diff --git a/CVE-2020/CVE-2020-257xx/CVE-2020-25730.json b/CVE-2020/CVE-2020-257xx/CVE-2020-25730.json index 4eade42e43b..0f1c2ab9d0e 100644 --- a/CVE-2020/CVE-2020-257xx/CVE-2020-25730.json +++ b/CVE-2020/CVE-2020-257xx/CVE-2020-25730.json @@ -2,7 +2,7 @@ "id": "CVE-2020-25730", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-04T08:15:06.283", - "lastModified": "2024-04-04T12:48:41.700", + "lastModified": "2024-11-04T19:35:00.910", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de Cross Site Scripting (XSS) en ZoneMinder anterior a la versi\u00f3n 1.34.21, permite a atacantes remotos ejecutar c\u00f3digo arbitrario, escalar privilegios y obtener informaci\u00f3n confidencial a trav\u00e9s del componente PHP_SELF en classic/views/download.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/ZoneMinder/zoneminder/commit/9268db14a79c4ccd444c2bf8d24e62b13207b413", diff --git a/CVE-2020/CVE-2020-52xx/CVE-2020-5200.json b/CVE-2020/CVE-2020-52xx/CVE-2020-5200.json index f8d4054bce5..88037776384 100644 --- a/CVE-2020/CVE-2020-52xx/CVE-2020-5200.json +++ b/CVE-2020/CVE-2020-52xx/CVE-2020-5200.json @@ -2,7 +2,7 @@ "id": "CVE-2020-5200", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T18:15:19.650", - "lastModified": "2024-04-30T19:35:36.960", + "lastModified": "2024-11-04T20:35:00.717", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Minerbabe hasta V4.16 se entrega con claves de host SSH integradas en la imagen de instalaci\u00f3n, lo que permite ataques de intermediario y hace que la identificaci\u00f3n de todos los nodos IPv4 p\u00fablicos sea trivial con Shodan.io." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://en.minerbabe.com/pc.html/#/helps/updateLog", diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47070.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47070.json index efb2031c847..d8b394d8215 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47070.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47070.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47070", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-01T22:15:46.920", - "lastModified": "2024-03-01T22:22:25.913", + "lastModified": "2024-11-04T19:35:01.957", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: uio_hv_generic: soluciona otra p\u00e9rdida de memoria en las rutas de manejo de errores. La memoria asignada por 'vmbus_alloc_ring()' al comienzo de la funci\u00f3n de sondeo nunca se libera en la ruta de manejo de errores. Agregue la llamada 'vmbus_free_ring()' que falta. Tenga en cuenta que ya est\u00e1 liberado en la funci\u00f3n .remove." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/0b0226be3a52dadd965644bc52a807961c2c26df", diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47262.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47262.json index 7bc4041549c..51fee0f4c49 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47262.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47262.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47262", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:14.930", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-11-04T19:35:02.187", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: KVM: x86: Garantizar la vivacidad de la VM anidada. Ingrese el mensaje de punto de seguimiento de falla. Utilice la maquinaria __string() proporcionada por el subsistema de seguimiento para hacer una copia de los literales de cadena consumidos por los puntos de seguimiento \"nested VM-Enter failed\". Es necesaria una copia completa para garantizar que el punto de seguimiento no pueda vivir m\u00e1s que los datos o la memoria que consume y para evitar la memoria obsoleta. Debido a que el punto de seguimiento en s\u00ed est\u00e1 definido por kvm, si kvm-intel y/o kvm-amd se construyen como m\u00f3dulos, la memoria que contiene los literales de cadena definidos por los m\u00f3dulos del proveedor se liberar\u00e1 cuando se descargue el m\u00f3dulo, mientras que el punto de seguimiento y sus datos en el b\u00fafer circular permanecer\u00e1 hasta que se descargue kvm (o \"indefinidamente\" si kvm est\u00e1 integrado). Este error ha existido desde que se agreg\u00f3 el punto de seguimiento, pero recientemente qued\u00f3 expuesto mediante una nueva verificaci\u00f3n en el seguimiento para detectar exactamente este tipo de error. fmt: '%s%s ' current_buffer: ' vmx_dirty_log_t-140127 [003] .... kvm_nested_vmenter_failed: ' ADVERTENCIA: CPU: 3 PID: 140134 en kernel/trace/trace.c:3759 trace_check_vprintf+0x3be/0x3e0 CPU: 3 PID: 140134 Comm: less No contaminado 5.13.0-rc1-ce2e73ce600a-req #184 Nombre de hardware: ASUS Q87M-E/Q87M-E, BIOS 1102 03/03/2014 RIP: 0010:trace_check_vprintf+0x3be/0x3e0 C\u00f3digo: < 0f> 0b 44 8b 4c 24 1c e9 a9 fe ff ff c6 44 02 ff 00 49 8b 97 b0 20 RSP: 0018:ffffa895cc37bcb0 EFLAGS: 00010282 RAX: 0000000000000000 RBX: cc37bd08 RCX: 0000000000000027 RDX: 0000000000000027 RSI: 00000000ffffdfff RDI: ffff9766cfad74f8 RBP : ffffffffc0a041d4 R08: ffff9766cfad74f0 R09: ffffa895cc37bad8 R10: 0000000000000001 R11: 00000000000000001 R12: ffffffffc0a041d4 R13: ffffffffc0f4dba8 R 14: 0000000000000000 R15: ffff976409f2c000 FS: 00007f92fa200740(0000) GS:ffff9766cfac0000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 00 CR0: 0000000080050033 CR2: 0000559bd11b0000 CR3: 000000019fbaa002 CR4: 00000000001726e0 Seguimiento de llamadas: trace_event_printf+0x5e/0x80 3a/0x60 [kvm] print_trace_line+0x1dd/0x4e0 s_show+0x45/0x150 seq_read_iter+0x2d5/0x4c0 seq_read+0x106/0x150 vfs_read+ 0x98/0x180 ksys_read+0x5f/0xe0 do_syscall_64+0x40/0xb0 entrada_SYSCALL_64_after_hwframe+0x44/0xae" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/796d3bd4ac9316e70c181189318cd2bd98af34bc", diff --git a/CVE-2021/CVE-2021-475xx/CVE-2021-47547.json b/CVE-2021/CVE-2021-475xx/CVE-2021-47547.json index 52d28d45493..fd94c15f86b 100644 --- a/CVE-2021/CVE-2021-475xx/CVE-2021-47547.json +++ b/CVE-2021/CVE-2021-475xx/CVE-2021-47547.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47547", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-24T15:15:19.570", - "lastModified": "2024-05-24T18:09:20.027", + "lastModified": "2024-11-04T19:35:02.390", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: tulip: de4x5: soluciona el problema de que la matriz 'lp->phy[8]' puede estar fuera de l\u00edmites En la l\u00ednea 5001, si todos los ID de la matriz 'lp ->phy[8]' no es 0, cuando termina 'for', 'k' es 8. En este momento, la matriz 'lp->phy[8]' puede estar fuera de l\u00edmite." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/12f907cb11576b8cd0b1d95a16d1f10ed5bb7237", diff --git a/CVE-2023/CVE-2023-452xx/CVE-2023-45289.json b/CVE-2023/CVE-2023-452xx/CVE-2023-45289.json index 8a31fdf8c13..92dcd7446ae 100644 --- a/CVE-2023/CVE-2023-452xx/CVE-2023-45289.json +++ b/CVE-2023/CVE-2023-452xx/CVE-2023-45289.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45289", "sourceIdentifier": "security@golang.org", "published": "2024-03-05T23:15:07.137", - "lastModified": "2024-05-01T17:15:25.983", + "lastModified": "2024-11-04T19:35:02.600", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Al seguir una redirecci\u00f3n HTTP a un dominio que no es una coincidencia de subdominio o una coincidencia exacta del dominio inicial, un cliente http.no reenv\u00eda encabezados confidenciales como \"Autorizaci\u00f3n\" o \"Cookie\". Por ejemplo, una redirecci\u00f3n de foo.com a www.foo.com reenviar\u00e1 el encabezado de Autorizaci\u00f3n, pero una redirecci\u00f3n a bar.com no. Una redirecci\u00f3n HTTP creada con fines malintencionados podr\u00eda provocar que se reenv\u00eden inesperadamente encabezados confidenciales." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/08/4", diff --git a/CVE-2023/CVE-2023-500xx/CVE-2023-50059.json b/CVE-2023/CVE-2023-500xx/CVE-2023-50059.json index 1d0fad4cf99..09b07bbc811 100644 --- a/CVE-2023/CVE-2023-500xx/CVE-2023-50059.json +++ b/CVE-2023/CVE-2023-500xx/CVE-2023-50059.json @@ -2,7 +2,7 @@ "id": "CVE-2023-50059", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T19:15:23.097", - "lastModified": "2024-04-30T19:35:36.960", + "lastModified": "2024-11-04T20:35:01.547", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema ingalxe.com La plataforma Galxe 1.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del proceso de autenticaci\u00f3n Web3 de Galxe, el mensaje firmado carece de un nonce (n\u00famero aleatorio)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-338" + } + ] + } + ], "references": [ { "url": "https://galxe.com/", diff --git a/CVE-2023/CVE-2023-520xx/CVE-2023-52066.json b/CVE-2023/CVE-2023-520xx/CVE-2023-52066.json index 9fe5f7a6c92..f0e602d6a05 100644 --- a/CVE-2023/CVE-2023-520xx/CVE-2023-52066.json +++ b/CVE-2023/CVE-2023-520xx/CVE-2023-52066.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52066", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.000", - "lastModified": "2024-11-01T12:57:03.417", + "lastModified": "2024-11-04T19:35:02.827", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Se descubri\u00f3 que el commit 76cf5 de http.zig conten\u00eda una vulnerabilidad de inyecci\u00f3n CRLF a trav\u00e9s del par\u00e1metro url." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://github.com/karlseguin/http.zig/issues/25", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52481.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52481.json index c40474f166b..69bff113cbc 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52481.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52481.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52481", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-29T06:15:46.060", - "lastModified": "2024-02-29T13:49:29.390", + "lastModified": "2024-11-04T20:35:02.537", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: errata: Agregar workaround de carga especulativa sin privilegios de Cortex-A520 Implementar la workaround para la errata 2966298 de ARM Cortex-A520. En un n\u00facleo Cortex-A520 afectado, una carga sin privilegios ejecutada especulativamente podr\u00eda filtrarse datos de una carga privilegiada a trav\u00e9s de un canal lateral de cach\u00e9. El problema s\u00f3lo existe para cargas dentro de un r\u00e9gimen de traducci\u00f3n con la misma traducci\u00f3n (por ejemplo, el mismo ASID y VMID). Por tanto, el problema s\u00f3lo afecta al retorno a EL0. La soluci\u00f3n es ejecutar un TLBI antes de regresar a EL0 despu\u00e9s de todas las cargas de datos privilegiados. Un TLBI que no se pueda compartir con cualquier direcci\u00f3n es suficiente. El workaround no es necesario si el aislamiento de la tabla de p\u00e1ginas (KPTI) est\u00e1 habilitado, pero por simplicidad lo ser\u00e1. El aislamiento de la tabla de p\u00e1ginas normalmente debe estar deshabilitado para Cortex-A520, ya que admite la funci\u00f3n CSV3 y la funci\u00f3n E0PD (utilizada cuando KASLR est\u00e1 habilitado)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/32b0a4ffcaea44a00a61e40c0d1bcc50362aee25", diff --git a/CVE-2024/CVE-2024-00xx/CVE-2024-0017.json b/CVE-2024/CVE-2024-00xx/CVE-2024-0017.json index 01df650ccae..761395b2c1f 100644 --- a/CVE-2024/CVE-2024-00xx/CVE-2024-0017.json +++ b/CVE-2024/CVE-2024-00xx/CVE-2024-0017.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0017", "sourceIdentifier": "security@android.com", "published": "2024-02-16T20:15:47.513", - "lastModified": "2024-02-16T21:39:50.223", + "lastModified": "2024-11-04T19:35:03.033", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En shouldUseNoOpLocation of CameraActivity.java, hay un posible adjunto confundido debido a una omisi\u00f3n de permisos. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/apps/Camera2/+/5c4c4b35754eef319dcd69c422f0b1ac0c823f6e", diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10100.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10100.json index 872ed4b4342..1df7095267f 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10100.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10100.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10100", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-17T19:15:21.533", - "lastModified": "2024-10-18T12:52:33.507", + "lastModified": "2024-11-04T19:15:05.297", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -22,19 +22,19 @@ "type": "Secondary", "cvssData": { "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "availabilityImpact": "NONE", - "baseScore": 7.5, - "baseSeverity": "HIGH" + "baseScore": 6.5, + "baseSeverity": "MEDIUM" }, - "exploitabilityScore": 3.9, + "exploitabilityScore": 2.8, "impactScore": 3.6 } ] diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10101.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10101.json index 35b0ac01f39..60ebd016068 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10101.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10101.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10101", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-17T19:15:21.713", - "lastModified": "2024-10-18T12:52:33.507", + "lastModified": "2024-11-04T19:15:05.527", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -22,19 +22,19 @@ "type": "Secondary", "cvssData": { "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "NONE", + "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 8.2, + "baseScore": 7.6, "baseSeverity": "HIGH" }, - "exploitabilityScore": 2.8, + "exploitabilityScore": 2.3, "impactScore": 4.7 } ] diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10598.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10598.json index c59a26a6a4d..a68c1a978f2 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10598.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10598.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10598", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-31T22:15:02.960", - "lastModified": "2024-11-01T12:57:03.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-04T19:44:05.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in Tongda OA 11.2/11.3/11.4/11.5/11.6. This vulnerability affects unknown code of the file general/hr/setting/attendance/leave/data.php of the component Annual Leave Handler. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": " Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Tongda OA 11.2/11.3/11.4/11.5/11.6. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo general/hr/setting/attendance/leave/data.php del componente Annual Leave Handler. La manipulaci\u00f3n conduce a una autorizaci\u00f3n indebida. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -106,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -116,22 +150,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tongda2000:office_anywhere:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.2", + "versionEndIncluding": "11.6", + "matchCriteriaId": "C756DF9A-7043-4989-8EC6-5614A809B53B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/LvZCh/td/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.282610", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.282610", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.433495", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10599.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10599.json index 0613d3c76fa..d4994e4241c 100644 --- a/CVE-2024/CVE-2024-105xx/CVE-2024-10599.json +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10599.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10599", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-31T22:15:03.267", - "lastModified": "2024-11-01T12:57:03.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-04T19:44:59.183", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in Tongda OA 2017 up to 11.7. This issue affects some unknown processing of the file /inc/package_static_resources.php. The manipulation leads to resource consumption. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en Tongda OA 2017 hasta la versi\u00f3n 11.7. Este problema afecta a algunos procesos desconocidos del archivo /inc/package_static_resources.php. La manipulaci\u00f3n provoca el consumo de recursos. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -106,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -116,22 +150,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tongda2000:office_anywhere:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0", + "versionEndIncluding": "11.7", + "matchCriteriaId": "9BB8B3E0-586B-4775-AE6A-F89D816DF1D2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tongda2000:office_anywhere:2017:*:*:*:*:*:*:*", + "matchCriteriaId": "2F3133D0-47ED-4B20-AE9A-55920B76E55E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/LvZCh/td/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.282611", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.282611", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.433496", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10600.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10600.json index 9af49c84c56..38bb2ca6422 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10600.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10600.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10600", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-31T23:15:12.067", - "lastModified": "2024-11-01T12:57:03.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-04T19:45:26.723", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in Tongda OA 2017 up to 11.6. Affected is an unknown function of the file pda/appcenter/submenu.php. The manipulation of the argument appid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Tongda OA 2017 hasta la versi\u00f3n 11.6. Se trata de una funci\u00f3n desconocida del archivo pda/appcenter/submenu.php. La manipulaci\u00f3n del argumento appid provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tongda2000:office_anywhere:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0", + "versionEndIncluding": "11.6", + "matchCriteriaId": "97BBFE62-53E4-45AA-8402-EF3F17FCD3A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tongda2000:office_anywhere:2017:*:*:*:*:*:*:*", + "matchCriteriaId": "2F3133D0-47ED-4B20-AE9A-55920B76E55E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/LvZCh/td/issues/3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.282612", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.282612", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.433497", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10601.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10601.json index e93d767a991..9233c254ac4 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10601.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10601.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10601", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-31T23:15:12.343", - "lastModified": "2024-11-01T12:57:03.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-04T19:45:45.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in Tongda OA 2017 up to 11.10 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /general/address/private/address/query/delete.php. The manipulation of the argument where_repeat leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": " Se ha encontrado una vulnerabilidad en Tongda OA 2017 hasta la versi\u00f3n 11.10 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /general/address/private/address/query/delete.php. La manipulaci\u00f3n del argumento where_repeat conduce a una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tongda2000:office_anywhere:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0", + "versionEndIncluding": "11.10", + "matchCriteriaId": "0946EEC6-F87E-4290-82B7-A9C870BBC6DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tongda2000:office_anywhere:2017:*:*:*:*:*:*:*", + "matchCriteriaId": "2F3133D0-47ED-4B20-AE9A-55920B76E55E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/LvZCh/td/issues/4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.282613", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.282613", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.433498", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10602.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10602.json index e4b73c21fd6..8f6d09fa0a1 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10602.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10602.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10602", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-01T00:15:02.973", - "lastModified": "2024-11-01T12:57:03.417", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-04T19:46:22.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Tongda OA 2017 up to 11.9 and classified as critical. Affected by this issue is some unknown functionality of the file /general/approve_center/list/input_form/data_picker_link.php. The manipulation of the argument dataSrc leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Tongda OA 2017 hasta la versi\u00f3n 11.9 y se clasific\u00f3 como cr\u00edtica. Este problema afecta a algunas funciones desconocidas del archivo /general/approve_center/list/input_form/data_picker_link.php. La manipulaci\u00f3n del argumento dataSrc conduce a una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha revelado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tongda2000:office_anywhere:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0", + "versionEndIncluding": "11.9", + "matchCriteriaId": "353F28DF-DFC8-4206-A613-5E15AB3F4D7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tongda2000:office_anywhere:2017:*:*:*:*:*:*:*", + "matchCriteriaId": "2F3133D0-47ED-4B20-AE9A-55920B76E55E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/LvZCh/td/issues/5", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.282614", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.282614", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.433499", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10655.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10655.json index 2e337904e75..49db734f728 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10655.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10655.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10655", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-01T14:15:05.057", - "lastModified": "2024-11-01T20:25:15.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-04T19:47:40.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Tongda OA 2017 up to 11.9. It has been declared as critical. This vulnerability affects unknown code of the file /pda/reportshop/new.php. The manipulation of the argument repid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": " Se ha detectado una vulnerabilidad en Tongda OA 2017 hasta la versi\u00f3n 11.9. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /pda/reportshop/new.php. La manipulaci\u00f3n del argumento repid provoca una inyecci\u00f3n SQL. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tongda2000:office_anywhere:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0", + "versionEndIncluding": "11.9", + "matchCriteriaId": "353F28DF-DFC8-4206-A613-5E15AB3F4D7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tongda2000:office_anywhere:2017:*:*:*:*:*:*:*", + "matchCriteriaId": "2F3133D0-47ED-4B20-AE9A-55920B76E55E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/LvZCh/td/issues/11", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.282670", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.282670", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.433515", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10656.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10656.json index 47623818e1b..62dde6b956a 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10656.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10656.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10656", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-01T15:15:16.960", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-04T19:47:22.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Tongda OA 2017 up to 11.9. It has been rated as critical. This issue affects some unknown processing of the file /pda/meeting/apply.php. The manipulation of the argument mr_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en Tongda OA 2017 hasta la versi\u00f3n 11.9. Se ha calificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /pda/meeting/apply.php. La manipulaci\u00f3n del argumento mr_id provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,62 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tongda2000:office_anywhere:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.0", + "versionEndIncluding": "11.9", + "matchCriteriaId": "353F28DF-DFC8-4206-A613-5E15AB3F4D7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tongda2000:office_anywhere:2017:*:*:*:*:*:*:*", + "matchCriteriaId": "2F3133D0-47ED-4B20-AE9A-55920B76E55E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/LvZCh/td/issues/12", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.282671", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.282671", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.433517", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10657.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10657.json index 5e88ba4e32a..e79390dbe5a 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10657.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10657.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10657", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-01T15:15:17.247", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-04T19:47:03.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical has been found in Tongda OA up to 11.10. Affected is an unknown function of the file /pda/approve_center/prcs_info.php. The manipulation of the argument RUN_ID leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": " Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en Tongda OA hasta la versi\u00f3n 11.10. Se ve afectada una funci\u00f3n desconocida del archivo /pda/approve_center/prcs_info.php. La manipulaci\u00f3n del argumento RUN_ID provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tongda2000:office_anywhere:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.2", + "versionEndIncluding": "11.10", + "matchCriteriaId": "E9BC7829-F010-4D46-96CD-0E7475A139E7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/LvZCh/td/issues/13", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.282672", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.282672", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.433528", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10658.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10658.json index 0417ce0ca85..bad25b095b7 100644 --- a/CVE-2024/CVE-2024-106xx/CVE-2024-10658.json +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10658.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10658", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-01T15:15:17.500", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-04T19:46:45.707", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in Tongda OA up to 11.10. Affected by this vulnerability is an unknown functionality of the file /pda/approve_center/check_seal.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en Tongda OA hasta la versi\u00f3n 11.10. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /pda/approve_center/check_seal.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,57 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tongda2000:office_anywhere:*:*:*:*:*:*:*:*", + "versionStartIncluding": "11.2", + "versionEndIncluding": "11.10", + "matchCriteriaId": "E9BC7829-F010-4D46-96CD-0E7475A139E7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/LvZCh/td/issues/14", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.282673", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.282673", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.433529", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10768.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10768.json new file mode 100644 index 00000000000..dfb7324355a --- /dev/null +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10768.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2024-10768", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-04T19:15:05.743", + "lastModified": "2024-11-04T19:15:05.743", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic was found in PHPGurukul Online Shopping Portal 2.0. This vulnerability affects unknown code of the file /admin/assets/plugins/DataTables/media/unit_testing/templates/two_tables.php. The manipulation of the argument scripts leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-707" + }, + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/secuserx/CVE/blob/main/%5BXSS%20vulnerability%5D%20found%20in%20Online%20Shopping%20Portal%202.0%20-%20(two_tables.php).md", + "source": "cna@vuldb.com" + }, + { + "url": "https://phpgurukul.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.282988", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.282988", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.436531", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10791.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10791.json new file mode 100644 index 00000000000..1d93d88364b --- /dev/null +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10791.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2024-10791", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-04T20:15:04.580", + "lastModified": "2024-11-04T20:15:04.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in Codezips Hospital Appointment System 1.0. This issue affects some unknown processing of the file /doctorAction.php. The manipulation of the argument Name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting file and parameter names to be affected." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-707" + }, + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/3127434/CVE/issues/2", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.282989", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.282989", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.436538", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-227xx/CVE-2024-22733.json b/CVE-2024/CVE-2024-227xx/CVE-2024-22733.json index a25b59c0f58..aea9ee1f353 100644 --- a/CVE-2024/CVE-2024-227xx/CVE-2024-22733.json +++ b/CVE-2024/CVE-2024-227xx/CVE-2024-22733.json @@ -2,20 +2,92 @@ "id": "CVE-2024-22733", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-01T16:15:08.077", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-04T20:01:12.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "TP Link MR200 V4 Firmware version 210201 was discovered to contain a null-pointer-dereference in the web administration panel on /cgi/login via the sign, Action or LoginStatus query parameters which could lead to a denial of service by a local or remote unauthenticated attacker." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 que la versi\u00f3n de firmware 210201 de TP Link MR200 V4 contiene una desreferencia de puntero nulo en el panel de administraci\u00f3n web en /cgi/login a trav\u00e9s de los par\u00e1metros de consulta sign, Action o LoginStatus, lo que podr\u00eda provocar una denegaci\u00f3n de servicio por parte de un atacante local o remoto no autenticado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:mr200_firmware:210201:*:*:*:*:*:*:*", + "matchCriteriaId": "1C1DE34A-147D-4532-980B-2C6CC6B247F6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:mr200:4:*:*:*:*:*:*:*", + "matchCriteriaId": "0DB5A797-BD97-481C-A804-1A7B7E090A2F" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://lenoctambule.dev/post/dos-on-tp-link-web-admin-panel", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-250xx/CVE-2024-25082.json b/CVE-2024/CVE-2024-250xx/CVE-2024-25082.json index 2464ab87f95..db965512034 100644 --- a/CVE-2024/CVE-2024-250xx/CVE-2024-25082.json +++ b/CVE-2024/CVE-2024-250xx/CVE-2024-25082.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25082", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-26T16:27:58.763", - "lastModified": "2024-05-01T19:15:22.237", + "lastModified": "2024-11-04T19:35:04.633", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Splinefont en FontForge hasta 20230101 permite la inyecci\u00f3n de comandos a trav\u00e9s de archivos creados o comprimidos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/08/2", diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25972.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25972.json index c42556235bf..ac64f82493a 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25972.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25972.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25972", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-03-01T10:15:07.413", - "lastModified": "2024-03-01T14:04:04.827", + "lastModified": "2024-11-04T20:35:03.760", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La inicializaci\u00f3n de un recurso con una vulnerabilidad predeterminada insegura en OET-213H-BTS1 vendido en Jap\u00f3n por Atsumi Electric Co., Ltd. permite a un atacante no autenticado adyacente a la red configurar y controlar el producto afectado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1188" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN77203800/", diff --git a/CVE-2024/CVE-2024-262xx/CVE-2024-26299.json b/CVE-2024/CVE-2024-262xx/CVE-2024-26299.json index b57fb596c3d..deb261f7999 100644 --- a/CVE-2024/CVE-2024-262xx/CVE-2024-26299.json +++ b/CVE-2024/CVE-2024-262xx/CVE-2024-26299.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26299", "sourceIdentifier": "security-alert@hpe.com", "published": "2024-02-27T22:15:15.723", - "lastModified": "2024-02-28T14:06:45.783", + "lastModified": "2024-11-04T19:35:05.457", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-001.txt", diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26652.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26652.json index fdce774154c..3e031f580cb 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26652.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26652.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26652", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-27T14:15:10.297", - "lastModified": "2024-03-27T15:49:41.437", + "lastModified": "2024-11-04T20:35:04.647", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net: pds_core: corrige posible doble liberaci\u00f3n en la ruta de manejo de errores Cuando auxiliar_device_add() devuelve un error y luego llama a auxiliar_device_uninit(), la funci\u00f3n de devoluci\u00f3n de llamada pdsc_auxbus_dev_release llama a kfree(padev) para liberar memoria. No deber\u00edamos volver a llamar a kfree(padev) en la ruta de manejo de errores. Solucione este problema limpiando el kfree() redundante y devolviendo el manejo de errores al lugar donde ocurrieron los errores." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.7, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/995f802abff209514ac2ee03b96224237646cec3", diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26737.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26737.json index 83418219542..23eaaa62387 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26737.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26737.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26737", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:51.243", - "lastModified": "2024-04-03T17:24:18.150", + "lastModified": "2024-11-04T19:35:06.193", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: bpf: Correcci\u00f3n de ejecuci\u00f3ns entre bpf_timer_cancel_and_free y bpf_timer_cancel La siguiente ejecuci\u00f3n es posible entre bpf_timer_cancel_and_free y bpf_timer_cancel. Dirigir\u00e1 una UAF en el temporizador->temporizador. bpf_timer_cancel(); spin_lock(); t = temporizador->tiempo; spin_unlock(); bpf_timer_cancel_and_free(); spin_lock(); t = temporizador->temporizador; temporizador->temporizador = NULL; spin_unlock(); hrtimer_cancel(&t->temporizador); klibre(t); /* UAF en t */ hrtimer_cancel(&t->timer); En bpf_timer_cancel_and_free, este parche libera el temporizador->temporizador despu\u00e9s de un per\u00edodo de gracia de rcu. Esto requiere una adici\u00f3n de rcu_head a \"struct bpf_hrtimer\". Otro kfree(t) ocurre en bpf_timer_init, esto no necesita un kfree_rcu porque todav\u00eda est\u00e1 bajo spin_lock y otros a\u00fan no han visible el temporizador->temporizador. En bpf_timer_cancel, se agrega rcu_read_lock() porque este asistente puede usarse en un contexto de secci\u00f3n no cr\u00edtica para rcu (por ejemplo, desde un programa bpf que se puede dormir). Se han auditado otros usos de temporizador->temporizador en helpers.c, bpf_timer_cancel() es el \u00fanico lugar donde se usa temporizador->temporizador fuera de spin_lock. Otra soluci\u00f3n considerada es marcar una bandera t-> en bpf_timer_cancel y borrarla una vez finalizado hrtimer_cancel(). En bpf_timer_cancel_and_free, est\u00e1 ocupado esperando a que se borre la bandera antes de kfree(t). Este parche incluye una soluci\u00f3n sencilla y libera el temporizador->temporizador despu\u00e9s de un per\u00edodo de gracia de rcu." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/0281b919e175bb9c3128bd3872ac2903e9436e3f", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26828.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26828.json index 201736f03db..b068feca1bc 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26828.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26828.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26828", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T10:15:09.300", - "lastModified": "2024-04-17T12:48:07.510", + "lastModified": "2024-11-04T19:35:06.407", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: cifs: corrige el desbordamiento insuficiente en parse_server_interfaces() En este bucle, recorremos el b\u00fafer y despu\u00e9s de cada elemento comprobamos si size_left es mayor que el tama\u00f1o m\u00ednimo que necesitamos. Sin embargo, el problema es que \"bytes_left\" es del tipo ssize_t mientras que sizeof() es del tipo size_t. Eso significa que debido a la promoci\u00f3n de tipo, la comparaci\u00f3n se realiza sin firmar y si nos quedan bytes negativos, el ciclo contin\u00faa en lugar de finalizar." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.5, + "impactScore": 5.2 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/7190353835b4a219abb70f90b06cdcae97f11512", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26918.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26918.json index 32d5bee1bb7..3df08c5d022 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26918.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26918.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26918", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-17T16:15:08.303", - "lastModified": "2024-04-17T16:51:07.347", + "lastModified": "2024-11-04T19:35:06.627", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: PCI: corrige el requisito de estado activo en el sondeo de PME. La confirmaci\u00f3n observada en las correcciones agreg\u00f3 un requisito falso de que los dispositivos administrados por PM en tiempo de ejecuci\u00f3n deben estar en el estado RPM_ACTIVE para el sondeo de PME. De hecho, s\u00f3lo se deben sondear los dispositivos en estados de bajo consumo de energ\u00eda. Sin embargo, todav\u00eda existe el requisito de que se pueda acceder al espacio de configuraci\u00f3n del dispositivo, lo que tiene implicaciones tanto para el estado actual del dispositivo sondeado como para el puente principal, cuando est\u00e9 presente. No es suficiente asumir que el puente permanece en D0 y se han observado casos en los que el puente pasa la prueba D0, pero el estado PM indica RPM_SUSPENDING y el espacio de configuraci\u00f3n del dispositivo sondeado se vuelve inaccesible durante pci_pme_wakeup(). Por lo tanto, dado que ya se requiere que el puente est\u00e9 en el estado RPM_ACTIVE, formalice esto en el c\u00f3digo y eleve el recuento de uso de PM para mantener el estado mientras se sondea el dispositivo subordinado. Esto resuelve una regresi\u00f3n reportada en el bugzilla a continuaci\u00f3n donde una jerarqu\u00eda Thunderbolt/USB4 no puede buscar un endpoint NVMe conectado aguas abajo de un puente en un estado de energ\u00eda D3hot." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/41044d5360685e78a869d40a168491a70cdb7e73", diff --git a/CVE-2024/CVE-2024-269xx/CVE-2024-26940.json b/CVE-2024/CVE-2024-269xx/CVE-2024-26940.json index ed14ce983a3..e6772d9ef7e 100644 --- a/CVE-2024/CVE-2024-269xx/CVE-2024-26940.json +++ b/CVE-2024/CVE-2024-269xx/CVE-2024-26940.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26940", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-01T06:15:09.343", - "lastModified": "2024-05-01T13:02:20.750", + "lastModified": "2024-11-04T19:35:06.833", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/vmwgfx: cree la entrada debugfs ttm_resource_manager solo si es necesario. El controlador crea /sys/kernel/debug/dri/0/mob_ttm incluso cuando el ttm_resource_manager correspondiente no est\u00e1 asignado. Esto provoca un bloqueo al intentar leer este archivo. Agregue una marca para crear archivos de depuraci\u00f3n mob_ttm, system_mob_ttm y gmr_ttm solo cuando se asigne el ttm_resource_manager correspondiente. crash> bt PID: 3133409 TAREA: ffff8fe4834a5000 CPU: 3 COMANDO: \"grep\" #0 [ffffb954506b3b20] machine_kexec en ffffffffb2a6bec3 #1 [ffffb954506b3b78] __crash_kexec en ffffffffb2bb598a #2 ffb954506b3c38] crash_kexec en ffffffffb2bb68c1 #3 [ffffb954506b3c50] oops_end en ffffffffb2a2a9b1 # 4 [ffffb954506b3c70] no_context en ffffffffb2a7e913 #5 [ffffb954506b3cc8] __bad_area_nosemaphore en ffffffffb2a7ec8c #6 [ffffb954506b3d10] do_page_fault en ffffffffb2a7f887 #7 54506b3d40] page_fault en ffffffffb360116e [excepci\u00f3n RIP: ttm_resource_manager_debug+0x11] RIP: ffffffffc04afd11 RSP: ffffb954506b3df0 RFLAGS: 00010246 RAX: ffff8fe41a6d1200 RBX: 0000000000000000 RCX: 0000000000000940 RDX: 0000000000000000 RSI: ffffffffc04b4338 RDI: 0000000000000000 RBP: ffffb9545 06b3e08 R8: ffff8fee3ffad000 R9: 0000000000000000 R10: ffff8fe41a76a000 R11: 0000000000000001 R12: 00000000ffffffff R13: 0000000000000001 R14: ffff8fe5bb6f3900 R15: ffff8fe41a6d1200 ORIG_RAX: ffffffffffffff CS: 0010 SS : 0018 #8 [ffffb954506b3e00] ttm_resource_manager_show en ffffffffc04afde7 [ttm] #9 [ffffb954506b3e30] seq_read en ffffffffb2d8f9f3 RIP: 00007f4c4eda8985 RSP: RFLAGS: 00000246 RAX: ffffffffffffffda RBX: 000000000037e000 RCX: 00007f4c4eda8985 RDX: 000000000037e000 RSI: 00007f4c41573000 RDI: 00000000000000 03 PBR: 000000000037e000 R8: 0000000000000000 R9: 000000000037fe30 R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4c41573000 R13: 0000000000000003 R14: 00007f4c41572010 R15: 0000000000000003 ORIG_RAX: 0000000000000000 CS: 0033 SS: 002b" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/016119154981d81c9e8f2ea3f56b9e2b4ea14500", diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27393.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27393.json index 299a0a51882..4abf0bcb1b5 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27393.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27393.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27393", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-14T15:12:26.993", - "lastModified": "2024-06-10T17:16:23.223", + "lastModified": "2024-11-04T19:35:07.067", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: xen-netfront: agrega skb_mark_for_recycle faltante. Tenga en cuenta que skb_mark_for_recycle() se introduce m\u00e1s tarde que la etiqueta de correcci\u00f3n en el commit 6a5bcd84e886 (\"page_pool: permitir que los controladores indiquen el reciclaje de SKB\"). Se cree que a la etiqueta de correcciones le faltaba una llamada a page_pool_release_page() entre v5.9 y v5.14, despu\u00e9s de lo cual deber\u00eda haber usado skb_mark_for_recycle(). Desde v6.6, la llamada page_pool_release_page() se elimin\u00f3 (en el commit 535b9c61bdef (\"net: page_pool: hide page_pool_release_page()\") y las personas que llaman restantes se convirtieron (en el commit 6bfef2ec0172 (\"Merge Branch 'net-page_pool-remove-page_pool_release_page'\") ). Esta fuga se hizo visible en la versi\u00f3n 6.8 mediante el commit dba1b8a7ab68 (\"mm/page_pool: captura p\u00e9rdidas de memoria en page_pool\")." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/05/08/4", diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27524.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27524.json index 6e4a58da755..919526e2788 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27524.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27524.json @@ -2,16 +2,55 @@ "id": "CVE-2024-27524", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-01T15:15:17.907", - "lastModified": "2024-11-01T20:24:53.730", + "lastModified": "2024-11-04T20:35:04.913", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in Chamilo LMS v.1.11.26 allows a remote attacker to escalate privileges via a crafted script to the filename parameter of the new_ticket.php component." + }, + { + "lang": "es", + "value": " La vulnerabilidad de cross site scripting en Chamilo LMS v.1.11.26 permite a un atacante remoto escalar privilegios a trav\u00e9s de un script manipulado espec\u00edficamente para el par\u00e1metro filename del componente new_ticket.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/chamilo/chamilo-lms/commit/53275c152275958b33a1f87a21843daa52fb543a", diff --git a/CVE-2024/CVE-2024-275xx/CVE-2024-27525.json b/CVE-2024/CVE-2024-275xx/CVE-2024-27525.json index 478c513cd56..0c7b36e21ae 100644 --- a/CVE-2024/CVE-2024-275xx/CVE-2024-27525.json +++ b/CVE-2024/CVE-2024-275xx/CVE-2024-27525.json @@ -2,16 +2,55 @@ "id": "CVE-2024-27525", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-01T15:15:18.003", - "lastModified": "2024-11-01T20:24:53.730", + "lastModified": "2024-11-04T20:35:05.800", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in Chamilo LMS v.1.11.26 allows a remote attacker to escalate privileges via a crafted script to the filename parameter of the home.php component." + }, + { + "lang": "es", + "value": "La vulnerabilidad de cross site scripting en Chamilo LMS v.1.11.26 permite a un atacante remoto escalar privilegios a trav\u00e9s de un script manipulado espec\u00edficamente para el par\u00e1metro filename del componente home.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/chamilo/chamilo-lms/commit/a63e03ef961e7bf2dab56f4ede6f87edef40ba0c", diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30616.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30616.json new file mode 100644 index 00000000000..c3063e6163f --- /dev/null +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30616.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-30616", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-04T19:15:06.193", + "lastModified": "2024-11-04T19:15:06.193", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Chamilo LMS 1.11.26 is vulnerable to Incorrect Access Control via main/auth/profile. Non-admin users can manipulate sensitive profiles information, posing a significant risk to data integrity." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/bahadoumi/Vulnerability-Research/tree/main/CVE-2024-30616", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/chamilo/chamilo-lms/commit/a1a1e4df70dc65ae4fc7857135f4d3ee185548e7", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30617.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30617.json new file mode 100644 index 00000000000..6dee0c534d0 --- /dev/null +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30617.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-30617", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-04T19:15:06.277", + "lastModified": "2024-11-04T19:15:06.277", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Cross-Site Request Forgery (CSRF) vulnerability in Chamilo LMS 1.11.26 \"/main/social/home.php,\" allows attackers to initiate a request that posts a fake post onto the user's social wall without their consent or knowledge." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/bahadoumi/Vulnerability-Research/tree/main/CVE-2024-30617", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/chamilo/chamilo-lms/commit/7a0e10cccc92eadae9403925f995b0a8d2d1305e", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30618.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30618.json new file mode 100644 index 00000000000..066dfd55e5c --- /dev/null +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30618.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-30618", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-04T19:15:06.360", + "lastModified": "2024-11-04T19:15:06.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Stored Cross-Site Scripting (XSS) Vulnerability in Chamilo LMS 1.11.26 allows a remote attacker to execute arbitrary JavaScript in a web browser by including a malicious payload in the 'content' parameter of 'group_topics.php'." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/bahadoumi/Vulnerability-Research/tree/main/CVE-2024-30618", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/chamilo/chamilo-lms/commit/3b98682199049ebfb170ace16ada9a7c8e9a6622", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-306xx/CVE-2024-30619.json b/CVE-2024/CVE-2024-306xx/CVE-2024-30619.json new file mode 100644 index 00000000000..827e7fe00f0 --- /dev/null +++ b/CVE-2024/CVE-2024-306xx/CVE-2024-30619.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-30619", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-04T19:15:06.440", + "lastModified": "2024-11-04T19:15:06.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Chamilo LMS Version 1.11.26 is vulnerable to Incorrect Access Control. A non-authenticated attacker can request the number of messages and the number of online users via \"/main/inc/ajax/message.ajax.php?a=get_count_message\" AND \"/main/inc/ajax/online.ajax.php?a=get_users_online.\"" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/bahadoumi/Vulnerability-Research/tree/main/CVE-2024-30619", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/chamilo/chamilo-lms/commit/bef68ffe0552cd25b0ef760e582e1188f0f6bf4b", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-342xx/CVE-2024-34223.json b/CVE-2024/CVE-2024-342xx/CVE-2024-34223.json index bec4e0c22ba..e8390972401 100644 --- a/CVE-2024/CVE-2024-342xx/CVE-2024-34223.json +++ b/CVE-2024/CVE-2024-342xx/CVE-2024-34223.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34223", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T15:38:36.463", - "lastModified": "2024-05-14T16:12:23.490", + "lastModified": "2024-11-04T19:35:07.467", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de permiso inseguro en /hrm/leaverequest.php en SourceCodester Human Resource Management System 1.0 permite a los atacantes aprobar o rechazar el ticket de licencia." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://github.com/dovankha/CVE-2024-34223", diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34885.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34885.json new file mode 100644 index 00000000000..ed4fd2d7bf5 --- /dev/null +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34885.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-34885", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-04T19:15:06.560", + "lastModified": "2024-11-04T19:15:06.560", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficiently protected credentials in SMTP server settings in 1C-Bitrix Bitrix24 23.300.100 allows remote administrators to read SMTP accounts passwords via HTTP GET request." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://bitrix24.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/DrieVlad/BitrixVulns", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-348xx/CVE-2024-34891.json b/CVE-2024/CVE-2024-348xx/CVE-2024-34891.json new file mode 100644 index 00000000000..05919582bc4 --- /dev/null +++ b/CVE-2024/CVE-2024-348xx/CVE-2024-34891.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-34891", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-04T19:15:06.647", + "lastModified": "2024-11-04T19:15:06.647", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficiently protected credentials in DAV server settings in 1C-Bitrix Bitrix24 23.300.100 allows remote administrators to read Exchange account passwords via HTTP GET request." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://bitrix24.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/DrieVlad/BitrixVulns", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-350xx/CVE-2024-35083.json b/CVE-2024/CVE-2024-350xx/CVE-2024-35083.json index d48843e93eb..9e52dfdcb41 100644 --- a/CVE-2024/CVE-2024-350xx/CVE-2024-35083.json +++ b/CVE-2024/CVE-2024-350xx/CVE-2024-35083.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35083", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-23T17:15:30.637", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-11-04T20:35:06.920", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que J2EEFAST v2.7.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s de la funci\u00f3n findPage en SysLoginInfoMapper.xml." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/35083.txt", diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36117.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36117.json index e361c97e2c3..b2cac42f93c 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36117.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36117.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36117", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-19T18:15:11.220", - "lastModified": "2024-06-20T12:43:25.663", + "lastModified": "2024-11-04T19:15:06.733", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,9 +52,17 @@ } ], "references": [ + { + "url": "https://github.com/dzikoysk/reposilite/commit/e172ae4b539c822d0d6e04cf090713c7202a79d6", + "source": "security-advisories@github.com" + }, { "url": "https://github.com/dzikoysk/reposilite/releases/tag/3.5.12", "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/dzikoysk/reposilite/security/advisories/GHSA-82j3-hf72-7x93", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36953.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36953.json index af62aadf349..331342641cf 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36953.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36953.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36953", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:18.233", - "lastModified": "2024-06-27T14:15:15.170", + "lastModified": "2024-11-04T19:35:09.213", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: KVM: arm64: vgic-v2: Verifique vCPU que no sea NULL en vgic_v2_parse_attr() vgic_v2_parse_attr() es responsable de encontrar la vCPU que coincida con el CPUID proporcionado por el usuario, que (de curso) puede no ser v\u00e1lido. Si el ID no es v\u00e1lido, kvm_get_vcpu_by_id() devuelve NULL, que no se maneja correctamente. De manera similar al flujo de uaccess de GICv3, verifique que kvm_get_vcpu_by_id() realmente devuelva algo y falle el ioctl si no." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/01981276d64e542c177b243f7c979fee855d5487", diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44731.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44731.json index c097d7720d9..5eccda69dfb 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44731.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44731.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44731", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-11T17:15:04.080", - "lastModified": "2024-10-15T12:57:46.880", + "lastModified": "2024-11-04T20:35:07.840", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Mirotalk antes de el commit 9de226 conten\u00eda una vulnerabilidad de cross-site scripting (XSS) basada en DOM que permite a los atacantes ejecutar c\u00f3digo arbitrario mediante el env\u00edo de payloads malipulados en mensajes a otros usuarios mediante conexiones RTC." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://aware7.com/de/blog/schwachstellen-in-videokonferenzsystemen/", diff --git a/CVE-2024/CVE-2024-450xx/CVE-2024-45086.json b/CVE-2024/CVE-2024-450xx/CVE-2024-45086.json new file mode 100644 index 00000000000..2a14768c567 --- /dev/null +++ b/CVE-2024/CVE-2024-450xx/CVE-2024-45086.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45086", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-11-04T20:15:05.013", + "lastModified": "2024-11-04T20:15:05.013", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM WebSphere Application Server 8.5 and 9.0 is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A privileged user could exploit this vulnerability to expose sensitive information or consume memory resources." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7174745", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45185.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45185.json new file mode 100644 index 00000000000..a6606f476bf --- /dev/null +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45185.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-45185", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-04T20:15:05.257", + "lastModified": "2024-11-04T20:15:05.257", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, Modem 5123, Modem 5300. There is an out-of-bounds write due to a heap overflow in the GPRS protocol." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + }, + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/cve-2024-45185/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48270.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48270.json index 9035cb9807b..0371fc43a87 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48270.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48270.json @@ -2,16 +2,43 @@ "id": "CVE-2024-48270", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-01T14:15:06.953", - "lastModified": "2024-11-01T20:25:15.673", + "lastModified": "2024-11-04T19:35:11.057", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the component /logins of oasys v1.1 allows attackers to access sensitive information via a burst attack." + }, + { + "lang": "es", + "value": " Un problema en el componente /logins de oasys v1.1 permite a los atacantes acceder a informaci\u00f3n confidencial a trav\u00e9s de un burst attack." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://github.com/majic-banana/vulnerability/blob/main/POC/Verification%20Code%20Reuse--misstt123oasys.md", diff --git a/CVE-2024/CVE-2024-482xx/CVE-2024-48289.json b/CVE-2024/CVE-2024-482xx/CVE-2024-48289.json index 19a3f27e2a4..e72b05f6ddd 100644 --- a/CVE-2024/CVE-2024-482xx/CVE-2024-48289.json +++ b/CVE-2024/CVE-2024-482xx/CVE-2024-48289.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48289", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-01T15:15:56.560", - "lastModified": "2024-11-01T20:24:53.730", + "lastModified": "2024-11-04T20:35:09.307", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the Bluetooth Low Energy implementation of Cypress Bluetooth SDK v3.66 allows attackers to cause a Denial of Service (DoS) via supplying a crafted LL_PAUSE_ENC_REQ packet." + }, + { + "lang": "es", + "value": " Un problema en la implementaci\u00f3n de Bluetooth Low Energy de Cypress Bluetooth SDK v3.66 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) mediante el suministro de un paquete LL_PAUSE_ENC_REQ manipulado espec\u00edficamente." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://community.infineon.com/t5/PSoC-4/BLE-SDK-Integer-Overflow/m-p/888037#M49108", diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48336.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48336.json index ef288e5d53c..c5e55b19a41 100644 --- a/CVE-2024/CVE-2024-483xx/CVE-2024-48336.json +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48336.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48336", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-04T18:15:05.027", - "lastModified": "2024-11-04T18:50:05.607", + "lastModified": "2024-11-04T20:35:10.193", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "The install() function of ProviderInstaller.java in Magisk App before canary version 27007 does not verify the GMS app before loading it, which allows a local untrusted app with no additional privileges to silently execute arbitrary code in the Magisk app and escalate privileges to root via a crafted package, aka Bug #8279. User interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-829" + } + ] + } + ], "references": [ { "url": "https://github.com/canyie/MagiskEoP", diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48733.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48733.json index 9aef2ceb8d1..b5184282d93 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48733.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48733.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48733", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.507", - "lastModified": "2024-11-01T13:15:12.390", + "lastModified": "2024-11-04T19:35:11.380", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "La vulnerabilidad de inyecci\u00f3n SQL en /SASStudio/sasexec/sessions/{sessionID}/sql en SAS Studio 9.4 permite a un atacante remoto ejecutar comandos SQL arbitrarios a trav\u00e9s de la solicitud del cuerpo POST." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "http://sas.com", diff --git a/CVE-2024/CVE-2024-487xx/CVE-2024-48734.json b/CVE-2024/CVE-2024-487xx/CVE-2024-48734.json index 3fcf3402cfb..aa51652b6cd 100644 --- a/CVE-2024/CVE-2024-487xx/CVE-2024-48734.json +++ b/CVE-2024/CVE-2024-487xx/CVE-2024-48734.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48734", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-30T21:15:14.563", - "lastModified": "2024-11-01T13:15:12.510", + "lastModified": "2024-11-04T19:35:12.597", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "*La carga de archivos sin restricciones en /SASStudio/SASStudio/sasexec/{sessionID}/{InternalPath} en SAS Studio 9.4 permite que atacantes remotos carguen archivos maliciosos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "http://sas.com", diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50801.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50801.json index d25956bbc26..7589801f35d 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50801.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50801.json @@ -2,16 +2,55 @@ "id": "CVE-2024-50801", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T19:15:13.313", - "lastModified": "2024-11-01T12:57:03.417", + "lastModified": "2024-11-04T19:35:13.810", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL Injection vulnerability was discovered in AbanteCart 1.4.0 in the update() function in public_html/admin/controller/responses/listing_grid/collections.php. The vulnerability is exploitable via the id parameter." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en AbanteCart 1.4.0 en la funci\u00f3n update() en public_html/admin/controller/responses/listing_grid/collections.php. La vulnerabilidad se puede explotar a trav\u00e9s del par\u00e1metro id." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://chiggerlor.substack.com/p/cve-2024-50801-and-and-cve-2024-50802", diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50802.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50802.json index 713ae106338..286d2d92842 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50802.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50802.json @@ -2,16 +2,55 @@ "id": "CVE-2024-50802", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-31T19:15:13.413", - "lastModified": "2024-11-01T12:57:03.417", + "lastModified": "2024-11-04T19:35:14.907", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A SQL Injection vulnerability was discovered in AbanteCart 1.4.0 in the update() function in public_html/admin/controller/responses/listing_grid/email_templates.php. The vulnerability is exploitable via the id parameter." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en AbanteCart 1.4.0 en la funci\u00f3n update() en public_html/admin/controller/responses/listing_grid/email_templates.php. La vulnerabilidad se puede explotar a trav\u00e9s del par\u00e1metro id." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://chiggerlor.substack.com/p/cve-2024-50801-and-and-cve-2024-50802", diff --git a/CVE-2024/CVE-2024-513xx/CVE-2024-51328.json b/CVE-2024/CVE-2024-513xx/CVE-2024-51328.json index eb25c2f9674..13340c985b6 100644 --- a/CVE-2024/CVE-2024-513xx/CVE-2024-51328.json +++ b/CVE-2024/CVE-2024-513xx/CVE-2024-51328.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51328", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-04T18:15:05.393", - "lastModified": "2024-11-04T18:50:05.607", + "lastModified": "2024-11-04T19:35:16.150", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Cross Site Scripting vulnerability in addcategory.php in projectworld's Travel Management System v1.0 allows remote attacker to inject arbitrary code via the t2 parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/redtrib3/CVEs/tree/main/CVE-2024-51328%20-%20Stored%20XSS%20", diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51406.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51406.json index d4c4682bfac..03833daf6e5 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51406.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51406.json @@ -2,16 +2,43 @@ "id": "CVE-2024-51406", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-01T14:15:07.073", - "lastModified": "2024-11-01T20:25:15.673", + "lastModified": "2024-11-04T19:35:17.410", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Floodlight SDN Open Flow Controller v.1.2 has an issue that allows local hosts to build fake LLDP packets that allow specific clusters to be missed by Floodlight, which in turn leads to missed hosts inside and outside the cluster." + }, + { + "lang": "es", + "value": " Floodlight SDN Open Flow Controller v.1.2 tiene un problema que permite que los hosts locales creen paquetes LLDP falsos que hacen que Floodlight no detecte cl\u00fasteres espec\u00edficos, lo que a su vez genera que no se detecten hosts dentro y fuera del cl\u00faster." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://github.com/floodlight/floodlight", diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51407.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51407.json index 074b10d41e8..2fb42f6fd4f 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51407.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51407.json @@ -2,16 +2,43 @@ "id": "CVE-2024-51407", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-01T14:15:07.193", - "lastModified": "2024-11-01T20:24:53.730", + "lastModified": "2024-11-04T20:35:11.350", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Floodlight SDN OpenFlow Controller v.1.2 has an issue that allows local hosts to construct false broadcast ports causing inter-host communication anomalies." + }, + { + "lang": "es", + "value": " Floodlight SDN OpenFlow Controller v.1.2 tiene un problema que permite que los hosts locales construyan puertos de transmisi\u00f3n falsos, lo que provoca anomal\u00edas de comunicaci\u00f3n entre hosts." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://github.com/floodlight/floodlight", diff --git a/CVE-2024/CVE-2024-60xx/CVE-2024-6080.json b/CVE-2024/CVE-2024-60xx/CVE-2024-6080.json index 84b639aca88..937892e577d 100644 --- a/CVE-2024/CVE-2024-60xx/CVE-2024-6080.json +++ b/CVE-2024/CVE-2024-60xx/CVE-2024-6080.json @@ -2,13 +2,13 @@ "id": "CVE-2024-6080", "sourceIdentifier": "cna@vuldb.com", "published": "2024-06-17T23:15:51.583", - "lastModified": "2024-09-20T00:27:34.317", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-04T19:15:07.323", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability classified as critical was found in Intelbras InControl 2.21.56. This vulnerability affects unknown code of the component incontrolWebcam Service. The manipulation leads to unquoted search path. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. VDB-268822 is the identifier assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure and plans to provide a solution within the next few weeks." + "value": "A vulnerability classified as critical was found in Intelbras InControl 2.21.56. This vulnerability affects unknown code of the component incontrolWebcam Service. The manipulation leads to unquoted search path. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Upgrading to version 2.21.58 is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early about this disclosure and plans to provide a solution within the next few weeks." }, { "lang": "es", @@ -133,6 +133,10 @@ "source": "cna@vuldb.com", "type": "Primary", "description": [ + { + "lang": "en", + "value": "CWE-426" + }, { "lang": "en", "value": "CWE-428" @@ -158,6 +162,14 @@ } ], "references": [ + { + "url": "https://backend.intelbras.com/sites/default/files/2024-10/Aviso%20de%20Seguran%C3%A7a%20-%20Incontrol%202.21.56%20e%202.21.57.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://download.cronos.intelbras.com.br/download/INCONTROL/INCONTROL-WEB/prod/INCONTROL-WEB-2.21.58-233dfd1ac1e2ca3eabb71c854005c78b.exe", + "source": "cna@vuldb.com" + }, { "url": "https://vuldb.com/?ctiid.268822", "source": "cna@vuldb.com", diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7807.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7807.json index 96ebdb97e0f..ef8edbc79de 100644 --- a/CVE-2024/CVE-2024-78xx/CVE-2024-7807.json +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7807.json @@ -2,16 +2,42 @@ "id": "CVE-2024-7807", "sourceIdentifier": "security@huntr.dev", "published": "2024-10-29T13:15:10.360", - "lastModified": "2024-10-29T14:35:21.773", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-04T20:47:21.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability in gaizhenbiao/chuanhuchatgpt version 20240628 allows for a Denial of Service (DOS) attack. When uploading a file, if an attacker appends a large number of characters to the end of a multipart boundary, the system will continuously process each character, rendering ChuanhuChatGPT inaccessible. This uncontrolled resource consumption can lead to prolonged unavailability of the service, disrupting operations and causing potential data inaccessibility and loss of productivity." + }, + { + "lang": "es", + "value": " Una vulnerabilidad en la versi\u00f3n 20240628 de gaizhenbiao/chuanhuchatgpt permite un ataque de denegaci\u00f3n de servicio (DOS). Al cargar un archivo, si un atacante agrega una gran cantidad de caracteres al final de un l\u00edmite de varias partes, el sistema procesar\u00e1 continuamente cada car\u00e1cter, lo que har\u00e1 que ChuanhuChatGPT sea inaccesible. Este consumo descontrolado de recursos puede provocar una indisponibilidad prolongada del servicio, lo que interrumpir\u00e1 las operaciones y provocar\u00e1 una posible inaccesibilidad de los datos y una p\u00e9rdida de productividad." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -37,8 +63,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -57,14 +93,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:20240628:*:*:*:*:*:*:*", + "matchCriteriaId": "1FC10782-5CE4-4545-A3F3-499CB770338B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/gaizhenbiao/chuanhuchatgpt/commit/919222d285d73b9dcd71fb34de379eef8c90d175", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/db67276d-36ee-4487-9165-b621c67ef8a3", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9324.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9324.json index 3b7e5237f14..4b72e51664c 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9324.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9324.json @@ -2,13 +2,13 @@ "id": "CVE-2024-9324", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-29T07:15:02.740", - "lastModified": "2024-10-07T16:05:50.067", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-04T19:15:07.587", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability was found in Intelbras InControl up to 2.21.57. It has been rated as critical. Affected by this issue is some unknown functionality of the file /v1/operador/ of the component Relat\u00f3rio de Operadores Page. The manipulation of the argument fields leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was informed early on 2024-07-19 about this issue. The release of a fixed version 2.21.58 was announced for the end of August 2024 but then was postponed until 2024-09-20." + "value": "A vulnerability was found in Intelbras InControl up to 2.21.57. It has been rated as critical. Affected by this issue is some unknown functionality of the file /v1/operador/ of the component Relat\u00f3rio de Operadores Page. The manipulation of the argument fields leads to code injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.21.58 is able to address this issue. It is recommended to upgrade the affected component. The vendor was informed early on 2024-07-19 about this issue. The release of a fixed version 2.21.58 was announced for the end of August 2024 but then was postponed until 2024-09-20." }, { "lang": "es", @@ -130,9 +130,17 @@ }, "weaknesses": [ { - "source": "nvd@nist.gov", + "source": "cna@vuldb.com", "type": "Primary", "description": [ + { + "lang": "en", + "value": "CWE-707" + }, + { + "lang": "en", + "value": "CWE-74" + }, { "lang": "en", "value": "CWE-94" @@ -140,7 +148,7 @@ ] }, { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Secondary", "description": [ { @@ -169,6 +177,14 @@ } ], "references": [ + { + "url": "https://backend.intelbras.com/sites/default/files/2024-10/Aviso%20de%20Seguran%C3%A7a%20-%20Incontrol%202.21.56%20e%202.21.57.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://download.cronos.intelbras.com.br/download/INCONTROL/INCONTROL-WEB/prod/INCONTROL-WEB-2.21.58-233dfd1ac1e2ca3eabb71c854005c78b.exe", + "source": "cna@vuldb.com" + }, { "url": "https://vuldb.com/?ctiid.278828", "source": "cna@vuldb.com", diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9325.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9325.json index 913123850d9..6a843377661 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9325.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9325.json @@ -2,13 +2,13 @@ "id": "CVE-2024-9325", "sourceIdentifier": "cna@vuldb.com", "published": "2024-09-29T08:15:02.243", - "lastModified": "2024-10-07T16:06:49.923", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-04T19:15:07.790", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability classified as critical has been found in Intelbras InControl up to 2.21.56. This affects an unknown part of the file C:\\Program Files (x86)\\Intelbras\\Incontrol Cliente\\incontrol_webcam\\incontrol-service-watchdog.exe. The manipulation leads to unquoted search path. It is possible to launch the attack on the local host. The vendor was informed early on 2024-08-05 about this issue. The release of a fixed version 2.21.58 was announced for the end of August 2024 but then was postponed until 2024-09-20." + "value": "A vulnerability classified as critical has been found in Intelbras InControl up to 2.21.56. This affects an unknown part of the file C:\\Program Files (x86)\\Intelbras\\Incontrol Cliente\\incontrol_webcam\\incontrol-service-watchdog.exe. The manipulation leads to unquoted search path. It is possible to launch the attack on the local host. Upgrading to version 2.21.58 is able to address this issue. It is recommended to upgrade the affected component. The vendor was informed early on 2024-08-05 about this issue. The release of a fixed version 2.21.58 was announced for the end of August 2024 but then was postponed until 2024-09-20." }, { "lang": "es", @@ -133,6 +133,10 @@ "source": "cna@vuldb.com", "type": "Primary", "description": [ + { + "lang": "en", + "value": "CWE-426" + }, { "lang": "en", "value": "CWE-428" @@ -159,6 +163,14 @@ } ], "references": [ + { + "url": "https://backend.intelbras.com/sites/default/files/2024-10/Aviso%20de%20Seguran%C3%A7a%20-%20Incontrol%202.21.56%20e%202.21.57.pdf", + "source": "cna@vuldb.com" + }, + { + "url": "https://download.cronos.intelbras.com.br/download/INCONTROL/INCONTROL-WEB/prod/INCONTROL-WEB-2.21.58-233dfd1ac1e2ca3eabb71c854005c78b.exe", + "source": "cna@vuldb.com" + }, { "url": "https://vuldb.com/?ctiid.278829", "source": "cna@vuldb.com", diff --git a/README.md b/README.md index f7c5a5c9c3d..f39a04b4ab3 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-04T19:00:20.374735+00:00 +2024-11-04T21:00:20.280091+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-04T18:55:38.580000+00:00 +2024-11-04T20:47:21.767000+00:00 ``` ### Last Data Feed Release @@ -33,56 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -268156 +268166 ``` ### CVEs added in the last Commit -Recently added CVEs: `12` +Recently added CVEs: `10` -- [CVE-2024-10766](CVE-2024/CVE-2024-107xx/CVE-2024-10766.json) (`2024-11-04T18:15:04.330`) -- [CVE-2024-34882](CVE-2024/CVE-2024-348xx/CVE-2024-34882.json) (`2024-11-04T18:15:04.683`) -- [CVE-2024-34883](CVE-2024/CVE-2024-348xx/CVE-2024-34883.json) (`2024-11-04T18:15:04.787`) -- [CVE-2024-34887](CVE-2024/CVE-2024-348xx/CVE-2024-34887.json) (`2024-11-04T18:15:04.867`) -- [CVE-2024-48336](CVE-2024/CVE-2024-483xx/CVE-2024-48336.json) (`2024-11-04T18:15:05.027`) -- [CVE-2024-48809](CVE-2024/CVE-2024-488xx/CVE-2024-48809.json) (`2024-11-04T17:15:07.880`) -- [CVE-2024-51127](CVE-2024/CVE-2024-511xx/CVE-2024-51127.json) (`2024-11-04T18:15:05.113`) -- [CVE-2024-51136](CVE-2024/CVE-2024-511xx/CVE-2024-51136.json) (`2024-11-04T17:15:08.050`) -- [CVE-2024-51326](CVE-2024/CVE-2024-513xx/CVE-2024-51326.json) (`2024-11-04T18:15:05.207`) -- [CVE-2024-51327](CVE-2024/CVE-2024-513xx/CVE-2024-51327.json) (`2024-11-04T18:15:05.310`) -- [CVE-2024-51328](CVE-2024/CVE-2024-513xx/CVE-2024-51328.json) (`2024-11-04T18:15:05.393`) -- [CVE-2024-51329](CVE-2024/CVE-2024-513xx/CVE-2024-51329.json) (`2024-11-04T18:15:05.480`) +- [CVE-2024-10768](CVE-2024/CVE-2024-107xx/CVE-2024-10768.json) (`2024-11-04T19:15:05.743`) +- [CVE-2024-10791](CVE-2024/CVE-2024-107xx/CVE-2024-10791.json) (`2024-11-04T20:15:04.580`) +- [CVE-2024-30616](CVE-2024/CVE-2024-306xx/CVE-2024-30616.json) (`2024-11-04T19:15:06.193`) +- [CVE-2024-30617](CVE-2024/CVE-2024-306xx/CVE-2024-30617.json) (`2024-11-04T19:15:06.277`) +- [CVE-2024-30618](CVE-2024/CVE-2024-306xx/CVE-2024-30618.json) (`2024-11-04T19:15:06.360`) +- [CVE-2024-30619](CVE-2024/CVE-2024-306xx/CVE-2024-30619.json) (`2024-11-04T19:15:06.440`) +- [CVE-2024-34885](CVE-2024/CVE-2024-348xx/CVE-2024-34885.json) (`2024-11-04T19:15:06.560`) +- [CVE-2024-34891](CVE-2024/CVE-2024-348xx/CVE-2024-34891.json) (`2024-11-04T19:15:06.647`) +- [CVE-2024-45086](CVE-2024/CVE-2024-450xx/CVE-2024-45086.json) (`2024-11-04T20:15:05.013`) +- [CVE-2024-45185](CVE-2024/CVE-2024-451xx/CVE-2024-45185.json) (`2024-11-04T20:15:05.257`) ### CVEs modified in the last Commit -Recently modified CVEs: `173` +Recently modified CVEs: `52` -- [CVE-2024-51249](CVE-2024/CVE-2024-512xx/CVE-2024-51249.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-51251](CVE-2024/CVE-2024-512xx/CVE-2024-51251.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-51253](CVE-2024/CVE-2024-512xx/CVE-2024-51253.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-51408](CVE-2024/CVE-2024-514xx/CVE-2024-51408.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-51556](CVE-2024/CVE-2024-515xx/CVE-2024-51556.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-51557](CVE-2024/CVE-2024-515xx/CVE-2024-51557.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-51558](CVE-2024/CVE-2024-515xx/CVE-2024-51558.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-51559](CVE-2024/CVE-2024-515xx/CVE-2024-51559.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-51560](CVE-2024/CVE-2024-515xx/CVE-2024-51560.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-51561](CVE-2024/CVE-2024-515xx/CVE-2024-51561.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-51582](CVE-2024/CVE-2024-515xx/CVE-2024-51582.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-51626](CVE-2024/CVE-2024-516xx/CVE-2024-51626.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-51661](CVE-2024/CVE-2024-516xx/CVE-2024-51661.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-51665](CVE-2024/CVE-2024-516xx/CVE-2024-51665.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-51672](CVE-2024/CVE-2024-516xx/CVE-2024-51672.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-51677](CVE-2024/CVE-2024-516xx/CVE-2024-51677.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-51678](CVE-2024/CVE-2024-516xx/CVE-2024-51678.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-51680](CVE-2024/CVE-2024-516xx/CVE-2024-51680.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-51681](CVE-2024/CVE-2024-516xx/CVE-2024-51681.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-51682](CVE-2024/CVE-2024-516xx/CVE-2024-51682.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-51683](CVE-2024/CVE-2024-516xx/CVE-2024-51683.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-51685](CVE-2024/CVE-2024-516xx/CVE-2024-51685.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-6536](CVE-2024/CVE-2024-65xx/CVE-2024-6536.json) (`2024-11-04T17:35:41.007`) -- [CVE-2024-9147](CVE-2024/CVE-2024-91xx/CVE-2024-9147.json) (`2024-11-04T18:50:05.607`) -- [CVE-2024-9287](CVE-2024/CVE-2024-92xx/CVE-2024-9287.json) (`2024-11-04T18:15:05.627`) +- [CVE-2024-26828](CVE-2024/CVE-2024-268xx/CVE-2024-26828.json) (`2024-11-04T19:35:06.407`) +- [CVE-2024-26918](CVE-2024/CVE-2024-269xx/CVE-2024-26918.json) (`2024-11-04T19:35:06.627`) +- [CVE-2024-26940](CVE-2024/CVE-2024-269xx/CVE-2024-26940.json) (`2024-11-04T19:35:06.833`) +- [CVE-2024-27393](CVE-2024/CVE-2024-273xx/CVE-2024-27393.json) (`2024-11-04T19:35:07.067`) +- [CVE-2024-27524](CVE-2024/CVE-2024-275xx/CVE-2024-27524.json) (`2024-11-04T20:35:04.913`) +- [CVE-2024-27525](CVE-2024/CVE-2024-275xx/CVE-2024-27525.json) (`2024-11-04T20:35:05.800`) +- [CVE-2024-34223](CVE-2024/CVE-2024-342xx/CVE-2024-34223.json) (`2024-11-04T19:35:07.467`) +- [CVE-2024-35083](CVE-2024/CVE-2024-350xx/CVE-2024-35083.json) (`2024-11-04T20:35:06.920`) +- [CVE-2024-36117](CVE-2024/CVE-2024-361xx/CVE-2024-36117.json) (`2024-11-04T19:15:06.733`) +- [CVE-2024-36953](CVE-2024/CVE-2024-369xx/CVE-2024-36953.json) (`2024-11-04T19:35:09.213`) +- [CVE-2024-44731](CVE-2024/CVE-2024-447xx/CVE-2024-44731.json) (`2024-11-04T20:35:07.840`) +- [CVE-2024-48270](CVE-2024/CVE-2024-482xx/CVE-2024-48270.json) (`2024-11-04T19:35:11.057`) +- [CVE-2024-48289](CVE-2024/CVE-2024-482xx/CVE-2024-48289.json) (`2024-11-04T20:35:09.307`) +- [CVE-2024-48336](CVE-2024/CVE-2024-483xx/CVE-2024-48336.json) (`2024-11-04T20:35:10.193`) +- [CVE-2024-48733](CVE-2024/CVE-2024-487xx/CVE-2024-48733.json) (`2024-11-04T19:35:11.380`) +- [CVE-2024-48734](CVE-2024/CVE-2024-487xx/CVE-2024-48734.json) (`2024-11-04T19:35:12.597`) +- [CVE-2024-50801](CVE-2024/CVE-2024-508xx/CVE-2024-50801.json) (`2024-11-04T19:35:13.810`) +- [CVE-2024-50802](CVE-2024/CVE-2024-508xx/CVE-2024-50802.json) (`2024-11-04T19:35:14.907`) +- [CVE-2024-51328](CVE-2024/CVE-2024-513xx/CVE-2024-51328.json) (`2024-11-04T19:35:16.150`) +- [CVE-2024-51406](CVE-2024/CVE-2024-514xx/CVE-2024-51406.json) (`2024-11-04T19:35:17.410`) +- [CVE-2024-51407](CVE-2024/CVE-2024-514xx/CVE-2024-51407.json) (`2024-11-04T20:35:11.350`) +- [CVE-2024-6080](CVE-2024/CVE-2024-60xx/CVE-2024-6080.json) (`2024-11-04T19:15:07.323`) +- [CVE-2024-7807](CVE-2024/CVE-2024-78xx/CVE-2024-7807.json) (`2024-11-04T20:47:21.767`) +- [CVE-2024-9324](CVE-2024/CVE-2024-93xx/CVE-2024-9324.json) (`2024-11-04T19:15:07.587`) +- [CVE-2024-9325](CVE-2024/CVE-2024-93xx/CVE-2024-9325.json) (`2024-11-04T19:15:07.790`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 7c0cb8999f3..86350507a30 100644 --- a/_state.csv +++ b/_state.csv @@ -73296,13 +73296,13 @@ CVE-2014-9821,0,0,a10b48c2cb08a38b661a78e7ffe89d9338aaea4c031262e788484d74d6c196 CVE-2014-9822,0,0,1b7a686e93975c0ed2ea9590e1f4a4becfcc480eb5e7c0da7b10f83a3454a55b,2024-10-31T19:56:51.983000 CVE-2014-9823,0,0,5b4f713b1aa371727f052d1e24491ccb5acf554c78179b76d7033ebe478b1155,2024-10-31T19:56:59.013000 CVE-2014-9824,0,0,a381cf0247b001d2b073d67346571aa1dc1560c09759e173df27875b30a4c9c9,2024-10-31T19:57:06.380000 -CVE-2014-9825,0,1,d101e503c09f6e6082e188174e52c62e24b5ca674dc710efcf5b1bc0a5aa0441,2024-11-04T18:55:24.060000 +CVE-2014-9825,0,0,d101e503c09f6e6082e188174e52c62e24b5ca674dc710efcf5b1bc0a5aa0441,2024-11-04T18:55:24.060000 CVE-2014-9826,0,0,860ab0020773466be74236a4548947dce8cf843f8de8cac7e27b4d6c73bb939a,2017-04-04T15:09:57.817000 -CVE-2014-9827,0,1,72c893d8e6fc9424d1240f349d84e581750673a3a31dff7dab4aff66279d67ba,2024-11-04T18:55:06.360000 -CVE-2014-9828,0,1,da6df16a5ca83fb738bd5c446e89e992751c72c5d551a7eaf2be4861037c9bea,2024-11-04T18:53:21.077000 -CVE-2014-9829,0,1,d1e034c250811e4896fd2678b6320e68c2e3210e4e4e033af0977f1df3a19db9,2024-11-04T18:53:00.827000 -CVE-2014-9830,0,1,0f184f38764a4102d76c0674029dca46ce8e23a47f4fa8209f0f7b7ac0f634b7,2024-11-04T18:52:34.957000 -CVE-2014-9831,0,1,8906e9c19fbb7ca6cef850dc6148e7aada5ffdc646cdfd28f9e9247c568b79c0,2024-11-04T18:50:14.833000 +CVE-2014-9827,0,0,72c893d8e6fc9424d1240f349d84e581750673a3a31dff7dab4aff66279d67ba,2024-11-04T18:55:06.360000 +CVE-2014-9828,0,0,da6df16a5ca83fb738bd5c446e89e992751c72c5d551a7eaf2be4861037c9bea,2024-11-04T18:53:21.077000 +CVE-2014-9829,0,0,d1e034c250811e4896fd2678b6320e68c2e3210e4e4e033af0977f1df3a19db9,2024-11-04T18:53:00.827000 +CVE-2014-9830,0,0,0f184f38764a4102d76c0674029dca46ce8e23a47f4fa8209f0f7b7ac0f634b7,2024-11-04T18:52:34.957000 +CVE-2014-9831,0,0,8906e9c19fbb7ca6cef850dc6148e7aada5ffdc646cdfd28f9e9247c568b79c0,2024-11-04T18:50:14.833000 CVE-2014-9832,0,0,f4c9c46492ce32d720439901293429b2bde360d262ac3dab77bfb7286622b851,2017-03-24T12:39:25.350000 CVE-2014-9833,0,0,ba752ec697e0cbbbd7638d418562d744e744957d16591caaca98f467a9f7af6a,2017-03-24T12:39:31.367000 CVE-2014-9834,0,0,23f9e8bf52d2fb29ece768bfdd7ad96153a515c50fe9b79758374b726cd4e77d,2017-03-24T12:39:36.040000 @@ -73319,13 +73319,13 @@ CVE-2014-9844,0,0,05640cc96b6e6b44623c6925119d31879036f01b4b263b4e9f2b60d4f829ea CVE-2014-9845,0,0,6049508ba42111e1f47b9053c88472e273702be69ee16083e810de6f4b2caaf4,2018-10-30T16:27:37.467000 CVE-2014-9846,0,0,9b9aa021de58b7c8ae4df9109a2e387b0524add155e9510b000f263c36198606,2018-10-30T16:27:37.467000 CVE-2014-9847,0,0,0216f650265c3b41a9c8f5f928489b69e615ed1366efcea424356a20c157e172,2018-10-30T16:27:37.467000 -CVE-2014-9848,0,1,1174b38ef289c68d153fd20f7fda420ffd5eee6ab807cceda1511cd2d37680a9,2024-11-04T18:49:53.660000 +CVE-2014-9848,0,0,1174b38ef289c68d153fd20f7fda420ffd5eee6ab807cceda1511cd2d37680a9,2024-11-04T18:49:53.660000 CVE-2014-9849,0,0,81170460990ec391e5fb1ee6b1796ef3dc2ad44d7843abc2de515e3367bb5ca6,2018-10-30T16:27:37.467000 CVE-2014-9850,0,0,5101491cecdcc0214cfb438cf77e8fff18e3cc649b61b48af2d45c978fd8478f,2018-10-30T16:27:37.467000 CVE-2014-9851,0,0,3cb7e7b40af7f4652eb38a2dc3f6eb89735d0f81f15d22623e978aad96253c0a,2018-10-30T16:27:37.467000 -CVE-2014-9852,0,1,a4925c330c92cd55d484b946ffbdec6fa86f30191cdd63728b0a6dcde2d581a8,2024-11-04T18:49:46.877000 -CVE-2014-9853,0,1,2f1c6a4124afaf29b236e71b4f8068a75979cc6ca0c5137f6d738d6ee2a2341f,2024-11-04T18:49:37.570000 -CVE-2014-9854,0,1,55a9646c2c63f2e2c4a3c2c1ceb47c5cdc631316975e57cbf2d9f7322e9a78a8,2024-11-04T18:49:30.603000 +CVE-2014-9852,0,0,a4925c330c92cd55d484b946ffbdec6fa86f30191cdd63728b0a6dcde2d581a8,2024-11-04T18:49:46.877000 +CVE-2014-9853,0,0,2f1c6a4124afaf29b236e71b4f8068a75979cc6ca0c5137f6d738d6ee2a2341f,2024-11-04T18:49:37.570000 +CVE-2014-9854,0,0,55a9646c2c63f2e2c4a3c2c1ceb47c5cdc631316975e57cbf2d9f7322e9a78a8,2024-11-04T18:49:30.603000 CVE-2014-9862,0,0,659989a52282877bf97b6f43ed241545b5469be31d568b4a5c4c76b7c30234da,2020-09-17T14:15:12.343000 CVE-2014-9863,0,0,08adb223d08b08f3ad185495429c48ef85b6a32d516b8f1f322614bd8911e062,2016-11-28T19:15:05.683000 CVE-2014-9864,0,0,9cc0dabb2fd7a892a73971ab6ce2a819e436df1250f891cdf0ce20521eff81ae,2016-11-28T19:15:06.620000 @@ -73371,7 +73371,7 @@ CVE-2014-9903,0,0,3c3364b597d9512b64981e3817efdf3af9281467a82c7a44d580da4dedcc80 CVE-2014-9904,0,0,ca51f4ba3cd0c1d839518211136b0bf260f44789728e316852af0d7835c8d7fe,2023-01-17T21:42:22.280000 CVE-2014-9905,0,0,c0a0390d3f31ab7ff8f1652b0583ad9a617497ec01918bc3b6f50538aa0b8c0d,2022-12-20T16:52:37.880000 CVE-2014-9906,0,0,e21f58e9b909387c967735f7022dce4cc57dd4b355e0126b643a920d898efdd6,2016-11-28T19:15:49.847000 -CVE-2014-9907,0,1,3d67528f4ad1b73e37b530ced1fd0f2220f392b8fa17942df249340725942587,2024-11-04T18:49:20.907000 +CVE-2014-9907,0,0,3d67528f4ad1b73e37b530ced1fd0f2220f392b8fa17942df249340725942587,2024-11-04T18:49:20.907000 CVE-2014-9908,0,0,35e41efc1256ffbf38b02fdbca717f1c3365b32de708e17c03c361ee3a8bf607,2020-01-13T21:01:20.453000 CVE-2014-9909,0,0,99f41d2524595ad235bd0d8e32c13b3eb20e03fb5e1920c64a25acfd1c0c715f,2017-01-20T02:59:02.827000 CVE-2014-9910,0,0,970ad47a429a59199e9cdc655b178479768d23b5d77dad5afebac000e404fca2,2017-01-20T02:59:02.870000 @@ -83465,8 +83465,8 @@ CVE-2016-10140,0,0,e41cd82f3c55eaf993fe959d6851e52a78c27f5e92eb8da9969f1d8f2b390 CVE-2016-10141,0,0,bd054c5d51cb1e20af51c3c4a2dd42453f9b3b7b7c0f06baca9d8d8479c8bcb5,2023-11-07T02:29:31.753000 CVE-2016-10142,0,0,ef0621fcec1497763bfe129efe28b498ec891f1c4e995754ceefd4ddc22409ae,2023-11-07T02:29:31.830000 CVE-2016-10143,0,0,c9281f523f56ceee5ed579abb3bfb67203d358bc79cf466532b0ce83a10ea20e,2017-03-14T01:59:00.333000 -CVE-2016-10144,0,1,237c80d7c8016be1d43b0ae87fea34d37a380688c12421738ba6cbe399a00793,2024-11-04T18:48:46.350000 -CVE-2016-10145,0,1,c3fc1d11655b4d3a65e85cfa6c2d486f58dba5f751f72d51cec4501755c3ef46,2024-11-04T18:45:24.470000 +CVE-2016-10144,0,0,237c80d7c8016be1d43b0ae87fea34d37a380688c12421738ba6cbe399a00793,2024-11-04T18:48:46.350000 +CVE-2016-10145,0,0,c3fc1d11655b4d3a65e85cfa6c2d486f58dba5f751f72d51cec4501755c3ef46,2024-11-04T18:45:24.470000 CVE-2016-10146,0,0,dc530eed2010ae83edb60518ce68eacdd83dd3d5ba5b1e0b5367935ac4b0ee01,2017-11-04T01:29:15.787000 CVE-2016-10147,0,0,14848770473e2f0cdc7f6d0b11ad5ca9a287cc99358656e1997db28569d707a1,2023-02-12T23:16:49.557000 CVE-2016-10148,0,0,0b93c7f6a79f52f11ed2692aa806523f9eaa05a4289d5f4bb5c3568ab83403c9,2017-03-16T01:59:00.887000 @@ -90459,7 +90459,7 @@ CVE-2016-7528,0,0,c16129d2462881b38bc83868468c620340a98142b2c9d4ae0116ffa0131b62 CVE-2016-7529,0,0,815c7fdada9f9e2bc75a51b9f5d1bf734db049324d2d75ffe30ad23eea1b27df,2024-07-03T15:22:20.367000 CVE-2016-7530,0,0,6492e65bbb8672ec847a4514447a6f39c1d56b13a2cf7c79ef9c970546f67022,2024-07-03T15:22:34.133000 CVE-2016-7531,0,0,c15056ad0b2cfe60b5b6e425711faabdbd0d18e669e26e61664e67468a59b7a2,2017-05-09T12:39:15.447000 -CVE-2016-7532,0,1,2c355ffc793fc8d79b23839d2327b5134d031a650ffe2d95f63e871231ba72e6,2024-11-04T18:55:38.580000 +CVE-2016-7532,0,0,2c355ffc793fc8d79b23839d2327b5134d031a650ffe2d95f63e871231ba72e6,2024-11-04T18:55:38.580000 CVE-2016-7533,0,0,0b5c1dbe1976d2fc2f4abf252703deacc66d9d8030522be17c5c1c20eb40fb1b,2024-07-03T15:23:17.167000 CVE-2016-7534,0,0,1d15b6b809a00df4dfaaa24cd210f52122b7bfacbd0bd967b9c1a2a0a459bd8d,2024-07-10T14:33:13.477000 CVE-2016-7535,0,0,8364736a933b4b4150718ace08297add9cf1bdd850ae670287119fb063330282,2024-07-10T14:33:28.527000 @@ -154944,7 +154944,7 @@ CVE-2020-25727,0,0,9f5eca368bd07dcdd869e0aeac7c4d2e011fffe163b754f51bdee77559709 CVE-2020-25728,0,0,bfdbfc94ad27bc04267c8e56468159aebc12f3a6057f0226fa6c134a2c76f10d,2020-09-25T17:40:51.173000 CVE-2020-25729,0,0,c050a786ee2fa8d723e5e41234630bfaffa93fb091157268dc95b7df1240f22c,2020-09-24T14:42:09.080000 CVE-2020-2573,0,0,7cb38a0cda14d86f7e594a6c977c8dd7d564d47b07843e6c3c833b9441654d86,2022-01-04T16:43:12.697000 -CVE-2020-25730,0,0,995a05bae09ab95b70112c64cfcbe392128ce27e3b51e538105af877e6bf3bc2,2024-04-04T12:48:41.700000 +CVE-2020-25730,0,1,2f2fe4829e79f017641d98f858979352ffef03d62b80cb5a735e7bdb56005f41,2024-11-04T19:35:00.910000 CVE-2020-25733,0,0,109e189ef190c59a9450ed9da0e65218f7d838e204deaae021d216f01b171854,2023-11-07T03:20:24.463000 CVE-2020-25734,0,0,3f59d4d29c83c5054ee354b50fd36ed8e9b765e17c7f639faa2d81e1b887e411,2023-11-07T03:20:24.520000 CVE-2020-25735,0,0,b762af2870594db2fbe828cc1b1bccdf29d1535ec31127ffb78a3546589bba77,2023-11-07T03:20:24.577000 @@ -160519,7 +160519,7 @@ CVE-2020-5194,0,0,b10abe505d51e0dd31546a82e1770808fcfc83ccc2039cd6bf4f2b226418ee CVE-2020-5195,0,0,9c455fce4359d8153f54937748aeafb112345aee5f0af6a7b8e8767cf75a65e0,2020-01-22T16:05:31.283000 CVE-2020-5196,0,0,3db9cfe307d6bfad1346143c1c789564b2d8d5344d159cb9a5aa67fdbb48bd78,2020-01-17T03:02:04.857000 CVE-2020-5197,0,0,166ff2df531a2c3cbdaca82b89f8ef39807972f6f515640d1b8fd23f6d803a6e,2021-07-21T11:39:23.747000 -CVE-2020-5200,0,0,966c6a994f108e987615a4abb36a09021e9d55b1127dcbd3b0dff6ba478ee00b,2024-04-30T19:35:36.960000 +CVE-2020-5200,0,1,646570fa5a655321d2cf417655cdf8e0c119a48ff65ec65d5fe4817bca5795db,2024-11-04T20:35:00.717000 CVE-2020-5202,0,0,58d5a304abc62c5752bab4f8c0370fb4da8104106dd134a4298657c13ae8b429,2022-01-01T20:03:08.133000 CVE-2020-5203,0,0,e1337dc8bdfa49ce0c2456a3ce041da4f1de509c7cac9c52fe24e7545d0a8071,2021-07-21T11:39:23.747000 CVE-2020-5204,0,0,970a07d3c1fbc57e57b03667d979c83238f3747c7ddc7782db20f3433fa11013,2020-01-18T19:15:10.947000 @@ -186900,7 +186900,7 @@ CVE-2021-46974,0,0,68106efb1dea0e888fc3f320c7c7f115f18907377c2b796169ea6fdae092b CVE-2021-46975,0,0,379ee4cd812bfdbb2fdb73351c9c5db9b3f393ba3702c95ca5be896799b9eeec,2024-03-19T14:15:07.467000 CVE-2021-46976,0,0,d459fe959a5a76c1fabcab8d05c872a73f329bb3a08d112447c0d44f1b1b1803,2024-02-28T14:06:45.783000 CVE-2021-46977,0,0,d1d161e94901e50528f60d982519891204ae84ebfa26840884a3742c374819f7,2024-02-28T14:06:45.783000 -CVE-2021-46978,0,1,0187421fdb780c5e8402e6f5d3328f1325a92158cb760e25754a40716ed6a9f2,2024-11-04T18:35:00.933000 +CVE-2021-46978,0,0,0187421fdb780c5e8402e6f5d3328f1325a92158cb760e25754a40716ed6a9f2,2024-11-04T18:35:00.933000 CVE-2021-46979,0,0,c37c9c214f340e677412cf2d33e7caafefcb389b424397f0168c07f01ce4d395,2024-02-28T14:06:45.783000 CVE-2021-46980,0,0,58325d996fe77641a4d00dbfe23b24bd7564ddab119d93d92ae442b18a3036cb,2024-02-28T14:06:45.783000 CVE-2021-46981,0,0,7c3826cb77987b8c9c9e2349d834ad83f81a936ca88dee47698c5d7da692053a,2024-02-28T14:06:45.783000 @@ -186911,7 +186911,7 @@ CVE-2021-46985,0,0,e5ec7d62e2dc241caedb03fb75bb65f46b7b8503decf87c3c257b8e400319 CVE-2021-46986,0,0,ebd0dd8fe5db0b48cbd262a90b8e8423d57b98cf2e9d94a4cda5e99e2875036e,2024-02-28T14:06:45.783000 CVE-2021-46987,0,0,c8633812fefd31995d23ecde0454c24318fd6e76ce3d74ee491b6218c131b2c9,2024-02-28T14:06:45.783000 CVE-2021-46988,0,0,a9ba9f369fea8a4d24ea3389b2ab5fa9be247ca1e8ca43aa55f681f99b5ccccb,2024-02-28T14:06:45.783000 -CVE-2021-46989,0,1,7866592ccbf1276372121c94c8485d5e30621d2f483a5264775b43216b0a6e03,2024-11-04T17:35:01.073000 +CVE-2021-46989,0,0,7866592ccbf1276372121c94c8485d5e30621d2f483a5264775b43216b0a6e03,2024-11-04T17:35:01.073000 CVE-2021-46990,0,0,3e4ac0af655ffa67aafe6583a51f4992e8dee7b3c5537062fca28ff84cfa3c9d,2024-02-28T14:06:45.783000 CVE-2021-46991,0,0,f3f161f91325f1426ad11e08d068f744953007e52a77b86fa73cc8203e02b7de,2024-02-28T14:06:45.783000 CVE-2021-46992,0,0,3b16720d3cef6c7f4a65ba23608e80851b1f858dd42d7ebe5c67c0d0e5a3f026,2024-02-28T14:06:45.783000 @@ -186966,7 +186966,7 @@ CVE-2021-47040,0,0,84ff3bafb4df71a01a584cf0d1216a5dc4f656f10350ce702f9885829de3d CVE-2021-47041,0,0,5bbef1bda2211d11616202302db5de2eb2b211978d2a678bbdf26df255371c69,2024-02-28T14:06:45.783000 CVE-2021-47042,0,0,4837a63de577c894fb1e2d57b5556538bb59eb7b609f368c9d56694f7cab2b82,2024-02-28T14:06:45.783000 CVE-2021-47043,0,0,a30aae0e86cae1f5c5dc4f207b2e3c34cd30973ca644656944c78b3bb7967ca8,2024-02-28T14:06:45.783000 -CVE-2021-47044,0,1,1e5d1e4d770c8ee1cc95c9eb8184f91bbfbe0dbc488a180598dbb2e7b19a3d6e,2024-11-04T17:35:01.323000 +CVE-2021-47044,0,0,1e5d1e4d770c8ee1cc95c9eb8184f91bbfbe0dbc488a180598dbb2e7b19a3d6e,2024-11-04T17:35:01.323000 CVE-2021-47045,0,0,7d850b3bf5b32401514a226ef2231c9e572882fdaee826d8ee2f4d904b6a3ed2,2024-02-28T14:06:45.783000 CVE-2021-47046,0,0,c6e0c7a9d3ccf4567bd445327f70a7b7d6b7a1f8e55d897a4862451a7c7d41ee,2024-02-28T14:06:45.783000 CVE-2021-47047,0,0,a5be49f7ba267bddcbda30bf54b32c88976252fbacf1f803efbd8e0bfc5c96bc,2024-02-28T14:06:45.783000 @@ -186992,7 +186992,7 @@ CVE-2021-47066,0,0,3dc9bcc464a6ab3b776aff0e71a0bea9e097dc1e904059ecf25dd8969bef0 CVE-2021-47067,0,0,47dc1af1626b10fa0dfe5d35f18291fb00286d2fb75fd269bcf3ff5bee42736c,2024-03-01T14:04:26.010000 CVE-2021-47068,0,0,0e9613a6b9e3bad19dd79725e1f65d7be51fb3aae34c56147e089ef00705124b,2024-03-01T14:04:26.010000 CVE-2021-47069,0,0,0baf3689a99afae159a794fa882bbde862d8f0b3a2cedc563e0510d34d3745bb,2024-03-01T22:22:25.913000 -CVE-2021-47070,0,0,fb369afb4ac9f2515fa7eb70014aff5a8edfed80439119b7abbed485f57d1bc2,2024-03-01T22:22:25.913000 +CVE-2021-47070,0,1,0584c186d80f84c4146403f3cafabf00a3e7703a9e9eb3500b990094f96b7714,2024-11-04T19:35:01.957000 CVE-2021-47071,0,0,b0504ff2034ae0c4cc16202b4cc6e9136ea7ef90af22d96415d8d13f216623a8,2024-03-01T22:22:25.913000 CVE-2021-47072,0,0,cf41cbf231f55b926ec73e3d5eeef7180bfd709e7f8ced7efd6dbec1d429bdcf,2024-03-01T22:22:25.913000 CVE-2021-47073,0,0,55717623a5e4775e6cdba866cbade7342e2c623e9f3852474ccdaf2b36202333,2024-03-01T22:22:25.913000 @@ -187052,7 +187052,7 @@ CVE-2021-47126,0,0,a034e294c1d1b663d08eaf969805865c1efbc89fcc8511c70b55bf9fe0c91 CVE-2021-47127,0,0,e4981b245281ea0af5618150d4684033b91a573e39d2b09ae4cf2fd729abd995,2024-03-17T22:38:29.433000 CVE-2021-47128,0,0,d4b8a83073f5f99b0dad82cbfd95dacc611cbe63c431e8fa1d88a19ed32ba271,2024-03-17T22:38:29.433000 CVE-2021-47129,0,0,0b91474c287c9fac5441e0bfddbeb84807bcf87135fd1024c88789a5dd0ae27e,2024-03-17T22:38:29.433000 -CVE-2021-47130,0,1,5b886b2fc7d9d62e8e586a18b61b3d341ddf828bbd4e31d4c16769a790585b87,2024-11-04T17:35:02.347000 +CVE-2021-47130,0,0,5b886b2fc7d9d62e8e586a18b61b3d341ddf828bbd4e31d4c16769a790585b87,2024-11-04T17:35:02.347000 CVE-2021-47131,0,0,fc14dc8b737479df9209c72577a6a68af3c4912ed49c51710efaa06b7a718277,2024-03-17T22:38:29.433000 CVE-2021-47132,0,0,724d4921dcb0e535eb4a7121c97e55ed94336b6cbad0341e8c4b65507e7d629b,2024-03-17T22:38:29.433000 CVE-2021-47133,0,0,ae7fd3a33929a5c4e101fee2460851fe1e4a477aecdaff34b7dde35db2cb171f,2024-03-17T22:38:29.433000 @@ -187184,7 +187184,7 @@ CVE-2021-47258,0,0,43e5d4398baa884888a6821f1cc44ebd315950a1d75455b3aa6a2b21fe961 CVE-2021-47259,0,0,b94b7bd51459fdf369e8f3e705a39196eb98f20596c79a7966fbe7cd84498907,2024-07-03T01:37:30.730000 CVE-2021-47260,0,0,eed23e4375c3c68601f2520e12d8f67acb43a3edb9de2b59bea4672dc4d46a96,2024-05-21T16:54:26.047000 CVE-2021-47261,0,0,445c6ca2c94ba5191e4c9238eece7da90e5479679202eff4238f40b3a18777b7,2024-05-21T16:54:26.047000 -CVE-2021-47262,0,0,af34a26f9a79e51b8f3c8ac55929e236cda8dba87529e79420ad2120cddbddc9,2024-05-21T16:54:26.047000 +CVE-2021-47262,0,1,a6777b1d4230cf53233c142858d3baca0c76203feaf8ab924d12cb0c66b5d1ed,2024-11-04T19:35:02.187000 CVE-2021-47263,0,0,1176196a3698e7937ef1dee9eee1484d93eb714c3bfd1da777cd57ad81e35620,2024-05-21T16:54:26.047000 CVE-2021-47264,0,0,6843fefa1c0dd36dc7cf5ef00b7f0d9e8fededb938b876ac5eaeaf235634eb5f,2024-05-21T16:54:26.047000 CVE-2021-47265,0,0,75030ffadf61bd1ff09d790099186059b18f888a5d9b4f5c6b04efe02cb5e83c,2024-05-21T16:54:26.047000 @@ -187193,7 +187193,7 @@ CVE-2021-47267,0,0,6349e0bc990c8821b4f1f47330358ad43006a2ca756ca74dc78d487011a23 CVE-2021-47268,0,0,f7ae2ff7dc4130803f352293a0eb617910736952e5ca52dcc0839f9aed403876,2024-05-21T16:54:26.047000 CVE-2021-47269,0,0,c2c5b47a5a979a7f48e0f6de92f8080fa46cdab42d8445b05c910db852887da9,2024-05-21T16:54:26.047000 CVE-2021-47270,0,0,ba39234c032bc1c921b7e7a36fa33cfb1260f9f29471d99d62b5b112c5882df4,2024-05-21T16:54:26.047000 -CVE-2021-47271,0,1,6898381db67887cd7465156fda4a155410858f8a93bfff1b093cf4b56f2976f7,2024-11-04T18:35:01.380000 +CVE-2021-47271,0,0,6898381db67887cd7465156fda4a155410858f8a93bfff1b093cf4b56f2976f7,2024-11-04T18:35:01.380000 CVE-2021-47272,0,0,ccf09efbddc0d92c1646801db2efae3f666097c5304c778fd3c94abd16b798b9,2024-05-21T16:54:26.047000 CVE-2021-47273,0,0,c608a2634e582e877617b62d19ef59066408b3424cf2dc765ffbfc0d5cb2d3e3,2024-05-21T16:54:26.047000 CVE-2021-47274,0,0,5e6b9f71d6b39e786c1e9484a9a5c1020a127cc111bfd1e3867b25c1d707414c,2024-07-03T01:37:32.447000 @@ -187469,11 +187469,11 @@ CVE-2021-47543,0,0,e10032a4dc5819dab790e96a9c85611aa2456b01789b4c8b320ffa21f2dd5 CVE-2021-47544,0,0,f8ca718ed959197c9021832a7220c2167737a26fe05b58fc21ffd4156ad184f7,2024-05-24T18:09:20.027000 CVE-2021-47545,0,0,f9e54059060dbde4c9be7c93d9de1cad5092e9bea1c8e1591e1b69055c210ed1,2024-06-13T14:15:10.783000 CVE-2021-47546,0,0,8461100e46567c79f5d33fcfead2911dc03544a4ae68184cff44a4e4a055685f,2024-06-10T18:30:20.320000 -CVE-2021-47547,0,0,9bd2d6e670b856487fa0f6b8bf5630349a5e909414d7a495b56733e3b4f42768,2024-05-24T18:09:20.027000 +CVE-2021-47547,0,1,04b64a9a35fc7837f86d56415bc5f41e13d3f173d5499d6ea570c7785f541036,2024-11-04T19:35:02.390000 CVE-2021-47548,0,0,03a8a3877d4ca0ad093bd20ff48d4aebe255325f8becd5edf1b9a31b21d3ffa9,2024-07-03T01:38:08.723000 CVE-2021-47549,0,0,513795ad7a7ea3e427214675d10d84c28c33553bc02366f8eefe4045f37975aa,2024-05-24T18:09:20.027000 CVE-2021-47550,0,0,625b7614680ee2b0447f843771d1b01d412586caa610798634da339105c2afb3,2024-06-10T19:23:10.227000 -CVE-2021-47551,0,1,eac531d2e05b82c07ff9255b733606dbe0ffe65bbbebf081e70ce81f529e47aa,2024-11-04T18:35:01.610000 +CVE-2021-47551,0,0,eac531d2e05b82c07ff9255b733606dbe0ffe65bbbebf081e70ce81f529e47aa,2024-11-04T18:35:01.610000 CVE-2021-47552,0,0,5d3d5362faf4887dd9c84f934a6fae5b4c1336fd72a4a6faa1165471dbee6a90,2024-05-24T18:09:20.027000 CVE-2021-47553,0,0,321382f7b9e6bf328f90a5b45f80489cf47e5531e7cf08bf3aa8c852a939d4b6,2024-05-24T18:09:20.027000 CVE-2021-47554,0,0,259e8e5707d266118c9c75a97a5d9e029fb1a3d3dd6cc808c2e17bc1fb0e8874,2024-05-24T18:09:20.027000 @@ -214954,7 +214954,7 @@ CVE-2023-2047,0,0,cffaecf8374ebb191af0f661ba6a6ae01114c895a3998ae75ad057d2324f91 CVE-2023-2048,0,0,3b96fdf8bf6bb1815e88259c23a8e8802bc71a7230a6980ba2168438ccf5766c,2024-05-17T02:22:36.683000 CVE-2023-2049,0,0,8dac22165dd378125a2d02dfc6c92bf36750623be7e8c8651944b5a13cfd2b96,2024-05-17T02:22:36.810000 CVE-2023-2050,0,0,52bd1ab7278b756f4e980be0c308c962c43732bbdb6944a3222ce1a25981c8ca,2024-05-17T02:22:36.920000 -CVE-2023-20509,0,1,d5079805debaf740012b23a288a83fc5ba0dcdd7af74df5c3331c1379a669e87,2024-11-04T18:35:02.490000 +CVE-2023-20509,0,0,d5079805debaf740012b23a288a83fc5ba0dcdd7af74df5c3331c1379a669e87,2024-11-04T18:35:02.490000 CVE-2023-2051,0,0,aae0b82e887061c7db66b0d038eeb5f5dd09f4b2acd07b8f05b78ea85d55a2f1,2024-05-17T02:22:37.033000 CVE-2023-20510,0,0,a28fddaa3bb3d74952e71d2d049a0f73848147e98f221e4c4bbda55281a9d31f,2024-08-14T02:07:05.410000 CVE-2023-20512,0,0,6c28a8516784d76dc627815e8a69fce65ff900673d7a5c7fb91dedc498c8b14a,2024-10-30T19:35:02.517000 @@ -223837,7 +223837,7 @@ CVE-2023-3130,0,0,ebfebbdee0a909a4baa4899df5c6a28ad3a7a04e265d15250b4d0c062e6eb4 CVE-2023-31300,0,0,c6a4108718dbef116ebe62862a40eb993a0f2f7732323f0332ebfa85216b3aaa,2024-01-08T12:52:27.867000 CVE-2023-31301,0,0,8b4aa9e0020370e9364f1514c1548d00f13f3a6f7e88a244d5ac3dcc0555465f,2024-01-04T21:53:26.990000 CVE-2023-31302,0,0,7db878fe5302d808bd5001becdb205fd1302d85ff5b5989c39244fbd498603b5,2024-01-08T13:04:07.097000 -CVE-2023-31304,0,1,d35cbd3c1a51f731cb3021ec4d7f26ebe776aa5c814e8a89e6392f12283085fa,2024-11-04T17:35:02.577000 +CVE-2023-31304,0,0,d35cbd3c1a51f731cb3021ec4d7f26ebe776aa5c814e8a89e6392f12283085fa,2024-11-04T17:35:02.577000 CVE-2023-31305,0,0,d9246761767dbfcb2e2f558fb5fc5e1cec565f0df8c900e55c4f4f1cf420ccbb,2024-08-14T02:07:05.410000 CVE-2023-31307,0,0,927363a24df9ec7431f47a682d4205fb756e21f24bd0cd30e96e1e5c0bf4352a,2024-08-14T02:07:05.410000 CVE-2023-3131,0,0,92b0e6ff89d88f5d5d16464713458f8b0d9ad7ab63634417462d4acc9effd23f,2023-11-07T04:17:57.837000 @@ -230493,7 +230493,7 @@ CVE-2023-40120,0,0,5b838e8c4c47501317dd05adcfbe80413a66e135a880283ba48578edf0596 CVE-2023-40121,0,0,6f1b8149132fed1f9caf7760d93e85063d510874095d383f4206a9c6ee1cdfd0,2023-10-30T17:13:34.723000 CVE-2023-40122,0,0,e741aaa829c64452d1ac98aa1d049188ec81231d3a0ebd8d7170393b59c86ef8,2024-02-16T13:37:55.033000 CVE-2023-40123,0,0,a013553dba266da76c92a11e3761fe0b31b0c8f54144492635fda08d8a24f69c,2023-10-30T17:13:46.193000 -CVE-2023-40124,0,1,4ae28f7df70f41883dc7bfaffe769bb97ce4e85bcd352b55009b7b03f9d86b13,2024-11-04T17:35:03.337000 +CVE-2023-40124,0,0,4ae28f7df70f41883dc7bfaffe769bb97ce4e85bcd352b55009b7b03f9d86b13,2024-11-04T17:35:03.337000 CVE-2023-40125,0,0,10829f6953f4822c99106d9d0f88e1b3db3a4e3fb3d7cbcdc340674c9e164399,2023-10-30T17:13:55.827000 CVE-2023-40127,0,0,963ee1f1b403e4155e01a7067eedf37fb5ec80918d54710881ab39a3ebff3036,2023-10-30T17:18:28.157000 CVE-2023-40128,0,0,5ca85b7746c980988a6fa9739296461ca29ba4d7b3cc7003dd0d8020e289c12a,2023-10-30T17:14:16.593000 @@ -232567,7 +232567,7 @@ CVE-2023-4282,0,0,085a2ef782c4ab33d8733756104530425d8c8aa9e976ffea2f9c3c7c799557 CVE-2023-42820,0,0,4f4a424580624de974093ce23efe959ca821d9a703013ffd027ed0f76cbf69b2,2023-09-29T15:04:32.443000 CVE-2023-42821,0,0,66f6aadae2a34eeac865f857102bc3b26a5c60b6e36f3488d9988d4daf35e5af,2023-09-26T14:59:06.790000 CVE-2023-42822,0,0,8190ac9dadae4e7d4fa3ad2550ce9d236b8884c40ebd4e9f3eb483d3c568be1d,2023-11-03T21:15:16.230000 -CVE-2023-42823,0,1,db1fd6995028860cfdc29311d82aa77ca995032e2e43b4369365896bb8231790,2024-11-04T17:35:04.180000 +CVE-2023-42823,0,0,db1fd6995028860cfdc29311d82aa77ca995032e2e43b4369365896bb8231790,2024-11-04T17:35:04.180000 CVE-2023-42824,0,0,485e0cd2c78947a6b7d7e2f90d965cacac7d26f1634b0de55cdb0acdf56558b1,2023-10-26T20:01:18.743000 CVE-2023-42826,0,0,c7e4ad3cd8aa997f54826518199738e903ac4af1c487d59e3b2d8e98f8642331,2024-01-12T14:42:28.700000 CVE-2023-42828,0,0,e2f1754bcff1d34297cb8e4955796ced60cae334d5c978995cc13802654d392a,2024-01-17T21:22:41.863000 @@ -232586,7 +232586,7 @@ CVE-2023-4284,0,0,61fe561181169a40965e309f813ea607fd0daab2834cbef8e665fe00162fc6 CVE-2023-42840,0,0,7d5761fec7b6f15aa84a1074a2da48e2a22e511dd264acb4eb97aeef295d728b,2024-02-22T19:07:27.197000 CVE-2023-42841,0,0,1ba74cc5d5e854bd871cdd5a2c1321cd1721679505b9b640a088d8b01d078fa3,2024-09-10T21:35:05.947000 CVE-2023-42842,0,0,e6c3110fb32fb31efa637e19595877e38152993b501001f3e91f7f4195c48558,2023-12-13T01:15:08.050000 -CVE-2023-42843,0,1,fdcaee2947060de20442c439e087fd1ee28a11ba66828a8d78ea7542fc20bb0f,2024-11-04T17:35:05.077000 +CVE-2023-42843,0,0,fdcaee2947060de20442c439e087fd1ee28a11ba66828a8d78ea7542fc20bb0f,2024-11-04T17:35:05.077000 CVE-2023-42844,0,0,66793d4e8de2c24e97a03d4cefbe2f223f4ee5ce1cd36dda628aa0655d9dc25f,2023-11-02T18:08:23.333000 CVE-2023-42845,0,0,9507f97dc4b913465e85ae62bddedca7d865f48caf294e5533af19459dc099ee,2023-11-02T18:08:38.750000 CVE-2023-42846,0,0,848125d4c2d8d21314821b56fcf8efec7a8c30032b153bfb1279f335aea162b9,2024-09-11T15:35:06.370000 @@ -234135,7 +234135,7 @@ CVE-2023-45285,0,0,77883aa881bda99f1d19ba35b11a9a1e8caee32118b6c24da9d7ea21930a3 CVE-2023-45286,0,0,d44939332093de0621571dd50fbbf72433dd32913bd42846a1498c4ee2848685,2024-01-04T19:15:08.737000 CVE-2023-45287,0,0,d2da2c58b3609253e3286b1b93fa0d97abe9bcd02db4f7cc4811b975b121f7c4,2024-01-12T14:15:48.310000 CVE-2023-45288,0,0,82bba28c8566833be940e806bb1e2ff38edb61bcc7c1e4542d16b7cdc8317f67,2024-08-26T21:35:02.457000 -CVE-2023-45289,0,0,55227dc74f3b7eff2b0242a09fa3e698d7b0d3f59cb4bf8a9cc5e9e130d6e09a,2024-05-01T17:15:25.983000 +CVE-2023-45289,0,1,5b9af44f5fb05d5fd02cd2106e16283e6766be9cc8c8184692f272ca138dc067,2024-11-04T19:35:02.600000 CVE-2023-45290,0,0,f22fc13bdae5e6edab97f7e0fddab9822bb3ae91388d56c6e1d234cdc0e49b4d,2024-05-01T17:15:26.040000 CVE-2023-45292,0,0,9325e9e3b78b777445115a8da3de2cb25249d0f8ef4a9d3921e74e58a0d0d777,2023-12-14T16:26:54.007000 CVE-2023-4530,0,0,eeb9daf8b96668373bbb47227634f4b43c799c25d28cf12757e3af97741f4f52,2023-10-11T17:19:19.627000 @@ -234861,7 +234861,7 @@ CVE-2023-46288,0,0,4e7c3d0f2a47c2cdb963e20693070bcb74b570c31f4c02925a81ed68bcc5f CVE-2023-46289,0,0,b718fe11c7d9982447dba29076a54dbfa45cb0ef9825d49911b46533095026f6,2023-11-07T18:18:35.950000 CVE-2023-4629,0,0,a2da5926fb0fca7bbafeced6fa322c009d8e911a79a6b6bf7f38a2a5e0ea6e3c,2024-03-12T12:40:13.500000 CVE-2023-46290,0,0,27e5ae817a0021378c38e4fd99f2c228169bd8f39b57bf0a325b209cd30c76ea,2023-11-07T19:09:56.033000 -CVE-2023-46294,0,1,229d21e7c2595b78ee7f7a15c45c0846701c2e9380c9a89ebb06ec6fba8d432d,2024-11-04T17:35:06.003000 +CVE-2023-46294,0,0,229d21e7c2595b78ee7f7a15c45c0846701c2e9380c9a89ebb06ec6fba8d432d,2024-11-04T17:35:06.003000 CVE-2023-46295,0,0,b15972e98a1950e4d4a3b9eb508002e3a9685d0bb1eed8df111f8eb853e8c9e0,2024-07-03T01:42:00.680000 CVE-2023-46297,0,0,36ec00ece79ff59f1f7e8a89df1d401e3ccfe69b828e4f08f1bead640ad02eba,2024-08-22T19:35:05.647000 CVE-2023-46298,0,0,11fb6fb4012be55616d4ed607b07d97f1217c6cccf4f89f567489addcccf54b4,2023-10-28T03:30:11.740000 @@ -236185,7 +236185,7 @@ CVE-2023-48256,0,0,8c52f18e432061d2a86f7618ae0e765e4069bd7fc12e6f62bad63d84c7525 CVE-2023-48257,0,0,88bbb2f20880f49b2a522dfbdf30f9b8dce56f99a7d766a6b6c4110a57d7b5e6,2024-01-16T22:07:15.017000 CVE-2023-48258,0,0,b6687b2a138bbcb4c013f582b78cfc0286c75f96b82f8ef6a4ce99d1cf785703,2024-01-16T21:51:00.210000 CVE-2023-48259,0,0,96cbaf7244c934dc3aeb8a3efec60957668e394e0d7d7fdd1f1ce0396347c9ea,2024-01-16T20:16:25.587000 -CVE-2023-4826,0,1,318596b5a747e1583655f90a19e11273a636c3559a105af583e0c1f16011ca7a,2024-11-04T17:35:07.100000 +CVE-2023-4826,0,0,318596b5a747e1583655f90a19e11273a636c3559a105af583e0c1f16011ca7a,2024-11-04T17:35:07.100000 CVE-2023-48260,0,0,73384636cb26d0175058822892fe9f4096a1bb2b6020454bd670d5ec89d92331,2024-01-16T20:16:05.787000 CVE-2023-48261,0,0,e92cfb8571fd6999ae57fd1871df0ab0d23bf1431180260aa67b9a22ca203dac,2024-01-16T20:15:31.977000 CVE-2023-48262,0,0,b615e0b8572761b1da7bd5b5e91032a64ba9047101531ded3eb11010312f0421,2024-01-16T20:30:28.287000 @@ -237568,7 +237568,7 @@ CVE-2023-5004,0,0,e9c8d000c46a971371653c9299f9477c1d350bcd7ede26af818f1f3cd6a6fc CVE-2023-50044,0,0,c9dad549cf95cdf6f6a82dc7c47870e6807ae3192bcaf46f220bb6a3fa47ca36,2023-12-29T00:15:50.170000 CVE-2023-5005,0,0,745cb1ab76d83a3107371edfdd319096e1b6d1d025dbda4b9d241b022cb9185d,2023-12-21T19:25:31.277000 CVE-2023-50053,0,0,9b450f039e219e8c0dc6b5319645fc133cad473316e16f22c0a481e9974339ce,2024-08-01T13:45:22.157000 -CVE-2023-50059,0,0,c672df92e602de468d6a10dde3ef7658749e2af6fdb872b8bc56a5b1138f8560,2024-04-30T19:35:36.960000 +CVE-2023-50059,0,1,02f0d37d833c83270aef100f2afd20fdbe702668e721150206666eba9d2f5d78,2024-11-04T20:35:01.547000 CVE-2023-5006,0,0,21d14cc4876f8cc1a801d8b8c70a50bf2886311fb727493df0ced96b6e0ba142,2024-01-24T17:16:48.267000 CVE-2023-50061,0,0,233fe17f839b0e8ef7a1099d37a8dbf5d9b685d75def71772f132a905686000f,2024-08-22T19:35:08.363000 CVE-2023-50069,0,0,d5b56f504dfc9456d663c793e6af0eeee24a43c49c91c208a5bdce7a8736c014,2024-01-05T23:08:29.450000 @@ -238820,7 +238820,7 @@ CVE-2023-5205,0,0,b69f37089db22b12f4214cc9f8a6664b76f8ae791614a71f308741a98961cc CVE-2023-52059,0,0,0016757ad0c8c5e292c8d6de754d386680126fb24aa8899c4ed395170c5f6803,2024-10-04T16:51:20.313000 CVE-2023-52060,0,0,10d04b0fb69a380e5645fa0ec83c2959fc511b0d1bd5963b639f55d35d913fd4,2024-10-03T19:58:19.037000 CVE-2023-52064,0,0,2e6eacf3122e193934b8e5026ba3d667018aabe2b15f00e378d2dd371a1d173e,2024-01-17T21:08:45.903000 -CVE-2023-52066,0,0,c3c376ef25a28f3060a98d8a1f7c83c541c51ed63014fbbdcc1f8157e8855b14,2024-11-01T12:57:03.417000 +CVE-2023-52066,0,1,85402deace46f95bf508292308a27b3aaa2bf7f39ae66e341406df5f594363f6,2024-11-04T19:35:02.827000 CVE-2023-52068,0,0,9738fbe2996c9d736286f8e78dfc9c20ccebb2ce66b7bbc56f1565006d5c4c29,2024-01-22T19:53:08.497000 CVE-2023-52069,0,0,ad23cadb3859f85a66031ccd7a898a641dcf7c2393a905b66159386dbb4d3689,2024-01-23T21:41:02.097000 CVE-2023-5207,0,0,27de1d00636be1f83fc1921e6c08668bf71abfdb23dc6eb68c14d9a95ba3c956,2024-10-03T07:15:23.347000 @@ -239047,10 +239047,10 @@ CVE-2023-5234,0,0,aef3fc2b8ae003c9924c974f3bb05bf3d8e87189a981252ee97d34bc614416 CVE-2023-52340,0,0,efcc45d139400c921426d64a1335d9bdc07b1697256afd1ef16215d589e13c89,2024-07-08T16:42:51.350000 CVE-2023-52341,0,0,752ec91f49f7d27aa4aefb97c1028c0e3ba02b8dbe8f5ef4e4a5be61da661cf4,2024-08-01T13:45:36.707000 CVE-2023-52342,0,0,d9217e8a43616eb93ae5900a69930974b98e947284e3031e63af0d98b4863568,2024-08-26T14:35:02.157000 -CVE-2023-52343,0,1,72f06a8afa822a3024d5a446620d24cff01d97ee834295104d1b734aa9f75e3e,2024-11-04T17:35:08.043000 +CVE-2023-52343,0,0,72f06a8afa822a3024d5a446620d24cff01d97ee834295104d1b734aa9f75e3e,2024-11-04T17:35:08.043000 CVE-2023-52344,0,0,b7bdf893497358fce61c7e7c376341fa7e28c8aeaf6089f1eaf3b8ab0febdf07,2024-04-08T18:48:40.217000 CVE-2023-52345,0,0,79680366d279669fe64f4cd5be841271339a4fd967e56a100f124c184011b03e,2024-04-08T18:48:40.217000 -CVE-2023-52346,0,1,abf5870e70e4c81d560fa222012a9514676bbea91379a04e47b0bfe7513e6621,2024-11-04T18:35:03.567000 +CVE-2023-52346,0,0,abf5870e70e4c81d560fa222012a9514676bbea91379a04e47b0bfe7513e6621,2024-11-04T18:35:03.567000 CVE-2023-52347,0,0,0de571f6617802f0c8b8163db0698d0cafc861c67facc0349aa475f789167481,2024-11-01T15:35:05.800000 CVE-2023-52348,0,0,7d43b2ab56f6d858307bdd7cb075403483cf601c54e7b506903fcac3dafba44d,2024-04-08T18:48:40.217000 CVE-2023-52349,0,0,e0268b41501b405d0a34f5e46844e3fb81c4f91874104463a587c292cc6b3166,2024-04-08T18:48:40.217000 @@ -239168,7 +239168,7 @@ CVE-2023-52477,0,0,efe2f5528fad5a77ed7c9d16cf79090652ba25f88c0384442b12b40db626d CVE-2023-52478,0,0,068097b3c13a30c208b5d211494ed7aaf6a7f9fc35695f62f8ac60e5e2f6fdb4,2024-02-29T13:49:29.390000 CVE-2023-52479,0,0,bc49728c5dbac438d554a85beb665991e321a7f58d6bb98d8ea717a0d121f494,2024-02-29T13:49:29.390000 CVE-2023-52480,0,0,2329da01f12ebb4b23076c653c8e17a2ab7add15aadb16cbe58fefc1bb16dc60,2024-02-29T13:49:29.390000 -CVE-2023-52481,0,0,0ea824a08319318c4bcf672abaabdb369e495d100ee9acf0655973f765694d4c,2024-02-29T13:49:29.390000 +CVE-2023-52481,0,1,13e0d99d5be86e579f2e4a651dc1cf50d114a581aa3d9bf867a5254db7e01289,2024-11-04T20:35:02.537000 CVE-2023-52482,0,0,8e7120a407feee69d888ab8d409801a9cc2911c8130d47914d6a778dab36d389,2024-11-04T13:16:34.130000 CVE-2023-52483,0,0,2ae4ab70118f65a957b47b0238eee6990f9676ca82bf320c1c4eb1ef04aaeb62,2024-02-29T13:49:29.390000 CVE-2023-52484,0,0,cad4d37ff955036544d9c11417bd9d68e192b5a6438cfcc5ad47e9adf8a1ff38,2024-02-29T13:49:29.390000 @@ -239256,7 +239256,7 @@ CVE-2023-52558,0,0,7a2164a6ea51bedc215ff5cabec224ee6fc723b56d536531a97955800cae2 CVE-2023-52559,0,0,04af586fb20ce25776f7cc5f46253da9986ceb3c1247d4979acb72706c00df50,2024-03-04T13:58:23.447000 CVE-2023-5256,0,0,5aee69de1e22d307abc14e771be22f79d8ee5fd41ede5223ed59f45c075ed353,2024-09-23T19:35:15.590000 CVE-2023-52560,0,0,bc4d2a15407ff432bc881d4e2170a40df60185e7a75ae78863245ad7424b8ffa,2024-03-04T13:58:23.447000 -CVE-2023-52561,0,1,1022d103dd37f889d52795204f0c9d00659a923895a656157d5b325fafa5cbac,2024-11-04T18:35:04.423000 +CVE-2023-52561,0,0,1022d103dd37f889d52795204f0c9d00659a923895a656157d5b325fafa5cbac,2024-11-04T18:35:04.423000 CVE-2023-52562,0,0,454d21a00b73374bef1d9203abf0967f2678b88a94fb5ff95a91c111a0cb0bf6,2024-03-04T13:58:23.447000 CVE-2023-52563,0,0,960b5a9380bd6ee2fc552704a4ddd50a6733a22470964324c4db37d93d49fe1e,2024-03-04T13:58:23.447000 CVE-2023-52564,0,0,3a218cd093fa4b84f7fa8ddb8efdc1d5ffe4511c4ca71bc1445b6bdf4e6aae11,2024-05-28T20:16:33.820000 @@ -239324,11 +239324,11 @@ CVE-2023-5262,0,0,dbc9cec6bb50e0a68a3b5ede7b08b3e3d8766566fd5a2a3e7793ec9100e686 CVE-2023-52620,0,0,5d0b94b1352a669c08bac1c5a9bb6d9ff96c67ecbbeaf0ffd97ef6b79908b648,2024-11-04T13:16:41.823000 CVE-2023-52621,0,0,26a33f9b008c64c6664e3e3a4869fe4d4572933cf6941e2f62ad48b2a923903f,2024-03-27T12:29:41.530000 CVE-2023-52622,0,0,1a4aa348f9b525ca69fe5a199e23d2ce602b346fde4c103318a5ea96e124b7a6,2024-11-04T13:16:41.973000 -CVE-2023-52623,0,1,74f6264a0d4f8f612430a8ffd97335038e0648002eaa7642f7664a57b746597f,2024-11-04T17:35:08.873000 +CVE-2023-52623,0,0,74f6264a0d4f8f612430a8ffd97335038e0648002eaa7642f7664a57b746597f,2024-11-04T17:35:08.873000 CVE-2023-52624,0,0,545684061372867fc2ccbd4f79630f0d293a5172b640770b5669f54f98e42ad5,2024-03-27T12:29:41.530000 CVE-2023-52625,0,0,33e2b5c9631b6255ea3d926003091e30d9a4307751bdc59e18c65ddda848418a,2024-03-27T12:29:41.530000 CVE-2023-52626,0,0,5c2f2378516bd010d48ba17ce823ea0145216cde165d7d8985c9f0a3930373e5,2024-03-27T12:29:41.530000 -CVE-2023-52627,0,1,379f202191b7fbaf40215b778fd642c87ec1f9426b35ba261cd383760ca356b5,2024-11-04T17:35:09.073000 +CVE-2023-52627,0,0,379f202191b7fbaf40215b778fd642c87ec1f9426b35ba261cd383760ca356b5,2024-11-04T17:35:09.073000 CVE-2023-52628,0,0,3329a75501420e00bba96b49322ededdee6ebf8d515e2f0926cf7b2c91254fe1,2024-07-05T08:15:02.090000 CVE-2023-52629,0,0,4aac381cfdcf6533bcbb5898019c55c00aa9c06c15dffc1a2cc7ddcb7c527b58,2024-08-01T13:45:41.290000 CVE-2023-5263,0,0,a5ca98a04e38722def5acce0f3cee4430b6299b258ed512a5240ea8a8830bc4e,2024-05-17T02:32:56.130000 @@ -241464,7 +241464,7 @@ CVE-2024-0011,0,0,871bd2790e1644ed9a3dece6c89b7131ea036c72c23f82726bf2a5f6003f50 CVE-2024-0014,0,0,57b1d977bcf36a4089ab5ef9c9905bf2b69a9e66b00e8c3e91bd20eccc0f8b75,2024-08-26T18:35:03.770000 CVE-2024-0015,0,0,00e8b369d8c884be684dc161c3d8d59320e06337f56989191711b768cfe02c9b,2024-08-28T17:35:03.353000 CVE-2024-0016,0,0,07b99aa38f7f021ca30f24587ae8679400297ca98f5e8da8ccc928cbae430ba9,2024-10-31T15:35:18.640000 -CVE-2024-0017,0,0,e30ea632c5fd7e4383ceb5900aa731fb2d3b5c50d8f9b57582813b251f138048,2024-02-16T21:39:50.223000 +CVE-2024-0017,0,1,14eb641628890f648788a425e3e5a78e490af46ff0390af32867dbcd0985ceba,2024-11-04T19:35:03.033000 CVE-2024-0018,0,0,eb1e6beb7617de808c00f24002cfa4ad37cdeb05dc3559f2748a83507aca8f33,2024-08-15T18:35:05.293000 CVE-2024-0019,0,0,99addb01bdd59dfa56c3bb78510b54e791e3b9af747d8108035ab5d4ed5b10b6,2024-02-16T21:39:50.223000 CVE-2024-0020,0,0,e73ca517c90039568523c56c44f0cf8b451388b3358b22e01f666a71e39cd157,2024-08-01T13:45:54.660000 @@ -242373,10 +242373,10 @@ CVE-2024-10024,0,0,341fb3a51358c0d5f83894d8ffa34bc8830630ac4903510ed67f09db34646 CVE-2024-10025,0,0,19a46c25128674d2a3df76dfa6881dd0177e057f9e034fa6abc2c0a4e8bba033,2024-10-18T12:52:33.507000 CVE-2024-1003,0,0,5577a6ad54fba7e1e984add6f75aca7e6ad73817623f9ed150fa33b583cd3fae,2024-05-17T02:35:09.147000 CVE-2024-10033,0,0,e2a4855e02c8a9aa5aec00750ec89db4d8c9b23a9a547fcb7ea42ccd4625cc1e,2024-10-30T18:50:04.137000 -CVE-2024-10035,0,1,e1bab51809ac69fa5c75a2d897691dc0f5acda7e478ad5d8b743b12fab524013,2024-11-04T18:50:05.607000 +CVE-2024-10035,0,0,e1bab51809ac69fa5c75a2d897691dc0f5acda7e478ad5d8b743b12fab524013,2024-11-04T18:50:05.607000 CVE-2024-1004,0,0,be9a3a60f238fd673f4d3f1f166af1f9400f4582d193359c16f232ef2b1c02fa,2024-05-17T02:35:09.263000 CVE-2024-10040,0,0,7b56aeaf06debaabcdf1e140476d580d2600dab38558a586b77601e247b0f5d1,2024-11-01T18:26:23.450000 -CVE-2024-10041,0,1,51c1a91c4f22ee214c5dcda807542750d47d7e85f524ab1da7d13a157020a726,2024-11-04T17:35:09.270000 +CVE-2024-10041,0,0,51c1a91c4f22ee214c5dcda807542750d47d7e85f524ab1da7d13a157020a726,2024-11-04T17:35:09.270000 CVE-2024-10045,0,0,a817f3402cf6055b1a750108ad8efeb9be1dc186e8fac94b1b8b513bcc47b228,2024-10-25T18:52:30.337000 CVE-2024-10048,0,0,753b7b10384148568802076e97b22f964c12e42cf7a3108618b3a771a6303c01,2024-10-29T14:34:04.427000 CVE-2024-10049,0,0,885c4f58797b80385cdce80d924e46fe2b372795dfe14e40121472290c664142,2024-10-29T14:49:04.463000 @@ -242403,8 +242403,8 @@ CVE-2024-10092,0,0,96aeeb96773a5c0a6e4e68b9196f2f369ac89a58107c1085bc8eadc272cfb CVE-2024-10093,0,0,94a330c294b313c7705272073b44baeb2e1acc1449e78c4e0c252c7b91c53316,2024-11-01T18:07:07.003000 CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615abb6,2024-10-21T21:03:53.647000 CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000 -CVE-2024-10100,0,0,551af785b2583dfc00dd65a689907bc427d5051278643ae24a3a0c57fb4f9ff3,2024-10-18T12:52:33.507000 -CVE-2024-10101,0,0,1d42831444f093da17057d1135157fc2c61373ed2c6e3aa4b33071a4d1f4b2d6,2024-10-18T12:52:33.507000 +CVE-2024-10100,0,1,f9d8653b0b809755807a27c91859fa59733e823c9baf33fbd9ba6460baccb9d4,2024-11-04T19:15:05.297000 +CVE-2024-10101,0,1,e3896c5d7db68c5b786b00b58edff142c65dff97c0f85c49d64d1701e59c4a4a,2024-11-04T19:15:05.527000 CVE-2024-10108,0,0,f3f4ad009417795f18debc95373d890db3250e635fff4006fa4ef1bc9580626c,2024-11-01T12:57:03.417000 CVE-2024-1011,0,0,a83b664837c33e7f0f4cec42868f7bdd93765cacc9e6b97b43804e8b07af65f2,2024-05-17T02:35:09.987000 CVE-2024-10112,0,0,3a01d2baa33f19e143abe5aabe181ccab32faac99effca8d7325142fe7220a64,2024-10-25T12:56:07.750000 @@ -242570,7 +242570,7 @@ CVE-2024-10380,0,0,251c7695ebdffe14f2a561bb3be22f7946019d2ec5c5cf9081e853969f103 CVE-2024-10381,0,0,63addd0f8191b1c4cfb4d8f0e97d60f16153f091ecece1db9c0d0bcf5f8350fa,2024-10-28T13:58:09.230000 CVE-2024-10386,0,0,2f19951219ebf285623df88c007e35e2ba1a621ceccb3eda9a0f05f4aa7fff04,2024-10-28T13:58:09.230000 CVE-2024-10387,0,0,12b5ab9fc09cd164a10e40d20079f8a9e53a7fb87af2edbf444782194d8bf238,2024-10-28T13:58:09.230000 -CVE-2024-10389,0,1,7f50d02831ec0c7210e3e958315c008e60e035592678e929be937e615de9b81c,2024-11-04T18:50:05.607000 +CVE-2024-10389,0,0,7f50d02831ec0c7210e3e958315c008e60e035592678e929be937e615de9b81c,2024-11-04T18:50:05.607000 CVE-2024-1039,0,0,823ba846a6d7c1759f085b54cf23829cdbadd28135927175e007d2b5df85a6ad,2024-02-07T14:09:47.017000 CVE-2024-10392,0,0,6e1e37299a52c0d29351f7b918b5ce63e7a851a7204714ad635a0d36b7f4f628,2024-11-01T12:57:03.417000 CVE-2024-10399,0,0,3874273dcd61d00780364abd4b80bff26291db4f2fcc766c950b26117fafe39a,2024-11-01T12:57:03.417000 @@ -242658,7 +242658,7 @@ CVE-2024-10507,0,0,18e22ae2d57c66f0ad77c1d6593d7aee514c678b3e74cb548851fdcaf5ed4 CVE-2024-10509,0,0,a9d05e50f1563ceed5339878fa8c2329eea9e28284f4c0c86984d14b77803f94,2024-11-01T20:52:15.573000 CVE-2024-1051,0,0,301df872c002365b13eaea34d02a8084366516306d472e0b862c9b6067f5d33d,2024-04-01T01:12:59.077000 CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef0f,2024-02-15T18:49:40.180000 -CVE-2024-10523,0,1,0a9da5f6f5fef7b13b15150d455643207cf8fb33d80d9527338aeff92e2045d0,2024-11-04T18:50:05.607000 +CVE-2024-10523,0,0,0a9da5f6f5fef7b13b15150d455643207cf8fb33d80d9527338aeff92e2045d0,2024-11-04T18:50:05.607000 CVE-2024-10525,0,0,cfad79154f466fe96736eabfa65cac8f6409e21deb7f07d79c02c68ee3f19eb2,2024-11-01T12:57:03.417000 CVE-2024-1053,0,0,3d9e5b8218feb39348551f4e96f20fbacd04f2b39830165bb00a553a3d3c5ccf,2024-02-22T19:07:27.197000 CVE-2024-1054,0,0,f8e7e53b5707aaecdfe1ea6fba53413ba04bed5cdf673762252b510775f984b1,2024-02-29T13:49:29.390000 @@ -242679,12 +242679,12 @@ CVE-2024-10594,0,0,9f73b176d1fdcc28ef57fb338558f792090b1198ca431d11760ef62758907 CVE-2024-10595,0,0,713412cb3481e40d2727869bbf69e43a9603569843cd3c3208811998499997f6,2024-11-01T20:57:26.027000 CVE-2024-10596,0,0,89ac2005acfd3d8d41d0e2b8aafe285ef55fcb6b50ff7e1417f316fc9317c4a3,2024-11-01T12:57:03.417000 CVE-2024-10597,0,0,ec144bfd42b6ee158eff368d4debef5de7c0bf99a868e7f6dbbe8e6a0cc8cee7,2024-11-01T12:57:03.417000 -CVE-2024-10598,0,0,9d876052f05d649da92bd88d359dc9871e5ab4bca9b13c74f9bd5ee238ebd63b,2024-11-01T12:57:03.417000 -CVE-2024-10599,0,0,a7bd2c060c620f474205c0a2cbcf4815069e0be4503658dbb71f1f7dd211b954,2024-11-01T12:57:03.417000 +CVE-2024-10598,0,1,660edc51f4fc2fa9935095811accaae31a6c26005b25bae3073af9a24ccefd47,2024-11-04T19:44:05.513000 +CVE-2024-10599,0,1,42ec1e77225c5fd4ca05825fc485c8d353f9da187c3647e655d8a79fac27eb60,2024-11-04T19:44:59.183000 CVE-2024-1060,0,0,d653064ebc7376d659eeceb53018669b809b93fa1e3915db85367d79da8fa5c6,2024-02-05T20:49:55.413000 -CVE-2024-10600,0,0,e65342a4fe415a76d0c01f9dc427f6a36b4a8c254439fb5e7781062445e45351,2024-11-01T12:57:03.417000 -CVE-2024-10601,0,0,09965553ba64798e40e7a827da209ee34788dad4d7aa5b47619f8a21111592b7,2024-11-01T12:57:03.417000 -CVE-2024-10602,0,0,ad4e3a2b575755a16725931c01581603a09a02d4197cc00288835755bfababa4,2024-11-01T12:57:03.417000 +CVE-2024-10600,0,1,5afdca71a2cfc04818fc875bba0d0eff7c59f59939a632712606dbeb7be81101,2024-11-04T19:45:26.723000 +CVE-2024-10601,0,1,91a7748f7ab8196cb0c18c7002e72eb09e5cd397974ceca74dce38f93ac7cb73,2024-11-04T19:45:45.603000 +CVE-2024-10602,0,1,04e1f27ef7f15379bd08987a24eacd4e8204618250984eba6d7aa4f620cd7386,2024-11-04T19:46:22.830000 CVE-2024-10605,0,0,c315ce550a5a02f0527765642dbae87c4523e776fcb8c12a6fce2fe76cbae215,2024-11-01T12:57:03.417000 CVE-2024-10607,0,0,d4f1d535c87507c67c7a41b6eff84066fe8858ae73b9785b0d4652d99a74edf2,2024-11-01T12:57:03.417000 CVE-2024-10608,0,0,bd2102b8a140839a55ce6e1f5830b17a43f862d7a5baafd4d8f33b660692c0cc,2024-11-01T12:57:03.417000 @@ -242708,10 +242708,10 @@ CVE-2024-10651,0,0,4020d234a4dc20eeefa40d62db04df21d3fc130e9d8122bd0290808c2b4b1 CVE-2024-10652,0,0,e78eb78c66337c771ed734884436ae7db011d1841627efa41acd490150897405,2024-11-01T12:57:03.417000 CVE-2024-10653,0,0,1b2d26feb706600b9c41b1333f6a03988902fcf9ecda5a5dffeb928661e3db01,2024-11-04T07:15:03.743000 CVE-2024-10654,0,0,b71e1c46dc877d6506cd8226e7a3f6003b53c0e286f8e1e5ecb474e19ec184b8,2024-11-01T12:57:03.417000 -CVE-2024-10655,0,0,4ce2955614fff55ff12df1f1b7cbda5a6e092b8b5b96213e41c3f555ef5454c6,2024-11-01T20:25:15.673000 -CVE-2024-10656,0,0,4cad3503fc39be5bed3cc62ccaf38bd267c13ac67122e3622eaed54489180dd8,2024-11-01T20:24:53.730000 -CVE-2024-10657,0,0,c5c61b7babaee88552aa80710e6733f9b320141adda9804d0a14bd100c77da1e,2024-11-01T20:24:53.730000 -CVE-2024-10658,0,0,8dfe2d43742f214c209f0fa78ba979aeeee1f547358530c78eb5465b82aaa3df,2024-11-01T20:24:53.730000 +CVE-2024-10655,0,1,4a39173efe85c13de7825496903f8eabd930fb258764390bce3ef665db358080,2024-11-04T19:47:40.207000 +CVE-2024-10656,0,1,18b5e609f97649677e5109dc16530200dc01ab85577b2f860b138b1af32e903c,2024-11-04T19:47:22.733000 +CVE-2024-10657,0,1,5aa26720310b42db2ea6ef4889360ebeb3fd6b29f11acb0fdb3b6096a49be1ec,2024-11-04T19:47:03.377000 +CVE-2024-10658,0,1,e9d9b236f839d9847378b01f43925f95cb3b7a9d36c15ac46bc9d52dc81aefc3,2024-11-04T19:46:45.707000 CVE-2024-10659,0,0,3d4100a5014ab3e38ed7d92229a30de2a57befe7b3dd0753fd233294ddd14e70,2024-11-01T20:24:53.730000 CVE-2024-1066,0,0,7cd919bef6acbf4a1ab59632c47efb8ac6efc2d2c9f422a5fc3bf23611a0e27a,2024-10-08T19:52:24.017000 CVE-2024-10660,0,0,f886943977b519a7bf6536209b69c1f1829a6f26fa045720745e5c1a9b2bccc9,2024-11-01T20:24:53.730000 @@ -242752,25 +242752,27 @@ CVE-2024-10747,0,0,65defe3ce03d4e7029fc0dc81fec58dc74e785c46c902e5a5dc8cb2b4c82c CVE-2024-10748,0,0,046d3079c4eb2e3a10c0f9284d1ec682329dd55d91d1ebf1b461964671cc9500,2024-11-04T01:35:50.083000 CVE-2024-10749,0,0,ced9684eb6bbdaaa8891bf4946486b251511fc0da6f635e33f3c9a1ae41d6b8e,2024-11-04T01:35:50.083000 CVE-2024-1075,0,0,b19be1823ece9ac4ec825cefa6ea1c80de9a3ed97dd278442b9d4fd30da7b4c5,2024-02-13T19:43:13.480000 -CVE-2024-10750,0,1,ac7291ff4e0ba9d18676e979fd2056600eeebf8de907e9707b37f8db746edc27,2024-11-04T18:50:05.607000 -CVE-2024-10751,0,1,708cf1d3706f9ba54f476d4dd9f247daa4104b854e08fb2539fd4f30c5245f0e,2024-11-04T18:50:05.607000 -CVE-2024-10752,0,1,f60f4b54a5588808d722929f40e2432d1cd618a09d2c214409b59f1e0b2fdcfd,2024-11-04T18:50:05.607000 -CVE-2024-10753,0,1,75eb25a3f070d044828578f0975e7509cf6e558ad84421cac13ede388c274730,2024-11-04T18:50:05.607000 -CVE-2024-10754,0,1,175c8df0d861733db53ca3cbd1c635f8edaa6f80546862105f2762de78b06078,2024-11-04T18:50:05.607000 -CVE-2024-10755,0,1,e166b13c7b091561a5ebd76b2bcc487a59926be42fba83e9e2f2ad6e8c7b22d2,2024-11-04T18:50:05.607000 -CVE-2024-10756,0,1,0f2dc3188f21b7cc9823003ff7556003105661c0335b8158caf8e2018e903e0a,2024-11-04T18:50:05.607000 -CVE-2024-10757,0,1,973ef513b065b4649f38b445bc7bb0e95ae6f462f426f8f5f7f5b52cc77126e8,2024-11-04T18:50:05.607000 -CVE-2024-10758,0,1,7904160229d44463548d6bdba164ef19928fb9c1f5f2973a8c086726375421c8,2024-11-04T18:50:05.607000 -CVE-2024-10759,0,1,7f190d62da81d90c587aeb92a7a4e997d7a9fcae93943d6d0e097fcb2da0d128,2024-11-04T18:50:05.607000 +CVE-2024-10750,0,0,ac7291ff4e0ba9d18676e979fd2056600eeebf8de907e9707b37f8db746edc27,2024-11-04T18:50:05.607000 +CVE-2024-10751,0,0,708cf1d3706f9ba54f476d4dd9f247daa4104b854e08fb2539fd4f30c5245f0e,2024-11-04T18:50:05.607000 +CVE-2024-10752,0,0,f60f4b54a5588808d722929f40e2432d1cd618a09d2c214409b59f1e0b2fdcfd,2024-11-04T18:50:05.607000 +CVE-2024-10753,0,0,75eb25a3f070d044828578f0975e7509cf6e558ad84421cac13ede388c274730,2024-11-04T18:50:05.607000 +CVE-2024-10754,0,0,175c8df0d861733db53ca3cbd1c635f8edaa6f80546862105f2762de78b06078,2024-11-04T18:50:05.607000 +CVE-2024-10755,0,0,e166b13c7b091561a5ebd76b2bcc487a59926be42fba83e9e2f2ad6e8c7b22d2,2024-11-04T18:50:05.607000 +CVE-2024-10756,0,0,0f2dc3188f21b7cc9823003ff7556003105661c0335b8158caf8e2018e903e0a,2024-11-04T18:50:05.607000 +CVE-2024-10757,0,0,973ef513b065b4649f38b445bc7bb0e95ae6f462f426f8f5f7f5b52cc77126e8,2024-11-04T18:50:05.607000 +CVE-2024-10758,0,0,7904160229d44463548d6bdba164ef19928fb9c1f5f2973a8c086726375421c8,2024-11-04T18:50:05.607000 +CVE-2024-10759,0,0,7f190d62da81d90c587aeb92a7a4e997d7a9fcae93943d6d0e097fcb2da0d128,2024-11-04T18:50:05.607000 CVE-2024-1076,0,0,1eec5a2aed6def26ca78a00c90cdc2a9e26a823100b6419a30b16c630a915a03,2024-08-30T13:15:12.257000 -CVE-2024-10760,0,1,6bdd52886ec00384959eb6af738c45b4575c45b728fc6ef0812e38c91365ff56,2024-11-04T18:50:05.607000 -CVE-2024-10761,0,1,e55627ca0aefeb59987656a92ae2fe0920723534c3676e4833cbe2ebfab1f89e,2024-11-04T18:50:05.607000 -CVE-2024-10764,0,1,ec3f49d125cf2e2f9f040e77955c901db8d4fc081c2a5a3c578e4d10b68b11ee,2024-11-04T18:50:05.607000 -CVE-2024-10765,0,1,f94f39587334d404980a388e9dfd9fb9115fae8b2ac1d9ff2a13bbe026583b18,2024-11-04T18:50:05.607000 -CVE-2024-10766,1,1,1b1319bb6e0bee622c046653104b00240692805524f9a93d49c4c9f821fef751,2024-11-04T18:50:05.607000 +CVE-2024-10760,0,0,6bdd52886ec00384959eb6af738c45b4575c45b728fc6ef0812e38c91365ff56,2024-11-04T18:50:05.607000 +CVE-2024-10761,0,0,e55627ca0aefeb59987656a92ae2fe0920723534c3676e4833cbe2ebfab1f89e,2024-11-04T18:50:05.607000 +CVE-2024-10764,0,0,ec3f49d125cf2e2f9f040e77955c901db8d4fc081c2a5a3c578e4d10b68b11ee,2024-11-04T18:50:05.607000 +CVE-2024-10765,0,0,f94f39587334d404980a388e9dfd9fb9115fae8b2ac1d9ff2a13bbe026583b18,2024-11-04T18:50:05.607000 +CVE-2024-10766,0,0,1b1319bb6e0bee622c046653104b00240692805524f9a93d49c4c9f821fef751,2024-11-04T18:50:05.607000 +CVE-2024-10768,1,1,aed04b331f848f55e770417e26cef0f008da2fae8f2170b818012b56295c9fef,2024-11-04T19:15:05.743000 CVE-2024-1077,0,0,9052c519c4a7de5cf3516fc923116c25b788d5b36a137a2e416fb3d37403344d,2024-07-03T01:44:58.330000 CVE-2024-1078,0,0,88568fa2f20f5ea8de25fda48576808429bbc616448df571a879f056db565620,2024-02-14T18:39:51.437000 CVE-2024-1079,0,0,0a964f4e43e1a2d85a40a4753c5354fe293facf65d0ebcc06031e68ccad95a0f,2024-02-14T19:33:09.977000 +CVE-2024-10791,1,1,cb043225edc618ea2693a51127808443f4accc3588a4d0ea0e9750587123f32a,2024-11-04T20:15:04.580000 CVE-2024-1080,0,0,9acdbacec5fb31283e62a6d3f1b1bde4de3af0ce021840a5a12a8cd06719b667,2024-03-13T18:16:18.563000 CVE-2024-1081,0,0,b9ecb327bf229081db54279065262fbdf204fadb84142fe6a647ad5480db67c8,2024-02-22T19:07:27.197000 CVE-2024-1082,0,0,1a3a3ef85a9a06621291f657b27812f6a6be683bc843b0137ba9e53485eee330,2024-10-17T15:46:44.327000 @@ -243740,27 +243742,27 @@ CVE-2024-20100,0,0,6232a5e349fb938dfde44a6272036d8fcab6eb82e3b395e905d1ef444c94e CVE-2024-20101,0,0,4ab31b8617124baf5a584f677af857db4f34ad707839e76bd0c5af95515b24c2,2024-10-07T19:36:43.247000 CVE-2024-20102,0,0,3cb6582406cbe14406fe81e42fc867d6348c8d6360f05e88e94b0e4d501c8f03,2024-10-10T18:20:31.820000 CVE-2024-20103,0,0,db42d95d798d4c29343c261aa8a039b0877035c0ce319208cb5d6e304467accf,2024-10-07T19:36:43.530000 -CVE-2024-20104,0,1,0eb0f6cec63790bfe271dccde21717eef40ef09e4c0ada0a9bf3281e03a25b78,2024-11-04T18:50:05.607000 -CVE-2024-20106,0,1,e802badf719ee91193f39dabfeacc6f7402cce3fb9882581725eeb664eb99531,2024-11-04T18:50:05.607000 -CVE-2024-20107,0,1,ea573850b5f7813350717c222c9395da828f3387988dd71fe57f2afa8cfb7bd2,2024-11-04T18:50:05.607000 -CVE-2024-20108,0,1,51ff38ef9a8e206454f1a52cdc9dd02a8ef9e6b5f51f357d4ca22814a544ffd1,2024-11-04T18:50:05.607000 -CVE-2024-20109,0,1,329be716d8c17779a789d6c54f4067532328a67503ee51f1f4b82135d7e12d0a,2024-11-04T18:50:05.607000 +CVE-2024-20104,0,0,0eb0f6cec63790bfe271dccde21717eef40ef09e4c0ada0a9bf3281e03a25b78,2024-11-04T18:50:05.607000 +CVE-2024-20106,0,0,e802badf719ee91193f39dabfeacc6f7402cce3fb9882581725eeb664eb99531,2024-11-04T18:50:05.607000 +CVE-2024-20107,0,0,ea573850b5f7813350717c222c9395da828f3387988dd71fe57f2afa8cfb7bd2,2024-11-04T18:50:05.607000 +CVE-2024-20108,0,0,51ff38ef9a8e206454f1a52cdc9dd02a8ef9e6b5f51f357d4ca22814a544ffd1,2024-11-04T18:50:05.607000 +CVE-2024-20109,0,0,329be716d8c17779a789d6c54f4067532328a67503ee51f1f4b82135d7e12d0a,2024-11-04T18:50:05.607000 CVE-2024-2011,0,0,4150023a6f5b05ff7bb1f10e004dac522c292e22a6fa4bc68fed9003ca68fddf,2024-08-15T21:25:45.037000 -CVE-2024-20110,0,1,d13a75bdef54b371678ab968b24e1cb1378ea02b8b1a291a79a5da9527360805,2024-11-04T18:50:05.607000 -CVE-2024-20111,0,1,3844afaec43e3f605de336de14e66397c560619827b4d232056aa90853fd8817,2024-11-04T18:50:05.607000 -CVE-2024-20112,0,1,aec8632268d53801bf3178030c0292363106fc55fd291b0c2de72254739cc579,2024-11-04T18:50:05.607000 -CVE-2024-20113,0,1,4b3e3a28a486c5a45ce9574225e84f39bc329878375ecc2f9f9de82a6e46dcff,2024-11-04T18:50:05.607000 -CVE-2024-20114,0,1,d4f9a6acd3671850ccdda364ad16fd101e957fe83ffdb2706267187949fed4af,2024-11-04T18:50:05.607000 -CVE-2024-20115,0,1,c210a51884bef6a1021f758530f4f2a5de02bc2b0a43406dea8d3ae0d73674a7,2024-11-04T18:50:05.607000 -CVE-2024-20117,0,1,7c37e16d78d22bbe6f6d816bf60aa223bf61c98fcf370ee47f184ded8c807678,2024-11-04T18:50:05.607000 -CVE-2024-20118,0,1,de415887ee6c076f946c02490cb02f573f7494398e53c6bece76bed9a2427926,2024-11-04T18:50:05.607000 -CVE-2024-20119,0,1,8a55961b12bffbd749551c2a476d60889049504d4a0fed2b30ad593cc3811eea,2024-11-04T18:50:05.607000 +CVE-2024-20110,0,0,d13a75bdef54b371678ab968b24e1cb1378ea02b8b1a291a79a5da9527360805,2024-11-04T18:50:05.607000 +CVE-2024-20111,0,0,3844afaec43e3f605de336de14e66397c560619827b4d232056aa90853fd8817,2024-11-04T18:50:05.607000 +CVE-2024-20112,0,0,aec8632268d53801bf3178030c0292363106fc55fd291b0c2de72254739cc579,2024-11-04T18:50:05.607000 +CVE-2024-20113,0,0,4b3e3a28a486c5a45ce9574225e84f39bc329878375ecc2f9f9de82a6e46dcff,2024-11-04T18:50:05.607000 +CVE-2024-20114,0,0,d4f9a6acd3671850ccdda364ad16fd101e957fe83ffdb2706267187949fed4af,2024-11-04T18:50:05.607000 +CVE-2024-20115,0,0,c210a51884bef6a1021f758530f4f2a5de02bc2b0a43406dea8d3ae0d73674a7,2024-11-04T18:50:05.607000 +CVE-2024-20117,0,0,7c37e16d78d22bbe6f6d816bf60aa223bf61c98fcf370ee47f184ded8c807678,2024-11-04T18:50:05.607000 +CVE-2024-20118,0,0,de415887ee6c076f946c02490cb02f573f7494398e53c6bece76bed9a2427926,2024-11-04T18:50:05.607000 +CVE-2024-20119,0,0,8a55961b12bffbd749551c2a476d60889049504d4a0fed2b30ad593cc3811eea,2024-11-04T18:50:05.607000 CVE-2024-2012,0,0,02707995e28bba3e21e37a0cc9698bd91832709b25d71785b53bd5ea8c9a7518,2024-08-15T21:19:03.770000 -CVE-2024-20120,0,1,abdf5fe0d9826449777afa803e667b5ff503d4bb09586c1271d9e77a7810a3dd,2024-11-04T18:50:05.607000 -CVE-2024-20121,0,1,64ee137ec6d4da89e8765ec85d8ed9256cab3d56dc912845aa26341810bbd9fc,2024-11-04T18:50:05.607000 -CVE-2024-20122,0,1,e91f0e64d1765b100ddb7c2a6a3253904ec619055693864d1573423b8b66fadf,2024-11-04T18:50:05.607000 -CVE-2024-20123,0,1,a6fa45d61f9a55f13ce8b7b5374adc77483c99447c1733b2f283a6b6bfd3450c,2024-11-04T18:50:05.607000 -CVE-2024-20124,0,1,f0fd554760cd299dfc56b4ac50a1e92ea4b3de134a0428b7867adeb4defad70e,2024-11-04T18:50:05.607000 +CVE-2024-20120,0,0,abdf5fe0d9826449777afa803e667b5ff503d4bb09586c1271d9e77a7810a3dd,2024-11-04T18:50:05.607000 +CVE-2024-20121,0,0,64ee137ec6d4da89e8765ec85d8ed9256cab3d56dc912845aa26341810bbd9fc,2024-11-04T18:50:05.607000 +CVE-2024-20122,0,0,e91f0e64d1765b100ddb7c2a6a3253904ec619055693864d1573423b8b66fadf,2024-11-04T18:50:05.607000 +CVE-2024-20123,0,0,a6fa45d61f9a55f13ce8b7b5374adc77483c99447c1733b2f283a6b6bfd3450c,2024-11-04T18:50:05.607000 +CVE-2024-20124,0,0,f0fd554760cd299dfc56b4ac50a1e92ea4b3de134a0428b7867adeb4defad70e,2024-11-04T18:50:05.607000 CVE-2024-2013,0,0,00ec85b9018843d83179244785c9b4c96e5ba8e015239a21d2d4ac8bf1b712fa,2024-08-15T21:08:02.010000 CVE-2024-2014,0,0,97c4d99afb7da491efaae3ff0fb6836102849098937eeb69745707d3dbc15b2d,2024-05-17T02:37:59.427000 CVE-2024-2015,0,0,bb3d603120b99e575edb7baace469be8f767dc6e32ed33cf2700f4d2936e46ac,2024-05-17T02:37:59.517000 @@ -245513,7 +245515,7 @@ CVE-2024-22251,0,0,5b1c78977e7a04eeaf6535ae42017a6a1e82ea208698ccd587ea5ce800725 CVE-2024-22252,0,0,52a85737ba1a2dd683ca2f0e723c2e638bb6ffce616a3bc6c60dd13cc85e813c,2024-03-05T18:50:18.333000 CVE-2024-22253,0,0,99373fd467fe1494c70def9a33c277abe9ef8000626bb6e83f26af7d49c26664,2024-08-16T20:35:05.110000 CVE-2024-22254,0,0,20d7e9ec4979d70b7eb4baedee6a35555829a7b91aea3c15baf85c60eb6e51bf,2024-08-14T19:35:18.467000 -CVE-2024-22255,0,1,8e7a40c5bf54cf100359b6bd89ec7ed5b7b9b1826e219d741464964078f159ff,2024-11-04T18:35:06.477000 +CVE-2024-22255,0,0,8e7a40c5bf54cf100359b6bd89ec7ed5b7b9b1826e219d741464964078f159ff,2024-11-04T18:35:06.477000 CVE-2024-22256,0,0,dcbf1bed6a2eb60ed505918b467b6ef5ef784547429273c505574abd3ae01acd,2024-03-12T15:01:32.347000 CVE-2024-22257,0,0,83d5592ba2658b12f45fdbdc1fa843be7cd4148ccfa8d90acba9b43bfc7d1437,2024-04-19T07:15:09.223000 CVE-2024-22258,0,0,4b97201062488eaff51b24fbc9ae28b1f946f20fc4b3f47d5337472a99498617,2024-03-20T13:00:16.367000 @@ -245820,7 +245822,7 @@ CVE-2024-22725,0,0,5fa379724d5fca6a5a451858a4ba6ac34ebc02b0c57c2f76559d231c12c11 CVE-2024-22727,0,0,21f0a699093390ba1d8ee3a22a8e6961dde2045354957e98f8b2db244c882256,2024-02-20T19:50:53.960000 CVE-2024-22729,0,0,768bb63a8e628d1d5ad8c32ce479e7ef65e430464c818e272a86590502c0053a,2024-02-01T15:15:34.173000 CVE-2024-2273,0,0,0a70a78279025f010830c200ec41c70db1b0b3c6a90f640b7fd5d17983a65e86,2024-05-02T18:00:37.360000 -CVE-2024-22733,0,0,96b1442dfb0bb282b6e8c5d03d1e1294802792f5f33df759d0ff13de8081d9ca,2024-11-01T20:24:53.730000 +CVE-2024-22733,0,1,5ffc84c54b1133a58773831b099651e00af398e2efc2f99a6ca9461a3d33c96b,2024-11-04T20:01:12.483000 CVE-2024-22734,0,0,a3491dcc3c7b5d449a7e86cb6408877457dffcd3f57d3503ef629f53a0b65b58,2024-07-08T14:17:29.360000 CVE-2024-2274,0,0,6fc96400c211578866c6c22eea50b1789a75c82b773ece131b3550b25233611e,2024-05-17T02:38:08.363000 CVE-2024-22749,0,0,bc8737d9438d776e0226ec03871efe6a0159338bddb3aa6ecadc564f1611c479,2024-01-31T18:01:59.017000 @@ -246226,7 +246228,7 @@ CVE-2024-23373,0,0,5f71e52681ce9b4c683001ee0714339e5fcbf3b0ac462fe47ab6cd76399fa CVE-2024-23374,0,0,f4c6d02700b6a8420aafee41d5598362caa782be31e75b6b5a2be4f35376a456,2024-10-16T20:26:47.983000 CVE-2024-23375,0,0,6c40f68c93a67061204173a720ea1a7d00eaefa497b28279e14abbb274c64d60,2024-10-16T20:26:01.167000 CVE-2024-23376,0,0,53f5fbcb9e7022eaed6b3b110c6c4a497cb456faf848338c012c4a394e4a25a1,2024-10-16T20:07:45.260000 -CVE-2024-23377,0,1,c3e4833903ad95d45a0469d4c22fd5cc0841672de66b1257aafc9b065e02c3ac,2024-11-04T18:50:05.607000 +CVE-2024-23377,0,0,c3e4833903ad95d45a0469d4c22fd5cc0841672de66b1257aafc9b065e02c3ac,2024-11-04T18:50:05.607000 CVE-2024-23378,0,0,cb12f7c9d19ce7e2f02f7f248035e9b955e6980ec80efbda1175620e9584e886,2024-10-16T20:00:29.503000 CVE-2024-23379,0,0,d83d42193b183369769000f98e3afdec4ada9e1be3c04ea1a4b9166a0e8b650f,2024-10-16T19:58:40.227000 CVE-2024-2338,0,0,97ed9304e53653e5f2f6be84ec656ed42a5ae14786266fb81f31dd764d99c05c,2024-03-08T21:19:43.127000 @@ -246235,8 +246237,8 @@ CVE-2024-23381,0,0,c05f9cee58e223ab89c0d0d7ff884408a74aec6ab8924761148e9dbc59968 CVE-2024-23382,0,0,ff24d6020e14bb69f781982e2cd1ca969bdc34877498b5f427eb6708619a0e83,2024-08-06T16:30:24.547000 CVE-2024-23383,0,0,a47dc771e576435c08fbf1cb6343f6cdccefbb6dc18c0aec3a268a581496d75f,2024-08-06T16:30:24.547000 CVE-2024-23384,0,0,af1a2c186017dbfb51721f232ecb63b5ddf276ff15ce1bbe6f03cf143cb8fb6c,2024-08-06T16:30:24.547000 -CVE-2024-23385,0,1,1f5bb106cd97ab1ac033c9191c514307f12907c8dfae5ce4b77d7260477f3310,2024-11-04T18:50:05.607000 -CVE-2024-23386,0,1,926827ad8dc70c1b893f2c93658b56e57a60f148b9a66ffe113f1eea7140ec55,2024-11-04T18:50:05.607000 +CVE-2024-23385,0,0,1f5bb106cd97ab1ac033c9191c514307f12907c8dfae5ce4b77d7260477f3310,2024-11-04T18:50:05.607000 +CVE-2024-23386,0,0,926827ad8dc70c1b893f2c93658b56e57a60f148b9a66ffe113f1eea7140ec55,2024-11-04T18:50:05.607000 CVE-2024-23387,0,0,a7f1916ac284cf0c8474af6b9f638254f5287c7c53a3c81d95bafc7f75d51a82,2024-01-25T02:00:29.210000 CVE-2024-23388,0,0,752c714a44aeac9cd8289b285e00a882944a95b977a7bc2b41dab87372ead843,2024-02-05T15:18:21.920000 CVE-2024-2339,0,0,f035f933b58c40751abb3c3284c6f139c7da6609ba017eef7b1ce8ff891fae95,2024-03-08T21:19:43.127000 @@ -246371,7 +246373,7 @@ CVE-2024-23584,0,0,25f43dde9216afa9143a8cf07755b8e095a8ff52fd4b037e0c34ead99c4a7 CVE-2024-23586,0,0,e4206382e7df5acbc3ee4909b5c9a721999892cd76df40fca8a357be2a4aa16c,2024-10-07T15:30:56.227000 CVE-2024-23588,0,0,616193c58804c0df33f02bbe918628fdff6c0cb92f6852ea08810ac3765e566c,2024-07-08T15:28:10.993000 CVE-2024-2359,0,0,92a91458fa3e30e1d3793add182cf3e1250c0ae608aace7f3a538586001a9a55,2024-10-17T15:39:03.397000 -CVE-2024-23590,0,1,a4a0ae6a5507a67e43b415a2e8c2ed8ea7bb4c3a6b430f230868b89baf523790,2024-11-04T18:50:05.607000 +CVE-2024-23590,0,0,a4a0ae6a5507a67e43b415a2e8c2ed8ea7bb4c3a6b430f230868b89baf523790,2024-11-04T18:50:05.607000 CVE-2024-23591,0,0,65ea9c151d9d7befc9470a956acb00d512d494f9281b48487341988483da52d2,2024-02-20T22:15:08.353000 CVE-2024-23592,0,0,f4db45b7df227186690b3d790e263099b74eb1bd23d5be604658bff5249e373d,2024-04-08T18:49:25.863000 CVE-2024-23593,0,0,b769409d07b1567757ec72b7cfa17a7cda228a62e52806c62239b600efd08769,2024-04-15T19:12:25.887000 @@ -247358,7 +247360,7 @@ CVE-2024-25079,0,0,747dcc74f114c461c43dc15d8c7262cc52b3ea0a47dd0c2658850379b94ea CVE-2024-2508,0,0,5f5b90c70383af5e74076ecfe442ac5d6b537a3785081aa188cda0ddf04bd81f,2024-07-31T12:57:02.300000 CVE-2024-25080,0,0,ac2a1dea63d0c6616a8817d8c9857da421c3824981ab86a3e448f029507a2e2d,2024-11-01T19:35:18.183000 CVE-2024-25081,0,0,8447758264e474cd1c8516048ae8770433feeb45ecce33ffdf5df19305ed1ff9,2024-08-27T19:35:13.260000 -CVE-2024-25082,0,0,c4024b086b0d99b44b3d9149e06878bd50b7e82765ae87c23c8e458108c36ef4,2024-05-01T19:15:22.237000 +CVE-2024-25082,0,1,e037d2c10f0e82add3e0b0236d3b6431278477a525fab3979ccbeb71c8bddda3,2024-11-04T19:35:04.633000 CVE-2024-25083,0,0,82140a5a06672843cc06d8c49a45d2786901923a23d988718119cbf0cb5278eb,2024-08-28T16:35:13.370000 CVE-2024-25086,0,0,d7f7d87d6cdc4c934f4645f409f9d6ad95bc0b43a7473acdcf85c7b382132abe,2024-07-08T14:17:42.020000 CVE-2024-25087,0,0,d0eb5bf250014d4733c8c2cd43475d3db0483672bd5d42f237e7c0898368e6b0,2024-10-30T15:35:07.993000 @@ -247956,7 +247958,7 @@ CVE-2024-25969,0,0,a2d227b0b86b4325c26bb6f673bbdc8a7ef141703ec468628c2766b328aa9 CVE-2024-2597,0,0,614f461cf5a32e6e3c045095423c1ac446116226b22d5334101b749199de8efc,2024-03-18T19:40:00.173000 CVE-2024-25970,0,0,f8b7303cc0abe87ee106240dccbd738c35db8e13a2603b08d62839897cd5a5d6,2024-05-14T19:18:31.490000 CVE-2024-25971,0,0,d03bf655e7e0d5dbf73b6beff3280dcd3ab38f529872aed84cb4a267414cdc66,2024-03-28T20:53:20.813000 -CVE-2024-25972,0,0,d95c21ee974d425afbb922b90eb304204c5a0eb3f080624a00ed82488538506f,2024-03-01T14:04:04.827000 +CVE-2024-25972,0,1,f562429727244ba83adab7ab33e6715f66598350a42ffea3de89f272c0ae03bd,2024-11-04T20:35:03.760000 CVE-2024-25973,0,0,64b2d7e51fd0c1f6188056368cd8ef177890326c25a57ab938769dde8c643479,2024-02-21T07:15:58.040000 CVE-2024-25974,0,0,12433a6d8e699d155905877ac67441d31fc3219c3906ce3bad9f2bfde8f9f2f4,2024-08-01T13:47:57.737000 CVE-2024-25975,0,0,7575b9d67e4ea045410d7956ad161bd45f31efb1c5194db4cce836637ccacb6a,2024-07-03T01:49:20.510000 @@ -248139,7 +248141,7 @@ CVE-2024-26151,0,0,e1dc838a6d430f2f3bb000afc8645752ee52070eab909d9c789d043adb639 CVE-2024-26152,0,0,be8646b007362130f2d7e4b19e1e011379a1ee505dd31fab682fd492bc0e9a97,2024-02-23T02:42:54.547000 CVE-2024-26158,0,0,e4eb67f7a9ef1e95f05f830527e292892249634485474776f5ca55a98fc6f945,2024-04-10T13:24:00.070000 CVE-2024-26159,0,0,56810e72f38b92040811a5204d542af9b722ff356135b225ffab76f56a28e7fb,2024-04-11T20:15:33.460000 -CVE-2024-2616,0,1,9b15179cd9c13063a987e4bea66929da17ee47340fd2e08c233e9c68e7f7a332,2024-11-04T17:35:14.147000 +CVE-2024-2616,0,0,9b15179cd9c13063a987e4bea66929da17ee47340fd2e08c233e9c68e7f7a332,2024-11-04T17:35:14.147000 CVE-2024-26160,0,0,a5ba5256c33bdbaacb3171d5280616afee8699c566f2ab3b8302aeb6de79cfee,2024-04-11T20:15:33.553000 CVE-2024-26161,0,0,144d4a9b4e8ed125dc2cdb23e80f565db560f7b039446d2c7eefd4f94fae90fd,2024-04-11T20:15:33.647000 CVE-2024-26162,0,0,24caa669816ecfa4cc8d90aff433766fa488343cde50be56e3b76ed5fb36afaa,2024-04-11T20:15:33.750000 @@ -248280,7 +248282,7 @@ CVE-2024-26295,0,0,bee0ceea4a2fa9f7b5cd5ca393d32245b0399ff1744d3c1781d7fe4c47055 CVE-2024-26296,0,0,544e1c2c94ce65e70db959ad46d5372fa189de6687abd994a179048ab80cba75,2024-08-01T13:48:05.123000 CVE-2024-26297,0,0,af2dff5c494a25db31e51e78048442dd01fa43e7ea7ca9a2aba52748560b0484,2024-08-01T13:48:05.817000 CVE-2024-26298,0,0,59727460b37052fa0a59faa646f1b3121962ba5c31619135e5630e3a1f8617f0,2024-08-01T13:48:06.523000 -CVE-2024-26299,0,0,388de7f3a87ecf2fa8513c69a452c6b2ff267b5ff8f028f7dadd75103abb070e,2024-02-28T14:06:45.783000 +CVE-2024-26299,0,1,4af490fcb06c2a0a12f3931f9418f50f8d065e15f235e9b7e567768770556a1c,2024-11-04T19:35:05.457000 CVE-2024-2630,0,0,ec856c27a5c03dd021fb947cb024a63c9409651759234a9bffe340d8fd7b989a,2024-10-30T16:35:14.117000 CVE-2024-26300,0,0,1ac1f21ae9a2403844c235609ee04177577ebeaf725b3bb4b2178b26e2a031f5,2024-02-28T14:06:45.783000 CVE-2024-26301,0,0,19f0f94ed5cbffac086b7363ba9897dc486d991fcb04fba1d0f3db89247a8bc8,2024-02-28T14:06:45.783000 @@ -248465,7 +248467,7 @@ CVE-2024-26649,0,0,940fcd7e5d20bc1c18f4c974a09622f0b6b6d87231bbd7408e7118d35c4ba CVE-2024-2665,0,0,0d168a0d5dbe4804c9bebe4f21c0d1f4a27974809ea172b5979b5dccd55d97c3,2024-04-10T13:23:38.787000 CVE-2024-26650,0,0,c37b82afef74cba8f0a1b3081e8c53c80ac8f73689ed9f1c045183b9566d980d,2024-05-23T14:15:09.293000 CVE-2024-26651,0,0,fb1778dec4aa28736fc803494a7d95d0a4887c74ed91b5258df0fc8bdc4d3968,2024-06-27T13:15:55.767000 -CVE-2024-26652,0,0,8d1d6ddd47009d0989b0af2880df88b1969ba8e4d26e3bf434b97801617a53ad,2024-03-27T15:49:41.437000 +CVE-2024-26652,0,1,8d6649d168744efbfe6b62c08e9360ae7602de48e9181fe8c422fe485dc0c24c,2024-11-04T20:35:04.647000 CVE-2024-26653,0,0,d8aee5aa874cda3bb376f3ce8a5f14e5f03fc79d04d8d093a2467a5582803bc0,2024-04-03T14:15:16.520000 CVE-2024-26654,0,0,d30cf3144176f55463a59233de7c2d22b1a5877071a0f572ada286ee3c4a13b0,2024-06-25T21:15:58.207000 CVE-2024-26655,0,0,e538fefaef2b297407375360bfd7d37a24041d5520688f3409c56615cace1742,2024-04-03T14:15:16.860000 @@ -248480,7 +248482,7 @@ CVE-2024-26662,0,0,4690da5f07bb4f5e40786063116ee764b660c850faf8c8d2effbea2f2fef6 CVE-2024-26663,0,0,d714e15cc9607ab844dd5f108c583e6fa158b855e51f0984ba2d0b1b59099cb2,2024-06-27T12:15:19.617000 CVE-2024-26664,0,0,89a417a13d785ad8325335d250bf1b0d19023246e19cb5ddc76946cbcac78ba0,2024-06-27T12:15:19.777000 CVE-2024-26665,0,0,95b558ab2a7d651a73090bb16cc70f3f1b7091635999816322baea48fdd6527f,2024-06-25T22:15:20.357000 -CVE-2024-26666,0,1,dba6407ca84bc6fce032abfb8ba38b81cf3c08823061c0b0f1d367639de1d8f9,2024-11-04T17:35:11.477000 +CVE-2024-26666,0,0,dba6407ca84bc6fce032abfb8ba38b81cf3c08823061c0b0f1d367639de1d8f9,2024-11-04T17:35:11.477000 CVE-2024-26667,0,0,9a1ea0e4ac9bf10d6568a6b8d7ce40bf22c9e05c2998d5540cc717ab017e057e,2024-04-02T12:50:42.233000 CVE-2024-26668,0,0,582f7a605a28f8d79a9b901b29ab8b643dbe0a75bef6fc5eda07e1d84212be81,2024-04-02T12:50:42.233000 CVE-2024-26669,0,0,a6fd5b0b0b3d84e69818d552f2361b002d90e9c67b18c3d40b35bce20ef4408e,2024-04-02T12:50:42.233000 @@ -248558,7 +248560,7 @@ CVE-2024-26733,0,0,646af548b9533cc8bde386b28e554214eab8f2a020503960c0d1f100df49a CVE-2024-26734,0,0,0eb1b1feddc3c43838ae7b1cbb500208ff685270dbb18f151464783d19bf4c65,2024-04-03T17:24:18.150000 CVE-2024-26735,0,0,7afe0996673efde5a6585f2186b8a08bb5ef98d3542cccab732c4df20b91e8aa,2024-10-31T14:35:12.657000 CVE-2024-26736,0,0,a562229f2b02fc6cec76f3673034e8ce7378dc0d0fc6cbaec0df447d9263eebb,2024-06-25T22:15:21.543000 -CVE-2024-26737,0,0,0eebf05ac9670a7b6624c0152880292a6d84adf09232bb7ee2becab2991f6bad,2024-04-03T17:24:18.150000 +CVE-2024-26737,0,1,5d630f8ababe5101cb5f2cea2096882f36be8fed2220dc01cee465676a15e40c,2024-11-04T19:35:06.193000 CVE-2024-26738,0,0,3ed173e742b2f1ef480700b80fac0353c8315c8c73b558ad6f8306db1c647ea2,2024-04-03T17:24:18.150000 CVE-2024-26739,0,0,3d829b13b19365c48f5d561476965397ebd2e1886563c8f01827db030cd83b2d,2024-04-03T17:24:18.150000 CVE-2024-2674,0,0,f2c8a10eeecd3f969d6af12d88b2654ac020152e56dd763b8a3c5395662fb559,2024-05-17T02:38:24.343000 @@ -248581,7 +248583,7 @@ CVE-2024-26754,0,0,1d4838500a8c252b0cbc8626cdb75e403c6b4035abdfb90db28910573033c CVE-2024-26755,0,0,39f7695747b108842d59070ebf8576f95142b84dcd41ed480d2d853aa612b61c,2024-04-03T17:24:18.150000 CVE-2024-26756,0,0,655c17b37b1ef2579c61a87ebef153f2774027727f182f3917510b923fe0ccdc,2024-04-03T17:24:18.150000 CVE-2024-26757,0,0,6034152e03c1ca661ffc06ef00b2bfd06031f7a425df0cd8c48af8de3fbaa9da,2024-04-03T17:24:18.150000 -CVE-2024-26758,0,1,13c69310718039924d9aab781258d9193abdbc64a782ef9279b6a2cb5e131a2b,2024-11-04T18:35:07.610000 +CVE-2024-26758,0,0,13c69310718039924d9aab781258d9193abdbc64a782ef9279b6a2cb5e131a2b,2024-11-04T18:35:07.610000 CVE-2024-26759,0,0,fee904955decc510df312a537847d082dbb8683c61f8fb59034da4ba171b0bf7,2024-04-03T17:24:18.150000 CVE-2024-2676,0,0,c5aff2ba1e0c7344ce038e4f14ac4978d6bb29d1aa8d9b0c435541e971559719,2024-05-17T02:38:24.527000 CVE-2024-26760,0,0,160226d81fdca2c84eeb6d46729122b3c80deb78aaa248984920bedee820af65,2024-04-03T17:24:18.150000 @@ -248612,7 +248614,7 @@ CVE-2024-26782,0,0,a8f0edf206263b3c9eba58e0fb3861d3e660f94765ec36c7016ad2ad14997 CVE-2024-26783,0,0,2af6ae94e0862d9e4c8fd1dd01e9d9533df487005b3632bcc9e5cde226324207,2024-04-04T12:48:41.700000 CVE-2024-26784,0,0,3a3f9b64e77aea2ce61d08fe6ae8aad422b3d40e30ce83138a1e05ab32d7f913,2024-04-04T12:48:41.700000 CVE-2024-26785,0,0,492d91066ad796fd42a81d8353bd8f9a1d6609491204ab2e4afcd38caad744f6,2024-10-10T12:15:03.027000 -CVE-2024-26786,0,1,f0d42ff714fdbdea6cad40254a7441c39ad23ba1d0f464ffbc3844c541dc2469,2024-11-04T17:35:11.680000 +CVE-2024-26786,0,0,f0d42ff714fdbdea6cad40254a7441c39ad23ba1d0f464ffbc3844c541dc2469,2024-11-04T17:35:11.680000 CVE-2024-26787,0,0,f985833eabc0b397db214dacc58c7e104cc79adde180c68c036e584aadedd282,2024-06-25T22:15:22.630000 CVE-2024-26788,0,0,50c90a7eb339f42da123055401cf03e57c42ac2878a6117d1ce68ecb98eebf96,2024-06-25T22:15:22.697000 CVE-2024-26789,0,0,7c68fd88d24a4175acc760683158a137f5ffc24de13af7d41ca7d2836f860294,2024-11-01T15:35:10.487000 @@ -248658,7 +248660,7 @@ CVE-2024-26824,0,0,34887f560d328b7bba35a6644eabb0ffc96cff74bf520b9ed66b0e71dc5b1 CVE-2024-26825,0,0,c530382651586c6f00e357a62287c33dae2aca66e91ddbf4d033164bb0e5af4c,2024-06-27T12:15:21.290000 CVE-2024-26826,0,0,b96f5bfbf455712c540bd404ccad30ca4bbaa9c3b24bb619ee2f9755485cb6ec,2024-04-17T12:48:07.510000 CVE-2024-26827,0,0,4cc514efbe22ca04935a47f409b758351113d51b04fbbf02df44e27fcf8c06d7,2024-04-18T15:15:28.957000 -CVE-2024-26828,0,0,068fdb4e6875948570b84d12958b3c669b70076b80bccc85ca800207db573b5d,2024-04-17T12:48:07.510000 +CVE-2024-26828,0,1,97a54035816ae7398000e031f21c5a1326a47ba614922ea9f997061803eed8fd,2024-11-04T19:35:06.407000 CVE-2024-26829,0,0,f8089f48fc5ec0e8590d91d8eb0c2fbd4e11020168517d02c9b9ea2b70df64b5,2024-04-17T12:48:07.510000 CVE-2024-2683,0,0,03d83a8830e046a65ef4d0799c57f1d02403a9d84f74ce05a3e92291cd2a2db1,2024-06-27T19:15:12.647000 CVE-2024-26830,0,0,b998bb99b2690406751770253dbf825292746bb49e7ef9e53a6b25ffa549a608,2024-04-17T12:48:07.510000 @@ -248757,7 +248759,7 @@ CVE-2024-26914,0,0,b60bf8a04b17c0ea33f524de7c269b75b58d301f82cdab9a9708a990a2d14 CVE-2024-26915,0,0,3aeea9b3b1040d92e3c4fc19c7e143be80147947903ccfd65b166e36804975a5,2024-04-17T16:51:07.347000 CVE-2024-26916,0,0,2c15e9b6f09b6b6e09b74c13dd3524379b0f76dc583243b6aec1ac31f122210d,2024-04-17T16:51:07.347000 CVE-2024-26917,0,0,cdf4aa661c28bc82e7bbc6e2edd85f7d0ef8bc5794588a496ab874cff6906bf0,2024-06-27T12:15:22.740000 -CVE-2024-26918,0,0,9b4bca146225d3584bb5a4e7f803865907f8fbb7cce4360b82a04b6cd8d4305b,2024-04-17T16:51:07.347000 +CVE-2024-26918,0,1,ce69ac1622eef6980f6643c9ecfc31fb973f75565e256eaf541cc492bb16369c,2024-11-04T19:35:06.627000 CVE-2024-26919,0,0,f54ec30d2ed3a1e0c74b7edc597cfe6317573675a479d2109cbf5afdc2d9f863,2024-04-17T16:51:07.347000 CVE-2024-2692,0,0,e314c30fd6d02d5324cac765f38a00a3fad84e8e8754a5ba44244d3c13521cfa,2024-04-04T12:48:41.700000 CVE-2024-26920,0,0,4ed01824a69e292270d5ff6781ce9cdf9d386678446143ef4ec96cc3c070ab59,2024-05-03T06:15:09.207000 @@ -248782,7 +248784,7 @@ CVE-2024-26937,0,0,33130fd04e0fa99aeccf3a69a79fa96a77ec456d0858750d9a99028babebd CVE-2024-26938,0,0,96ac3ebb354ca4dfcb1c66c1b68ad4ffcd043cacfbf00b0352d68804b44cf1b2,2024-05-01T13:02:20.750000 CVE-2024-26939,0,0,3127531537fc8434c8a8153e0717ce9c8f7520225ded802370bdb01946c9c847,2024-07-03T01:50:03.663000 CVE-2024-2694,0,0,fad38f23bc41981803e0eeabc9f68c34e5895ab08c006564e735241d1ad99ffe,2024-09-03T15:10:54.557000 -CVE-2024-26940,0,0,c72295abdaad32ca77e2301d4de8375912e37850cee76d101c0ad3f77fa78c4a,2024-05-01T13:02:20.750000 +CVE-2024-26940,0,1,f34b1c5c185f90adcb50cc6aa19a87b181d6d95943fd7cdf197949bcb6da759e,2024-11-04T19:35:06.833000 CVE-2024-26941,0,0,2a1089d0f00712d14223399449bc2078dc16c4aec3f3fa2e0d76cbb9292aff72,2024-05-01T13:02:20.750000 CVE-2024-26942,0,0,2d57b93ce0dd646b07d92a214c08685384cf52a1b44011b76a4f0a2c97f50567,2024-07-03T01:50:04.523000 CVE-2024-26943,0,0,d0c9c3da8d0f6a05b9cd6130864f51abb4e8d6492319a7d33df6ba0459e34162,2024-05-01T13:02:20.750000 @@ -248799,7 +248801,7 @@ CVE-2024-26952,0,0,47ebebbcdab3581e41cc5107a6b3f0472a8676645b0ea70ac7b8109d2eee0 CVE-2024-26953,0,0,c78b027cc863e48e94803cf491dfd64d2b764ce43e7ab23c2049c026f6922d49,2024-05-01T13:02:20.750000 CVE-2024-26954,0,0,90522f0664a4f93930ef5e09349c88689f646e2b4950f2cccd0234d76688f7c7,2024-05-01T13:02:20.750000 CVE-2024-26955,0,0,d6c4dd38abc9cb6e2db5afbc36cceadc1e078a55c8b63140b9d735b176a08307,2024-06-27T13:15:57.220000 -CVE-2024-26956,0,1,fea0bf0ba118fc3ddb3c1fe4c7041c831a08d3585f9194b7857b3ee7bd208329,2024-11-04T17:35:12.510000 +CVE-2024-26956,0,0,fea0bf0ba118fc3ddb3c1fe4c7041c831a08d3585f9194b7857b3ee7bd208329,2024-11-04T17:35:12.510000 CVE-2024-26957,0,0,871ec22ed701e6c25fde35c12b49fcc960cd21538002ff829aa32c4c117b7686,2024-07-03T01:50:07.493000 CVE-2024-26958,0,0,0204f95c1db119c3fdfb8c5eaf476d8d5ccb6d4b2400dbedcca1b1f17820f449,2024-06-25T22:15:26.937000 CVE-2024-26959,0,0,893220db683cffdedd47243299be24ddf9c990960c64139a7f4d9714f8f2a89b,2024-05-01T13:02:20.750000 @@ -248840,7 +248842,7 @@ CVE-2024-26990,0,0,9b9558e43e20b1e28e693fba8f5f27330fefe2730d26184929c933061c05b CVE-2024-26991,0,0,66926c26b51c284f243472cb3f664262b27cf6deea347654af7e2043ce601936,2024-05-13T08:15:11.137000 CVE-2024-26992,0,0,bc997639d6a66fb5cfcdd14535f30d9f82ab75003f826aec82dcbbc4fae8a036,2024-05-13T08:15:11.193000 CVE-2024-26993,0,0,ff5240fa452f930fb75917ee79875aa8e99da9ef202f89fcf5f48f1578532103,2024-06-27T13:15:57.563000 -CVE-2024-26994,0,1,f8c2416e0a156737ed5b408a04e59be19808cb5f338ca5ce09f59583e7c1a06c,2024-11-04T17:35:12.723000 +CVE-2024-26994,0,0,f8c2416e0a156737ed5b408a04e59be19808cb5f338ca5ce09f59583e7c1a06c,2024-11-04T17:35:12.723000 CVE-2024-26995,0,0,5042ea3b1305da8b8c54adadb58dd73a742218d3dd1a3f59f6d3449bce3bacd3,2024-05-13T08:15:11.270000 CVE-2024-26996,0,0,f13300a99169a38a9b0787aa8393009120551c7b98f04ab9b92ca6acb9849b2f,2024-05-13T08:15:11.327000 CVE-2024-26997,0,0,454540311fe5335a43e8980f30eaa156ee7f28db2700fe42f0a36241f9986681,2024-06-27T13:15:57.663000 @@ -249090,7 +249092,7 @@ CVE-2024-27230,0,0,9420863bbd94fd05dcdfd0ca39954afd3c251ba38b740d930d8e5974939f1 CVE-2024-27231,0,0,cb6c833d389f9377c9592e3868a50b649339743a051bcf66fdda4f2a40b61535,2024-04-08T18:49:25.863000 CVE-2024-27232,0,0,64ecd9a830c9b30b766707b244dd77aa970adc2152fb16fddd12d23820aced02,2024-04-08T18:49:25.863000 CVE-2024-27233,0,0,4f805b66de1371a2d4417bd116c04ac1324a59b0f4fedad25c9d0195537442f4,2024-08-05T18:35:11.120000 -CVE-2024-27234,0,1,1b0ad16da90d4d5fdb81d47fff8f9573f537fbee16c19c1920ac4110156ba7b1,2024-11-04T17:35:12.957000 +CVE-2024-27234,0,0,1b0ad16da90d4d5fdb81d47fff8f9573f537fbee16c19c1920ac4110156ba7b1,2024-11-04T17:35:12.957000 CVE-2024-27235,0,0,ca7df1b3186edf63083ffa451556ee8cef5481ef83fd54ad47ed09114ed183d0,2024-03-15T20:15:09.253000 CVE-2024-27236,0,0,42db3b0d6114a0f284786f77acfa731b447b1bbb3d017aeb40a796e6668e1514,2024-08-27T15:35:10.943000 CVE-2024-27237,0,0,229917a4428117370a5145466e677b0c72a40fdcb37122ac8c08e36ef5d19033,2024-03-12T12:40:13.500000 @@ -249242,7 +249244,7 @@ CVE-2024-2739,0,0,f67ee20b2bc2ca284467eaab4487259eaa12927229efc313e4a8f27526c7f5 CVE-2024-27390,0,0,fd939b5a46e3db47e38737677dc08895d4507457dc8c59f804a220890fafa028,2024-05-01T19:50:25.633000 CVE-2024-27391,0,0,c609df1ae4a0d8b672f84b73ef5e4ba82e2a581d1583d7f5330bf8875e22776f,2024-05-01T19:50:25.633000 CVE-2024-27392,0,0,d71bd39d141dc4709bff7fbbc837ba796224bb31c86e71592537c5234c653cf4,2024-05-01T19:50:25.633000 -CVE-2024-27393,0,0,0d122d1a50515c52a623d15f9a0d95a22f7e02938fb8b22e82a5712750ad9006,2024-06-10T17:16:23.223000 +CVE-2024-27393,0,1,a820280c7bba1e95ccdd5f172abf8e004f1adbda93a24cf4bc97141799a16e12,2024-11-04T19:35:07.067000 CVE-2024-27394,0,0,08a27f4278e90895db869570c2ad1394d2b1b7ce2eebd13c81985e703b3d5763,2024-09-06T14:35:11.027000 CVE-2024-27395,0,0,f509312d757b52ad19fbd73ceeb6a726f1f69fc5206c32a2cd50e6d3c74db34b,2024-06-27T12:15:24.577000 CVE-2024-27396,0,0,e14a9534df6188e2d3948f71aa579b6ff342c8dd8805de92331af3aa294e2094,2024-06-27T12:15:24.647000 @@ -249333,8 +249335,8 @@ CVE-2024-27517,0,0,93229684c3b5353b9850f42eea516ead9975e4cc8c949db8afa0cb3684297 CVE-2024-27518,0,0,eee44445b24d086f58ae13c836362c174731b2fe04eb60975982bae1d572cb19,2024-08-22T19:35:18.243000 CVE-2024-2752,0,0,9ac4a8690eeceffd759ff2fb7b55e32f8cb8bb4afb752110bdafa62b8f4bb686,2024-05-02T18:00:37.360000 CVE-2024-27521,0,0,142655bf7422b3c81bdc37fb7ef4329756d07238f339af47f3bda39ff16ed820,2024-08-09T21:35:03.300000 -CVE-2024-27524,0,0,31295ffcbefcc2bc9273829b5b91a55465a3712046db327b6d5f0aa3888b27e2,2024-11-01T20:24:53.730000 -CVE-2024-27525,0,0,9f52819ef6193bc1a37692394cf83b467c76d0514e5614414cba606e7a2b921e,2024-11-01T20:24:53.730000 +CVE-2024-27524,0,1,08e4bd6ccc21c266f96d6111b83d7d95158b2c7ca600162e7e70631b4fc240b9,2024-11-04T20:35:04.913000 +CVE-2024-27525,0,1,e06f7e0695efcbe9bfa15a3ac23251ff54875c477a75b737778895eddfe51566,2024-11-04T20:35:05.800000 CVE-2024-2753,0,0,49ae39425f6531deb039d8727a759281a000c2c0b8058f4a13a0491f93794534,2024-08-30T22:15:06.227000 CVE-2024-27536,0,0,c377b0d21fbb5c7de68c4946896ec2f8ec67ef0d39bad02515cbb41c44d1bebd,2024-04-23T22:15:07.037000 CVE-2024-27537,0,0,3cbe9bcef09fe4fba870050d9e0c130363a525b398fa9371487301911d20249d,2024-04-23T22:15:07.087000 @@ -250146,7 +250148,7 @@ CVE-2024-28815,0,0,a66a592511ffd5b563fa083295811494fe79ce7c34bc79ae02ae7f38cd9af CVE-2024-28816,0,0,75a949219f8a896ffef945213a1610d3de2a2cf64da977b1d4287b567e2864da,2024-09-06T17:35:06.960000 CVE-2024-28818,0,0,553ea080520e3ef7d7c194b1130a084d77d8e937a2b2bb8942609e2870cc98f5,2024-06-27T16:43:48.633000 CVE-2024-2882,0,0,ac3db032a55af245aeee4f2522d2c10c01bd50b8ed58cf00aeea2dd39d0cf75d,2024-06-27T19:25:12.067000 -CVE-2024-28820,0,1,59630a2ec384f5cee96f56aaa85aea5162ded435ca23f64ff656b699864e52c3,2024-11-04T18:35:08.457000 +CVE-2024-28820,0,0,59630a2ec384f5cee96f56aaa85aea5162ded435ca23f64ff656b699864e52c3,2024-11-04T18:35:08.457000 CVE-2024-28823,0,0,927067da9fdc9e5e8a46b927c68553c4b240f8e12b50935e3045e657acce74ef,2024-11-01T19:35:21.633000 CVE-2024-28824,0,0,eef4aea08ae10a65f9268e3694b2e67d70c352841b8880eff507640248495160,2024-03-22T12:45:36.130000 CVE-2024-28825,0,0,2060c8862968982d4a6159b0b62313dec95ecc020293b85f137ce41396383f90,2024-04-24T13:39:42.883000 @@ -250431,7 +250433,7 @@ CVE-2024-29129,0,0,022433b928b77b4e11df8137329a8e805ce777a51e5c390569874776ed9f1 CVE-2024-2913,0,0,f13b68719789b0ec1d0ac3f00293efe13ae2d2476f7393cb029a386c10b9d5fb,2024-05-07T13:39:32.710000 CVE-2024-29130,0,0,3c5ab042ef8fedd1c9b8f15ab543cc07d9c157ccb5fa600e78e62121be1aee44,2024-03-19T14:31:27.883000 CVE-2024-29131,0,0,2ae4211a49a3f62b40c035e6593efbeb170b4f6145b3bd61df41334ef04dc0f3,2024-08-28T15:35:19.953000 -CVE-2024-29133,0,1,214f6bd706e630814a4edccbf96364fc85b0c9198fcca91c066dcd7a72b84cbe,2024-11-04T17:35:13.290000 +CVE-2024-29133,0,0,214f6bd706e630814a4edccbf96364fc85b0c9198fcca91c066dcd7a72b84cbe,2024-11-04T17:35:13.290000 CVE-2024-29134,0,0,64d7104dca1a7039d75ee2143ca2d6681014df1f5270f4434e5925abd69f5cba,2024-03-19T14:31:27.883000 CVE-2024-29135,0,0,82b1b4a3f7dec94f8bbc60ae3c283e311437a5e9bda89959429180db805aaa10,2024-03-19T14:31:27.883000 CVE-2024-29136,0,0,36fd1ab95c6fd5ca82b508b8182dde2cefa5ccf077499c888b13d02963a90641,2024-03-19T14:31:27.883000 @@ -251151,7 +251153,7 @@ CVE-2024-30200,0,0,c455a1dbb6f9d915db0da82c73cca8bc6fa2d78acc476d7a8456fd9d1e2ea CVE-2024-30201,0,0,b519279052e3bf480fab70215e80d453e6672590c8aefdb7acb1d4f5f3735ecd,2024-03-27T12:29:30.307000 CVE-2024-30202,0,0,2545347c9158a3f795ad08e02fee2783f83a0102d3b3c6cd088e6c61c3ec608b,2024-05-01T18:15:19.553000 CVE-2024-30203,0,0,2528811fe998684170944fb8e77607f511d271cfeb505996a2be8c30f142c13c,2024-05-01T18:15:19.610000 -CVE-2024-30204,0,1,4b2af1187ee5f3703025057d51c0997c41fee3382ca411eec613f6ae404cff0c,2024-11-04T17:35:14.370000 +CVE-2024-30204,0,0,4b2af1187ee5f3703025057d51c0997c41fee3382ca411eec613f6ae404cff0c,2024-11-04T17:35:14.370000 CVE-2024-30205,0,0,59ff5e238770a16ac12a044b9f567826327ea645bd7ddc5284c92e9966a63ace,2024-05-01T17:15:32.820000 CVE-2024-30206,0,0,a7d0521ef088000b8f51cc15715463c9e26ba3441057ea1a5875859d791a61b9,2024-06-11T12:15:14.390000 CVE-2024-30207,0,0,93b801e8c0cb837d34644b282b92dd26d7a86790e6531becad283497647bbd2d,2024-06-11T12:15:14.520000 @@ -251553,6 +251555,10 @@ CVE-2024-3061,0,0,4efd703c3bf27329551bb8c57b6ec5103d42ea334ef6d9361feb4d292b06b0 CVE-2024-30612,0,0,e42904b723a61ee315384c0049851285bcc87d076f88def1dfe4ab911cc568cf,2024-08-01T15:35:11.227000 CVE-2024-30613,0,0,ec7980af57ce21f0caa7be201315bcd79301675671829a9c0350efcb6a7c58e3,2024-08-01T15:35:12.083000 CVE-2024-30614,0,0,70864962c71d46c273106725c973080a3fb9295eb2c95d98fdaa16c813277ea2,2024-04-12T12:43:46.210000 +CVE-2024-30616,1,1,c1a6a4c3cc5fd0dcdf0bc13fd82797f8e892fdde1ef891f61798225b0b81093d,2024-11-04T19:15:06.193000 +CVE-2024-30617,1,1,337a5e570fc3287a5934dd6ed25da1f8be90c7bdd03412e4cf3fd9e4a4bd3aed,2024-11-04T19:15:06.277000 +CVE-2024-30618,1,1,76eb4eef203367820f3c5d1365fb1d7995071f91ca2740b654bd334c85c99889,2024-11-04T19:15:06.360000 +CVE-2024-30619,1,1,fe2b48990b749bc87750f991b242da0180f7975b89478992bf2890b8ebff25ae,2024-11-04T19:15:06.440000 CVE-2024-30620,0,0,cb2dae6c6270bb539b2166cb7fc038684b4c961f4662350232b399db4e69aab4,2024-08-01T13:50:20.133000 CVE-2024-30621,0,0,c30c1529b2190a6ab334a4d43b23be8a438f3a9728c71ea136b98a3e95653561,2024-08-19T20:35:13.943000 CVE-2024-30622,0,0,9349da08418f3c5641f38670dab1e797cf4839fe3c9959b5e399bf11323db712,2024-08-13T15:35:09.960000 @@ -252290,7 +252296,7 @@ CVE-2024-3174,0,0,cc93afb1fba4ed5cb1d1b58e07131fbee1642590e2326d02f843f51030b35a CVE-2024-31741,0,0,f78c52375cd180ef5690711784580d11ad07d5a273b816fcd715c6a8fa7113c2,2024-08-01T13:51:06.003000 CVE-2024-31744,0,0,fb9aa7a38c780f352284188ba5594185fd9278eb672cdcc53bb5f1def8b1306f,2024-07-03T01:55:18.993000 CVE-2024-31745,0,0,1d2bc6dbb22666ca6fd7636d86e091f5aeff674e8f5352a220c9cbb705a7eb7c,2024-04-25T16:15:11.227000 -CVE-2024-31747,0,1,f997c395f027e3a1010cca523d5ab63cbd3e10983b00bf83d28a303728938662,2024-11-04T17:35:15.230000 +CVE-2024-31747,0,0,f997c395f027e3a1010cca523d5ab63cbd3e10983b00bf83d28a303728938662,2024-11-04T17:35:15.230000 CVE-2024-3175,0,0,e1a78d7c87de5412e17091578d745df9c9852450742733cfce5d89ae459bf460,2024-08-01T13:56:26.597000 CVE-2024-31750,0,0,1a15dee129c540f50ba0b22addd9273e209e8744c01daff655aada30a84ff874,2024-07-03T01:55:19.837000 CVE-2024-31755,0,0,3bd12cf4853126d6f31d6cbd32f6b5b02770582813fa897bd2c19a22d945bc42,2024-07-03T01:55:20.690000 @@ -252367,7 +252373,7 @@ CVE-2024-31864,0,0,dd401fd2f9c38e157d115772d6fe233b1887a6b2c7d0eb5183b48c430298b CVE-2024-31865,0,0,02a2ba0d6bb162e0849bdf7568c167d76e92f64cab3447bcb8f0f65f613886ef,2024-07-03T01:55:31.473000 CVE-2024-31866,0,0,4d372d14b7807ced8e821f43a5c883c03fa5dbca9edfba0af795f01513fe30b5,2024-08-21T15:35:08.187000 CVE-2024-31867,0,0,7c90191082994197ce09c1b6019992176f2d76072856e8d65beb1a7b6ded7916,2024-05-01T18:15:23.740000 -CVE-2024-31868,0,1,d3c844e6a3dbbedb810459c41bb5637ffa155cba2e17be6dddb0e1f19a739f3c,2024-11-04T17:35:15.470000 +CVE-2024-31868,0,0,d3c844e6a3dbbedb810459c41bb5637ffa155cba2e17be6dddb0e1f19a739f3c,2024-11-04T17:35:15.470000 CVE-2024-31869,0,0,683e8c771fda682074fc448ea32be7db8fcec1e782121eb87243bff930796032,2024-05-01T18:15:23.843000 CVE-2024-3187,0,0,9daa4400efbb95cf28ef1942a813d3b40029e3093ff205104e53b1461d32309f,2024-10-18T12:52:33.507000 CVE-2024-31870,0,0,089cc53c4c4bda98698ee28fa3173d546c896f43008726ca3e29a627fc47e14b,2024-08-01T20:37:52.127000 @@ -252436,7 +252442,7 @@ CVE-2024-31948,0,0,2545f6a13668ac7d71382ed97228591f14df9b7003f52f431839a3cf2cbd6 CVE-2024-31949,0,0,6e39badd21c22fae949ff94d85aeafc847ebfb0900888b28cfa176432c58fd9e,2024-04-28T07:15:08.917000 CVE-2024-3195,0,0,54895de1b254f44ccb4469ba2b74594e6a91af91f3d85ccfdb05ae95c48717c5,2024-06-04T19:20:17.337000 CVE-2024-31950,0,0,eb45ca7adae95d9eeac606348ca2077ad73db009d4eb3ae0e3b3f28067f4639f,2024-04-08T18:48:40.217000 -CVE-2024-31951,0,1,7fc3bdf022f9b125cc27ae75fabfcaec7e87c8ecab18ef2ce5effcefee4503ca,2024-11-04T17:35:15.700000 +CVE-2024-31951,0,0,7fc3bdf022f9b125cc27ae75fabfcaec7e87c8ecab18ef2ce5effcefee4503ca,2024-11-04T17:35:15.700000 CVE-2024-31952,0,0,3d77ea42e3c6b71ca78bc5c0c7985e6bde91a46241e6b9004033a640e8da9c8d,2024-09-06T19:35:20.623000 CVE-2024-31953,0,0,473e2dd03665c41fd12eb732a6a8b796dd851974540019960eeeb8c84154b002,2024-07-03T01:55:35.270000 CVE-2024-31954,0,0,75cb48abade3eb19dfa6628441b7fbf62791ae48f745250b97879749047eeee3,2024-07-03T01:55:35.973000 @@ -252459,7 +252465,7 @@ CVE-2024-31971,0,0,a1f4b42965419df8f210a326f6ff82813b583045274127c94e5e4f5a032a0 CVE-2024-31972,0,0,f9241b9f06175c965ad284b5c2136f1f7f8e377bc5d6b68f231b17656172b319,2024-11-01T12:57:03.417000 CVE-2024-31973,0,0,c3480f733abb332799fc1f07ef143103e9de0ed931d381c037c7e12d5a9eb78d,2024-11-01T12:57:03.417000 CVE-2024-31974,0,0,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000 -CVE-2024-31975,0,1,eb324a6bedd4b93ad2ac0707b00b07dfad728d7f39959adabc810317189eae1a,2024-11-04T17:15:07.030000 +CVE-2024-31975,0,0,eb324a6bedd4b93ad2ac0707b00b07dfad728d7f39959adabc810317189eae1a,2024-11-04T17:15:07.030000 CVE-2024-31977,0,0,8eb0d10eae7cd02452acc4180866c19a5b8993f8851d4be772620f1837a0acf8,2024-09-03T21:15:15.803000 CVE-2024-31978,0,0,d7e67cdb6c9abfc8a281402447b24c354a9ac8bd28f05dea2bb91e1cf546ce10,2024-04-09T12:48:04.090000 CVE-2024-31979,0,0,f097e05504ac9e9ee25949ce03f6b7581ce42735e92ea4d2772041b31a214c2d,2024-08-01T13:51:19.213000 @@ -253208,8 +253214,8 @@ CVE-2024-32911,0,0,3a0fef0abd5eab29360573b4c903482bbebef01629598c289909e1af8d4e6 CVE-2024-32912,0,0,fd994f36adaadcf11decff8c54cb9ed9dfd2529041b080833bc870baeef2b9e7,2024-07-16T14:56:26.787000 CVE-2024-32913,0,0,996f6595bdd5fe8c40fd4536473f9753d8a3be1f0d10e2434d28fb6144612388,2024-08-19T14:35:08.433000 CVE-2024-32914,0,0,cbed74c6bf4e90dfcc109de77f32486ffc4a1bf4af82a04c39b30a381f81c36e,2024-06-17T12:43:31.090000 -CVE-2024-32915,0,1,4c1d20a9ebe8b814b723ab8c358028576e2a48f20441baee31fe76310539badc,2024-11-04T18:35:09.293000 -CVE-2024-32916,0,1,d8831ef74b688a9a11e24f411d0b273555821e16e14587caff484bd0789da6eb,2024-11-04T17:35:16.763000 +CVE-2024-32915,0,0,4c1d20a9ebe8b814b723ab8c358028576e2a48f20441baee31fe76310539badc,2024-11-04T18:35:09.293000 +CVE-2024-32916,0,0,d8831ef74b688a9a11e24f411d0b273555821e16e14587caff484bd0789da6eb,2024-11-04T17:35:16.763000 CVE-2024-32917,0,0,6d583d8ab79c5333a5d03cc2ab6bba8eb02ee95c890cd04661d7dbc4855b1773,2024-08-15T16:35:09.653000 CVE-2024-32918,0,0,19b6831a0d6fc35e011db4c7518c1e532ce5203d93c6f41b5ff75941ff046014,2024-08-19T14:35:09.183000 CVE-2024-32919,0,0,f0aa26802459bcc1e57c74adfaef7d72c48e702e9fd1db0d49dae70c6bb3b2a9,2024-08-01T13:51:40.153000 @@ -253321,11 +253327,11 @@ CVE-2024-33025,0,0,b2224958808cef69179c29751ac5699dda8398fa1ca6d6be644feb0949d64 CVE-2024-33026,0,0,298d33f6a8bfb6f36fcf1be4fa982f6af985ae195af9a3a0c45ae097558f81f9,2024-08-06T16:30:24.547000 CVE-2024-33027,0,0,cc2e5aea91d0b51c006f2b36474a376cee8428cecc94d1a162b764842c335f3c,2024-08-06T16:30:24.547000 CVE-2024-33028,0,0,9632bd9093b259716a8b9578d714120e37db12b0d16b9cf18505d5f86f8aeb5e,2024-08-06T16:30:24.547000 -CVE-2024-33029,0,1,70c2e343ba148f13ed11376116209ab84d1710635b4c1c97363fef474712e62b,2024-11-04T18:50:05.607000 -CVE-2024-33030,0,1,8b58689698c4a3e507a90b69666f459bcec9ee75e9ccdf551395d704be91e56c,2024-11-04T18:50:05.607000 -CVE-2024-33031,0,1,5f62d621d51befde20ba7b911726eca7a4eb2a07c2cb8f65c875eb73379fa78d,2024-11-04T18:50:05.607000 -CVE-2024-33032,0,1,63242e7f018d21d9f71a363b6ade6f06646e4f13dc1093ae9290fad9e15a8f23,2024-11-04T18:50:05.607000 -CVE-2024-33033,0,1,7df657d4c4289fb6f347187638edbe10a37c5398cf3a670ce1c3ea784cdae4d6,2024-11-04T18:50:05.607000 +CVE-2024-33029,0,0,70c2e343ba148f13ed11376116209ab84d1710635b4c1c97363fef474712e62b,2024-11-04T18:50:05.607000 +CVE-2024-33030,0,0,8b58689698c4a3e507a90b69666f459bcec9ee75e9ccdf551395d704be91e56c,2024-11-04T18:50:05.607000 +CVE-2024-33031,0,0,5f62d621d51befde20ba7b911726eca7a4eb2a07c2cb8f65c875eb73379fa78d,2024-11-04T18:50:05.607000 +CVE-2024-33032,0,0,63242e7f018d21d9f71a363b6ade6f06646e4f13dc1093ae9290fad9e15a8f23,2024-11-04T18:50:05.607000 +CVE-2024-33033,0,0,7df657d4c4289fb6f347187638edbe10a37c5398cf3a670ce1c3ea784cdae4d6,2024-11-04T18:50:05.607000 CVE-2024-33034,0,0,54ed6e7d2fd983f237005bb3e1f82ed940ac2231de49deea5f0abbc3e6097779,2024-08-06T16:30:24.547000 CVE-2024-33035,0,0,a2cbf1ac3ca408060419991a03b24932660c70b02e16b8809b1fde0e9b502e88,2024-09-03T12:59:02.453000 CVE-2024-33038,0,0,d174e8cb32f352bb37d4cf42fb06ed39c66af4e6d398e5501824f9508319fcd5,2024-09-04T17:21:28.943000 @@ -253346,7 +253352,7 @@ CVE-2024-33060,0,0,8e20f230158ec785e72e303f04a05aee62188eb8b143d335c7e1363dc54b7 CVE-2024-33064,0,0,bfbd742ae234880f52f67d6978c158799c406232f5aac7c3edf51ec757747c4a,2024-10-16T19:52:54.483000 CVE-2024-33065,0,0,e28bf41f307659f4fb4f14868be73b5e9d88ec7819cf206c24cd9f25c36ab870,2024-10-16T19:50:45.190000 CVE-2024-33066,0,0,66a8d9354112b9051cf178fd2c2f4c437b5cf34f4a798a9546a14ff489506cc8,2024-10-16T19:49:40.333000 -CVE-2024-33068,0,1,b547540c6e6fff4ddb6c4b5ad1b6c00cd676f2da25e54d35e18fa3cb6df96772,2024-11-04T18:50:05.607000 +CVE-2024-33068,0,0,b547540c6e6fff4ddb6c4b5ad1b6c00cd676f2da25e54d35e18fa3cb6df96772,2024-11-04T18:50:05.607000 CVE-2024-33069,0,0,43c56f0e9b4f42c73eddbe695dc23769c84225eafe9aba7ea54e0211778b7147,2024-10-16T19:48:32.207000 CVE-2024-3307,0,0,de2078d32c9fd66ca1e329712579640346be35f0240807faa106038aa71fb05f,2024-05-02T18:00:37.360000 CVE-2024-33070,0,0,5c227e83ae052fa89b8d8522db931e95887b68320f2416daace5ac118cc217ce,2024-10-16T19:47:04.547000 @@ -253558,7 +253564,7 @@ CVE-2024-33522,0,0,99fcc369cb1d7d030860e4a6a89738f8fddd8cc3ac74b8b631e1a59fe3215 CVE-2024-33525,0,0,2e71eaad279c374a12f668d097a9cb7bb1826ead20d625216f803275f1d12777,2024-07-03T01:58:23.960000 CVE-2024-33526,0,0,d9fbb2bf90f7562deb9562daceb1447ff20e85e1306478b1fbaa885f49f02b18,2024-08-01T13:52:03.173000 CVE-2024-33527,0,0,c58cd3ff1861491b9e0aa8bd55b935a0ffef7224152b2ec75ba8d15461542ccb,2024-05-23T17:15:29.103000 -CVE-2024-33528,0,1,6d38b7704a361913efde540c7527f28cdaa52176f9b6f83eaffe6b959e019e75,2024-11-04T17:35:17 +CVE-2024-33528,0,0,6d38b7704a361913efde540c7527f28cdaa52176f9b6f83eaffe6b959e019e75,2024-11-04T17:35:17 CVE-2024-33529,0,0,91064aa32d9fedf772ab62f032798d695b5cf92350be4cf38e5a4910e6c665d5,2024-07-03T01:58:24.870000 CVE-2024-3353,0,0,ce0bc328455f80cf14b93a65517c4acf833c7c445bb8d7418f958bb30757f2de,2024-08-01T13:56:31.790000 CVE-2024-33530,0,0,06dbd90020910883fd649aabf3091f4012b6024bee39b35744993f4679188732,2024-07-03T01:58:25.043000 @@ -254071,7 +254077,7 @@ CVE-2024-34149,0,0,bc997c41063649e77025e7b523e84ecd9251e3e152bcf881c50ffb65d2530 CVE-2024-3415,0,0,34ccb97766fc5acac460b5429af5d66fea7f850526947b377f986615d31afcf6,2024-05-17T02:39:54.247000 CVE-2024-34152,0,0,2436c8a621b0d09dd7154ff9aa9ad8e75fea3818a8a19b6b0802746c78436018,2024-05-28T12:39:28.377000 CVE-2024-34153,0,0,e95099655513585da61ae60b19c6138c76d9a4480ba77c6aabc7e79515d4cada,2024-09-23T14:35:48.157000 -CVE-2024-34155,0,1,1f73cc746ff0c26792b640822af084b364cbd0bb7e6ac962ddcc060520d1590f,2024-11-04T17:35:17.887000 +CVE-2024-34155,0,0,1f73cc746ff0c26792b640822af084b364cbd0bb7e6ac962ddcc060520d1590f,2024-11-04T17:35:17.887000 CVE-2024-34156,0,0,281374624716fc97e73927b0e17fc3ff10c7c3ce10cee8420a8b05daef295f7d,2024-09-09T15:35:07.573000 CVE-2024-34158,0,0,0fd72fb00224cfe4f9ed8cacfff4aeadb87d2bc96dad7a6b5b064905d0cc5bda,2024-09-09T14:35:01.170000 CVE-2024-3416,0,0,a081ed6eeab1f8c610822f30cf17aa2151f535dbb3c22c142c8cc9d4a77c8f63,2024-05-17T02:39:54.337000 @@ -254110,7 +254116,7 @@ CVE-2024-3422,0,0,5f60b24505b1e7fc45669de7abca6b1144a134b9cac6c7f843eaaa0cb8d68c CVE-2024-34220,0,0,664ae3f60d9d03fd7e09aca2b3c3f619f12a9aa76b48e9dbe80314480913931c,2024-07-03T01:59:40.530000 CVE-2024-34221,0,0,4fc0fe5a0a7d481229d82414975559b5ce7e394eebb1a6cc6af7f54bf077ba48,2024-10-29T15:35:28.087000 CVE-2024-34222,0,0,c9254aeea26939ed840e05e8449aee7f6267f0c74101a29fff26f90fc72a21b5,2024-07-03T01:59:42.050000 -CVE-2024-34223,0,0,e20a175c7dfda07a23d9be727c891b1d9b5fe04956f12c400e7a65f5770b7fda,2024-05-14T16:12:23.490000 +CVE-2024-34223,0,1,00e725fc833985ae31ccd463ca116c24e214083756cb7b09e0d3b38167c9cd28,2024-11-04T19:35:07.467000 CVE-2024-34224,0,0,bc6821e7a1a1197e8806ef37396dfb61f1b6fcbd255743a94622a514f32eb2a4,2024-09-03T19:35:12.227000 CVE-2024-34225,0,0,e08a9ad45b2661eed67570a87cb42ad712c6fe6e9c128f00e0736869ea473a7c,2024-07-03T01:59:42.910000 CVE-2024-34226,0,0,e9df399e03868b5419f9e1d39391572872ab999c75d356756b02d0d173e993c9,2024-08-22T15:35:06.620000 @@ -254616,10 +254622,12 @@ CVE-2024-34854,0,0,6f71aaf23a02a63a600f0bcc65e36559492677e420248555c46cf3409591d CVE-2024-3486,0,0,62a4db44c896a78c795e29b3f9a0c80ac2a4afae964bf16e58e73f8540a6d627,2024-05-15T18:35:11.453000 CVE-2024-3487,0,0,4ff2b905105ca048d90a2e33e25fd9b26128f3e6906b07d6299f870ad63ad55f,2024-05-15T18:35:11.453000 CVE-2024-3488,0,0,61e15575c22ff5a767d1be731e2c78e99681dc33e8575bc1a8940edf28193df9,2024-05-15T18:35:11.453000 -CVE-2024-34882,1,1,414bf162499af104af9e3ac918dba0d5046535587e72d8bc01c02fcf53c2126c,2024-11-04T18:50:05.607000 -CVE-2024-34883,1,1,8cef556fd6ed557941a27afa1209a5a7329727230a916eab9bc05cc044ac6260,2024-11-04T18:50:05.607000 -CVE-2024-34887,1,1,d22116c2ae31cab92f7a56e7512a45389f55722ab02edbebae92352923fda0c2,2024-11-04T18:50:05.607000 +CVE-2024-34882,0,0,414bf162499af104af9e3ac918dba0d5046535587e72d8bc01c02fcf53c2126c,2024-11-04T18:50:05.607000 +CVE-2024-34883,0,0,8cef556fd6ed557941a27afa1209a5a7329727230a916eab9bc05cc044ac6260,2024-11-04T18:50:05.607000 +CVE-2024-34885,1,1,9bb95018cc7498813bb5e4c574e8edec8c067795fd5c1f2a36cbd0c7ca8bdc4c,2024-11-04T19:15:06.560000 +CVE-2024-34887,0,0,d22116c2ae31cab92f7a56e7512a45389f55722ab02edbebae92352923fda0c2,2024-11-04T18:50:05.607000 CVE-2024-3489,0,0,ea9bd95a767998b3f2d98747bee17b3d4435734727140c279148a23c9826811b,2024-05-02T18:00:37.360000 +CVE-2024-34891,1,1,74f783d8e75ff41a9b7fd67a10b65058026cc95b8c85260bf99919168c78e502,2024-11-04T19:15:06.647000 CVE-2024-34899,0,0,8587795bcb80eaac03ccdd83ddcd275c805b44aa37227142776a20079d894d2e,2024-05-14T16:12:23.490000 CVE-2024-3490,0,0,fde4feb36b1284855cd6b30fa66a3af34b0e61e505831180625a8b1a9752ddb6,2024-05-02T13:27:25.103000 CVE-2024-34905,0,0,f78ccd452da80c6b8b88b8df2150e212f5062dc9ace03288d809e1d46c16b911,2024-08-19T18:35:11.410000 @@ -254701,7 +254709,7 @@ CVE-2024-3508,0,0,ce82a7050fad9545b54b48fbeb7e72666687f8071a844658c7f2f064c0e3c0 CVE-2024-35080,0,0,c9a211365cbd542cdef0b29d59f3b2dfae2b1b61359fa8769a673763d1c1edb3,2024-07-03T02:01:19.997000 CVE-2024-35081,0,0,5f351d35a7c4bf1c7c66c04741787cf7f264d0978d7069822794634f96e6d2d6,2024-07-03T02:01:20.817000 CVE-2024-35082,0,0,50893ba92bdaace4fd9b61f50c725a7911d5b698ac51e1ad37d8182767cd2ba8,2024-05-24T01:15:30.977000 -CVE-2024-35083,0,0,7526f5c67c7c61f5e9524d88bffbd1f53b2e6e3fe0b16c03a5885c0421346696,2024-05-24T01:15:30.977000 +CVE-2024-35083,0,1,33f64168edb7b7f68d059cde18d803c0f2719b461103a2f57a97fd64b126d447,2024-11-04T20:35:06.920000 CVE-2024-35084,0,0,ac2799cc1434dfc2c78149fd1b6245909a5d0ccbc943a72e9768ed8158560b71,2024-07-03T02:01:21.793000 CVE-2024-35085,0,0,28b8104ff5f9fa8bc166e7b90ee75abfa07185cbfa227faaf969ddb5ab2e1407,2024-08-19T16:35:14.260000 CVE-2024-35086,0,0,bbb34dc58989be1196237a9d847c0e01aed13ed3f437f7e1bef961a874339d86,2024-07-03T02:01:22.567000 @@ -254932,7 +254940,7 @@ CVE-2024-35432,0,0,a5bddee657b22bd17e3fa9b1098801bb1ed3f60d3017572c00af5fda3d0c5 CVE-2024-35433,0,0,f81c77793e6b4ae7b0491b15530e15eb48456cdd61c3fc22182d06ed972d41be,2024-09-04T20:35:18.400000 CVE-2024-35434,0,0,21d86b1029a00b97e65dc0e9f829fff58cf55d0aa50fabcc94705f59669d3cd5,2024-08-22T20:35:11.130000 CVE-2024-3544,0,0,ac159828af5bc2292e8e0701d42b4d30a3b9b1860c97c52c0c82cf5c85bdace8,2024-05-02T18:00:37.360000 -CVE-2024-3545,0,1,8572c3ccec0c267251b3f9351679ce5114a5e3088ae0469b492154e558f9687c,2024-11-04T17:35:20.247000 +CVE-2024-3545,0,0,8572c3ccec0c267251b3f9351679ce5114a5e3088ae0469b492154e558f9687c,2024-11-04T17:35:20.247000 CVE-2024-3546,0,0,35163ad2b2190e22887b6e298f1e24f2828b8a7ebd49798d961ad2c534ecb1cb,2024-05-02T18:00:37.360000 CVE-2024-35468,0,0,f9dd9febc4034bc90fe43ce99b50256976b33c57b8b35c20fdc90432a37fa2c3,2024-08-19T15:35:09.230000 CVE-2024-35469,0,0,18bee3ba5715b478a436de716da42f1ea7108aec420f8357db65b4bc2307290f,2024-08-22T19:35:28.953000 @@ -255348,7 +255356,7 @@ CVE-2024-35943,0,0,b04e983e56e1c9d7081132a05bf0f0262e78b88cb4f2fd9952b8a83736f04 CVE-2024-35944,0,0,0b8fa1460b20d6ae41d4689dcd9629878bd9a25ab0d2ab9ccb19600028fdb51f,2024-06-27T12:15:26.637000 CVE-2024-35945,0,0,0185bd4cabd6e0a379e9ebc2bedca4e6c5d5d2c2f77ee4a77ecd1c628a97c866,2024-05-20T13:00:04.957000 CVE-2024-35946,0,0,00f10c1a184b3e4406a5f235832a88832bc9c4296d0f1672f7ba0e34dcfe4d40,2024-05-20T13:00:04.957000 -CVE-2024-35947,0,1,8390bf97224de35b2ead2fe9b18589ecb6a8a4b66969e2ea8f853894464d35be,2024-11-04T17:35:18.283000 +CVE-2024-35947,0,0,8390bf97224de35b2ead2fe9b18589ecb6a8a4b66969e2ea8f853894464d35be,2024-11-04T17:35:18.283000 CVE-2024-35948,0,0,b46d9803032a3127456ee310c36bf3cedd17b0d7a11fbe27dab4bfc37a02fd78,2024-07-03T02:02:27.897000 CVE-2024-35949,0,0,1ccc3097c7a8990efd529a399603a472cca264bffe2e92a6e9359510e7d5185e,2024-06-10T16:15:16.563000 CVE-2024-3595,0,0,077cbbbd2e6db33a2d0b909dee1e47b9db04619d27b5534acb08f47c2c565c8f,2024-05-14T16:11:39.510000 @@ -255501,7 +255509,7 @@ CVE-2024-36113,0,0,bd0f172ed061f2563f819d35f44c783c215c944968e504df51b3e976b592c CVE-2024-36114,0,0,5e400f6e1accfe4ee34afe11a2ba03b10596fa4481251b5d420288b4320d1b3a,2024-05-30T13:15:41.297000 CVE-2024-36115,0,0,f8ba661b18a24aa8a9d37cbb77cc6240a2c56bf800de38ea5defb142197d0446,2024-06-20T12:43:25.663000 CVE-2024-36116,0,0,3e18cd044e5ac4fbf5437d214cb9f9e5fd21bda7e634efa12dbd7a1ca2e9815a,2024-06-20T12:43:25.663000 -CVE-2024-36117,0,0,a7ab09db028982b6b101d2fe523552a9b672bd7e5bac53eaefe60a31dbfc8818,2024-06-20T12:43:25.663000 +CVE-2024-36117,0,1,42a17f7c6e84289ca632ec11d6e4deda84e90fa76f4b0c21d790cd54d8995eea,2024-11-04T19:15:06.733000 CVE-2024-36118,0,0,465f56aaa290110c45c5a97c561d74aa67b1f0338ecac0756842534493905f75,2024-05-30T18:18:58.870000 CVE-2024-36119,0,0,ad3fdfde6f7f919d37105cd874e63e8e2fe26461ce221136b38033b394426334,2024-05-31T13:01:46.727000 CVE-2024-3612,0,0,93a685f994d05c8ad5b7ff57b12106c8be79a3b2a7f159c5cdaae42ff2a83d49,2024-06-26T17:15:27.243000 @@ -255693,7 +255701,7 @@ CVE-2024-36376,0,0,9a27434ef5883d727baddbf1e021940c1f4b2a295230df160913ffae79dbc CVE-2024-36377,0,0,fed13c03878e3f3eaedb891e290180d41f088a5875828ca11ab182ae9d3f0b1e,2024-05-29T15:18:26.427000 CVE-2024-36378,0,0,ca258e9b594af616c42b58f8248851951bbd7b3ba86b1f4eba271688d3b210ab,2024-05-29T15:18:26.427000 CVE-2024-3638,0,0,620fdccfcdbef1110695fe5f4df8efef5a2f6320fb9175c618899b2ed73206f0,2024-07-05T17:14:22.140000 -CVE-2024-36383,0,1,2c9cf4016aaf0711836c59164d1d46e4509eac95f6ae137d172050d33955d4ae,2024-11-04T17:35:18.540000 +CVE-2024-36383,0,0,2c9cf4016aaf0711836c59164d1d46e4509eac95f6ae137d172050d33955d4ae,2024-11-04T17:35:18.540000 CVE-2024-36384,0,0,94068a38f09a54b32734b72e88f07dbe37a23dc81abe40c24fae8278840e51b9,2024-05-28T12:39:28.377000 CVE-2024-36387,0,0,a2bf37a0e64575b7db49c720ef2f1af1931a4f978873dbf393d59870fa3eb3f3,2024-07-12T14:15:11.670000 CVE-2024-36388,0,0,e13152636423c6e93176d03b27ba8c5b0397bbb97d42aaccd55001a4d2861e72,2024-06-03T14:46:24.250000 @@ -255783,7 +255791,7 @@ CVE-2024-3648,0,0,8ea394456a868f5cb440700cb4f3d40035b05f4bd668cd1adcf2b942f06e80 CVE-2024-36480,0,0,8cfe7316f6ef17d7594f0f48ea5faff4d266af61040753ef41d7dc8fbca2c04f,2024-08-01T13:52:55.747000 CVE-2024-36481,0,0,c20069fe9216cf7ae5e42e62fc886e320b7997d027cb5be79eafe3b725910b77,2024-06-24T18:35:33.157000 CVE-2024-36484,0,0,d90e8addbe4310fb59424c1e2209c39c8eeed0a72f79133301d102644feba769,2024-07-29T07:15:03.447000 -CVE-2024-36485,0,1,a947f55c90ed783a077826539e0e76d5e963683ade514150d6f12222f7e4fb4c,2024-11-04T18:50:05.607000 +CVE-2024-36485,0,0,a947f55c90ed783a077826539e0e76d5e963683ade514150d6f12222f7e4fb4c,2024-11-04T18:50:05.607000 CVE-2024-36489,0,0,2f34b177a387259c170db7b91a53518947ffa720aa7b598baba9b38f62a0e242,2024-09-09T13:32:13.087000 CVE-2024-3649,0,0,9d2e0b18ffe30ccf7cbc0e74a77daf1869af9483d0413cb80580942eae7d40a2,2024-05-02T18:00:37.360000 CVE-2024-36491,0,0,0594f931fd7fcba21d9716595a57f83c241ce75441ab3d963604c9fb9792c871,2024-09-27T14:05:54.037000 @@ -256030,7 +256038,7 @@ CVE-2024-3695,0,0,cd8583909d9224874fa5edd0e2b15c723aa0e29947c489c19d9e0c7d6c0bc0 CVE-2024-36950,0,0,5481634f4762829611a0871f56a4ab89e2246b2eba6289dad49130b2c56bcf42,2024-06-27T14:15:15.090000 CVE-2024-36951,0,0,cdb358871df864e3a182d37953aaed429ff6a5f247e5d9e7d6be476ab6336252,2024-05-30T18:18:58.870000 CVE-2024-36952,0,0,0e58dc709cffcfd05de9d57f3aa03a8717a237addfd16a6d5836235e18c7c410,2024-05-30T18:18:58.870000 -CVE-2024-36953,0,0,dc7ffbfd8559b5961fd614d00b517ce7e49bc8bbabf6d0df604d5fc47dafd2d3,2024-06-27T14:15:15.170000 +CVE-2024-36953,0,1,0490f8448dc7e27a18e58db0aaae7f93d214f69dd46e7c69b0f76db33e41cf96,2024-11-04T19:35:09.213000 CVE-2024-36954,0,0,0cc7487fca8978b6ea62e77d179531116ae2856cff453cf4a9702de0da5aa2c4,2024-06-27T14:15:15.237000 CVE-2024-36955,0,0,2177d2fec34a0c82ee8955b7c31b7d24aa0bfbc57287be7b8c0e982445dfea8d,2024-07-03T02:03:54.210000 CVE-2024-36956,0,0,f86ebb70c181e89ce1106f0834475ad18db36a14534d58b5dedad7d89fb3c2b5,2024-05-30T18:18:58.870000 @@ -256040,7 +256048,7 @@ CVE-2024-36959,0,0,fc3d9d9926c226cf4906037cfce0a2bd712e2b24c0670fe1694f9fe8618f8 CVE-2024-3696,0,0,2ce74e73d58684ac12265567b6f3042de841c097e7899c73ac3f7d1082bbff20,2024-05-17T02:40:04.613000 CVE-2024-36960,0,0,b95b26866e47237dc2fc66a84de293d780a8db9b870d76a7a8442f137192d806,2024-07-03T02:03:55.203000 CVE-2024-36961,0,0,4e4b446649db320a139f4aa3bca09c9bc55ac839253094093faf8717c16691c5,2024-06-03T14:46:24.250000 -CVE-2024-36962,0,1,070df5cd30920983625abc537c28c209768df157460fac85a83a609a7868d4f2,2024-11-04T17:35:18.780000 +CVE-2024-36962,0,0,070df5cd30920983625abc537c28c209768df157460fac85a83a609a7868d4f2,2024-11-04T17:35:18.780000 CVE-2024-36963,0,0,9babc41f15278c97e25649f1d781a93b01c025406e91090bbc0d7680e835d154,2024-06-03T14:46:24.250000 CVE-2024-36964,0,0,49af3173fdbcf36d2da73042cc4bf87777abec14f46c8d6af8dee65266d543cb,2024-06-27T12:15:28.493000 CVE-2024-36965,0,0,f3145e6076d1b300dfd59296285f95e07925904a4fe3d12b79e2e88ad523ab1d,2024-07-17T17:32:46.323000 @@ -256406,7 +256414,7 @@ CVE-2024-37380,0,0,4ce1330fb679655262ab3b818cd133f9eef1b7c4341268f445fa1434d34f9 CVE-2024-37381,0,0,9fe6fde53d8260503255e878e5a3cad14d0e0ad42f178326952eb9a7c509519f,2024-08-01T13:53:31.757000 CVE-2024-37382,0,0,a8a740545d65ebc631499231db822baee95a9596af82e521bd493b8948bb2169,2024-08-29T14:29:32.920000 CVE-2024-37383,0,0,749376f10dc0a15dd5d224c633d6641b07e533f7f05a91ed9e4f71b969f627db,2024-10-25T13:56:29.010000 -CVE-2024-37384,0,1,0086f0275bbb16b57a0d27b673b7a7c537e6b89023ec0f40bc361623760123c5,2024-11-04T17:35:19.013000 +CVE-2024-37384,0,0,0086f0275bbb16b57a0d27b673b7a7c537e6b89023ec0f40bc361623760123c5,2024-11-04T17:35:19.013000 CVE-2024-37385,0,0,5f654dacc6b54aa57eac57d975e30bca933785ac3cff88e1e1d552468bd97c34,2024-08-01T13:53:32.450000 CVE-2024-37386,0,0,e26fe4180478658f5d7116e982a44893b27c0547f48ec9e4efebd50f599527d1,2024-08-01T13:53:36.410000 CVE-2024-37387,0,0,fe2e0e702592a3b950e5c7ffa6cd887e6a1ea8123fb6a269a45db83eafdcfbbc,2024-07-03T02:04:17.790000 @@ -257171,20 +257179,20 @@ CVE-2024-38399,0,0,2b771b5ba490c62bc791d46a0084f1ef76097271953e34800c189edde8b5e CVE-2024-3840,0,0,ec33e8e5666d06426f4f27241e2048dc8546d2022bc8f60f84c59f2555cee127,2024-07-03T02:06:39.663000 CVE-2024-38401,0,0,49e5f353e979551d81ba913b1959baf9c9c3b65372fddd5de7583edefa3b0302,2024-09-04T17:05:39.320000 CVE-2024-38402,0,0,0bfbbf50597e4077e5091de633e6f7dc9b2e3a47b37a9db75c35363f82e41c81,2024-09-05T21:43:22.677000 -CVE-2024-38403,0,1,8958dc3a4f5cdd79df6af4290ff070c00d33a2e9f2ac4533573ff2a008e3ab81,2024-11-04T18:50:05.607000 -CVE-2024-38405,0,1,a505a4fd4be7afede4c2da1495f4422ab46c3c0d63d8c7bde8b6c1f39542a75a,2024-11-04T18:50:05.607000 -CVE-2024-38406,0,1,1f1228db5aad2a69e9cb6a79ea695c633e1fff91ade5a48327f7c4a370e83d7b,2024-11-04T18:50:05.607000 -CVE-2024-38407,0,1,c850df793301d63956ea2de95c1da7612354dfaf09d9aa5d87951a991bddc10b,2024-11-04T18:50:05.607000 -CVE-2024-38408,0,1,a71bf42758bad0648f05b420ec4b22d43a2840f9e4a82ce92b42e9e5aad98757,2024-11-04T18:50:05.607000 -CVE-2024-38409,0,1,1c5215f692c2bc0e6ae37b7b32421c66545eacf9ecc84b96bba23930fffdb7b8,2024-11-04T18:50:05.607000 +CVE-2024-38403,0,0,8958dc3a4f5cdd79df6af4290ff070c00d33a2e9f2ac4533573ff2a008e3ab81,2024-11-04T18:50:05.607000 +CVE-2024-38405,0,0,a505a4fd4be7afede4c2da1495f4422ab46c3c0d63d8c7bde8b6c1f39542a75a,2024-11-04T18:50:05.607000 +CVE-2024-38406,0,0,1f1228db5aad2a69e9cb6a79ea695c633e1fff91ade5a48327f7c4a370e83d7b,2024-11-04T18:50:05.607000 +CVE-2024-38407,0,0,c850df793301d63956ea2de95c1da7612354dfaf09d9aa5d87951a991bddc10b,2024-11-04T18:50:05.607000 +CVE-2024-38408,0,0,a71bf42758bad0648f05b420ec4b22d43a2840f9e4a82ce92b42e9e5aad98757,2024-11-04T18:50:05.607000 +CVE-2024-38409,0,0,1c5215f692c2bc0e6ae37b7b32421c66545eacf9ecc84b96bba23930fffdb7b8,2024-11-04T18:50:05.607000 CVE-2024-3841,0,0,8802855d3bfa5a1c81bb3b1500254989e91bb5a660a45184fb94e49c6e6b50a2,2024-07-03T02:06:40.900000 -CVE-2024-38410,0,1,5cea5cfb4bc439ce832f92d9c6fd8fffb08294b97be59c2eeb49f06244a7b422,2024-11-04T18:50:05.607000 -CVE-2024-38415,0,1,496a43169afbfbd87ce1e50594aead25e503d0a73f46766803db5f72848ec51d,2024-11-04T18:50:05.607000 -CVE-2024-38419,0,1,f9c0d718f5c27040e1ac989a2728e9885b61af1af81b5baaa6098039685c0f74,2024-11-04T18:50:05.607000 -CVE-2024-38421,0,1,aad14f85b88e77a4170da6d063782d327d4bbef7c623d2319afa5deee071a16d,2024-11-04T18:50:05.607000 -CVE-2024-38422,0,1,e92abdff4637938f6aa11bc12bba25c477ccc43ca20d8cc02d2a1ebd434dd66d,2024-11-04T18:50:05.607000 -CVE-2024-38423,0,1,3bf7fdaa66125afc30eccef1cbb9ef74bd13212938c90821434b074e17838e49,2024-11-04T18:50:05.607000 -CVE-2024-38424,0,1,06340bbf66d2a6342f7a5ee8dbfa160e63170339b13f4014ebbb43ba3d347571,2024-11-04T18:50:05.607000 +CVE-2024-38410,0,0,5cea5cfb4bc439ce832f92d9c6fd8fffb08294b97be59c2eeb49f06244a7b422,2024-11-04T18:50:05.607000 +CVE-2024-38415,0,0,496a43169afbfbd87ce1e50594aead25e503d0a73f46766803db5f72848ec51d,2024-11-04T18:50:05.607000 +CVE-2024-38419,0,0,f9c0d718f5c27040e1ac989a2728e9885b61af1af81b5baaa6098039685c0f74,2024-11-04T18:50:05.607000 +CVE-2024-38421,0,0,aad14f85b88e77a4170da6d063782d327d4bbef7c623d2319afa5deee071a16d,2024-11-04T18:50:05.607000 +CVE-2024-38422,0,0,e92abdff4637938f6aa11bc12bba25c477ccc43ca20d8cc02d2a1ebd434dd66d,2024-11-04T18:50:05.607000 +CVE-2024-38423,0,0,3bf7fdaa66125afc30eccef1cbb9ef74bd13212938c90821434b074e17838e49,2024-11-04T18:50:05.607000 +CVE-2024-38424,0,0,06340bbf66d2a6342f7a5ee8dbfa160e63170339b13f4014ebbb43ba3d347571,2024-11-04T18:50:05.607000 CVE-2024-38425,0,0,d6a49b1b2867bcbd4e1afebc1d8cce3ff52f15da8a3ae6e1386a8acb3cf0ae32,2024-10-16T17:34:41.633000 CVE-2024-38427,0,0,8994acf8b0d2e9fdb11baea3df5edeec421ed8fa1c8aac7108ecf0d2784c04de,2024-07-03T02:05:00.507000 CVE-2024-38428,0,0,452d54ed820ff08b69aa9d520f4026807b45be623e70313c52b21d33bd87b5b0,2024-10-28T21:35:09.643000 @@ -257800,7 +257808,7 @@ CVE-2024-39338,0,0,224e3a3c09358e014697d42ae118e958b11cd83a92fda65e581c38eeeb8c2 CVE-2024-39339,0,0,fe161151f8e005b87f748c729f84f5d922c0d07dafc4c5760d37acbd5c309b7f,2024-09-20T12:30:17.483000 CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453cac,2024-07-22T13:00:53.287000 CVE-2024-39340,0,0,fc621b442d86eea0a2e72227f2b14f23e2a67834630b902f47135788b8db4fd4,2024-09-23T15:15:13.907000 -CVE-2024-39341,0,1,7c359c6b4015613fc52267fcd7e5d9646d4cfcd7e7964fd0c4b36316116d1347,2024-11-04T17:35:19.370000 +CVE-2024-39341,0,0,7c359c6b4015613fc52267fcd7e5d9646d4cfcd7e7964fd0c4b36316116d1347,2024-11-04T17:35:19.370000 CVE-2024-39342,0,0,93fef3118f07e5180653fc41b9d6410f0df44f4e0465d850d3b1f4400c7d473a,2024-09-26T13:32:55.343000 CVE-2024-39344,0,0,e818a000a36da13fc4fe8918e0aa5d488785b27901618777d7233d703b03f419,2024-08-26T16:35:10.110000 CVE-2024-39345,0,0,f773bf4aa168ca0fb54a499af45e3e951779cc47e8e783983f66e20a083935eb,2024-09-03T22:15:04.480000 @@ -258541,10 +258549,10 @@ CVE-2024-40650,0,0,84d69f74023b7625d57fbc8106fe861d15f00562153a0ec27f968621fa8a1 CVE-2024-40652,0,0,0dc9a34620355d1a82f6409ecc9e9411449a2ec7843cc6a278a0f0f3b1b9a70e,2024-09-11T21:35:09.017000 CVE-2024-40654,0,0,21790eceed7e02cb65e578306828cdf9a6e19465650f92e825f1c3f87473b28c,2024-10-16T16:35:03.940000 CVE-2024-40655,0,0,f9e742a073d4783d6e3e69c7c29dfc537f097ccbb827a6e63290bf1fc0f97f80,2024-09-11T16:26:11.920000 -CVE-2024-40656,0,1,840dc94a7b68cd7ee3975215db9701e55f31bca5dde918908ee00bfb81643af5,2024-11-04T17:35:21.163000 +CVE-2024-40656,0,0,840dc94a7b68cd7ee3975215db9701e55f31bca5dde918908ee00bfb81643af5,2024-11-04T17:35:21.163000 CVE-2024-40657,0,0,20ced210671262f43b0cc62341898b9fc7febd5f8789caf35d41deaa287b92ab,2024-09-11T16:26:11.920000 CVE-2024-40658,0,0,5f8a6b60ca62d2cfa0f9862e86c619e00e5db037ad87f1558ced4ae7f02d2bd8,2024-09-11T16:26:11.920000 -CVE-2024-40659,0,1,fabbb4b92a57e596b06e9bd31b045ecca58663666534e05d61759f6961367421,2024-11-04T18:35:10.733000 +CVE-2024-40659,0,0,fabbb4b92a57e596b06e9bd31b045ecca58663666534e05d61759f6961367421,2024-11-04T18:35:10.733000 CVE-2024-4066,0,0,5674d1317b0a03adb324e31f70d35a87031f26ca2ea2869349483359d081bdf7,2024-06-04T19:20:29.323000 CVE-2024-40662,0,0,158da2f06a1d27615161cee7fe7341ef1e87f2062801f47e3e4f4b1d6a1663ec,2024-09-11T16:26:11.920000 CVE-2024-4067,0,0,cb2492818fe81f39be6108b3726f1fbc34af211b5be3405ee7a17904cdbd58f2,2024-08-28T00:15:04.130000 @@ -261272,7 +261280,7 @@ CVE-2024-44728,0,0,cb7a7604dfcd48f9cda73a0c69d9a24576616f565cbb7b44a1dd956c1a254 CVE-2024-44729,0,0,8927fd223d4ba575b179ed6c329831ef814c6d84c37bf537a737d3016ff6f41f,2024-10-16T19:35:07.543000 CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000 CVE-2024-44730,0,0,68e24ec16142e7e4b16db1fb49b8bca291622a943e62f8987d7002843b292365,2024-10-16T19:35:08.430000 -CVE-2024-44731,0,0,84a9da96da62ef0fd19671f44ccbd7806fe97a6aa159a56e60da9946ddc9c890,2024-10-15T12:57:46.880000 +CVE-2024-44731,0,1,c8b83766bd37ae72dea57fcd8091713c429814e3571ec057fa8a55aadda72daa,2024-11-04T20:35:07.840000 CVE-2024-44734,0,0,2c4788aa6c56f345d19a79974f7a25e8f33117ccbb6a849bf098c683fbf59a73,2024-10-16T19:35:09.310000 CVE-2024-44739,0,0,48da2c283a8d53275b8fef0ca13127577bd8ad3471472700794962cf357a3ab6,2024-09-06T16:46:47.907000 CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000 @@ -261497,6 +261505,7 @@ CVE-2024-45075,0,0,72725abf8f0bda55b265624cd19c42b954d17e9672b7c19951b6fe04531ef CVE-2024-45076,0,0,5fb321e82c08a6c58252337bee6e5fcb4b13786a863fe8ca643f04e713d05d32,2024-09-06T16:44:52.310000 CVE-2024-4508,0,0,26388c420646a8ddc4ee2de628a691e0fa51808e2f848ae0f9b7aad58ccb1298,2024-05-17T02:40:26.220000 CVE-2024-45085,0,0,6bf407745c49416d639e4551e6b0198c41834096ad27b893ebf03e1d6f70dda9,2024-10-16T16:38:14.557000 +CVE-2024-45086,1,1,6033a6df67db621f8173f55d18c48fb1722bf1239fc7b55c825347122fb7ab81,2024-11-04T20:15:05.013000 CVE-2024-4509,0,0,996942a0a2c59f4d53067a2868fbad35944719504585e3998bbd4d788c545588,2024-06-04T19:20:40.347000 CVE-2024-45096,0,0,d4f642a1e6bb8f30a3a63abc6de33d2a734d4a63841c63adbbf0861fc10b1ff8,2024-09-06T12:34:17.957000 CVE-2024-45097,0,0,66f33176e0c07f5466116654bcd7c2847267016c1af22914a830c235e4290102,2024-09-06T12:51:59.750000 @@ -261559,7 +261568,7 @@ CVE-2024-45159,0,0,315bbe3853593d217ddbcd9fba2e9d9003cbd4c00b52b441be6179268e6c4 CVE-2024-4516,0,0,7413b58d03a0a8938a8f9c3b85a26b19cfb41e2c50a00216b0df80496b4b87e3,2024-06-04T19:20:40.930000 CVE-2024-45160,0,0,5448512f93e2c872a5532bb6e7925e6443ae5601b38aa00ad59c4de27ffce9e0,2024-10-10T12:51:56.987000 CVE-2024-45163,0,0,d1b8d71b55c9c05a6535a6d473b973daf564bdfb091297232be0a5c5759d6390,2024-08-22T15:35:12.750000 -CVE-2024-45164,0,1,8cb398eb84123906b5632a4d2bb59ecadf3f1bb550e2a7fa85685ab1d859daed,2024-11-04T18:50:05.607000 +CVE-2024-45164,0,0,8cb398eb84123906b5632a4d2bb59ecadf3f1bb550e2a7fa85685ab1d859daed,2024-11-04T18:50:05.607000 CVE-2024-45165,0,0,c95c37e8403c42b6535ee3db172ebed1de2af8ddabba72579971a9771877b8f5,2024-10-31T19:35:08.327000 CVE-2024-45166,0,0,a776bd2559e4bed9a84a577a682c1ac93ea07fab716da8fcb660f8b43cc91ea2,2024-08-22T14:35:13.183000 CVE-2024-45167,0,0,6f3847a892b75be18a24e1374ef352424a8d56284d9550373f08d0a52ea49aa9,2024-08-22T20:35:24.417000 @@ -261581,6 +261590,7 @@ CVE-2024-45180,0,0,08348c7b1382a66372a71879585bc4b470bbbe0e7bc2a628091dcf790778c CVE-2024-45181,0,0,c1b3f50892c5ad2964a42f2f7c4bb1e591fc78d268d80e02244df3b7c3d3d502,2024-09-18T20:26:26.873000 CVE-2024-45182,0,0,e32901d25899173bbdbcd4da8de2dfd78b6a7db5248414eaa56acb1cb3e78104,2024-10-29T21:35:21.720000 CVE-2024-45184,0,0,2cf234e0a6e14825f232aaef12e4c1aaad3da08547a4333f332ffe8186f4ef37,2024-10-15T12:57:46.880000 +CVE-2024-45185,1,1,4d25eea007d12e8196676fddd5a022b600ae0556220020b594a3731f94074eb3,2024-11-04T20:15:05.257000 CVE-2024-45186,0,0,77c3f8977c3993383fb80894e402f55d5d22584cb41b5e73c31c8d88ae8792cc,2024-10-04T13:50:43.727000 CVE-2024-45187,0,0,b29c34a9281e147a1f2b33bdd2a8c272cd39081d36dd9d0273787cf191e54024,2024-08-26T12:47:20.187000 CVE-2024-45188,0,0,b715e0fd98dc9de103c52fc47a055822268226fc14af5f0a01f3a3eab3db9def,2024-08-26T12:47:20.187000 @@ -261798,7 +261808,7 @@ CVE-2024-45490,0,0,06cbc4e334c584d891c3ace1d9b2615373ad498dcf0899c8b0a88252c7eed CVE-2024-45491,0,0,e460156ea6419a80b45a0f265018e72555b70e117c8be4ee37cb347a447d976e,2024-09-04T14:28:33.953000 CVE-2024-45492,0,0,073ca72c9147ce0bd071ae42dd069b817368a461c31ddb6a6a85b43c752a5921,2024-09-04T14:28:41.760000 CVE-2024-45496,0,0,cb4145e26d358c15cb434585f9bcb20449ce473167aa6d60e18e039ff47cf458,2024-09-20T12:31:20.110000 -CVE-2024-45498,0,1,ead799fee90d0be791c926b84a8db9a257cc85e76c202f16fed08488baf7d590,2024-11-04T17:35:22.900000 +CVE-2024-45498,0,0,ead799fee90d0be791c926b84a8db9a257cc85e76c202f16fed08488baf7d590,2024-11-04T17:35:22.900000 CVE-2024-4550,0,0,ea2693a2208898e22f1b33bfbea2ea7879154431a660b6be5aad9a2659ccd071,2024-09-14T11:47:14.677000 CVE-2024-45504,0,0,d1fb07a3228efd18f7c0af3faab016c97edb9e2da8e02dba547168a8c292ae66,2024-09-10T12:09:50.377000 CVE-2024-45506,0,0,53228a9659d8b3663e59f7b6cd3ffdc01b4518a34e19971e095f98575a886619,2024-10-14T03:15:10.123000 @@ -261989,16 +261999,16 @@ CVE-2024-45873,0,0,c49a27b891c2cba5f20315647687fde4c837ff4206eca9eaffb57a4f0d790 CVE-2024-45874,0,0,2e0e68e484da1ec476bcb0982736db7f6eddfb72b06a902a4960817b887d973a,2024-10-10T12:57:21.987000 CVE-2024-4588,0,0,9198a141cbfd67d79271a90e0ce19e828dccb043a1ec84b18e696744e0f31db8,2024-06-04T19:20:43.163000 CVE-2024-45880,0,0,cea99cab279728fefb1cf99178e03e8166f7f71fb61ca1ac6100aefdaeff9258,2024-10-10T12:56:30.817000 -CVE-2024-45882,0,1,4a977af8fdd839cd4f9ec7d626404754a20e280136cd0957d74d6ce36952a6fa,2024-11-04T18:50:05.607000 -CVE-2024-45884,0,1,4248abe1b6b5044f680879e90513283a5706ec504fd510f598fa028423e0546c,2024-11-04T18:50:05.607000 -CVE-2024-45885,0,1,c7673dac95f2e274f0c52351a0724f70812d1f0f53eb28fd104408c9752ab424,2024-11-04T18:50:05.607000 -CVE-2024-45887,0,1,ad0f4d71217154c00e00009f5378adccb0c580a79b8d13e096670b39627ca3af,2024-11-04T18:50:05.607000 -CVE-2024-45888,0,1,b79efdd075a61a01f7126c4c1da549cf5602389dbc7aef8dc7b2347a51647d3c,2024-11-04T18:50:05.607000 -CVE-2024-45889,0,1,512ef2d3caaade1639f221d9a87472c7147b7a39f2b32d901ecfd06ba58ed97c,2024-11-04T18:50:05.607000 +CVE-2024-45882,0,0,4a977af8fdd839cd4f9ec7d626404754a20e280136cd0957d74d6ce36952a6fa,2024-11-04T18:50:05.607000 +CVE-2024-45884,0,0,4248abe1b6b5044f680879e90513283a5706ec504fd510f598fa028423e0546c,2024-11-04T18:50:05.607000 +CVE-2024-45885,0,0,c7673dac95f2e274f0c52351a0724f70812d1f0f53eb28fd104408c9752ab424,2024-11-04T18:50:05.607000 +CVE-2024-45887,0,0,ad0f4d71217154c00e00009f5378adccb0c580a79b8d13e096670b39627ca3af,2024-11-04T18:50:05.607000 +CVE-2024-45888,0,0,b79efdd075a61a01f7126c4c1da549cf5602389dbc7aef8dc7b2347a51647d3c,2024-11-04T18:50:05.607000 +CVE-2024-45889,0,0,512ef2d3caaade1639f221d9a87472c7147b7a39f2b32d901ecfd06ba58ed97c,2024-11-04T18:50:05.607000 CVE-2024-4589,0,0,4328e8e6c3737b332b5624dfb7ea03e7812e5262794529580dcb4596fe3e40c9,2024-06-04T19:20:43.257000 -CVE-2024-45890,0,1,9691f342b540a5c558f2871c8e7e44faa16ec59d64e890b9fbf5fea35d30b539,2024-11-04T18:50:05.607000 -CVE-2024-45891,0,1,50fff6697f014ddbc5f2b6ba55857b27bdd1629ef94c1d57793dde287bc51282,2024-11-04T18:50:05.607000 -CVE-2024-45893,0,1,5f10b85050f43cff47e43a959f8c7947ba6467dcbd117fb999c03d320bfccf01,2024-11-04T18:50:05.607000 +CVE-2024-45890,0,0,9691f342b540a5c558f2871c8e7e44faa16ec59d64e890b9fbf5fea35d30b539,2024-11-04T18:50:05.607000 +CVE-2024-45891,0,0,50fff6697f014ddbc5f2b6ba55857b27bdd1629ef94c1d57793dde287bc51282,2024-11-04T18:50:05.607000 +CVE-2024-45893,0,0,5f10b85050f43cff47e43a959f8c7947ba6467dcbd117fb999c03d320bfccf01,2024-11-04T18:50:05.607000 CVE-2024-45894,0,0,740550dc5a86649aa0fe59728cae8a43ea99cf049e7478afa6af433b67b6e7ff,2024-10-10T12:57:21.987000 CVE-2024-4590,0,0,8ca402987898b35fa6dccf6a68bedf09dff404f8ccc3b30e4b5d3617c810458c,2024-06-04T19:20:43.350000 CVE-2024-4591,0,0,932b05f4c05f6cec282455aa1d3695481031502fa6f9d1dddbe95851cbcfc0be,2024-06-04T19:20:43.450000 @@ -263307,7 +263317,7 @@ CVE-2024-48257,0,0,cde7b8837142e8c81fa5cdd04cd1a286ad8050551e4a13ecd4d16d52e71f8 CVE-2024-48259,0,0,05be91466999f287d7c34a7b188d482630d814bc65ce325c3824838e8ad22bcc,2024-10-15T19:35:38.413000 CVE-2024-4826,0,0,deaf8fdab596ba1219725251282b0367e2dd73462b62b55f2e950ae3725565c5,2024-05-16T13:15:48.163000 CVE-2024-48261,0,0,c50173bdf25e4741bc510b2698ace8c3db8c27162251f6faafaff8896241ef72,2024-10-14T15:15:14.130000 -CVE-2024-48270,0,0,c34f493fc945c8641941af047819fdd3eff3102fc65ad67d776dda9faa88706a,2024-11-01T20:25:15.673000 +CVE-2024-48270,0,1,e82279cb4f373ef131088b2d6ce9afd1cdb7a974f6f061e99b19d0e81804f27f,2024-11-04T19:35:11.057000 CVE-2024-48271,0,0,f1a486724163e31edae91e89dc14d5baec7425ac5626e9c57973c7569aa40cc5,2024-11-01T12:57:03.417000 CVE-2024-48272,0,0,dbe268aef174a7c0e19118488cdbf6bd3dd4bc2a094901a22c6cf1a9597b5ee2,2024-11-01T12:57:03.417000 CVE-2024-48278,0,0,2d230a37c6a5ea93411d7a1b4293f4f461a087e46c8a9a4eaba61f8eeb3339e7,2024-10-16T16:38:43.170000 @@ -263315,11 +263325,11 @@ CVE-2024-48279,0,0,734681838e14fea506d33d2e5cffcb45e5208b2ff1232248e90dbda0d4737 CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b92f9,2024-10-16T16:38:43.170000 CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b694,2024-10-16T16:38:43.170000 CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000 -CVE-2024-48289,0,0,955f59fc9322ac810e4c17e1fa6f43db031535f27434f509f94fb29bac5c8a70,2024-11-01T20:24:53.730000 +CVE-2024-48289,0,1,3c17d5bd38424fa0af920fbe41958bfb5ff6ab46e45b8d73a90e0bb1a9946e7a,2024-11-04T20:35:09.307000 CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000 CVE-2024-48307,0,0,935ee3e0328307bbb03111416c4595c4eff3ac408a08578a24f622dddb9d0c64,2024-11-01T12:57:03.417000 CVE-2024-48311,0,0,354d288e073d9064d21602cf2204c79fdbedf6cf54999e8a50b7d788e057c63f,2024-11-01T12:57:03.417000 -CVE-2024-48336,1,1,95191449bb04b318838888182067870ab2800ab58e75f33b07339892bd30632d,2024-11-04T18:50:05.607000 +CVE-2024-48336,0,1,ceb20642f87b45ae345232a2a331752a7382b0137ef1494f458e4bcdd5d57c2f,2024-11-04T20:35:10.193000 CVE-2024-48342,0,0,cab27a7526b8debabab042631051135b3c12f9f8dc84e657f2f251a3750f9436,2024-11-04T07:15:11.437000 CVE-2024-48343,0,0,6b50c2f4f6b1096ee0c17db257557835a9194bfca6ac184c217bfb38c59667b0,2024-10-29T19:35:23.657000 CVE-2024-48346,0,0,9cadc94f91da6becfc880372821212f6fb47778feb19564283e0a19072e428a5,2024-11-01T12:57:03.417000 @@ -263437,8 +263447,8 @@ CVE-2024-48713,0,0,445ad86acde4498d015f6e3ec387c87f05498a686a49f564198004eca8c35 CVE-2024-48714,0,0,5966fa7e4cea1148b0617541f87717ad0f7359afa5da2d98079f2bad16d0d0d4,2024-10-16T17:35:06.330000 CVE-2024-4872,0,0,549af6d3c4facab0e0ed80259f11ae3b62839f464bd03f4ae7443d031f1f2086,2024-10-30T15:31:41.743000 CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000 -CVE-2024-48733,0,0,fee840189ff810ec49dfbfe7085ad088b6df061846bc5ecd2fc8bccbb125c7d6,2024-11-01T13:15:12.390000 -CVE-2024-48734,0,0,29f01c84fc7b1fdfd9019ed2d673a1ad053dd328de668f0d733d13951d427293,2024-11-01T13:15:12.510000 +CVE-2024-48733,0,1,773fd6b2e7e4f5cd5440d09e78665a8b9dbd2f1c81115825a7a0b5a44cebe66d,2024-11-04T19:35:11.380000 +CVE-2024-48734,0,1,235096d5d15c9ed0cae8fc2b37a546f714681d3c8637630f6435091904d25b7e,2024-11-04T19:35:12.597000 CVE-2024-48735,0,0,aa134cb71eec050b9e0ec9fc38dfda524a75b12ece7317a32efa232ed7d6416c,2024-11-01T13:15:12.620000 CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000 CVE-2024-48743,0,0,e34f375e468f7c410c7d8c60761e70f3ee3d5b15b7109d5d939d88a21b51dbc6,2024-10-29T19:35:25.777000 @@ -263477,7 +263487,7 @@ CVE-2024-48797,0,0,84ec47d2f0875bb5f244804e75fe25176b42fd271e656bf8a6c457b2cefda CVE-2024-48798,0,0,456e6efd1999d161e08d7d92b829aad7f771e38427be013211a406399a3cd174,2024-10-15T16:35:14.783000 CVE-2024-48799,0,0,896d6d04e9dd29e6b7911e8a609c1f9aedfadec2fef931b761998c1ee9dd8f3e,2024-10-15T15:35:21.350000 CVE-2024-48807,0,0,0d144ac83f7e3b1760f53caa259e9e3c92797a393e9f0218e5e59721fbc1c4dc,2024-11-01T12:57:03.417000 -CVE-2024-48809,1,1,43781c77abeaa6728314eec20171832d8fdf9834357c279579011e6dc318148f,2024-11-04T18:50:05.607000 +CVE-2024-48809,0,0,43781c77abeaa6728314eec20171832d8fdf9834357c279579011e6dc318148f,2024-11-04T18:50:05.607000 CVE-2024-4881,0,0,d7fec9dc10ea1cda5c43b7baed66b19ac106fead894074c09a02df3073ad45bc,2024-10-17T15:17:00.590000 CVE-2024-48813,0,0,b3275c3656b3f4746c55f236fa34d6d816026c088db796644a052e298f356a4f,2024-10-15T12:58:51.050000 CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000 @@ -263494,7 +263504,7 @@ CVE-2024-4885,0,0,2608f2aa7fb5189467bda7bb610d4e03f1b43256b775a84e60ba9a3b8ac9b2 CVE-2024-4886,0,0,d27ca09c7d3a0108a7cfa4692eb479eab6127452085468fbf17d7a45144cc1ee,2024-06-11T17:14:56.323000 CVE-2024-4887,0,0,a9fcb128c464af9b649411220acdd6815488462c8e19ba3fbbc0069b693c8d04,2024-10-29T19:52:44.863000 CVE-2024-48870,0,0,9db15b771a088b28bd1f0b1772504cda9cfbd6a68039dc698e13b987df9abdfe,2024-10-25T12:56:07.750000 -CVE-2024-48878,0,1,15151d9fd204d808e0708bc64472f5337fc68b353c187de2111b889c9dad41c7,2024-11-04T18:50:05.607000 +CVE-2024-48878,0,0,15151d9fd204d808e0708bc64472f5337fc68b353c187de2111b889c9dad41c7,2024-11-04T18:50:05.607000 CVE-2024-4888,0,0,ad5e456877e6c4225b3f983ebfcea1f0af64a03667e43f1cd6a0842bed4216c0,2024-11-03T17:15:14.137000 CVE-2024-4889,0,0,98c988bc305180dfde4233cdb25b83940a2a23ecd5fc7825e58f1cc0fbfe5628,2024-10-15T19:00:09.633000 CVE-2024-4890,0,0,ee7720239380ab5c638f0803999a779457a74687c16e858d2acf0798605f57a2,2024-10-10T20:11:44.610000 @@ -264055,7 +264065,7 @@ CVE-2024-50020,0,0,6661d43351c3469f03e20f3e76c98c07a0ed5f6d6c8216674628fc4e4b1c9 CVE-2024-50021,0,0,57898aec5b1884b47d938a7c111f0959d068fd1db827ee35c06871b16a31f2f4,2024-10-25T14:52:13.890000 CVE-2024-50022,0,0,d347f317ab0388be7e02e3c067a725743f4f4a2ec5fe9c3616767a56611772d5,2024-10-25T15:05:57.403000 CVE-2024-50023,0,0,67f390b3621c869ad7858ff2cf441444955c6d93a2b1b8f79163356225513f54,2024-10-25T15:07:10.487000 -CVE-2024-50024,0,1,6b15a13db214b0d135537b06f13a1f560c5d24158a817a49698224e28b6616ab,2024-11-04T18:34:56.237000 +CVE-2024-50024,0,0,6b15a13db214b0d135537b06f13a1f560c5d24158a817a49698224e28b6616ab,2024-11-04T18:34:56.237000 CVE-2024-50025,0,0,996c9003bb36be85d02a1f00c0b7117f395f6400ba523ac2e3036745eb98fc43,2024-10-25T15:12:00.453000 CVE-2024-50026,0,0,2ea88617c927e9b4efea5125e99e0520462e67a640d28198604f210d9ecb47e7,2024-10-25T15:13:04.783000 CVE-2024-50027,0,0,911e9c91ef791dfbec8fa7d37f12e0e3766dc424c106bb3bfff768993b582c21,2024-10-25T15:19:07.347000 @@ -264068,7 +264078,7 @@ CVE-2024-50032,0,0,637e150873829d1b7c3d3a118914d460721e34274ed685e063d54b031f3cb CVE-2024-50033,0,0,31b01ea83bcca81918c070b63b5485c88672f34d727199970bc597721f06bb09,2024-10-24T19:56:04.097000 CVE-2024-50034,0,0,ef0ee6c054fa6d95d82a1cc5e3a063aef10790efa19e561bb55f1a0df403b297,2024-10-24T19:56:29.170000 CVE-2024-50035,0,0,9397571eb914efebc6686d6fee86d3765ca656654c3527a13621032f6dad372b,2024-10-24T19:54:01.987000 -CVE-2024-50036,0,1,1d0df25807361a32d6b4d5f2b739fdb90a97c7801e06c67c2be03fc4ff1ca693,2024-11-04T18:34:21.040000 +CVE-2024-50036,0,0,1d0df25807361a32d6b4d5f2b739fdb90a97c7801e06c67c2be03fc4ff1ca693,2024-11-04T18:34:21.040000 CVE-2024-50037,0,0,7b8bd0ced0d5a92e759859fc7f266b7f65512be91ea2b7830f75e01b13b64dae,2024-10-25T15:43:07.520000 CVE-2024-50038,0,0,5139188422bfac2a9578e368c33cca37aad41d76348b8b556e0dc9e15f35e6c4,2024-10-25T15:45:51.340000 CVE-2024-50039,0,0,7079ea2b935dafa93e7976f635f7aad3260c3b73e52698f049796deadf4fedf6,2024-10-25T15:47:04.950000 @@ -264099,7 +264109,7 @@ CVE-2024-50063,0,0,1d1881a47d554fc29d203efb6c8521669e1b28611f2bbf99ab231399dab59 CVE-2024-50064,0,0,0fbb48f98a0eb4f4ff5ac7ecc0e869de5fbcd36b7eb760b827cf0f646f0d7eab,2024-10-23T21:49:29.423000 CVE-2024-50065,0,0,798ea878f6caa10adb303d247fc046bf695b098e873c9993ee906b7bb5d17e5c,2024-10-23T15:12:34.673000 CVE-2024-50066,0,0,d94429be94d535aee100ff68d7809fe3a46ae84c5531ba245573459a38823316,2024-10-23T15:12:34.673000 -CVE-2024-50067,0,1,0cfc9c6ccaccce00b2a6e12271047c38492efba30a1cd4007e0e0ce196ff1010,2024-11-04T18:34:01.667000 +CVE-2024-50067,0,0,0cfc9c6ccaccce00b2a6e12271047c38492efba30a1cd4007e0e0ce196ff1010,2024-11-04T18:34:01.667000 CVE-2024-50068,0,0,b357b7d6a2971d612ca74bbd17c1e805d468b220432de66ab123477d4c8a0299,2024-10-30T16:57:35.427000 CVE-2024-50069,0,0,f0efb37fce406b5577ae6affb711463f72093df862fef1ce6ec787e41a622262,2024-10-30T16:58:19.983000 CVE-2024-50070,0,0,a93237e500fada4b88abb4aa778a5f3c2cf8813abaffa45e0eeec4d5a914d64b,2024-10-30T16:59:39.013000 @@ -264271,15 +264281,15 @@ CVE-2024-50510,0,0,c20bcf79645964cfe7d1f097e44f43edf8fcb1f8c86258043a8f25edf3a0b CVE-2024-50511,0,0,d2405bceb5490caa25d48c9eaccd1b135c0f31fb2801d8eda1baf830c34ba921,2024-11-01T12:57:03.417000 CVE-2024-50512,0,0,d3eb5beba15659e24233a17e23ff12b2ae18a8a0e2a2662e84998527ef3378d4,2024-11-01T12:57:03.417000 CVE-2024-5052,0,0,1db4612270fc4085b1cc808dfe93eaa2dc99045707c3296716068fcb2c40c936,2024-05-17T18:35:35.070000 -CVE-2024-50523,0,1,c6a70c2337ad1a08c0cf9c9287bb46dc5b836dcc56d2aebc19936a029550cb52,2024-11-04T18:50:05.607000 -CVE-2024-50525,0,1,3f8111347df6931458c9f7e4ac41644caed172420e9dab26d30bbb3227d96198,2024-11-04T18:50:05.607000 -CVE-2024-50526,0,1,03a7d9df8f257120dfb13e4d6b00d372da8f716ca3024e20226448de93f04a84,2024-11-04T18:50:05.607000 -CVE-2024-50527,0,1,b40bbc326cd3bb104307caa75aac26386f5b990c97a95e2ad88fd937af33800f,2024-11-04T18:50:05.607000 -CVE-2024-50528,0,1,735185d7fb10e77bade7bb3697db3987e43d0912aefe11cadcd5d03af3be0d8d,2024-11-04T18:50:05.607000 -CVE-2024-50529,0,1,9454ba0143df47276a2a2afdadcf79fd69d6699ca42e671d69642156f7b867e3,2024-11-04T18:50:05.607000 +CVE-2024-50523,0,0,c6a70c2337ad1a08c0cf9c9287bb46dc5b836dcc56d2aebc19936a029550cb52,2024-11-04T18:50:05.607000 +CVE-2024-50525,0,0,3f8111347df6931458c9f7e4ac41644caed172420e9dab26d30bbb3227d96198,2024-11-04T18:50:05.607000 +CVE-2024-50526,0,0,03a7d9df8f257120dfb13e4d6b00d372da8f716ca3024e20226448de93f04a84,2024-11-04T18:50:05.607000 +CVE-2024-50527,0,0,b40bbc326cd3bb104307caa75aac26386f5b990c97a95e2ad88fd937af33800f,2024-11-04T18:50:05.607000 +CVE-2024-50528,0,0,735185d7fb10e77bade7bb3697db3987e43d0912aefe11cadcd5d03af3be0d8d,2024-11-04T18:50:05.607000 +CVE-2024-50529,0,0,9454ba0143df47276a2a2afdadcf79fd69d6699ca42e671d69642156f7b867e3,2024-11-04T18:50:05.607000 CVE-2024-5053,0,0,85ba036ea0ce8a641df5f4bb0e9116ce37b7603e5543e179441180f635dd17ca,2024-10-04T16:02:22.037000 -CVE-2024-50530,0,1,63e06adfa4fafa8114bfe1b8a141066c3ff787daf64f4e571e9b63ebb6d24141,2024-11-04T18:50:05.607000 -CVE-2024-50531,0,1,8b27635a00d9bdcfd48a2eda16060f69efabc3f323a06bf6e7ec076598185a58,2024-11-04T18:50:05.607000 +CVE-2024-50530,0,0,63e06adfa4fafa8114bfe1b8a141066c3ff787daf64f4e571e9b63ebb6d24141,2024-11-04T18:50:05.607000 +CVE-2024-50531,0,0,8b27635a00d9bdcfd48a2eda16060f69efabc3f323a06bf6e7ec076598185a58,2024-11-04T18:50:05.607000 CVE-2024-5055,0,0,346404cc585681a2fe5319ad3cd387f2171e7718710adaf135152ad352635ebd,2024-05-17T18:35:35.070000 CVE-2024-50550,0,0,0d2291a684da454f82b0b3876a679625fedb67aa405d9eb4df12eeb34adbbab4,2024-10-29T14:34:04.427000 CVE-2024-5056,0,0,b09a6a74de5b053675f9afc4f104e067ee8a59f791091ecbf85080c4327f1e74,2024-08-23T16:04:14.643000 @@ -264325,8 +264335,8 @@ CVE-2024-5076,0,0,de640e02cf3b45a3c273aa587ea62260b6bf3eea8d977ac9f3e7280d3f5d4b CVE-2024-5077,0,0,58d61679dec16d0807ee3c6d8f70abda23dd3b8ef542c3a47286601f3d544039,2024-08-01T13:59:40.333000 CVE-2024-5079,0,0,03cab751fae6538cdd3ee0f9a467090b1b9dca8ded972c9a24812d90a2b62ab7,2024-08-01T13:59:40.517000 CVE-2024-5080,0,0,88ae00b43e12b64ab9ecc2d4c4ea1fe4d89b86d4c131aa05e4a989c5a4e3b207,2024-08-01T13:59:40.707000 -CVE-2024-50801,0,0,12fa6528480d09a9fa2eaa4a50b664a633a931b105b820fffeb1f93e9a31cbe8,2024-11-01T12:57:03.417000 -CVE-2024-50802,0,0,b78140282d8abd4ee47c0fd36ce8ab925c5b94864ec0fb29c78063d87402e2c9,2024-11-01T12:57:03.417000 +CVE-2024-50801,0,1,b02fd2a4d914f47ebf18861bef14a429b26208dd8058232ee786f89bcea879c0,2024-11-04T19:35:13.810000 +CVE-2024-50802,0,1,8492f5be24f5ad2918f47970062e4bc2c1c3f432ad972af1d330cb18adac5b2e,2024-11-04T19:35:14.907000 CVE-2024-5081,0,0,0bebffdc717b25462ccb5a198cb29076c0fa0475011c795b0df7ab25d1acf197,2024-08-05T15:35:16.180000 CVE-2024-5084,0,0,79705ce3d53f6e7c72da00fccc935c6da44be9bf4354c31cd8528afb5e0a643e,2024-05-24T01:15:30.977000 CVE-2024-5085,0,0,6942e3068671e85a9578eddbb7240c8706dd53cd6ec5670c5d4ddd91c950a30a,2024-05-24T01:15:30.977000 @@ -264364,9 +264374,9 @@ CVE-2024-5109,0,0,ceb18a5d96497e9a6ac7740a19ad17f4e12924c64b1533f15150f5dd2571e3 CVE-2024-5110,0,0,97ec9134be0ff29c231012cbb3632c9becbf0944f1a706861520a2aec58057e2,2024-05-20T13:00:04.957000 CVE-2024-5111,0,0,1e1510502a884c6f23b18cee848205aa75aeed3171cb87569d39e4078bf9232b,2024-06-04T19:20:59.907000 CVE-2024-5112,0,0,689c76c95598a2f86ee6cadbc1c25854cf35ada5e2d2725de4638c44d7f73797,2024-06-04T19:21:00.007000 -CVE-2024-51127,1,1,af77c41f3e695b35e5d7d2a014102e22ccd34cd96f4a1eb4289d1e174ab59ec8,2024-11-04T18:50:05.607000 +CVE-2024-51127,0,0,af77c41f3e695b35e5d7d2a014102e22ccd34cd96f4a1eb4289d1e174ab59ec8,2024-11-04T18:50:05.607000 CVE-2024-5113,0,0,d52da1935c57c4016d19b1f0658aa6603ac8563b2af10cf87d5ce42568a3ed96,2024-06-04T19:21:00.113000 -CVE-2024-51136,1,1,01065aa01300ba3069b8f78f5cc816bb7c27734cd0ce5e01b4fe90b7b78cc901,2024-11-04T18:50:05.607000 +CVE-2024-51136,0,0,01065aa01300ba3069b8f78f5cc816bb7c27734cd0ce5e01b4fe90b7b78cc901,2024-11-04T18:50:05.607000 CVE-2024-5114,0,0,51655375bf74d88d0b44bf3106775b49d83b04b179d3446b4a92ffe727b17b66,2024-06-04T19:21:00.217000 CVE-2024-5115,0,0,566281473e2daa2487dd251e202869dc3059aeec07f7c63daa38b65c3bae3de7,2024-06-04T19:21:00.323000 CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000 @@ -264382,15 +264392,15 @@ CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83 CVE-2024-5124,0,0,ddf4d98394e08878019bd952c44f2cfd27f047274d82fb0e14f997780f16638c,2024-11-04T11:15:06.937000 CVE-2024-51242,0,0,e088a83b7d97849945ef8e4d907ce1041a9c29e696b96e8d85eb2989ae73aa7b,2024-11-01T12:57:03.417000 CVE-2024-51243,0,0,dc9a3bcceef7b79b773664e490e9177d288abe6b5bfadf448f185196016ec54c,2024-11-01T12:57:03.417000 -CVE-2024-51244,0,1,5d9d30a0365fb32e6b113bd67e8734073fd6e1f3f97c744a334090e5db6f0da5,2024-11-04T17:35:31.740000 -CVE-2024-51245,0,1,926fc5df0e3a81877ebbb0bdd4104f807040dd23ea5b5d543c69607ee68487af,2024-11-04T17:35:33.130000 -CVE-2024-51246,0,1,90f14622f67d4bb93742ef4444188b35626331bc6bf6eef7e29707c6ff25b53c,2024-11-04T18:50:05.607000 -CVE-2024-51247,0,1,f91aabdacc19911e686cb0a70b4fe352fe5b7223ce99b8d8bbb7be0048cad2b8,2024-11-04T17:35:35.743000 -CVE-2024-51248,0,1,5b1f2d7395fc3935207664d4c3fab29f0abf14a36ed23190b3643b6f2344c487,2024-11-04T17:35:37.110000 -CVE-2024-51249,0,1,3d0cc9c67b7b5023c7f9e10f06a152021d08c28671660933aadd4bf75e0be323,2024-11-04T18:50:05.607000 -CVE-2024-51251,0,1,c4c34718f73bd23a2f11b62312d57fb9837cb268511a72fa7d6e908990a99a5e,2024-11-04T18:50:05.607000 +CVE-2024-51244,0,0,5d9d30a0365fb32e6b113bd67e8734073fd6e1f3f97c744a334090e5db6f0da5,2024-11-04T17:35:31.740000 +CVE-2024-51245,0,0,926fc5df0e3a81877ebbb0bdd4104f807040dd23ea5b5d543c69607ee68487af,2024-11-04T17:35:33.130000 +CVE-2024-51246,0,0,90f14622f67d4bb93742ef4444188b35626331bc6bf6eef7e29707c6ff25b53c,2024-11-04T18:50:05.607000 +CVE-2024-51247,0,0,f91aabdacc19911e686cb0a70b4fe352fe5b7223ce99b8d8bbb7be0048cad2b8,2024-11-04T17:35:35.743000 +CVE-2024-51248,0,0,5b1f2d7395fc3935207664d4c3fab29f0abf14a36ed23190b3643b6f2344c487,2024-11-04T17:35:37.110000 +CVE-2024-51249,0,0,3d0cc9c67b7b5023c7f9e10f06a152021d08c28671660933aadd4bf75e0be323,2024-11-04T18:50:05.607000 +CVE-2024-51251,0,0,c4c34718f73bd23a2f11b62312d57fb9837cb268511a72fa7d6e908990a99a5e,2024-11-04T18:50:05.607000 CVE-2024-51252,0,0,f4f3cc5383a6a1f58f9ea84c21f6a507fb680ae234f6b29b5a0b0272d72878d3,2024-11-01T20:24:53.730000 -CVE-2024-51253,0,1,096fa2cabcaa44b92f571ac0967480e4fabe4fb9873c51a9dbe9e95ead4dc4ec,2024-11-04T18:50:05.607000 +CVE-2024-51253,0,0,096fa2cabcaa44b92f571ac0967480e4fabe4fb9873c51a9dbe9e95ead4dc4ec,2024-11-04T18:50:05.607000 CVE-2024-51254,0,0,223d23065b28f9aecf516c7169cb923513ae1f39fc52963cc50e2cab41350206,2024-11-01T12:57:03.417000 CVE-2024-51255,0,0,09c7dedf943104113335c71594438f15e0e67937d27a8d621ad19f82c6566163,2024-11-01T12:57:03.417000 CVE-2024-51257,0,0,5bc43acf86cf6a149a1c82df6d74466de1800bed5ebde1393a814b2e71c1f732,2024-11-01T12:57:03.417000 @@ -264410,10 +264420,10 @@ CVE-2024-51301,0,0,50e23c850160cb1168fecb7636516cc977715139705058d2de9e569c4aa7d CVE-2024-51304,0,0,7a3dee26145f52820ecad3ae3aa1a89e8c75c8ec87878c3a22e391c73ebfd301,2024-11-01T12:57:03.417000 CVE-2024-5131,0,0,9b223a3704656a88e804c16f004e4517a5aad70b85be149c86a7a2071dad5534,2024-11-03T17:15:14.743000 CVE-2024-5132,0,0,1e1b0edf57956ef222afc7fdedc2f2211203f4402428303961b463cfc0ea97cb,2024-06-07T17:15:51.840000 -CVE-2024-51326,1,1,f88ded964298acbc6e9a32974022511c8e8484cd2422cb2a7910953f3b963a4b,2024-11-04T18:50:05.607000 -CVE-2024-51327,1,1,9e8435fa7a61ae04c5765f958337ed383ed068434cbfa132e59dc833305d80cc,2024-11-04T18:50:05.607000 -CVE-2024-51328,1,1,c7cf0173e7c6be178e6812998247eaf9a492b58431acaf7d7d05b6a5bafa50bd,2024-11-04T18:50:05.607000 -CVE-2024-51329,1,1,fe9fe6fee70bf7f535cc859756a1487466d3af982f47aeef778ab1863ee2a417,2024-11-04T18:50:05.607000 +CVE-2024-51326,0,0,f88ded964298acbc6e9a32974022511c8e8484cd2422cb2a7910953f3b963a4b,2024-11-04T18:50:05.607000 +CVE-2024-51327,0,0,9e8435fa7a61ae04c5765f958337ed383ed068434cbfa132e59dc833305d80cc,2024-11-04T18:50:05.607000 +CVE-2024-51328,0,1,768f8be19425d8bf4cf9b5b89b937b298b5cc7b18ce12eea5265b64902006bbb,2024-11-04T19:35:16.150000 +CVE-2024-51329,0,0,fe9fe6fee70bf7f535cc859756a1487466d3af982f47aeef778ab1863ee2a417,2024-11-04T18:50:05.607000 CVE-2024-5133,0,0,ce2c3261ccf7a6af3656f0cd319a645240f50aa81e714a3f3634cc2f14d7c857,2024-10-17T16:41:53.717000 CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa19,2024-06-04T19:21:01.167000 CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000 @@ -264424,9 +264434,9 @@ CVE-2024-51378,0,0,25041eea06e8de15fb868a226604237e266234c162cafb1c59832cc50427a CVE-2024-5138,0,0,47c03094386326d2315f3415dc7d3ef94b00cbe65c94e42ace003fc1a8714791,2024-09-06T20:35:18.950000 CVE-2024-51398,0,0,e38b939d0a6ada1e8acc966a58f2c362a310a99f3df73314a118d336cca6e0d5,2024-11-01T20:24:53.730000 CVE-2024-51399,0,0,885aca9993ad625251b3194b60c099bbab5438db620967daab647ff77bcb67d2,2024-11-01T20:24:53.730000 -CVE-2024-51406,0,0,23a8b017382413f62cc228eaff5bcfccc7c502c9b9323c87944a90639cb253e6,2024-11-01T20:25:15.673000 -CVE-2024-51407,0,0,cdf72967db2c69b5defcb1138df761cb190d06df523f018741079aa6438aa512,2024-11-01T20:24:53.730000 -CVE-2024-51408,0,1,9a1949f2d560a68fd2bb3d1dbdd350dc06e2d41859fb297a38dbe2b5ea7ec1ed,2024-11-04T18:50:05.607000 +CVE-2024-51406,0,1,219f1a907dc34e3139e40d74617f86db24d4b43908c87f25fb1a00f5ef8165d9,2024-11-04T19:35:17.410000 +CVE-2024-51407,0,1,fda917e854eca07dcff49df0339535f103ba20de93b59699ac770c63d8521d21,2024-11-04T20:35:11.350000 +CVE-2024-51408,0,0,9a1949f2d560a68fd2bb3d1dbdd350dc06e2d41859fb297a38dbe2b5ea7ec1ed,2024-11-04T18:50:05.607000 CVE-2024-5141,0,0,5b006751fd2d8ca9e95fc8cef49a641b35089e8e5594eecd996fab7cf0d4e5e8,2024-07-24T17:58:54.867000 CVE-2024-51419,0,0,e145fdc3d6134b228049cf2c0ec561624aa79dc4de0c1da7a3c5f83de9d39a5f,2024-11-01T12:57:03.417000 CVE-2024-5142,0,0,8102929b9600e5392a308a1b7cfd863bc4b2848bde33508d601b388a9c02231d,2024-08-27T11:15:04.540000 @@ -264458,38 +264468,38 @@ CVE-2024-5152,0,0,0dea7afcd89dc9073df22774961d2668d67dbdb8f03e5c77bf50a81dbd6b30 CVE-2024-5153,0,0,5f2ff3d02c80ca958142f9e7cc43ade832c59a768b74da69d608dbd2c4a4a2d6,2024-07-24T17:56:55.923000 CVE-2024-5154,0,0,dd9543d1b55e95fe68ef2cbce657bf493d3cb20e7ff1b13c6f72f3406df71c74,2024-09-25T06:15:04.890000 CVE-2024-5155,0,0,bda9a47dace36470fd3600985ed47f5579d8b3230222d03e314a73ac1655d764,2024-07-03T02:08:34.117000 -CVE-2024-51556,0,1,b55d82bf90fdb78e33d2cf1f00dfc8aa7bcfecbd3a990a1f45f070aee8579330,2024-11-04T18:50:05.607000 -CVE-2024-51557,0,1,409b8b71c02c1a6156ffb9b30f82adf7f482e618bbb534233192bb45e1ba4f5d,2024-11-04T18:50:05.607000 -CVE-2024-51558,0,1,a77ea5523c72e594fcc04a4ffd32e7543c28774ad7dad1bb59369369d2e3ce28,2024-11-04T18:50:05.607000 -CVE-2024-51559,0,1,c67bedfc7d7a4c2ba774f93c80aec83ca69ade0ef57eca0543a1b55b832734bb,2024-11-04T18:50:05.607000 +CVE-2024-51556,0,0,b55d82bf90fdb78e33d2cf1f00dfc8aa7bcfecbd3a990a1f45f070aee8579330,2024-11-04T18:50:05.607000 +CVE-2024-51557,0,0,409b8b71c02c1a6156ffb9b30f82adf7f482e618bbb534233192bb45e1ba4f5d,2024-11-04T18:50:05.607000 +CVE-2024-51558,0,0,a77ea5523c72e594fcc04a4ffd32e7543c28774ad7dad1bb59369369d2e3ce28,2024-11-04T18:50:05.607000 +CVE-2024-51559,0,0,c67bedfc7d7a4c2ba774f93c80aec83ca69ade0ef57eca0543a1b55b832734bb,2024-11-04T18:50:05.607000 CVE-2024-5156,0,0,15fe916f4b576f7b7dc0d841e2e4a8f8e08add666a82cde7e5fe7e09d48d907a,2024-06-20T16:07:50.417000 -CVE-2024-51560,0,1,9f02ceb8504d368daba1c91c898aa5843478addd73c9ec30709d112c4db8e01d,2024-11-04T18:50:05.607000 -CVE-2024-51561,0,1,b9addf6f8f743df7f500c086a533d7514ad18f577d4214bc1734d73b73a31401,2024-11-04T18:50:05.607000 +CVE-2024-51560,0,0,9f02ceb8504d368daba1c91c898aa5843478addd73c9ec30709d112c4db8e01d,2024-11-04T18:50:05.607000 +CVE-2024-51561,0,0,b9addf6f8f743df7f500c086a533d7514ad18f577d4214bc1734d73b73a31401,2024-11-04T18:50:05.607000 CVE-2024-51567,0,0,fb22eca2665672d2aff69a30826055432e216f3624d9c34f21d445174b67e450,2024-11-01T12:57:03.417000 CVE-2024-51568,0,0,ef96c64ab696ce1dd0f4d9f421838b3895b55219506da5bc264e22e1b5e0e5b2,2024-11-01T12:57:03.417000 CVE-2024-5157,0,0,24d31b037c5fbef35f77d9be746cd537f78e6f1e98b9c21955d97a62fe59949f,2024-07-03T02:08:34.407000 CVE-2024-5158,0,0,b58e7eaee1d1dd9c5e85390b8596c36aa736d240ceb0715ad1a8e256309daea1,2024-09-15T19:35:04.757000 -CVE-2024-51582,0,1,adeac09c227642ad1bc8ba17d895b54bc0538dfe6fe9de82acb4c2b8e5e86b22,2024-11-04T18:50:05.607000 +CVE-2024-51582,0,0,adeac09c227642ad1bc8ba17d895b54bc0538dfe6fe9de82acb4c2b8e5e86b22,2024-11-04T18:50:05.607000 CVE-2024-5159,0,0,6487690749e64572084b0b1ffb84b7950e8b682c3129ca3d21d0dbc204e9ec91,2024-10-25T19:35:15.010000 CVE-2024-5160,0,0,761bdadb9ac3f89d156978519ca326c5704c62592c7f03e703ecc7e802a865d7,2024-07-03T02:08:36.807000 CVE-2024-5161,0,0,f120c7db938e25c7983d6c400da502880d5ffbc93ab4e5e05351c3fca8fbd038,2024-07-24T17:54:42.387000 CVE-2024-5162,0,0,b916c521cfe3c1fb21956086b784f2a8541eeb514496e084206ecc726f921efe,2024-07-24T17:53:33.277000 -CVE-2024-51626,0,1,18e5c511939be2558be617df0507b9f12fa7d0e50de2af2ea7459c488b192636,2024-11-04T18:50:05.607000 +CVE-2024-51626,0,0,18e5c511939be2558be617df0507b9f12fa7d0e50de2af2ea7459c488b192636,2024-11-04T18:50:05.607000 CVE-2024-5163,0,0,1f45f157a740def8c3f1c2e097025198bc2166983108f63600058e7c57408d30,2024-08-21T06:15:07.277000 CVE-2024-5165,0,0,2b7469c3d25cc1e03e7fcca1607bc78daf489d82c018a0fbc4f3b815c328cf85,2024-05-24T01:15:30.977000 CVE-2024-5166,0,0,5c544eab21844e01fabd3874ed7776a55145987bd3a510311ad16f12f33bd2bc,2024-05-22T18:59:20.240000 -CVE-2024-51661,0,1,9622f3634ba493f615ed2927ef92c179ee0dcb7280d813f52b441be81e048a8e,2024-11-04T18:50:05.607000 -CVE-2024-51665,0,1,56bf9fcd202b3ea9001e454522be11bd5978f32ce441602f00aa1bbb031128ad,2024-11-04T18:50:05.607000 +CVE-2024-51661,0,0,9622f3634ba493f615ed2927ef92c179ee0dcb7280d813f52b441be81e048a8e,2024-11-04T18:50:05.607000 +CVE-2024-51665,0,0,56bf9fcd202b3ea9001e454522be11bd5978f32ce441602f00aa1bbb031128ad,2024-11-04T18:50:05.607000 CVE-2024-5167,0,0,a26d674346a63d8730649864e3fcc22e33fb8b5877ed990bcd49874aef8d8c48,2024-08-01T13:59:41.660000 -CVE-2024-51672,0,1,02f34342c7a243fc55088e6039256e7de98338fcdc98f8b95fb11a31d6c364d4,2024-11-04T18:50:05.607000 -CVE-2024-51677,0,1,3a3f242a7ff6f80c9e763fd44464d5f149926414812ec89ee8be44bce14d131b,2024-11-04T18:50:05.607000 -CVE-2024-51678,0,1,ca8e2772685847dbfa010764deeffa0341c2b977902afc49a77a90e54643e432,2024-11-04T18:50:05.607000 +CVE-2024-51672,0,0,02f34342c7a243fc55088e6039256e7de98338fcdc98f8b95fb11a31d6c364d4,2024-11-04T18:50:05.607000 +CVE-2024-51677,0,0,3a3f242a7ff6f80c9e763fd44464d5f149926414812ec89ee8be44bce14d131b,2024-11-04T18:50:05.607000 +CVE-2024-51678,0,0,ca8e2772685847dbfa010764deeffa0341c2b977902afc49a77a90e54643e432,2024-11-04T18:50:05.607000 CVE-2024-5168,0,0,cbe1b6c96aef7b506dd526cf00951c936dfc5233fd9563b4af0bf7fdab7a5899,2024-05-24T01:15:30.977000 -CVE-2024-51680,0,1,6a0e4dc35b32086a537bd54899180c80ad01a8c6290d199cc8c4684b6784a87c,2024-11-04T18:50:05.607000 -CVE-2024-51681,0,1,b2240f3aac7cf521a8583b6a4f2d4157a3e0c7b650f696a8fe56bed46dd560b4,2024-11-04T18:50:05.607000 -CVE-2024-51682,0,1,12881b8ca373787a3c057bd1e8d9525a2539983e5a3ed6d65b201c2ff661d1fb,2024-11-04T18:50:05.607000 -CVE-2024-51683,0,1,0f4d7566656d1bf0660d68c0ecfc6656f45f0a02e4da79c690f191f19760df22,2024-11-04T18:50:05.607000 -CVE-2024-51685,0,1,7b28dffec4e6705aaec1bb56354bbb1411bb79518c9cb091d87049e01af7b433,2024-11-04T18:50:05.607000 +CVE-2024-51680,0,0,6a0e4dc35b32086a537bd54899180c80ad01a8c6290d199cc8c4684b6784a87c,2024-11-04T18:50:05.607000 +CVE-2024-51681,0,0,b2240f3aac7cf521a8583b6a4f2d4157a3e0c7b650f696a8fe56bed46dd560b4,2024-11-04T18:50:05.607000 +CVE-2024-51682,0,0,12881b8ca373787a3c057bd1e8d9525a2539983e5a3ed6d65b201c2ff661d1fb,2024-11-04T18:50:05.607000 +CVE-2024-51683,0,0,0f4d7566656d1bf0660d68c0ecfc6656f45f0a02e4da79c690f191f19760df22,2024-11-04T18:50:05.607000 +CVE-2024-51685,0,0,7b28dffec4e6705aaec1bb56354bbb1411bb79518c9cb091d87049e01af7b433,2024-11-04T18:50:05.607000 CVE-2024-5169,0,0,882a6aa1fee4c71f4df51ce353ec6b27431ae776e2b2b23b3c5ba8c59ca21797,2024-08-02T15:00:10.200000 CVE-2024-5170,0,0,0357b8fbab1b76f01ca0dd625bf87ec8b80f7fd2d35927c69b68200ba07a11a4,2024-09-27T18:23:43.833000 CVE-2024-5171,0,0,dd574bf92e93c62d270c5e3b0cb384556e01dba1d43a5b9db2a02845fa564cb4,2024-07-23T18:09:56.753000 @@ -265298,7 +265308,7 @@ CVE-2024-6076,0,0,f75c5e0cd2d3ad9cf3dc79d2ee6835febd9e3e1415fea3908528543dbed7f7 CVE-2024-6077,0,0,c4974f2c49bcf99698e08f718ed154b51d3cf73496f9c975d2598a4132600a7c,2024-09-19T14:31:18.463000 CVE-2024-6078,0,0,a48aa92a89b3d2f828f8a341ad2ce6a914a21f3587846f530cf16dc8ed30ed69,2024-08-15T13:01:10.150000 CVE-2024-6079,0,0,a625435aeb66a78a45b154461c249f77137a161767aad8b8e49464f09120384a,2024-08-14T02:07:05.410000 -CVE-2024-6080,0,0,b3887fb3b4fd5f293274d3ad5dd29ece87266c462cba473fc4b929473be2cb40,2024-09-20T00:27:34.317000 +CVE-2024-6080,0,1,55d7faa358e2c45f28e6431d41c784f80ed1049266aaeb5cc9ce768b54dd30d9,2024-11-04T19:15:07.323000 CVE-2024-6082,0,0,013046d87182f03b6cbc3b5958c2d5ce3b9ca55b4984041383e50b43bd3564b5,2024-09-13T18:29:30.637000 CVE-2024-6083,0,0,6d9bb4abe3add5a9314088c73da6990ced956f79d42ec66733f8e068d49bd5c9,2024-09-16T13:21:53.467000 CVE-2024-6084,0,0,6faa90c930997c0aec12adfd29df5cf00c8158d82ed8686290b073db2ac7ae60,2024-08-08T16:20:42.537000 @@ -265698,7 +265708,7 @@ CVE-2024-6532,0,0,34d446197f804dcbdd8feccdfe721cd1c46fe7ee3b5e0da65e1be9d287c7b6 CVE-2024-6533,0,0,66400252f24e50c2d9b1e3ed6e622d7f7b7af745f22a620964464c66ff668430,2024-08-19T18:13:59.457000 CVE-2024-6534,0,0,0cc2422c4acf0879987370c9bde0fddfc0c65c819154f83a709538e35fb27fca,2024-08-19T18:17:15.110000 CVE-2024-6535,0,0,3933087fb45ecc6b0ecc9b074f4274211c579214228b2b0b3595456c11ddf683,2024-09-18T09:15:06.037000 -CVE-2024-6536,0,1,5e444df1a0fc212775b8c0c5f4ed6bdaab41fc9aad6351cde84edfd09cbddff8,2024-11-04T17:35:41.007000 +CVE-2024-6536,0,0,5e444df1a0fc212775b8c0c5f4ed6bdaab41fc9aad6351cde84edfd09cbddff8,2024-11-04T17:35:41.007000 CVE-2024-6539,0,0,81a7a773476044a536e1904849aff55df114add8144e8265b917f8120b92d867,2024-07-11T14:56:20.733000 CVE-2024-6540,0,0,f13af52637070826766869c9a967d13110a057955f51f107eb0d0f88b4032338,2024-07-16T18:05:37.267000 CVE-2024-6542,0,0,bb318408eda9e57d4fba1c49251ffc615a87c88f77b6516a9b3efcf954de0990,2024-08-14T16:32:34.753000 @@ -266727,7 +266737,7 @@ CVE-2024-7799,0,0,00b687245dbb834ce768a34773e6d247f116248fb1170e2cff00e71dda4a9f CVE-2024-7800,0,0,648c15c60d543078675ed09d23bcee51c2c4405b9726708dfb6ef04a08b9ac6a,2024-08-19T16:50:39.993000 CVE-2024-7801,0,0,bed682b6222cb0c9f77cc5a0751ff36b1d3476d22f8b98362a2b5472dbe7cc5b,2024-10-17T15:19:27.053000 CVE-2024-7805,0,0,135d6da17dfa4c84aefd569e9d92e16548bde418c54a07f703c8b45a0b8c6cd9,2024-09-11T14:15:13.560000 -CVE-2024-7807,0,0,0e2a44959ae3bb0b2cc26db4ea86f0388763df06b2c8c2674bf1a9f0faa7707b,2024-10-29T14:35:21.773000 +CVE-2024-7807,0,1,2b05161833902ee1c6dae96b01f5274ddcf91f23e94abe55093a1d69ee2cc8f0,2024-11-04T20:47:21.767000 CVE-2024-7808,0,0,969711922c4e0f4c36191148ae8c5b992516373bcf5aef167544cc98dd0f6ef8,2024-08-19T18:07:44.270000 CVE-2024-7809,0,0,60527746c8c58a9337e860dd0533a4fd053da5d7ab44e27861411efc76582427,2024-08-19T18:11:18.537000 CVE-2024-7810,0,0,501ecfcc11cf2cc73802b4d3933bb0470270948711ab4bd8700d22a848dae6e6,2024-08-19T18:12:14.090000 @@ -267673,7 +267683,7 @@ CVE-2024-9142,0,0,143ad6ae744fa593642be06138ba59f5a3ac64fb0a6f22e5d0ade004fddfc1 CVE-2024-9143,0,0,72af6f2ce64369da19b732394a82c347f40298441d275f9835e3a379d1574e5a,2024-10-18T12:53:04.627000 CVE-2024-9145,0,0,666aa1000539c0391187e882757d18372cd0bce4cc6b153bd670793f8325f34a,2024-10-04T13:51:25.567000 CVE-2024-9146,0,0,dd225bf1435696d6b519369d4a8422b91a9f46c7eecd30c6fd592ac6ec22d53f,2024-10-07T17:48:28.117000 -CVE-2024-9147,0,1,af3a18dc56636dcac9819b544ade5f1c66419f69c2dffcac870f8567de9095b4,2024-11-04T18:50:05.607000 +CVE-2024-9147,0,0,af3a18dc56636dcac9819b544ade5f1c66419f69c2dffcac870f8567de9095b4,2024-11-04T18:50:05.607000 CVE-2024-9148,0,0,54e87e3f2b6f69d5080b11c080fcfce17264899c6147cd6032f168b6e8923e92,2024-09-30T17:34:12.760000 CVE-2024-9155,0,0,e7852dec1d1a0cf6fb02c65df23cf83432ff26399350f16bb6b49f28f4d3005e,2024-09-30T12:46:20.237000 CVE-2024-9156,0,0,a219412140ed669efa4745f4f28cc6c7900dfc19ec3ad1e09069c0d323d2ba8e,2024-10-15T14:40:45.093000 @@ -267750,7 +267760,7 @@ CVE-2024-9282,0,0,55016f43807b8bd2c7051116cb1e6375d4d2b410c86e99396c4800f5d9843f CVE-2024-9283,0,0,a5233c3b589826e3e09dfcafb866e56b060b301af37e2de0e699930a9008fdfe,2024-09-30T12:45:57.823000 CVE-2024-9284,0,0,e077aa9b3331db7cd8049b8d7f3273d870b80909d1916943a385cf9659e49d1c,2024-09-30T12:45:57.823000 CVE-2024-9286,0,0,c80c050c0c81c8eb62f751fd5198d6e48229164de5cbb6d6309b72371d27a18e,2024-10-10T12:51:56.987000 -CVE-2024-9287,0,1,c2a7f3a505d28ef46ad4e1f9eb56973bf151ebebc64c28ba273663c28e99f565,2024-11-04T18:15:05.627000 +CVE-2024-9287,0,0,c2a7f3a505d28ef46ad4e1f9eb56973bf151ebebc64c28ba273663c28e99f565,2024-11-04T18:15:05.627000 CVE-2024-9289,0,0,06a6a34a1543252ca19c46e940aea37797a21c2bfa8e6ac1935900ffb41badd0,2024-10-07T18:25:21.380000 CVE-2024-9291,0,0,e3e60de040a8e25c6f8c9bce959d91ab605417a7bb6a76f30e8af4524d979a49,2024-10-07T16:13:44.433000 CVE-2024-9292,0,0,a7bdba47009ed945081e4090ae3ff19a132a10f1ea840ac7ca884beb20641078,2024-10-10T12:57:21.987000 @@ -267779,8 +267789,8 @@ CVE-2024-9320,0,0,f09699099fcbae251236569e3b80f87aa18c611c7a9a81741339a3f6ea9ef5 CVE-2024-9321,0,0,a14c3ea501d5675f270df02cf8d21d7014c48fd4251b0c1b324165be69ef0bfa,2024-10-01T13:28:20.110000 CVE-2024-9322,0,0,e95e70788b8a6a49aa85018220569b500de2dbb1919ebd97b01b91f0a91cc54e,2024-10-02T13:32:17.277000 CVE-2024-9323,0,0,890a6430432a24ca83a099564288fe0c5e63b6dff3bdabb06ff3376334cef2ee,2024-10-01T12:55:17.873000 -CVE-2024-9324,0,0,4c0537cf61c0426b532aa33deca0a824159725e98a7fec467a1ac6ae13e97815,2024-10-07T16:05:50.067000 -CVE-2024-9325,0,0,ccc79b9638441f145a359aa7c5b9719b94016aabf379bd429a974f7b1e6fff5f,2024-10-07T16:06:49.923000 +CVE-2024-9324,0,1,c90a31597fc72ee8ba44787e48ca451aefb58f6936dc59b8b78a2afd7dcaf01e,2024-11-04T19:15:07.587000 +CVE-2024-9325,0,1,f1bc3af7edbc900b325a37f1afc7e0ab8457fdb779f2396948205355d49dfd14,2024-11-04T19:15:07.790000 CVE-2024-9326,0,0,ac353111de081e75045512f212a47527fdd858d5e54a48eba79a4b87a1838dd8,2024-10-02T13:33:16.530000 CVE-2024-9327,0,0,9bb62fae114b1c29588ad2672d640859a17a9f3af7375a799fc34e218e9d39c9,2024-10-02T12:57:17.787000 CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000