Auto-Update: 2024-12-11T00:55:46.185644+00:00

This commit is contained in:
cad-safe-bot 2024-12-11 00:59:07 +00:00
parent 9b15234bdf
commit 2392b725c7
37 changed files with 3827 additions and 484 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11651",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-25T03:15:07.973",
"lastModified": "2024-11-25T03:15:07.973",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-10T23:12:34.057",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,24 +142,132 @@
"value": "CWE-77"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD524C6-198C-405D-BA83-76C4D8F94EB0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E8D70A-F5C2-4714-A398-26F7700D7E94"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
}
]
}
]
}
],
"references": [
{
"url": "https://k9u7kv33ub.feishu.cn/wiki/XIepwv7goiCcYxk5QAgc8Q2LnMc?from=from_copylink",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.285972",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.285972",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.446623",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11652",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-25T03:15:08.533",
"lastModified": "2024-11-25T03:15:08.533",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-10T23:13:23.947",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,24 +142,133 @@
"value": "CWE-77"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD524C6-198C-405D-BA83-76C4D8F94EB0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E8D70A-F5C2-4714-A398-26F7700D7E94"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
}
]
}
]
}
],
"references": [
{
"url": "https://k9u7kv33ub.feishu.cn/wiki/Rf7wwXMpQiJkp8kp4pmcZb2tnPe",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.285973",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.285973",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.446629",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11653",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-25T04:15:05.337",
"lastModified": "2024-11-25T04:15:05.337",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-10T23:13:40.990",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,24 +142,133 @@
"value": "CWE-77"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD524C6-198C-405D-BA83-76C4D8F94EB0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E8D70A-F5C2-4714-A398-26F7700D7E94"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
}
]
}
]
}
],
"references": [
{
"url": "https://k9u7kv33ub.feishu.cn/wiki/AHPnwdCaoiaQ3fkrdeUcqPfLnEd",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.285974",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.285974",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.446633",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11654",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-25T04:15:05.577",
"lastModified": "2024-11-25T04:15:05.577",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-10T23:13:58.150",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,24 +142,133 @@
"value": "CWE-77"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD524C6-198C-405D-BA83-76C4D8F94EB0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E8D70A-F5C2-4714-A398-26F7700D7E94"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
}
]
}
]
}
],
"references": [
{
"url": "https://k9u7kv33ub.feishu.cn/wiki/YrKfwHqLjijPeYkMTQfcdhrBnyg?from=from_copylink",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.285975",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.285975",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.446637",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11655",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-25T05:15:09.447",
"lastModified": "2024-11-25T05:15:09.447",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-10T23:14:37.130",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,24 +142,133 @@
"value": "CWE-77"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD524C6-198C-405D-BA83-76C4D8F94EB0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E8D70A-F5C2-4714-A398-26F7700D7E94"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
}
]
}
]
}
],
"references": [
{
"url": "https://k9u7kv33ub.feishu.cn/wiki/PpM6w3TF8ilK3Ek5RLqcLPUrn6c",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.285976",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.285976",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.446638",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11656",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-25T05:15:10.387",
"lastModified": "2024-11-25T05:15:10.387",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-10T23:14:44.037",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,24 +142,133 @@
"value": "CWE-77"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD524C6-198C-405D-BA83-76C4D8F94EB0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E8D70A-F5C2-4714-A398-26F7700D7E94"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
}
]
}
]
}
],
"references": [
{
"url": "https://k9u7kv33ub.feishu.cn/wiki/FBJCwjFPZiY4aakElh6cwF25nff",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.285977",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.285977",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.446639",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11657",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-25T06:15:06.073",
"lastModified": "2024-11-25T06:15:06.073",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-10T23:14:54.933",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,24 +142,133 @@
"value": "CWE-77"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD524C6-198C-405D-BA83-76C4D8F94EB0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E8D70A-F5C2-4714-A398-26F7700D7E94"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
}
]
}
]
}
],
"references": [
{
"url": "https://k9u7kv33ub.feishu.cn/wiki/RURswTkepiuKCzkGMd2cA1M2nNc",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.285978",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.285978",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.446640",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11658",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-25T06:15:06.593",
"lastModified": "2024-11-25T06:15:06.593",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-10T23:15:02.890",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,24 +142,133 @@
"value": "CWE-77"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD524C6-198C-405D-BA83-76C4D8F94EB0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E8D70A-F5C2-4714-A398-26F7700D7E94"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
}
]
}
]
}
],
"references": [
{
"url": "https://k9u7kv33ub.feishu.cn/wiki/VyKHwBhydiyeuDkATo9cFZTDnHb",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.285979",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.285979",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.446641",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11659",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-25T07:15:04.837",
"lastModified": "2024-11-25T07:15:04.837",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-10T23:15:14.893",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,24 +142,133 @@
"value": "CWE-77"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:enh1350ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0AD524C6-198C-405D-BA83-76C4D8F94EB0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:enh1350ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F4E8D70A-F5C2-4714-A398-26F7700D7E94"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens500-ac_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3C6AF42E-8CD1-418F-906E-65959337E39F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:eens500-ac:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0FCCF839-A118-49CC-B492-B07D6608A724"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:engeniustech:ens620ext_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "170D8BD6-2C90-4BB5-A6AA-DB18A743C788"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:engeniustech:ens620ext:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CB739DD5-DDF0-4AA3-8114-8D31A52EE71F"
}
]
}
]
}
],
"references": [
{
"url": "https://k9u7kv33ub.feishu.cn/wiki/OhR6w0THjiFeV1kSfZncaCxTn7f?from=from_copylink",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.285980",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.285980",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.446642",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12000",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-30T12:15:17.200",
"lastModified": "2024-11-30T12:15:17.200",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-10T23:16:02.667",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -122,28 +142,74 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3CB4C2-E5C6-4136-B3A8-418484B48FD2"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/jaychou8023/cve/blob/main/xss3.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.286415",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.286415",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.453717",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12001",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-30T13:15:04.140",
"lastModified": "2024-11-30T13:15:04.140",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-10T23:16:24.893",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -122,28 +142,74 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anisha:wazifa_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0017ACDA-AB2A-4C45-81E8-8646C3FF9CE3"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/jaychou8023/cve/blob/main/xss4.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.286416",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.286416",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.453721",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12002",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-30T13:15:04.610",
"lastModified": "2024-11-30T13:15:04.610",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-10T23:21:19.827",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -111,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -122,28 +142,192 @@
"value": "CWE-476"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:fh451_firmware:1.0.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "645BB5C8-F542-4D2A-81EB-168982028C42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:fh451_firmware:1.0.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7587331C-8CDC-43FA-869B-CACC9E39CC4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:fh451_firmware:1.0.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A7521568-7BCD-43F8-9F20-440DF3919D5D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:fh451:-:*:*:*:*:*:*:*",
"matchCriteriaId": "97A8BF83-E42A-4D6B-A52D-146FE1AEE2B0"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:fh1201_firmware:1.2.0.8\\(8155\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0368A8C0-C2C0-477E-A0C2-4D941B963520"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:fh1201_firmware:1.2.0.14\\(408\\)_en:*:*:*:*:*:*:*",
"matchCriteriaId": "84F68F46-077A-48C8-AA85-342A2264BF1C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:fh1201:-:*:*:*:*:*:*:*",
"matchCriteriaId": "67A1C59D-AE12-4410-9173-B9B9A72B3AE4"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:fh1202_firmware:1.2.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "9DA584AC-7E1F-4FF7-91EA-F82AC2D2D3CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:fh1202_firmware:1.2.0.14\\(408\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B9FD9D0A-39F4-4AD8-AEE0-71C9E77D2799"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:fh1202_firmware:1.2.0.14\\(408\\)_en:*:*:*:*:*:*:*",
"matchCriteriaId": "9A318B1F-C8E5-4C39-A1B3-83C5693CEB61"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:fh1202:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A632A11-60A0-457C-A039-BED32F83BD52"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:fh1206_firmware:1.2.0.8\\(8155\\):*:*:*:*:*:*:*",
"matchCriteriaId": "066BD21A-2694-474D-B885-6E9A2A1DBCFF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:fh1206:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1412759D-05ED-4D6C-93C3-FE59F6A1490E"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Kalvin2077/tenda-fh-cve",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.286417",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.286417",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.453974",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tenda.com.cn/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12188",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-05T01:15:04.943",
"lastModified": "2024-12-05T01:15:04.943",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-10T23:18:39.680",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in 1000 Projects Library Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /brains/stu.php. The manipulation of the argument useri leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en 1000 Projects Library Management System 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /brains/stu.php. La manipulaci\u00f3n del argumento useri conduce a una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -118,28 +142,74 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:1000projects:library_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F7B5BC36-12E9-4DE1-B238-C53C11EEAFB7"
}
]
}
]
}
],
"references": [
{
"url": "https://1000projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/SkGoing/CVE-repo_00/issues/4",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.286909",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.286909",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.455061",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12228",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-05T14:15:20.123",
"lastModified": "2024-12-05T14:15:20.123",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-10T23:19:04.773",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in PHPGurukul Complaint Management System 1.0. Affected is an unknown function of the file /admin/user-search.php. The manipulation of the argument search leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Complaint Management System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /admin/user-search.php. La manipulaci\u00f3n del argumento search provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -118,28 +142,74 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*",
"matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/PunyHunter/CVE/issues/2",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.286974",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.286974",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.455059",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12229",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-05T15:15:09.050",
"lastModified": "2024-12-05T15:15:09.050",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-10T23:19:31.487",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in PHPGurukul Complaint Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/complaint-search.php. The manipulation of the argument search leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Complaint Management System 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /admin/complaint-search.php. La manipulaci\u00f3n del argumento search conduce a una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,28 +142,74 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*",
"matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/qiyes233/CVE/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.286975",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.286975",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.455065",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12230",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-05T15:15:09.280",
"lastModified": "2024-12-05T15:15:09.280",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-10T23:19:46.887",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in PHPGurukul Complaint Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/subcategory.php. The manipulation of the argument category leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en PHPGurukul Complaint Management System 1.0. Este problema afecta a algunas funciones desconocidas del archivo /admin/subcategory.php. La manipulaci\u00f3n del argumento category provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,28 +142,74 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*",
"matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/wqywfvc/CVE/issues/2",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.286976",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.286976",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.456517",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12233",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-05T17:15:11.037",
"lastModified": "2024-12-05T17:15:11.037",
"vulnStatus": "Received",
"lastModified": "2024-12-10T23:24:57.237",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Online Notice Board up to 1.0 and classified as critical. This issue affects some unknown processing of the file /registration.php of the component Profile Picture Handler. The manipulation of the argument img leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en code-projects Online Notice Board hasta la versi\u00f3n 1.0 y se ha clasificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /registration.php del componente Profile Picture Handler. La manipulaci\u00f3n del argumento img provoca una carga sin restricciones. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,28 +142,74 @@
"value": "CWE-434"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabianros:online_notice_board:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F3CCB274-6AA2-45A3-BA71-B63D91134DED"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/LamentXU123/cve/blob/main/RCE1.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.286979",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.286979",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.456458",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12234",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-05T17:15:11.213",
"lastModified": "2024-12-05T17:15:11.213",
"vulnStatus": "Received",
"lastModified": "2024-12-10T23:25:36.387",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in 1000 Projects Beauty Parlour Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/edit-customer-detailed.php. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en 1000 Projects Beauty Parlour Management System 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /admin/edit-customer-detailed.php. La manipulaci\u00f3n del nombre del argumento provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -118,28 +142,74 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:1000projects:beauty_parlour_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4CC5BB9B-86BF-4DDC-9A70-B48A4707A48E"
}
]
}
]
}
],
"references": [
{
"url": "https://1000projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Hacker0xone/CVE/issues/17",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.286980",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.286980",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.456519",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12343",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-08T10:15:04.637",
"lastModified": "2024-12-08T10:15:04.637",
"vulnStatus": "Received",
"lastModified": "2024-12-10T23:26:52.047",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in TP-Link VN020 F3v(T) TT_V6.2.1021. Affected is an unknown function of the file /control/WANIPConnection of the component SOAP Request Handler. The manipulation of the argument NewConnectionType leads to buffer overflow. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en TP-Link VN020 F3v(T) TT_V6.2.1021. Se ve afectada una funci\u00f3n desconocida del archivo /control/WANIPConnection del componente SOAP Request Handler. La manipulaci\u00f3n del argumento NewConnectionType provoca un desbordamiento del b\u00fafer. El ataque debe realizarse dentro de la red local. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -120,26 +144,72 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:vn020_f3v_firmware:6.2.1021:*:*:*:*:*:*:*",
"matchCriteriaId": "08BBB07D-693A-4491-A084-F9DC21E5B94E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:vn020_f3v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C2BBC06-4EC1-4568-9732-64E087F27332"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Zephkek/TP-WANPunch/blob/main/README.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.287262",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.287262",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.446212",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tp-link.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12344",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-08T23:15:04.980",
"lastModified": "2024-12-08T23:15:04.980",
"vulnStatus": "Received",
"lastModified": "2024-12-10T23:28:05.760",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in TP-Link VN020 F3v(T) TT_V6.2.1021. This affects an unknown part of the component FTP USER Command Handler. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en TP-Link VN020 F3v(T) TT_V6.2.1021. Afecta a una parte desconocida del componente FTP USER Command Handler. La manipulaci\u00f3n provoca la corrupci\u00f3n de la memoria. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -107,35 +131,92 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:vn020_f3v_firmware:6.2.1021:*:*:*:*:*:*:*",
"matchCriteriaId": "08BBB07D-693A-4491-A084-F9DC21E5B94E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:vn020_f3v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3C2BBC06-4EC1-4568-9732-64E087F27332"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Zephkek/TP-1450",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.287265",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.287265",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.452658",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.tp-link.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12352",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-09T02:15:18.090",
"lastModified": "2024-12-09T02:15:18.090",
"vulnStatus": "Received",
"lastModified": "2024-12-10T23:31:47.427",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in TOTOLINK EX1800T 9.1.0cu.2112_B20220316. This vulnerability affects the function sub_40662C of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument ssid leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en TOTOLINK EX1800T 9.1.0cu.2112_B20220316. Esta vulnerabilidad afecta a la funci\u00f3n sub_40662C del archivo /cgi-bin/cstecgi.cgi. La manipulaci\u00f3n del argumento ssid provoca un desbordamiento de b\u00fafer en la regi\u00f3n stack de la memoria . El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,28 +142,85 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:ex1800t_firmware:9.1.0cu.2112_b20220316:*:*:*:*:*:*:*",
"matchCriteriaId": "0A42AB5D-BBE3-46C5-B60E-0C5D0BE5BD61"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:ex1800t:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4ECDCF8F-01EE-4B54-AE5F-8793D54BB5A2"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/zheng0064/cve/blob/main/StackOverFlow-CVE.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.287272",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.287272",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.457392",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12353",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-09T02:15:18.920",
"lastModified": "2024-12-09T02:15:18.920",
"vulnStatus": "Received",
"lastModified": "2024-12-10T23:37:06.613",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in SourceCodester Phone Contact Manager System 1.0. This issue affects the function UserInterface::MenuDisplayStart of the component User Menu. The manipulation of the argument name leads to improper input validation. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en SourceCodester Phone Contact Manager System 1.0. Este problema afecta a la funci\u00f3n UserInterface::MenuDisplayStart del componente User Menu. La manipulaci\u00f3n del argumento name provoca una validaci\u00f3n de entrada incorrecta. Es necesario realizar un ataque local. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -107,35 +131,81 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:razormist:phone_contact_manager_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0DB2815-489F-42F1-8CFA-9DB8CA0E1501"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/jasontimwong/CVE/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.287273",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.287273",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.457438",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12354",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-09T02:15:19.120",
"lastModified": "2024-12-09T02:15:19.120",
"vulnStatus": "Received",
"lastModified": "2024-12-10T23:36:25.740",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in SourceCodester Phone Contact Manager System 1.0. Affected is the function UserInterface::MenuDisplayStart of the component User Menu. The manipulation leads to buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en SourceCodester Phone Contact Manager System 1.0. La funci\u00f3n UserInterface::MenuDisplayStart del componente User Menu est\u00e1 afectada. La manipulaci\u00f3n provoca un desbordamiento de b\u00fafer. Es posible lanzar el ataque en el host local. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,28 +142,74 @@
"value": "CWE-120"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:razormist:phone_contact_manager_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0DB2815-489F-42F1-8CFA-9DB8CA0E1501"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/jasontimwong/CVE/issues/2",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.287274",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.287274",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.457477",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12355",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-09T02:15:19.300",
"lastModified": "2024-12-09T02:15:19.300",
"vulnStatus": "Received",
"lastModified": "2024-12-10T23:36:03.883",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in SourceCodester Phone Contact Manager System 1.0 and classified as problematic. Affected by this vulnerability is the function ContactBook::adding of the file ContactBook.cpp. The manipulation leads to improper input validation. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en SourceCodester Phone Contact Manager System 1.0 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n ContactBook::adding del archivo ContactBook.cpp. La manipulaci\u00f3n provoca una validaci\u00f3n de entrada incorrecta. El ataque debe abordarse localmente. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -107,35 +131,78 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:razormist:phone_contact_manager_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0DB2815-489F-42F1-8CFA-9DB8CA0E1501"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/TinkAnet/cve/blob/main/BOF2.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.287275",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.287275",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.457864",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12357",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-09T05:15:06.973",
"lastModified": "2024-12-09T05:15:06.973",
"vulnStatus": "Received",
"lastModified": "2024-12-10T23:35:15.660",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Best House Rental Management System 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument page leads to file inclusion. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en SourceCodester Best House Rental Management System 1.0 y se clasific\u00f3 como problem\u00e1tica. Este problema afecta a algunas funciones desconocidas del archivo /index.php. La manipulaci\u00f3n del argumento page conduce a la inclusi\u00f3n de archivos. El ataque puede iniciarse de forma remota. El exploit se ha revelado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
@ -107,35 +131,77 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-73"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mayurik:best_house_rental_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A7D6CEC7-5EE1-4052-B0E2-093C40418760"
}
]
}
]
}
],
"references": [
{
"url": "https://pastebin.com/Qupf8YbH",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?ctiid.287276",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.287276",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.457505",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12358",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-09T05:15:07.320",
"lastModified": "2024-12-09T05:15:07.320",
"vulnStatus": "Received",
"lastModified": "2024-12-10T23:34:20.467",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in WeiYe-Jing datax-web 2.1.1. It has been classified as critical. This affects an unknown part of the file /api/job/add/. The manipulation of the argument glueSource leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en WeiYe-Jing datax-web 2.1.1. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo /api/job/add/. La manipulaci\u00f3n del argumento glueSource provoca la inyecci\u00f3n de comandos en el sistema operativo. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,24 +142,67 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:datax-web_project:datax-web:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "68046A1A-9CA3-464C-BD18-E73CC16C91DA"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/jxp98/VulResearch/blob/main/2024/12/1.Datax-Web%20-%20Remote%20Code%20Execution.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.287277",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.287277",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.457865",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12359",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-09T05:15:07.630",
"lastModified": "2024-12-09T05:15:07.630",
"vulnStatus": "Received",
"lastModified": "2024-12-10T23:34:02.110",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Admin Dashboard 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /vendor_management.php. The manipulation of the argument username leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting product names."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en Admin Dashboard 1.0. Se ha declarado como problem\u00e1tica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /vendor_management.php. La manipulaci\u00f3n del argumento username provoca cross site scripting. El ataque se puede iniciar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. El aviso inicial para investigadores menciona nombres de productos contradictorios."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,28 +142,71 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:admin_dashboard:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E47E6451-4F39-4F1E-8D0F-C7F9EE16AB27"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://hackmd.io/@salt9487/HyTgLR-V1l",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.287278",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.287278",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.458634",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12360",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-09T05:15:07.920",
"lastModified": "2024-12-09T05:15:07.920",
"vulnStatus": "Received",
"lastModified": "2024-12-10T23:33:47.773",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Online Class and Exam Scheduling System 1.0. It has been rated as critical. This issue affects some unknown processing of the file class_update.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en Online Class and Exam Scheduling System 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo class_update.php. La manipulaci\u00f3n del argumento id conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha revelado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,28 +142,74 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:online_class_and_exam_scheduling_system_project:online_class_and_exam_scheduling_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E869E51B-CF80-4761-B288-EBE89D8DA973"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/bjtyyy/CVE/blob/main/Online%20Class%20and%20Exam%20Scheduling%20System.docx",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.287279",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.287279",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.458891",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2058",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-01T11:15:08.237",
"lastModified": "2024-11-21T09:08:57.057",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-10T23:23:40.153",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,38 +96,83 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/Unauthenticated%20Arbitrary%20File%20Upload.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/Surya2Developer%20Online_shopping_-system/SOURCECODESTER%20Petrol%20pump%20management%20software/Unauthenticated%20Arbitrary%20File%20Upload.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.255373",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.255373",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/Unauthenticated%20Arbitrary%20File%20Upload.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/Surya2Developer%20Online_shopping_-system/SOURCECODESTER%20Petrol%20pump%20management%20software/Unauthenticated%20Arbitrary%20File%20Upload.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.255373",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.255373",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2059",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-01T12:15:48.890",
"lastModified": "2024-11-21T09:08:57.203",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-10T23:24:34.477",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,30 +96,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mayurik:petrol_pump_management:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A334E610-B489-4A7C-B31A-1132B26FFF0B"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/service_crud.php%20Unauthenticated%20Arbitrary%20File%20Upload.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.255374",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.255374",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Petrol%20pump%20management%20software/service_crud.php%20Unauthenticated%20Arbitrary%20File%20Upload.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.255374",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.255374",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25149",
"sourceIdentifier": "security@liferay.com",
"published": "2024-02-20T07:15:10.557",
"lastModified": "2024-11-21T09:00:21.293",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-10T23:03:54.853",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
@ -49,16 +69,176 @@
"value": "CWE-863"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.2",
"matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
"matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
"matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
"matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
"matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
"matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
"matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
"matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
"matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
"matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
"matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
"matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
"matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
"matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
"matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
"matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
"matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
"matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
"matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
"matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
"matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
"matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
"matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
"matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
"matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.4.2",
"matchCriteriaId": "69440C19-B9E7-41F3-B731-B5C7E37C718A"
}
]
}
]
}
],
"references": [
{
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25149",
"source": "security@liferay.com"
"source": "security@liferay.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25149",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25150",
"sourceIdentifier": "security@liferay.com",
"published": "2024-02-20T08:15:07.290",
"lastModified": "2024-11-21T09:00:21.417",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-10T23:01:58.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -49,16 +69,206 @@
"value": "CWE-201"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.2",
"matchCriteriaId": "AF8EBC77-BA94-4AA8-BAF0-D1E3C9146459"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:-:*:*:*:*:*:*",
"matchCriteriaId": "0DCF7F39-A198-4F7E-84B7-90C88C1BAA96"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_1:*:*:*:*:*:*",
"matchCriteriaId": "E7E68DF8-749B-4284-A7C9-929701A86B36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_10:*:*:*:*:*:*",
"matchCriteriaId": "340DF1FE-5720-4516-BA51-F2197A654409"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_11:*:*:*:*:*:*",
"matchCriteriaId": "97E155DE-05C6-4559-94A8-0EFEB958D0C9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_12:*:*:*:*:*:*",
"matchCriteriaId": "0635FB5F-9C90-49C7-A9EF-00C0396FCCAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_13:*:*:*:*:*:*",
"matchCriteriaId": "77523B76-FC26-41B1-A804-7372E13F4FB2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_14:*:*:*:*:*:*",
"matchCriteriaId": "B15397B8-5087-4239-AE78-D3C37D59DE83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_15:*:*:*:*:*:*",
"matchCriteriaId": "311EE92A-0EEF-4556-A52F-E6C9522FA2DD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_16:*:*:*:*:*:*",
"matchCriteriaId": "49501C9E-D12A-45E0-92F3-8FD5FDC6D3CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_17:*:*:*:*:*:*",
"matchCriteriaId": "F2B55C77-9FAA-4E14-8CEF-9C4CAC804007"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_18:*:*:*:*:*:*",
"matchCriteriaId": "54E499E6-C747-476B-BFE2-C04D9F8744F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_2:*:*:*:*:*:*",
"matchCriteriaId": "7CECAA19-8B7F-44C8-8059-6D4F2105E196"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_3:*:*:*:*:*:*",
"matchCriteriaId": "68CBCEEB-7C28-4769-813F-3F01E33D2E08"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_4:*:*:*:*:*:*",
"matchCriteriaId": "C0CB4927-A361-4DFA-BDB8-A454EA2894AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_5:*:*:*:*:*:*",
"matchCriteriaId": "B2B771B7-D5CB-4778-A3A8-1005E4EE134C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_6:*:*:*:*:*:*",
"matchCriteriaId": "3B9DB383-3791-4A43-BA4D-7695B203E736"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_7:*:*:*:*:*:*",
"matchCriteriaId": "13F02D77-20E9-4F32-9752-511EB71E6704"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_8:*:*:*:*:*:*",
"matchCriteriaId": "6353CC8F-A6D4-4A0C-8D68-290CD8DEB4F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:fix_pack_9:*:*:*:*:*:*",
"matchCriteriaId": "759DDB90-6A89-4E4F-BD04-F70EFA5343B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_1:*:*:*:*:*:*",
"matchCriteriaId": "43F61E2F-4643-4D5D-84DB-7B7B6E93C67B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_2:*:*:*:*:*:*",
"matchCriteriaId": "8B057D81-7589-4007-9A0D-2D302B82F9CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_3:*:*:*:*:*:*",
"matchCriteriaId": "6F0F2558-6990-43D7-9FE2-8E99D81B8269"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_4:*:*:*:*:*:*",
"matchCriteriaId": "11072673-C3AB-42EA-A26F-890DEE903D42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_5:*:*:*:*:*:*",
"matchCriteriaId": "134560B0-9746-4EC3-8DE3-26E53E2CAC6D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.2:service_pack_6:*:*:*:*:*:*",
"matchCriteriaId": "71E41E59-D71F-48F0-812B-39D59F81997B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:-:*:*:*:*:*:*",
"matchCriteriaId": "6F6A98ED-E694-4F39-95D0-C152BD1EC115"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_1:*:*:*:*:*:*",
"matchCriteriaId": "2CD6861A-D546-462F-8B22-FA76A4AF8A9C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:fix_pack_2:*:*:*:*:*:*",
"matchCriteriaId": "324BB977-5AAC-4367-98FC-605FF4997B3F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_1:*:*:*:*:*:*",
"matchCriteriaId": "2BBA40AC-4619-434B-90CF-4D29A1CA6D86"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:digital_experience_platform:7.3:service_pack_3:*:*:*:*:*:*",
"matchCriteriaId": "728DF154-F19F-454C-87CA-1E755107F2A6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:liferay:liferay_portal:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.4.3.4",
"matchCriteriaId": "831BFAEF-E7B6-4E84-9142-79B93FBA0E8A"
}
]
}
]
}
],
"references": [
{
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25150",
"source": "security@liferay.com"
"source": "security@liferay.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2024-25150",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,94 @@
{
"id": "CVE-2024-54133",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-10T23:15:06.240",
"lastModified": "2024-12-10T23:15:06.240",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Action Pack is a framework for handling and responding to web requests. There is a possible Cross Site Scripting (XSS) vulnerability in the `content_security_policy` helper starting in version 5.2.0 of Action Pack and prior to versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1. Applications which set Content-Security-Policy (CSP) headers dynamically from untrusted user input may be vulnerable to carefully crafted inputs being able to inject new directives into the CSP. This could lead to a bypass of the CSP and its protection against XSS and other attacks. Versions 7.0.8.7, 7.1.5.1, 7.2.2.1, and 8.0.0.1 contain a fix. As a workaround, applications can avoid setting CSP headers dynamically from untrusted input, or can validate/sanitize that input."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 2.3,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/rails/rails/commit/2e3f41e4538b9ca1044357f6644f037bbb7c6c49",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/rails/rails/commit/3da2479cfe1e00177114b17e496213c40d286b3a",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/rails/rails/commit/5558e72f22fc69c1c407b31ac5fb3b4ce087b542",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/rails/rails/commit/cb16a3bb515b5d769f73926d9757270ace691f1d",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/rails/rails/security/advisories/GHSA-vfm5-rmrh-j26v",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-55653",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-10T23:15:06.410",
"lastModified": "2024-12-10T23:15:06.410",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PwnDoc is a penetration test report generator. In versions up to and including 0.5.3, an authenticated user is able to crash the backend by raising a `UnhandledPromiseRejection` on audits which exits the backend. The user doesn't need to know the audit id, since a bad audit id will also raise the rejection. With the backend being unresponsive, the whole application becomes unusable for all users of the application. As of time of publication, no known patches are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://github.com/pwndoc/pwndoc/security/advisories/GHSA-ggqg-3f7v-c8rc",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2024-55655",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-10T23:15:06.570",
"lastModified": "2024-12-10T23:15:06.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "sigstore-python is a Python tool for generating and verifying Sigstore signatures. Versions of sigstore-python newer than 2.0.0 but prior to 3.6.0 perform insufficient validation of the \"integration time\" present in \"v2\" and \"v3\" bundles during the verification flow: the \"integration time\" is verified *if* a source of signed time (such as an inclusion promise) is present, but is otherwise trusted if no source of signed time is present. This does not affect \"v1\" bundles, as the \"v1\" bundle format always requires an inclusion promise.\n\nSigstore uses signed time to support verification of signatures made against short-lived signing keys. The impact and severity of this weakness is *low*, as Sigstore contains multiple other enforcing components that prevent an attacker who modifies the integration timestamp within a bundle from impersonating a valid signature. In particular, an attacker who modifies the integration timestamp can induce a Denial of Service, but in no different manner than already possible with bundle access (e.g. modifying the signature itself such that it fails to verify). Separately, an attacker could upload a *new* entry to the transparency service, and substitute their new entry's time. However, this would still be rejected at validation time, as the new entry's (valid) signed time would be outside the validity window of the original signing certificate and would nonetheless render the attacker auditable."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 2.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "UNREPORTED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-325"
}
]
}
],
"references": [
{
"url": "https://github.com/sigstore/sigstore-python/commit/300b502ae99ebfaace124f1f4e422a6a669369cf",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/sigstore/sigstore-python/releases/tag/v3.6.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/sigstore/sigstore-python/security/advisories/GHSA-hhfg-fwrw-87w7",
"source": "security-advisories@github.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-10T23:00:30.405237+00:00
2024-12-11T00:55:46.185644+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-10T22:59:32.727000+00:00
2024-12-10T23:37:06.613000+00:00
```
### Last Data Feed Release
@ -33,66 +33,47 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
273151
273154
```
### CVEs added in the last Commit
Recently added CVEs: `153`
Recently added CVEs: `3`
- [CVE-2024-53954](CVE-2024/CVE-2024-539xx/CVE-2024-53954.json) (`2024-12-10T21:15:20.560`)
- [CVE-2024-53955](CVE-2024/CVE-2024-539xx/CVE-2024-53955.json) (`2024-12-10T22:15:25.610`)
- [CVE-2024-53956](CVE-2024/CVE-2024-539xx/CVE-2024-53956.json) (`2024-12-10T22:15:25.767`)
- [CVE-2024-53957](CVE-2024/CVE-2024-539xx/CVE-2024-53957.json) (`2024-12-10T22:15:25.917`)
- [CVE-2024-53958](CVE-2024/CVE-2024-539xx/CVE-2024-53958.json) (`2024-12-10T22:15:26.510`)
- [CVE-2024-53959](CVE-2024/CVE-2024-539xx/CVE-2024-53959.json) (`2024-12-10T22:15:27.347`)
- [CVE-2024-53960](CVE-2024/CVE-2024-539xx/CVE-2024-53960.json) (`2024-12-10T22:15:27.550`)
- [CVE-2024-54032](CVE-2024/CVE-2024-540xx/CVE-2024-54032.json) (`2024-12-10T21:15:20.690`)
- [CVE-2024-54034](CVE-2024/CVE-2024-540xx/CVE-2024-54034.json) (`2024-12-10T21:15:20.817`)
- [CVE-2024-54036](CVE-2024/CVE-2024-540xx/CVE-2024-54036.json) (`2024-12-10T21:15:20.947`)
- [CVE-2024-54037](CVE-2024/CVE-2024-540xx/CVE-2024-54037.json) (`2024-12-10T21:15:21.080`)
- [CVE-2024-54038](CVE-2024/CVE-2024-540xx/CVE-2024-54038.json) (`2024-12-10T21:15:21.210`)
- [CVE-2024-54039](CVE-2024/CVE-2024-540xx/CVE-2024-54039.json) (`2024-12-10T21:15:21.337`)
- [CVE-2024-54040](CVE-2024/CVE-2024-540xx/CVE-2024-54040.json) (`2024-12-10T21:15:21.463`)
- [CVE-2024-54041](CVE-2024/CVE-2024-540xx/CVE-2024-54041.json) (`2024-12-10T21:15:21.590`)
- [CVE-2024-54042](CVE-2024/CVE-2024-540xx/CVE-2024-54042.json) (`2024-12-10T21:15:21.720`)
- [CVE-2024-54043](CVE-2024/CVE-2024-540xx/CVE-2024-54043.json) (`2024-12-10T21:15:21.850`)
- [CVE-2024-54044](CVE-2024/CVE-2024-540xx/CVE-2024-54044.json) (`2024-12-10T21:15:21.977`)
- [CVE-2024-54045](CVE-2024/CVE-2024-540xx/CVE-2024-54045.json) (`2024-12-10T21:15:22.110`)
- [CVE-2024-54046](CVE-2024/CVE-2024-540xx/CVE-2024-54046.json) (`2024-12-10T21:15:22.237`)
- [CVE-2024-54047](CVE-2024/CVE-2024-540xx/CVE-2024-54047.json) (`2024-12-10T21:15:22.360`)
- [CVE-2024-54048](CVE-2024/CVE-2024-540xx/CVE-2024-54048.json) (`2024-12-10T21:15:22.490`)
- [CVE-2024-54049](CVE-2024/CVE-2024-540xx/CVE-2024-54049.json) (`2024-12-10T21:15:22.627`)
- [CVE-2024-54050](CVE-2024/CVE-2024-540xx/CVE-2024-54050.json) (`2024-12-10T21:15:22.767`)
- [CVE-2024-54051](CVE-2024/CVE-2024-540xx/CVE-2024-54051.json) (`2024-12-10T21:15:22.927`)
- [CVE-2024-54133](CVE-2024/CVE-2024-541xx/CVE-2024-54133.json) (`2024-12-10T23:15:06.240`)
- [CVE-2024-55653](CVE-2024/CVE-2024-556xx/CVE-2024-55653.json) (`2024-12-10T23:15:06.410`)
- [CVE-2024-55655](CVE-2024/CVE-2024-556xx/CVE-2024-55655.json) (`2024-12-10T23:15:06.570`)
### CVEs modified in the last Commit
Recently modified CVEs: `22`
Recently modified CVEs: `32`
- [CVE-2021-47077](CVE-2021/CVE-2021-470xx/CVE-2021-47077.json) (`2024-12-10T21:01:51.030`)
- [CVE-2023-36358](CVE-2023/CVE-2023-363xx/CVE-2023-36358.json) (`2024-12-10T22:15:05.393`)
- [CVE-2023-36359](CVE-2023/CVE-2023-363xx/CVE-2023-36359.json) (`2024-12-10T21:15:14.750`)
- [CVE-2023-52503](CVE-2023/CVE-2023-525xx/CVE-2023-52503.json) (`2024-12-10T21:26:43.377`)
- [CVE-2024-10968](CVE-2024/CVE-2024-109xx/CVE-2024-10968.json) (`2024-12-10T21:10:06.700`)
- [CVE-2024-10969](CVE-2024/CVE-2024-109xx/CVE-2024-10969.json) (`2024-12-10T21:10:24.593`)
- [CVE-2024-11138](CVE-2024/CVE-2024-111xx/CVE-2024-11138.json) (`2024-12-10T21:11:45.043`)
- [CVE-2024-25604](CVE-2024/CVE-2024-256xx/CVE-2024-25604.json) (`2024-12-10T22:59:32.727`)
- [CVE-2024-25605](CVE-2024/CVE-2024-256xx/CVE-2024-25605.json) (`2024-12-10T22:20:47.737`)
- [CVE-2024-26271](CVE-2024/CVE-2024-262xx/CVE-2024-26271.json) (`2024-12-10T21:07:04.467`)
- [CVE-2024-26272](CVE-2024/CVE-2024-262xx/CVE-2024-26272.json) (`2024-12-10T21:07:02.180`)
- [CVE-2024-26273](CVE-2024/CVE-2024-262xx/CVE-2024-26273.json) (`2024-12-10T21:07:07.587`)
- [CVE-2024-38002](CVE-2024/CVE-2024-380xx/CVE-2024-38002.json) (`2024-12-10T21:06:57.970`)
- [CVE-2024-53470](CVE-2024/CVE-2024-534xx/CVE-2024-53470.json) (`2024-12-10T22:15:25.010`)
- [CVE-2024-53471](CVE-2024/CVE-2024-534xx/CVE-2024-53471.json) (`2024-12-10T22:15:25.277`)
- [CVE-2024-53481](CVE-2024/CVE-2024-534xx/CVE-2024-53481.json) (`2024-12-10T21:15:20.003`)
- [CVE-2024-55635](CVE-2024/CVE-2024-556xx/CVE-2024-55635.json) (`2024-12-10T22:15:28.190`)
- [CVE-2024-55636](CVE-2024/CVE-2024-556xx/CVE-2024-55636.json) (`2024-12-10T22:15:28.347`)
- [CVE-2024-55637](CVE-2024/CVE-2024-556xx/CVE-2024-55637.json) (`2024-12-10T22:15:28.500`)
- [CVE-2024-55638](CVE-2024/CVE-2024-556xx/CVE-2024-55638.json) (`2024-12-10T22:15:28.640`)
- [CVE-2024-5660](CVE-2024/CVE-2024-56xx/CVE-2024-5660.json) (`2024-12-10T22:15:28.790`)
- [CVE-2024-8980](CVE-2024/CVE-2024-89xx/CVE-2024-8980.json) (`2024-12-10T21:07:09.857`)
- [CVE-2024-11658](CVE-2024/CVE-2024-116xx/CVE-2024-11658.json) (`2024-12-10T23:15:02.890`)
- [CVE-2024-11659](CVE-2024/CVE-2024-116xx/CVE-2024-11659.json) (`2024-12-10T23:15:14.893`)
- [CVE-2024-12000](CVE-2024/CVE-2024-120xx/CVE-2024-12000.json) (`2024-12-10T23:16:02.667`)
- [CVE-2024-12001](CVE-2024/CVE-2024-120xx/CVE-2024-12001.json) (`2024-12-10T23:16:24.893`)
- [CVE-2024-12002](CVE-2024/CVE-2024-120xx/CVE-2024-12002.json) (`2024-12-10T23:21:19.827`)
- [CVE-2024-12188](CVE-2024/CVE-2024-121xx/CVE-2024-12188.json) (`2024-12-10T23:18:39.680`)
- [CVE-2024-12228](CVE-2024/CVE-2024-122xx/CVE-2024-12228.json) (`2024-12-10T23:19:04.773`)
- [CVE-2024-12229](CVE-2024/CVE-2024-122xx/CVE-2024-12229.json) (`2024-12-10T23:19:31.487`)
- [CVE-2024-12230](CVE-2024/CVE-2024-122xx/CVE-2024-12230.json) (`2024-12-10T23:19:46.887`)
- [CVE-2024-12233](CVE-2024/CVE-2024-122xx/CVE-2024-12233.json) (`2024-12-10T23:24:57.237`)
- [CVE-2024-12234](CVE-2024/CVE-2024-122xx/CVE-2024-12234.json) (`2024-12-10T23:25:36.387`)
- [CVE-2024-12343](CVE-2024/CVE-2024-123xx/CVE-2024-12343.json) (`2024-12-10T23:26:52.047`)
- [CVE-2024-12344](CVE-2024/CVE-2024-123xx/CVE-2024-12344.json) (`2024-12-10T23:28:05.760`)
- [CVE-2024-12352](CVE-2024/CVE-2024-123xx/CVE-2024-12352.json) (`2024-12-10T23:31:47.427`)
- [CVE-2024-12353](CVE-2024/CVE-2024-123xx/CVE-2024-12353.json) (`2024-12-10T23:37:06.613`)
- [CVE-2024-12354](CVE-2024/CVE-2024-123xx/CVE-2024-12354.json) (`2024-12-10T23:36:25.740`)
- [CVE-2024-12355](CVE-2024/CVE-2024-123xx/CVE-2024-12355.json) (`2024-12-10T23:36:03.883`)
- [CVE-2024-12357](CVE-2024/CVE-2024-123xx/CVE-2024-12357.json) (`2024-12-10T23:35:15.660`)
- [CVE-2024-12358](CVE-2024/CVE-2024-123xx/CVE-2024-12358.json) (`2024-12-10T23:34:20.467`)
- [CVE-2024-12359](CVE-2024/CVE-2024-123xx/CVE-2024-12359.json) (`2024-12-10T23:34:02.110`)
- [CVE-2024-12360](CVE-2024/CVE-2024-123xx/CVE-2024-12360.json) (`2024-12-10T23:33:47.773`)
- [CVE-2024-2058](CVE-2024/CVE-2024-20xx/CVE-2024-2058.json) (`2024-12-10T23:23:40.153`)
- [CVE-2024-2059](CVE-2024/CVE-2024-20xx/CVE-2024-2059.json) (`2024-12-10T23:24:34.477`)
- [CVE-2024-25149](CVE-2024/CVE-2024-251xx/CVE-2024-25149.json) (`2024-12-10T23:03:54.853`)
- [CVE-2024-25150](CVE-2024/CVE-2024-251xx/CVE-2024-25150.json) (`2024-12-10T23:01:58.647`)
## Download and Usage

View File

@ -187218,7 +187218,7 @@ CVE-2021-47073,0,0,1da6789de0e18c722faf0748d86b29266ec446ef02b371ec3294102d5dc16
CVE-2021-47074,0,0,62606d2032895447276146a4bd74173d7188ecf09841f325ee145350e8690bb6,2024-11-21T06:35:20.813000
CVE-2021-47075,0,0,36eeb7f2e930817c1b1fe865ad9fae545910e7fd96de6d94f28c455e8e24109c,2024-11-21T06:35:20.930000
CVE-2021-47076,0,0,eb44f78121b9b3561a16c318aaec96c6c6576ae1ed25b0b86867d5e51cb5effd,2024-11-21T06:35:21.103000
CVE-2021-47077,0,1,89ceade981ed48989989cfdea08722c6551df82a7dcf7e9e57d17f7163739998,2024-12-10T21:01:51.030000
CVE-2021-47077,0,0,89ceade981ed48989989cfdea08722c6551df82a7dcf7e9e57d17f7163739998,2024-12-10T21:01:51.030000
CVE-2021-47078,0,0,10d2cc255b79f1ae1b2de2b41ed383d0a6ccb70ddfa9cdcb0b129f97f8f6ab93,2024-11-21T06:35:21.327000
CVE-2021-47079,0,0,c036a75d1b217059f3eeacf84ba954225baad506d2ec7a3aba1818ec631ba415,2024-12-09T18:41:59.903000
CVE-2021-47080,0,0,b2998f659a4b3e4f9d004f3f3d103d7ee3c84ede27b87e416214f7ed38cac5e7,2024-12-09T18:45:03.330000
@ -227855,8 +227855,8 @@ CVE-2023-36354,0,0,f52211b337a7b329ca6967c351c2cceb8600276a1c14ee18982757daf0433
CVE-2023-36355,0,0,b13b6b4d1b429dcb0d564bf46350457d4136a5d32b0a65c6ff4288911b1c219a,2024-11-21T08:09:35.113000
CVE-2023-36356,0,0,dfe0803ee38c4a445d74cdbb675a6baf3dc666a786ff0be950f1a18a5fe656c5,2024-11-21T08:09:35.277000
CVE-2023-36357,0,0,7f8ec13898de07f57c7e8e66d0c8d2ff725c2b13b80d89d540b0324101332414,2024-12-02T19:15:07.480000
CVE-2023-36358,0,1,ded194e7b200adb441b4fa709d63c99e2eef0e06835442964ff220e3502b3889,2024-12-10T22:15:05.393000
CVE-2023-36359,0,1,f1cfdda5960f8b568ffa1ef340bf74059ceff420da4bb55dede3794d35432533,2024-12-10T21:15:14.750000
CVE-2023-36358,0,0,ded194e7b200adb441b4fa709d63c99e2eef0e06835442964ff220e3502b3889,2024-12-10T22:15:05.393000
CVE-2023-36359,0,0,f1cfdda5960f8b568ffa1ef340bf74059ceff420da4bb55dede3794d35432533,2024-12-10T21:15:14.750000
CVE-2023-3636,0,0,f79ef9ecae829c199359798b63f24fb8a51eecaca990fa8998937337744d6ca2,2024-11-21T08:17:43.370000
CVE-2023-36360,0,0,03f8e99b08fd657ff41dfd2813e153f5a284df5fa1c76bf6a8d43cc2dedb5354,2023-11-07T04:16:33.320000
CVE-2023-36361,0,0,4e0200c7874320e4f073214633a311a386756b789151e899a0bc24bab0baa2b5,2024-11-21T08:09:35.950000
@ -239697,7 +239697,7 @@ CVE-2023-5250,0,0,58ce2b34b475373736e77e988be92b15eb836a64d3c5382c9b7f18d2986aa0
CVE-2023-52500,0,0,fbb9efaa221bcebca4695082e7346353f1edaceda435306e7320013f86e44d86,2024-11-21T08:39:54.610000
CVE-2023-52501,0,0,dce8fea28787eccd5fdf1c2279867b1856cfdadbf948affe1018e6b016ffe136,2024-11-21T08:39:54.730000
CVE-2023-52502,0,0,53b5c7371b4f4373fe848296392853f59d8735375e39195cf54701f13f36c71d,2024-11-21T08:39:54.847000
CVE-2023-52503,0,1,b25829a16f78c14d9235d80b7c332263af083b055661f6466ab49e61a0d35aa6,2024-12-10T21:26:43.377000
CVE-2023-52503,0,0,b25829a16f78c14d9235d80b7c332263af083b055661f6466ab49e61a0d35aa6,2024-12-10T21:26:43.377000
CVE-2023-52504,0,0,20d543413cbfdce3982f0e69879d8085fe9ae071f6db241d63eea26ff6923237,2024-11-21T08:39:55.150000
CVE-2023-52505,0,0,457ceb32eaa0dbf4f3fb83c3def49ce35850e4a94f5e4c24c521950a01b60bc6,2024-11-21T08:39:55.273000
CVE-2023-52506,0,0,2473aef6ecee2b11075221629d29edc4b86db27ed7be427c580f9b517750fde5,2024-11-21T08:39:55.397000
@ -243631,8 +243631,8 @@ CVE-2024-10964,0,0,57b272f10f583f57ad350a67bc460132637ea8e73b01849caa65e88235230
CVE-2024-10965,0,0,7a48e746780c9b936f9156485d79a795eb32972691169d69dc596fa55046e4dd,2024-11-23T01:45:14.267000
CVE-2024-10966,0,0,b7a50c5d6f825b28e507a19c3844f5a82d0b4c6a45687a7c351c49bc0dd409eb,2024-11-08T19:01:03.880000
CVE-2024-10967,0,0,7c3473c2b77a8d05803cf7f270943b5290b5d24c3b903af32185338840b213c3,2024-11-26T01:30:41.650000
CVE-2024-10968,0,1,a921b8902882d4801f626f2f4054af6a15bab4d0cf4468f9642e1f86377f1fd9,2024-12-10T21:10:06.700000
CVE-2024-10969,0,1,8114c2dfe952beb461c299d8bda61eb6b5ef295ee43d6de90e2c4aa8ea5fd65c,2024-12-10T21:10:24.593000
CVE-2024-10968,0,0,a921b8902882d4801f626f2f4054af6a15bab4d0cf4468f9642e1f86377f1fd9,2024-12-10T21:10:06.700000
CVE-2024-10969,0,0,8114c2dfe952beb461c299d8bda61eb6b5ef295ee43d6de90e2c4aa8ea5fd65c,2024-12-10T21:10:24.593000
CVE-2024-1097,0,0,f1ad2b99b98b2176c3b3ccdd494bed6625a86a9f96e0ed3a25e7d4f3cd789ac4,2024-11-19T19:05:30.620000
CVE-2024-10971,0,0,f8d3e9d67661e4546a1e254ebb74d5d0c1dddae1c4d768a7ce5fd78bda7de46d,2024-11-21T08:49:10.613000
CVE-2024-10975,0,0,87dd438a371aa254e8d367f54246f88f9b61e035fde8423a2dec0ee6b83d81a4,2024-11-08T19:01:03.880000
@ -243766,7 +243766,7 @@ CVE-2024-11127,0,0,a3efa55977cec0481a9d0f60f752166adc632313ccf7c08d957fcbfaa47d4
CVE-2024-1113,0,0,db1a37354bc3ae93faa7351501dc98fbca0217da03c731fe56b764e77974ccf3,2024-11-21T08:49:49.557000
CVE-2024-11130,0,0,2031b0d91a76a3ae308e67f748474890b1fb080d7d4cbebe58df244865c594b4,2024-11-15T17:57:53.270000
CVE-2024-11136,0,0,725bf56498e2623c27a356d77c56c56ec2fbb4238d9582d18b0c73a291d687b6,2024-11-15T13:58:08.913000
CVE-2024-11138,0,1,7a4f991a93172e8f92a25ff85e41fd89c92d700227aa3b95284768518268aadd,2024-12-10T21:11:45.043000
CVE-2024-11138,0,0,7a4f991a93172e8f92a25ff85e41fd89c92d700227aa3b95284768518268aadd,2024-12-10T21:11:45.043000
CVE-2024-1114,0,0,26f8d922f7817a26291214f4551b12b577ca7b3e88078b0c0c71e617799dfdd6,2024-11-21T08:49:49.727000
CVE-2024-11143,0,0,686e238b18cb6e6b1a398192b44515340df593fe49d6838dfcc7892698b7fdab,2024-11-18T15:03:56.927000
CVE-2024-11145,0,0,49d8db8e9affdc9bd928055d93b635f15e5703854689b5be5f582242400a9150,2024-11-26T20:15:25.270000
@ -244126,15 +244126,15 @@ CVE-2024-11648,0,0,7767a97f87e6ac5b52c62a9ab3e06af98c54488fb6fa6db87ff57d4b59586
CVE-2024-11649,0,0,2e02a1b1ac73e9631e0d1a9797095a406b688cb0877d8f7698e9962760832419,2024-11-25T16:48:37.237000
CVE-2024-1165,0,0,f0eb9b30d6a68836136018056f023b617295681fde22058072d340e5efc4e2a8,2024-11-21T08:49:56.660000
CVE-2024-11650,0,0,c1a83adb5fe7f79d88eb6196b3c8ac6aa781d1511831a253d8e0e7484128306a,2024-11-25T03:15:06.707000
CVE-2024-11651,0,0,17348de1119776db26030e9659dbb657f30e3390cd51cfca60aee866c70f68df,2024-11-25T03:15:07.973000
CVE-2024-11652,0,0,6acb2a8b97f7a26528234ba6716df53272242783d16c311788f9fef9f07b6c47,2024-11-25T03:15:08.533000
CVE-2024-11653,0,0,9918c1f7886c6d017bd9961c38b87c701db8070452b51fb5354ad45330dde2ba,2024-11-25T04:15:05.337000
CVE-2024-11654,0,0,21401afaf8ecf74c5d0db69dfd7c0c17a97cc6c6a463b11ffdc1a1c2dd37902a,2024-11-25T04:15:05.577000
CVE-2024-11655,0,0,ff8edbaf2b00fb02e08da5e071e47487c2f42a8aaec1793585954963c191b5a0,2024-11-25T05:15:09.447000
CVE-2024-11656,0,0,3c38eb90724808c2d57ac7f1e37e526270af01870e1817c86338de10b4d1a27a,2024-11-25T05:15:10.387000
CVE-2024-11657,0,0,3b1d1fe8d0758caf3b82c97d710174695e8f4631c95f72f8292876b320368551,2024-11-25T06:15:06.073000
CVE-2024-11658,0,0,9c345fcddb5d970c1d299dc0ee97feeca68b6d2ff2ee9ddf6277fff83c8f2a43,2024-11-25T06:15:06.593000
CVE-2024-11659,0,0,4ba25452a441f40b384f689a3137f1a167c9e2c6e3f82bf19d05a1cb716eb0db,2024-11-25T07:15:04.837000
CVE-2024-11651,0,1,1ab789c9eacaad7c175ddc8afa1992c793e015c3b6f49833dba9691422e781b4,2024-12-10T23:12:34.057000
CVE-2024-11652,0,1,33668e06a8390aec93f01c5243e821060407052a728d8fc9cf77a157eb5f30ec,2024-12-10T23:13:23.947000
CVE-2024-11653,0,1,4f0865d84dde581169e5fc4f057c95f93f00192712fe5392e0e3b1c1b53093c7,2024-12-10T23:13:40.990000
CVE-2024-11654,0,1,13b950818c431c00e0ccfa7e4708e0621c51a74698f1f42c1f1d8ee79f24642d,2024-12-10T23:13:58.150000
CVE-2024-11655,0,1,76a02b250b83551be6a13ebd60a95c6bfd1919484c18f40e8609059b505aebaf,2024-12-10T23:14:37.130000
CVE-2024-11656,0,1,ae5d62f8089e5b420c86674ec5b9d797d90254a7516b5d1e5cc0e66373221a54,2024-12-10T23:14:44.037000
CVE-2024-11657,0,1,893d6eae4e57947a06d3ac1fe3a26f703d0cc35b972b40317f35a6ea8903cc90,2024-12-10T23:14:54.933000
CVE-2024-11658,0,1,262660ae934203477e09837b0ae58d534fbf787226668bfcc4278980ecb805e2,2024-12-10T23:15:02.890000
CVE-2024-11659,0,1,73971f1a5bede07ed8180dfa7d34f0b3b27aba70b99e0b8d5b25787aef733c4c,2024-12-10T23:15:14.893000
CVE-2024-1166,0,0,9a4043bccbd810fe27a7f1e35eefa8a5ff4605f22a20be37f65eb257e1506a5a,2024-11-21T08:49:56.773000
CVE-2024-11660,0,0,c69038363011e72870bf05ba1b77807b46b410512f645c7de24fbe53640bca7c,2024-12-04T17:49:09.103000
CVE-2024-11661,0,0,245f7af368d483b99968c06f6626bb5531f9195deb8e8301e7998f114936ec1c,2024-12-04T18:41:52.773000
@ -244307,9 +244307,9 @@ CVE-2024-11996,0,0,c9890e109cbd3473a593b35fd7d1b915d4d2a7a9695a33296844a7786a35e
CVE-2024-11997,0,0,2af8126987a27c26e5e9fb866e5bf6a59fe0bc68e164aa36d761876f8d96a284,2024-12-04T21:26:54.147000
CVE-2024-11998,0,0,c32498d8a84a24616240eccde60a71f350199dae5d10d57970d82263bdad0fd7,2024-12-04T21:23:13.700000
CVE-2024-1200,0,0,e8315157751d481549a2635b52695b341549aeb4d8405db846b56db1c12fa29b,2024-11-21T08:50:01.490000
CVE-2024-12000,0,0,ab0ea335fdef1f2943f85e72a95a6f1701ba706c44d94d7b431efd0dc394df24,2024-11-30T12:15:17.200000
CVE-2024-12001,0,0,24a237e51a6a9afcac14598d7cc3b1fb087313623efcb8ea1294b11bfa7131f6,2024-11-30T13:15:04.140000
CVE-2024-12002,0,0,188be46b4ba3746fdca63523598fd9a9beb4f35572d5dfe474c1d7df181eb4c0,2024-11-30T13:15:04.610000
CVE-2024-12000,0,1,e45e46bd9049a7c2eac2343a939848eded6d5b005c7247796df205afc6eac9d3,2024-12-10T23:16:02.667000
CVE-2024-12001,0,1,75bbf94d31b41f422ac1216beeda365d0b924dd232e408edb33262f11bb39f10,2024-12-10T23:16:24.893000
CVE-2024-12002,0,1,642bad4c124467ff4f581f355ddf310f5dadc994966ff22ccdf8e42852d0744f,2024-12-10T23:21:19.827000
CVE-2024-12003,0,0,e39ee63656708893dab4dc4b108494b2da97ab05cd1b7a687dd08b180fa7d4d8,2024-12-06T09:15:07.630000
CVE-2024-12007,0,0,3f0955870ea9bdf12f159a9ff3518e539c39735afc0d33a5578fc33e0cfc6a81,2024-12-01T23:15:05.310000
CVE-2024-1201,0,0,ede9ef00e40c3771a17b2608d045b2ee9c35ff3d800bb0d000b60662409e157c,2024-11-21T08:50:01.647000
@ -244366,7 +244366,7 @@ CVE-2024-12183,0,0,82e7d00c0d43970561dcde149328e37153ec341d20500330a205d615cf784
CVE-2024-12185,0,0,2794475f4c291bccc75d891cf053c96f74c5bfa44bdb40ae143fb3a0b3833593,2024-12-10T15:57:03.543000
CVE-2024-12186,0,0,44e0fbeb8593926913663c90a8d76c7d9e63d8cea11901a6acafe7cca925b60d,2024-12-10T15:52:39.487000
CVE-2024-12187,0,0,d5219bf8165d3b6d69ade284ac66cc01774c2830861f108855db8360e680b621,2024-12-10T15:25:53.537000
CVE-2024-12188,0,0,9630a0796baa9ec4e8782d005d486e4f8bf046eb1e553a6bbf9ee9e7d1813812,2024-12-05T01:15:04.943000
CVE-2024-12188,0,1,7ed239e8baff77cd72f7797865913dce6f434fc87b23f5e6feb697e0a02c98fb,2024-12-10T23:18:39.680000
CVE-2024-1219,0,0,629287fb6c9fdb1db5a6b18292530d26bc4ea3297efdbbab51f719885479af95,2024-11-21T08:50:04.430000
CVE-2024-12196,0,0,9fa580adf43e9cbf06e25fc8b96bbf2ae78be5e0921b9598efca40b2ec0f8630,2024-12-04T21:15:21.090000
CVE-2024-1220,0,0,9554836c8027e0b7a98d02c469b0640f37340ff8518df5c7c53c1851829f880c,2024-11-21T08:50:04.733000
@ -244374,14 +244374,14 @@ CVE-2024-12209,0,0,e55df453280925a5ada6ceed594c84db1ea741f75d9f89eeca6eeeac114b8
CVE-2024-1221,0,0,c833d2d1840e5e81b3c325295532e3c4cac8ba514abb434d638a7c419bdc43e8,2024-11-21T08:50:04.920000
CVE-2024-1222,0,0,ff0f67607974451388d42ae6b90b2e9690717b801a6493a4e7aa508a94c6883e,2024-11-21T08:50:05.110000
CVE-2024-12227,0,0,ba90ebb2cf382c847aea04197c034e5e0e145f9bb34caf2219ef0758e476d6a3,2024-12-05T14:15:19.400000
CVE-2024-12228,0,0,31eea3c62e91877dec1581810510afd90e847a91043b6cd6e253705405122f7d,2024-12-05T14:15:20.123000
CVE-2024-12229,0,0,e946d82e348383155a1358ef71e119564a0942119e9b979a3266997d80839ffb,2024-12-05T15:15:09.050000
CVE-2024-12228,0,1,cba3b66c66f8b74b7da0219a0273d1dd0c005a65d0aca4a38c9a6589b54985c9,2024-12-10T23:19:04.773000
CVE-2024-12229,0,1,aa44844c8d830c107b3760370b58cb504158d7d7c510be09891b02a376b9c9ac,2024-12-10T23:19:31.487000
CVE-2024-1223,0,0,be24dd89111c5fcc9b818c0848f8619380122cccb06e3640ec34c1018e50b1b4,2024-11-21T08:50:05.300000
CVE-2024-12230,0,0,8fe309b024c3ce22cce3f311bb414add56c34b7a4edc5e4706470219b915d8ed,2024-12-05T15:15:09.280000
CVE-2024-12230,0,1,973683b5e69b27d9daf3cfc7eb4a458b4dc39d62d7edd5222b7b5e4c000bda78,2024-12-10T23:19:46.887000
CVE-2024-12231,0,0,2d61cd97d30688f5839da3e8db4d5653c16d2d28938561890550be74fc098362,2024-12-05T16:15:24.933000
CVE-2024-12232,0,0,8ac258fec8b1773cf95dd11c943fcd65f455678e8beaddd5071d54b1acd6e5b3,2024-12-05T16:15:25.090000
CVE-2024-12233,0,0,05b9925f1297f182adba9298e65b877490d4cb6f74e3cd9a5f7f5b2f5c9df9d4,2024-12-05T17:15:11.037000
CVE-2024-12234,0,0,393ae01c764aca95a7ebbb32374a68fa6706a527e69981b016911f43ea345c05,2024-12-05T17:15:11.213000
CVE-2024-12233,0,1,d89c9263a4f22f201b1dce8be51578aec307181a11a72f57d5d6a093a558942d,2024-12-10T23:24:57.237000
CVE-2024-12234,0,1,25d3aa7d45ccf0539b66121de3bcd155bbef1f8925f8aad4f69521eed8a998f2,2024-12-10T23:25:36.387000
CVE-2024-12235,0,0,38f1b3feacaad948f40ac9e8f67e1ff40424da9b6b0097b46c94da1cb9b5c6b9,2024-12-05T18:15:21.660000
CVE-2024-12236,0,0,caa087d872ef2d26c670019d91aa1248a68a09c1bcd376af7384f31b991183a0,2024-12-10T15:15:07.147000
CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000
@ -244407,8 +244407,8 @@ CVE-2024-12326,0,0,f960296d4c7a80b2aa28fc7f84f75a77ad31211d0d7e9b5df25b051a57e66
CVE-2024-1233,0,0,9d758d75169c31056a2dd99a6ff761ac0a3c179827b3dc598c6fb0d83614dada,2024-11-21T08:50:07.317000
CVE-2024-1234,0,0,6b4d1ae0b8159c98fb379447cf95a21f71a7514cfa9af5f48616ab89e3a52cca,2024-11-21T08:50:07.567000
CVE-2024-12342,0,0,c8f9d4658bb439c06796f6393d38c161608854ed130acdc85baa16bde35bc56c,2024-12-08T07:15:04.950000
CVE-2024-12343,0,0,40124b18e2d3de18ab98a4f87f9d42f8013f21e96e390110cdec80fee777538a,2024-12-08T10:15:04.637000
CVE-2024-12344,0,0,b6a25eb8c3525836c38e773d62e1b176ca33b20be4057ad5cd0025ceb055ea8f,2024-12-08T23:15:04.980000
CVE-2024-12343,0,1,ac88dc9695a819696f313a26b68429a92402a92d44a44fae3dae004786557c5b,2024-12-10T23:26:52.047000
CVE-2024-12344,0,1,a74c4de6f3ec8761526e235e0afb71aca4880eff4cfe7e19b9ce946c54f2c01c,2024-12-10T23:28:05.760000
CVE-2024-12346,0,0,80cb0f641e48457b23b15bd65b063b12a84c74cd98692c10accc52ead008b067,2024-12-09T00:15:04.207000
CVE-2024-12347,0,0,03b5c659fb7311a053f8959fd28372cdf56b1d1a85fe87823f3ed5487c3d37dc,2024-12-09T00:15:04.910000
CVE-2024-12348,0,0,8a10f1d1bbeb46074f9e146f37bc90c671b027b7252fa3e978381ed5d459a2a7,2024-12-09T01:15:05.603000
@ -244416,15 +244416,15 @@ CVE-2024-12349,0,0,3d063bdeee6aecc6e73ab3e1d240af7daa461f127325f4d59b59bef9f8695
CVE-2024-1235,0,0,fd37d01ad20dcc5d0dd22397b78801055d1e00ef080900e252a8af428afe4d67,2024-11-21T08:50:07.683000
CVE-2024-12350,0,0,c6ed55f56770c3ba92aae6fb67fd45964cbb43ddf597fb06d36f88fd90713d63,2024-12-09T01:15:05.943000
CVE-2024-12351,0,0,c7a1c9b6e1b0366b89dc0ddff8a6358f5817bd99800138af16ab4bd5a31f1f3c,2024-12-09T01:15:06.120000
CVE-2024-12352,0,0,df6e6e438031ecc98e4060be996123925a2d11714cbf6d67b70dfc73b77f0412,2024-12-09T02:15:18.090000
CVE-2024-12353,0,0,cdfb3d26fac16a1a5d998eb3be106173119f8a00dbfb4191025a22992ab16e5a,2024-12-09T02:15:18.920000
CVE-2024-12354,0,0,9cd087b8f40c9a4013f29fb518d260911b2e8d8a0b8a192d987032812a26f2d7,2024-12-09T02:15:19.120000
CVE-2024-12355,0,0,59de9253426a92e27e7c3904943024aa25fb561f82b61f281cb2411b05b4fc81,2024-12-09T02:15:19.300000
CVE-2024-12357,0,0,2e3ace4329dee544759b3943ce02a194d6d82c92302601be13110040a3e78f1c,2024-12-09T05:15:06.973000
CVE-2024-12358,0,0,6ddb1068585d936786ad516cf6a6bcc212677513e0b470b785f791b17192fa88,2024-12-09T05:15:07.320000
CVE-2024-12359,0,0,1b9eca10a0eb8c61148d2c180bd16045cbf319152c6d0689f3b60739161e9047,2024-12-09T05:15:07.630000
CVE-2024-12352,0,1,32f72a704f1e2542fc20de0d035c196da17ca0c575db05fe3835b61fbee7c417,2024-12-10T23:31:47.427000
CVE-2024-12353,0,1,036565fabbbc178396eb3e3c0305ad86dac517256d160df7657b090d3f9dd19d,2024-12-10T23:37:06.613000
CVE-2024-12354,0,1,b8e15a077e4c1a839cf8211dcd4deb8e8c4036fa20d487417d7ee12337ae44d8,2024-12-10T23:36:25.740000
CVE-2024-12355,0,1,27ba3231c85cb7bb230de2bfcb71ae509e2205da9b6afc6c150214b3cf17ceaf,2024-12-10T23:36:03.883000
CVE-2024-12357,0,1,48fcc186a0b90c08dc56b15842484729758da0392dc94d034d9fe9fdfb82ecb1,2024-12-10T23:35:15.660000
CVE-2024-12358,0,1,c693e0849f917c8e8b82ecbabaa009531cb87832861cfd247370c207501db351,2024-12-10T23:34:20.467000
CVE-2024-12359,0,1,c89d1a1aa75e792ebb41728457dc48f1f26a200ebabc2671ae04aee3d706d446,2024-12-10T23:34:02.110000
CVE-2024-1236,0,0,98cf8c8d0d2027d41420e47ce0e54a62c55b6c82b55779fb1975380b5e094f29,2024-11-21T08:50:07.797000
CVE-2024-12360,0,0,73fc0231527ad06f2d47ddb3328eb56e1d3966ef0dded4f11416bdaabed92b1f,2024-12-09T05:15:07.920000
CVE-2024-12360,0,1,9c92ce0fa75af6038fb90116f61bca41613e1dcad55daccb6d63b1c2c6eac745,2024-12-10T23:33:47.773000
CVE-2024-12369,0,0,020d729c045c8eaa8f498306958a74fd2b364bdb1cd395ef2460e8703f80119a,2024-12-09T21:15:08.203000
CVE-2024-1237,0,0,7608b762d209f55f10a23dbde634d086adad1d6240344714ec7de5c458d836b6,2024-11-21T08:50:07.910000
CVE-2024-1238,0,0,61e2d99ce6e3dfa86afb8331abcc236f68b5fa34f245659f4f6216db5239b32e,2024-11-21T08:50:08.053000
@ -245607,8 +245607,8 @@ CVE-2024-20540,0,0,5046d412fb4d977a66a069ad7e69b4507f6a0eef37dbd61ef109cc61fdb35
CVE-2024-2055,0,0,9c9b4203c5a8691f7ee3b1c0f37424285bdb22c4e9691349b0a7161f418f3aa7,2024-11-21T09:08:56.533000
CVE-2024-2056,0,0,68371bbfe3e7de0ab75bbaafdb9ba13342e9ac1572c260d9b23595be0a55c605,2024-11-21T09:08:56.727000
CVE-2024-2057,0,0,e5c93f7381e9c562590637af109bc48ab64f0cda8b9656e06708802a9eaa17f2,2024-11-21T09:08:56.920000
CVE-2024-2058,0,0,e868ae1e4fef69ae1bf90831cffd1310680740a4c2ab53c9ddd21491ac69ef7c,2024-11-21T09:08:57.057000
CVE-2024-2059,0,0,30c11d5c2719e4dca8b1a55579561e83e75f72521b4ac95f37da2fcdad518f2d,2024-11-21T09:08:57.203000
CVE-2024-2058,0,1,33a3e353af74f2d695cce3be2493a5677751c7365de6b1d8c6772bcf6a979a5a,2024-12-10T23:23:40.153000
CVE-2024-2059,0,1,5f97477692139521401f190887f1f2478fd814e5ddd0152ac688240955c16848,2024-12-10T23:24:34.477000
CVE-2024-2060,0,0,e30aa9c1a298c19807282a1755921a86bb2e5b5f93b64559a78c7077fba12793,2024-11-21T09:08:57.347000
CVE-2024-2061,0,0,79dc1bd1746c35498269eb72fd4501df46f607a32105dcc0bd7da4fa73505d75,2024-11-21T09:08:57.477000
CVE-2024-2062,0,0,4aff557e6e96d7678134b316b3c4ed63f2c8d5ed487405f524f805b6164b27d3,2024-11-21T09:08:57.603000
@ -249039,9 +249039,9 @@ CVE-2024-25145,0,0,dbee4a8aa2955d24baa6ce590f567fd8a044639487641fff575b69d6b04e2
CVE-2024-25146,0,0,70580878c7e66c134303e82bf314a0ea51bb4c7efa77286154d103535edb2832,2024-11-21T09:00:20.870000
CVE-2024-25147,0,0,84387167479e85437a489a3c440f913c2250ff97704942139aa39a68fe27bcc6,2024-11-21T09:00:21.010000
CVE-2024-25148,0,0,baaba4bd1038fed5c1e9c1ed403cafba105c20610c41c31a35b866b1248f5d6d,2024-11-21T09:00:21.143000
CVE-2024-25149,0,0,04b9d2424a206d9847edbab3d8b70b1199935dcf381076c6b352936ae0a85cf3,2024-11-21T09:00:21.293000
CVE-2024-25149,0,1,c3bee153938ba2820767f603be3339e9a49705623e20e7321fe693091302456b,2024-12-10T23:03:54.853000
CVE-2024-2515,0,0,44f3fa018c3519699334cca505032d6c5d3c8e2affb7c2ada212e4ff428377b2,2024-11-21T09:09:55.143000
CVE-2024-25150,0,0,5aa15083b71af9814955e4db2bad49ef0137000d46664df6beaa1afdc2009fa9,2024-11-21T09:00:21.417000
CVE-2024-25150,0,1,9beb971424f34e419f2e67ec3339fe7f8ab91aa6b6e1cf1fb61046498d7f4901,2024-12-10T23:01:58.647000
CVE-2024-25151,0,0,0b01c254dc10f34581a176a2dd1392ead139db1f1f92ec88900940bbbe02d51c,2024-11-21T09:00:21.530000
CVE-2024-25152,0,0,c4883d942930ec99a7ece74f3181fc32c370260063ba88e828c32188ee6d7978,2024-11-21T09:00:21.653000
CVE-2024-25153,0,0,28781d25e5c087d6ca5fbaa17986781f84cb0a151f81a7762bfeb961d739885f,2024-11-21T09:00:21.797000
@ -249313,8 +249313,8 @@ CVE-2024-25600,0,0,28903babf8e9ad9ce0e5926e98fade9a295a4e34c50bc53f7183dac7a3597
CVE-2024-25601,0,0,592b72e8287af6c7a3150c0f52361c80173956d1cbaa844c63524e684c186930,2024-11-21T09:01:03.450000
CVE-2024-25602,0,0,43c5fd7be09141d81d52c491e8514b96cba0daa24c348da2dd7a06a5b7ef9400,2024-11-21T09:01:03.573000
CVE-2024-25603,0,0,6efc2ab54ea3be651c1cc1d95ba47da582406dbdf361cbfd55e80b7611a41412,2024-11-21T09:01:03.690000
CVE-2024-25604,0,1,adb2744e99dce2faa265e66e541e673623a62dc0725d7f7a02f3571eed752f2b,2024-12-10T22:59:32.727000
CVE-2024-25605,0,1,cd3f213631c053f1b608e3b480951743b40dfcd47cd39c4fbb6227f798899db1,2024-12-10T22:20:47.737000
CVE-2024-25604,0,0,adb2744e99dce2faa265e66e541e673623a62dc0725d7f7a02f3571eed752f2b,2024-12-10T22:59:32.727000
CVE-2024-25605,0,0,cd3f213631c053f1b608e3b480951743b40dfcd47cd39c4fbb6227f798899db1,2024-12-10T22:20:47.737000
CVE-2024-25606,0,0,bde9b15898ae8e9ac91d25fcc0eaa7295bb6e28d0668446fd2e7868187bc749d,2024-11-21T09:01:04.087000
CVE-2024-25607,0,0,92a9fb01b0a8ceee06add8818a4f6f32834dea0c68b94bc58e295449a80a9e8b,2024-11-21T09:01:04.213000
CVE-2024-25608,0,0,7279c61e8730c275fdc995418fe07aa60ec60482b57bc6e0726dab12a2b3647c,2024-11-21T09:01:04.343000
@ -249889,9 +249889,9 @@ CVE-2024-26268,0,0,23e044f877833d2fc9c6cb2791fea7f1b133aec4b8fae18bf04051ac445c2
CVE-2024-26269,0,0,d870fd7aea3811009ab17d04f9dd1d54494e5857babaaa4dcaab41af1197170c,2024-11-21T09:02:16.430000
CVE-2024-2627,0,0,de67bfac37d74088e8645fc2f654e4a2f29dfe354b1fc4a8ac77cbde5ca7bfda,2024-11-21T09:10:09.897000
CVE-2024-26270,0,0,49db57e31c30404ffb3f7bccb6cb6e19533f6fa5e6e33873d874c52de8711e91,2024-11-21T09:02:16.553000
CVE-2024-26271,0,1,f5e20f3e7ade7688c430ad4b5e84f0ca9756226805976c19d5b4529200159d1e,2024-12-10T21:07:04.467000
CVE-2024-26272,0,1,58a64a22c48ee9a99d489ffa86f4aa8bb22502dcecbaf406b7d5815d612ddd8d,2024-12-10T21:07:02.180000
CVE-2024-26273,0,1,3ee41ff0c2ea2c1b4a7735a51d1950b78cbd34107596c9cdbc77e1aa48114140,2024-12-10T21:07:07.587000
CVE-2024-26271,0,0,f5e20f3e7ade7688c430ad4b5e84f0ca9756226805976c19d5b4529200159d1e,2024-12-10T21:07:04.467000
CVE-2024-26272,0,0,58a64a22c48ee9a99d489ffa86f4aa8bb22502dcecbaf406b7d5815d612ddd8d,2024-12-10T21:07:02.180000
CVE-2024-26273,0,0,3ee41ff0c2ea2c1b4a7735a51d1950b78cbd34107596c9cdbc77e1aa48114140,2024-12-10T21:07:07.587000
CVE-2024-26275,0,0,7adf3b58cf07abc79b09e6a4e3ae91eec8606977c2d24583ab33b1ecfa27dc67,2024-11-21T09:02:17.087000
CVE-2024-26276,0,0,2507a0d98d6e86bf82fb6c6e69a8d9b42268b993e1b77dacbb992126b34776dc,2024-11-21T09:02:17.223000
CVE-2024-26277,0,0,883b80b0c2f142d921ae2a08f7c7ab6d81c3acfa65435daae1b7c2df6c5457f2,2024-11-21T09:02:17.347000
@ -258695,7 +258695,7 @@ CVE-2024-37997,0,0,2006b990dbbb2069eddd0adaaf33aad8aa0cc21c743589acaa3ecc874870e
CVE-2024-37998,0,0,dfd861d0b4df4e8d176ddf44fe3d2f2766e372fba153c1d9134a8a6bac6c195f,2024-11-21T09:24:40.713000
CVE-2024-37999,0,0,902faf7d67489217cd37d263849f71c3123d5265d393df6999a24ac65f3049a9,2024-11-21T09:24:40.843000
CVE-2024-3800,0,0,dfab3c406824ce0d4eb335e80feb62aa951ff12b204f0958a043e16218a90fc2,2024-11-21T09:30:25.690000
CVE-2024-38002,0,1,0094626d4d749888df36614a8d2f1e1c8cae759add919cae9539858de17c7d9e,2024-12-10T21:06:57.970000
CVE-2024-38002,0,0,0094626d4d749888df36614a8d2f1e1c8cae759add919cae9539858de17c7d9e,2024-12-10T21:06:57.970000
CVE-2024-3801,0,0,0f8bfa58ad160c9f71633ed43875c383317300520d9a57afb022ce5659399045,2024-11-21T09:30:25.820000
CVE-2024-38010,0,0,738538b21364387fdf533aba47443ed1eb58bd43ab96778d2e27a558178da55f,2024-11-21T09:24:41.133000
CVE-2024-38011,0,0,36a42c1107d1e04c268b3d9879d9ba8cd10e71d7fb8849da71f609adece6ec99,2024-11-21T09:24:41.290000
@ -262785,52 +262785,52 @@ CVE-2024-43702,0,0,026195b67973267c5f7e1b66b43eadfe3de1f0eaa8dad79a11b9df4d6c345
CVE-2024-43703,0,0,e564d47a3ea8e2e59e7c0c62fe5b37de767d270b87bc716325b902fc07b61a86,2024-12-01T23:15:06.383000
CVE-2024-43704,0,0,82c22af109add6551b6eea89e99a6b50accfdf02d564899eae149615096d5dc8,2024-11-18T17:11:17.393000
CVE-2024-4371,0,0,e83d972dfd798c0045589442b000f085f252e3d21fb48583dd2590000a3618ae,2024-11-21T09:42:43.087000
CVE-2024-43712,1,1,9ee48631a6c800619b6220970e4109eb3e24b302c90d74a7304d64274af05c08,2024-12-10T22:15:05.830000
CVE-2024-43713,1,1,88956e95548256f6c441e123f3270b1fea317d031bbd101ad92b391bb25a18e2,2024-12-10T22:15:06.017000
CVE-2024-43714,1,1,666f0d2462b8965622f2bce3e1536481448c0776ccb5be0162067dee976b3f8e,2024-12-10T22:15:06.200000
CVE-2024-43715,1,1,40e6484d984150edb4ff88bf91b63943f5590c2eacd1a349b7ae86c49294189c,2024-12-10T22:15:06.377000
CVE-2024-43716,1,1,07d0c20c4e1a2fa7a3b090c83bbc14eeb6af21216e32e6f9129956c8ae2fdbf9,2024-12-10T22:15:06.533000
CVE-2024-43717,1,1,8c5304f4d78bbbcef5a32ae9021c13cb27a91dba45d8d57dcebd7def864f105d,2024-12-10T22:15:06.703000
CVE-2024-43718,1,1,0ab5b1e3d3ace879d3623681441f70a779d5314e5c6f6389c1ff5e977a88a438,2024-12-10T22:15:06.860000
CVE-2024-43719,1,1,9764b408538f848cead0dbf1069f4f60876464b760786acd334cf9fdc053a9f3,2024-12-10T22:15:07.010000
CVE-2024-43712,0,0,9ee48631a6c800619b6220970e4109eb3e24b302c90d74a7304d64274af05c08,2024-12-10T22:15:05.830000
CVE-2024-43713,0,0,88956e95548256f6c441e123f3270b1fea317d031bbd101ad92b391bb25a18e2,2024-12-10T22:15:06.017000
CVE-2024-43714,0,0,666f0d2462b8965622f2bce3e1536481448c0776ccb5be0162067dee976b3f8e,2024-12-10T22:15:06.200000
CVE-2024-43715,0,0,40e6484d984150edb4ff88bf91b63943f5590c2eacd1a349b7ae86c49294189c,2024-12-10T22:15:06.377000
CVE-2024-43716,0,0,07d0c20c4e1a2fa7a3b090c83bbc14eeb6af21216e32e6f9129956c8ae2fdbf9,2024-12-10T22:15:06.533000
CVE-2024-43717,0,0,8c5304f4d78bbbcef5a32ae9021c13cb27a91dba45d8d57dcebd7def864f105d,2024-12-10T22:15:06.703000
CVE-2024-43718,0,0,0ab5b1e3d3ace879d3623681441f70a779d5314e5c6f6389c1ff5e977a88a438,2024-12-10T22:15:06.860000
CVE-2024-43719,0,0,9764b408538f848cead0dbf1069f4f60876464b760786acd334cf9fdc053a9f3,2024-12-10T22:15:07.010000
CVE-2024-4372,0,0,80047d29f24899dba9fb9823b96bdeb83dfdd1716f145c555f0448a73bb4cc01,2024-11-21T09:42:43.207000
CVE-2024-43720,1,1,76928c5ef0db8034461437c52b5e02bc4ab89b62901520cc068aaecd2e3bd7e1,2024-12-10T22:15:07.160000
CVE-2024-43721,1,1,1d14669fb2267cca251017e411673fc0a5df2b6fd792dc42405d131907e00156,2024-12-10T22:15:07.310000
CVE-2024-43722,1,1,4026577d9c2c5d0a91c4a01d11148854c0f7c886ab80408495ce0328beeb76e2,2024-12-10T22:15:07.500000
CVE-2024-43723,1,1,a882053d237d18e0e8eefe2d71e82c0a14d443b202d47a33a30e3e8adbf3bfa5,2024-12-10T22:15:07.663000
CVE-2024-43724,1,1,3763064ce7e37065a077ec6473a10ccc04397cda18e7c8c86f86b3ae8f2db6df,2024-12-10T22:15:07.827000
CVE-2024-43725,1,1,b99691726340b14dfc9dd0a0f49db5e6762d480ba8b60b38feeec8069cdfb7e0,2024-12-10T22:15:07.987000
CVE-2024-43726,1,1,00d012e8bd070b6cdc9c1783a3576c3cf39050d3d6de64779d2c2dc095eb4d11,2024-12-10T22:15:08.170000
CVE-2024-43727,1,1,39302cc38bcac03174fffb97dd3d3a6d80358a26c96b3ce45b836ad145d7c9e1,2024-12-10T22:15:08.330000
CVE-2024-43728,1,1,c80985dd09e7ad8e39033d40eab120361ef4cd20028c9141a119799a6de9cb56,2024-12-10T22:15:08.500000
CVE-2024-43729,1,1,adb8cec74aefe4e2cfc467a901674867119c5db8a8c5ed8279b28d237247afbb,2024-12-10T22:15:08.653000
CVE-2024-43720,0,0,76928c5ef0db8034461437c52b5e02bc4ab89b62901520cc068aaecd2e3bd7e1,2024-12-10T22:15:07.160000
CVE-2024-43721,0,0,1d14669fb2267cca251017e411673fc0a5df2b6fd792dc42405d131907e00156,2024-12-10T22:15:07.310000
CVE-2024-43722,0,0,4026577d9c2c5d0a91c4a01d11148854c0f7c886ab80408495ce0328beeb76e2,2024-12-10T22:15:07.500000
CVE-2024-43723,0,0,a882053d237d18e0e8eefe2d71e82c0a14d443b202d47a33a30e3e8adbf3bfa5,2024-12-10T22:15:07.663000
CVE-2024-43724,0,0,3763064ce7e37065a077ec6473a10ccc04397cda18e7c8c86f86b3ae8f2db6df,2024-12-10T22:15:07.827000
CVE-2024-43725,0,0,b99691726340b14dfc9dd0a0f49db5e6762d480ba8b60b38feeec8069cdfb7e0,2024-12-10T22:15:07.987000
CVE-2024-43726,0,0,00d012e8bd070b6cdc9c1783a3576c3cf39050d3d6de64779d2c2dc095eb4d11,2024-12-10T22:15:08.170000
CVE-2024-43727,0,0,39302cc38bcac03174fffb97dd3d3a6d80358a26c96b3ce45b836ad145d7c9e1,2024-12-10T22:15:08.330000
CVE-2024-43728,0,0,c80985dd09e7ad8e39033d40eab120361ef4cd20028c9141a119799a6de9cb56,2024-12-10T22:15:08.500000
CVE-2024-43729,0,0,adb8cec74aefe4e2cfc467a901674867119c5db8a8c5ed8279b28d237247afbb,2024-12-10T22:15:08.653000
CVE-2024-4373,0,0,90a0bc6a003143c6727c6fb96559f1f531614f51612ca46e3d9865e65abf33ed,2024-11-21T09:42:43.307000
CVE-2024-43730,1,1,554b1f9dd4303d16e148076363d22a5eaf6cd3919eca15f869c24534b3e41a85,2024-12-10T22:15:08.800000
CVE-2024-43731,1,1,618b4905d50c5a0f9653dc2d108ad6dbef8dcb1c3da71a8e0ab10155221c1c24,2024-12-10T22:15:08.953000
CVE-2024-43732,1,1,16f50ba3e588ed01ca62ccb83b3016c041510ef147ba4e1eb16e8a57578344ec,2024-12-10T22:15:09.130000
CVE-2024-43733,1,1,8a2211464cd02d7d0b3b54ac4e6e1bb3e3daabe02b23e820e01a3134f70c7b70,2024-12-10T22:15:09.330000
CVE-2024-43734,1,1,5cf55b57e5738f86b87bbf2f8c7946ec3009db6f917dff7efaa176e79862b48b,2024-12-10T22:15:09.507000
CVE-2024-43735,1,1,3de86dad72105c21814c232ac1ef9a581d3117e305e89a6a34fb420fef13f244,2024-12-10T22:15:09.670000
CVE-2024-43736,1,1,3bd86a8f7c02c75b998104c9d43a9b6ec3fe6cbe8f381abaf6fa63a2a0b7d5ac,2024-12-10T22:15:09.840000
CVE-2024-43737,1,1,2de6a61b4b618b9aeb86d6d56b2c66702cf2bc626d9e8e3bb1c75c86799d1cfb,2024-12-10T22:15:09.990000
CVE-2024-43738,1,1,cf243843202dfab5a56a12222bca23d48fee7cc9c3056586bd57879f9e07aaa1,2024-12-10T22:15:10.153000
CVE-2024-43739,1,1,49b94328668b277f5692616ddd2ee3143ee106234cbb03ec090baea1fcd6519e,2024-12-10T22:15:10.320000
CVE-2024-43730,0,0,554b1f9dd4303d16e148076363d22a5eaf6cd3919eca15f869c24534b3e41a85,2024-12-10T22:15:08.800000
CVE-2024-43731,0,0,618b4905d50c5a0f9653dc2d108ad6dbef8dcb1c3da71a8e0ab10155221c1c24,2024-12-10T22:15:08.953000
CVE-2024-43732,0,0,16f50ba3e588ed01ca62ccb83b3016c041510ef147ba4e1eb16e8a57578344ec,2024-12-10T22:15:09.130000
CVE-2024-43733,0,0,8a2211464cd02d7d0b3b54ac4e6e1bb3e3daabe02b23e820e01a3134f70c7b70,2024-12-10T22:15:09.330000
CVE-2024-43734,0,0,5cf55b57e5738f86b87bbf2f8c7946ec3009db6f917dff7efaa176e79862b48b,2024-12-10T22:15:09.507000
CVE-2024-43735,0,0,3de86dad72105c21814c232ac1ef9a581d3117e305e89a6a34fb420fef13f244,2024-12-10T22:15:09.670000
CVE-2024-43736,0,0,3bd86a8f7c02c75b998104c9d43a9b6ec3fe6cbe8f381abaf6fa63a2a0b7d5ac,2024-12-10T22:15:09.840000
CVE-2024-43737,0,0,2de6a61b4b618b9aeb86d6d56b2c66702cf2bc626d9e8e3bb1c75c86799d1cfb,2024-12-10T22:15:09.990000
CVE-2024-43738,0,0,cf243843202dfab5a56a12222bca23d48fee7cc9c3056586bd57879f9e07aaa1,2024-12-10T22:15:10.153000
CVE-2024-43739,0,0,49b94328668b277f5692616ddd2ee3143ee106234cbb03ec090baea1fcd6519e,2024-12-10T22:15:10.320000
CVE-2024-4374,0,0,0fc50b1de94238d83b826da2552010ff2a72cfbd8cd99e9aecee9f37433a6dbd,2024-11-21T09:42:43.410000
CVE-2024-43740,1,1,c42a7cb58a34fe645b4e8ba4fa4f8195739fe32fc629b332138fc00fdc3d2eaa,2024-12-10T22:15:10.480000
CVE-2024-43742,1,1,3626c593ea81e22089939d8eac91324d283bf7ae758a9ddc4900be70cdbb89bb,2024-12-10T22:15:10.633000
CVE-2024-43743,1,1,30d50929f9185598230408f40fefb5ac6acf1ca6df5d52dec9f2959ea925a099,2024-12-10T22:15:10.787000
CVE-2024-43744,1,1,a2c80a04a2d0b0708514970dd2adae417c720657458d50b19d922560cb75bea5,2024-12-10T22:15:10.950000
CVE-2024-43745,1,1,b4e07d49a252d0ab5d4b47d0387e1c0cc24d59ba34f7c05c774af898ebab4667,2024-12-10T22:15:11.110000
CVE-2024-43746,1,1,2da115c92ba05ae13896d0a270473a809ddb02762d8bd8a1e96866e650ebfc75,2024-12-10T22:15:11.277000
CVE-2024-43747,1,1,e6cb69f695b1a963b1cc982b1f1849f12c9404b32a2f4dccf9b1006f06626cfa,2024-12-10T22:15:11.440000
CVE-2024-43748,1,1,70a7a62895d4866bcda6fbe965b30937af6854c16b6c23de9c20cc6466631add,2024-12-10T22:15:11.597000
CVE-2024-43749,1,1,035809cd32c66ba2d3808ce1bf38a99f7a6a8179f1fa29c433623b873f955924,2024-12-10T22:15:11.763000
CVE-2024-43740,0,0,c42a7cb58a34fe645b4e8ba4fa4f8195739fe32fc629b332138fc00fdc3d2eaa,2024-12-10T22:15:10.480000
CVE-2024-43742,0,0,3626c593ea81e22089939d8eac91324d283bf7ae758a9ddc4900be70cdbb89bb,2024-12-10T22:15:10.633000
CVE-2024-43743,0,0,30d50929f9185598230408f40fefb5ac6acf1ca6df5d52dec9f2959ea925a099,2024-12-10T22:15:10.787000
CVE-2024-43744,0,0,a2c80a04a2d0b0708514970dd2adae417c720657458d50b19d922560cb75bea5,2024-12-10T22:15:10.950000
CVE-2024-43745,0,0,b4e07d49a252d0ab5d4b47d0387e1c0cc24d59ba34f7c05c774af898ebab4667,2024-12-10T22:15:11.110000
CVE-2024-43746,0,0,2da115c92ba05ae13896d0a270473a809ddb02762d8bd8a1e96866e650ebfc75,2024-12-10T22:15:11.277000
CVE-2024-43747,0,0,e6cb69f695b1a963b1cc982b1f1849f12c9404b32a2f4dccf9b1006f06626cfa,2024-12-10T22:15:11.440000
CVE-2024-43748,0,0,70a7a62895d4866bcda6fbe965b30937af6854c16b6c23de9c20cc6466631add,2024-12-10T22:15:11.597000
CVE-2024-43749,0,0,035809cd32c66ba2d3808ce1bf38a99f7a6a8179f1fa29c433623b873f955924,2024-12-10T22:15:11.763000
CVE-2024-4375,0,0,226fb639a4436df6c70ad0c0a2a37d985a688254ed5b66b084e0fcdf89f3a83f,2024-11-21T09:42:43.523000
CVE-2024-43750,1,1,5ff2bfa8f71453312fdcd917de2a161927bb75aec34801406c9417234bcaa687,2024-12-10T22:15:11.913000
CVE-2024-43751,1,1,3884ff7ef488e7bbf2ab6953f704cfc41f1ed4521198206ecbe782828399e93b,2024-12-10T22:15:12.057000
CVE-2024-43752,1,1,ba2dd2eda9200d8f82d846378bdcc47ad8ef5b6b8cbc72dd3e5f07ec22d3d559,2024-12-10T22:15:12.203000
CVE-2024-43754,1,1,5798001f2eace304b743b28c8777db35d8d6bf4097d149a34408e50277858bd8,2024-12-10T22:15:12.343000
CVE-2024-43755,1,1,220e68bab73625cee39348db067804689cbea3cc00850eb811f1343d1aeb2a7b,2024-12-10T22:15:12.507000
CVE-2024-43750,0,0,5ff2bfa8f71453312fdcd917de2a161927bb75aec34801406c9417234bcaa687,2024-12-10T22:15:11.913000
CVE-2024-43751,0,0,3884ff7ef488e7bbf2ab6953f704cfc41f1ed4521198206ecbe782828399e93b,2024-12-10T22:15:12.057000
CVE-2024-43752,0,0,ba2dd2eda9200d8f82d846378bdcc47ad8ef5b6b8cbc72dd3e5f07ec22d3d559,2024-12-10T22:15:12.203000
CVE-2024-43754,0,0,5798001f2eace304b743b28c8777db35d8d6bf4097d149a34408e50277858bd8,2024-12-10T22:15:12.343000
CVE-2024-43755,0,0,220e68bab73625cee39348db067804689cbea3cc00850eb811f1343d1aeb2a7b,2024-12-10T22:15:12.507000
CVE-2024-43756,0,0,574012d52ba61623896d593dde944e97d1e4486f17b00226542a0b61b33f8b0d,2024-09-13T17:00:59.890000
CVE-2024-43758,0,0,572e17c14d16efa1d490120c56ed34a19c6fc103a35ebd610b716ea536d9632d,2024-09-13T17:27:33.230000
CVE-2024-43759,0,0,4270d1c80d4da61f734b4e2d0cec7cefaa5eece74e1d071a8d6c550e1b8941c2,2024-09-13T17:13:35.427000
@ -263754,8 +263754,8 @@ CVE-2024-4515,0,0,7504024f77fc639532586006edbcd7df35e7f34ba56f61d68d467513e18a66
CVE-2024-45150,0,0,95b51ecadaebd1691fb6d0830c72849a15d157444cecbdab2e0bb3fba208f418,2024-10-18T14:35:32.140000
CVE-2024-45152,0,0,078be3b278fe562a83e4cffd61092d0b3a581e3cb96347e3601fbbc38485ff00,2024-10-18T14:41:51.683000
CVE-2024-45153,0,0,fbfef51b891369d8b4535dbd73c5037c896ececfed8b242bc1453c48af4b8df5,2024-12-02T22:44:29.430000
CVE-2024-45155,1,1,91bfa5e04c5eb2f4e380705bd73ab70bce386f8d80e6e498ed0a8564bf2c613b,2024-12-10T21:15:15.983000
CVE-2024-45156,1,1,393e553077f143d91adf4733a682f0adbf93d392b916d327253f5b4a77c3d538,2024-12-10T21:15:16.137000
CVE-2024-45155,0,0,91bfa5e04c5eb2f4e380705bd73ab70bce386f8d80e6e498ed0a8564bf2c613b,2024-12-10T21:15:15.983000
CVE-2024-45156,0,0,393e553077f143d91adf4733a682f0adbf93d392b916d327253f5b4a77c3d538,2024-12-10T21:15:16.137000
CVE-2024-45157,0,0,a69b06d34ddf029527ac0ac1fe5b34d92807642f681ef6bd757e92f99741f827,2024-09-12T16:29:42.717000
CVE-2024-45158,0,0,3f9bce1afa9a77d0a545f8d7bc11dfbcc4df3d1e21a774f7f4e024057033de58,2024-09-06T19:35:26.390000
CVE-2024-45159,0,0,6443b31bd8a87954adf636c6caa04225967184f7d72f05db7c10765203afb376,2024-09-19T18:26:24.687000
@ -266355,7 +266355,7 @@ CVE-2024-49509,0,0,15e897a9631a64e5146680986f3191fcf788babf34f3f0ba79ae3fe2c381d
CVE-2024-49510,0,0,fe711f4c1936cc4d1c1a59bfdb147d64db234c5a51b851c0183ceb3b562d496d,2024-11-16T00:35:01.073000
CVE-2024-49511,0,0,c1a397163534f4b11a270038019b332581e67fda877ef20583e441a6f830b9d0,2024-11-16T00:34:33.607000
CVE-2024-49512,0,0,02ef47bf10e6dce59ce4befda9ee5100105274d34a60a4569c66eb776013d5cb,2024-11-16T00:34:20.890000
CVE-2024-49513,1,1,f2e4fe215006d0241ece39a7212b8e68a1ac71e5d832e3383127ee041cc059a9,2024-12-10T21:15:16.343000
CVE-2024-49513,0,0,f2e4fe215006d0241ece39a7212b8e68a1ac71e5d832e3383127ee041cc059a9,2024-12-10T21:15:16.343000
CVE-2024-49514,0,0,168a9134372c0d9a29fab9f489e9694c2368c05c346e3fe45209179b57524370,2024-11-18T18:06:39.030000
CVE-2024-49515,0,0,4ad3af5f10e18882a5a32566a0bec8998bc31a66f706415135803550e7f84b15,2024-11-13T19:14:24.320000
CVE-2024-49516,0,0,44da5d94482e4b65792e0d29a7ef15205438256f74e207e521457b4cb0fb7589,2024-11-13T18:52:31.573000
@ -266379,17 +266379,17 @@ CVE-2024-49533,0,0,75968618599fd3437292a06f84769b4df1570448be7e5d716f073cc32a878
CVE-2024-49534,0,0,2de7ddeb964d1e2f1108f1d599e0866d435c778aa898e98642e7d656c11b74cf,2024-12-10T20:15:18.743000
CVE-2024-49535,0,0,e52b71be2403d7e7c7ec6df87555241b12f0d6af2e7ed28d403cc9e5574871ea,2024-12-10T20:15:18.923000
CVE-2024-49536,0,0,3226abc075af5af9440f5cdc9a3a66360f030ce3d405055960c0bca748fe4e92,2024-11-19T21:21:45.640000
CVE-2024-49537,1,1,9069a21f9ad82f63c2008fa214d1f0de46072a9dfd4ccd673ef0f8c9a149a49e,2024-12-10T21:15:16.500000
CVE-2024-49538,1,1,81e85541e5661b26b50f4faa760250dc680859c0e56bb2cdf63fb912d594cf0a,2024-12-10T21:15:16.650000
CVE-2024-49541,1,1,6c831ac9f6a3d11b676851a3d48c47166db3deef8bf35cccb4c42727ed1f24c2,2024-12-10T21:15:16.793000
CVE-2024-49543,1,1,924475ae14f5d8ac0778b81265b81215ae6e2e70c39ad4176421ee7522bfb47e,2024-12-10T21:15:16.937000
CVE-2024-49544,1,1,4ad36cc37598ffc2500960ab3589eedde9fbfb4be99d63a99a410eb31f285cb3,2024-12-10T21:15:17.073000
CVE-2024-49545,1,1,4388025dcd940fca76d7eb8cf825b27e42f62038077b655f252866452a814b21,2024-12-10T21:15:17.220000
CVE-2024-49546,1,1,3fa6d3ea3e007d50bb60e9761b11c951037efca9d325db42c8cdc612d790891e,2024-12-10T21:15:17.350000
CVE-2024-49547,1,1,42cbe1a8169f080c60083e78853a43df10036fc439fec11e8c9fbb6ee3bc7ade,2024-12-10T21:15:17.483000
CVE-2024-49548,1,1,d15d7a4ef91d0628ddda6e603a3bee21c45696be5f379adad00ea725e1a1245e,2024-12-10T21:15:17.617000
CVE-2024-49549,1,1,fde806fc727424d2a36b3e057dc22c4803c1ce162cbcff5dca073789456a2c1e,2024-12-10T21:15:17.753000
CVE-2024-49550,1,1,05badb1c283042dac26c35d1bdd2b9cbec87de216b529b66dd1d3cafdffb27e9,2024-12-10T21:15:17.903000
CVE-2024-49537,0,0,9069a21f9ad82f63c2008fa214d1f0de46072a9dfd4ccd673ef0f8c9a149a49e,2024-12-10T21:15:16.500000
CVE-2024-49538,0,0,81e85541e5661b26b50f4faa760250dc680859c0e56bb2cdf63fb912d594cf0a,2024-12-10T21:15:16.650000
CVE-2024-49541,0,0,6c831ac9f6a3d11b676851a3d48c47166db3deef8bf35cccb4c42727ed1f24c2,2024-12-10T21:15:16.793000
CVE-2024-49543,0,0,924475ae14f5d8ac0778b81265b81215ae6e2e70c39ad4176421ee7522bfb47e,2024-12-10T21:15:16.937000
CVE-2024-49544,0,0,4ad36cc37598ffc2500960ab3589eedde9fbfb4be99d63a99a410eb31f285cb3,2024-12-10T21:15:17.073000
CVE-2024-49545,0,0,4388025dcd940fca76d7eb8cf825b27e42f62038077b655f252866452a814b21,2024-12-10T21:15:17.220000
CVE-2024-49546,0,0,3fa6d3ea3e007d50bb60e9761b11c951037efca9d325db42c8cdc612d790891e,2024-12-10T21:15:17.350000
CVE-2024-49547,0,0,42cbe1a8169f080c60083e78853a43df10036fc439fec11e8c9fbb6ee3bc7ade,2024-12-10T21:15:17.483000
CVE-2024-49548,0,0,d15d7a4ef91d0628ddda6e603a3bee21c45696be5f379adad00ea725e1a1245e,2024-12-10T21:15:17.617000
CVE-2024-49549,0,0,fde806fc727424d2a36b3e057dc22c4803c1ce162cbcff5dca073789456a2c1e,2024-12-10T21:15:17.753000
CVE-2024-49550,0,0,05badb1c283042dac26c35d1bdd2b9cbec87de216b529b66dd1d3cafdffb27e9,2024-12-10T21:15:17.903000
CVE-2024-49551,0,0,9445123a9c53b54d733fa08f43beb18f2ce6084e52ab61a7d528ad5ab92d83ca,2024-12-10T20:15:19.110000
CVE-2024-49552,0,0,012ff5acfeb4e368169fa593e29c252993e80910ce98090bc36411dfd72cd242,2024-12-10T20:15:19.297000
CVE-2024-49553,0,0,0ee5fb71153e208c0ba26614c22b2b1366f3826855b9b3b8fb41e8c5ca08636a,2024-12-10T20:15:19.530000
@ -268555,56 +268555,56 @@ CVE-2024-52810,0,0,bc519c3395fca90f2847180bace5d2bd61f10ead143c379d0438b1982cdf8
CVE-2024-52811,0,0,8b4a122817488a51be41eacb5a5ec9e0b5886ee8b97dd1908dd9d3513b97f482,2024-11-25T19:15:11.567000
CVE-2024-52814,0,0,27542fdf4d1e39899f04e440482727ae79215851a144e892e913b9bf3a0be02c,2024-11-22T16:15:34.553000
CVE-2024-52815,0,0,c1e8fde97970f9249cef290754120e31a2a9f9b91031232cee085d5724ae3d3e,2024-12-03T17:15:12.267000
CVE-2024-52816,1,1,9cd2f301c6ad090e9d7c870bdf8f9fb2cdad0c6ad494c1f4c7311d6427b21b93,2024-12-10T22:15:13.527000
CVE-2024-52817,1,1,a2afad4adbb58fe46e8180fd8fcf21dbe3bc4a25fe48e063062835e55e702b15,2024-12-10T22:15:13.703000
CVE-2024-52818,1,1,c591d3cdd4b4dff4dbb430e663018e6f0482cebb5a15b0e56af6bf8ebf53b92e,2024-12-10T22:15:13.870000
CVE-2024-52816,0,0,9cd2f301c6ad090e9d7c870bdf8f9fb2cdad0c6ad494c1f4c7311d6427b21b93,2024-12-10T22:15:13.527000
CVE-2024-52817,0,0,a2afad4adbb58fe46e8180fd8fcf21dbe3bc4a25fe48e063062835e55e702b15,2024-12-10T22:15:13.703000
CVE-2024-52818,0,0,c591d3cdd4b4dff4dbb430e663018e6f0482cebb5a15b0e56af6bf8ebf53b92e,2024-12-10T22:15:13.870000
CVE-2024-5282,0,0,4f51eeaed389eb920a9aeb3a8c1e7ea5a9931768c3b7eb6744dae1b0adac061c,2024-11-21T09:47:20.920000
CVE-2024-52822,1,1,22387ebff73677ed4f22b111a4ee51601ee1201ceeb655c0752c8406dc17c0a9,2024-12-10T22:15:14.070000
CVE-2024-52823,1,1,7021b3fcf4d4b0f71b69ecbe3da196d9cf95c1e44a4eb8efbc8526196469adcd,2024-12-10T22:15:14.223000
CVE-2024-52824,1,1,1673a49210295a6fc082a70b6b56c4788aaf535d6c6f3e943289e352f3685054,2024-12-10T22:15:14.367000
CVE-2024-52825,1,1,03a6f20a540fbfe10cdbb4208bc17b62c1b1164aeb084113ee07584f80a47d41,2024-12-10T22:15:14.523000
CVE-2024-52826,1,1,eb36d0c5f25dce1e2da616d7f54aafa0f8ce1b6b1f356d5ddb388243c8394811,2024-12-10T22:15:14.687000
CVE-2024-52827,1,1,ce6b5b33bf3e549364019f6a6df626ca03e15278b76c16543c0963f403e8cdfc,2024-12-10T22:15:14.860000
CVE-2024-52828,1,1,ffc66369dd2cff4e7a711b14587329d3250b0469537555be32472488a634a8b4,2024-12-10T22:15:15.027000
CVE-2024-52829,1,1,e888ccf25e1c2fd2ad6e4e0d09e84cd8942e9d25c855d328ed23fe106093daa1,2024-12-10T22:15:15.173000
CVE-2024-52822,0,0,22387ebff73677ed4f22b111a4ee51601ee1201ceeb655c0752c8406dc17c0a9,2024-12-10T22:15:14.070000
CVE-2024-52823,0,0,7021b3fcf4d4b0f71b69ecbe3da196d9cf95c1e44a4eb8efbc8526196469adcd,2024-12-10T22:15:14.223000
CVE-2024-52824,0,0,1673a49210295a6fc082a70b6b56c4788aaf535d6c6f3e943289e352f3685054,2024-12-10T22:15:14.367000
CVE-2024-52825,0,0,03a6f20a540fbfe10cdbb4208bc17b62c1b1164aeb084113ee07584f80a47d41,2024-12-10T22:15:14.523000
CVE-2024-52826,0,0,eb36d0c5f25dce1e2da616d7f54aafa0f8ce1b6b1f356d5ddb388243c8394811,2024-12-10T22:15:14.687000
CVE-2024-52827,0,0,ce6b5b33bf3e549364019f6a6df626ca03e15278b76c16543c0963f403e8cdfc,2024-12-10T22:15:14.860000
CVE-2024-52828,0,0,ffc66369dd2cff4e7a711b14587329d3250b0469537555be32472488a634a8b4,2024-12-10T22:15:15.027000
CVE-2024-52829,0,0,e888ccf25e1c2fd2ad6e4e0d09e84cd8942e9d25c855d328ed23fe106093daa1,2024-12-10T22:15:15.173000
CVE-2024-5283,0,0,2e4c0e59b537a1fa6ef21044d27ad6c5c503d962bc23f2bfaaea7d6483dfc4a1,2024-11-21T09:47:21.083000
CVE-2024-52830,1,1,19f7903b85c1532a422d34d1e9861acaf8c14a85bc7b10106fd28adb2bebffeb,2024-12-10T22:15:15.333000
CVE-2024-52831,1,1,dc7f0b41c9248d2c032245d59bb15968be8ce0e9e78696545855e3a8a31b7cd6,2024-12-10T22:15:15.533000
CVE-2024-52832,1,1,6b0fb930aba7a58c1e47c5feada2dbce541cb9afb931929d1787e423ebefe1cc,2024-12-10T22:15:18.100000
CVE-2024-52833,1,1,f775271d8e1525ec1c720a874d9c56a107552706da04f4612742afe3d52f10c8,2024-12-10T22:15:18.250000
CVE-2024-52834,1,1,e77f5eb9f7764d2efe0114af11137e65b77270553d3af3f3f047b1f77e63425e,2024-12-10T22:15:18.393000
CVE-2024-52835,1,1,336545064d1861dc9ff401e157d88f4c988d4e832514b89199b784a4f850e6b2,2024-12-10T22:15:18.540000
CVE-2024-52836,1,1,8407be9e351ce90331d0d6a24be87ca97a8e9d22a835c5172b2ad8d4b473b3a3,2024-12-10T22:15:18.687000
CVE-2024-52837,1,1,f324dc392916019d8f6d706a98650bd28f14995ee2f27f21edb92de12ff1ebab,2024-12-10T22:15:18.850000
CVE-2024-52838,1,1,aa684fb4dc0e6a326bb6932006784d5d9804e348a05a2fbff4b983ada57c3d15,2024-12-10T22:15:19
CVE-2024-52839,1,1,8fc042291bf4fd05aceb42a32c171ba44e7085e1c28e888235ab14771202447e,2024-12-10T22:15:19.150000
CVE-2024-52830,0,0,19f7903b85c1532a422d34d1e9861acaf8c14a85bc7b10106fd28adb2bebffeb,2024-12-10T22:15:15.333000
CVE-2024-52831,0,0,dc7f0b41c9248d2c032245d59bb15968be8ce0e9e78696545855e3a8a31b7cd6,2024-12-10T22:15:15.533000
CVE-2024-52832,0,0,6b0fb930aba7a58c1e47c5feada2dbce541cb9afb931929d1787e423ebefe1cc,2024-12-10T22:15:18.100000
CVE-2024-52833,0,0,f775271d8e1525ec1c720a874d9c56a107552706da04f4612742afe3d52f10c8,2024-12-10T22:15:18.250000
CVE-2024-52834,0,0,e77f5eb9f7764d2efe0114af11137e65b77270553d3af3f3f047b1f77e63425e,2024-12-10T22:15:18.393000
CVE-2024-52835,0,0,336545064d1861dc9ff401e157d88f4c988d4e832514b89199b784a4f850e6b2,2024-12-10T22:15:18.540000
CVE-2024-52836,0,0,8407be9e351ce90331d0d6a24be87ca97a8e9d22a835c5172b2ad8d4b473b3a3,2024-12-10T22:15:18.687000
CVE-2024-52837,0,0,f324dc392916019d8f6d706a98650bd28f14995ee2f27f21edb92de12ff1ebab,2024-12-10T22:15:18.850000
CVE-2024-52838,0,0,aa684fb4dc0e6a326bb6932006784d5d9804e348a05a2fbff4b983ada57c3d15,2024-12-10T22:15:19
CVE-2024-52839,0,0,8fc042291bf4fd05aceb42a32c171ba44e7085e1c28e888235ab14771202447e,2024-12-10T22:15:19.150000
CVE-2024-5284,0,0,f27d035f8fcaa3c5dd2f39806299edcb6edf39605d373e0e7746729a950daa3c,2024-11-21T09:47:21.243000
CVE-2024-52840,1,1,2ef05a7a1d4726aad93ff9927589eabbf69b8713394ec8276c85ad82a3a7a449,2024-12-10T22:15:19.297000
CVE-2024-52841,1,1,7acf477452bda97d064d1f98fc400d370a895937ed08c14a6ceca91683f11675,2024-12-10T22:15:19.440000
CVE-2024-52842,1,1,bc90bac451465cd8dde720d278c7d7d0ed9441f2cf253864e85e5ad2a9dc6295,2024-12-10T22:15:19.593000
CVE-2024-52843,1,1,bef2831b52c31d865a5ccd34b6cc1e0f39d83f33e4f43802f0ef6d3504564364,2024-12-10T22:15:19.737000
CVE-2024-52844,1,1,523d68c9040a71f7d53514ced8d09219880f2d34b2fa425b43088225a2bd7af6,2024-12-10T22:15:19.900000
CVE-2024-52845,1,1,a63f3fa33ec8d8f293b8bee7a9828fc08a4d3c85538b914dddaf573eb5e83101,2024-12-10T22:15:20.040000
CVE-2024-52846,1,1,e9ebde3d1908d2c426b776cca864e3a2491e837a0a578ef32e077f554f7250d7,2024-12-10T22:15:20.197000
CVE-2024-52847,1,1,109507e52d56b83ccc80c4de9f9174f0399ce85dd73fc5f5694e7651193d8d58,2024-12-10T22:15:20.340000
CVE-2024-52848,1,1,cb65185dccae884335aad1f12c57c4bb19ee27520fe7c74b5ba8d1ea27b26435,2024-12-10T22:15:20.483000
CVE-2024-52849,1,1,b351c123633b435c42646f208c9b7e12281b00f61b5c1ac683652c2ddc266070,2024-12-10T22:15:20.640000
CVE-2024-52840,0,0,2ef05a7a1d4726aad93ff9927589eabbf69b8713394ec8276c85ad82a3a7a449,2024-12-10T22:15:19.297000
CVE-2024-52841,0,0,7acf477452bda97d064d1f98fc400d370a895937ed08c14a6ceca91683f11675,2024-12-10T22:15:19.440000
CVE-2024-52842,0,0,bc90bac451465cd8dde720d278c7d7d0ed9441f2cf253864e85e5ad2a9dc6295,2024-12-10T22:15:19.593000
CVE-2024-52843,0,0,bef2831b52c31d865a5ccd34b6cc1e0f39d83f33e4f43802f0ef6d3504564364,2024-12-10T22:15:19.737000
CVE-2024-52844,0,0,523d68c9040a71f7d53514ced8d09219880f2d34b2fa425b43088225a2bd7af6,2024-12-10T22:15:19.900000
CVE-2024-52845,0,0,a63f3fa33ec8d8f293b8bee7a9828fc08a4d3c85538b914dddaf573eb5e83101,2024-12-10T22:15:20.040000
CVE-2024-52846,0,0,e9ebde3d1908d2c426b776cca864e3a2491e837a0a578ef32e077f554f7250d7,2024-12-10T22:15:20.197000
CVE-2024-52847,0,0,109507e52d56b83ccc80c4de9f9174f0399ce85dd73fc5f5694e7651193d8d58,2024-12-10T22:15:20.340000
CVE-2024-52848,0,0,cb65185dccae884335aad1f12c57c4bb19ee27520fe7c74b5ba8d1ea27b26435,2024-12-10T22:15:20.483000
CVE-2024-52849,0,0,b351c123633b435c42646f208c9b7e12281b00f61b5c1ac683652c2ddc266070,2024-12-10T22:15:20.640000
CVE-2024-5285,0,0,25a8229cdfa4e13254dd0951e315a68edbe7ddfe1ffb4dedc6bf2138cc2fad8f,2024-11-21T09:47:21.403000
CVE-2024-52850,1,1,c61d8c15323f5fe60a6bb33ff0b4523c95ca577ef372ce4e493befa517294c81,2024-12-10T22:15:20.783000
CVE-2024-52851,1,1,5c7c472ab454ae08b0d4ac83b0e5ef9b32b8d2c0f6d4083fc6598ae0f25fc294,2024-12-10T22:15:20.917000
CVE-2024-52852,1,1,74f02244650cea9b338bf8c6b77a0129125ca442d662b4c2bf9f2b45f871c052,2024-12-10T22:15:21.060000
CVE-2024-52853,1,1,e7458c1ef49ccf0d8ea1ba998c86b437710477c6be8a041826e7351c00455252,2024-12-10T22:15:21.217000
CVE-2024-52854,1,1,009841fa040f8f67d9d6d903a2358e2d8e69e21bf548fccc901e2583abfc248f,2024-12-10T22:15:21.373000
CVE-2024-52855,1,1,4492248e1817f494f8ba3e559ba29141d3fc5dfb18c00af373c17316d2f822e5,2024-12-10T22:15:21.523000
CVE-2024-52857,1,1,86db52201160974439d4088fd4de753eb451ab5c80d3a46f608ba42f78414496,2024-12-10T22:15:21.667000
CVE-2024-52858,1,1,da4f0319a7d2920a929366a5da796388ca7d499b384c1b2cc814fd8adf768345,2024-12-10T22:15:21.817000
CVE-2024-52859,1,1,dd90b33a51281c2049b0b0f22847034b3e1a07b8a718369194027b8d65102dd8,2024-12-10T22:15:21.957000
CVE-2024-52850,0,0,c61d8c15323f5fe60a6bb33ff0b4523c95ca577ef372ce4e493befa517294c81,2024-12-10T22:15:20.783000
CVE-2024-52851,0,0,5c7c472ab454ae08b0d4ac83b0e5ef9b32b8d2c0f6d4083fc6598ae0f25fc294,2024-12-10T22:15:20.917000
CVE-2024-52852,0,0,74f02244650cea9b338bf8c6b77a0129125ca442d662b4c2bf9f2b45f871c052,2024-12-10T22:15:21.060000
CVE-2024-52853,0,0,e7458c1ef49ccf0d8ea1ba998c86b437710477c6be8a041826e7351c00455252,2024-12-10T22:15:21.217000
CVE-2024-52854,0,0,009841fa040f8f67d9d6d903a2358e2d8e69e21bf548fccc901e2583abfc248f,2024-12-10T22:15:21.373000
CVE-2024-52855,0,0,4492248e1817f494f8ba3e559ba29141d3fc5dfb18c00af373c17316d2f822e5,2024-12-10T22:15:21.523000
CVE-2024-52857,0,0,86db52201160974439d4088fd4de753eb451ab5c80d3a46f608ba42f78414496,2024-12-10T22:15:21.667000
CVE-2024-52858,0,0,da4f0319a7d2920a929366a5da796388ca7d499b384c1b2cc814fd8adf768345,2024-12-10T22:15:21.817000
CVE-2024-52859,0,0,dd90b33a51281c2049b0b0f22847034b3e1a07b8a718369194027b8d65102dd8,2024-12-10T22:15:21.957000
CVE-2024-5286,0,0,ffcd0e1ed442acf970104f3248793a2ad8bce94591cd92edc7dccb735466eae6,2024-11-21T09:47:21.590000
CVE-2024-52860,1,1,92b871d90d15ef165f8c777c51eab434a63512d59606036ce7531fbbd14c7f9a,2024-12-10T22:15:22.097000
CVE-2024-52861,1,1,d98bf81ccae2045616e8f90105015b86928e39b59021ec8b9adc91787f8d85da,2024-12-10T22:15:22.230000
CVE-2024-52862,1,1,ff7feb4033305bb9603b443894ca7e1821f63bd92cc2a7ef3c702449b17d24c0,2024-12-10T22:15:22.377000
CVE-2024-52864,1,1,344db1c8e80cd3870272e5b0e7f2f750b1520b0520d6c69b05ffa75ced8e0f77,2024-12-10T22:15:22.520000
CVE-2024-52865,1,1,ce4b9bc93e1340740e22119661ed960f798d2b0f9d93c5cf6ab09b063beb6c65,2024-12-10T22:15:22.663000
CVE-2024-52860,0,0,92b871d90d15ef165f8c777c51eab434a63512d59606036ce7531fbbd14c7f9a,2024-12-10T22:15:22.097000
CVE-2024-52861,0,0,d98bf81ccae2045616e8f90105015b86928e39b59021ec8b9adc91787f8d85da,2024-12-10T22:15:22.230000
CVE-2024-52862,0,0,ff7feb4033305bb9603b443894ca7e1821f63bd92cc2a7ef3c702449b17d24c0,2024-12-10T22:15:22.377000
CVE-2024-52864,0,0,344db1c8e80cd3870272e5b0e7f2f750b1520b0520d6c69b05ffa75ced8e0f77,2024-12-10T22:15:22.520000
CVE-2024-52865,0,0,ce4b9bc93e1340740e22119661ed960f798d2b0f9d93c5cf6ab09b063beb6c65,2024-12-10T22:15:22.663000
CVE-2024-52867,0,0,b14a9f7c8b0d212f056e38d3758777be722d9d6a10918da14d6ef6ffa3fcbd7e,2024-11-21T09:46:35.283000
CVE-2024-5287,0,0,ede9629ba14e7833d0e00ab367a4e2205145f22a5dce3f4d9b720c5001bdf2cc,2024-11-21T09:47:21.753000
CVE-2024-52871,0,0,bc912334ad7760e2905477f1da15c92d58ec818da9de2502b7206c7a0336bc4d,2024-11-18T18:35:09.027000
@ -268645,32 +268645,32 @@ CVE-2024-52959,0,0,2eb2157890632ca954f7c150a61a989fe40d967f91d0ca40fadb69eac73b6
CVE-2024-5296,0,0,f4668a62dc8d11409bf71e36f1f99bcc5881901b7026ad13be4beab222eb08c7,2024-11-21T09:47:22.827000
CVE-2024-5297,0,0,4e7f74d9629bbb9b864fb76b28bd5d406dd3be0c174577372182a6d0a600d934,2024-11-21T09:47:22.990000
CVE-2024-5298,0,0,329feabae44ccd7ff86530cac1ce0ba86c416ea44126377af7ea7290b6d65a10,2024-11-21T09:47:23.103000
CVE-2024-52982,1,1,d4c8cf917744a1fead78b8ade90a4122e489131dde6a21024387c784388b07c5,2024-12-10T21:15:18.053000
CVE-2024-52983,1,1,32f716a4ee996ee93a11134a523dbdcc04456d0b12d72d48c947054bd93ef1f2,2024-12-10T21:15:18.203000
CVE-2024-52984,1,1,9f4fa98da214a5c55e0a26e9c6fa0cdbcee4632e62475188f7d50d034471e8ae,2024-12-10T21:15:18.347000
CVE-2024-52985,1,1,0d55d1fc87ef1e1890a8bd3d147b2ad872c29dabc90a82bc7046d59271c809a4,2024-12-10T21:15:18.483000
CVE-2024-52986,1,1,8302c940a08ae37c097cec8a4c165e4074a4b7d15080465dcdd82ae75c28f5c7,2024-12-10T21:15:18.627000
CVE-2024-52987,1,1,a439891a04556f94a07a5caadc799167cd1b027e7464a630f332a47bf4345530,2024-12-10T21:15:18.760000
CVE-2024-52988,1,1,e8bcbc0ecd6fe39f74e69d3af61e03c91fc054f693ecbfa650f21c12688923c7,2024-12-10T21:15:18.910000
CVE-2024-52989,1,1,81491d0f65d8a7345ca04f13f5d8c90c19ad2f44f9bf39b5272fc930e77722aa,2024-12-10T21:15:19.040000
CVE-2024-52982,0,0,d4c8cf917744a1fead78b8ade90a4122e489131dde6a21024387c784388b07c5,2024-12-10T21:15:18.053000
CVE-2024-52983,0,0,32f716a4ee996ee93a11134a523dbdcc04456d0b12d72d48c947054bd93ef1f2,2024-12-10T21:15:18.203000
CVE-2024-52984,0,0,9f4fa98da214a5c55e0a26e9c6fa0cdbcee4632e62475188f7d50d034471e8ae,2024-12-10T21:15:18.347000
CVE-2024-52985,0,0,0d55d1fc87ef1e1890a8bd3d147b2ad872c29dabc90a82bc7046d59271c809a4,2024-12-10T21:15:18.483000
CVE-2024-52986,0,0,8302c940a08ae37c097cec8a4c165e4074a4b7d15080465dcdd82ae75c28f5c7,2024-12-10T21:15:18.627000
CVE-2024-52987,0,0,a439891a04556f94a07a5caadc799167cd1b027e7464a630f332a47bf4345530,2024-12-10T21:15:18.760000
CVE-2024-52988,0,0,e8bcbc0ecd6fe39f74e69d3af61e03c91fc054f693ecbfa650f21c12688923c7,2024-12-10T21:15:18.910000
CVE-2024-52989,0,0,81491d0f65d8a7345ca04f13f5d8c90c19ad2f44f9bf39b5272fc930e77722aa,2024-12-10T21:15:19.040000
CVE-2024-5299,0,0,2529d83f4332340dd8e75b95926982e4ae8b624f13bfc3e75814ba5d64949f5a,2024-11-21T09:47:23.213000
CVE-2024-52990,1,1,bd2f0de42826863f33e952bec766a3e63faebab4bec1f9cc4287a21759add14e,2024-12-10T21:15:19.170000
CVE-2024-52991,1,1,8a6821b7f3b06f04b77be1068e019e2a9fca024a567b021c86f4eb9a2fb41b72,2024-12-10T22:15:22.883000
CVE-2024-52992,1,1,3e38f4643e1141961ac4b544253d85cedc850a050573c8615becfa4a718a6505,2024-12-10T22:15:23.033000
CVE-2024-52993,1,1,748892de9e9d59351bd15771ff43c45e736b1f012ed3a213c6de1f0854b492af,2024-12-10T22:15:23.190000
CVE-2024-52994,1,1,2cd0586fb40792c7a487ff88a2682a1ecd6f2d454b9994169352cd7df9aeb6df,2024-12-10T21:15:19.310000
CVE-2024-52995,1,1,a3099d90b55abcf26b549c067920f32a315aa9a3ca364123259b3a6e079a22f5,2024-12-10T21:15:19.440000
CVE-2024-52996,1,1,a57afb01d3277dc8f1c34b62e9696316a1a26d9c78ffb0410a0300bb2c1dc079,2024-12-10T21:15:19.573000
CVE-2024-52997,1,1,a5ab10ce606936e2cfb895068f98aa9f46c96c6578e4ed8df8154c7e1884d01f,2024-12-10T21:15:19.740000
CVE-2024-52990,0,0,bd2f0de42826863f33e952bec766a3e63faebab4bec1f9cc4287a21759add14e,2024-12-10T21:15:19.170000
CVE-2024-52991,0,0,8a6821b7f3b06f04b77be1068e019e2a9fca024a567b021c86f4eb9a2fb41b72,2024-12-10T22:15:22.883000
CVE-2024-52992,0,0,3e38f4643e1141961ac4b544253d85cedc850a050573c8615becfa4a718a6505,2024-12-10T22:15:23.033000
CVE-2024-52993,0,0,748892de9e9d59351bd15771ff43c45e736b1f012ed3a213c6de1f0854b492af,2024-12-10T22:15:23.190000
CVE-2024-52994,0,0,2cd0586fb40792c7a487ff88a2682a1ecd6f2d454b9994169352cd7df9aeb6df,2024-12-10T21:15:19.310000
CVE-2024-52995,0,0,a3099d90b55abcf26b549c067920f32a315aa9a3ca364123259b3a6e079a22f5,2024-12-10T21:15:19.440000
CVE-2024-52996,0,0,a57afb01d3277dc8f1c34b62e9696316a1a26d9c78ffb0410a0300bb2c1dc079,2024-12-10T21:15:19.573000
CVE-2024-52997,0,0,a5ab10ce606936e2cfb895068f98aa9f46c96c6578e4ed8df8154c7e1884d01f,2024-12-10T21:15:19.740000
CVE-2024-52998,0,0,6290b7bcb6009685ce74422e3ebe6e84d8aa2373cdb09dbaf200385294d7d729,2024-12-03T14:32:51.580000
CVE-2024-52999,1,1,95094939bfd6900cf25010b48f43c6d669c48c53977270952939580400b5673a,2024-12-10T22:15:23.547000
CVE-2024-53000,1,1,723fd44d0fa4c10847595664197057a9d5c075f93324ef9320ae7996448cf078,2024-12-10T22:15:23.693000
CVE-2024-53001,1,1,6027b6bf4bd2e0541d44309761cda27d9f5d859e89bdf09504d92dd8c06a87ba,2024-12-10T22:15:23.837000
CVE-2024-53002,1,1,97d9d1f10417834075f33d462468d1505b456bdcf996215b44a6a1c8df77a490,2024-12-10T22:15:24
CVE-2024-53003,1,1,7ec181dbbf51dcee94abe1495b97e08b47f599c2b84fb505c7959a9ca50c835b,2024-12-10T22:15:24.140000
CVE-2024-53004,1,1,f0691fe6059760f11f76965205dce3364b2da2ff2af1141452b95793c6854333,2024-12-10T22:15:24.287000
CVE-2024-53005,1,1,b4b91484a4802af6ee99458daeb2041f9650c5d1dd9592932ad0ce610dc38603,2024-12-10T22:15:24.463000
CVE-2024-53006,1,1,1b77a93f61b789d73a3401b2f32b9c484aa597e79953855de24b5f01d9cc1099,2024-12-10T22:15:24.617000
CVE-2024-52999,0,0,95094939bfd6900cf25010b48f43c6d669c48c53977270952939580400b5673a,2024-12-10T22:15:23.547000
CVE-2024-53000,0,0,723fd44d0fa4c10847595664197057a9d5c075f93324ef9320ae7996448cf078,2024-12-10T22:15:23.693000
CVE-2024-53001,0,0,6027b6bf4bd2e0541d44309761cda27d9f5d859e89bdf09504d92dd8c06a87ba,2024-12-10T22:15:23.837000
CVE-2024-53002,0,0,97d9d1f10417834075f33d462468d1505b456bdcf996215b44a6a1c8df77a490,2024-12-10T22:15:24
CVE-2024-53003,0,0,7ec181dbbf51dcee94abe1495b97e08b47f599c2b84fb505c7959a9ca50c835b,2024-12-10T22:15:24.140000
CVE-2024-53004,0,0,f0691fe6059760f11f76965205dce3364b2da2ff2af1141452b95793c6854333,2024-12-10T22:15:24.287000
CVE-2024-53005,0,0,b4b91484a4802af6ee99458daeb2041f9650c5d1dd9592932ad0ce610dc38603,2024-12-10T22:15:24.463000
CVE-2024-53006,0,0,1b77a93f61b789d73a3401b2f32b9c484aa597e79953855de24b5f01d9cc1099,2024-12-10T22:15:24.617000
CVE-2024-53008,0,0,36a5b7477386f9a2d6dcbfd20d0c70ef83d1d8823020ec6fd4bce6966412829a,2024-11-28T03:15:16.363000
CVE-2024-5301,0,0,9944435231e4232deb9644b6756c62dd37aded32278d6910acfd86a9fca6bba1,2024-11-21T09:47:23.327000
CVE-2024-5302,0,0,82745a56882a5e93127da6843cc252c1f39f5e3b6031b0cf4b30203e7450051c,2024-11-21T09:47:23.453000
@ -268858,14 +268858,14 @@ CVE-2024-53457,0,0,2a9d6ff9530514e1b1118f6cfb8ea3e80f964c7759c5b6fc65af26bdd6a25
CVE-2024-53459,0,0,5f9e5f3a8b33fbe02bdd059bb8fe15cb2eeacdc4f602dd12944ee928044f080b,2024-12-02T18:15:11.123000
CVE-2024-5346,0,0,835e1b7230e6e33db8d8cf7bc9b64a0aa9f43b5b6335773933376ca9c2372d0c,2024-11-21T09:47:28
CVE-2024-5347,0,0,a4eb7d8feed8c584fc13b2c0e6136e67598b45cb75b5638081f14ed1c0f5fa79,2024-11-21T09:47:28.127000
CVE-2024-53470,0,1,7e717d458d3e971476fce58f4e759acfb3653594788d9bb4f7ef6a8cad1dbc8b,2024-12-10T22:15:25.010000
CVE-2024-53471,0,1,dea70dfafbf7c115f6b9fc5aab8fa383b86b6c8d65d06c11e3049e5b3d3b885e,2024-12-10T22:15:25.277000
CVE-2024-53470,0,0,7e717d458d3e971476fce58f4e759acfb3653594788d9bb4f7ef6a8cad1dbc8b,2024-12-10T22:15:25.010000
CVE-2024-53471,0,0,dea70dfafbf7c115f6b9fc5aab8fa383b86b6c8d65d06c11e3049e5b3d3b885e,2024-12-10T22:15:25.277000
CVE-2024-53472,0,0,72dbc0cce14855ba1d3569457dbee3a8b2bcc3ee364096a0891b3e57adbf038f,2024-12-05T16:15:25.977000
CVE-2024-53473,0,0,358e2b05fdc54a6e3691e8ba3f77fedff57be14fcbc952f41ed19a97501744e2,2024-12-07T23:15:34.137000
CVE-2024-53477,0,0,0bf7b09ba287b24f18c03a66d52e9150f8f87653e9cc33aac9bf4a8d9356bba9,2024-12-02T21:15:11.217000
CVE-2024-5348,0,0,0c3454114961657672c2409af3f9f2f3bb9995c6579ea15f7d29552347b906f3,2024-11-21T09:47:28.240000
CVE-2024-53480,0,0,4889d0ff1fe4dddc3829b2478649a6155b88e7256aa2574b5a87fc73b9645c93,2024-12-10T20:15:20.920000
CVE-2024-53481,0,1,8c2a844186665814baa9349f5f9eb75c05702deacf50797c7fa1db6e74c909d8,2024-12-10T21:15:20.003000
CVE-2024-53481,0,0,8c2a844186665814baa9349f5f9eb75c05702deacf50797c7fa1db6e74c909d8,2024-12-10T21:15:20.003000
CVE-2024-53484,0,0,0fc6633eb0bb323c7c1b56ffa21d5cd5b78570e350e583a38942d8a30f904a22,2024-12-03T16:15:23.980000
CVE-2024-5349,0,0,75911b9a04c41ba625bf561a6fda73d6a6249d16eb1736f313b0d58e1202f17d,2024-11-21T09:47:28.357000
CVE-2024-53490,0,0,c2f3aa4cff7ef0e114b620eaf49a4030edbb963b6051b20627f7157e432c7834,2024-12-05T17:15:14.180000
@ -269110,17 +269110,17 @@ CVE-2024-53947,0,0,f3f49f507fdd673942647045e7a6129704131798f17f201931ae5ff94b253
CVE-2024-53948,0,0,6ea9a9bf9db83504c3565ac4e6f0a87dd0b4b80d29ed015b913925534416c4a7,2024-12-09T18:15:23.893000
CVE-2024-53949,0,0,b536a3aaccc48e4b523395b29ca4495755368005bd7e091272f9f8a953010750,2024-12-09T18:15:24.013000
CVE-2024-5395,0,0,aa518ac6cc2e8e3e116d2e709097641ebff6dab87bd1ab80d2e397c0f6317f19,2024-11-21T09:47:34.290000
CVE-2024-53951,1,1,43e509fee888dfedc1ddd04d17a82a93b47aa2d7f61f4a6291f1cd966a3839d8,2024-12-10T21:15:20.167000
CVE-2024-53952,1,1,38daed262ef75a5427be61fbe61366babf285e64ee4dda69e669dbd911c9195f,2024-12-10T21:15:20.307000
CVE-2024-53953,1,1,5dc2d3b87414abd1b0a86230f9d8acddf47be361a7c50818b7ce9ac006f308f3,2024-12-10T21:15:20.437000
CVE-2024-53954,1,1,12337a35199c24ab8d7ec22f5a08d121844d28c7a25b063dca67d12a40591e05,2024-12-10T21:15:20.560000
CVE-2024-53955,1,1,c5af8768fe7083075e11107c6d540f2f7727b32060d9923503be5a85bf08f0e6,2024-12-10T22:15:25.610000
CVE-2024-53956,1,1,e5a8521a14e4cbb76222eef41cd69b2793f16069558b7af55be6244ddaff726e,2024-12-10T22:15:25.767000
CVE-2024-53957,1,1,1bb9e76a3063f3f957d1b9a7506439ae97014640321e8abb9df957ae9e9cf255,2024-12-10T22:15:25.917000
CVE-2024-53958,1,1,b8642d2277418d24dfeb23f78defa8e23296fe394a736852cb16590879257a5f,2024-12-10T22:15:26.510000
CVE-2024-53959,1,1,5a246505d595c5cbf97996d80b5e32a114e38474dd1156baf85534b2cb2948eb,2024-12-10T22:15:27.347000
CVE-2024-53951,0,0,43e509fee888dfedc1ddd04d17a82a93b47aa2d7f61f4a6291f1cd966a3839d8,2024-12-10T21:15:20.167000
CVE-2024-53952,0,0,38daed262ef75a5427be61fbe61366babf285e64ee4dda69e669dbd911c9195f,2024-12-10T21:15:20.307000
CVE-2024-53953,0,0,5dc2d3b87414abd1b0a86230f9d8acddf47be361a7c50818b7ce9ac006f308f3,2024-12-10T21:15:20.437000
CVE-2024-53954,0,0,12337a35199c24ab8d7ec22f5a08d121844d28c7a25b063dca67d12a40591e05,2024-12-10T21:15:20.560000
CVE-2024-53955,0,0,c5af8768fe7083075e11107c6d540f2f7727b32060d9923503be5a85bf08f0e6,2024-12-10T22:15:25.610000
CVE-2024-53956,0,0,e5a8521a14e4cbb76222eef41cd69b2793f16069558b7af55be6244ddaff726e,2024-12-10T22:15:25.767000
CVE-2024-53957,0,0,1bb9e76a3063f3f957d1b9a7506439ae97014640321e8abb9df957ae9e9cf255,2024-12-10T22:15:25.917000
CVE-2024-53958,0,0,b8642d2277418d24dfeb23f78defa8e23296fe394a736852cb16590879257a5f,2024-12-10T22:15:26.510000
CVE-2024-53959,0,0,5a246505d595c5cbf97996d80b5e32a114e38474dd1156baf85534b2cb2948eb,2024-12-10T22:15:27.347000
CVE-2024-5396,0,0,a2e12a462b12b592c06259ea229afce64d9cb2b529021eb0ae1f63c97dd38d23,2024-11-21T09:47:34.430000
CVE-2024-53960,1,1,7010c91cffe8702ad07fc789dd9a0c2b48640368e9c1eab4aa8d0a4b82defe1e,2024-12-10T22:15:27.550000
CVE-2024-53960,0,0,7010c91cffe8702ad07fc789dd9a0c2b48640368e9c1eab4aa8d0a4b82defe1e,2024-12-10T22:15:27.550000
CVE-2024-5397,0,0,1c1b9f46c7fae3545f6c6bff25b88c782d3838975abd0364f3776c48ef8d8b3f,2024-11-21T09:47:34.563000
CVE-2024-53975,0,0,1c6eb06597883327a72f325fc0f751cbd0dc5c99b87a33d8b2ef4784e7416fa6,2024-11-27T15:15:26.923000
CVE-2024-53976,0,0,e0e34654e2920917adcad83ccc486a90e5a6d39da581d67f84c5bbc103fd6b7b,2024-11-26T16:15:21.430000
@ -269151,26 +269151,26 @@ CVE-2024-54008,0,0,c83adc0070c7b9fe5dc822e3df77a6cc986e702399c7129cd968ded9ec0b9
CVE-2024-54014,0,0,9895136be901bda6024d3c86fc774e344b5ffa93f0cfe6e13e8990c6229717ed,2024-12-05T03:15:14.530000
CVE-2024-5402,0,0,ff0d9bb22ac0a71984c61b65bae28749f481f4dd7d54b4eb8642f168357fe194,2024-11-21T09:47:34.947000
CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000
CVE-2024-54032,1,1,df0158302690dede6512412fea2d6ccccc394f592fbabea5c3d49cd38dd7f328,2024-12-10T21:15:20.690000
CVE-2024-54034,1,1,baaa40662bc32f195cddc79f3445c5d2533af057773b700c7fef44d6833372be,2024-12-10T21:15:20.817000
CVE-2024-54036,1,1,21405c4cb11cd6b4deb8ff32afbb450126cd9ec1484d35e315024d84e8c8a188,2024-12-10T21:15:20.947000
CVE-2024-54037,1,1,4f1c9e1bdd3e5e66246dfdf3e682f75fa5431cc6ed04a6b8c3b10699379f1e08,2024-12-10T21:15:21.080000
CVE-2024-54038,1,1,508c9e54004006962495f03a00b50c70c49263e5fc81ce6f7870a7da64ac2daf,2024-12-10T21:15:21.210000
CVE-2024-54039,1,1,3b2e527d49295c6804e18cf2f92ddd23f41d3c6345c8b9ac0c14f1f2ed50f544,2024-12-10T21:15:21.337000
CVE-2024-54032,0,0,df0158302690dede6512412fea2d6ccccc394f592fbabea5c3d49cd38dd7f328,2024-12-10T21:15:20.690000
CVE-2024-54034,0,0,baaa40662bc32f195cddc79f3445c5d2533af057773b700c7fef44d6833372be,2024-12-10T21:15:20.817000
CVE-2024-54036,0,0,21405c4cb11cd6b4deb8ff32afbb450126cd9ec1484d35e315024d84e8c8a188,2024-12-10T21:15:20.947000
CVE-2024-54037,0,0,4f1c9e1bdd3e5e66246dfdf3e682f75fa5431cc6ed04a6b8c3b10699379f1e08,2024-12-10T21:15:21.080000
CVE-2024-54038,0,0,508c9e54004006962495f03a00b50c70c49263e5fc81ce6f7870a7da64ac2daf,2024-12-10T21:15:21.210000
CVE-2024-54039,0,0,3b2e527d49295c6804e18cf2f92ddd23f41d3c6345c8b9ac0c14f1f2ed50f544,2024-12-10T21:15:21.337000
CVE-2024-5404,0,0,3740c7be3046d2190332188e66ec21e8b1d4282df75b875095c31d64e80fbe92,2024-11-21T09:47:35.213000
CVE-2024-54040,1,1,549d978f7583a4825b97064030c5badb3762cf7e6723188bcefb9be1a6200d33,2024-12-10T21:15:21.463000
CVE-2024-54041,1,1,f606483c8aa9eca45ff6f1881b32b573f4344237f4044c5f4b6ae4fed277b694,2024-12-10T21:15:21.590000
CVE-2024-54042,1,1,627992c033209e845a6af41961f6f72dbd144af08f18d5464d315f1b5874ced1,2024-12-10T21:15:21.720000
CVE-2024-54043,1,1,55493f4f1751ed4dc7c97754ee71be29e965f63c4bc095b4a32f8cd59aae22e4,2024-12-10T21:15:21.850000
CVE-2024-54044,1,1,06fe2a3b8d676ceb22e837bcdf275bfc416d9d966ef51cb8951620a42b790759,2024-12-10T21:15:21.977000
CVE-2024-54045,1,1,423094df5e959be2432263e2ec7f568bf9c0ded1dc0c87e6596f89c05684b444,2024-12-10T21:15:22.110000
CVE-2024-54046,1,1,589bf843ec98f51533159c4e2ecab05e1a70204de35a8fc003fe2b3a60389b77,2024-12-10T21:15:22.237000
CVE-2024-54047,1,1,468dbe2f56cb4813dd8eda8a037852b48318d240118d1d600cef498d5bed864d,2024-12-10T21:15:22.360000
CVE-2024-54048,1,1,39b377fa96a757b526e90a8c59e7b3f7cfc1a9151ce03d075db32fe19596a203,2024-12-10T21:15:22.490000
CVE-2024-54049,1,1,c1e7f2cbe12586d407f72f606a5e2a9c6ca117139095e3df497b3a8c2ce3a497,2024-12-10T21:15:22.627000
CVE-2024-54040,0,0,549d978f7583a4825b97064030c5badb3762cf7e6723188bcefb9be1a6200d33,2024-12-10T21:15:21.463000
CVE-2024-54041,0,0,f606483c8aa9eca45ff6f1881b32b573f4344237f4044c5f4b6ae4fed277b694,2024-12-10T21:15:21.590000
CVE-2024-54042,0,0,627992c033209e845a6af41961f6f72dbd144af08f18d5464d315f1b5874ced1,2024-12-10T21:15:21.720000
CVE-2024-54043,0,0,55493f4f1751ed4dc7c97754ee71be29e965f63c4bc095b4a32f8cd59aae22e4,2024-12-10T21:15:21.850000
CVE-2024-54044,0,0,06fe2a3b8d676ceb22e837bcdf275bfc416d9d966ef51cb8951620a42b790759,2024-12-10T21:15:21.977000
CVE-2024-54045,0,0,423094df5e959be2432263e2ec7f568bf9c0ded1dc0c87e6596f89c05684b444,2024-12-10T21:15:22.110000
CVE-2024-54046,0,0,589bf843ec98f51533159c4e2ecab05e1a70204de35a8fc003fe2b3a60389b77,2024-12-10T21:15:22.237000
CVE-2024-54047,0,0,468dbe2f56cb4813dd8eda8a037852b48318d240118d1d600cef498d5bed864d,2024-12-10T21:15:22.360000
CVE-2024-54048,0,0,39b377fa96a757b526e90a8c59e7b3f7cfc1a9151ce03d075db32fe19596a203,2024-12-10T21:15:22.490000
CVE-2024-54049,0,0,c1e7f2cbe12586d407f72f606a5e2a9c6ca117139095e3df497b3a8c2ce3a497,2024-12-10T21:15:22.627000
CVE-2024-5405,0,0,8df36cd9ebb4aacfaea97c0ae9188e72e9768324f03849be72121f482af48749,2024-11-21T09:47:35.333000
CVE-2024-54050,1,1,428c85900ce276f730a05cb59342cccb3401b06f05c398638e56ca8561c03ce2,2024-12-10T21:15:22.767000
CVE-2024-54051,1,1,1d913bcc4017b91db45413bcbfda71d5158f669904b648b89bb2fe4e4425403e,2024-12-10T21:15:22.927000
CVE-2024-54050,0,0,428c85900ce276f730a05cb59342cccb3401b06f05c398638e56ca8561c03ce2,2024-12-10T21:15:22.767000
CVE-2024-54051,0,0,1d913bcc4017b91db45413bcbfda71d5158f669904b648b89bb2fe4e4425403e,2024-12-10T21:15:22.927000
CVE-2024-5406,0,0,5db0f501f7c712d4bcce798425460b3472165eeef82fd225689429d234120e5b,2024-11-21T09:47:35.457000
CVE-2024-5407,0,0,e082637321598f3dc8c3c9e1760b81a1e1197c4d13cd58fed3245c37f0bb71c9,2024-11-21T09:47:35.567000
CVE-2024-5408,0,0,0b23a712a85d13fef48f02294d854672174790bd624dfee1416450ccef66434a,2024-11-21T09:47:35.690000
@ -269192,6 +269192,7 @@ CVE-2024-5413,0,0,9c8ff2da29f08732e07c89fc8382f308bef7d11e6924d70a41370457152a22
CVE-2024-54130,0,0,d743b97b688f1889df506833c19b059d59c521aa9cf19eb794486082f55f5a26,2024-12-05T16:15:27.020000
CVE-2024-54131,0,0,c463433824fe5efdee504c6600137f62c1f6f3079653cf467045d47ec224d2f9,2024-12-03T21:15:08.127000
CVE-2024-54132,0,0,527670a307280752e14dbc843883c73b56ba2891158d4335a64d013e5f7b3f3b,2024-12-04T16:15:26.730000
CVE-2024-54133,1,1,9f28f1b1196428f0b352b2fc621327cac84b53a445be84368cd6337d539f12db,2024-12-10T23:15:06.240000
CVE-2024-54134,0,0,3a899a081edf0165ba2208f8f25abf5168b570b324e22e9511247da0e409bb1b,2024-12-04T16:15:26.883000
CVE-2024-54135,0,0,0a2cd21806eae801f971086127a29556a7e3e1448341f7576c0282d14711f088,2024-12-06T16:15:22.340000
CVE-2024-54136,0,0,a25cfad5b733779b89f1058e830aa0566695b66d6e2a5fd70ee19ee3a2642062,2024-12-06T16:15:22.500000
@ -269433,12 +269434,14 @@ CVE-2024-55601,0,0,89175adefd85ee52b8d0660bf5cffaad0818c3ee1a9c4ccd9c1b1dad82da5
CVE-2024-55602,0,0,50669de054a1828aef63b70e8d626e9a1c733113b3df3c2b5b9e9ba1699877b0,2024-12-10T18:15:43.500000
CVE-2024-5561,0,0,4022800ab031c19c97b7a8f23f8f937de2c70091af69e68157c4f9d46ea4b02c,2024-10-07T17:45:29.950000
CVE-2024-55634,0,0,ad2c430955951ebc1817bb1d3d7bee47a20555d925042aca8d328fb0e4be76b9,2024-12-10T00:15:22.323000
CVE-2024-55635,0,1,02aeec60dc680ba5e64ba21b7921f79d14588994f0456ea0982ac81c3eef7905,2024-12-10T22:15:28.190000
CVE-2024-55636,0,1,b733e66d088dc80ea0d2f7272ec2b8b2908f8b8b999bac93067067b2ba1c576a,2024-12-10T22:15:28.347000
CVE-2024-55637,0,1,b339d1b46d013911874bbdadbc242ce2cec2e62c40f0c0b5fcadabacc3a18ead,2024-12-10T22:15:28.500000
CVE-2024-55638,0,1,a4181edcafad19b32a68c9307a9f7762f0502e887b0637bf4f98f55d3d91262d,2024-12-10T22:15:28.640000
CVE-2024-55635,0,0,02aeec60dc680ba5e64ba21b7921f79d14588994f0456ea0982ac81c3eef7905,2024-12-10T22:15:28.190000
CVE-2024-55636,0,0,b733e66d088dc80ea0d2f7272ec2b8b2908f8b8b999bac93067067b2ba1c576a,2024-12-10T22:15:28.347000
CVE-2024-55637,0,0,b339d1b46d013911874bbdadbc242ce2cec2e62c40f0c0b5fcadabacc3a18ead,2024-12-10T22:15:28.500000
CVE-2024-55638,0,0,a4181edcafad19b32a68c9307a9f7762f0502e887b0637bf4f98f55d3d91262d,2024-12-10T22:15:28.640000
CVE-2024-5564,0,0,3aa73f6c6404c243b9f6f394613afc94e063551efa8746acdefa8554437d3ac7,2024-11-21T09:47:56.340000
CVE-2024-5565,0,0,032bdcff8dac2089c90f98c674e66bb1a3269fca437d11950d454869056d685d,2024-11-25T13:15:07.310000
CVE-2024-55653,1,1,23cbcdc73ea3dd154265821e22496b95434ef5c6f5ff0474f2c26897e605302d,2024-12-10T23:15:06.410000
CVE-2024-55655,1,1,07019389634e3065fbeabfcfefa9ff068beb42552c22fbc2c221237f731ec5c6,2024-12-10T23:15:06.570000
CVE-2024-5566,0,0,55157068cefe792f617f9d985299d525c0156c753cbd8d7bb670501225f08f89,2024-11-21T09:47:56.607000
CVE-2024-5567,0,0,58e82791c8fea00e3d24c3a38ca7e73d8284e730929acebb640917b4f39b60a1,2024-09-26T18:27:51.817000
CVE-2024-5569,0,0,af3784ad99fd1d8f40146e3cc0f791571d7dbaa8c15694f8f3c51428e2663498,2024-11-21T09:47:56.840000
@ -269521,7 +269524,7 @@ CVE-2024-5656,0,0,ba99339cfecc1c5fdb0f6d1bb26f06bfe70b58ff628ceb5bd66c459a2628a6
CVE-2024-5657,0,0,322b989a97af9a632a310787c45ccef95cbff8f0006f11abe6348fcd1668034b,2024-11-21T09:48:06.280000
CVE-2024-5658,0,0,7e7462fc3515e519516e2f809c98e13e2106352e6aac99c565fb770e189dd063,2024-11-21T09:48:06.413000
CVE-2024-5659,0,0,83e7687f93b86419198f1683634dd14733df87a0c466715b2e7e79370f69ac01,2024-11-21T09:48:06.543000
CVE-2024-5660,0,1,16e07c0fdda274ec7d4c36bf5943e00082ee54db66c328edcf07e7ace2166180,2024-12-10T22:15:28.790000
CVE-2024-5660,0,0,16e07c0fdda274ec7d4c36bf5943e00082ee54db66c328edcf07e7ace2166180,2024-12-10T22:15:28.790000
CVE-2024-5661,0,0,7d090de96660a134ff2e3cb7262fde0b3d927ce5a88611486b37761a6a2d78a0,2024-11-21T09:48:06.673000
CVE-2024-5662,0,0,a32230f368c985ce000177685318420ae12365dafb7b142a133da07f0e3fd986,2024-11-21T09:48:06.860000
CVE-2024-5663,0,0,3d93cfa6260123c05a0fe5dd837778ab353045f85b9b96941dd647b061b7390d,2024-11-21T09:48:06.970000
@ -272368,7 +272371,7 @@ CVE-2024-8975,0,0,2e1af783568cf7ad44e3b33e6ac71980410920ee6be566fa4a01ec060d747a
CVE-2024-8977,0,0,cb8e4225cbeae27a4d5cd5a6caff3e78c74f90a4a117f3ebee8859bf0cf66b60,2024-10-16T17:10:13.220000
CVE-2024-8978,0,0,d27b973a30e145b038f4aa46488a1a73c5d80a05af06996c64c589eb06d82073,2024-11-19T17:04:38.903000
CVE-2024-8979,0,0,c8d7a454a2e21b5a6419915f563e8d188611a09ebbbeb9864f16825c369f1ca3,2024-11-19T17:05:08.270000
CVE-2024-8980,0,1,f21e1b5a085b95548892c69cb9e71b81f9ad3987b25a3b637ff6f5bc1ea3182e,2024-12-10T21:07:09.857000
CVE-2024-8980,0,0,f21e1b5a085b95548892c69cb9e71b81f9ad3987b25a3b637ff6f5bc1ea3182e,2024-12-10T21:07:09.857000
CVE-2024-8981,0,0,ab731ebe09d14b423954c8d1c309f529eca9637e35f5ff7d59615aebbb87cece,2024-10-04T13:51:25.567000
CVE-2024-8983,0,0,27bd060291bf8fbf2987becf30df5e9011a78deda3d7b017aa5acbc337d382f1,2024-10-10T12:57:21.987000
CVE-2024-8985,0,0,2747a15c007aed3b55062332e399a5ed9dbfdc53f9e2cb4a2cbced1eaac1da1a,2024-11-13T17:01:16.850000

Can't render this file because it is too large.