Auto-Update: 2024-11-04T03:00:23.406842+00:00

This commit is contained in:
cad-safe-bot 2024-11-04 03:03:24 +00:00
parent 602b2b5875
commit 23a290bacd
61 changed files with 1640 additions and 112 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10310",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-02T02:15:12.070",
"lastModified": "2024-11-02T02:15:12.070",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10540",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-02T02:15:12.320",
"lastModified": "2024-11-02T02:15:12.320",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10697",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-02T12:15:15.780",
"lastModified": "2024-11-02T12:15:15.780",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10698",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-02T14:15:12.980",
"lastModified": "2024-11-02T14:15:12.980",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10699",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-02T15:15:16.313",
"lastModified": "2024-11-02T15:15:16.313",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10700",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-02T16:15:03.243",
"lastModified": "2024-11-02T16:15:03.243",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10701",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-02T18:15:03.057",
"lastModified": "2024-11-02T18:15:03.057",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10702",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-02T18:15:03.363",
"lastModified": "2024-11-02T18:15:03.363",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10730",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-03T09:15:02.943",
"lastModified": "2024-11-03T09:15:02.943",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10731",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-03T10:15:03.113",
"lastModified": "2024-11-03T10:15:03.113",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10732",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-03T11:15:03.147",
"lastModified": "2024-11-03T11:15:03.147",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10733",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-03T12:15:12.780",
"lastModified": "2024-11-03T12:15:12.780",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10734",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-03T13:15:03.197",
"lastModified": "2024-11-03T13:15:03.197",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10735",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-03T14:15:13.127",
"lastModified": "2024-11-03T14:15:13.127",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10736",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-03T15:15:03.113",
"lastModified": "2024-11-03T15:15:03.113",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10737",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-03T15:15:03.367",
"lastModified": "2024-11-03T15:15:03.367",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10738",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-03T17:15:12.803",
"lastModified": "2024-11-03T17:15:12.803",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10739",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-03T18:15:02.640",
"lastModified": "2024-11-03T18:15:02.640",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10740",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-03T20:15:14.127",
"lastModified": "2024-11-03T20:15:14.127",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10741",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-03T21:15:03.253",
"lastModified": "2024-11-03T21:15:03.253",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10742",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-03T21:15:03.533",
"lastModified": "2024-11-03T21:15:03.533",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10743",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-03T22:15:03.987",
"lastModified": "2024-11-03T22:15:03.987",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10744",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-03T23:15:03.040",
"lastModified": "2024-11-03T23:15:03.040",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10745",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-03T23:15:03.317",
"lastModified": "2024-11-03T23:15:03.317",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10746",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-04T00:15:11.437",
"lastModified": "2024-11-04T00:15:11.437",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10747",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-04T00:15:11.740",
"lastModified": "2024-11-04T00:15:11.740",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-10748",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-04T01:15:03.167",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in Cosmote Greece What's Up App 4.47.3 on Android. This issue affects some unknown processing of the file gr/desquared/kmmsharedmodule/db/RealmDB.java of the component Realm Database Handler. The manipulation of the argument defaultRealmKey leads to use of default cryptographic key. Local access is required to approach this attack. The complexity of an attack is rather high. The exploitation is known to be difficult. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 2.0,
"baseSeverity": "LOW"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.0,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:H/Au:S/C:P/I:N/A:N",
"accessVector": "LOCAL",
"accessComplexity": "HIGH",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.0
},
"baseSeverity": "LOW",
"exploitabilityScore": 1.5,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-1394"
}
]
}
],
"references": [
{
"url": "https://github.com/secuserx/CVE/blob/main/%5BHardcoded%20Realm%20Database%20Encryption%20Key%5D%20found%20in%20What's%20UP%20Android%20App%204.47.3%20-%20(RealmDB.java).md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.282917",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.282917",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.432429",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-10749",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-04T01:15:03.470",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in ThinkAdmin up to 6.1.67. Affected is the function script of the file /app/admin/controller/api/Plugs.php. The manipulation of the argument uptoken leads to deserialization. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 2.3,
"baseSeverity": "LOW"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.6,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://github.com/pwysec/Xmwcq/blob/main/1.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.282918",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.282918",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.432436",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-10750",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-04T02:15:14.667",
"lastModified": "2024-11-04T02:15:14.667",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Tenda i22 1.0.0.3(4687) and classified as problematic. Affected by this vulnerability is the function websReadEvent of the file /goform/GetIPTV?fgHPOST/goform/SysToo. The manipulation of the argument Content-Length leads to null pointer dereference. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 7.1,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://github.com/xiaobor123/tenda-vul-i22",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.282919",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.282919",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.435407",
"source": "cna@vuldb.com"
},
{
"url": "https://www.tenda.com.cn/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-10751",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-04T02:15:14.993",
"lastModified": "2024-11-04T02:15:14.993",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Codezips ISP Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file pay.php. The manipulation of the argument customer leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/JiangJiangCC/CVE/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.282920",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.282920",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.436296",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-10752",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-04T02:15:15.310",
"lastModified": "2024-11-04T02:15:15.310",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Codezips Pet Shop Management System 1.0. It has been classified as critical. This affects an unknown part of the file /productsadd.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting file names to be affected."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/primaryboy/CVE/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.282921",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.282921",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.436316",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-10753",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-04T02:15:15.613",
"lastModified": "2024-11-04T02:15:15.613",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul Online Shopping Portal 2.0. It has been declared as problematic. This vulnerability affects unknown code of the file admin/assets/plugins/DataTables/media/unit_testing/templates/dom_data_two_headers.php. The manipulation of the argument scripts leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/secuserx/CVE/blob/main/%5BXSS%20vulnerability%5D%20found%20in%20Online%20Shopping%20Portal%202.0%20-%20(dom_data_two_headers.php).md",
"source": "cna@vuldb.com"
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.282922",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.282922",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.436375",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20104",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-11-04T02:15:15.940",
"lastModified": "2024-11-04T02:15:15.940",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In da, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09073261; Issue ID: MSV-1772."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20106",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-11-04T02:15:16.070",
"lastModified": "2024-11-04T02:15:16.070",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In m4u, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08960505; Issue ID: MSV-1590."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20107",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-11-04T02:15:16.163",
"lastModified": "2024-11-04T02:15:16.163",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09124360; Issue ID: MSV-1823."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20108",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-11-04T02:15:16.273",
"lastModified": "2024-11-04T02:15:16.273",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In atci, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09082988; Issue ID: MSV-1774."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20109",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-11-04T02:15:16.387",
"lastModified": "2024-11-04T02:15:16.387",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09065928; Issue ID: MSV-1763."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20110",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-11-04T02:15:16.480",
"lastModified": "2024-11-04T02:15:16.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09065887; Issue ID: MSV-1762."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20111",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-11-04T02:15:16.567",
"lastModified": "2024-11-04T02:15:16.567",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09065033; Issue ID: MSV-1754."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20112",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-11-04T02:15:16.653",
"lastModified": "2024-11-04T02:15:16.653",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In isp, there is a possible out of bounds read due to a missing bounds check. This could lead to local denial of service with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09071481; Issue ID: MSV-1730."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20113",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-11-04T02:15:16.743",
"lastModified": "2024-11-04T02:15:16.743",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09036814; Issue ID: MSV-1715."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20114",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-11-04T02:15:16.830",
"lastModified": "2024-11-04T02:15:16.830",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09037038; Issue ID: MSV-1714."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20115",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-11-04T02:15:16.923",
"lastModified": "2024-11-04T02:15:16.923",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In ccu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09036695; Issue ID: MSV-1713."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20117",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-11-04T02:15:17.017",
"lastModified": "2024-11-04T02:15:17.017",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In vdec, there is a possible out of bounds read due to improper structure design. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09008925; Issue ID: MSV-1681."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20118",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-11-04T02:15:17.097",
"lastModified": "2024-11-04T02:15:17.097",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In mms, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09062392; Issue ID: MSV-1621."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-123"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20119",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-11-04T02:15:17.190",
"lastModified": "2024-11-04T02:15:17.190",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In mms, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09062301; Issue ID: MSV-1620."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-123"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20120",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-11-04T02:15:17.280",
"lastModified": "2024-11-04T02:15:17.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08956986; Issue ID: MSV-1575."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20121",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-11-04T02:15:17.383",
"lastModified": "2024-11-04T02:15:17.383",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In KeyInstall, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08956986; Issue ID: MSV-1574."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20122",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-11-04T02:15:17.473",
"lastModified": "2024-11-04T02:15:17.473",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In vdec, there is a possible out of bounds read due to improper structure design. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09008925; Issue ID: MSV-1572."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20123",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-11-04T02:15:17.567",
"lastModified": "2024-11-04T02:15:17.567",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In vdec, there is a possible out of bounds read due to improper structure design. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09008925; Issue ID: MSV-1569."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-20124",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-11-04T02:15:17.647",
"lastModified": "2024-11-04T02:15:17.647",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In vdec, there is a possible out of bounds read due to improper structure design. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09008925; Issue ID: MSV-1568."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@mediatek.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/November-2024",
"source": "security@mediatek.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44232",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-11-01T21:15:14.730",
"lastModified": "2024-11-01T21:15:14.730",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44233",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-11-01T21:15:14.787",
"lastModified": "2024-11-01T21:15:14.787",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44234",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-11-01T21:15:14.847",
"lastModified": "2024-11-01T21:15:14.847",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51774",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-02T06:15:03.007",
"lastModified": "2024-11-02T06:15:03.007",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8739",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-02T02:15:12.560",
"lastModified": "2024-11-02T02:15:12.560",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9191",
"sourceIdentifier": "psirt@okta.com",
"published": "2024-11-01T22:15:03.213",
"lastModified": "2024-11-01T22:15:03.213",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9868",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-02T02:15:12.803",
"lastModified": "2024-11-02T02:15:12.803",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9896",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-02T08:15:03.197",
"lastModified": "2024-11-02T08:15:03.197",
"vulnStatus": "Received",
"lastModified": "2024-11-04T01:35:50.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-04T00:55:37.313798+00:00
2024-11-04T03:00:23.406842+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-04T00:15:11.740000+00:00
2024-11-04T02:15:17.647000+00:00
```
### Last Data Feed Release
@ -27,29 +27,75 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2024-11-03T01:00:10.074845+00:00
2024-11-04T01:00:10.068841+00:00
```
### Total Number of included CVEs
```plain
268038
268063
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `25`
- [CVE-2024-10744](CVE-2024/CVE-2024-107xx/CVE-2024-10744.json) (`2024-11-03T23:15:03.040`)
- [CVE-2024-10745](CVE-2024/CVE-2024-107xx/CVE-2024-10745.json) (`2024-11-03T23:15:03.317`)
- [CVE-2024-10746](CVE-2024/CVE-2024-107xx/CVE-2024-10746.json) (`2024-11-04T00:15:11.437`)
- [CVE-2024-10747](CVE-2024/CVE-2024-107xx/CVE-2024-10747.json) (`2024-11-04T00:15:11.740`)
- [CVE-2024-10748](CVE-2024/CVE-2024-107xx/CVE-2024-10748.json) (`2024-11-04T01:15:03.167`)
- [CVE-2024-10749](CVE-2024/CVE-2024-107xx/CVE-2024-10749.json) (`2024-11-04T01:15:03.470`)
- [CVE-2024-10750](CVE-2024/CVE-2024-107xx/CVE-2024-10750.json) (`2024-11-04T02:15:14.667`)
- [CVE-2024-10751](CVE-2024/CVE-2024-107xx/CVE-2024-10751.json) (`2024-11-04T02:15:14.993`)
- [CVE-2024-10752](CVE-2024/CVE-2024-107xx/CVE-2024-10752.json) (`2024-11-04T02:15:15.310`)
- [CVE-2024-10753](CVE-2024/CVE-2024-107xx/CVE-2024-10753.json) (`2024-11-04T02:15:15.613`)
- [CVE-2024-20104](CVE-2024/CVE-2024-201xx/CVE-2024-20104.json) (`2024-11-04T02:15:15.940`)
- [CVE-2024-20106](CVE-2024/CVE-2024-201xx/CVE-2024-20106.json) (`2024-11-04T02:15:16.070`)
- [CVE-2024-20107](CVE-2024/CVE-2024-201xx/CVE-2024-20107.json) (`2024-11-04T02:15:16.163`)
- [CVE-2024-20108](CVE-2024/CVE-2024-201xx/CVE-2024-20108.json) (`2024-11-04T02:15:16.273`)
- [CVE-2024-20109](CVE-2024/CVE-2024-201xx/CVE-2024-20109.json) (`2024-11-04T02:15:16.387`)
- [CVE-2024-20110](CVE-2024/CVE-2024-201xx/CVE-2024-20110.json) (`2024-11-04T02:15:16.480`)
- [CVE-2024-20111](CVE-2024/CVE-2024-201xx/CVE-2024-20111.json) (`2024-11-04T02:15:16.567`)
- [CVE-2024-20112](CVE-2024/CVE-2024-201xx/CVE-2024-20112.json) (`2024-11-04T02:15:16.653`)
- [CVE-2024-20113](CVE-2024/CVE-2024-201xx/CVE-2024-20113.json) (`2024-11-04T02:15:16.743`)
- [CVE-2024-20114](CVE-2024/CVE-2024-201xx/CVE-2024-20114.json) (`2024-11-04T02:15:16.830`)
- [CVE-2024-20115](CVE-2024/CVE-2024-201xx/CVE-2024-20115.json) (`2024-11-04T02:15:16.923`)
- [CVE-2024-20117](CVE-2024/CVE-2024-201xx/CVE-2024-20117.json) (`2024-11-04T02:15:17.017`)
- [CVE-2024-20118](CVE-2024/CVE-2024-201xx/CVE-2024-20118.json) (`2024-11-04T02:15:17.097`)
- [CVE-2024-20119](CVE-2024/CVE-2024-201xx/CVE-2024-20119.json) (`2024-11-04T02:15:17.190`)
- [CVE-2024-20120](CVE-2024/CVE-2024-201xx/CVE-2024-20120.json) (`2024-11-04T02:15:17.280`)
- [CVE-2024-20121](CVE-2024/CVE-2024-201xx/CVE-2024-20121.json) (`2024-11-04T02:15:17.383`)
- [CVE-2024-20122](CVE-2024/CVE-2024-201xx/CVE-2024-20122.json) (`2024-11-04T02:15:17.473`)
- [CVE-2024-20123](CVE-2024/CVE-2024-201xx/CVE-2024-20123.json) (`2024-11-04T02:15:17.567`)
- [CVE-2024-20124](CVE-2024/CVE-2024-201xx/CVE-2024-20124.json) (`2024-11-04T02:15:17.647`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `34`
- [CVE-2024-10731](CVE-2024/CVE-2024-107xx/CVE-2024-10731.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-10732](CVE-2024/CVE-2024-107xx/CVE-2024-10732.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-10733](CVE-2024/CVE-2024-107xx/CVE-2024-10733.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-10734](CVE-2024/CVE-2024-107xx/CVE-2024-10734.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-10735](CVE-2024/CVE-2024-107xx/CVE-2024-10735.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-10736](CVE-2024/CVE-2024-107xx/CVE-2024-10736.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-10737](CVE-2024/CVE-2024-107xx/CVE-2024-10737.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-10738](CVE-2024/CVE-2024-107xx/CVE-2024-10738.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-10739](CVE-2024/CVE-2024-107xx/CVE-2024-10739.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-10740](CVE-2024/CVE-2024-107xx/CVE-2024-10740.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-10741](CVE-2024/CVE-2024-107xx/CVE-2024-10741.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-10742](CVE-2024/CVE-2024-107xx/CVE-2024-10742.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-10743](CVE-2024/CVE-2024-107xx/CVE-2024-10743.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-10744](CVE-2024/CVE-2024-107xx/CVE-2024-10744.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-10745](CVE-2024/CVE-2024-107xx/CVE-2024-10745.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-10746](CVE-2024/CVE-2024-107xx/CVE-2024-10746.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-10747](CVE-2024/CVE-2024-107xx/CVE-2024-10747.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-44232](CVE-2024/CVE-2024-442xx/CVE-2024-44232.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-44233](CVE-2024/CVE-2024-442xx/CVE-2024-44233.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-44234](CVE-2024/CVE-2024-442xx/CVE-2024-44234.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-51774](CVE-2024/CVE-2024-517xx/CVE-2024-51774.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-8739](CVE-2024/CVE-2024-87xx/CVE-2024-8739.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-9191](CVE-2024/CVE-2024-91xx/CVE-2024-9191.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-9868](CVE-2024/CVE-2024-98xx/CVE-2024-9868.json) (`2024-11-04T01:35:50.083`)
- [CVE-2024-9896](CVE-2024/CVE-2024-98xx/CVE-2024-9896.json) (`2024-11-04T01:35:50.083`)
## Download and Usage

View File

@ -242525,7 +242525,7 @@ CVE-2024-1030,0,0,34264c5a1a4e97f6ee4441192a69e3a5aa9d9614a8467bdc88cd76d1a9884f
CVE-2024-10300,0,0,ca0242a4c58ba5eb41987558653c1fad0eefdb856c34de56d3278680f413cd2c,2024-10-25T18:49:01.953000
CVE-2024-10301,0,0,43e47cf56bc671ed7b90e0f04f420138e8362a6d949261d9acbcdf888c921aa2,2024-10-25T18:47:54.033000
CVE-2024-1031,0,0,6576162a78ac686f55e5931a6b8f02ff6c7312ac04792581e6d78da8a91700d4,2024-05-17T02:35:11.843000
CVE-2024-10310,0,0,44e4f212dbd387191ac1c17fafbfea8afd0cd16e10f15c2104cc89bcbf827181,2024-11-02T02:15:12.070000
CVE-2024-10310,0,1,8627942b9bedc88403b058610e178026fa2c4afa02baf09482128bde758698c0,2024-11-04T01:35:50.083000
CVE-2024-10312,0,0,d10f0012149342545ee317e492eeaf284c6b634b254526457f270c7ce4937a16,2024-10-29T14:34:04.427000
CVE-2024-10313,0,0,0a692e743da8a6f5929e9a5e61a16c962249b9fbffffedea4a154098bf7390c0,2024-10-25T12:56:07.750000
CVE-2024-1032,0,0,06925fc416f8ceea7fb895efc2e3f765d4f064c5150968a9409448741aa1fb78,2024-05-17T02:35:11.947000
@ -242659,7 +242659,7 @@ CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef
CVE-2024-10525,0,0,cfad79154f466fe96736eabfa65cac8f6409e21deb7f07d79c02c68ee3f19eb2,2024-11-01T12:57:03.417000
CVE-2024-1053,0,0,3d9e5b8218feb39348551f4e96f20fbacd04f2b39830165bb00a553a3d3c5ccf,2024-02-22T19:07:27.197000
CVE-2024-1054,0,0,f8e7e53b5707aaecdfe1ea6fba53413ba04bed5cdf673762252b510775f984b1,2024-02-29T13:49:29.390000
CVE-2024-10540,0,0,fb85c19421ab3f69a93be1f392ed322f4e3a3a646d1bbc79bb70857cca41b582,2024-11-02T02:15:12.320000
CVE-2024-10540,0,1,71b4d8dd372610eb6aadd9ee2f499b7f6c7c514a0fbc392c946046e7aec32132,2024-11-04T01:35:50.083000
CVE-2024-10544,0,0,d84fa7aeaabdc2cfe5861efef74c5b30022ed51487865228c56366868169c4d7,2024-11-01T12:57:03.417000
CVE-2024-10546,0,0,fe7c4bb80388357d2012de9abcf9bdb2510a4d8644b958f5e63299c9a417e4c8,2024-11-01T12:57:03.417000
CVE-2024-1055,0,0,ccc78f7d4bd63bcc448b5e62f7789de0e1a26ab036272b89eca521cba41a35e3,2024-02-14T18:59:33.780000
@ -242717,36 +242717,42 @@ CVE-2024-10662,0,0,d4e1d96fd372cbdc5b8334f5c6dd869966981cc60e3dd848ec899c5d2ee68
CVE-2024-1067,0,0,54f094f38a51fcd0954e79c36caca8c799a450eda4559137980b77dd6d9caf6c,2024-05-03T14:17:53.690000
CVE-2024-1068,0,0,affccf40ed47a318eb2ecd8e307c56fa640a43f94e3b3e8b50a778ab4a9c998f,2024-08-26T19:35:04.287000
CVE-2024-1069,0,0,9f4b19e535b82e8b50b814b402985dc45959fb8eebaa25a120ba3f787349c9c3,2024-02-06T20:11:52.587000
CVE-2024-10697,0,0,b6a5fbdd54ff78ca8f29be9d904245700764dda2892e20d8100f91a87604ea47,2024-11-02T12:15:15.780000
CVE-2024-10698,0,0,8281674c5312d1eac605117cac32e949ec8e479274dd1749bb2715d742010d6d,2024-11-02T14:15:12.980000
CVE-2024-10699,0,0,ef67a20c3335f29b114cad7b0aedb794f1b00f327f73345873f5e40c4d641fcb,2024-11-02T15:15:16.313000
CVE-2024-10697,0,1,400b0c691de1d4d04a08ed75b5ff2c1090c210982145630e8b93e65ea795d2a2,2024-11-04T01:35:50.083000
CVE-2024-10698,0,1,236b38079c641e413bd7bebc1fdfad07acc1d9e6f5d99c4e4596e4bb9429c7df,2024-11-04T01:35:50.083000
CVE-2024-10699,0,1,fe2c7d137c97c404816ddf9e3bb9e571274df811b1a38d888d420c39b6c31f06,2024-11-04T01:35:50.083000
CVE-2024-1070,0,0,945eeccf4f5ba232f5b58cbe0a0fb277520149997c332f988c0ef3d652aa0c5c,2024-02-29T13:49:29.390000
CVE-2024-10700,0,0,b17b93e7f82967a1cd70f297abdf013df9d7712afeb0e21e10309930c9dd8b06,2024-11-02T16:15:03.243000
CVE-2024-10701,0,0,64d00583e128223a818e31012b27c2f4fcc546f61ed52ef284055292721719a1,2024-11-02T18:15:03.057000
CVE-2024-10702,0,0,b860327a4907fe5152218cc2a7d1bde1b844706b23959e8ecc33094988f3f771,2024-11-02T18:15:03.363000
CVE-2024-10700,0,1,a26404e46b37e656f5281779e0d9091897613c667bf7801ba7d96eada96120c0,2024-11-04T01:35:50.083000
CVE-2024-10701,0,1,feef0490b9a5343bbd81c2d74656e28446f2c282178d53c2cfc86555fe72242e,2024-11-04T01:35:50.083000
CVE-2024-10702,0,1,1325634e3f4fdbfa2e4a1276b2401b086b25bcc969a908cc22819ae619148a71,2024-11-04T01:35:50.083000
CVE-2024-1071,0,0,203dd69d50b387b330a57560d4e66e827311506680b4f1e4c4b62b6aa394169c,2024-03-13T18:16:18.563000
CVE-2024-1072,0,0,d1340477909607c729b87fb4231ec3eb5b83c947dd2f9537edfb72049dfc44f6,2024-02-13T19:44:28.620000
CVE-2024-1073,0,0,39b7dc528198b2afbafa91161478b052efb2c858a3c417cf6368bfe809460c5d,2024-02-07T20:56:30.313000
CVE-2024-10730,0,0,0290ba426de3764e77845b12f9be23ede9a2d5cdb0858e6e836b6393eea1c65a,2024-11-03T09:15:02.943000
CVE-2024-10731,0,0,0edbd27ff87fe7ed63697e42258d1992829a75f85bde44db29e4896a5b1dcdfc,2024-11-03T10:15:03.113000
CVE-2024-10732,0,0,cc05b547a090986643dc6f60010297a6e164d0fc561f19045f5c23b16d08a8d3,2024-11-03T11:15:03.147000
CVE-2024-10733,0,0,e31e1515e56cea31e3e6cd23ea983f95655bbeddaaf828558407c18b76e76328,2024-11-03T12:15:12.780000
CVE-2024-10734,0,0,1ada97ce88c9764cce86d1be06d5a440543b67631c7509fb56b879cad67b8d57,2024-11-03T13:15:03.197000
CVE-2024-10735,0,0,18e5abeb765f8b4cee532a9ccfe47a41535b695e674660e0401d753889675ed7,2024-11-03T14:15:13.127000
CVE-2024-10736,0,0,2b3c1ca1fde308db2682ba585d91df4e5fb8e8b2132e6896b341182640475636,2024-11-03T15:15:03.113000
CVE-2024-10737,0,0,d5f597e3131334cb6398b921e8ae2406a2cedfdef19debcbf36a8289606bdaac,2024-11-03T15:15:03.367000
CVE-2024-10738,0,0,cf3434bd59b0285df7a84404b7ffeefec9fd9bbab036f7db09502c7b06bbe882,2024-11-03T17:15:12.803000
CVE-2024-10739,0,0,2d9d0512020c1f842d19eb7873caa87034bcedcbf1098acfc3b06d84312e22d7,2024-11-03T18:15:02.640000
CVE-2024-10730,0,1,7ce4421b8e6852fd42d52a08ac5d64cca9f961fa36f0f9b178564ab2c7b010fc,2024-11-04T01:35:50.083000
CVE-2024-10731,0,1,e9573f69cc170cafd345054080776894775b4b6ef21372d23290dedcafe0e5b5,2024-11-04T01:35:50.083000
CVE-2024-10732,0,1,2794c37d840ac85d80e6c6ee22e0cafa21a8bf385597e614f0966ea692f6b0f3,2024-11-04T01:35:50.083000
CVE-2024-10733,0,1,ecfa611fffa7dda7b20a60257897e0fb58b1e425e94f2e6ec6ece37368bae70d,2024-11-04T01:35:50.083000
CVE-2024-10734,0,1,4bdf3d9933efb7c2036a96af2289bb842795f8b5d58b3a97064506aeabfba048,2024-11-04T01:35:50.083000
CVE-2024-10735,0,1,a16cccc151e9f2bcc15c729d193af752b598e5a499de6cc85f10b7387b0a41fd,2024-11-04T01:35:50.083000
CVE-2024-10736,0,1,30b87f486dfbd55aa362867c46d8dcc45ec927ce563a6b5741ce601545c2ab1f,2024-11-04T01:35:50.083000
CVE-2024-10737,0,1,1c0a27b6a0f6352047b4dfdf5563612ad3b9bab250d86c650765dfc629a73416,2024-11-04T01:35:50.083000
CVE-2024-10738,0,1,8a0072515d947ec408b784d3e6ce1bd5b3e05b55ff660db8ef16ced14bb5241e,2024-11-04T01:35:50.083000
CVE-2024-10739,0,1,d1743cc8054aad38eef2acd426187b3ee676a28c7bc532fe709feadcb472844e,2024-11-04T01:35:50.083000
CVE-2024-1074,0,0,dead9100582cc2974c0c91196eb84b5d13c4d6e306ff1bc10a509afe7df361d3,2024-03-13T18:16:18.563000
CVE-2024-10740,0,0,217073bf1930c0f14a0fc226a9bb2d6398d765fa68bd0fff7edbfeb9d520c0f7,2024-11-03T20:15:14.127000
CVE-2024-10741,0,0,ad19cf95cdeabbcd628e782f1aef9e0a797e7e2a931984e3147cce270645d2c3,2024-11-03T21:15:03.253000
CVE-2024-10742,0,0,6a62150a0204ffc17beb47d87a5902b3367743d3f1d487bded09a284fcc7f3cb,2024-11-03T21:15:03.533000
CVE-2024-10743,0,0,7611018f0a9e71fea5a36fac5f4dfeb4f6eff80ab38389ae42f5a10f8b11138a,2024-11-03T22:15:03.987000
CVE-2024-10744,1,1,b4c4e009e5596df94ce79d62ee56cd3fbc6a900cff97bdb4d1aa0745a35b1462,2024-11-03T23:15:03.040000
CVE-2024-10745,1,1,51128a835b5b59553a6908c04ad84a8b4da4fc5730f783ce2d78ea058fa94927,2024-11-03T23:15:03.317000
CVE-2024-10746,1,1,e23188babfde0ffbb47feb6b6c9f36cbc2b7ae157fe8ca236ea137bd1fc23e84,2024-11-04T00:15:11.437000
CVE-2024-10747,1,1,8e25b9be4440f8a0bdbe2ba2f18fb0464e7bda631f613f54d7a2e0d0a17cf7c2,2024-11-04T00:15:11.740000
CVE-2024-10740,0,1,96ae1b50031fdef804d7941f636b5cc91402b9e022058e71fa088d447d37e9fd,2024-11-04T01:35:50.083000
CVE-2024-10741,0,1,d677d081ae90772d9c62e5eea166401d1a36ed1ce290a4c4cf0fca2a8f45e908,2024-11-04T01:35:50.083000
CVE-2024-10742,0,1,7e43489f32deadc14864d8fabccd1005ed82b082c5d08626921b13cf108b6229,2024-11-04T01:35:50.083000
CVE-2024-10743,0,1,f4196b5be77693362a82a07a1abbed5d528d0f570809fe8b21b46f419f58a446,2024-11-04T01:35:50.083000
CVE-2024-10744,0,1,2c6e64fe43853cda822e15d40340f32792083b462e7980325b4be1e7805845b9,2024-11-04T01:35:50.083000
CVE-2024-10745,0,1,9b882c9f702379042badc860798ab8ac79d88ccc37d410489dcf6335bc9dba88,2024-11-04T01:35:50.083000
CVE-2024-10746,0,1,5fc5b1f0c7c81c9c17f031df506140838636e81da729c18f4dee42e8bb008e3e,2024-11-04T01:35:50.083000
CVE-2024-10747,0,1,65defe3ce03d4e7029fc0dc81fec58dc74e785c46c902e5a5dc8cb2b4c82ceb1,2024-11-04T01:35:50.083000
CVE-2024-10748,1,1,046d3079c4eb2e3a10c0f9284d1ec682329dd55d91d1ebf1b461964671cc9500,2024-11-04T01:35:50.083000
CVE-2024-10749,1,1,ced9684eb6bbdaaa8891bf4946486b251511fc0da6f635e33f3c9a1ae41d6b8e,2024-11-04T01:35:50.083000
CVE-2024-1075,0,0,b19be1823ece9ac4ec825cefa6ea1c80de9a3ed97dd278442b9d4fd30da7b4c5,2024-02-13T19:43:13.480000
CVE-2024-10750,1,1,a5ab38ab4e0a30803b76cb92f36d106e28cb9646c5f450e7b359c617fa79db89,2024-11-04T02:15:14.667000
CVE-2024-10751,1,1,ece80e95a2cea401caf01f16c80e716d345300d1a9937ae65bf2b9b198d7fbdc,2024-11-04T02:15:14.993000
CVE-2024-10752,1,1,8a3cbd606c9961479f693d42867703d9117f36820b9a355e369e4c3dc6e7a45d,2024-11-04T02:15:15.310000
CVE-2024-10753,1,1,bba63f6afd5c7db41ec944ca9e3254b1565ead11d9f0f9c2936fcd3fdd183f4d,2024-11-04T02:15:15.613000
CVE-2024-1076,0,0,1eec5a2aed6def26ca78a00c90cdc2a9e26a823100b6419a30b16c630a915a03,2024-08-30T13:15:12.257000
CVE-2024-1077,0,0,9052c519c4a7de5cf3516fc923116c25b788d5b36a137a2e416fb3d37403344d,2024-07-03T01:44:58.330000
CVE-2024-1078,0,0,88568fa2f20f5ea8de25fda48576808429bbc616448df571a879f056db565620,2024-02-14T18:39:51.437000
@ -243720,8 +243726,27 @@ CVE-2024-20100,0,0,6232a5e349fb938dfde44a6272036d8fcab6eb82e3b395e905d1ef444c94e
CVE-2024-20101,0,0,4ab31b8617124baf5a584f677af857db4f34ad707839e76bd0c5af95515b24c2,2024-10-07T19:36:43.247000
CVE-2024-20102,0,0,3cb6582406cbe14406fe81e42fc867d6348c8d6360f05e88e94b0e4d501c8f03,2024-10-10T18:20:31.820000
CVE-2024-20103,0,0,db42d95d798d4c29343c261aa8a039b0877035c0ce319208cb5d6e304467accf,2024-10-07T19:36:43.530000
CVE-2024-20104,1,1,661fc67dbcdb1ca1b3a9dcb0db0e00d638855bf588515f8fe400ac77c76151ad,2024-11-04T02:15:15.940000
CVE-2024-20106,1,1,51f90ca794383a5c2bfc20cba0cf660f0a64d83b490b33f63c0d4bc14a368e29,2024-11-04T02:15:16.070000
CVE-2024-20107,1,1,922cc22eadfefcee8e734664d9fb6565be24bcbf2c94fca880abdb60812ec87e,2024-11-04T02:15:16.163000
CVE-2024-20108,1,1,cc520a14b3242d8e9165692d2d17f9f18b7ea31e755767123888ee69a34e06a4,2024-11-04T02:15:16.273000
CVE-2024-20109,1,1,54795d1d7fd515ea820548086475776cda34b0ce69d6720787f4e237144d7231,2024-11-04T02:15:16.387000
CVE-2024-2011,0,0,4150023a6f5b05ff7bb1f10e004dac522c292e22a6fa4bc68fed9003ca68fddf,2024-08-15T21:25:45.037000
CVE-2024-20110,1,1,6f5a4c4b9adf7359592c8804c0bd25dcfa7bae0a9b7bd7baedd3251427f4d4a7,2024-11-04T02:15:16.480000
CVE-2024-20111,1,1,27d22f9b268a8c3b7284649bfde84bce31ffe5554c53de51675e4fad0516fe32,2024-11-04T02:15:16.567000
CVE-2024-20112,1,1,84c649e4458a5610722ef13eff2e7bccc80211f1069764379375ca5abd753952,2024-11-04T02:15:16.653000
CVE-2024-20113,1,1,8e7b0c04b4d4ed0b893903cba4c199153ed552db76caf2e34be7db959d9a6d69,2024-11-04T02:15:16.743000
CVE-2024-20114,1,1,3ab633082fb562a27e5d95e86318ac3b18818e40ff24ad66240303d146fc57ff,2024-11-04T02:15:16.830000
CVE-2024-20115,1,1,d671ab30f09df16767829e3fea998fb0f41a9daf49276d42345088b6858cfd2e,2024-11-04T02:15:16.923000
CVE-2024-20117,1,1,d61b2f990b1e15b7058e4556c78df8414fed2e10f805d41207337618f97c757b,2024-11-04T02:15:17.017000
CVE-2024-20118,1,1,a704fdd2e1dde1a934b585bc78a59bfc44b3b7d71084d3d46b3975c6477a549e,2024-11-04T02:15:17.097000
CVE-2024-20119,1,1,5e2d11df70ca1ca51a4d20891fb63f7289f15a3ccc06813c8c89fff44967631f,2024-11-04T02:15:17.190000
CVE-2024-2012,0,0,02707995e28bba3e21e37a0cc9698bd91832709b25d71785b53bd5ea8c9a7518,2024-08-15T21:19:03.770000
CVE-2024-20120,1,1,ccc8588caef2c754d0f2d3a62096a317fe95226b38302d1661505059372773a5,2024-11-04T02:15:17.280000
CVE-2024-20121,1,1,323992abdcb80e925340c9d5380591ccb11059d2c67bc6cc09508284dbd715e0,2024-11-04T02:15:17.383000
CVE-2024-20122,1,1,7f3da73d1063726b36c15c2eead085208e001c249ada6692b5a0ead1ef2dd874,2024-11-04T02:15:17.473000
CVE-2024-20123,1,1,5b11ca42e589c3e23b63de7d94f1539bff348aa54a5100c00b6c443a91847ca8,2024-11-04T02:15:17.567000
CVE-2024-20124,1,1,ea196b7f4300fdd6e9f7e59aa6adb0ebab1f3c2a66191c5840c9ed88124506e9,2024-11-04T02:15:17.647000
CVE-2024-2013,0,0,00ec85b9018843d83179244785c9b4c96e5ba8e015239a21d2d4ac8bf1b712fa,2024-08-15T21:08:02.010000
CVE-2024-2014,0,0,97c4d99afb7da491efaae3ff0fb6836102849098937eeb69745707d3dbc15b2d,2024-05-17T02:37:59.427000
CVE-2024-2015,0,0,bb3d603120b99e575edb7baace469be8f767dc6e32ed33cf2700f4d2936e46ac,2024-05-17T02:37:59.517000
@ -261034,9 +261059,9 @@ CVE-2024-44222,0,0,2d1c9506aa01928c94a245f74651f0e477458ddd815a4bd143998351ecb56
CVE-2024-44228,0,0,4d366f4ca03e1f210ca17d40371d7f0002d4d2fd25c7288f272f27e0c556885e,2024-10-30T20:35:27.570000
CVE-2024-44229,0,0,459366a3ff6ef76a99d08535a28f4f2b6e8f55a20bc19afc8ece1fec95aa44c2,2024-10-29T23:15:03.437000
CVE-2024-4423,0,0,0715bc9caf3e0b170ca2968c721bdd1e236908d8891315bb75fdf772bdc9c875,2024-07-03T02:07:32.943000
CVE-2024-44232,0,0,191f9bfeeb1d62bdd87334797048d4412244f7ecfe6bbd6480aa91153492f1cd,2024-11-01T21:15:14.730000
CVE-2024-44233,0,0,2ca2e0a55694b969813c2ea21d075e99121deaa48b4daf8c0e3001c0881abd5f,2024-11-01T21:15:14.787000
CVE-2024-44234,0,0,24c16a966156c95ed52608f2e801d8dab42879e91efb09e6ab39c80f7fe34435,2024-11-01T21:15:14.847000
CVE-2024-44232,0,1,4c28f2f4a7eeb218636d2d83bbc63a2a4c4883c4a9d8461e7c674b470a63b1a2,2024-11-04T01:35:50.083000
CVE-2024-44233,0,1,5fbcd61e78328b0d5b5d8515b5e18152226785bd560b0e3433d5e80f113fbb1c,2024-11-04T01:35:50.083000
CVE-2024-44234,0,1,6c6aec5b8251f584ee84a7e4fff6c667b44c4d629cbdb2d26c9c95408643ab2f,2024-11-04T01:35:50.083000
CVE-2024-44235,0,0,f6b12e29f9914b58eea41bdafe0e4148ebdbea0c9aa9cac7f81ae35deb7df419,2024-10-30T21:35:06.987000
CVE-2024-44236,0,0,2596c988781ee3ffb6a2ddc6dda4e4baeacf8834e38bce0c324b3d9abc20481c,2024-10-30T17:28:52.077000
CVE-2024-44237,0,0,0ccb96caec122e6d60ce17ba18063b0a9447d8c20c9511ccf57f0112e5d3846b,2024-10-29T21:35:16.563000
@ -264380,7 +264405,7 @@ CVE-2024-5172,0,0,b469524ff2309ced9aec08b056578c23e8b8b5248adb8fcea2b38cb214c812
CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da6464,2024-06-26T12:44:29.693000
CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000
CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000
CVE-2024-51774,0,0,596774be6de28515ec1b421651436af5f842b86d44b3a546fb99267d554b2c28,2024-11-02T06:15:03.007000
CVE-2024-51774,0,1,242a44b9a9a0589607c8c1cdba956fe336337ab5aadb3b57a9925f5da73df90f,2024-11-04T01:35:50.083000
CVE-2024-5178,0,0,bd0c2f144426314e1167d96790d03a45b87cc8b4eeec82d66437d8c03cef924c,2024-07-11T22:15:02.467000
CVE-2024-5179,0,0,ea665152b8c9953ad6e84eb904f7eac78af7e075a45f2a4da51451b13f6b9cb3,2024-10-09T16:57:08.317000
CVE-2024-5181,0,0,bbf6825e1d5f360a1a58b67dff2bf4d85afbf0a93fef4d4bb8dfd7975bcf0e60,2024-06-26T12:44:29.693000
@ -267309,7 +267334,7 @@ CVE-2024-8733,0,0,2ad75c4913be224ff75684fa724a275e53b709dc0d7f918cc99544f1d75453
CVE-2024-8734,0,0,df9336f51fe9af5a1ddacc740bf3abe8991041c91d1f44bc6bec3f0ce7eaa8b2,2024-09-26T19:30:03.503000
CVE-2024-8737,0,0,a8f5a9ac08b3915d238b7b0f4fdae19f4d9de463f7b6e5257b850817c52f3420,2024-09-26T19:18:36.097000
CVE-2024-8738,0,0,8d7254f4f1af2919bab9c4b9c8e7ac85cdc1b41f46ed454e2ea854234d64d13d,2024-09-26T16:48:19.490000
CVE-2024-8739,0,0,ba103783330da51a68b7977ee0653396c66f5c092a1a8772f841a298e993b44e,2024-11-02T02:15:12.560000
CVE-2024-8739,0,1,41153810936f3619e5c81e3d953c85176c796fb54603cafdf01bd17244a97cb1,2024-11-04T01:35:50.083000
CVE-2024-8740,0,0,344648ec73420b23dee0eff45da9579413da1d5a4cc904056aa5b9f023dadc49,2024-10-29T14:46:02.103000
CVE-2024-8741,0,0,b4e1d7f7dfc20b3d40ed40689f6d2a74196871e98895f038c49cf39f3f685863,2024-10-02T16:37:16.407000
CVE-2024-8742,0,0,22ad08a64cc55234113e83ee811bd639e6d0a7f5c2878d141833012213ce6335,2024-09-27T16:28:07.827000
@ -267577,7 +267602,7 @@ CVE-2024-9180,0,0,43a25f270cfb7cd861387fae3760598de599a33ae7c6d1aa6e3f1a95d5d03b
CVE-2024-9184,0,0,a3ba82d979bc8561ae674a4ec58c26ce5e04750eca08a1e8b1f42f6ecf9aa161,2024-10-18T12:52:33.507000
CVE-2024-9187,0,0,ec7d5f1d630d180582cea6b34ef03e6ee8cc268d8686e0a61f71186e80a87f38,2024-10-15T12:57:46.880000
CVE-2024-9189,0,0,589dc859bd1b4dfe4aefe62d286159acb6f430185a125dd81b1568310ee1bb88,2024-10-03T17:26:19.397000
CVE-2024-9191,0,0,83a992af53a23983e3607616beb0d4f27ad95a615e8bc88c24b927f198a88fc3,2024-11-01T22:15:03.213000
CVE-2024-9191,0,1,c5c6218bb397957fa2ce005f80352a140b08b33c91a2e82fcc916dff9be5ccd6,2024-11-04T01:35:50.083000
CVE-2024-9194,0,0,94d0f5f267ad180c0cf40bc9b87cc59bf3002f59241057e5b89ba1ec25bacf82,2024-10-04T13:51:25.567000
CVE-2024-9198,0,0,f43e7cbf5ad8264654a856d8df5069cea0145a66becd85052219123b3f2b7d6c,2024-10-02T14:33:52.780000
CVE-2024-9199,0,0,0d70434db3b8e5067294d8da03c36e695141f2bf7d8322fbb68a3bc3177abf45,2024-10-02T14:33:54.607000
@ -267944,7 +267969,7 @@ CVE-2024-9862,0,0,a125c015e3b00c8735ed8c9687686a16a9d40d9b6f2ce90b19ff292bf536d9
CVE-2024-9863,0,0,5a2779f928f03a35905e31f60158c72d5505c6aaa35173f98063e46d2c1389f4,2024-10-18T12:53:04.627000
CVE-2024-9864,0,0,ecd679b570a8abacc1db8d694db02ae1ea10c97942981b05302fe359da1cbf9c,2024-10-25T12:56:07.750000
CVE-2024-9865,0,0,767ca346f0a1ff11496989a87fd401620d0792dff4b8ce54d6dd2bc8cbb6f984,2024-10-25T12:56:07.750000
CVE-2024-9868,0,0,cfa3fb7bcdb4df457cfcd8cd91388f3153ab52ef6741ef4dfc11f5fc24b8bf96,2024-11-02T02:15:12.803000
CVE-2024-9868,0,1,619ab7a97cf5b6852372ad0a01ba35ee632f7798836d1aef77412959238d8fb1,2024-11-04T01:35:50.083000
CVE-2024-9869,0,0,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1ae,2024-10-11T15:15:06.500000
CVE-2024-9873,0,0,54e1b937a83aa8c512a9ce3ab381594073150b73716fb01cf60c5f6e4db0c415,2024-10-16T16:38:14.557000
CVE-2024-9884,0,0,757f98f3275a3bf4e9b1e819bb018e139225ae1ebee044e7c027a7c44897e089,2024-11-01T12:57:03.417000
@ -267958,7 +267983,7 @@ CVE-2024-9892,0,0,467133fa57ffb28c737f61f289d5c58f570db21daea4bb6d667a876d772714
CVE-2024-9893,0,0,d84489165ec702532da777a72a4e467826e650640db0f44ed30b8d433e32a61e,2024-10-16T16:38:14.557000
CVE-2024-9894,0,0,32055c4142b72d0a3f9c19293b700e4df1192ff16d337368689045e8c50a9c33,2024-10-16T22:13:05.583000
CVE-2024-9895,0,0,9f4575888232de3c29cfc8d0d4e2d5d892b3f5ec9e574dd895cb53771a8a3d74,2024-10-17T20:50:03.503000
CVE-2024-9896,0,0,50af1852de2ceeb6ef7007469273b0df4a41cf8534b27ab37ac70aa2310c8ecc,2024-11-02T08:15:03.197000
CVE-2024-9896,0,1,b6422a69408923c8fbfb23c93250f2055895778f177137c25dbacaac56966208,2024-11-04T01:35:50.083000
CVE-2024-9897,0,0,c000f038202bbdf161648c8f1d74fa0a88aad69aa13c730474d96a3fd2473014,2024-11-01T15:27:56.797000
CVE-2024-9898,0,0,34647a8f54872789fb9d153b7e32e611f940664cb6907ab09e4df7e32cdaa8ba,2024-10-18T12:52:33.507000
CVE-2024-9899,0,0,6c76ba1fcc7597d7958a7e74c7de009221352c8fe34414d847a1d4d85ee09e27,2024-10-23T21:15:15.050000

Can't render this file because it is too large.