diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20626.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20626.json new file mode 100644 index 00000000000..225b19a8ff4 --- /dev/null +++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20626.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-20626", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:19.287", + "lastModified": "2024-11-15T16:15:19.287", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Prime Access Registrar Appliance could allow an authenticated, remote attacker to conduct a cross-site scripting attack against a user of the interface. The attacker would require valid credentials for the device.\r\nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-prime-reg-xss-zLOz8PfB", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20631.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20631.json new file mode 100644 index 00000000000..1eb20c55a7e --- /dev/null +++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20631.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-20631", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:19.527", + "lastModified": "2024-11-15T16:15:19.527", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco ECE could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device.\r\nThe vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by inserting malicious script code in a chat window. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20634.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20634.json new file mode 100644 index 00000000000..808d04e9531 --- /dev/null +++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20634.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-20634", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:19.747", + "lastModified": "2024-11-15T16:15:19.747", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco ECE could allow an unauthenticated, remote attacker to redirect a user to an undesired web page.\r\nThis vulnerability is due to improper input validation of the URL parameters in an HTTP request that is sent to an affected system. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to cause the interface to redirect the user to a specific, malicious URL. This type of vulnerability is known as an open redirect and is used in phishing attacks that get users to unknowingly visit malicious sites.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20648.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20648.json new file mode 100644 index 00000000000..6a7dbaba962 --- /dev/null +++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20648.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2022-20648", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:19.983", + "lastModified": "2024-11-15T16:15:19.983", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in a debug function for Cisco RCM for Cisco StarOS Software could allow an unauthenticated, remote attacker to perform debug actions that could result in the disclosure of confidential information that should be restricted.\r\nThis vulnerability exists because of a debug service that incorrectly listens to and accepts incoming connections. An attacker could exploit this vulnerability by connecting to the debug port and executing debug commands. A successful exploit could allow the attacker to view sensitive debugging information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rcm-vuls-7cS3Nuq", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tetr-cmd-injc-skrwGO", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-FmbPu2pe", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20649.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20649.json new file mode 100644 index 00000000000..63f9bbce4c6 --- /dev/null +++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20649.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2022-20649", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:20.247", + "lastModified": "2024-11-15T16:15:20.247", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in Cisco RCM for Cisco StarOS Software could allow an unauthenticated, remote attacker to perform remote code execution on the application with root-level privileges in the context of the configured container.\r\n\r\nThis vulnerability exists because the debug mode is incorrectly enabled for specific services. An attacker could exploit this vulnerability by connecting to the device and navigating to the service with debug mode enabled. A successful exploit could allow the attacker to execute arbitrary commands as the root user.\r\nThe attacker would need to perform detailed reconnaissance to allow for unauthenticated access. The vulnerability can also be exploited by an authenticated attacker.\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-489" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rcm-vuls-7cS3Nuq", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tetr-cmd-injc-skrwGO", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-FmbPu2pe", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20652.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20652.json new file mode 100644 index 00000000000..d64d6d75824 --- /dev/null +++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20652.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2022-20652", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:20.520", + "lastModified": "2024-11-15T16:15:20.520", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface and in the API subsystem of Cisco Tetration could allow an authenticated, remote attacker to inject arbitrary commands to be executed with root-level privileges on the underlying operating system.\r\nThis vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by submitting a crafted HTTP message to the affected system. A successful exploit could allow the attacker to execute commands with root-level privileges. To exploit this vulnerability, an attacker would need valid administrator-level credentials.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-tetr-cmd-injc-skrwGO", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-FmbPu2pe", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20654.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20654.json new file mode 100644 index 00000000000..b46dbd80f56 --- /dev/null +++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20654.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-20654", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:20.767", + "lastModified": "2024-11-15T16:15:20.767", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based interface of Cisco Webex Meetings could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the web-based interface.\r\nThis vulnerability is due to insufficient validation of user-supplied input by the web-based interface of Cisco Webex Meetings. An attacker could exploit this vulnerability by persuading a user of the interface to click a maliciously crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-webex-xss-FmbPu2pe", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20655.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20655.json new file mode 100644 index 00000000000..758bdd78c6b --- /dev/null +++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20655.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2022-20655", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:20.987", + "lastModified": "2024-11-15T16:15:20.987", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the implementation of the CLI on a device that is running ConfD could allow an authenticated, local attacker to perform a command injection attack.\r\n The vulnerability is due to insufficient validation of a process argument on an affected device. An attacker could exploit this vulnerability by injecting commands during the execution of this process. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privilege level of ConfD, which is commonly root." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cli-cmdinj-4MttWZPB", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-confdcli-cmdinj-wybQDSSh", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20656.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20656.json new file mode 100644 index 00000000000..0f0f028df73 --- /dev/null +++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20656.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2022-20656", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:21.237", + "lastModified": "2024-11-15T16:15:21.237", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco PI and Cisco EPNM could allow an authenticated, remote attacker to conduct a path traversal attack on an affected device. To exploit this vulnerability, the attacker must have valid credentials on the system.\r\n\r\nThis vulnerability is due to insufficient input validation of the HTTPS URL by the web-based management interface. An attacker could exploit this vulnerability by sending a crafted request that contains directory traversal character sequences to an affected device. A successful exploit could allow the attacker to write arbitrary files to the host system.\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-24" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-path-trav-zws324yn", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sna-xss-NXOxDhRQ", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20657.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20657.json new file mode 100644 index 00000000000..60acb30b70b --- /dev/null +++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20657.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-20657", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:21.473", + "lastModified": "2024-11-15T16:15:21.473", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco PI and Cisco EPNM could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device.\r\nThis vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pi-epnm-path-trav-zws324yn", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20663.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20663.json new file mode 100644 index 00000000000..97747d37376 --- /dev/null +++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20663.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-20663", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:21.693", + "lastModified": "2024-11-15T16:15:21.693", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Secure Network Analytics, formerly Stealthwatch Enterprise, could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.\r\nThe vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of the affected software. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.Attention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see ." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sna-xss-NXOxDhRQ", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20685.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20685.json new file mode 100644 index 00000000000..fbc4b2bf6f2 --- /dev/null +++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20685.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2022-20685", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:21.910", + "lastModified": "2024-11-15T16:15:21.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Modbus preprocessor of the Snort detection engine could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\nThis vulnerability is due to an integer overflow while processing Modbus traffic. An attacker could exploit this vulnerability by sending crafted Modbus traffic through an affected device. A successful exploit could allow the attacker to cause the Snort process to hang, causing traffic inspection to stop.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sna-xss-NXOxDhRQ", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort-dos-9D3hJLuj", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20766.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20766.json new file mode 100644 index 00000000000..921eef920f3 --- /dev/null +++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20766.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-20766", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:22.133", + "lastModified": "2024-11-15T16:15:22.133", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Cisco Discovery Protocol functionality of Cisco ATA 190 Series Adaptive Telephone Adapter firmware could allow an unauthenticated, remote attacker to cause a DoS condition on an affected device.\r\nThis vulnerability is due to an out-of-bounds read when processing Cisco Discovery Protocol packets. An attacker could exploit this vulnerability by sending crafted Cisco Discovery Protocol packets to an affected device. A successful exploit could allow the attacker to cause a service restart.Cisco has released firmware updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ata19x-multivuln-GEZYVvs", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-207xx/CVE-2022-20793.json b/CVE-2022/CVE-2022-207xx/CVE-2022-20793.json new file mode 100644 index 00000000000..c26acda3e2f --- /dev/null +++ b/CVE-2022/CVE-2022-207xx/CVE-2022-20793.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-20793", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:22.370", + "lastModified": "2024-11-15T16:15:22.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in pairing process of Cisco TelePresence CE Software and RoomOS Software for Cisco Touch 10 Devices could allow an unauthenticated, remote attacker to impersonate a legitimate device and pair with an affected device.\r\nThis vulnerability is due to insufficient identity verification. An attacker could exploit this vulnerability by impersonating a legitimate device and responding to the pairing broadcast from an affected device. A successful exploit could allow the attacker to access the affected device while impersonating a legitimate device.There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-325" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CTT-IVV-4A66Dsfj", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20814.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20814.json new file mode 100644 index 00000000000..87a53e3d5b4 --- /dev/null +++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20814.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2022-20814", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:22.670", + "lastModified": "2024-11-15T16:15:22.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the certificate validation of Cisco Expressway-C and Cisco TelePresence VCS could allow an unauthenticated, remote attacker to gain unauthorized access to sensitive data.  The vulnerability is due to a lack of validation of the SSL server certificate that an affected device receives when it establishes a connection to a Cisco Unified Communications Manager device. An attacker could exploit this vulnerability by using a man-in-the-middle technique to intercept the traffic between the devices, and then using a self-signed certificate to impersonate the endpoint. A successful exploit could allow the attacker to view the intercepted traffic in clear text or alter the contents of the traffic.\r\nNote: Cisco Expressway-E is not affected by this vulnerability.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "references": [] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20845.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20845.json new file mode 100644 index 00000000000..3be2fc9370b --- /dev/null +++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20845.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2022-20845", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:22.913", + "lastModified": "2024-11-15T16:15:22.913", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the TL1 function of Cisco Network Convergence System (NCS) 4000 Series could allow an authenticated, local attacker to cause a memory leak in the TL1 process.\r\nThis vulnerability is due to TL1 not freeing memory under some conditions. An attacker could exploit this vulnerability by connecting to the device and issuing TL1 commands after being authenticated. A successful exploit could allow the attacker to cause the TL1 process to consume large amounts of memory. When the memory reaches a threshold, the Resource Monitor (Resmon) process will begin to restart or shutdown the top five consumers of memory, resulting in a denial of service (DoS).Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is part of the September 2022 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see ." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.5, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-789" + } + ] + } + ], + "references": [] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20846.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20846.json new file mode 100644 index 00000000000..892031b8dc4 --- /dev/null +++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20846.json @@ -0,0 +1,51 @@ +{ + "id": "CVE-2022-20846", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:23.120", + "lastModified": "2024-11-15T16:15:23.120", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Cisco Discovery Protocol implementation for Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause the Cisco Discovery Protocol process to reload on an affected device.\r\nThis vulnerability is due to a heap buffer overflow in certain Cisco Discovery Protocol messages. An attacker could exploit this vulnerability by sending a malicious Cisco Discovery Protocol packet to an affected device. A successful exploit could allow the attacker to cause a heap overflow, which could cause the Cisco Discovery Protocol process to reload on the device. The bytes that can be written in the buffer overflow are restricted, which limits remote code execution.Note: Cisco Discovery Protocol is a Layer 2 protocol. To exploit this vulnerability, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).  Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is part of the September 2022 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see ." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20849.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20849.json new file mode 100644 index 00000000000..609364d7604 --- /dev/null +++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20849.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-20849", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:23.327", + "lastModified": "2024-11-15T16:15:23.327", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Broadband Network Gateway PPP over Ethernet (PPPoE) feature of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause the PPPoE process to continually crash.\r\nThis vulnerability exists because the PPPoE feature does not properly handle an error condition within a specific crafted packet sequence. An attacker could exploit this vulnerability by sending a sequence of specific PPPoE packets from controlled customer premises equipment (CPE). A successful exploit could allow the attacker to cause the PPPoE process to continually restart, resulting in a denial of service condition (DoS).Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is part of the September 2022 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see ." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-391" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-bng-Gmg5Gxt", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20853.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20853.json new file mode 100644 index 00000000000..f49e3a716c0 --- /dev/null +++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20853.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2022-20853", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:23.540", + "lastModified": "2024-11-15T16:15:23.540", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the REST API of Cisco Expressway Series and Cisco TelePresence VCS could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system.\r\n\r\nThis vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected system. An attacker could exploit this vulnerability by persuading a user of the REST API to follow a crafted link. A successful exploit could allow the attacker to cause the affected system to reload.\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. " + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-thinrcpt-xss-gSj4CecU", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-priv-esc-SEjz69dv", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-csrf-sqpsSfY6", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-8PdRU8t8", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20871.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20871.json new file mode 100644 index 00000000000..51bd88ca8f5 --- /dev/null +++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20871.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2022-20871", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:23.757", + "lastModified": "2024-11-15T16:15:23.757", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web management interface of Cisco AsyncOS for Cisco Secure Web Appliance, formerly Cisco Web Security Appliance (WSA), could allow an authenticated, remote attacker to perform a command injection and elevate privileges to root.\r\nThis vulnerability is due to insufficient validation of user-supplied input for the web interface. An attacker could exploit this vulnerability by authenticating to the system and sending a crafted HTTP packet to the affected device. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system and elevate privileges to root. To successfully exploit this vulnerability, an attacker would need at least read-only credentials.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.Attention: Simplifying the Cisco portfolio includes the renaming of security products under one brand: Cisco Secure. For more information, see ." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-thinrcpt-xss-gSj4CecU", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-priv-esc-SEjz69dv", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wsa-prv-esc-8PdRU8t8", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20931.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20931.json new file mode 100644 index 00000000000..d151bab6d6a --- /dev/null +++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20931.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2022-20931", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:23.967", + "lastModified": "2024-11-15T16:15:23.967", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the version control of Cisco TelePresence CE Software for Cisco Touch 10 Devices could allow an unauthenticated, adjacent attacker to install an older version of the software on an affected device.\r\nThis vulnerability is due to insufficient version control. An attacker could exploit this vulnerability by installing an older version of Cisco TelePresence CE Software on an affected device. A successful exploit could allow the attacker to take advantage of vulnerabilities in older versions of the software.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-527" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CTT-DAV-HSvEHHEt", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20939.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20939.json new file mode 100644 index 00000000000..abc84ac74e4 --- /dev/null +++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20939.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2022-20939", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:24.200", + "lastModified": "2024-11-15T16:15:24.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Smart Software Manager On-Prem could allow an authenticated, remote attacker to elevate privileges on an affected system.\r\nThis vulnerability is due to inadequate protection of sensitive user information. An attacker could exploit this vulnerability by accessing certain logs on an affected system. A successful exploit could allow the attacker to use the obtained information to elevate privileges to System Admin.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-thinrcpt-xss-gSj4CecU", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cssm-priv-esc-SEjz69dv", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-209xx/CVE-2022-20948.json b/CVE-2022/CVE-2022-209xx/CVE-2022-20948.json new file mode 100644 index 00000000000..9fd865a58b8 --- /dev/null +++ b/CVE-2022/CVE-2022-209xx/CVE-2022-20948.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2022-20948", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:24.427", + "lastModified": "2024-11-15T16:15:24.427", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web management interface of Cisco BroadWorks Hosted Thin Receptionist could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.\r\nThis vulnerability is due to insufficient user input validation. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-CTT-DAV-HSvEHHEt", + "source": "ykramarz@cisco.com" + }, + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-thinrcpt-xss-gSj4CecU", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20004.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20004.json new file mode 100644 index 00000000000..d6c76fe7692 --- /dev/null +++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20004.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-20004", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:24.657", + "lastModified": "2024-11-15T16:15:24.657", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Three vulnerabilities in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device.\r\n\r\nThese vulnerabilities are due to improper access controls on files that are on the local file system. An attacker could exploit these vulnerabilities by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit these vulnerabilities, an attacker would need to have a remote support user account.\r\nNote: CVE-2023-20092 does not affect Cisco DX70, DX80, TelePresence MX Series, or TelePresence SX Series devices.\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20036.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20036.json new file mode 100644 index 00000000000..9c363e6bb53 --- /dev/null +++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20036.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-20036", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:24.950", + "lastModified": "2024-11-15T16:15:24.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web UI of Cisco IND could allow an authenticated, remote attacker to execute arbitrary commands with administrative privileges on the underlying operating system of an affected device.\r\n\r\nThis vulnerability is due to improper input validation when uploading a Device Pack. An attacker could exploit this vulnerability by altering the request that is sent when uploading a Device Pack. A successful exploit could allow the attacker to execute arbitrary commands as NT AUTHORITY\\SYSTEM on the underlying operating system of an affected device.\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ind-CAeLFk6V", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20039.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20039.json new file mode 100644 index 00000000000..7670db8f7e9 --- /dev/null +++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20039.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-20039", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:25.157", + "lastModified": "2024-11-15T16:15:25.157", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in Cisco IND could allow an authenticated, local attacker to read application data.\r\n\r\nThis vulnerability is due to insufficient default file permissions that are applied to the application data directory. An attacker could exploit this vulnerability by accessing files in the application data directory. A successful exploit could allow the attacker to view sensitive information.\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. " + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ind-CAeLFk6V", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20060.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20060.json new file mode 100644 index 00000000000..68d772f83b0 --- /dev/null +++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20060.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-20060", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:25.357", + "lastModified": "2024-11-15T16:15:25.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Prime Collaboration Deployment could allow an unauthenticated, remote attacker to conduct a cross-site scripting attack against a user of the interface.\r\n\r\nThis vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.\r\nCisco plans to release software updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-pcd-xss-jDXpjm7", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20090.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20090.json new file mode 100644 index 00000000000..9e4ed60b632 --- /dev/null +++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20090.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-20090", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:25.560", + "lastModified": "2024-11-15T16:15:25.560", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to elevate privileges to root on an affected device.\r\n\r\nThis vulnerability is due to improper access control on certain CLI commands. An attacker could exploit this vulnerability by running a series of crafted commands. A successful exploit could allow the attacker to elevate privileges to root.\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-27" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20091.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20091.json new file mode 100644 index 00000000000..185f859de58 --- /dev/null +++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20091.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-20091", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:25.770", + "lastModified": "2024-11-15T16:15:25.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device.\r\n\r\nThis vulnerability is due to improper access controls on files that are on the local file system. An attacker could exploit this vulnerability by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit this vulnerability, an attacker would need to have a remote support user account.\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-61" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20092.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20092.json new file mode 100644 index 00000000000..b11eb8d654e --- /dev/null +++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20092.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-20092", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:25.980", + "lastModified": "2024-11-15T16:15:25.980", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Three vulnerabilities in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device.\r\n\r\nThese vulnerabilities are due to improper access controls on files that are on the local file system. An attacker could exploit these vulnerabilities by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit these vulnerabilities, an attacker would need to have a remote support user account.\r\nNote: CVE-2023-20092 does not affect Cisco DX70, DX80, TelePresence MX Series, or TelePresence SX Series devices.\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-61" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20093.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20093.json new file mode 100644 index 00000000000..683dd2f70ba --- /dev/null +++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20093.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-20093", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:26.187", + "lastModified": "2024-11-15T16:15:26.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Three vulnerabilities in the CLI of Cisco TelePresence CE and RoomOS could allow an authenticated, local attacker to overwrite arbitrary files on the local file system of an affected device.\r\n\r\nThese vulnerabilities are due to improper access controls on files that are on the local file system. An attacker could exploit these vulnerabilities by placing a symbolic link in a specific location on the local file system of an affected device. A successful exploit could allow the attacker to overwrite arbitrary files on the affected device. To exploit these vulnerabilities, an attacker would need to have a remote support user account.\r\nNote: CVE-2023-20092 does not affect Cisco DX70, DX80, TelePresence MX Series, or TelePresence SX Series devices.\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-61" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-200xx/CVE-2023-20094.json b/CVE-2023/CVE-2023-200xx/CVE-2023-20094.json new file mode 100644 index 00000000000..1e75539a985 --- /dev/null +++ b/CVE-2023/CVE-2023-200xx/CVE-2023-20094.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-20094", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T16:15:26.390", + "lastModified": "2024-11-15T16:15:26.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in Cisco TelePresence CE and RoomOS could allow an unauthenticated, adjacent attacker to view sensitive information on an affected device.\r\n\r\nThis vulnerability exists because the affected software performs improper bounds checks. An attacker could exploit this vulnerability by sending a crafted request to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read that discloses sensitive information.\r\nNote: This vulnerability only affects Cisco Webex Desk Hub.\r\nThere are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-roomos-file-write-rHKwegKf", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20125.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20125.json new file mode 100644 index 00000000000..e1eeadbb5d4 --- /dev/null +++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20125.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-20125", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T15:15:05.347", + "lastModified": "2024-11-15T15:15:05.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the local interface of Cisco BroadWorks Network Server could allow an unauthenticated, remote attacker to exhaust system resources, causing a denial of service (DoS) condition.\r\n\r\nThis vulnerability exists because rate limiting does not occur for certain incoming TCP connections. An attacker could exploit this vulnerability by sending a high rate of TCP connections to the server. A successful exploit could allow the attacker to cause TCP connection resources to grow rapidly until the Cisco BroadWorks Network Server becomes unusable.\r\nNote: To recover from this vulnerability, either Cisco BroadWorks Network Server software must be restarted or the Cisco BroadWorks Network Server node must be rebooted. For more information, see the section of this advisory.\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 8.6, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-tcp-dos-KEdJCxLs", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-201xx/CVE-2023-20154.json b/CVE-2023/CVE-2023-201xx/CVE-2023-20154.json new file mode 100644 index 00000000000..3b37c1d446c --- /dev/null +++ b/CVE-2023/CVE-2023-201xx/CVE-2023-20154.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-20154", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T15:15:05.697", + "lastModified": "2024-11-15T15:15:05.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the external authentication mechanism of Cisco Modeling Labs could allow an unauthenticated, remote attacker to access the web interface with administrative privileges.\r\n\r\nThis vulnerability is due to the improper handling of certain messages that are returned by the associated external authentication server. An attacker could exploit this vulnerability by logging in to the web interface of an affected server. Under certain conditions, the authentication mechanism would be bypassed and the attacker would be logged in as an administrator. A successful exploit could allow the attacker to obtain administrative privileges on the web interface of an affected server, including the ability to access and modify every simulation and all user-created data. To exploit this vulnerability, the attacker would need valid user credentials that are stored on the associated external authentication server.\r\nCisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-305" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cml-auth-bypass-4fUCCeG5", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-106xx/CVE-2024-10691.json b/CVE-2024/CVE-2024-106xx/CVE-2024-10691.json new file mode 100644 index 00000000000..2230fdfb1e5 --- /dev/null +++ b/CVE-2024/CVE-2024-106xx/CVE-2024-10691.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2024-10691", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-11-15T15:15:05.943", + "lastModified": "2024-11-15T15:15:05.943", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-9530. Reason: This candidate is a reservation duplicate of CVE-2024-9530. Notes: All CVE users should reference CVE-2024-9530 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11241.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11241.json new file mode 100644 index 00000000000..5f8a306cd98 --- /dev/null +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11241.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2024-11241", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-15T15:15:06.003", + "lastModified": "2024-11-15T15:15:06.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Job Recruitment 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file reset.php. The manipulation of the argument e leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 7.5 + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Anti-Entropy-Zhurong/cve/blob/main/sql-1.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.284677", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.284677", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.442036", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11242.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11242.json new file mode 100644 index 00000000000..27d91e25142 --- /dev/null +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11242.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-11242", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-15T15:15:06.280", + "lastModified": "2024-11-15T15:15:06.280", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in ZZCMS 2023. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/ad_list.php?action=pass of the component Keyword Filtering. The manipulation of the argument keyword leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 5.8 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 6.4, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/En0t5/vul/blob/main/zzcms/zzcms-add_list-sql-inject.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.284678", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.284678", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.442038", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11243.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11243.json new file mode 100644 index 00000000000..9c7798401b4 --- /dev/null +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11243.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2024-11243", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-15T15:15:06.557", + "lastModified": "2024-11-15T15:15:06.557", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in code-projects Online Shop Store 1.0. This affects an unknown part of the file /signup.php. The manipulation of the argument m2 with the input leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/sh3rl0ckpggp/0day/blob/main/code-projects_online-shop_CrossSiteScripting.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.284679", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.284679", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.442075", + "source": "cna@vuldb.com" + }, + { + "url": "https://youtu.be/QThAqddl5Dk", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11244.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11244.json new file mode 100644 index 00000000000..f7df850d695 --- /dev/null +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11244.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2024-11244", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-15T16:15:32.790", + "lastModified": "2024-11-15T16:15:32.790", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in code-projects Farmacia 1.0. This vulnerability affects unknown code of the file /editar-cliente.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/zsx020121/cve/blob/main/sql.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.284680", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.284680", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.443177", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11245.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11245.json new file mode 100644 index 00000000000..08c151a6141 --- /dev/null +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11245.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2024-11245", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-15T16:15:33.153", + "lastModified": "2024-11-15T16:15:33.153", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, has been found in code-projects Farmacia 1.0. This issue affects some unknown processing of the file /editar-produto.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/WEFNNTT/cve/blob/main/sql.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.284681", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.284681", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.443188", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11246.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11246.json new file mode 100644 index 00000000000..f5ebc80c236 --- /dev/null +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11246.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2024-11246", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-15T16:15:33.593", + "lastModified": "2024-11-15T16:15:33.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in code-projects Farmacia 1.0. Affected is an unknown function of the file /adicionar-cliente.php. The manipulation of the argument nome/cpf/dataNascimento leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions the parameter \"nome\" to be affected. But further inspection indicates that other parameters might be affected as well." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/curry136/cve/blob/main/xss8.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.284682", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.284682", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.443189", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-203xx/CVE-2024-20373.json b/CVE-2024/CVE-2024-203xx/CVE-2024-20373.json new file mode 100644 index 00000000000..5dd7a157af0 --- /dev/null +++ b/CVE-2024/CVE-2024-203xx/CVE-2024-20373.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-20373", + "sourceIdentifier": "ykramarz@cisco.com", + "published": "2024-11-15T15:15:06.823", + "lastModified": "2024-11-15T15:15:06.823", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the implementation of the Simple Network Management Protocol (SNMP) IPv4 access control list (ACL) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform SNMP polling of an affected device, even if it is configured to deny SNMP traffic. \r\n\r\nThis vulnerability exists because Cisco IOS Software and Cisco IOS XE Software do not support extended IPv4 ACLs for SNMP, but they do allow administrators to configure extended named IPv4 ACLs that are attached to the SNMP server configuration without a warning message. This can result in no ACL being applied to the SNMP listening process. An attacker could exploit this vulnerability by performing SNMP polling of an affected device. A successful exploit could allow the attacker to perform SNMP operations that should be denied. The attacker has no control of the SNMP ACL configuration and would still need a valid SNMP version 2c (SNMPv2c) community string or SNMP version 3 (SNMPv3) user credentials.\r\nSNMP with IPv6 ACL configurations is not affected.\r\nFor more information, see the section of this advisory." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "ykramarz@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-uwBXfqww", + "source": "ykramarz@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34662.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34662.json index 2b81d20f790..319dd6711ec 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34662.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34662.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34662", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-10-08T07:15:03.037", - "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:34:28.937", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,472 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F1525232-54F0-467F-9575-2445F73F43B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "06092D16-EBD5-489C-81D2-F6E0F922AE7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E070DA79-8F09-4877-BFBA-3F23564DD8C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D80C2C7A-6F48-48B8-ACAD-720FC797F836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "EE03013A-AAB3-4426-BB22-E1487D3B3F6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0AF1EDA0-2712-4C3C-8D8A-89E154BB63DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "CD382E2D-0B51-4908-989A-88E083FC85BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "61D507C0-086B-4139-A560-126964DFA579" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "57B125ED-D939-4CBC-9E96-BBCF02402A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF85AA7B-E1C7-4946-92B4-E4D545CAACDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B6871BC1-19F4-4F0C-88D8-4000590D8D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9FA72654-2389-4709-BC70-59EC4349A826" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "79C89A24-B07F-43D2-AE83-8F4F03D6C114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E4187BA1-226E-4976-A642-2F6DAE85538E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BFB2B338-5E04-4136-939F-749A3B163656" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=10", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41784.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41784.json new file mode 100644 index 00000000000..b6d8f01f95b --- /dev/null +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41784.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41784", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-11-15T16:15:34.240", + "lastModified": "2024-11-15T16:15:34.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Sterling Secure Proxy 6.0.0.0, 6.0.0.1, 6.0.0.2, 6.0.0.3, and 6.1.0.0 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot dot\" sequences (/.../) to view arbitrary files on the system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-32" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7173631", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41785.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41785.json new file mode 100644 index 00000000000..832620224bf --- /dev/null +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41785.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41785", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-11-15T15:15:07.047", + "lastModified": "2024-11-15T15:15:07.047", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Concert Software 1.0.0 through 1.0.1 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7173596", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43189.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43189.json new file mode 100644 index 00000000000..bd1c9d0d7e0 --- /dev/null +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43189.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43189", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-11-15T15:15:07.307", + "lastModified": "2024-11-15T15:15:07.307", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Concert Software 1.0.0 through 1.0.1 could allow a remote attacker to obtain sensitive information, caused by the failure to properly enable HTTP Strict Transport Security. An attacker could exploit this vulnerability to obtain sensitive information using man in the middle techniques." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7173596", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47067.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47067.json index b2dc1127bd1..d0c1fecb68d 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47067.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47067.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47067", "sourceIdentifier": "security-advisories@github.com", "published": "2024-09-30T16:15:09.267", - "lastModified": "2024-10-04T13:51:25.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:28:48.533", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -73,14 +105,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:alist_project:alist:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.29.0", + "matchCriteriaId": "0C182720-1235-4A80-8CE6-300CDF962788" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/alist-org/alist/commit/6100647310594868e931f3de1188ddd8bde93b78", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://securitylab.github.com/advisories/GHSL-2023-220_Alist/", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47867.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47867.json index 70b3b7b3266..6572ec849da 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47867.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47867.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47867", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-10T23:15:02.640", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:44:54.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,12 +59,44 @@ "baseSeverity": "LOW" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -73,10 +105,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gradio_project:gradio:*:*:*:*:*:python:*:*", + "versionEndExcluding": "5.0.0", + "matchCriteriaId": "32D191C7-095C-427B-832D-C63FE4D4A037" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/gradio-app/gradio/security/advisories/GHSA-8c87-gvhj-xm8m", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48068.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48068.json new file mode 100644 index 00000000000..433eca8020e --- /dev/null +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48068.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-48068", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-15T15:15:07.607", + "lastModified": "2024-11-15T15:15:07.607", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in Shenzhen Landray Software Co.,LTD Landray EKP v16 and earlier allows attackers to execute arbitrary web scripts or HTML via a crafted payload." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/CoinIsMoney/3448ba7c3e0cf01c3cbc6e2ab280d3c3", + "source": "cve@mitre.org" + }, + { + "url": "https://www.landray.com.cn/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48994.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48994.json index 7aa94b69424..f43a03e255e 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48994.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48994.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48994", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:36.117", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T15:40:38.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48994", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48995.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48995.json index a0d55bf3d79..cf65a9e827f 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48995.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48995.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48995", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:36.360", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T15:41:26.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48995", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48996.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48996.json index ba198589c27..af71ba0c707 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48996.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48996.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48996", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:36.637", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T15:45:46.920", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48996", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48997.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48997.json index 821c50f337e..cb522e46722 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48997.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48997.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48997", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:36.870", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T15:46:44.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48997", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48998.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48998.json index a8783bb7318..d4575e19561 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48998.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48998.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48998", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:37.110", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T15:51:24.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48998", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48999.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48999.json index 3819cef847d..9f5d3ae56b2 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48999.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48999.json @@ -2,8 +2,8 @@ "id": "CVE-2024-48999", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:37.340", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T15:51:44.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48999", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49000.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49000.json index cee4eef9b1d..c0a44c5f718 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49000.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49000.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49000", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:37.577", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T15:52:08.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49000", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49001.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49001.json index 84410e3d325..e605f692528 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49001.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49001.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49001", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:37.807", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T15:58:36.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49001", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49002.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49002.json index 57369b1bc2f..c56f84900ec 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49002.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49002.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49002", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:38.040", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T15:58:14.693", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49002", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49003.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49003.json index 2fd956acd58..96305fbedd9 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49003.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49003.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49003", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:38.257", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T15:57:52.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49003", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49004.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49004.json index 42f4b6f3291..1d6d5f7c7bb 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49004.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49004.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49004", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:38.500", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T15:56:55.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49004", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49005.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49005.json index 0532910299f..038fc8254fe 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49005.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49005.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49005", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:38.740", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T15:56:23.680", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49005", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49006.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49006.json index 50f987cd0d2..9eb8b6cbd6b 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49006.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49006.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49006", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:38.963", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:03:33.790", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49006", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49007.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49007.json index 76c88d466f7..982872592e0 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49007.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49007.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49007", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:39.203", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:03:17.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49007", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49008.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49008.json index 71e0478b7e2..6d774efb4f3 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49008.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49008.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49008", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:39.423", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:02:22.743", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49008", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49009.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49009.json index cacbf22bded..322bdc54fb2 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49009.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49009.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49009", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:39.650", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:02:11.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49009", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49010.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49010.json index be25b6f6b28..82a350fbb8e 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49010.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49010.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49010", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:39.870", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T15:59:36.937", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49010", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49011.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49011.json index 5d2b78540d6..d23becef434 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49011.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49011.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49011", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:40.087", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:16:21.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49011", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49012.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49012.json index e1ac02ebfa6..182b46d4da0 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49012.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49012.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49012", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:40.307", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:16:05.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49012", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49013.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49013.json index 562fd9974aa..dfb22147f88 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49013.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49013.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49013", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:40.530", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:14:55.170", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49013", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49014.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49014.json index 4d5376e2a98..32144dbf925 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49014.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49014.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49014", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:40.737", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T15:55:46.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "secure@microsoft.com", "type": "Secondary", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49014", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49015.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49015.json index 21ecf01d8a1..01c67f62628 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49015.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49015.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49015", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:40.953", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:07:40.680", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49015", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49016.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49016.json index 503f4da6ae5..a3e01124474 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49016.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49016.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49016", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:41.177", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:07:22.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49016", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49017.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49017.json index 11b10fb38da..0f5ecad96a6 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49017.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49017.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49017", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:41.407", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:07:03.200", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49017", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49018.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49018.json index aa482e67025..a58ab9af803 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49018.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49018.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49018", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:41.637", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:06:29.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,68 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49018", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49021.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49021.json index a8fe5808fb3..711930cd1d7 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49021.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49021.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49021", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:42.100", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:04:55.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,82 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.1000.6", + "versionEndExcluding": "16.0.1135.2", + "matchCriteriaId": "09CBD25F-B912-4F23-825B-AE53A7BDD608" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.4003.1", + "versionEndExcluding": "16.0.4155.4", + "matchCriteriaId": "099F41FA-ED7C-4D2E-9300-AF4365B95EAA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49021", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49043.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49043.json index 7a343fcd402..373163b6f65 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49043.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49043.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49043", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-12T18:15:44.637", - "lastModified": "2024-11-13T17:01:58.603", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:05:30.773", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -41,8 +41,18 @@ }, "weaknesses": [ { - "source": "secure@microsoft.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "secure@microsoft.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +61,82 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6455.2", + "matchCriteriaId": "94F7D410-C105-4D0E-91BC-57A36A7C30C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7050.2", + "matchCriteriaId": "DBBCB15E-0D31-44C4-AB3F-6CF06A654A02" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2070.1", + "matchCriteriaId": "9BF43A68-2ADF-49E5-BD43-F5286AB3B93D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3485.1", + "matchCriteriaId": "1C6809A5-466A-41B0-9AF2-B23B1A424CA0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2130.3", + "matchCriteriaId": "E8E62074-2024-4A7D-B8DE-B93D5B4594E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4410.1", + "matchCriteriaId": "6837EEFD-F447-4679-A001-C7BA0D11C5BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.1000.6", + "versionEndExcluding": "16.0.1135.2", + "matchCriteriaId": "09CBD25F-B912-4F23-825B-AE53A7BDD608" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.4003.1", + "versionEndExcluding": "16.0.4155.4", + "matchCriteriaId": "099F41FA-ED7C-4D2E-9300-AF4365B95EAA" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49043", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49754.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49754.json new file mode 100644 index 00000000000..122afde48fb --- /dev/null +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49754.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-49754", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-15T16:15:34.510", + "lastModified": "2024-11-15T16:15:34.510", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the API-Access page allows authenticated users to inject arbitrary JavaScript through the \"token\" parameter when creating a new API token. This vulnerability can result in the execution of malicious code in the context of other users' sessions, compromising their accounts and enabling unauthorized actions. This vulnerability is fixed in 24.10.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.7, + "impactScore": 5.3 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/librenms/librenms/commit/25988a937cbaebd2ba4c0517510206c404dfb359", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/librenms/librenms/security/advisories/GHSA-gfwr-xqmj-j27v", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49758.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49758.json new file mode 100644 index 00000000000..42d50ee8ccc --- /dev/null +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49758.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-49758", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-15T16:15:34.880", + "lastModified": "2024-11-15T16:15:34.880", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. User with Admin role can add Notes to a device, the application did not properly sanitize the user input, when the ExamplePlugin enable, if java script code is inside the device's Notes, its will be trigger. This vulnerability is fixed in 24.10.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/librenms/librenms/commit/24b142d753898e273ec20b542a27dd6eb530c7d8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/librenms/librenms/security/advisories/GHSA-c86q-rj37-8f85", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49759.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49759.json new file mode 100644 index 00000000000..685a62fda45 --- /dev/null +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49759.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-49759", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-15T16:15:35.100", + "lastModified": "2024-11-15T16:15:35.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the \"Manage User Access\" page allows authenticated users to inject arbitrary JavaScript through the \"bill_name\" parameter when creating a new bill. This vulnerability can lead to the execution of malicious code when visiting the \"Bill Access\" dropdown in the user's \"Manage Access\" page, potentially compromising user sessions and allowing unauthorized actions. This vulnerability is fixed in 24.10.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/librenms/librenms/commit/237f4d2e818170171dfad6efad36a275cd2ba8d0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/librenms/librenms/security/advisories/GHSA-888j-pjqh-fx58", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-497xx/CVE-2024-49764.json b/CVE-2024/CVE-2024-497xx/CVE-2024-49764.json new file mode 100644 index 00000000000..0aee3ea74b8 --- /dev/null +++ b/CVE-2024/CVE-2024-497xx/CVE-2024-49764.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-49764", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-15T16:15:35.323", + "lastModified": "2024-11-15T16:15:35.323", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the \"Capture Debug Information\" page allows authenticated users to inject arbitrary JavaScript through the \"hostname\" parameter when creating a new device. This vulnerability results in the execution of malicious code when the \"Capture Debug Information\" page is visited, redirecting the user and sending non-httponly cookies to an attacker-controlled domain. This vulnerability is fixed in 24.10.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/librenms/librenms/commit/af15eabbb1752985d36f337cecf137a947e170f6", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/librenms/librenms/security/advisories/GHSA-rmr4-x6c9-jc68", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50350.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50350.json new file mode 100644 index 00000000000..99c596e40ad --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50350.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-50350", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-15T16:15:35.537", + "lastModified": "2024-11-15T16:15:35.537", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the \"Port Settings\" page allows authenticated users to inject arbitrary JavaScript through the \"name\" parameter when creating a new Port Group. This vulnerability results in the execution of malicious code when the \"Port Settings\" page is visited after the affected Port Group is added to a device, potentially compromising user sessions and allowing unauthorized actions. This vulnerability is fixed in 24.10.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/librenms/librenms/commit/82a744bfe29017b8b58b5752ab9e1b335bedf0a0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/librenms/librenms/security/advisories/GHSA-xh4g-c9p6-5jxg", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50351.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50351.json new file mode 100644 index 00000000000..7dc334a3ae6 --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50351.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-50351", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-15T16:15:35.750", + "lastModified": "2024-11-15T16:15:35.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Reflected Cross-Site Scripting (XSS) vulnerability in the \"section\" parameter of the \"logs\" tab of a device allows attackers to inject arbitrary JavaScript. This vulnerability results in the execution of malicious code when a user accesses the page with a malicious \"section\" parameter, potentially compromising their session and enabling unauthorized actions. The issue arises from a lack of sanitization in the \"report_this()\" function. This vulnerability is fixed in 24.10.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/librenms/librenms/commit/6a14a9bd767c6e452e4df77a24126c3eeb93dcbf", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/librenms/librenms/security/advisories/GHSA-v7w9-63xh-6r3w", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50352.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50352.json new file mode 100644 index 00000000000..b6993ef3d87 --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50352.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-50352", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-15T16:15:35.960", + "lastModified": "2024-11-15T16:15:35.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the \"Services\" section of the Device Overview page allows authenticated users to inject arbitrary JavaScript through the \"name\" parameter when adding a service to a device. This vulnerability could result in the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and enabling unauthorized actions. This vulnerability is fixed in 24.10.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/librenms/librenms/commit/b4af778ca42c5839801f16ece53505bb7fa1e7bc", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/librenms/librenms/security/advisories/GHSA-qr8f-5qqg-j3wg", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50355.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50355.json new file mode 100644 index 00000000000..6690d925e8d --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50355.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-50355", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-15T16:15:36.160", + "lastModified": "2024-11-15T16:15:36.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. User with Admin role can edit the Display Name of a device, the application did not properly sanitize the user input in the device Display Name, if java script code is inside the name of the device Display Name, its can be trigger from different sources. This vulnerability is fixed in 24.10.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/librenms/librenms/commit/bb4731419b592867bf974dde525e536606a52976", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/librenms/librenms/security/advisories/GHSA-4m5r-w2rq-q54q", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50623.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50623.json index 04b3f489160..da23ed6b09a 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50623.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50623.json @@ -2,13 +2,13 @@ "id": "CVE-2024-50623", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-28T00:15:03.657", - "lastModified": "2024-10-30T21:35:11.373", + "lastModified": "2024-11-15T16:15:36.367", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In Cleo Harmony before 5.8.0.20, VLTrader before 5.8.0.20, and LexiCom before 5.8.0.20, there is a JavaScript Injection vulnerability: unrestricted file upload and download could lead to remote code execution." + "value": "In Cleo Harmony before 5.8.0.21, VLTrader before 5.8.0.21, and LexiCom before 5.8.0.21, there is an unrestricted file upload and download that could lead to remote code execution." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50647.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50647.json new file mode 100644 index 00000000000..56d7e720f18 --- /dev/null +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50647.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-50647", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-15T16:15:36.467", + "lastModified": "2024-11-15T16:15:36.467", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The python_food ordering system V1.0 has an unauthorized vulnerability that leads to the leakage of sensitive user information. Attackers can access it through https://ip:port/api/myapp/index/user/info?id=1 And modify the ID value to obtain sensitive user information beyond authorization." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Yllxx03/CVE/blob/main/python_food_Information_Disclosure.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Yllxx03/CVE/tree/main/CVE-2024-50647", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50648.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50648.json new file mode 100644 index 00000000000..1c18b19bb74 --- /dev/null +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50648.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-50648", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-15T16:15:36.547", + "lastModified": "2024-11-15T16:15:36.547", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "yshopmall V1.0 has an arbitrary file upload vulnerability, which can enable RCE or even take over the server when improperly configured to parse JSP files." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Yllxx03/CVE/blob/main/yshop_fileu_pload.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Yllxx03/CVE/tree/main/CVE-2024-50648", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50649.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50649.json new file mode 100644 index 00000000000..e6b15a4158e --- /dev/null +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50649.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-50649", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-15T16:15:36.637", + "lastModified": "2024-11-15T16:15:36.637", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The user avatar upload function in python_book V1.0 has an arbitrary file upload vulnerability." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Yllxx03/CVE/blob/main/python_book/FileUpload.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Yllxx03/CVE/tree/main/CVE-2024-50649", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50650.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50650.json new file mode 100644 index 00000000000..1a832c548f6 --- /dev/null +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50650.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-50650", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-15T16:15:36.710", + "lastModified": "2024-11-15T16:15:36.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "python_book V1.0 is vulnerable to Incorrect Access Control, which allows attackers to obtain sensitive information of users with different IDs by modifying the ID parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Yllxx03/CVE/blob/main/python_book/BrokenAccessControl.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Yllxx03/CVE/tree/main/CVE-2024-50650", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50651.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50651.json new file mode 100644 index 00000000000..e248f554563 --- /dev/null +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50651.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-50651", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-15T16:15:36.783", + "lastModified": "2024-11-15T16:15:36.783", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "java_shop 1.0 is vulnerable to Incorrect Access Control, which allows attackers to obtain sensitive information of users with different IDs by modifying the ID parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Yllxx03/CVE/blob/main/java_shop/BrokenAccessControl.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Yllxx03/CVE/tree/main/CVE-2024-50651", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50652.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50652.json new file mode 100644 index 00000000000..853fe1b115b --- /dev/null +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50652.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-50652", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-15T16:15:36.863", + "lastModified": "2024-11-15T16:15:36.863", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A file upload vulnerability in java_shop 1.0 allows attackers to upload arbitrary files by modifying the avatar function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Yllxx03/CVE/blob/main/java_shop/FileUpload.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Yllxx03/CVE/tree/main/CVE-2024-50652", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-507xx/CVE-2024-50724.json b/CVE-2024/CVE-2024-507xx/CVE-2024-50724.json new file mode 100644 index 00000000000..7a8c30954e4 --- /dev/null +++ b/CVE-2024/CVE-2024-507xx/CVE-2024-50724.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-50724", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-15T16:15:36.943", + "lastModified": "2024-11-15T16:15:36.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "KASO v9.0 was discovered to contain a SQL injection vulnerability via the person_id parameter at /cardcase/editcard.jsp." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/youyuzhongli/KASO-SQL/blob/main/README.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50986.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50986.json new file mode 100644 index 00000000000..34ecae57ebf --- /dev/null +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50986.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-50986", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-15T15:15:07.773", + "lastModified": "2024-11-15T15:15:07.773", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in Clementine v.1.3.1 allows a local attacker to execute arbitrary code via a crafted DLL file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/clementine-player/Clementine", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/riftsandroses/CVE-2024-50986/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.clementine-player.org/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51164.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51164.json new file mode 100644 index 00000000000..a44eca6f6ad --- /dev/null +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51164.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-51164", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-15T16:15:37.057", + "lastModified": "2024-11-15T16:15:37.057", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Multiple parameters have SQL injection vulnerability in JEPaaS 7.2.8 via /je/login/btnLog/insertBtnLog, which could allow a remote user to submit a specially crafted query, allowing an attacker to retrieve all the information stored in the DB." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitee.com/ketr/jepaas-release", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/abcc111/vulns/blob/main/JEPaaS/Multiple%20parameters%20have%20SQL%20injection%20issues%20in%20JEPAAS.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51494.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51494.json new file mode 100644 index 00000000000..beaa953e64e --- /dev/null +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51494.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-51494", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-15T16:15:37.140", + "lastModified": "2024-11-15T16:15:37.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the \"Port Settings\" page allows authenticated users to inject arbitrary JavaScript through the \"descr\" parameter when editing a device's port settings. This vulnerability can lead to the execution of malicious code when the \"Port Settings\" page is visited, potentially compromising the user's session and allowing unauthorized actions. This vulnerability is fixed in 24.10.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/librenms/librenms/commit/82a744bfe29017b8b58b5752ab9e1b335bedf0a0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/librenms/librenms/security/advisories/GHSA-7663-37rg-c377", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51495.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51495.json new file mode 100644 index 00000000000..d692a3033e1 --- /dev/null +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51495.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-51495", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-15T16:15:37.343", + "lastModified": "2024-11-15T16:15:37.343", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the Device Overview page allows authenticated users to inject arbitrary JavaScript through the \"overwrite_ip\" parameter when editing a device. This vulnerability results in the execution of malicious code when the device overview page is visited, potentially compromising the accounts of other users. This vulnerability is fixed in 24.10.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/librenms/librenms/commit/4568188ce9097a2e3a3b563311077f2bb82455c0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/librenms/librenms/security/advisories/GHSA-p66q-ppwr-q5j8", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51496.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51496.json new file mode 100644 index 00000000000..315727344d9 --- /dev/null +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51496.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-51496", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-15T16:15:37.553", + "lastModified": "2024-11-15T16:15:37.553", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Reflected Cross-Site Scripting (XSS) vulnerability in the \"metric\" parameter of the \"/wireless\" and \"/health\" endpoints allows attackers to inject arbitrary JavaScript. This vulnerability results in the execution of malicious code when a user accesses the page with a malicious \"metric\" parameter, potentially compromising their session and allowing unauthorized actions. This vulnerability is fixed in 24.10.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/librenms/librenms/commit/aef739a438ffb507e927a4ec87b359164a7a053a", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/librenms/librenms/security/advisories/GHSA-28p7-f6h6-3jh3", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51497.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51497.json new file mode 100644 index 00000000000..e2281a958b6 --- /dev/null +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51497.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-51497", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-15T16:15:37.770", + "lastModified": "2024-11-15T16:15:37.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the \"Custom OID\" tab of a device allows authenticated users to inject arbitrary JavaScript through the \"unit\" parameter when creating a new OID. This vulnerability can lead to the execution of malicious code in the context of other users' sessions, compromising their accounts and enabling unauthorized actions. This vulnerability is fixed in 24.10.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/librenms/librenms/commit/42b156e42a3811c23758772ce8c63d4d3eaba59b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/librenms/librenms/security/advisories/GHSA-gv4m-f6fx-859x", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51599.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51599.json index 62ad63583c7..493f5b443f2 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51599.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51599.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51599", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-09T15:15:07.490", - "lastModified": "2024-11-12T13:56:24.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:55:34.480", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:russellalbin:simple_business_manager:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "4.6.7.4", + "matchCriteriaId": "8446ADEC-09B0-4B86-98E1-A31D6457F89B" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/simple-business-manager/wordpress-simple-business-manager-plugin-4-6-7-4-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51603.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51603.json index c917c197e44..6e27b0785fa 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51603.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51603.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51603", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-09T15:15:07.710", - "lastModified": "2024-11-12T13:56:24.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:24:18.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mirceatm:nmr_strava_activities:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.6", + "matchCriteriaId": "56E572F9-07C9-43DA-92E5-F1E6FB8BA217" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/nmr-strava-activities/wordpress-nmr-strava-activities-plugin-1-0-6-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51604.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51604.json index 6ed7ed4ee29..3895f6af521 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51604.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51604.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51604", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-09T15:15:07.920", - "lastModified": "2024-11-12T13:56:24.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:19:11.063", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jumpstartcreatives:media_modal:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.2", + "matchCriteriaId": "9F3B52BF-857C-4F29-B189-10E97E01DA42" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/media-modal/wordpress-media-modal-plugin-1-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51605.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51605.json index 9e5c1a2083a..a297eb55c6d 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51605.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51605.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51605", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-09T15:15:08.123", - "lastModified": "2024-11-12T13:56:24.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:31:12.773", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:genoo:genoo:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "6.0.10", + "matchCriteriaId": "B8E75285-453D-4AE7-9D03-B57A73B1CF7F" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/genoo/wordpress-genoo-plugin-6-0-10-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51610.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51610.json index 2d7e8e5115f..1ee2d7374f2 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51610.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51610.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51610", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-09T15:15:09.033", - "lastModified": "2024-11-12T13:56:24.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:32:46.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:seothemes:display_terms_shortcode:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.4", + "matchCriteriaId": "FBA9A25F-DF60-44E5-BC75-4A3510729187" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/display-terms-shortcode/wordpress-display-terms-shortcode-plugin-1-0-4-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-518xx/CVE-2024-51882.json b/CVE-2024/CVE-2024-518xx/CVE-2024-51882.json index 081db6b47fd..faba9ae0a93 100644 --- a/CVE-2024/CVE-2024-518xx/CVE-2024-51882.json +++ b/CVE-2024/CVE-2024-518xx/CVE-2024-51882.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51882", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-11T06:15:09.837", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:08:40.333", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ehues:gboy_custom_google_map:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.2", + "matchCriteriaId": "DFC2091F-634A-4F0A-BFDD-B3373E2E48CC" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/gboy-custom-google-map/wordpress-gboy-custom-google-map-plugin-1-2-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-51xx/CVE-2024-5125.json b/CVE-2024/CVE-2024-51xx/CVE-2024-5125.json index f794476f757..a5839c23cff 100644 --- a/CVE-2024/CVE-2024-51xx/CVE-2024-5125.json +++ b/CVE-2024/CVE-2024-51xx/CVE-2024-5125.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5125", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-14T18:15:26.760", - "lastModified": "2024-11-15T13:58:08.913", + "lastModified": "2024-11-15T16:35:09.290", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.5 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52356.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52356.json index b3de657d7d4..b45591a67e4 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52356.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52356.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52356", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-11T06:15:10.153", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:05:12.367", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webangon:the_pack_elementor_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.1", + "matchCriteriaId": "0B62959E-CDAC-4299-B98D-9890CFED6649" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/the-pack-addon/wordpress-the-pack-elementor-addons-plugin-2-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52357.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52357.json index 367810d5945..3e3ecfc86d2 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52357.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52357.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52357", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-11T06:15:10.440", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:04:45.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lqd:liquid_blocks:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.0", + "matchCriteriaId": "221915AA-9AD0-4D20-B6BC-F5FA25116144" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/liquid-blocks/wordpress-liquid-blocks-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52358.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52358.json index 7c8c6503ac9..3c25e569a88 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52358.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52358.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52358", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-11T06:15:10.737", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:17:40.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cyberchimps:responsive_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.6.0", + "matchCriteriaId": "3D805F48-EE9A-4686-9A7D-6F0F31B8DCC2" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/responsive-addons-for-elementor/wordpress-responsive-addons-for-elementor-plugin-1-5-4-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52526.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52526.json new file mode 100644 index 00000000000..13b7cc577eb --- /dev/null +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52526.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-52526", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-15T16:15:38.107", + "lastModified": "2024-11-15T16:15:38.107", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. A Stored Cross-Site Scripting (XSS) vulnerability in the \"Services\" tab of the Device page allows authenticated users to inject arbitrary JavaScript through the \"descr\" parameter when adding a service to a device. This vulnerability could result in the execution of malicious code in the context of other users' sessions, potentially compromising their accounts and enabling unauthorized actions. This vulnerability is fixed in 24.10.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/librenms/librenms/commit/30e522c29bbb1f9b72951025e7049a26c7e1d76e", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/librenms/librenms/security/advisories/GHSA-8fh4-942r-jf2g", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52555.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52555.json new file mode 100644 index 00000000000..bbceeba1c9a --- /dev/null +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52555.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52555", + "sourceIdentifier": "cve@jetbrains.com", + "published": "2024-11-15T16:15:38.340", + "lastModified": "2024-11-15T16:15:38.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In JetBrains WebStorm before 2024.3 code execution in Untrusted Project mode was possible via type definitions installer script" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@jetbrains.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "cve@jetbrains.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-349" + } + ] + } + ], + "references": [ + { + "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", + "source": "cve@jetbrains.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6413.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6413.json new file mode 100644 index 00000000000..68469fa86eb --- /dev/null +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6413.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2024-6413", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-11-15T16:15:38.573", + "lastModified": "2024-11-15T16:15:38.573", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-2414. Reason: This candidate is a reservation duplicate of \tCVE-2023-2414. Notes: All CVE users should reference CVE-2023-2414 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-78xx/CVE-2024-7865.json b/CVE-2024/CVE-2024-78xx/CVE-2024-7865.json new file mode 100644 index 00000000000..883c7c27427 --- /dev/null +++ b/CVE-2024/CVE-2024-78xx/CVE-2024-7865.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2024-7865", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-11-15T16:15:38.630", + "lastModified": "2024-11-15T16:15:38.630", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2023-2414. Reason: This candidate is a reservation duplicate of CVE-2023-2414. Notes: All CVE users should reference CVE-2023-2414 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9487.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9487.json index a3cf511d3e5..7b5bef87b58 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9487.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9487.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9487", "sourceIdentifier": "product-cna@github.com", "published": "2024-10-10T22:15:11.357", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:57:10.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,9 +59,41 @@ "baseSeverity": "CRITICAL" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + }, { "source": "product-cna@github.com", "type": "Secondary", @@ -73,22 +105,73 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.11.16", + "matchCriteriaId": "E624875C-FCF2-4538-8F3E-D64183154275" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.12.0", + "versionEndExcluding": "3.12.10", + "matchCriteriaId": "F70645DE-4DC2-40CB-B425-4E002B302FDB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.13.0", + "versionEndExcluding": "3.13.5", + "matchCriteriaId": "B08CBD2C-6DA7-4C0F-9812-42933F51C003" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.14.0", + "versionEndExcluding": "3.14.2", + "matchCriteriaId": "59E74193-93FE-45FE-8C74-34EC30EEB03C" + } + ] + } + ] + } + ], "references": [ { "url": "https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.16", - "source": "product-cna@github.com" + "source": "product-cna@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://docs.github.com/en/enterprise-server@3.12/admin/release-notes#3.12.10", - "source": "product-cna@github.com" + "source": "product-cna@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://docs.github.com/en/enterprise-server@3.13/admin/release-notes#3.13.5", - "source": "product-cna@github.com" + "source": "product-cna@github.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.2", - "source": "product-cna@github.com" + "source": "product-cna@github.com", + "tags": [ + "Release Notes" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9822.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9822.json index d826e32df5a..46061fd5217 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9822.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9822.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9822", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-11T03:15:10.967", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T16:41:41.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pedalo:pedalo_connector:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.0.5", + "matchCriteriaId": "E4368DBF-CFDE-4375-89A6-34D904FC543D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/pedalo-connector/tags/2.0.5/public/class-pedalo_connector-public.php#L118", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6ab0d342-bfa7-4760-b839-37c3354414ca?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 504cdb58806..a100963a29b 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-15T15:00:31.902868+00:00 +2024-11-15T17:00:20.137202+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-15T14:39:34.863000+00:00 +2024-11-15T16:57:10.080000+00:00 ``` ### Last Data Feed Release @@ -33,47 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -269835 +269906 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `71` -- [CVE-2024-11238](CVE-2024/CVE-2024-112xx/CVE-2024-11238.json) (`2024-11-15T13:15:03.753`) -- [CVE-2024-11239](CVE-2024/CVE-2024-112xx/CVE-2024-11239.json) (`2024-11-15T14:15:19.693`) -- [CVE-2024-11240](CVE-2024/CVE-2024-112xx/CVE-2024-11240.json) (`2024-11-15T14:15:19.953`) +- [CVE-2024-49754](CVE-2024/CVE-2024-497xx/CVE-2024-49754.json) (`2024-11-15T16:15:34.510`) +- [CVE-2024-49758](CVE-2024/CVE-2024-497xx/CVE-2024-49758.json) (`2024-11-15T16:15:34.880`) +- [CVE-2024-49759](CVE-2024/CVE-2024-497xx/CVE-2024-49759.json) (`2024-11-15T16:15:35.100`) +- [CVE-2024-49764](CVE-2024/CVE-2024-497xx/CVE-2024-49764.json) (`2024-11-15T16:15:35.323`) +- [CVE-2024-50350](CVE-2024/CVE-2024-503xx/CVE-2024-50350.json) (`2024-11-15T16:15:35.537`) +- [CVE-2024-50351](CVE-2024/CVE-2024-503xx/CVE-2024-50351.json) (`2024-11-15T16:15:35.750`) +- [CVE-2024-50352](CVE-2024/CVE-2024-503xx/CVE-2024-50352.json) (`2024-11-15T16:15:35.960`) +- [CVE-2024-50355](CVE-2024/CVE-2024-503xx/CVE-2024-50355.json) (`2024-11-15T16:15:36.160`) +- [CVE-2024-50647](CVE-2024/CVE-2024-506xx/CVE-2024-50647.json) (`2024-11-15T16:15:36.467`) +- [CVE-2024-50648](CVE-2024/CVE-2024-506xx/CVE-2024-50648.json) (`2024-11-15T16:15:36.547`) +- [CVE-2024-50649](CVE-2024/CVE-2024-506xx/CVE-2024-50649.json) (`2024-11-15T16:15:36.637`) +- [CVE-2024-50650](CVE-2024/CVE-2024-506xx/CVE-2024-50650.json) (`2024-11-15T16:15:36.710`) +- [CVE-2024-50651](CVE-2024/CVE-2024-506xx/CVE-2024-50651.json) (`2024-11-15T16:15:36.783`) +- [CVE-2024-50652](CVE-2024/CVE-2024-506xx/CVE-2024-50652.json) (`2024-11-15T16:15:36.863`) +- [CVE-2024-50724](CVE-2024/CVE-2024-507xx/CVE-2024-50724.json) (`2024-11-15T16:15:36.943`) +- [CVE-2024-50986](CVE-2024/CVE-2024-509xx/CVE-2024-50986.json) (`2024-11-15T15:15:07.773`) +- [CVE-2024-51164](CVE-2024/CVE-2024-511xx/CVE-2024-51164.json) (`2024-11-15T16:15:37.057`) +- [CVE-2024-51494](CVE-2024/CVE-2024-514xx/CVE-2024-51494.json) (`2024-11-15T16:15:37.140`) +- [CVE-2024-51495](CVE-2024/CVE-2024-514xx/CVE-2024-51495.json) (`2024-11-15T16:15:37.343`) +- [CVE-2024-51496](CVE-2024/CVE-2024-514xx/CVE-2024-51496.json) (`2024-11-15T16:15:37.553`) +- [CVE-2024-51497](CVE-2024/CVE-2024-514xx/CVE-2024-51497.json) (`2024-11-15T16:15:37.770`) +- [CVE-2024-52526](CVE-2024/CVE-2024-525xx/CVE-2024-52526.json) (`2024-11-15T16:15:38.107`) +- [CVE-2024-52555](CVE-2024/CVE-2024-525xx/CVE-2024-52555.json) (`2024-11-15T16:15:38.340`) +- [CVE-2024-6413](CVE-2024/CVE-2024-64xx/CVE-2024-6413.json) (`2024-11-15T16:15:38.573`) +- [CVE-2024-7865](CVE-2024/CVE-2024-78xx/CVE-2024-7865.json) (`2024-11-15T16:15:38.630`) ### CVEs modified in the last Commit -Recently modified CVEs: `325` +Recently modified CVEs: `43` -- [CVE-2024-5918](CVE-2024/CVE-2024-59xx/CVE-2024-5918.json) (`2024-11-15T13:58:08.913`) -- [CVE-2024-5919](CVE-2024/CVE-2024-59xx/CVE-2024-5919.json) (`2024-11-15T13:58:08.913`) -- [CVE-2024-5920](CVE-2024/CVE-2024-59xx/CVE-2024-5920.json) (`2024-11-15T13:58:08.913`) -- [CVE-2024-6068](CVE-2024/CVE-2024-60xx/CVE-2024-6068.json) (`2024-11-15T13:58:08.913`) -- [CVE-2024-7124](CVE-2024/CVE-2024-71xx/CVE-2024-7124.json) (`2024-11-15T13:58:08.913`) -- [CVE-2024-7404](CVE-2024/CVE-2024-74xx/CVE-2024-7404.json) (`2024-11-15T13:58:08.913`) -- [CVE-2024-7730](CVE-2024/CVE-2024-77xx/CVE-2024-7730.json) (`2024-11-15T13:58:08.913`) -- [CVE-2024-7787](CVE-2024/CVE-2024-77xx/CVE-2024-7787.json) (`2024-11-15T13:58:08.913`) -- [CVE-2024-8180](CVE-2024/CVE-2024-81xx/CVE-2024-8180.json) (`2024-11-15T13:58:08.913`) -- [CVE-2024-8648](CVE-2024/CVE-2024-86xx/CVE-2024-8648.json) (`2024-11-15T13:58:08.913`) -- [CVE-2024-8961](CVE-2024/CVE-2024-89xx/CVE-2024-8961.json) (`2024-11-15T13:58:08.913`) -- [CVE-2024-8978](CVE-2024/CVE-2024-89xx/CVE-2024-8978.json) (`2024-11-15T13:58:08.913`) -- [CVE-2024-8979](CVE-2024/CVE-2024-89xx/CVE-2024-8979.json) (`2024-11-15T13:58:08.913`) -- [CVE-2024-9186](CVE-2024/CVE-2024-91xx/CVE-2024-9186.json) (`2024-11-15T13:58:08.913`) -- [CVE-2024-9356](CVE-2024/CVE-2024-93xx/CVE-2024-9356.json) (`2024-11-15T13:58:08.913`) -- [CVE-2024-9413](CVE-2024/CVE-2024-94xx/CVE-2024-9413.json) (`2024-11-15T14:00:09.720`) -- [CVE-2024-9465](CVE-2024/CVE-2024-94xx/CVE-2024-9465.json) (`2024-11-15T14:39:34.863`) -- [CVE-2024-9472](CVE-2024/CVE-2024-94xx/CVE-2024-9472.json) (`2024-11-15T13:58:08.913`) -- [CVE-2024-9476](CVE-2024/CVE-2024-94xx/CVE-2024-9476.json) (`2024-11-15T14:00:09.720`) -- [CVE-2024-9529](CVE-2024/CVE-2024-95xx/CVE-2024-9529.json) (`2024-11-15T13:58:08.913`) -- [CVE-2024-9609](CVE-2024/CVE-2024-96xx/CVE-2024-9609.json) (`2024-11-15T13:58:08.913`) -- [CVE-2024-9633](CVE-2024/CVE-2024-96xx/CVE-2024-9633.json) (`2024-11-15T13:58:08.913`) -- [CVE-2024-9693](CVE-2024/CVE-2024-96xx/CVE-2024-9693.json) (`2024-11-15T13:58:08.913`) -- [CVE-2024-9832](CVE-2024/CVE-2024-98xx/CVE-2024-9832.json) (`2024-11-15T13:58:08.913`) -- [CVE-2024-9834](CVE-2024/CVE-2024-98xx/CVE-2024-9834.json) (`2024-11-15T13:58:08.913`) +- [CVE-2024-49009](CVE-2024/CVE-2024-490xx/CVE-2024-49009.json) (`2024-11-15T16:02:11.097`) +- [CVE-2024-49010](CVE-2024/CVE-2024-490xx/CVE-2024-49010.json) (`2024-11-15T15:59:36.937`) +- [CVE-2024-49011](CVE-2024/CVE-2024-490xx/CVE-2024-49011.json) (`2024-11-15T16:16:21.817`) +- [CVE-2024-49012](CVE-2024/CVE-2024-490xx/CVE-2024-49012.json) (`2024-11-15T16:16:05.507`) +- [CVE-2024-49013](CVE-2024/CVE-2024-490xx/CVE-2024-49013.json) (`2024-11-15T16:14:55.170`) +- [CVE-2024-49014](CVE-2024/CVE-2024-490xx/CVE-2024-49014.json) (`2024-11-15T15:55:46.947`) +- [CVE-2024-49015](CVE-2024/CVE-2024-490xx/CVE-2024-49015.json) (`2024-11-15T16:07:40.680`) +- [CVE-2024-49016](CVE-2024/CVE-2024-490xx/CVE-2024-49016.json) (`2024-11-15T16:07:22.397`) +- [CVE-2024-49017](CVE-2024/CVE-2024-490xx/CVE-2024-49017.json) (`2024-11-15T16:07:03.200`) +- [CVE-2024-49018](CVE-2024/CVE-2024-490xx/CVE-2024-49018.json) (`2024-11-15T16:06:29.407`) +- [CVE-2024-49021](CVE-2024/CVE-2024-490xx/CVE-2024-49021.json) (`2024-11-15T16:04:55.487`) +- [CVE-2024-49043](CVE-2024/CVE-2024-490xx/CVE-2024-49043.json) (`2024-11-15T16:05:30.773`) +- [CVE-2024-50623](CVE-2024/CVE-2024-506xx/CVE-2024-50623.json) (`2024-11-15T16:15:36.367`) +- [CVE-2024-5125](CVE-2024/CVE-2024-51xx/CVE-2024-5125.json) (`2024-11-15T16:35:09.290`) +- [CVE-2024-51599](CVE-2024/CVE-2024-515xx/CVE-2024-51599.json) (`2024-11-15T16:55:34.480`) +- [CVE-2024-51603](CVE-2024/CVE-2024-516xx/CVE-2024-51603.json) (`2024-11-15T16:24:18.843`) +- [CVE-2024-51604](CVE-2024/CVE-2024-516xx/CVE-2024-51604.json) (`2024-11-15T16:19:11.063`) +- [CVE-2024-51605](CVE-2024/CVE-2024-516xx/CVE-2024-51605.json) (`2024-11-15T16:31:12.773`) +- [CVE-2024-51610](CVE-2024/CVE-2024-516xx/CVE-2024-51610.json) (`2024-11-15T16:32:46.277`) +- [CVE-2024-51882](CVE-2024/CVE-2024-518xx/CVE-2024-51882.json) (`2024-11-15T16:08:40.333`) +- [CVE-2024-52356](CVE-2024/CVE-2024-523xx/CVE-2024-52356.json) (`2024-11-15T16:05:12.367`) +- [CVE-2024-52357](CVE-2024/CVE-2024-523xx/CVE-2024-52357.json) (`2024-11-15T16:04:45.767`) +- [CVE-2024-52358](CVE-2024/CVE-2024-523xx/CVE-2024-52358.json) (`2024-11-15T16:17:40.127`) +- [CVE-2024-9487](CVE-2024/CVE-2024-94xx/CVE-2024-9487.json) (`2024-11-15T16:57:10.080`) +- [CVE-2024-9822](CVE-2024/CVE-2024-98xx/CVE-2024-9822.json) (`2024-11-15T16:41:41.507`) ## Download and Usage diff --git a/_state.csv b/_state.csv index d179aede818..83feac9db5b 100644 --- a/_state.csv +++ b/_state.csv @@ -61302,7 +61302,7 @@ CVE-2013-3896,0,0,2f16407b73ada215f5106e639dcd7a3a77019c2bff5360cdd75e9173d86c6e CVE-2013-3897,0,0,b72882d4e43715dd810e1a5c9b26720bf797f23fb9f46c20bf600fe2a406ffa1,2024-07-16T17:35:10.297000 CVE-2013-3898,0,0,adce080d90c6ab18e43ee5f8aeefa7f5c6eacaaeca0c2f14d949b429f34843bb,2018-10-12T22:05:15.477000 CVE-2013-3899,0,0,b949ae26d8e682596affc2c3cac842b5f50e14a7098ef4be97cbc20478609e8a,2019-02-26T14:04:00.993000 -CVE-2013-3900,0,1,31662f7b42360988f09d025d3259f164b03792e115cbc5a018adb82124d95fa5,2024-11-15T14:34:02.340000 +CVE-2013-3900,0,0,31662f7b42360988f09d025d3259f164b03792e115cbc5a018adb82124d95fa5,2024-11-15T14:34:02.340000 CVE-2013-3901,0,0,909726abe80e061ae6e2dd321fecfa4d619bac1c32ab43350c89c79f858d262c,2023-11-07T02:16:04.560000 CVE-2013-3902,0,0,c3268eb845cc61f648c0f924f7aea32bf035b177d6afdc3b4618f8fae3570fc9,2020-09-28T12:58:30.503000 CVE-2013-3903,0,0,ba33c71cb834f29161cb041ea3ea2cb9e5593eb9759c9e34363de18a0ee9ff62,2019-05-08T22:03:15.720000 @@ -96969,7 +96969,7 @@ CVE-2017-13221,0,0,57e3b08fba40dbad7e13f1ecaef036f44baab1a7137260bac79cedbd0aaba CVE-2017-13222,0,0,ebfdf42baf601798adad1e504ba051d585896884b139bf563ee706b616493897,2018-01-24T16:09:05.727000 CVE-2017-13225,0,0,435256662af53bc84b96c8ecfbcc5e36a7df54bbec82fdff4a451c067fc3516f,2018-01-25T14:42:54.447000 CVE-2017-13226,0,0,a63799b06443b94461c2cc06e2e1817db591c161b20b7ad48cffc3add8fc02f9,2019-10-03T00:03:26.223000 -CVE-2017-13227,0,1,1218c8f6d24ebd15c69e188cae747189d6f4bc1ebaf096d13599f773d27d57bd,2024-11-15T13:58:08.913000 +CVE-2017-13227,0,0,1218c8f6d24ebd15c69e188cae747189d6f4bc1ebaf096d13599f773d27d57bd,2024-11-15T13:58:08.913000 CVE-2017-13228,0,0,d6d00cc11b40a6f7cf8c7c7b74c3a16d54ba4bf0782c9a7d7071e50c41c579df,2018-03-13T14:41:27.033000 CVE-2017-13229,0,0,7ebc8fa8286ba1d5821a34ad554783788a44485aedcb5ab1d772a4b9b365c210,2018-03-06T19:52:36.463000 CVE-2017-13230,0,0,d8a847f5c7c6d9cdce8e19c6fc7435655e7234b7d29ac67a202b7766226c4533,2018-03-13T14:40:12.123000 @@ -179867,7 +179867,7 @@ CVE-2021-37391,0,0,612092213cbf3c7c8612c0c47f8c525d5a52fd73e735ce6c2b430c9b86b41 CVE-2021-37392,0,0,60b8dbff0c2d792a54d0cec2f57109e745df15412f48a80e1ebca647d9b97654,2021-08-06T16:21:28.697000 CVE-2021-37393,0,0,8aef86848c22832237243030c09554d5c294fe67bf36c767afe9af07ac38cfd0,2021-08-06T16:16:15.627000 CVE-2021-37394,0,0,3bedea4cd8c10cff8545c5ec47bc3c52f53035db41f301c1be09bcbd332575a2,2022-07-12T17:42:04.277000 -CVE-2021-3740,0,1,50364709b33e38e987de64e61691a6050ef2c764a51b7f4e96d18c3fa8da634b,2024-11-15T13:58:08.913000 +CVE-2021-3740,0,0,50364709b33e38e987de64e61691a6050ef2c764a51b7f4e96d18c3fa8da634b,2024-11-15T13:58:08.913000 CVE-2021-37400,0,0,b0d27ef29eb9b33b48de9bc66b3e1c03ad9217ada68e0e9fad53740c5cf9e509,2022-01-07T20:40:19.347000 CVE-2021-37401,0,0,59627adb2bdfa439df8627bb1689eacf7a0bb3291449d63f2dceab9e283ff994,2022-01-07T20:29:50.673000 CVE-2021-37402,0,0,cf2062259da087492fc8edbe731f8aff92da042f2b45087a0d323466afa22b5a,2022-02-10T17:57:02.027000 @@ -179875,7 +179875,7 @@ CVE-2021-37403,0,0,82552ed0c573f39bdd26ed69942611c847d9a9b43f6257e0cb1eb6c1b0bd8 CVE-2021-37404,0,0,5a0e9f6dc54189d8c836c0ab9c368f4d87fc3dcd07409437f67bddfe1436495c,2023-06-27T15:15:09.823000 CVE-2021-37405,0,0,99b66947fe60bfe7691d9d16217aae051bd21ca1d36b5350aafb451f141845f0,2024-05-17T01:59:13.510000 CVE-2021-37409,0,0,68d64f3f262bc3fe4112cc846cd3785f4b7627dd3a214f6863ba2f7b1e1497c6,2023-04-01T22:15:09.710000 -CVE-2021-3741,0,1,f28dfd128f4e9a11f9df52a41ace85bc1c50d6f5c0ea1d30c18e00fc65520623,2024-11-15T13:58:08.913000 +CVE-2021-3741,0,0,f28dfd128f4e9a11f9df52a41ace85bc1c50d6f5c0ea1d30c18e00fc65520623,2024-11-15T13:58:08.913000 CVE-2021-37412,0,0,c4ae4ff35985b522589284c8cdff1e75d55dc933d0298323169869b52cad8ce3,2023-01-24T15:40:30.060000 CVE-2021-37413,0,0,4cc7cba0bca0572fafb12dd6e2f19b3e6c044ad90d1c0308f827136dd04ea713,2022-06-01T19:36:47.227000 CVE-2021-37414,0,0,e94477ddecab7d5bc2d7e77a4e197ecb02bc86dc29db03c682fc50a0f087770e,2021-12-20T22:30:30.567000 @@ -179884,7 +179884,7 @@ CVE-2021-37416,0,0,2e6268d3c4aec7d053473a27b3499f3c904bb8afa46207b20648c1d9d3251 CVE-2021-37417,0,0,0af7afec4419ac71323dbe19fcafecf8b5620734ea16d7bba48e8df850d31058,2022-07-12T17:42:04.277000 CVE-2021-37418,0,0,146b4ef0e7964748fbc25b1e94686917c4647a3307c5708e67798876e0feddf4,2023-11-07T03:36:57.323000 CVE-2021-37419,0,0,9464053d73f212e534a6909af63b44d1c351a4729e973af190457c0a1d02f2c9,2022-03-18T20:43:55.713000 -CVE-2021-3742,0,1,e6beb8378dac536963062c75373aaaf7538dd7cb6ac45905aa8bf7a058793cb6,2024-11-15T13:58:08.913000 +CVE-2021-3742,0,0,e6beb8378dac536963062c75373aaaf7538dd7cb6ac45905aa8bf7a058793cb6,2024-11-15T13:58:08.913000 CVE-2021-37420,0,0,b52aa49c12ed23f5fc454663899c9e989f90752f3b6225dd6ef1f0904854480f,2022-07-12T17:42:04.277000 CVE-2021-37421,0,0,72a802fc9066861ac62eb2ef177ad824c7c5b2ea14bb5783b3fe6f6887532709,2022-07-12T17:42:04.277000 CVE-2021-37422,0,0,04c08c63b243212678162abf332587426643acf6f890ec905ee35d9fbe2fb7d5,2021-09-17T18:11:03.127000 @@ -180604,7 +180604,7 @@ CVE-2021-38376,0,0,d4485ca92681558168e0fd9a80da3a4ca7d974684f50f50f1dbd03a5e1f21 CVE-2021-38377,0,0,48443da60f90ac4652bc515c5c3f88029b2bd62277bc482a3739e4f453b49065,2022-07-12T17:42:04.277000 CVE-2021-38378,0,0,432e746fcb98480b06b83fac0fe9649e434fa56a8d7663d16931ad26e7f975bd,2022-07-12T17:42:04.277000 CVE-2021-38379,0,0,b8dbd9bba6856ef42bc651ecfafd71af15e01cfb8b87f0442cabe4efd9091d1e,2021-11-04T13:37:43.773000 -CVE-2021-3838,0,1,73ee934f950bc7bf45ef2754d13869d83992608338f01cd6970c5f24e125feeb,2024-11-15T13:58:08.913000 +CVE-2021-3838,0,0,73ee934f950bc7bf45ef2754d13869d83992608338f01cd6970c5f24e125feeb,2024-11-15T13:58:08.913000 CVE-2021-38380,0,0,966a303a4461fc8fabdefd21a52860a9a0545818ea34433392a6e6db9ea93c3d,2023-11-07T03:37:24.547000 CVE-2021-38381,0,0,f90987e628b6ca7ec620183d6ef4cd28fb101753b7f8f85a6534a6827c2cc9bb,2023-11-07T03:37:24.610000 CVE-2021-38382,0,0,56aeb4bbf5aec265fc686978fb16984a29124462e10ec9d950e4eb086e18c989,2023-11-07T03:37:24.670000 @@ -180637,7 +180637,7 @@ CVE-2021-38406,0,0,1a412ed4845c3e7db5ba8209c3a4d108b981fb433611867e224ac85224be4 CVE-2021-38407,0,0,890c190c0283a8e0a8f342b5c890f629a334ad53f0da1aaff56114e2a83bc435,2021-11-05T13:43:35.517000 CVE-2021-38408,0,0,cefdd68e1c399b8924048ad1c5dce3eac2e9d956e5a6317469b54e6ccef2b652,2021-09-20T12:44:57.193000 CVE-2021-38409,0,0,ac5681ac9ecb25d83290b8fe770f1a64c20ce909cd6e46bc422ea778311ca22f,2021-12-27T20:18:03 -CVE-2021-3841,0,1,b1497b55607cb4e55996bd0467d8f1b896a75235583200c77a00036aebccb2fc,2024-11-15T13:58:08.913000 +CVE-2021-3841,0,0,b1497b55607cb4e55996bd0467d8f1b896a75235583200c77a00036aebccb2fc,2024-11-15T13:58:08.913000 CVE-2021-38410,0,0,052e53829d51f2a2454940a2e213a88f9fe5d97f4595c4c33710b5a6c717b5b6,2022-08-04T02:48:06.450000 CVE-2021-38411,0,0,3f3ee8a81c8a60a013d7fdb503ae6a6cd21c95c21682c5d270adc23f92af62c0,2021-11-05T13:40:54.753000 CVE-2021-38412,0,0,cf3e8d210ed955e3f0b30bca33000f0de0090c42ecba6e720388ddafdb5fa783,2022-10-27T12:59:17.667000 @@ -181125,7 +181125,7 @@ CVE-2021-39016,0,0,88d7422235623a2db52d08ccbb930b8332e62a309f55b1a0bb58ad6b4c307 CVE-2021-39017,0,0,43da2de1e5021798d5e2da169cbabdb2f1ea3bc804f6e06fdd5bba1a80d8bbae,2023-08-08T14:22:24.967000 CVE-2021-39018,0,0,ccad4b84b3066dd393e4dd8123dc7a6269ea1c28676cd9811de926207c38696c,2022-07-18T19:27:57.433000 CVE-2021-39019,0,0,469fabcf38af6844701fed49a6e80d48722d455ad28af8536243f61e3be90191,2022-07-18T19:18:23.533000 -CVE-2021-3902,0,1,0fc4ab0f3340e7aff4180ba39bd3b7680dbefdc5ebb9f68ca355d98694913531,2024-11-15T13:58:08.913000 +CVE-2021-3902,0,0,0fc4ab0f3340e7aff4180ba39bd3b7680dbefdc5ebb9f68ca355d98694913531,2024-11-15T13:58:08.913000 CVE-2021-39020,0,0,f8a046ed21eb98ee1f2ce9e6feab22d062faea367e7e86b10085c29b6de05cd6,2022-05-13T17:16:25.233000 CVE-2021-39021,0,0,c20de8bb5efb66e3ec217f01f9525cf7c58f1792615ff1990e77c2bd1881bc03,2022-03-24T16:02:52.140000 CVE-2021-39022,0,0,12f9551c868b6c453d5c84008020f3db65f37eb2f4891591958baa35af27c010,2022-03-22T13:43:39.510000 @@ -181849,7 +181849,7 @@ CVE-2021-39856,0,0,b28d7eb0b7a5d39eaf23ac52dc09cb278f0e7689028bf36ed2fc3971582d7 CVE-2021-39857,0,0,1edb1b1ccf62746fa0da62a0bb737fb805f4b33f81197adfd22bca19c0f7d2f1,2023-11-07T03:37:48.580000 CVE-2021-39858,0,0,b28c2928ea13457807429906858d94adce9264a45ed2cc6a4355db39a8af6d60,2023-11-07T03:37:48.843000 CVE-2021-39859,0,0,983d64eb6a749b9e785340e4b1f0236aaa9d4cbffc4158e9a122ebb19e5056ae,2023-09-12T14:38:54.530000 -CVE-2021-3986,0,1,cf8e85b7286f11f0bd9460ffa61e4e7e95740e9fdf9d0296bcd970c9149f95c2,2024-11-15T13:58:08.913000 +CVE-2021-3986,0,0,cf8e85b7286f11f0bd9460ffa61e4e7e95740e9fdf9d0296bcd970c9149f95c2,2024-11-15T13:58:08.913000 CVE-2021-39860,0,0,ae8998c31697bbdcf345e9d4ddfa2fed95711346b038579c6fe27d9a56e021bb,2022-02-05T02:17:52.057000 CVE-2021-39861,0,0,66551e624494d96e7c3d65854c95f53647ef34c93a78c99750c131046b1aace0,2022-02-05T02:17:54.577000 CVE-2021-39862,0,0,bf04081e341e83b6669a4fabac8cd0b2d30699c53f96872ce03a60d22ca567b3,2023-11-07T03:37:49.170000 @@ -181860,7 +181860,7 @@ CVE-2021-39866,0,0,6fabb561196e392a171b14d09332d010f59de8a7ed9880963cc586df8f988 CVE-2021-39867,0,0,cf1dad99c282faabc5cb3cf833ed6f5b91097d777779477ac24fd680f378127d,2021-10-12T19:08:05.167000 CVE-2021-39868,0,0,01bf76261c9d86e2825302310d8b1d110b2d4f6a0f91c6aea468c32be845a7f5,2021-10-12T19:47:47.650000 CVE-2021-39869,0,0,50c4bfd31656adba59cb9dc37b7b350e99a58491e593864693fd3f1525a21185,2022-06-28T14:11:45.273000 -CVE-2021-3987,0,1,b86edabc1c017e3020e93667bce01ab165f5d6b33d801bad1de70274874323b7,2024-11-15T13:58:08.913000 +CVE-2021-3987,0,0,b86edabc1c017e3020e93667bce01ab165f5d6b33d801bad1de70274874323b7,2024-11-15T13:58:08.913000 CVE-2021-39870,0,0,f4d27e6e382702365ecb6b123ea92ce819b6bff3f3b19cf8c54ff152bc410640,2021-10-09T03:31:41.567000 CVE-2021-39871,0,0,9da9bbcde2429b6f2a3b8c36de5587428d893fba2ba1c35d4bc22836c49d3722,2021-10-12T19:52:42.127000 CVE-2021-39872,0,0,389f57b77d45e9d1425003b8b643833784e02c6171170491cb4db28b7e8fd74c,2021-10-12T18:24:40.737000 @@ -181871,7 +181871,7 @@ CVE-2021-39876,0,0,163386dcc440f8e6b66258fe9f8087aeebbd81b74bcfe526af8eddfb343a7 CVE-2021-39877,0,0,f9748be5890f45dbfe5a909268c2e810aed0fd7cef3df47f2f844678254c3d6c,2021-10-12T15:55:42.793000 CVE-2021-39878,0,0,9d9437315fc043e2589cca1b010554d7ecb9e451d3d2157288a1e88191aca38b,2021-10-12T17:15:02.807000 CVE-2021-39879,0,0,429da5caba14265b91489ac72fa37fdea760044ee3fb62e1cd11f34e878ac20f,2021-10-12T15:57:48.810000 -CVE-2021-3988,0,1,1a2b960d07e4dca041731b2dad7e71998a6580fdea304f38e856d3a0e8567280,2024-11-15T13:58:08.913000 +CVE-2021-3988,0,0,1a2b960d07e4dca041731b2dad7e71998a6580fdea304f38e856d3a0e8567280,2024-11-15T13:58:08.913000 CVE-2021-39880,0,0,f43fbf46512fe0da98b08e588e5c97c52ff7199b5c05f615aa05257e460043bf,2022-10-19T18:25:02.617000 CVE-2021-39881,0,0,5445efe9c4c4cf5d576eca639b40a53c718d8c7b4fa50521ccc2d6c6aff6a28d,2021-10-09T03:31:08.827000 CVE-2021-39882,0,0,989fca2f5d44fb7d0c221b794ff55417ebd0a1be5be524bdad69ce4323e8c8b4,2021-10-12T18:39:13.573000 @@ -181904,7 +181904,7 @@ CVE-2021-39906,0,0,e04ad55a1100d2964d2fe24a0d9044d99aa4ff75b0959894c4e77599d608f CVE-2021-39907,0,0,fb47addbd6bbabad003567f698b756cafc4248e663cf3186ea0c076027d378af,2021-11-08T18:11:09.323000 CVE-2021-39908,0,0,f72dfff8f0de9ab8ced78ab85d925d77e9a0ab0762baa52bbd5bcb5844b20d7a,2022-09-30T12:58:54.010000 CVE-2021-39909,0,0,0eb46c843aee997f319542a3de59e07a425b198542987db6d18b92f2cd302bc6,2022-10-06T19:55:19.013000 -CVE-2021-3991,0,1,e59ae99f86d2beefd3dc071c27b04367e5a4a69327aff26d3e7be5bbf9f0d029,2024-11-15T13:58:08.913000 +CVE-2021-3991,0,0,e59ae99f86d2beefd3dc071c27b04367e5a4a69327aff26d3e7be5bbf9f0d029,2024-11-15T13:58:08.913000 CVE-2021-39910,0,0,282b0ca251be46e18bfa01121795127e6cadb5a2fbd4e673f7596e1fdc2179ea,2022-07-12T17:42:04.277000 CVE-2021-39911,0,0,b91f499ed64b9404e4620abe987fe34a286f26afde4bd21996a2f7b358c0c585,2022-10-06T20:14:22.410000 CVE-2021-39912,0,0,6b1571a12bafe3ca8eacf93314ab0c9c2bfaa878e8fb257fb7f993e04329f737,2021-11-08T18:38:05.060000 @@ -188713,7 +188713,7 @@ CVE-2022-1222,0,0,b3920337094656db702d78f1c526ab2ae12658b8e98c28c5c4ab7be3ad3344 CVE-2022-1223,0,0,637b2827dcaf7417e78dbd542a64935d1a8b67bacce03b5481a1f13bfe63287f,2023-08-02T09:15:12.567000 CVE-2022-1224,0,0,1f7e411e11108d7458b51eab22eb66a24149a5879c00141ef2f28fe0fafb05dc,2022-04-11T16:42:06.027000 CVE-2022-1225,0,0,5748f4f5345a9f6c3175311aa2738ab2bf9651a24ed3aa3e4677372333de4ca4,2022-04-11T16:44:30.957000 -CVE-2022-1226,0,1,5c9b08edd13206e693ccfda5956fd5745a205b23ba4b6a18454f74ca614034b3,2024-11-15T13:58:08.913000 +CVE-2022-1226,0,0,5c9b08edd13206e693ccfda5956fd5745a205b23ba4b6a18454f74ca614034b3,2024-11-15T13:58:08.913000 CVE-2022-1227,0,0,83b90259bbaaaa877c52c1a6a345ecac76277c5a49b8d7b2e55d5609ee2638a9,2024-06-28T16:15:03.017000 CVE-2022-1228,0,0,7d23d45a83435d1e3bd4ca47a231881fd502cebe5b74cef074758e121829a08b,2022-05-03T17:07:53.397000 CVE-2022-1229,0,0,224e2e97e97497a42291fdfe93e44428659fa5e137ea549dec7de44ffe085b98,2023-04-04T16:24:30.943000 @@ -189351,7 +189351,7 @@ CVE-2022-1876,0,0,983e56cac9f7021f952f9f938d45e035dc9acbf02c1272a86efe4cc4b468e0 CVE-2022-1881,0,0,7439c809094624c8b5fdbf022a11f3d774e6fefc61f4a028f8263bd6fe529332,2022-07-27T18:21:16.887000 CVE-2022-1882,0,0,3baaf779da64335ffad3abdda3c3850b06114d069bb0bf1a437e02c2ffe782b9,2023-11-07T03:42:15.460000 CVE-2022-1883,0,0,10b029e5ce85ce2290987adcb3c5745aea973d33d0d3803bfa3a6beb774a6afd,2022-06-03T14:05:34.297000 -CVE-2022-1884,0,1,e7fa10953a0a16e523463c4de82cd2670c0254a7ce2d1852a8ba795b94bb1c34,2024-11-15T13:58:08.913000 +CVE-2022-1884,0,0,e7fa10953a0a16e523463c4de82cd2670c0254a7ce2d1852a8ba795b94bb1c34,2024-11-15T13:58:08.913000 CVE-2022-1885,0,0,990571f5f58372d06c86739f0d8507a9bf4c77382683b628e53a4fb6b11f2c45,2022-07-06T18:07:38.497000 CVE-2022-1886,0,0,7934fa97f2a8af4a046d7bb9f14babcddc4a4e2348bcdab16ebde94dde55d5a5,2023-11-07T03:42:15.700000 CVE-2022-1887,0,0,c9859a4b8fe51696b2ace2c5b6406cbbf00272360b5c9ea988467e7b99e94416,2022-12-24T04:23:54.613000 @@ -190125,11 +190125,14 @@ CVE-2022-20622,0,0,21f8864443a2ef64c107280614b898e9b5d4c9e8c77661acad69cff2f1a46 CVE-2022-20623,0,0,7c797f2b6141740b167d12f60757b1cdad545053d3150326da5778540cb57a02,2023-11-07T03:42:28.110000 CVE-2022-20624,0,0,3c70791dc122586abc481fbd7bb7216723c3e6d202f07e63cbb1e6162b35f5fa,2023-11-07T03:42:28.307000 CVE-2022-20625,0,0,b2289228f7d56d599a0cac3cd2984eb7943c96e01df0e18df0052f01f8d4a9e0,2023-11-07T03:42:28.523000 +CVE-2022-20626,1,1,71d7034560b3981ea3bd3ba6ca05c8a821b253c0fd58e019fbe642ed9e598ccb,2024-11-15T16:15:19.287000 CVE-2022-20627,0,0,61e6aaadc7256ae597e1358157a3f8a7ca5c65ceb03de865f99c00b8cc067e76,2023-11-07T03:42:28.730000 CVE-2022-20628,0,0,2d913383575108b406c6fd7f6d7b27f7042313f3ec94ec4b865b29c23ff51516,2023-11-07T03:42:28.940000 CVE-2022-20629,0,0,349b8459f865e323293bf05068ff9de40ca8c8ffdf8aa26427123369090292d1,2023-11-07T03:42:29.150000 CVE-2022-2063,0,0,d062d780a00017fb43c5ea9093ff0ade157df72419b34c1782bda4532983613e,2022-06-22T15:15:56.310000 CVE-2022-20630,0,0,13b8dfdcba520d48f3edc38534d08ff817268f168eafce0c2fa806a535bf598b,2023-11-07T03:42:29.340000 +CVE-2022-20631,1,1,e7f1fe229b50433969790eff74efa4aae4b10defefdad753b836d39da4042706,2024-11-15T16:15:19.527000 +CVE-2022-20634,1,1,48c40b6618c9373d684cf71f1c386b2094b7fd260584dffa83cb52e6f13c9c85,2024-11-15T16:15:19.747000 CVE-2022-20635,0,0,312537bfc7fadc3f4a5ae453076f673da67ee7fd6d6c549bd850db6bbd3634f5,2023-11-07T03:42:29.527000 CVE-2022-20636,0,0,cb1e137161d1f8bb5eb5658fe185dcf66aa86cbb228fbedff5a38969384418c1,2023-11-07T03:42:29.713000 CVE-2022-20637,0,0,6c706a8e39f723ce20951f46cff7c8db43813cd9854833ae35aa389e314d6648,2023-11-07T03:42:29.910000 @@ -190144,16 +190147,24 @@ CVE-2022-20644,0,0,0b78bd45d6c626c7de60e88864441db476f08a5174dd41f6637b7edccc7f2 CVE-2022-20645,0,0,160c71f81c35d36d8616f55bb4461f93f9d6e0502c187926122b382be552fc94,2023-11-07T03:42:31.427000 CVE-2022-20646,0,0,ef0f3bd90058a0fbc8ce4e9e70856731466565eb44005ab60f710d7413f85873,2023-11-07T03:42:31.623000 CVE-2022-20647,0,0,d692c23c3d73e41484cc8829c6fef8bb7f01eaadabaa22a077af57a682a118b8,2023-11-07T03:42:31.810000 +CVE-2022-20648,1,1,562f23b1937d127df3ea41a2276f5e7197ae5ed5a0fa8cb86fcea1b92269b63d,2024-11-15T16:15:19.983000 +CVE-2022-20649,1,1,8155ccf997bad476539f5908278a9fb6af22a844515ebeff02b78573f25b19cc,2024-11-15T16:15:20.247000 CVE-2022-2065,0,0,571960ee80a382ed580e7d50315d006024f880324c003ffed0bd463503bb2a8a,2022-06-22T16:20:27.387000 CVE-2022-20650,0,0,390d5d5a31497df0829ae3a8fc18eb7f62e12fd0be6f7fb4d5181ea2eae9bff8,2023-11-07T03:42:31.993000 CVE-2022-20651,0,0,d94f842526344890878ca96e31695d88f10dc06979f9c817f5f2aba7d6da3f9d,2023-11-07T03:42:32.200000 +CVE-2022-20652,1,1,f09523846e227026ee68c0eb35b1818ad786a9eddbdedfddee4965b8ae83736d,2024-11-15T16:15:20.520000 CVE-2022-20653,0,0,970fcc0d6442596100c16b68df05f9dad01eb21b28dfd29c61acafe7da6b8ed4,2023-11-07T03:42:32.423000 +CVE-2022-20654,1,1,6d5ad5888c06146b87ff8b655e3550807cdbee3f61d9fe4b625555b16f4a4d67,2024-11-15T16:15:20.767000 +CVE-2022-20655,1,1,8f64410d345cab96b82fbe57818b3d1e3d9a6ea1a40fe710503a24b34cd3534c,2024-11-15T16:15:20.987000 +CVE-2022-20656,1,1,94d0d175330b07bdd1dd64cfefab5a80bd81f2f0a1fbb504960830adc92aaeeb,2024-11-15T16:15:21.237000 +CVE-2022-20657,1,1,7baaace96e123a6345b4bb4abaa834dde9cfba9ca99b0ed993ff6964c5a74a33,2024-11-15T16:15:21.473000 CVE-2022-20658,0,0,774a5dde9c2ecf972fc765622b6d0329acd4851f27b3d1ab2d6b2cbfc1ac03cd,2023-11-07T03:42:32.603000 CVE-2022-20659,0,0,3fd61ea02c1112c94dc17c417ca780e8ee231b8cf54650606f53f7fde39a0294,2023-11-07T03:42:32.800000 CVE-2022-2066,0,0,568eafb08191ec2a4e1a7f2d0ecaf78921ed93b231ddacd6663ad37debc4f4d6,2022-06-22T16:21:24.417000 CVE-2022-20660,0,0,25e35575d22740895f29ecfa5b6f10e97e537332cd507b8a5a02cfdb0a151c82,2023-11-07T03:42:33 CVE-2022-20661,0,0,ebbc5bdda270769928f447c068a18170348fd8ac2a4054e266807c3234e50017,2023-11-07T03:42:33.230000 CVE-2022-20662,0,0,fb11ce878bd9e5767617bbb14056b29a23c7fb6e26be8d2cdbb2091ddaa1a1bf,2023-11-07T03:42:33.423000 +CVE-2022-20663,1,1,36394921b0dcdb60ecef258e3301f4f1586711911ece1d2d90660247854d0552,2024-11-15T16:15:21.693000 CVE-2022-20664,0,0,be14e0a88f9bd5873e4e7d83da3f9a1ae1ddad4b757d0073bdb5b8e0e8b0b849,2023-11-07T03:42:33.617000 CVE-2022-20665,0,0,65ea883e8571a97a65aa5035f73402c0028f57d383f6bc792038f719cc5b4623,2023-11-07T03:42:33.803000 CVE-2022-20666,0,0,554438e89eef0f5407fb469b9bc4b48cb7fd326de5225a6475b70540a51c7fc5,2023-11-07T03:42:33.990000 @@ -190177,6 +190188,7 @@ CVE-2022-20681,0,0,8ce88ca30f33ba86a2d4adc3dd9bbad9d36c51fccd8d2b3acc49b78d941ac CVE-2022-20682,0,0,25a7eb9330f70ef9976d6c55d4569af37b05abd1af56d00ee24736136c649e0c,2023-11-07T03:42:37.030000 CVE-2022-20683,0,0,a354d3c0e5b0f24befc71439adf6bbcbde0e7e37e1c93f2b570b32d1492672af,2023-11-07T03:42:37.410000 CVE-2022-20684,0,0,ace0be60e7c6730ba3570013e8fe871c4b55baaaeff74811edd07de64469e799,2023-11-07T03:42:37.597000 +CVE-2022-20685,1,1,bd96f0d54eae7ff5d0ea140707a16b5191f28fb92f723d510b739e1db809af63,2024-11-15T16:15:21.910000 CVE-2022-20686,0,0,63471bf91a63f74f5bc4dc22960373a5446fe8fcf9d0734fbd1b5b92fd83f77b,2024-01-25T17:15:14.263000 CVE-2022-20687,0,0,c86852782558780f02ecbadae1910d7d3d8aa5808e760b8d6bee105b7473f89d,2024-01-25T17:15:14.410000 CVE-2022-20688,0,0,349b788ecdc733c67c5b8c538600b2022545072f056bfdf0f4685151c41347d6,2024-01-25T17:15:14.540000 @@ -190265,6 +190277,7 @@ CVE-2022-20762,0,0,288f61e6fd65ba791a1a7db2c5f51d79a13328f1955ce01c53ef82ffdb7b8 CVE-2022-20763,0,0,e6700aed27706764408fa6238a5bbf832a8e2d16b381788d9bafcb2d443e7342,2023-11-07T03:42:52.870000 CVE-2022-20764,0,0,9d232eabbd0c2be2319c5539459914b198378ecb409a966ef5a73adbeb491896,2023-11-07T03:42:53.053000 CVE-2022-20765,0,0,61b2c3dbcaea45db7f3243431662ba7c2881cbdb7a5d7d6956de355f8ab882d9,2023-11-07T03:42:53.240000 +CVE-2022-20766,1,1,11eade385af401c66fba3bea146972bc7aaa61ec2923546c24dc6a13d120ab95,2024-11-15T16:15:22.133000 CVE-2022-20767,0,0,bf3e408f2ddb577255f2a65ca0d92afecbfac86b6c268999a1d91a15bb935a65,2023-11-07T03:42:53.413000 CVE-2022-20768,0,0,b31df78e6f7a1690a0e6dc9026760925463d8c56c3c89a6df70005c95c07a8b4,2023-11-07T03:42:53.597000 CVE-2022-20769,0,0,9b39cf5519304df5f8eb08403777d95fd8d0b56cec10c7963730515e4701a15c,2023-11-07T03:42:53.770000 @@ -190294,6 +190307,7 @@ CVE-2022-2079,0,0,960f06c13a414a3705d83f5387631ce2fc7a4df365ebb43e16e4f2c0a1119b CVE-2022-20790,0,0,8dfe9c0790bcdd9e5d24c882a8764e4f3efe0ffb7dfafa8ed6588c86d8874174,2023-11-07T03:42:57.763000 CVE-2022-20791,0,0,0a0d06758ea5b6a8a0bfa7e93734af692de69e6ae62272ab0563b7dca0259a54,2023-11-07T03:42:57.940000 CVE-2022-20792,0,0,9d31518fb1ecca5bf2eef7cab0f72d7aed9df73b04ddb2aa2f1a47344b6e4d20,2023-10-01T11:15:10.490000 +CVE-2022-20793,1,1,d42474ba7afc1fa88b1811e630c9cc232b04180956634328a3450ec92af25992,2024-11-15T16:15:22.370000 CVE-2022-20794,0,0,db18b8afc597f4f3ca2303342cd61b95263cdf62a8397bee6efeefd72db9573f,2023-11-07T03:42:58.150000 CVE-2022-20795,0,0,401cda8a7f1773e7dc44867691432480a43fc9bb2bb011a5642d8e138d4bbbef,2023-11-07T03:42:58.327000 CVE-2022-20796,0,0,d10c97adcc8041fe2197f037ec61ff1033fc25e78b803756d801f9e39c0f073a,2023-11-07T03:42:58.520000 @@ -190316,6 +190330,7 @@ CVE-2022-20810,0,0,d465eef9b8b49f6cfb2d6bafb33fa2e371f9e6acad1c0018859266ef98cb7 CVE-2022-20811,0,0,894662974debbe90d9048d04c2e89055d5abb1a4cf1c1d40eeea299833ae5fe9,2023-11-07T03:43:01.097000 CVE-2022-20812,0,0,ab77d59c65b8c3b8fa22769a2502e274cfb97592b7f62e8f7e615979b1069764,2023-11-07T03:43:01.317000 CVE-2022-20813,0,0,41ff039ab407da2aee799c0e1f824d1a5aed4332ff899eff1c4f22e18add2aca,2023-11-07T03:43:01.517000 +CVE-2022-20814,1,1,2a51a8ad0b3a6aea61694eae4c68a3c856708276243d42739a7f8962ab6a8c3c,2024-11-15T16:15:22.670000 CVE-2022-20815,0,0,3b286a33cd412277cd07ecc33c3a88fe24589d1bb8e68df238991b9f13826a97,2023-11-07T03:43:01.693000 CVE-2022-20816,0,0,f11ccbdc893ee80f99212c658d510a9d68a3c1dc64cf17744fc0ba52a820c978,2023-11-07T03:43:01.880000 CVE-2022-20817,0,0,d44f2aa7ff7acf966547c59d8fb64b08a5a1dc81ddb4d70dbf3284d5da7cd837,2023-11-07T03:43:02.067000 @@ -190348,12 +190363,16 @@ CVE-2022-20841,0,0,e14c27fc3061f8b1830c57f8e521b083f3ab7f22e5a692520de69b6b21ca5 CVE-2022-20842,0,0,1d7d4435c2ef9a46ba9809bda8eab515ed9c7fc8e795761c86bc8df5d0a73cb5,2023-11-07T03:43:06.253000 CVE-2022-20843,0,0,6316d53e796b332df867738f37e3f529db0c0e2177960556c25cdb7820dae231,2024-01-25T17:15:17.370000 CVE-2022-20844,0,0,b1a64b1a4c5d7dcc8860c07126d6ed58b168d65f2b142dae84529b201148addd,2023-11-07T03:43:06.533000 +CVE-2022-20845,1,1,31837f57a193b5de7f66c9b5307ced859f47e302726debf13e0c26ba2cb2ff84,2024-11-15T16:15:22.913000 +CVE-2022-20846,1,1,1b03b1c123c48d1a360c4a170ea42c62a7566a09fc99da03090658cf6b439522,2024-11-15T16:15:23.120000 CVE-2022-20847,0,0,d21ac3e78f416486eced7fa6cfc95babac837c7da6572789bb1ab30b56b84e30,2023-11-07T03:43:06.717000 CVE-2022-20848,0,0,6856ea2a34bbbf446a21aebecd96700714cd1b28252f9d8d45fbb3b93186ddbf,2023-11-07T03:43:06.903000 +CVE-2022-20849,1,1,d0b7b0f488f1e88d4c0d5b5c4f1d0d1788625fb8a626a15634326e38180e40c3,2024-11-15T16:15:23.327000 CVE-2022-2085,0,0,f4cc97e054d518a1b8e57be5dd18f72a26616e2d14ce992571496bd5c70179fd,2023-09-17T07:15:07.477000 CVE-2022-20850,0,0,24d532a63709c9c79d292d9ed54926b717811f58afab7f6b996c677a1adbd1d6,2023-11-07T03:43:07.130000 CVE-2022-20851,0,0,2e7bafafa01d45a84d4b2a8c580c4c75362d932b722c85590bceb09f3183033d,2023-11-07T03:43:07.323000 CVE-2022-20852,0,0,1bdd9d0b9d69398e7edb0f874a3fffa56b7b8b47091299d08b5674ce44cb70b3,2023-11-07T03:43:07.543000 +CVE-2022-20853,1,1,4e2aa3c2ab3b57418dc6f78d60a93e0308d1f0dd505f9ecdfa4e1881453e3373,2024-11-15T16:15:23.540000 CVE-2022-20854,0,0,1a05af98dc8d2ef15178eb96b0b76560c3e4cb96313975c5ea578841c47c60c1,2024-01-25T17:15:17.553000 CVE-2022-20855,0,0,9f6f93783492963335ac892a343dd4cdacef454e1b9b7dce8584d27bdc95e2a6,2023-11-07T03:43:07.853000 CVE-2022-20856,0,0,868e5ad39f52bfd78d3e7385f0e52869ec525ec684dde7ef1c1c7286d1dd3549,2023-11-07T03:43:08.077000 @@ -190373,6 +190392,7 @@ CVE-2022-20868,0,0,4640e0357abedaa6546d966462561149d797bdbab2bbadadef49344d3fd11 CVE-2022-20869,0,0,8887b091e307a2f88853ff131574b445d6e7f0597cb704fb6a7c61e6418f8a49,2023-11-07T03:43:10.317000 CVE-2022-2087,0,0,fda9e6cd2c392bb72803e7dbda3914e31ca3ca5df0dd6e23a58310711305f386,2022-06-23T20:18:52.003000 CVE-2022-20870,0,0,6f92229442f62bfb5da21fcb7695aab7bb0921406738dfb31ff76b5d6bb0dcdd,2023-11-07T03:43:10.497000 +CVE-2022-20871,1,1,c0532d5e751d14eba9b12dbc2b35817cb13c35611c95884f40f9e516900fb05e,2024-11-15T16:15:23.757000 CVE-2022-20872,0,0,1945a4dcb7945d859a19d40da445928f2094af2529e1e70a83a3bd202f8c41ee,2024-01-25T17:15:18.350000 CVE-2022-20873,0,0,d8bf430445adaf3263b8acd5192c1bd1d0db328031972aa64cfb0f60a4b16104,2023-11-07T03:43:10.800000 CVE-2022-20874,0,0,0e01d51ac565010ffd696d15a51e5ae7cc5c44445885b94d7f0d2d506e5aa9d1,2023-11-07T03:43:10.993000 @@ -190438,6 +190458,7 @@ CVE-2022-20928,0,0,b4bd8b7eb9845a5dea83e785fb8c3899d259ad181c9b176e8422c105f318b CVE-2022-20929,0,0,9f8c5dc9e36cc6b7f4e13cb5e0133b8ef9c8d1c97757a2f523c4c08c6c4607c4,2024-01-25T17:15:19.680000 CVE-2022-2093,0,0,f9b6c46d92ed3a273479f0aac6b074690a25c899c0a81056db6bb170ebe3407a,2022-07-15T21:04:01.350000 CVE-2022-20930,0,0,b8872f19944e1a2247dfb95b6faf0c0e7eaa3d2f18cea7fdfefae7f7900b33c7,2023-11-07T03:43:20.913000 +CVE-2022-20931,1,1,e5fb10462a81b13c06dd06c488845db7d743f391aacd2eb72f311a695bbf6842,2024-11-15T16:15:23.967000 CVE-2022-20932,0,0,7c4fcd146ede3d6f7ba677a46479a351e54f0aa5e1d73606f8df1118caa068ff,2024-01-25T17:15:19.803000 CVE-2022-20933,0,0,1e3f8165b47aa08c2f85f22683a82391e523ba4b3d0e0e05c77690809d7d71d4,2023-11-07T03:43:21.230000 CVE-2022-20934,0,0,3eca5a2d3b359874a263a3a14b4a938cd00d4932f8daa7be0579a8c705e9bdc8,2024-01-25T17:15:19.910000 @@ -190445,6 +190466,7 @@ CVE-2022-20935,0,0,c6cd0d5563c829bcad9fdec873f413150075b70909f2cdd7967e28a06c665 CVE-2022-20936,0,0,79a4d834423e5e48bbc06de76ac7d3473907bd3fa94c8bdf1610226472c24195,2024-01-25T17:15:20.170000 CVE-2022-20937,0,0,8e5b375c4457ca31958f4afc7ba467afb9b666e17cd09da694c6761da19c3374,2024-01-25T17:15:20.310000 CVE-2022-20938,0,0,0716f27fa0cadcc725b3df26d6c7e6466d6941bf89479f43ef098c881ea48696,2024-01-25T17:15:20.443000 +CVE-2022-20939,1,1,e07cbe365a6e87f2c336d694baaf775b629f4d76606c9e96fda3e9aa795547b0,2024-11-15T16:15:24.200000 CVE-2022-2094,0,0,aa8e90b78fb16ce790f2711a054b3e1e1aff3fd1748a249ad1a0e41c3a136bb8,2023-11-07T03:46:12.680000 CVE-2022-20940,0,0,af53884143c8285046170dd4e82cf6cbdd440ae613a8d35ce9164ebe27f7d939,2024-01-25T17:15:20.583000 CVE-2022-20941,0,0,71446826ba7b5ebf325cbe0c4e0c055414ee6e18ba4a0637ac686f9ae7cb72c3,2024-01-25T17:15:20.713000 @@ -190454,6 +190476,7 @@ CVE-2022-20944,0,0,d58bd4035167d677f318709b4ebea617d8d18c861ba0013d9b503a3010875 CVE-2022-20945,0,0,9ac7c9cd20a7de1d05f991eb10d16d7f1862b368e5a43a2c5aa867e25e186258,2023-11-07T03:43:22.547000 CVE-2022-20946,0,0,b0ea2682a6374774770e0bcbde525c8be07755eccbfc5b7daca4813803d1ed24,2024-01-25T17:15:21.187000 CVE-2022-20947,0,0,bc3e0c6e94591d9afa8eb56626954db5e7a8bf9b8f24b857429895e836356bb1,2024-01-25T17:15:21.303000 +CVE-2022-20948,1,1,228c80ec66473cd1e93ed08690f05a2f53bf644debb790097de9e597079ad5a2,2024-11-15T16:15:24.427000 CVE-2022-20949,0,0,0c27a247c22579ca4e19d2d036bd7af81f0fba76711a1a7a70435d0fa406e580,2024-01-25T17:15:21.460000 CVE-2022-2095,0,0,3c251989bea580be837ba52fc5502217dfec5c99671ae55c970e8f7da9e0ae82,2022-08-11T15:01:36.410000 CVE-2022-20950,0,0,a1584a6de4bec827872a5671921aa2b3aac3dc26894b0a2f83afd677eb9cc1d3,2024-01-25T17:15:21.597000 @@ -191283,7 +191306,7 @@ CVE-2022-21879,0,0,b80571e02e45b4c3bc6fa1ec4c41715878dbab32c3cc02c5d5aa57f8c121e CVE-2022-2188,0,0,55d3398b17c8580970a402b3138b19fbf105bc319e31fecf24a3789446c85770,2023-11-07T03:46:16.607000 CVE-2022-21880,0,0,291621ef85ecd1019b86f86cb4969733e4105e27c85639aaa97536fe96f54759,2024-11-14T21:15:13.267000 CVE-2022-21881,0,0,d77a4cb00d202cd2aaa4cccc2d7a26120d1f5e676e87acd6db156de620f89f4c,2024-11-14T21:15:13.413000 -CVE-2022-21882,0,1,ff742c209ea7c234b7a3d1e7b0f376edc041bc20a5fd65b7b15ab156dc4c95f9,2024-11-15T14:35:03.910000 +CVE-2022-21882,0,0,ff742c209ea7c234b7a3d1e7b0f376edc041bc20a5fd65b7b15ab156dc4c95f9,2024-11-15T14:35:03.910000 CVE-2022-21883,0,0,5026326689733caed3be4860695075313a3399d1989a0ca93427982eff2d0932,2024-11-14T21:15:13.757000 CVE-2022-21884,0,0,02410fb143314217c18457c2c0a8c4c1fd5aa4619687bf5c3a1db4c13912f90b,2024-11-14T21:15:13.913000 CVE-2022-21885,0,0,336986904607e485c8f0fab2e3f60eba916e67195be8494ceed55d04efc9dac6,2024-11-14T21:15:14.033000 @@ -191321,7 +191344,7 @@ CVE-2022-21915,0,0,412f473c876d5413c82bb33406d924797bf5f9904cce39a1af57a204d5346 CVE-2022-21916,0,0,9679c658551086dbc3cb9abe43d1f6925b622c73df732e23cf30fbb0ec907bca,2024-11-14T21:15:18.240000 CVE-2022-21917,0,0,8d972592ce7c74763004b2445e4570f851a5ddf3b05f3882b45aaa3f6f9247f8,2024-11-14T21:15:18.403000 CVE-2022-21918,0,0,253fe40c009402fe3b7cf678ddff57641f6a3bdb714317a50bbec45230f4c336,2024-11-14T21:15:18.533000 -CVE-2022-21919,0,1,7f0e7d87afa1bc20ea3b7a0b90364caefb39d7ea976ed787cfba00e9fa878dab,2024-11-15T14:35:32.303000 +CVE-2022-21919,0,0,7f0e7d87afa1bc20ea3b7a0b90364caefb39d7ea976ed787cfba00e9fa878dab,2024-11-15T14:35:32.303000 CVE-2022-2192,0,0,3d00254e7291c01d08e36868688becfdfa79dc421a888feb0112fc918c4c9771,2022-07-27T07:23:43.320000 CVE-2022-21920,0,0,fb6d2c0bb191175a3862953de48f2977bffc54b4daf5b0834f288d3f08dcb56e,2024-11-14T21:15:18.927000 CVE-2022-21921,0,0,38695df0b4898eb385b53bb50d763987b320ae69b4601f7d446a34b3acc5b0ef,2024-11-14T21:15:19.123000 @@ -191726,7 +191749,7 @@ CVE-2022-22316,0,0,68d428ce839b198d4fbca5fc56697c13b0333daf7d04f7ea4a4d7eedfef52 CVE-2022-22317,0,0,46e39f81c954851405d08a7503df6e1365bc23d5623a26f584840a5bb4df9249,2022-06-28T12:23:56.023000 CVE-2022-22318,0,0,8cf7c44a294363867fb36c46abe6bef4d5890a368969107e59ae542d7adc0d7b,2022-06-28T12:22:25.073000 CVE-2022-22319,0,0,73f199cb6097c35bccc1601c95a7d4fe0c341871a75277b1cee33346ff16ee7f,2023-08-08T14:22:24.967000 -CVE-2022-2232,0,1,bd846ee79e1a4385023ea33ce9bacefff742799a793117ff1a96b96e7db250d6,2024-11-15T13:58:08.913000 +CVE-2022-2232,0,0,bd846ee79e1a4385023ea33ce9bacefff742799a793117ff1a96b96e7db250d6,2024-11-15T13:58:08.913000 CVE-2022-22320,0,0,d92eba3df93dbb64fe03338baeafdb26b68d25c17a5ee76ae1b40c4769623318,2022-05-19T18:14:30.350000 CVE-2022-22321,0,0,df92e805cdeb1a2d3302178f9c053a0b9b5034408cbfd90722f5c7c323fd9212,2023-08-08T14:22:24.967000 CVE-2022-22322,0,0,2e071a7d1fc94ba4d6a9ab644c15e9e9b1c9bfae24980238701c7fc913dbb02e,2022-05-06T18:16:28.067000 @@ -199605,13 +199628,13 @@ CVE-2022-31662,0,0,4716baf2173369b6ff3e13b07755ad4e0e453df4c6dc19303fe237ad32cf3 CVE-2022-31663,0,0,c250a0e102f60432d255e827fdd6db289d62d1a4e1292229b591504e22573b3c,2022-08-11T16:13:03.250000 CVE-2022-31664,0,0,8ae94e3e4b372e5f45259d81541342947ae361ebba4e6da89206986ea919de52,2023-08-08T14:22:24.967000 CVE-2022-31665,0,0,7a06345a1942d5d52d9b06c0ee41416d4ed2364fdc0d69c8a0c3f480ee888cbb,2022-08-11T16:14:08.620000 -CVE-2022-31666,0,1,fddd08a0275cd2757989dfe397f2a0364bee8be87b326ee85f29b843beb3c153,2024-11-15T13:58:08.913000 -CVE-2022-31667,0,1,32cff782d282fbfcb6596afa91274b8004222cf2628408acd245bff40eebe8cb,2024-11-15T13:58:08.913000 -CVE-2022-31668,0,1,bb5f66840515f00c3c2895e8f894d8d6ed141195a34cd2692f11338811011922,2024-11-15T13:58:08.913000 -CVE-2022-31669,0,1,8740f25556ae5be0b93f4c4e5047b90d372f1ff4f6e72bf3309b6917097bae4e,2024-11-15T13:58:08.913000 +CVE-2022-31666,0,0,fddd08a0275cd2757989dfe397f2a0364bee8be87b326ee85f29b843beb3c153,2024-11-15T13:58:08.913000 +CVE-2022-31667,0,0,32cff782d282fbfcb6596afa91274b8004222cf2628408acd245bff40eebe8cb,2024-11-15T13:58:08.913000 +CVE-2022-31668,0,0,bb5f66840515f00c3c2895e8f894d8d6ed141195a34cd2692f11338811011922,2024-11-15T13:58:08.913000 +CVE-2022-31669,0,0,8740f25556ae5be0b93f4c4e5047b90d372f1ff4f6e72bf3309b6917097bae4e,2024-11-15T13:58:08.913000 CVE-2022-3167,0,0,47921e8a9cb97995d6f2ce8276ccf118a65fe4731d6ac6de65dd0ec114eec596,2022-09-14T15:32:08.950000 -CVE-2022-31670,0,1,052d448ecf5d0517ba034ef4c6d55be116c668318dde16e7f96c8c978ee85769,2024-11-15T13:58:08.913000 -CVE-2022-31671,0,1,ff77dcdc201b12eca3b816fe655bd9cbf93833faac10d6d2cec8c838b7944280,2024-11-15T13:58:08.913000 +CVE-2022-31670,0,0,052d448ecf5d0517ba034ef4c6d55be116c668318dde16e7f96c8c978ee85769,2024-11-15T13:58:08.913000 +CVE-2022-31671,0,0,ff77dcdc201b12eca3b816fe655bd9cbf93833faac10d6d2cec8c838b7944280,2024-11-15T13:58:08.913000 CVE-2022-31672,0,0,f935cb14a924ae93702f89793daf0806536a0ce42ff8289dde093642be80a068,2023-08-08T14:22:24.967000 CVE-2022-31673,0,0,da7dcaa4140053d84527543292fb585bb296fa966885cdf6f4d876302e1f87da,2023-08-08T14:21:49.707000 CVE-2022-31674,0,0,332df8a6563c46e3b27acddce953af7226cedea008975ba4b629bdb187c43e75,2022-08-15T18:56:24.003000 @@ -212898,7 +212921,7 @@ CVE-2023-0105,0,0,2b12a003cd73110318e79298dd730b028944de31b3b2fd49ae09c6e6c34faf CVE-2023-0106,0,0,05e0d567b91f98b80dba4d8ef37e3d6d93df29ade7db9eb7d74b845f158d4370,2023-01-12T15:04:29.543000 CVE-2023-0107,0,0,cd205e669e16f38bc95e2290070f356c4fee19f825da4c33fef61ad635b5f6dd,2023-01-12T15:04:41.817000 CVE-2023-0108,0,0,70c8cf4e996128d54da9f7301a41fc8c246a66fdfe898b159018bdcb506d722d,2023-01-12T15:05:03.130000 -CVE-2023-0109,0,1,e3a8476d90ed5e719f70b45a2f1d451ef9584771c810e3a89da7ee9b7b149d8c,2024-11-15T13:58:08.913000 +CVE-2023-0109,0,0,e3a8476d90ed5e719f70b45a2f1d451ef9584771c810e3a89da7ee9b7b149d8c,2024-11-15T13:58:08.913000 CVE-2023-0110,0,0,b9a61a54a079a5cddcae7f57892e97a4bbf51450edf598dd8a9a1b1c401ebd1f,2023-01-12T15:05:16.323000 CVE-2023-0111,0,0,f766f05747dd6dfbc35868e0369bbe0def763377d79a8a4ea4e4bea44d32809b,2023-01-12T15:05:27.080000 CVE-2023-0112,0,0,66c21565a3c1e4d16d1c053665b40b7925a9b3641bc7aeaa413fbdfe779c924d,2023-01-12T15:05:37.157000 @@ -213501,7 +213524,7 @@ CVE-2023-0733,0,0,e09491ec0935323a2fec770c3ecd0ead271e6d263c55ec182afeeb068268d5 CVE-2023-0734,0,0,8d2fcc12463e0b1abec4a2a51b7df5516739ca6f45b2b04f9bbd78cb0aff604f,2023-03-09T20:55:01.123000 CVE-2023-0735,0,0,9fdced2b47db01a6a01919f52b5ed809a8d21724989b5bfa7955c49171c3b6f7,2023-02-15T19:24:41.473000 CVE-2023-0736,0,0,b3396876d05ebd2f1f90f4354a1dda6ed12cd8c3d0ffb089c43fbadd8845f1a2,2023-02-15T19:25:29.570000 -CVE-2023-0737,0,1,5ae8030b4544ca482d8f862c7cdcd33aa561e809c4c313d3fcd74e92dbd682ac,2024-11-15T13:58:08.913000 +CVE-2023-0737,0,0,5ae8030b4544ca482d8f862c7cdcd33aa561e809c4c313d3fcd74e92dbd682ac,2024-11-15T13:58:08.913000 CVE-2023-0738,0,0,8b8dc61e92f27262b3aa279351d6ab8033f6bacb206b350b6e8e6ebc9af5389e,2023-04-17T16:57:07.133000 CVE-2023-0739,0,0,b1b26d0ce5c494e5d7ada0f8a588c86492d1c9f0144b5f459b8cc611b553c2cd,2023-03-02T02:15:41.857000 CVE-2023-0740,0,0,a07e1065e4de29dd41d3a7cadad7fafff7c778c739891464a73f725e2a440f3d,2023-02-15T20:20:37.850000 @@ -214703,6 +214726,7 @@ CVE-2023-1999,0,0,83389713b72fbb33f0448bb5b017209184e6ccef0d6519c942437609b0d8d1 CVE-2023-2000,0,0,8cd3accd68d360d71369e55670660f98528dc3de89fec28ade37ccac2b39579a,2023-05-09T16:31:00.540000 CVE-2023-20002,0,0,ff13495a0460fbbacc056e6923313814b51b36acd21f7c9330f556a50e5a03b3,2024-01-25T17:15:23.817000 CVE-2023-20003,0,0,8fe26b3bec3529a10e55876a22ec60b9ee58198c132d4ff5edf36301727ae87b,2023-11-07T04:05:41.743000 +CVE-2023-20004,1,1,b8b8bb895d1c0ffae6c7a94554cf6f58305da8062a3b0cc143d9c959768e78e9,2024-11-15T16:15:24.657000 CVE-2023-20005,0,0,e6f8b8b85fb6df871de6707dd09891ba34946e80382eb4a813f86c4405f5b2e8,2024-01-25T17:15:23.923000 CVE-2023-20006,0,0,622425150ebc1a2988c05bbaea651c7a6ed670ba7f0e101f079ee845f25f6c12,2024-01-25T17:15:24.040000 CVE-2023-20007,0,0,1e7c88b95bdcf2290facf5bbacd178b32fa5b1d81010bee0a06d65a221ba36af,2024-01-25T17:15:24.170000 @@ -214737,8 +214761,10 @@ CVE-2023-20032,0,0,0fee7d5743a2e252d59b0ededb2008bac10fa1267c3289a466f3942175317 CVE-2023-20033,0,0,bd6288e791dfb3c89867f4824e1ee919aae061f3e96f787678743266c88dcf23,2024-01-25T17:15:26.057000 CVE-2023-20034,0,0,afd24b3dbdd5e84fb716ee5384c251e519b4b7ebccb7a61a644c5b76dafe5b5b,2024-01-25T17:15:26.360000 CVE-2023-20035,0,0,bf990679f6d153aa28516a84b9951dc45b406e82f1842f688d0df62730227192,2023-11-07T04:05:49.507000 +CVE-2023-20036,1,1,916e6764f208248dc43a0b22f54d555c1ce314abeb0e390cc5c0ab5ae85d622e,2024-11-15T16:15:24.950000 CVE-2023-20037,0,0,c2914760d5e410f5261b59e565cefb8d4f1ad623014e2dd1e8cb5eb583c1e599,2024-01-25T17:15:26.570000 CVE-2023-20038,0,0,57f68a49cbd3aba16d00a0b70502d11657968cc0f76448d9c73d428db9623a97,2024-01-25T17:15:26.670000 +CVE-2023-20039,1,1,d65c08ea066f3359ebb27749600ec14b5f90b5612ef5e69d2cf14f12a603e408,2024-11-15T16:15:25.157000 CVE-2023-2004,0,0,43f7bc74ef9fcd317532bd3537b64c658f91f5edb3bbc6123888b6bcd27ec49a,2023-11-07T04:11:40.947000 CVE-2023-20040,0,0,0922a655363fa1ec544d5405a43843e57a5d1d552046d1047b53c5b382f2b45c,2024-01-25T17:15:26.757000 CVE-2023-20041,0,0,fd5755bac85a4f3c718b0f1eb74d0c569a2cc18341d3c265f8df5cf4be80a077,2024-01-25T17:15:26.853000 @@ -214761,6 +214787,7 @@ CVE-2023-20057,0,0,043792f5aee16aeaeb4241db65fe08863eb4a3d25ab39d0568d5bffb0a156 CVE-2023-20058,0,0,ad815c14d82ee176555edb6a4e2052d61f7ea3f63365c395b0328bebd76c78c0,2024-01-25T17:15:28.070000 CVE-2023-20059,0,0,b99d0f72dcc000eb953ace65e13282c926b8d14b4c6816adcddee8cc0dd72692,2023-11-07T04:05:53.953000 CVE-2023-2006,0,0,576ccd01f75cc25728924f4ed5e26d8b930bd4477bce9be56dd71bf07e1c6057,2023-08-25T15:23:55.877000 +CVE-2023-20060,1,1,4fe227273b5e34e9cbc20e8fc1a831f4459e6cc67c0f6ea42c5c4cf1a0dfdf59,2024-11-15T16:15:25.357000 CVE-2023-20061,0,0,2ec24e7f0c8bcf98f0de0b7378a7de0b9009080959b3f6e60b70d985f8c0253b,2023-11-07T04:05:54.383000 CVE-2023-20062,0,0,74adefadccfa785110e4e05f634c8688933a1b2a514cb692712de49e45b87ba6,2023-11-07T04:05:54.797000 CVE-2023-20063,0,0,ab9aa4a035ed2a1055c8eae268aa7b6b803ad113e479a4dca4e69fb32738c3a9,2024-10-23T17:15:13.320000 @@ -214793,6 +214820,11 @@ CVE-2023-20087,0,0,133c6492751092d6c28ab324bb58a12f819bd773f8708e73bfb29f97a2be8 CVE-2023-20088,0,0,705f2ea50f1d59a2e3ad7ebc85510dd9d8de6350673ed4bdfd84da5ef77c6e04,2023-11-07T04:06:01.113000 CVE-2023-20089,0,0,984606cfab01f8b8da767b529c591d341f255333dd5307e8011a8533079438b1,2023-11-07T04:06:01.503000 CVE-2023-2009,0,0,f993c356b46fc35d0cbf9d2c6587ae24636f78445d0fc0982a31ae802aada552,2023-11-07T04:11:41.033000 +CVE-2023-20090,1,1,7d8ed5165f13ce8abe5c92710ba00fc6627539c932bfceefcd559e7d5c2d9c0c,2024-11-15T16:15:25.560000 +CVE-2023-20091,1,1,7957d54a758c97d56ea8f39938f86e458704a25f7e6f0d0392c890dc728d5579,2024-11-15T16:15:25.770000 +CVE-2023-20092,1,1,c4563a1f3434466be4aea0d7227c50c30aa74a790971fa8ffe4531c50241f35f,2024-11-15T16:15:25.980000 +CVE-2023-20093,1,1,300b01ffe6545980e2d5e8da2c4875c20bcc800d9dad4aca9740acdc9fbd769b,2024-11-15T16:15:26.187000 +CVE-2023-20094,1,1,c772b82858adcd41613402d4f19b1e84a24c9a0c5be417184c8d0d17eedefdc1,2024-11-15T16:15:26.390000 CVE-2023-20095,0,0,c1d39625b73fc4114d101d356e72bcbfa28ba08de7f2dbc09ec224218c1f83e0,2024-01-25T17:15:29.320000 CVE-2023-20096,0,0,5ec9d92a3c53d239a4bea6ac652028ebc9a4f75c4f12a87c04a0f5b9d268f7d1,2023-11-07T04:06:01.853000 CVE-2023-20097,0,0,0f1b759fa19d9d1fbf0d1fb932575fa350688fd85c697d74def63c42805ec83a,2023-11-07T04:06:02.180000 @@ -214823,6 +214855,7 @@ CVE-2023-20121,0,0,358dbca94d32e6dcf0b3104823aa6eef27bbc41a499c165775feefef3dd70 CVE-2023-20122,0,0,7c9e16c7a0ee316d150ed9cf383eca40d39459afaa779ec2d9350f20bcf1e719,2023-11-07T04:06:06.620000 CVE-2023-20123,0,0,1938d04db810293056039009697e32a6b0e0e894259a64bf86651878bc0084e4,2023-11-07T04:06:06.960000 CVE-2023-20124,0,0,e83f8aaae6cd3d65ff2154227681c9318ae0e3b7070056480e66eb5d3b4ab066,2023-11-07T04:06:07.280000 +CVE-2023-20125,1,1,4d3ece80bb2bc98d6b9179f7ff626afd566df172ea9eac0084c18d7ae4849bdd,2024-11-15T15:15:05.347000 CVE-2023-20126,0,0,f839d079229ba6c1e694033f3ce70a9f46e6c8795d13d51bd2484856d9f0674a,2023-11-07T04:06:07.613000 CVE-2023-20127,0,0,5dd1b97bf22fd06bfdbb3184f8e0d784536bbcfd9846484be1e70c5dfc0a2bdf,2023-11-07T04:06:07.933000 CVE-2023-20128,0,0,84d58c0ee921e563d643445e5800ae3cd231b79ec1aa65fe75f6d6b469342bc7,2023-11-07T04:06:08.293000 @@ -214854,6 +214887,7 @@ CVE-2023-20150,0,0,94ea55c7c3cf20c73cbf1b524abac3dc9bbcc065627308840f1663af75b5b CVE-2023-20151,0,0,88742a817c2df6fdace33e29b508ea48e1e2e1dc833b2f75c7b254b36e99152c,2023-11-07T04:06:15.360000 CVE-2023-20152,0,0,b285aade6162740e6dd931c919008308d719b96b4e7dc41373d9b5d41f9dc560,2023-11-07T04:06:15.710000 CVE-2023-20153,0,0,ae7f889caea069cd7690b5f9920f78358d15337fff658fe3de0d3daef91d68f0,2023-11-07T04:06:16.027000 +CVE-2023-20154,1,1,4d0a0d038c8b5442778ad17b85c37cdb9cd722940a6cd558087f26d17561d095,2024-11-15T15:15:05.697000 CVE-2023-20155,0,0,33b71951116186ed9605c91d855e2b68ba331011dda75495bb098ec5b6e270bb,2024-01-25T17:15:31.683000 CVE-2023-20156,0,0,ea0e130fec2d57b54bae7e81d6b74b3374f2cc6170c056dd2fc367148eca7107,2023-11-07T04:06:16.423000 CVE-2023-20157,0,0,bbdecebb32e3e6b666e8da5d3dee094804414044129700721a781dd8705107e8,2023-11-07T04:06:16.923000 @@ -217454,7 +217488,7 @@ CVE-2023-2331,0,0,e433c8f28124f99de996fe1b6c3691e25c108649c8ab730059c257d74b0a50 CVE-2023-23313,0,0,5ab564b75d72781324830922b5feefff3026f2101be70bbaad014ca9b998958c,2023-11-07T04:07:40.137000 CVE-2023-23314,0,0,b80392fd9584b433a38a78e2530c4db30446fa40b35f645f6acfbdcc1e22626e,2023-01-30T19:31:41.750000 CVE-2023-23315,0,0,32244c72a2b7eabff29fdd785e8853617587d6b657a16b1b687badeb31ddeb6a,2023-03-10T02:31:23.757000 -CVE-2023-2332,0,1,489ede0aaa6f14f767a2f9c9e16259a2d63d7f571501feaf647974cecf801abf,2024-11-15T13:58:08.913000 +CVE-2023-2332,0,0,489ede0aaa6f14f767a2f9c9e16259a2d63d7f571501feaf647974cecf801abf,2024-11-15T13:58:08.913000 CVE-2023-23324,0,0,95dd911b066baa0858b7b409d73bcd14ff22686691096373e30e8c5721aa2257,2023-12-05T12:39:44.770000 CVE-2023-23325,0,0,94e1a8e3ac75f1a3bc2a74e7374f6d9f0e838c3c3932b61fa7dac52d90f8e0d8,2023-12-05T12:48:15.773000 CVE-2023-23326,0,0,af8ef32c5b2a0d921fed756052ef1d0183c04f71130cb143f8686b6d4c026c5b,2023-03-16T15:56:41.620000 @@ -226027,7 +226061,7 @@ CVE-2023-34045,0,0,efcc90e9c554373a3c46862e56f008ba7488a75ec1d99629fde063d424a27 CVE-2023-34046,0,0,940c9fc1e6b0b0f75909505dcbc5c54324caa725c2f9e799f85d164cca40c6c7,2023-10-28T03:34:15.293000 CVE-2023-34047,0,0,2deed76b81cbbd710c03198ed7fba5a7406f65771b7a4bafc40dc468b5019e48,2023-10-18T18:04:30.410000 CVE-2023-34048,0,0,85fcdc74e66ac70590bd0779c468437a4b104548eae3fa739b3fa5514e6d1617,2024-08-14T20:02:35.353000 -CVE-2023-34049,0,1,c2bb03a3e34cbdb6866b99016c0ba893ec8e8838fd743d6ef9077f0efe832f58,2024-11-15T13:58:08.913000 +CVE-2023-34049,0,0,c2bb03a3e34cbdb6866b99016c0ba893ec8e8838fd743d6ef9077f0efe832f58,2024-11-15T13:58:08.913000 CVE-2023-3405,0,0,0c266b7d3570c3d94ac19eb248b9b0c3ec6e185e0d327fcad7aa0c292964fb70,2024-08-28T09:15:08.677000 CVE-2023-34050,0,0,6bf9fe5de1088502db285c6eaa05c1aab935be0e9bec211546bfc1be5b5afd5f,2023-10-25T16:54:31.770000 CVE-2023-34051,0,0,e6048bd7bc8ae549228fa0e7507cc168b790322ae0a61fef62c26cd3f513b2c1,2023-10-30T15:28:40.420000 @@ -227008,7 +227042,7 @@ CVE-2023-35654,0,0,5ec0257719972615a54320d70abd4585860da16cb9145e7dd4cf2a9de0b38 CVE-2023-35655,0,0,46ccfbda32de6d4aaa44064f160c4fe81117afbe213f242d2b419179ac9bae89,2023-10-14T01:44:43.167000 CVE-2023-35656,0,0,351408b3f3ce527e3e9ca146a71adca57765b10d14ffc2f2878145486a62e13f,2023-10-25T10:02:58.693000 CVE-2023-35658,0,0,8bcf70abab563df9c5ba967b15bc341b1fdf6e9f2ec89ab41d871dfe9fd14b2f,2023-09-14T02:18:53.670000 -CVE-2023-35659,0,1,1d9225ec8c2d98e0bb710b261fa655c53a135ecdd31f56c6bc7135c01426158a,2024-11-15T14:00:09.720000 +CVE-2023-35659,0,0,1d9225ec8c2d98e0bb710b261fa655c53a135ecdd31f56c6bc7135c01426158a,2024-11-15T14:00:09.720000 CVE-2023-3566,0,0,c2dc7026e794fcf3036669dc6d7e1d3151b5648f6848d46c6c625fc93ddde6f5,2024-05-17T02:27:36.673000 CVE-2023-35660,0,0,486a712e4d0f56647a1f8028aec97638904ee0fb3391eb5df721854ed5551546,2023-10-18T01:42:58.543000 CVE-2023-35661,0,0,92d005e666e4198e224998a5911b6ec28079a5f8101e9661c640419fbd2863da,2023-10-18T01:45:44.173000 @@ -227035,7 +227069,7 @@ CVE-2023-35681,0,0,2603f8896e8c125b6797dbd02195d63673d6f51724707bcecf3de29ee5bd3 CVE-2023-35682,0,0,8e5be0df20127646df0c428d0877b5f6025db53a632750e4d83bce87d34712e9,2023-09-13T14:39:22.120000 CVE-2023-35683,0,0,5a67cee00f3de3a526dd990d465ec70cca53419801a3d26ae9d8d814db70f2e8,2023-09-14T02:00:12.517000 CVE-2023-35684,0,0,09ccb465b40d0eb68fba17fcdf270a630f7753abe8e6c5c89ccedcd22bd9e51b,2023-09-14T02:02:15.467000 -CVE-2023-35686,0,1,5a90ad46939bae57191718f65dfefacd86c4e383dbfef7a1f6b2818ac9179cb5,2024-11-15T14:00:09.720000 +CVE-2023-35686,0,0,5a90ad46939bae57191718f65dfefacd86c4e383dbfef7a1f6b2818ac9179cb5,2024-11-15T14:00:09.720000 CVE-2023-35687,0,0,c28e4b6a4d942f40e08b784a20dfc07c8f0fcc8f7236ef7809c0123c392aa182,2023-09-14T02:03:49.147000 CVE-2023-35689,0,0,c77c9e7a23c05ba829d34db48953b7d9e346df1f83dfb61e4b82c0b286c3749f,2023-08-22T01:10:41.940000 CVE-2023-3569,0,0,5a78514f93a9c1a429d4db50f2959ea2876b105709fb83ffa2f2296def39f506,2023-08-14T19:15:13.793000 @@ -229657,7 +229691,7 @@ CVE-2023-38914,0,0,dfac752e4e293650625d5006e8c3410a0610877f7957a0323579b7c2d7edb CVE-2023-38915,0,0,e0a8ff70cd4417c510aef91dd0f6972af0ed915761de08e703e665c6b2313fe3,2023-08-22T15:16:26.497000 CVE-2023-38916,0,0,23fb3b5127391e950f7519403846a77510acbba7dbb851cde681d44af2040efa,2023-08-22T15:27:37.117000 CVE-2023-3892,0,0,c9f6a4d1b687347c3ba3c3230cdfc19fa2bf394a3eddbfeeec6c72ca32b3d97c,2023-09-22T19:23:28.753000 -CVE-2023-38920,0,1,9e6a8719f6c7d42d5dcd9efb4bc604b738f26314c3edaa85ac9eb22e5038f0ba,2024-11-15T14:00:09.720000 +CVE-2023-38920,0,0,9e6a8719f6c7d42d5dcd9efb4bc604b738f26314c3edaa85ac9eb22e5038f0ba,2024-11-15T14:00:09.720000 CVE-2023-38921,0,0,bebe4da2ac8c19aa3117b71df5df81a2a540954d5cd32c199b250d414df16abf,2023-08-09T18:03:20.593000 CVE-2023-38922,0,0,c13408e1267ba337650adb18b7ea02ab8164cc19f684df35716dcd3649677074,2023-08-09T18:03:54.593000 CVE-2023-38924,0,0,407f514ef1d1e932061b14361799c979737b4dfe271bb68e226240b4e084d2e1,2023-08-09T18:04:06.470000 @@ -231600,7 +231634,7 @@ CVE-2023-41336,0,0,b635acad925f51897708f1c284f31b52e812f930d0f8a69e729a597a376bd CVE-2023-41337,0,0,15e5e52f40f65a0229a0cdd3d18e84b3f05954948f9735ee45da4880e8cdce6b,2023-12-19T19:10:12.043000 CVE-2023-41338,0,0,4ff13041d1d920a3e7cf920d32fc2747c67006ee742953739c10eeb93bb4c4dc,2023-09-12T19:12:29.057000 CVE-2023-41339,0,0,d5e9f04e6c95a3d0eb6da07191e971e3e5f23fc0a4622beb8f9610cba2e4c6d5,2023-10-31T19:53:57.670000 -CVE-2023-4134,0,1,0ad2c336b62ea0bc752bd81f24bb5dc8384946dfb3f97322284868077cf0a28c,2024-11-15T13:58:08.913000 +CVE-2023-4134,0,0,0ad2c336b62ea0bc752bd81f24bb5dc8384946dfb3f97322284868077cf0a28c,2024-11-15T13:58:08.913000 CVE-2023-41343,0,0,d014d94f0c954572fa228d52527071fd46ed723d95e2596289d617e9451c129a,2023-11-09T21:59:36.353000 CVE-2023-41344,0,0,fd945b61a59b0f15cf1f2c1695c5c3de41b28d458dedce455cfee4907f8e8504,2023-11-13T19:54:38.750000 CVE-2023-41345,0,0,ee8a523a2662b0bb570a5de5622ce7c196dfd6d4b60b13c44584d06fa25b5a77,2023-11-13T16:59:55.303000 @@ -233854,7 +233888,7 @@ CVE-2023-4454,0,0,fb429f754193553b6975a0d32c55113a293441b320ca968748467aa80d3d24 CVE-2023-4455,0,0,20e2a71b7fd8a18a1114b92d93267c5ab15590b2a47c5b1f075ea92a982f3a49,2023-08-24T21:11:31.950000 CVE-2023-4456,0,0,369c0fad995b8264d64349ce435b2c1dc3089365795bdcd3741dfadaea65acc6,2023-11-07T04:22:38.447000 CVE-2023-4457,0,0,ee0b8eadfc3272ee478862dc9e8584d1b618758034c6a68efc19123317a2c60b,2023-10-20T15:17:32.870000 -CVE-2023-4458,0,1,bfdb25cb1bb4e2ab2a7551e6415bd755590021839b15f79064367249f86c4202,2024-11-15T13:58:08.913000 +CVE-2023-4458,0,0,bfdb25cb1bb4e2ab2a7551e6415bd755590021839b15f79064367249f86c4202,2024-11-15T13:58:08.913000 CVE-2023-4459,0,0,ded88117b55c4284762f2f8393f20b576cf09dfb8895bd1c0d3f42fcb1ae428a,2024-04-25T14:15:09.507000 CVE-2023-4460,0,0,5fb802ae85625b42d8217a009e041c135e908761081f43a6b546052a002e9402,2024-10-01T16:35:12.403000 CVE-2023-4462,0,0,6ee35d095410fea9ab00663779e595263154c8235788b3e851e641d73c81658c,2024-05-17T02:31:35.497000 @@ -235324,7 +235358,7 @@ CVE-2023-46786,0,0,bf4916e892e13d9bd5f18249e97f7ed4aeb5247f2854f8c308efd96466799 CVE-2023-46787,0,0,eee6ea113b686659f2a66a8e2e38db99b180a9cdd992ed45b258359c2fbbafb0,2023-11-13T18:00:08.857000 CVE-2023-46788,0,0,fa89ddc1e582ea32e59694cd588090422058d73f3e55d49cdf4218b1d27bcb24,2023-11-13T18:00:01.510000 CVE-2023-46789,0,0,9fbdb411cccdb011e81628500fbc3b74a0a6d06d2a8237255e6accafa55442cd,2023-11-13T17:59:42.877000 -CVE-2023-4679,0,1,bd41f16aa163eb389f55143467cd4dd83f1cf653b0a52e5edf88d1f45ea711d7,2024-11-15T13:58:08.913000 +CVE-2023-4679,0,0,bd41f16aa163eb389f55143467cd4dd83f1cf653b0a52e5edf88d1f45ea711d7,2024-11-15T13:58:08.913000 CVE-2023-46790,0,0,7414a678623b3a8d31eda7749ee35a2bdf61169d6ade6fd91b06a5a0e4bffda9,2024-01-02T22:15:08.290000 CVE-2023-46791,0,0,4f7a7ce04b20ee1c59664fc3196bc82b7bf68c16659759baf914252cd593ed28,2024-01-02T22:15:08.367000 CVE-2023-46792,0,0,7e34df21be011e0e859102a1381c46b673dbda14e06d4aaaab00023b1fb66f87,2024-01-02T22:15:08.440000 @@ -242241,7 +242275,7 @@ CVE-2024-0782,0,0,dd227a8b469ce6630eb22142a87d0da772ecdb0285534b1bcdde3ca20e489d CVE-2024-0783,0,0,889b3aec94f8730e9264c4087d63efb1328316b4df2b41f572aa9ab243eedd51,2024-05-17T02:34:58.020000 CVE-2024-0784,0,0,05fccc58af077ffcd0eb7b186f39f412c8126936ae9b879608bee8086b2c9a33,2024-05-17T02:34:58.123000 CVE-2024-0786,0,0,09a89f715683ba83fe81b0a3f3fbdcf9cf5cb4fbf3001ded7457bfdf3b510a57,2024-02-28T14:06:45.783000 -CVE-2024-0787,0,1,4ded82f0e9865a8d4b6032375e3f9c6131e1d0daf9c4adfd7fb6e243f6c64c6d,2024-11-15T13:58:08.913000 +CVE-2024-0787,0,0,4ded82f0e9865a8d4b6032375e3f9c6131e1d0daf9c4adfd7fb6e243f6c64c6d,2024-11-15T13:58:08.913000 CVE-2024-0788,0,0,77f61568ad57c437194aa13eed7b7f4a244f0c473b6deae4d7ecf1e9a4375c8f,2024-09-05T23:15:11.527000 CVE-2024-0789,0,0,dd4dfae2cf9c1e14c885c435e4946684b1e28fce4e56958a0b475f730b1ce5ce,2024-06-20T12:44:01.637000 CVE-2024-0790,0,0,faf5037c158d063c7d3783eeaaf8baa8e520d90b8a2f56f0b34167c00c86529b,2024-02-13T19:42:38.757000 @@ -242323,7 +242357,7 @@ CVE-2024-0871,0,0,2a81c9221f676df23b70ee25b96f92b79bd7fe2d47d83d3cf9575aeab8537e CVE-2024-0872,0,0,59570f703919134c83976c0a589bd002a09343b74061ad8cfeb778f494366fb8,2024-04-10T13:24:00.070000 CVE-2024-0873,0,0,0d017532f0822fb01a43bd5a5b6fb8ed2d6c3075b76ac0b6436fcb6d890c9423,2024-04-10T13:24:00.070000 CVE-2024-0874,0,0,e6fb28781735bc896300880a10982c06b4a0d863ac3f7c9c0e53997a057bc6f4,2024-09-11T22:15:01.933000 -CVE-2024-0875,0,1,89dfb36d50ba6403be06cc49835d930d762a751ae158b09b4e6180de2dcd0e29,2024-11-15T13:58:08.913000 +CVE-2024-0875,0,0,89dfb36d50ba6403be06cc49835d930d762a751ae158b09b4e6180de2dcd0e29,2024-11-15T13:58:08.913000 CVE-2024-0879,0,0,40ca4d922e04a74721c93cda9d6ef307a09b39f845db5f9dd6db6b694e034cf2,2024-01-31T19:16:07.630000 CVE-2024-0880,0,0,44431bf4f01e73978bc2a282db63f61857269e71b91d3e3d902140e76c6dd1ce,2024-05-17T02:35:00.317000 CVE-2024-0881,0,0,1252bf71170a54b7a474d354bacf2afe464c57991281e1919b7ffd68baf1e1ed,2024-10-31T15:35:20.223000 @@ -242502,11 +242536,11 @@ CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615a CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000 CVE-2024-10100,0,0,f9d8653b0b809755807a27c91859fa59733e823c9baf33fbd9ba6460baccb9d4,2024-11-04T19:15:05.297000 CVE-2024-10101,0,0,e3896c5d7db68c5b786b00b58edff142c65dff97c0f85c49d64d1701e59c4a4a,2024-11-04T19:15:05.527000 -CVE-2024-10104,0,1,32132c8cff39375b51f3675eac359dd441ca99a65adfb217bad642370ce25de2,2024-11-15T13:58:08.913000 +CVE-2024-10104,0,0,32132c8cff39375b51f3675eac359dd441ca99a65adfb217bad642370ce25de2,2024-11-15T13:58:08.913000 CVE-2024-10108,0,0,f3f4ad009417795f18debc95373d890db3250e635fff4006fa4ef1bc9580626c,2024-11-01T12:57:03.417000 CVE-2024-1011,0,0,a83b664837c33e7f0f4cec42868f7bdd93765cacc9e6b97b43804e8b07af65f2,2024-05-17T02:35:09.987000 CVE-2024-10112,0,0,3a01d2baa33f19e143abe5aabe181ccab32faac99effca8d7325142fe7220a64,2024-10-25T12:56:07.750000 -CVE-2024-10113,0,1,30c83db4887ee366b46da24a82d7384a70c079ddd30bc3f9c149617d502bafbe,2024-11-15T13:58:08.913000 +CVE-2024-10113,0,0,30c83db4887ee366b46da24a82d7384a70c079ddd30bc3f9c149617d502bafbe,2024-11-15T13:58:08.913000 CVE-2024-10114,0,0,16b8947ff2e570aff6db4fc1326409cd8691db8a310b773c04315751bc454909,2024-11-07T17:04:09.203000 CVE-2024-10115,0,0,2f48f8fc2fb64e7eea0f8a197e6ea039f4addb791184326175f5bf3196ca43c6,2024-10-18T19:15:13.600000 CVE-2024-10117,0,0,7266808fb250241ee6ed4b7bcd7ffe295a81bef2421c05c5f9197e6a33b75e8d,2024-10-28T13:58:09.230000 @@ -242534,7 +242568,7 @@ CVE-2024-1014,0,0,8e546db835ee0e62e0f6ed5b95e90d5586231fc78746cbbfef7db3d61b3c5f CVE-2024-10140,0,0,ec9d51c2fc14eea2e4cdb7aa8f8bd180db2ec005ceca8608d4d081404a2e210c,2024-10-22T14:19:08.420000 CVE-2024-10141,0,0,1a2024f75553982bce647b93dbf2bff672eefec5950fa457467c64b98f6e45c7,2024-10-23T20:27:09.370000 CVE-2024-10142,0,0,f8d897c68f0699e753bf4964aa75eec3baa1d06414695c8d5256c262c45a3b84,2024-10-22T18:11:20.450000 -CVE-2024-10146,0,1,a05479823dc9b244c9d3c6072656889f63716e15bd862616259d6ac79eca877a,2024-11-15T13:58:08.913000 +CVE-2024-10146,0,0,a05479823dc9b244c9d3c6072656889f63716e15bd862616259d6ac79eca877a,2024-11-15T13:58:08.913000 CVE-2024-10148,0,0,83c51017fcaad8303b49e241d62740cf9ee14ff3b98ac6e60e27203bec158551,2024-11-06T16:02:22.120000 CVE-2024-1015,0,0,5516b1d1af5a9d3814b8a6e102d3692fcdb9c463b2e2645787afdcb157946f20,2024-02-02T02:04:13.267000 CVE-2024-10150,0,0,980e5c556ba92cfe6f78a7c5edf14225adf63d1f935caa703239c8f6c3933115,2024-11-05T17:47:35.353000 @@ -242607,7 +242641,7 @@ CVE-2024-10241,0,0,ae512d639185a0ae3de570db96ee11e8b4269e6da724c94a52e42eddaeb0b CVE-2024-10245,0,0,a0531404f8e42b22ebf8edf706088f8f3bbff70573c99f5feaf6c300487731f6,2024-11-12T13:55:21.227000 CVE-2024-10250,0,0,8accb693817c35c7e4f9fa710076ead819720d8653e5052fbeeec31b3a5b47d2,2024-10-25T16:37:32.777000 CVE-2024-1026,0,0,e127bb5d00442b36eed0e6ff6513a3a42c45706876a3a5f2167365447fb898e7,2024-05-17T02:35:11.320000 -CVE-2024-10260,0,1,244e865d9a1607c34ef78b8cc10fe9d865d0e00b89c6d7074ea26acb40607ce7,2024-11-15T13:58:08.913000 +CVE-2024-10260,0,0,244e865d9a1607c34ef78b8cc10fe9d865d0e00b89c6d7074ea26acb40607ce7,2024-11-15T13:58:08.913000 CVE-2024-10261,0,0,c0bacd51f8c13c6f93273b74702fb7ce7659bc324c7b90c6cfb500b131b8dd02,2024-11-12T13:56:24.513000 CVE-2024-10263,0,0,d8274159492686a2b3c754959bfc4509f9c9201a502006a3dee5515647626798,2024-11-08T15:59:41.633000 CVE-2024-10265,0,0,f3110d4f544093035d0a9b2f7bbeb2aefd9a822ae90a8974b8e692b012c9f1eb,2024-11-14T15:17:47.947000 @@ -242645,7 +242679,7 @@ CVE-2024-10300,0,0,ca0242a4c58ba5eb41987558653c1fad0eefdb856c34de56d3278680f413c CVE-2024-10301,0,0,43e47cf56bc671ed7b90e0f04f420138e8362a6d949261d9acbcdf888c921aa2,2024-10-25T18:47:54.033000 CVE-2024-1031,0,0,6576162a78ac686f55e5931a6b8f02ff6c7312ac04792581e6d78da8a91700d4,2024-05-17T02:35:11.843000 CVE-2024-10310,0,0,3b0decb54117e1f6369f0c8a49822eb1c6d4be5cb40b8b5a9079fd842cd0c653,2024-11-04T13:06:20.190000 -CVE-2024-10311,0,1,901db5d8eca542c05b4cebf2535d0c0c4daf89cc065922cbfb213e4c9f7b35f4,2024-11-15T13:58:08.913000 +CVE-2024-10311,0,0,901db5d8eca542c05b4cebf2535d0c0c4daf89cc065922cbfb213e4c9f7b35f4,2024-11-15T13:58:08.913000 CVE-2024-10312,0,0,d10f0012149342545ee317e492eeaf284c6b634b254526457f270c7ce4937a16,2024-10-29T14:34:04.427000 CVE-2024-10313,0,0,0a692e743da8a6f5929e9a5e61a16c962249b9fbffffedea4a154098bf7390c0,2024-10-25T12:56:07.750000 CVE-2024-10314,0,0,4ff424a08f54d46f95f43c7d51534e0e6342cc7a5b817ec1e4e580680bb1c702,2024-11-12T13:55:21.227000 @@ -242703,9 +242737,9 @@ CVE-2024-10387,0,0,5a1f42d28f618e614b5301c0b94be55a535432bf7194e0692256ccf6aa332 CVE-2024-10389,0,0,5c3e383a622dd2c962c1328ad97e7119997516337f3c204f5e02dea9bf077b56,2024-11-04T18:50:05.607000 CVE-2024-1039,0,0,823ba846a6d7c1759f085b54cf23829cdbadd28135927175e007d2b5df85a6ad,2024-02-07T14:09:47.017000 CVE-2024-10392,0,0,6e1e37299a52c0d29351f7b918b5ce63e7a851a7204714ad635a0d36b7f4f628,2024-11-01T12:57:03.417000 -CVE-2024-10394,0,1,4035dfc5a5bcf296734e398f64f1bd6d0cad9615950c5c863b2c2a3b361b6828,2024-11-15T13:58:08.913000 -CVE-2024-10396,0,1,eea82678934a4b6027473b74cdd3b7d449ff1d094dd2f74343b30dcc0b4b3531,2024-11-15T13:58:08.913000 -CVE-2024-10397,0,1,641d68ac85205cf509805150d7c0a339ca6da65bef2e6ec008aeac4464cea320,2024-11-15T13:58:08.913000 +CVE-2024-10394,0,0,4035dfc5a5bcf296734e398f64f1bd6d0cad9615950c5c863b2c2a3b361b6828,2024-11-15T13:58:08.913000 +CVE-2024-10396,0,0,eea82678934a4b6027473b74cdd3b7d449ff1d094dd2f74343b30dcc0b4b3531,2024-11-15T13:58:08.913000 +CVE-2024-10397,0,0,641d68ac85205cf509805150d7c0a339ca6da65bef2e6ec008aeac4464cea320,2024-11-15T13:58:08.913000 CVE-2024-10399,0,0,3874273dcd61d00780364abd4b80bff26291db4f2fcc766c950b26117fafe39a,2024-11-01T12:57:03.417000 CVE-2024-1040,0,0,b32f85342f197693d2db41df3bf264f5b00d802b0a5fb12822762c63c498621d,2024-02-07T17:11:40.623000 CVE-2024-10402,0,0,2443718b847d5ad0a7e8e6883b9aca46725ab83d65a53ced89e927dfa1ec15f4,2024-10-28T13:58:09.230000 @@ -242748,7 +242782,7 @@ CVE-2024-10438,0,0,927b1217e569151a95177fd0867aa44fd49cf458bed4e6241532df7fa8516 CVE-2024-10439,0,0,3741efcec87ce897773441ba8b13058a649924c1100d6b93c1ffe7465b37c5dc,2024-10-31T00:35:36.173000 CVE-2024-1044,0,0,aabb10708db1db153d691de2620429bf76b48269bc86aae28cbf6b6a3c047729,2024-02-29T13:49:29.390000 CVE-2024-10440,0,0,9134bb1aaa59624e138e5f8b3325f09bddc2e56431561ccb4c3e021d68fff1ce,2024-10-31T00:34:23.870000 -CVE-2024-10443,0,1,eb0cb1704ab48423bc57dbf5a4c19f84812c5ab8225bd00df260ebc4e3da02f0,2024-11-15T13:58:08.913000 +CVE-2024-10443,0,0,eb0cb1704ab48423bc57dbf5a4c19f84812c5ab8225bd00df260ebc4e3da02f0,2024-11-15T13:58:08.913000 CVE-2024-10446,0,0,deea975d5a7cce536c2612b9366552ab52fe1c83fa7bd626ef5b6cf23fd62b64,2024-11-01T16:39:25.890000 CVE-2024-10447,0,0,20a77c16977cd86421b31dc7f8e87f37efdc79e51d4f78a901539c52dec6ae6c,2024-10-31T01:23:46.300000 CVE-2024-10448,0,0,321c290fa10bd947d8b384a53dafbe5d4ff4b7a0a6522b833253529007c67a27,2024-11-01T18:26:55.980000 @@ -242801,7 +242835,7 @@ CVE-2024-10529,0,0,0345fe1a98579e0c46e6718b2719e0f35e2b675397c4baba2f79359ae71dc CVE-2024-1053,0,0,3d9e5b8218feb39348551f4e96f20fbacd04f2b39830165bb00a553a3d3c5ccf,2024-02-22T19:07:27.197000 CVE-2024-10530,0,0,44b1f61a9c6f6aa30b3b0d0f98cecd2a1b5d01908b2709a3a311951be1b1552b,2024-11-13T17:01:16.850000 CVE-2024-10531,0,0,5f58651087e63c6b2a12c6f7bdf9268a38a5c1f35ee89b5b7476b1d8409f73e4,2024-11-13T17:01:16.850000 -CVE-2024-10534,0,1,79dcab6d073e2cfc299d2109f99835aa00ff704c80b4e6050641c4dc3c96d863,2024-11-15T13:58:08.913000 +CVE-2024-10534,0,0,79dcab6d073e2cfc299d2109f99835aa00ff704c80b4e6050641c4dc3c96d863,2024-11-15T13:58:08.913000 CVE-2024-10535,0,0,14a566633b856f0bcfd07185d246772590c919ba8cb5a244786d38adaffa8830,2024-11-08T21:19:27.540000 CVE-2024-10538,0,0,4258e87072a64a27fee35a0841a3c5095b5fad35eea820564ce6eaffa01f0137,2024-11-14T13:27:00.400000 CVE-2024-1054,0,0,f8e7e53b5707aaecdfe1ea6fba53413ba04bed5cdf673762252b510775f984b1,2024-02-29T13:49:29.390000 @@ -242817,12 +242851,12 @@ CVE-2024-10559,0,0,f02de87419b06f79046e87a4e20909e93937f86137fa0aad3ef812234236a CVE-2024-1056,0,0,7aa227b1313326ef7e8b583bc7a3f0e84afbbd1f0f46388543b54cca53251293,2024-09-19T22:06:32.340000 CVE-2024-10561,0,0,29b70870967a739c229fbeecbb009b70108489636df3647702a2fd1c0595a0bb,2024-11-01T20:42:12.303000 CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b1769,2024-04-22T13:28:43.747000 -CVE-2024-10571,0,1,c9e5eda37da45c0ee9ea2673e5008fbb192402a38328c880611324ce53244500,2024-11-15T13:58:08.913000 +CVE-2024-10571,0,0,c9e5eda37da45c0ee9ea2673e5008fbb192402a38328c880611324ce53244500,2024-11-15T13:58:08.913000 CVE-2024-10573,0,0,9063cc223ea5dcb15427b5dfc605e5a082c0cb2c41a32875a4278d827b140fe0,2024-11-01T12:57:03.417000 CVE-2024-10575,0,0,d60bf0a0bfff7c064a609e35a84fef721491108a3e1293beb652d4120d21f4e8,2024-11-13T17:01:16.850000 CVE-2024-10577,0,0,a22bb88e9d80100e8493f63e77c4cd5ab2a37147944c69ab526442c593c29d99,2024-11-13T17:01:16.850000 CVE-2024-1058,0,0,6b5e9e2c8572168cf164dc3fe2cb55f99ab49ff2791e71ab226d135ab3271443,2024-02-29T13:49:29.390000 -CVE-2024-10582,0,1,6555712a7d6f47e2377fc1b0be3d50cc3c6e0937266d088860909050ec988f03,2024-11-15T13:58:08.913000 +CVE-2024-10582,0,0,6555712a7d6f47e2377fc1b0be3d50cc3c6e0937266d088860909050ec988f03,2024-11-15T13:58:08.913000 CVE-2024-10586,0,0,f1f769b86eb6d000daef591c5f367193d87a3d50622221457cbf9ad14bf94bab,2024-11-12T13:56:54.483000 CVE-2024-10588,0,0,c2bcaed6fe7b435f43e9c22f77453914df70e3466f4c66fa7dbe7829c2fb6e04,2024-11-12T13:56:24.513000 CVE-2024-10589,0,0,a6d8f39b47e9cb3150ad138c8d50791b37f1119d54a24371f819b9a1d868ac19,2024-11-12T13:56:24.513000 @@ -242893,6 +242927,7 @@ CVE-2024-10686,0,0,fcdad82b29385ae50029c826386214a0438adfef3126687e07ca7cc6d4975 CVE-2024-10687,0,0,2d74811f2fc6d3aaef423135ea18016bd4a20ce3a927ba94efb8aa3eac4c5b2f,2024-11-08T15:26:52.523000 CVE-2024-10688,0,0,2bcb0cc2d0a39373aaf27b3a9b6b49c4606abf5541b93372733fc379535c54ca,2024-11-12T13:56:24.513000 CVE-2024-1069,0,0,9f4b19e535b82e8b50b814b402985dc45959fb8eebaa25a120ba3f787349c9c3,2024-02-06T20:11:52.587000 +CVE-2024-10691,1,1,db2c0688a52bf60c2a1055a856c5f32b6875efacbb339285fcf0094be8a5d17a,2024-11-15T15:15:05.943000 CVE-2024-10693,0,0,2a11d3d5f51d0b8c3f7c9ca79b8ec09785ef4fc759c11326213a65170220169f,2024-11-12T13:56:24.513000 CVE-2024-10694,0,0,05c164a4732350edd5fee46247e775b1e69a11363b78cebc8b6784de8da1fb44,2024-11-11T21:15:06.030000 CVE-2024-10695,0,0,c91c88b2e014c926c977a623d612f44936109b69ef58435a4fdca68abda40e21,2024-11-14T19:44:16.020000 @@ -242956,7 +242991,7 @@ CVE-2024-1078,0,0,88568fa2f20f5ea8de25fda48576808429bbc616448df571a879f056db5656 CVE-2024-1079,0,0,0a964f4e43e1a2d85a40a4753c5354fe293facf65d0ebcc06031e68ccad95a0f,2024-02-14T19:33:09.977000 CVE-2024-10790,0,0,c5195852541315ac22dd1b614848e72547c3a099e7858697bb9ee4c86225d43f,2024-11-12T13:55:21.227000 CVE-2024-10791,0,0,a1ab37f8c195110cb663fc7e474028527dca661a169201c0160b30306fac4c75,2024-11-06T15:05:38.240000 -CVE-2024-10793,0,1,849ac0ebf38dc14a8de5efdfa21bed57d99ba8cf0f5c0cd846b144396d51ad4c,2024-11-15T13:58:08.913000 +CVE-2024-10793,0,0,849ac0ebf38dc14a8de5efdfa21bed57d99ba8cf0f5c0cd846b144396d51ad4c,2024-11-15T13:58:08.913000 CVE-2024-10794,0,0,990e73a12d2666bd3fad2efb1281964d2189bbaa2e95112b72149dc1a8399a47,2024-11-13T17:01:16.850000 CVE-2024-1080,0,0,9acdbacec5fb31283e62a6d3f1b1bde4de3af0ce021840a5a12a8cd06719b667,2024-03-13T18:16:18.563000 CVE-2024-10800,0,0,fb8e6ea9cb7f5838daa314a39d21e1e54fbb9eab7af4f73cc8a245f78af7556e,2024-11-13T17:01:16.850000 @@ -242974,7 +243009,7 @@ CVE-2024-10816,0,0,e858f5d61a9a9365d35b4f1632e08232437088d807fd2da2fd482099073bf CVE-2024-1082,0,0,1a3a3ef85a9a06621291f657b27812f6a6be683bc843b0137ba9e53485eee330,2024-10-17T15:46:44.327000 CVE-2024-10820,0,0,53fb78c5ab1cb50fbe971478c44681256823c1d2118b9f5fa84f30fb209fb38c,2024-11-13T17:01:16.850000 CVE-2024-10824,0,0,6eb650dcc5948040831c411456d27fae52cd783d32ad30faaf04938565b810b8,2024-11-08T19:01:03.880000 -CVE-2024-10825,0,1,625ed9c1c1d0e6bd7023320806103f19751c752d2e5e0c1168f546a2155686c2,2024-11-15T13:58:08.913000 +CVE-2024-10825,0,0,625ed9c1c1d0e6bd7023320806103f19751c752d2e5e0c1168f546a2155686c2,2024-11-15T13:58:08.913000 CVE-2024-10826,0,0,6aa37fdb16b5853a7b5472e25a8ac0220ff66e617581e203df39439d12ed70ca,2024-11-06T18:17:17.287000 CVE-2024-10827,0,0,6577ad366fcac00efbf959f7905ba60a1d9c696b896b68d8b10d38d71dfd5e3b,2024-11-06T18:17:17.287000 CVE-2024-10828,0,0,6d13ed488cefed03e92f75350a2f29132e810389942ee7924deafa370427db35,2024-11-13T17:01:16.850000 @@ -243002,7 +243037,7 @@ CVE-2024-1088,0,0,7487e11aa2518f6cc93d89dd95a39f5c8d6e4a1b2567cf073eed09f7df7825 CVE-2024-10882,0,0,d50cca8abf620c67a958717eb4d933afb7abd51207b4b48e13771e9f1de70410,2024-11-13T17:01:16.850000 CVE-2024-10887,0,0,6f1c620112f0531885feb58bf605da1bdf3e2be3ee69e7f92d5d01d446076f44,2024-11-13T17:01:16.850000 CVE-2024-1089,0,0,9442709e929187c1b992d082c3eaeec9226480f80fc28198e3a73f4a684640d5,2024-02-29T13:49:29.390000 -CVE-2024-10897,0,1,a06583b49e979e6c2e08d66a731da16126991a206b79119172b9152aecec155d,2024-11-15T13:58:08.913000 +CVE-2024-10897,0,0,a06583b49e979e6c2e08d66a731da16126991a206b79119172b9152aecec155d,2024-11-15T13:58:08.913000 CVE-2024-1090,0,0,2d0b80c82d6d153c4e0b5412c3fcf892da86ac73a72da4cbf84bfbb064bdcb0c,2024-02-29T13:49:29.390000 CVE-2024-1091,0,0,54ee7e9ca708166212a73aaa10e4715176fe17b55fbce1ee0ea8f95d289d46a5,2024-02-29T13:49:29.390000 CVE-2024-10914,0,0,a19349a4797c04ddb77f70975a0145b559e2c17ff8d6db53557df6669e0449a1,2024-11-08T19:53:04.793000 @@ -243012,10 +243047,10 @@ CVE-2024-10917,0,0,1eea699579f5dcb0f1ea716ba091b6b657cbea6b54620c9aa27bd72862f79 CVE-2024-10919,0,0,e8fbb923eb829e965254205b876d7ef672d5aac59877ea419609aa8d8f6bb3e9,2024-11-08T21:07:58.383000 CVE-2024-1092,0,0,4e514cbeb8cbdb0016fe4cb374f3dffe448e95b35a82b13ed7cb7be1b7fe61c2,2024-02-13T19:43:06.247000 CVE-2024-10920,0,0,2cf9a2b6fa319444c301d4d5e50d2260546d202b9ce9ceed0622f3257443827f,2024-11-06T18:17:17.287000 -CVE-2024-10921,0,1,e4551a7fb6e9a47101373d83ae7e9c0677be8ee1bd96c33a43c9b04fcf7dfcf8,2024-11-15T13:58:08.913000 +CVE-2024-10921,0,0,e4551a7fb6e9a47101373d83ae7e9c0677be8ee1bd96c33a43c9b04fcf7dfcf8,2024-11-15T13:58:08.913000 CVE-2024-10922,0,0,2e8ad1bbe2c22b2f860e82caba9eca723e865a4e9bffae87682e3cfa53e59e0d,2024-11-08T19:01:25.633000 CVE-2024-10923,0,0,a52ee7279b45f6cbb4af1bcb280dc131fb026565d6c8cec2e60c88cc2adb08c1,2024-11-13T21:35:04.867000 -CVE-2024-10924,0,1,81893a916d56c17bfaebe03737efc603a4394519bc7d6f05195e83e8e85b1166,2024-11-15T13:58:08.913000 +CVE-2024-10924,0,0,81893a916d56c17bfaebe03737efc603a4394519bc7d6f05195e83e8e85b1166,2024-11-15T13:58:08.913000 CVE-2024-10926,0,0,d4b8448490b176d20ac7d5dd5d9abfb0445d0f8f33211ac22e460a561e976123,2024-11-08T19:01:25.633000 CVE-2024-10927,0,0,89d2896b297590d0b070dc2d6fc3af12d21eeade74b7d5af5a8c30243a174669,2024-11-08T19:01:25.633000 CVE-2024-10928,0,0,d7b9ae13d8f86fa638d0e1d42acef5c90ca0f7e31aac0a4c1ed2473457ce5298,2024-11-08T19:01:25.633000 @@ -243031,7 +243066,7 @@ CVE-2024-1095,0,0,e70da3b629cae08421ac3ff6db71fb525bf872b735f906aa9168a1a3feae7d CVE-2024-10953,0,0,496fd56d3a163ffff52ed6786827de0c1da0afb8656a03af3cf0cf6c1de87d4a,2024-11-12T13:56:54.483000 CVE-2024-10958,0,0,5ab671d0f18f16536cdc1e49a5ce9e7bd51980aaa21f74ae418c3b86ac578dbd,2024-11-14T14:57:23.103000 CVE-2024-1096,0,0,9e6ec92aa91c226f1dce82b660bd82ecda12366a7db0465d5ab79a9947cb0a51,2024-03-21T02:51:34.720000 -CVE-2024-10962,0,1,cc07a6052d335762b681821acc9ab9361629b4ad0b389a0c9ce7ad2399cf435f,2024-11-15T13:58:08.913000 +CVE-2024-10962,0,0,cc07a6052d335762b681821acc9ab9361629b4ad0b389a0c9ce7ad2399cf435f,2024-11-15T13:58:08.913000 CVE-2024-10963,0,0,eee86a3aedc7174854dc69b5daad7ddd56acd624730edee3419c240e1ae079c9,2024-11-11T18:15:14.487000 CVE-2024-10964,0,0,59c42738567fc9804ec2d61407344d8d58a5472c34e273ef586a2c76a2aefe85,2024-11-08T19:01:03.880000 CVE-2024-10965,0,0,c66f8f41a86b61772baa3fe053f73c721fa7e86ea505631bf695cb762fd01af0,2024-11-08T19:01:03.880000 @@ -243039,13 +243074,13 @@ CVE-2024-10966,0,0,3df47cfeba07424dbca1650d45cf844f6cc1bcda5f1462544d39e404a912c CVE-2024-10967,0,0,045953be48e7bafc650cdaba1889b3cce653fc03383c0343e3292851109279a3,2024-11-08T19:01:03.880000 CVE-2024-10968,0,0,f600c79ff6183eb1b51f4003b01ba4a417fb853b88c9cd1f3e9f06879ffd32fe,2024-11-08T19:01:03.880000 CVE-2024-10969,0,0,34fb384baf8f9b6070297fa30997eac3a4fc91278070bd97f872695ea721a856,2024-11-08T19:01:03.880000 -CVE-2024-1097,0,1,8d4cc6316d3932e8571fa0fccc6762506fe97338769cb542b0abb6a5d89fb544,2024-11-15T13:58:08.913000 +CVE-2024-1097,0,0,8d4cc6316d3932e8571fa0fccc6762506fe97338769cb542b0abb6a5d89fb544,2024-11-15T13:58:08.913000 CVE-2024-10971,0,0,48718e7d6163afe0c28e377c2f658daad2fd70d420b988ed3e01fe2fd9d4a70c,2024-11-13T17:01:58.603000 CVE-2024-10975,0,0,f38693c9a402e208f0de21f91edcefa5c1f789073d3e380787ea5dd138f197fa,2024-11-08T19:01:03.880000 -CVE-2024-10976,0,1,8bb93de8d5444bc1f7d7cfe21c652c167b6aaede15e99982f1b13d49d0b9457b,2024-11-15T13:58:08.913000 -CVE-2024-10977,0,1,29b2ddc2319ae0c0d223db4a89d3fc8449062a0e9ea3025a5b9e5c6a1b746feb,2024-11-15T13:58:08.913000 -CVE-2024-10978,0,1,3ebab35a4eede26cd6c86db97fd53ab90e5957182d37b6e0abcc8e9197e65113,2024-11-15T13:58:08.913000 -CVE-2024-10979,0,1,3a334af0d54c8ec80e9b8cb03e116d52b074032ecbaafbd647e9ef1aae7be8d2,2024-11-15T13:58:08.913000 +CVE-2024-10976,0,0,8bb93de8d5444bc1f7d7cfe21c652c167b6aaede15e99982f1b13d49d0b9457b,2024-11-15T13:58:08.913000 +CVE-2024-10977,0,0,29b2ddc2319ae0c0d223db4a89d3fc8449062a0e9ea3025a5b9e5c6a1b746feb,2024-11-15T13:58:08.913000 +CVE-2024-10978,0,0,3ebab35a4eede26cd6c86db97fd53ab90e5957182d37b6e0abcc8e9197e65113,2024-11-15T13:58:08.913000 +CVE-2024-10979,0,0,3a334af0d54c8ec80e9b8cb03e116d52b074032ecbaafbd647e9ef1aae7be8d2,2024-11-15T13:58:08.913000 CVE-2024-1098,0,0,7637c79f93f6fef4c2ad0472be16e5b2b85cffeb9436b7defda280fbd3390871,2024-05-17T02:35:14.017000 CVE-2024-10987,0,0,3d92aa33c7cd82b5da2d8627d31a00cc6f3627f00f3b6f252e968a08d3bf860d,2024-11-13T00:58:55.400000 CVE-2024-10988,0,0,6d214b682ab0622d06c1c4f694c05924f3acdece53f5429fbbce41d026ca23b5,2024-11-13T00:59:17.867000 @@ -243126,7 +243161,7 @@ CVE-2024-11115,0,0,6752a3f15fe7742272035ac5069774108f37f03dae8259d5e310243c06e07 CVE-2024-11116,0,0,50b6a7b0baae7d93d967770820ad4acb1265e0c8d7e355f7414e720fb7141658,2024-11-13T17:01:16.850000 CVE-2024-11117,0,0,44ab0c5f984ce9aed4e52f00adac2e7b146a348c1dbadd3cdaa1ba5594ee10da,2024-11-13T17:01:16.850000 CVE-2024-1112,0,0,a074043c8f95f29514c3f59ea2279c09f17d99731ab21d34b196cbe82c1cf23d,2024-02-09T14:34:41.827000 -CVE-2024-11120,0,1,368b83ae5902e34b0c550f99a9e3cbb6abf3210b2f6a699d61899ee63a5aa2ff,2024-11-15T13:58:08.913000 +CVE-2024-11120,0,0,368b83ae5902e34b0c550f99a9e3cbb6abf3210b2f6a699d61899ee63a5aa2ff,2024-11-15T13:58:08.913000 CVE-2024-11121,0,0,78c7f01d1528f5af7c7c0921f9908f534edd8a79fcf13b8e8ba56ec04209ef7f,2024-11-12T16:15:20.770000 CVE-2024-11122,0,0,8b39eb171f905156949631c8c8e8a5af8e744e4719ba7b47f1a185280518c4e7,2024-11-12T16:15:20.873000 CVE-2024-11123,0,0,2c2c3a47aaef9d48349e1017759c96035abab5e51ba4d62444aa173a7ccd2b65,2024-11-12T16:15:20.990000 @@ -243136,7 +243171,7 @@ CVE-2024-11126,0,0,b967d4c9797ae557d5008a2e89e34b56b8ab089540ce69fba53b421e80e1e CVE-2024-11127,0,0,872c91b8fef54d334e58f460ad31540519bfcc5b745ac9da794cfe9b05f34fe8,2024-11-12T15:48:59.103000 CVE-2024-1113,0,0,6955c6c679809523d129efea09ef779c898e264f7e3230a68d2b1fd615c8f410,2024-05-17T02:35:14.663000 CVE-2024-11130,0,0,578a772ca1269be9bdc99bb966d7eb9c39dbd0e02e5dba4d3229d53dfaceb8e4,2024-11-12T15:48:59.103000 -CVE-2024-11136,0,1,24240577f7b850705f8148f1e2257c636c3b9dc696f019566c5d55e0511cc8a2,2024-11-15T13:58:08.913000 +CVE-2024-11136,0,0,24240577f7b850705f8148f1e2257c636c3b9dc696f019566c5d55e0511cc8a2,2024-11-15T13:58:08.913000 CVE-2024-11138,0,0,7b0edb369e2d9df427aea00759a3991acb4ee32080a1e83cba9502f5a7a362f2,2024-11-13T17:01:58.603000 CVE-2024-1114,0,0,4ba1cd03fbc35862ac6b2ce79da50122dd303ea22f4f4a45a352ffb5be12a8ee,2024-05-17T02:35:14.777000 CVE-2024-11143,0,0,7f1fadde01fb3ddd4517afb19a16094808880468a8f2dcb40cb3d8e84d34f2d7,2024-11-13T17:01:16.850000 @@ -243149,28 +243184,34 @@ CVE-2024-11168,0,0,5e610ba56b770f0c45b8e5f1da8a18409af80ecc6fd32d397017d56ba5ace CVE-2024-1117,0,0,0eff4d8f06fdd3645727772834638be79e19128758cbe94b2a8e7a297167b8d0,2024-05-17T02:35:15.090000 CVE-2024-11175,0,0,2129c1cdddb364757f82b16fba301982b34bdf0dfeb6c2bb6f48aa85e142eee1,2024-11-13T17:01:16.850000 CVE-2024-1118,0,0,6c399aaded9e96cfac900ecbd30e202d5a6a42d5625667c3de9725b65dc62fc3,2024-02-10T04:13:01.030000 -CVE-2024-11182,0,1,2c8b47b53840f1b2967586a65b9fa7c78b80f1c6c1c69d3e7c3505d211f5d54c,2024-11-15T13:58:08.913000 +CVE-2024-11182,0,0,2c8b47b53840f1b2967586a65b9fa7c78b80f1c6c1c69d3e7c3505d211f5d54c,2024-11-15T13:58:08.913000 CVE-2024-1119,0,0,5426bc48e63724893c52e881a8535fb7954cf4e6383fc287bdb9896410f7d3a0,2024-03-20T13:00:16.367000 -CVE-2024-11193,0,1,a70708fa48dd67ba3a86a48525d6b9656d6da3b4be924e80c673ce5d9c638eff,2024-11-15T14:00:09.720000 +CVE-2024-11193,0,0,a70708fa48dd67ba3a86a48525d6b9656d6da3b4be924e80c673ce5d9c638eff,2024-11-15T14:00:09.720000 CVE-2024-1120,0,0,4ae965ad3da5f8a3235e6e58dd82dd504b21e474d229ae465351f9f2ed6318d2,2024-03-01T14:04:04.827000 -CVE-2024-11206,0,1,4dabdbee4189d67c14faab7077a38bbebaaf9a0412b9485b8ea9f96e93b55b84,2024-11-15T13:58:08.913000 -CVE-2024-11207,0,1,98c51622a761e0f4191d7b9bd2fdd9da6fc0915a6a97cca51529b9e5f809abed,2024-11-15T13:58:08.913000 -CVE-2024-11208,0,1,5132b158407eb931e5d684318db9de41bd59baedd6c1f8713db9092ba5bcfd4a,2024-11-15T13:58:08.913000 -CVE-2024-11209,0,1,6796931fa86300b3e2b9543bd1b280cd5b640012f3ea8899a042d616c6df016b,2024-11-15T13:58:08.913000 +CVE-2024-11206,0,0,4dabdbee4189d67c14faab7077a38bbebaaf9a0412b9485b8ea9f96e93b55b84,2024-11-15T13:58:08.913000 +CVE-2024-11207,0,0,98c51622a761e0f4191d7b9bd2fdd9da6fc0915a6a97cca51529b9e5f809abed,2024-11-15T13:58:08.913000 +CVE-2024-11208,0,0,5132b158407eb931e5d684318db9de41bd59baedd6c1f8713db9092ba5bcfd4a,2024-11-15T13:58:08.913000 +CVE-2024-11209,0,0,6796931fa86300b3e2b9543bd1b280cd5b640012f3ea8899a042d616c6df016b,2024-11-15T13:58:08.913000 CVE-2024-1121,0,0,19a454e1b0b19f003a8998da71d81afc60a591ff2c6ec5f42743662bb8a72434,2024-02-13T19:42:57.107000 -CVE-2024-11210,0,1,0cca9b9ced96b815f23a2adf405f6ef8ca2d51de736dbd61610d0077a6858d38,2024-11-15T13:58:08.913000 -CVE-2024-11211,0,1,5a3ff1958288000dff9efbfd9636a1e83dea10099aa8993b255e34f281aec47b,2024-11-15T13:58:08.913000 -CVE-2024-11212,0,1,d580f98b2d893ad0ca823fed098b3da0e1374898a103c5afa4af95f7221aafd6,2024-11-15T13:58:08.913000 -CVE-2024-11213,0,1,0c495b874546c97440b3fe42e97782a656e128548583235ee69a0a31261b0052,2024-11-15T13:58:08.913000 -CVE-2024-11214,0,1,d39fe330eb8d17269036227b36e62f47bf8007d5207bfeb9d874b55c9f476130,2024-11-15T13:58:08.913000 -CVE-2024-11215,0,1,fb8a71cad5204690d7fc24b1c1787d6360fda1c469df5e0270b5ef3894a4902a,2024-11-15T13:58:08.913000 +CVE-2024-11210,0,0,0cca9b9ced96b815f23a2adf405f6ef8ca2d51de736dbd61610d0077a6858d38,2024-11-15T13:58:08.913000 +CVE-2024-11211,0,0,5a3ff1958288000dff9efbfd9636a1e83dea10099aa8993b255e34f281aec47b,2024-11-15T13:58:08.913000 +CVE-2024-11212,0,0,d580f98b2d893ad0ca823fed098b3da0e1374898a103c5afa4af95f7221aafd6,2024-11-15T13:58:08.913000 +CVE-2024-11213,0,0,0c495b874546c97440b3fe42e97782a656e128548583235ee69a0a31261b0052,2024-11-15T13:58:08.913000 +CVE-2024-11214,0,0,d39fe330eb8d17269036227b36e62f47bf8007d5207bfeb9d874b55c9f476130,2024-11-15T13:58:08.913000 +CVE-2024-11215,0,0,fb8a71cad5204690d7fc24b1c1787d6360fda1c469df5e0270b5ef3894a4902a,2024-11-15T13:58:08.913000 CVE-2024-1122,0,0,0daea6a9b881beb2ea9e563443c7905c114cf68ea1093ef9f6fd6cdf2c48aad7,2024-02-15T19:17:26.630000 CVE-2024-1123,0,0,b973e4c54de6f241a32cf221a70e04068421d86df4d000867b2228a54e55ef35,2024-03-11T01:32:39.697000 -CVE-2024-11237,0,1,8e8efac9e9fbe063a859c165ee378ecff565ba183a1a030817265309876770b7,2024-11-15T13:58:08.913000 -CVE-2024-11238,1,1,f196800203d7a40ea6fe71674205d5ffdaa3f312de9f25c1b832724bfe8a5907,2024-11-15T13:58:08.913000 -CVE-2024-11239,1,1,f1dab3b1bd9473b4d4db92608adf6e4ae1f9c5d4ed0e180c09e7deb1a37f009f,2024-11-15T14:23:55.747000 +CVE-2024-11237,0,0,8e8efac9e9fbe063a859c165ee378ecff565ba183a1a030817265309876770b7,2024-11-15T13:58:08.913000 +CVE-2024-11238,0,0,f196800203d7a40ea6fe71674205d5ffdaa3f312de9f25c1b832724bfe8a5907,2024-11-15T13:58:08.913000 +CVE-2024-11239,0,0,f1dab3b1bd9473b4d4db92608adf6e4ae1f9c5d4ed0e180c09e7deb1a37f009f,2024-11-15T14:23:55.747000 CVE-2024-1124,0,0,913ac2351f43d83be68411d873bf568715eb455fa7fe6219a9189bc1238726a9,2024-03-11T01:32:39.697000 -CVE-2024-11240,1,1,4cbdc145e46050047bae82d06e6eca707b526afd40e8adf36873c1573b95ee6e,2024-11-15T14:23:55.747000 +CVE-2024-11240,0,0,4cbdc145e46050047bae82d06e6eca707b526afd40e8adf36873c1573b95ee6e,2024-11-15T14:23:55.747000 +CVE-2024-11241,1,1,5adf62031ef29f2a6aff64af13c8577879fdb0eeb5c43426a2053134c8e9a63b,2024-11-15T15:15:06.003000 +CVE-2024-11242,1,1,b664b9f9ca5ef78a8f76c90b02dcb3e79e313f2513ec5d029d7980fcef3095d0,2024-11-15T15:15:06.280000 +CVE-2024-11243,1,1,07cdde05767a6c078a6880e496b4fc9b8dfe250fb9a8764bfb93c7dd52756f43,2024-11-15T15:15:06.557000 +CVE-2024-11244,1,1,eb8845955460a34ff0f05caa9bffc40321db9bab2c0d6c5ab4b0b8a45f110b8d,2024-11-15T16:15:32.790000 +CVE-2024-11245,1,1,1d3c3963003f652e39ad70e62873c3ce61143e6efc282e684e7f3305765b976f,2024-11-15T16:15:33.153000 +CVE-2024-11246,1,1,03623f9d2973a20ed102a61231dd48a6ec42601438415081c5e6186dd1e755c3,2024-11-15T16:15:33.593000 CVE-2024-1125,0,0,f1d015036f4cdda32f03ba210c93a8838e991a1e1d168cce1bd81d56428097c5,2024-03-11T01:32:39.697000 CVE-2024-1126,0,0,719cb9688eaad755b04db0e390abb1a9b0b6a5e25f632a929e6736322faf9c06,2024-03-13T18:16:18.563000 CVE-2024-1127,0,0,fc004f13d69dd65990588f481257d3c8dd60a3804cfac37ac389768e5b88f08c,2024-03-13T18:16:18.563000 @@ -243282,7 +243323,7 @@ CVE-2024-1236,0,0,9d7e383554119a6eb8995bc3e3c594237fc2517d15212a162d538fac1156aa CVE-2024-1237,0,0,971489c96af173cd98795b7c46411895a847e87f027eb141f5511aec59ad2e5a,2024-03-13T18:16:18.563000 CVE-2024-1238,0,0,9f0a38233429658f32f8a976db71d716904de01ac4f7f996eed98f40cb8ba7b5,2024-04-01T01:12:59.077000 CVE-2024-1239,0,0,db432ab525693f47cc78135d0c2cedd8ee6bd0f1495c321fd41dc0e5a9f890b0,2024-03-17T22:38:29.433000 -CVE-2024-1240,0,1,92652d70475ec1119cd517683372e3ddccb6008e6e9e687594e3ace0418a2314,2024-11-15T13:58:08.913000 +CVE-2024-1240,0,0,92652d70475ec1119cd517683372e3ddccb6008e6e9e687594e3ace0418a2314,2024-11-15T13:58:08.913000 CVE-2024-1241,0,0,96fd44c6e5fabc6d4bff3dcf2753825594889b1a8245005a991dd6eafde3d621,2024-04-23T12:52:09.397000 CVE-2024-1242,0,0,77f2f4c11df61eb6748d46bb4a1f43701b90877f99a1028521d6b0a2e093dca9,2024-02-29T13:49:29.390000 CVE-2024-1245,0,0,9f0a6683f1d5096645febd5b42c6e25cc14953b1062510f4b421bd46b5a5a4fe,2024-02-15T04:44:27.987000 @@ -243689,7 +243730,7 @@ CVE-2024-1678,0,0,d7ff889a45c19600d651a095e777206640b8492b0764403803a17b2b0960a8 CVE-2024-1679,0,0,17bb9123bbf364aa33e966e6c2425a349b78ca4b0bae773030e2388aec7f2994,2024-05-02T18:00:37.360000 CVE-2024-1680,0,0,bd026f6f4577d87113b1d29b371eaa9932e24a38c7da0012faa1c1e94f133830,2024-03-13T18:15:58.530000 CVE-2024-1681,0,0,1a482680a055401416ddaa083a69f1c47b6c9194da0d7c18ae32e2ad08501e23,2024-04-22T13:28:50.310000 -CVE-2024-1682,0,1,735ddeba41963c2aebeb394ede3667cd2f4331f209d2293ba81ef590838da375,2024-11-15T13:58:08.913000 +CVE-2024-1682,0,0,735ddeba41963c2aebeb394ede3667cd2f4331f209d2293ba81ef590838da375,2024-11-15T13:58:08.913000 CVE-2024-1683,0,0,5eea2ca94f33514f1a10330cfb76f46bfaa5dd8e7036c4fcc56926960dff400d,2024-02-23T02:42:54.547000 CVE-2024-1684,0,0,3968c3bdd3b3ae3fb293826cfdf6d87aa6258fc78cc6b2c763e860d1cdec7f47,2024-03-13T18:15:58.530000 CVE-2024-1685,0,0,52ebc28025f57fba31216035550fa84131fc9d72b996fd38059ce631ee298162,2024-03-17T22:38:29.433000 @@ -244264,6 +244305,7 @@ CVE-2024-20369,0,0,e23910e4adf6ac7fe444b246c85eb12e2e56e7b12054f1339b9256c8ec4ec CVE-2024-20370,0,0,9c8d802e115773847851e6a87a7c6331398027635ff6abdb8c313a21d8306cc9,2024-10-25T12:56:36.827000 CVE-2024-20371,0,0,5b763c21f0dad7933d07cd6f6f6dc5ca9ec50c488ae19c36eb22a1fb95a945ae,2024-11-06T18:17:17.287000 CVE-2024-20372,0,0,feaf3b98a24bdcf61707d881e5427a56c3f9e9ebde0774029fc1bd7580a0df31,2024-11-05T16:04:41.993000 +CVE-2024-20373,1,1,a2c2841c5e75e2098b2545a81c3463193dde584ae470f938c5f5d2013afd2a94,2024-11-15T15:15:06.823000 CVE-2024-20374,0,0,e0c9fc3f494f29ebf625a888aaf98651649c668b7d5475f4297a0435038e214e,2024-10-25T12:56:36.827000 CVE-2024-20375,0,0,a4ae364a987d406a5046b71b718fe2e5ce4da208cd9db67ac24eb19997b1276b,2024-08-21T17:24:59.627000 CVE-2024-20376,0,0,616e740c2ab9d6be811f96c68e43db8bad88fc7cef9833f2acf95234fb3cc478,2024-05-01T19:50:25.633000 @@ -245531,7 +245573,7 @@ CVE-2024-2178,0,0,138a5b6037346befd95f162100f3bb85e6d4a637c54fc9498b0643abc46960 CVE-2024-21780,0,0,143558a84e82d570b6723510ee619a946911b6889b6f6671986dcdd0082e6ea3,2024-08-01T23:15:27.210000 CVE-2024-21781,0,0,d162bf1e72449bae162d770913ed78a167c9a61a173e3f0334c37ec3290f1b76,2024-09-16T18:03:16.707000 CVE-2024-21782,0,0,b5dffee8207db247a6acdac6b2dcd64e03e670c2352443c2256ad0b59ce34c1e,2024-02-14T18:04:45.380000 -CVE-2024-21783,0,1,0e11253a2fcedbabc98fdc7552dc0384cab95ab9b1d8e6c9bab8c5ed0d4d020b,2024-11-15T14:00:09.720000 +CVE-2024-21783,0,0,0e11253a2fcedbabc98fdc7552dc0384cab95ab9b1d8e6c9bab8c5ed0d4d020b,2024-11-15T14:00:09.720000 CVE-2024-21784,0,0,d1c03a69f724f2701560068d9ea091b9ba1c4a0fcae5582b3c351bfc2aa7deb4,2024-08-14T17:49:14.177000 CVE-2024-21785,0,0,f31a00597d17e865ab6ff0a878d7de62b53a2814c89997dcfbb5b7e2587fe6e3,2024-06-10T17:16:18.643000 CVE-2024-21787,0,0,5f2b6e4c1ffdd2284fa9bd570e3d998919dcab4195292c72560d8b2c45f658c7,2024-08-14T17:49:14.177000 @@ -245545,7 +245587,7 @@ CVE-2024-21794,0,0,3da4616cfee04bc74bfc95974dd9f83bbdb78452787277f6c7fc15778ae28 CVE-2024-21795,0,0,4c526521468e78a581fac1a65dee6fe30626865dc4bc6584b348e80d2f7486e1,2024-04-02T15:15:52.517000 CVE-2024-21796,0,0,4c30b7e370457352f3ad9c0b491bb5443c36dbd10c44444c805c65b2a198074d,2024-09-10T18:35:02.553000 CVE-2024-21798,0,0,68d62fb6f929549ed87769596cef19fa55bafb1b5bee7557a0aa8ca1ab0c212c,2024-06-12T01:15:48.833000 -CVE-2024-21799,0,1,39d302e42368216e3c7296614d2ecb3dc3ef52a57f1f26a08e1325cbd5f02ae9,2024-11-15T14:00:09.720000 +CVE-2024-21799,0,0,39d302e42368216e3c7296614d2ecb3dc3ef52a57f1f26a08e1325cbd5f02ae9,2024-11-15T14:00:09.720000 CVE-2024-2180,0,0,ea5a425caba6ac1cd3af8063470a5a58882d59cccfb29a7ae46ceaab23a1dfb3,2024-09-05T23:15:11.970000 CVE-2024-21801,0,0,87368b81aaeb71fd9558ab521f94a4ce96a7438d03623fd572720282a3acb74f,2024-08-14T17:49:14.177000 CVE-2024-21802,0,0,4bfb24c0cf07d11e23ce0023e7998228cd51775f2a30a94c1081993102e6adf5,2024-02-26T18:15:07.290000 @@ -245553,7 +245595,7 @@ CVE-2024-21803,0,0,69612c1623993f11d7fce2e1a14c7756ada99e8bfdc9df57a5e97833caef1 CVE-2024-21805,0,0,3a2e1d8a123029644fcb8d0bab0d1771a21e29a3866d74ce7d95b980e4d4f46c,2024-08-05T18:35:05.637000 CVE-2024-21806,0,0,65620a9d36f843c31df5bee46c66dbfc33ad38c40ca8a398b4fde7f21b629291,2024-08-14T17:49:14.177000 CVE-2024-21807,0,0,ba6f1bbbf5d17f9fae70968c02481e0be734219b1b474942a4df970f31b1da60,2024-08-14T17:49:14.177000 -CVE-2024-21808,0,1,58a36890001b132a5fc8444b0024287bc3b1f4b27fa50f3498c2c037d49429bb,2024-11-15T14:00:09.720000 +CVE-2024-21808,0,0,58a36890001b132a5fc8444b0024287bc3b1f4b27fa50f3498c2c037d49429bb,2024-11-15T14:00:09.720000 CVE-2024-21809,0,0,50d2cad50fd4dffa4f1b9f6b2462b67131f9c0b70f872c844ae858853b94ca32,2024-05-17T18:36:05.263000 CVE-2024-2181,0,0,60b72562a78b2ad4912973d68442a626bf2476e44b4af06efcb887d1f7cfdee6,2024-04-10T13:23:38.787000 CVE-2024-21810,0,0,7633eed9bbb03bb704f77f0b689eb6e24c4196314a36f3baaed3c83403c89668,2024-08-14T17:49:14.177000 @@ -245564,7 +245606,7 @@ CVE-2024-21815,0,0,5b23099bf10c23b8e1fae5f6c90928b2a739513059f777d7513b8ba3e58d4 CVE-2024-21816,0,0,3556729912be1fc6b4992629f2fcc218916937e232361f846f9c6dbeb23ef32a,2024-03-04T13:58:23.447000 CVE-2024-21818,0,0,c637d2f2e962f29751d87c76f242879f1ed5232e4fb28fc3b3902f1a9fec3083,2024-05-17T18:36:05.263000 CVE-2024-2182,0,0,9420149cfa0f08959cb9cf762a78b873e21a3b4307bf9c2f3b44b30a64cf49e6,2024-09-14T00:15:17.220000 -CVE-2024-21820,0,1,f802057867224a89a0c7d30fdb52d66b289e9c1068e3329d8dd0c17015b0b5bd,2024-11-15T14:00:09.720000 +CVE-2024-21820,0,0,f802057867224a89a0c7d30fdb52d66b289e9c1068e3329d8dd0c17015b0b5bd,2024-11-15T14:00:09.720000 CVE-2024-21821,0,0,7321c5e03ded4c9a82a76a55d87da948884b86260a5a676716e6227a5659e3c2,2024-07-03T23:15:02.157000 CVE-2024-21823,0,0,a7d08304679f358cccf6555e051c669b20181bbee48ad836ab002c3ea453a60a,2024-08-14T21:15:16.520000 CVE-2024-21824,0,0,d1c38dae82b5f002920c2d4cd1ccb35fe1b20b53a13f43f2c755312be72b4f96,2024-11-07T16:35:12.887000 @@ -245592,10 +245634,10 @@ CVE-2024-21846,0,0,2a8624f890cdc423b16069bdaf8d771ee68cb57f48b44bf5e830d58e42e6c CVE-2024-21848,0,0,f050bf22503a8e34689d158df37ffd67892b58fde426292cce64c910f0fd1e0a,2024-04-05T12:40:52.763000 CVE-2024-21849,0,0,96989f2185cf65634de99c3c7add3d53df2db07e8a83a9a08d8d6ee18a2d5ddf,2024-02-14T18:04:45.380000 CVE-2024-2185,0,0,9581f0db66d45d4565aa3c630ed27e51d0d5b119497ed85d856079c067eccf9d,2024-04-10T13:23:38.787000 -CVE-2024-21850,0,1,463bfd3773f0419e4fa1af5c936c30e0da32f02c3a0469ad128b5775fc1cd264,2024-11-15T14:00:09.720000 +CVE-2024-21850,0,0,463bfd3773f0419e4fa1af5c936c30e0da32f02c3a0469ad128b5775fc1cd264,2024-11-15T14:00:09.720000 CVE-2024-21851,0,0,8e398aac12bbb21ba05513b47999f67a62b40ba9b522286a8a37a1d73bfd4876,2024-09-09T12:21:53.383000 CVE-2024-21852,0,0,e09fcb0f4086f4ac6c48d1ca3fa7a5e41e6f642875943dbe00f653a811530b98,2024-02-07T17:15:05.653000 -CVE-2024-21853,0,1,ea7cc2deac6ab8708b41273f3995d863656691743da43d80951ae3039018caa8,2024-11-15T14:00:09.720000 +CVE-2024-21853,0,0,ea7cc2deac6ab8708b41273f3995d863656691743da43d80951ae3039018caa8,2024-11-15T14:00:09.720000 CVE-2024-21857,0,0,4e2443b561b772a5c97ab940abdec5cde2140f23214432cedd665dd724466d21,2024-08-14T17:49:14.177000 CVE-2024-2186,0,0,e665ec858a077f86f139194a096540ce739bac905c65aab62f9ef8dbfe496609,2024-04-10T13:23:38.787000 CVE-2024-21860,0,0,30ba943973f6d6734369afd4519408a3b514173a6e8d04e4b4f9aa07930fea0e,2024-09-09T12:21:53.383000 @@ -245852,7 +245894,7 @@ CVE-2024-22180,0,0,18a45d8f6659d188faad8fb1bacbe12becae8c7c4918462b5af541fe52b90 CVE-2024-22181,0,0,2af604318511689351820fe608b306ed17138cbb3ba282414427968a6e6eda36,2024-06-10T17:16:18.890000 CVE-2024-22182,0,0,b8c6625a5282a72f76fb60314413b773d9f3fb9c9d9f485e5d536e19dd0bfd59,2024-08-12T21:15:31.830000 CVE-2024-22184,0,0,e3b13ffe675f8579db3776363f4670ba9137f26137c3f424c46d120f2b78c4bf,2024-08-14T17:49:14.177000 -CVE-2024-22185,0,1,772fdb08228087be60124779d95b96f1cbe476d6589862dcbaf74ee1accd6b2a,2024-11-15T14:00:09.720000 +CVE-2024-22185,0,0,772fdb08228087be60124779d95b96f1cbe476d6589862dcbaf74ee1accd6b2a,2024-11-15T14:00:09.720000 CVE-2024-22186,0,0,59ecddd100ddcae06a7ecf9fc641630f9ab4f57ca25d5313e480ef6c07a40e52,2024-05-28T17:15:09.680000 CVE-2024-22187,0,0,764c633f29a9b7a4988eca707a5f5a20cd222e9e3850a0ea108932eed046a25b,2024-06-10T18:15:25.660000 CVE-2024-22188,0,0,a96bd9db4651dc0f50b7bacc9da06b067d0f934ea4749ebcd5dd380cc8b5a64d,2024-10-07T19:36:44.783000 @@ -246458,7 +246500,7 @@ CVE-2024-23192,0,0,229d70b1e4ced5112284ee834fb2370481e129639e639f46dbf40dcc4e6ad CVE-2024-23193,0,0,94365d7de57d8ce926c2c7ac02ef89a93b80020f4b39156cd6a94092ab50fac2,2024-05-07T01:15:06.497000 CVE-2024-23194,0,0,089c2460385496ae22f7a90553a23720c6ebf4be452b1a50dfaeb1dc5b6ea1ab,2024-07-11T13:05:54.930000 CVE-2024-23196,0,0,e45d2b288ffc42c77c53256d3583d28293621dd89d142259811f8fe52d06b396,2024-02-10T04:06:14.577000 -CVE-2024-23198,0,1,21e5938f4d74c8281bf8790da1b84875167859241f1d6235396b8f1f5665d0ec,2024-11-15T14:00:09.720000 +CVE-2024-23198,0,0,21e5938f4d74c8281bf8790da1b84875167859241f1d6235396b8f1f5665d0ec,2024-11-15T14:00:09.720000 CVE-2024-23201,0,0,2015a286fe1ca1d8b9078d39d11c89a41b6be37be9d18a49416dd892d150a982,2024-11-01T15:35:09.553000 CVE-2024-23203,0,0,35efc69ad503e337d3e396ab83791d4158b674a366899f0534bda8815d3c1835,2024-03-13T22:15:09.117000 CVE-2024-23204,0,0,afae0f8b3e19ab8973af8b7a3b489e4bd91d0fdadf5faf2aa71183f3a9158566,2024-03-13T23:15:45.887000 @@ -246575,7 +246617,7 @@ CVE-2024-23308,0,0,ab780e3d459f30026b937323fd197ac1b2578a1b6664154111931dd5ecc07 CVE-2024-23309,0,0,72e0380a6f27818b0b36a759ba1b1c9597b21f436a8e41a403b9b735fe7f79d2,2024-11-08T18:27:00.643000 CVE-2024-2331,0,0,4ae45893d8915acf1a1828719d664bd22bca980785ca070e6d05565096dfa696,2024-05-17T02:38:10.643000 CVE-2024-23310,0,0,4179f0bf8f658e9935c63c9c35f42aea4d1771a834836f01ffe3c75ee4f84241,2024-04-02T15:15:52.963000 -CVE-2024-23312,0,1,4477f8277fe034df488348d28f3b9f7f99a0ea82cc211cd950a7583d9be85470,2024-11-15T14:00:09.720000 +CVE-2024-23312,0,0,4477f8277fe034df488348d28f3b9f7f99a0ea82cc211cd950a7583d9be85470,2024-11-15T14:00:09.720000 CVE-2024-23313,0,0,423eb5c8ce01f4dbd3ff16b47be219cc8721b4595695d3e2421bc510a6ef2931,2024-04-02T15:15:53.050000 CVE-2024-23314,0,0,79ce3965804323389139e64c1c8f6318f01cdd30218fdcb12aed534db8534787,2024-02-14T18:04:45.380000 CVE-2024-23315,0,0,c1f98dd0e29176e2436efe403071800577257a937d629bb3b7d47f8a4b4769c7,2024-06-10T18:15:26.180000 @@ -246902,7 +246944,7 @@ CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582c CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000 CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000 CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000 -CVE-2024-23715,0,1,be9ca32355354e8e866a9cc5f9269e48161aa8200c02ba6e7048918c9ef2bdb8,2024-11-15T14:00:09.720000 +CVE-2024-23715,0,0,be9ca32355354e8e866a9cc5f9269e48161aa8200c02ba6e7048918c9ef2bdb8,2024-11-15T14:00:09.720000 CVE-2024-23716,0,0,72aa4692fe36e515631363961ebc214b187f38d11478c60001fc03eecbbbe02e,2024-09-12T14:35:11.523000 CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000 CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000 @@ -247098,8 +247140,8 @@ CVE-2024-23914,0,0,ef84d8471f9b2e6f74b964fa20e89b8542f1e03d544d051711757b2a10104 CVE-2024-23915,0,0,26daec6c21dda6d5d37818379de58533357f885ea52deb2834a097462a07bb95,2024-09-20T19:07:32.673000 CVE-2024-23916,0,0,5077cd24018e805b075cf41f1ccac823739f63acd7350dd61dccd4ccae77329c,2024-09-20T19:07:23.750000 CVE-2024-23917,0,0,f3236f3886ac3a298029762564187aed866f84d01e9365abb654a21b0d966829,2024-02-09T01:05:22.180000 -CVE-2024-23918,0,1,a581ec956a0e5f03f546bdeba0ea8e1c1eb252ebc5d36e878f10821dc458712f,2024-11-15T14:00:09.720000 -CVE-2024-23919,0,1,9dd58f42865811581de44d643f73ccfe6cc8b3603f753f451294afffa7a13d2f,2024-11-15T14:00:09.720000 +CVE-2024-23918,0,0,a581ec956a0e5f03f546bdeba0ea8e1c1eb252ebc5d36e878f10821dc458712f,2024-11-15T14:00:09.720000 +CVE-2024-23919,0,0,9dd58f42865811581de44d643f73ccfe6cc8b3603f753f451294afffa7a13d2f,2024-11-15T14:00:09.720000 CVE-2024-2392,0,0,a1f238224b889878ea8101bb03eb85f7363cbe3f032b78dbb59584257d093c6d,2024-03-22T12:45:36.130000 CVE-2024-23922,0,0,3574fa19d2a2f0f07ed0705fa9c0f7eca8ae68dde48fb31a4d5183868003a365,2024-09-30T15:37:28.453000 CVE-2024-23923,0,0,453ef28475b56e67e0565d9d37a0863ba038aa3a0c6bf6afee123eb3bd3aa3c8,2024-10-03T18:07:35.977000 @@ -247715,8 +247757,8 @@ CVE-2024-24978,0,0,e773fada76c847170a8dd98c98b8cc13106b8bdbc3716bb8963410e73fd17 CVE-2024-24980,0,0,3fdf73457b919755fcf59939500686a4e764152c575eabbdfb315f29409758ab,2024-08-14T17:49:14.177000 CVE-2024-24981,0,0,4778c6815162129c19c427caa98fb743cbc1e80e4ace882077c64de825799123,2024-07-03T01:48:32.340000 CVE-2024-24983,0,0,e552e4af213b0ab57adb4ba19aeb0c4530827148e23a2e1c19c3f213b7957135,2024-08-14T17:49:14.177000 -CVE-2024-24984,0,1,4dcebd05c282433571c5f44d027f6863b80244b646728b73dd1c6e746e10144f,2024-11-15T14:00:09.720000 -CVE-2024-24985,0,1,2e4456d663edc08a6b8175093c8533ba894736097f8ac984a8f2a082bb15009f,2024-11-15T14:00:09.720000 +CVE-2024-24984,0,0,4dcebd05c282433571c5f44d027f6863b80244b646728b73dd1c6e746e10144f,2024-11-15T14:00:09.720000 +CVE-2024-24985,0,0,2e4456d663edc08a6b8175093c8533ba894736097f8ac984a8f2a082bb15009f,2024-11-15T14:00:09.720000 CVE-2024-24986,0,0,77b300319c7ee1ccc9e61dd316d3dcaa5e475b38e28730cee5e5deb88cc75c00,2024-09-06T20:23:48.690000 CVE-2024-24988,0,0,9e4f6f88273498e8474a945212f722bcba31b159d34f99737f4277d72dd9fb6e,2024-02-29T13:49:29.390000 CVE-2024-24989,0,0,81a2a87b35bcbca4ec34d5e22214bdf976ca0d87c889c16ca05e31de151ff5e5,2024-06-10T17:16:21.607000 @@ -248033,7 +248075,7 @@ CVE-2024-25468,0,0,3864d1f55affa64d70277d4fba0d3f88289336bf2eb6f1b29a5e8a856bd9e CVE-2024-25469,0,0,557b8a68044694189954e70cb5b5e2ebf1ecf04b2586629d7bb1e69d0af34ee0,2024-08-27T19:35:14.107000 CVE-2024-2547,0,0,146fae91278ac89c915ff47054ab066cf474c37945462dcf0d1632a5cd39af51,2024-05-17T02:38:18.377000 CVE-2024-2548,0,0,40cde8752e3c8848aae41da66672115ef0cd24cbd123858c9556b9dd3342115f,2024-10-17T15:52:32.283000 -CVE-2024-2550,0,1,80a98738149437f8501318cb0354419af6631f135c3eeab2998e07464a173794,2024-11-15T13:58:08.913000 +CVE-2024-2550,0,0,80a98738149437f8501318cb0354419af6631f135c3eeab2998e07464a173794,2024-11-15T13:58:08.913000 CVE-2024-25501,0,0,53c57009bf13ac9e81165c240313efc6336b1030bc10f61986ac8903ee95ed6c,2024-08-27T20:35:14.160000 CVE-2024-25502,0,0,d9aa39f94cfb1820b327a0e3490f96eeb91b5ac2a113d9f7ad8c92fe65038e88,2024-08-22T19:35:15.140000 CVE-2024-25503,0,0,d18daea47533c0b519e93decb5b52383220a142cd875d19e67dca0b7259c8ef8,2024-08-19T20:35:07.610000 @@ -248041,7 +248083,7 @@ CVE-2024-25506,0,0,331fc2aa8008abcbe7529c8e1f902eaa8f01961e899bf76c0c02400b4802e CVE-2024-25507,0,0,d01f5e6d07dd4234554e701d042eeba7ebff258fccd1723712b33d5ea82451cc,2024-07-03T01:48:51.430000 CVE-2024-25508,0,0,90339bb48fc1cfbfbe04d77c441539b4eb12357264469da7dce73e670017a9bc,2024-08-01T20:35:25.160000 CVE-2024-25509,0,0,43932d598b677151ec148e2c6fe397dad54fbcf37bcb8324dfd2608c97fcef93,2024-07-03T01:48:52.240000 -CVE-2024-2551,0,1,79910b59d2bb2193a7324aeec5862a9391a639b015c614cba847d4ed2564749d,2024-11-15T13:58:08.913000 +CVE-2024-2551,0,0,79910b59d2bb2193a7324aeec5862a9391a639b015c614cba847d4ed2564749d,2024-11-15T13:58:08.913000 CVE-2024-25510,0,0,861a29eb687c50c63d985cbe3b942fd6dcb2a5ed2f01fa956e441eba24a1e618,2024-07-03T01:48:53.193000 CVE-2024-25511,0,0,45841a27c05abdda5e88c8662dccb1b2ce0612679a4549ee5889dfadc7c35b1c,2024-07-03T01:48:53.997000 CVE-2024-25512,0,0,30e70416daf9bc731aa2cc10d3309e50db92ad7a3860e9d31d00559db96a5244,2024-07-03T01:48:54.810000 @@ -248051,7 +248093,7 @@ CVE-2024-25515,0,0,9552fe583425297ae50d0d3fb3aef41d1ff7ccab24982b4401e1de2eb3120 CVE-2024-25517,0,0,2d5bfca64a87833b4bf7fcaafb0e1c6c75a7c73d9c79ee7ef678b3593647ad5d,2024-07-03T01:48:58.093000 CVE-2024-25518,0,0,4f656721efc43904c6c1b7982efa8acf36cdc63eca4dc6a739fe56633964cd05,2024-07-03T01:48:58.917000 CVE-2024-25519,0,0,1e9856bf69a42caa8c87d9efc940250a43a6d8133746dd534ead5365966d2794,2024-07-03T01:48:59.717000 -CVE-2024-2552,0,1,59109df70190e92cc64bc844f9b780348086a8d582ef6ac1b462123b55d8d538,2024-11-15T13:58:08.913000 +CVE-2024-2552,0,0,59109df70190e92cc64bc844f9b780348086a8d582ef6ac1b462123b55d8d538,2024-11-15T13:58:08.913000 CVE-2024-25520,0,0,ef18d590b5f58eb9bb7ec3b39fa017b59c50accc89216dbff8503dbc68a15ded,2024-07-03T01:49:00.550000 CVE-2024-25521,0,0,92b6345ac0bc5186de3acc2eb108650c8fdf5ebf11f9b3b43771a2e77e69def2,2024-07-03T01:49:01.367000 CVE-2024-25522,0,0,20bcbb11d104068e82316fe242ad3d32a079fcd34efa7624e69f8b13b3bb1c9c,2024-07-03T01:49:02.173000 @@ -248079,8 +248121,8 @@ CVE-2024-2556,0,0,d03e7f1784653a97f31dc4e2fd10447d6f2db7c14a279d58208c6467bb9e5b CVE-2024-25560,0,0,e7b7bd3b9b2bd4e7d45c7cc73f2078dfc39996dd7babf1c9bfbdcc4206fa2bb7,2024-05-08T17:05:24.083000 CVE-2024-25561,0,0,76009d8f511bac009453b1046a38e646e70f224b7d5698b6c84d95afebbbc42c,2024-09-12T18:50:32.413000 CVE-2024-25562,0,0,691463f616aff0c576eb38540790057cbc3fed7a44a49e5b85921154797d7fac,2024-08-31T03:40:47.857000 -CVE-2024-25563,0,1,553e75dc718d3a55fc37b920936c83b115d44c23976cf775fe2948693ea470ed,2024-11-15T14:00:09.720000 -CVE-2024-25565,0,1,a39195a6496ab48ad36fcbb2ea938d1e2b566d2088e4bbb25abaf65edc8f7619,2024-11-15T14:00:09.720000 +CVE-2024-25563,0,0,553e75dc718d3a55fc37b920936c83b115d44c23976cf775fe2948693ea470ed,2024-11-15T14:00:09.720000 +CVE-2024-25565,0,0,a39195a6496ab48ad36fcbb2ea938d1e2b566d2088e4bbb25abaf65edc8f7619,2024-11-15T14:00:09.720000 CVE-2024-25566,0,0,ce8c284cdb4acbcf113905cd78211b80901c4f2cd5428d38bfca89845635eb11,2024-11-08T15:38:56.150000 CVE-2024-25567,0,0,312765bfd106474db1f5aba6392fe2ea9517594a364566ff599d59e6c885b134,2024-03-22T12:45:36.130000 CVE-2024-25568,0,0,1f3b68eecdadc5fc067f1c6a6f3d0aecf716d94021ea1c3d5bfe3c2dbc91ce3d,2024-08-01T13:47:46.990000 @@ -248160,7 +248202,7 @@ CVE-2024-25643,0,0,b37cbe067d8add39730eb4b37fe5e8af21dcf6913d79a4bada6119cce1ed1 CVE-2024-25644,0,0,b702cfb10f1d9840e7089aa6d4444498e1a0b1a9f6491295ca80b70c56a42bd0,2024-09-28T23:15:12.907000 CVE-2024-25645,0,0,6bd46b6b76bf2191c2da23dbf63dbdf0c2ad3d8c1e837e15d8adaddae98d01c1,2024-09-28T23:15:13.020000 CVE-2024-25646,0,0,a101219cbb661ecbc967b4403965684b4e383408a09ced0696a5c771abd09b61,2024-09-28T23:15:13.110000 -CVE-2024-25647,0,1,004a6fed6424dc49a02739de5a84f329990c1b44f0437974b2148e4b82822e29,2024-11-15T14:00:09.720000 +CVE-2024-25647,0,0,004a6fed6424dc49a02739de5a84f329990c1b44f0437974b2148e4b82822e29,2024-11-15T14:00:09.720000 CVE-2024-25648,0,0,43a3c9df6a9798012b99a2670068513af50de7590b4bfb346569d85e9cedfb11,2024-04-30T17:52:35.057000 CVE-2024-25649,0,0,699eb0c1b6c1eb28f54aa653e10ca84f6b536f18d39e73450a463cbb2c01c545,2024-08-27T19:35:14.950000 CVE-2024-2565,0,0,343041114de587054fc8697fd61433e361f1d5090f96a5bc5840cfbd0d3fa764,2024-05-17T02:38:19.613000 @@ -248428,7 +248470,7 @@ CVE-2024-26010,0,0,0e2e4323cef6d8344800a888bb1e02076ffd37daaab8c643e84c0ccb4ef63 CVE-2024-26011,0,0,8bd3606941f97d4a6211382e409999ead68edcd45e5344e383437669201d7fe9,2024-11-13T17:01:16.850000 CVE-2024-26015,0,0,eda3ef05e78350dbdf4bafb3ceec1e42a75ece53c103b8d65ceafa697330841d,2024-09-09T16:12:36.640000 CVE-2024-26016,0,0,53e5a707ce7137aca290d896e582e8d2a49565424594d76b59ea5a9464cdabc2,2024-02-28T15:15:09.320000 -CVE-2024-26017,0,1,29b69c6327ca7e9581060ad10131cb64e7089e27b058bc4b558a5897a14d5b73,2024-11-15T14:00:09.720000 +CVE-2024-26017,0,0,29b69c6327ca7e9581060ad10131cb64e7089e27b058bc4b558a5897a14d5b73,2024-11-15T14:00:09.720000 CVE-2024-26018,0,0,3b204ab00ea9e5a4e89dbbd72602f66cfac87fb0fd92b5110c31c614c83a90a6,2024-10-31T18:35:08.353000 CVE-2024-26019,0,0,c8f3817ebef24fc08c083645b2146c067190c6ce99f258e914d83a748ccfa09f,2024-04-11T12:47:44.137000 CVE-2024-2602,0,0,68545756683921883a71e009514104eaecb0a76db274a20107afd513be41a06e,2024-07-12T16:39:51.080000 @@ -249490,7 +249532,7 @@ CVE-2024-27197,0,0,b073898ec17a08d3b1a11c7b0c90ebe35fb389ca08bf315d6421cc3959bbe CVE-2024-27198,0,0,bac9f46c484adf9de6a634098336c1e11ababf2b56401655185bb4c8e491abfd,2024-05-23T17:57:49.653000 CVE-2024-27199,0,0,b7165fde30d8edec4986915f0c4ca7947c54838852015584a90e5050c5a6077c,2024-03-11T15:15:47.663000 CVE-2024-2720,0,0,85869b201641191d674a3d8cb0449932108d6f33187a3194c3a297f2e914d0b6,2024-05-17T02:38:27.590000 -CVE-2024-27200,0,1,85aaff6fe226984a748b9a99f9d807d66ef62a7ac2cdd3e0e23654f62a36798c,2024-11-15T14:00:09.720000 +CVE-2024-27200,0,0,85aaff6fe226984a748b9a99f9d807d66ef62a7ac2cdd3e0e23654f62a36798c,2024-11-15T14:00:09.720000 CVE-2024-27201,0,0,f4057db407cc0b2cb15b83d5bfcc727fb8fffbe5df642064a2f39b01d31b3338,2024-04-03T17:24:18.150000 CVE-2024-27202,0,0,dec3b871d77de488d2204727c8b45ba74ac889892271b3051ec433c7b5758780,2024-05-08T17:05:24.083000 CVE-2024-27204,0,0,21c5c3d644ab35ec9e83742f3138cff8265e6d21b8f7f41fe9d62eba43137806,2024-08-01T13:48:17.703000 @@ -250135,10 +250177,10 @@ CVE-2024-28021,0,0,d3b281f790deb0e028449c0547c897de30755152601ff8bfb79129f9a9b61 CVE-2024-28022,0,0,9077c2e7130f01aa732cd3390b7c4ae4caddc752d7d580463d4dc1ef8afd6333,2024-10-30T14:24:16.353000 CVE-2024-28023,0,0,95e92873beee8f336f4c9cf0229eba10eb803f09aac2855be4773e8156ab7584,2024-06-13T18:36:45.417000 CVE-2024-28024,0,0,b0c6ecf3013967d3efc0618c902b41d32c3ab34672126ec38ab8cb1948f54213,2024-10-29T15:15:09.697000 -CVE-2024-28028,0,1,7f1683c7d8d2298a0f21e5354077b989a81758b917776e2c2063898bb751c521,2024-11-15T14:00:09.720000 +CVE-2024-28028,0,0,7f1683c7d8d2298a0f21e5354077b989a81758b917776e2c2063898bb751c521,2024-11-15T14:00:09.720000 CVE-2024-28029,0,0,9e4bd22dac92b2ff82c0b0c8dd5314b634ca4785041ee3b60958f95130ac218e,2024-10-17T19:15:22.063000 CVE-2024-2803,0,0,22f2c86ca1c88d78ce00e8d709ea3d268b625d199c05ddcd35d56c7f9860f31d,2024-04-04T12:48:41.700000 -CVE-2024-28030,0,1,383ba087a7d9e03f3729f2d371b6b408a3b63145fc91da4126609ef755900230,2024-11-15T14:00:09.720000 +CVE-2024-28030,0,0,383ba087a7d9e03f3729f2d371b6b408a3b63145fc91da4126609ef755900230,2024-11-15T14:00:09.720000 CVE-2024-28033,0,0,b3c00174c596428be92cce453e3547082c3550d2faa9dae834e019420834a8b4,2024-08-02T17:35:33.770000 CVE-2024-28034,0,0,1f04dc65f231aba26563c955179bb55e818d7cb96adc110022207010427ec021,2024-11-05T15:35:10.627000 CVE-2024-28039,0,0,3a8376c4c37b22221c3249737981025e902f9cb4913edf8d0bc477677335599e,2024-08-01T13:48:56.840000 @@ -250150,10 +250192,10 @@ CVE-2024-28044,0,0,467bc4d273fc147cd017e289ec4fbc7277cb9c1dda35ad3e884f62d72c51d CVE-2024-28045,0,0,bde3e039013a70b21c912b8e223d5131c889e7d6afc8ba834f2bbb61111aea50,2024-03-22T12:45:36.130000 CVE-2024-28046,0,0,e317050e5191f1a9311172b20af408b0774a96cf976a07961cd105c21cd52020,2024-09-06T18:40:14.330000 CVE-2024-28048,0,0,427932cc2219e9755e4267ffe9ddd33c638166ca04c44c64b94478c05d38f523,2024-08-07T20:35:15.970000 -CVE-2024-28049,0,1,903fc60f1b27f4554ab4c5a10c9b93b4ad52238991d04f2546cd12133e95b3b1,2024-11-15T14:00:09.720000 +CVE-2024-28049,0,0,903fc60f1b27f4554ab4c5a10c9b93b4ad52238991d04f2546cd12133e95b3b1,2024-11-15T14:00:09.720000 CVE-2024-2805,0,0,286efc9a19dc11ee0838ec500ba164305f2c14641c0d5856229be06ec762a801,2024-05-17T02:38:30.840000 CVE-2024-28050,0,0,0d145d7886c67ca4edf4d6c71f8ed46211449029687ca634366ee5c88b5e7b1e,2024-09-06T18:38:11.353000 -CVE-2024-28051,0,1,cdb08da3efbec97bcaa24b5752778d91d7dd57a757eb65acfb8041fed7e73986,2024-11-15T14:00:09.720000 +CVE-2024-28051,0,0,cdb08da3efbec97bcaa24b5752778d91d7dd57a757eb65acfb8041fed7e73986,2024-11-15T14:00:09.720000 CVE-2024-28052,0,0,c15d25a82fbb807832ff1bc94dd565bcc8e771a56ab0af0e3e3891fe636a1952,2024-11-13T18:07:42.263000 CVE-2024-28053,0,0,c6161d8eec33d0d4874e655333f8b3d42189dbff5254c952286bcd697b2efc85,2024-03-15T12:53:06.423000 CVE-2024-28054,0,0,42bd8bafc554125a5c189382c84c5d77dd5214fa492ad959b0494172465d0aa0,2024-03-23T03:15:11.510000 @@ -250256,7 +250298,7 @@ CVE-2024-28165,0,0,46715a30feb276737abc87d7ed511464bf9b4ab74c972d46bf629bd896d4f CVE-2024-28166,0,0,d799c0db8419cc219426077b2570c40e187024e21f6e37f4e3723cf31620790d,2024-09-16T16:17:15.540000 CVE-2024-28167,0,0,1d78d7f4b9ae6d1ce7ebcfb3fbb052b019794bf39b0c5c69579e1b351fc0d30f,2024-04-09T12:48:04.090000 CVE-2024-28168,0,0,e243987a138484b576941798683716902af5bc81ad25b67661951597f2bf3e0e,2024-10-10T12:51:56.987000 -CVE-2024-28169,0,1,92d5cedcb912c9098c051028b6e8a53f12eb4c9e88428141d44a812a099fe862,2024-11-15T14:00:09.720000 +CVE-2024-28169,0,0,92d5cedcb912c9098c051028b6e8a53f12eb4c9e88428141d44a812a099fe862,2024-11-15T14:00:09.720000 CVE-2024-2817,0,0,c674fcdba74ce38976cc24fe7d55a331a6fbc3ee70971f1cbb43b1b952ff96f8,2024-05-17T02:38:32.210000 CVE-2024-28170,0,0,b651a495621059669c19c3fdc9d2ee84d87fc5f846a93fbe1c30394bd5ddd768,2024-09-23T14:49:17.057000 CVE-2024-28171,0,0,33886fb8942146c369bad25646a1251c19953189c1ff16eea603f4d0cd1b835d,2024-03-22T12:45:36.130000 @@ -250644,10 +250686,10 @@ CVE-2024-28877,0,0,cc0627e9c2b6ba5f30332865405b5bc76f89994c49e4e390afd92f763c789 CVE-2024-28878,0,0,d059bd49c00a1fffb41c41d6dd95d1c802f748f752ac96eeef423a76a468b10c,2024-04-15T13:15:51.577000 CVE-2024-2888,0,0,170e6c09f0bbb2971ac1585d2092b2ec04063ebd1a1dbb82f7cb5e40a0b8e45e,2024-03-26T12:55:05.010000 CVE-2024-28880,0,0,d86d3a57226b47e9756d0e2de7fe8eb3bf99b87dc35f89b5848778ed1b1b3b47,2024-07-03T01:51:53.260000 -CVE-2024-28881,0,1,97768a675f43b2a9ca17e89ef1a1b9241165217e05a61ee26347015f5a233307,2024-11-15T14:00:09.720000 +CVE-2024-28881,0,0,97768a675f43b2a9ca17e89ef1a1b9241165217e05a61ee26347015f5a233307,2024-11-15T14:00:09.720000 CVE-2024-28882,0,0,c1fb7fe1ed5bd3e8a38fb634c7592f77c8d6a5edfc3f3375a5b593f79fbe5331,2024-11-01T21:35:02.697000 CVE-2024-28883,0,0,7608553831e95dbd64a1629b16235d631ce647c64db4d36e5f31f95004223611,2024-05-08T17:05:24.083000 -CVE-2024-28885,0,1,5188af4754e264735b29e0d598e87a2d0c27af581e6b3caee884ec6774f7009c,2024-11-15T14:00:09.720000 +CVE-2024-28885,0,0,5188af4754e264735b29e0d598e87a2d0c27af581e6b3caee884ec6774f7009c,2024-11-15T14:00:09.720000 CVE-2024-28886,0,0,c5e838328be71c5eb5c783cfb3d7b29e0393c19c1f2fbf543fbfcbc9ad011077,2024-07-03T01:51:54.130000 CVE-2024-28887,0,0,02788ece8fafa84414db815e90d6fbdcb64e36e799546da1d80bab49ab148ef2,2024-09-12T18:51:49.010000 CVE-2024-28888,0,0,ae6e6114831c183954a3ca2ab2fd4722d2fcbbd18a0d2ca68d3103846864fbf7,2024-10-08T14:14:55.637000 @@ -250716,9 +250758,9 @@ CVE-2024-28947,0,0,9d3506b7ac0d8414d56f005d3db3860beb6359f3ca23ee696b9b26b32dc4d CVE-2024-28948,0,0,306b07dbd124a47412fe3ed4c4285e5515501d0fe586cae1d827a381bd21c099,2024-10-04T18:58:14.400000 CVE-2024-28949,0,0,d5e48bc4aa20c39f513a0582c3f637deca3b5b6936a689a13ce9af3ad1e7d8d0,2024-04-05T12:40:52.763000 CVE-2024-2895,0,0,b446221d46d418d396cd9d883702efdf5b2797ce3a0ab257ce4f7a9b35ffa891,2024-06-05T20:15:13.023000 -CVE-2024-28950,0,1,d87cf536998f19ca3ea46db1e2a2b6eb63d52069373bbccf1f977f66004b1215,2024-11-15T14:00:09.720000 +CVE-2024-28950,0,0,d87cf536998f19ca3ea46db1e2a2b6eb63d52069373bbccf1f977f66004b1215,2024-11-15T14:00:09.720000 CVE-2024-28951,0,0,a076a4222e08b02e8cd2b9c67ba4cfaca5bf7589b5e41c98ae39575c74159c6e,2024-04-02T12:50:42.233000 -CVE-2024-28952,0,1,03ce4d26ea83e91549021668eb00f7a216a1167d8d20f0cad44e8ebe7a2762af,2024-11-15T14:00:09.720000 +CVE-2024-28952,0,0,03ce4d26ea83e91549021668eb00f7a216a1167d8d20f0cad44e8ebe7a2762af,2024-11-15T14:00:09.720000 CVE-2024-28953,0,0,bf15e6214517ab8261fa8ae7ceac88b061cfcb90015627f72b13aec9e1761bc6,2024-08-14T17:49:14.177000 CVE-2024-28957,0,0,99432bbf0e2944655d9b3d14025b17e0714441ee50861d2d06b13856968b6443,2024-08-29T20:36:38 CVE-2024-2896,0,0,65ede353e34c386898ba2637cfb49ad4710dca05a79d3f20095106470af669ff,2024-06-26T20:15:15.187000 @@ -250833,15 +250875,15 @@ CVE-2024-29072,0,0,50e2db556663c43fd665c3ae801a5bd36f73f0e7479a230bf4ff9553f9fcd CVE-2024-29073,0,0,c7a1ecc52b2710f20eb4ca399da6fabfc271c86a39117df7ecabe6454fad279f,2024-09-18T18:31:42.290000 CVE-2024-29074,0,0,dae045c5f696de776b77da3987f8405651ce1bf4fa99e4d5313acc43e5165076,2024-04-02T12:50:42.233000 CVE-2024-29075,0,0,5f4ceb8e1519bbaa6bc09ea81eba95b9d8df6e5520fb957f27607d429d5b6e04,2024-11-12T13:55:21.227000 -CVE-2024-29076,0,1,9b074b5afc626db7949d79102d07b510201b2d6430e2467a96a36ea9f4304fec,2024-11-15T14:00:09.720000 -CVE-2024-29077,0,1,1e95b9d443d21cf896eb45bf7d1fcaa0325610a5924b0e8674ef0156a8d615bc,2024-11-15T14:00:09.720000 +CVE-2024-29076,0,0,9b074b5afc626db7949d79102d07b510201b2d6430e2467a96a36ea9f4304fec,2024-11-15T14:00:09.720000 +CVE-2024-29077,0,0,1e95b9d443d21cf896eb45bf7d1fcaa0325610a5924b0e8674ef0156a8d615bc,2024-11-15T14:00:09.720000 CVE-2024-29078,0,0,a4fab3b35091f8fd08881f2bf49d899dc5478faeb8df15472b3560684c1a5420,2024-05-28T12:39:28.377000 -CVE-2024-29079,0,1,f7b85dae4ce1b1f9a8c3b18fdea1df0834d4beca921c1f1207dddda2504eb216,2024-11-15T14:00:09.720000 +CVE-2024-29079,0,0,f7b85dae4ce1b1f9a8c3b18fdea1df0834d4beca921c1f1207dddda2504eb216,2024-11-15T14:00:09.720000 CVE-2024-2908,0,0,3845fc124bc9f710736d5363f9b086190df4e2925cb4e5b4a7eb9455fd55b3c6,2024-07-03T01:53:38.703000 CVE-2024-29080,0,0,d70af9cf8ca134f2fc32b6a3edafa05fe0b9ef4b57ba184ff012b1c5ad246169,2024-11-13T16:35:13.577000 CVE-2024-29082,0,0,f3bffdf8f114e3bc255f264ae5fa99c37ecaaf471e91670eb2b8e47c9b14fc4a,2024-08-20T17:11:31.787000 -CVE-2024-29083,0,1,30506b29b8a9faeff5b3a579042010fec9025d83620091d428bc84c37cc3aa3f,2024-11-15T14:00:09.720000 -CVE-2024-29085,0,1,61bb10aaa512be477286344224796ddda123654970be996af0175471c9a596c2,2024-11-15T14:00:09.720000 +CVE-2024-29083,0,0,30506b29b8a9faeff5b3a579042010fec9025d83620091d428bc84c37cc3aa3f,2024-11-15T14:00:09.720000 +CVE-2024-29085,0,0,61bb10aaa512be477286344224796ddda123654970be996af0175471c9a596c2,2024-11-15T14:00:09.720000 CVE-2024-29086,0,0,a506e441c3bf25764a8b903d5765d986b768db67b23cfb3ff53fe13b9a27e4ba,2024-04-02T12:50:42.233000 CVE-2024-29089,0,0,0e8f97a635f9f0c1a64450754b2a18a9e0c4596034f0fadf2dfda26a23dacbbd,2024-03-20T13:00:16.367000 CVE-2024-2909,0,0,0e3061bf6a0e2ec3e09b8019aa64a03564628e11a8822cb14e5d6cf0553832b0,2024-05-17T02:38:36.843000 @@ -252252,7 +252294,7 @@ CVE-2024-31069,0,0,36481f1718994048a20a15ed67941e1a51f806f748a1e21efe82cd8268700 CVE-2024-3107,0,0,26336691309b77f9b9ed1d01af8da80f39f18aa81e7e280fa98e64adbe096bda,2024-05-02T18:00:37.360000 CVE-2024-31070,0,0,6d92bf7f941ba8b0a97929fd581428fe88083485ec4febaa08ecbb4f73e2d00c,2024-09-27T17:54:52.130000 CVE-2024-31071,0,0,5282cdb502099fd214901289f849e21cb27e95440fad17b9c6193e904f64fc7f,2024-09-09T12:21:53.383000 -CVE-2024-31074,0,1,3b76cf2ad37e2f164c566fefe158023c77a92dd5d2f4289877bafeb8205e5c44,2024-11-15T14:00:09.720000 +CVE-2024-31074,0,0,3b76cf2ad37e2f164c566fefe158023c77a92dd5d2f4289877bafeb8205e5c44,2024-11-15T14:00:09.720000 CVE-2024-31076,0,0,b516579659528296f384d5fc2847472b67a1e9cb8089efce1b81514ba7455edc,2024-07-15T07:15:03.810000 CVE-2024-31077,0,0,4ee4934fb388f0c6aecae8ff57d029bcb5098c8db84cc409e7cf47f67893eb97,2024-08-01T13:50:46.110000 CVE-2024-31078,0,0,b0bbe41ef9db9ceb087fcafc0c2efaa7f33c48976a0bab70d091b39f8b940d0d,2024-05-07T13:39:32.710000 @@ -252319,9 +252361,9 @@ CVE-2024-31146,0,0,b342a247282dd82cf1f52d9b8502d9aab215fbb81ba82cfea4edb5bd4cfeb CVE-2024-3115,0,0,5c883fd956848ebd732b9328b2a6f07d0a52d1e0d056f15c570d933f5c859482,2024-08-30T14:15:16.060000 CVE-2024-31151,0,0,16248b06da0978ae9664e2116ba9b7b948b4a7588c1b7fb8035d9df807e84827,2024-11-13T18:19:26.453000 CVE-2024-31152,0,0,227fcf0f32e5b111ad71b6918e612548f3ac0e6ca0eaa271448a249647dc5c85,2024-11-13T18:15:31.597000 -CVE-2024-31154,0,1,e597323df7123de6822eaac00675682cf71ee9dcb950706a62d0094f1cd1d86b,2024-11-15T14:00:09.720000 +CVE-2024-31154,0,0,e597323df7123de6822eaac00675682cf71ee9dcb950706a62d0094f1cd1d86b,2024-11-15T14:00:09.720000 CVE-2024-31156,0,0,0196e496a3b7a6255c15a0e2200e98a2f53059591b5db0d973b7d4520d1de2fe,2024-05-08T17:05:24.083000 -CVE-2024-31158,0,1,ac4c7692175407d91e3bc1eb8d96a9bb32ce577d22528683698bc9900cf8691e,2024-11-15T14:00:09.720000 +CVE-2024-31158,0,0,ac4c7692175407d91e3bc1eb8d96a9bb32ce577d22528683698bc9900cf8691e,2024-11-15T14:00:09.720000 CVE-2024-31159,0,0,1cdbc9c62e9fa77de1f1d4073e38d32145ad47af8833ae9b854fc846b51fea1e,2024-08-16T20:27:40.107000 CVE-2024-3116,0,0,9b51187c570a5abfd3b1d9bb042dab999267b982fd372840204c0edfde974aa9,2024-04-23T02:15:48.310000 CVE-2024-31160,0,0,df48ab606466bd66cd539890b6337283ccfce4c5ec6123b8878b9c85f80b785c,2024-08-16T20:27:16.697000 @@ -252512,7 +252554,7 @@ CVE-2024-31333,0,0,fffa52c47c5b8e1c2bcdc9fe3c080f43dd069e7ef7813f142892cae434fbd CVE-2024-31334,0,0,69828e729ce39e0f18173fda19e01cf9f4d39333d7345a58dacf94a302bbacd6,2024-07-11T15:05:41.960000 CVE-2024-31335,0,0,3a5c3c43b9344b158e79d76d5bd0e2d36d3e7822b50bec9afc211045c26c9812,2024-08-01T13:50:52.347000 CVE-2024-31336,0,0,e16f98988b82130b2e32557c399f0ea25778a1838eb9ccce21afc0b2ed5c5a95,2024-09-13T01:15:01.980000 -CVE-2024-31337,0,1,211cc0c863ee5c8d748051b42330bf23dfc862367b588e297bbc4c9eb5d837ca,2024-11-15T14:00:09.720000 +CVE-2024-31337,0,0,211cc0c863ee5c8d748051b42330bf23dfc862367b588e297bbc4c9eb5d837ca,2024-11-15T14:00:09.720000 CVE-2024-31339,0,0,cd4c96aade7176a5aa7427f1e13d7eb03c1e703de2eb92c3c6c97472cece1e5c,2024-07-12T16:11:34.910000 CVE-2024-3134,0,0,29c3b545a5da0a472480af2af3f9f3acedbe4b841a8f6f121606a369bcd8fa7c,2024-05-17T18:36:05.263000 CVE-2024-31340,0,0,69d2a170836208f6faad46a647a02e1d14f5dbc15c6da296b85bfb3a229fe567,2024-07-03T01:54:45.633000 @@ -252587,7 +252629,7 @@ CVE-2024-31402,0,0,c29db4a048ec9774ef548a289fc2a98cd30777530f3e94468f19f6b59c56b CVE-2024-31403,0,0,0224148112c12b7ed3a671555d8cb853847c387c0a01fd25254394bf7f9de8b8,2024-07-03T01:54:49.817000 CVE-2024-31404,0,0,4256fd8adbfc33fbeafded726cd549f291f03694e3ecf73a230c9ad3cdb8eef9,2024-06-11T13:54:12.057000 CVE-2024-31406,0,0,50456975bcaa7f8217ed5d32434dc8fe15a49c6e53ad431c822a1405fa86be01,2024-07-08T14:18:24.767000 -CVE-2024-31407,0,1,15a938a68afa06caa5faf91db976ebbae46b8f74be661e9dc8d5d3433a567064,2024-11-15T14:00:09.720000 +CVE-2024-31407,0,0,15a938a68afa06caa5faf91db976ebbae46b8f74be661e9dc8d5d3433a567064,2024-11-15T14:00:09.720000 CVE-2024-31409,0,0,09ade636686018d011934a2d430e86d633c432ebce6a25dfdd22659ad619bb0a,2024-05-16T13:03:05.353000 CVE-2024-3141,0,0,f613ac942cd4fe27f02940a465f775f9bffd5aa44eaf65a9fb94b5d68958c63e,2024-05-17T02:39:44.593000 CVE-2024-31410,0,0,23155e757f76d6df45e3314d3045af8745f87c8b7ddeb1d4a8dad059bea073da,2024-05-16T13:03:05.353000 @@ -252756,7 +252798,7 @@ CVE-2024-31680,0,0,c4628bff4524f4ba02ba3d3e5f2d1afd3e6b045a8d32604fb16cfbf01a187 CVE-2024-31682,0,0,6ad84277376005bde3c5be691a4699ed2a494d2e47836225d1c8ccbe4273b358,2024-10-29T14:35:17.517000 CVE-2024-31684,0,0,a58e80e535316094d398f75f99933a7946ff10472558d364c59331628a9ef154,2024-11-12T18:35:08.927000 CVE-2024-3169,0,0,b6d2ffb09103c8b8a3976e1d11af5d86787ae2ffc33eb4178c248279d95ed274,2024-08-01T13:56:22.240000 -CVE-2024-31695,0,1,fc44d9cb1da1273e05dbd57bee60e9de07dbf071072ff6d9a88b80b1a406cc2b,2024-11-15T13:58:08.913000 +CVE-2024-31695,0,0,fc44d9cb1da1273e05dbd57bee60e9de07dbf071072ff6d9a88b80b1a406cc2b,2024-11-15T13:58:08.913000 CVE-2024-3170,0,0,e5d3e527beb338f17b4d7e88e470a76429efa4bde538f57bcfe45fe38f4493ae,2024-08-01T13:56:23.270000 CVE-2024-31705,0,0,360c5213fb2e781c07e5b26068537bfd39f5bcae9363979b2bff285237ce8d8a,2024-08-20T17:35:05.360000 CVE-2024-3171,0,0,7ac04b89850dd4c13fd178af0a23f600897d741bf0b6409f6d9c0faa5fbe4cd3,2024-08-01T13:56:24.363000 @@ -252997,11 +253039,11 @@ CVE-2024-3204,0,0,5a10b779eb237794920970ea98df609533768062f7220aad3ec409486f83f9 CVE-2024-32040,0,0,2a59e6bf326f1328d8546c65d2762aad2ca566269dcea32017aa265f455e3c0b,2024-06-10T18:15:32.390000 CVE-2024-32041,0,0,bef43cb3c4ff2b6bbee1ac08a3a8a3150c93da1520ec94fc65261262f1d069b3,2024-06-10T18:15:32.483000 CVE-2024-32042,0,0,355f48ff21d72da3b9838bdef5e12f2a2c2d8ea5a789f4872ad15499dbe5842a,2024-05-16T13:03:05.353000 -CVE-2024-32044,0,1,29fcd2044604ba1daf71b4a358b0229edcb866736174ea5add1cd18e60954863,2024-11-15T14:00:09.720000 +CVE-2024-32044,0,0,29fcd2044604ba1daf71b4a358b0229edcb866736174ea5add1cd18e60954863,2024-11-15T14:00:09.720000 CVE-2024-32045,0,0,d9b3b8d7cbb47251e891c2a2067a997e9d9e0aef9dd4387a3cd863053ad6ba61,2024-05-28T12:39:28.377000 CVE-2024-32046,0,0,127aa65607887fd88339f17f0e1e9b6c2609d669344bd9783292254a6884d7da,2024-04-26T12:58:17.720000 CVE-2024-32047,0,0,a198c8a79835b1d83471515e78aae6b4f1f4ae4457845d496dc5b497e6e9e88b,2024-05-16T13:03:05.353000 -CVE-2024-32048,0,1,dcbb7d2b1b84763f8715a6da1c30e312b2c12ac8e1ce8a396f9e0f38683d522c,2024-11-15T14:00:09.720000 +CVE-2024-32048,0,0,dcbb7d2b1b84763f8715a6da1c30e312b2c12ac8e1ce8a396f9e0f38683d522c,2024-11-15T14:00:09.720000 CVE-2024-32049,0,0,d35a34bd25ca74b14076b651af92560e4e0a548295ced56eebf406c2acadf1b2,2024-05-08T17:05:24.083000 CVE-2024-3205,0,0,346ca69b09129b4c06727922b86e459ce3cb5d6f9647014bc2e489da71546615,2024-05-27T15:15:08.930000 CVE-2024-32051,0,0,e28a1e0c21bc5f7358767662bb9a7b790bf9856f0536eacca66c7e2c127c26a1,2024-07-03T01:55:45.237000 @@ -253267,9 +253309,9 @@ CVE-2024-3248,0,0,250b2dbd79112a5c409f75ad686b891df81af7a505fb4de44a036ccb0053b1 CVE-2024-32480,0,0,19c71cf4b4927bc3b3fafd8de700ee992dac8872f5c7a42dd66fe5bbf9c168fa,2024-04-23T12:52:26.253000 CVE-2024-32481,0,0,c54808d23bab7c98fa436bfac9ea5eb550592b31e4fb9b6afe22c10c85cad030,2024-04-25T17:24:59.967000 CVE-2024-32482,0,0,5a4b91f74f5513de658c6d05ee36d1ae3d22e82071be37fe63fc64fe4f8fa23a,2024-04-24T13:39:42.883000 -CVE-2024-32483,0,1,ec309708779c7d67d94d4ab6d1420cd4d97f5965bbeb3c95e49274397024b914,2024-11-15T14:00:09.720000 +CVE-2024-32483,0,0,ec309708779c7d67d94d4ab6d1420cd4d97f5965bbeb3c95e49274397024b914,2024-11-15T14:00:09.720000 CVE-2024-32484,0,0,841fb97965ab4479f29c48487f7eefb4217e0294c7a236e1213d3e2e18152bd5,2024-09-11T14:46:02.483000 -CVE-2024-32485,0,1,08a6921a5432a718e7fa1d48e03f42c0b05e237f0cf36089f30f72c4b222334b,2024-11-15T14:00:09.720000 +CVE-2024-32485,0,0,08a6921a5432a718e7fa1d48e03f42c0b05e237f0cf36089f30f72c4b222334b,2024-11-15T14:00:09.720000 CVE-2024-32487,0,0,9b75323b8c9e4bc0024b685cf9b8c4f1bcf527dbb8fcae997b90b5ab98a4af95,2024-07-08T14:18:29.363000 CVE-2024-32488,0,0,a412842bd8b825cf0ccc137ff6a5e549f64f0fec820d1ace6690b9c794fe8f1d,2024-08-09T16:35:04.773000 CVE-2024-32489,0,0,159e1feadca8ba00fef63951857feba1cb8efb3d2694b3ac66347dedca764d98,2024-08-19T15:35:04.270000 @@ -253446,7 +253488,7 @@ CVE-2024-32662,0,0,5f003072f7211f34b59274650cc76076b71e9dd9df104678309b3e242e3ce CVE-2024-32663,0,0,f2fcb4ba191e2db4c103fe37b60d13e4202c7ed224bd233cedba9fff1ee4aaaa,2024-05-07T20:07:58.737000 CVE-2024-32664,0,0,7b65453ace3efd93d2cd0a4f397cf5413b4c9e5ae106db66ef45b39a143d4e8f,2024-05-07T20:07:58.737000 CVE-2024-32666,0,0,585ef297a7f1cf279098360207e1cfb775ee523d89cd54ed887150532cb5d51f,2024-09-23T14:47:22.033000 -CVE-2024-32667,0,1,5ee5117ac0f3c8bdda381bf21999aa50f87a29f8ef25dae5944d192220177cdb,2024-11-15T14:00:09.720000 +CVE-2024-32667,0,0,5ee5117ac0f3c8bdda381bf21999aa50f87a29f8ef25dae5944d192220177cdb,2024-11-15T14:00:09.720000 CVE-2024-32668,0,0,fe0a58fb56fe763cf142e84ed9a793b91b7f497782b7f4a42a54a40fcca1727a,2024-09-05T21:25:38.810000 CVE-2024-32669,0,0,1c249494e22e7c275a812095677f2945379060d0cae4bdfd8500bbbde31f40b7,2024-05-14T16:12:23.490000 CVE-2024-3267,0,0,940010b55b9a616638f110687c77a6c496dcf0d2dfd170d1aa59ab5c8e848149,2024-04-10T13:23:38.787000 @@ -254137,17 +254179,17 @@ CVE-2024-33604,0,0,f300ec136103721a36b6f9e3ad22fcddf48753bfae597ae6d6eb99e8e877f CVE-2024-33606,0,0,e277f7ddb9a42d3084a4fa02dbc3b1b3d63499186ceb3e463e593da1b13af1f7,2024-06-13T18:36:09.013000 CVE-2024-33608,0,0,2634f245511a2ef8bdf0a976af80480a0940742ffc95fa320a1cb750a797cfb7,2024-05-08T17:05:24.083000 CVE-2024-3361,0,0,3987591b20407a1c515606479571376257c715748e7334237cf48ed958e6de1a,2024-05-17T02:39:52.620000 -CVE-2024-33611,0,1,cf39a65aaa20c224e34d51f4ed23923edc045062aed1a2cad8c463648c07e8b6,2024-11-15T14:00:09.720000 +CVE-2024-33611,0,0,cf39a65aaa20c224e34d51f4ed23923edc045062aed1a2cad8c463648c07e8b6,2024-11-15T14:00:09.720000 CVE-2024-33612,0,0,74c7c883d3664c00836e065c241cfad127fb1c2fb9de0c3022446dbc1326076a,2024-05-08T17:05:24.083000 CVE-2024-33615,0,0,2c0c4d1e8ef406786c1679d725fd5d6b0a90745e47351d773c9f2720f2fe7461,2024-05-16T13:03:05.353000 -CVE-2024-33617,0,1,48b1ad41b5cd3e3d5db84d8c4b46a345ab8193d6715efa3057992b1f283e39f6,2024-11-15T14:00:09.720000 +CVE-2024-33617,0,0,48b1ad41b5cd3e3d5db84d8c4b46a345ab8193d6715efa3057992b1f283e39f6,2024-11-15T14:00:09.720000 CVE-2024-33619,0,0,2684fa8fefc27f2e1a5ed51c39fc9579fbba8ac802fe77fdcca9db705628800f,2024-06-21T11:22:01.687000 CVE-2024-3362,0,0,d92169c3d8c5742c227b67545a8be3a4af52d45882987a88c4a23c2fb99ad420,2024-05-17T02:39:52.720000 CVE-2024-33620,0,0,e869b572e67eecaa04960c7c1c826ad66c9d71964f8469bf34eb9ac43afb5484,2024-08-13T20:35:09.233000 CVE-2024-33621,0,0,ed1eec35bbbbdea80d33a8bbcfc24d343e0426fb309b2aaa07ef1d5e8aa29271,2024-07-15T07:15:04.067000 CVE-2024-33622,0,0,d58465a4a66214b50b1796cf92386e687ba2dbe496bc818c44d1f85dc4a8973b,2024-06-20T12:44:01.637000 CVE-2024-33623,0,0,116f3edcd13359aa5adc6eba23f440de570db71265bf02d171d8168c6f224fdb,2024-11-13T18:43:10.740000 -CVE-2024-33624,0,1,ce1a80935469c9fb189b2f99578cb0b232bfca170955c09f368016008a1604e5,2024-11-15T14:00:09.720000 +CVE-2024-33624,0,0,ce1a80935469c9fb189b2f99578cb0b232bfca170955c09f368016008a1604e5,2024-11-15T14:00:09.720000 CVE-2024-33625,0,0,645afc1357c853e892786758021f6a244aedee60fe13b747d548e0f0fed77836,2024-05-16T13:03:05.353000 CVE-2024-33626,0,0,6efddedb3f8b7377c52729fd1e446561bd59fbdd48df7eaf407a8231acc10462,2024-11-13T18:43:57.057000 CVE-2024-33627,0,0,739561a300c8e0c5d6e0776600829ec1cdfa9e9832b6a16afdce5ca14d9efae0,2024-04-29T12:42:03.667000 @@ -254256,7 +254298,7 @@ CVE-2024-33786,0,0,4c34eaaeb6404bd11728362ca0ccaf1f06d8896bfaa0a8e30f5a7055f9db9 CVE-2024-33787,0,0,c79d3756f20fa8608bd38338556aeaa798aa21ec0e9c3dffe176487918ad4adc,2024-08-06T15:35:13.693000 CVE-2024-33788,0,0,db496e414e9eacb69df835d7ad8cccbd3f6da6b6998f07eaab69cafc694fe336,2024-07-03T01:58:47 CVE-2024-33789,0,0,1b705f261bdfdb3c7c0384a6685c74908e5e41969953d5575683a1d41efd63d5,2024-07-03T01:58:47.770000 -CVE-2024-3379,0,1,0b3639db5143904888f6d79b3c1af3e16e2bcb8e425bced038c913edaba9bb8f,2024-11-15T13:58:08.913000 +CVE-2024-3379,0,0,0b3639db5143904888f6d79b3c1af3e16e2bcb8e425bced038c913edaba9bb8f,2024-11-15T13:58:08.913000 CVE-2024-33791,0,0,4a99a46cc9bc13330a58a77df6070e766b5a533f0015633cf295877892d64b94,2024-07-03T01:58:48.567000 CVE-2024-33792,0,0,7c7c9a5cdc3e6c8c82320ec108a0ab3708c01bb96dfb27d34785495a231c6066,2024-07-03T01:58:49.357000 CVE-2024-33793,0,0,657ddfb93c384e79c20456942320d557ebaeb8c427e62d4fba5eb78b0e45cbc0,2024-07-03T01:58:50.130000 @@ -254452,13 +254494,13 @@ CVE-2024-34019,0,0,ff720c73d7b799cb466f79ed87b9acbf36d22c868dd2f8e93b3f0bc554584 CVE-2024-3402,0,0,9338564bd22c4003db146afde9bd8c1a92a594a6c110944ff805be3cba8ce58e,2024-09-24T14:04:44.507000 CVE-2024-34020,0,0,c4663f98778b76c33582b9d015039d06540b400c550bf7c9ee3e5b98d9ff425a,2024-07-03T01:59:16.227000 CVE-2024-34021,0,0,ba9a52b25c7a77dfa7bf1a07f5ab53755e56e707c7456547716a3d28e95401ca,2024-08-01T14:35:09.920000 -CVE-2024-34022,0,1,7b23e7a4942e184fec33b1bffa07086984aca57ed7d3dd370cec1e2a245271cf,2024-11-15T14:00:09.720000 -CVE-2024-34023,0,1,4dad96a4b3405ff5975c0f7d1a940e81b4b229c6fe69b1b44167ee14d10f47a5,2024-11-15T14:00:09.720000 +CVE-2024-34022,0,0,7b23e7a4942e184fec33b1bffa07086984aca57ed7d3dd370cec1e2a245271cf,2024-11-15T14:00:09.720000 +CVE-2024-34023,0,0,4dad96a4b3405ff5975c0f7d1a940e81b4b229c6fe69b1b44167ee14d10f47a5,2024-11-15T14:00:09.720000 CVE-2024-34024,0,0,0a0d832c0db4d58a70ccecce54b6344b3f181daaf3ed5285ed66313a40334a22,2024-06-20T12:44:01.637000 CVE-2024-34025,0,0,edd2792f368696b38d90328f1c1ccaaade65bc2e70f896834331ba779fb27dd0,2024-05-16T13:03:05.353000 CVE-2024-34026,0,0,d23e70be79ae55b32e18d5911869778bf5369290a7a856aaf669d9f9bc7f7d52,2024-09-26T20:52:39.357000 CVE-2024-34027,0,0,665288561aa105eb3ace1a2e821548dcc73a2a65b6f5aec99c3e8227e5375b1e,2024-11-05T15:35:13.297000 -CVE-2024-34028,0,1,a3a07b51d5aa0818b6ec8ab4e731fb278385db3589960d5a656ff9b167059806,2024-11-15T14:00:09.720000 +CVE-2024-34028,0,0,a3a07b51d5aa0818b6ec8ab4e731fb278385db3589960d5a656ff9b167059806,2024-11-15T14:00:09.720000 CVE-2024-34029,0,0,f5d25bd32468c541a51740035f23234d8d5f3f16a79d2529894430e4831fa01a,2024-05-28T12:39:28.377000 CVE-2024-3403,0,0,b6e0e9c5c8bbba14526747c5960a7a5699ede8dea782a1ab2b3e6a77206d4587,2024-05-16T13:03:05.353000 CVE-2024-34030,0,0,d69df042bd8c46231655367245aee1323839b1ad1303155a792446d5da60613d,2024-10-30T20:35:19.987000 @@ -254581,11 +254623,11 @@ CVE-2024-34158,0,0,0fd72fb00224cfe4f9ed8cacfff4aeadb87d2bc96dad7a6b5b064905d0cc5 CVE-2024-3416,0,0,a081ed6eeab1f8c610822f30cf17aa2151f535dbb3c22c142c8cc9d4a77c8f63,2024-05-17T02:39:54.337000 CVE-2024-34161,0,0,bbdc550af4eb522ba0c0a49b8f0b0f2b8ab2486eb88097c00d555e9de7e4a0b7,2024-06-10T18:15:34.770000 CVE-2024-34163,0,0,2f9be74221a126c780fee9df35c4749361e313e79808498cd64aeaba263e49d6,2024-09-12T18:59:30.753000 -CVE-2024-34164,0,1,efd8b638f6022da57f6ee2faeaf60e8940a4bab962493112791d300389f055b1,2024-11-15T14:00:09.720000 -CVE-2024-34165,0,1,5f3c8ad4b4e4d0e5bc71a03e42e033328c198fcf3d84a7a78168501b66f95043,2024-11-15T14:00:09.720000 -CVE-2024-34167,0,1,aeda5377618eca35986281ed9d38c406cb3ea14894f4eed8413adfa9746a4305,2024-11-15T14:00:09.720000 +CVE-2024-34164,0,0,efd8b638f6022da57f6ee2faeaf60e8940a4bab962493112791d300389f055b1,2024-11-15T14:00:09.720000 +CVE-2024-34165,0,0,5f3c8ad4b4e4d0e5bc71a03e42e033328c198fcf3d84a7a78168501b66f95043,2024-11-15T14:00:09.720000 +CVE-2024-34167,0,0,aeda5377618eca35986281ed9d38c406cb3ea14894f4eed8413adfa9746a4305,2024-11-15T14:00:09.720000 CVE-2024-3417,0,0,ec2cc67e87ef08b286df0e04fd0b771b8794998f9cd38dab847478283ab7b53f,2024-05-17T02:39:54.430000 -CVE-2024-34170,0,1,85f9d5cba5ac450a886d1f7c655dc8e577cb71c8f388c153a7ce1046384cf9ed,2024-11-15T14:00:09.720000 +CVE-2024-34170,0,0,85f9d5cba5ac450a886d1f7c655dc8e577cb71c8f388c153a7ce1046384cf9ed,2024-11-15T14:00:09.720000 CVE-2024-34171,0,0,c11d75efd1e3db81369447a70f71be2cc6b80f6bf0101a0af8950c5eb11372dc,2024-05-31T13:01:46.727000 CVE-2024-3418,0,0,502fc54d23469afbe964523306f6a78a43aa4bbda684d42d8a15714665a9197f,2024-05-17T02:39:54.520000 CVE-2024-3419,0,0,55e9e939cce7031c82bff2b248ad3247eb5f6b71fadfe890fcd9e67ed87233e2,2024-05-17T02:39:54.607000 @@ -254794,7 +254836,7 @@ CVE-2024-34466,0,0,dd736f9a85d19253650a199739cba2301673ec6ec2adc5e7de09970e86411 CVE-2024-34467,0,0,903bd38a14a72c5e31ca95b7f024225144ec2f1cfed11b0213915da81da29f0c,2024-08-16T19:35:11.493000 CVE-2024-34468,0,0,b164ab2b609bf8b9d79a88576e6595ba967431973eb7a086f2ba71149d9690e8,2024-05-06T12:44:56.377000 CVE-2024-34469,0,0,c68e04abdf928312d44ac341a209cf5378ddee40d6b8b27a9211f964972de340,2024-08-01T13:52:22.830000 -CVE-2024-3447,0,1,b6e83f6d0454d82bbf78ae398e06e86ffce6005193a0451419e0df83af742b83,2024-11-15T13:58:08.913000 +CVE-2024-3447,0,0,b6e83f6d0454d82bbf78ae398e06e86ffce6005193a0451419e0df83af742b83,2024-11-15T13:58:08.913000 CVE-2024-34470,0,0,c26a3e4e103c3a39ccd71f6b73acf5c04b4f366cb36f58bea718bc4b8f16af48,2024-07-03T02:00:10.887000 CVE-2024-34471,0,0,532d16184865828974b7b8bfccacf00acd1cea4229675a661e47fbd9ede966c2,2024-07-03T02:00:12.450000 CVE-2024-34472,0,0,849451fca1b199d715cc88e41dff8ac49cd790dbac58f51bec15328bb61654e2,2024-07-03T02:00:13.630000 @@ -254967,7 +255009,7 @@ CVE-2024-34659,0,0,dd3f9420e24bf859148c793c2123fe1fcf6f82da97ec67367518f44415c24 CVE-2024-3466,0,0,0337eeb2bb11dc2971562c8acd5fd5c98aad745dda4239343a7e69d2339c0489,2024-05-17T02:39:57.717000 CVE-2024-34660,0,0,0b2d2bea24d7fa6e914da9f7286c2cb2a544faaaec97dda10fa17e8966604e75,2024-09-05T13:30:28.343000 CVE-2024-34661,0,0,39eda7ed3fc18d4431971deb4f86b7b12866001e42dbec50f2575ba9405dbbce,2024-09-05T17:57:44.563000 -CVE-2024-34662,0,0,a6658413d6b88b3373ec5926587f6541001b2a48e07597ea624b92716d312cdd,2024-10-10T12:57:21.987000 +CVE-2024-34662,0,1,606c004802ffd4bbbf92e055cc11b6c203b0ea6fc76b4b2f8bcb431031d349ac,2024-11-15T16:34:28.937000 CVE-2024-34663,0,0,bc7e792d3bf9cb19b3bac7de5e5f393eda73c48981c29bad44b4305bf7709bc5,2024-10-10T12:57:21.987000 CVE-2024-34664,0,0,b864c4351ccbb106aca6a04f609ab07081f58539736f6b0a259450595fc32b90,2024-10-10T12:57:21.987000 CVE-2024-34665,0,0,8e97b696e2825593cef2b60bbd5fe842a775ccd597e31a6a3daa4e47d15b624a,2024-10-30T14:28:55.223000 @@ -255025,7 +255067,7 @@ CVE-2024-34714,0,0,e231a4a259714202f61a69bb06497a65111477c8e99d84b716409e7518cfc CVE-2024-34715,0,0,a82e11e04c452d1bea6b0a9824b74b6f2046192e0be7962e7e2d23b74ac2865a,2024-05-29T19:50:25.303000 CVE-2024-34716,0,0,6c3b1bfeb59833afa0878217bf084cc4cde82455598fa083dba17b1e1360762c,2024-05-14T19:17:55.627000 CVE-2024-34717,0,0,9708a1af9b10bdcf029cd505a3cb07145d8977f96260cc07b0dfdf42dc2f21cb,2024-05-14T19:17:55.627000 -CVE-2024-34719,0,1,58c35f491a3b3ca454b7d586d09fcb356bc7cb2ca4d5e08c119ab24bc5d9d8a8,2024-11-15T14:00:09.720000 +CVE-2024-34719,0,0,58c35f491a3b3ca454b7d586d09fcb356bc7cb2ca4d5e08c119ab24bc5d9d8a8,2024-11-15T14:00:09.720000 CVE-2024-3472,0,0,72b7d7dda7b4399aa8e0987dd9661c2b209f511d24633ce5f0fddd8a616a16dd,2024-07-03T02:06:14.580000 CVE-2024-34720,0,0,d5f9e320876749ef63f3ae3fd855102efef7812668f3ea77cca5b86835b0fa9f,2024-07-12T16:11:36.933000 CVE-2024-34721,0,0,e10eab3e44bc304347c4431c31d705a2c4a55c2499e0412aab4621d1d6ef445b,2024-11-05T21:35:07.660000 @@ -255035,7 +255077,7 @@ CVE-2024-34724,0,0,913fd057cda1c7d4c484876a49aa72529e900891c98a4a2d61e29b59d9444 CVE-2024-34725,0,0,71c51510eb6c519ede5c0bd5b935ecb821799239014d1b6c0035512d0bff6cbf,2024-08-01T13:52:25.887000 CVE-2024-34726,0,0,148667699b7fd62da52cb8a62c1c3c6fd756ca900c40298f1823e1d94f76998b,2024-07-11T15:05:45.340000 CVE-2024-34727,0,0,75befb2ba24a3b4b3047b7cd5fae93e6c869e1a4a8df4db9070d6b118a79dd7b,2024-09-11T12:43:45.260000 -CVE-2024-34729,0,1,54de913c260765be67c48041f77073710a2847abf55ca4fe236c2bf5de701ec8,2024-11-15T14:00:09.720000 +CVE-2024-34729,0,0,54de913c260765be67c48041f77073710a2847abf55ca4fe236c2bf5de701ec8,2024-11-15T14:00:09.720000 CVE-2024-3473,0,0,174ffd5ba26767424b634a780ad377f8ae33849c44036babd665d0b98ce27738,2024-05-02T18:00:37.360000 CVE-2024-34731,0,0,c2796903b18972c85283f94e39f216adab1245ab24ab7429de75a096f2bef3ba,2024-08-19T13:00:23.117000 CVE-2024-34734,0,0,03ca469f8cd315011dd153921c263a875a2212423b28ba9a9477308f69d8631d,2024-10-24T20:35:05.433000 @@ -255048,7 +255090,7 @@ CVE-2024-34740,0,0,cd68171e55105c9a184cdc72c371579137a9ca2bcc91416cae3d7556d14ec CVE-2024-34741,0,0,92c683bbe77a7f293c2037090a232d821770d81c7905215e3ef6319cf6b5adba,2024-08-19T13:00:23.117000 CVE-2024-34742,0,0,ae7622882d0f2f3d011507be8bcb7493359b0ef6aaca92f56d7280395d35123c,2024-08-19T13:00:23.117000 CVE-2024-34743,0,0,9a08509f1ceb4bbb716866bb59161611c0588d77430a21c15b6c1621568bccf5,2024-08-19T20:35:16.253000 -CVE-2024-34747,0,1,2d28e87671e44808335b186af8072869a96462e808f2184392e92b73bb99c621,2024-11-15T14:00:09.720000 +CVE-2024-34747,0,0,2d28e87671e44808335b186af8072869a96462e808f2184392e92b73bb99c621,2024-11-15T14:00:09.720000 CVE-2024-34749,0,0,048a4718a6adf63bcc95dd588dc6297f930a23113bd2619e190eb8b7852c3de9,2024-08-02T03:15:45.390000 CVE-2024-3475,0,0,3d68cde343ddcb97ac984b733d2ae7662c97a24c514b9a563c1c306f42f1759f,2024-05-02T13:27:25.103000 CVE-2024-34750,0,0,c670e390c383fbaa0e17449b121645c068a83500fff53e2ba8ec3633bed5a922,2024-07-09T16:22:37.120000 @@ -255077,7 +255119,7 @@ CVE-2024-34770,0,0,2eeebcb7dbb27d6d916fc0bf7ae4dafa0841a8c9eaa13ac31a6919da323f2 CVE-2024-34771,0,0,452ec502adbdf587176d97ed478a2d6f8beb3a64c98f7d59c911ddec3954d67f,2024-05-14T19:17:55.627000 CVE-2024-34772,0,0,bf5aa55974c4947b2a40ae851f7aa83dde7195e97317e1244709204543c5bdfb,2024-05-14T19:17:55.627000 CVE-2024-34773,0,0,100b1cb449b7ae251f86bd995ac4446f704b2d5bcbff0a59ab0bc97995491271,2024-05-14T19:17:55.627000 -CVE-2024-34776,0,1,c35f4786753f7787c740d9c77c4bd6de052654b924db04a30c1cfcfea09d2aa5,2024-11-15T14:00:09.720000 +CVE-2024-34776,0,0,c35f4786753f7787c740d9c77c4bd6de052654b924db04a30c1cfcfea09d2aa5,2024-11-15T14:00:09.720000 CVE-2024-34777,0,0,47369db5c522c34e9489779523e2c10406821ae54d821b2c269278d042fde193,2024-06-21T15:58:51.410000 CVE-2024-34779,0,0,61552efe08011b21d4ca3c0787e9337089cecf0917e51cf3275efb7daf3d34a0,2024-09-12T22:35:06.133000 CVE-2024-3478,0,0,d6058a0e6db67f9fedb470e62fc4a04776cf84b327b4bd61639e707b408d963f,2024-05-02T13:27:25.103000 @@ -255209,11 +255251,11 @@ CVE-2024-34995,0,0,c5ae887edb3d68f5b17625c821aa1f4eef9c82bfd086996cef9a6f896adae CVE-2024-34997,0,0,5fbdf010972a8268fd5a9463e95189eba51629c3cae1b641fade25965bb6360c,2024-08-27T15:35:16.800000 CVE-2024-3500,0,0,65f7cd29cdae6ff6308db5dac7c1e408d4ae13919a645c3f45d14d5a6eb829b1,2024-05-02T18:00:37.360000 CVE-2024-35009,0,0,3fe7a6685d547c8f13c78e6aa6b52334336d0dbec9afe2301a9c305ba9814939,2024-08-08T15:35:12.080000 -CVE-2024-3501,0,1,097e8a9362bbd50897a07cfa11bacf1e8874a343e2a4be0465724b821185ab5f,2024-11-15T13:58:08.913000 +CVE-2024-3501,0,0,097e8a9362bbd50897a07cfa11bacf1e8874a343e2a4be0465724b821185ab5f,2024-11-15T13:58:08.913000 CVE-2024-35010,0,0,6e4b79d2c02224bc0070ffd30b8ebbf9821b5f9a967abd7e45b682dfed020dc3,2024-08-20T14:35:18.007000 CVE-2024-35011,0,0,20c56ae7701ad2e917dd6b2ccceeffea8e94a8ddd9a2b2ca02beb893f0a0b7e1,2024-08-19T17:35:16.943000 CVE-2024-35012,0,0,c8bd09796e971cbd360d6bb5909687d1917c7ee2369b2a3730c7a0355d3c5511,2024-07-03T02:01:12.127000 -CVE-2024-3502,0,1,eabbd93f1d9b7f453fb7ebae4aac0fd4ce587ab0f9f2a18d8bbe28cd7c3c4aaa,2024-11-15T13:58:08.913000 +CVE-2024-3502,0,0,eabbd93f1d9b7f453fb7ebae4aac0fd4ce587ab0f9f2a18d8bbe28cd7c3c4aaa,2024-11-15T13:58:08.913000 CVE-2024-35039,0,0,16789b799d84c4b57ca393e0c1f64a27f89bdf5208029185a91c381dd5f853e1,2024-07-03T02:01:12.907000 CVE-2024-3504,0,0,e2de0e6f69991c8d2671ce35086e9faed799d2b484a27eddaabccf584b0c7ea8,2024-10-09T15:27:06.437000 CVE-2024-35048,0,0,7d2e40c430e02cb68d065988844aba370a92c807c6984a33499abbf4ef502def,2024-07-03T02:01:13.607000 @@ -255306,7 +255348,7 @@ CVE-2024-35198,0,0,7592c428e1bf061ba03a09a77c9fc676ecc19ee3535a3f1dd84fdd07d6a08 CVE-2024-35199,0,0,10d88a39b30b98eb1ab39fdfe91d64eca78a834d79f0e8d397aca33bb33c48ea,2024-08-07T16:15:44.737000 CVE-2024-3520,0,0,4d2ca8beda165968cfea3b64e955c18436397c1b54474f7a64b510b5eacd13fe,2024-05-02T18:00:37.360000 CVE-2024-35200,0,0,4e081bc266f3339c234fd0d9836610e298ca5ba3771760c1147fa5a32be6afdb,2024-06-10T18:15:34.983000 -CVE-2024-35201,0,1,b30e0c3a88de4989772c1b3b29ea072e0e535b3a02eddc8535a86932d65eca8f,2024-11-15T14:00:09.720000 +CVE-2024-35201,0,0,b30e0c3a88de4989772c1b3b29ea072e0e535b3a02eddc8535a86932d65eca8f,2024-11-15T14:00:09.720000 CVE-2024-35202,0,0,4af51be94f170b8c7faf730b20ffce243593310efdd5d249d08c2d764ada1552,2024-10-15T12:58:51.050000 CVE-2024-35204,0,0,2ea5b7f3f64c9f31f0a98ec693d23952b0be3ff72b74340b9fa74f103be148a8,2024-09-26T16:15:07.840000 CVE-2024-35205,0,0,b114736c6ce96d182acaf33482dfa6527b14733d7c35394119539255eedf2feb,2024-08-20T14:35:21.557000 @@ -255347,7 +255389,7 @@ CVE-2024-3524,0,0,caaaa672c1583c111467dc987fb30c87160b7f141d39c66ef33b7bd5d6f222 CVE-2024-35240,0,0,10f7cfa87efb80189efe3d266bfaf6f2d74876bd1f9be0a2a318dfa5c5196863,2024-05-29T13:02:09.280000 CVE-2024-35241,0,0,cb282beda3e169f0ffe5213a46ad14d5235aa62b1613d6fd39f98e381add4a7d,2024-06-20T09:15:11.993000 CVE-2024-35242,0,0,582d7cb6c304b8940a8805c990f3fb7ff37dec36204966ddd8a9cce31009f1cf,2024-06-20T09:15:12.140000 -CVE-2024-35245,0,1,0abf4f6509e66549f5f43f7be33ca478585d0e9b90c24e0597504467160d28c3,2024-11-15T14:00:09.720000 +CVE-2024-35245,0,0,0abf4f6509e66549f5f43f7be33ca478585d0e9b90c24e0597504467160d28c3,2024-11-15T14:00:09.720000 CVE-2024-35246,0,0,cc5250190c0b6d05aacf7ab7e1559a6a667a42d50dc12d387326d113c4c39730,2024-06-21T11:22:01.687000 CVE-2024-35247,0,0,88bbd7eea3b694f188b138a274c2cc76eba6f7f74ce49816ad3caef11da1dd52,2024-06-24T19:26:47.037000 CVE-2024-35248,0,0,6f761ad0894cbff75e1c7772a20ff086c968454140c8bb852c982fcf9f1a31bf,2024-06-20T16:38:22.977000 @@ -256180,16 +256222,16 @@ CVE-2024-36238,0,0,731ec648c7a4b37d3d9981730990df56da762b2c31663b42ba5ac64d30b38 CVE-2024-36239,0,0,e66429661b644353e918160353ee5e2167a6d0894e5b77a9d2b6393099a7a98a,2024-06-17T20:20:18.633000 CVE-2024-3624,0,0,af8bc198a1edb70d7feacc6f3d2793c7e8656f5800282a4e0dce44ca2e727e34,2024-04-26T12:58:17.720000 CVE-2024-36241,0,0,b4fd0c32db9ad6a0b3feb22ac73a4f053b381b184e4f898e9ee2d7a50f7f8ebe,2024-05-28T12:39:28.377000 -CVE-2024-36242,0,1,948f20d8cdc28d8fae77d4ab5c7426991c25b0847dae3637aa9b6097b09a994d,2024-11-15T14:00:09.720000 +CVE-2024-36242,0,0,948f20d8cdc28d8fae77d4ab5c7426991c25b0847dae3637aa9b6097b09a994d,2024-11-15T14:00:09.720000 CVE-2024-36243,0,0,29dab3a6b5eb0bbcb070b16ccb36842afdc1a26e250f57828442ca058f96401e,2024-09-09T12:21:53.383000 CVE-2024-36244,0,0,72ec9199c50b58fba1710bd51385a13f86b624ab2159e939e6a1444afbe8dfc0,2024-06-21T11:22:01.687000 -CVE-2024-36245,0,1,dde3668c508a0a731afb7367784c1ce5e9599c5845e89faea97d8a30d6c66563,2024-11-15T14:00:09.720000 +CVE-2024-36245,0,0,dde3668c508a0a731afb7367784c1ce5e9599c5845e89faea97d8a30d6c66563,2024-11-15T14:00:09.720000 CVE-2024-36246,0,0,d22d56b3ac190fbff4b5b820bf9253b2e2f7fd0137ac45e12945d45896804b68,2024-08-15T17:35:07.080000 CVE-2024-36247,0,0,16c6efe40503daf1080fcbf6d9a009e1a3c1386098439c6bda19cf80a4941086,2024-09-23T14:16:11.290000 CVE-2024-3625,0,0,fb0a948a4b5da0bdab04bf1595a286af67dd68466c0feac9aee7f6c3556ca9e2,2024-04-26T12:58:17.720000 CVE-2024-36250,0,0,84e96f986a29ca7154d7560c7f995480a77fe85044db24411c2c6dac77be0279,2024-11-14T17:11:23.913000 CVE-2024-36252,0,0,4edf18ae557d8c3498076af1a69a7b853e545554a27b9b0b40bcb780d22c50d6,2024-07-03T02:02:59.060000 -CVE-2024-36253,0,1,440d7b8249c4286c7e09d3a45cabb0a3006bd48cbd66e9aa33e43eb576c7fb12,2024-11-15T14:00:09.720000 +CVE-2024-36253,0,0,440d7b8249c4286c7e09d3a45cabb0a3006bd48cbd66e9aa33e43eb576c7fb12,2024-11-15T14:00:09.720000 CVE-2024-36255,0,0,a469b4be0a60fb4a2e32368cbd9ff1f41eb30d9e30ebf5e64783accfe9b2d73a,2024-05-28T12:39:28.377000 CVE-2024-36257,0,0,de59e82b2cc868e7dbd975a3494539da4e2b96eaf9e15fff111a5d725848914c,2024-07-05T17:06:28.517000 CVE-2024-3626,0,0,ecad313ba7341fd9bbe18ef0c6d316a3039cc88d660f7ee647b2392d610decc0,2024-05-24T01:15:30.977000 @@ -256203,21 +256245,21 @@ CVE-2024-36267,0,0,66b127f77fa5a54e7fcd6fbeddc446c0aeca670a52e22fd99c771e136e093 CVE-2024-36268,0,0,506bdd503241b054b98e469c8190767746cc55f82420c89947b6255b68cd420b,2024-08-27T17:19:43.653000 CVE-2024-3627,0,0,b89e9f2ca530f3e52199f8e236751735781433429621317f8b9fc4faa8df3d5f,2024-07-15T17:12:17.763000 CVE-2024-36270,0,0,3a197151a024bba12721f1588c9d9bd5bc71631bbef10c0636165f353f48f0a0,2024-09-09T13:16:22.050000 -CVE-2024-36275,0,1,487a1d13cdb0e2804d6b6b7a6688fa44dcd111fde6b4f7ad7eae2d7916dbb067,2024-11-15T14:00:09.720000 -CVE-2024-36276,0,1,c9c845fb57a876241c04a6ca03c9d6f88f58341d35b59d1bfe3fd800d79f949f,2024-11-15T14:00:09.720000 +CVE-2024-36275,0,0,487a1d13cdb0e2804d6b6b7a6688fa44dcd111fde6b4f7ad7eae2d7916dbb067,2024-11-15T14:00:09.720000 +CVE-2024-36276,0,0,c9c845fb57a876241c04a6ca03c9d6f88f58341d35b59d1bfe3fd800d79f949f,2024-11-15T14:00:09.720000 CVE-2024-36277,0,0,94264d57b475e2e31a7e48502c2a39dffb9729ea0c8a56f3b75bb7d3d5d2006b,2024-08-02T04:35:38.880000 CVE-2024-36278,0,0,4945d0ffe4c056118d1dbbf9f47438cd1039ab9e5603c7cf52cac309f0443d7c,2024-09-09T12:21:53.383000 CVE-2024-36279,0,0,ae6d96e367108cc090e0cf1f9382ed63328248da9c7d975607021f129b51c4ff,2024-07-03T02:03:01.997000 CVE-2024-3628,0,0,d2a16bb2e0ca783e20096bf35e3f91c09dc2bc7f0a3b813f429c51b8aa3691ef,2024-05-07T13:39:32.710000 CVE-2024-36281,0,0,3c26e9b44165c28e13e77d449048c3cb1d69d3587e4fcb2660aeaa7d88871486,2024-09-09T13:28:25.937000 -CVE-2024-36282,0,1,2ea89db377451e49f06fc04c2ac5cac8cc2fbbc6de1bb92c35a87faef3153225,2024-11-15T14:00:09.720000 -CVE-2024-36284,0,1,016c4fa47673f1d3acfdd501ff93fb6005d1722096716132a33dc143f2cd681f,2024-11-15T14:00:09.720000 +CVE-2024-36282,0,0,2ea89db377451e49f06fc04c2ac5cac8cc2fbbc6de1bb92c35a87faef3153225,2024-11-15T14:00:09.720000 +CVE-2024-36284,0,0,016c4fa47673f1d3acfdd501ff93fb6005d1722096716132a33dc143f2cd681f,2024-11-15T14:00:09.720000 CVE-2024-36286,0,0,7d09221a564e0c2df0ff5611559a80db23ca3f0bea1adae57d3ef567da0d5321,2024-07-15T07:15:05.140000 CVE-2024-36287,0,0,58cd0f96868d0f87ad27a0900cc18166044a8ed0400369c58b15a0b5d92f53af,2024-08-07T16:13:00.603000 CVE-2024-36288,0,0,f27253452fa242bd38d9e8a6852071d40fc41ce412d6b25543b2bb1fcbe8c01c,2024-07-15T07:15:05.230000 CVE-2024-36289,0,0,c81e4dcba680502adf1e6cb5fb9cf85188de117b98260b47eb77431186ce409a,2024-07-03T02:03:02.973000 CVE-2024-3629,0,0,e776b351c13d8fab7d20c1d77ce24b1735377c1f0ada7e55eb9590007cc5c2e8,2024-05-15T16:40:19.330000 -CVE-2024-36294,0,1,ab00c27961eace667f9ea5e5ad7b6cd8c0f468a3668d36549eb32d498e33b135,2024-11-15T14:00:09.720000 +CVE-2024-36294,0,0,ab00c27961eace667f9ea5e5ad7b6cd8c0f468a3668d36549eb32d498e33b135,2024-11-15T14:00:09.720000 CVE-2024-3630,0,0,bdc2182e4eec98ff9c8b84bc3c1a34a4c9de2619b28e4dcc17481a1a7a7b6f08,2024-11-07T16:35:19.253000 CVE-2024-36302,0,0,97f37a0491b91273ea881320e1230a32004b42aecc2ad6ef769b0832e9456ade,2024-07-03T02:03:03.750000 CVE-2024-36303,0,0,1057cf85b25be31ec287f99b57fc3e82f4cda691b1b5094cac55978878e142d7,2024-10-04T17:33:03.267000 @@ -256343,10 +256385,10 @@ CVE-2024-36479,0,0,dee4352def0751c2293c7f9148494e529c22ac95426bcab70e58c8c955d6c CVE-2024-3648,0,0,8ea394456a868f5cb440700cb4f3d40035b05f4bd668cd1adcf2b942f06e8067,2024-05-24T01:15:30.977000 CVE-2024-36480,0,0,8cfe7316f6ef17d7594f0f48ea5faff4d266af61040753ef41d7dc8fbca2c04f,2024-08-01T13:52:55.747000 CVE-2024-36481,0,0,c20069fe9216cf7ae5e42e62fc886e320b7997d027cb5be79eafe3b725910b77,2024-06-24T18:35:33.157000 -CVE-2024-36482,0,1,dae359e53b5e8177039f35b3dc38cb72d57dd1834336927a90433d819cf87afb,2024-11-15T14:00:09.720000 +CVE-2024-36482,0,0,dae359e53b5e8177039f35b3dc38cb72d57dd1834336927a90433d819cf87afb,2024-11-15T14:00:09.720000 CVE-2024-36484,0,0,d90e8addbe4310fb59424c1e2209c39c8eeed0a72f79133301d102644feba769,2024-07-29T07:15:03.447000 CVE-2024-36485,0,0,56777d4dd209683886c66b8d883e76c829b3cc4b5aa56001fcac75ddb73fe7db,2024-11-07T11:15:04.637000 -CVE-2024-36488,0,1,0b3730ee760831e1cc3419c6fd09e2a127d61516e56e574db3488906040cd924,2024-11-15T14:00:09.720000 +CVE-2024-36488,0,0,0b3730ee760831e1cc3419c6fd09e2a127d61516e56e574db3488906040cd924,2024-11-15T14:00:09.720000 CVE-2024-36489,0,0,2f34b177a387259c170db7b91a53518947ffa720aa7b598baba9b38f62a0e242,2024-09-09T13:32:13.087000 CVE-2024-3649,0,0,9d2e0b18ffe30ccf7cbc0e74a77daf1869af9483d0413cb80580942eae7d40a2,2024-05-02T18:00:37.360000 CVE-2024-36491,0,0,0594f931fd7fcba21d9716595a57f83c241ce75441ab3d963604c9fb9792c871,2024-09-27T14:05:54.037000 @@ -256665,10 +256707,10 @@ CVE-2024-37019,0,0,c34529539f4c6ff793225ec64e29909e2614ce1bc964c3c63810b9219791c CVE-2024-37021,0,0,df42b273589de5447bead7df7667049e2658c880af6df99f8ec35df9bab3713a,2024-06-24T19:26:47.037000 CVE-2024-37022,0,0,c89ab136485bb25fceb1ebadf25398758307a2b39977d566fcb7ed1a8d501728,2024-10-03T15:55:56.250000 CVE-2024-37023,0,0,8524a0bea62903b02ec8e898aba28cae243223cb44baaac206a78705a8ec65f8,2024-08-20T17:12:03.330000 -CVE-2024-37024,0,1,2caa5df609f178cdae1b513d222c22ba708f4adcb61f41292550c82a0cb9d6de,2024-11-15T14:00:09.720000 -CVE-2024-37025,0,1,fe09977a551870ee95e9267e6ccdd2bbc2bcf7169e9d4af92271565fefcbf58e,2024-11-15T14:00:09.720000 +CVE-2024-37024,0,0,2caa5df609f178cdae1b513d222c22ba708f4adcb61f41292550c82a0cb9d6de,2024-11-15T14:00:09.720000 +CVE-2024-37025,0,0,fe09977a551870ee95e9267e6ccdd2bbc2bcf7169e9d4af92271565fefcbf58e,2024-11-15T14:00:09.720000 CVE-2024-37026,0,0,72a4b17689cbdac04fb86cce78128e997cb4a2e097881aab9fb79c35d7ec4f49,2024-06-24T19:26:47.037000 -CVE-2024-37027,0,1,4dc3e5cb80d4569b9b5d635193d722e490eb58453dc362e1599e328fb4c05632,2024-11-15T14:00:09.720000 +CVE-2024-37027,0,0,4dc3e5cb80d4569b9b5d635193d722e490eb58453dc362e1599e328fb4c05632,2024-11-15T14:00:09.720000 CVE-2024-37028,0,0,b7e9c99e1fd0ecec6eefdacd33a3c9c912ef383532f72bb887cdccaeaf455e4d,2024-08-20T19:26:49.730000 CVE-2024-37029,0,0,2af12962304df614d8d33d4ab08c57fecf21a37e5688c3ed4ee5182e993c1306,2024-10-03T16:43:40.713000 CVE-2024-3703,0,0,bd96f9d277c687f2c8df474724f359223698fb8a762e1288e006520ebff94d49,2024-05-03T12:48:41.067000 @@ -256889,7 +256931,7 @@ CVE-2024-37280,0,0,ac35b85853446debbb96c46d0c81b9a57aa5a4ffc880ba0d37638e24be271 CVE-2024-37281,0,0,6b102b9952e22ea6bb07ccf242d5f0cb293d2c3d6d03a35a192358e7864801ae,2024-07-31T12:57:02.300000 CVE-2024-37282,0,0,9e75dd72782fd47fb8dcc1bf3ef22e08f7f64df6cb16c7858ce8e53d3eddfcf3,2024-06-28T10:27:00.920000 CVE-2024-37283,0,0,07a52ca714a9a80e3a78bead6f35fc6d30e576ab4ba6daa4bcb81e93f175a210,2024-08-12T13:41:36.517000 -CVE-2024-37285,0,1,4b69777de4da67951c3e4ad3f7e6208102ae14e8d39c2868a6ce3e31c4613b59,2024-11-15T13:58:08.913000 +CVE-2024-37285,0,0,4b69777de4da67951c3e4ad3f7e6208102ae14e8d39c2868a6ce3e31c4613b59,2024-11-15T13:58:08.913000 CVE-2024-37286,0,0,6382030145a65eaac3e6c890da740dca7c4a6af69dff82fb27db89389bebb54f,2024-09-11T20:20:34.503000 CVE-2024-37287,0,0,a9d3453fb1c9fe3cd5af0cb7ff0109d98a345ff76f4539de093f05db9c477ffa,2024-08-22T13:33:12.477000 CVE-2024-37288,0,0,665135dee06da174ac43bb1366ac01932e76fc67d054a27a8125a1a355fb458d,2024-09-16T13:29:06.023000 @@ -257145,7 +257187,7 @@ CVE-2024-37571,0,0,f2268da0f70596d56829f3f9bf9d47661ad5192c587321bdcf916146c34ae CVE-2024-37573,0,0,7cf896a83bff7adb78d3c1fc14e6c4ef534e5b6ec963a5ca90d46c8aebfbcf87,2024-11-01T12:57:03.417000 CVE-2024-3758,0,0,9133e9ab6c91a5523f7a6c3075b39d739f115990ca9d090ea03db032b6c7f7e8,2024-05-07T13:39:32.710000 CVE-2024-3759,0,0,228c14dd97b4dcf6507c1901dec59f930e3b9b578ef9455bb0b7881e5199f2f8,2024-05-07T13:39:32.710000 -CVE-2024-3760,0,1,76b9db3e61bfe14a00c564a1f24b36ec1cec03802d2d5f0be68505965aee5668,2024-11-15T13:58:08.913000 +CVE-2024-3760,0,0,76b9db3e61bfe14a00c564a1f24b36ec1cec03802d2d5f0be68505965aee5668,2024-11-15T13:58:08.913000 CVE-2024-3761,0,0,bcb7ea1ac08a49551e80d8143adffef9f2599014e2b4d32b190639643f083116,2024-05-20T13:00:04.957000 CVE-2024-37619,0,0,09797faff2df8b72db2a2f262ebdfd130817b6ee60286e6aa7311eb834d19b77,2024-08-01T13:54:07.797000 CVE-2024-3762,0,0,40d3f55de3ecbf79b02b0c0e4b35c8d9284b268357e297bc7035406e1948919a,2024-05-17T02:40:06.647000 @@ -257735,11 +257777,11 @@ CVE-2024-3838,0,0,19b80bb7728999ff8307a96193e2751434e29b0f17864fd13990588a7832d0 CVE-2024-38380,0,0,772c1db87e773ec094b30af8e675fcdb7ae8ec5c736b7a94607b2b1a80aeb8ac,2024-10-02T14:22:25.323000 CVE-2024-38381,0,0,5a68653a08804721325cf4b769157d8413d44196c0ae824bb1098e9e93c70b8a,2024-09-09T13:37:39.093000 CVE-2024-38382,0,0,5eb9605172a2cc2881cc14a987b3697e7a685364bc9cd84ed64848cef9c33fdc,2024-09-04T17:10:56.497000 -CVE-2024-38383,0,1,ac21d97c00d07890c6f9f891435b12c728456706ca1ec7baf9ac4069f1397850,2024-11-15T14:00:09.720000 +CVE-2024-38383,0,0,ac21d97c00d07890c6f9f891435b12c728456706ca1ec7baf9ac4069f1397850,2024-11-15T14:00:09.720000 CVE-2024-38384,0,0,ae2be85d9f39947f564fb161f1fe1f488208e4ae714d2807653ca1b96b2300ca,2024-07-03T02:04:57.820000 CVE-2024-38385,0,0,ad39ce50ee10d7c4352abf70f77a4305b91c93b47f7bafc6237b8077dda885d1,2024-09-03T17:59:27.440000 CVE-2024-38386,0,0,4681bfa2c99f249f935e8a6e34318b7575619c3c0775d501b8fe8a79c951203a,2024-09-04T16:56:41.463000 -CVE-2024-38387,0,1,014a3d44dcc0a711ef94361a639acd581d9d8567d9ef5156c648a25b68eac6a4,2024-11-15T14:00:09.720000 +CVE-2024-38387,0,0,014a3d44dcc0a711ef94361a639acd581d9d8567d9ef5156c648a25b68eac6a4,2024-11-15T14:00:09.720000 CVE-2024-38388,0,0,59d748481b79bef641da29fa14283366526c194312c93d8df5bfc773a451913c,2024-06-21T11:22:01.687000 CVE-2024-3839,0,0,7c6a8e24e8992e3cadc889bd78886524b88f88c58f4f3536293ab700e2d6e3b8,2024-07-03T02:06:38.637000 CVE-2024-38390,0,0,79dc30f8af84c9201715bbbab17f78ad07e2499ec7748a40259461d61601cd3c,2024-09-09T13:38:26.600000 @@ -257814,7 +257856,7 @@ CVE-2024-38474,0,0,4f088cfc0bc3e33027842b99d0e9469f8c62a5c78773b6fa11ed87f203504 CVE-2024-38475,0,0,4434bbc9e26235e103b2ea8722d70e74e682dd306d9d4b03d295c12ec512ff31,2024-07-12T14:15:15.277000 CVE-2024-38476,0,0,4dc405e6abe8ebf298b73a343c8daaff34dea74ec39521b4e5e4a255a423f89d,2024-10-29T17:35:06.547000 CVE-2024-38477,0,0,f870fe888c8d23cfdfdc0433edf103c8cad01a9d525dd04e1a70d1ea4bc3e13e,2024-08-21T15:11:30.857000 -CVE-2024-38479,0,1,a59c846ab11aea7508425cae5038126c4ec0f650a8e2bdbef76ed0cb402c0b6f,2024-11-15T13:58:08.913000 +CVE-2024-38479,0,0,a59c846ab11aea7508425cae5038126c4ec0f650a8e2bdbef76ed0cb402c0b6f,2024-11-15T13:58:08.913000 CVE-2024-3848,0,0,3a1e7dbb50cc54ecdbcc89881c429869965f00f9d2e1eb9f088acc297fe8920f,2024-05-16T13:03:05.353000 CVE-2024-38480,0,0,6eb9cee6c02610ad5600c451b6902c31f702ef5c26caea9038a07913b62ebd8a,2024-11-12T18:35:13.150000 CVE-2024-38481,0,0,a84ef873be05988cbfb5d94abd02b4ab54b65ea0e48ede31f1ebc6095538ede7,2024-08-02T13:54:44.360000 @@ -257995,14 +258037,14 @@ CVE-2024-38655,0,0,9fa5962107ba530b2c50d108a64a004697f709eb8300ac16263e176994b9a CVE-2024-38656,0,0,cf4377c1c67875c41a0da2b125ecb3da0cd28ad5d1cc79dce747ea861df4eae2,2024-11-13T19:35:13.270000 CVE-2024-38659,0,0,7f018343721f0a1816fbc1d0de6ee38bcc05d21743970bb8a1218031b26bafff,2024-07-15T07:15:14.163000 CVE-2024-3866,0,0,7a39485bd1345ca492dd2d645f7c31281d1cbae5daa389ff1a3811c5ea0b474f,2024-10-02T18:26:59.520000 -CVE-2024-38660,0,1,d0d9175d3816ca2e67508172ccde9924c32e55147382a7404f429ab929961a1c,2024-11-15T14:00:09.720000 +CVE-2024-38660,0,0,d0d9175d3816ca2e67508172ccde9924c32e55147382a7404f429ab929961a1c,2024-11-15T14:00:09.720000 CVE-2024-38661,0,0,b3548dc9d015869558d5e6ce591bb61c7302091308e2952841787fdc0fd16368,2024-09-03T18:03:36.033000 CVE-2024-38662,0,0,587269b0aade9b66f2b27453b59929a1dd57dcfa88975eb87dd718f6e7386b22,2024-06-24T18:34:17.547000 CVE-2024-38663,0,0,76edf2df49fecd967d78d8fa91a81453e6903492924f9f2a65b88c7cc552bf4f,2024-06-24T19:26:47.037000 CVE-2024-38664,0,0,418ee48bd44d13024e4f172458676dafa0328cf20a417e7f77e8ce1f228430db,2024-06-26T13:52:23.033000 -CVE-2024-38665,0,1,506212d7d6c0aaa08403e6df260a713fd634a24e0ff4650b98c6bcf57f4eb78f,2024-11-15T14:00:09.720000 +CVE-2024-38665,0,0,506212d7d6c0aaa08403e6df260a713fd634a24e0ff4650b98c6bcf57f4eb78f,2024-11-15T14:00:09.720000 CVE-2024-38667,0,0,4b5489473e44a31d8ebc57a7df1b1f90dd93f1295210f54d8df43808f9aac1bc,2024-06-26T13:53:56.883000 -CVE-2024-38668,0,1,9cccf2aed35dda54c7ee0c225dd5cdcc55384758d468266d7050f37f91a362ac,2024-11-15T14:00:09.720000 +CVE-2024-38668,0,0,9cccf2aed35dda54c7ee0c225dd5cdcc55384758d468266d7050f37f91a362ac,2024-11-15T14:00:09.720000 CVE-2024-38669,0,0,8a7889053d25869f84a98ae5b3e4ecb1a68a4a8a2e59b74e93fe1ee4c37190e5,2024-07-22T13:00:53.287000 CVE-2024-3867,0,0,3968b9e505102e62d9c9cd090501b1f1c2cd1651a087ff43068fc396f312a659,2024-04-16T17:15:11.113000 CVE-2024-38670,0,0,d6d7f4b5a182e3647c0898f8ca9d2d3bda4d575e0843840aff165e03a4fc453a,2024-07-22T13:00:53.287000 @@ -258344,7 +258386,7 @@ CVE-2024-39278,0,0,51fae5fc06f1bea217dd270a1a945e50fc908e01cdd6aa79fc8df1b8bf725 CVE-2024-3928,0,0,3771bfd5d61bb660489266159da597b0f2838c8fcc0fdb41f660ee68264744db,2024-06-06T20:15:13.813000 CVE-2024-39281,0,0,3419a2439625cfc41f8c1fc2af52d02a93ea28cf83965accb2fa3b9f5e648646,2024-11-12T15:48:59.103000 CVE-2024-39283,0,0,3cb180f3de5aa4a3b64779758cf8f61008b6ae73b857127aaaa5aa752ce57774,2024-09-12T19:15:46.390000 -CVE-2024-39285,0,1,b1c6d3c642e9af183b02a5dea78479f665c25d357dc70e9b85394065780bbfca,2024-11-15T14:00:09.720000 +CVE-2024-39285,0,0,b1c6d3c642e9af183b02a5dea78479f665c25d357dc70e9b85394065780bbfca,2024-11-15T14:00:09.720000 CVE-2024-39287,0,0,95145d1fbc5d3c99088ebf6343df14053c1bba8568afd021848bf0425c858769,2024-08-29T14:23:31.807000 CVE-2024-3929,0,0,f18b8c9cdb1e48904246b7e57e142d1a1782977d19d7fe85b4105fb3a35bceaa,2024-04-25T13:18:13.537000 CVE-2024-39291,0,0,557945eb3fbb1a8814c89e2fc458e5ea39dd1732dd1cb9036e754a14bd8e417d,2024-06-26T14:03:13.437000 @@ -258409,7 +258451,7 @@ CVE-2024-3936,0,0,eb020bb37778f80e494a260dbac71fcd852240dc2c6ce10d95e3bece33882b CVE-2024-39361,0,0,8673bcaced52217297c8c7fce708f73bcd943cb4e490aea668f5945b814898d2,2024-07-05T17:07:34.827000 CVE-2024-39362,0,0,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000 CVE-2024-39364,0,0,b1aae8c993ed814613269c7b92bcab8df246636e5f77bcc9570a7ff102a4d793,2024-09-30T12:45:57.823000 -CVE-2024-39368,0,1,25c435677ddde12916b9333776e571c91bf36c7e39133b9c9bc1ccded9657336,2024-11-15T14:00:09.720000 +CVE-2024-39368,0,0,25c435677ddde12916b9333776e571c91bf36c7e39133b9c9bc1ccded9657336,2024-11-15T14:00:09.720000 CVE-2024-3937,0,0,caaabb81caaba3cddc5592aabd3ee34f488b982de96c4de732a39d12bbc28dca,2024-05-29T13:02:09.280000 CVE-2024-39371,0,0,18c2ec312f19c927a5a7c162cba506481bea1f8c1f717499a86b2605ff600cef,2024-08-19T19:40:41.547000 CVE-2024-39373,0,0,49313ed17734e6debe931be9bab23ed5eb2e40aab9f298cb157f10a9804c26ee,2024-09-17T18:26:20.067000 @@ -258639,9 +258681,9 @@ CVE-2024-39600,0,0,3f218b3b2797556a97f50f1b3db443b951be2a33b8f95e3d04ecb200803e8 CVE-2024-39601,0,0,7691c6b30f5986c79e8398298f8afaed5e766d08eb3fdbaa17ee23cfa6227202,2024-07-24T12:55:13.223000 CVE-2024-39605,0,0,a5d8e60b596ac98c4205247c388074418dc90b00520b572619e13063948297f8,2024-11-12T13:55:21.227000 CVE-2024-39607,0,0,82ab1f90403a4f0d3b9e21e2a488cd41b34ece370e96146e9e8729444d740066,2024-08-01T15:35:17.240000 -CVE-2024-39609,0,1,401f47af88785fcf6c5cc0ca5d32835e49543ee5687edc942fa4495f0d4f3044,2024-11-15T14:00:09.720000 +CVE-2024-39609,0,0,401f47af88785fcf6c5cc0ca5d32835e49543ee5687edc942fa4495f0d4f3044,2024-11-15T14:00:09.720000 CVE-2024-3961,0,0,7859b6a2f8e5a01656e72fd209a53f5adaf23f278f08a55d207894f918e1fda9,2024-07-17T13:32:37.647000 -CVE-2024-39610,0,1,c01bed11a0638a816f33e09e96777a7445bfb13ab6bd55745cee95e8e818ad43,2024-11-15T13:58:08.913000 +CVE-2024-39610,0,0,c01bed11a0638a816f33e09e96777a7445bfb13ab6bd55745cee95e8e818ad43,2024-11-15T13:58:08.913000 CVE-2024-39612,0,0,029b5e043f8fa9387c1e935fd25a69e218f8fd7196fe19845233dbfcda84d17e,2024-09-04T16:38:56.383000 CVE-2024-39613,0,0,a01eb288198c1ee98f509a48683a6028690d03e91539f0fa22857619bc4ca335,2024-09-20T13:59:01.117000 CVE-2024-39614,0,0,80fda44b15f74076f020f7bfc25c89db880e93067c83790f059fc3bf750e00f8,2024-08-01T13:55:55.837000 @@ -258737,7 +258779,7 @@ CVE-2024-39701,0,0,879aa58f50a7d5b18bfb505718bd80f7c1e443b3ef3725ff1457799d3d8b8 CVE-2024-39702,0,0,26972dcfed4a9e2d13857f82734cd85677a01fa267564ba6286c42935ec6e373,2024-07-24T12:55:13.223000 CVE-2024-39704,0,0,1d59c065d69d465eb86bf6114b5299aaf44c728f69d6748df6b6bd65077d4590,2024-07-03T14:32:56.510000 CVE-2024-39705,0,0,aa75ecfe331ee5d16e104493e16afd26f62024e9296a197b99cac0edaec74e23,2024-09-15T20:35:02.817000 -CVE-2024-39707,0,1,a705426f80da8c6a5e48f3d7c38b841a2fbb1f6e4435784c498bc1aedae1b179,2024-11-15T13:58:08.913000 +CVE-2024-39707,0,0,a705426f80da8c6a5e48f3d7c38b841a2fbb1f6e4435784c498bc1aedae1b179,2024-11-15T13:58:08.913000 CVE-2024-39708,0,0,5ba6724a88a25c721702dbcbb09c32f9771f7eb0a866958cc03dc7237b54b807,2024-10-31T14:35:16.610000 CVE-2024-39709,0,0,18c732ed201f2614b279141675539029315bb58820f31197d64cccd45f0aa46a,2024-11-13T19:35:14.073000 CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000 @@ -258778,7 +258820,7 @@ CVE-2024-39747,0,0,a2161f167ae95389c72b0c031bdb90fe73f7e348a5f87dbcba6e48e765456 CVE-2024-39751,0,0,a868bf4be3dd2b51f3b58089c18a834cccac125c90e59de11837fcfc432cb518,2024-08-29T16:56:32.053000 CVE-2024-39753,0,0,6bcbf6ac96b06d4d219adf124dd62c559d3dd840ef1bf69100476577424fbd3d,2024-10-23T15:12:34.673000 CVE-2024-39755,0,0,dfcf10f6b8600deddb49177d38227bb50ccc0bc92a697b205718d374dfc6c532,2024-10-04T13:50:43.727000 -CVE-2024-39766,0,1,7c05e599347e24bf3e99cf099c7c0db0a8f9d0eebdd7642cd355fe57ac61a26f,2024-11-15T14:00:09.720000 +CVE-2024-39766,0,0,7c05e599347e24bf3e99cf099c7c0db0a8f9d0eebdd7642cd355fe57ac61a26f,2024-11-15T14:00:09.720000 CVE-2024-39767,0,0,3e2d929a0dec960247b2d08752313be7fe5d03de12cbd71addbfff64b71f8489,2024-07-16T18:04:02.993000 CVE-2024-3977,0,0,e9ddc667440c6dcbe059212d85a4e046d10d5ad7b4b151b497bb4963c631de68,2024-08-01T13:56:47.833000 CVE-2024-39771,0,0,9e0580f815353995f09e16cf0a17131e87cdc1c24ed90f31d73908db8cfc927d,2024-10-28T21:35:11.267000 @@ -258797,7 +258839,7 @@ CVE-2024-39807,0,0,ba2c368fe4cdf413290b5bff8a949eddf35bb4de98ed47f43e524e6cb747e CVE-2024-39808,0,0,f1d26d2425b41e1ef901bf3d90a3385ce6661037b493c6ae6b535707b4ad0681,2024-09-11T16:26:11.920000 CVE-2024-39809,0,0,c569a9d6ae86025131a09eaedcfa15c9c40ca354c9f22b3a0f796bbc84856d4d,2024-08-19T16:19:52.530000 CVE-2024-39810,0,0,32d906c66fda3178aaaf67b328715612b9d762f16a6ecd0f62d6e5eaf48f095a,2024-08-23T16:16:36.907000 -CVE-2024-39811,0,1,1d3e48021eb49ddfb2eacf0645f15509b27b0fdfaf7a0cb5a12a6885980fa18f,2024-11-15T14:00:09.720000 +CVE-2024-39811,0,0,1d3e48021eb49ddfb2eacf0645f15509b27b0fdfaf7a0cb5a12a6885980fa18f,2024-11-15T14:00:09.720000 CVE-2024-39815,0,0,2d23504d87a7185e1f6c185524d0f78ab739cf6cb169d8e09b6dc1e083fb2cc8,2024-08-20T17:14:18.587000 CVE-2024-39816,0,0,99e8d0f2ca7c7949ccc5b1fb01e67a6b8249c725e85c2220f31f36de7605bd24,2024-09-04T16:30:42.197000 CVE-2024-39817,0,0,da37b9dcdb041f40628bdd9732b2ecb73043147c99cfbf7acdec75950efdf2c1,2024-09-11T19:36:18.050000 @@ -259003,12 +259045,12 @@ CVE-2024-40395,0,0,3ba6dbce46079967e0577ccca7056038a218abcb260e702c86d066887bd84 CVE-2024-4040,0,0,4c2ad1f11d479d0071ddbaeb3523edde6a0cd9c4e74c065c69d4bb5c9b1ac029,2024-04-26T15:25:47.270000 CVE-2024-40400,0,0,aec60b9f9f600363c457f651ff723a62cac6ef548b5399a3264322f4567e7220,2024-08-01T13:57:15.850000 CVE-2024-40402,0,0,8f3b56ab0ece8779de55d2a1e01ca402786b5a92667e8e6ee5b5e922914d1480,2024-08-01T13:57:16.643000 -CVE-2024-40404,0,1,09c3b53abfd0e91392f863ace73d4bf792a3d39fa8ece0e52b239a44c680b5dd,2024-11-15T13:58:08.913000 -CVE-2024-40405,0,1,b6fe3ee9d74cb7dadbfaf01b71937c8526639bef219e5b271ae83c0ede768c3e,2024-11-15T13:58:08.913000 -CVE-2024-40407,0,1,cfdde6cfd1ec4997a6be04496533e6e3ba493fdb86485e1df9b448f4cdb421be,2024-11-15T13:58:08.913000 -CVE-2024-40408,0,1,f2a4bf811588bd6549be4495047343b805bc51122bf3c331b3657e08be80af16,2024-11-15T13:58:08.913000 +CVE-2024-40404,0,0,09c3b53abfd0e91392f863ace73d4bf792a3d39fa8ece0e52b239a44c680b5dd,2024-11-15T13:58:08.913000 +CVE-2024-40405,0,0,b6fe3ee9d74cb7dadbfaf01b71937c8526639bef219e5b271ae83c0ede768c3e,2024-11-15T13:58:08.913000 +CVE-2024-40407,0,0,cfdde6cfd1ec4997a6be04496533e6e3ba493fdb86485e1df9b448f4cdb421be,2024-11-15T13:58:08.913000 +CVE-2024-40408,0,0,f2a4bf811588bd6549be4495047343b805bc51122bf3c331b3657e08be80af16,2024-11-15T13:58:08.913000 CVE-2024-4041,0,0,bd71d95aba274d30d448ad146bc23c848b8a3b9576dc252f709372f143cb7780,2024-05-14T16:11:39.510000 -CVE-2024-40410,0,1,df61a951d33ce95e69a8770a86879c0ecb50cd8e184ef90b585d3c5705171ad7,2024-11-15T13:58:08.913000 +CVE-2024-40410,0,0,df61a951d33ce95e69a8770a86879c0ecb50cd8e184ef90b585d3c5705171ad7,2024-11-15T13:58:08.913000 CVE-2024-40412,0,0,6bec7f774fa3844522b88a2194ef0a518564be0031f950daee4cc3a1d2af5bc7,2024-08-01T13:57:17.453000 CVE-2024-40414,0,0,cce4bc45b3fd958899493947d8b56ef56455ed7c491dfa2b8588a84925be9f13,2024-08-07T22:13:50.937000 CVE-2024-40415,0,0,97b6ea5de4ca3bbb8d7d817518418a144fefb721c0a2cb8a92df0a8cba71dbba,2024-08-07T22:13:41.720000 @@ -259026,7 +259068,7 @@ CVE-2024-40433,0,0,e7a4ec9affcd5459ba2865b747a3c21f3af0ec6afc5f3d7573785ee389417 CVE-2024-4044,0,0,e5bbe7519a57f32e10b3da751a3cb9112f45a7270ca309aa6997e34b1ffc6b95,2024-05-14T16:11:39.510000 CVE-2024-40441,0,0,c6514ede5c7f5ef8c83cfb03126d88402099d182d6578c9b7395512c5db252a8,2024-09-26T13:32:55.343000 CVE-2024-40442,0,0,b94f825c99758bea85b2c2210a43f156f98af881c7925e7becb988dd665ef631,2024-09-26T13:32:55.343000 -CVE-2024-40443,0,1,ca408d5d9e694f13a0db48747453974f4b97d8d30f5844a8baa1f829ec489365,2024-11-15T14:00:09.720000 +CVE-2024-40443,0,0,ca408d5d9e694f13a0db48747453974f4b97d8d30f5844a8baa1f829ec489365,2024-11-15T14:00:09.720000 CVE-2024-4045,0,0,2ae0d8f233b2cc7f6d27d9d81b74b74fd6cc2876f88a425dbeb60d35e4802b53,2024-05-28T12:39:42.673000 CVE-2024-40453,0,0,4483c5209dc00972ed35087fa7a57143bcc3f4e4c2aa05f9c16e6199d4acac45,2024-08-23T17:35:05.463000 CVE-2024-40455,0,0,2b4af03841b1088e106e2c8470bdfc3454c77a8d4b576f687e8da463b4385ab7,2024-08-01T13:57:29.287000 @@ -259102,7 +259144,7 @@ CVE-2024-40568,0,0,4e89eb42d593339b238d1e440516cb2ccd3f5095fd163b21c19673544e39a CVE-2024-4057,0,0,26b46aa52b04f4ef8890033772544e5e99ad730f84e9e0e97b479cd36cf89ace,2024-07-03T02:07:02.197000 CVE-2024-40575,0,0,267280fd6d1dce9620611aeb1f0d6276db3825fa55e9f5e7fc538f4804a7f026,2024-07-25T17:35:28.913000 CVE-2024-40576,0,0,8423823b913f3d1284aae2224b689bfefe0b7a1b018e49f904fd4948fdba6a99,2024-08-01T13:57:51.520000 -CVE-2024-40579,0,1,3f82e21074c6bf0b316ec262cf4256590fbaedbb88be06b33f5645f8e73b5bb9,2024-11-15T13:58:08.913000 +CVE-2024-40579,0,0,3f82e21074c6bf0b316ec262cf4256590fbaedbb88be06b33f5645f8e73b5bb9,2024-11-15T13:58:08.913000 CVE-2024-4058,0,0,517dff31dd649a4fc97ec9b0700bafce6dc3cd3c4729ffb175a77bfe0097ad6e,2024-08-01T13:59:23.240000 CVE-2024-4059,0,0,c49986e07be30ca2c850f4613369c1702dff21e7018832f61c83284c95e0cc00,2024-05-03T03:16:29.430000 CVE-2024-40592,0,0,5acfdff926c4ce1e8230567e18f89491dd35f3a5c402aaf623c0641f88ae3656,2024-11-14T20:37:06.040000 @@ -259160,11 +259202,11 @@ CVE-2024-40657,0,0,20ced210671262f43b0cc62341898b9fc7febd5f8789caf35d41deaa287b9 CVE-2024-40658,0,0,5f8a6b60ca62d2cfa0f9862e86c619e00e5db037ad87f1558ced4ae7f02d2bd8,2024-09-11T16:26:11.920000 CVE-2024-40659,0,0,fabbb4b92a57e596b06e9bd31b045ecca58663666534e05d61759f6961367421,2024-11-04T18:35:10.733000 CVE-2024-4066,0,0,5674d1317b0a03adb324e31f70d35a87031f26ca2ea2869349483359d081bdf7,2024-06-04T19:20:29.323000 -CVE-2024-40660,0,1,69f3d7259c5da11ebe11f4c03a4b3a515c6f33e7688275926969f1e12f9501e4,2024-11-15T14:00:09.720000 -CVE-2024-40661,0,1,e9c32aa9f312300f15863e83b56dcd4f501b9446d32e8063b8d30f119f8dda41,2024-11-15T14:00:09.720000 +CVE-2024-40660,0,0,69f3d7259c5da11ebe11f4c03a4b3a515c6f33e7688275926969f1e12f9501e4,2024-11-15T14:00:09.720000 +CVE-2024-40661,0,0,e9c32aa9f312300f15863e83b56dcd4f501b9446d32e8063b8d30f119f8dda41,2024-11-15T14:00:09.720000 CVE-2024-40662,0,0,158da2f06a1d27615161cee7fe7341ef1e87f2062801f47e3e4f4b1d6a1663ec,2024-09-11T16:26:11.920000 CVE-2024-4067,0,0,cb2492818fe81f39be6108b3726f1fbc34af211b5be3405ee7a17904cdbd58f2,2024-08-28T00:15:04.130000 -CVE-2024-40671,0,1,1a698dcc54c72745530fe727387f290b0787d77995a851331f67ecba0eeb9701,2024-11-15T14:00:09.720000 +CVE-2024-40671,0,0,1a698dcc54c72745530fe727387f290b0787d77995a851331f67ecba0eeb9701,2024-11-15T14:00:09.720000 CVE-2024-4068,0,0,bb45b0f3c24ec800e9c86d4119a908807b555886bbc03073bf2175c668679f63,2024-07-03T02:07:03.943000 CVE-2024-40680,0,0,6a7d82455fef21e03a575dce9fc7ae88a549fdf8ecdf4b4bb72b8cebe35b53d9,2024-10-31T17:15:12.990000 CVE-2024-40681,0,0,fac9532bdd8d5b6d1b1f49e08b67a17d3abcf6f9f6c80d971ff62d66179abc1a,2024-10-31T17:15:13.143000 @@ -259325,7 +259367,7 @@ CVE-2024-40873,0,0,6df1707815f9f38105b50cd71b6fad1bdaf7a6f3e3c945bc399ab848fdd0a CVE-2024-4088,0,0,61cc31924b86843bbd20c326ef7465dc1aa394b548458b2e1a9fc62c09ede628,2024-06-11T17:11:30.193000 CVE-2024-40883,0,0,403e612e6d9c92bba755ea1bc3ab9fda6730b304c92eb59eb04af52459f79697,2024-10-27T01:35:12.100000 CVE-2024-40884,0,0,ff232cdbc88b9d59bd801683d73c76bda50973c98d329e426c37e00c00612f9e,2024-10-17T14:05:16.247000 -CVE-2024-40885,0,1,e98274fce0ae6642c4bef8a0796da12bd974b4bf43010735bc4ff5db64ebfb9b,2024-11-15T14:00:09.720000 +CVE-2024-40885,0,0,e98274fce0ae6642c4bef8a0796da12bd974b4bf43010735bc4ff5db64ebfb9b,2024-11-15T14:00:09.720000 CVE-2024-40886,0,0,366f3546e42ed526b269e117ba5fde90b643767db321194ac7a300a3dda42364,2024-08-23T16:09:31.887000 CVE-2024-4089,0,0,c48b0b1633259955b88d07dee6add98fde70c2881982b5baf56d243e9a2b6c21,2024-10-17T19:41:36.467000 CVE-2024-40892,0,0,80f2c69eafcb531435cc671447d237ff8792f374d8c58f10182688d813811ab4,2024-08-21T18:15:09.710000 @@ -259596,7 +259638,7 @@ CVE-2024-41161,0,0,9b33361091df6923832caa53c78a9e46bbbedfd096d5512869c0f1eed0413 CVE-2024-41162,0,0,e54fc1a9823f936d00354799974ba06adb4cc451d56f48d5711fb6c0d45b612e,2024-09-04T17:03:53.010000 CVE-2024-41163,0,0,27e4d5214b7422b34fa104447f5b61de05cea94735fc481acd43b25292b276a1,2024-10-08T14:47:56.787000 CVE-2024-41164,0,0,c5521af658e92e64cee6bd40535b27065e46248fed1bc5e43067dc57eef0c4d6,2024-08-19T18:39:06.157000 -CVE-2024-41167,0,1,5e8adb8a4f1d03de454100a60c52fb33bcf00d04b8db414a4c56515dec65fd5d,2024-11-15T14:00:09.720000 +CVE-2024-41167,0,0,5e8adb8a4f1d03de454100a60c52fb33bcf00d04b8db414a4c56515dec65fd5d,2024-11-15T14:00:09.720000 CVE-2024-4117,0,0,439d2da59fd01a25f254df6698027149837f261eb1a16ba5752d7e62667d1bfc,2024-06-04T19:20:30.043000 CVE-2024-41170,0,0,817fea013dbb80aba74cedd999d41f457edab776da0940277c0a8d6917a3fea3,2024-09-10T12:09:50.377000 CVE-2024-41171,0,0,21e8211c0e8b04d22b03b4933a02a2ed4c14686c5cf3c857123c3bdfefc5823a,2024-09-10T12:09:50.377000 @@ -259612,10 +259654,10 @@ CVE-2024-41184,0,0,460d3d6d07916ac0f7c6ce162599c802c196ea0f25bca5ddf54b8e8b24963 CVE-2024-4119,0,0,1787463dab796293e9249fc34f7a40843b12d1d129a7d5ccdb513e5ec2672067,2024-06-04T19:20:30.247000 CVE-2024-4120,0,0,820754c86895fc4e7f3a6d10baae3c2abd537610acf37474f492c12f46cc8b59,2024-06-04T19:20:30.353000 CVE-2024-41200,0,0,c6634d5ee9208991d605965f74d59d477ce80a275c83b2ac8c83f9990bd5e19e,2024-11-05T22:35:06.980000 -CVE-2024-41206,0,1,edbaf16e5ee8ab9dd8a7f73c36515a779dd6902880ac13f83b82178d57170002,2024-11-15T13:58:08.913000 -CVE-2024-41209,0,1,c96c2c4e5eb3b8683f7fb1ba3c5fc4ccd74a82104f499ec8e7ccc3e64813740d,2024-11-15T13:58:08.913000 +CVE-2024-41206,0,0,edbaf16e5ee8ab9dd8a7f73c36515a779dd6902880ac13f83b82178d57170002,2024-11-15T13:58:08.913000 +CVE-2024-41209,0,0,c96c2c4e5eb3b8683f7fb1ba3c5fc4ccd74a82104f499ec8e7ccc3e64813740d,2024-11-15T13:58:08.913000 CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd920,2024-06-04T19:20:30.460000 -CVE-2024-41217,0,1,f09401728c77dc59a55e5d2423a8e51ee32f809c3fdb8c0afc3ba242373e3b76,2024-11-15T13:58:08.913000 +CVE-2024-41217,0,0,f09401728c77dc59a55e5d2423a8e51ee32f809c3fdb8c0afc3ba242373e3b76,2024-11-15T13:58:08.913000 CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd281,2024-06-04T19:20:30.560000 CVE-2024-41226,0,0,a3a85fa64d0c123f261294a19d764a3608a61e848957876669f922adbd8d3b3c,2024-09-03T21:15:15.923000 CVE-2024-41228,0,0,f3d365bd2199687dcff5eebde6177461134036d09c1cc3d7eb6b2cb72c0f76b0,2024-09-26T13:32:55.343000 @@ -259911,6 +259953,8 @@ CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d83 CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000 CVE-2024-41773,0,0,73b68ae1e3819b7d1bac9bdaf38a7a90512524d32ae7dfbb950bef5b99d479bb,2024-08-26T18:33:07.997000 CVE-2024-41774,0,0,efcbfdf7ce18fcd97c6ecc860adabe2a80f23f77068d5d032fbe380664ccfbc3,2024-08-24T11:15:05.670000 +CVE-2024-41784,1,1,4b9bce87b99a4cb8633adeca46d5c13b7e94312b7a819f69309d37321034c793,2024-11-15T16:15:34.240000 +CVE-2024-41785,1,1,acdd00f5f60c3a57c055b3330660e51341a71d97fcd9840019eb93d619819ff9,2024-11-15T15:15:07.047000 CVE-2024-41798,0,0,0376144119ee906fa3756a5ffda1af85d3678e11ad2cbd0913fd4be38d98ecf1,2024-10-10T12:56:30.817000 CVE-2024-41799,0,0,7695f1ee4025235dd7412142131ce8d75a7b17a18d3cf669cff383f93f7dba19,2024-07-29T16:21:52.517000 CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434fc,2024-06-04T16:57:41.053000 @@ -260249,7 +260293,7 @@ CVE-2024-42166,0,0,18df6e3d78544dc8ad38e19fe493f73a53f7ef17f4a96d8246b9654224a5c CVE-2024-42167,0,0,cd8646272ac8e058d6c4cd2f9a697cfc1c8ee88730b877963e6d060dbe9c7f9a,2024-08-29T15:24:12.060000 CVE-2024-4217,0,0,b697d32a81a44314e31fbbbd491d72bf1d83730c215f0b4ac0b5c272bbd60693,2024-08-01T13:59:28.453000 CVE-2024-4218,0,0,dff7b6ef5b1eda10e25547a7c58ff59e7141627798ff1eb390bbb04c101af4a9,2024-05-30T13:15:41.297000 -CVE-2024-42188,0,1,26a3c898c2312a232bd54c8511f8d7fef66ee727dbf7a729f62cb44bd166d795,2024-11-15T13:58:08.913000 +CVE-2024-42188,0,0,26a3c898c2312a232bd54c8511f8d7fef66ee727dbf7a729f62cb44bd166d795,2024-11-15T13:58:08.913000 CVE-2024-4219,0,0,e67747b1814e30f9a57aa2d5fada7a64c70b8e2f4229bf1bd72194f6b14072cc,2024-06-11T17:06:50.963000 CVE-2024-4220,0,0,046e30c2acea51afb217826bab01d9bc8062f3ae27d0f03889e044f9dcbfad10,2024-06-11T17:05:35.203000 CVE-2024-42218,0,0,331226ea49af1a2f92292f364b4fd8bc3c26a90f49d1b9421ad0db0c509189fd,2024-08-12T18:27:54.660000 @@ -260498,7 +260542,7 @@ CVE-2024-42493,0,0,62acde285327354a8bf885be4a4449e2ac155d363ca62a755a0d6560a4377 CVE-2024-42495,0,0,9abc7330eac6d6df1f12abde56401fb389a89e85bdfac6db206d32a19ef64c3e,2024-10-04T14:37:36.703000 CVE-2024-42496,0,0,82629bcd722b8cb6d341bed3916823c994361fb6b4946b9099c29ac012cbc5a4,2024-09-30T12:45:57.823000 CVE-2024-42497,0,0,6c95277a74b4240375f9e65f5c21a104fec038817af68c50a8b421844638164c,2024-10-16T20:05:09.183000 -CVE-2024-42499,0,1,c9441ed075a7bfd8e58b67a4fefec6e1fb82fdc6387117c2032cf13cf05f22de,2024-11-15T13:58:08.913000 +CVE-2024-42499,0,0,c9441ed075a7bfd8e58b67a4fefec6e1fb82fdc6387117c2032cf13cf05f22de,2024-11-15T13:58:08.913000 CVE-2024-4250,0,0,29d8096febeb47af7a705b5c5f44b0e0121b5483d3074c39ff1bff1155e9a3a5,2024-06-04T19:20:34.200000 CVE-2024-42500,0,0,f0bcaea9090b49f77db24a21554ec397886059105966434018e3d2adca5c9151,2024-09-10T12:09:50.377000 CVE-2024-42501,0,0,2d6a46c355be0708ff7db2c58107fc669881111adf034802ab42261dde0a7bbe,2024-09-20T12:30:51.220000 @@ -260696,7 +260740,7 @@ CVE-2024-42816,0,0,8dd1ae8820cfa39b8949229a5b0a0fd0a511af977924a1929a9dcb8553f95 CVE-2024-42818,0,0,694f268c461684854315b7e46e53659be0c6525c36cb73fb82a2ea42f888fdd3,2024-08-26T19:10:18.890000 CVE-2024-4283,0,0,0b01382e91d2d3830bdcadad6ff16c4cbf45d62064e6424171f058dd71657988,2024-09-24T16:51:23.193000 CVE-2024-42831,0,0,81c8fba77a06683f68ef3418776fd6a90738b17ea781218e5200d9ee57eaad3f,2024-10-10T12:57:21.987000 -CVE-2024-42834,0,1,702ce8441c33f6864b5e255415f27d92e2ceba09d0dd7351bacc93c440dba751,2024-11-15T14:00:09.720000 +CVE-2024-42834,0,0,702ce8441c33f6864b5e255415f27d92e2ceba09d0dd7351bacc93c440dba751,2024-11-15T14:00:09.720000 CVE-2024-42835,0,0,fb2d538cbd8f88f1ce5aec6568bdd53758673ed888c26df71bdc646cb1d289fd,2024-11-01T12:57:03.417000 CVE-2024-4284,0,0,4fbe27a80563712e41b6422ac48754a31c657da862cab89b959335ecaf13d90e,2024-05-20T13:00:04.957000 CVE-2024-42843,0,0,147a94e278dd08ceb9ff0b00f505eb868d7a1e59c01ddecc9d1420e344e9ec86,2024-08-19T19:35:09.180000 @@ -260800,26 +260844,26 @@ CVE-2024-4305,0,0,3d3b1d1c5c813e5fa60e1eff1163926298ea6a7612f6966e2cad8be591d140 CVE-2024-4306,0,0,a2edc9b105cc4a694942681b57dff61f9e5285cc8aec37eba8bdc15814541dcc,2024-04-29T12:42:03.667000 CVE-2024-4307,0,0,9af1fe76e1dfb80a8368bbb3fc69b1f2cbb4fca53c0870243e2c9aa4c3d8390b,2024-04-30T13:11:16.690000 CVE-2024-4308,0,0,63b73a2fc8e8d5be636a84f19daeea12c1e2d5b3b652e500f77934bf4e894f3b,2024-07-03T02:07:22.320000 -CVE-2024-43080,0,1,799a05817985865907820873f2e9a662b70e7528a1722bc76cebfc8eb3a1468f,2024-11-15T14:00:09.720000 -CVE-2024-43081,0,1,cc1d4ea682e601791d9f0d9c15814cd90ad877dd31f4ae97c17c16e9118aa848,2024-11-15T14:00:09.720000 -CVE-2024-43082,0,1,12f0f2869b283eec76de099c8cf236101d8899667860efc0b278d21e3ecea426,2024-11-15T14:00:09.720000 -CVE-2024-43083,0,1,c980986f7048e2585e4816111a624bc7f629db6efbbd3ed5d6638f93c42b8dbc,2024-11-15T14:00:09.720000 -CVE-2024-43084,0,1,3d7cb769c3819debac5ab4b56b1b8dcc94072d34ea69ec89429430e9aeaf07c3,2024-11-15T14:00:09.720000 -CVE-2024-43085,0,1,cf52c671f83dd53a26461c676e72cb7481a4a9aad5b4b88ee4e1b647b9b40893,2024-11-15T14:00:09.720000 -CVE-2024-43086,0,1,3c0b373141dec951439b451c55790d2a488bce45bac9d3576bca83606fa321d3,2024-11-15T14:00:09.720000 -CVE-2024-43087,0,1,4485d42339159abb1686cbc8803004987a41e51d0da2d1ede54495e9cf6541e6,2024-11-15T14:00:09.720000 -CVE-2024-43088,0,1,5fbf63de8edfff74dd53eb50c668704ac8d4545d67de243eaefcbc2be774c7e6,2024-11-15T14:00:09.720000 -CVE-2024-43089,0,1,d3b053825a9d0f746a08fd76a42a6d43f88775450cf3a22f622d8b459747722b,2024-11-15T14:00:09.720000 +CVE-2024-43080,0,0,799a05817985865907820873f2e9a662b70e7528a1722bc76cebfc8eb3a1468f,2024-11-15T14:00:09.720000 +CVE-2024-43081,0,0,cc1d4ea682e601791d9f0d9c15814cd90ad877dd31f4ae97c17c16e9118aa848,2024-11-15T14:00:09.720000 +CVE-2024-43082,0,0,12f0f2869b283eec76de099c8cf236101d8899667860efc0b278d21e3ecea426,2024-11-15T14:00:09.720000 +CVE-2024-43083,0,0,c980986f7048e2585e4816111a624bc7f629db6efbbd3ed5d6638f93c42b8dbc,2024-11-15T14:00:09.720000 +CVE-2024-43084,0,0,3d7cb769c3819debac5ab4b56b1b8dcc94072d34ea69ec89429430e9aeaf07c3,2024-11-15T14:00:09.720000 +CVE-2024-43085,0,0,cf52c671f83dd53a26461c676e72cb7481a4a9aad5b4b88ee4e1b647b9b40893,2024-11-15T14:00:09.720000 +CVE-2024-43086,0,0,3c0b373141dec951439b451c55790d2a488bce45bac9d3576bca83606fa321d3,2024-11-15T14:00:09.720000 +CVE-2024-43087,0,0,4485d42339159abb1686cbc8803004987a41e51d0da2d1ede54495e9cf6541e6,2024-11-15T14:00:09.720000 +CVE-2024-43088,0,0,5fbf63de8edfff74dd53eb50c668704ac8d4545d67de243eaefcbc2be774c7e6,2024-11-15T14:00:09.720000 +CVE-2024-43089,0,0,d3b053825a9d0f746a08fd76a42a6d43f88775450cf3a22f622d8b459747722b,2024-11-15T14:00:09.720000 CVE-2024-4309,0,0,5b40a8fbb2137dd0d77fe6c4c1c586190f4489f813d005ab45d5553c299b0b73,2024-04-30T13:11:16.690000 -CVE-2024-43090,0,1,848285523b1896a815127be3a3a822d3044ca02a62736f67a76b73d14c9bb36e,2024-11-15T14:00:09.720000 -CVE-2024-43091,0,1,a4ed2e91dce6bf9b7994c0e48ea8b422882ce713583c38600d41c714ede7374c,2024-11-15T14:00:09.720000 +CVE-2024-43090,0,0,848285523b1896a815127be3a3a822d3044ca02a62736f67a76b73d14c9bb36e,2024-11-15T14:00:09.720000 +CVE-2024-43091,0,0,a4ed2e91dce6bf9b7994c0e48ea8b422882ce713583c38600d41c714ede7374c,2024-11-15T14:00:09.720000 CVE-2024-43093,0,0,a5e7a7a99ded32f4ceacb99abeec61cc52c3868dd50355a02eece2e0b7c2cfec,2024-11-14T21:42:34.923000 CVE-2024-43099,0,0,1e8651c725576df83054b4b74436ff5087c13bad1e13244cb0e6a25df0f7bb09,2024-09-14T11:47:14.677000 CVE-2024-4310,0,0,08f5e8e76073c3640785934b5dbc198d89dde47497c02b1ac3fc670d20c22fd2,2024-04-30T13:11:16.690000 CVE-2024-43102,0,0,08e196b4c8739548226238903033d07bdd98395e1a6fb3461533ef08cfa70faf,2024-09-05T21:23:40.503000 CVE-2024-43105,0,0,65a66601afd2de184f3745e025013cb99c4a6cae651d4eabc58a96778d4da9f8,2024-08-23T16:18:28.547000 CVE-2024-43108,0,0,d9bd8ea3b307dd054ae1953991304a1a331018261701e1f611f2a6906461a05c,2024-10-17T17:15:11.883000 -CVE-2024-4311,0,1,1206cb174e395a911dfce9fc5257fd99b4e97e70b5a158c70161cd9e4c52115f,2024-11-15T13:58:08.913000 +CVE-2024-4311,0,0,1206cb174e395a911dfce9fc5257fd99b4e97e70b5a158c70161cd9e4c52115f,2024-11-15T13:58:08.913000 CVE-2024-43110,0,0,1fe822a52c0b3af1ede7bdafa556f57158a1ace3adaf6fcd1e0c1b1f3c86485b,2024-09-05T21:22:04.810000 CVE-2024-43111,0,0,45754d9244b10ae48023a8465600f12d5ca692d4146e1c9ba1d4a0e6fcd0734a,2024-08-29T16:53:16.233000 CVE-2024-43112,0,0,72269ebdb7b810fe860916d34468320e2e91d1a609ed10c8290e69cc95ee1d45,2024-08-29T16:51:55.937000 @@ -260888,6 +260932,7 @@ CVE-2024-43177,0,0,2e91df99c102e520c2bb937f75df1229588c30ac5f4c9282ac32d182ae564 CVE-2024-4318,0,0,3bd63bc61468b7ca3d2d40c33a55eb01fa72ff95d7d5fb5f0e4f8d9b094da54b,2024-05-16T13:03:05.353000 CVE-2024-43180,0,0,abb2e48a138ce8e840850ec2c73107ac445b622170d298531958775b0aa3e8a2,2024-09-20T17:28:06.617000 CVE-2024-43188,0,0,e35d0111e2400440d7a3229650e46565d9a613f599bd61cb8e0041fbf0bfcd3f,2024-09-29T00:24:49.103000 +CVE-2024-43189,1,1,8361501fcc1618295692fa4ffcd954b7028fa6b3347368e6559d4521dfeabfce,2024-11-15T15:15:07.307000 CVE-2024-4319,0,0,7ca0245a01df3d5ced472265b32f90c6f6a22a37af3715d5589379ecac1f6a24,2024-06-11T13:54:12.057000 CVE-2024-43191,0,0,39f06d3c6ad8405bfc0c97c3e896524beacc5fba902e2cdc1730fdb616dc0623,2024-09-30T12:46:20.237000 CVE-2024-43199,0,0,94150f8459e19abf18625a946d8a507867275817cd3d9928084030fcb7fa8330,2024-08-12T12:59:48.253000 @@ -261120,7 +261165,7 @@ CVE-2024-43426,0,0,2e98ed8cd0fe3bbd03bc31edcafe875e17ec3c3fbf69dc03657573f422300 CVE-2024-43427,0,0,c0afa9190bfbd3a42daa26b3156ede180ba7e66263d84fafeb811083b81b57ec,2024-11-12T15:35:06.950000 CVE-2024-43428,0,0,b5ed04eb9991b8a533d52401aafbeac39cc5aa45a83db20224d68df7b23b336a,2024-11-08T19:01:03.880000 CVE-2024-43429,0,0,f5ddfa56b018dea7dd2df903532e997853780531d9960a7743dc3f510200d05d,2024-11-12T20:35:11.370000 -CVE-2024-4343,0,1,ab4d2662cd7c6951d24746bc50df31bf25ca1d1ac8d66b86f18b9d1e5fa73d47,2024-11-15T13:58:08.913000 +CVE-2024-4343,0,0,ab4d2662cd7c6951d24746bc50df31bf25ca1d1ac8d66b86f18b9d1e5fa73d47,2024-11-15T13:58:08.913000 CVE-2024-43430,0,0,56b9aa97c4cdbeb7d02668c0a21fc9e420a493aa45c3ca05f334d7cfa97343ea,2024-11-12T15:35:07.837000 CVE-2024-43431,0,0,b9005a05e5507a46df12a8ffbb839f8f4313b143d14ebe18ef1c5cef640c905e,2024-11-08T19:01:03.880000 CVE-2024-43432,0,0,6882cdf5acd71ff08ac60ea8ef39b61d02a539f240a4304bb1e0c1af091cba8f,2024-11-12T16:35:17.560000 @@ -262209,7 +262254,7 @@ CVE-2024-4509,0,0,996942a0a2c59f4d53067a2868fbad35944719504585e3998bbd4d788c5455 CVE-2024-45096,0,0,d4f642a1e6bb8f30a3a63abc6de33d2a734d4a63841c63adbbf0861fc10b1ff8,2024-09-06T12:34:17.957000 CVE-2024-45097,0,0,66f33176e0c07f5466116654bcd7c2847267016c1af22914a830c235e4290102,2024-09-06T12:51:59.750000 CVE-2024-45098,0,0,d99373b3861e761d69e1423a19b397cd3881f87fabdf54ab0162bbecfa72f038,2024-09-06T13:01:44.023000 -CVE-2024-45099,0,1,2ac82c72dd3344ff32d6bcbe01fdc95a7307d008c3f97ecc0b6e21b0440cfdf3,2024-11-15T13:58:08.913000 +CVE-2024-45099,0,0,2ac82c72dd3344ff32d6bcbe01fdc95a7307d008c3f97ecc0b6e21b0440cfdf3,2024-11-15T13:58:08.913000 CVE-2024-4510,0,0,e609022dce213b03ba687f592023f15f3e261f085d88e9ff14f3b7ffe9969d1b,2024-05-17T02:40:26.417000 CVE-2024-45101,0,0,cad1255565408251227b424af7803fa7b621bb0a87132fd60fe56f4ddc9639ef,2024-09-14T11:47:14.677000 CVE-2024-45103,0,0,01e8c7d7777680c3c907a9b9346c8d516e1c4df3a86a3dfed3c0a030a8c65f44,2024-09-19T01:50:12.427000 @@ -262338,8 +262383,8 @@ CVE-2024-4525,0,0,dfe2a87106534aea559d2a64c000518f6d0b8952ad5d7b752f8fc10ec2414d CVE-2024-45250,0,0,e9b56e111bbc8f345e771d0d97f6c666ffbfb94747161b5a547dc2214faeb00b,2024-10-07T17:47:48.410000 CVE-2024-45251,0,0,4723402deaff257a03485bee19d0c63cf2e4218538079529007db41f2e86ba8e,2024-10-07T17:47:48.410000 CVE-2024-45252,0,0,d5507db1b0bfef3e2d4dc8033cbb1d8a5c92c659f9cc4356d3a7d9eed6325773,2024-10-07T17:47:48.410000 -CVE-2024-45253,0,1,3ae7870db7b1870fee32d9e68f2da2a811ff8ae3b1bc36c2651f85223f7ecf6d,2024-11-15T13:58:08.913000 -CVE-2024-45254,0,1,3a02ea6d224b632434bb70e685a0a234ace2d002ace9aee29c76fa887eafd0c4,2024-11-15T13:58:08.913000 +CVE-2024-45253,0,0,3ae7870db7b1870fee32d9e68f2da2a811ff8ae3b1bc36c2651f85223f7ecf6d,2024-11-15T13:58:08.913000 +CVE-2024-45254,0,0,3a02ea6d224b632434bb70e685a0a234ace2d002ace9aee29c76fa887eafd0c4,2024-11-15T13:58:08.913000 CVE-2024-45256,0,0,1ad6eb17928348883dd9cb354722f92894049d9e7bbed38aa0c5260ca73ab2c4,2024-08-26T13:35:02.937000 CVE-2024-45258,0,0,20ee97d2eb3a83f8d2a7be46b53936d32dfd424c455ff5dc5358a331a56dedc1,2024-08-26T14:35:08.627000 CVE-2024-45259,0,0,5969bc7c5f33ec37926b142b968946029edbf5a989ec1eaf52aded1cc1f71bb1,2024-10-28T20:35:13.597000 @@ -262545,7 +262590,7 @@ CVE-2024-45590,0,0,10d4788b438864d0cd458ad76a6de33b5eb010a84e104671688016fb6cabd CVE-2024-45591,0,0,2ec8609992b5b8415223014481927a4d3688ea93678a8aaed703d491c5983587,2024-09-20T19:55:54.657000 CVE-2024-45592,0,0,344fb1da2ff8d3df06848c3a67556280c55b0a28cfca16bff24c2975e2ac29d8,2024-09-20T19:57:05.323000 CVE-2024-45593,0,0,de30c059659aa3ed9b1ad3c8d3a065abcdf373d953976edb052332afd861d49e,2024-09-20T19:57:55.573000 -CVE-2024-45594,0,1,b92b3752c69160ee80c6f9e6ba142ae7591b376f9627b6a940ea18bd550ea1e1,2024-11-15T14:00:09.720000 +CVE-2024-45594,0,0,b92b3752c69160ee80c6f9e6ba142ae7591b376f9627b6a940ea18bd550ea1e1,2024-11-15T14:00:09.720000 CVE-2024-45595,0,0,4000fc5613545b24d45d9ab58aeb6d6a3f02eb8751f15d7d6eaab00c6ce0b4fa,2024-09-20T19:59:02.963000 CVE-2024-45596,0,0,6e565b4a7c9ad9fc7c8e22389ae667ed11775275e4e8d0d4bae0af105f45843b,2024-09-11T16:26:11.920000 CVE-2024-45597,0,0,0fad881157bfd299e8512a05afe15ba28f7513c6a1c09923d6036dedef269a28,2024-09-11T16:26:11.920000 @@ -262574,12 +262619,12 @@ CVE-2024-45624,0,0,7a0e35c55ac45641bb752e88253516bf9e2f94ec9e17765278ecb76cea70f CVE-2024-45625,0,0,3e5f2d639aef0e82608d7bd80d0e32d86a25b4046e30921cb8739a9c3be44b6a,2024-09-10T11:19:40.113000 CVE-2024-4563,0,0,a90af34c00297497a78ff72a2c306ea2262a49c5811c3b8bcaed5ddcefc9b6fb,2024-05-23T16:15:08.867000 CVE-2024-4564,0,0,045273651cbda7642192b25b1ce14ee6220cb16969b1d2c569252c03c480a950,2024-06-13T18:36:09.013000 -CVE-2024-45642,0,1,39263e364272a62f9453ccfa5c1f7f1119294c129c855574c52446a18a672d7b,2024-11-15T13:58:08.913000 +CVE-2024-45642,0,0,39263e364272a62f9453ccfa5c1f7f1119294c129c855574c52446a18a672d7b,2024-11-15T13:58:08.913000 CVE-2024-4565,0,0,15260fda70e8733111d52b1dae1a14ee33f22d1739a2e8de851c031d5bec2fb8,2024-07-17T14:14:08.750000 CVE-2024-45656,0,0,78d9804910af28b8c176663f88322290c5c713635ecedd69d9bf4321a17d8cf5,2024-10-29T14:34:04.427000 CVE-2024-4566,0,0,c4354a4e62a03c97286174a61ad4d2f3843d01589ace1532dbd5a5f84743d16c,2024-05-21T12:37:59.687000 CVE-2024-4567,0,0,55b6508070b71672e22c57660afab28e7ebc1a40a37655965c41825cdc3bc17a,2024-05-14T16:11:39.510000 -CVE-2024-45670,0,1,06b027cec872ea193a76ea5f043d656902c6d062d4c55c46bbf0d21ef14923cd,2024-11-15T13:58:08.913000 +CVE-2024-45670,0,0,06b027cec872ea193a76ea5f043d656902c6d062d4c55c46bbf0d21ef14923cd,2024-11-15T13:58:08.913000 CVE-2024-45678,0,0,a1fda46a16546e5971e32d47cf6c55c6e5adf9e7e7bc6498d2c3cdc35ca99a2c,2024-09-12T20:07:09.640000 CVE-2024-45679,0,0,b98f85803530a208de6f955471a00fda8462357bfd07c53d204959dc086af47d,2024-09-20T12:30:51.220000 CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec4236,2024-05-07T13:39:32.710000 @@ -262637,7 +262682,7 @@ CVE-2024-45771,0,0,754a0f27219aa2eb6179ec627ac31099e8e2882043a643cfa7921ddb03dbb CVE-2024-45772,0,0,d4fcff511ac9c702d11d2981d4f53f578a5b533222a07c5c21d8a62a8451fded,2024-10-04T13:20:58.327000 CVE-2024-45773,0,0,fa80a32ca25578799d772108a6e7f2b87164fbdfd3820c41dab7e96e6c83084e,2024-09-30T12:45:57.823000 CVE-2024-4578,0,0,de2bf1ab8b65cf8119579f63d8e64a9383c9519828d1fae8ddac21d6dcb5605a,2024-06-27T19:25:12.067000 -CVE-2024-45784,0,1,401349bd1daa018202f98e4495f90cc2ad6a60a28c2f61c7dee6ba498ba23ce7,2024-11-15T13:58:08.913000 +CVE-2024-45784,0,0,401349bd1daa018202f98e4495f90cc2ad6a60a28c2f61c7dee6ba498ba23ce7,2024-11-15T13:58:08.913000 CVE-2024-45785,0,0,edaf655206685301bfa1d23b3961ca90e190821a2f1da23140bfad50572d7731,2024-11-06T17:08:40.507000 CVE-2024-45786,0,0,1027a4a71b54e4ed926e7c4d82608ed7bf7290e7e8486a1ac94d8f7e4edfad02,2024-09-18T20:12:47.337000 CVE-2024-45787,0,0,46f8564066b3f70e712610c0aca9059d9bda6862d53c941af56b2ef72737a51d,2024-09-18T18:15:07.650000 @@ -262712,11 +262757,11 @@ CVE-2024-45871,0,0,728c8e6e25f852a5194b96b816339c6dea2f278495c76d4d9d6d904a9357f CVE-2024-45872,0,0,8e87b92fe22bbef6284d58a5e62493b4717b48305cf479255ef9a674e1d360d9,2024-10-04T13:50:43.727000 CVE-2024-45873,0,0,c49a27b891c2cba5f20315647687fde4c837ff4206eca9eaffb57a4f0d790169,2024-10-10T12:57:21.987000 CVE-2024-45874,0,0,2e0e68e484da1ec476bcb0982736db7f6eddfb72b06a902a4960817b887d973a,2024-10-10T12:57:21.987000 -CVE-2024-45875,0,1,4511e7c6c223f11ba90de4d69c66ff141aa95f1f82f947b14caa9f3bcdaed5e7,2024-11-15T14:00:09.720000 -CVE-2024-45876,0,1,027a13f13cb51be837afea68fb1d7e00076030912fc4892d2dca3a25b5f9f3ba,2024-11-15T14:00:09.720000 -CVE-2024-45877,0,1,bd3a5e512d5935ce6c501d77acd0efa2037f56c41cb6165f588a12d3af203cbe,2024-11-15T14:00:09.720000 -CVE-2024-45878,0,1,b7f1cf9ff04c142b3f7a2f664dd5de800a21d58640f5d311d359fd7697e8408f,2024-11-15T14:00:09.720000 -CVE-2024-45879,0,1,1a89d4d18e049d294aa3955b22a2d83fd9c1ca44cb5ff049165076871ffb8a88,2024-11-15T14:00:09.720000 +CVE-2024-45875,0,0,4511e7c6c223f11ba90de4d69c66ff141aa95f1f82f947b14caa9f3bcdaed5e7,2024-11-15T14:00:09.720000 +CVE-2024-45876,0,0,027a13f13cb51be837afea68fb1d7e00076030912fc4892d2dca3a25b5f9f3ba,2024-11-15T14:00:09.720000 +CVE-2024-45877,0,0,bd3a5e512d5935ce6c501d77acd0efa2037f56c41cb6165f588a12d3af203cbe,2024-11-15T14:00:09.720000 +CVE-2024-45878,0,0,b7f1cf9ff04c142b3f7a2f664dd5de800a21d58640f5d311d359fd7697e8408f,2024-11-15T14:00:09.720000 +CVE-2024-45879,0,0,1a89d4d18e049d294aa3955b22a2d83fd9c1ca44cb5ff049165076871ffb8a88,2024-11-15T14:00:09.720000 CVE-2024-4588,0,0,9198a141cbfd67d79271a90e0ce19e828dccb043a1ec84b18e696744e0f31db8,2024-06-04T19:20:43.163000 CVE-2024-45880,0,0,cea99cab279728fefb1cf99178e03e8166f7f71fb61ca1ac6100aefdaeff9258,2024-10-10T12:56:30.817000 CVE-2024-45882,0,0,a14449ffa2d1f7de4757ef5afa74eb71a4d5e2837a9c3cf521070ed5cd905c99,2024-11-04T18:50:05.607000 @@ -263337,7 +263382,7 @@ CVE-2024-47062,0,0,c88a3c374fa0eb0b07de5442f40e8a296375128149eedfb948b94e624d430 CVE-2024-47063,0,0,c726e0d37891011bf574e2ada4ecd35149371afeb49fe2d5efae62d1adcff659,2024-10-30T18:24:21 CVE-2024-47064,0,0,5ab2606b47a3954363f47ef08af3365b7f2a07e53b06c729e25edc8cc707330a,2024-10-30T18:23:17.020000 CVE-2024-47066,0,0,0b43b85d84d6edf2581c4495657e290f15385b4237a6d0903f4ed36005e8e711,2024-09-30T18:03:58.750000 -CVE-2024-47067,0,0,11c88cd23cf1a822b362b5c4da6e6e5aad4cf4ba8be6cf32fd08cc0b90e2e962,2024-10-04T13:51:25.567000 +CVE-2024-47067,0,1,8929a705056d33f2294d5cbfad444e9ca09934cfd86406b1d0bf38287cb7c1bd,2024-11-15T16:28:48.533000 CVE-2024-47068,0,0,264a648ddebf754f99098ce6835c5c225a8b5d43bf206a3d80cb7c7fc0e3a5d3,2024-10-29T16:15:05.583000 CVE-2024-47069,0,0,255d89cbb652b594a7eefdca5524a576b519375e297f09c89870c40566f1ba4a,2024-09-30T13:40:36.460000 CVE-2024-4707,0,0,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000 @@ -263937,7 +263982,7 @@ CVE-2024-47850,0,0,9d437471ee4f1be7fe8d8f91eb2162f8d4a45526c516c7abe8fcc5930f99b CVE-2024-47854,0,0,cef81393ed48661f146b05190eb5cd22e800b4711975bd0fc685986ac16438cf,2024-11-13T15:25:13.953000 CVE-2024-47855,0,0,55506bc59fb300d34c632b3a5f880b3df3b3b2206fd15f460c6853ba7eb245ef,2024-11-07T20:35:11.733000 CVE-2024-4786,0,0,bbc8c5b9b549878acd4ee1e5896d7add0ba995b55e84e619083dd37cca26f8f1,2024-07-29T14:12:08.783000 -CVE-2024-47867,0,0,ab930a5134ec2749c4c7aeddae39ca362d9631d50a282f941fbaca32a5ca7733,2024-10-15T12:58:51.050000 +CVE-2024-47867,0,1,61f4df5a4a08eee13ad627f16450273fdbebcbdee4534b2d49b7e1adc602b8a3,2024-11-15T16:44:54.783000 CVE-2024-47868,0,0,b1d3ae34e95c1b5cdfd4777e6cf22588fee5fb92f1e32bee19fdee66c93a7d46,2024-10-17T17:04:35.547000 CVE-2024-47869,0,0,d239f8cdf446e03965c640dcef85e018494089ffa7953a4e5e2539ab04b057de,2024-10-17T16:59:04.703000 CVE-2024-4787,0,0,6e9b8652de9328ef9248746b2fe52f715cb97566c59048ae6277a1aaed304f45,2024-06-20T12:44:01.637000 @@ -263975,9 +264020,9 @@ CVE-2024-47910,0,0,da0097185007355b026dacc76d86a72088b7bf1d898f5a147fff92f16ae10 CVE-2024-47911,0,0,1780d2f9891b374cce407dc3e6f68171fc1b0dbbc46286fbacc7f087c63dae2c,2024-10-07T19:37:44.613000 CVE-2024-47912,0,0,f418c53b744005b67d73cb39395cb1c2d3d904d67f2798e6e9fa7f31b38510fd,2024-10-23T15:12:34.673000 CVE-2024-47913,0,0,7cee4e2f0a703b60f4905ba90942e3ad4333a4649dfd698a2259843e49767bfc,2024-10-07T17:48:28.117000 -CVE-2024-47914,0,1,56cc63573c5a889b6c3e411fa855c0d969375c2166d629185c0ab4fc830d3469,2024-11-15T13:58:08.913000 -CVE-2024-47915,0,1,90d7b1a0d768cb6f6b63850f82f08df84e0b2e7d9f08baf3dd8fc4db1a7a3ce0,2024-11-15T13:58:08.913000 -CVE-2024-47916,0,1,1d79f6c6a9cdbd76c726d866e7e2354e149300195b24f64860399a2a11cabeb9,2024-11-15T13:58:08.913000 +CVE-2024-47914,0,0,56cc63573c5a889b6c3e411fa855c0d969375c2166d629185c0ab4fc830d3469,2024-11-15T13:58:08.913000 +CVE-2024-47915,0,0,90d7b1a0d768cb6f6b63850f82f08df84e0b2e7d9f08baf3dd8fc4db1a7a3ce0,2024-11-15T13:58:08.913000 +CVE-2024-47916,0,0,1d79f6c6a9cdbd76c726d866e7e2354e149300195b24f64860399a2a11cabeb9,2024-11-15T13:58:08.913000 CVE-2024-4792,0,0,d367db616eff60413675ec0cb96dcf5072899c5126e3ab7b85dd0b323d2aa0a3,2024-06-12T20:15:13.643000 CVE-2024-4793,0,0,d7ea24a63b045e67640f8521c21cc9fd0113236775183a92ddafb3253726675a,2024-06-04T19:20:49.390000 CVE-2024-47939,0,0,fb0122088811efc1ccf3ce2b970c428eb00ae94db66e7aa25ff544122afe9a3d,2024-11-01T12:57:03.417000 @@ -264057,6 +264102,7 @@ CVE-2024-48059,0,0,f3391fb334843a3fc6d7e517bab31554559de5a31b6bcad37ec348d6020d4 CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000 CVE-2024-48061,0,0,3afb2ef6eba7f21135f7c2c854e268a2fe30714157a06ae965803eb7d12a5161,2024-11-06T20:35:30.633000 CVE-2024-48063,0,0,7dad3075f35e3bd4e2e591484ba350f38d4e17902517b9e5e6279458bc0b207a,2024-11-01T13:15:12.020000 +CVE-2024-48068,1,1,06b45b29ce3f821e2db622a6716622dc89ea68129fc83706bd80927d88a3593e,2024-11-15T15:15:07.607000 CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000 CVE-2024-48073,0,0,410986e3bac5b99d20c35e908ba9e14361ecff8b8737388dcc22bfd8d08857aa,2024-11-12T13:56:54.483000 CVE-2024-48074,0,0,ad38eed7680db70af45f593399c08c1cb64e93854bc7fa5dd06ea3c6cdff4594,2024-11-08T22:15:20.877000 @@ -264147,7 +264193,7 @@ CVE-2024-48279,0,0,734681838e14fea506d33d2e5cffcb45e5208b2ff1232248e90dbda0d4737 CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b92f9,2024-10-16T16:38:43.170000 CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b694,2024-10-16T16:38:43.170000 CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000 -CVE-2024-48284,0,1,c1b7fb84604e1a8474a526fdad6cdbf7d9eafb7dbc2cf17d279dc64dac115aeb,2024-11-15T13:58:08.913000 +CVE-2024-48284,0,0,c1b7fb84604e1a8474a526fdad6cdbf7d9eafb7dbc2cf17d279dc64dac115aeb,2024-11-15T13:58:08.913000 CVE-2024-48289,0,0,3c17d5bd38424fa0af920fbe41958bfb5ff6ab46e45b8d73a90e0bb1a9946e7a,2024-11-04T20:35:09.307000 CVE-2024-48290,0,0,470dc7a365392aceea819604e300f16b964336068e4f6e607d709f5104e50d51,2024-11-08T19:01:03.880000 CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000 @@ -264387,50 +264433,50 @@ CVE-2024-48958,0,0,92a426e369946b14ff79b98b6fb42dd0c692d3b7d45d68198a4072bdaadf4 CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000 CVE-2024-48963,0,0,6d60ed9d1e7a308212fb6ea5de6f1d94d8559909dd9cb5f4650d856671de0962,2024-10-30T14:54:53.937000 CVE-2024-48964,0,0,7d209543eb23e2e6809a7e4f01bdb09a7ba8fb1b32d439bae945ab7d5b6dd3de,2024-10-30T13:46:31.657000 -CVE-2024-48966,0,1,6ce21af485b8f7bde854dc6fa73e4754262c2c902a98462d651b3be5a8dc03bb,2024-11-15T13:58:08.913000 -CVE-2024-48967,0,1,fba665d8fee6e5765d796c0f4f56dc350e86d3e170c3ebb4b0f8842760a802c5,2024-11-15T13:58:08.913000 +CVE-2024-48966,0,0,6ce21af485b8f7bde854dc6fa73e4754262c2c902a98462d651b3be5a8dc03bb,2024-11-15T13:58:08.913000 +CVE-2024-48967,0,0,fba665d8fee6e5765d796c0f4f56dc350e86d3e170c3ebb4b0f8842760a802c5,2024-11-15T13:58:08.913000 CVE-2024-4897,0,0,b80483aa02f533d1f5c4695afa1f7ec5dae4ecfa8b472cf561efa5d05f8ff11d,2024-07-02T17:44:45.700000 -CVE-2024-48970,0,1,30952c19668099b57fde85f2cc4ffa98f340d9444adc84e11607e43c4c5216fe,2024-11-15T13:58:08.913000 -CVE-2024-48971,0,1,aec61daa8e3e4bc8e82a3ac6302404f969998220414a402a4bfea69832823f39,2024-11-15T13:58:08.913000 -CVE-2024-48973,0,1,1df97559f56714d73ec761dcc150a7afb6ddaa2583c3474ad5af745f48ebc20c,2024-11-15T13:58:08.913000 -CVE-2024-48974,0,1,bca1b70ac99b7db7d345213bfc69c0dea4bcbf3438528546c7259844ada903e4,2024-11-15T13:58:08.913000 +CVE-2024-48970,0,0,30952c19668099b57fde85f2cc4ffa98f340d9444adc84e11607e43c4c5216fe,2024-11-15T13:58:08.913000 +CVE-2024-48971,0,0,aec61daa8e3e4bc8e82a3ac6302404f969998220414a402a4bfea69832823f39,2024-11-15T13:58:08.913000 +CVE-2024-48973,0,0,1df97559f56714d73ec761dcc150a7afb6ddaa2583c3474ad5af745f48ebc20c,2024-11-15T13:58:08.913000 +CVE-2024-48974,0,0,bca1b70ac99b7db7d345213bfc69c0dea4bcbf3438528546c7259844ada903e4,2024-11-15T13:58:08.913000 CVE-2024-4898,0,0,a64ada88476e7dbd5dca1f8ed9406bed15a3acb87fadbe7d9a4f3102502b7a67,2024-07-23T17:50:44.033000 CVE-2024-48987,0,0,bb1285db59c3075341f96aec62f9b4ce4709041d90082c7f3534792a4d32fb84,2024-10-15T12:58:51.050000 CVE-2024-48989,0,0,58124d2b058d3a194dfa580edaf9984afd1d4350d13e9d1063b31cfbc8902f5b,2024-11-13T17:01:16.850000 CVE-2024-4899,0,0,7d0ca1543842829897b22c32fd7c3ea389ea1c85b28761d045bc30da0b354462,2024-07-03T02:08:16.280000 CVE-2024-48993,0,0,0dab823074732093bc8d73d037071c26077efcc55f0a4da56d7b2a3ff60a512f,2024-11-13T17:01:58.603000 -CVE-2024-48994,0,0,0b7f9d1628211e8093a451f37daa191aa3b95215c271ced3efef261c22b3d0db,2024-11-13T17:01:58.603000 -CVE-2024-48995,0,0,e94b258c5d29043afd54c560feebd4fae7459d0411be584256b4448ef0bb12ea,2024-11-13T17:01:58.603000 -CVE-2024-48996,0,0,4285e4099fffc5d013f989d2db3aae0aed54b20b922d1ea8bb58082de1befca9,2024-11-13T17:01:58.603000 -CVE-2024-48997,0,0,f4345e14d75295661d5b4694055e93526045c10c7ec0873ab17406892e629c29,2024-11-13T17:01:58.603000 -CVE-2024-48998,0,0,e09aaf76e46c5c5df4f92385080fc72a26f6468780ddc522a6a0305ddf2b5f17,2024-11-13T17:01:58.603000 -CVE-2024-48999,0,0,4e4418203d8cb4c94ade17f8ca9573e932b18188e7fce95d7434eca7ef5ea4ff,2024-11-13T17:01:58.603000 +CVE-2024-48994,0,1,f318b3abe51a65c36b34811cd6779d9025e28bb0518b94d3d7c79c7579b1e1e4,2024-11-15T15:40:38.250000 +CVE-2024-48995,0,1,c8a152b4d83ebd46a319f38f36cd95f3ce9fdb5043f9229f5986839789db7ebd,2024-11-15T15:41:26.280000 +CVE-2024-48996,0,1,63c2449ddf3c17aa92c6f7edb44c8efc93ae248c076045e11c0bc6772ecc2dcb,2024-11-15T15:45:46.920000 +CVE-2024-48997,0,1,809a5ae9097510048a583e48fefef3bfec1f102e64cf832ee44a1d74b0d2cd79,2024-11-15T15:46:44.917000 +CVE-2024-48998,0,1,70ad12bbf3d2e3a049a22afd48ec9e5148477d4d2bb2bad66ee315a84a6b2057,2024-11-15T15:51:24.197000 +CVE-2024-48999,0,1,557ea53a4d5db33249b0ce08f59e4afba8c2445967d6a9a4c87c2b91ac47c81e,2024-11-15T15:51:44.517000 CVE-2024-4900,0,0,2074e15c0050e8989f750822fa85e67702dc13ece861470c246a4c4acb047889,2024-06-24T12:57:36.513000 -CVE-2024-49000,0,0,42af91124b6c2c2e55c1f1b79147d88e7726ac42167f1f5be6ae7f27273f7f1b,2024-11-13T17:01:58.603000 -CVE-2024-49001,0,0,115580c7cee5f2505d0271c9e961721664c4519aea42ae4abdfa654d234e2ed5,2024-11-13T17:01:58.603000 -CVE-2024-49002,0,0,aa6c9a216aa1ae85cad78a50c911c79ee5bf02bc5e356b7a202b4337d0992a71,2024-11-13T17:01:58.603000 -CVE-2024-49003,0,0,b2bbd57ab6c8da8d4e7f3083d6ddf6cde5abfd30fe875c5e92a27aca3aa89e29,2024-11-13T17:01:58.603000 -CVE-2024-49004,0,0,8236d1f5d72ac5809fc14d5f12f0b6b26916d6642c53fe1e27ebec56d2aeacd7,2024-11-13T17:01:58.603000 -CVE-2024-49005,0,0,b44f19fe5e891e336627c7315720e5c7fa5b59af215d9b1c4753ef5bf3d1339a,2024-11-13T17:01:58.603000 -CVE-2024-49006,0,0,2a7a25cdb4441c30769bfa35245e92729b5cbfb1126be04eecd116270847bbea,2024-11-13T17:01:58.603000 -CVE-2024-49007,0,0,22ff43a99c09ba08f04e7eadb0698606bd99b30a5cad6cea39e343e8a46f2417,2024-11-13T17:01:58.603000 -CVE-2024-49008,0,0,76fcda4e1992bb083a081276b4b6d54219bbb6a3557073b997b64dbcd34e3545,2024-11-13T17:01:58.603000 -CVE-2024-49009,0,0,3d5325b62d7fdbff37f78028be6b4bab88e4a17f7b91dfc1552cb593934371cd,2024-11-13T17:01:58.603000 +CVE-2024-49000,0,1,784c045fc0596c9e0642c36b4b8f2ac0ab57e10e1a32b95efc1bf1bdb02864ac,2024-11-15T15:52:08.557000 +CVE-2024-49001,0,1,06fd47831380c806b4bee6116a8c985746c5f6952a7e0c3793873d3412bf0bcb,2024-11-15T15:58:36.290000 +CVE-2024-49002,0,1,e7f871d3ce352cffc0c373425650a6788d487f9947f789b179ef5ad36c05fdf9,2024-11-15T15:58:14.693000 +CVE-2024-49003,0,1,5a592fa72515a983d73d29c561211092a9b91851e5d03aeedc0164ac6df45e7a,2024-11-15T15:57:52.277000 +CVE-2024-49004,0,1,d52868406da97d18b407ad1a9fce860ed9e93cff6cd03153aff07ef6455908a2,2024-11-15T15:56:55.917000 +CVE-2024-49005,0,1,4e1a42633da9f66381e9eb7fad5b051b9a4cd07b8a8756924c2df8f8a62048fe,2024-11-15T15:56:23.680000 +CVE-2024-49006,0,1,239eda227c0a60b6c6e5013994d6fea02af0115bf54bb9d4853d304d22727dcf,2024-11-15T16:03:33.790000 +CVE-2024-49007,0,1,4d209a87923d4eb39c2f50646b9124ece07c6ef85100bb37dec22f7045b578b5,2024-11-15T16:03:17.297000 +CVE-2024-49008,0,1,4a2d6677dc40eb5691d14bf7cd6591d2473719cc7702de78d1912ce7772b5650,2024-11-15T16:02:22.743000 +CVE-2024-49009,0,1,30770ccb7ad68c4e475f1386011b4fadd40c5114fdda7630d72ba718edec2908,2024-11-15T16:02:11.097000 CVE-2024-4901,0,0,038977315c18c98069a655ab35eb2b501ae92d62e5deb196337fd2891dd989fe,2024-06-28T13:18:19.407000 -CVE-2024-49010,0,0,f9989b66705ed5a635801a383a605b417aed59ecd12395aefff0741c18ecf91f,2024-11-13T17:01:58.603000 -CVE-2024-49011,0,0,88b6b8f9abd74b6b9add1fe73077d5e122f5bc317644545438ca49db76fb38bb,2024-11-13T17:01:58.603000 -CVE-2024-49012,0,0,d8a33fc5dd2cb7e688694796730fb3587248ab1cb1b8dc983fe29cd690725a1d,2024-11-13T17:01:58.603000 -CVE-2024-49013,0,0,e412c75d46694a90bcd26270127c3bb690cf452f713acf1107c06b183115d20b,2024-11-13T17:01:58.603000 -CVE-2024-49014,0,0,77f3b9339304fc18a9508ab416be026f100a19d5c065e100b6ca78a7c8b15849,2024-11-13T17:01:58.603000 -CVE-2024-49015,0,0,0da01164410536330c4d3c63c6c8992fe47336fcd357e8908e43577c4221d19c,2024-11-13T17:01:58.603000 -CVE-2024-49016,0,0,42812b0a1b39b28d145e6a4be3b30ddfce08c08090bb83090f9ec59c37b4bfb0,2024-11-13T17:01:58.603000 -CVE-2024-49017,0,0,c29e042ae6b4bfce0d0cd16abcf7cafbea96dc2670cf35b0dec655e7b14eac30,2024-11-13T17:01:58.603000 -CVE-2024-49018,0,0,0615cfcc51eb520b9d979e0e45ec66111b8acf74ff261ffa3a90b9ef2696bc8b,2024-11-13T17:01:58.603000 +CVE-2024-49010,0,1,8dc6769987a70c8e901c43efaedf045ff627b8b5d66588b1cf1d8c71721eb88c,2024-11-15T15:59:36.937000 +CVE-2024-49011,0,1,01c749f70821920c3c477877b9d9cfb54346eae8ef76d8020513d0754bda6a6a,2024-11-15T16:16:21.817000 +CVE-2024-49012,0,1,929df80ba01c0711e6d4de2e89fa8304d1bf6a8a701e56efd9b6cff04ea88b34,2024-11-15T16:16:05.507000 +CVE-2024-49013,0,1,d6e7f65f705950800f1774a16d44e92b41eabeb6640c763d719c65985b489e86,2024-11-15T16:14:55.170000 +CVE-2024-49014,0,1,2ae717a1e7a00c91281675e1dd196ebf937d4372aaa95ea483d875af56032c7e,2024-11-15T15:55:46.947000 +CVE-2024-49015,0,1,010b13c2c915010b0f12355795a3e7db594c11886ca0722fcb257bddfb91fbde,2024-11-15T16:07:40.680000 +CVE-2024-49016,0,1,6e6a3e1e7d43f87788dff79da9bc35781bc8df562605244075a145d65f186874,2024-11-15T16:07:22.397000 +CVE-2024-49017,0,1,725144d756c259d6e8e5930241ee20e0430c0d60f2d540c6eb59c09762345d3e,2024-11-15T16:07:03.200000 +CVE-2024-49018,0,1,37682cb9b699fa423e654654a1734c21f63fb95a81f3e043a18fcb7be760f973,2024-11-15T16:06:29.407000 CVE-2024-49019,0,0,e08679fc365479f57d65d68203459387c13c3c1dd4e5679713ba188e89b8cabc,2024-11-13T17:01:58.603000 CVE-2024-4902,0,0,41bb791734595d42fd1c69ded99c61dc232bf3972633339d010380dd468a9fb6,2024-10-29T18:07:23.897000 -CVE-2024-49021,0,0,aa53deff3838efd1c66c363e2988f51dc92f0fe1f44fbadc27229d2d752a53d8,2024-11-13T17:01:58.603000 +CVE-2024-49021,0,1,85116f14375956c0e17b04e02d70108b9bbae302c7ed7fb6c441a5f54c8f1324,2024-11-15T16:04:55.487000 CVE-2024-49023,0,0,af47ee9dc5b34537abe1e2a50e9a1a6dd7bec2ff89d9910cf199b8b7e8fc3c1a,2024-10-18T17:01:32.803000 -CVE-2024-49025,0,1,35dc42d2dd7a2e760f68b11d7ba7c5916c688fb71c05374f7a2ecaa9b21d3c92,2024-11-15T13:58:08.913000 +CVE-2024-49025,0,0,35dc42d2dd7a2e760f68b11d7ba7c5916c688fb71c05374f7a2ecaa9b21d3c92,2024-11-15T13:58:08.913000 CVE-2024-49026,0,0,389b45fb365606f0dc850137e89a99d79b49e7936c4d322daa7512c8f2a443d1,2024-11-13T17:01:58.603000 CVE-2024-49027,0,0,756a52ba86626ae0feaa38ac7b9ca7560a1f0424ed8969e0ec266d976b69f598,2024-11-13T17:01:58.603000 CVE-2024-49028,0,0,15af4a2817e602a0be5b827f4b62639c5042e250c1d16e5ecaf5290fdb0946fa,2024-11-13T17:01:58.603000 @@ -264444,7 +264490,7 @@ CVE-2024-49039,0,0,35081b6450a24914db672b1bfea30c0edc233e94d1f078f8c664cf196464b CVE-2024-4904,0,0,e08155723dc24ff1bcb5adf9d2f839d33f4e022ac557667a35564764380e5202,2024-06-04T19:20:52.380000 CVE-2024-49040,0,0,be49458de740c9721130038142e1187759fb23950dfc8c806ecf7b0472546f4b,2024-11-13T17:01:58.603000 CVE-2024-49042,0,0,8550e6f45d8ccfb522aabce24120e04e03609dbaf334f8e26399de3cabfb4b51,2024-11-13T17:01:16.850000 -CVE-2024-49043,0,0,10b05df63a54e8aa326f4cf9b733ee0039fd4f1e9766d75884d3b9af87e8ca25,2024-11-13T17:01:58.603000 +CVE-2024-49043,0,1,7687f02e8c033046e84a25a54a1ddfa232890a08944ecd76f708f2aed0f5dc24,2024-11-15T16:05:30.773000 CVE-2024-49044,0,0,d82fb98a7f5feaaff34665c3e5f2204ad3822610f6571f31342b781d5bf4f678,2024-11-13T17:01:58.603000 CVE-2024-49046,0,0,b644a86688d45b12601d38cbe6e9dc0cb7d8a26a2b34042f583e5aa086f28d23,2024-11-13T17:01:58.603000 CVE-2024-49048,0,0,3478b70374b682b5c968ed62afec830bb0af9b0a095d1ec23b524e486f51e98a,2024-11-13T17:01:58.603000 @@ -264609,7 +264655,7 @@ CVE-2024-49358,0,0,df99e254916c8dff27bc118ecfd140161a54ef4581a6841d720c531a5bf44 CVE-2024-49359,0,0,cc09522176dca55ed443e811571748ebfc3f0f5a4f89d4ec44c17a0a8a645881,2024-11-06T15:27:02.347000 CVE-2024-4936,0,0,51b2c41822c3ce01e84bd55c02328ac3499013d52d632d2af56d406c35d5a658,2024-08-06T18:29:27.013000 CVE-2024-49361,0,0,f551e9abf09d421b2a081416ae11d1d19a91d21656c86d2519f1c7f0e281007d,2024-10-21T17:10:22.857000 -CVE-2024-49362,0,1,607782a5d34a0bcea667b4613803b3479fadb0d82404a368be33f1da13be2d17,2024-11-15T13:58:08.913000 +CVE-2024-49362,0,0,607782a5d34a0bcea667b4613803b3479fadb0d82404a368be33f1da13be2d17,2024-11-15T13:58:08.913000 CVE-2024-49366,0,0,1ea5441e3f8684e26cb3e2ee03927aa37cfc22f8ddf1688cacc08e4a6c38e9c1,2024-11-07T15:15:04.587000 CVE-2024-49367,0,0,a00a7c814532ad3abb0f836142856607dc752da167ff2cb313965be7a6e5269e,2024-11-07T14:57:17.393000 CVE-2024-49368,0,0,8be4e296ee1ec30084981da91255270e2fb2a840014ea77ee3103f7dcd091363,2024-11-06T18:28:54.440000 @@ -264619,7 +264665,7 @@ CVE-2024-49373,0,0,4aa9cfdbe744fd3ae046ca1eeb4ecc11fd5a7b167271bdbcafbe01dffbbbe CVE-2024-49376,0,0,cd559b6ff037aecb65c3d5840816f94e5487658ed4c219483ab43d3c98a1839f,2024-11-14T22:49:50.667000 CVE-2024-49377,0,0,f0a66be903c1ae0848c0330b2ecd5bcb10926f277636c57c6f6f956b317ea158,2024-11-06T18:17:17.287000 CVE-2024-49378,0,0,09a13f2bc12578e659c5acb1c73f93e5796dca0b69672708f3a85d0256e97128,2024-10-28T13:58:09.230000 -CVE-2024-49379,0,1,f0bce3efcf99eca522c2d25bed87641aecc1ae34ed8c7ebff65d05248a2bf203,2024-11-15T14:00:09.720000 +CVE-2024-49379,0,0,f0bce3efcf99eca522c2d25bed87641aecc1ae34ed8c7ebff65d05248a2bf203,2024-11-15T14:00:09.720000 CVE-2024-49380,0,0,f56d412280c28c68a65e58c4bcb66239a0fd300a5ecc1079da487338d842284a,2024-10-28T13:58:09.230000 CVE-2024-49381,0,0,bb9988af81733ccd03de48d75bc197c7dec21a72eb70ce010eb71fafccaa1274,2024-11-14T23:04:21.637000 CVE-2024-49382,0,0,cd14c2989a948ff9829f4d119b31d603af2c2c459b5f5d9afd11a73e5c1e5fec,2024-10-16T13:53:45.860000 @@ -264799,13 +264845,17 @@ CVE-2024-4975,0,0,d684ecfff12b84901405d8ee54394b9595e6fb8a06328936509cd0d9c15207 CVE-2024-49750,0,0,a4d8c273c7d01e1dcb69ab54945d9fa3ef0aafd14a5615789a19e3567d7b1d64,2024-11-06T14:58:19.993000 CVE-2024-49751,0,0,ff7d052700c88a06f3721dad1b8cfae38c2356a33cba16eba3e8bf2b6f89cf9e,2024-10-25T12:56:36.827000 CVE-2024-49753,0,0,e48f997c3307c7149c72669441f9343576b6be2cbdb15b89775e89497816dbec,2024-10-28T13:58:09.230000 +CVE-2024-49754,1,1,3550e73273f425617ed28b59b36a9108486b5c28d588af30eef27d5785caf9d5,2024-11-15T16:15:34.510000 CVE-2024-49755,0,0,b1c1713e62d1c6cff006bddd32caeacb7a00a5abd98bfdd4887a4a4fcdb0308a,2024-10-29T14:34:50.257000 CVE-2024-49756,0,0,17e2aa8675de07a9bb36aad326a0b90c2e6105df968303ed06bc9a1149a476bc,2024-10-25T12:56:36.827000 CVE-2024-49757,0,0,41883c0db2190e07eb75f1500b6be8583d0953bfe5f6820811285d92db2c4bda,2024-10-28T13:58:09.230000 +CVE-2024-49758,1,1,b469460ce3b2b26871ada73252ec097b2120dacea45da1951a93146e86a8fd7a,2024-11-15T16:15:34.880000 +CVE-2024-49759,1,1,ba9444879a3b53f14c62c77f0b4d72cd1329bbf91a3aad6f19fbe3de6c548660,2024-11-15T16:15:35.100000 CVE-2024-4976,0,0,fc4df77a0f9a74699614d42497ce42eb6f6db7897f4ce74b0071ab4cbdb2d9cf,2024-05-16T13:03:05.353000 CVE-2024-49760,0,0,ab1d2b1d3d6f87001d0ec0c674554d145fba544f43978860ab9f315317a9615d,2024-11-06T15:01:01.013000 CVE-2024-49761,0,0,cc77d1f33b16264261b43a7d1baebc02063ded1f31c9ab42da049e2bed05a708,2024-11-05T16:41:46.660000 CVE-2024-49762,0,0,e267f4df9b55b0cddd8b82283d5a577158c52194b354f86421be17fb0c5fcf65,2024-10-25T12:56:07.750000 +CVE-2024-49764,1,1,6747ce98a9cc0f5e3f54775a8fffdb9c130835843da49143280334403b418cd0,2024-11-15T16:15:35.323000 CVE-2024-49766,0,0,555038e30b17856b98b1634207b04f50d3fce08a3c00047a5f41e29a9d10d5d9,2024-10-28T13:58:09.230000 CVE-2024-49767,0,0,b1abfb6c942255ecba6af733c92d4d0cb5e1d316b2b9040982ab9c6769c6893b,2024-11-05T20:03:04.847000 CVE-2024-49768,0,0,d1c7bee24c60a7682e6a57ee28bfb0a2fbc48c379b23053fbff091516cb1e066,2024-11-07T17:28:02.853000 @@ -264816,9 +264866,9 @@ CVE-2024-49771,0,0,160fc663912b069ef891129905ae1be73f75e83c8368c487931bd9ae946e0 CVE-2024-49772,0,0,9281743e575857929b74a42ff17b0b9202ae9bb7ed1b47fefe705f7bd0b972d2,2024-11-13T20:19:54.597000 CVE-2024-49773,0,0,e7ad43d5c3fd7b249f682f0b65eb1709f39d3084c0fa75087a4fd4a2decb3591,2024-11-13T20:29:11.297000 CVE-2024-49774,0,0,ebd8a0eea0a53281f5f3ae3a93acb0432e3d9a4208605b56d1016ce02a10c1a5,2024-11-13T20:40:26.100000 -CVE-2024-49776,0,1,b98b59521cd715d0ec617d2fd0db152a13cd8254e4dda962c91988b20e09de7f,2024-11-15T13:58:08.913000 -CVE-2024-49777,0,1,9baeca1cafb37b9a950e665befe702cbd02f2ad8698e66a79c9b0d29d5965980,2024-11-15T13:58:08.913000 -CVE-2024-49778,0,1,958fdd6c4862af8f1bd031bb3fc3cf3c4e3090a99baf545814260a0e74f7bb7b,2024-11-15T13:58:08.913000 +CVE-2024-49776,0,0,b98b59521cd715d0ec617d2fd0db152a13cd8254e4dda962c91988b20e09de7f,2024-11-15T13:58:08.913000 +CVE-2024-49777,0,0,9baeca1cafb37b9a950e665befe702cbd02f2ad8698e66a79c9b0d29d5965980,2024-11-15T13:58:08.913000 +CVE-2024-49778,0,0,958fdd6c4862af8f1bd031bb3fc3cf3c4e3090a99baf545814260a0e74f7bb7b,2024-11-15T13:58:08.913000 CVE-2024-4978,0,0,5928c3b846f5437fa931d5f8f8094b6c99b5e796eec27a2a5602f4b07774db40,2024-05-31T16:03:52.247000 CVE-2024-4980,0,0,1d2b61808b4cae121d6a29c34adc83b7ce102dcc100d7578fef807794b8506ae,2024-05-22T12:46:53.887000 CVE-2024-4983,0,0,47e5eccd768078063df4e275a1ffdcd617ddbc2b7b8451c89e2e261cf23ec523,2024-06-27T12:47:19.847000 @@ -265267,8 +265317,8 @@ CVE-2024-50261,0,0,946c442cc56e3e8af45dc6329602e8261cd21844e512a68f35505737590fc CVE-2024-50262,0,0,491da488ea3f6be70bbe09eed55bf84625143c296910fe98f090fd0f0e85c13c,2024-11-13T21:10:44.267000 CVE-2024-50263,0,0,031640c798eb6a3a8aeb817df2908ddb318a337ddb803a116f07c15a4af2eba6,2024-11-14T16:23:08.347000 CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000 -CVE-2024-50305,0,1,b03fd6d501d19d7b209a06f202d725af272151828bcd7418064455026a0a9df5,2024-11-15T13:58:08.913000 -CVE-2024-50306,0,1,99b8de1207b2fdc71c13146c7372e7163a77f6f60a3176c55d7bfb57d63fa38c,2024-11-15T13:58:08.913000 +CVE-2024-50305,0,0,b03fd6d501d19d7b209a06f202d725af272151828bcd7418064455026a0a9df5,2024-11-15T13:58:08.913000 +CVE-2024-50306,0,0,99b8de1207b2fdc71c13146c7372e7163a77f6f60a3176c55d7bfb57d63fa38c,2024-11-15T13:58:08.913000 CVE-2024-50307,0,0,6d2dcfccb50c0c30fd7d9bda3b36490982da8110db31d087befc4509a1d360cd,2024-10-28T13:58:09.230000 CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000 CVE-2024-50310,0,0,cdbb51e1b47d1a9497998e60f58fb5fe87ced29e9d042b4c42b3a1b3ac7563d2,2024-11-13T23:15:38.657000 @@ -265308,8 +265358,12 @@ CVE-2024-50346,0,0,fb25cbb7b8a23f8bc4a8f048afe511d7d942fe5a9bb027a602dbfa956ec82 CVE-2024-50347,0,0,27f16939f93088b46ca4735812513cca765a91a390b88a1aa60491d8fb6217f3,2024-11-01T12:57:03.417000 CVE-2024-50348,0,0,fa8a8e9e48d227df1afdc378e4ee00ffda2dd051bb15c8b477e290549096cb45,2024-11-06T14:49:46.073000 CVE-2024-5035,0,0,592ce94ebba91d65c9cac29085dbc465d14be23d13ac08f1e0101f9ce552a856,2024-05-29T05:16:08.793000 +CVE-2024-50350,1,1,fe33fb1c52289387a103d60f99132eed80d6bd254f86a98de7b78a4c941057aa,2024-11-15T16:15:35.537000 +CVE-2024-50351,1,1,ae2519e0c7bf4bfda7fca0bf4c148d971d247eeb107cc3d234d0973074b92910,2024-11-15T16:15:35.750000 +CVE-2024-50352,1,1,e598f971ea4973919bec33ee98be0b76e78d3b7e47b4e2939d4342c0730209ed,2024-11-15T16:15:35.960000 CVE-2024-50353,0,0,ccbaa89f0150ad038f7930bf7da95bdebd48b8dd8438583bd87ed80c0a277898,2024-11-13T15:15:19.900000 CVE-2024-50354,0,0,5fe2cfed42eb75a8865a8b156fa958f7af02063c60312ccd6714684eb18cee96,2024-11-01T12:57:03.417000 +CVE-2024-50355,1,1,f1ef7d5e8f66469b3931f44256f6bd3ac9c89a211edc6ffbf7eafef6207e5929,2024-11-15T16:15:36.160000 CVE-2024-50356,0,0,1007ed397ecbfac0c7e4779187113696b4d36207eb77ee96ff22c8fde6a29757,2024-11-01T14:35:08.330000 CVE-2024-5036,0,0,e97b40bd40cf208c311323e6564cb1ded96d8cc433059436a8705289f1e02a66,2024-06-20T12:43:25.663000 CVE-2024-5037,0,0,46d4a5c4b83922b1ee19bcb8bbc97a0a290a2086fb5a073395bdb9a5e03441e0,2024-08-19T17:15:09.807000 @@ -265484,20 +265538,27 @@ CVE-2024-50614,0,0,e4dbc17db42a0c42579ba77a146705a8445a75f90546cb7b4c3dc14d7adb7 CVE-2024-50615,0,0,b7e43b47cd429a59ea1e65cb3383a96641f8d8401c0e7577999bdb52f4f71fe1,2024-10-30T20:35:37.310000 CVE-2024-50616,0,0,e123de96868e8818da5b7d193dee2e816ee0e81fabf6e652a87cb9726aad9098,2024-10-30T20:35:38.380000 CVE-2024-5062,0,0,1dce1f93ce1b9242e76ae9cf090eb76ee6afadb656622c6eb5a578a5eb76013f,2024-08-20T14:14:35.717000 -CVE-2024-50623,0,0,71c6fad96d3194eba7d5d7edd081f9ad30cc6decd08744ac71e97f086f12f546,2024-10-30T21:35:11.373000 +CVE-2024-50623,0,1,ad30148e87f5246daa69bfdb66ae52252255d95d6629024623f3277543bd569d,2024-11-15T16:15:36.367000 CVE-2024-50624,0,0,2f6d7cbc06ddd09de063e5bd0feef072f438fbd478c20a099bcf6256ed039f90,2024-10-30T21:35:12.223000 CVE-2024-5063,0,0,3ea00cb3f53084b2393e5a818811e5957f116b348338ce87a59f64292b187a9f,2024-06-04T19:20:57.760000 CVE-2024-50634,0,0,fc2a161c2c755e76311d472b0c0ca48eeb524c368ea8177e76956b97738f2002,2024-11-14T20:40:43.690000 CVE-2024-50636,0,0,2fc9138fa183119876b777928207f426f13352402fa782392dc2b828754f0184,2024-11-12T13:55:21.227000 CVE-2024-50637,0,0,7cb3fd4c2566fc1d1593156e77d24b90af6dfd042618185e839399543b673bed,2024-11-07T14:15:16.780000 CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000 +CVE-2024-50647,1,1,2e7f3d7e544ece0ccbd2aaa6f612b5dc159612e5869768624aaaad0a22d84340,2024-11-15T16:15:36.467000 +CVE-2024-50648,1,1,30c2e10e651b32960de225f86256bd9fbaacf658adf0001ebfbed0c8c5c26fc0,2024-11-15T16:15:36.547000 +CVE-2024-50649,1,1,7d22823a31c69e206ba178b089c551e50e81d6f9ee0c9cb53f27845845392f2c,2024-11-15T16:15:36.637000 CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000 +CVE-2024-50650,1,1,5bec41adc57062c51936e8c337bf1e936a3ecb43832b17672528a8666a80227d,2024-11-15T16:15:36.710000 +CVE-2024-50651,1,1,4bf05b042e73c0bfe89a5dc5ae8bb550ea2493dde13bd6ee166a1ac311cf9dc2,2024-11-15T16:15:36.783000 +CVE-2024-50652,1,1,4c6e0ebe8d90d732657f125730d362693c1bd46064ac0d862788dfb71947eb2e,2024-11-15T16:15:36.863000 CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000 CVE-2024-50667,0,0,0dcbd7b35b311fe7a681d780dcbe2293327603709e31a27594acb760866d084d,2024-11-12T17:35:12.270000 CVE-2024-5067,0,0,7a5f09523c1a14d6651905f1f8853395c32eebb526caa99a81fddc9a443e16ea,2024-09-05T17:29:32.287000 CVE-2024-5069,0,0,9472ccb93cc67e368452ccbd7690fcdac2e9c6bf3a0a4c1febdda7b23dc05b96,2024-06-04T19:20:58.080000 CVE-2024-5071,0,0,1e84a840bf7fe6d05a333c61daff03721e2399762594abd260e8b415b74d49eb,2024-10-28T21:35:22.430000 CVE-2024-5072,0,0,b208332fdeb0349d564f3ae12700e597664b77bbcd409305187f03a8e1be9ee8,2024-05-17T18:35:35.070000 +CVE-2024-50724,1,1,5876d658fd18659eb21f77ce4b57af6281fab952c0298d4065af6f6407d660a7,2024-11-15T16:15:36.943000 CVE-2024-5073,0,0,84e84c9e85d38ba2ba8fcac94cd632adf73ebd62caf103a5afc104149a6ce671,2024-05-30T13:15:41.297000 CVE-2024-5074,0,0,323ff3e4be9a1a01795a645c087210e0124e3c1100808fef1bff4cc986dff48b,2024-08-01T13:59:39.780000 CVE-2024-5075,0,0,3a68f5400be3fd65933ca2b54d2fe1b2cd42ebfc5586417b08ab71b3ebef46c2,2024-08-01T13:59:39.960000 @@ -265513,30 +265574,30 @@ CVE-2024-50809,0,0,0543ed682b74f6a15eb703e6e2e2cbff22bee156f875bd21c519fc7274b92 CVE-2024-5081,0,0,0bebffdc717b25462ccb5a198cb29076c0fa0475011c795b0df7ab25d1acf197,2024-08-05T15:35:16.180000 CVE-2024-50810,0,0,7da23b2ab88a2657cb76543548549613aa1f561df30582c648f7520bf514f0d4,2024-11-12T13:56:54.483000 CVE-2024-50811,0,0,d8ef1ac40dcb898d28bb949cb8cb9a8ce73f83d8e224524d33d6a2ba92df335a,2024-11-12T13:56:54.483000 -CVE-2024-5082,0,1,3c0f951c5b33762a472b3ea33ccf88b6977979b0c14a32ab8b6cbf67889fd7af,2024-11-15T13:58:08.913000 -CVE-2024-50823,0,1,a7026ee15916bc36c3e42723c6a10980ba2883e893c0171902ae31b7d89f1060,2024-11-15T13:58:08.913000 -CVE-2024-50824,0,1,c55d7e12643db55061d4a640017bff61e9f15221ac6001bee882deb20ebe943b,2024-11-15T13:58:08.913000 -CVE-2024-50825,0,1,8dce200ffd161c4239ec859a75978c9248b5ff5d89ba1d807f28989fc4da017a,2024-11-15T13:58:08.913000 -CVE-2024-50826,0,1,96416466db84ead7728fcd4c227ba8d6325dccb40ead7a5cab15ffc264df75f3,2024-11-15T13:58:08.913000 -CVE-2024-50827,0,1,203b5b6d15b29a748a40717f8d394e86bd8b82d1f36ce357bf01c585dd635748,2024-11-15T13:58:08.913000 -CVE-2024-50828,0,1,d38eb603f6d52963b831aa645a76e2a42079a7abb971db821189cd7245975e71,2024-11-15T13:58:08.913000 -CVE-2024-50829,0,1,dd181a80b73d89f1ffa2079bf99fb9386ab3c8712533acd07526f8acc5c56715,2024-11-15T13:58:08.913000 -CVE-2024-5083,0,1,732c694a7e1209ed2f8fc7bc4b33638dd34156f3bcdf08e1c465413b90acb66d,2024-11-15T13:58:08.913000 -CVE-2024-50830,0,1,32471327f9de17614ff8dcf3bbf6f1a4c39c87320e10e0a3c6c50da64f1958bc,2024-11-15T13:58:08.913000 -CVE-2024-50831,0,1,2290314ea9a02a60bfa34f07e4d4c3dd85301533416c71431af8b48595f840ba,2024-11-15T13:58:08.913000 -CVE-2024-50832,0,1,cd96b74da2fa5ea2c366f454efebbe37a4e092fdcb4c80e7a0b378224ba2a8fd,2024-11-15T13:58:08.913000 -CVE-2024-50833,0,1,5964073e00a86b1dfe7860be97241ed8ef7353cb5b89ab0a9e0e4fb932d64792,2024-11-15T13:58:08.913000 -CVE-2024-50834,0,1,25391f19d247f5c5625bd98bd56a6bc2e8f791aeed4903e0b187b006792c5b65,2024-11-15T13:58:08.913000 -CVE-2024-50835,0,1,d5fbc4b0d7032126c0f14b65179dabe6edfc46679aef0894f54588480863cf78,2024-11-15T13:58:08.913000 -CVE-2024-50836,0,1,85766955476c98bd839d5b2de9f60973de1bd164e67470863e519d1cacd3f4a7,2024-11-15T13:58:08.913000 -CVE-2024-50837,0,1,fa916683a3dbdfde4d576245ae8ebbe1bad5683debaaa4ab7d920a9d6cde4375,2024-11-15T13:58:08.913000 -CVE-2024-50838,0,1,03dc014a97e8c40e12ccc27e79d2f7d1a4be7052e0e877e043248cf17a531f10,2024-11-15T13:58:08.913000 -CVE-2024-50839,0,1,3a608a7f42db8a1d3498636aca9211ea343bc7800681c21ae957ddd569de8350,2024-11-15T13:58:08.913000 +CVE-2024-5082,0,0,3c0f951c5b33762a472b3ea33ccf88b6977979b0c14a32ab8b6cbf67889fd7af,2024-11-15T13:58:08.913000 +CVE-2024-50823,0,0,a7026ee15916bc36c3e42723c6a10980ba2883e893c0171902ae31b7d89f1060,2024-11-15T13:58:08.913000 +CVE-2024-50824,0,0,c55d7e12643db55061d4a640017bff61e9f15221ac6001bee882deb20ebe943b,2024-11-15T13:58:08.913000 +CVE-2024-50825,0,0,8dce200ffd161c4239ec859a75978c9248b5ff5d89ba1d807f28989fc4da017a,2024-11-15T13:58:08.913000 +CVE-2024-50826,0,0,96416466db84ead7728fcd4c227ba8d6325dccb40ead7a5cab15ffc264df75f3,2024-11-15T13:58:08.913000 +CVE-2024-50827,0,0,203b5b6d15b29a748a40717f8d394e86bd8b82d1f36ce357bf01c585dd635748,2024-11-15T13:58:08.913000 +CVE-2024-50828,0,0,d38eb603f6d52963b831aa645a76e2a42079a7abb971db821189cd7245975e71,2024-11-15T13:58:08.913000 +CVE-2024-50829,0,0,dd181a80b73d89f1ffa2079bf99fb9386ab3c8712533acd07526f8acc5c56715,2024-11-15T13:58:08.913000 +CVE-2024-5083,0,0,732c694a7e1209ed2f8fc7bc4b33638dd34156f3bcdf08e1c465413b90acb66d,2024-11-15T13:58:08.913000 +CVE-2024-50830,0,0,32471327f9de17614ff8dcf3bbf6f1a4c39c87320e10e0a3c6c50da64f1958bc,2024-11-15T13:58:08.913000 +CVE-2024-50831,0,0,2290314ea9a02a60bfa34f07e4d4c3dd85301533416c71431af8b48595f840ba,2024-11-15T13:58:08.913000 +CVE-2024-50832,0,0,cd96b74da2fa5ea2c366f454efebbe37a4e092fdcb4c80e7a0b378224ba2a8fd,2024-11-15T13:58:08.913000 +CVE-2024-50833,0,0,5964073e00a86b1dfe7860be97241ed8ef7353cb5b89ab0a9e0e4fb932d64792,2024-11-15T13:58:08.913000 +CVE-2024-50834,0,0,25391f19d247f5c5625bd98bd56a6bc2e8f791aeed4903e0b187b006792c5b65,2024-11-15T13:58:08.913000 +CVE-2024-50835,0,0,d5fbc4b0d7032126c0f14b65179dabe6edfc46679aef0894f54588480863cf78,2024-11-15T13:58:08.913000 +CVE-2024-50836,0,0,85766955476c98bd839d5b2de9f60973de1bd164e67470863e519d1cacd3f4a7,2024-11-15T13:58:08.913000 +CVE-2024-50837,0,0,fa916683a3dbdfde4d576245ae8ebbe1bad5683debaaa4ab7d920a9d6cde4375,2024-11-15T13:58:08.913000 +CVE-2024-50838,0,0,03dc014a97e8c40e12ccc27e79d2f7d1a4be7052e0e877e043248cf17a531f10,2024-11-15T13:58:08.913000 +CVE-2024-50839,0,0,3a608a7f42db8a1d3498636aca9211ea343bc7800681c21ae957ddd569de8350,2024-11-15T13:58:08.913000 CVE-2024-5084,0,0,79705ce3d53f6e7c72da00fccc935c6da44be9bf4354c31cd8528afb5e0a643e,2024-05-24T01:15:30.977000 -CVE-2024-50840,0,1,601608d1ca95a74cd56c0dd2a1a4b49ba28181e146695e4569128379dc5e5b7f,2024-11-15T13:58:08.913000 -CVE-2024-50841,0,1,024c85eb651d2b498ef517f63a06a689ce4d3e3c9e9daff3a7c4a6f00269c068,2024-11-15T13:58:08.913000 -CVE-2024-50842,0,1,cd0c52715782c1f793f61b49abf65f7f712f1badfd90077c866b2e48024a0004,2024-11-15T13:58:08.913000 -CVE-2024-50843,0,1,4477435381e6083c9119592b1603e3c4197eb68378d57b4a3fc0ce6a1344e25c,2024-11-15T13:58:08.913000 +CVE-2024-50840,0,0,601608d1ca95a74cd56c0dd2a1a4b49ba28181e146695e4569128379dc5e5b7f,2024-11-15T13:58:08.913000 +CVE-2024-50841,0,0,024c85eb651d2b498ef517f63a06a689ce4d3e3c9e9daff3a7c4a6f00269c068,2024-11-15T13:58:08.913000 +CVE-2024-50842,0,0,cd0c52715782c1f793f61b49abf65f7f712f1badfd90077c866b2e48024a0004,2024-11-15T13:58:08.913000 +CVE-2024-50843,0,0,4477435381e6083c9119592b1603e3c4197eb68378d57b4a3fc0ce6a1344e25c,2024-11-15T13:58:08.913000 CVE-2024-5085,0,0,6942e3068671e85a9578eddbb7240c8706dd53cd6ec5670c5d4ddd91c950a30a,2024-05-24T01:15:30.977000 CVE-2024-50852,0,0,64b96a730bbab5fdeb50ea2ef9d8c753a3ee332a2ced5e6155c4d6262476cb74,2024-11-14T14:38:04.837000 CVE-2024-50853,0,0,1baed05583acd81f33e173c1b1cff8a1aa290b815790fbe2c0ede1914c1b3840,2024-11-14T14:49:16.290000 @@ -265551,17 +265612,18 @@ CVE-2024-5092,0,0,00bc3fe74171cc3f61d986dd5d1b43711757ac5d30e24bab5f84b663495133 CVE-2024-5093,0,0,13d2e709dd3e7be8048d02a6012bbed004823bd119b45510128e77bb922bb163,2024-06-04T19:20:58.343000 CVE-2024-5094,0,0,a6da916325cb7c5c0cbf108ef5f048d7004d52e417cf8850e363484a9b36d59d,2024-06-04T19:20:58.470000 CVE-2024-5095,0,0,1588c0abfc34bbd50f97e7721e8e7ba42bb279c7cb42725ee04b715e36b1b7b7,2024-06-04T19:20:58.577000 -CVE-2024-50955,0,1,8157390cc8753ab3c3dc03f615378f98ac2c1983a215bd6243bc7dc27b80318c,2024-11-15T13:58:08.913000 -CVE-2024-50956,0,1,61199958fcf25ae9206f0f8875ee79a0e783a402692b34e9d18c29f4a470b75f,2024-11-15T13:58:08.913000 +CVE-2024-50955,0,0,8157390cc8753ab3c3dc03f615378f98ac2c1983a215bd6243bc7dc27b80318c,2024-11-15T13:58:08.913000 +CVE-2024-50956,0,0,61199958fcf25ae9206f0f8875ee79a0e783a402692b34e9d18c29f4a470b75f,2024-11-15T13:58:08.913000 CVE-2024-5096,0,0,5ed717834c38883681c6d180e391a0fccee5714f6ff3215bd896b6366e61be87,2024-06-04T19:20:58.687000 CVE-2024-50966,0,0,17999db3c119b65097d64bae028974d0e6d4cf5d6910c7a7a211536c5ff5b48a,2024-11-08T19:01:03.880000 -CVE-2024-50968,0,1,cdb414b0ec5b70d2218ae5e9dc043fda59b893e101e9eea07e1c691b1af0a88c,2024-11-15T13:58:08.913000 +CVE-2024-50968,0,0,cdb414b0ec5b70d2218ae5e9dc043fda59b893e101e9eea07e1c691b1af0a88c,2024-11-15T13:58:08.913000 CVE-2024-50969,0,0,f82f81fef8a82d72e4053f9ec8030a8d4d20833c5d6be0f5bb0e03f29d0491f9,2024-11-14T14:47:53.487000 CVE-2024-5097,0,0,f8c17c92eeab06c631c7e3bccbcd56a5be798bb0ae3554a5ecf4b2a49f948336,2024-06-04T19:20:58.787000 CVE-2024-50970,0,0,2e7889cd3277e474e337527bd160fa64940d7885ad18ecb1fd92dbeebea4ffd5,2024-11-14T14:52:08.097000 CVE-2024-50971,0,0,848df10022c9f75f1c9b9af05147f0923c3bc4a87738961451f1396fe9fbaab2,2024-11-14T14:54:33.787000 CVE-2024-50972,0,0,4e8fb2dd82bb709cf8c210bd21d32873aff8eb306d7b228bf00eb024671ceb3b,2024-11-14T14:55:08.567000 CVE-2024-5098,0,0,51bb68a404444dbad57c4444d3880f6dd34c8b10fc09ab7783a9da02fb8f5608,2024-06-04T19:20:58.887000 +CVE-2024-50986,1,1,949bd035da5362255ed7ac7c9edff0cc7fd8e202111ff0c1f3097978f8821437,2024-11-15T15:15:07.773000 CVE-2024-50989,0,0,539ed9c0a64887e69fa9cae96035a115db3a8a96afe0045140278b0fb7737495,2024-11-12T18:35:31.437000 CVE-2024-5099,0,0,c449033239abbf7fd2bba4f64694ff77374623f364f0fa141d0a92a151a3ab2c,2024-06-04T19:20:58.993000 CVE-2024-50990,0,0,3537d7668a1d8721c4b70a753dc5bd5ceae4b32dbcc1547432740e88301eb02f,2024-11-12T20:35:16.907000 @@ -265602,7 +265664,7 @@ CVE-2024-51022,0,0,9c971f391f021663a674f6ebedab01c215349ea525c288aa5349243311884 CVE-2024-51023,0,0,b12f806c39027dd585f6605b170e48144a3513f557c323acb9850f669a22caef,2024-11-05T21:35:11.923000 CVE-2024-51024,0,0,2602616b46cde149e40ad1ec2305c8463ebfa9f137264738865d2534ea931b9c,2024-11-05T20:35:25.253000 CVE-2024-51026,0,0,62fad2f07d50146e8433d063d38894194ce538e71bf191ac14b4c471f5cbc87a,2024-11-12T18:35:32.357000 -CVE-2024-51027,0,1,0df86581863a598d2520a0e997d45372c5b4a9ad62b540c319606898003d1398,2024-11-15T13:58:08.913000 +CVE-2024-51027,0,0,0df86581863a598d2520a0e997d45372c5b4a9ad62b540c319606898003d1398,2024-11-15T13:58:08.913000 CVE-2024-5103,0,0,aef0baf1fd7c527670ecf099c59b541b0a60e91a3e6b8de1c582546f74d7df46,2024-06-04T19:20:59.297000 CVE-2024-51030,0,0,f2e747039aa1c94bb05e787f4d207222d754db12ded9f6bb6df83cbdf74d7a25,2024-11-13T16:47:16.060000 CVE-2024-51031,0,0,b86b8798942030d83468cd0fee37fbed37248c27fcb27a06dd2e8866d706c425,2024-11-13T19:34:52.990000 @@ -265637,9 +265699,10 @@ CVE-2024-51136,0,0,b7028b746c76b0b8db7064a5c94d8b9b8b4865b267652b712081099f88f87 CVE-2024-5114,0,0,51655375bf74d88d0b44bf3106775b49d83b04b179d3446b4a92ffe727b17b66,2024-06-04T19:21:00.217000 CVE-2024-5115,0,0,566281473e2daa2487dd251e202869dc3059aeec07f7c63daa38b65c3bae3de7,2024-06-04T19:21:00.323000 CVE-2024-51152,0,0,2fc415b0efc6d5417097e1245b382b91c976aaa5917a1040e7761d3f03c4c572,2024-11-13T20:03:06.083000 -CVE-2024-51156,0,1,ab531e15c589d8d218306e8fd6a6995b5bbbca61f7ac15e609aad877e064595a,2024-11-15T13:58:08.913000 +CVE-2024-51156,0,0,ab531e15c589d8d218306e8fd6a6995b5bbbca61f7ac15e609aad877e064595a,2024-11-15T13:58:08.913000 CVE-2024-51157,0,0,15c268449f10cd3f5e2b0f898333f8df5f6a7a275257a0f4491ba5cb90f1b17e,2024-11-12T13:56:54.483000 CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000 +CVE-2024-51164,1,1,b9f1776fc3ef4840650c14e1a3f3e7dd8ac91dd3773b241274f401af13a4a1cc,2024-11-15T16:15:37.057000 CVE-2024-5117,0,0,8f71e5dda3348556d6b06143dcd47b79229dad0468d30aa7c38f8c5c1ecb8524,2024-06-04T19:21:00.547000 CVE-2024-51179,0,0,1ac36b7f8ecbb6442c3e82b8bfc190a784ef1fdb6227f3a1da3d4126f204bf98,2024-11-13T20:35:10.303000 CVE-2024-5118,0,0,ede24973ef1505b96fcd3c614d177bf90baaafde820cda4461fa6280b3c2b455,2024-05-20T13:00:04.957000 @@ -265667,7 +265730,7 @@ CVE-2024-51246,0,0,aa194fa853a376377fe6819071cfa2916e0d00edaefe6d104071b5230b5ba CVE-2024-51247,0,0,6f763214fc728651cee8f49e7f9d3466af02b1a87bcb320803295d2391bcc8af,2024-11-05T19:28:25.143000 CVE-2024-51248,0,0,24dce655c534c26b0b67ea327bc58bc6e5d7937e725965feb96bf75ba11def28,2024-11-05T19:28:29.730000 CVE-2024-51249,0,0,23dd85f23924e75ce199438298671d7b20ece05b7ee21f636e4f3929eb3f65e7,2024-11-04T18:50:05.607000 -CVE-2024-5125,0,1,4f170aace6b5c692b539636ba8a6126582ffcd0c045483b65d5ad5819a69c4c6,2024-11-15T13:58:08.913000 +CVE-2024-5125,0,1,f1ae9e54b9f94555190f44a209aeee1e2465c5a5c1bc0183d9c12898cc0fe1e7,2024-11-15T16:35:09.290000 CVE-2024-51251,0,0,63152562fe66f261ed3205b0767b9a859ea9c0ff927b599c5c96705e6967a8f8,2024-11-04T18:50:05.607000 CVE-2024-51252,0,0,bf357f6855609c81237cb444d332859dc7316dc50aaeed6006dd85a3ea82ebf7,2024-11-05T20:54:38.960000 CVE-2024-51253,0,0,bd6b7c4e24728199770eb9a14af1e277c7168d7d6f853e011077c74df42885e3,2024-11-04T18:50:05.607000 @@ -265745,6 +265808,10 @@ CVE-2024-5149,0,0,35aba13432990695b4ab26ada33d31578be519ff456b8edf807a15027d0b18 CVE-2024-51490,0,0,ce278c5bd11182b0f76e1306bfd4f5475ffe3bef255b34a2e09a247de41ed216,2024-11-14T20:13:01.587000 CVE-2024-51492,0,0,0a58c7013d2cd1abea36461b62b0843b3a8fe747b96ce2f6ac388e3c542b0b6c,2024-11-01T21:15:15.080000 CVE-2024-51493,0,0,905ca061a7e2249944cb0aec37c9054b75e237343bc05a733cf47492ea8f9f1d,2024-11-06T18:17:17.287000 +CVE-2024-51494,1,1,3bf3dc12c3275774bba61fd80cb9b469c3d1558c31dcf555fea4131d1a96dff7,2024-11-15T16:15:37.140000 +CVE-2024-51495,1,1,e5f07f08dba079d6dbed1b9bb4b396d9f02dcfcea5a5cfc1d096beea8d8ada12,2024-11-15T16:15:37.343000 +CVE-2024-51496,1,1,74cb6333739e3cc4c8e4c5764cfdffa2904217e6fbc34f4ca72b325e67ebd30c,2024-11-15T16:15:37.553000 +CVE-2024-51497,1,1,a39c34b7cc7817251d031d66b8a932ec72bf7d572c96a4983b8eae763d06c98b,2024-11-15T16:15:37.770000 CVE-2024-51498,0,0,a215c64a461c357224f24d4e16a3f3f3214ac081278e197bc9556945ad303f5e,2024-11-05T16:04:26.053000 CVE-2024-5150,0,0,af277f2642e60b6f0769d64573990279b6b64286b8d76d1359b09a52e223643b,2024-05-29T13:02:09.280000 CVE-2024-51500,0,0,42c2a285903076a2664ebb01d93e2fe7be0196e6180cfa0174e85e23f0ae008b,2024-11-05T16:04:26.053000 @@ -265827,19 +265894,19 @@ CVE-2024-51595,0,0,86c632a830d98810cba6685fef0932835324b783d480bd1e19dc70d238e88 CVE-2024-51596,0,0,68d56f326e86c174368dc8e5c4f277c0b65894f0149206735201856a3bb51840,2024-11-12T13:56:24.513000 CVE-2024-51597,0,0,e580da6df611238773fd113640aa155cd0ddae703c31494078adb66dd981bd48,2024-11-14T20:27:46.943000 CVE-2024-51598,0,0,ab45aa537bf288c8af2bb6366c2e9a74b71582c9d0d27efbfe545b94537181da,2024-11-12T13:56:24.513000 -CVE-2024-51599,0,0,5cd988e2787a53cdc2d1a464fab74b9367513165a89a10c905f4537cb27134dd,2024-11-12T13:56:24.513000 +CVE-2024-51599,0,1,7acfc4d03f6c4e0241e4f801826852b96d8755f6240b0f8a5702939c52f7cc5a,2024-11-15T16:55:34.480000 CVE-2024-5160,0,0,761bdadb9ac3f89d156978519ca326c5704c62592c7f03e703ecc7e802a865d7,2024-07-03T02:08:36.807000 CVE-2024-51601,0,0,1c0dbdb8639065f7f5ea5f6062d0125a4c4ce4b0c601912e96fe5db543ebfd2a,2024-11-12T13:56:24.513000 CVE-2024-51602,0,0,822f9c86566535e8535c86995cf3af8d3cfe52baf5520ff85e767e1c3e7259ea,2024-11-12T13:56:24.513000 -CVE-2024-51603,0,0,8b39030ffd0cb3459341d14dd644b429e38d44c25946f2093686635047f23972,2024-11-12T13:56:24.513000 -CVE-2024-51604,0,0,d6aae3a059c834fc01b3c5ecd18a671e61f67a1403ae9009e32e762b5707c5b2,2024-11-12T13:56:24.513000 -CVE-2024-51605,0,0,3181370e86e19cb15e2ba0b512a12ea9b3036b112f432239f6f810bbb742dc02,2024-11-12T13:56:24.513000 +CVE-2024-51603,0,1,a730746ec59538833fb1b8d30890055ac7925dfae1cdd77b4fda1967b595a281,2024-11-15T16:24:18.843000 +CVE-2024-51604,0,1,6a3e4a9375291be744614b2d5906671c19d1fe09996779b8dae193cdb2d50254,2024-11-15T16:19:11.063000 +CVE-2024-51605,0,1,1ef48abb0eb49926eef25f707be1d8bf237a6deaa1172eb4cd87e118f053e35d,2024-11-15T16:31:12.773000 CVE-2024-51606,0,0,ee1e7a1b1dbbb608910d3a1a8045750337c3795b4002cbbe921c849cc6ea0c49,2024-11-14T17:17:28.997000 CVE-2024-51607,0,0,6430a32ad0ccdbe2b5e85b260802defe649419f41be04507feb4e50aaec51a17,2024-11-12T13:56:24.513000 CVE-2024-51608,0,0,fa8c1f71c1313549b1f07e9b16bbcd2db8cf2a03813dee88669910ab58470fe5,2024-11-14T17:14:55.070000 CVE-2024-51609,0,0,56872967e7644d93195c5d54b9b6037222a1a65a36a397a829075693cfee2bc9,2024-11-14T17:10:36.463000 CVE-2024-5161,0,0,f120c7db938e25c7983d6c400da502880d5ffbc93ab4e5e05351c3fca8fbd038,2024-07-24T17:54:42.387000 -CVE-2024-51610,0,0,0c5999073d5ab9119b43a93ca30f63ab8745f39e68c0616117ee986d0b9671e4,2024-11-12T13:56:24.513000 +CVE-2024-51610,0,1,7648a3f8f67777cb52a0face6e2d46430e2e9cd0bf8a7468c0457d04e5d93ed9,2024-11-15T16:32:46.277000 CVE-2024-51611,0,0,df71ebdad6b83784c059a213dbfeff0cd4ad4cfa07621a54c78ae28de90b182c,2024-11-12T13:56:24.513000 CVE-2024-51612,0,0,68d292e6c4edc9ad2cb6a4f4df85c4beb58f5e75eb303880d4a399c88b63d1b7,2024-11-12T13:56:24.513000 CVE-2024-51613,0,0,e5e09d28c859e2362905d8484d126a9fa39bc52028d1cd16464bb2210975b217,2024-11-12T13:56:24.513000 @@ -265861,8 +265928,8 @@ CVE-2024-5163,0,0,1f45f157a740def8c3f1c2e097025198bc2166983108f63600058e7c57408d CVE-2024-51630,0,0,22adffaa9039d1fe9e03a4e48d178f89d1bd36af85559e36a535a227a69b456d,2024-11-12T13:56:24.513000 CVE-2024-51647,0,0,0c6d8f9a804912e43c7869d3b717f4cbcd6166cf1be9c7b6f9ef329e8fce46cc,2024-11-12T13:56:24.513000 CVE-2024-5165,0,0,2b7469c3d25cc1e03e7fcca1607bc78daf489d82c018a0fbc4f3b815c328cf85,2024-05-24T01:15:30.977000 -CVE-2024-51658,0,1,435f4fb63039956e91b2b852b51372b029bcbaead7356ecd935124297917cb89,2024-11-15T13:58:08.913000 -CVE-2024-51659,0,1,78d45b532178a143b0c2b377e8ea9093595088b2434d4e401a5f34f0a4ad9452,2024-11-15T13:58:08.913000 +CVE-2024-51658,0,0,435f4fb63039956e91b2b852b51372b029bcbaead7356ecd935124297917cb89,2024-11-15T13:58:08.913000 +CVE-2024-51659,0,0,78d45b532178a143b0c2b377e8ea9093595088b2434d4e401a5f34f0a4ad9452,2024-11-15T13:58:08.913000 CVE-2024-5166,0,0,5c544eab21844e01fabd3874ed7776a55145987bd3a510311ad16f12f33bd2bc,2024-05-22T18:59:20.240000 CVE-2024-51661,0,0,7f81708d1fd43600536029afc897b01b4855aee3d2fe39c5692b8132139274de,2024-11-08T15:02:08.660000 CVE-2024-51662,0,0,f5359332d7a9d4e37aab99663d0e73af1a60912d65021c3415523622490d6f78,2024-11-12T13:56:24.513000 @@ -265879,16 +265946,16 @@ CVE-2024-51675,0,0,8a4bacc24cff024145f3f2bcaf3202f909b690eb8b24ec3863ccfd5d10856 CVE-2024-51676,0,0,ece0a16779fe3a19431027941663a0cdb1298b76465f9e748c1eef77d20b83f9,2024-11-12T13:56:24.513000 CVE-2024-51677,0,0,8b0f7a3853108bd14021b832cd2914a4bbd49dc774029c03bf84670c6d192320,2024-11-06T22:10:31.677000 CVE-2024-51678,0,0,ce4086679232add4ebc40be30bdc12f20f02b66e38c181d2556e9473603941fd,2024-11-06T22:10:45.103000 -CVE-2024-51679,0,1,416926b16682f0c55900a28defd472a645a0e4e03f884d4071960b168013dde9,2024-11-15T13:58:08.913000 +CVE-2024-51679,0,0,416926b16682f0c55900a28defd472a645a0e4e03f884d4071960b168013dde9,2024-11-15T13:58:08.913000 CVE-2024-5168,0,0,cbe1b6c96aef7b506dd526cf00951c936dfc5233fd9563b4af0bf7fdab7a5899,2024-05-24T01:15:30.977000 CVE-2024-51680,0,0,e3d442fcfe0b4fceddb505a5eff13c52978f820716977fad69b0fdd39fa2c605,2024-11-06T22:10:59.270000 CVE-2024-51681,0,0,6987ab81beb2df0eaa9da220f2d791ed5d8df3f0e18bd37d9a9b390a4eaf5a17,2024-11-06T22:11:16.003000 CVE-2024-51682,0,0,aaba0581a3d811571ae104155388a45dd47ae531ed284c6ab0022efdb152fbe5,2024-11-06T22:12:02.353000 CVE-2024-51683,0,0,f59d50717ee7305489d521abf4c5c1ef491e4436568b0e3c6dd145e0ad77427b,2024-11-06T22:12:19.803000 -CVE-2024-51684,0,1,a66bec9d86deedea6e14348a98db70ceeb83061cd431a4e6c641125801528e71,2024-11-15T13:58:08.913000 +CVE-2024-51684,0,0,a66bec9d86deedea6e14348a98db70ceeb83061cd431a4e6c641125801528e71,2024-11-15T13:58:08.913000 CVE-2024-51685,0,0,3ec6f589ce8427b20bd90f3e3168669c47fda17fa0f474f038e9a6e94e0e60b9,2024-11-06T19:34:31.590000 -CVE-2024-51687,0,1,24a77cb38fadbe8a5a015eafc173e9b49aed872e2c6265ce10909094b71db7bc,2024-11-15T13:58:08.913000 -CVE-2024-51688,0,1,4c55663463f797e767c6b3e5e6a57ee83b28815908f133c53dcf3a7dc0159646,2024-11-15T13:58:08.913000 +CVE-2024-51687,0,0,24a77cb38fadbe8a5a015eafc173e9b49aed872e2c6265ce10909094b71db7bc,2024-11-15T13:58:08.913000 +CVE-2024-51688,0,0,4c55663463f797e767c6b3e5e6a57ee83b28815908f133c53dcf3a7dc0159646,2024-11-15T13:58:08.913000 CVE-2024-51689,0,0,ab2f405c7815c7db8e61d12d5b0c31d4e0752b7068e1e475bf3338853f840d9d,2024-11-12T13:56:24.513000 CVE-2024-5169,0,0,882a6aa1fee4c71f4df51ce353ec6b27431ae776e2b2b23b3c5ba8c59ca21797,2024-08-02T15:00:10.200000 CVE-2024-51690,0,0,7e5eae0ff5cca9f377bf464de65b2d968392e357bd55f7a073753a3ee3d229f4,2024-11-12T13:56:24.513000 @@ -265984,7 +266051,7 @@ CVE-2024-5185,0,0,0c09010aee9423412314c9f1cbba57fc2fd9ee19c760646e6502f5738cacb7 CVE-2024-5186,0,0,7baed0c201f742c44896dec767d6237c8df7ae961ab3d7ec09eb8b65736716f7,2024-09-24T14:04:47.170000 CVE-2024-5187,0,0,88fb29ce759c452b913d57a873a63220e31c82d475ca2c84fa3b804bf9736023,2024-10-23T13:36:11.643000 CVE-2024-5188,0,0,b2a939863f7779e6dba1e0e2aecd4047c60710495b7cac734003aec732566505,2024-06-11T17:41:17.087000 -CVE-2024-51882,0,0,e290c05368a0bd7b18c7c49e7b6a5a874f7303a05115f4a00bb15e20d5a6314a,2024-11-12T13:55:21.227000 +CVE-2024-51882,0,1,5d194411246929bd7d2c565494fb6c4858f77dd0f83ada9b5feee4075b6dc33c,2024-11-15T16:08:40.333000 CVE-2024-5189,0,0,87ea6bb70c0f4e8e0e95d6725175819a83c6ff33cc484fc5f525db9ad5e385e9,2024-06-13T18:36:45.417000 CVE-2024-5190,0,0,d58b9fdaecdb1abec20ccf7764e52a460a4959870ee8917a6c4a9f4c686657e6,2024-05-22T03:15:08.273000 CVE-2024-5191,0,0,855a566258b8b88a588ebc49e507f9db3fa3e450b83819e0fe6599e7fdad210b,2024-06-24T19:25:23.943000 @@ -266003,7 +266070,7 @@ CVE-2024-51992,0,0,6af48747827be50f1e3a16e8e861da6495a81992702d7833ebe1335a57ab1 CVE-2024-51993,0,0,0b180a03099571fff8a13158fe72d7871f053352d43d872590f8f53c841ecca8,2024-11-08T19:01:03.880000 CVE-2024-51994,0,0,9ecdd0862ec4cb4e8cbc599710fe336df5bb3c681162050e709512d4ec211c97,2024-11-08T19:01:03.880000 CVE-2024-51995,0,0,7484e6b15af945f697a88a8c3b9d2c315fe6e0004cde6e533470a014d3f9ae3d,2024-11-08T19:01:03.880000 -CVE-2024-51996,0,1,0a7b5626197330d2deefd861196112c7d2cb23b384e4a55d59917685d6bf245c,2024-11-15T14:00:09.720000 +CVE-2024-51996,0,0,0a7b5626197330d2deefd861196112c7d2cb23b384e4a55d59917685d6bf245c,2024-11-15T14:00:09.720000 CVE-2024-51997,0,0,ab86aff6fa43516eaff213e4584d906496b3f2e2f19bf6f0c2c9236a622fbe69,2024-11-12T13:56:54.483000 CVE-2024-51998,0,0,19a2e1052c10533bdc1ed034b91b5ec816f585536da2e947441dab97cd0af7ac,2024-11-08T19:01:03.880000 CVE-2024-52000,0,0,53607fd920c5e6c0c523f59cb394de5d5c634c469499e12c0f4cb198af2d27c3,2024-11-12T13:56:54.483000 @@ -266064,8 +266131,8 @@ CVE-2024-5228,0,0,d7fb18ef663e7fbb963ee04e575f2bc258b900955c0912600676521519fad8 CVE-2024-52286,0,0,a006a0be971b0e96964504e5809b0d7c6410ed1592b8c4976d82ae2953104dc3,2024-11-12T13:55:21.227000 CVE-2024-52288,0,0,8f949332b60260488906ff1b8c70f9a1209d9b10278c3c334faa6ae7259272ba,2024-11-12T13:55:21.227000 CVE-2024-5229,0,0,787c92e076dbd9dca682f832ee22f0e31b439c91ed2d6b58a8c544f86d4189c3,2024-07-03T02:08:42.827000 -CVE-2024-52291,0,1,fafc120c824abccbbbd1655cda9505d589a683965834f3ef4a977c8bff8181bf,2024-11-15T14:00:09.720000 -CVE-2024-52292,0,1,c4b9012714205012dabf563cec252d830c6f1b4cdf3e29387e0d322f13e715f3,2024-11-15T14:00:09.720000 +CVE-2024-52291,0,0,fafc120c824abccbbbd1655cda9505d589a683965834f3ef4a977c8bff8181bf,2024-11-15T14:00:09.720000 +CVE-2024-52292,0,0,c4b9012714205012dabf563cec252d830c6f1b4cdf3e29387e0d322f13e715f3,2024-11-15T14:00:09.720000 CVE-2024-52293,0,0,be674165b50e47c42934b026587a88a0d357895caf150a8f7a87138e0392b425,2024-11-13T17:01:16.850000 CVE-2024-52295,0,0,5bb196d45351b5c5415457f3e913ea51119231df112b61c7f2362bdc436f254f,2024-11-13T19:35:16.587000 CVE-2024-52296,0,0,e6de64e2880a3b50a57d7a18eca2e2a99963ce11a96b5efab192b94d0fcdfe73,2024-11-13T17:01:58.603000 @@ -266075,10 +266142,10 @@ CVE-2024-52299,0,0,b25255ab4f1b29c4028976bec468c74e39d28d9197a16d9d7dc41d1fe898e CVE-2024-5230,0,0,f45c8274ba28e0dc58bed98870ed092580a9c18662584e7c3debbd7f7cd359f4,2024-06-04T19:21:02.540000 CVE-2024-52300,0,0,f4e4e536b3ce93b4bea9ba04caa74bba8b78b20ed3e702dcbb1c83ad51694c69,2024-11-13T17:01:16.850000 CVE-2024-52301,0,0,091c40845cee35a6db54cae490564bdae10317d21b9b1b70a65b6fc3311911d8,2024-11-13T17:01:16.850000 -CVE-2024-52302,0,1,07877ae667924fcd5dc6349e2bbc5755286c2a37cd731fe353996ab7a3354ec7,2024-11-15T13:58:08.913000 +CVE-2024-52302,0,0,07877ae667924fcd5dc6349e2bbc5755286c2a37cd731fe353996ab7a3354ec7,2024-11-15T13:58:08.913000 CVE-2024-52305,0,0,dc609877fc9dfb62c6c6bc68486e8898c1a92ac08e89f322ce436991076d7cdb,2024-11-13T19:15:08.853000 CVE-2024-52306,0,0,59f18663771ceab92cba47c3e31ee5dd3eed1ee3c6f7144187a60ded4a98f970,2024-11-13T17:01:16.850000 -CVE-2024-52308,0,1,68dbd5663bc1fce9463187e86de0183ed1b47f7db3824a2242b39ee69302613a,2024-11-15T13:58:08.913000 +CVE-2024-52308,0,0,68dbd5663bc1fce9463187e86de0183ed1b47f7db3824a2242b39ee69302613a,2024-11-15T13:58:08.913000 CVE-2024-5231,0,0,255bed42ab2a064a39e6f8c88880296d2f7a7d154f3db6dc7f4df2fa244d299f,2024-06-04T19:21:02.640000 CVE-2024-52311,0,0,440cc6f6193f2a4b57d7c7c4a4f4b3f01242ca6df6bc89770050e09d3b499acf,2024-11-12T13:56:54.483000 CVE-2024-52312,0,0,e095caa38b1d55aa1661d9e6b591e2f5164609c3e5c2884b5f60aa22d851bdcc,2024-11-12T13:56:54.483000 @@ -266094,31 +266161,31 @@ CVE-2024-52352,0,0,d000632140f71e44e942a3dbc2ddd9260fa470cb96bef8ac5f8ba3eea1f03 CVE-2024-52353,0,0,8f6fdbf8162ece41a08a7cc2a2dc9e5249ac6195297b0e830ced0d3f4bc5c84a,2024-11-12T13:55:21.227000 CVE-2024-52354,0,0,bd5ed3d68271f155fc3112a493679226950394a406d6f8e4021a12bfa7a3c4fe,2024-11-12T13:55:21.227000 CVE-2024-52355,0,0,ab138c81f8a6c2d78d8bf3737e35a8422aee1976da0dc3f8a86c63b65d3787dd,2024-11-12T13:55:21.227000 -CVE-2024-52356,0,0,6f52c6a317f3e6d9b4fea003476d72ca3813f755516b2759515eed910b7d7fc2,2024-11-12T13:55:21.227000 -CVE-2024-52357,0,0,0b87f00ebcffd7ab9b093f3ccd343158c40fba6d8989757f4c8a16b72f945025,2024-11-12T13:55:21.227000 -CVE-2024-52358,0,0,98865d3b54e5cf46f7348181649ffde2326b16ddca1830d7a36a631093f0fb1c,2024-11-12T13:55:21.227000 +CVE-2024-52356,0,1,851c201d7c2106e058116183f3ef13ac524e944c93e92a0be8b5c856c91b9b6b,2024-11-15T16:05:12.367000 +CVE-2024-52357,0,1,1972e22f599a1fd1b8d4152d07239a706a9c53ad0eb79683c3aab852fc4e443e,2024-11-15T16:04:45.767000 +CVE-2024-52358,0,1,64a4a904a23151aab1b11ae172d146919fa43e3b57b368f1c78e5557900f2543,2024-11-15T16:17:40.127000 CVE-2024-5236,0,0,3a876190aab882c0110e09fef49a5c72516897cda47bddba2de12251cfa9a5e8,2024-05-24T01:15:30.977000 -CVE-2024-52369,0,1,9bb6355bce4a4436b67b89be0df4c04ac56d16c7e0beb82cd7d9fa08a46a5e50,2024-11-15T13:58:08.913000 +CVE-2024-52369,0,0,9bb6355bce4a4436b67b89be0df4c04ac56d16c7e0beb82cd7d9fa08a46a5e50,2024-11-15T13:58:08.913000 CVE-2024-5237,0,0,8803efe45da93d97b55082adbd1bb29281c1282514c20ec3608a648081cd56be,2024-06-04T19:21:03.317000 -CVE-2024-52370,0,1,874be94a621de817f27e01c88939990ee0dc4a52d3b1b13e46feb4a595429a4a,2024-11-15T13:58:08.913000 -CVE-2024-52371,0,1,9a946993726136039a1fb1551c053f51c189ddd41644c4ba4290b169bdca8c95,2024-11-15T13:58:08.913000 -CVE-2024-52372,0,1,111b0ca2a795e6ef56f7cbe0caee5bfb901a0830290fa23e169f67a1927cccae,2024-11-15T13:58:08.913000 -CVE-2024-52373,0,1,a5189c794fe72d286d43c099f99f282b112f69d5416a7fbe6208ae0bd66ad816,2024-11-15T13:58:08.913000 -CVE-2024-52374,0,1,d1819e6a2966efc635ff2cb6b4917d1e5ba47121c8188c1c9d7250a92d203e0d,2024-11-15T13:58:08.913000 -CVE-2024-52375,0,1,35eca6c981b2f3551c72d8c94f17e1a840e8c873bc9b2228458bc70709b66885,2024-11-15T13:58:08.913000 -CVE-2024-52376,0,1,edac5b784e6996bb01a6c1e12897935fbb487b409e2d2e812f8b2c6d34005a87,2024-11-15T13:58:08.913000 -CVE-2024-52377,0,1,c192ad27456fea87ae23a8b3f39a82b8f43ef8131f5d34df56642bc235140391,2024-11-15T13:58:08.913000 -CVE-2024-52378,0,1,cd58dacad479640dc895fd48c4d69f33df5b32a6f6d7490c2be4ec3f7894bc41,2024-11-15T13:58:08.913000 -CVE-2024-52379,0,1,77d647e5917248b547551f82c04a1ee052e1c8dc5717b7dff6634059def97fb1,2024-11-15T13:58:08.913000 +CVE-2024-52370,0,0,874be94a621de817f27e01c88939990ee0dc4a52d3b1b13e46feb4a595429a4a,2024-11-15T13:58:08.913000 +CVE-2024-52371,0,0,9a946993726136039a1fb1551c053f51c189ddd41644c4ba4290b169bdca8c95,2024-11-15T13:58:08.913000 +CVE-2024-52372,0,0,111b0ca2a795e6ef56f7cbe0caee5bfb901a0830290fa23e169f67a1927cccae,2024-11-15T13:58:08.913000 +CVE-2024-52373,0,0,a5189c794fe72d286d43c099f99f282b112f69d5416a7fbe6208ae0bd66ad816,2024-11-15T13:58:08.913000 +CVE-2024-52374,0,0,d1819e6a2966efc635ff2cb6b4917d1e5ba47121c8188c1c9d7250a92d203e0d,2024-11-15T13:58:08.913000 +CVE-2024-52375,0,0,35eca6c981b2f3551c72d8c94f17e1a840e8c873bc9b2228458bc70709b66885,2024-11-15T13:58:08.913000 +CVE-2024-52376,0,0,edac5b784e6996bb01a6c1e12897935fbb487b409e2d2e812f8b2c6d34005a87,2024-11-15T13:58:08.913000 +CVE-2024-52377,0,0,c192ad27456fea87ae23a8b3f39a82b8f43ef8131f5d34df56642bc235140391,2024-11-15T13:58:08.913000 +CVE-2024-52378,0,0,cd58dacad479640dc895fd48c4d69f33df5b32a6f6d7490c2be4ec3f7894bc41,2024-11-15T13:58:08.913000 +CVE-2024-52379,0,0,77d647e5917248b547551f82c04a1ee052e1c8dc5717b7dff6634059def97fb1,2024-11-15T13:58:08.913000 CVE-2024-5238,0,0,a03a95be1868c6bee6318b11858946fc155e156e4fa75ea27b59162de04fd53f,2024-06-04T19:21:03.413000 -CVE-2024-52380,0,1,424b66af08a431dc68e605f19f164d9b67b08c8aaec35ebd9f0a1ce7cf945087,2024-11-15T13:58:08.913000 -CVE-2024-52381,0,1,3fbc89030970c07d375e37c82ba59ce7607ae9e6c691ea1328542c68d514aa99,2024-11-15T13:58:08.913000 -CVE-2024-52382,0,1,c4bf60f4f3e3ee1d6c9140f8005c8310fb9af0b0c2e66dc8173a41341386c9ed,2024-11-15T13:58:08.913000 -CVE-2024-52383,0,1,59cf4c36c8c34facc65aedf368b7db52af8e4801d0555a71f39486dfcb6217b9,2024-11-15T13:58:08.913000 -CVE-2024-52384,0,1,12b6b4c606276d15fa1739f31b57b636d0ff7888825685c206f091a25d7ded7a,2024-11-15T13:58:08.913000 +CVE-2024-52380,0,0,424b66af08a431dc68e605f19f164d9b67b08c8aaec35ebd9f0a1ce7cf945087,2024-11-15T13:58:08.913000 +CVE-2024-52381,0,0,3fbc89030970c07d375e37c82ba59ce7607ae9e6c691ea1328542c68d514aa99,2024-11-15T13:58:08.913000 +CVE-2024-52382,0,0,c4bf60f4f3e3ee1d6c9140f8005c8310fb9af0b0c2e66dc8173a41341386c9ed,2024-11-15T13:58:08.913000 +CVE-2024-52383,0,0,59cf4c36c8c34facc65aedf368b7db52af8e4801d0555a71f39486dfcb6217b9,2024-11-15T13:58:08.913000 +CVE-2024-52384,0,0,12b6b4c606276d15fa1739f31b57b636d0ff7888825685c206f091a25d7ded7a,2024-11-15T13:58:08.913000 CVE-2024-5239,0,0,22096f8834a8c03dcb48be161c14c319f43af7764381bdfba5862a8d7ec5b0e4,2024-06-04T19:21:03.520000 -CVE-2024-52393,0,1,544c9a3bd507c14f5bd824b3ace32c372ff7d621dec666c2268e7d1fbb090c75,2024-11-15T13:58:08.913000 -CVE-2024-52396,0,1,ed7ce5f089112efbbf69e98091ae455f8a1a2931f642482b52d2f92fdebab2fc,2024-11-15T13:58:08.913000 +CVE-2024-52393,0,0,544c9a3bd507c14f5bd824b3ace32c372ff7d621dec666c2268e7d1fbb090c75,2024-11-15T13:58:08.913000 +CVE-2024-52396,0,0,ed7ce5f089112efbbf69e98091ae455f8a1a2931f642482b52d2f92fdebab2fc,2024-11-15T13:58:08.913000 CVE-2024-5240,0,0,f498b44970022e280094b55bfe8352214cc561bf319f52e66772660c36836426,2024-06-04T19:21:03.623000 CVE-2024-5241,0,0,b91d4b722c041cbce6644b69dfde443a5ae4515bb0ecbdc8f8544e6b04a0143c,2024-06-04T19:21:03.750000 CVE-2024-5242,0,0,8cd95bcd77d40a92ee0a6d389bf812b544cb6fb4b8301f7049b84de17fceaeef,2024-05-24T01:15:30.977000 @@ -266130,30 +266197,32 @@ CVE-2024-5247,0,0,fdfe6c1388c42f602cdcb0ffda38b56b5f1ed960e60bfada435f42d294b295 CVE-2024-5248,0,0,6cfa5cec6de457c13d7096887dc7c2d8bd99f0e898238886822e69d1ee66037e,2024-11-03T17:15:14.860000 CVE-2024-5249,0,0,7881e207dd06fe76500d559735f87b1084a494789351514ee988debe74e79673,2024-10-01T14:26:17.410000 CVE-2024-5250,0,0,b4b370273f1fe30d94b715ad219dda570a7dcb84192abd50c3cb746299bdbb93,2024-10-01T14:33:47.727000 -CVE-2024-52505,0,1,7c58f328eee3b40bfcef13b278250e7509b58c18af26b7fe642ca2ce116c61a9,2024-11-15T13:58:08.913000 +CVE-2024-52505,0,0,7c58f328eee3b40bfcef13b278250e7509b58c18af26b7fe642ca2ce116c61a9,2024-11-15T13:58:08.913000 CVE-2024-5251,0,0,7d84d2df7bf6674f7d634954defb2f38b0363c19ae19f78012df0aa633abf27a,2024-07-19T15:25:30.980000 CVE-2024-5252,0,0,1b28d536afc88eae5088fe06ff49428bbad5ffcb2aa7139fe40c4c06d2601422,2024-07-19T15:29:35.447000 -CVE-2024-52524,0,1,71485345519193ae9ba542ea67056853a738d2240eb01cec0b89113cc24468ca,2024-11-15T13:58:08.913000 +CVE-2024-52524,0,0,71485345519193ae9ba542ea67056853a738d2240eb01cec0b89113cc24468ca,2024-11-15T13:58:08.913000 +CVE-2024-52526,1,1,db92b0ba845b721050dc5d75b07751c56b5840b3faec607c877ff07aee8d97f7,2024-11-15T16:15:38.107000 CVE-2024-5253,0,0,73f9562f224a9a11b8b8279a7bf00d920003fa046cb7c88a3a55caf281adabe4,2024-07-19T15:30:34.717000 CVE-2024-52530,0,0,9accb3b51708da4056e1b2d60bf748a8c8f27363e68e7120159317514b4fed53,2024-11-12T19:35:14.927000 CVE-2024-52531,0,0,4a9a627b31c610f608576c39893b61b41c0efeb9f9d97b523937261d20004d52,2024-11-12T19:35:15.807000 CVE-2024-52532,0,0,82ab4898c82b79d45f58347a35d13014aa77e1fd942e3edcc771ee91b2c6c3ad,2024-11-12T19:35:16.970000 CVE-2024-52533,0,0,81d75647e8fcacbe880bcd9f7eaf399938e1df4314078c30bc37f40639859c7b,2024-11-12T16:35:24.297000 CVE-2024-5254,0,0,78882d871be0a19bc95888168cf12372f503de77ac359f287536c8f062c38532,2024-07-19T15:32:05.560000 -CVE-2024-52549,0,1,fd75f7ddf331713d4d68d280968ebe1a7937bdcd0767d23dbc768a0c6cf66c13,2024-11-15T14:00:09.720000 +CVE-2024-52549,0,0,fd75f7ddf331713d4d68d280968ebe1a7937bdcd0767d23dbc768a0c6cf66c13,2024-11-15T14:00:09.720000 CVE-2024-5255,0,0,a9d47c22e8985fc8d8b40f4bef3272595484bdbc8485e44830cb58ee997ab90f,2024-07-19T15:32:18.850000 -CVE-2024-52550,0,1,661ac238dfad624bd220f9ba8f9c5922eaba43fcb8053e586f1460e86428b73b,2024-11-15T14:00:09.720000 -CVE-2024-52551,0,1,a55fcfda0c856a7c2e6739ceee574cb85a24fabb6c3ff844edb014b969fe974d,2024-11-15T14:00:09.720000 -CVE-2024-52552,0,1,2f96ac448bf9b00ee8139fe2b1f83755e1d5e7ee62e44cc3e0f2925f12d3f6ce,2024-11-15T14:00:09.720000 -CVE-2024-52553,0,1,11348c28b862f60d8b3c8dc11ab0fb5f1e53e1358b82b1f8a97199c0de1f5907,2024-11-15T14:00:09.720000 -CVE-2024-52554,0,1,6589eaee43c4794afc2869f1e1fb69f264d40d3a38b215d2e67a517b5a3abbef,2024-11-15T13:58:08.913000 +CVE-2024-52550,0,0,661ac238dfad624bd220f9ba8f9c5922eaba43fcb8053e586f1460e86428b73b,2024-11-15T14:00:09.720000 +CVE-2024-52551,0,0,a55fcfda0c856a7c2e6739ceee574cb85a24fabb6c3ff844edb014b969fe974d,2024-11-15T14:00:09.720000 +CVE-2024-52552,0,0,2f96ac448bf9b00ee8139fe2b1f83755e1d5e7ee62e44cc3e0f2925f12d3f6ce,2024-11-15T14:00:09.720000 +CVE-2024-52553,0,0,11348c28b862f60d8b3c8dc11ab0fb5f1e53e1358b82b1f8a97199c0de1f5907,2024-11-15T14:00:09.720000 +CVE-2024-52554,0,0,6589eaee43c4794afc2869f1e1fb69f264d40d3a38b215d2e67a517b5a3abbef,2024-11-15T13:58:08.913000 +CVE-2024-52555,1,1,5bd2a197b9b62d1570e8e4e5ac858dca21aea78d7b7b9d312bc19de044b868c9,2024-11-15T16:15:38.340000 CVE-2024-5256,0,0,c0c79be075ef53b66bd4c726b840e366d70c6f0c56013178c0440e2e2bf91c1e,2024-09-24T18:41:40.007000 CVE-2024-5257,0,0,e4fba0a5c9dc635ae9582dcee356a08c90165a6e8c8a0a01b6dfbef5e885cd24,2024-07-12T16:54:34.517000 CVE-2024-5258,0,0,51134eb56f05332c584317818ff995de56b2de598a9752cb1990f31f73c535e3,2024-05-24T01:15:30.977000 CVE-2024-5259,0,0,b3c664cd11ddb9db1b34b50011b18499fc5ac06e8b6b6a588e8cf7d8bc26fc37,2024-06-11T17:44:42.783000 CVE-2024-5260,0,0,1ea9956e2812efb1ad02a50e6e15b3c5419e86ea96923b6afc83449c65511582,2024-07-02T12:09:16.907000 CVE-2024-5261,0,0,0592ac8c89e0cb8027f6648912b9536cab36db7fb70868109d4e1f51168ecc2f,2024-06-25T18:50:42.040000 -CVE-2024-52613,0,1,9959ccabc06b7c4865878e6ea669712da2592f256182abd74f6dbf4231644332,2024-11-15T13:58:08.913000 +CVE-2024-52613,0,0,9959ccabc06b7c4865878e6ea669712da2592f256182abd74f6dbf4231644332,2024-11-15T13:58:08.913000 CVE-2024-5262,0,0,83603483afb7387d019b476baa2cae004e6d4e7f9b65a5997b6545bcd7a41b63,2024-06-11T17:18:50.600000 CVE-2024-5263,0,0,997be873c6f28955b5d0d8cb5df3c06ebeb17c50a7068003806eac08a0ed2846,2024-08-07T16:01:35.217000 CVE-2024-5264,0,0,7660c1edaddd779c29789898410be8f6784b9b682f1b3f0cb339e7e58b29768e,2024-06-21T17:18:00.973000 @@ -266733,10 +266802,10 @@ CVE-2024-5913,0,0,307a9260d70a9d37ef03fc90a18fce4dac6ad981979537b72159d2890aa10b CVE-2024-5914,0,0,5ab56ff6e03c38766463339097d3da51e1161518db555649197f85ab7972331e,2024-08-20T16:22:06.357000 CVE-2024-5915,0,0,02c85b3460ff280d15df03319450806b3e5d30c71b9189b0ecc887e95a66b96e,2024-08-20T16:23:10.493000 CVE-2024-5916,0,0,5c958efb87a06f0a35735b489fd355d0842ab659e7fda78c1c111ac292a5fa45,2024-08-20T19:30:11.980000 -CVE-2024-5917,0,1,a39fbbac1190d92d966cdf19c9a927a7c0a96e862058b0163628c17f4a7f6de6,2024-11-15T13:58:08.913000 -CVE-2024-5918,0,1,88becd1b2966b560f82646aa7f974f77214bd3a55c994cfc8e755b4f03134072,2024-11-15T13:58:08.913000 -CVE-2024-5919,0,1,8f8927031df583665b1d75315ef8952b20df8dea438865dba0d05d4820d70f35,2024-11-15T13:58:08.913000 -CVE-2024-5920,0,1,51ec49cbee3eb90449e3fab927d98f3df16920675ceb32c0cbe775d630ce053b,2024-11-15T13:58:08.913000 +CVE-2024-5917,0,0,a39fbbac1190d92d966cdf19c9a927a7c0a96e862058b0163628c17f4a7f6de6,2024-11-15T13:58:08.913000 +CVE-2024-5918,0,0,88becd1b2966b560f82646aa7f974f77214bd3a55c994cfc8e755b4f03134072,2024-11-15T13:58:08.913000 +CVE-2024-5919,0,0,8f8927031df583665b1d75315ef8952b20df8dea438865dba0d05d4820d70f35,2024-11-15T13:58:08.913000 +CVE-2024-5920,0,0,51ec49cbee3eb90449e3fab927d98f3df16920675ceb32c0cbe775d630ce053b,2024-11-15T13:58:08.913000 CVE-2024-5922,0,0,50960a94a5a484ee279a2b7dcacb2f2a0eb6eb2607889fe30657dd07f5206782,2024-06-28T10:27:00.920000 CVE-2024-5924,0,0,4b7e4b611121f550bcb0fd877a4f853b37b9df78f8237b70038811b9cca802bd,2024-06-17T12:43:31.090000 CVE-2024-5925,0,0,e946172587053e70c75c453600b6000de540319095aebb04cea6cd10cd2597bf,2024-06-28T10:27:00.920000 @@ -266868,7 +266937,7 @@ CVE-2024-6064,0,0,4e113927f74e0953e67a2edd02307ec5164ca1a59a235d271f6fdb46199c8d CVE-2024-6065,0,0,fb62e316a0ad9ece1e768d08a64b14f3810d575505955be6b70f210883e1f8c6,2024-08-08T16:10:07.147000 CVE-2024-6066,0,0,5bf5957210d37b62ac802e0ce97b7afa3dcb298f48bcd651cbf6bebf0741a628,2024-08-08T16:05:04.247000 CVE-2024-6067,0,0,a73dc457c770b2e45a6dd293341485e3a7db7c0fb5a46fb8e73299fe897d8932,2024-08-08T16:24:21.720000 -CVE-2024-6068,0,1,cc716d020d2e1e1c55c1561f0b0ed389125b60a453b13211fd76fbe082b95680,2024-11-15T13:58:08.913000 +CVE-2024-6068,0,0,cc716d020d2e1e1c55c1561f0b0ed389125b60a453b13211fd76fbe082b95680,2024-11-15T13:58:08.913000 CVE-2024-6069,0,0,262b48eb8c330c3b1dd3ca5015bcbc32f226a318c6d31e421e5580f86d9ea37b,2024-07-09T18:19:14.047000 CVE-2024-6070,0,0,1949da6de042279176b79576f8e73bfd6878b90ce3cb716b8378384d024fe5eb,2024-08-01T14:00:09.647000 CVE-2024-6071,0,0,bca2018b96efb2814691d14babc0569e66d271cf9656a7d77f33746825377522,2024-06-28T10:27:00.920000 @@ -267176,6 +267245,7 @@ CVE-2024-6409,0,0,9bcf73b7e73de600a40e8d67921dca9ee633e58d1be7205c1cbcd58e7e7c03 CVE-2024-6410,0,0,9db961a9e1824a35ea4ea0ac1b25800d120aafac2e5d4caf32d46e6051ad19d3,2024-07-11T13:05:54.930000 CVE-2024-6411,0,0,47c8df8c850420fccb0a9ac1089e4a10bdc49d8ecc38cd5ac33a449b2082a491,2024-07-11T13:05:54.930000 CVE-2024-6412,0,0,ac3e0b4dd9dc421ed7bc50bb0eaac729f5a46e72227bdeb5f2fc2db7ccb48399,2024-08-01T18:35:24.697000 +CVE-2024-6413,1,1,b5f68fde45a9f778cbd0fdc1a3ab3968b7f6b50b44c8e25d6d6e5c144950ab51,2024-11-15T16:15:38.573000 CVE-2024-6414,0,0,ae0d661be5f3239fdfe6f0d08030fef27c03212dc1e12675bcf532fd90369002,2024-07-01T12:37:24.220000 CVE-2024-6415,0,0,2d930efbf55d72578aa6f6117194938fd91dbe48efc49659be82131c011d6129,2024-07-01T12:37:24.220000 CVE-2024-6416,0,0,1d3038bca30e2041aec4c6f6e9ac2c7cb38b0b032dbc11dcdc7f3d31ad18d01f,2024-07-01T12:37:24.220000 @@ -267751,7 +267821,7 @@ CVE-2024-7120,0,0,dd88c4d4f5099fe6bbb2fa59d0942931f85db230d235608307fdbb069312e6 CVE-2024-7121,0,0,fdae6687b65374b6aec5500198958517002acfa86b757e82c1fe85c4c568e879,2024-08-08T17:15:19.820000 CVE-2024-7122,0,0,348ac43c4b3841d8ea6bf4cc4c8ca071e08de7e4a4af578e88c361afae480157,2024-09-03T14:41:02.420000 CVE-2024-7123,0,0,9cd56c5d21be01850838f11a2df252558cd6c9b176bc2485ad2b1b549f072ade,2024-08-08T17:15:19.970000 -CVE-2024-7124,0,1,8ca2faed0847a769adbf753e68a561a58b9a2ca49ac6617d2045b7c9b26cef41,2024-11-15T13:58:08.913000 +CVE-2024-7124,0,0,8ca2faed0847a769adbf753e68a561a58b9a2ca49ac6617d2045b7c9b26cef41,2024-11-15T13:58:08.913000 CVE-2024-7125,0,0,eeabb5486a5ad2f2094206d4f0142bb635fc7a57bcd2279354b026b1e44628c1,2024-08-27T13:01:37.913000 CVE-2024-7127,0,0,2842be40cd41bba2687b1d2d238a3a521369bfe05553f868496bd1f3f7f4951f,2024-08-23T14:00:59.740000 CVE-2024-7128,0,0,22b40e3236f05da8de2b73f629340b5796a3b45429dedc50864bf862ccb583f9,2024-07-29T14:12:08.783000 @@ -267986,7 +268056,7 @@ CVE-2024-7398,0,0,4bceec8e4e1ae5d86e69945d7f8f61d9ec5b7ac80a4cf5b22e0ebbed499850 CVE-2024-7399,0,0,94de8cab81b119f815fa73c008811f38562f3609d3da13634aecbd720ea861e6,2024-08-13T15:30:52.337000 CVE-2024-7400,0,0,880bea0e2ff4ceadacbe376968f4ebe20bb468fa58e2ed97aa47316bc459f45c,2024-09-30T12:46:20.237000 CVE-2024-7401,0,0,43ffed7b6ca165f2a0da7944b4e4cef6faa3da0b6dbd419986732fe262f21587,2024-09-05T18:34:17.433000 -CVE-2024-7404,0,1,3de89ee628b5ee024a57e174f6f544c149981b7447dbe414eb2dc5874d61c7d0,2024-11-15T13:58:08.913000 +CVE-2024-7404,0,0,3de89ee628b5ee024a57e174f6f544c149981b7447dbe414eb2dc5874d61c7d0,2024-11-15T13:58:08.913000 CVE-2024-7408,0,0,a5191010d29cd8fd3daea07e74870b9bf130ede8610ab518fb24ce3a11a386f4,2024-08-13T16:06:08.213000 CVE-2024-7409,0,0,a0a6addbe3c2f0cc1db031d3b6ccbc76b45c7e3857a91ea8908f269e71f57171,2024-11-12T17:15:10.833000 CVE-2024-7410,0,0,d4e8b81d7bab3d90baf0746a6fdf1d2e1dd63b1bd2599e20b73bae4467a0729b,2024-08-12T13:41:36.517000 @@ -268264,7 +268334,7 @@ CVE-2024-7725,0,0,0aa115eb5d51c7a8f3b04c61085136493dcca84fb2460c54ba86db4138dcdd CVE-2024-7727,0,0,210da2d03590f7837e73d2a797749f40cf37c3d8121af3fa52cb49298f27dd84,2024-09-18T18:07:55.450000 CVE-2024-7728,0,0,6e291d9f53263e2fb59ac76ca77cbca952de50403aadce3c0e948994f87ca9a9,2024-08-14T13:00:37.107000 CVE-2024-7729,0,0,2bbcc23121d3cbbbfd7b7747e3325c391cd14964f404891acd614a24c4694f71,2024-08-14T13:00:37.107000 -CVE-2024-7730,0,1,a03a177b890b764d3539d9493e7289c45ead33d93263985f4e6c8d5545dac612,2024-11-15T13:58:08.913000 +CVE-2024-7730,0,0,a03a177b890b764d3539d9493e7289c45ead33d93263985f4e6c8d5545dac612,2024-11-15T13:58:08.913000 CVE-2024-7731,0,0,e84a2998e171304858ad1fb8b038e10b362c1589200ef021af448b39d41434b9,2024-08-22T14:40:00.913000 CVE-2024-7732,0,0,301f49d15dd3186d40aa3031630ea252f10589d241790753d1277daa7600dd48,2024-10-03T18:39:20.227000 CVE-2024-7733,0,0,6e2d7bf1ae3b63c8d3634c7048b79cd280171ae70720629e0842a624f33387c9,2024-09-12T16:20:49.503000 @@ -268306,7 +268376,7 @@ CVE-2024-7783,0,0,39c8808c8c931a81ab6f36457422df672bce6f594a7e28cbb717d3fa5f5b7d CVE-2024-7784,0,0,7e942e70a98522ec84a0bbfc9f820ed1b39966f32999b97410584854b83e96dc,2024-11-08T09:15:08.083000 CVE-2024-7785,0,0,a72f8e02860a571fa21aeee74639693caaa851e87622e48dd31b51d79a961437,2024-09-20T12:30:17.483000 CVE-2024-7786,0,0,fc116ee7a384561ad006648b89134c44e9184040e8b317407aecf4e96010cf80,2024-10-07T17:46:08.943000 -CVE-2024-7787,0,1,8c972d8894bd2f09ace4b7d67f4e97757cc2c4ce5fce2ec1a031b9811f9e9802,2024-11-15T13:58:08.913000 +CVE-2024-7787,0,0,8c972d8894bd2f09ace4b7d67f4e97757cc2c4ce5fce2ec1a031b9811f9e9802,2024-11-15T13:58:08.913000 CVE-2024-7788,0,0,70ac00bf2f1b71d3cd198f79846cc3aedcbc03d7b166d0d3297938d6d80c8e0c,2024-09-25T19:56:45.847000 CVE-2024-7790,0,0,456afed422d8355372643bd567f11679217bfde5ad866de9b559c62284a4c756,2024-08-20T19:27:28.757000 CVE-2024-7791,0,0,7416656b44e86a668ddf90bfa89c01f36bde25a07c507963ab58656b2d115a3d,2024-08-27T13:01:37.913000 @@ -268375,6 +268445,7 @@ CVE-2024-7861,0,0,0a909509d97ae1cc7403adef3feb39aabff91c1c695789c3f097cacdbb9f06 CVE-2024-7862,0,0,93a56c5460193ed1b7a3fcd65df3704afa8a5142705928cac67e2d4cbedb7a4c,2024-09-30T14:15:37.093000 CVE-2024-7863,0,0,11d320db6ad42df94b7ce126cd0ba1a84504b8818a402a12b56e92e066aa845a,2024-09-27T21:27:07.640000 CVE-2024-7864,0,0,8cb55f9c6813f7ebb3e411de07404fd2812a548c1112fcc9ece6be38f8f1e98f,2024-09-27T21:26:50.067000 +CVE-2024-7865,1,1,f7c647db6becccf9919112076e8e4feb9a32ead1a81ccabf732c60c97ebe93bd,2024-11-15T16:15:38.630000 CVE-2024-7866,0,0,4c0cb0c858c0ff2de3d3bc9c6187348080bb51d5934bb16167513e626d441be5,2024-08-20T19:23:02.780000 CVE-2024-7867,0,0,cc4e8e2cbae6cc9c2393332b56b3dc1a7160836d4b3b7919e8d1234e73599a3b,2024-08-28T21:59:33.973000 CVE-2024-7868,0,0,c4ea1bb97a13baa8d231995b3d29c0db15f328b428d9b25a1a7a0b4c8b9c1d1a,2024-09-11T12:40:01.817000 @@ -268617,7 +268688,7 @@ CVE-2024-8173,0,0,50ae04f881a2d18920200f91fab2c91cb50ce1f1b838a9340ca053dbaf5dd8 CVE-2024-8174,0,0,8543f0d8f92ea7727c4605df4b165224a3b6d137f11ee710b81d48c311ac7b21,2024-08-27T14:32:08.607000 CVE-2024-8175,0,0,93cd36c03979068837f469bd77e40d2775fae2df59f7cba10d5c6e9b4e387e5b,2024-09-26T13:32:02.803000 CVE-2024-8178,0,0,ba572c1f8157c41d405fb002c7b6f163f2d56dcc78fed52d2bcc31657caf5604,2024-09-06T17:35:20.203000 -CVE-2024-8180,0,1,1ef4988ada0861011caab53fe9c701222028221d2bc6840b7e69f2f294674651,2024-11-15T13:58:08.913000 +CVE-2024-8180,0,0,1ef4988ada0861011caab53fe9c701222028221d2bc6840b7e69f2f294674651,2024-11-15T13:58:08.913000 CVE-2024-8181,0,0,493690832b830d715024bac2c57cbeb9d316626844b43ee44a3d0839b5d01d36,2024-09-06T15:35:07.267000 CVE-2024-8182,0,0,9ca161eed16086dd999c3dcdddb12be07c44a0882f46a0d2167122ca829615b9,2024-08-30T13:53:52.197000 CVE-2024-8184,0,0,92c1db6b8911f83c9668ff411c9a02657286363b11f9f1292cd97f0715f9d11d,2024-11-08T21:00:09.857000 @@ -268975,7 +269046,7 @@ CVE-2024-8643,0,0,65992d3896b37b48df19952ad7033017b9b000296b656714e5a6ab5e9ea7fe CVE-2024-8644,0,0,8daf59c098b2276a29dcd1d73a81642c115f1f83d1a0bcca3d09a68de0fbf0d0,2024-10-04T17:14:20.587000 CVE-2024-8645,0,0,a9ec59eb761dcf7b03b051641e3314ff9102e8e55de30e4e3a512e1bddcece61,2024-09-10T12:09:50.377000 CVE-2024-8646,0,0,80914337a2bd562d2db1f36aec06ad883cb607d6cc039af494590eb0a0b50d8e,2024-09-18T20:20:51.643000 -CVE-2024-8648,0,1,057cf1f99c5c8db25ca2994a3c910a492267630cdc8a4749d522d281110c1092,2024-11-15T13:58:08.913000 +CVE-2024-8648,0,0,057cf1f99c5c8db25ca2994a3c910a492267630cdc8a4749d522d281110c1092,2024-11-15T13:58:08.913000 CVE-2024-8651,0,0,98f15bd48d1c12270cdb328a70de9359f32b42ef85efa713989e765f41ce1150,2024-09-23T17:51:13.050000 CVE-2024-8652,0,0,5d01775755896a4299850c49803f86a9d1b46ea9f2e8832e738f33bf1157fe52,2024-09-23T17:53:49.197000 CVE-2024-8653,0,0,9ff517ad541f0c9badefd1c8205a26f97eafbec49ef5c58c2bc37d53706b328b,2024-09-23T17:55:01.610000 @@ -269177,7 +269248,7 @@ CVE-2024-8956,0,0,1cb756cbfed7cce32103cd61ea4e7225af7cf46acb1dafb383d10ad8a9c01d CVE-2024-8957,0,0,0308f2f5a0567b3e01401fcc5a35dd0d4903c31a6d3992c47cfe16c6bc21eadc,2024-11-05T02:00:01.697000 CVE-2024-8959,0,0,0dc3502ed244ae66bafd80efba15dddd0bb76667e6d8b2d3ee7e3d6fc71e6baf,2024-10-25T12:56:07.750000 CVE-2024-8960,0,0,cb9c3666b1d5630b31aed515dc84bc6b9317ac9454d917c6e7a599d8d75d0609,2024-11-12T13:56:24.513000 -CVE-2024-8961,0,1,ccb434262e501054e5047a0be923bd2bf8f62654dadfc497a5e1d18e49a2e834,2024-11-15T13:58:08.913000 +CVE-2024-8961,0,0,ccb434262e501054e5047a0be923bd2bf8f62654dadfc497a5e1d18e49a2e834,2024-11-15T13:58:08.913000 CVE-2024-8963,0,0,67fe8ea90f3163df4929d6782956d377bcadef461d17352cf475deabaa8fd4ad,2024-09-20T16:32:02.563000 CVE-2024-8964,0,0,c8fc4fc0d8f6e4149ea3cd0239ed4708c78c8d6f77eb0df4938d6649d94bf7d7,2024-10-10T12:56:30.817000 CVE-2024-8965,0,0,fcd9a7faf9aba17ebbc93d83d1389f5891b9c0797caaf85615a1a91da1ce5a78,2024-10-04T19:04:03.157000 @@ -269187,8 +269258,8 @@ CVE-2024-8970,0,0,ac6a340d484c123a9130b7a8da1b91e0090b1836f7865857c5a2324dbb60a4 CVE-2024-8974,0,0,47fcb9de64a47ab7d6fd39981189c5f91c3407e2aae34c6aae2197da9ba195e7,2024-10-04T17:30:18.803000 CVE-2024-8975,0,0,e9dab26a838a0dd237537c2cbdba69bbaa5b6602743bc0ca17e054f95d0f2b70,2024-10-01T19:20:21.103000 CVE-2024-8977,0,0,5252c9de61b84aeddd3ec48f8829f82be03db26645b8f09321099ae149149381,2024-10-16T17:10:13.220000 -CVE-2024-8978,0,1,26772e7e3a33787427107050d9c88eeb4d322de177191a9fc9b0986d407d077c,2024-11-15T13:58:08.913000 -CVE-2024-8979,0,1,6f2aaab4f48ba6288e14c4e1346c583b13992c0dae667d0763d97fce46a58acd,2024-11-15T13:58:08.913000 +CVE-2024-8978,0,0,26772e7e3a33787427107050d9c88eeb4d322de177191a9fc9b0986d407d077c,2024-11-15T13:58:08.913000 +CVE-2024-8979,0,0,6f2aaab4f48ba6288e14c4e1346c583b13992c0dae667d0763d97fce46a58acd,2024-11-15T13:58:08.913000 CVE-2024-8980,0,0,34622dfc36a70206b20752d1026a226663789c42eaaff2958041a445f566dbba,2024-10-30T14:46:14.127000 CVE-2024-8981,0,0,72a5e946545b01f6f5b55bd9be0a66c4964926bf866e85b9f0e826b5c8f5cfe7,2024-10-04T13:51:25.567000 CVE-2024-8983,0,0,a5894726a3c72e301955e62952254bf05f92543b19c3d4bf59f7d30236266e8c,2024-10-10T12:57:21.987000 @@ -269325,7 +269396,7 @@ CVE-2024-9177,0,0,c4277901c0a37ba57d19438c33c0231133f774b6681a96af5a3a31a338af68 CVE-2024-9178,0,0,eca5aa915b955e4e0d7be79d1a2a855f18f7873a33fd6eb6846d12ead9d5fc40,2024-11-08T16:03:26.157000 CVE-2024-9180,0,0,43a25f270cfb7cd861387fae3760598de599a33ae7c6d1aa6e3f1a95d5d03b2a,2024-10-18T20:15:03.393000 CVE-2024-9184,0,0,a3ba82d979bc8561ae674a4ec58c26ce5e04750eca08a1e8b1f42f6ecf9aa161,2024-10-18T12:52:33.507000 -CVE-2024-9186,0,1,9ccb88cb17e2872277ccd8115b7398a92c368331839a2f4636e99d27eb66e4e9,2024-11-15T13:58:08.913000 +CVE-2024-9186,0,0,9ccb88cb17e2872277ccd8115b7398a92c368331839a2f4636e99d27eb66e4e9,2024-11-15T13:58:08.913000 CVE-2024-9187,0,0,ec7d5f1d630d180582cea6b34ef03e6ee8cc268d8686e0a61f71186e80a87f38,2024-10-15T12:57:46.880000 CVE-2024-9189,0,0,589dc859bd1b4dfe4aefe62d286159acb6f430185a125dd81b1568310ee1bb88,2024-10-03T17:26:19.397000 CVE-2024-9191,0,0,ee6dfe1b0c94de0c4973c32fd9b929e1fce6c45c7ed6900711a578d548548d42,2024-11-05T17:06:41.363000 @@ -269435,7 +269506,7 @@ CVE-2024-9351,0,0,33d034faa3e6b0aeb71bafa0ae8b2ea418555ae0b07eef9d890e7c43507fa4 CVE-2024-9352,0,0,788f5bf16f633f8f02e340b198528b062bcda6aeec70a897601eaf656cd6ab6a,2024-10-18T12:52:33.507000 CVE-2024-9353,0,0,64ddffc3239a0d67e3b79e48af9889b2f8d89027aa9c53de3cc5595dbd6f2fd7,2024-10-08T18:50:51.357000 CVE-2024-9355,0,0,302621984b6116aa148a6d267ab2864d150a3fcf399bab5a42fa5db73f8156da,2024-11-05T08:15:04.413000 -CVE-2024-9356,0,1,5ef3a6f6e42eeb70f3f0a3cf86d7f29bc317f9d12d447c962c47d2384419ce59,2024-11-15T13:58:08.913000 +CVE-2024-9356,0,0,5ef3a6f6e42eeb70f3f0a3cf86d7f29bc317f9d12d447c962c47d2384419ce59,2024-11-15T13:58:08.913000 CVE-2024-9357,0,0,ecac5cca1d13ae41e27c64ccd21707ad2b9f6cb13725a3072faecffbc49d78e9,2024-11-12T13:55:21.227000 CVE-2024-9358,0,0,ad1311c8435fb7ce092ff9c8b7c1abe83209465bc92e72b7b733a8ea9fa4bf3c,2024-10-04T13:51:25.567000 CVE-2024-9359,0,0,c3e20cb7feaf9e2d5c48c39f4d484e16226f28d5df197104e70b6a5f0b84dc00,2024-10-04T18:54:12.417000 @@ -269478,7 +269549,7 @@ CVE-2024-9409,0,0,bd26a6d58a7fb40d2ba0ec55a264bb1d6254e13220d49c2ad9283b1761c05c CVE-2024-9410,0,0,f1caeb057101bc11b923104c4939c2a18b358804c54a293851a2bbe945ca8cb5,2024-10-07T17:48:28.117000 CVE-2024-9411,0,0,09446adc9a52ba88acfc951352e9088b24cfd1cdb8a001643ee070875c43ffef,2024-10-04T13:51:25.567000 CVE-2024-9412,0,0,aa9a3d3cdb3659b02012ef158f2f0c675ff0de511272afae470c48f556502feb,2024-10-10T12:51:56.987000 -CVE-2024-9413,0,1,43902701acbdeb851a55b1b248691b229ddabb1616e4335f2a201d49d639f4ae,2024-11-15T14:00:09.720000 +CVE-2024-9413,0,0,43902701acbdeb851a55b1b248691b229ddabb1616e4335f2a201d49d639f4ae,2024-11-15T14:00:09.720000 CVE-2024-9414,0,0,5c21f14ec376abe57dfce5e862247c317429afdd9c8e1a9c0b90f9672b7f519b,2024-10-18T12:52:33.507000 CVE-2024-9417,0,0,c74a648d5508a7a2c2d3e505619e54040658d58791e6150e9a0fe8cbf972b416,2024-10-07T17:48:28.117000 CVE-2024-9419,0,0,a3f1d241a393213976f2495a35f5bc1427a284fa16c4a0b19d1f7c056beff495,2024-11-01T12:57:03.417000 @@ -269511,24 +269582,24 @@ CVE-2024-9460,0,0,d6ff22c922d7573d861145a9f9c7a3aa2a44b6806bef76282f2615732b0247 CVE-2024-9462,0,0,da874134bd4c6d4628ad3a17d1671b7f5c2018935fed477a57fc0d0990ff5d0e,2024-10-28T13:58:09.230000 CVE-2024-9463,0,0,4113bfcc0359b86f4600f4bd332ad0fb25180b65c5beb0ba03a5a18a0d79965c,2024-11-15T02:00:01.687000 CVE-2024-9464,0,0,2a950a39fbd8d03d9c46c09cf06c881d311182236743fa872a3d09d866901a80,2024-10-17T06:15:04.190000 -CVE-2024-9465,0,1,064f36dfd96356716729204db567e10570633c1061deec4eb5c398055c531edf,2024-11-15T14:39:34.863000 +CVE-2024-9465,0,0,064f36dfd96356716729204db567e10570633c1061deec4eb5c398055c531edf,2024-11-15T14:39:34.863000 CVE-2024-9466,0,0,fd9458b730d3a9a669f2d9d658488af28ef360506c84b0ff287be2e6f400846d,2024-10-17T06:15:04.720000 CVE-2024-9467,0,0,75d04ab03e69b7f9e1a38d891f6aaa266a750bf286ffd9f476545cea603cc1a5,2024-10-15T15:09:13.297000 CVE-2024-9468,0,0,f7accbeda6900e100e8aad354b4e5585f782571ee82a35557f7f3b3ab3e92447,2024-10-10T12:51:56.987000 CVE-2024-9469,0,0,bfacd6ae0e951d4d0f806b219fe22ea394e7dcfb5460f334dffa6ddb0a7e18c6,2024-10-15T18:38:25.647000 CVE-2024-9470,0,0,13c3a583553fbf2e90723a5a0ed6f2354808c5a1753993b658aba04d0ed9b282,2024-10-10T12:51:56.987000 CVE-2024-9471,0,0,2517c360d1e41d9c7ea79e15df7f34465e8f98b985f9011876ffa34a1656df21,2024-10-15T16:55:45.090000 -CVE-2024-9472,0,1,6dc75bb8c902376e1f062a26c7a99982f272de37330a03e0fbfe9796bed76fac,2024-11-15T13:58:08.913000 +CVE-2024-9472,0,0,6dc75bb8c902376e1f062a26c7a99982f272de37330a03e0fbfe9796bed76fac,2024-11-15T13:58:08.913000 CVE-2024-9473,0,0,2610a860a1ec132e11b499793a273ee08374ba46887944874ff47b7b5fdd4588,2024-10-17T06:15:04.983000 CVE-2024-9475,0,0,273622ecfea8dd0cb8d3a034084a5946e50b2bee83443e844bae24857067e968,2024-10-28T13:58:09.230000 -CVE-2024-9476,0,1,e9d7dbd43229ebc9ea9972271d753666a58d144ea232688064d92b4b52fc9277,2024-11-15T14:00:09.720000 +CVE-2024-9476,0,0,e9d7dbd43229ebc9ea9972271d753666a58d144ea232688064d92b4b52fc9277,2024-11-15T14:00:09.720000 CVE-2024-9477,0,0,d96fc519f7a9945d386fdd8950ef88a71881f191581b1624fa0de9c4a83d5a52,2024-11-13T17:01:16.850000 CVE-2024-9481,0,0,00fc2967ba19d907f5a39395cc30079db3ef641b613179e4b9951bd38c8d6817,2024-11-08T20:49:03.597000 CVE-2024-9482,0,0,761865a3338cb95ad6952db46fced2e0b200e6722c7208c63ea4447e2930458e,2024-11-08T20:49:58.077000 CVE-2024-9483,0,0,ad5fedd0cd72fbc18365b7b114267513d576cf1b98379267d7018d384a26ba96,2024-11-08T20:54:30.980000 CVE-2024-9484,0,0,86ad5ee84c3c6fb7cf3b149fe0f453f5a54885e17fbe04bacb6644367538b071,2024-11-08T20:55:14.283000 CVE-2024-9486,0,0,69b6721a825ab2624e7f19326bb9e1625f15ea4093ed6bc68f868f6a5c393d51,2024-11-08T20:56:54.807000 -CVE-2024-9487,0,0,e3a385658c66fc500363f16f3c27f6fce25e7b265fffe42414ebb85b7cd7e9a7,2024-10-15T12:58:51.050000 +CVE-2024-9487,0,1,8c0f797a1267751cd655e097cc4e72301937e39ee2b0b43119e44c1b6d6e9879,2024-11-15T16:57:10.080000 CVE-2024-9488,0,0,7160e6226507ff679fbcba733953e2a0c67fe3c2a8e1dee05991bd941a40e8b2,2024-11-06T14:57:04.457000 CVE-2024-9489,0,0,da9917eda81b5ad40f78c98d3cdcfaa2ce360118ba030bb2ddb2e149e55b8a8e,2024-11-01T16:27:25.937000 CVE-2024-9501,0,0,d7be73289096f59e8614142ae5f23da8d3cd042d0cbe3c76d9c725d64a67b604,2024-10-28T13:58:09.230000 @@ -269544,7 +269615,7 @@ CVE-2024-9520,0,0,043b00f2bf4932488b29ee05bd55762d90704159cb97bf4c710160da6d1296 CVE-2024-9521,0,0,09a594ea849fc5009e458f6cc46742d3176f440810ef4457104bfe2103f1d0c7,2024-10-16T16:38:14.557000 CVE-2024-9522,0,0,884c9004d667a145fae3b3526c4cb56c9d9a1365bd2a57b2af580c0e3b9c19a1,2024-10-15T14:27:41.553000 CVE-2024-9528,0,0,ad76266403ba94311c1f58d7258b765d914c39ddcd1148706c2e05f82ca92e87,2024-10-07T17:48:28.117000 -CVE-2024-9529,0,1,1f833eccd2da22522c8143845fa5e36426abfe1c8d1327010d0bf6c2b380e515,2024-11-15T13:58:08.913000 +CVE-2024-9529,0,0,1f833eccd2da22522c8143845fa5e36426abfe1c8d1327010d0bf6c2b380e515,2024-11-15T13:58:08.913000 CVE-2024-9530,0,0,a4f4ec0ca4c538513c522bc25437bdee95aa200ea2c8ddaeaa2d301c3f668205,2024-10-25T18:52:10.810000 CVE-2024-9531,0,0,2d32cff16aa07ef9767a12c3b335b7a483cb4a13b1ba87080414d4508df82841,2024-10-25T12:56:07.750000 CVE-2024-9532,0,0,b7f2aba05edad35ecf41f43ec9640effe332d3189a3ed38d97f2bf49866ac50d,2024-10-09T11:18:49.027000 @@ -269610,7 +269681,7 @@ CVE-2024-9598,0,0,dd6abd1d8094ef836910b53aefec035745da73e794770d7e620055613b3335 CVE-2024-9602,0,0,296483daa0f02222bb5f79446d51c7890118dbb294ec1c3853abb9b3dfc7ffb2,2024-10-10T12:51:56.987000 CVE-2024-9603,0,0,f06afeee14d2c3a95b2fa9bd06bec0b0c1ce9ce3a2d2cc5d2614c0b7bfd8287c,2024-10-10T12:51:56.987000 CVE-2024-9607,0,0,6559a4c9ecc679c1a526ad316820d8ef58b184c710c286477d0fc3422e598c6b,2024-11-05T17:40:57.777000 -CVE-2024-9609,0,1,c1484c5c48af634e8a1e9ca2c1221b2473ae9ec782fb8f61ec7661582d6a362d,2024-11-15T13:58:08.913000 +CVE-2024-9609,0,0,c1484c5c48af634e8a1e9ca2c1221b2473ae9ec782fb8f61ec7661582d6a362d,2024-11-15T13:58:08.913000 CVE-2024-9610,0,0,c2ae8ad13a32a2ecc4cf7a3cb852077ce2d6eff8b7bb2625c3e46911eeeead24,2024-10-15T12:58:51.050000 CVE-2024-9611,0,0,f16a109b2beda9ef97e16997885b40d38db6eba42b8291e32288f7a269b19f0c,2024-10-15T12:58:51.050000 CVE-2024-9613,0,0,03f12b76d11ccd814de04879dc193f94fb86a0d3aade1fad8084c29f467aedb8,2024-10-28T13:58:09.230000 @@ -269626,7 +269697,7 @@ CVE-2024-9628,0,0,61a27472b9da741357728e2747c61581a42641370f854cfe14defa2dd6861d CVE-2024-9629,0,0,31c72e7d62d8dbf8ba1681676a61a2f04680ade1749c367b775242f4864b6d17,2024-10-29T14:34:50.257000 CVE-2024-9630,0,0,95cf42fc9d833aab63558caaeb38c94fd9570f2d1a1e45300ec7feb07db9cd04,2024-10-25T12:56:07.750000 CVE-2024-9632,0,0,c06a5ac998e148649dc6c5dee5c57116c25a0e87e4991e75c7be58f6925baae3,2024-11-13T20:15:17.487000 -CVE-2024-9633,0,1,e5fbee35063cb2b5bb72c098df6afb2f3f6d152341b6d3ba5eca4eaf82f8969c,2024-11-15T13:58:08.913000 +CVE-2024-9633,0,0,e5fbee35063cb2b5bb72c098df6afb2f3f6d152341b6d3ba5eca4eaf82f8969c,2024-11-15T13:58:08.913000 CVE-2024-9634,0,0,d64c376a2cd176bba19f7a8121026bf8ac88c7cb95243ab4e56bfc5d5fa1c1d3,2024-10-16T16:38:14.557000 CVE-2024-9637,0,0,bfd23401e1c5bf70ae99ee491fd04ce8ab223b8247ed87e78ca84ed9446a1b72,2024-10-28T13:58:09.230000 CVE-2024-9642,0,0,647a46d1d1e49bfca6a77d0bd6bf95c53250c168d1d2756cdcd405ced420913f,2024-10-28T13:58:09.230000 @@ -269654,7 +269725,7 @@ CVE-2024-9686,0,0,8a91e1ae5070fa70337820c934475166fa3e061411ab7464abf260ed961a06 CVE-2024-9687,0,0,ae8c4791dae243694c67044fa0088a221548cce6d43bc08144a537d590a79ff2,2024-10-17T21:11:14.197000 CVE-2024-9689,0,0,8f8c579186810d2b61eae71f3a64a7543fcf1895acd4679afad8157c388bec86,2024-11-07T20:35:16.807000 CVE-2024-9692,0,0,6637a78c6a5a322d069f0f0384d674a49925fbfbbf719ba95a3af042d35fdc19,2024-10-25T12:56:07.750000 -CVE-2024-9693,0,1,d3ce3af0a6d80dbc98dd50b33c81a1344c9e31c2a5be66350b63da26f2e128f6,2024-11-15T13:58:08.913000 +CVE-2024-9693,0,0,d3ce3af0a6d80dbc98dd50b33c81a1344c9e31c2a5be66350b63da26f2e128f6,2024-11-15T13:58:08.913000 CVE-2024-9696,0,0,78e7cb06b620e1544d9c6811ae0c44cf981cc195d0067b351c711666292c356e,2024-10-15T12:57:46.880000 CVE-2024-9700,0,0,ee544a9b692e7ab9f9ab56395ca8011eb3604c34474b906ade007707a048f142,2024-11-01T12:57:03.417000 CVE-2024-9703,0,0,dd5db55cccdddcc3b58f6b494a8ef777447f72688cd0a2c60dac8e42fee7b6a9,2024-10-22T15:25:27.887000 @@ -269703,15 +269774,15 @@ CVE-2024-9817,0,0,f8de20e1a75881ef54f60bc313d87d714ab8deb93b0bb597962b93099db146 CVE-2024-9818,0,0,27036e755744f27c38d726a43ad1c9df4e3ef69bf87c77f10cf90295a9b03eec,2024-10-17T18:13:37.347000 CVE-2024-9820,0,0,c625b59d383479a78d36c1a053a231b239e4eac8d7ff5924cc83c93a44968c73,2024-10-19T00:44:10.420000 CVE-2024-9821,0,0,847982287e8db8d54661c5522d18fa833c3d9091b2ddb2afe78ab1e8077a47cb,2024-10-15T12:57:46.880000 -CVE-2024-9822,0,0,3245ced109c1c371c55834b9b14d881a9e8b7fd7c32c19b6e9a742506d7d4c79,2024-10-15T12:58:51.050000 +CVE-2024-9822,0,1,82e3d945f4509fe65e88458324aa86a5fabdddc602a0f9734fd3049d36a53ed7,2024-11-15T16:41:41.507000 CVE-2024-9823,0,0,9bd58749a01179ea21ca36b4d37feb833f368418a0a0359d3cad87b853574111,2024-10-15T12:57:46.880000 CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca424894a,2024-10-15T12:57:46.880000 CVE-2024-9825,0,0,43f77069eab20c6659796a5ca73cb04eb18b719fa0ad0721704c789de713790a,2024-10-29T14:34:50.257000 CVE-2024-9826,0,0,c03e2e0710a5712915ae2341fa5030e5bd74d5917743f7fdf85c043b115b921d,2024-11-01T16:17:10.620000 CVE-2024-9827,0,0,c5e7676b9d011eef0934f8d1e51cd92697f77495088547784042162cb4944824,2024-11-01T16:17:07.187000 CVE-2024-9829,0,0,ea980a1e481fc86407edeb6f0040d6f4a6ff2d17edcbe8d18dd95381292ad49b,2024-10-25T16:30:44.520000 -CVE-2024-9832,0,1,f83569141ad467d0d58d6d102fc2c3d41921b26196f3d65ebeb4a5f0b165400e,2024-11-15T13:58:08.913000 -CVE-2024-9834,0,1,58a96ed6d2e0276f3eaa10de898ae35fd311ab0f6605b68b83724fedae743534,2024-11-15T13:58:08.913000 +CVE-2024-9832,0,0,f83569141ad467d0d58d6d102fc2c3d41921b26196f3d65ebeb4a5f0b165400e,2024-11-15T13:58:08.913000 +CVE-2024-9834,0,0,58a96ed6d2e0276f3eaa10de898ae35fd311ab0f6605b68b83724fedae743534,2024-11-15T13:58:08.913000 CVE-2024-9835,0,0,ca18e7b41fab9b483950f5f59199903f1b661b24923c7a18a4c44cf7bcb08f14,2024-11-12T15:35:17.853000 CVE-2024-9836,0,0,5d120048cea246a15edceb1ecc1c13de92be1dc1c21567e1e478f7428ef25fec,2024-11-12T15:35:18.093000 CVE-2024-9837,0,0,bb8fbc31e530027dfddbaf6dae2f5d1b4333d91b7cafcea32a3d82a1ea54dea9,2024-10-15T12:57:46.880000