diff --git a/CVE-2023/CVE-2023-341xx/CVE-2023-34188.json b/CVE-2023/CVE-2023-341xx/CVE-2023-34188.json index b29918c31c0..39644da2656 100644 --- a/CVE-2023/CVE-2023-341xx/CVE-2023-34188.json +++ b/CVE-2023/CVE-2023-341xx/CVE-2023-34188.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34188", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-23T20:15:09.053", - "lastModified": "2023-09-06T17:15:50.190", + "lastModified": "2024-12-02T15:15:08.200", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -19,6 +19,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -26,9 +28,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 7.5, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 3.6 @@ -45,6 +45,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] } ], "configurations": [ @@ -90,6 +100,31 @@ "tags": [ "Patch" ] + }, + { + "url": "https://blog.narfindustries.com/blog/narf-discovers-critical-vulnerabilities-in-cesanta-mongoose-http-server", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/cesanta/mongoose/commit/4663090a8fb036146dfe77718cff612b0101cb0f", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] + }, + { + "url": "https://github.com/cesanta/mongoose/compare/7.9...7.10", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] + }, + { + "url": "https://github.com/cesanta/mongoose/pull/2197", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10905.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10905.json new file mode 100644 index 00000000000..fdf3683f4f9 --- /dev/null +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10905.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-10905", + "sourceIdentifier": "psirt@sailpoint.com", + "published": "2024-12-02T15:15:10.240", + "lastModified": "2024-12-02T15:15:10.240", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IdentityIQ 8.4 and all 8.4 patch levels prior to 8.4p2, IdentityIQ 8.3 and all 8.3 patch levels prior to 8.3p5, IdentityIQ 8.2 and all 8.2 patch levels prior to 8.2p8, and all prior versions\u00a0allows HTTP access to\u00a0static content in the IdentityIQ application directory that should be protected." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@sailpoint.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@sailpoint.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-66" + } + ] + } + ], + "references": [ + { + "url": "https://www.sailpoint.com/security-advisories/", + "source": "psirt@sailpoint.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11051.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11051.json index 7d3d523ba09..17dd5708371 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11051.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11051.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11051", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-10T08:15:03.380", - "lastModified": "2024-11-12T13:56:24.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T15:14:56.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -23,6 +23,8 @@ "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", @@ -54,9 +56,7 @@ "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", - "providerUrgency": "NOT_DEFINED", - "baseScore": 5.3, - "baseSeverity": "MEDIUM" + "providerUrgency": "NOT_DEFINED" } } ], @@ -67,6 +67,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -74,12 +76,30 @@ "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "LOW", - "baseScore": 6.3, - "baseSeverity": "MEDIUM" + "availabilityImpact": "LOW" }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -89,13 +109,13 @@ "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", - "availabilityImpact": "PARTIAL", - "baseScore": 6.5 + "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,24 +142,65 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amttgroup:hotel_broadband_operating_system:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.0.3.151204", + "matchCriteriaId": "E11A62D3-13B4-4C96-A6D1-18FD37B50BF6" + } + ] + } + ] } ], "references": [ { "url": "https://vuldb.com/?ctiid.283794", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.283794", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.432691", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wiki.shikangsi.com/post/share/ab8e6804-5c8e-442b-8a37-c6b376bcc86f", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11700.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11700.json index 5a74076b300..741e99718a7 100644 --- a/CVE-2024/CVE-2024-117xx/CVE-2024-11700.json +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11700.json @@ -2,13 +2,13 @@ "id": "CVE-2024-11700", "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:19.523", - "lastModified": "2024-11-27T16:15:13.300", - "vulnStatus": "Received", + "lastModified": "2024-12-02T15:15:10.557", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Malicious websites may have been able to user intent confirmation through tapjacking. This could have led to users unknowingly approving the launch of external applications, potentially exposing them to underlying vulnerabilities. This vulnerability affects Firefox < 133 and Thunderbird < 133." + "value": "Malicious websites may have been able to perform user intent confirmation through tapjacking. This could have led to users unknowingly approving the launch of external applications, potentially exposing them to underlying vulnerabilities. This vulnerability affects Firefox < 133 and Thunderbird < 133." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20130.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20130.json index 1b763169e7b..ef87cfe4a2e 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20130.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20130.json @@ -2,16 +2,43 @@ "id": "CVE-2024-20130", "sourceIdentifier": "security@mediatek.com", "published": "2024-12-02T04:15:05.190", - "lastModified": "2024-12-02T04:15:05.190", - "vulnStatus": "Received", + "lastModified": "2024-12-02T16:15:07.200", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In power, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09193374; Issue ID: MSV-1982." + }, + { + "lang": "es", + "value": "En el estado de encendido, es posible que se produzca una escritura fuera de los l\u00edmites debido a la falta de una comprobaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los privilegios de ejecuci\u00f3n del sistema. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09193374; ID de problema: MSV-1982." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20131.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20131.json index 33635bd4114..5b9cccd54b0 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20131.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20131.json @@ -2,16 +2,43 @@ "id": "CVE-2024-20131", "sourceIdentifier": "security@mediatek.com", "published": "2024-12-02T04:15:05.337", - "lastModified": "2024-12-02T04:15:05.337", - "vulnStatus": "Received", + "lastModified": "2024-12-02T16:15:07.387", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Modem, there is a possible escalation of privilege due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01395886; Issue ID: MSV-1873." + }, + { + "lang": "es", + "value": "En el m\u00f3dem, existe una posible escalada de privilegios debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los privilegios de ejecuci\u00f3n del sistema. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: MOLY01395886; ID de problema: MSV-1873." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20132.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20132.json index 4dfaddd334e..dfb6e8a4ed1 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20132.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20132.json @@ -2,16 +2,43 @@ "id": "CVE-2024-20132", "sourceIdentifier": "security@mediatek.com", "published": "2024-12-02T04:15:05.460", - "lastModified": "2024-12-02T04:15:05.460", - "vulnStatus": "Received", + "lastModified": "2024-12-02T16:15:07.557", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Modem, there is a possible out of bonds write due to a mission bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY00957388; Issue ID: MSV-1872." + }, + { + "lang": "es", + "value": "En Modem, existe la posibilidad de una escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites de misi\u00f3n. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: MOLY00957388; ID de problema: MSV-1872." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20133.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20133.json index bea505f9979..e3c307d41ab 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20133.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20133.json @@ -2,16 +2,43 @@ "id": "CVE-2024-20133", "sourceIdentifier": "security@mediatek.com", "published": "2024-12-02T04:15:05.567", - "lastModified": "2024-12-02T04:15:05.567", - "vulnStatus": "Received", + "lastModified": "2024-12-02T16:15:07.737", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Modem, there is a possible escalation of privilege due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: MOLY01395886; Issue ID: MSV-1871." + }, + { + "lang": "es", + "value": "En el m\u00f3dem, existe una posible escalada de privilegios debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los privilegios de ejecuci\u00f3n del sistema. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: MOLY01395886; ID de problema: MSV-1871." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20134.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20134.json index 0f7944af551..020707f126e 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20134.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20134.json @@ -2,16 +2,43 @@ "id": "CVE-2024-20134", "sourceIdentifier": "security@mediatek.com", "published": "2024-12-02T04:15:05.693", - "lastModified": "2024-12-02T04:15:05.693", - "vulnStatus": "Received", + "lastModified": "2024-12-02T16:15:07.907", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In ril, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09154589; Issue ID: MSV-1866." + }, + { + "lang": "es", + "value": "En RIL, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los privilegios de ejecuci\u00f3n del sistema. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09154589; ID de problema: MSV-1866." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20135.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20135.json index f1affbdaa55..8e9894d9e9f 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20135.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20135.json @@ -2,16 +2,43 @@ "id": "CVE-2024-20135", "sourceIdentifier": "security@mediatek.com", "published": "2024-12-02T04:15:05.797", - "lastModified": "2024-12-02T04:15:05.797", - "vulnStatus": "Received", + "lastModified": "2024-12-02T16:15:08.097", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In soundtrigger, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09142526; Issue ID: MSV-1841." + }, + { + "lang": "es", + "value": "En Soundtrigger, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los privilegios de ejecuci\u00f3n del sistema. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09142526; ID de problema: MSV-1841." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20136.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20136.json index 42e5278f810..674e97023ab 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20136.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20136.json @@ -2,16 +2,43 @@ "id": "CVE-2024-20136", "sourceIdentifier": "security@mediatek.com", "published": "2024-12-02T04:15:05.920", - "lastModified": "2024-12-02T04:15:05.920", - "vulnStatus": "Received", + "lastModified": "2024-12-02T16:15:08.260", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In da, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09121847; Issue ID: MSV-1821." + }, + { + "lang": "es", + "value": "En da, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09121847; ID de problema: MSV-1821." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20137.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20137.json index ec153596a1d..1e59e08a96f 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20137.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20137.json @@ -2,16 +2,43 @@ "id": "CVE-2024-20137", "sourceIdentifier": "security@mediatek.com", "published": "2024-12-02T04:15:06.030", - "lastModified": "2024-12-02T04:15:06.030", - "vulnStatus": "Received", + "lastModified": "2024-12-02T16:15:08.433", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In wlan driver, there is a possible client disconnection due to improper handling of exceptional conditions. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: WCNCR00384543; Issue ID: MSV-1727." + }, + { + "lang": "es", + "value": "En el controlador WLAN, existe una posible desconexi\u00f3n del cliente debido al manejo inadecuado de condiciones excepcionales. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: WCNCR00384543; ID de problema: MSV-1727." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20138.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20138.json index fc041e368ca..8e11cb3a046 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20138.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20138.json @@ -2,16 +2,43 @@ "id": "CVE-2024-20138", "sourceIdentifier": "security@mediatek.com", "published": "2024-12-02T04:15:06.133", - "lastModified": "2024-12-02T04:15:06.133", - "vulnStatus": "Received", + "lastModified": "2024-12-02T16:15:08.603", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In wlan driver, there is a possible out of bound read due to improper input validation. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08998291; Issue ID: MSV-1604." + }, + { + "lang": "es", + "value": "En el controlador WLAN, existe una posible lectura fuera de los l\u00edmites debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS08998291; ID de problema: MSV-1604." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-201xx/CVE-2024-20139.json b/CVE-2024/CVE-2024-201xx/CVE-2024-20139.json index 3d9c45cc4fe..ca756619d65 100644 --- a/CVE-2024/CVE-2024-201xx/CVE-2024-20139.json +++ b/CVE-2024/CVE-2024-201xx/CVE-2024-20139.json @@ -2,16 +2,43 @@ "id": "CVE-2024-20139", "sourceIdentifier": "security@mediatek.com", "published": "2024-12-02T04:15:06.247", - "lastModified": "2024-12-02T04:15:06.247", - "vulnStatus": "Received", + "lastModified": "2024-12-02T16:15:08.770", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Bluetooth firmware, there is a possible firmware asssert due to improper handling of exceptional conditions. This could lead to local denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09001270; Issue ID: MSV-1600." + }, + { + "lang": "es", + "value": "En el firmware de Bluetooth, existe una posible confirmaci\u00f3n de firmware debido al manejo inadecuado de condiciones excepcionales. Esto podr\u00eda provocar una denegaci\u00f3n de servicio local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09001270; ID de problema: MSV-1600." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21723.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21723.json index 2ed7ca6eb10..13d25167dc1 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21723.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21723.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21723", "sourceIdentifier": "security@joomla.org", "published": "2024-02-29T01:44:03.707", - "lastModified": "2024-02-29T13:49:29.390", + "lastModified": "2024-12-02T16:15:08.967", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un an\u00e1lisis inadecuado de las URL podr\u00eda dar lugar a una redirecci\u00f3n abierta." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ { "source": "security@joomla.org", @@ -32,6 +55,10 @@ { "url": "https://developer.joomla.org/security-centre/926-20240202-core-open-redirect-in-installation-application.html", "source": "security@joomla.org" + }, + { + "url": "https://developer.joomla.org/security-centre/926-20240202-core-open-redirect-in-installation-application.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-296xx/CVE-2024-29645.json b/CVE-2024/CVE-2024-296xx/CVE-2024-29645.json new file mode 100644 index 00000000000..8af6156863d --- /dev/null +++ b/CVE-2024/CVE-2024-296xx/CVE-2024-29645.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-29645", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-02T15:15:10.960", + "lastModified": "2024-12-02T15:15:10.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Buffer Overflow vulnerability in radarorg radare2 v.5.8.8 allows an attacker to execute arbitrary code via the parse_die function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Crispy-fried-chicken/83f0f5e8a475284d64bf99fb342e9027", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/radareorg/radare2/commit/72bf3a486fa851797aa21887a40ba0e3d3a6d620", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/radareorg/radare2/pull/22561", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31669.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31669.json new file mode 100644 index 00000000000..9b48f9e6c64 --- /dev/null +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31669.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-31669", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-02T15:15:11.113", + "lastModified": "2024-12-02T15:15:11.113", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "rizin before Release v0.6.3 is vulnerable to Uncontrolled Resource Consumption via bin_pe_parse_imports, Pe_r_bin_pe_parse_var, and estimate_slide." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Crispy-fried-chicken/fb9f7000f0517a085483f7f2a60f0f08", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/rizinorg/rizin/commit/e42999dda0be7737fafaf5e63c1c5833a72fd9c9", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38827.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38827.json new file mode 100644 index 00000000000..8b7c261792a --- /dev/null +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38827.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38827", + "sourceIdentifier": "security@vmware.com", + "published": "2024-12-02T15:15:11.270", + "lastModified": "2024-12-02T15:15:11.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The usage of String.toLowerCase()\u00a0and String.toUpperCase()\u00a0has some Locale\u00a0dependent exceptions that could potentially result in authorization rules not working properly." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://spring.io/security/cve-2024-38827", + "source": "security@vmware.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45520.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45520.json index f42e22238da..ef3e0e810f5 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45520.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45520.json @@ -2,16 +2,55 @@ "id": "CVE-2024-45520", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-01T21:15:04.190", - "lastModified": "2024-12-01T21:15:04.190", - "vulnStatus": "Received", + "lastModified": "2024-12-02T16:15:11.293", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "WithSecure Atlant (formerly F-Secure Atlant) 1.0.35-1 allows a remote Denial of Service because of memory corruption during scanning of a PE32 file." + }, + { + "lang": "es", + "value": "WithSecure Atlant (anteriormente F-Secure Atlant) 1.0.35-1 permite una denegaci\u00f3n de servicio remota debido a la corrupci\u00f3n de memoria durante el escaneo de un archivo PE32." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://withsecure.com", diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46905.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46905.json new file mode 100644 index 00000000000..a5b45ef410d --- /dev/null +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46905.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-46905", + "sourceIdentifier": "security@progress.com", + "published": "2024-12-02T15:15:11.443", + "lastModified": "2024-12-02T15:15:11.443", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In WhatsUp Gold versions released before 2024.0.1, a SQL Injection vulnerability allows an authenticated lower-privileged user (at least Network Manager permissions required) to achieve privilege escalation to the admin account." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-September-2024", + "source": "security@progress.com" + }, + { + "url": "https://docs.progress.com/bundle/whatsupgold-release-notes-24-0/page/WhatsUp-Gold-2024.0-Release-Notes.html", + "source": "security@progress.com" + }, + { + "url": "https://www.progress.com/network-monitoring", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46906.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46906.json new file mode 100644 index 00000000000..d3529a8a22c --- /dev/null +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46906.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-46906", + "sourceIdentifier": "security@progress.com", + "published": "2024-12-02T15:15:11.633", + "lastModified": "2024-12-02T15:15:11.633", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In WhatsUp Gold versions released before 2024.0.1, a SQL Injection vulnerability allows an authenticated low-privileged user (at least Report Viewer permissions required) to achieve privilege escalation to the admin account." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-September-2024", + "source": "security@progress.com" + }, + { + "url": "https://docs.progress.com/bundle/whatsupgold-release-notes-24-0/page/WhatsUp-Gold-2024.0-Release-Notes.html", + "source": "security@progress.com" + }, + { + "url": "https://www.progress.com/network-monitoring", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46907.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46907.json new file mode 100644 index 00000000000..6ef48062d7d --- /dev/null +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46907.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-46907", + "sourceIdentifier": "security@progress.com", + "published": "2024-12-02T15:15:11.793", + "lastModified": "2024-12-02T15:15:11.793", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In WhatsUp Gold versions released before 2024.0.1, a SQL Injection vulnerability allows an authenticated low-privileged user (at least Report Viewer permissions required) to achieve privilege escalation to the admin account." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-September-2024", + "source": "security@progress.com" + }, + { + "url": "https://docs.progress.com/bundle/whatsupgold-release-notes-24-0/page/WhatsUp-Gold-2024.0-Release-Notes.html", + "source": "security@progress.com" + }, + { + "url": "https://www.progress.com/network-monitoring", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46908.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46908.json new file mode 100644 index 00000000000..c77225aab06 --- /dev/null +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46908.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-46908", + "sourceIdentifier": "security@progress.com", + "published": "2024-12-02T15:15:11.967", + "lastModified": "2024-12-02T15:15:11.967", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In WhatsUp Gold versions released before 2024.0.1, a SQL Injection vulnerability allows an authenticated low-privileged user (at least Report Viewer permissions required)\n\n to achieve privilege escalation to the admin account." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-September-2024", + "source": "security@progress.com" + }, + { + "url": "https://docs.progress.com/bundle/whatsupgold-release-notes-24-0/page/WhatsUp-Gold-2024.0-Release-Notes.html", + "source": "security@progress.com" + }, + { + "url": "https://www.progress.com/network-monitoring", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46909.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46909.json new file mode 100644 index 00000000000..9b30dec6dbc --- /dev/null +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46909.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2024-46909", + "sourceIdentifier": "security@progress.com", + "published": "2024-12-02T15:15:12.120", + "lastModified": "2024-12-02T15:15:12.120", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In WhatsUp Gold versions released before 2024.0.1, a\u00a0remote unauthenticated attacker could leverage this vulnerability to execute code in the context of the service account." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-16" + }, + { + "lang": "en", + "value": "CWE-22" + }, + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-September-2024", + "source": "security@progress.com" + }, + { + "url": "https://docs.progress.com/bundle/whatsupgold-release-notes-24-0/page/WhatsUp-Gold-2024.0-Release-Notes.html", + "source": "security@progress.com" + }, + { + "url": "https://www.progress.com/network-monitoring", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-527xx/CVE-2024-52732.json b/CVE-2024/CVE-2024-527xx/CVE-2024-52732.json new file mode 100644 index 00000000000..923f65af79f --- /dev/null +++ b/CVE-2024/CVE-2024-527xx/CVE-2024-52732.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-52732", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-02T15:15:12.270", + "lastModified": "2024-12-02T15:15:12.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect access control in wms-Warehouse management system-zeqp v2.20.9.1 due to the token value of the zeqp system being reused." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/LINF2009/fe2f0681389d4521d236a34ec2109a24", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/dotNetTreasury/WMS/blob/master/README.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/dotNetTreasury/WMS/tree/master/src", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-534xx/CVE-2024-53459.json b/CVE-2024/CVE-2024-534xx/CVE-2024-53459.json new file mode 100644 index 00000000000..e46574b0e09 --- /dev/null +++ b/CVE-2024/CVE-2024-534xx/CVE-2024-53459.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-53459", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-02T16:15:12.637", + "lastModified": "2024-12-02T16:15:12.637", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sysax Multi Server 6.99 is vulnerable to Cross Site Scripting (XSS) via the /scgi?sid parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstormsecurity.com/files/182467/Sysax-Multi-Server-6.99-Cross-Site-Scripting.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53862.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53862.json new file mode 100644 index 00000000000..f063bb93850 --- /dev/null +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53862.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-53862", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-02T16:15:14.277", + "lastModified": "2024-12-02T16:15:14.277", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. When using `--auth-mode=client`, Archived Workflows can be retrieved with a fake or spoofed token via the GET Workflow endpoint: `/api/v1/workflows/{namespace}/{name}` or when using `--auth-mode=sso`, all Archived Workflows can be retrieved with a valid token via the GET Workflow endpoint: `/api/v1/workflows/{namespace}/{name}`. No authentication is performed by the Server itself on `client` tokens. Authentication & authorization is instead delegated to the k8s API server. However, the Workflow Archive does not interact with k8s, and so any token that looks valid will be considered authenticated, even if it is not a k8s token or even if the token has no RBAC for Argo. To handle the lack of pass-through k8s authN/authZ, the Workflow Archive specifically does the equivalent of a `kubectl auth can-i` check for respective methods. In 3.5.7 and 3.5.8, the auth check was accidentally removed on the GET Workflow endpoint's fallback to archived workflows on these lines, allowing archived workflows to be retrieved with a fake token. This vulnerability is fixed in 3.6.2 and 3.5.13." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/argoproj/argo-workflows/pull/13021/files#diff-a5b255abaceddc9cc20bf6da6ae92c3a5d3605d94366af503ed754c079a1171aL668-R715", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/argoproj/argo-workflows/security/advisories/GHSA-h36c-m3rf-34h9", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53981.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53981.json new file mode 100644 index 00000000000..1072360c5d1 --- /dev/null +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53981.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-53981", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-02T16:15:14.457", + "lastModified": "2024-12-02T16:15:14.457", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "python-multipart is a streaming multipart parser for Python. When parsing form data, python-multipart skips line breaks (CR \\r or LF \\n) in front of the first boundary and any tailing bytes after the last boundary. This happens one byte at a time and emits a log event each time, which may cause excessive logging for certain inputs. An attacker could abuse this by sending a malicious request with lots of data before the first or after the last boundary, causing high CPU load and stalling the processing thread for a significant amount of time. In case of ASGI application, this could stall the event loop and prevent other requests from being processed, resulting in a denial of service (DoS). This vulnerability is fixed in 0.0.18." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Kludex/python-multipart/commit/c4fe4d3cebc08c660e57dd709af1ffa7059b3177", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Kludex/python-multipart/security/advisories/GHSA-59g5-xgcq-4qw3", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53984.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53984.json new file mode 100644 index 00000000000..c0118b58487 --- /dev/null +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53984.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-53984", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-02T16:15:14.603", + "lastModified": "2024-12-02T16:15:14.603", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Nanopb is a small code-size Protocol Buffers implementation. When the compile time option PB_ENABLE_MALLOC is enabled, the message contains at least one field with FT_POINTER field type, custom stream callback is used with unknown stream length. and the pb_decode_ex() function is used with flag PB_DECODE_DELIMITED, then the pb_decode_ex() function does not automatically call pb_release(), like is done for other failure cases. This could lead to memory leak and potential denial-of-service. This vulnerability is fixed in 0.4.9.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + }, + { + "lang": "en", + "value": "CWE-755" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/nanopb/nanopb/commit/2b86c255aa52250438d5aba124d0e86db495b378", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/nanopb/nanopb/security/advisories/GHSA-xwqq-qxmw-hj5r", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8785.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8785.json new file mode 100644 index 00000000000..52222f8c956 --- /dev/null +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8785.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-8785", + "sourceIdentifier": "security@progress.com", + "published": "2024-12-02T15:15:12.380", + "lastModified": "2024-12-02T15:15:12.380", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In WhatsUp Gold versions released before 2024.0.1, a\u00a0remote unauthenticated attacker could leverage NmAPI.exe to create or change an existing registry value in registry path HKEY_LOCAL_MACHINE\\SOFTWARE\\WOW6432Node\\Ipswitch\\." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-648" + } + ] + } + ], + "references": [ + { + "url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-September-2024", + "source": "security@progress.com" + }, + { + "url": "https://docs.progress.com/bundle/whatsupgold-release-notes-24-0/page/WhatsUp-Gold-2024.0-Release-Notes.html", + "source": "security@progress.com" + }, + { + "url": "https://www.progress.com/network-monitoring", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index b232829c0d9..058c390d2ac 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-02T15:01:02.406975+00:00 +2024-12-02T17:01:43.272285+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-02T15:00:03.333000+00:00 +2024-12-02T16:15:14.603000+00:00 ``` ### Last Data Feed Release @@ -33,60 +33,49 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -271886 +271901 ``` ### CVEs added in the last Commit -Recently added CVEs: `103` +Recently added CVEs: `15` -- [CVE-2024-53729](CVE-2024/CVE-2024-537xx/CVE-2024-53729.json) (`2024-12-02T14:15:16.290`) -- [CVE-2024-53730](CVE-2024/CVE-2024-537xx/CVE-2024-53730.json) (`2024-12-02T14:15:16.423`) -- [CVE-2024-53740](CVE-2024/CVE-2024-537xx/CVE-2024-53740.json) (`2024-12-02T14:15:16.560`) -- [CVE-2024-53741](CVE-2024/CVE-2024-537xx/CVE-2024-53741.json) (`2024-12-02T14:15:16.700`) -- [CVE-2024-53751](CVE-2024/CVE-2024-537xx/CVE-2024-53751.json) (`2024-12-02T14:15:16.863`) -- [CVE-2024-53753](CVE-2024/CVE-2024-537xx/CVE-2024-53753.json) (`2024-12-02T14:15:17.007`) -- [CVE-2024-53754](CVE-2024/CVE-2024-537xx/CVE-2024-53754.json) (`2024-12-02T14:15:17.143`) -- [CVE-2024-53755](CVE-2024/CVE-2024-537xx/CVE-2024-53755.json) (`2024-12-02T14:15:17.290`) -- [CVE-2024-53759](CVE-2024/CVE-2024-537xx/CVE-2024-53759.json) (`2024-12-02T14:15:17.430`) -- [CVE-2024-53761](CVE-2024/CVE-2024-537xx/CVE-2024-53761.json) (`2024-12-02T14:15:17.563`) -- [CVE-2024-53762](CVE-2024/CVE-2024-537xx/CVE-2024-53762.json) (`2024-12-02T14:15:17.697`) -- [CVE-2024-53765](CVE-2024/CVE-2024-537xx/CVE-2024-53765.json) (`2024-12-02T14:15:17.827`) -- [CVE-2024-53769](CVE-2024/CVE-2024-537xx/CVE-2024-53769.json) (`2024-12-02T14:15:17.953`) -- [CVE-2024-53770](CVE-2024/CVE-2024-537xx/CVE-2024-53770.json) (`2024-12-02T14:15:18.093`) -- [CVE-2024-53775](CVE-2024/CVE-2024-537xx/CVE-2024-53775.json) (`2024-12-02T14:15:18.237`) -- [CVE-2024-53776](CVE-2024/CVE-2024-537xx/CVE-2024-53776.json) (`2024-12-02T14:15:18.370`) -- [CVE-2024-53777](CVE-2024/CVE-2024-537xx/CVE-2024-53777.json) (`2024-12-02T14:15:18.503`) -- [CVE-2024-53779](CVE-2024/CVE-2024-537xx/CVE-2024-53779.json) (`2024-12-02T14:15:18.640`) -- [CVE-2024-53780](CVE-2024/CVE-2024-537xx/CVE-2024-53780.json) (`2024-12-02T14:15:18.777`) -- [CVE-2024-53781](CVE-2024/CVE-2024-537xx/CVE-2024-53781.json) (`2024-12-02T14:15:18.913`) -- [CVE-2024-53782](CVE-2024/CVE-2024-537xx/CVE-2024-53782.json) (`2024-12-02T14:15:19.050`) -- [CVE-2024-53784](CVE-2024/CVE-2024-537xx/CVE-2024-53784.json) (`2024-12-02T14:15:19.190`) -- [CVE-2024-53789](CVE-2024/CVE-2024-537xx/CVE-2024-53789.json) (`2024-12-02T14:15:19.327`) -- [CVE-2024-53792](CVE-2024/CVE-2024-537xx/CVE-2024-53792.json) (`2024-12-02T14:15:19.460`) -- [CVE-2024-53793](CVE-2024/CVE-2024-537xx/CVE-2024-53793.json) (`2024-12-02T14:15:19.587`) +- [CVE-2024-10905](CVE-2024/CVE-2024-109xx/CVE-2024-10905.json) (`2024-12-02T15:15:10.240`) +- [CVE-2024-29645](CVE-2024/CVE-2024-296xx/CVE-2024-29645.json) (`2024-12-02T15:15:10.960`) +- [CVE-2024-31669](CVE-2024/CVE-2024-316xx/CVE-2024-31669.json) (`2024-12-02T15:15:11.113`) +- [CVE-2024-38827](CVE-2024/CVE-2024-388xx/CVE-2024-38827.json) (`2024-12-02T15:15:11.270`) +- [CVE-2024-46905](CVE-2024/CVE-2024-469xx/CVE-2024-46905.json) (`2024-12-02T15:15:11.443`) +- [CVE-2024-46906](CVE-2024/CVE-2024-469xx/CVE-2024-46906.json) (`2024-12-02T15:15:11.633`) +- [CVE-2024-46907](CVE-2024/CVE-2024-469xx/CVE-2024-46907.json) (`2024-12-02T15:15:11.793`) +- [CVE-2024-46908](CVE-2024/CVE-2024-469xx/CVE-2024-46908.json) (`2024-12-02T15:15:11.967`) +- [CVE-2024-46909](CVE-2024/CVE-2024-469xx/CVE-2024-46909.json) (`2024-12-02T15:15:12.120`) +- [CVE-2024-52732](CVE-2024/CVE-2024-527xx/CVE-2024-52732.json) (`2024-12-02T15:15:12.270`) +- [CVE-2024-53459](CVE-2024/CVE-2024-534xx/CVE-2024-53459.json) (`2024-12-02T16:15:12.637`) +- [CVE-2024-53862](CVE-2024/CVE-2024-538xx/CVE-2024-53862.json) (`2024-12-02T16:15:14.277`) +- [CVE-2024-53981](CVE-2024/CVE-2024-539xx/CVE-2024-53981.json) (`2024-12-02T16:15:14.457`) +- [CVE-2024-53984](CVE-2024/CVE-2024-539xx/CVE-2024-53984.json) (`2024-12-02T16:15:14.603`) +- [CVE-2024-8785](CVE-2024/CVE-2024-87xx/CVE-2024-8785.json) (`2024-12-02T15:15:12.380`) ### CVEs modified in the last Commit -Recently modified CVEs: `16` +Recently modified CVEs: `15` -- [CVE-2023-34151](CVE-2023/CVE-2023-341xx/CVE-2023-34151.json) (`2024-12-02T14:34:36.813`) -- [CVE-2023-34152](CVE-2023/CVE-2023-341xx/CVE-2023-34152.json) (`2024-12-02T14:34:31.887`) -- [CVE-2023-34153](CVE-2023/CVE-2023-341xx/CVE-2023-34153.json) (`2024-12-02T14:34:41.337`) -- [CVE-2023-48795](CVE-2023/CVE-2023-487xx/CVE-2023-48795.json) (`2024-12-02T14:54:27.177`) -- [CVE-2024-11970](CVE-2024/CVE-2024-119xx/CVE-2024-11970.json) (`2024-12-02T14:48:39.960`) -- [CVE-2024-31248](CVE-2024/CVE-2024-312xx/CVE-2024-31248.json) (`2024-12-02T14:03:36.677`) -- [CVE-2024-35696](CVE-2024/CVE-2024-356xx/CVE-2024-35696.json) (`2024-12-02T14:28:17.550`) -- [CVE-2024-37094](CVE-2024/CVE-2024-370xx/CVE-2024-37094.json) (`2024-12-02T14:15:05.967`) -- [CVE-2024-40859](CVE-2024/CVE-2024-408xx/CVE-2024-40859.json) (`2024-12-02T14:59:47.877`) -- [CVE-2024-44191](CVE-2024/CVE-2024-441xx/CVE-2024-44191.json) (`2024-12-02T15:00:03.333`) -- [CVE-2024-45766](CVE-2024/CVE-2024-457xx/CVE-2024-45766.json) (`2024-12-02T14:37:32.017`) -- [CVE-2024-45767](CVE-2024/CVE-2024-457xx/CVE-2024-45767.json) (`2024-12-02T14:32:37.183`) -- [CVE-2024-48957](CVE-2024/CVE-2024-489xx/CVE-2024-48957.json) (`2024-12-02T14:58:55.063`) -- [CVE-2024-48958](CVE-2024/CVE-2024-489xx/CVE-2024-48958.json) (`2024-12-02T14:58:37.067`) -- [CVE-2024-51636](CVE-2024/CVE-2024-516xx/CVE-2024-51636.json) (`2024-12-02T14:15:06.113`) -- [CVE-2024-52336](CVE-2024/CVE-2024-523xx/CVE-2024-52336.json) (`2024-12-02T14:15:06.410`) +- [CVE-2023-34188](CVE-2023/CVE-2023-341xx/CVE-2023-34188.json) (`2024-12-02T15:15:08.200`) +- [CVE-2024-11051](CVE-2024/CVE-2024-110xx/CVE-2024-11051.json) (`2024-12-02T15:14:56.087`) +- [CVE-2024-11700](CVE-2024/CVE-2024-117xx/CVE-2024-11700.json) (`2024-12-02T15:15:10.557`) +- [CVE-2024-20130](CVE-2024/CVE-2024-201xx/CVE-2024-20130.json) (`2024-12-02T16:15:07.200`) +- [CVE-2024-20131](CVE-2024/CVE-2024-201xx/CVE-2024-20131.json) (`2024-12-02T16:15:07.387`) +- [CVE-2024-20132](CVE-2024/CVE-2024-201xx/CVE-2024-20132.json) (`2024-12-02T16:15:07.557`) +- [CVE-2024-20133](CVE-2024/CVE-2024-201xx/CVE-2024-20133.json) (`2024-12-02T16:15:07.737`) +- [CVE-2024-20134](CVE-2024/CVE-2024-201xx/CVE-2024-20134.json) (`2024-12-02T16:15:07.907`) +- [CVE-2024-20135](CVE-2024/CVE-2024-201xx/CVE-2024-20135.json) (`2024-12-02T16:15:08.097`) +- [CVE-2024-20136](CVE-2024/CVE-2024-201xx/CVE-2024-20136.json) (`2024-12-02T16:15:08.260`) +- [CVE-2024-20137](CVE-2024/CVE-2024-201xx/CVE-2024-20137.json) (`2024-12-02T16:15:08.433`) +- [CVE-2024-20138](CVE-2024/CVE-2024-201xx/CVE-2024-20138.json) (`2024-12-02T16:15:08.603`) +- [CVE-2024-20139](CVE-2024/CVE-2024-201xx/CVE-2024-20139.json) (`2024-12-02T16:15:08.770`) +- [CVE-2024-21723](CVE-2024/CVE-2024-217xx/CVE-2024-21723.json) (`2024-12-02T16:15:08.967`) +- [CVE-2024-45520](CVE-2024/CVE-2024-455xx/CVE-2024-45520.json) (`2024-12-02T16:15:11.293`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 11b3ed4abd6..b84153f0ef5 100644 --- a/_state.csv +++ b/_state.csv @@ -226312,9 +226312,9 @@ CVE-2023-34147,0,0,198e3225716af6193eb26e6bcbe7b5cdd685374207244a1df7861331267bf CVE-2023-34148,0,0,7d024bac19d717f8a780356fe18f6aa568718b5868fa92fcd0ef8516d21ca840,2023-06-30T17:53:51.130000 CVE-2023-34149,0,0,5f8464856c1cae67e8901b2028d326e2003933ed78350ebbe96bedb97b9b2722,2023-07-06T19:15:10.460000 CVE-2023-34150,0,0,7be44c69cc4685a15ba704c5ec25bf1fa1aa7d4868d59dfe1ea8808a130bcf19,2024-08-02T16:16:07.070000 -CVE-2023-34151,0,1,99655761750ec80cccabb2190e2dff1e94a4afa7357d176a172dac871102bb71,2024-12-02T14:34:36.813000 -CVE-2023-34152,0,1,334da3b68a0c4bcbcd97713b755f74eb3f582cefd06ffbd3f5072dbe60ebbbcf,2024-12-02T14:34:31.887000 -CVE-2023-34153,0,1,ed14304b1e6ccf8b58695c524d173bf8dc75bbd828fca06ae43e772c59aef8ea,2024-12-02T14:34:41.337000 +CVE-2023-34151,0,0,99655761750ec80cccabb2190e2dff1e94a4afa7357d176a172dac871102bb71,2024-12-02T14:34:36.813000 +CVE-2023-34152,0,0,334da3b68a0c4bcbcd97713b755f74eb3f582cefd06ffbd3f5072dbe60ebbbcf,2024-12-02T14:34:31.887000 +CVE-2023-34153,0,0,ed14304b1e6ccf8b58695c524d173bf8dc75bbd828fca06ae43e772c59aef8ea,2024-12-02T14:34:41.337000 CVE-2023-34154,0,0,05d6e2f49001330ff46c54f071f6db28c5ab796e45bdc3dc0f1ed8fc05d6ff97,2023-06-26T17:51:03.840000 CVE-2023-34155,0,0,e43d6eb4b537096863e39658c71b8a6e787fa3706e81ef2d985affa41b828ac8,2023-06-27T09:24:48.237000 CVE-2023-34156,0,0,361646aa2d04d92372e5aa6931a49ce3d3814ed937de7aaff12f079256ecf3f7,2023-06-27T09:24:17.830000 @@ -226352,7 +226352,7 @@ CVE-2023-34184,0,0,6b37f9feddce7aba2ca90f92dc8f3c51f7944b89051b1ad282cbb6150f423 CVE-2023-34185,0,0,563c7630349ce4fda4e82697db7e4483c6146d83421789afbaa13e7c27db6e75,2023-07-18T18:21:37.307000 CVE-2023-34186,0,0,c601dee59d899685f4dac19bfea3727b06f03a27cdd0c5191a1823bf6439e20d,2024-05-17T18:36:05.263000 CVE-2023-34187,0,0,b30d3a29f02d088f2a343a02dc8816c3ac4f2ba6ee34c5e343a68b83e34759b6,2023-08-31T21:02:52.107000 -CVE-2023-34188,0,0,01175c77514202c3e82378761747d0f87086971fab1640482ef765cb32978b91,2023-09-06T17:15:50.190000 +CVE-2023-34188,0,1,7be73ea83cc4ddbb5dc0108971f2be63ace20410512b5554871f577f0f232511,2024-12-02T15:15:08.200000 CVE-2023-34189,0,0,852069858a43c3b830dd45f0d9f89b339d989703c15bd2112166348e71f45a18,2023-08-02T18:51:03.527000 CVE-2023-3419,0,0,dc2398e0d232c730deb43c680eb3a3837a602d0fa3030139e39cb20d21ad8852,2024-08-19T12:59:59.177000 CVE-2023-34192,0,0,85d981e01ef8ef1e0680768bc42005fded3d3ef3dece16cd8a3b1675004ee8a0,2023-07-12T23:08:32.340000 @@ -237007,7 +237007,7 @@ CVE-2023-4879,0,0,245c5838bc8e554dd27a373a6083696d5edb3e8ea87398d1d9ca7c6e5aa0ff CVE-2023-48791,0,0,64aa589d33601cfd147e8571ed4a080a7c45a8b01329dc5837136a4402406668,2023-12-15T20:09:24.010000 CVE-2023-48792,0,0,5c2aee35948bf52c45856f04423cf3034c4db1705c4352d4c0ffe18b53f16d95,2024-07-03T01:42:23.563000 CVE-2023-48793,0,0,e12fc34ba64c9d158dedcc17eac798e8672651aef8eadf95d2da8c11d5f8f26b,2024-07-03T01:42:24.367000 -CVE-2023-48795,0,1,9f573930b8ec65c3868966cd2ddd54cbe66cadece3f6303e1885a670127a5d9a,2024-12-02T14:54:27.177000 +CVE-2023-48795,0,0,9f573930b8ec65c3868966cd2ddd54cbe66cadece3f6303e1885a670127a5d9a,2024-12-02T14:54:27.177000 CVE-2023-48796,0,0,9eda200b3ff52f25078cb00716f1db333a7072a5aaba6a17d3fab0872160a5b8,2023-12-01T20:14:35.870000 CVE-2023-48799,0,0,1d1065023c755b0ef111bb9821d69d31e2c58684086396f923386090db5b3cfa,2023-12-07T20:14:48.190000 CVE-2023-48800,0,0,65e1497c037bd1bf664b19905b3cbfe79f0e133572d0fb6812917add4f2fd9b5,2023-12-07T20:43:31.520000 @@ -243311,6 +243311,7 @@ CVE-2024-10898,0,0,29bba6e208449ebd52631361f4bdc8eca3c372d754cd58876d30ee6c07372 CVE-2024-10899,0,0,3af5ea7b90e5da0230215c5076c9eff9b3749f9f5f947443d89625612842d08a,2024-11-26T21:01:21.643000 CVE-2024-1090,0,0,2d0b80c82d6d153c4e0b5412c3fcf892da86ac73a72da4cbf84bfbb064bdcb0c,2024-02-29T13:49:29.390000 CVE-2024-10900,0,0,5438023601d5947725ce57a2b51b24b31a697395c49ac1553534945223b38a58,2024-11-29T20:58:31.967000 +CVE-2024-10905,1,1,e98ffff37b5956a2ad6c437472b8f53d76d0603bed01c95ada00a17c9ce7eb4b,2024-12-02T15:15:10.240000 CVE-2024-1091,0,0,54ee7e9ca708166212a73aaa10e4715176fe17b55fbce1ee0ea8f95d289d46a5,2024-02-29T13:49:29.390000 CVE-2024-10913,0,0,4e9b29333972ed20a30c4eccde2c9645761370bd1f3d0211dcdd27a3f9c3d9cf,2024-11-20T14:15:17.253000 CVE-2024-10914,0,0,0e11c1731905763ffc173784369687971adc0677422c26a81c4aa2918d85e560,2024-11-24T15:15:06.090000 @@ -243405,7 +243406,7 @@ CVE-2024-11047,0,0,64dbad14a794669b828bb44eebca3fde6ac51457cfee02dad21b39b098487 CVE-2024-11048,0,0,21786d98bafe82af70b0d13927da0cfc2a5e251397b591082c79052adc605aee,2024-11-13T20:53:55.113000 CVE-2024-11049,0,0,efe77d054e00096c249033caeded95aa45069f1f11b699edbd4a58681a130c8a,2024-11-23T01:41:19.207000 CVE-2024-11050,0,0,4a557ebc68e4a21833dd3972056655a89812d1110bd037fcaf7747ecf814996b,2024-11-23T01:38:15.047000 -CVE-2024-11051,0,0,eb9e15965e4cd0c6f388b6eb1187188afb18b6da215e4b4c9a8311016e9cd0cc,2024-11-12T13:56:24.513000 +CVE-2024-11051,0,1,0c5db2f4a5372b3789ea13ae4e153849a79584f39670640750e498cda1bc9950,2024-12-02T15:14:56.087000 CVE-2024-11054,0,0,2b10f7eb7e0ea54cbdf2f44e8ccd2401488923bf3e8bbeb3c99a947af182af3e,2024-11-14T02:43:36.197000 CVE-2024-11055,0,0,063f616f81ec8b41ac610800e9641fd71662778ce9165238c4e4d73be7647e35,2024-11-14T15:18:45.933000 CVE-2024-11056,0,0,6e0160117ff4187f70de2c20437329aad36979ea68e9d50c9569d1405a688157,2024-11-14T15:21:09.907000 @@ -243799,7 +243800,7 @@ CVE-2024-11697,0,0,5748a45bf5b4ab1df9cdc0d9e9aecb8d661d83a718add7c3b7046a7fb75f2 CVE-2024-11698,0,0,4794c1cf0af88db81ed7f95cedceea58d59a70d0fc54757fe957e605d54d7ffb,2024-11-27T16:15:13.130000 CVE-2024-11699,0,0,a7ea20a1c54c5589a88b0fef3691aeab09fe6e64b22758a350879ee83ee60e9d,2024-11-27T15:15:24.600000 CVE-2024-1170,0,0,ef14266ea2026fd1e77d96d081d12f376a313e532bfd85bbf7562d8a6e990ca2,2024-03-07T13:52:27.110000 -CVE-2024-11700,0,0,ceace3355c1afadd3765ff990a47b048411702573d03dfd1ddbe541b66cd2a99,2024-11-27T16:15:13.300000 +CVE-2024-11700,0,1,bc2be5af2b84b6516d161a848a53862ea2fabd715864fcabb126a0f4a490319e,2024-12-02T15:15:10.557000 CVE-2024-11701,0,0,3ce088d891c171dd484e061591f74125e217790d856876ddb068c1435abf2279,2024-11-27T16:15:13.470000 CVE-2024-11702,0,0,13d1f6c9b043e1cf62a5a526ef83139151e2fe50c3be4951aef4463544909f25,2024-11-27T16:15:13.660000 CVE-2024-11703,0,0,a0aade5966792892c7a69520deed0024219950d9ba72d34090cb3bb1b7974f3a,2024-11-26T14:15:19.810000 @@ -243879,7 +243880,7 @@ CVE-2024-11967,0,0,12f18dfc45eb819820254e66461b73c23a82321abe05a31382bf89c4ef0ee CVE-2024-11968,0,0,da1eb41fd3caaae1d6edfd3659687335ef8ca5c9c6a02406ba4c7be157fe3497,2024-11-28T18:15:07.980000 CVE-2024-11969,0,0,328ae06406886fb66d7ac1b2c34b1818381f0d888a340c497ddc215ced06af80,2024-11-28T16:15:07.190000 CVE-2024-1197,0,0,eee502956c194e641ee01f282e886cb95c42c3ca82a247ebe6baa4a7059b14c0,2024-05-17T02:35:18.363000 -CVE-2024-11970,0,1,1a849bf68450bf6823e4c6c28effecbfa7f1d9d228ab32bedb6122aff4f177bb,2024-12-02T14:48:39.960000 +CVE-2024-11970,0,0,1a849bf68450bf6823e4c6c28effecbfa7f1d9d228ab32bedb6122aff4f177bb,2024-12-02T14:48:39.960000 CVE-2024-11971,0,0,38215aae1affbb1fe3b0b911c5ff0552bf6ce1619ab76a58fad7d4415b59c88a,2024-11-28T22:15:15.090000 CVE-2024-11978,0,0,82a503c1ccc829c5aa4edddd9a1368db8d8d07e5bd911457d7693a4c582d1965,2024-11-29T03:15:14.700000 CVE-2024-11979,0,0,a7d9158b13addb102e25d626e75f83d1385a44201d3dac6e49beea06afd7775f,2024-11-29T03:15:15.653000 @@ -243901,7 +243902,7 @@ CVE-2024-12001,0,0,d124c0f10f30b54eb4f74d57e35bd484e6cb76bb299b65c3d619c3385b273 CVE-2024-12002,0,0,2d664898f022b9ee65d7e21df2d171082c6696d82f0f74082488bdac27e9a6cc,2024-11-30T13:15:04.610000 CVE-2024-12007,0,0,d09eb162fd0802cb9d12367e01f06496d503cbf35d3d8593ef98baeac09d1ac1,2024-12-01T23:15:05.310000 CVE-2024-1201,0,0,f9834193bbb62b403f23d3357a53cc3ad9bb6173e269e5c9bf81a47c0a1a0786,2024-02-09T19:27:29.517000 -CVE-2024-12015,1,1,76bde5ba443e4cef655d444ed6b12009e494b1530b8cc5faad4f131977067c23,2024-12-02T14:15:05.383000 +CVE-2024-12015,0,0,76bde5ba443e4cef655d444ed6b12009e494b1530b8cc5faad4f131977067c23,2024-12-02T14:15:05.383000 CVE-2024-1202,0,0,6132da5e9762048f130f38f4ec670738f94221153725a0b95c9666bf5c59cb16,2024-08-01T19:15:32.277000 CVE-2024-1203,0,0,b776394b4b874eaeeae3e5b604198862b49ad905e4e26e755c608f17ba381dab,2024-03-13T18:16:18.563000 CVE-2024-1204,0,0,227dcadf8be17e7ba46954487209fff721db299a9b29c34d65c82dfa9a2b5cb2,2024-07-03T01:45:05.337000 @@ -244787,16 +244788,16 @@ CVE-2024-20127,0,0,191445c8421ac764bafa609e191240e08a49a9b03cf7c2f97161e0ac39e8f CVE-2024-20128,0,0,fd4f49b631373e0791fe4bb327ef73d8f0d2affdeeb231166beab6965fc15222,2024-12-02T04:15:04.967000 CVE-2024-20129,0,0,671726aba2b1095472532326d37fd302eed94fd6211ea01542506d4087187d34,2024-12-02T04:15:05.073000 CVE-2024-2013,0,0,00ec85b9018843d83179244785c9b4c96e5ba8e015239a21d2d4ac8bf1b712fa,2024-08-15T21:08:02.010000 -CVE-2024-20130,0,0,c5c61b42999586eb6524adf7fc57c7a4dc342ecee029309ce1d74b441655b6a6,2024-12-02T04:15:05.190000 -CVE-2024-20131,0,0,e8bf468034b877700f2f815db730ea01b9fb33b2f2b0fd1889826015a8b961cf,2024-12-02T04:15:05.337000 -CVE-2024-20132,0,0,9373b009841b6e7e2bc7798ff8b4105dc55369c566645250d6e8c88a510d00d2,2024-12-02T04:15:05.460000 -CVE-2024-20133,0,0,c9b8fcaac5b72964bffdd7bdbd43f33dd0d5445990becc6ef33b45a084beb516,2024-12-02T04:15:05.567000 -CVE-2024-20134,0,0,10e8a3a9fd2b91d09bd084ecc2c34261009ca68c983807b8ba80b90d62432e28,2024-12-02T04:15:05.693000 -CVE-2024-20135,0,0,d899dd8e63efcc84e4786ff33cc1dfe5ce8a481f68881279ba65dc626a2f9818,2024-12-02T04:15:05.797000 -CVE-2024-20136,0,0,a6b9cf231f91cccb8fba39afa78239f0aaf973583a4f0691ff23291adfe70f63,2024-12-02T04:15:05.920000 -CVE-2024-20137,0,0,e357ea18b28bddcd6237829f6d2454e40f9e38cb85e81244650de6b005c419f8,2024-12-02T04:15:06.030000 -CVE-2024-20138,0,0,ae6e031e4fd01ba7830025a65e56a373917971371e3f604b52e691eba9d87548,2024-12-02T04:15:06.133000 -CVE-2024-20139,0,0,58e35926fd10f61748cf5c6dd1def0172c7194c5c66e70664d0177296fe29614,2024-12-02T04:15:06.247000 +CVE-2024-20130,0,1,b9b17aa1c03d9483b8843b48bea126960747e04e39929dc746ce4ca1479eb2f1,2024-12-02T16:15:07.200000 +CVE-2024-20131,0,1,1e64bc7a3127731196d2fa87109d2384b3e91b26839694666fe149e4e5b53554,2024-12-02T16:15:07.387000 +CVE-2024-20132,0,1,f4cc91744b8a6b3af86e4e8d184a868c2fc84388570327f87327ebff157bcaa8,2024-12-02T16:15:07.557000 +CVE-2024-20133,0,1,fd2d9fef2f12a32cb33536969e0da117c7ff6a7c081a67ea7cd40b5a5f6d630d,2024-12-02T16:15:07.737000 +CVE-2024-20134,0,1,1d4bc63f9eb4412de5ebc6bed4a6fab51dfdc46af786282811b440ef7d69407c,2024-12-02T16:15:07.907000 +CVE-2024-20135,0,1,57119bf972026e38996ca755a3f316af2b3402cc04a9db9eba30e1da211f5a53,2024-12-02T16:15:08.097000 +CVE-2024-20136,0,1,974b7b8826843336352c8b21d2c949dee3a935c2a7f163750d3cfbd49e510cb7,2024-12-02T16:15:08.260000 +CVE-2024-20137,0,1,fe4bf8bc17a27800d12c2afc646a8a72b841cdaf312d08e530acc587ecfcadc2,2024-12-02T16:15:08.433000 +CVE-2024-20138,0,1,1264e7fcc71f95b0ae39f37ee36146e7c465bf599e4b07c736bd426b81382a8a,2024-12-02T16:15:08.603000 +CVE-2024-20139,0,1,434bf1878b4edcc6ee42c87512888b556d261e46d1cb8ef2e233401120fa701b,2024-12-02T16:15:08.770000 CVE-2024-2014,0,0,97c4d99afb7da491efaae3ff0fb6836102849098937eeb69745707d3dbc15b2d,2024-05-17T02:37:59.427000 CVE-2024-2015,0,0,bb3d603120b99e575edb7baace469be8f767dc6e32ed33cf2700f4d2936e46ac,2024-05-17T02:37:59.517000 CVE-2024-2016,0,0,8c172ad566a2e375a3ac2c22bb48a79ffa778559105a1fd5ded9fbaceb4cfb2c,2024-06-04T19:19:12.807000 @@ -246151,7 +246152,7 @@ CVE-2024-21703,0,0,08d952643f27d625e1a34daf2a14cf006a2e6417e07616e354cd3cfc64f9f CVE-2024-2171,0,0,17c18c0537b711b05cfdac779ba2d168e9830dc55b69168346eed3896c1fbc48,2024-10-11T14:15:32.983000 CVE-2024-2172,0,0,edf7001396454eaaf4557a9c3fcef53434431cfdf8112832b9dc273636d1d743,2024-03-13T18:15:58.530000 CVE-2024-21722,0,0,a86fb4d95ec57288d080d9ff105ac4d713cb82e6d029a4568b198925539efc69,2024-10-30T18:35:02.897000 -CVE-2024-21723,0,0,c123a68ae41218e084e71266e368c668840ae873b9865a9853aeca12024bce7b,2024-02-29T13:49:29.390000 +CVE-2024-21723,0,1,ea00e53d0673b309526ea9182c39ca1385df8eb584192b37edee739e9b4e1501,2024-12-02T16:15:08.967000 CVE-2024-21724,0,0,13cf7200241cf795a2ddca2e0396bacd352639744079d295d3483718d273f60f,2024-02-29T13:49:29.390000 CVE-2024-21725,0,0,ebdabbe1fa288bbeb81a276a125f761859acd9172475efecd68ff4e2c004f13b,2024-10-27T02:35:00.563000 CVE-2024-21726,0,0,258e12429393fbdcadf90bc903b6c4eaa784036f8d4a014cbe225655bb0298a5,2024-11-04T21:35:03.690000 @@ -251827,6 +251828,7 @@ CVE-2024-2963,0,0,31d50b8247d27494fa9b9adaa5f17e80a25f74cd25c24e5136f653283814c7 CVE-2024-2964,0,0,6af8d38af5c9612485676aa7d2fa3bff7d4d2c725303e86b5f288ee45d8070f9,2024-03-29T12:45:02.937000 CVE-2024-29640,0,0,86e865cda03b368a317d7c9a1be400ed630e63c917f88b7400c156c17d9e66f3,2024-08-27T18:35:07.370000 CVE-2024-29644,0,0,8f85f2ee54dea78f450e0a34d8d144c380c8a4c7a954f54ad9e505caffbc88b6,2024-08-05T17:35:10.887000 +CVE-2024-29645,1,1,998bedeba8b13cb24165783aaa6044be39300d70fde69663c8a7c6d0c6cecfa8,2024-12-02T15:15:10.960000 CVE-2024-2965,0,0,31194867e3c8375be8a7a72353070c45d11fab5833d7a91937e736bd4749a53d,2024-11-03T17:15:13.107000 CVE-2024-29650,0,0,32230dc7c100b4d45992d9916209ac72d3ba4f4a88f0a390b7772dee0091b547,2024-08-01T16:35:08.160000 CVE-2024-29651,0,0,10ced44f5f76b0e20af308caf370e6cc4fceca5031ea22581c3d1437b439d8e2,2024-08-20T14:35:13.967000 @@ -253131,7 +253133,7 @@ CVE-2024-31244,0,0,d6bd1922a515e9e257631e6ccae0b71daa087818a03a04b5e238d9a4d6348 CVE-2024-31245,0,0,9494828f7ed62996db86d58f22c317374ab4a0f02ae2927fe6308bd197a09e99,2024-04-10T19:49:51.183000 CVE-2024-31246,0,0,f90c299bc88290b1a3ba848f1c038167145513c9b72a33c76006f09f98c7dffc,2024-10-05T01:59:34.870000 CVE-2024-31247,0,0,ccecdcd4d60867cc44b0f68ee01066e569d6ebe211a4fbbc8c94f5280ede9aa6,2024-04-10T19:49:51.183000 -CVE-2024-31248,0,1,6f2a80ff5a8ee75c0625c495eeae2bb150e9004a8f4e9a6f58616e8ef671ab84,2024-12-02T14:03:36.677000 +CVE-2024-31248,0,0,6f2a80ff5a8ee75c0625c495eeae2bb150e9004a8f4e9a6f58616e8ef671ab84,2024-12-02T14:03:36.677000 CVE-2024-31249,0,0,c303e93c7d1feb8f0499ce4b625c2c8fc9dc44bc2e75c2bd338f7ab1fdea1fd4,2024-04-10T19:49:51.183000 CVE-2024-3125,0,0,78ae7b76247fdcfaa00f4d4fa57053e68edc10f0c2d0c800767afda822154b12,2024-05-17T02:39:43.820000 CVE-2024-31250,0,0,1e8c8f3e227e8fdf738c50120ff46f1a018556e80e43dea48ad17c321cb951db,2024-04-15T13:15:51.577000 @@ -253460,6 +253462,7 @@ CVE-2024-31651,0,0,ff635ec14b868d2b93fa21d54db2cc160b86957cb7aa11437f2a0e792cdac CVE-2024-31652,0,0,d3a39df49d7c9a4ac8f46bb863860ab64051b06ba513b7c983446092a2722415,2024-10-30T17:35:05.700000 CVE-2024-3166,0,0,d48b1a20c8084628d17380e69f30813f1d8085267297cebc2bf523c13b3ece3d,2024-10-23T15:25:16.403000 CVE-2024-31666,0,0,253643df7e9c7fc7c94316b23bbda0edfbf28e84ffeb8510af634fd8ae7e9fc0,2024-04-22T19:24:06.727000 +CVE-2024-31669,1,1,31ec3184aae1ad222bbbb1a4594b8bb1b152b5cce59b11c364f48ace0bb1fce5,2024-12-02T15:15:11.113000 CVE-2024-3167,0,0,0e0e401d957a36adf31f389f0d7fa47f7901c0598b7b2fd42d4c75bdbdd76e80,2024-04-26T15:55:58.810000 CVE-2024-31673,0,0,958f02eb1f314a421c4e692d99797c4d8f0e196e848d56cb014d5e77e7fc54c5,2024-08-05T19:35:12.297000 CVE-2024-31678,0,0,45c8b2607673d8af8b3ec231962e66bcea8064211e1867ed0addb4c93b773839,2024-08-01T13:51:04.350000 @@ -256367,7 +256370,7 @@ CVE-2024-35692,0,0,c23d33c37503a8e8f25e1564013ecb45490977176b56ba09aed4252ab52c3 CVE-2024-35693,0,0,472b85635f751bbb73374106d257ae5cae23d72b0e5b2e1e0e0ebb17ffd7f85e,2024-08-29T21:17:56.007000 CVE-2024-35694,0,0,c34dfc60695ab5f6cf2c79d36f43d21428a300388d41d67f360c32c074abcba5,2024-08-29T21:23:01.367000 CVE-2024-35695,0,0,ab44d026f8bf756f1fe3ab06413a866da24ddfd1c83d36e6b1b31e22da685f2e,2024-08-29T21:36:20.590000 -CVE-2024-35696,0,1,8c5d5314b48da0ca00a285810d61dc8f8c306f8d7e365147e6b1966e410d2c71,2024-12-02T14:28:17.550000 +CVE-2024-35696,0,0,8c5d5314b48da0ca00a285810d61dc8f8c306f8d7e365147e6b1966e410d2c71,2024-12-02T14:28:17.550000 CVE-2024-35697,0,0,ed26483e03d41cbda2679aca1662298d32b2cfe43e2a2b534c7112e53fc75b2f,2024-08-29T17:13:49.557000 CVE-2024-35698,0,0,ce5805ea174c7d79028851b201d10370f7d8980a44f785817681e8858e08f43b,2024-08-29T17:11:36.290000 CVE-2024-35699,0,0,bb29147c315960e5ea1d6cdd4347723d85b9a10f4d38a78e1ce06e8ac950d004,2024-08-29T17:09:55.017000 @@ -257497,7 +257500,7 @@ CVE-2024-37089,0,0,4079e469a0b9c8eff7513f19c004b5889c685b5a744b48949620385f99d2c CVE-2024-37090,0,0,5d012601ead052938e64a5cf6fbacb664a926b0431e026ab44832a3c42b6a7e0,2024-08-16T14:19:42.403000 CVE-2024-37091,0,0,b626c72d25f84f9219d28a104cd2d18472b59c6cd0ed8347ffeee08b9e2b4719,2024-10-20T12:15:02.977000 CVE-2024-37092,0,0,5d6ec5440d10a9301dd3905013853ef3f8ec0563d3da8d9c4e2e50eb50e7d655,2024-08-20T20:15:40.147000 -CVE-2024-37094,0,1,461a573e0402bc0e49439ada6f1ee204f3ab4cdbf605a4d834cb0d003291654a,2024-12-02T14:15:05.967000 +CVE-2024-37094,0,0,461a573e0402bc0e49439ada6f1ee204f3ab4cdbf605a4d834cb0d003291654a,2024-12-02T14:15:05.967000 CVE-2024-37095,0,0,3408bf6ac4dd919459f933e8f521bf6c518da1c069e237e80314c34a9f6761a1,2024-11-01T20:24:53.730000 CVE-2024-37096,0,0,23220101781d6f82b516c48f773cc5677aa7466abd0e4fbb5bfa71b95dd859f9,2024-11-01T20:24:53.730000 CVE-2024-37097,0,0,2ff654ed870e28098ff61d9863b817bf82788553fa15e646afcc390727bd15fb,2024-07-26T12:56:05.293000 @@ -258940,6 +258943,7 @@ CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d CVE-2024-38820,0,0,517fdb1091af57612900b39a11b0b83e3890144a7a4d4cb71cfb71c69b405fa9,2024-11-29T12:15:07.007000 CVE-2024-38821,0,0,bb251b2231aa5ec8776de9aee89d7b4c729d7a41bc68ac186fa12d01aa093b81,2024-10-28T13:58:09.230000 CVE-2024-38826,0,0,d2dc3bc0b0f77945ea4b1900d4b45fc9041d9a4783cdeb176eb488aedabdfbeb,2024-11-12T13:55:21.227000 +CVE-2024-38827,1,1,3874c464e716661a48f3e22603ab20b7e36bf129e4ab27a217f4348c4a349acc,2024-12-02T15:15:11.270000 CVE-2024-38828,0,0,0c8d1b5128144a8d7d124f30bfb82a89e19f39cd304dc10431ed647af64ddcb3,2024-11-18T17:11:17.393000 CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000 CVE-2024-38830,0,0,25b272dc1cf212b6cf8b44602a3d5cd0c946406c321e913898f69284c3986026,2024-11-26T12:15:18.413000 @@ -260112,7 +260116,7 @@ CVE-2024-40853,0,0,406098e9dedf197de0514938c4993bfbf477e600f2b7ec8507b9e9ccf473b CVE-2024-40855,0,0,c4009c31deae8d3429e902b0eee1277607cb2dfde34abfa3e4e0ee995107e214,2024-10-30T19:35:15.737000 CVE-2024-40856,0,0,d1c395cfb081223f2e2dfeb53f10a6fd746e5cb54023878ed4edffc6317ff1c1,2024-09-25T13:43:40.657000 CVE-2024-40857,0,0,f2e2a807b57a9e2f285ea0e786a7b34a2d2aa721fddb70aba2e62035d4b0c8f7,2024-09-25T13:41:41.843000 -CVE-2024-40859,0,1,46749f00540a137f4fa073cd49e6c82184e33775d43533189720fd97419e33a7,2024-12-02T14:59:47.877000 +CVE-2024-40859,0,0,46749f00540a137f4fa073cd49e6c82184e33775d43533189720fd97419e33a7,2024-12-02T14:59:47.877000 CVE-2024-4086,0,0,4591112164bebe25a6e3755e5f7d7b3acd1442e1405281bbc9f49b1286c02b38,2024-05-02T18:00:37.360000 CVE-2024-40860,0,0,e5ead227110aa19c4042e26e364c8228b4489bfdf6f0431771df4e3ccb8a59ef,2024-09-25T13:41:05.177000 CVE-2024-40861,0,0,7204d4c395d904aba2687d268d077938e2cf1cd101497574171fb4f0b590be98,2024-09-20T12:31:20.110000 @@ -262632,7 +262636,7 @@ CVE-2024-44188,0,0,d9b3eca877b183751dacb80ba82d47175b17c9197d2f1bc3c870ce12e136f CVE-2024-44189,0,0,e2ab737161ad2da12e67ce91184b5117737604e14075d78e50c43a3e20db6842,2024-09-24T18:33:02.477000 CVE-2024-4419,0,0,918f3c0166609f9f9b771eac1f6aa12d317d90973a2d5ca4b8b94efa19c28169,2024-05-29T13:02:09.280000 CVE-2024-44190,0,0,5081ce2fbdd1649caaed595db236986bbee24e3cff5adfb1ad5f115afe6eab20,2024-09-24T18:02:25.313000 -CVE-2024-44191,0,1,d240f1b8433a5ce6dbe87e65698049b28e8c35859d01c776684fda07dd899ed0,2024-12-02T15:00:03.333000 +CVE-2024-44191,0,0,d240f1b8433a5ce6dbe87e65698049b28e8c35859d01c776684fda07dd899ed0,2024-12-02T15:00:03.333000 CVE-2024-44193,0,0,f17ea6ad74232cbfafb0dc23bcf4b401977d8786ab1d3a877fc57ebc775c3168,2024-10-04T13:50:43.727000 CVE-2024-44194,0,0,a72a729395908679d65238c4629e953464a1555a31cfb5252936c5c793c0aaa9,2024-10-30T17:16:24.380000 CVE-2024-44196,0,0,37fcda4793ee95ace3154d44d1f0e6b9e5246a54065c19ee694bcd44652d1ff0,2024-11-14T02:15:57.873000 @@ -263395,7 +263399,7 @@ CVE-2024-45511,0,0,a33b00ed5286e02a99a5d7d32b95a722e842936b42cb3272cb3598da23178 CVE-2024-45518,0,0,9735413fa02ac827dc734eb603d392ab15d93caac171e362b785c2b23afa3a6f,2024-10-30T21:23:59.893000 CVE-2024-45519,0,0,ba02770fed1525b5b4f0df98b6cf30b24de2e09da9e676dc121caef23db2992b,2024-10-23T15:39:23.220000 CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000 -CVE-2024-45520,0,0,17c8a5ee333942b254f1fb713e55b8c00193a6e6a8baa3e94cf38a9a53a48bbc,2024-12-01T21:15:04.190000 +CVE-2024-45520,0,1,5466845711de025b484d71bfbeb994612050916cd5bfb23e3333148ac74978ae,2024-12-02T16:15:11.293000 CVE-2024-45522,0,0,cfbe5f5b4866198ecf4773ddc4ec07a576ac517554c3c987f558bc88648f0e9a,2024-09-05T14:29:32.737000 CVE-2024-45523,0,0,e7d93fa702fd02b5bced215282921c641c45ca521a1d9282d8eeca5a4c9e6cac,2024-09-20T14:35:11.523000 CVE-2024-45526,0,0,f14e1fcc5198e28bcb9f7b3a43daa36e99814812ca109c1c007380ac29ec0aa1,2024-10-23T19:35:10.713000 @@ -263510,8 +263514,8 @@ CVE-2024-4576,0,0,d47b5037987d3332638a14c0dba5a2bae073fe818289e35d14fa9c3b2b6479 CVE-2024-45763,0,0,5f7d7ac3b08fad38dc089defb7985eaf73e97a507d7a6c2cb5624891053958df,2024-11-13T16:52:22.340000 CVE-2024-45764,0,0,29e13cb6a03fff5cdc6c3ef68de77f19b0779a31e97cc9e0051ab172b8bd0716,2024-11-13T19:08:29.580000 CVE-2024-45765,0,0,c6c653a57910c9e5fa2a5cae23f65417dd9558dca2f1055224c4f87c49aae5ed,2024-11-13T19:06:45.377000 -CVE-2024-45766,0,1,cb4c3c84c88cb7602021384e9baedee491595bbaa7b7b0edb58660f7b54e9a70,2024-12-02T14:37:32.017000 -CVE-2024-45767,0,1,e26b6101fb9c066a1fced0975b23e5489dc0e2cf80a407cde21f162badb51be3,2024-12-02T14:32:37.183000 +CVE-2024-45766,0,0,cb4c3c84c88cb7602021384e9baedee491595bbaa7b7b0edb58660f7b54e9a70,2024-12-02T14:37:32.017000 +CVE-2024-45767,0,0,e26b6101fb9c066a1fced0975b23e5489dc0e2cf80a407cde21f162badb51be3,2024-12-02T14:32:37.183000 CVE-2024-45769,0,0,68a2a61eadf42c80605ce04117a3301a4bc932c0f0fb7e1da09aa7ee31344d24,2024-11-12T18:15:35.427000 CVE-2024-4577,0,0,b55cac970df35b2daf21f1bc20cfa9dd0965f08c49eae1007fc9a139f9980913,2024-08-14T19:23:47.253000 CVE-2024-45770,0,0,9c8c7fc9fdf0b72fbb9d716faed9837ec24c65464a5ce38c4a50fad0b84880d1,2024-11-12T18:15:35.643000 @@ -264119,6 +264123,11 @@ CVE-2024-46898,0,0,1121a0227e884e663de945d1f5ee0881d2211aaf4fceffe823ea2d2dc74e4 CVE-2024-4690,0,0,8a659fbde289577b9d47a4e0b198b3a10d973db6b9b3690d157fcfdd9eceabd6,2024-10-21T15:51:10.467000 CVE-2024-46902,0,0,27aaa174bb37d07c97f320c2cd9d7af55f96c8335147ef8fc1c8a8b59f67e5a3,2024-10-25T14:50:23.897000 CVE-2024-46903,0,0,c5646f2eca42dcdf58f6c7cfced2b89da0d0fd3b53651fe38e295ee3b07935b5,2024-11-01T19:35:27.957000 +CVE-2024-46905,1,1,61d026d9619c108dab285c18a0cf72d8d80132a58f70faff94aa5509533b9382,2024-12-02T15:15:11.443000 +CVE-2024-46906,1,1,b7342c4add30d58f1a7fc06f53ca3ea14de5f93eb25a93d613be8e7c5aac1102,2024-12-02T15:15:11.633000 +CVE-2024-46907,1,1,99a5d98e415fb461a7a64ecd1233b781d36234e513fb2259d5e67154c9356651,2024-12-02T15:15:11.793000 +CVE-2024-46908,1,1,d9df5230b86009d0e5d988ab260acc4e7ab8189ce25aa89bbb900b7c4573af2b,2024-12-02T15:15:11.967000 +CVE-2024-46909,1,1,b47bd7ac65aae0a6ebdfdafd0dc3e7316ffb6c2826608679aaa969584ac03798,2024-12-02T15:15:12.120000 CVE-2024-46911,0,0,b22e051b0f3c36b9606e67ab41355b75022485dd9540e72995287ed3b5f31c90,2024-11-01T17:35:07.877000 CVE-2024-46914,0,0,8183f2e81bda981099173d1b49f2e9d3c952a93e63b81e2bd23ce00d12f134f9,2024-10-22T22:15:05.810000 CVE-2024-46918,0,0,bb2eeb1c2eb1e1757cf1750044772f91012857866544e10c0b718da276cf0057,2024-09-20T18:14:23.897000 @@ -265322,8 +265331,8 @@ CVE-2024-48952,0,0,7de8f0ffdb763541ab8ce6157f5917743308ff40ebc9162f0a4d60fe92d34 CVE-2024-48953,0,0,79c92dfcc1eac07994739d9fdc765ebb791baa2ff43aa6b181a30c7df184694e,2024-11-08T19:01:03.880000 CVE-2024-48954,0,0,63b3f4d2836dcc48091174845b5c1b8643f6a2efd9748a0593b560920e78e084,2024-11-08T19:01:03.880000 CVE-2024-48955,0,0,84de7be29efb285e46fc24626f552063b1e23de7f9dbbe9943b534f430e239e9,2024-11-01T12:57:35.843000 -CVE-2024-48957,0,1,5fcdfcbeaa463107575a01d5356d8785a9ae755870410379189773fce30e9e71,2024-12-02T14:58:55.063000 -CVE-2024-48958,0,1,4bd7d702f5c7b44ad567fb715dd16e3f71bc515beb7581dcafc207e9d8028dfc,2024-12-02T14:58:37.067000 +CVE-2024-48957,0,0,5fcdfcbeaa463107575a01d5356d8785a9ae755870410379189773fce30e9e71,2024-12-02T14:58:55.063000 +CVE-2024-48958,0,0,4bd7d702f5c7b44ad567fb715dd16e3f71bc515beb7581dcafc207e9d8028dfc,2024-12-02T14:58:37.067000 CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000 CVE-2024-48962,0,0,14108fb7b73c0b556a184000052b7efc5bcd8ed17ac4fdb955d4d3bd57456592,2024-11-19T16:35:14.930000 CVE-2024-48963,0,0,6d60ed9d1e7a308212fb6ea5de6f1d94d8559909dd9cb5f4650d856671de0962,2024-10-30T14:54:53.937000 @@ -267001,7 +267010,7 @@ CVE-2024-51632,0,0,87fad758525004f92b88b536b8c27aff671fa8f7e477425d950b8ceda3786 CVE-2024-51633,0,0,ab393eedb0e80d07a49a4487d5453aa1e835119ca29b1bb333524a32d355d429,2024-11-19T21:57:32.967000 CVE-2024-51634,0,0,5551df4111063f79c80f45a9fb3ddb129d80648222538b01bef381c28a31b983,2024-11-19T21:57:32.967000 CVE-2024-51635,0,0,d5516ce0cdac3298ee81b3844e919736718b17175023ec6bb1c2bb190d6edfc9,2024-11-19T21:57:32.967000 -CVE-2024-51636,0,1,3aaa551b36e73792d7567532256f3bf6656ad181fee958a5f72303a1ecc243aa,2024-12-02T14:15:06.113000 +CVE-2024-51636,0,0,3aaa551b36e73792d7567532256f3bf6656ad181fee958a5f72303a1ecc243aa,2024-12-02T14:15:06.113000 CVE-2024-51637,0,0,2cb3f79f6b2ca81a1706ba6f61023d68321f37eaa82fecbe7301abd27dfed33a,2024-11-19T21:57:32.967000 CVE-2024-51638,0,0,305fcbfa70d32882ab369962766db28a91a50ef3f65dd5e460149e1ffc8e609e,2024-11-19T21:57:32.967000 CVE-2024-51639,0,0,2651e0f528caf9d7ddb4394ab6753df06682b03424a2ec033106c12d483149ca,2024-11-19T21:57:32.967000 @@ -267254,7 +267263,7 @@ CVE-2024-51897,0,0,7af160c26a8eab6d1292ed66c346916bc23dc809fb55b05ad17b230c4e66e CVE-2024-51898,0,0,7d6b408e02cf476177e2ee8596272af601038bf9941353af8f1d4acd09aa6c8b,2024-11-19T21:56:45.533000 CVE-2024-51899,0,0,902a276081bf2d9ed5344710e0e77e28a363d244033c8781dac2e21740c3dfc9,2024-11-19T21:56:45.533000 CVE-2024-5190,0,0,d58b9fdaecdb1abec20ccf7764e52a460a4959870ee8917a6c4a9f4c686657e6,2024-05-22T03:15:08.273000 -CVE-2024-51900,1,1,badacb405c92269b37e2a451290dd43a4c8cbc001dde771fd2b2a812f963398e,2024-12-02T14:15:06.237000 +CVE-2024-51900,0,0,badacb405c92269b37e2a451290dd43a4c8cbc001dde771fd2b2a812f963398e,2024-12-02T14:15:06.237000 CVE-2024-51901,0,0,fe9569935e40c0112f410f7d6478fcefec0cdb856293fc5c3a3dc5c73b43b02f,2024-11-19T21:56:45.533000 CVE-2024-51902,0,0,9d10b45ca3b42a2dbd37bef0ae6acb43fd724502f4505049fa1ca9dac36b59cc,2024-11-19T21:56:45.533000 CVE-2024-51903,0,0,280cea4973a8e0b67d936c40c3b0e7998c13aa3732970dc92abf9a6554add514,2024-11-19T21:56:45.533000 @@ -267404,7 +267413,7 @@ CVE-2024-52318,0,0,2bba437e59239c6e36ab9227be3e173d0f3c7cc38d614e024ac840e507a6b CVE-2024-5232,0,0,8d68905f3b69b3dadb32694d2c73f30dc32ad3c794d56bacf5b1c8bfed3d3bb6,2024-06-04T19:21:02.890000 CVE-2024-52323,0,0,4140a8efee2487f8a0ab9781f1095192b3a647c23a2a9eaba3cf214b9a3b68db,2024-11-27T15:15:26.377000 CVE-2024-5233,0,0,d230ff373762a089849cb791769c151d4d1eb1a364270894bffa0dbac945e679,2024-06-04T19:21:02.993000 -CVE-2024-52336,0,1,9862ee2f08b867c4aec9679fde3c34020806d6ea0e1bbe82d4d6575bb6602628,2024-12-02T14:15:06.410000 +CVE-2024-52336,0,0,9862ee2f08b867c4aec9679fde3c34020806d6ea0e1bbe82d4d6575bb6602628,2024-12-02T14:15:06.410000 CVE-2024-52337,0,0,9656de207aa30a2d131aa04cba5e006cf8cd5efaccbbfa03406364f930f0e487,2024-12-02T08:15:07.793000 CVE-2024-52338,0,0,9bcca0f5584def2789a1613da17d1dfa11f003cf9877e634fced8f070cd4a571,2024-11-29T15:15:17.550000 CVE-2024-52339,0,0,a92fd5f858dc2ec0979f9ef9252c34f43da704c1fe29995d6e8479e981a2460e,2024-11-19T21:57:32.967000 @@ -267521,25 +267530,25 @@ CVE-2024-52449,0,0,ce90d5d55e8436b94a304efc19163b49c2f5473c38f99b1a35c1d69e33313 CVE-2024-5245,0,0,8367cc316d7fd622697ed020483e2edc6264aea8aa776978b7228518baa31702,2024-05-24T01:15:30.977000 CVE-2024-52450,0,0,002d848f8b202503bc5f349083e6360328b5ca35b8e488d4cb20477667418239,2024-11-20T12:15:22.203000 CVE-2024-52451,0,0,c4dda19ad903fd6f4cd91db91be4b7e0b1f40513a3624be5b88bb657ca6869ae,2024-11-20T12:15:22.427000 -CVE-2024-52452,1,1,bc13343fcbf76bb3829e38d8db3147826917da6cdd8876ae77531d9ebf19b86f,2024-12-02T14:15:06.550000 -CVE-2024-52453,1,1,58aba024649b67cdf665eb01918a80f1494450c78d3a4411a274ae5f3514bd8a,2024-12-02T14:15:06.697000 -CVE-2024-52454,1,1,2fd6a219eed38a4bc0ee579c8c751552c3f30c7f817d3a87601b6eb6bcc1b94a,2024-12-02T14:15:06.840000 -CVE-2024-52455,1,1,33dd3225e538e286028e3cbc3e276350d854ab06fa8b045ed5c8c191a8f87e44,2024-12-02T14:15:06.983000 -CVE-2024-52456,1,1,2f3133879862d0fe3e638d35022569034a9af171e0c8ed120e511dbf1776bfb8,2024-12-02T14:15:07.117000 -CVE-2024-52457,1,1,a709c2052b7ddba821142d57c4c7896d7a20113b3dc0192caa04e7cf0bb6f66f,2024-12-02T14:15:07.250000 -CVE-2024-52458,1,1,6502153a77f8617481cad7902ce81f668fc42b58dacb8485aecbddfe94bf492b,2024-12-02T14:15:07.380000 -CVE-2024-52459,1,1,55afeec3eeccc511235207b3771d1c6af16d6aa7896c8305d0fdbdcb38ef1b12,2024-12-02T14:15:07.513000 +CVE-2024-52452,0,0,bc13343fcbf76bb3829e38d8db3147826917da6cdd8876ae77531d9ebf19b86f,2024-12-02T14:15:06.550000 +CVE-2024-52453,0,0,58aba024649b67cdf665eb01918a80f1494450c78d3a4411a274ae5f3514bd8a,2024-12-02T14:15:06.697000 +CVE-2024-52454,0,0,2fd6a219eed38a4bc0ee579c8c751552c3f30c7f817d3a87601b6eb6bcc1b94a,2024-12-02T14:15:06.840000 +CVE-2024-52455,0,0,33dd3225e538e286028e3cbc3e276350d854ab06fa8b045ed5c8c191a8f87e44,2024-12-02T14:15:06.983000 +CVE-2024-52456,0,0,2f3133879862d0fe3e638d35022569034a9af171e0c8ed120e511dbf1776bfb8,2024-12-02T14:15:07.117000 +CVE-2024-52457,0,0,a709c2052b7ddba821142d57c4c7896d7a20113b3dc0192caa04e7cf0bb6f66f,2024-12-02T14:15:07.250000 +CVE-2024-52458,0,0,6502153a77f8617481cad7902ce81f668fc42b58dacb8485aecbddfe94bf492b,2024-12-02T14:15:07.380000 +CVE-2024-52459,0,0,55afeec3eeccc511235207b3771d1c6af16d6aa7896c8305d0fdbdcb38ef1b12,2024-12-02T14:15:07.513000 CVE-2024-5246,0,0,481ebf23b779dd3e32e9e0cda77aaee7d0bfc9eca82266cde6c77415f4c9c730,2024-07-03T02:08:44.767000 -CVE-2024-52460,1,1,87f8de4fb3fab1fcc0df5618b7221ec6995e7325e8503015d6ba0eb1192cdc69,2024-12-02T14:15:07.653000 -CVE-2024-52461,1,1,bde36cecbc200ffe75ac528c9df661646e035db31a30bdbea7facb96b6eec1f4,2024-12-02T14:15:07.790000 -CVE-2024-52462,1,1,1e90660cc68a029bf2e5a099e092ea72c38a8f81deb2bc1e20234a6a34cf9162,2024-12-02T14:15:07.920000 -CVE-2024-52463,1,1,9ec2fe67aaaad39208b3421e4770afee11c942b11b07cff42ddb11baaf570225,2024-12-02T14:15:08.060000 -CVE-2024-52464,1,1,031bfdf41e345937a9ce7756b575ac3713282840fa3ca4cf756c521b99bb4a5c,2024-12-02T14:15:08.203000 -CVE-2024-52465,1,1,c9036b37facbb7454a9ddf2e86a6632906e042aa66e5a04c075cddc4674e7247,2024-12-02T14:15:08.340000 -CVE-2024-52466,1,1,878900695074605262b24c8c5022ef92d0aa56180ded5d79a557e300e606830c,2024-12-02T14:15:08.483000 -CVE-2024-52467,1,1,432b831d67d68137794f273f683f80722dfe00b9dd75984abc6c3b2e88ddbc0f,2024-12-02T14:15:08.623000 -CVE-2024-52468,1,1,49677279abc9e9bfe590e078b06da078900d69091d80136c560ec44d37561772,2024-12-02T14:15:08.770000 -CVE-2024-52469,1,1,29dfc335d1fa6e30d786d9c43bf1c443d1b2ec28197000ac250b34a50eda9466,2024-12-02T14:15:08.913000 +CVE-2024-52460,0,0,87f8de4fb3fab1fcc0df5618b7221ec6995e7325e8503015d6ba0eb1192cdc69,2024-12-02T14:15:07.653000 +CVE-2024-52461,0,0,bde36cecbc200ffe75ac528c9df661646e035db31a30bdbea7facb96b6eec1f4,2024-12-02T14:15:07.790000 +CVE-2024-52462,0,0,1e90660cc68a029bf2e5a099e092ea72c38a8f81deb2bc1e20234a6a34cf9162,2024-12-02T14:15:07.920000 +CVE-2024-52463,0,0,9ec2fe67aaaad39208b3421e4770afee11c942b11b07cff42ddb11baaf570225,2024-12-02T14:15:08.060000 +CVE-2024-52464,0,0,031bfdf41e345937a9ce7756b575ac3713282840fa3ca4cf756c521b99bb4a5c,2024-12-02T14:15:08.203000 +CVE-2024-52465,0,0,c9036b37facbb7454a9ddf2e86a6632906e042aa66e5a04c075cddc4674e7247,2024-12-02T14:15:08.340000 +CVE-2024-52466,0,0,878900695074605262b24c8c5022ef92d0aa56180ded5d79a557e300e606830c,2024-12-02T14:15:08.483000 +CVE-2024-52467,0,0,432b831d67d68137794f273f683f80722dfe00b9dd75984abc6c3b2e88ddbc0f,2024-12-02T14:15:08.623000 +CVE-2024-52468,0,0,49677279abc9e9bfe590e078b06da078900d69091d80136c560ec44d37561772,2024-12-02T14:15:08.770000 +CVE-2024-52469,0,0,29dfc335d1fa6e30d786d9c43bf1c443d1b2ec28197000ac250b34a50eda9466,2024-12-02T14:15:08.913000 CVE-2024-5247,0,0,fdfe6c1388c42f602cdcb0ffda38b56b5f1ed960e60bfada435f42d294b2956e,2024-05-24T01:15:30.977000 CVE-2024-52470,0,0,1056a8e921e929245f25b46d1b7e1a435f2ea3ebf136056d5c86cf3721d0fcd8,2024-11-20T15:15:10.810000 CVE-2024-52471,0,0,d8b300ef69bfcbcb29a9b3cfe811f085cc9237972a5d7ecbe7073758ecdf12a9,2024-11-20T15:15:11.010000 @@ -267547,24 +267556,24 @@ CVE-2024-52472,0,0,ce2cab3222d8b621b2ba91024fe7494b0185a8ad2ea776f56b82d385cdb5d CVE-2024-52473,0,0,5130e33c6a3f3d98a0fc58c19aa3c06c52bf935b44f029d120d52d53c95d1f26,2024-11-20T15:15:11.443000 CVE-2024-52474,0,0,f35fcf6a40f916b46540ce59f11d6616c6973d4c68f74d2e36288e6d9b91ae09,2024-11-28T11:15:48.860000 CVE-2024-52475,0,0,048f430e71cfa65b9b5c0a7120c7de2380a4c37fa4de1243200864d13928e676,2024-11-28T11:15:49.230000 -CVE-2024-52476,1,1,24ce0352084a1dc0a16a98d084aee0b62026042152486af1e8ab7dae94c8d355,2024-12-02T14:15:09.050000 -CVE-2024-52477,1,1,f9b570c926f4427f2c4e7acb1de83616be97918287125ef3322b663c639dae1b,2024-12-02T14:15:09.193000 -CVE-2024-52478,1,1,979f89fe1bb5f90913cccfda292a213d9b495c6eca1a7fb83b205601eb767c82,2024-12-02T14:15:09.327000 -CVE-2024-52479,1,1,89aa81ba08f605f73250cbd52feffc34bbc76e14c68c0a4506229004da0a9e99,2024-12-02T14:15:09.467000 +CVE-2024-52476,0,0,24ce0352084a1dc0a16a98d084aee0b62026042152486af1e8ab7dae94c8d355,2024-12-02T14:15:09.050000 +CVE-2024-52477,0,0,f9b570c926f4427f2c4e7acb1de83616be97918287125ef3322b663c639dae1b,2024-12-02T14:15:09.193000 +CVE-2024-52478,0,0,979f89fe1bb5f90913cccfda292a213d9b495c6eca1a7fb83b205601eb767c82,2024-12-02T14:15:09.327000 +CVE-2024-52479,0,0,89aa81ba08f605f73250cbd52feffc34bbc76e14c68c0a4506229004da0a9e99,2024-12-02T14:15:09.467000 CVE-2024-5248,0,0,6cfa5cec6de457c13d7096887dc7c2d8bd99f0e898238886822e69d1ee66037e,2024-11-03T17:15:14.860000 CVE-2024-52481,0,0,f36c3b5551b68230f3193251192fab779548872795820d8881203867d93fb076,2024-11-28T11:15:49.610000 -CVE-2024-52482,1,1,66920610aeb0672798a92bda44313435992ca28aa2ab7d80c6084695c5a3abd3,2024-12-02T14:15:09.603000 -CVE-2024-52483,1,1,421c897462ffa23d75cbdd42f2c4e63b8e0ddabed480eae9f0247c22337c0f3b,2024-12-02T14:15:09.740000 -CVE-2024-52484,1,1,869607d023f3bda61d41d3bfcafcce06b33151761bbfbb970f457a99612ecd1b,2024-12-02T14:15:09.883000 -CVE-2024-52486,1,1,8a0a52f7402b56decea279ee59c65abbc9180153b2a53d82bf2a98b901125841,2024-12-02T14:15:10.017000 -CVE-2024-52487,1,1,a975e2630c024ce5a1fd1828822b3b86d8c2b6f2a63e9b66d8ac8a9f129df561,2024-12-02T14:15:10.147000 -CVE-2024-52489,1,1,f3795b6d56a86a6d171db095c8c53aebf9469102a89b47da6cd1c56e1f0bce1b,2024-12-02T14:15:10.320000 +CVE-2024-52482,0,0,66920610aeb0672798a92bda44313435992ca28aa2ab7d80c6084695c5a3abd3,2024-12-02T14:15:09.603000 +CVE-2024-52483,0,0,421c897462ffa23d75cbdd42f2c4e63b8e0ddabed480eae9f0247c22337c0f3b,2024-12-02T14:15:09.740000 +CVE-2024-52484,0,0,869607d023f3bda61d41d3bfcafcce06b33151761bbfbb970f457a99612ecd1b,2024-12-02T14:15:09.883000 +CVE-2024-52486,0,0,8a0a52f7402b56decea279ee59c65abbc9180153b2a53d82bf2a98b901125841,2024-12-02T14:15:10.017000 +CVE-2024-52487,0,0,a975e2630c024ce5a1fd1828822b3b86d8c2b6f2a63e9b66d8ac8a9f129df561,2024-12-02T14:15:10.147000 +CVE-2024-52489,0,0,f3795b6d56a86a6d171db095c8c53aebf9469102a89b47da6cd1c56e1f0bce1b,2024-12-02T14:15:10.320000 CVE-2024-5249,0,0,7881e207dd06fe76500d559735f87b1084a494789351514ee988debe74e79673,2024-10-01T14:26:17.410000 CVE-2024-52490,0,0,2f72bf6f16e7c1ef88a5ad166ff8106f5613b7783eca5a9de13741c356393c41,2024-11-28T11:15:49.980000 -CVE-2024-52491,1,1,613ae9d1031fdb253bb0bb1cd51ed7581b825754c52cbd0063442090fc1b7131,2024-12-02T14:15:10.483000 -CVE-2024-52492,1,1,18e87e530f0418953a743771c45592e2b024ec189c852fa405f0e68051862e41,2024-12-02T14:15:10.617000 -CVE-2024-52493,1,1,8a4e3c973874adabd430340b8254b92f19df65bc9cd9b66492a3b48d711f1770,2024-12-02T14:15:10.760000 -CVE-2024-52494,1,1,bf5dd1b631179b8d9daa1278ac8f984ff6df107e65e931981f5b743066661f07,2024-12-02T14:15:10.897000 +CVE-2024-52491,0,0,613ae9d1031fdb253bb0bb1cd51ed7581b825754c52cbd0063442090fc1b7131,2024-12-02T14:15:10.483000 +CVE-2024-52492,0,0,18e87e530f0418953a743771c45592e2b024ec189c852fa405f0e68051862e41,2024-12-02T14:15:10.617000 +CVE-2024-52493,0,0,8a4e3c973874adabd430340b8254b92f19df65bc9cd9b66492a3b48d711f1770,2024-12-02T14:15:10.760000 +CVE-2024-52494,0,0,bf5dd1b631179b8d9daa1278ac8f984ff6df107e65e931981f5b743066661f07,2024-12-02T14:15:10.897000 CVE-2024-52495,0,0,90a5d94a83491ba0aa9e1a9e4a4f5fe0ca98459576244f5c8b05a77af4905f58,2024-11-28T11:15:50.340000 CVE-2024-52496,0,0,3f7e072f25a3e2e86befaba43547621d2bd70978a190ba0cbf1154b522b2b4fc,2024-11-28T11:15:50.703000 CVE-2024-52497,0,0,2dfb67ac6989206e43becb4cadecdbbe12f14d96dff6ad787aa10ac60639df51,2024-11-28T11:15:51.137000 @@ -267572,8 +267581,8 @@ CVE-2024-52498,0,0,7dc88433e35e501a5376d838b1b69e48bc75ad19918b9c65d7419f1705de8 CVE-2024-52499,0,0,ab893b1d1da52473926df770d37b1bfb72a33c2a9668548c2bac1caa129bcb8a,2024-11-28T11:15:51.957000 CVE-2024-5250,0,0,b4b370273f1fe30d94b715ad219dda570a7dcb84192abd50c3cb746299bdbb93,2024-10-01T14:33:47.727000 CVE-2024-52501,0,0,820788b8853098079143f7490c7b02533ae4f012d58a67dd13e49f2a3e89b88a,2024-11-28T11:15:52.363000 -CVE-2024-52502,1,1,817678ccc832c380487555bf34da66a26c99b2c375aaddd8612ad01746353d13,2024-12-02T14:15:11.037000 -CVE-2024-52503,1,1,1aabb91bd5ca11fde2744394e4b7d174b6ee8c54b337bdf2c119b033f8364cb0,2024-12-02T14:15:11.177000 +CVE-2024-52502,0,0,817678ccc832c380487555bf34da66a26c99b2c375aaddd8612ad01746353d13,2024-12-02T14:15:11.037000 +CVE-2024-52503,0,0,1aabb91bd5ca11fde2744394e4b7d174b6ee8c54b337bdf2c119b033f8364cb0,2024-12-02T14:15:11.177000 CVE-2024-52505,0,0,7c58f328eee3b40bfcef13b278250e7509b58c18af26b7fe642ca2ce116c61a9,2024-11-15T13:58:08.913000 CVE-2024-52506,0,0,9420310376fa2dd9c3501acaf4dd8ad5c343b22844be701c8938f04ee189a7d8,2024-11-19T21:57:32.967000 CVE-2024-52507,0,0,18377407544f5a86346c3ba14b439e11d26f6fdcec177783785d2e2abbc40b48,2024-11-18T17:11:56.587000 @@ -267663,6 +267672,7 @@ CVE-2024-52723,0,0,5e158b9e6ae935fe53fcd904758ef5184a80e91ca85495f081966847a4cf0 CVE-2024-52725,0,0,33f6fa34c3dd7f326aa8525752182246593fbe26f97c40f7481f5dc188051048,2024-11-20T17:15:18.867000 CVE-2024-52726,0,0,07104ca9c9e8f2a3a4e4ad76e018b45eb5df5070643287e443babd815c74fea3,2024-11-27T17:15:13.463000 CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000 +CVE-2024-52732,1,1,d6a80ccb8de450005a7cb1743d48fc0ea7e9c3041c776b4edbabfa2f08461cb5,2024-12-02T15:15:12.270000 CVE-2024-52739,0,0,e67c6617d90c4f2c32d6849dbe6387498e43b14fb180727dba9b598a59a70f9d,2024-11-20T20:35:16.147000 CVE-2024-5274,0,0,c24e97658283aca2d227c212a256ad0361bc0b2f150a90ed4a532bb6225b406f,2024-11-27T18:12:51.690000 CVE-2024-5275,0,0,0a8f92936fd54cfeba80497afbb5044228db5d667d0dcb3a75c34af54c4c0fca,2024-06-20T12:44:01.637000 @@ -267814,28 +267824,28 @@ CVE-2024-53101,0,0,be92e9e8d17dfd621b3b25a601d91583efd6dd3a3dcb841c50fadbb794469 CVE-2024-53102,0,0,066d999453d30a546d39a31866cdbaeffc79fa681b911ec129d6f4d4ed9a482b,2024-11-25T22:15:17.553000 CVE-2024-53103,0,0,114b1bd1d86e3038b5fca99e3f30f1382e9859e6ca578fca04e8084d60836cbd,2024-12-02T08:15:08.537000 CVE-2024-53104,0,0,96fbf37e91f40bafe9df3c78316e1cf66865f2d1a8b59bc0e99acfbf7bd2520e,2024-12-02T08:15:08.687000 -CVE-2024-53105,1,1,34fb59c99973b0ac20157c5f762b90fa1db6c744c0c3a4f77e1dd477075d668c,2024-12-02T14:15:11.313000 -CVE-2024-53106,1,1,4840ef2d3246a88b8027eadb2cd2135b951add8b3c7bb0be210467bca7751137,2024-12-02T14:15:11.420000 -CVE-2024-53107,1,1,4b84755f171f25522003c482aa7c9bbc1693aeb50d66bdc27785a0eb26087dc7,2024-12-02T14:15:11.523000 -CVE-2024-53108,1,1,844e3ba3acba4692054e1e31baea66c1ccdb5b3cf6374037fd9f5faa749e94f0,2024-12-02T14:15:11.617000 -CVE-2024-53109,1,1,7f26b5fbd302d9428fb778898098f50613f01301f474333bf4c2e409087dd77d,2024-12-02T14:15:11.713000 +CVE-2024-53105,0,0,34fb59c99973b0ac20157c5f762b90fa1db6c744c0c3a4f77e1dd477075d668c,2024-12-02T14:15:11.313000 +CVE-2024-53106,0,0,4840ef2d3246a88b8027eadb2cd2135b951add8b3c7bb0be210467bca7751137,2024-12-02T14:15:11.420000 +CVE-2024-53107,0,0,4b84755f171f25522003c482aa7c9bbc1693aeb50d66bdc27785a0eb26087dc7,2024-12-02T14:15:11.523000 +CVE-2024-53108,0,0,844e3ba3acba4692054e1e31baea66c1ccdb5b3cf6374037fd9f5faa749e94f0,2024-12-02T14:15:11.617000 +CVE-2024-53109,0,0,7f26b5fbd302d9428fb778898098f50613f01301f474333bf4c2e409087dd77d,2024-12-02T14:15:11.713000 CVE-2024-5311,0,0,4e4e9b4edb642fa4d04760ded51b93254fd12f5bde190a96e2c1818c58cf4797,2024-06-03T14:46:24.250000 -CVE-2024-53110,1,1,4fb57ef18c905c99d2ef421edab043e7e478bc8dbb022435b6245e56d9a936cd,2024-12-02T14:15:11.803000 -CVE-2024-53111,1,1,ff35a79dfa18e9a3c4b3d829b0c454b489b08308fddaa4f3b24236629109a596,2024-12-02T14:15:11.903000 -CVE-2024-53112,1,1,493e428622d78ea7d1db31e2e4c853a634f05b801abdf51906d6cfb64c66e04d,2024-12-02T14:15:11.997000 -CVE-2024-53113,1,1,23898fdc6e9baeb57bc1e1a8ad0c7b5eeec55fa8aa89c67420cf40f70626cbbf,2024-12-02T14:15:12.097000 -CVE-2024-53114,1,1,ddbfe6b02798114c2beb1a23a1afd80c6c7ee628dfd08f03d1e8a97ebd3e0615,2024-12-02T14:15:12.197000 -CVE-2024-53115,1,1,0d48a8162cdf298c9e7d3f2ab0b4a676a02670bb4fddc2176cb34be1974bc124,2024-12-02T14:15:12.287000 -CVE-2024-53116,1,1,6e4334a37e5ca8e626d3791eaa06fe3fb0c570ea98c44807298b3f1a50c04120,2024-12-02T14:15:12.373000 -CVE-2024-53117,1,1,e6a5e215dac200b4de300b17050399c9627434ea4a40734723b977ef04223257,2024-12-02T14:15:12.470000 -CVE-2024-53118,1,1,983c7d703cc35f8f5107da873eff3b2d2baf701213c52ff3a3bff415e0b25e85,2024-12-02T14:15:12.567000 -CVE-2024-53119,1,1,4d7ccd81b9b7ab1264f542f39181ad9d6bc9a645bb5abc598e2f18106a8f74bf,2024-12-02T14:15:12.667000 +CVE-2024-53110,0,0,4fb57ef18c905c99d2ef421edab043e7e478bc8dbb022435b6245e56d9a936cd,2024-12-02T14:15:11.803000 +CVE-2024-53111,0,0,ff35a79dfa18e9a3c4b3d829b0c454b489b08308fddaa4f3b24236629109a596,2024-12-02T14:15:11.903000 +CVE-2024-53112,0,0,493e428622d78ea7d1db31e2e4c853a634f05b801abdf51906d6cfb64c66e04d,2024-12-02T14:15:11.997000 +CVE-2024-53113,0,0,23898fdc6e9baeb57bc1e1a8ad0c7b5eeec55fa8aa89c67420cf40f70626cbbf,2024-12-02T14:15:12.097000 +CVE-2024-53114,0,0,ddbfe6b02798114c2beb1a23a1afd80c6c7ee628dfd08f03d1e8a97ebd3e0615,2024-12-02T14:15:12.197000 +CVE-2024-53115,0,0,0d48a8162cdf298c9e7d3f2ab0b4a676a02670bb4fddc2176cb34be1974bc124,2024-12-02T14:15:12.287000 +CVE-2024-53116,0,0,6e4334a37e5ca8e626d3791eaa06fe3fb0c570ea98c44807298b3f1a50c04120,2024-12-02T14:15:12.373000 +CVE-2024-53117,0,0,e6a5e215dac200b4de300b17050399c9627434ea4a40734723b977ef04223257,2024-12-02T14:15:12.470000 +CVE-2024-53118,0,0,983c7d703cc35f8f5107da873eff3b2d2baf701213c52ff3a3bff415e0b25e85,2024-12-02T14:15:12.567000 +CVE-2024-53119,0,0,4d7ccd81b9b7ab1264f542f39181ad9d6bc9a645bb5abc598e2f18106a8f74bf,2024-12-02T14:15:12.667000 CVE-2024-5312,0,0,18bbe6bd336686ff14003841f43dce1a45b7d1ab8cfffd6fca5539a180b7243f,2024-05-24T13:03:05.093000 -CVE-2024-53120,1,1,919be945ca98aed53fcad18380cf849dcdc8741181a721036f5386ccba7f0308,2024-12-02T14:15:12.773000 -CVE-2024-53121,1,1,0df4084097284edf0dd35ebbe17aab3a3d685c9d3fdc3da9364efeff401621a2,2024-12-02T14:15:12.877000 -CVE-2024-53122,1,1,1c299a2688f6ab9dded70cf6b0cfd3aeafa91db46a3f4d275e9dee3fcde2a23a,2024-12-02T14:15:13.010000 -CVE-2024-53123,1,1,dcef2903ddd7f9038bf183b6ef6585245f13744aad480c16672e1f79f35f6cd8,2024-12-02T14:15:13.120000 -CVE-2024-53124,1,1,ce00db9f52d4602938a9498c77e180ac9ff339a933c4e30878280323c81f97d8,2024-12-02T14:15:13.220000 +CVE-2024-53120,0,0,919be945ca98aed53fcad18380cf849dcdc8741181a721036f5386ccba7f0308,2024-12-02T14:15:12.773000 +CVE-2024-53121,0,0,0df4084097284edf0dd35ebbe17aab3a3d685c9d3fdc3da9364efeff401621a2,2024-12-02T14:15:12.877000 +CVE-2024-53122,0,0,1c299a2688f6ab9dded70cf6b0cfd3aeafa91db46a3f4d275e9dee3fcde2a23a,2024-12-02T14:15:13.010000 +CVE-2024-53123,0,0,dcef2903ddd7f9038bf183b6ef6585245f13744aad480c16672e1f79f35f6cd8,2024-12-02T14:15:13.120000 +CVE-2024-53124,0,0,ce00db9f52d4602938a9498c77e180ac9ff339a933c4e30878280323c81f97d8,2024-12-02T14:15:13.220000 CVE-2024-5313,0,0,f1cdfb8a50e98ae6ac3af0ea1d50716e060963965a73a7d8f531b777ae15b8ad,2024-08-14T13:40:02.907000 CVE-2024-5314,0,0,a7cdac28c15b59d972bbd1ad7f63aae58232f4c63fcf8544d4cfc91c709ee3db,2024-05-24T13:03:05.093000 CVE-2024-5315,0,0,8579169b825e98cf3238daa1adb0a4d2ea9e4baf40a7a9906b16d52fd8bd309a,2024-05-24T13:03:05.093000 @@ -267881,6 +267891,7 @@ CVE-2024-5343,0,0,fedc1366914170279f2e5d2ad585273a49bb658750b62f8b5bda5b06ac846b CVE-2024-53438,0,0,269e7677ace7d9295c53368d7a770c8536638e497558c04303dcd88d3a89eb20,2024-11-27T17:15:14.647000 CVE-2024-5344,0,0,b9eb66177d3d824bf1f1529dfc9f0ece4e45e95565139113aee3e384e4e64696,2024-07-17T03:07:04.743000 CVE-2024-5345,0,0,e63bd8698ebea410f9684596571cb5f236dcece9e087d3c47739e1f377731d0e,2024-05-31T13:01:46.727000 +CVE-2024-53459,1,1,245c76a8b1f2e6c0f50dde2742a33bf75027788f3843da5272c1752af8a62ac6,2024-12-02T16:15:12.637000 CVE-2024-5346,0,0,da43d69a3160345da9f992308a5772b156b46661e78425f332f67d306a3affb7,2024-06-24T20:00:59.240000 CVE-2024-5347,0,0,16093735dbce016cf2430c73a4d8045f77e47434e1c219ace83416138a28cb5d,2024-05-31T13:01:46.727000 CVE-2024-5348,0,0,bc3d8d1f3668d1fc879553d2a82a62e6b9980757b64bfd9f1d5fdacf853f73c6,2024-06-03T14:46:24.250000 @@ -267927,33 +267938,33 @@ CVE-2024-5368,0,0,769eef522c880c8dc2093ffee3167938a54b59c296f29ac57c1d46dc08bc9b CVE-2024-5369,0,0,29d3079c2fa6a7da6972686f223f9055b777de966536d115ae3b502886660c79,2024-06-07T20:15:12.487000 CVE-2024-5370,0,0,8d5901c25d38686248547e2a8832556411ad40480084c4770850db2b44d5a57a,2024-06-04T19:21:06.980000 CVE-2024-53701,0,0,f4abe9649c710b202319e22139a56475c551199e0e3e57f7ccc2eaf6ea401cc5,2024-11-29T06:15:07.327000 -CVE-2024-53707,1,1,a9246f735bee9bc7750700a9c6002bb8b6dde861692868616037fa1dcb717775,2024-12-02T14:15:13.323000 -CVE-2024-53708,1,1,efaeb83838813199845e63e7481a204f70f52ca3d8667f17b131ad7d329a0921,2024-12-02T14:15:13.457000 -CVE-2024-53709,1,1,b365e38c63651e90ce91d3f404bbdba8b1cb0d65ff4d68d2e2fbafcce3c07dbd,2024-12-02T14:15:13.600000 +CVE-2024-53707,0,0,a9246f735bee9bc7750700a9c6002bb8b6dde861692868616037fa1dcb717775,2024-12-02T14:15:13.323000 +CVE-2024-53708,0,0,efaeb83838813199845e63e7481a204f70f52ca3d8667f17b131ad7d329a0921,2024-12-02T14:15:13.457000 +CVE-2024-53709,0,0,b365e38c63651e90ce91d3f404bbdba8b1cb0d65ff4d68d2e2fbafcce3c07dbd,2024-12-02T14:15:13.600000 CVE-2024-5371,0,0,56fb3bd7c83fca20345b3582754dbd2980927fa93a960aec189b84900cda47f4,2024-06-04T19:21:07.077000 -CVE-2024-53710,1,1,2388ff8ef4cd70b631a86988ad13ac01fba3196ca7c9ac387e78a637e7ef3fe8,2024-12-02T14:15:13.737000 -CVE-2024-53711,1,1,20fb68ceecb54ff9b2b1116de6fd531c547a2a52d35dacb9be1a576a92bd42ab,2024-12-02T14:15:13.870000 -CVE-2024-53712,1,1,09f6eb78a2cb9e7568462e532276050a640ce974616ee2a3855dee11b37fabff,2024-12-02T14:15:14.013000 -CVE-2024-53713,1,1,9f246873795e1272a31fbb32b7c02579edffea0825b53cfebaf45746d6bce0e5,2024-12-02T14:15:14.147000 -CVE-2024-53714,1,1,2bffec3a91f0924d93372fd1fbd1c04445c95e3ab0b62b38976176b823d13c83,2024-12-02T14:15:14.277000 -CVE-2024-53715,1,1,c6c2355dbe197083e5715b0994e93053d2ddc78fd188e1a6cb9186758f325f46,2024-12-02T14:15:14.413000 -CVE-2024-53716,1,1,e51d9dfe781b278f0ae731aae086c033ec86bd3d0a64dbdf44932fea1a5c7961,2024-12-02T14:15:14.540000 -CVE-2024-53717,1,1,2f6855af9b2f8b0110f0b4ee721080608f0a3473c68f029f03260ba243eab2a9,2024-12-02T14:15:14.680000 -CVE-2024-53718,1,1,101d023e9c16d770e2deb7a7d5c5ad40762520189266fbe72600a352e4961217,2024-12-02T14:15:14.820000 -CVE-2024-53719,1,1,4bf5fadb47435621b60ae954c454e8fed1ea38ebaf266ec20ce78d94cb0f71ed,2024-12-02T14:15:14.953000 +CVE-2024-53710,0,0,2388ff8ef4cd70b631a86988ad13ac01fba3196ca7c9ac387e78a637e7ef3fe8,2024-12-02T14:15:13.737000 +CVE-2024-53711,0,0,20fb68ceecb54ff9b2b1116de6fd531c547a2a52d35dacb9be1a576a92bd42ab,2024-12-02T14:15:13.870000 +CVE-2024-53712,0,0,09f6eb78a2cb9e7568462e532276050a640ce974616ee2a3855dee11b37fabff,2024-12-02T14:15:14.013000 +CVE-2024-53713,0,0,9f246873795e1272a31fbb32b7c02579edffea0825b53cfebaf45746d6bce0e5,2024-12-02T14:15:14.147000 +CVE-2024-53714,0,0,2bffec3a91f0924d93372fd1fbd1c04445c95e3ab0b62b38976176b823d13c83,2024-12-02T14:15:14.277000 +CVE-2024-53715,0,0,c6c2355dbe197083e5715b0994e93053d2ddc78fd188e1a6cb9186758f325f46,2024-12-02T14:15:14.413000 +CVE-2024-53716,0,0,e51d9dfe781b278f0ae731aae086c033ec86bd3d0a64dbdf44932fea1a5c7961,2024-12-02T14:15:14.540000 +CVE-2024-53717,0,0,2f6855af9b2f8b0110f0b4ee721080608f0a3473c68f029f03260ba243eab2a9,2024-12-02T14:15:14.680000 +CVE-2024-53718,0,0,101d023e9c16d770e2deb7a7d5c5ad40762520189266fbe72600a352e4961217,2024-12-02T14:15:14.820000 +CVE-2024-53719,0,0,4bf5fadb47435621b60ae954c454e8fed1ea38ebaf266ec20ce78d94cb0f71ed,2024-12-02T14:15:14.953000 CVE-2024-5372,0,0,d8d2417bd06fb1324e3d48551a2db8f1959a8f0e0eac596d597fb3248c5962f3,2024-05-28T12:39:28.377000 -CVE-2024-53720,1,1,f688959dbf12eb2ea0f499fdf8c28f44211499cd2e44c3ed89fcdda3081e4f61,2024-12-02T14:15:15.090000 -CVE-2024-53721,1,1,a8b61c0607329498372dc3cf899c2686093cf393eefd10c46d503918c84d49af,2024-12-02T14:15:15.227000 -CVE-2024-53722,1,1,16c45f596c47028eb98a2efd1f04f92e7d57cf15385e54a781dd1357b565a756,2024-12-02T14:15:15.360000 -CVE-2024-53723,1,1,5360b055861e6bd29aa0e0434d7359762f6f736ebded018edfafc435f5114bff,2024-12-02T14:15:15.490000 -CVE-2024-53724,1,1,a0507f008de48d18fc1495d6ae68165bbfaa7958a7ba0d4aad616c65fad04e25,2024-12-02T14:15:15.620000 -CVE-2024-53725,1,1,16299bf4b24fdfa226bd84824401d1868e0cc306f8d5eb276303509b8474d2ee,2024-12-02T14:15:15.757000 -CVE-2024-53726,1,1,fb25a4ad6bed966414f536e218e21acf50d65b64359b7ef1aae856f4906755b7,2024-12-02T14:15:15.890000 -CVE-2024-53727,1,1,6e601eec96005bc895f65268cbbea6951cdf766f10f09295a2d849f6356d7839,2024-12-02T14:15:16.027000 -CVE-2024-53728,1,1,fdf25874b3492642fed355a1c691d9725e20e96d980b5e031996d5c7b1dbed73,2024-12-02T14:15:16.153000 -CVE-2024-53729,1,1,4c5d4e088d7bdda49a89f91dcacf8df919a095df32fe8edd0c9465212954fb8e,2024-12-02T14:15:16.290000 +CVE-2024-53720,0,0,f688959dbf12eb2ea0f499fdf8c28f44211499cd2e44c3ed89fcdda3081e4f61,2024-12-02T14:15:15.090000 +CVE-2024-53721,0,0,a8b61c0607329498372dc3cf899c2686093cf393eefd10c46d503918c84d49af,2024-12-02T14:15:15.227000 +CVE-2024-53722,0,0,16c45f596c47028eb98a2efd1f04f92e7d57cf15385e54a781dd1357b565a756,2024-12-02T14:15:15.360000 +CVE-2024-53723,0,0,5360b055861e6bd29aa0e0434d7359762f6f736ebded018edfafc435f5114bff,2024-12-02T14:15:15.490000 +CVE-2024-53724,0,0,a0507f008de48d18fc1495d6ae68165bbfaa7958a7ba0d4aad616c65fad04e25,2024-12-02T14:15:15.620000 +CVE-2024-53725,0,0,16299bf4b24fdfa226bd84824401d1868e0cc306f8d5eb276303509b8474d2ee,2024-12-02T14:15:15.757000 +CVE-2024-53726,0,0,fb25a4ad6bed966414f536e218e21acf50d65b64359b7ef1aae856f4906755b7,2024-12-02T14:15:15.890000 +CVE-2024-53727,0,0,6e601eec96005bc895f65268cbbea6951cdf766f10f09295a2d849f6356d7839,2024-12-02T14:15:16.027000 +CVE-2024-53728,0,0,fdf25874b3492642fed355a1c691d9725e20e96d980b5e031996d5c7b1dbed73,2024-12-02T14:15:16.153000 +CVE-2024-53729,0,0,4c5d4e088d7bdda49a89f91dcacf8df919a095df32fe8edd0c9465212954fb8e,2024-12-02T14:15:16.290000 CVE-2024-5373,0,0,723592340da8ccd8f25024820eebbe02ad7dbee30d73ac71e1bda91f01d7cbec,2024-06-04T19:21:07.183000 -CVE-2024-53730,1,1,abc8247aae9fad9a557cec0fbaa9609ab8980cb18de5d1a0ad2cbc23f0782ab1,2024-12-02T14:15:16.423000 +CVE-2024-53730,0,0,abc8247aae9fad9a557cec0fbaa9609ab8980cb18de5d1a0ad2cbc23f0782ab1,2024-12-02T14:15:16.423000 CVE-2024-53731,0,0,99dd051791dffd2f845724af34a8772840a5c71c1582521ff72e80a4c7bf7aab,2024-11-28T12:15:17.107000 CVE-2024-53732,0,0,abbc43ec9fa63a7364cd4412c8e7d50f2486ba52096e0e19343b21f95591685e,2024-11-28T11:15:52.773000 CVE-2024-53733,0,0,a15424cb01b44014303701bb7a936a48f052e7c0ef953db6088888d4df1dbe37,2024-11-28T11:15:53.203000 @@ -267963,8 +267974,8 @@ CVE-2024-53737,0,0,f3a335bb195dd0244d4039f558efb2c4498714f2b0074383fd7bed5cc5fa8 CVE-2024-53738,0,0,ab5f509d61384a8d5bb28b6ed9517e0641b5e54dd9466510814bf9b361067912,2024-11-30T21:15:15.350000 CVE-2024-53739,0,0,0576cfe7f72b11873c2d85ed4107584c336a3c0ba57c0c01247976652b6807f8,2024-11-30T21:15:15.653000 CVE-2024-5374,0,0,9590dde507302753225c45768250d14c5989d70c121d20e0bb9a4a301eeaee55,2024-05-28T12:39:28.377000 -CVE-2024-53740,1,1,c85ebbc44ec3d633689bb8d1c53d64d1e8f02ed54c77431010d57460ab492da7,2024-12-02T14:15:16.560000 -CVE-2024-53741,1,1,f968d0794c07f67160ae6fe6dbe029f7f983aae05a7f14618a59651448676b8e,2024-12-02T14:15:16.700000 +CVE-2024-53740,0,0,c85ebbc44ec3d633689bb8d1c53d64d1e8f02ed54c77431010d57460ab492da7,2024-12-02T14:15:16.560000 +CVE-2024-53741,0,0,f968d0794c07f67160ae6fe6dbe029f7f983aae05a7f14618a59651448676b8e,2024-12-02T14:15:16.700000 CVE-2024-53742,0,0,97a10dbf8528ba8ea615d10490be23e98c0e662868a40aa466de286b0b7e3433,2024-12-01T22:15:05.007000 CVE-2024-53743,0,0,feb004f324a1261364f2a4d452e2172f54b890a3ffd00baa1714195ee5d48f0c,2024-12-01T22:15:05.247000 CVE-2024-53744,0,0,e60b9ac53c5025b801bf3932b561a8621c4ce8ca9fefa21ab185fd27f8e00b7b,2024-12-01T22:15:05.393000 @@ -267975,50 +267986,50 @@ CVE-2024-53748,0,0,b88a9b1ce9c55ac9da22becdcc2d8a4d80472347150e9b04a63606bcb9d3a CVE-2024-53749,0,0,9053e051fa5385b6ef36255ca5a18e2c1299eaa441080631f0693dfba2467042,2024-12-01T22:15:06.080000 CVE-2024-5375,0,0,ee384884521ae20b595e19cb0f157171143b462efc516d82edefadc2db8af61c,2024-06-04T19:21:07.297000 CVE-2024-53750,0,0,4850438ad2df488d504e24a4b23943996fec6575e28da6125c54fcb9dc7f153b,2024-12-01T22:15:06.217000 -CVE-2024-53751,1,1,5f6bea25e0d522695302050f333d0950f5715eec8bfc9074e7118050933cee36,2024-12-02T14:15:16.863000 +CVE-2024-53751,0,0,5f6bea25e0d522695302050f333d0950f5715eec8bfc9074e7118050933cee36,2024-12-02T14:15:16.863000 CVE-2024-53752,0,0,ee9ea6d0a0bfb4fdc244e64871d614994ca2a53ef8c67604ea7a0a1c631195c5,2024-12-01T22:15:06.360000 -CVE-2024-53753,1,1,e03081e72bbb11b20bd612b7339dffb05fa69a73bb38165e18453809a12008a9,2024-12-02T14:15:17.007000 -CVE-2024-53754,1,1,0ccae7db8577df5c6e88256f3f04b4e3a7a223eecfdf67699d7e5b858ce33c42,2024-12-02T14:15:17.143000 -CVE-2024-53755,1,1,e602c4778f16020c85d4569dd78d8621d6daaf6604e1ad5bbdc3ced172c6d39f,2024-12-02T14:15:17.290000 +CVE-2024-53753,0,0,e03081e72bbb11b20bd612b7339dffb05fa69a73bb38165e18453809a12008a9,2024-12-02T14:15:17.007000 +CVE-2024-53754,0,0,0ccae7db8577df5c6e88256f3f04b4e3a7a223eecfdf67699d7e5b858ce33c42,2024-12-02T14:15:17.143000 +CVE-2024-53755,0,0,e602c4778f16020c85d4569dd78d8621d6daaf6604e1ad5bbdc3ced172c6d39f,2024-12-02T14:15:17.290000 CVE-2024-53756,0,0,1534bc9cafd8b9e85e4aa0cb8ed3455c9e21cd00440e21d978b660417fca453e,2024-11-30T22:15:17.433000 CVE-2024-53757,0,0,3ab806c7443ca7454908ccef564c0146328a2f5fb0d433be52be21d67cb958d4,2024-11-30T22:15:17.740000 CVE-2024-53758,0,0,bde4fa2013676ceaff0c568b31de62731a43cdadd754347c99deeb769a812bc3,2024-11-30T22:15:17.883000 -CVE-2024-53759,1,1,07d97e3f709364fefa2a6d201d3e568d0a07c23a055f9b7913da1bd962bfe72b,2024-12-02T14:15:17.430000 +CVE-2024-53759,0,0,07d97e3f709364fefa2a6d201d3e568d0a07c23a055f9b7913da1bd962bfe72b,2024-12-02T14:15:17.430000 CVE-2024-5376,0,0,1916e3797ba72d918b0d6b4e68154ad489313814ec55b1e1e9e1869dabc13c93,2024-06-04T19:21:07.390000 CVE-2024-53760,0,0,f5fb8981571d96d4e62dd086d79e85e73a26f8de6b964e51025d2810dd92ed28,2024-11-30T22:15:18.020000 -CVE-2024-53761,1,1,198e8a29524c6bb20f4cb46cb861319bc688ef2b4cfd30c6324b9fae9ae26c37,2024-12-02T14:15:17.563000 -CVE-2024-53762,1,1,677bbd70c0cce4237c6c6bcda055dc2bb1278b93eaeb1b00f2395228a8765361,2024-12-02T14:15:17.697000 +CVE-2024-53761,0,0,198e8a29524c6bb20f4cb46cb861319bc688ef2b4cfd30c6324b9fae9ae26c37,2024-12-02T14:15:17.563000 +CVE-2024-53762,0,0,677bbd70c0cce4237c6c6bcda055dc2bb1278b93eaeb1b00f2395228a8765361,2024-12-02T14:15:17.697000 CVE-2024-53763,0,0,5c179c36c9ff76e09f5709dbcee1e87f826bb388920c5cac94d040e4d8f0856f,2024-11-30T22:15:18.153000 CVE-2024-53764,0,0,ed39039cd1972d38d47a6508e5962774507d4e742d266d6a1fe70e6844779d4f,2024-11-30T22:15:18.310000 -CVE-2024-53765,1,1,a5efd496d7d51bd500eed53d880c0cd19971eda88e9dfb9402a13efcec3202d9,2024-12-02T14:15:17.827000 +CVE-2024-53765,0,0,a5efd496d7d51bd500eed53d880c0cd19971eda88e9dfb9402a13efcec3202d9,2024-12-02T14:15:17.827000 CVE-2024-53766,0,0,bfe7f698933500d02433c5bc01396652a569ab6326cb32ded581eddbdc2ab523,2024-11-30T22:15:18.457000 CVE-2024-53767,0,0,1a6c78cdb2213d488fa53998e0269020aecd068260f85114403ee4333ea5eb1d,2024-11-30T22:15:18.600000 CVE-2024-53768,0,0,b397ba15345aa532d051534bd1f7e64b150e1bf5e65474f96d4677f92f2f7dc2,2024-11-30T21:15:15.783000 -CVE-2024-53769,1,1,5035c1727c17326a09a9feba85cf459f91d0e286c7525c7acdd32966103dff8a,2024-12-02T14:15:17.953000 +CVE-2024-53769,0,0,5035c1727c17326a09a9feba85cf459f91d0e286c7525c7acdd32966103dff8a,2024-12-02T14:15:17.953000 CVE-2024-5377,0,0,34aa01cd1159e89b37e209d2d3e4b966c0dd1c9883823eac1f1ebdfcdeab8bca,2024-06-04T19:21:07.497000 -CVE-2024-53770,1,1,f0662a9a1c4231b311a1fbae34d640652e78f85ae3a23cc9518648bcc0b6551e,2024-12-02T14:15:18.093000 +CVE-2024-53770,0,0,f0662a9a1c4231b311a1fbae34d640652e78f85ae3a23cc9518648bcc0b6551e,2024-12-02T14:15:18.093000 CVE-2024-53771,0,0,e5bcfe8d9c7e973c95176a03ba2916c7810a6c0640db5b858f2ad3033ab2a7dc,2024-11-30T22:15:18.743000 CVE-2024-53772,0,0,797dc04fc147cee7e636edb368c4a74e4e6bbab8e49055e5875fea59cb8c92c9,2024-11-30T22:15:18.883000 CVE-2024-53773,0,0,d316388f590a42b451c3001cefdd46102d814619163542617fd7a8b15090b5ef,2024-11-30T22:15:19.027000 CVE-2024-53774,0,0,1d76761b2a9ab2700b5097d7c35f24f1527f6b928d3e9422eb1cdc9e899de232,2024-11-30T22:15:19.157000 -CVE-2024-53775,1,1,3bb466c9f9ac4b1f9b93ccb92918495c1da7da1586f54c95dea46171dfd7bb9e,2024-12-02T14:15:18.237000 -CVE-2024-53776,1,1,fc42c5c819c001038fbea2b1598f0c6c559d698372f072380710870758f9f2df,2024-12-02T14:15:18.370000 -CVE-2024-53777,1,1,20347e387bd9c76c3dffd23567214147fbd01d323c79be5d8a5822378fc27db6,2024-12-02T14:15:18.503000 +CVE-2024-53775,0,0,3bb466c9f9ac4b1f9b93ccb92918495c1da7da1586f54c95dea46171dfd7bb9e,2024-12-02T14:15:18.237000 +CVE-2024-53776,0,0,fc42c5c819c001038fbea2b1598f0c6c559d698372f072380710870758f9f2df,2024-12-02T14:15:18.370000 +CVE-2024-53777,0,0,20347e387bd9c76c3dffd23567214147fbd01d323c79be5d8a5822378fc27db6,2024-12-02T14:15:18.503000 CVE-2024-53778,0,0,4edda202777df03cc3ffd840c5974a0345cc17cbeb6a02c703c85b4041c42bdd,2024-11-30T22:15:19.283000 -CVE-2024-53779,1,1,3ebe6f674f6d3e324c6f56f39b3f3bcd6f7c7c93cc981c0a336acb9b9c724a45,2024-12-02T14:15:18.640000 +CVE-2024-53779,0,0,3ebe6f674f6d3e324c6f56f39b3f3bcd6f7c7c93cc981c0a336acb9b9c724a45,2024-12-02T14:15:18.640000 CVE-2024-5378,0,0,53584bd839279bfc76a6f2fdc29ac4c797511bdc7e769650cb61527d6bb9adcb,2024-06-07T20:15:12.587000 -CVE-2024-53780,1,1,41b39b8ddfdf6894491c72bff739020f6a4e901c71c1017cf7ca5ffafa52838f,2024-12-02T14:15:18.777000 -CVE-2024-53781,1,1,f23493b9cc356e47c78651523266ffa74f2d6060783ce01959dcd0f33f2c40a7,2024-12-02T14:15:18.913000 -CVE-2024-53782,1,1,0be577ffaf6bdeab7a34b0372a908f9192093ec4831f6c13eaf4a3712cd48f96,2024-12-02T14:15:19.050000 +CVE-2024-53780,0,0,41b39b8ddfdf6894491c72bff739020f6a4e901c71c1017cf7ca5ffafa52838f,2024-12-02T14:15:18.777000 +CVE-2024-53781,0,0,f23493b9cc356e47c78651523266ffa74f2d6060783ce01959dcd0f33f2c40a7,2024-12-02T14:15:18.913000 +CVE-2024-53782,0,0,0be577ffaf6bdeab7a34b0372a908f9192093ec4831f6c13eaf4a3712cd48f96,2024-12-02T14:15:19.050000 CVE-2024-53783,0,0,909ecd06495a0409d1084773a5a9eaba83eec8f6c25d9d6a1a6e9d198f2b3079,2024-11-30T21:15:15.927000 -CVE-2024-53784,1,1,ce473411ff65cbcd80dd78ddf490809961bc897973dbe348b16745c618548145,2024-12-02T14:15:19.190000 +CVE-2024-53784,0,0,ce473411ff65cbcd80dd78ddf490809961bc897973dbe348b16745c618548145,2024-12-02T14:15:19.190000 CVE-2024-53786,0,0,797e50a6875d5c7ad9f2fb0112f99749ab00d53e524e87c98b2164603c866fd3,2024-11-30T22:15:19.427000 CVE-2024-53787,0,0,60d906f2a3bd854110bab10b544f5d9a15a4d276b5bd4102ed8cfd5bde1101f3,2024-11-30T21:15:16.077000 CVE-2024-53788,0,0,f0bb5fb412a0fefe15f72e0e8d7bd5f244651188fb15dab75348d7c3c918196d,2024-11-30T21:15:16.233000 -CVE-2024-53789,1,1,0cd2c8e734d87f5ff29c7519080e96932e6ae611e3be8577ab3c11bfb215e5c0,2024-12-02T14:15:19.327000 +CVE-2024-53789,0,0,0cd2c8e734d87f5ff29c7519080e96932e6ae611e3be8577ab3c11bfb215e5c0,2024-12-02T14:15:19.327000 CVE-2024-5379,0,0,f1dd25a1f48845d51cd2d3d553915019ba63e0d50a7cb63638140d83426dbbeb,2024-06-04T19:21:07.600000 -CVE-2024-53792,1,1,f009c6ce656203f8698667a7a8b6410f02ab5bb9d11f62134a5b95054d5b3de6,2024-12-02T14:15:19.460000 -CVE-2024-53793,1,1,f5cb19ad8d226899765c0a6b6688756efabf7b6fa8f4dcbaf2d25a5eff86f1d9,2024-12-02T14:15:19.587000 +CVE-2024-53792,0,0,f009c6ce656203f8698667a7a8b6410f02ab5bb9d11f62134a5b95054d5b3de6,2024-12-02T14:15:19.460000 +CVE-2024-53793,0,0,f5cb19ad8d226899765c0a6b6688756efabf7b6fa8f4dcbaf2d25a5eff86f1d9,2024-12-02T14:15:19.587000 CVE-2024-5380,0,0,1a43ccdfd322bdb041c1bd02966c3ff303ab6a44cb8598c469f347dceefe258b,2024-06-04T19:21:07.720000 CVE-2024-5381,0,0,e60d0bf720c06b0401aa74a4fcd990afc31874a89cad5638c50edeb5ec515420,2024-06-04T19:21:07.820000 CVE-2024-5382,0,0,89de52ac46497e2894cab1bab1dd4b0e93975c2cd2d4911a68fe0b848c20cc76,2024-06-11T18:27:00.427000 @@ -268034,6 +268045,7 @@ CVE-2024-53858,0,0,6c64b7a629ccdbeeaa44425cb24892d67f2dbeb5f6725b97741be6047ebd2 CVE-2024-53859,0,0,4facd2b494aef0ff73beaf08d6d1ca6f6f9ab5c48842cb7bed7f8b39e94a454f,2024-11-27T22:15:05.673000 CVE-2024-53860,0,0,f686ec46a02a9bc4a804217b41a7af4658fb7390d2c722028f65e08a7a2b5414,2024-11-27T22:15:05.833000 CVE-2024-53861,0,0,a65f03f3f651364136c909e8ecc868a7d260812665c52bd4fa163e7f079f01ea,2024-11-29T19:15:09.433000 +CVE-2024-53862,1,1,eb71730385f5a115df10825836b94c0319055c91f99db9bfd92d5c3006795a35,2024-12-02T16:15:14.277000 CVE-2024-53864,0,0,5333aa1d756baa8b2b2af9d321f1e4bf84fee7810b77a54afa507c359fe16403,2024-11-29T19:15:09.577000 CVE-2024-53865,0,0,4a38354939a410a34cc87939fb2218794cb79b60b95dc7b6ebed34b8c98c2e76,2024-11-29T19:15:09.710000 CVE-2024-5387,0,0,d7455745fd4e2043656d894120ace9fd562ab2b459405f5c80fb87774616ea6e,2024-06-03T19:15:09.500000 @@ -268064,7 +268076,9 @@ CVE-2024-53976,0,0,8d5f56cf46e847394bbb16bbccc754e64a340211b5713f291e4e6fbe540b2 CVE-2024-53979,0,0,daaf571bfcfd25ad5803f97558dcc6ea565a6375b17d8bed4a6f9cee29769cb2,2024-11-29T19:15:09.847000 CVE-2024-5398,0,0,1fca9edd99ff7753e0d36d6f4d73a5a23ccf8ab9dd992541f79488471e393289,2024-06-11T10:15:13.690000 CVE-2024-53980,0,0,f2c4b71c263d54957f07bea69df75ebb3d992381d97f959d8cfdaa259a929ae9,2024-11-29T19:15:09.993000 +CVE-2024-53981,1,1,4ba898eb1befa3f2561edd750eac82eeb420da27aa2d03f7cf36b5b838c9b47f,2024-12-02T16:15:14.457000 CVE-2024-53983,0,0,53274ba64b5204fbd988c3ba5170f84dc187572b2bad72061a88e06a87cfa81a,2024-11-29T19:15:10.137000 +CVE-2024-53984,1,1,892c82f8a41d78ebdbb6204162b35fdbbfd980dac8482c839614b9f0b40eeb3b,2024-12-02T16:15:14.603000 CVE-2024-5399,0,0,6f591a4ee360dfdb4118262029ef6ec2f3647ffdfa160e81ed9cdadb88ac0f1d,2024-05-28T12:39:28.377000 CVE-2024-5400,0,0,094967d50b5003fa8a1a95a7cd40ccdb2300c03695bb818acf6e11d6054c6ffe,2024-05-28T12:39:28.377000 CVE-2024-54003,0,0,2506866a989efaeab3da1a8a5555a804f26e4215f0a647f04a179f236368dfb1,2024-11-27T20:15:26.133000 @@ -270960,6 +270974,7 @@ CVE-2024-8781,0,0,3ec0b05f8d5a664e00f19be45699369ceb748ac3a54899e5a3d5a5f6653a98 CVE-2024-8782,0,0,ec0da4baac22ae9eceb8ce2507375e0a71b6a51926de3cc40576bcd259fd7175,2024-09-19T01:46:07.003000 CVE-2024-8783,0,0,b434dfc5f50cf2811a1f5688ac574f745dec48e5af54cf5f568ce8560b0e2702,2024-09-19T01:38:57.033000 CVE-2024-8784,0,0,7bc5ed86fd42122481efd27561493828acec6a50cb9d34c0b1c40453c943431f,2024-09-19T01:38:35.177000 +CVE-2024-8785,1,1,389f4d4466fc599aa1e162e96341d9287a40c3b8fbeefcdf0ef9b4791ab6ee69,2024-12-02T15:15:12.380000 CVE-2024-8786,0,0,98535b365547eb81c56b86d17170e324effeb134cfd99a6f8a9199c7d69b6f51,2024-10-04T13:51:25.567000 CVE-2024-8787,0,0,697959dd00ebdc9b4d866bc462eeca4254ff62268820b8cc5f18a9f4531e0ed8,2024-10-16T16:38:14.557000 CVE-2024-8788,0,0,109bf9bb3aa314390f1c0b3dee4d54ea5d0e02bbb648b956ffff0a9dad06b2f6,2024-10-03T17:25:41.467000