Auto-Update: 2024-12-03T11:02:51.266239+00:00

This commit is contained in:
cad-safe-bot 2024-12-03 11:06:02 +00:00
parent e7974b4c00
commit 2f78e8e71d
9 changed files with 442 additions and 25 deletions

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-11325",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-03T10:15:05.067",
"lastModified": "2024-12-03T10:15:05.067",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The AWeber Forms by Optin Cat plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.5.7. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/aweber-wp/trunk/includes/eoi-subscribers.php#L353",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3198559/aweber-wp/trunk/includes/eoi-subscribers.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/21c09207-38a1-47ae-ae1e-52f8eea4785d?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-11782",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-03T10:15:05.320",
"lastModified": "2024-12-03T10:15:05.320",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP Mailster plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mst_subscribe' shortcode in all versions up to, and including, 1.8.17.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-mailster/tags/1.8.17.0/mailster/subscr/SubscriberPlugin.php#L216",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3198497/wp-mailster/trunk/mailster/subscr/SubscriberPlugin.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/909beed4-06a9-4ec4-bf00-4072a38af82b?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-11844",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-03T09:15:04.473",
"lastModified": "2024-12-03T09:15:04.473",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The IdeaPush plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the idea_push_taxonomy_save_routine function in all versions up to, and including, 8.71. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete terms for the \"boards\" taxonomy."
},
{
"lang": "es",
"value": "El complemento IdeaPush para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n idea_push_taxonomy_save_routine en todas las versiones hasta la 8.71 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, eliminen t\u00e9rminos de la taxonom\u00eda \"boards\"."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/ideapush/trunk/ideapush.php#L766",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3198488/ideapush/trunk/ideapush.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/34603c3f-834f-4a2a-9b9f-5213155d4317?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-11866",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-03T09:15:05.487",
"lastModified": "2024-12-03T09:15:05.487",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The BMLT Tabbed Map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'bmlt_tabbed_map' shortcode in all versions up to, and including, 1.1.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento BMLT Tabbed Map para WordPress es vulnerable a cross site scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'bmlt_tabbed_map' del complemento en todas las versiones hasta la 1.1.8 incluida, debido a una desinfecci\u00f3n de entrada y al escape de salida insuficientes en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3198537%40bmlt-tabbed-map&new=3198537%40bmlt-tabbed-map&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/49958e9e-7f9b-48fb-bfe2-5b1b437171d6?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-12062",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-03T10:15:05.493",
"lastModified": "2024-12-03T10:15:05.493",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Charity Addon for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.3.2 via the 'nacharity_elementor_template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts created by Elementor that they should not have access to."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/charity-addon-for-elementor/trunk/elementor/lib/lib.php#L12",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ac68314-c704-4273-addc-4bc623659769?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-45106",
"sourceIdentifier": "security@apache.org",
"published": "2024-12-03T10:15:05.697",
"lastModified": "2024-12-03T10:15:05.697",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper authentication of an HTTP endpoint in the S3 Gateway of Apache Ozone 1.4.0 allows any authenticated Kerberos user to revoke and regenerate the S3 secrets of any other user. This is only possible if:\n * ozone.s3g.secret.http.enabled is set to true. The default value of this configuration is false.\n * The user configured in ozone.s3g.kerberos.principal is also configured in ozone.s3.administrators or ozone.administrators.\n\n\nUsers are recommended to upgrade to Apache Ozone version 1.4.1 which disables the affected endpoint."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://lists.apache.org/thread/rylnxwttp004kvotpk9j158vb238pfkm",
"source": "security@apache.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/12/02/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-47476",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-12-03T10:15:05.883",
"lastModified": "2024-12-03T10:15:05.883",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell NetWorker Management Console, version(s) 19.11, contain(s) an Improper Verification of Cryptographic Signature vulnerability. An unauthenticated attacker with local access could potentially exploit this vulnerability, leading to Code execution."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000255884/dsa-2024-477-security-update-for-dell-networker-runtime-environment-nre-multiple-component-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-03T09:01:38.528083+00:00
2024-12-03T11:02:51.266239+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-03T08:15:06.857000+00:00
2024-12-03T10:15:05.883000+00:00
```
### Last Data Feed Release
@ -33,29 +33,26 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
271973
271980
```
### CVEs added in the last Commit
Recently added CVEs: `8`
Recently added CVEs: `7`
- [CVE-2024-11453](CVE-2024/CVE-2024-114xx/CVE-2024-11453.json) (`2024-12-03T08:15:05.830`)
- [CVE-2024-11461](CVE-2024/CVE-2024-114xx/CVE-2024-11461.json) (`2024-12-03T08:15:06.043`)
- [CVE-2024-11707](CVE-2024/CVE-2024-117xx/CVE-2024-11707.json) (`2024-12-03T08:15:06.223`)
- [CVE-2024-11732](CVE-2024/CVE-2024-117xx/CVE-2024-11732.json) (`2024-12-03T08:15:06.383`)
- [CVE-2024-11805](CVE-2024/CVE-2024-118xx/CVE-2024-11805.json) (`2024-12-03T08:15:06.553`)
- [CVE-2024-11853](CVE-2024/CVE-2024-118xx/CVE-2024-11853.json) (`2024-12-03T08:15:06.710`)
- [CVE-2024-11898](CVE-2024/CVE-2024-118xx/CVE-2024-11898.json) (`2024-12-03T08:15:06.857`)
- [CVE-2024-9058](CVE-2024/CVE-2024-90xx/CVE-2024-9058.json) (`2024-12-03T07:15:04.230`)
- [CVE-2024-11325](CVE-2024/CVE-2024-113xx/CVE-2024-11325.json) (`2024-12-03T10:15:05.067`)
- [CVE-2024-11782](CVE-2024/CVE-2024-117xx/CVE-2024-11782.json) (`2024-12-03T10:15:05.320`)
- [CVE-2024-11844](CVE-2024/CVE-2024-118xx/CVE-2024-11844.json) (`2024-12-03T09:15:04.473`)
- [CVE-2024-11866](CVE-2024/CVE-2024-118xx/CVE-2024-11866.json) (`2024-12-03T09:15:05.487`)
- [CVE-2024-12062](CVE-2024/CVE-2024-120xx/CVE-2024-12062.json) (`2024-12-03T10:15:05.493`)
- [CVE-2024-45106](CVE-2024/CVE-2024-451xx/CVE-2024-45106.json) (`2024-12-03T10:15:05.697`)
- [CVE-2024-47476](CVE-2024/CVE-2024-474xx/CVE-2024-47476.json) (`2024-12-03T10:15:05.883`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `0`
- [CVE-2023-0142](CVE-2023/CVE-2023-01xx/CVE-2023-0142.json) (`2024-12-03T08:15:04.313`)
- [CVE-2024-0854](CVE-2024/CVE-2024-08xx/CVE-2024-0854.json) (`2024-12-03T08:15:05.673`)
## Download and Usage

View File

@ -213116,7 +213116,7 @@ CVE-2023-0138,0,0,0f9ccca9b74539caf9bf1274a26e12b16eff6998a1ad1c1003e4e4bdb44e51
CVE-2023-0139,0,0,2a1d06ec16cbeb0f42802443463825b23acd36452e12ef549d5a1ce04deec709,2023-11-25T11:15:13.543000
CVE-2023-0140,0,0,2ab5ec9e9acd6659ed75cd30d7b68abf8235bc4af57f2a36dc58df75bf340d2a,2023-11-25T11:15:13.633000
CVE-2023-0141,0,0,2cb1e4440abf0032ef49cf1ab95073658cbf263e8f5270d6f9a5d41ec61c8650,2023-11-25T11:15:13.760000
CVE-2023-0142,0,1,0c7e924277e96fad531f647b42de568fe1dae5f8e560eb49156d02ea2e710ec5,2024-12-03T08:15:04.313000
CVE-2023-0142,0,0,0c7e924277e96fad531f647b42de568fe1dae5f8e560eb49156d02ea2e710ec5,2024-12-03T08:15:04.313000
CVE-2023-0143,0,0,c52bc7813dfc6659f9c59afb905330880b0986c1d9bf153f3ef70aa31d452894,2023-11-07T03:59:43.137000
CVE-2023-0144,0,0,5f9e4ac72968ef219e9d39533d3ff53192a456ee89fe5e9aace6023ca65ee9e2,2023-11-07T03:59:43.350000
CVE-2023-0145,0,0,eed30560a0871467c4d1ebfbc7a0d489db6a1815578450029ed9cf29da6cdcf3,2023-11-07T03:59:43.550000
@ -242543,7 +242543,7 @@ CVE-2024-0848,0,0,e0e26015fce7454a8ecd0b62d6bfcebc24339b5d12fceee5ba30ea769681be
CVE-2024-0849,0,0,3d9186cbdefe9b879cc8d1763ec900b7d18820b531adac823e565a400881f9bb,2024-09-05T23:15:11.673000
CVE-2024-0851,0,0,f71017226a428253d7e6f7557fb0ae0457b9beec038f9e66758c71c8032e7938,2024-05-28T12:39:28.377000
CVE-2024-0853,0,0,3c910daae8e71e1ce70b1329a110fcfb56e12ff4cd703e160872830a02778b72,2024-05-03T13:15:21.320000
CVE-2024-0854,0,1,ec5d60d861e7fb141da9bc8f0fb18adcb88ed69e2ca6710ed7702b7c5bd77ede,2024-12-03T08:15:05.673000
CVE-2024-0854,0,0,ec5d60d861e7fb141da9bc8f0fb18adcb88ed69e2ca6710ed7702b7c5bd77ede,2024-12-03T08:15:05.673000
CVE-2024-0855,0,0,61bb12eb398f3f222f6fe0c4603d214af7ba9f6d4fd218198b137421ef268723,2024-08-08T21:35:01.813000
CVE-2024-0856,0,0,cdf686922dc6dc53a8573a4e6d7fe25c3162a97d00eaaeaf4df6f669bee7cf43,2024-08-05T19:35:01.477000
CVE-2024-0857,0,0,135b818be9db5d9ae259c8ee8260201b0eed5c0f5f2f59c834f8ec0a79ea8407,2024-08-22T17:23:44.947000
@ -243594,6 +243594,7 @@ CVE-2024-11318,0,0,9febe7cf088687dfbeb6d2d8f74590e0f8059ffca33de9b68ad34437f87d2
CVE-2024-11319,0,0,10049ab876319f9ecb08a7b21cc61880e37e90d0ecd4d79058dbd3eba0407f5e,2024-11-20T14:59:38.297000
CVE-2024-1132,0,0,3de6e62885ac8497a4c1d8f4950ebedc171b13b33dfedd6a9eea9ae164fd993a,2024-07-03T01:45:01.507000
CVE-2024-11320,0,0,043dd45fc8afc6a3f6d5124b009a260902c28d8e6731495b55f0e622c6d087a7,2024-11-26T17:26:33.327000
CVE-2024-11325,1,1,14da4d35c2181419813fe9ac1dccdd051d8a95ab923f557a3b686e3cf070cb30,2024-12-03T10:15:05.067000
CVE-2024-1133,0,0,b8b851364368259dd533f1c71b437f741276dcf99770b03558b5d9cd5d3f095a,2024-02-29T13:49:29.390000
CVE-2024-11330,0,0,1c458fab138aae3f3b89b170e15e7403fdc2fbe304c8cf0cbc41ae122ec08539,2024-11-23T07:15:03.737000
CVE-2024-11332,0,0,21d8101c0dd73a7dc8b4a9b045dbbf7a2c40f682ad21bdcbf98ef68d6b970235,2024-11-23T05:15:06.520000
@ -243639,10 +243640,10 @@ CVE-2024-11431,0,0,b8bb7503cec0f1c97409d5d96fa693f0c0a3c2fbf2f6e1d737e15cdb7da79
CVE-2024-1144,0,0,546e0bd85767acb1f88a8198b87bd681b7ca87705a2ab38d3ca6ac16bba85f8b,2024-03-19T13:26:46
CVE-2024-11446,0,0,58ee3306e8d72a71b4c73e9400de7c4b9a7a44ede260329876f7cb058e66c8ed,2024-11-23T07:15:04.820000
CVE-2024-1145,0,0,fa713ba5e7e18de90151eee1a4726d9f9f0863a5fccb48575e3f29ec11b8835c,2024-03-19T13:26:46
CVE-2024-11453,1,1,5a92196f1949efd85a5ee687acf7700234668e98610de2c7d4557dd8f3aebb90,2024-12-03T08:15:05.830000
CVE-2024-11453,0,0,5a92196f1949efd85a5ee687acf7700234668e98610de2c7d4557dd8f3aebb90,2024-12-03T08:15:05.830000
CVE-2024-11458,0,0,6849bad28a4b41fcdd85ffcf4846b0c6058567a8a7be243965c5d4ff08dab5b5,2024-11-28T09:15:04.640000
CVE-2024-1146,0,0,c681ac136637104b7d43e23a49d30f381f11dad3f3f7ec48919504256a9e5b2a,2024-03-19T13:26:46
CVE-2024-11461,1,1,ddca8d6b2db926cfca3eee24bf3b6aa5eb08e9faad161d3c0076b0f9ecc87254,2024-12-03T08:15:06.043000
CVE-2024-11461,0,0,ddca8d6b2db926cfca3eee24bf3b6aa5eb08e9faad161d3c0076b0f9ecc87254,2024-12-03T08:15:06.043000
CVE-2024-11463,0,0,ec04c7e81fa0a01468a3fa77b8e3ee0a2d478d739fbf8b7cd12d4c8bed3fd0d3,2024-11-23T04:15:08.893000
CVE-2024-1147,0,0,5da69e40e8a720c3c3c366cde1a8363ffbcff6346e82168cfd4c7602d33328bd,2024-03-21T12:58:51.093000
CVE-2024-11477,0,0,47ede4582a757f3d8a2482f5720bb8d1160cb660e47ba0cb5bbe4f95d03eaff1,2024-11-22T21:15:08.613000
@ -243825,12 +243826,12 @@ CVE-2024-11703,0,0,e983d143affae3fe0df24c337c8810ae7731133ae347091f674c58908251a
CVE-2024-11704,0,0,2b7b550cc939bccaee7258fd0a9f771da470ed456c481083dde13c083b054c7f,2024-11-27T16:15:13.837000
CVE-2024-11705,0,0,b00958231cd75a51aaf41f507045209bb5b601f8c6cb2be613795f56225c7da5,2024-11-27T16:15:14
CVE-2024-11706,0,0,1b96fbb1c831be79b72164c44aa56f72093a93485fb6eb748f832788631279b2,2024-11-26T17:15:23.010000
CVE-2024-11707,1,1,0754803a170e0831f66c99e53b47cf1098effd65abf2b17a1244c3f488060a20,2024-12-03T08:15:06.223000
CVE-2024-11707,0,0,0754803a170e0831f66c99e53b47cf1098effd65abf2b17a1244c3f488060a20,2024-12-03T08:15:06.223000
CVE-2024-11708,0,0,5872b1f165a61acebbe70a5730336bc20a16b17ac8491536799290291f1eb8e9,2024-11-27T15:15:24.747000
CVE-2024-1171,0,0,59f6a72a19a26da04118a5786af1566b99863895f524fbe4b34406571782a615,2024-02-29T13:49:29.390000
CVE-2024-1172,0,0,11b44e5ce5101f5b7c8ab7c5bd49458795761e0ba5cf2024c3b79ca4ef4be57d,2024-02-29T13:49:29.390000
CVE-2024-1173,0,0,d3495940fb5216c0fbed831a88233211893c24cb888781ac48f1d76bb3bc26ba,2024-05-02T18:00:37.360000
CVE-2024-11732,1,1,9ac5f8faeb8d3d023aef30c0e1c16293895e21fbeef4db588eecb4bcce0a9632,2024-12-03T08:15:06.383000
CVE-2024-11732,0,0,9ac5f8faeb8d3d023aef30c0e1c16293895e21fbeef4db588eecb4bcce0a9632,2024-12-03T08:15:06.383000
CVE-2024-1174,0,0,1a20d0936daa8c05ea33a8dfff3a4c4c734ee1e57e74d832a558685298d668aa,2024-08-28T21:35:03.473000
CVE-2024-11742,0,0,67990b8c6d291afd926a35484e6c0e210504d9728dfca33a0ba1469d0b959cb7,2024-11-26T20:15:25.703000
CVE-2024-11743,0,0,4f6422c96bd4f753ba6c7b4e725945a7686018b3a7c5c8f40a5c1bd59c112f03,2024-11-26T20:15:25.930000
@ -243841,6 +243842,7 @@ CVE-2024-1176,0,0,3a9729597b8ae5d1f7a6b2981371f9af662d86aa4ba3ac1ac5a3a2992dbcfc
CVE-2024-11761,0,0,eb52b6beba84d5e3aa94afd1e69b06248988bf9736924036fa502f3813b0779d,2024-11-28T09:15:05.090000
CVE-2024-1177,0,0,d9cdcff987bd78d6f32a7f8b0a8d2970109268852041331a890d212ad12ebb88,2024-02-13T14:06:04.817000
CVE-2024-1178,0,0,1ff4a71536018366c289bfb8a1aa1adef7208a3ae26719efcdb84bec870fcd3d,2024-03-05T13:41:01.900000
CVE-2024-11782,1,1,e3d9ca853e3de7c456298225b3bac758bc6cc14e92c8dd2b7f7b36c0bd838f02,2024-12-03T10:15:05.320000
CVE-2024-11786,0,0,6cf20be08bd72bdf18f1b37af5fd1777457199a33f3d53de54fd985237bb5f39,2024-11-28T09:15:05.243000
CVE-2024-11787,0,0,8884b7c43bffdc761343b898533952062d862c4863a9b6bcdc4c5c48c1360306,2024-11-28T00:15:04
CVE-2024-11788,0,0,01a0a36704164a1ea673e9c9b149d51cdeaf30b14f663c5b5a2abc31455fcbdb,2024-11-28T09:15:05.393000
@ -243861,7 +243863,7 @@ CVE-2024-11800,0,0,452e646ca4272df50dba618a6bbe5597902065fb71dbf212269417af86b3c
CVE-2024-11801,0,0,9f7fb4a596ccaeab8fec5833422864785f9b02d4e4cdf4de8584f0f02ff993f7,2024-11-28T00:15:05.873000
CVE-2024-11802,0,0,6f4d24723a8ed97073be195e50e0db56014f2b2ea65777a9a07412229fff3a98,2024-11-28T00:15:06.007000
CVE-2024-11803,0,0,81a74b13e4dbf770a17aeec0a98f9e92d283ae44a8459caff765261ca92e6496,2024-11-28T00:15:06.143000
CVE-2024-11805,1,1,c4320a41ca0d4edd118e9ad964bb3b250fee875896f75cfe07057a59cde52b29,2024-12-03T08:15:06.553000
CVE-2024-11805,0,0,c4320a41ca0d4edd118e9ad964bb3b250fee875896f75cfe07057a59cde52b29,2024-12-03T08:15:06.553000
CVE-2024-1181,0,0,3ab1ccda9f702c4fc6b350844c2c0edd9e45550807a44d2d8746213d5ed7378e,2024-03-20T13:00:16.367000
CVE-2024-11817,0,0,878ee2179044a99d330d167a93477de960b6cf592f6203d72eec9805c4d5d74a,2024-11-26T23:15:04.990000
CVE-2024-11818,0,0,db7694cd2fdcae7c78aac428fa42653e88b1d41dfdd73e2502c588c9613c4f73,2024-11-27T00:15:17.727000
@ -243871,16 +243873,18 @@ CVE-2024-11820,0,0,98b7e3f55278e4e540b5d30afcc2f1c61148c58882b41c21d30f2b114d45b
CVE-2024-11828,0,0,246e1e2eab57884aa3d4d52a63d8c3c77eefda7cf137c7c25e51217c37ae62b7,2024-11-26T19:15:22.910000
CVE-2024-1183,0,0,b9ca697d85173799c910606842f064c322818be1aee71b1208c43495b066c09a,2024-04-16T13:24:07.103000
CVE-2024-1184,0,0,0bd0336a802b5a07ef17cf4c3337487d1573b3f8590cc13c2e3f9ac276b1f143,2024-05-17T02:35:16.900000
CVE-2024-11844,1,1,fa93732bf7a7811a41c3e6cfac99ea6aa7951ce050fad551bdb8bf6251ff9356,2024-12-03T09:15:04.473000
CVE-2024-1185,0,0,a60268243ee8d3dcf82e9c185863da8146ac8c49246dc744f2663ef723b40081,2024-06-26T15:15:19.220000
CVE-2024-11853,1,1,c70345c399e57b281a218378a22a846eb5d7cd1f69686e8d6c992b2449c02ac9,2024-12-03T08:15:06.710000
CVE-2024-11853,0,0,c70345c399e57b281a218378a22a846eb5d7cd1f69686e8d6c992b2449c02ac9,2024-12-03T08:15:06.710000
CVE-2024-11856,0,0,20144f62e7f4edae2d8f1729fbe98f20a8d619a96145aa244e22c04511e4c37d,2024-12-02T03:15:13.713000
CVE-2024-1186,0,0,b01b3a0462d1f7a1a803ca8f493a6219bd71eed48ddf8d36021e6ca2af3e1767,2024-05-17T02:35:17.110000
CVE-2024-11860,0,0,8f2a0fbf19059c6c3c8a5836cc661c7d3bd0f5aaad2633071ac71b0a6a9605c7,2024-11-27T17:15:10.010000
CVE-2024-11862,0,0,6d3560dff7bd57ea41736e55020db21367a02a743a7c33eb7522f1239d06cd69,2024-11-27T15:15:25.393000
CVE-2024-11866,1,1,236ffb034bd54f27fb167fb484e28869563519fc7ac4134695f9cf499c46e00e,2024-12-03T09:15:05.487000
CVE-2024-1187,0,0,3fcd8394fe17b53cc850805fb2de93d28c688f808245fcfde96cd99bc903bbab,2024-05-17T02:35:17.220000
CVE-2024-1188,0,0,6744ad4ad1ed370f6488ba44c137b6887619ea6ff1a51ee5f48fd0aec905e09b,2024-05-17T02:35:17.327000
CVE-2024-1189,0,0,b364c59b0d964a14f93b1e1b61d95f98aeb338db4ea440a29e1d18c3cc27c9d5,2024-05-17T02:35:17.427000
CVE-2024-11898,1,1,0456808eb2a54e3b5ec4a2165ac77afd50bb67da5ab4fe9c475ae45285713587,2024-12-03T08:15:06.857000
CVE-2024-11898,0,0,0456808eb2a54e3b5ec4a2165ac77afd50bb67da5ab4fe9c475ae45285713587,2024-12-03T08:15:06.857000
CVE-2024-1190,0,0,97174d698ee0a283db94af4be93c59e8a1814d898054ed7eb2fd6bfac02921e8,2024-05-17T02:35:17.533000
CVE-2024-1191,0,0,6e38ed7db5944087a721298d0ec64e89db09082a4119551dba4b0f62276916e5,2024-05-17T02:35:17.640000
CVE-2024-11918,0,0,3593929fa79fd2ff3075ff0960153853c146cae2b4c652e91826347f06e81c6b,2024-11-28T06:15:08.347000
@ -243931,6 +243935,7 @@ CVE-2024-1203,0,0,b776394b4b874eaeeae3e5b604198862b49ad905e4e26e755c608f17ba381d
CVE-2024-1204,0,0,227dcadf8be17e7ba46954487209fff721db299a9b29c34d65c82dfa9a2b5cb2,2024-07-03T01:45:05.337000
CVE-2024-1205,0,0,0a0d23d8cab3c22e48da3af802fa5d4730efda2f1ae3f246ab487b1969fd7c36,2024-03-20T13:00:16.367000
CVE-2024-1206,0,0,5f77d40826619ff076a6ee2348b6f5023dd16e0c591d0d5d735c076214b8b61d,2024-02-29T13:49:29.390000
CVE-2024-12062,1,1,053134064f0b6efbb78d94709d74965493fd7936bfcf08f9a9a8ec7d826131fc,2024-12-03T10:15:05.493000
CVE-2024-1207,0,0,dcc484c1fca006f292c23965347128c235a983932753c8f043310e93d42eeea4,2024-02-15T02:05:42.313000
CVE-2024-1208,0,0,931317b38cffca1e6ab678e3f4e10db5d686e3bb7ffa9e092bfb0d5704f0fe50,2024-02-13T14:06:24.090000
CVE-2024-1209,0,0,b007174870c79d931de8bd87795b421ecc64b354efa55388cf8747cc0f9b9382,2024-02-14T16:51:40.300000
@ -263108,6 +263113,7 @@ CVE-2024-45101,0,0,cad1255565408251227b424af7803fa7b621bb0a87132fd60fe56f4ddc963
CVE-2024-45103,0,0,01e8c7d7777680c3c907a9b9346c8d516e1c4df3a86a3dfed3c0a030a8c65f44,2024-09-19T01:50:12.427000
CVE-2024-45104,0,0,30db7dcba4a138780d42a329ad568630f0b423c3266582b9f2b058712e15f7a1,2024-09-19T01:49:50.870000
CVE-2024-45105,0,0,9aafd743798418b48e0189ab1d1328ef9ead562b2c45a261fda806c20503b868,2024-09-14T11:47:14.677000
CVE-2024-45106,1,1,0b7483e7fda2ca3e4f437827923b095d4721533c78676e955e670f0ec77727b3,2024-12-03T10:15:05.697000
CVE-2024-45107,0,0,d5e30880270706ae80f98d427d6a3501f7b9d607b88b780b72f90a000a13f3a6,2024-09-06T16:26:03.440000
CVE-2024-45108,0,0,03b1037fb5ccdb261a2f64bd06297f4c212c932af1d9e1d68068742a2f76d080,2024-09-13T17:00:03.120000
CVE-2024-45109,0,0,b69153e81faafb81e736e68d1b34969baaa1e930ab46f2d35f58ab7a52cf7801,2024-09-13T16:59:46
@ -264572,6 +264578,7 @@ CVE-2024-47462,0,0,be6c9453989893d3dcfbe5bdc6e676b393ed9c49111f1ece54054c135b42f
CVE-2024-47463,0,0,2c716c4d7f29d4820a72727f94c0dd565fcb88d49fc25a376e2306f9f47f5669,2024-11-06T18:17:17.287000
CVE-2024-47464,0,0,236d04a0c7d407559b9f7742340111549ca9237c3d8e53730db19cfca87c0db1,2024-11-06T18:17:17.287000
CVE-2024-4747,0,0,071c88b133efa29a5bceaf4f1781edaa635d35ede69008d4aad9361c37e95f56,2024-05-14T16:11:39.510000
CVE-2024-47476,1,1,e227a115c9dd221fd83760fbbc7631e29365bc82fe86cf49b12c6a98eb5fbbf5,2024-12-03T10:15:05.883000
CVE-2024-4748,0,0,5ce71114653bf2c9cc6586a0117b72827b192c4aa4e8e27ac2b81ed4a0b190af,2024-10-10T16:15:08.630000
CVE-2024-47481,0,0,83505b26fa6eb758ddde8dc521f672e8bc2bacfc2db0ee1df66890f0ab8642bc,2024-10-31T00:01:40.487000
CVE-2024-47483,0,0,da98222f22e89d9e61f65fd3ac619771e185cbdec7a679159eab7aec6c7cc7a0,2024-10-31T00:01:05.127000
@ -271258,7 +271265,7 @@ CVE-2024-9050,0,0,78b9638634d0ff28e0659c218fd386df1d4e4f7c5c88d6469370350eb2679b
CVE-2024-9051,0,0,e0f892f6090989bc65bfe2c27d48e7e51216899c12a8aa5d44d38bf2b4829ddc,2024-10-15T12:58:51.050000
CVE-2024-9054,0,0,8ac0760d3aa06e14d98991152c0b4a90664b0b925ad15b2f9f9f67c478cb9754,2024-10-17T15:19:32.803000
CVE-2024-9057,0,0,1e7730ffd6c424e386d911bdf2bfee9e4291e522521f210193a354376f62eabc,2024-10-15T13:58:19.960000
CVE-2024-9058,1,1,3c4249771363eaf8f1ee3f2a724fa89fffa22e0f0b5c258bc3a4c06bb10f565a,2024-12-03T07:15:04.230000
CVE-2024-9058,0,0,3c4249771363eaf8f1ee3f2a724fa89fffa22e0f0b5c258bc3a4c06bb10f565a,2024-12-03T07:15:04.230000
CVE-2024-9059,0,0,4d4eca66fdabff300ba12a6c3aa840e717659fd399e0c46eca6a0c562dee781c,2024-11-19T15:53:56.680000
CVE-2024-9060,0,0,362dff7d92c4f79cdb773c7965db43bbd7eb0923ce5f0445c06b15d2c9fc0e79,2024-10-04T13:51:25.567000
CVE-2024-9061,0,0,68964a8d24a934fad1df20bd8f6d5ba6a330caf51ca0e0445a293becf4ee4892,2024-10-30T21:11:17.450000

Can't render this file because it is too large.