Auto-Update: 2024-12-04T23:00:39.149264+00:00

This commit is contained in:
cad-safe-bot 2024-12-04 23:03:50 +00:00
parent f7309ae78d
commit 31b9ae6d7c
56 changed files with 3047 additions and 287 deletions

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9396",
"sourceIdentifier": "security@android.com",
"published": "2024-12-04T22:15:18.457",
"lastModified": "2024-12-04T22:15:18.457",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In rpc_msg_handler and related handlers of drivers/misc/mediatek/eccci/port_rpc.c, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-47535",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-24T15:15:17.120",
"lastModified": "2024-05-24T18:09:20.027",
"lastModified": "2024-12-04T21:15:18.563",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/msm/a6xx: asigne suficiente espacio para los registros GMU. En el commit 142639a52a01 (\"drm/msm/a6xx: corrija la captura del estado de falla para A650\") cambiamos a6xx_get_gmu_registers() para que diga 3 conjuntos de registros. Desafortunadamente, no cambiamos la asignaci\u00f3n de memoria para la matriz. Eso conduce a una advertencia de KASAN (esto estaba en el kernel chromeos-5.4, que tiene el commit problem\u00e1tica respaldada): ERROR: KASAN: slab-out-of-bounds in _a6xx_get_gmu_registers+0x144/0x430 Escritura de tama\u00f1o 8 en addr ffffff80c89432b0 por tarea A618-worker/209 CPU: 5 PID: 209 Comm: A618-worker Contaminado: GW 5.4.156-lockdep #22 Nombre del hardware: Google Lazor Limozeen sin pantalla t\u00e1ctil (rev5 - rev8) (DT) Rastreo de llamadas: dump_backtrace+0x0 /0x248 show_stack+0x20/0x2c dump_stack+0x128/0x1ec print_address_description+0x88/0x4a0 __kasan_report+0xfc/0x120 kasan_report+0x10/0x18 __asan_report_store8_noabort+0x1c/0x24 _a6xx_get_gmu_registers +0x144/0x430 a6xx_gpu_state_get+0x330/0x25d4 msm_gpu_crashstate_capture+0xa0/0x84c recovery_worker+0x328 /0x838 kthread_worker_fn+0x32c/0x574 kthread+0x2dc/0x39c ret_from_fork+0x10/0x18 Asignado por la tarea 209: __kasan_kmalloc+0xfc/0x1c4 kasan_kmalloc+0xc/0x14 kmem_cache_alloc_trace+0x1f0/0x 2a0 a6xx_gpu_state_get+0x164/0x25d4 msm_gpu_crashstate_capture+0xa0/0x84c recovery_worker+0x328 /0x838 kthread_worker_fn+0x32c/0x574 kthread+0x2dc/0x39c ret_from_fork+0x10/0x18"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/83e54fcf0b14ca2d869dd37abe1bb6542805f538",
@ -28,6 +63,18 @@
{
"url": "https://git.kernel.org/stable/c/d646856a600e8635ba498f20b194219b158626e8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/83e54fcf0b14ca2d869dd37abe1bb6542805f538",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/b4d25abf9720b69a03465b09d0d62d1998ed6708",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/d646856a600e8635ba498f20b194219b158626e8",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-36238",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-13T21:15:53.813",
"lastModified": "2024-03-14T12:52:21.763",
"lastModified": "2024-12-04T21:15:19.377",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,11 +15,50 @@
"value": "La referencia directa a objetos inseguros (IDOR) en Bagisto v.1.5.1 permite a un atacante obtener informaci\u00f3n confidencial a trav\u00e9s del par\u00e1metro ID de factura."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://github.com/Ek-Saini/security/blob/main/IDOR-Bagisto",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Ek-Saini/security/blob/main/IDOR-Bagisto",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42835",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-02-21T07:15:48.167",
"lastModified": "2024-02-22T19:07:27.197",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-04T22:34:26.587",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,74 @@
"value": "Se solucion\u00f3 un problema de l\u00f3gica con controles mejorados. Este problema se solucion\u00f3 en macOS Sonoma 14.1. Un atacante puede acceder a los datos del usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.1",
"matchCriteriaId": "2BB2BFC1-74A1-4178-8488-69EC5A60B34F"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213984",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213984",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42928",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-02-21T07:15:50.603",
"lastModified": "2024-08-01T13:44:49.103",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-04T22:34:44.777",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,12 +17,34 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,19 +52,63 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.1",
"matchCriteriaId": "0B5787E4-1911-4926-9D81-492EFB438954"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.1",
"matchCriteriaId": "434A55CA-5660-4F40-B4A2-5ABAF4CA7263"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213982",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213982",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-50923",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-21T00:15:07.597",
"lastModified": "2024-08-02T23:15:37.853",
"lastModified": "2024-12-04T21:15:19.777",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
@ -22,7 +22,42 @@
"value": "En QUIC en RFC 9000, la especificaci\u00f3n Latency Spin Bit (secci\u00f3n 17.4) no restringe estrictamente el valor del bit cuando la caracter\u00edstica est\u00e1 deshabilitada, lo que podr\u00eda permitir a atacantes remotos construir un canal encubierto con datos representados como cambios en el valor del bit. NOTA: \"Sheridan, S., Keane, A. (2015). En Actas de la 14\u00aa Conferencia Europea sobre Guerra Cibern\u00e9tica y Seguridad (ECCWS), Universidad de Hertfordshire, Hatfield, Reino Unido\". El art\u00edculo dice: \"Los protocolos de comunicaci\u00f3n de Internet modernos proporcionan un n\u00famero casi infinito de formas en las que los datos pueden ocultarse o incrustarse en el tr\u00e1fico de red aparentemente normal\"."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://arrow.tudublin.ie/nsdcon/2/",
@ -35,6 +70,18 @@
{
"url": "https://www.rfc-editor.org/rfc/rfc9000.html",
"source": "cve@mitre.org"
},
{
"url": "https://arrow.tudublin.ie/nsdcon/2/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://ieeexplore.ieee.org/document/10427406",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.rfc-editor.org/rfc/rfc9000.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52722",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-28T00:15:07.270",
"lastModified": "2024-07-03T19:15:03.080",
"lastModified": "2024-12-04T21:15:19.983",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Se descubri\u00f3 un problema en Artifex Ghostscript hasta la versi\u00f3n 10.01.0. psi/zmisc1.c, cuando se utiliza el modo M\u00c1S SEGURO, permite semillas eexec distintas al est\u00e1ndar Tipo 1."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/06/28/2",
@ -24,6 +47,14 @@
{
"url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/06/28/2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://cgit.ghostscript.com/cgi-bin/cgit.cgi/ghostpdl.git/commit/?id=afd7188f74918cb51b5fb89f52b54eb16e8acfd1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52724",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T00:15:07.287",
"lastModified": "2024-04-30T13:11:16.690",
"lastModified": "2024-12-04T21:15:20.180",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,11 +15,50 @@
"value": "Open Networking Foundation SD-RAN onos-kpimon 0.4.7 permite el acceso a la matriz fuera de los l\u00edmites en la funci\u00f3n ProcessIndicationFormat1."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://github.com/onosproject/onos-kpimon/pull/120",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/onosproject/onos-kpimon/pull/120",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52829",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T16:15:20.600",
"lastModified": "2024-05-21T16:53:56.550",
"lastModified": "2024-12-04T21:15:20.377",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: wifi: ath12k: corrige una posible escritura fuera de los l\u00edmites en ath12k_wmi_ext_hal_reg_caps() reg_cap.phy_id se extrae del evento WMI y podr\u00eda ser un valor inesperado en caso de que ocurran algunos errores. Como resultado, puede ocurrir una escritura fuera de los l\u00edmites en soc->hal_reg_cap. Solucionarlo validando reg_cap.phy_id antes de usarlo. Esto se encuentra durante la revisi\u00f3n del c\u00f3digo. Compilaci\u00f3n probada \u00fanicamente."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/4dd0547e8b45faf6f95373be5436b66cde326c0e",
@ -28,6 +63,18 @@
{
"url": "https://git.kernel.org/stable/c/dfe13eaab043130f90dd3d57c7d88577c04adc97",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
},
{
"url": "https://git.kernel.org/stable/c/4dd0547e8b45faf6f95373be5436b66cde326c0e",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/b302dce3d9edea5b93d1902a541684a967f3c63c",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://git.kernel.org/stable/c/dfe13eaab043130f90dd3d57c7d88577c04adc97",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11742",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-26T20:15:25.703",
"lastModified": "2024-11-26T20:15:25.703",
"vulnStatus": "Received",
"lastModified": "2024-12-04T21:04:48.830",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in SourceCodester Best House Rental Management System 1.0. This issue affects some unknown processing of the file /rental/ajax.php?action=save_tenant. The manipulation of the argument lastname/firstname/middlename leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como problem\u00e1tica, en SourceCodester Best House Rental Management System 1.0. Este problema afecta a algunos procesos desconocidos del archivo /rental/ajax.php?action=save_tenant. La manipulaci\u00f3n del argumento lastname/firstname/middlename conduce a cross-site scripting. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -120,26 +144,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mayurik:best_house_rental_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A7D6CEC7-5EE1-4052-B0E2-093C40418760"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/YasserREED/YasserREED-CVEs/blob/main/Best%20house%20rental%20management%20system%20project%20in%20php/Stored%20Cross-Site%20Scripting%20(XSS).md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.286139",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.286139",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.449683",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11743",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-26T20:15:25.930",
"lastModified": "2024-11-26T20:15:25.930",
"vulnStatus": "Received",
"lastModified": "2024-12-04T21:07:20.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in SourceCodester Best House Rental Management System 1.0. Affected is an unknown function of the file /rental/ajax.php?action=delete_user of the component POST Request Handler. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en SourceCodester Best House Rental Management System 1.0. Se trata de una funci\u00f3n desconocida del archivo /rental/ajax.php?action=delete_user del componente POST Request Handler. La manipulaci\u00f3n conduce a cross-site request forgery. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,28 +142,71 @@
"value": "CWE-862"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mayurik:best_house_rental_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A7D6CEC7-5EE1-4052-B0E2-093C40418760"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/YasserREED/YasserREED-CVEs/blob/main/Best%20house%20rental%20management%20system%20project%20in%20php/Cross-Site%20Request%20Forgery%20(CSRF).md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.286140",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.286140",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.449697",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11860",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-27T17:15:10.010",
"lastModified": "2024-11-27T17:15:10.010",
"vulnStatus": "Received",
"lastModified": "2024-12-04T21:08:39.133",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in SourceCodester Best House Rental Management System 1.0. This affects an unknown part of the file /rental/ajax.php?action=delete_tenant of the component POST Request Handler. The manipulation of the argument id leads to improper authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en SourceCodester Best House Rental Management System 1.0. Afecta a una parte desconocida del archivo /rental/ajax.php?action=delete_tenant del componente POST Request Handler. La manipulaci\u00f3n del argumento id conduce a una autorizaci\u00f3n incorrecta. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede ser utilizado."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,32 +142,78 @@
"value": "CWE-285"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mayurik:best_house_rental_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A7D6CEC7-5EE1-4052-B0E2-093C40418760"
}
]
}
]
}
],
"references": [
{
"url": "https://drive.google.com/file/d/1CyjtknGVqn5QO_R1WZX-hoGH8ae5DjRq/view",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://github.com/YasserREED/YasserREED-CVEs/blob/main/Best%20house%20rental%20management%20system%20project%20in%20php/Unauthorized%20Tenant%20Deletion.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.286245",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.286245",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?submit.449684",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11995",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-29T21:15:04.290",
"lastModified": "2024-11-29T21:15:04.290",
"vulnStatus": "Received",
"lastModified": "2024-12-04T21:37:07.487",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in code-projects Farmacia 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /pagamento.php. The manipulation of the argument total leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en code-projects Farmacia 1.0 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /pagamento.php. La manipulaci\u00f3n del argumento total provoca ataques de Cross-site Scripting. El ataque puede ejecutarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,28 +142,71 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anisha:farmacia:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B8C68FD0-0D27-4525-8289-0526E4F5B6E6"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/5p4rk/cve/blob/main/xss.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.286411",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.286411",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?submit.453639",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11996",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-30T08:15:03.937",
"lastModified": "2024-11-30T08:15:03.937",
"vulnStatus": "Received",
"lastModified": "2024-12-04T21:29:13.483",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Farmacia 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /editar-fornecedor.php. The manipulation of the argument cidade leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en code-projects Farmacia 1.0 y se ha clasificado como problem\u00e1tica. Este problema afecta a algunas funciones desconocidas del archivo /editar-fornecedor.php. La manipulaci\u00f3n del argumento cidade provoca Cross-site Scripting. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,28 +142,71 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anisha:farmacia:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B8C68FD0-0D27-4525-8289-0526E4F5B6E6"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/jaychou8023/cve/blob/main/xss1.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.286412",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.286412",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.453702",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11997",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-30T08:15:05.223",
"lastModified": "2024-11-30T08:15:05.223",
"vulnStatus": "Received",
"lastModified": "2024-12-04T21:26:54.147",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Farmacia 1.0. It has been classified as problematic. This affects an unknown part of the file /vendas.php. The manipulation of the argument notaFiscal leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en code-projects Farmacia 1.0. Se ha clasificado como problem\u00e1tica. Afecta a una parte desconocida del archivo /vendas.php. La manipulaci\u00f3n del argumento notaFiscal provoca ataques de Cross-site Scripting. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,28 +142,71 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anisha:farmacia:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B8C68FD0-0D27-4525-8289-0526E4F5B6E6"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/jaychou8023/cve/blob/main/xss2.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.286413",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.286413",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.453703",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11998",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-30T10:15:04.340",
"lastModified": "2024-11-30T10:15:04.340",
"vulnStatus": "Received",
"lastModified": "2024-12-04T21:23:13.700",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Farmacia 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /visualizer-forneccedor.chp. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en code-projects Farmacia 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /visualizer-forneccedor.chp. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,28 +142,71 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:farmacia_project:farmacia:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D380C1FE-6094-48EE-8E25-BFFCB798D54B"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/jaychou8023/cve/blob/main/sql1.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.286414",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.286414",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.453706",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-12180",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-04T22:15:22.140",
"lastModified": "2024-12-04T22:15:22.140",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in DedeCMS 5.7.116. Affected is an unknown function of the file /member/article_add.php. The manipulation of the argument body leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/Hebing123/cve/issues/76",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.286902",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.286902",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.452969",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-12181",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-04T22:15:22.360",
"lastModified": "2024-12-04T22:15:22.360",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in DedeCMS 5.7.116. Affected by this vulnerability is an unknown functionality of the file /member/uploads_add.php of the component SWF File Handler. The manipulation of the argument mediatype leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/Hebing123/cve/issues/77",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.286903",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.286903",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.452983",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12196",
"sourceIdentifier": "security@devolutions.net",
"published": "2024-12-04T18:15:13.173",
"lastModified": "2024-12-04T18:15:13.173",
"lastModified": "2024-12-04T21:15:21.090",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "Incorrect authorization in the permission component in Devolutions Server 2024.3.7.0 and earlier allows an authenticated user to view the password history of an entry without the view password permission."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@devolutions.net",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1674",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-02-21T04:15:08.430",
"lastModified": "2024-12-02T19:51:32.163",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-04T21:15:21.223",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1703",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-21T17:15:08.793",
"lastModified": "2024-05-17T02:35:33.577",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-04T22:33:29.567",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,12 +32,30 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
@ -45,13 +65,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:L/Au:S/C:P/I:N/A:N",
"baseScore": 2.7,
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.7
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 5.1,
@ -67,27 +87,84 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-36"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zhongbangkeji:crmeb:5.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "429519B4-5DD9-4348-B318-6C4F1273BA81"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Echosssy/-CRMEB-Mall-commercial-version-of-any-file-read-vulnerability/blob/main/README.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.254391",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.254391",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/Echosssy/-CRMEB-Mall-commercial-version-of-any-file-read-vulnerability/blob/main/README.md",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.254391",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.254391",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1704",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-21T18:15:50.613",
"lastModified": "2024-05-17T02:35:33.680",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-04T22:24:16.043",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,12 +32,30 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
],
"cvssMetricV2": [
@ -45,13 +65,13 @@
"cvssData": {
"version": "2.0",
"vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 5.2,
"accessVector": "ADJACENT_NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.2
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 5.1,
@ -67,7 +87,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -76,18 +96,65 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zhongbangkeji:crmeb:5.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "429519B4-5DD9-4348-B318-6C4F1273BA81"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Echosssy/CVE/blob/main/%E4%BC%97%E9%82%A6%E7%A7%91%E6%8A%80CRMEB%20Mall%20business%20edition%20overrides%20any%20file.docx",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.254392",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.254392",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/Echosssy/CVE/blob/main/%E4%BC%97%E9%82%A6%E7%A7%91%E6%8A%80CRMEB%20Mall%20business%20edition%20overrides%20any%20file.docx",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.254392",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.254392",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20745",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T15:15:41.380",
"lastModified": "2024-03-18T19:40:00.173",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-04T22:07:18.903",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -42,19 +42,81 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
"versionEndExcluding": "23.6.4",
"matchCriteriaId": "20EDCC65-982D-4AC5-837A-C0185DE70A2E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0",
"versionEndExcluding": "24.2.1",
"matchCriteriaId": "F6E39ED0-A7E1-40F7-B42D-B9CF812FB96D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/premiere_pro/apsb24-12.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/premiere_pro/apsb24-12.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20746",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T15:15:41.580",
"lastModified": "2024-03-18T19:40:00.173",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-04T22:06:27.610",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,62 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
"versionEndExcluding": "23.6.4",
"matchCriteriaId": "20EDCC65-982D-4AC5-837A-C0185DE70A2E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0",
"versionEndExcluding": "24.2.1",
"matchCriteriaId": "F6E39ED0-A7E1-40F7-B42D-B9CF812FB96D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/premiere_pro/apsb24-12.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/premiere_pro/apsb24-12.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20752",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T16:15:07.380",
"lastModified": "2024-03-18T19:40:00.173",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-04T22:05:25.983",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,62 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.0.6",
"matchCriteriaId": "5951C9D2-5807-4736-B51F-3CF9053D90D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0.0",
"versionEndExcluding": "14.0.2",
"matchCriteriaId": "379E4362-C280-44A5-A7D5-AA89148803CF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/bridge/apsb24-15.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/bridge/apsb24-15.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20754",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:07.897",
"lastModified": "2024-03-18T19:40:00.173",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-04T21:55:42.963",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
@ -30,19 +32,37 @@
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +71,50 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:lightroom:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.2",
"matchCriteriaId": "885C0D24-2492-47D5-A461-DBB67F57607E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/lightroom/apsb24-17.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/lightroom/apsb24-17.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20755",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T16:15:07.640",
"lastModified": "2024-03-18T19:40:00.173",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-04T22:04:31.123",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -42,19 +42,81 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.0.6",
"matchCriteriaId": "5951C9D2-5807-4736-B51F-3CF9053D90D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0.0",
"versionEndExcluding": "14.0.2",
"matchCriteriaId": "379E4362-C280-44A5-A7D5-AA89148803CF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/bridge/apsb24-15.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/bridge/apsb24-15.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20756",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T16:15:07.933",
"lastModified": "2024-03-18T19:40:00.173",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-04T22:03:16.873",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,62 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.0.6",
"matchCriteriaId": "5951C9D2-5807-4736-B51F-3CF9053D90D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0.0",
"versionEndExcluding": "14.0.2",
"matchCriteriaId": "379E4362-C280-44A5-A7D5-AA89148803CF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/bridge/apsb24-15.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/bridge/apsb24-15.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20757",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T16:15:08.193",
"lastModified": "2024-03-18T19:40:00.173",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-04T21:56:40.727",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,62 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.0.6",
"matchCriteriaId": "5951C9D2-5807-4736-B51F-3CF9053D90D0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:bridge:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0.0",
"versionEndExcluding": "14.0.2",
"matchCriteriaId": "379E4362-C280-44A5-A7D5-AA89148803CF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/bridge/apsb24-15.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/bridge/apsb24-15.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20767",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T12:15:06.870",
"lastModified": "2024-03-18T12:38:25.490",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-04T22:15:59.953",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,31 +32,181 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:-:*:*:*:*:*:*",
"matchCriteriaId": "7A94B406-C011-4673-8C2B-0DD94D46CC4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update1:*:*:*:*:*:*",
"matchCriteriaId": "AFD05E3A-10F9-4C75-9710-BA46B66FF6E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update10:*:*:*:*:*:*",
"matchCriteriaId": "F1FC7D1D-6DD2-48B2-980F-B001B0F24473"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update11:*:*:*:*:*:*",
"matchCriteriaId": "1FA19E1D-61C2-4640-AF06-4BCFE750BDF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update12:*:*:*:*:*:*",
"matchCriteriaId": "3F331DEA-F3D0-4B13-AB1E-6FE39B2BB55D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update2:*:*:*:*:*:*",
"matchCriteriaId": "D57C8681-AC68-47DF-A61E-B5C4B4A47663"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update3:*:*:*:*:*:*",
"matchCriteriaId": "75608383-B727-48D6-8FFA-D552A338A562"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update4:*:*:*:*:*:*",
"matchCriteriaId": "7773DB68-414A-4BA9-960F-52471A784379"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update5:*:*:*:*:*:*",
"matchCriteriaId": "B38B9E86-BCD5-4BCA-8FB7-EC55905184E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update6:*:*:*:*:*:*",
"matchCriteriaId": "5E7BAB80-8455-4570-A2A2-8F40469EE9CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update7:*:*:*:*:*:*",
"matchCriteriaId": "F9D645A2-E02D-4E82-A2BD-0A7DE5B8FBCC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update8:*:*:*:*:*:*",
"matchCriteriaId": "6E22D701-B038-4795-AA32-A18BC93C2B6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update9:*:*:*:*:*:*",
"matchCriteriaId": "CAC4A0EC-C3FC-47D8-86CE-0E6A87A7F0B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:-:*:*:*:*:*:*",
"matchCriteriaId": "B02A37FE-5D31-4892-A3E6-156A8FE62D28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update1:*:*:*:*:*:*",
"matchCriteriaId": "0AA3D302-CFEE-4DFD-AB92-F53C87721BFF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update2:*:*:*:*:*:*",
"matchCriteriaId": "EB88D4FE-5496-4639-BAF2-9F29F24ABF29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update3:*:*:*:*:*:*",
"matchCriteriaId": "43E0ED98-2C1F-40B8-AF60-FEB1D85619C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update4:*:*:*:*:*:*",
"matchCriteriaId": "76204873-C6E0-4202-8A03-0773270F1802"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update5:*:*:*:*:*:*",
"matchCriteriaId": "C1A22BE9-0D47-4BA8-8BDB-9B12D7A0F7C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update6:*:*:*:*:*:*",
"matchCriteriaId": "E3A83642-BF14-4C37-BD94-FA76AABE8ADC"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb24-14.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb24-14.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20791",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-05-16T09:15:08.967",
"lastModified": "2024-05-16T13:03:05.353",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-04T22:39:52.703",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,62 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
"versionEndExcluding": "27.9.4",
"matchCriteriaId": "88DFD058-372A-417C-8192-B14FA401623B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
"versionStartIncluding": "28.0",
"versionEndExcluding": "28.5",
"matchCriteriaId": "0985E08E-4341-4E84-A6EB-76C174B3FDEA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb24-30.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb24-30.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21105",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:31.770",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-12-04T21:15:21.417",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 2.0,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
@ -30,19 +32,33 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.0,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22780",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-02T15:15:52.817",
"lastModified": "2024-04-02T18:12:16.283",
"lastModified": "2024-12-04T21:15:21.567",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de Cross Site Scripting en CA17 TeamsACS v.1.0.1 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un script manipulado en el par\u00e1metro errmsg."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "http://ca17.com",
@ -28,6 +63,18 @@
{
"url": "https://github.com/CA17/TeamsACS",
"source": "cve@mitre.org"
},
{
"url": "http://ca17.com",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://fuo.fi/CVE-2024-22780/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/CA17/TeamsACS",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23249",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:48.480",
"lastModified": "2024-03-13T21:15:56.730",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-04T21:15:21.770",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": "El problema se solucion\u00f3 mejorando el manejo de la memoria. Este problema se solucion\u00f3 en macOS Sonoma 14.4. El procesamiento de un archivo puede provocar una denegaci\u00f3n de servicio o potencialmente revelar el contenido de la memoria."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-404"
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
@ -24,6 +59,14 @@
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "product-security@apple.com"
},
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://support.apple.com/en-us/HT214084",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23735",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-10T16:15:09.950",
"lastModified": "2024-04-10T19:49:51.183",
"lastModified": "2024-12-04T21:15:21.980",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "La vulnerabilidad de Cross Site Scripting (XSS) en la funcionalidad de carga de certificados S/MIME de las p\u00e1ginas de perfil de usuario en savignano S/Notify anterior a 4.0.0 para Confluence permite a los atacantes manipular datos del usuario a trav\u00e9s de un certificado especialmente manipulado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://help.savignano.net/snotify-email-encryption/sa-2023-11-02",
@ -24,6 +59,14 @@
{
"url": "https://help.savignano.net/snotify-email-encryption/security-advisories",
"source": "cve@mitre.org"
},
{
"url": "https://help.savignano.net/snotify-email-encryption/sa-2023-11-02",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://help.savignano.net/snotify-email-encryption/security-advisories",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2380",
"sourceIdentifier": "security@checkmk.com",
"published": "2024-04-05T13:15:07.973",
"lastModified": "2024-04-08T18:49:25.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-04T21:53:45.717",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,12 +32,30 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,12 +69,59 @@
"value": "CWE-80"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "1A020A77-7D84-4557-9B0B-D74A89BC1538"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "D9770554-978B-4552-9E0E-CD6B6675243C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "1883D2F4-CB96-4DDE-87E8-D1990A3FA092"
}
]
}
]
}
],
"references": [
{
"url": "https://checkmk.com/werk/16618",
"source": "security@checkmk.com"
"source": "security@checkmk.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://checkmk.com/werk/16618",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-25073",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-09-10T15:15:15.170",
"lastModified": "2024-09-23T19:15:13.197",
"lastModified": "2024-12-04T21:15:22.230",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
@ -30,15 +32,25 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26450",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-28T22:15:26.730",
"lastModified": "2024-03-09T08:15:06.120",
"lastModified": "2024-12-04T21:15:22.447",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,11 +15,54 @@
"value": "La vulnerabilidad de Cross Site Scripting en Piwigo anterior a v.14.2.0 permite a un atacante remoto escalar privilegios a trav\u00e9s de la funci\u00f3n por lotes en la p\u00e1gina de administraci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/Piwigo/Piwigo/security/advisories/GHSA-p362-cfpj-q55f",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Piwigo/Piwigo/security/advisories/GHSA-p362-cfpj-q55f",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26469",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-03T10:15:06.813",
"lastModified": "2024-03-04T13:58:23.447",
"lastModified": "2024-12-04T21:15:22.647",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,11 +15,50 @@
"value": "Vulnerabilidad de Server-Side Request Forgery (SSRF) en el m\u00f3dulo \"Product Designer\" (productdesigner) de Tunis Soft para PrestaShop anterior a la versi\u00f3n 1.178.36, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (DoS) y escalar privilegios a trav\u00e9s del par\u00e1metro url en el postProcess () m\u00e9todo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-productdesigner-918.md",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/friends-of-presta/security-advisories/blob/main/_posts/2024-02-29-productdesigner-918.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27140",
"sourceIdentifier": "security@apache.org",
"published": "2024-03-01T16:15:46.143",
"lastModified": "2024-08-05T21:15:38.120",
"lastModified": "2024-12-04T21:15:22.860",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
@ -22,11 +22,34 @@
"value": "** NO SOPORTADO CUANDO EST\u00c1 ASIGNADO ** Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('cross-site Scripting') en Apache Archiva. Este problema afecta a Apache Archiva: desde 2.0.0. Como este proyecto est\u00e1 retirado, no planeamos lanzar una versi\u00f3n que solucione este problema. Se recomienda a los usuarios que busquen una alternativa o restrinjan el acceso a la instancia a usuarios confiables. Alternativamente, puede configurar un proxy HTTP frente a su instancia de Archiva para reenviar solo solicitudes que no tengan caracteres maliciosos en la URL. NOTA: Esta vulnerabilidad solo afecta a productos que ya no son compatibles con el fabricante."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -43,6 +66,14 @@
{
"url": "https://lists.apache.org/thread/xrn6nt904ozh3jym60c3f5hj2fb75pjy",
"source": "security@apache.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/03/01/2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.apache.org/thread/xrn6nt904ozh3jym60c3f5hj2fb75pjy",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28565",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-20T06:15:09.087",
"lastModified": "2024-05-01T18:15:17.513",
"lastModified": "2024-12-04T21:15:23.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de desbordamiento de b\u00fafer en open source FreeImage v.3.19.0 [r1909] permite que un atacante local provoque una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de la funci\u00f3n psdParser::ReadImageData() al leer im\u00e1genes en formato PSD."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/10",
@ -32,6 +67,22 @@
{
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/10",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/11/3",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/Ruanxingzhi/vul-report/tree/master/freeimage-r1909",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-30864",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-01T15:15:50.033",
"lastModified": "2024-04-01T15:53:18.060",
"lastModified": "2024-12-04T21:15:23.283",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,11 +15,50 @@
"value": "netentsec NS-ASG 6.3 es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de /admin/config_ISCGroupTimePolicy.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-config_ISCGroupTimePolicy.md",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-config_ISCGroupTimePolicy.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-31852",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-05T15:15:08.270",
"lastModified": "2024-04-08T18:49:25.863",
"lastModified": "2024-12-04T21:15:23.467",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "LLVM anterior a 18.1.3 genera c\u00f3digo en el que el registro LR se puede sobrescribir sin que los datos se guarden en la pila y, por lo tanto, a veces puede haber un error explotable en el flujo de control. Esto afecta el backend de ARM y se puede demostrar con Clang. NOTA: la perspectiva del proveedor es \"no tenemos fuertes objeciones para que se cree un CVE... Parece que la probabilidad de que esta mala compilaci\u00f3n permita un exploit sigue siendo muy baja, porque la mala compilaci\u00f3n que resulta en este dispositivo JOP es tal que \"Es m\u00e1s probable que la funci\u00f3n falle en la mayor\u00eda de las entradas v\u00e1lidas de la funci\u00f3n. Por lo tanto, si esta funci\u00f3n est\u00e1 cubierta por alguna prueba, lo m\u00e1s probable es que se descubra la mala compilaci\u00f3n antes de que el binario se env\u00ede a producci\u00f3n\"."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://bugs.chromium.org/p/llvm/issues/detail?id=69",
@ -32,6 +55,22 @@
{
"url": "https://llvm.org/docs/Security.html",
"source": "cve@mitre.org"
},
{
"url": "https://bugs.chromium.org/p/llvm/issues/detail?id=69",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/llvm/llvm-project/issues/80287",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/llvmbot/llvm-project/commit/0e16af8e4cf3a66ad5d078d52744ae2776f9c4b2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://llvm.org/docs/Security.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-34468",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-04T20:15:07.590",
"lastModified": "2024-05-06T12:44:56.377",
"lastModified": "2024-12-04T21:15:23.670",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,11 +15,50 @@
"value": "Rukovoditel anterior a 3.5.3 permite XSS a trav\u00e9s de user_photo a Mi p\u00e1gina."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://forum.rukovoditel.net/viewtopic.php?t=5071",
"source": "cve@mitre.org"
},
{
"url": "https://forum.rukovoditel.net/viewtopic.php?t=5071",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-34500",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-05T19:15:07.123",
"lastModified": "2024-06-10T17:16:29.303",
"lastModified": "2024-12-04T21:15:23.877",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en la extensi\u00f3n UnlinkedWikibase en MediaWiki antes de 1.39.6, 1.40.x antes de 1.40.2 y 1.41.x antes de 1.41.1. XSS puede ocurrir a trav\u00e9s de un mensaje de interfaz. Los mensajes de error (en la $err var) no se escapan antes de pasarse a Html::rawElement() en la funci\u00f3n getError() en la clase Hooks."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/UnlinkedWikibase/+/1002175",
@ -28,6 +63,18 @@
{
"url": "https://phabricator.wikimedia.org/T357203",
"source": "cve@mitre.org"
},
{
"url": "https://gerrit.wikimedia.org/r/c/mediawiki/extensions/UnlinkedWikibase/+/1002175",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FU2FGUXXK6TMV6R52VRECLC6XCSQQISY/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://phabricator.wikimedia.org/T357203",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-38829",
"sourceIdentifier": "security@vmware.com",
"published": "2024-12-04T21:15:24.103",
"lastModified": "2024-12-04T21:15:24.103",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in VMware Tanzu Spring LDAP allows data exposure for case sensitive comparisons.This issue affects Spring LDAP: from 2.4.0 through 2.4.3, from 3.0.0 through 3.0.9, from 3.1.0 through 3.1.7, from 3.2.0 through 3.2.7, AND all versions prior to 2.4.0.\n\nThe usage of String.toLowerCase() and String.toUpperCase() has some Locale dependent exceptions that could potentially result in unintended columns from being queried\nRelated to CVE-2024-38820 https://spring.io/security/cve-2024-38820"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@vmware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@vmware.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-178"
}
]
}
],
"references": [
{
"url": "https://spring.io/security/cve-2024-38829",
"source": "security@vmware.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-39219",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-04T21:15:24.233",
"lastModified": "2024-12-04T21:15:24.233",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Aginode GigaSwitch V5 before version 7.06G allows authenticated attackers with Administrator privileges to upload an earlier firmware version, exposing the device to previously patched vulnerabilities."
}
],
"metrics": {},
"references": [
{
"url": "https://blog.hackvens.fr/advisories/CVE-2024-39967-CVE-2024-39219-GigaSwitch.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.aginode.support/support/documentation/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-4900",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-06-24T06:15:11.423",
"lastModified": "2024-06-24T12:57:36.513",
"lastModified": "2024-12-04T21:15:24.417",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,11 +15,38 @@
"value": "El complemento SEOPress WordPress anterior a 7.8 no valida ni escapa a una de sus configuraciones de publicaci\u00f3n, lo que podr\u00eda permitir que el colaborador y el rol superior realicen ataques de redireccionamiento abierto contra cualquier usuario que vea una publicaci\u00f3n maliciosa."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/a56ad272-e2ed-4064-9b5d-114a834dd8b3/",
"source": "contact@wpscan.com"
},
{
"url": "https://wpscan.com/vulnerability/a56ad272-e2ed-4064-9b5d-114a834dd8b3/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-50947",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-04T21:15:24.570",
"lastModified": "2024-12-04T21:15:24.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in kmqtt v0.2.7 allows attackers to cause a Denial of Service (DoS) via a crafted request."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/pengwGit/40934164f68a8a45ebaacfcdeb598fcb",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/davidepianca98/KMQTT",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-50948",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-03T19:15:10.580",
"lastModified": "2024-12-03T19:15:10.580",
"lastModified": "2024-12-04T22:15:22.627",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in mochiMQTT v2.6.3 allows attackers to cause a Denial of Service (DoS) via a crafted request."
},
{
"lang": "es",
"value": " Un problema en mochiMQTT v2.6.3 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una solicitud manipulada espec\u00edficamente."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://gist.github.com/pengwGit/39760ed5ae03171622ca8215dc0d8c60",

View File

@ -0,0 +1,36 @@
{
"id": "CVE-2024-51210",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-04T21:15:24.697",
"lastModified": "2024-12-04T21:15:24.697",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Firepad through 1.5.11 allows remote attackers, who have knowledge of a pad ID, to retrieve both the current text of a document and all content that has previously been pasted into the document. NOTE: in several similar products, this is the intentional behavior for anyone who knows the full document ID and corresponding URL. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {},
"references": [
{
"url": "https://firebase.blog/posts/2013/04/announcing-firepad-our-open-source/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/FirebaseExtended/firepad/releases/tag/v1.5.11",
"source": "cve@mitre.org"
},
{
"url": "https://medium.com/@adityaahuja.work/accessing-full-history-of-firepad-users-ddc889e73936",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-53916",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-25T00:15:04.423",
"lastModified": "2024-12-04T04:15:04.710",
"lastModified": "2024-12-04T22:15:22.840",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -52,6 +52,10 @@
"url": "https://review.opendev.org/q/project:openstack/neutron",
"source": "cve@mitre.org"
},
{
"url": "https://security.openstack.org/ossa/OSSA-2024-005.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/12/03/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-54674",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-04T21:15:25.130",
"lastModified": "2024-12-04T21:15:25.130",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "app/View/GalaxyClusters/cluster_export_misp_galaxy.ctp in MISP through 2.5.2 has stored XSS when exporting custom clusters into the misp-galaxy format."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/MISP/MISP/commit/d0330989e235a8a9f43c90817896de87a589ef7d",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-54675",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-04T21:15:25.263",
"lastModified": "2024-12-04T21:15:25.263",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "app/webroot/js/workflows-editor/workflows-editor.js in MISP through 2.5.2 has stored XSS in the editor interface for an ad-hoc workflow."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/MISP/MISP/commit/e02c2b864a85d14d64adf9f878f9c7b2bdd15173",
"source": "cve@mitre.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-04T21:00:42.134731+00:00
2024-12-04T23:00:39.149264+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-04T20:39:07.400000+00:00
2024-12-04T22:39:52.703000+00:00
```
### Last Data Feed Release
@ -33,27 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
272142
272151
```
### CVEs added in the last Commit
Recently added CVEs: `0`
Recently added CVEs: `9`
- [CVE-2018-9396](CVE-2018/CVE-2018-93xx/CVE-2018-9396.json) (`2024-12-04T22:15:18.457`)
- [CVE-2024-12180](CVE-2024/CVE-2024-121xx/CVE-2024-12180.json) (`2024-12-04T22:15:22.140`)
- [CVE-2024-12181](CVE-2024/CVE-2024-121xx/CVE-2024-12181.json) (`2024-12-04T22:15:22.360`)
- [CVE-2024-38829](CVE-2024/CVE-2024-388xx/CVE-2024-38829.json) (`2024-12-04T21:15:24.103`)
- [CVE-2024-39219](CVE-2024/CVE-2024-392xx/CVE-2024-39219.json) (`2024-12-04T21:15:24.233`)
- [CVE-2024-50947](CVE-2024/CVE-2024-509xx/CVE-2024-50947.json) (`2024-12-04T21:15:24.570`)
- [CVE-2024-51210](CVE-2024/CVE-2024-512xx/CVE-2024-51210.json) (`2024-12-04T21:15:24.697`)
- [CVE-2024-54674](CVE-2024/CVE-2024-546xx/CVE-2024-54674.json) (`2024-12-04T21:15:25.130`)
- [CVE-2024-54675](CVE-2024/CVE-2024-546xx/CVE-2024-54675.json) (`2024-12-04T21:15:25.263`)
### CVEs modified in the last Commit
Recently modified CVEs: `8`
Recently modified CVEs: `45`
- [CVE-2024-11664](CVE-2024/CVE-2024-116xx/CVE-2024-11664.json) (`2024-12-04T19:28:26.773`)
- [CVE-2024-11673](CVE-2024/CVE-2024-116xx/CVE-2024-11673.json) (`2024-12-04T20:10:53.617`)
- [CVE-2024-11674](CVE-2024/CVE-2024-116xx/CVE-2024-11674.json) (`2024-12-04T19:35:52.697`)
- [CVE-2024-11675](CVE-2024/CVE-2024-116xx/CVE-2024-11675.json) (`2024-12-04T20:15:39.110`)
- [CVE-2024-11676](CVE-2024/CVE-2024-116xx/CVE-2024-11676.json) (`2024-12-04T20:19:52.030`)
- [CVE-2024-11677](CVE-2024/CVE-2024-116xx/CVE-2024-11677.json) (`2024-12-04T20:33:13.023`)
- [CVE-2024-11678](CVE-2024/CVE-2024-116xx/CVE-2024-11678.json) (`2024-12-04T20:39:07.400`)
- [CVE-2024-8360](CVE-2024/CVE-2024-83xx/CVE-2024-8360.json) (`2024-12-04T19:32:21.703`)
- [CVE-2024-20746](CVE-2024/CVE-2024-207xx/CVE-2024-20746.json) (`2024-12-04T22:06:27.610`)
- [CVE-2024-20752](CVE-2024/CVE-2024-207xx/CVE-2024-20752.json) (`2024-12-04T22:05:25.983`)
- [CVE-2024-20754](CVE-2024/CVE-2024-207xx/CVE-2024-20754.json) (`2024-12-04T21:55:42.963`)
- [CVE-2024-20755](CVE-2024/CVE-2024-207xx/CVE-2024-20755.json) (`2024-12-04T22:04:31.123`)
- [CVE-2024-20756](CVE-2024/CVE-2024-207xx/CVE-2024-20756.json) (`2024-12-04T22:03:16.873`)
- [CVE-2024-20757](CVE-2024/CVE-2024-207xx/CVE-2024-20757.json) (`2024-12-04T21:56:40.727`)
- [CVE-2024-20767](CVE-2024/CVE-2024-207xx/CVE-2024-20767.json) (`2024-12-04T22:15:59.953`)
- [CVE-2024-20791](CVE-2024/CVE-2024-207xx/CVE-2024-20791.json) (`2024-12-04T22:39:52.703`)
- [CVE-2024-21105](CVE-2024/CVE-2024-211xx/CVE-2024-21105.json) (`2024-12-04T21:15:21.417`)
- [CVE-2024-22780](CVE-2024/CVE-2024-227xx/CVE-2024-22780.json) (`2024-12-04T21:15:21.567`)
- [CVE-2024-23249](CVE-2024/CVE-2024-232xx/CVE-2024-23249.json) (`2024-12-04T21:15:21.770`)
- [CVE-2024-23735](CVE-2024/CVE-2024-237xx/CVE-2024-23735.json) (`2024-12-04T21:15:21.980`)
- [CVE-2024-2380](CVE-2024/CVE-2024-23xx/CVE-2024-2380.json) (`2024-12-04T21:53:45.717`)
- [CVE-2024-25073](CVE-2024/CVE-2024-250xx/CVE-2024-25073.json) (`2024-12-04T21:15:22.230`)
- [CVE-2024-26450](CVE-2024/CVE-2024-264xx/CVE-2024-26450.json) (`2024-12-04T21:15:22.447`)
- [CVE-2024-26469](CVE-2024/CVE-2024-264xx/CVE-2024-26469.json) (`2024-12-04T21:15:22.647`)
- [CVE-2024-27140](CVE-2024/CVE-2024-271xx/CVE-2024-27140.json) (`2024-12-04T21:15:22.860`)
- [CVE-2024-28565](CVE-2024/CVE-2024-285xx/CVE-2024-28565.json) (`2024-12-04T21:15:23.083`)
- [CVE-2024-30864](CVE-2024/CVE-2024-308xx/CVE-2024-30864.json) (`2024-12-04T21:15:23.283`)
- [CVE-2024-31852](CVE-2024/CVE-2024-318xx/CVE-2024-31852.json) (`2024-12-04T21:15:23.467`)
- [CVE-2024-34468](CVE-2024/CVE-2024-344xx/CVE-2024-34468.json) (`2024-12-04T21:15:23.670`)
- [CVE-2024-34500](CVE-2024/CVE-2024-345xx/CVE-2024-34500.json) (`2024-12-04T21:15:23.877`)
- [CVE-2024-4900](CVE-2024/CVE-2024-49xx/CVE-2024-4900.json) (`2024-12-04T21:15:24.417`)
- [CVE-2024-50948](CVE-2024/CVE-2024-509xx/CVE-2024-50948.json) (`2024-12-04T22:15:22.627`)
- [CVE-2024-53916](CVE-2024/CVE-2024-539xx/CVE-2024-53916.json) (`2024-12-04T22:15:22.840`)
## Download and Usage

View File

@ -126945,6 +126945,7 @@ CVE-2018-9392,0,0,49e7b9f23a88c682cbbb44bc61a5ba9c2ca4fa0f281672e6345a23150430e8
CVE-2018-9393,0,0,b6af74fd0caf19ec65a302341dc419c40d160016677c975b82b1482a5d64f5d6,2024-12-04T18:15:09.850000
CVE-2018-9394,0,0,3d3b4f1d67e3b9aaf482e66f7658cdeeb9e9c9c0e737adcd8dcee7e000eb075a,2024-12-04T18:15:10.003000
CVE-2018-9395,0,0,dd0529bb234903930decc878c54e926214965a12290f9375b0d2e04679edbb01,2024-12-04T18:15:10.163000
CVE-2018-9396,1,1,be4ec7a86532032b0b52439a51ec71718fbc5b2e121bb3fd2f699ac8af262ab6,2024-12-04T22:15:18.457000
CVE-2018-9409,0,0,ebcda6f7e24e6f698fa6ccd47d9f60bf8bc1c7442cbc31f290fa0b923152d8a0,2024-11-20T20:35:04.480000
CVE-2018-9410,0,0,67eeebcbba32822e3887bccb33fae18efb160aec58d1cb7ea07ebe4be1e04e64,2024-11-22T22:28:51.533000
CVE-2018-9411,0,0,e176a59ad08b39fe1e6853540b0f5379b5df64366124dc7ef673195cfcdd7002,2024-11-22T22:30:25.617000
@ -187655,7 +187656,7 @@ CVE-2021-47531,0,0,b8bee44a8e49b95add0489fa860584fc7aeb11bd276b6266410444ceab442
CVE-2021-47532,0,0,eb70ddbdee3c495f8346d1dd9825d5167f4b39ea8db8a0be2b547c870331ca54,2024-05-24T18:09:20.027000
CVE-2021-47533,0,0,868d1256e6855a7e05acc382a85dae28ab41072d2b101bdb631670fb81ccff88,2024-05-24T18:09:20.027000
CVE-2021-47534,0,0,6c52ba917936ff78883cc7ff90a0bd2d7ece1e15ecd530c11da3b1d6b74863f4,2024-11-07T17:35:03.020000
CVE-2021-47535,0,0,f9e30fcf94dad9cfd06140aed5236d65a2a635fba0e895a19cf6130446b80d67,2024-05-24T18:09:20.027000
CVE-2021-47535,0,1,c8777a05ce1dc49aeb0c8c19cc1d1387ca13c1f29781e357a51cc6261aefebc9,2024-12-04T21:15:18.563000
CVE-2021-47536,0,0,a360faee07164645434064e3473571de768bb8e50b01ec848cd6ddc9799fc0ca,2024-05-24T18:09:20.027000
CVE-2021-47537,0,0,86966e911d2738f8b2a69e220dbf87c64ebff3f3588243cae82ab8fc561cc878,2024-06-10T18:35:41.393000
CVE-2021-47538,0,0,1ebba7f02cf6f2f5fc3557eb12e0e823e5413db3efefd7d147d6fc46e49e5a0c,2024-05-24T18:09:20.027000
@ -227686,7 +227687,7 @@ CVE-2023-36234,0,0,a6663c5e30d395d561de90ff52304e2332618ef3efd52e81ba511c2a86f4b
CVE-2023-36235,0,0,2b3e9f7f5a236420091fd31c65ef906ea1e1aaf195bca8c8a6de6ca143c608d4,2024-01-24T18:17:24.737000
CVE-2023-36236,0,0,ade1bae37fd3ff6554ed23e3d36bf0cd03d785d03bf01ee620f45df074ef7926,2024-01-20T18:46:09.557000
CVE-2023-36237,0,0,6cdbb2f4f772ed3466812b89bf4b43296dc4e2767eadf62364857699c4da69a9,2024-08-01T13:44:05.510000
CVE-2023-36238,0,0,7ed6618423a7f958c81af0b13eb3e711f180845a0e762bb21431ed5bd6f8cf50,2024-03-14T12:52:21.763000
CVE-2023-36238,0,1,6855edc7b830b38c07ef599563cbb5b398131b27fb716584864c8ef11cb4cd5f,2024-12-04T21:15:19.377000
CVE-2023-36239,0,0,cb1f60977bb0e88b80b7a994f098aa5fd0277f25f00d533d6315ab66a3a92dec,2023-06-29T20:58:32.827000
CVE-2023-3624,0,0,2359737609e52e7bb8e66c413ea0b9e9b9a124a75d3e344a359ee48efb51b316,2024-05-17T02:27:39.323000
CVE-2023-36243,0,0,a76a3e1407c07832ff18ee29c9b1d24ef6483e6e74fd3fc432edff25c45d59f9,2023-06-29T21:02:42.490000
@ -232869,7 +232870,7 @@ CVE-2023-42831,0,0,15c2657a6cda93c32bf9e6d0e8961db6424b2c5d0a3a331db0a572f126ae0
CVE-2023-42832,0,0,d4139f8d7ebcb6dbe3f816f6f2093afb5b55323ca863cc15652de2caab2f0de4,2024-01-17T21:16:29.277000
CVE-2023-42833,0,0,e734eedae2bb752eeb00548b60901154a053eb23181a33e00797702140032cb8,2024-11-06T20:35:06.280000
CVE-2023-42834,0,0,08d87def638a26a5eb9093b6708a8eacf657bb89462798c60d907ee1b3410e44,2024-11-06T15:35:05.580000
CVE-2023-42835,0,0,78785fec11e2de3eca12998532cc4e293a664be2c1386edf69f250c848f4be97,2024-02-22T19:07:27.197000
CVE-2023-42835,0,1,9956dc456ba41773404d8f44ad7b269b3f7a358f4e5a280c805b86e2ebbfd44f,2024-12-04T22:34:26.587000
CVE-2023-42836,0,0,57dd9f5214333cc32869174710fab8ff9c58d3ed310e22708cf2b23e79addefb,2024-02-22T19:07:27.197000
CVE-2023-42838,0,0,d2c7cb1076afde325efe19ebd9189ea0f891ccc309473cf4021fe8881f3b600e,2024-08-09T16:35:01.893000
CVE-2023-42839,0,0,765dd4087b9c648a2614e4f77e8cb2a77a0f084da4aebcff5c956301f137e1c8,2024-02-22T19:07:27.197000
@ -232955,7 +232956,7 @@ CVE-2023-42924,0,0,ee67d224e135add0a3ebe533e99aadef1fb79612269a77d92db5afc056caa
CVE-2023-42925,0,0,8da2b7b6dffca2e5a2a28ec58e4d981b49626effdf01d299531ec187ded3bca5,2024-08-12T15:45:16.637000
CVE-2023-42926,0,0,10536a0e5d0896ff760b50cd54c1cef47c09b911f9aeabee54318eada99b22f1,2024-02-02T03:11:34.350000
CVE-2023-42927,0,0,14031071501231274e24e297950a9bf2d187da6694c43ed89fc9fa105221fcbf,2023-12-20T17:15:08.377000
CVE-2023-42928,0,0,22aa3a2e4e0e0621b755fab05358d10340fe6ca794f9e924d8a66423ddc1e866,2024-08-01T13:44:49.103000
CVE-2023-42928,0,1,09b31ffbb457522f85f851077716b61a6b3ab014cc929e3d598a183a03cc68c0,2024-12-04T22:34:44.777000
CVE-2023-42929,0,0,d69966076d0165d9b3c28cf3f5258f7af78be3e1fca4d2abcbd675929782ffb2,2024-01-12T14:42:35.277000
CVE-2023-4293,0,0,25a930cabefd3da6413e2a6b1102e5e9ab925db3891f1492ca8cd657e719e67d,2023-11-07T04:22:25.750000
CVE-2023-42930,0,0,7798cb838c89cab08a179ecdacf92fcc3c9962a80ba08db86ed92752433dfd64,2024-04-08T22:46:51.907000
@ -238375,7 +238376,7 @@ CVE-2023-50919,0,0,38af9ba50695a16516d64f73ed36b332bc0cac82f0d001507aca15e8385ac
CVE-2023-50920,0,0,c938368db7a4c9537b5377cdf34d3f5ec0edc820e2fa722ca152b39939d0e7d6,2024-01-19T02:11:15.010000
CVE-2023-50921,0,0,8899f5e37f2831d9b789264bc38bb3f46faaf8a2ff87bcec247afeba01501599,2024-01-10T14:17:23.097000
CVE-2023-50922,0,0,b9a4a0bcb6ac50d647c21e4131c32a03088ef2bbada9645b8c01fa3e3f358d37,2024-01-10T13:52:10.643000
CVE-2023-50923,0,0,6bb7bdae9ef9fa94af2a68ef4fb5dbe546ea74044d6295c2e233309d3bf51b05,2024-08-02T23:15:37.853000
CVE-2023-50923,0,1,41746b2328d03f226300e1d453aa06f98f173172b6df557f7fc6b5b090ebfb79,2024-12-04T21:15:19.777000
CVE-2023-50924,0,0,8bc42f4e95a4fcc7b2bbb31fbd6df914ac73a284f24ce3df494b09df03c1b844,2024-01-05T12:09:54.470000
CVE-2023-50926,0,0,b18f40326b3c7c2dc4efbcec12756ed7f52c3e073205062c231362e7504b33b6,2024-02-15T06:23:39.303000
CVE-2023-50927,0,0,a24cb659b5c1b71c72f9fe8643ea6697b0b89539b610f4ca62741d321701977b,2024-02-15T06:23:39.303000
@ -239750,9 +239751,9 @@ CVE-2023-52719,0,0,0b9c7c845b2ce77a78a962b64edd3768f1849737eb82a5a8844977ff162f7
CVE-2023-5272,0,0,ae4b6a25d44f9bb2e577703b49c308bac2045471cfdd099de98f1a5093c1515f,2024-05-17T02:32:57.117000
CVE-2023-52720,0,0,b36e13b7e594fa09e2bcd8190ba92d4d2287a0044e861174bb0ebf22331a64f5,2024-05-14T16:13:02.773000
CVE-2023-52721,0,0,83559e584516d8c8b2502a73b1150d46df403edb0f0597fd38386601a9dc7f09,2024-05-14T16:13:02.773000
CVE-2023-52722,0,0,250fce369e99fe0d305fc0974f3828b9c2d126c482a924568c83a4e91b8703ee,2024-07-03T19:15:03.080000
CVE-2023-52722,0,1,7fff592201e192d157a623c15011a6628efe93145f4d58466ecb6cb2c367aa05,2024-12-04T21:15:19.983000
CVE-2023-52723,0,0,2fe194d004e97af726d85431e007c3326f52eff7c20e279a9c12c4d1b3f28f1f,2024-07-03T01:43:49.597000
CVE-2023-52724,0,0,95120cda4ac6bd6031f2e2daebb9e5bbb1d44f3ad800bed01c5a520101567ca4,2024-04-30T13:11:16.690000
CVE-2023-52724,0,1,88d42293847d2bda1d1e40f9b1423b933839db8ba74e9fdb2c35a76a9d329911,2024-12-04T21:15:20.180000
CVE-2023-52725,0,0,6c8006c6d070845e944a8779fc3ce3ac7e3893f3aa940aa4f5f18ea13a44ba8c,2024-07-03T01:43:50.417000
CVE-2023-52726,0,0,461e65a6795b13b587912cbbcf2691811a9fedc1284b87ef3001955692c77f7d,2024-07-03T01:43:51.233000
CVE-2023-52727,0,0,a99f786c16c90dfbbafabd50802fabf0de8a61b92c16ea1eb9d66eb802587002,2024-12-03T19:15:07.950000
@ -239867,7 +239868,7 @@ CVE-2023-52825,0,0,f2742e12b7636152c6ee22fc13791afdc72e52c1be16e3ea5cc66e4764fcc
CVE-2023-52826,0,0,1fcb1e0d5f24f1d681db39274af8721ea0323197bdde7d823fff6f2c048824b0,2024-05-21T16:53:56.550000
CVE-2023-52827,0,0,868d3ccba27de4f06eeb98ccfc2f4ed8e5872c0922583b6defcad43254034743,2024-05-24T01:14:46.933000
CVE-2023-52828,0,0,51801c536a9b0628296461d58e1225962ce4a373ee2f8099ca2a21963e102490,2024-11-05T16:35:07.670000
CVE-2023-52829,0,0,44d584554451dffe8f25a42402b38d74443e5b1cfef8a83f5a2ab4aad0657f47,2024-05-21T16:53:56.550000
CVE-2023-52829,0,1,411a0ce7532cfe1210c0999ae4b6a679f98c4d1ae9f3d811a60990427b0bad12,2024-12-04T21:15:20.377000
CVE-2023-5283,0,0,a7d9e3faf8c49df72b5e04f073d2848c771dedded278051272c5abb4b6f90d3f,2024-06-05T21:15:14.330000
CVE-2023-52830,0,0,8b6b414d6333e9d7c2c9fd5d18284e3ab1fdb4ba091b070cc2fe57c2c7664a0d,2024-05-22T12:15:09.470000
CVE-2023-52831,0,0,954264ba7db5cd0870350fe4b754bf71ab384bd46a6e36ff16c91f2c6ec78b48,2024-05-21T16:53:56.550000
@ -243816,7 +243817,7 @@ CVE-2024-11660,0,0,c69038363011e72870bf05ba1b77807b46b410512f645c7de24fbe53640bc
CVE-2024-11661,0,0,245f7af368d483b99968c06f6626bb5531f9195deb8e8301e7998f114936ec1c,2024-12-04T18:41:52.773000
CVE-2024-11662,0,0,8eddcedd4d81580627eb49a5c0b83d72ce9c466dae7dd645a8640b29c2f87568,2024-11-25T08:15:09.970000
CVE-2024-11663,0,0,6a74e18ba052e37c1e8b2cbba30892c27dc6677553d13b3a96791fde2ffc8858,2024-12-04T19:00:16.413000
CVE-2024-11664,0,1,83233ba3e20edddfb394bd0dc34d74a27fcc2b46bb551381a62ca91949e86aca,2024-12-04T19:28:26.773000
CVE-2024-11664,0,0,83233ba3e20edddfb394bd0dc34d74a27fcc2b46bb551381a62ca91949e86aca,2024-12-04T19:28:26.773000
CVE-2024-11665,0,0,86a5623ad291d6e005e52a68942920dbe4f41f173faf07762b4fa8c9734c648c,2024-12-04T17:43:55.183000
CVE-2024-11666,0,0,a7e124e4e7b7bca398eeda63d114e258fa78223da80e0f950915de9498ee814c,2024-12-03T15:40:14.907000
CVE-2024-11667,0,0,de0c11a87d2ca2552722880f013198690865f3d7a4b8c44eb443085c54a28213,2024-12-04T02:00:02.410000
@ -243826,12 +243827,12 @@ CVE-2024-1167,0,0,ed50fa0852f2fbdcdff47243517d528056863b720fcd10bdada66efed3504e
CVE-2024-11670,0,0,da97a331b546adbf73f2b38147c185b1f7045c13e5878ca1de4e9a941cf83c83,2024-11-25T16:15:12.173000
CVE-2024-11671,0,0,2615e6d984f10785804bed1195d17e9edea1f659c624af4ab21f00fc47d133cf,2024-11-25T17:15:11.930000
CVE-2024-11672,0,0,04cbb60e58825873c0969626d23fdfedf7389ea5e4e3e844c45f4fa741c93da1,2024-11-25T17:15:12.110000
CVE-2024-11673,0,1,eae9c4b05aefecbc19737baa5f86f4ba1f0e090398c63c27995ff99632798de7,2024-12-04T20:10:53.617000
CVE-2024-11674,0,1,fada8974116464c136b96d4679db0d3c33746685494e4d22dddeb35247826aa3,2024-12-04T19:35:52.697000
CVE-2024-11675,0,1,bb3efe83357462600cee3d3d515266d7154082b5df7dbad2775d6744f3efccfb,2024-12-04T20:15:39.110000
CVE-2024-11676,0,1,6ef36de52dd97ba26f79b4f6c2236d5c5f7317f446d492a904b809bcb2fcc266,2024-12-04T20:19:52.030000
CVE-2024-11677,0,1,87a6177c5b391fe3e3720d37e67024bea5a041e744a962c7b6d3c8e2d9ea86f7,2024-12-04T20:33:13.023000
CVE-2024-11678,0,1,fce9fb7e025c917df93cde2de1c865701af156abefa3010e32d19624bfee04c2,2024-12-04T20:39:07.400000
CVE-2024-11673,0,0,eae9c4b05aefecbc19737baa5f86f4ba1f0e090398c63c27995ff99632798de7,2024-12-04T20:10:53.617000
CVE-2024-11674,0,0,fada8974116464c136b96d4679db0d3c33746685494e4d22dddeb35247826aa3,2024-12-04T19:35:52.697000
CVE-2024-11675,0,0,bb3efe83357462600cee3d3d515266d7154082b5df7dbad2775d6744f3efccfb,2024-12-04T20:15:39.110000
CVE-2024-11676,0,0,6ef36de52dd97ba26f79b4f6c2236d5c5f7317f446d492a904b809bcb2fcc266,2024-12-04T20:19:52.030000
CVE-2024-11677,0,0,87a6177c5b391fe3e3720d37e67024bea5a041e744a962c7b6d3c8e2d9ea86f7,2024-12-04T20:33:13.023000
CVE-2024-11678,0,0,fce9fb7e025c917df93cde2de1c865701af156abefa3010e32d19624bfee04c2,2024-12-04T20:39:07.400000
CVE-2024-1168,0,0,b74b0b0c267c02c66f0f474186eac7335d29517290a9638a292d9de8edcd7c5d,2024-07-11T02:52:36.687000
CVE-2024-11680,0,0,1415befe3c792193abfef469dafa7463a81c8604ddd2ae59420450f5f0258ce0,2024-12-04T02:00:02.410000
CVE-2024-11684,0,0,9f2fe09eb8e335ba8391a949cbf48c636db8bb7de80a47009590f5cdfa3e8218,2024-11-28T09:15:04.793000
@ -243861,8 +243862,8 @@ CVE-2024-1172,0,0,11b44e5ce5101f5b7c8ab7c5bd49458795761e0ba5cf2024c3b79ca4ef4be5
CVE-2024-1173,0,0,d3495940fb5216c0fbed831a88233211893c24cb888781ac48f1d76bb3bc26ba,2024-05-02T18:00:37.360000
CVE-2024-11732,0,0,9ac5f8faeb8d3d023aef30c0e1c16293895e21fbeef4db588eecb4bcce0a9632,2024-12-03T08:15:06.383000
CVE-2024-1174,0,0,1a20d0936daa8c05ea33a8dfff3a4c4c734ee1e57e74d832a558685298d668aa,2024-08-28T21:35:03.473000
CVE-2024-11742,0,0,67990b8c6d291afd926a35484e6c0e210504d9728dfca33a0ba1469d0b959cb7,2024-11-26T20:15:25.703000
CVE-2024-11743,0,0,4f6422c96bd4f753ba6c7b4e725945a7686018b3a7c5c8f40a5c1bd59c112f03,2024-11-26T20:15:25.930000
CVE-2024-11742,0,1,159958446bfcddf210e603d44dd5e0653c4d00985f509f964ecd8fded8c95573,2024-12-04T21:04:48.830000
CVE-2024-11743,0,1,f820c67dcaaaf23a6b1da5f22e8dfaf3af6e92af3da2964cdf1cbb12adde80f2,2024-12-04T21:07:20.510000
CVE-2024-11744,0,0,d39b5f592014fd4a2278c647fc2411f75d3865150415b86b86bc4d90ea41f3d3,2024-12-03T15:30:32.153000
CVE-2024-11745,0,0,96069305de6ef8812783ef245e2f61d86d985db42c36cad22c8d389adbd7e8c1,2024-12-03T15:25:28.847000
CVE-2024-11747,0,0,5846087b971ceadf1fdbd5ac66bd2b2a8268b18d83ff64448907256363b9d87e,2024-12-04T03:15:04.933000
@ -243912,7 +243913,7 @@ CVE-2024-11853,0,0,c70345c399e57b281a218378a22a846eb5d7cd1f69686e8d6c992b2449c02
CVE-2024-11854,0,0,19031e0fe3e69020cafdc97722d8197d27bcfafae002c34b650d000ba85c0f80,2024-12-04T12:15:19.250000
CVE-2024-11856,0,0,20144f62e7f4edae2d8f1729fbe98f20a8d619a96145aa244e22c04511e4c37d,2024-12-02T03:15:13.713000
CVE-2024-1186,0,0,b01b3a0462d1f7a1a803ca8f493a6219bd71eed48ddf8d36021e6ca2af3e1767,2024-05-17T02:35:17.110000
CVE-2024-11860,0,0,8f2a0fbf19059c6c3c8a5836cc661c7d3bd0f5aaad2633071ac71b0a6a9605c7,2024-11-27T17:15:10.010000
CVE-2024-11860,0,1,3a70209f793392595a3a51a4d60b0579da591107f99f2af8b8ca46fce7a60e47,2024-12-04T21:08:39.133000
CVE-2024-11862,0,0,6d3560dff7bd57ea41736e55020db21367a02a743a7c33eb7522f1239d06cd69,2024-11-27T15:15:25.393000
CVE-2024-11866,0,0,236ffb034bd54f27fb167fb484e28869563519fc7ac4134695f9cf499c46e00e,2024-12-03T09:15:05.487000
CVE-2024-1187,0,0,3fcd8394fe17b53cc850805fb2de93d28c688f808245fcfde96cd99bc903bbab,2024-05-17T02:35:17.220000
@ -243959,10 +243960,10 @@ CVE-2024-11985,0,0,239fb5b0fc3eff87ce338f1355a3d7f02bbf3154ef26b14b09dcb67a7c003
CVE-2024-1199,0,0,9a04e528b30ee4387e68bb38a7f1be0392a71f3796108477e123a7601c79c0fa,2024-05-17T02:35:18.570000
CVE-2024-11990,0,0,0ea61f760bb00d4ee0bb54c1c5f4898913a822219e93c4dad86c6424a909019a,2024-11-29T13:15:04.170000
CVE-2024-11992,0,0,dec6f82d309a9ca3d0c0e65e3be01067bf6c8b19cbafb67c3c3b2120ec9fbb36,2024-11-29T13:15:05.210000
CVE-2024-11995,0,0,659ce94b6e16e4b5841f6ecdfa5b75901b46fdf4f7f3359160ef6a760f2f39d5,2024-11-29T21:15:04.290000
CVE-2024-11996,0,0,d80b8507fc172b9a86f6ab141fb0a9044d43c80de0d910c996155f10dde992d0,2024-11-30T08:15:03.937000
CVE-2024-11997,0,0,95224e93a9082cc1de0a1beded60b60246bebbe18db37af5480d5a7cc7cf8119,2024-11-30T08:15:05.223000
CVE-2024-11998,0,0,f0265b44321a393a9a2577dcf38bfa269cf779efa8c3d964a6a6f01f1ceb81ee,2024-11-30T10:15:04.340000
CVE-2024-11995,0,1,2072ff09f6a8d91ce5a6cb9ddb1c925e662d777c56c3ca9e5422a4217a97baba,2024-12-04T21:37:07.487000
CVE-2024-11996,0,1,c9890e109cbd3473a593b35fd7d1b915d4d2a7a9695a33296844a7786a35e6d8,2024-12-04T21:29:13.483000
CVE-2024-11997,0,1,2af8126987a27c26e5e9fb866e5bf6a59fe0bc68e164aa36d761876f8d96a284,2024-12-04T21:26:54.147000
CVE-2024-11998,0,1,c32498d8a84a24616240eccde60a71f350199dae5d10d57970d82263bdad0fd7,2024-12-04T21:23:13.700000
CVE-2024-1200,0,0,cbf824dd51d7a3b837d210f60d3bc2fcd8c0de7dc55b64bf2469e6bd3fafa8cd,2024-05-17T02:35:18.673000
CVE-2024-12000,0,0,b554fb7516e14db1feaba750220ae1f899d45d1ef9cfed719bdd93039699e21a,2024-11-30T12:15:17.200000
CVE-2024-12001,0,0,d124c0f10f30b54eb4f74d57e35bd484e6cb76bb299b65c3d619c3385b273728,2024-11-30T13:15:04.140000
@ -243999,8 +244000,10 @@ CVE-2024-12151,0,0,abe4093b15b72a0aaf39aa376793d8a1e5de09a117d86ddaf539a4d3630eb
CVE-2024-1216,0,0,2ac4284b62a708a705b7ab9ac6ff4ec2f3952b584d951b1f83e5c9b3524c781f,2024-03-21T02:51:38.760000
CVE-2024-1217,0,0,6075c1c30cf8dbd69ffc4f54a2c1be059316219999cb061c49a6d509b11c4db7,2024-02-29T13:49:29.390000
CVE-2024-1218,0,0,453752a0899f8b793ec74c90c12a7ff24c5b2280b6a6b9717bccd3f166c7f71e,2024-02-29T13:49:29.390000
CVE-2024-12180,1,1,61084dd183d3aa387fa066c78a1d4e8a02556683b3d433df77c7a37a0bc5ddba,2024-12-04T22:15:22.140000
CVE-2024-12181,1,1,a823a1c69c583a4446529ba818f035f88d02d4f2069dbfd50a5fc407697713ed,2024-12-04T22:15:22.360000
CVE-2024-1219,0,0,c458cc72658e7a053403f6629df47005daa64a22965acf0ef87a52df05752215,2024-07-03T01:45:05.720000
CVE-2024-12196,0,0,2cf810c5897db795d799e4a317e0b1484f6ba54b8591637e6a88b9fbc235f29f,2024-12-04T18:15:13.173000
CVE-2024-12196,0,1,08b9439397a0ecc83e711e8fc5c4b8790edac0a417409dd477ea63113d832e9d,2024-12-04T21:15:21.090000
CVE-2024-1220,0,0,3cf4ec368701eb9f29bed8e0aee16ed45bee1642c821201a62addfd605d76a71,2024-03-06T15:18:08.093000
CVE-2024-1221,0,0,f57b38e01f2045763b64023d54cd14b115226519f5b5549123f745e94b8ad6f9,2024-09-26T04:15:07.007000
CVE-2024-1222,0,0,5d7d5aee4e7308a5e1ea882d199b9214632e9928d03f04d754209bedd842261e,2024-09-26T04:15:07.170000
@ -244421,7 +244424,7 @@ CVE-2024-1670,0,0,1076fe172d6239bf170090e8e565b53f2a5e980bdc541ad08c209e2df3f767
CVE-2024-1671,0,0,b90d151a59720bfc66cb3bbbb41d4e1a2a08b8f84ae511718307d6e0d6c90578,2024-02-26T16:27:52.697000
CVE-2024-1672,0,0,5df25617ae1b8580bd17e41342f3db39038751d4dea40ef6d92d4a83e8eeb0f4,2024-08-01T13:46:08.940000
CVE-2024-1673,0,0,72b6738109f060ca33cec8daa581f20d84f924c2dda86dec338ec0b1edf6aa3e,2024-08-01T13:46:09.737000
CVE-2024-1674,0,0,4cf2c5e9e39ff8cbbaa4992242e531b6a235b946fada67dc6b67140da5874399,2024-12-02T19:51:32.163000
CVE-2024-1674,0,1,4ba13d339c0085a8c6736e2e58ccbdd34850427ed620a2dbb72ff03c39afc724,2024-12-04T21:15:21.223000
CVE-2024-1675,0,0,6dc11c1ffd0c7e93efd7705d99983d7290104eca7113a2804027689feb726c3f,2024-12-02T19:54:08.677000
CVE-2024-1676,0,0,49c3202c5c497a772989e79ead25a52e922bf653bfa98e11038c1b979dd6584e,2024-11-05T16:35:10.247000
CVE-2024-1677,0,0,6fbed0b3db8f4573d0e0535b3a26ae2bb9498eab495e7625679b1e1f5bc2100b,2024-05-02T18:00:37.360000
@ -244449,8 +244452,8 @@ CVE-2024-1698,0,0,a176064c6784ca5eaa70200471c19c22c1e7519db793cff327cfba5b41c749
CVE-2024-1700,0,0,291e1df00861c0b5fec48d6b86f94073e4b1ad9ad88dd66a0b50e765aede381b,2024-05-17T02:35:33.267000
CVE-2024-1701,0,0,cafa5ede86727dc47638d09cd29b63b4ad96bd844eecd819e2d399f497c3aec9,2024-05-17T02:35:33.377000
CVE-2024-1702,0,0,cbf977e419e06d00592d239dd55258309fffde6ad10148723d5475a5d275a3a6,2024-05-17T02:35:33.473000
CVE-2024-1703,0,0,2b7b4df2e11c0afa43b51c3845eabd09a80bb260e399cc13b99b9e12c58a82c7,2024-05-17T02:35:33.577000
CVE-2024-1704,0,0,a7371172dfd721c08720c2dcf6aaec276e3c161d27f61f5287cb4d1647db4850,2024-05-17T02:35:33.680000
CVE-2024-1703,0,1,3aad4ed0e55dd45f2fcfafb3b7e528269d5ff888e1f41d3cb887f3e688b3bb19,2024-12-04T22:33:29.567000
CVE-2024-1704,0,1,ff6e20de0073982b76270051de7beb8dcc5895ac0d177a7f5bb4168245b921a5,2024-12-04T22:24:16.043000
CVE-2024-1705,0,0,ecf0625d652844532d3f8a5e2f10cfb4c62f613c5ad589e747a6c93055b594df,2024-05-17T02:35:33.780000
CVE-2024-1706,0,0,123483d70375ed873b8b9f9e8c26487c61d8af6c0e4608943131d344f386f53d,2024-05-17T02:35:33.870000
CVE-2024-1707,0,0,d502091d3e79b1f39fe91487b1da8859420f9eb6cb063e8f74fb067bdd15995e,2024-05-17T02:35:33.967000
@ -245299,19 +245302,19 @@ CVE-2024-20741,0,0,3e0433e176a59104b613d42d78b50656537a1dcbc720620c126ff771ba841
CVE-2024-20742,0,0,0702d94053f64f299b640f8b22eaf218d24e541cb09ff4609996afacbb582163,2024-02-16T20:07:52
CVE-2024-20743,0,0,dffee445c32d9f014315d08ac06e753565b053f832c2032019dc36f7f1a8e57a,2024-02-16T20:06:10.620000
CVE-2024-20744,0,0,2ecfd2e9c2f83ee87ab86ff1cde79e678b85dc31657c8b027fee7ad296f01537,2024-02-16T19:51:12.413000
CVE-2024-20745,0,0,b503e99f24bd55de8f5b1ad049a4b960bbf667a1b47350183544a8723f1e771a,2024-03-18T19:40:00.173000
CVE-2024-20746,0,0,706fd5d150c496345273a0d032b7bdd6fd4e0d5de4ec63be58cad4d006d62d27,2024-03-18T19:40:00.173000
CVE-2024-20745,0,1,a9f328487ba9d7624eac6adb9b4ab7e8f1934827458204e177f38457389b07dc,2024-12-04T22:07:18.903000
CVE-2024-20746,0,1,2463bf0d0d5ecd6ebc647d2fa83b6ee7d2ad3aee066c61e71752bb587c3f8351,2024-12-04T22:06:27.610000
CVE-2024-20747,0,0,2f6cc84d9c3f642d7aa7aa3c408889cba0af9c15116c9e379af5658f23269705,2024-03-05T22:17:24.763000
CVE-2024-20748,0,0,b2727d2679f4034f9765faf610fc86c3782a5a3ec6973417780e4f3e7e755b6c,2024-03-05T22:17:26.913000
CVE-2024-20749,0,0,275b3a7c68a00702bdf8390602bbf378fd8c74dda5b1c131d384e754ef7e05a3,2024-03-05T22:17:17.527000
CVE-2024-2075,0,0,697ddb04b7f782de85ad884f01abc82cd245882cddd4cdff25b25e7ab89a49df,2024-05-17T02:38:02.263000
CVE-2024-20750,0,0,733596897cd420f49d9ddf9eb46b4cb28601761cf0a1f58dedb2f621b2a473f4,2024-02-15T14:28:20.067000
CVE-2024-20752,0,0,24312dfdc413f0fca6733c148b0b6d207453b7e0cafbb57da8bc21f4d136132d,2024-03-18T19:40:00.173000
CVE-2024-20752,0,1,55d4f68342f3f1f07fda826e7e0bb3f2cc0c0bfe38a211d90fc2973a7dfae8f0,2024-12-04T22:05:25.983000
CVE-2024-20753,0,0,2ce18c159e068066ae48b89cf399c038a77f7045dedbcf8fd4c4911f7575d30d,2024-07-22T18:20:55.763000
CVE-2024-20754,0,0,ffda0dcdc95b3852a1f043563d1ea9dcecdf61ccb4ddd6a58e0a97668e68a7b6,2024-03-18T19:40:00.173000
CVE-2024-20755,0,0,22651d41f3dd3226698b24aa1c2c119182e61c27509736e12cbde59fcb10a601,2024-03-18T19:40:00.173000
CVE-2024-20756,0,0,9685da36b3b7e1d3c7641fbf2504171b07180ea0a2837c2e91067145dc91f0a4,2024-03-18T19:40:00.173000
CVE-2024-20757,0,0,d4876285f861d8804a5deb2dce4161b79aaf535159e519e23db4f581b4072510,2024-03-18T19:40:00.173000
CVE-2024-20754,0,1,f1651dde78abbc62bb949b8ba0f8487c988cbc51443d86b48da7724d4e1be3f9,2024-12-04T21:55:42.963000
CVE-2024-20755,0,1,d5f059960248507b53591366a4d3031e64b9f291b151cf640657e966143c7344,2024-12-04T22:04:31.123000
CVE-2024-20756,0,1,88313d2c3c606f1871f91a2c00cd5cd24e32cdafeb9a0b07de11dc0c809af8a6,2024-12-04T22:03:16.873000
CVE-2024-20757,0,1,87e05cc0c79ed5867db27715686268a767dbf03b036fadb64bc451a097f96a2f,2024-12-04T21:56:40.727000
CVE-2024-20758,0,0,9a68474708dbba86344d778593d171591406a4b15d84e428ecc0142dd681df99,2024-04-10T13:23:38.787000
CVE-2024-20759,0,0,a686ba0e4b3836d989843a87504f9dac91dbfa6f45b488354f95fb65c9a28ce7,2024-04-10T13:23:38.787000
CVE-2024-2076,0,0,b498bfd91472e82b9d0da8877f7703c42c1b4325bed0ae394a281bb937b4cf85,2024-05-17T02:38:02.357000
@ -245322,7 +245325,7 @@ CVE-2024-20763,0,0,c4ae7ee1e5da223faf7f6ab1679656c9b9fede84d1024a9c5eedb3023d54e
CVE-2024-20764,0,0,425a15ec3fa98912e0e2b2e3e32bf3ee284d81cfd6b2ca0b093427879549fe69,2024-12-04T15:15:25.463000
CVE-2024-20765,0,0,ad91982b1363103e7d071a542448be4f43c1d446a44c46149dd1d5563e96bd7d,2024-02-29T18:06:42.010000
CVE-2024-20766,0,0,898b775b089dd9caddb4b4690630a4034df5907c7b03a6ac372c91b73b803f73,2024-04-10T19:49:51.183000
CVE-2024-20767,0,0,e44fe1f40a168c1d580708d22170c7101344fa827a777107ab7c62d60385df35,2024-03-18T12:38:25.490000
CVE-2024-20767,0,1,899fd635a0014761ced37cbe14634fda9e5e98e3a2888379f978a49261ff3455,2024-12-04T22:15:59.953000
CVE-2024-20768,0,0,fca9dcc18fdb5e923a7d5ffae471944f30c53e8970448c3d9b0c0d1182566ccc,2024-12-03T21:46:08.623000
CVE-2024-20769,0,0,4c236b05669b68ca5ce041ed8b26b6adfc2e0cb9e4a3ee0955957eb96f78ccb6,2024-06-14T19:30:30.037000
CVE-2024-2077,0,0,e7bd6e3d8e34c4ba57719bf938fdc690e0425d907fa9aeaa848477a4c8d06182,2024-05-17T02:38:02.460000
@ -245342,7 +245345,7 @@ CVE-2024-20787,0,0,7c36bbe5fcf9a53a846da3c3aa07b3e1e8c318b37d60b9c9bc1c0d85b2b47
CVE-2024-20789,0,0,2be0d33fe7f6a2ca915ce1bc566125c1928c2c16133fd8fdef1172ad2e465f0a,2024-08-19T18:59:05.617000
CVE-2024-2079,0,0,f10772ba31d142dba517b938901fc1b75b6b0e63ac1ac474e47c5b00d72243ad,2024-03-14T12:52:16.723000
CVE-2024-20790,0,0,3934bc21914c68bc7f6c87d335433310d3f22ed71eccb1f27568a92329715bb0,2024-08-19T18:58:42.660000
CVE-2024-20791,0,0,30758adf0bc2f0f37a906cbf437cc58c73eb8c3385f894e41d9f4f5ef41f50b8,2024-05-16T13:03:05.353000
CVE-2024-20791,0,1,7463d03dabc7b9776b7c6cb0ee52300d4d429ab1ee6b989659f0c15283375972,2024-12-04T22:39:52.703000
CVE-2024-20792,0,0,f743a82f55d36974fd9055bf0c833f5b4f50402bf02427344d220e686fedd52f,2024-05-16T13:03:05.353000
CVE-2024-20793,0,0,79df2b707e1cbc4e53b872f4870eee47d97e91541b8737f8089fe7049103b0ad,2024-05-16T13:03:05.353000
CVE-2024-20794,0,0,009cfcab48094bcf6aabe6ba2b455d8a62e38422e17ebb73b841667a8ce258e2,2024-04-11T12:47:44.137000
@ -245677,7 +245680,7 @@ CVE-2024-21101,0,0,91755928d5ed81eb1c0b6d3faaf85c7a1a9acb13a679b76992a144a90a15a
CVE-2024-21102,0,0,e0c4528cdd1a9369fffd301868d00884311048b2a3539b7313328ec89feb0833,2024-04-26T09:15:11.813000
CVE-2024-21103,0,0,2f3299fda2cbf8e902f3515fd0d48b9d8de5702ec09ff6c5557d6ae05b059de3,2024-04-17T12:48:31.863000
CVE-2024-21104,0,0,eebfe4dd9b21aaa35ec722f534d9449bff2c7a22cb7852b7fed566ff1ff264ce,2024-04-17T12:48:31.863000
CVE-2024-21105,0,0,a025937dea1ddbc18632fa98b68490251974c0a63176360144d7d1a06954f7bb,2024-04-17T12:48:31.863000
CVE-2024-21105,0,1,fc58e283f6d0e4d970fd8ad2b639eb7f30380b543f0c738a670fbf8a20f2d5da,2024-12-04T21:15:21.417000
CVE-2024-21106,0,0,ab50f512ef43406c6bec553aae7f9997284c506ca99d62550b6d1b274cae0f7e,2024-04-17T12:48:31.863000
CVE-2024-21107,0,0,8b22c366b8e56e1eace3e0c72769115530475e44eb4f180061f1d02595110799,2024-08-15T15:35:03.743000
CVE-2024-21108,0,0,457a95edc17f2d19406b77901b0315a9c16fbc7197ac7f42787f9b5f2f03b290,2024-04-17T12:48:07.510000
@ -247016,7 +247019,7 @@ CVE-2024-22776,0,0,642d619b355fbb2b5cc749a1f87205b7fff1d4b33bb24bffa4b5d84ecbf55
CVE-2024-22778,0,0,d6f95e35f4d5924308a8864914d9ade6fdd13564913e1dc9160849aee42c6684,2024-11-06T17:35:29.337000
CVE-2024-22779,0,0,da7d6977832dc3c77efd0828b12672e5165d77aed4664eb8e25534e23467c0f0,2024-07-03T01:47:22.543000
CVE-2024-2278,0,0,cbbe8d95d17074268ce13783e0b396bcd517d6176e85320160a036a53e494096,2024-10-27T15:35:07.657000
CVE-2024-22780,0,0,51acf3ba46fabf66b7e472aef9a6620d7f0360062b5706dc3d5e6ae6e5bb5394,2024-04-02T18:12:16.283000
CVE-2024-22780,0,1,e7c9e53b53c73f14641469ac17c6a267c6ae51b4da23d85d4748bd237084cc7c,2024-12-04T21:15:21.567000
CVE-2024-2279,0,0,7e0397887ef78910fe5346b589ae1458ec3f6bb507a0cbcba6565d299ce12b01,2024-04-12T12:43:57.400000
CVE-2024-22795,0,0,528a6df9e9b059f04f34cc0eace00c350d9f5020161813e1f94e48ec4410cfeb,2024-02-15T17:53:54.680000
CVE-2024-2280,0,0,8df1bdcd08431d7e8668e7a7f4c77b82e78f035ce77c6431d432c2078fad11c6,2024-04-05T21:15:09.660000
@ -247275,7 +247278,7 @@ CVE-2024-23245,0,0,101d7b866eed02e86ebd84557a1282b5cb9bc6d29a5271f7e19a7ee3c96cb
CVE-2024-23246,0,0,a3f6288a4dec4e6b98e18e3dcc2273527c942df80239f6227e94a0328a431f71,2024-07-03T01:47:40.097000
CVE-2024-23247,0,0,d5698b79b28caabaab0fed7a322a63e6d266c688aa3ae5f6b0f0f62214304bc8,2024-08-26T15:35:04.747000
CVE-2024-23248,0,0,c6580627d980adaa3f84f2190835feaa8367986dcf4cd0997d62805a89d20fc8,2024-10-30T19:35:08.687000
CVE-2024-23249,0,0,42bfde6e5f9114fee0a0e78d064ee23207be1e84b8c9f1b5d3166ece7b7bc94c,2024-03-13T21:15:56.730000
CVE-2024-23249,0,1,3e263356c0755c0a69c937889b4ad48c4f44653f9a58fba536b85c502a3137dc,2024-12-04T21:15:21.770000
CVE-2024-2325,0,0,7c23733ac07d678fef2131155333b86f0e270e103dc635d072d48231d3950c26,2024-04-10T13:23:38.787000
CVE-2024-23250,0,0,07279c8c12ac3b5810e0a08afc9a612f0127647f21ad57d9453a83d5e0073cd2,2024-03-13T22:15:10.157000
CVE-2024-23251,0,0,092f1229e72a5c3cf728a0733bb73dcf6be0d42bcc4cdd3b35ac4b29d4862c68,2024-07-03T01:47:41.057000
@ -247684,7 +247687,7 @@ CVE-2024-23730,0,0,4088c5b420c8561e609e86e9e6639362f96648106817a43f2c436ecb5e3da
CVE-2024-23731,0,0,9e444542e77d768ae255d5361c86689c30d0d3ff31dd7c8827b69cb99e58f1a3,2024-01-26T21:11:25.430000
CVE-2024-23732,0,0,02703c2ad5218c00fbf227a383e9ac2f87b400985304eaa4f21127fe5bfed2aa,2024-01-26T21:11:51.840000
CVE-2024-23734,0,0,4cf048a3603c2236c83db185389a1798a3a8236cb3edbaddf13143286cab452a,2024-10-31T16:35:07.840000
CVE-2024-23735,0,0,1e59c189ebdd76a87eae090bebc9792b24a3eddd264b9f1d7bc1535978159480,2024-04-10T19:49:51.183000
CVE-2024-23735,0,1,f1b3fd73c171e2471b0b8d6a13ee761a7d0601e34a52453fccbb77a2a9d3d13c,2024-12-04T21:15:21.980000
CVE-2024-23736,0,0,bcd223ae0db7879befee0415fb371b15c3be00a7450081b37507ddd44cb2eebb,2024-07-11T15:05:26.800000
CVE-2024-23737,0,0,33f3b596037211695cde51ae42037e9b7f68645a30cea20e35e881cc76e8e296,2024-08-29T20:34:40.387000
CVE-2024-23738,0,0,c792a8c61de509a6b4c8710933e1e89c56da0b87e5c16dc5d6b30dffd8a63ebd,2024-08-01T23:15:47.553000
@ -247744,7 +247747,7 @@ CVE-2024-23796,0,0,b78054f583bcbbbf407e069ae69c356916456fd9441cdd542f17ab5e1c4b5
CVE-2024-23797,0,0,a4dc0b724fa07db85a396224b8453a0f6dbdf17528bc02ac5f794e344aa9a168,2024-02-13T19:21:42.603000
CVE-2024-23798,0,0,9ad3a159f8c73d59a598f6dac0af54c14715ccd56f912587a5f8623f664dbdfb,2024-02-13T19:21:49.827000
CVE-2024-23799,0,0,78ce2f47fc12ae067cd708854b62689447c98bd5c5a8763a71325c5549c76a7e,2024-02-13T19:22:01.760000
CVE-2024-2380,0,0,a9f1163ab4c56becdc168c2b7dd9aeb17925e11fa34f71cba56b08556e4b650d,2024-04-08T18:49:25.863000
CVE-2024-2380,0,1,e034c722ddda4213751e462e4677d7efc1e688e7e84c35a5ebac532cb2ac0a77,2024-12-04T21:53:45.717000
CVE-2024-23800,0,0,1fb9e64139d12c791be707e01cbf1319b4c42e4ed314eefb7bf7eac30e5e12b0,2024-02-13T19:22:19.453000
CVE-2024-23801,0,0,f18ac954d546dcd578b202a4fe4d0f52dacb485be0a3c188c777124cfe7a5592,2024-02-13T19:22:25.110000
CVE-2024-23802,0,0,81ec59be7b57b56010aae8a00a50785b4cae392063ce6ae45e9bdc96725d8768,2024-02-13T19:22:31.803000
@ -248555,7 +248558,7 @@ CVE-2024-25063,0,0,974af0bcd393eeee85e8240282eb20080b5485f8c7ead439e836ce3c3fbcd
CVE-2024-25064,0,0,0770f9d742da8a4ef1654f2a903e2066b829d91dbbc42fb7f1f0759a089ebb88,2024-03-04T22:43:15.337000
CVE-2024-25065,0,0,ee86c2c4ae99b640b23ec2509e27ca1e8877189c550c4b4e7d30422934d42841,2024-08-29T20:36:15.613000
CVE-2024-2507,0,0,059cda731f595d08cc9a92bc2f36829afe22653a29c81bf0cc15e53c1729da6d,2024-04-10T13:23:38.787000
CVE-2024-25073,0,0,cab6e5621a352c42cf6cc0589fb57fc47cebfa6433573a366f4bc2432d035b1d,2024-09-23T19:15:13.197000
CVE-2024-25073,0,1,b773096cbe22b7b2359c05c5b9b8c5d77df4ed93f4aca2b5ee2c4c6254770bbe,2024-12-04T21:15:22.230000
CVE-2024-25074,0,0,b3b9ed627bb8bc6455f977badd5c29acfab2706fc85b295893a6f5829c8a5c4e,2024-09-23T19:15:13.370000
CVE-2024-25075,0,0,bfed480b2306172449fd442aea4561660fa83ab81e8f534c8111cd2e1f0d7f14,2024-04-03T12:38:04.840000
CVE-2024-25076,0,0,26f9af1ba1d1d6abf593ce5cb002ec7a5de923ee3f100a60b5eb1daeac203495,2024-07-11T15:05:28.443000
@ -249549,7 +249552,7 @@ CVE-2024-2642,0,0,f4d5d0409211a54140db72574a0074f769063560d7df04b7b7402f6cc784e4
CVE-2024-2644,0,0,fab6e7415abdc266e0f9914dee035a72adfdb797420e958820a3298690e993b0,2024-06-05T20:15:12.680000
CVE-2024-26445,0,0,3ad35fce57999549366fe75957d1ee38511704ca77b59a13d71bd470d9abd074,2024-08-28T21:35:06.473000
CVE-2024-2645,0,0,67f71252e39d0ed76704dae79e75d677c0e90051473290647c0cf447a8a8225f,2024-06-27T20:15:20.417000
CVE-2024-26450,0,0,2146e3629e9f66432c697f6f39985fce2f3781294b94d7100d7ec0e05de5d8ff,2024-03-09T08:15:06.120000
CVE-2024-26450,0,1,44fde4f373d5569241d50bdb30df7d9eed39fdf74554bc5181d04d6ee81e71ae,2024-12-04T21:15:22.447000
CVE-2024-26454,0,0,81eabbcddc4452199e1fbc82a1f9c649bd6c739560f3b4e9fd2208f082955849,2024-03-15T12:53:06.423000
CVE-2024-26455,0,0,24002b24bc6de1eece0f3fc2139bf437dca858793debcca4d45e15415e2ceb55,2024-08-28T21:35:07.220000
CVE-2024-26458,0,0,a765d34e6f5b725d584f2b00225139e479f8d76beade21f52c1720860105f89b,2024-05-14T15:09:00.470000
@ -249561,7 +249564,7 @@ CVE-2024-26465,0,0,2da9a8da14eb7ad2ae1e44833aaff4b7a90cbaefc41a17a4f9b407a5541f6
CVE-2024-26466,0,0,6709258f243577bc1f93e1c54519a7b66e4e3ffda1e209724abca2cbfec5238f,2024-10-30T20:35:12.827000
CVE-2024-26467,0,0,c79919be511844338d780cb29a83d8434b9e819bf896bf804be060a155284c12,2024-10-31T15:35:29.323000
CVE-2024-26468,0,0,888c1400596629f642930ce1dfab915bb89a161094e6e25fcf42a7aafbb78e0f,2024-11-06T15:35:12.710000
CVE-2024-26469,0,0,202a3878dd7ca90a2deb83f9c6068be468c522265741b212613bae7399baf445,2024-03-04T13:58:23.447000
CVE-2024-26469,0,1,ca30b6ba743f8a94ca9252341154faef8133ad746480726630ceceb570bbe30d,2024-12-04T21:15:22.647000
CVE-2024-2647,0,0,dc044af22784e4db6ad7522cd4841e4dbc9efce24abfd075978f936ae875c263,2024-05-17T02:38:23.120000
CVE-2024-26470,0,0,58e234d7e215267230c8a12c548ad8fb022e4ba21a7a856a3f33600c880169c4,2024-08-28T16:35:18.190000
CVE-2024-26471,0,0,638407be95241af8b802e909dd749dda860405db3eaaa59ad63e6686ac6163d0,2024-08-27T20:35:17.533000
@ -250211,7 +250214,7 @@ CVE-2024-27136,0,0,27208b55e838e26e8744f0daba44f78d1e5c27e433ec8142f38052cb8e098
CVE-2024-27138,0,0,1f057fc4a86e32fdd3cbe80da63722cbc73089ddadbb43b1562d5d847b0f5599,2024-08-21T21:35:04.820000
CVE-2024-27139,0,0,5ffd1b44abbd3dc84ccc8dc40302ee472c30e7eda7536bd71d562f3fb40cf709,2024-08-02T01:15:30.347000
CVE-2024-2714,0,0,fd707009e35b2adf97d47fd45e1287d327a5720e922cfb5f98c6896a9e8b6097,2024-05-17T02:38:26.850000
CVE-2024-27140,0,0,792f5350d961d2c57a4d83059389a2799aafa0cb7b0a5d870e522f2e29bff45e,2024-08-05T21:15:38.120000
CVE-2024-27140,0,1,a3821b5f25a8577cfbccfc711946798f35aea5a02f54272396f143a00fafde6a,2024-12-04T21:15:22.860000
CVE-2024-27141,0,0,057b70aa4d3ef54e41334849d6465eb42f0fa3aefe9d620f030d33f3f65261da,2024-07-04T05:15:11.080000
CVE-2024-27142,0,0,79822e0f7dcb5b3a82e0dd23a4699f3fc3fe43a55cbf16abbe0a0a6baeba3e4b,2024-07-04T05:15:11.227000
CVE-2024-27143,0,0,16f58db5f61d63a26cab75baf7d89ce8c51b3c9d0a4e287f0edcb715313c823c,2024-07-04T05:15:11.323000
@ -251242,7 +251245,7 @@ CVE-2024-28560,0,0,3fd8591df7d8f3dc687a41631da45cf8fa3552dbdf6be751bbaf518f6d22a
CVE-2024-28562,0,0,c4f55b29f2279e75b1a789f4b07670430651db2206d35a6f334762a60b9a3185,2024-10-28T19:35:22.063000
CVE-2024-28563,0,0,a76a8c0b981d93846eaf9f675982e2266f870d6c33b80aaee30a9eb94f23d95b,2024-07-03T01:51:43.500000
CVE-2024-28564,0,0,98d624dff17c8253cbed1bbb574d567035a888650dad48956ce1db69309694b1,2024-11-01T19:35:20.600000
CVE-2024-28565,0,0,67f054920a683c9ff4a8bb4e9fd8358086a3370b6a221e02c15e3d7e27c0feec,2024-05-01T18:15:17.513000
CVE-2024-28565,0,1,5a6ceee2d5138821eecccd0d3bd97028a77e63b602fbf1848ccb99b554d0096c,2024-12-04T21:15:23.083000
CVE-2024-28566,0,0,2e0016af850982aa60890a5c70f74ddb1f006304aaca70fa40b549891174432f,2024-08-02T19:35:27.200000
CVE-2024-28567,0,0,1fbda14ca5c066f5197f6bfd970b5e6607506a43068d2624b1de8dc822d70067,2024-08-02T19:35:27.990000
CVE-2024-28568,0,0,a70bfd8e4571206dfd87545fdaf8b723a948df1f3176a3c6fa84ca9ce559ca36,2024-08-02T19:35:28.773000
@ -252945,7 +252948,7 @@ CVE-2024-30860,0,0,9bdfc2db70afd889277b07183a72c7f92c8e82e29cb1bf435dfec54f9b9bc
CVE-2024-30861,0,0,7e2d4ab742f25c07df5041abf0b6da4278283dbade6c38df491b21144111151d,2024-11-22T20:15:08.890000
CVE-2024-30862,0,0,2f8ee6d6575c950abdb75d61397650796104ac283158fac245a38cdac1f61216,2024-07-03T01:54:14.183000
CVE-2024-30863,0,0,7f09c2bdbf8f076c5cd7b1eece510a200de1e8d840afb09ad65df10a82d1a55b,2024-10-30T19:35:11.540000
CVE-2024-30864,0,0,e04c733145e51290e0b4b760b29d1c4c2f4d6a6d5789b7b3dce3f78c10b78a59,2024-04-01T15:53:18.060000
CVE-2024-30864,0,1,ba60f0363595fba6571097ba72df40624b139d5a463e689a4850cf5226c90d3d,2024-12-04T21:15:23.283000
CVE-2024-30865,0,0,086ddea3051d95c24fd9bb62d2d2002b68b5fa407fb1d02593ab6a50d2ae94d8,2024-08-27T17:35:06.970000
CVE-2024-30866,0,0,fbc7fee320d7c2e8e3f30de496723c97a0df95b09f2b3b6897107e3f849d418a,2024-08-01T14:35:08.350000
CVE-2024-30867,0,0,10db6a2918480cae65cfe287f5279b549ccab3273d6372c5f100fc7f7de51fc9,2024-08-27T16:35:11.577000
@ -253633,7 +253636,7 @@ CVE-2024-31849,0,0,71733c4e588c5b1de602b4b3a846cb85af7e707a6a801380baeaefec415f1
CVE-2024-3185,0,0,9b4a71d513a26ff0472cd9eb59f40aaa78b7e93821c1ce593ecf8e2fe82c1ed8,2024-04-23T12:52:09.397000
CVE-2024-31850,0,0,af6bc43334c5e9dca388278026500da44c9d8f5cf28f363db0eff5dc050aba03,2024-04-08T18:49:25.863000
CVE-2024-31851,0,0,8dbdb4c5c7233eca402a30bc12c50d425c312f79677469eb6faec57e8f45c880,2024-04-08T18:49:25.863000
CVE-2024-31852,0,0,05df9e5d1e1855c684901a0f2256bf744f516ff5583847e1514009f87c86b975,2024-04-08T18:49:25.863000
CVE-2024-31852,0,1,ba9051f6bc6d3b5aba3b4d7f2092d68c6a17eb29edddb549caa75380b0b647ce,2024-12-04T21:15:23.467000
CVE-2024-31856,0,0,5b17ff56b891e28d61d399fcd31dbd56e16c04a63e50007a8b07a5f126fa07a3,2024-05-16T13:03:05.353000
CVE-2024-31857,0,0,b57daea1515042b1254b11fea9a109934d9eaeaf743c5e6b1d4482216f0f52dd,2024-07-03T01:55:30.363000
CVE-2024-31859,0,0,c7e4bf86d17f8d38f3b896e8ada50cd27745133fc837be8a4aeca253b15d0e96,2024-05-28T12:39:42.673000
@ -255618,7 +255621,7 @@ CVE-2024-34462,0,0,8a88747aa45fa0ff08468c03145b77f14c23a2c5a801117a3645ac9e35ca3
CVE-2024-34463,0,0,93e0b7a3eff8acce578e44f45931c5eaf5e6d1df4cebdc938c3a054fad258881,2024-09-03T15:12:16.467000
CVE-2024-34466,0,0,dd736f9a85d19253650a199739cba2301673ec6ec2adc5e7de09970e86411685,2024-05-06T15:15:24.473000
CVE-2024-34467,0,0,903bd38a14a72c5e31ca95b7f024225144ec2f1cfed11b0213915da81da29f0c,2024-08-16T19:35:11.493000
CVE-2024-34468,0,0,b164ab2b609bf8b9d79a88576e6595ba967431973eb7a086f2ba71149d9690e8,2024-05-06T12:44:56.377000
CVE-2024-34468,0,1,b2413f026c39102fe2830fda55196a6eb43c090f84107b02154996d6d64ea526,2024-12-04T21:15:23.670000
CVE-2024-34469,0,0,c68e04abdf928312d44ac341a209cf5378ddee40d6b8b27a9211f964972de340,2024-08-01T13:52:22.830000
CVE-2024-3447,0,0,b6e83f6d0454d82bbf78ae398e06e86ffce6005193a0451419e0df83af742b83,2024-11-15T13:58:08.913000
CVE-2024-34470,0,0,c26a3e4e103c3a39ccd71f6b73acf5c04b4f366cb36f58bea718bc4b8f16af48,2024-07-03T02:00:10.887000
@ -255641,7 +255644,7 @@ CVE-2024-34487,0,0,f8a502380ab1e377fb91e288027c5b0a32280a04c3867681b304cf44a4ef3
CVE-2024-34488,0,0,bd1886e792bd0f0be5174d43785b1ee8c3d2805a0b92328a691bf28c3b9e55ad,2024-07-03T02:00:17.670000
CVE-2024-34489,0,0,98fc4bbdad28e1f470f6bbf8edfd27b4d57977594296e589fe4b4857cec1a304,2024-07-03T02:00:18.727000
CVE-2024-34490,0,0,8682749851a19fd719239443e2502b58b0b536d71d97e88f6d39bdad053f0e7a,2024-07-03T02:00:19.953000
CVE-2024-34500,0,0,ac0f11e606e3a2f4fa3a35277b66fd154ed807cd910549607f9e78f6d7afdfa3,2024-06-10T17:16:29.303000
CVE-2024-34500,0,1,ad0d4277fb282ffeba130e48b29d422feab82a804fbd90a55147b70fa341bf7e,2024-12-04T21:15:23.877000
CVE-2024-34502,0,0,ff8021fe77a80f8fce883984eb2b34368073d3f3b28ee0c6d7be9cabaf01d43f,2024-08-21T20:35:03.920000
CVE-2024-34506,0,0,91884f62e0a07e36490be7a849db3addb4a9338b84975e418e0914a4f89aa554,2024-07-03T02:00:21.367000
CVE-2024-34507,0,0,218d2664de9ad27dc44233beca69cace0ca437014bd07ff163e57c33e50085bd,2024-07-03T02:00:22.533000
@ -259036,6 +259039,7 @@ CVE-2024-38821,0,0,bb251b2231aa5ec8776de9aee89d7b4c729d7a41bc68ac186fa12d01aa093
CVE-2024-38826,0,0,d2dc3bc0b0f77945ea4b1900d4b45fc9041d9a4783cdeb176eb488aedabdfbeb,2024-11-12T13:55:21.227000
CVE-2024-38827,0,0,3874c464e716661a48f3e22603ab20b7e36bf129e4ab27a217f4348c4a349acc,2024-12-02T15:15:11.270000
CVE-2024-38828,0,0,0c8d1b5128144a8d7d124f30bfb82a89e19f39cd304dc10431ed647af64ddcb3,2024-11-18T17:11:17.393000
CVE-2024-38829,1,1,ad4caa79811af6b197cbeb29379706c45076953124b05260a89dc08da6efa87b,2024-12-04T21:15:24.103000
CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000
CVE-2024-38830,0,0,25b272dc1cf212b6cf8b44602a3d5cd0c946406c321e913898f69284c3986026,2024-11-26T12:15:18.413000
CVE-2024-38831,0,0,b5e967b8a77db6e3a77f1cd78a29b2905760b9996368a4c348bc11e2fc7704dd,2024-11-26T15:15:31.957000
@ -259211,6 +259215,7 @@ CVE-2024-39209,0,0,7ae48942b6b741e327b80a7d619fe2cbf17f09140a290b1dc29277309cf5b
CVE-2024-3921,0,0,3df891161d817967027b36a59ee53de2ea83f1b76e0d4238df41e738cf592261,2024-08-09T20:35:04.863000
CVE-2024-39210,0,0,a6968325552cf6cb6c7f302a071accd1facda0c07b9843340635e35e5b596a4a,2024-10-10T12:35:11.213000
CVE-2024-39211,0,0,c9d7c4325bba0a2ec1ec1fe3daef35d056c7407899b9cbce0b5c58ab7122a0da,2024-08-22T19:35:34.747000
CVE-2024-39219,1,1,1eacae6a567f4f2e7a97818a6e574538a90c1d1a8b52380cc5257b491e9571bc,2024-12-04T21:15:24.233000
CVE-2024-3922,0,0,d93b594e75035330ffbe6c52b35218aa3c4c95531df86f73f7a2c93c08b19be8,2024-07-18T19:33:55.580000
CVE-2024-39220,0,0,cffdc7781bb5a48c8af1f6973408b621ad60d81fad4d0ce74cb4feeeca56b86d,2024-07-09T16:22:52.750000
CVE-2024-39223,0,0,f54ba99b81aef6a1a473e3f0b32cd7be01aae3fd33418d38ef44eeff204ead38,2024-10-25T18:35:06.463000
@ -265488,7 +265493,7 @@ CVE-2024-48996,0,0,63c2449ddf3c17aa92c6f7edb44c8efc93ae248c076045e11c0bc6772ecc2
CVE-2024-48997,0,0,809a5ae9097510048a583e48fefef3bfec1f102e64cf832ee44a1d74b0d2cd79,2024-11-15T15:46:44.917000
CVE-2024-48998,0,0,70ad12bbf3d2e3a049a22afd48ec9e5148477d4d2bb2bad66ee315a84a6b2057,2024-11-15T15:51:24.197000
CVE-2024-48999,0,0,557ea53a4d5db33249b0ce08f59e4afba8c2445967d6a9a4c87c2b91ac47c81e,2024-11-15T15:51:44.517000
CVE-2024-4900,0,0,2074e15c0050e8989f750822fa85e67702dc13ece861470c246a4c4acb047889,2024-06-24T12:57:36.513000
CVE-2024-4900,0,1,75901d6984a71d5f518b8822c6892bf1f3215a9b5edb8f9582dc94aa5d106e0f,2024-12-04T21:15:24.417000
CVE-2024-49000,0,0,784c045fc0596c9e0642c36b4b8f2ac0ab57e10e1a32b95efc1bf1bdb02864ac,2024-11-15T15:52:08.557000
CVE-2024-49001,0,0,06fd47831380c806b4bee6116a8c985746c5f6952a7e0c3793873d3412bf0bcb,2024-11-15T15:58:36.290000
CVE-2024-49002,0,0,e7f871d3ce352cffc0c373425650a6788d487f9947f789b179ef5ad36c05fdf9,2024-11-15T15:58:14.693000
@ -266808,7 +266813,8 @@ CVE-2024-5092,0,0,00bc3fe74171cc3f61d986dd5d1b43711757ac5d30e24bab5f84b663495133
CVE-2024-5093,0,0,13d2e709dd3e7be8048d02a6012bbed004823bd119b45510128e77bb922bb163,2024-06-04T19:20:58.343000
CVE-2024-5094,0,0,a6da916325cb7c5c0cbf108ef5f048d7004d52e417cf8850e363484a9b36d59d,2024-06-04T19:20:58.470000
CVE-2024-50942,0,0,74bb27dcec6f641721fef2704da713b75046095ccb8aeb2b392b8ef1abb8cd71,2024-12-04T17:15:15.020000
CVE-2024-50948,0,0,9bf83261dbf826c53c1f276a04e06af617475a17b2328241309f3983b9190769,2024-12-03T19:15:10.580000
CVE-2024-50947,1,1,bb7a32bbd57daee54c6e07b3a08f6779dbf89c7475587c03e22d927cc073a5ba,2024-12-04T21:15:24.570000
CVE-2024-50948,0,1,19553633ff2f5850d7dead94d9c3065a6ce96b4feb94d2c3e1c2bd5e7799176c,2024-12-04T22:15:22.627000
CVE-2024-5095,0,0,1588c0abfc34bbd50f97e7721e8e7ba42bb279c7cb42725ee04b715e36b1b7b7,2024-06-04T19:20:58.577000
CVE-2024-50955,0,0,8157390cc8753ab3c3dc03f615378f98ac2c1983a215bd6243bc7dc27b80318c,2024-11-15T13:58:08.913000
CVE-2024-50956,0,0,12124e11e67fab80bf49da8101d4c3d956d958942d16765a9a0238618204ee2c,2024-11-25T20:15:09.383000
@ -266931,6 +266937,7 @@ CVE-2024-5120,0,0,512e5b032e12a79292f06756f99bf223a47a4b934de5206e20b5529b01ef61
CVE-2024-51208,0,0,351057211d85406971a8a4342c798325b6fcc3c070b739d535371d009d3edffc,2024-11-23T01:02:45.400000
CVE-2024-51209,0,0,5193df27fee0b78bbdc7c2b1f184598c324815ff66602ff4d95528a6d5d80cc4,2024-11-20T15:15:08.830000
CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3bdb,2024-06-04T19:21:00.860000
CVE-2024-51210,1,1,a1a8cdd7a20c73dee9fe8524fd0985abea927718fff82c9cbc1e49e58f6f3532,2024-12-04T21:15:24.697000
CVE-2024-51211,0,0,581556a1bd92632bbd04cf9aebe233d1f5e96f417c538ff40e3ed80078a79ca9,2024-11-12T13:56:54.483000
CVE-2024-51213,0,0,a598a44042c959028b27d1b964937a81a14ecccc57789a4658084176eb433102,2024-11-12T18:35:33.433000
CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b5e,2024-06-04T19:21:00.963000
@ -268265,7 +268272,7 @@ CVE-2024-53912,0,0,1f4db0332861ddc3d21771f81e88e64303e6668de99899f3afc95f8e7d972
CVE-2024-53913,0,0,f29eb48b3cfa8a7826d6fe7adbaf2bce87f89a85e25f58c699946a9277a37df3,2024-11-29T20:55:25.543000
CVE-2024-53914,0,0,e050babf2e1b2fa263009de5875d826c83245812f4e7813c8d122d68332fd2a8,2024-11-29T20:55:35.293000
CVE-2024-53915,0,0,4605c52b83221ae0e3cdd10a9aad63d660542ba26783410343eed38f4ba2ed72,2024-11-29T20:55:43.810000
CVE-2024-53916,0,0,ab01a55f00681ded85136e665bd41d37ab9a1308d53df080c0f0322c9d5d1a3d,2024-12-04T04:15:04.710000
CVE-2024-53916,0,1,7468505b685e2683f2dc63bcafcc06191cbfc06c9d73791b1fbe8d39601d18c5,2024-12-04T22:15:22.840000
CVE-2024-5392,0,0,b24872fec717fdd1d01c0a9d16cd8dae85d0db85954b236e74ba95a5e5c8352c,2024-06-04T19:21:08.117000
CVE-2024-53920,0,0,a291ce56b664f688b2d6f36f512bf0b737cf558f95f0af0d70bd1b3310ba1ecf,2024-12-02T17:15:13.913000
CVE-2024-53921,0,0,eb41a4432b5a9d706840e3bfc01bd30d99edb3ace8a9178bddbd38b299a4035c,2024-12-03T20:15:16.153000
@ -268377,6 +268384,8 @@ CVE-2024-5466,0,0,7210eb30821301ab6ac0b6aaa79a17e39c84346dbb1ec0b37d3f9aca66c7a3
CVE-2024-54661,0,0,a7869024e775d27a777a789534fe9533b55cb90ea0d22f9015f9f2a6b4b8ae94,2024-12-04T15:15:17.580000
CVE-2024-54664,0,0,79dc396dc6c5b3917fb202a8de4cee0534c56602cdfe210a713783011dd6c02d,2024-12-04T15:15:18.093000
CVE-2024-5467,0,0,d5f2177f9d3ea444dfbcd8018e7c02f38607b067be38c512aaf8da3b2751677c,2024-08-27T14:35:48.977000
CVE-2024-54674,1,1,56f9d85353667186a6a0ffb946b91460250a5804fcd9070b9bb3a6467c00ad32,2024-12-04T21:15:25.130000
CVE-2024-54675,1,1,5589ec032bc34e220c2f359592bccdcbcd7a67a0bb3e53baa6e086289bb87428,2024-12-04T21:15:25.263000
CVE-2024-5468,0,0,a9b6881473aab66cd93b6151044b19528c011d8001f0e2556b425e826958e7fb,2024-06-13T18:36:09.010000
CVE-2024-5469,0,0,2b1f02bc4b651b767de9138333ca1493d00343771be32540c7c4d36f10b2a10e,2024-08-30T14:15:16.703000
CVE-2024-5470,0,0,6ad8fffdbc9fc3c2ca94bc381d3be223e310676e26148212c497e243b6c17473,2024-07-12T16:52:52.883000
@ -270873,7 +270882,7 @@ CVE-2024-8356,0,0,073be8addbfe3a95494a6412a75ee845be7aa4cb55c149651e8801c88c6a68
CVE-2024-8357,0,0,4891f679e3fbf9f3ff3f8dce4a7f48418eb802724fd30c05d838157827893a5d,2024-11-22T22:15:19.107000
CVE-2024-8358,0,0,f3e24dfb04e831a0a6b01e9578be4e81beaad7f7a2d2f706047731a7ee8e4ad2,2024-11-22T22:15:19.240000
CVE-2024-8359,0,0,0bec334a44cf4efa8fc85f7475f9ed5525e444073e2a598883a37620db91c0fb,2024-11-22T22:15:19.373000
CVE-2024-8360,0,1,22c4c990bf4aaa61dc086e437b0215a3b37405b4d1363d33a2d6964b7931df49,2024-12-04T19:32:21.703000
CVE-2024-8360,0,0,22c4c990bf4aaa61dc086e437b0215a3b37405b4d1363d33a2d6964b7931df49,2024-12-04T19:32:21.703000
CVE-2024-8362,0,0,54abf718b9bfba93199694e9f50bfa28d6dfde9a56fb3c77d91594ed8cbda92f,2024-09-04T14:35:16.777000
CVE-2024-8363,0,0,01e2f3c42ed63ca762fc774c70d7336df5274e0f5dacdde750731dfd76f769a2,2024-09-11T16:35:05.653000
CVE-2024-8364,0,0,7767c7c95e089c6b038abf689ec85904f48b602f94f00381bdc8869619571039,2024-09-25T15:08:08.503000

Can't render this file because it is too large.