From 37e12b3213ac6c0778fa4046d3e7e01f82591fad Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 15 Nov 2024 23:03:22 +0000 Subject: [PATCH] Auto-Update: 2024-11-15T23:00:19.830276+00:00 --- CVE-2017/CVE-2017-133xx/CVE-2017-13309.json | 44 ++++ CVE-2017/CVE-2017-133xx/CVE-2017-13310.json | 21 ++ CVE-2017/CVE-2017-133xx/CVE-2017-13311.json | 21 ++ CVE-2017/CVE-2017-133xx/CVE-2017-13312.json | 21 ++ CVE-2017/CVE-2017-133xx/CVE-2017-13313.json | 21 ++ CVE-2017/CVE-2017-133xx/CVE-2017-13314.json | 21 ++ CVE-2021/CVE-2021-277xx/CVE-2021-27702.json | 39 +++- CVE-2021/CVE-2021-277xx/CVE-2021-27703.json | 39 +++- CVE-2021/CVE-2021-375xx/CVE-2021-37577.json | 39 +++- CVE-2021/CVE-2021-471xx/CVE-2021-47154.json | 27 ++- CVE-2022/CVE-2022-208xx/CVE-2022-20814.json | 2 +- CVE-2023/CVE-2023-459xx/CVE-2023-45935.json | 39 +++- CVE-2024/CVE-2024-111xx/CVE-2024-11124.json | 84 +++++++- CVE-2024/CVE-2024-111xx/CVE-2024-11175.json | 77 ++++++- CVE-2024/CVE-2024-112xx/CVE-2024-11217.json | 60 ++++++ CVE-2024/CVE-2024-112xx/CVE-2024-11261.json | 141 +++++++++++++ CVE-2024/CVE-2024-15xx/CVE-2024-1555.json | 39 +++- CVE-2024/CVE-2024-200xx/CVE-2024-20070.json | 27 ++- CVE-2024/CVE-2024-210xx/CVE-2024-21088.json | 14 +- CVE-2024/CVE-2024-211xx/CVE-2024-21146.json | 14 +- CVE-2024/CVE-2024-239xx/CVE-2024-23944.json | 27 ++- CVE-2024/CVE-2024-244xx/CVE-2024-24447.json | 39 +++- CVE-2024/CVE-2024-244xx/CVE-2024-24450.json | 39 +++- CVE-2024/CVE-2024-244xx/CVE-2024-24452.json | 39 +++- CVE-2024/CVE-2024-244xx/CVE-2024-24453.json | 39 +++- CVE-2024/CVE-2024-244xx/CVE-2024-24454.json | 39 +++- CVE-2024/CVE-2024-244xx/CVE-2024-24455.json | 39 +++- CVE-2024/CVE-2024-244xx/CVE-2024-24457.json | 39 +++- CVE-2024/CVE-2024-244xx/CVE-2024-24458.json | 39 +++- CVE-2024/CVE-2024-244xx/CVE-2024-24459.json | 39 +++- CVE-2024/CVE-2024-272xx/CVE-2024-27223.json | 27 ++- CVE-2024/CVE-2024-277xx/CVE-2024-27789.json | 39 +++- CVE-2024/CVE-2024-291xx/CVE-2024-29119.json | 41 +++- CVE-2024/CVE-2024-293xx/CVE-2024-29316.json | 27 ++- CVE-2024/CVE-2024-313xx/CVE-2024-31337.json | 27 ++- CVE-2024/CVE-2024-340xx/CVE-2024-34024.json | 27 ++- CVE-2024/CVE-2024-344xx/CVE-2024-34460.json | 39 +++- CVE-2024/CVE-2024-347xx/CVE-2024-34729.json | 27 ++- CVE-2024/CVE-2024-347xx/CVE-2024-34747.json | 39 +++- CVE-2024/CVE-2024-361xx/CVE-2024-36140.json | 93 ++++++++- CVE-2024/CVE-2024-383xx/CVE-2024-38370.json | 56 +++++ CVE-2024/CVE-2024-426xx/CVE-2024-42680.json | 8 +- CVE-2024/CVE-2024-447xx/CVE-2024-44758.json | 25 +++ CVE-2024/CVE-2024-456xx/CVE-2024-45610.json | 56 +++++ CVE-2024/CVE-2024-456xx/CVE-2024-45611.json | 56 +++++ CVE-2024/CVE-2024-490xx/CVE-2024-49060.json | 56 +++++ CVE-2024/CVE-2024-495xx/CVE-2024-49592.json | 21 ++ CVE-2024/CVE-2024-501xx/CVE-2024-50143.json | 134 +++++++++++- CVE-2024/CVE-2024-508xx/CVE-2024-50835.json | 41 +++- CVE-2024/CVE-2024-509xx/CVE-2024-50983.json | 25 +++ CVE-2024/CVE-2024-517xx/CVE-2024-51764.json | 21 ++ CVE-2024/CVE-2024-517xx/CVE-2024-51765.json | 21 ++ CVE-2024/CVE-2024-87xx/CVE-2024-8755.json | 4 +- CVE-2024/CVE-2024-94xx/CVE-2024-9477.json | 65 +++++- CVE-2024/CVE-2024-95xx/CVE-2024-9500.json | 56 +++++ README.md | 103 +++++---- _state.csv | 220 +++++++++++--------- 57 files changed, 2272 insertions(+), 250 deletions(-) create mode 100644 CVE-2017/CVE-2017-133xx/CVE-2017-13309.json create mode 100644 CVE-2017/CVE-2017-133xx/CVE-2017-13310.json create mode 100644 CVE-2017/CVE-2017-133xx/CVE-2017-13311.json create mode 100644 CVE-2017/CVE-2017-133xx/CVE-2017-13312.json create mode 100644 CVE-2017/CVE-2017-133xx/CVE-2017-13313.json create mode 100644 CVE-2017/CVE-2017-133xx/CVE-2017-13314.json create mode 100644 CVE-2024/CVE-2024-112xx/CVE-2024-11217.json create mode 100644 CVE-2024/CVE-2024-112xx/CVE-2024-11261.json create mode 100644 CVE-2024/CVE-2024-383xx/CVE-2024-38370.json create mode 100644 CVE-2024/CVE-2024-447xx/CVE-2024-44758.json create mode 100644 CVE-2024/CVE-2024-456xx/CVE-2024-45610.json create mode 100644 CVE-2024/CVE-2024-456xx/CVE-2024-45611.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49060.json create mode 100644 CVE-2024/CVE-2024-495xx/CVE-2024-49592.json create mode 100644 CVE-2024/CVE-2024-509xx/CVE-2024-50983.json create mode 100644 CVE-2024/CVE-2024-517xx/CVE-2024-51764.json create mode 100644 CVE-2024/CVE-2024-517xx/CVE-2024-51765.json create mode 100644 CVE-2024/CVE-2024-95xx/CVE-2024-9500.json diff --git a/CVE-2017/CVE-2017-133xx/CVE-2017-13309.json b/CVE-2017/CVE-2017-133xx/CVE-2017-13309.json new file mode 100644 index 00000000000..85ca11546a9 --- /dev/null +++ b/CVE-2017/CVE-2017-133xx/CVE-2017-13309.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2017-13309", + "sourceIdentifier": "security@android.com", + "published": "2024-11-15T21:15:05.980", + "lastModified": "2024-11-15T21:35:00.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In readEncryptedData of ConscryptEngine.java, there is a possible plaintext leak due to improperly used crypto. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://source.android.com/security/bulletin/2018-05-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2017/CVE-2017-133xx/CVE-2017-13310.json b/CVE-2017/CVE-2017-133xx/CVE-2017-13310.json new file mode 100644 index 00000000000..4bf0d0bd72a --- /dev/null +++ b/CVE-2017/CVE-2017-133xx/CVE-2017-13310.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2017-13310", + "sourceIdentifier": "security@android.com", + "published": "2024-11-15T22:15:14.177", + "lastModified": "2024-11-15T22:15:14.177", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In createFromParcel of ViewPager.java, there is a possible read/write serialization issue leading to a permissions bypass. This could lead to local escalation of privilege where an app can start an activity with system privileges with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/2018-05-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2017/CVE-2017-133xx/CVE-2017-13311.json b/CVE-2017/CVE-2017-133xx/CVE-2017-13311.json new file mode 100644 index 00000000000..d8b17bbadf0 --- /dev/null +++ b/CVE-2017/CVE-2017-133xx/CVE-2017-13311.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2017-13311", + "sourceIdentifier": "security@android.com", + "published": "2024-11-15T22:15:14.240", + "lastModified": "2024-11-15T22:15:14.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the read() function of ProcessStats.java, there is a possible read/write serialization issue leading to a permissions bypass. This could lead to local escalation of privilege where an app can start an activity with system privileges with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/2018-05-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2017/CVE-2017-133xx/CVE-2017-13312.json b/CVE-2017/CVE-2017-133xx/CVE-2017-13312.json new file mode 100644 index 00000000000..558867a576f --- /dev/null +++ b/CVE-2017/CVE-2017-133xx/CVE-2017-13312.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2017-13312", + "sourceIdentifier": "security@android.com", + "published": "2024-11-15T22:15:14.300", + "lastModified": "2024-11-15T22:15:14.300", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In createFromParcel of MediaCas.java, there is a possible parcel read/write mismatch due to improper input validation. This could lead to local escalation of privilege where an app can start an activity with system privileges with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/2018-05-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2017/CVE-2017-133xx/CVE-2017-13313.json b/CVE-2017/CVE-2017-133xx/CVE-2017-13313.json new file mode 100644 index 00000000000..7bcdf9604b2 --- /dev/null +++ b/CVE-2017/CVE-2017-133xx/CVE-2017-13313.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2017-13313", + "sourceIdentifier": "security@android.com", + "published": "2024-11-15T22:15:14.373", + "lastModified": "2024-11-15T22:15:14.373", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In ElementaryStreamQueue::dequeueAccessUnitMPEG4Video of ESQueue.cpp, there is a possible infinite loop leading to resource exhaustion due to an incorrect bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/2018-05-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2017/CVE-2017-133xx/CVE-2017-13314.json b/CVE-2017/CVE-2017-133xx/CVE-2017-13314.json new file mode 100644 index 00000000000..433b8974045 --- /dev/null +++ b/CVE-2017/CVE-2017-133xx/CVE-2017-13314.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2017-13314", + "sourceIdentifier": "security@android.com", + "published": "2024-11-15T22:15:14.440", + "lastModified": "2024-11-15T22:15:14.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In setAllowOnlyVpnForUids of NetworkManagementService.java, there is a possible security settings bypass due to a missing permission check. This could lead to local escalation of privilege allowing users to access non-VPN networks, when they are supposed to be restricted to the VPN networks, with no additional execution privileges needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/security/bulletin/2018-05-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-277xx/CVE-2021-27702.json b/CVE-2021/CVE-2021-277xx/CVE-2021-27702.json index d2c00c39087..69772062ed5 100644 --- a/CVE-2021/CVE-2021-277xx/CVE-2021-27702.json +++ b/CVE-2021/CVE-2021-277xx/CVE-2021-27702.json @@ -2,7 +2,7 @@ "id": "CVE-2021-27702", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-12T23:15:03.797", - "lastModified": "2024-11-13T17:01:16.850", + "lastModified": "2024-11-15T22:35:02.520", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El enrutador Sercomm Etisalat modelo S3-AC2100 se ve afectado por un control de acceso incorrecto a trav\u00e9s de la utilidad de diagn\u00f3stico en el panel del enrutador." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/Mrnmap/mrnmap-cve/blob/main/CVE-2021-27702", diff --git a/CVE-2021/CVE-2021-277xx/CVE-2021-27703.json b/CVE-2021/CVE-2021-277xx/CVE-2021-27703.json index 05d2ae8bbd4..dd13fedd8be 100644 --- a/CVE-2021/CVE-2021-277xx/CVE-2021-27703.json +++ b/CVE-2021/CVE-2021-277xx/CVE-2021-27703.json @@ -2,7 +2,7 @@ "id": "CVE-2021-27703", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-12T23:15:03.897", - "lastModified": "2024-11-13T17:01:16.850", + "lastModified": "2024-11-15T22:35:03.380", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El modelo Sercomm Etisalat modelo S3-AC2100 se ve afectado por Cross Site Scripting (XSS) a trav\u00e9s de la p\u00e1gina de actualizaci\u00f3n de firmware." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Mrnmap/mrnmap-cve/blob/main/CVE-2021-27703", diff --git a/CVE-2021/CVE-2021-375xx/CVE-2021-37577.json b/CVE-2021/CVE-2021-375xx/CVE-2021-37577.json index 3b742af0807..bb4708bb773 100644 --- a/CVE-2021/CVE-2021-375xx/CVE-2021-37577.json +++ b/CVE-2021/CVE-2021-375xx/CVE-2021-37577.json @@ -2,7 +2,7 @@ "id": "CVE-2021-37577", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-01T15:15:06.423", - "lastModified": "2024-10-04T13:51:25.567", + "lastModified": "2024-11-15T21:35:01.120", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El emparejamiento de conexiones seguras de Bluetooth LE y BR/EDR y el emparejamiento simple seguro mediante el protocolo de entrada de clave de acceso en las especificaciones b\u00e1sicas de Bluetooth 2.1 a 5.3 pueden permitir que un atacante intermediario no autenticado identifique la clave de acceso utilizada durante el emparejamiento mediante el reflejo de una clave p\u00fablica manipulada con la misma coordenada X que la clave p\u00fablica ofrecida y mediante el reflejo de la evidencia de autenticaci\u00f3n del dispositivo iniciador, lo que potencialmente permite que este atacante complete el emparejamiento autenticado con el dispositivo que responde utilizando la clave de acceso correcta para la sesi\u00f3n de emparejamiento. Este es un problema relacionado con CVE-2020-26558." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], "references": [ { "url": "https://bluetooth.com", diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47154.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47154.json index 7ce459476cf..582c883c947 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47154.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47154.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47154", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-18T05:15:06.140", - "lastModified": "2024-03-23T17:15:10.217", + "lastModified": "2024-11-15T22:35:04.207", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El m\u00f3dulo Net::CIDR::Lite anterior a 0.22 para Perl no considera adecuadamente los caracteres cero extra\u00f1os al comienzo de una cadena de direcci\u00f3n IP, lo que (en algunas situaciones) permite a los atacantes eludir el control de acceso basado en direcciones IP." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://blog.urth.org/2021/03/29/security-issues-in-perl-ip-address-distros/", diff --git a/CVE-2022/CVE-2022-208xx/CVE-2022-20814.json b/CVE-2022/CVE-2022-208xx/CVE-2022-20814.json index 87a53e3d5b4..9e8b593beb6 100644 --- a/CVE-2022/CVE-2022-208xx/CVE-2022-20814.json +++ b/CVE-2022/CVE-2022-208xx/CVE-2022-20814.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20814", "sourceIdentifier": "ykramarz@cisco.com", "published": "2024-11-15T16:15:22.670", - "lastModified": "2024-11-15T16:15:22.670", + "lastModified": "2024-11-15T22:15:14.747", "vulnStatus": "Received", "cveTags": [], "descriptions": [ diff --git a/CVE-2023/CVE-2023-459xx/CVE-2023-45935.json b/CVE-2023/CVE-2023-459xx/CVE-2023-45935.json index 137c7b82641..4b6ee87691f 100644 --- a/CVE-2023/CVE-2023-459xx/CVE-2023-45935.json +++ b/CVE-2023/CVE-2023-459xx/CVE-2023-45935.json @@ -2,7 +2,7 @@ "id": "CVE-2023-45935", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T05:15:47.377", - "lastModified": "2024-08-02T21:15:47.317", + "lastModified": "2024-11-15T22:35:05.180", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "Se descubri\u00f3 que Qt 6 a 6.6 conten\u00eda una desreferencia de puntero NULL mediante la funci\u00f3n QXcbConnection::initializeAllAtoms(). NOTA: esto est\u00e1 en disputa porque no se espera que una aplicaci\u00f3n X contin\u00fae ejecut\u00e1ndose cuando hay un comportamiento an\u00f3malo arbitrario del servidor X." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jan/61", diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11124.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11124.json index dae464034bd..82feed8dac4 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11124.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11124.json @@ -2,13 +2,17 @@ "id": "CVE-2024-11124", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-12T14:15:16.260", - "lastModified": "2024-11-12T15:48:59.103", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T22:47:16.050", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in TimGeyssens UIOMatic 5 and classified as critical. This vulnerability affects unknown code of the file /src/UIOMatic/wwwroot/backoffice/resources/uioMaticObject.r. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en TimGeyssens UIOMatic 5 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /src/UIOMatic/wwwroot/backoffice/resources/uioMaticObject.r. La manipulaci\u00f3n conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -106,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -120,26 +154,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:timgeyssens:ui-o-matic:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD4547F9-B069-49FC-900C-EBD1A40A260B" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/TimGeyssens/UIOMatic/pull/227", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/TimGeyssens/UIOMatic/pull/227#issuecomment-2317993695", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/TimGeyssens/UIOMatic/pull/227#issuecomment-2346074453", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://vuldb.com/?ctiid.283972", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.283972", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11175.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11175.json index c6428c84c4d..5f311fb8e58 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11175.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11175.json @@ -2,13 +2,17 @@ "id": "CVE-2024-11175", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-13T16:15:17.740", - "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-15T22:50:48.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in Public CMS 5.202406.d and classified as problematic. This issue affects some unknown processing of the file /admin/cmsVote/save of the component Voting Management. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named b9530b9cc1f5cfdad4b637874f59029a6283a65c. It is recommended to apply a patch to fix this issue." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad en Public CMS 5.202406.d y se clasific\u00f3 como problem\u00e1tica. Este problema afecta a algunos procesos desconocidos del archivo /admin/cmsVote/save del componente Voting Management. La manipulaci\u00f3n conduce a Cross-Site Scripting. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. El parche se llama b9530b9cc1f5cfdad4b637874f59029a6283a65c. Se recomienda aplicar un parche para solucionar este problema." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -105,6 +129,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +154,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:publiccms:publiccms:5.202406.d:*:*:*:*:*:*:*", + "matchCriteriaId": "85610E70-6347-47C4-9F7B-2407D2AEA5CF" + } + ] + } + ] + } + ], "references": [ { "url": "https://gitee.com/sanluan/PublicCMS/commit/b9530b9cc1f5cfdad4b637874f59029a6283a65c", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://gitee.com/sanluan/PublicCMS/issues/IB2BUV", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.284351", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.284351", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11217.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11217.json new file mode 100644 index 00000000000..6b1eb20f146 --- /dev/null +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11217.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-11217", + "sourceIdentifier": "secalert@redhat.com", + "published": "2024-11-15T21:15:06.543", + "lastModified": "2024-11-15T21:15:06.543", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in the OAuth-server. OAuth-server logs the OAuth2 client secret when the logLevel is Debug higher for OIDC/GitHub/GitLab/Google IDPs login options." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secalert@redhat.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secalert@redhat.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1295" + } + ] + } + ], + "references": [ + { + "url": "https://access.redhat.com/security/cve/CVE-2024-11217", + "source": "secalert@redhat.com" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2326230", + "source": "secalert@redhat.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11261.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11261.json new file mode 100644 index 00000000000..3fc23290f0a --- /dev/null +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11261.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-11261", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-15T22:15:14.970", + "lastModified": "2024-11-15T22:15:14.970", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in SourceCodester Student Record Management System 1.0. Affected is an unknown function of the file StudentRecordManagementSystem.cpp of the component Number of Students Menu. The manipulation leads to memory corruption. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "LOCAL", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 4.3 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 3.1, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Hacker0xone/CVE/issues/12", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.284718", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.284718", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.443906", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1555.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1555.json index fd9e453bf3c..55490ce97cd 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1555.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1555.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1555", "sourceIdentifier": "security@mozilla.org", "published": "2024-02-20T14:15:09.007", - "lastModified": "2024-02-20T19:50:53.960", + "lastModified": "2024-11-15T21:35:03.400", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Al abrir un sitio web utilizando el controlador de protocolo `firefox://`, las cookies de SameSite no se respetaban adecuadamente. Esta vulnerabilidad afecta a Firefox < 123." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 8.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1873223", diff --git a/CVE-2024/CVE-2024-200xx/CVE-2024-20070.json b/CVE-2024/CVE-2024-200xx/CVE-2024-20070.json index 04cddb35bfd..04a3e3de472 100644 --- a/CVE-2024/CVE-2024-200xx/CVE-2024-20070.json +++ b/CVE-2024/CVE-2024-200xx/CVE-2024-20070.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20070", "sourceIdentifier": "security@mediatek.com", "published": "2024-06-03T02:15:09.093", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-11-15T21:35:04.253", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En los m\u00f3dems, existe una posible divulgaci\u00f3n de informaci\u00f3n debido al uso de algoritmos criptogr\u00e1ficos riesgosos durante la negociaci\u00f3n del establecimiento de la conexi\u00f3n. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n, cuando se utiliza un algoritmo de cifrado d\u00e9bil, sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: MOLY00942482; ID del problema: MSV-1469." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 2.5 + } + ] + }, "weaknesses": [ { "source": "security@mediatek.com", diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21088.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21088.json index c4d4a4be07c..7e82cb40981 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21088.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21088.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21088", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:28.810", - "lastModified": "2024-04-17T12:48:31.863", + "lastModified": "2024-11-15T22:35:06.793", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-444" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21146.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21146.json index be7195c852b..bb7671ab0c5 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21146.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21146.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21146", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:16.190", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-11-15T21:35:04.493", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujul2024.html", diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23944.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23944.json index c34bc941f99..bd7d58d2608 100644 --- a/CVE-2024/CVE-2024-239xx/CVE-2024-23944.json +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23944.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23944", "sourceIdentifier": "security@apache.org", "published": "2024-03-15T11:15:08.927", - "lastModified": "2024-05-01T17:15:29.330", + "lastModified": "2024-11-15T21:35:05.263", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Divulgaci\u00f3n de informaci\u00f3n en el manejo de observadores persistentes en Apache ZooKeeper debido a la falta de verificaci\u00f3n de ACL. Permite a un atacante monitorear znodes secundarios adjuntando un observador persistente (comando addWatch) a un padre al que el atacante ya tiene acceso. El servidor ZooKeeper no realiza una verificaci\u00f3n de ACL cuando se activa el observador persistente y, como consecuencia, la ruta completa de los znodes sobre los que se activa un evento de vigilancia queda expuesta al propietario del observador. Es importante tener en cuenta que esta vulnerabilidad solo expone la ruta, no los datos de znode, pero dado que la ruta de znode puede contener informaci\u00f3n confidencial como el nombre de usuario o el ID de inicio de sesi\u00f3n, este problema es potencialmente cr\u00edtico. Se recomienda a los usuarios actualizar a la versi\u00f3n 3.9.2, 3.8.4, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24447.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24447.json index a4c4666edc5..2460a44ee42 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24447.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24447.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24447", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T18:15:26.930", - "lastModified": "2024-11-15T19:15:06.300", + "lastModified": "2024-11-15T21:35:05.520", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A buffer overflow in the ngap_amf_handle_pdu_session_resource_setup_response function of oai-cn5g-amf up to v2.0.0 allows attackers to cause a Denial of Service (DoS) via a PDU Session Resource Setup Response with an empty Response Item list." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24450.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24450.json index 8160880f987..db80eb266da 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24450.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24450.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24450", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T18:15:27.097", - "lastModified": "2024-11-15T18:15:27.097", + "lastModified": "2024-11-15T21:35:06.360", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Stack-based memcpy buffer overflow in the ngap_handle_pdu_session_resource_setup_response routine in OpenAirInterface CN5G AMF <= 2.0.0 allows a remote attacker with access to the N2 interface to carry out denial of service against the AMF and potentially execute code by sending a PDU Session Resource Setup Response with a suffciently large FailedToSetupList IE." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24452.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24452.json index 02761280af1..b4edb6a0dc9 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24452.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24452.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24452", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T20:15:19.117", - "lastModified": "2024-11-15T20:15:19.117", + "lastModified": "2024-11-15T21:35:07.200", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB Release Indication messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "http://athonet.com", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24453.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24453.json index 89c5d04056e..f94570ea983 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24453.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24453.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24453", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T20:15:19.203", - "lastModified": "2024-11-15T20:15:19.203", + "lastModified": "2024-11-15T21:35:08.027", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB NotToBeModifiedBearerModInd information element in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "http://athonet.com", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24454.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24454.json index 5d90fa0953b..2a419162f94 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24454.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24454.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24454", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T20:15:19.300", - "lastModified": "2024-11-15T20:15:19.300", + "lastModified": "2024-11-15T21:35:08.870", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB Modify Request messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "http://athonet.com", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24455.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24455.json index 4cbd60a4295..d569b079410 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24455.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24455.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24455", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T20:15:19.403", - "lastModified": "2024-11-15T20:15:19.403", + "lastModified": "2024-11-15T21:35:09.713", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An invalid memory access when handling a UE Context Release message containing an invalid UE identifier in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "http://athonet.com", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24457.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24457.json index f3f26581e53..84592a5efdc 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24457.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24457.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24457", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T20:15:19.510", - "lastModified": "2024-11-15T20:15:19.510", + "lastModified": "2024-11-15T21:35:10.550", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An invalid memory access when handling the ProtocolIE_ID field of E-RAB Setup List Context SURes messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "http://athonet.com", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24458.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24458.json index baa93f66c39..257ddf9956a 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24458.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24458.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24458", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T20:15:19.610", - "lastModified": "2024-11-15T20:15:19.610", + "lastModified": "2024-11-15T21:35:11.383", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An invalid memory access when handling the ENB Configuration Transfer messages containing invalid PLMN Identities in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "http://athonet.com", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24459.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24459.json index 79c6ac75fae..c5601d79bcb 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24459.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24459.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24459", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T20:15:19.703", - "lastModified": "2024-11-15T20:15:19.703", + "lastModified": "2024-11-15T21:35:12.210", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An invalid memory access when handling the ProtocolIE_ID field of S1Setup Request messages in Athonet vEPC MME v11.4.0 allows attackers to cause a Denial of Service (DoS) to the cellular network by repeatedly initiating connections and sending a crafted payload." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "http://athonet.com", diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27223.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27223.json index 33009f4c7f2..c1a233cbaa4 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27223.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27223.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27223", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-03-11T19:15:48.603", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-11-15T21:35:13.053", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En EUTRAN_LCS_DecodeFacilityInformationElement de LPP_LcsManagement.c, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a la divulgaci\u00f3n remota de informaci\u00f3n despu\u00e9s de autenticar la conexi\u00f3n celular sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-03-01", diff --git a/CVE-2024/CVE-2024-277xx/CVE-2024-27789.json b/CVE-2024/CVE-2024-277xx/CVE-2024-27789.json index 63b761fe091..f16be5f1b89 100644 --- a/CVE-2024/CVE-2024-277xx/CVE-2024-27789.json +++ b/CVE-2024/CVE-2024-277xx/CVE-2024-27789.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27789", "sourceIdentifier": "product-security@apple.com", "published": "2024-05-14T15:13:01.493", - "lastModified": "2024-06-10T19:15:53.183", + "lastModified": "2024-11-15T22:35:08.453", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se solucion\u00f3 un problema de l\u00f3gica con controles mejorados. Este problema se solucion\u00f3 en iOS 16.7.8 y iPadOS 16.7.8, macOS Monterey 12.7.5, macOS Ventura 13.6.7, macOS Sonoma 14.4. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/May/11", diff --git a/CVE-2024/CVE-2024-291xx/CVE-2024-29119.json b/CVE-2024/CVE-2024-291xx/CVE-2024-29119.json index a5654c3e551..08dd341aad5 100644 --- a/CVE-2024/CVE-2024-291xx/CVE-2024-29119.json +++ b/CVE-2024/CVE-2024-291xx/CVE-2024-29119.json @@ -2,13 +2,17 @@ "id": "CVE-2024-29119", "sourceIdentifier": "productcert@siemens.com", "published": "2024-11-12T13:15:07.263", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T22:50:03.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in Spectrum Power 7 (All versions < V24Q3). The affected product contains several root-owned SUID binaries that could allow an authenticated local attacker to escalate privileges." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en Spectrum Power 7 (todas las versiones anteriores a V24Q3). El producto afectado contiene varios binarios SUID propiedad de superusuario que podr\u00edan permitir que un atacante local autenticado aumente los privilegios." } ], "metrics": { @@ -80,6 +84,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "productcert@siemens.com", "type": "Secondary", @@ -91,10 +105,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siemens:spectrum_power_7:*:*:*:*:*:*:*:*", + "versionEndExcluding": "24q3", + "matchCriteriaId": "60335833-4E79-43C9-B629-1FD9D4D675DA" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-616032.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-293xx/CVE-2024-29316.json b/CVE-2024/CVE-2024-293xx/CVE-2024-29316.json index 6cf8fa7ad5d..b5e349d32fe 100644 --- a/CVE-2024/CVE-2024-293xx/CVE-2024-29316.json +++ b/CVE-2024/CVE-2024-293xx/CVE-2024-29316.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29316", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-28T23:15:46.470", - "lastModified": "2024-03-29T12:45:02.937", + "lastModified": "2024-11-15T21:35:13.307", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "NodeBB 3.6.7 es vulnerable a un control de acceso incorrecto; por ejemplo, un atacante con pocos privilegios puede acceder a las pesta\u00f1as restringidas del grupo de administraci\u00f3n a trav\u00e9s de \"isadmin\":true." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://medium.com/%40krityamkarma858041/broken-access-control-nodebb-v3-6-7-eebc59c24deb", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31337.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31337.json index 97208083460..e56c9bf200f 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31337.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31337.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31337", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:20.167", - "lastModified": "2024-11-15T14:00:09.720", + "lastModified": "2024-11-15T22:35:09.383", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En PVRSRVRGXKickTA3DKM de rgxta3d.c, existe la posibilidad de ejecuci\u00f3n de c\u00f3digo arbitrario debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar una escalada local de privilegios en el n\u00facleo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://source.android.com/security/bulletin/2024-11-01", diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34024.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34024.json index e1f09cdf807..2b651dc4f2d 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34024.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34024.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34024", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-06-18T06:15:11.257", - "lastModified": "2024-06-20T12:44:01.637", + "lastModified": "2024-11-15T21:35:13.637", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Existe un problema de discrepancia de respuesta observable en ID Link Manager y FUJITSU Software TIME CREATOR. Si se explota esta vulnerabilidad, un atacante remoto no autenticado puede determinar si un nombre de usuario es v\u00e1lido o no." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://jvn.jp/en/jp/JVN65171386/", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34460.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34460.json index 146ab36052f..9139d6d04f2 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34460.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34460.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34460", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-04T05:15:06.497", - "lastModified": "2024-05-06T12:44:56.377", + "lastModified": "2024-11-15T21:35:13.877", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La herramienta Tree Explorer de Organizer en Zenario anterior a 9.5.60602 se ve afectada por XSS. (Este componente se elimin\u00f3 en 9.5.60602)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://zenar.io/zenario-9/blog/zenario-9560602-patch-released", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34729.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34729.json index 9c7e8d57623..e69957f3bc3 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34729.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34729.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34729", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:20.337", - "lastModified": "2024-11-15T14:00:09.720", + "lastModified": "2024-11-15T22:35:09.693", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En varias ubicaciones, existe la posibilidad de ejecuci\u00f3n de c\u00f3digo arbitrario debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios en el n\u00facleo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://source.android.com/security/bulletin/2024-11-01", diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34747.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34747.json index 8ba86e1e155..13b9046b5e6 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34747.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34747.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34747", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:20.410", - "lastModified": "2024-11-15T14:00:09.720", + "lastModified": "2024-11-15T22:35:09.927", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En DevmemXIntMapPages de devicemem_server.c, existe un posible use-after-free debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios en el kernel sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. " } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-11-01", diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36140.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36140.json index 497255a5d06..4e00cc2c678 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36140.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36140.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36140", "sourceIdentifier": "productcert@siemens.com", "published": "2024-11-12T13:15:07.957", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T22:53:26.063", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been identified in OZW672 (All versions < V5.2), OZW772 (All versions < V5.2). The user accounts tab of affected devices is vulnerable to stored cross-site scripting (XSS) attacks.\r\n\r\nThis could allow an authenticated remote attacker to inject arbitrary JavaScript code that is later executed by another authenticated victim user with potential higher privileges than the attacker." + }, + { + "lang": "es", + "value": "Se ha identificado una vulnerabilidad en OZW672 (todas las versiones anteriores a la V5.2) y OZW772 (todas las versiones anteriores a la V5.2). La pesta\u00f1a de cuentas de usuario de los dispositivos afectados es vulnerable a ataques de Cross Site Scripting (XSS) almacenado. Esto podr\u00eda permitir que un atacante remoto autenticado inyecte c\u00f3digo JavaScript arbitrario que luego ejecuta otro usuario v\u00edctima autenticado con posibles privilegios superiores a los del atacante." } ], "metrics": { @@ -58,8 +62,28 @@ ], "cvssMetricV31": [ { - "source": "productcert@siemens.com", + "source": "nvd@nist.gov", "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, + { + "source": "productcert@siemens.com", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N", @@ -91,10 +115,71 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:ozw672_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.2", + "matchCriteriaId": "79643F49-38EC-4BC7-9EB4-6586505B6D76" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:ozw672:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B44996E-361B-4A33-BCBA-E834612D891E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:siemens:ozw772_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.2", + "matchCriteriaId": "C6D46204-8631-4874-98E4-112595A1BDEB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:siemens:ozw772:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D76AA89B-3B42-4A6D-858D-63F503D8F953" + } + ] + } + ] + } + ], "references": [ { "url": "https://cert-portal.siemens.com/productcert/html/ssa-230445.html", - "source": "productcert@siemens.com" + "source": "productcert@siemens.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-383xx/CVE-2024-38370.json b/CVE-2024/CVE-2024-383xx/CVE-2024-38370.json new file mode 100644 index 00000000000..a9ff6f40e4d --- /dev/null +++ b/CVE-2024/CVE-2024-383xx/CVE-2024-38370.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38370", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-15T22:15:15.317", + "lastModified": "2024-11-15T22:15:15.317", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GLPI is a free asset and IT management software package. Starting in 9.2.0 and prior to 11.0.0, it is possible to download a document from the API without appropriate rights. Upgrade to 10.0.16." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-xrm2-m72w-w4x4", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-426xx/CVE-2024-42680.json b/CVE-2024/CVE-2024-426xx/CVE-2024-42680.json index 402d9b587bf..c5776f1223a 100644 --- a/CVE-2024/CVE-2024-426xx/CVE-2024-42680.json +++ b/CVE-2024/CVE-2024-426xx/CVE-2024-42680.json @@ -2,8 +2,8 @@ "id": "CVE-2024-42680", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-15T14:15:11.107", - "lastModified": "2024-08-21T11:06:00.887", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-15T21:15:07.623", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -70,6 +70,10 @@ } ], "references": [ + { + "url": "https://github.com/WarmBrew/web_vul/blob/main/CVES/CVE-2024-42680.md", + "source": "cve@mitre.org" + }, { "url": "https://github.com/WarmBrew/web_vul/blob/main/CYGLXT/CYinfo.md", "source": "cve@mitre.org", diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44758.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44758.json new file mode 100644 index 00000000000..7ef1da04836 --- /dev/null +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44758.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-44758", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-15T21:15:09.233", + "lastModified": "2024-11-15T21:15:09.233", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An arbitrary file upload vulnerability in the component /Production/UploadFile of NUS-M9 ERP Management Software v3.0.0 allows attackers to execute arbitrary code via uploading crafted files." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/WarmBrew/web_vul/blob/main/CVES/CVE-2024-44758.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/WarmBrew/web_vul/blob/main/M9ERP/M9ERP-upload.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45610.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45610.json new file mode 100644 index 00000000000..662ecb55432 --- /dev/null +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45610.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45610", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-15T21:15:09.370", + "lastModified": "2024-11-15T21:15:09.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An unauthenticated user can provide a malicious link to a GLPI technician in order to exploit a reflected XSS vulnerability located in the Cable form. Upgrade to 10.0.17." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-vvr8-chwj-9m4c", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-456xx/CVE-2024-45611.json b/CVE-2024/CVE-2024-456xx/CVE-2024-45611.json new file mode 100644 index 00000000000..12bfab81974 --- /dev/null +++ b/CVE-2024/CVE-2024-456xx/CVE-2024-45611.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45611", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-15T21:15:09.627", + "lastModified": "2024-11-15T21:15:09.627", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An authenticated user can bypass the access control policy to create a private RSS feed attached to another user account and use a malicious payload to triggger a stored XSS. Upgrade to 10.0.17." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-j73h-x6j3-m479", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49060.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49060.json new file mode 100644 index 00000000000..73eb1137117 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49060.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49060", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-15T21:15:10.863", + "lastModified": "2024-11-15T21:15:10.863", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Azure Stack HCI Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49060", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49592.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49592.json new file mode 100644 index 00000000000..e08dc5e087e --- /dev/null +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49592.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-49592", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-15T21:15:11.070", + "lastModified": "2024-11-15T21:15:11.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "McAfee Trial Installer 16.0.53 has Incorrect Access Control that leads to Local Escalation of Privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.mcafee.com/support/s/article/000002516?language=en_US", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50143.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50143.json index 4b4068ba81e..036cd652b29 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50143.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50143.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50143", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-07T10:15:06.243", - "lastModified": "2024-11-08T19:01:03.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T22:22:40.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,149 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: udf: se corrige el uso de un valor no inicializado en udf_get_fileshortad. Se comprueba si hay desbordamiento al calcular alen en udf_current_aext para mitigar el uso posterior de un valor no inicializado en udf_get_fileshortad. Error de KMSAN[1]. Despu\u00e9s de aplicar el parche, el reproductor no activ\u00f3 ning\u00fan problema[2]. [1] https://syzkaller.appspot.com/bug?extid=8901c4560b7ab5c2f9df [2] https://syzkaller.appspot.com/x/log.txt?x=10242227980000" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.19.323", + "matchCriteriaId": "3BC77309-A76B-49EF-A846-844D824E3586" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.285", + "matchCriteriaId": "B5A89369-320F-47FC-8695-56F61F87E4C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.15.170", + "matchCriteriaId": "2A6E0420-A1EC-4112-AAE8-10319804CCEE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.115", + "matchCriteriaId": "C08A77A6-E42E-4EFD-B5A1-2BF6CBBB42AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.59", + "matchCriteriaId": "5D15CA59-D15C-4ACD-8B03-A072DEAD2081" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.6", + "matchCriteriaId": "E4486B12-007B-4794-9857-F07145637AA1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1ac49babc952f48d82676979b20885e480e69be8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/264db9d666ad9a35075cc9ed9ec09d021580fbb1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/417bd613bdbe791549f7687bb1b9b8012ff111c2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/4fc0d8660e391dcd8dde23c44d702be1f6846c61", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5eb76fb98b3335aa5cca6a7db2e659561c79c32b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/72e445df65a0aa9066c6fe2b8736ba2fcca6dac7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e52e0b92ed31dc62afbda15c243dcee0bb5bb58d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-508xx/CVE-2024-50835.json b/CVE-2024/CVE-2024-508xx/CVE-2024-50835.json index f03f54a570c..cfa086d32f3 100644 --- a/CVE-2024/CVE-2024-508xx/CVE-2024-50835.json +++ b/CVE-2024/CVE-2024-508xx/CVE-2024-50835.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50835", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T17:15:07.090", - "lastModified": "2024-11-15T13:58:08.913", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-15T21:35:17.397", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se encontr\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en /admin/edit_student.php in KASHIPARA E-learning Management System Project 1.0 a trav\u00e9s de los par\u00e1metros cys, un, ln, fn e id." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/m14r41/Writeups/blob/main/CVE/Kashipara/E-learning%20Management%20System%20project/SQL%20Injection%20-%20edit%20student.pdf", diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50983.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50983.json new file mode 100644 index 00000000000..e904980fbe6 --- /dev/null +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50983.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-50983", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-15T22:15:15.907", + "lastModified": "2024-11-15T22:15:15.907", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "FlightPath 7.5 contains a Cross Site Scripting (XSS) vulnerability, which allows authenticated remote attackers with administrative rights to inject arbitrary JavaScript in the web browser of a user by including a malicious payload into the Last Name section in the Create/Edit Faculty/Staff User or Create/Edit Student User sections." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/redhotchilihacker1/CVE-Hunting/blob/master/CVE-2024-50983/README.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/swampopus/flightpath/blob/e713acf9f125af22cc68c2f5664c2869cd73616b/flightpath/CHANGELOG.txt#L4", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51764.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51764.json new file mode 100644 index 00000000000..cc0f9db1a92 --- /dev/null +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51764.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-51764", + "sourceIdentifier": "security-alert@hpe.com", + "published": "2024-11-15T22:15:16.017", + "lastModified": "2024-11-15T22:15:16.017", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A security vulnerability has been identified in HPE Data Management Framework (DMF) Suite (CXFS). Depending on configuration, this vulnerability may lead to local/cluster unauthorized access." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbcr04747en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51765.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51765.json new file mode 100644 index 00000000000..95cc66329da --- /dev/null +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51765.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-51765", + "sourceIdentifier": "security-alert@hpe.com", + "published": "2024-11-15T22:15:16.090", + "lastModified": "2024-11-15T22:15:16.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A security vulnerability has been identified in HPE Cray Data Virtualization Service (DVS). Depending on configuration, this vulnerability may lead to local/cluster unauthorized access." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbcr04748en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-87xx/CVE-2024-8755.json b/CVE-2024/CVE-2024-87xx/CVE-2024-8755.json index 000d91845d4..141a886e9aa 100644 --- a/CVE-2024/CVE-2024-87xx/CVE-2024-8755.json +++ b/CVE-2024/CVE-2024-87xx/CVE-2024-8755.json @@ -2,13 +2,13 @@ "id": "CVE-2024-8755", "sourceIdentifier": "security@progress.com", "published": "2024-10-11T15:15:06.150", - "lastModified": "2024-10-15T12:58:51.050", + "lastModified": "2024-11-15T21:15:11.443", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.This issue affects:\n\n\n\n\n\n?Product \n\n\n\n\n\nAffected Versions \n\n\n\n\n\nLoadMaster \n\n\n\n\n\nFrom 7.2.55.0 to 7.2.60.1 (inclusive) \n\n\n\n\n\n?\u00a0\n\n\n\n\n\nFrom 7.2.49.0 to 7.2.54.12 (inclusive) \n\n\n\n\n\n?\u00a0\n\n\n\n\n\n7.2.48.12 and all prior versions \n\n\n\n\n\n\n\n\nMulti-Tenant Hypervisor \n\n\n\n\n\n7.1.35.12 and all prior versions \n\n\n\n\n\n\n\n\n\n\nECS\n\n\n\n\n\nAll prior versions to 7.2.60.1 (inclusive)" + "value": "Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.This issue affects:\n\n\n\n\n\n\u202fProduct \n\n\n\n\n\nAffected Versions \n\n\n\n\n\nLoadMaster \n\n\n\n\n\nFrom 7.2.55.0 to 7.2.60.1 (inclusive) \n\n\n\n\n\n\u202f\u00a0\n\n\n\n\n\nFrom 7.2.49.0 to 7.2.54.12 (inclusive) \n\n\n\n\n\n\u202f\u00a0\n\n\n\n\n\n7.2.48.12 and all prior versions \n\n\n\n\n\n\n\n\nMulti-Tenant Hypervisor \n\n\n\n\n\n7.1.35.12 and all prior versions \n\n\n\n\n\n\n\n\n\n\nECS\n\n\n\n\n\nAll prior versions to 7.2.60.1 (inclusive)" }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9477.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9477.json index 39a37fde61e..1a25c5ab63e 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9477.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9477.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9477", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-11-13T15:15:09.493", - "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-15T22:54:21.233", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "iletisim@usom.gov.tr", @@ -16,6 +16,10 @@ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AirTies Air4443 Firmware allows Cross-Site Scripting (XSS).This issue affects Air4443 Firmware: through 14102024.\n\n\nNOTE: The vendor was contacted and it was learned that the product classified as End-of-Life and End-of-Support." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o \"Cross-site Scripting\") en AirTies Air4443 Firmware que permite Cross-Site Scripting (XSS). Este problema afecta al firmware Air4443: hasta 14102024. NOTA: Se contact\u00f3 al proveedor y se supo que el producto estaba clasificado como al final de su vida \u00fatil y al final de su soporte." } ], "metrics": { @@ -62,6 +66,28 @@ "baseSeverity": "MEDIUM" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } ] }, "weaknesses": [ @@ -76,10 +102,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:airties:air4443_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "14102024", + "matchCriteriaId": "8482ED96-B625-421B-8EF9-EAA6F7EFBDAC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:airties:air4443:-:*:*:*:*:*:*:*", + "matchCriteriaId": "78D47A7A-A217-47EE-A28C-3C54886BF022" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.usom.gov.tr/bildirim/tr-24-1851", - "source": "iletisim@usom.gov.tr" + "source": "iletisim@usom.gov.tr", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9500.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9500.json new file mode 100644 index 00000000000..0a6d8325e77 --- /dev/null +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9500.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-9500", + "sourceIdentifier": "psirt@autodesk.com", + "published": "2024-11-15T22:15:16.580", + "lastModified": "2024-11-15T22:15:16.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A maliciously crafted DLL file when placed in temporary files and folders that are leveraged by the Autodesk Installer could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to insecure privilege management." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2024-0023", + "source": "psirt@autodesk.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 481359c38f3..049473b68b7 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-15T21:00:20.056961+00:00 +2024-11-15T23:00:19.830276+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-15T20:35:26.383000+00:00 +2024-11-15T22:54:21.233000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,62 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -269994 +270012 ``` ### CVEs added in the last Commit -Recently added CVEs: `32` +Recently added CVEs: `18` -- [CVE-2024-24426](CVE-2024/CVE-2024-244xx/CVE-2024-24426.json) (`2024-11-15T19:15:06.057`) -- [CVE-2024-24431](CVE-2024/CVE-2024-244xx/CVE-2024-24431.json) (`2024-11-15T19:15:06.137`) -- [CVE-2024-24446](CVE-2024/CVE-2024-244xx/CVE-2024-24446.json) (`2024-11-15T19:15:06.220`) -- [CVE-2024-24452](CVE-2024/CVE-2024-244xx/CVE-2024-24452.json) (`2024-11-15T20:15:19.117`) -- [CVE-2024-24453](CVE-2024/CVE-2024-244xx/CVE-2024-24453.json) (`2024-11-15T20:15:19.203`) -- [CVE-2024-24454](CVE-2024/CVE-2024-244xx/CVE-2024-24454.json) (`2024-11-15T20:15:19.300`) -- [CVE-2024-24455](CVE-2024/CVE-2024-244xx/CVE-2024-24455.json) (`2024-11-15T20:15:19.403`) -- [CVE-2024-24457](CVE-2024/CVE-2024-244xx/CVE-2024-24457.json) (`2024-11-15T20:15:19.510`) -- [CVE-2024-24458](CVE-2024/CVE-2024-244xx/CVE-2024-24458.json) (`2024-11-15T20:15:19.610`) -- [CVE-2024-24459](CVE-2024/CVE-2024-244xx/CVE-2024-24459.json) (`2024-11-15T20:15:19.703`) -- [CVE-2024-3334](CVE-2024/CVE-2024-33xx/CVE-2024-3334.json) (`2024-11-15T20:15:19.910`) -- [CVE-2024-41679](CVE-2024/CVE-2024-416xx/CVE-2024-41679.json) (`2024-11-15T19:15:06.527`) -- [CVE-2024-43417](CVE-2024/CVE-2024-434xx/CVE-2024-43417.json) (`2024-11-15T19:15:06.737`) -- [CVE-2024-43418](CVE-2024/CVE-2024-434xx/CVE-2024-43418.json) (`2024-11-15T19:15:06.940`) -- [CVE-2024-44759](CVE-2024/CVE-2024-447xx/CVE-2024-44759.json) (`2024-11-15T20:15:20.163`) -- [CVE-2024-45608](CVE-2024/CVE-2024-456xx/CVE-2024-45608.json) (`2024-11-15T19:15:07.143`) -- [CVE-2024-45609](CVE-2024/CVE-2024-456xx/CVE-2024-45609.json) (`2024-11-15T20:15:20.410`) -- [CVE-2024-45969](CVE-2024/CVE-2024-459xx/CVE-2024-45969.json) (`2024-11-15T19:15:07.413`) -- [CVE-2024-45970](CVE-2024/CVE-2024-459xx/CVE-2024-45970.json) (`2024-11-15T19:15:07.497`) -- [CVE-2024-45971](CVE-2024/CVE-2024-459xx/CVE-2024-45971.json) (`2024-11-15T19:15:07.577`) -- [CVE-2024-49536](CVE-2024/CVE-2024-495xx/CVE-2024-49536.json) (`2024-11-15T20:15:20.683`) -- [CVE-2024-51037](CVE-2024/CVE-2024-510xx/CVE-2024-51037.json) (`2024-11-15T19:15:07.803`) -- [CVE-2024-51141](CVE-2024/CVE-2024-511xx/CVE-2024-51141.json) (`2024-11-15T19:15:07.893`) -- [CVE-2024-51142](CVE-2024/CVE-2024-511xx/CVE-2024-51142.json) (`2024-11-15T19:15:07.980`) -- [CVE-2024-51330](CVE-2024/CVE-2024-513xx/CVE-2024-51330.json) (`2024-11-15T19:15:08.057`) +- [CVE-2017-13309](CVE-2017/CVE-2017-133xx/CVE-2017-13309.json) (`2024-11-15T21:15:05.980`) +- [CVE-2017-13310](CVE-2017/CVE-2017-133xx/CVE-2017-13310.json) (`2024-11-15T22:15:14.177`) +- [CVE-2017-13311](CVE-2017/CVE-2017-133xx/CVE-2017-13311.json) (`2024-11-15T22:15:14.240`) +- [CVE-2017-13312](CVE-2017/CVE-2017-133xx/CVE-2017-13312.json) (`2024-11-15T22:15:14.300`) +- [CVE-2017-13313](CVE-2017/CVE-2017-133xx/CVE-2017-13313.json) (`2024-11-15T22:15:14.373`) +- [CVE-2017-13314](CVE-2017/CVE-2017-133xx/CVE-2017-13314.json) (`2024-11-15T22:15:14.440`) +- [CVE-2024-11217](CVE-2024/CVE-2024-112xx/CVE-2024-11217.json) (`2024-11-15T21:15:06.543`) +- [CVE-2024-11261](CVE-2024/CVE-2024-112xx/CVE-2024-11261.json) (`2024-11-15T22:15:14.970`) +- [CVE-2024-38370](CVE-2024/CVE-2024-383xx/CVE-2024-38370.json) (`2024-11-15T22:15:15.317`) +- [CVE-2024-44758](CVE-2024/CVE-2024-447xx/CVE-2024-44758.json) (`2024-11-15T21:15:09.233`) +- [CVE-2024-45610](CVE-2024/CVE-2024-456xx/CVE-2024-45610.json) (`2024-11-15T21:15:09.370`) +- [CVE-2024-45611](CVE-2024/CVE-2024-456xx/CVE-2024-45611.json) (`2024-11-15T21:15:09.627`) +- [CVE-2024-49060](CVE-2024/CVE-2024-490xx/CVE-2024-49060.json) (`2024-11-15T21:15:10.863`) +- [CVE-2024-49592](CVE-2024/CVE-2024-495xx/CVE-2024-49592.json) (`2024-11-15T21:15:11.070`) +- [CVE-2024-50983](CVE-2024/CVE-2024-509xx/CVE-2024-50983.json) (`2024-11-15T22:15:15.907`) +- [CVE-2024-51764](CVE-2024/CVE-2024-517xx/CVE-2024-51764.json) (`2024-11-15T22:15:16.017`) +- [CVE-2024-51765](CVE-2024/CVE-2024-517xx/CVE-2024-51765.json) (`2024-11-15T22:15:16.090`) +- [CVE-2024-9500](CVE-2024/CVE-2024-95xx/CVE-2024-9500.json) (`2024-11-15T22:15:16.580`) ### CVEs modified in the last Commit -Recently modified CVEs: `40` +Recently modified CVEs: `37` -- [CVE-2024-41206](CVE-2024/CVE-2024-412xx/CVE-2024-41206.json) (`2024-11-15T19:35:08.297`) -- [CVE-2024-41209](CVE-2024/CVE-2024-412xx/CVE-2024-41209.json) (`2024-11-15T19:35:09.147`) -- [CVE-2024-41217](CVE-2024/CVE-2024-412xx/CVE-2024-41217.json) (`2024-11-15T19:35:10.000`) -- [CVE-2024-44760](CVE-2024/CVE-2024-447xx/CVE-2024-44760.json) (`2024-11-15T20:15:20.270`) -- [CVE-2024-45784](CVE-2024/CVE-2024-457xx/CVE-2024-45784.json) (`2024-11-15T20:35:07.697`) -- [CVE-2024-46383](CVE-2024/CVE-2024-463xx/CVE-2024-46383.json) (`2024-11-15T20:35:07.907`) -- [CVE-2024-50145](CVE-2024/CVE-2024-501xx/CVE-2024-50145.json) (`2024-11-15T19:50:44.203`) -- [CVE-2024-50800](CVE-2024/CVE-2024-508xx/CVE-2024-50800.json) (`2024-11-15T19:35:15.183`) -- [CVE-2024-50823](CVE-2024/CVE-2024-508xx/CVE-2024-50823.json) (`2024-11-15T20:35:09.490`) -- [CVE-2024-50824](CVE-2024/CVE-2024-508xx/CVE-2024-50824.json) (`2024-11-15T20:35:10.823`) -- [CVE-2024-50825](CVE-2024/CVE-2024-508xx/CVE-2024-50825.json) (`2024-11-15T20:35:12.167`) -- [CVE-2024-50826](CVE-2024/CVE-2024-508xx/CVE-2024-50826.json) (`2024-11-15T20:35:13.500`) -- [CVE-2024-50827](CVE-2024/CVE-2024-508xx/CVE-2024-50827.json) (`2024-11-15T20:35:14.820`) -- [CVE-2024-50828](CVE-2024/CVE-2024-508xx/CVE-2024-50828.json) (`2024-11-15T20:35:16.143`) -- [CVE-2024-50829](CVE-2024/CVE-2024-508xx/CVE-2024-50829.json) (`2024-11-15T20:35:17.460`) -- [CVE-2024-50830](CVE-2024/CVE-2024-508xx/CVE-2024-50830.json) (`2024-11-15T20:35:18.800`) -- [CVE-2024-50831](CVE-2024/CVE-2024-508xx/CVE-2024-50831.json) (`2024-11-15T20:35:20.133`) -- [CVE-2024-50832](CVE-2024/CVE-2024-508xx/CVE-2024-50832.json) (`2024-11-15T20:35:21.483`) -- [CVE-2024-50833](CVE-2024/CVE-2024-508xx/CVE-2024-50833.json) (`2024-11-15T20:35:22.847`) -- [CVE-2024-50834](CVE-2024/CVE-2024-508xx/CVE-2024-50834.json) (`2024-11-15T20:35:24.163`) -- [CVE-2024-50968](CVE-2024/CVE-2024-509xx/CVE-2024-50968.json) (`2024-11-15T19:55:17.097`) -- [CVE-2024-52522](CVE-2024/CVE-2024-525xx/CVE-2024-52522.json) (`2024-11-15T19:35:18.670`) -- [CVE-2024-9186](CVE-2024/CVE-2024-91xx/CVE-2024-9186.json) (`2024-11-15T20:35:26.383`) -- [CVE-2024-9355](CVE-2024/CVE-2024-93xx/CVE-2024-9355.json) (`2024-11-15T20:15:21.523`) -- [CVE-2024-9529](CVE-2024/CVE-2024-95xx/CVE-2024-9529.json) (`2024-11-15T19:35:19.160`) +- [CVE-2024-23944](CVE-2024/CVE-2024-239xx/CVE-2024-23944.json) (`2024-11-15T21:35:05.263`) +- [CVE-2024-24447](CVE-2024/CVE-2024-244xx/CVE-2024-24447.json) (`2024-11-15T21:35:05.520`) +- [CVE-2024-24450](CVE-2024/CVE-2024-244xx/CVE-2024-24450.json) (`2024-11-15T21:35:06.360`) +- [CVE-2024-24452](CVE-2024/CVE-2024-244xx/CVE-2024-24452.json) (`2024-11-15T21:35:07.200`) +- [CVE-2024-24453](CVE-2024/CVE-2024-244xx/CVE-2024-24453.json) (`2024-11-15T21:35:08.027`) +- [CVE-2024-24454](CVE-2024/CVE-2024-244xx/CVE-2024-24454.json) (`2024-11-15T21:35:08.870`) +- [CVE-2024-24455](CVE-2024/CVE-2024-244xx/CVE-2024-24455.json) (`2024-11-15T21:35:09.713`) +- [CVE-2024-24457](CVE-2024/CVE-2024-244xx/CVE-2024-24457.json) (`2024-11-15T21:35:10.550`) +- [CVE-2024-24458](CVE-2024/CVE-2024-244xx/CVE-2024-24458.json) (`2024-11-15T21:35:11.383`) +- [CVE-2024-24459](CVE-2024/CVE-2024-244xx/CVE-2024-24459.json) (`2024-11-15T21:35:12.210`) +- [CVE-2024-27223](CVE-2024/CVE-2024-272xx/CVE-2024-27223.json) (`2024-11-15T21:35:13.053`) +- [CVE-2024-27789](CVE-2024/CVE-2024-277xx/CVE-2024-27789.json) (`2024-11-15T22:35:08.453`) +- [CVE-2024-29119](CVE-2024/CVE-2024-291xx/CVE-2024-29119.json) (`2024-11-15T22:50:03.257`) +- [CVE-2024-29316](CVE-2024/CVE-2024-293xx/CVE-2024-29316.json) (`2024-11-15T21:35:13.307`) +- [CVE-2024-31337](CVE-2024/CVE-2024-313xx/CVE-2024-31337.json) (`2024-11-15T22:35:09.383`) +- [CVE-2024-34024](CVE-2024/CVE-2024-340xx/CVE-2024-34024.json) (`2024-11-15T21:35:13.637`) +- [CVE-2024-34460](CVE-2024/CVE-2024-344xx/CVE-2024-34460.json) (`2024-11-15T21:35:13.877`) +- [CVE-2024-34729](CVE-2024/CVE-2024-347xx/CVE-2024-34729.json) (`2024-11-15T22:35:09.693`) +- [CVE-2024-34747](CVE-2024/CVE-2024-347xx/CVE-2024-34747.json) (`2024-11-15T22:35:09.927`) +- [CVE-2024-36140](CVE-2024/CVE-2024-361xx/CVE-2024-36140.json) (`2024-11-15T22:53:26.063`) +- [CVE-2024-42680](CVE-2024/CVE-2024-426xx/CVE-2024-42680.json) (`2024-11-15T21:15:07.623`) +- [CVE-2024-50143](CVE-2024/CVE-2024-501xx/CVE-2024-50143.json) (`2024-11-15T22:22:40.397`) +- [CVE-2024-50835](CVE-2024/CVE-2024-508xx/CVE-2024-50835.json) (`2024-11-15T21:35:17.397`) +- [CVE-2024-8755](CVE-2024/CVE-2024-87xx/CVE-2024-8755.json) (`2024-11-15T21:15:11.443`) +- [CVE-2024-9477](CVE-2024/CVE-2024-94xx/CVE-2024-9477.json) (`2024-11-15T22:54:21.233`) ## Download and Usage diff --git a/_state.csv b/_state.csv index fc66a71aebc..661dc3ed64d 100644 --- a/_state.csv +++ b/_state.csv @@ -97055,7 +97055,13 @@ CVE-2017-13304,0,0,bc01bf9619a2ed9e9969de4c65bf442a5fec6030e332a0ad95cf9c9671c48 CVE-2017-13305,0,0,2acce61b5781c64283da81f61da07d2eadea1d7bd22b7b38dbaaa4a20fc64699,2019-10-03T00:03:26.223000 CVE-2017-13306,0,0,423f74da95b3c89ac4494a0b8267dc23743708bc4de0a0cc92f3a3c6e2cdbb52,2019-10-03T00:03:26.223000 CVE-2017-13307,0,0,e83357c9230d3ea5a0100316af468cc9cffb10b590fc6474a2652e4724796965,2019-10-03T00:03:26.223000 +CVE-2017-13309,1,1,2e22442e912c5fb731ed83c3f96ba1a742154503347e7ab20f5d5707587891a4,2024-11-15T21:35:00.833000 CVE-2017-1331,0,0,fbfa6b4058c65afc0dadcb6abf2b300b566ab5bd4820053710fa36c8414eaba4,2017-08-09T12:43:53.857000 +CVE-2017-13310,1,1,033b3b63ed77c79d7314fc6565fc5c81260f38803d345358a3676942601fa56b,2024-11-15T22:15:14.177000 +CVE-2017-13311,1,1,44c0edcb53250bc42089f6ccc93c1af6528c9b857753cba11b459a79ba25c682,2024-11-15T22:15:14.240000 +CVE-2017-13312,1,1,e34a6fa4f383f164b91264bc4bdfb4a4368f6c80074f8a18574b28d7e93a0d8b,2024-11-15T22:15:14.300000 +CVE-2017-13313,1,1,c49dc9ddc0a7110bc63ef52a03d676f2216066756e3b2d280089ba7dc6b8e5d5,2024-11-15T22:15:14.373000 +CVE-2017-13314,1,1,76ea800f4d2ed2a18d3ca10f332fb088665ffa85b184df9396944a5b6c20f3c1,2024-11-15T22:15:14.440000 CVE-2017-1332,0,0,784a9ee8c3796f2a11ff24e95ae95a08508911f60f6ead21d91e6503f5824554,2017-08-03T15:46:39.147000 CVE-2017-1333,0,0,3ec8913dbfad3ccab38e891f6e15f9a0101bb53e4d210c158476cd692803a999,2017-11-16T17:13:42.270000 CVE-2017-1334,0,0,406b3dd86a0e9fb2c9a541dafaa2903ce89044fcfe05700f9700b783b2647a7d,2017-10-10T15:07:22.713000 @@ -172811,8 +172817,8 @@ CVE-2021-27697,0,0,d8ded8bdc52f59c312d3bf74607b3b01908e360dcebb7fc529a36c74b3134 CVE-2021-27698,0,0,a71ff4d002f44401e10c1b1ff211b671c263fe02041820a72f55c49bfa7844a8,2021-04-09T17:58:56.127000 CVE-2021-27700,0,0,df728dd54188563ed8cd3ee40e75b79fdd65a0a46114e1813cdb87a8e42063f0,2024-11-13T17:01:16.850000 CVE-2021-27701,0,0,0cfaf4a9ab35e9f24a43b423a0184d590f4bcf791e191d98fedda77826098f61,2024-11-13T17:01:16.850000 -CVE-2021-27702,0,0,46efb4b17f0b7cf376e80d83971ca54223b2df79d26ad784365d8128d1e2ca13,2024-11-13T17:01:16.850000 -CVE-2021-27703,0,0,95d232c5cf5b38169b612f483aa773fb398f25077a05f6e33f9c4e62d7d0e50b,2024-11-13T17:01:16.850000 +CVE-2021-27702,0,1,0548d60e19988cde8ba8fdcde37222b33338b356d699d9a704ce05570224eb06,2024-11-15T22:35:02.520000 +CVE-2021-27703,0,1,d62ff39918af8c0cb167f5b639fc31ed4219eb530213926a015fce97189ac0a8,2024-11-15T22:35:03.380000 CVE-2021-27704,0,0,7112cca193900f07897e7733aa4595c2de8f409e2bfb65df8b19fdfc732c4062,2024-11-13T17:01:16.850000 CVE-2021-27705,0,0,0fc451b5c83532ba56dddcc5d193e275e54a51b7f6fd8bde6d30a4d168e267fa,2021-04-20T21:43:49.410000 CVE-2021-27706,0,0,350588a83c6c47e1bdcdf8294935f4152b5875d95db621a6ad2d14cc64b3e98f,2021-04-20T21:43:34.577000 @@ -179880,7 +179886,7 @@ CVE-2021-37391,0,0,612092213cbf3c7c8612c0c47f8c525d5a52fd73e735ce6c2b430c9b86b41 CVE-2021-37392,0,0,60b8dbff0c2d792a54d0cec2f57109e745df15412f48a80e1ebca647d9b97654,2021-08-06T16:21:28.697000 CVE-2021-37393,0,0,8aef86848c22832237243030c09554d5c294fe67bf36c767afe9af07ac38cfd0,2021-08-06T16:16:15.627000 CVE-2021-37394,0,0,3bedea4cd8c10cff8545c5ec47bc3c52f53035db41f301c1be09bcbd332575a2,2022-07-12T17:42:04.277000 -CVE-2021-3740,0,1,8b3b4a3b17eafbcc622d74e09a34aeba660ee97147cab5876d5a308e76fa0842,2024-11-15T19:35:02.440000 +CVE-2021-3740,0,0,8b3b4a3b17eafbcc622d74e09a34aeba660ee97147cab5876d5a308e76fa0842,2024-11-15T19:35:02.440000 CVE-2021-37400,0,0,b0d27ef29eb9b33b48de9bc66b3e1c03ad9217ada68e0e9fad53740c5cf9e509,2022-01-07T20:40:19.347000 CVE-2021-37401,0,0,59627adb2bdfa439df8627bb1689eacf7a0bb3291449d63f2dceab9e283ff994,2022-01-07T20:29:50.673000 CVE-2021-37402,0,0,cf2062259da087492fc8edbe731f8aff92da042f2b45087a0d323466afa22b5a,2022-02-10T17:57:02.027000 @@ -180016,7 +180022,7 @@ CVE-2021-37571,0,0,8810bdea1e0d75d03e240d501b5268f30a1e86678a94e1f0084ada248d7d9 CVE-2021-37572,0,0,281c07dfa56f806afe8a253991bfe8f3f11a98fa249cc7aa15d0189bdbefced0,2022-01-06T17:48:54.300000 CVE-2021-37573,0,0,7a62febf8116992b0f2e78d77492937043d09c083776ae7d2f10c207efd03f0c,2021-08-17T12:51:19.657000 CVE-2021-37576,0,0,e34430bb99e453aab32f0d546a7eac30cb7e4a1ba3ddc5e07589a81e633a6e3f,2023-11-07T03:36:58.177000 -CVE-2021-37577,0,0,758592ffe72b54a9258c14b5d6355ad5a6e0dcbc91f9380d094322611f8e9e55,2024-10-04T13:51:25.567000 +CVE-2021-37577,0,1,6d9673d10175da3b562723e50eaaf21f208195d20ace6575eb3efe3c6b982fc7,2024-11-15T21:35:01.120000 CVE-2021-37578,0,0,9c85acc83abe44ac1a15da9480215ac43f11754a5a9615af576198fc0797def1,2021-08-11T14:35:32.113000 CVE-2021-37579,0,0,9b4a5e1e4d0e07566dadc76198aebd7c7b97cb20e6feccf4056e349e554ad702,2021-09-17T15:54:55.787000 CVE-2021-3758,0,0,5a543d76efb308409cc43a5170931244d9fe9c47acf40afa5bdb66fa49ae3d1e,2021-09-10T18:05:03.760000 @@ -187127,7 +187133,7 @@ CVE-2021-47150,0,0,c039c267eea8345920d021434c604afedc5623ca093058c28ca680cbc8aa1 CVE-2021-47151,0,0,1fe3b28ed2c4f851af3156078fb754f319c7960371ca93a8bceeedd12ec853ab,2024-03-25T13:47:14.087000 CVE-2021-47152,0,0,b1587e917360f7774ad2c993fe18c5bf1b14c10323a49c1c67ba3251b6d157db,2024-03-25T13:47:14.087000 CVE-2021-47153,0,0,56cbf1db580541bf210a568c42ec0d8d1585a326c6cb4d7e68f92d9c28512649,2024-11-05T17:35:02.053000 -CVE-2021-47154,0,0,7696bd975b9d5cd0a5ecb9d8c992707b7a3d42cc8932a1cadcc3789a47ae2a4d,2024-03-23T17:15:10.217000 +CVE-2021-47154,0,1,bf01c5a57b84c76af2ae964b238dd0a389f1bbe02106fafbff877dce7353cf4b,2024-11-15T22:35:04.207000 CVE-2021-47155,0,0,6308ec95938d8ffb3e70dc240296486288d07212264c6946580b1860e22fa163,2024-08-29T20:35:04.380000 CVE-2021-47156,0,0,b2f4b6ef5982b832a45226efc32372b1be0aadedffe1e1672fdf4a4a2cbbe76d,2024-03-18T12:38:25.490000 CVE-2021-47157,0,0,ffa912ab59086aaed72ae16afb96bf4cf5c72c4797b59fc955ea9521c3ad905d,2024-03-18T12:38:25.490000 @@ -189364,7 +189370,7 @@ CVE-2022-1876,0,0,983e56cac9f7021f952f9f938d45e035dc9acbf02c1272a86efe4cc4b468e0 CVE-2022-1881,0,0,7439c809094624c8b5fdbf022a11f3d774e6fefc61f4a028f8263bd6fe529332,2022-07-27T18:21:16.887000 CVE-2022-1882,0,0,3baaf779da64335ffad3abdda3c3850b06114d069bb0bf1a437e02c2ffe782b9,2023-11-07T03:42:15.460000 CVE-2022-1883,0,0,10b029e5ce85ce2290987adcb3c5745aea973d33d0d3803bfa3a6beb774a6afd,2022-06-03T14:05:34.297000 -CVE-2022-1884,0,1,23b1205baec96f7e23701a3fb895259c618cca15d9600e947a60e6f8ad9e65b7,2024-11-15T20:35:02.693000 +CVE-2022-1884,0,0,23b1205baec96f7e23701a3fb895259c618cca15d9600e947a60e6f8ad9e65b7,2024-11-15T20:35:02.693000 CVE-2022-1885,0,0,990571f5f58372d06c86739f0d8507a9bf4c77382683b628e53a4fb6b11f2c45,2022-07-06T18:07:38.497000 CVE-2022-1886,0,0,7934fa97f2a8af4a046d7bb9f14babcddc4a4e2348bcdab16ebde94dde55d5a5,2023-11-07T03:42:15.700000 CVE-2022-1887,0,0,c9859a4b8fe51696b2ace2c5b6406cbbf00272360b5c9ea988467e7b99e94416,2022-12-24T04:23:54.613000 @@ -190345,7 +190351,7 @@ CVE-2022-20810,0,0,d465eef9b8b49f6cfb2d6bafb33fa2e371f9e6acad1c0018859266ef98cb7 CVE-2022-20811,0,0,894662974debbe90d9048d04c2e89055d5abb1a4cf1c1d40eeea299833ae5fe9,2023-11-07T03:43:01.097000 CVE-2022-20812,0,0,ab77d59c65b8c3b8fa22769a2502e274cfb97592b7f62e8f7e615979b1069764,2023-11-07T03:43:01.317000 CVE-2022-20813,0,0,41ff039ab407da2aee799c0e1f824d1a5aed4332ff899eff1c4f22e18add2aca,2023-11-07T03:43:01.517000 -CVE-2022-20814,0,0,2a51a8ad0b3a6aea61694eae4c68a3c856708276243d42739a7f8962ab6a8c3c,2024-11-15T16:15:22.670000 +CVE-2022-20814,0,1,4b020eca98f138c140408118b3e94914dfba654ad75c0f917c759c799a7f932b,2024-11-15T22:15:14.747000 CVE-2022-20815,0,0,3b286a33cd412277cd07ecc33c3a88fe24589d1bb8e68df238991b9f13826a97,2023-11-07T03:43:01.693000 CVE-2022-20816,0,0,f11ccbdc893ee80f99212c658d510a9d68a3c1dc64cf17744fc0ba52a820c978,2023-11-07T03:43:01.880000 CVE-2022-20817,0,0,d44f2aa7ff7acf966547c59d8fb64b08a5a1dc81ddb4d70dbf3284d5da7cd837,2023-11-07T03:43:02.067000 @@ -233365,7 +233371,7 @@ CVE-2023-43835,0,0,d8c6ddc2049f074a11aa1d14080d5c6c78f2183d14f440bfa86d65c24d709 CVE-2023-43836,0,0,909aa097fa945ea9081ca912c09938b024bee55c7581cdb4815aa6c6721c51ea,2023-10-04T17:04:16.373000 CVE-2023-43838,0,0,ef0d4d0a77025638e25ac91e467d096c6c184c9c50cf0c660c7d95e7823829db,2023-10-06T16:14:54.457000 CVE-2023-4384,0,0,54db9c5e0e48d365638318efaabdbc065f24cee66ef882641c4e391d0e81b6d5,2024-05-17T02:31:31.327000 -CVE-2023-43842,0,1,969ad9c97c033694c7c5ce6a213f5d596585a2f74b768866e6202653765d58cb,2024-11-15T19:35:03.303000 +CVE-2023-43842,0,0,969ad9c97c033694c7c5ce6a213f5d596585a2f74b768866e6202653765d58cb,2024-11-15T19:35:03.303000 CVE-2023-43843,0,0,aef808c71263ea6153f2eb4b7e45ae7b9a73047abeb8810e9698360185074ff9,2024-05-29T13:02:09.280000 CVE-2023-43844,0,0,060d731423af6f4711e120eb2a59d74f233fa214c9e9f3f730d535056c38b526,2024-08-22T20:35:01.130000 CVE-2023-43845,0,0,d8c84d9afe0ac5a8afc98f0447d8c6711d3b8b032d2ae653c041ead4ab58d994,2024-07-03T01:41:41.020000 @@ -234723,7 +234729,7 @@ CVE-2023-4593,0,0,4991cf119c8ebfc10d48154734bdf0ee9365316ccc7c1b60d5d04e7ab999d2 CVE-2023-45930,0,0,ac3197c84435c7633fa4745f386c7743f353780ba24625d46aefcbc75ec9d4de,2024-01-30T06:15:45.560000 CVE-2023-45931,0,0,1f5bd835283ab289e500417af1c235f343ba52a05df340c733345fabae2eb518,2024-09-04T15:35:13.067000 CVE-2023-45932,0,0,5804986f26a4a7091164de7ac51ad9027240da2e953af7ae7ca5bb7bec6cb357,2024-01-29T09:15:42.593000 -CVE-2023-45935,0,0,a681b11e1b15d64f0feef3bbce8cfc25d06bd82aced7e4d63aa09594ced1e08a,2024-08-02T21:15:47.317000 +CVE-2023-45935,0,1,f6ee20461587d18e0358708786acbde234e71430dcae9955d2c03c48be24878c,2024-11-15T22:35:05.180000 CVE-2023-4594,0,0,24c035b780c77202dedc81f329600980e9f4ebf5e60ff552b7c3ea2fd6139c32,2023-11-29T21:23:22.717000 CVE-2023-4595,0,0,e074cf3112cc40f52c3cb7bd1d68d6206089cc822c0d5f9ca4fee6aa17585812,2023-11-29T21:23:11.087000 CVE-2023-45951,0,0,a0ce1dec3006fcbc682f8af4087e6b6b07ea1f5c8d28deeaa25ad267f3532e34,2023-10-24T20:49:24.337000 @@ -235373,7 +235379,7 @@ CVE-2023-46786,0,0,bf4916e892e13d9bd5f18249e97f7ed4aeb5247f2854f8c308efd96466799 CVE-2023-46787,0,0,eee6ea113b686659f2a66a8e2e38db99b180a9cdd992ed45b258359c2fbbafb0,2023-11-13T18:00:08.857000 CVE-2023-46788,0,0,fa89ddc1e582ea32e59694cd588090422058d73f3e55d49cdf4218b1d27bcb24,2023-11-13T18:00:01.510000 CVE-2023-46789,0,0,9fbdb411cccdb011e81628500fbc3b74a0a6d06d2a8237255e6accafa55442cd,2023-11-13T17:59:42.877000 -CVE-2023-4679,0,1,9696f8639661f4ff600ec910a28b0621ec509409b2c3dcff5c480894998943b2,2024-11-15T20:35:03.507000 +CVE-2023-4679,0,0,9696f8639661f4ff600ec910a28b0621ec509409b2c3dcff5c480894998943b2,2024-11-15T20:35:03.507000 CVE-2023-46790,0,0,7414a678623b3a8d31eda7749ee35a2bdf61169d6ade6fd91b06a5a0e4bffda9,2024-01-02T22:15:08.290000 CVE-2023-46791,0,0,4f7a7ce04b20ee1c59664fc3196bc82b7bf68c16659759baf914252cd593ed28,2024-01-02T22:15:08.367000 CVE-2023-46792,0,0,7e34df21be011e0e859102a1381c46b673dbda14e06d4aaaab00023b1fb66f87,2024-01-02T22:15:08.440000 @@ -242290,7 +242296,7 @@ CVE-2024-0782,0,0,dd227a8b469ce6630eb22142a87d0da772ecdb0285534b1bcdde3ca20e489d CVE-2024-0783,0,0,889b3aec94f8730e9264c4087d63efb1328316b4df2b41f572aa9ab243eedd51,2024-05-17T02:34:58.020000 CVE-2024-0784,0,0,05fccc58af077ffcd0eb7b186f39f412c8126936ae9b879608bee8086b2c9a33,2024-05-17T02:34:58.123000 CVE-2024-0786,0,0,09a89f715683ba83fe81b0a3f3fbdcf9cf5cb4fbf3001ded7457bfdf3b510a57,2024-02-28T14:06:45.783000 -CVE-2024-0787,0,1,da307c985a5d2f7277ca10e0fa3477284443893dbdb87e2624f6bc584ee82d36,2024-11-15T19:35:04.380000 +CVE-2024-0787,0,0,da307c985a5d2f7277ca10e0fa3477284443893dbdb87e2624f6bc584ee82d36,2024-11-15T19:35:04.380000 CVE-2024-0788,0,0,77f61568ad57c437194aa13eed7b7f4a244f0c473b6deae4d7ecf1e9a4375c8f,2024-09-05T23:15:11.527000 CVE-2024-0789,0,0,dd4dfae2cf9c1e14c885c435e4946684b1e28fce4e56958a0b475f730b1ce5ce,2024-06-20T12:44:01.637000 CVE-2024-0790,0,0,faf5037c158d063c7d3783eeaaf8baa8e520d90b8a2f56f0b34167c00c86529b,2024-02-13T19:42:38.757000 @@ -242551,7 +242557,7 @@ CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615a CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000 CVE-2024-10100,0,0,f9d8653b0b809755807a27c91859fa59733e823c9baf33fbd9ba6460baccb9d4,2024-11-04T19:15:05.297000 CVE-2024-10101,0,0,e3896c5d7db68c5b786b00b58edff142c65dff97c0f85c49d64d1701e59c4a4a,2024-11-04T19:15:05.527000 -CVE-2024-10104,0,1,72cf69759458c44313ae635dcdff8a669fdc4ab81a7522ae21a712b6681cb93c,2024-11-15T19:35:04.683000 +CVE-2024-10104,0,0,72cf69759458c44313ae635dcdff8a669fdc4ab81a7522ae21a712b6681cb93c,2024-11-15T19:35:04.683000 CVE-2024-10108,0,0,f3f4ad009417795f18debc95373d890db3250e635fff4006fa4ef1bc9580626c,2024-11-01T12:57:03.417000 CVE-2024-1011,0,0,a83b664837c33e7f0f4cec42868f7bdd93765cacc9e6b97b43804e8b07af65f2,2024-05-17T02:35:09.987000 CVE-2024-10112,0,0,3a01d2baa33f19e143abe5aabe181ccab32faac99effca8d7325142fe7220a64,2024-10-25T12:56:07.750000 @@ -243070,7 +243076,7 @@ CVE-2024-10926,0,0,d4b8448490b176d20ac7d5dd5d9abfb0445d0f8f33211ac22e460a561e976 CVE-2024-10927,0,0,89d2896b297590d0b070dc2d6fc3af12d21eeade74b7d5af5a8c30243a174669,2024-11-08T19:01:25.633000 CVE-2024-10928,0,0,d7b9ae13d8f86fa638d0e1d42acef5c90ca0f7e31aac0a4c1ed2473457ce5298,2024-11-08T19:01:25.633000 CVE-2024-1093,0,0,de7ad9b72d87a55cf339c2dc774b7bea1d33bb68e3b932a439fb6fd6a0ef5b53,2024-03-05T13:41:01.900000 -CVE-2024-10934,1,1,a69e8c368cd0afb57664ae3d4f2c76ada6a2cb886a8cd15572bdb8a5a3aba87d,2024-11-15T20:15:17.620000 +CVE-2024-10934,0,0,a69e8c368cd0afb57664ae3d4f2c76ada6a2cb886a8cd15572bdb8a5a3aba87d,2024-11-15T20:15:17.620000 CVE-2024-1094,0,0,e9e492360318e20689e515fe6138ed3b8630e834f4abf2efeafd987f7e7b2dc6,2024-06-17T12:42:04.623000 CVE-2024-10941,0,0,13c9aa5648736117eddcc05b7c7bbd41bd256da81c39332a1bd9e9e846bf4626,2024-11-08T19:01:25.633000 CVE-2024-10943,0,0,0ccd8432f0f0e1492058026cc01938e6138a4fa1c4553945683b272d10510561,2024-11-13T17:01:58.603000 @@ -243181,7 +243187,7 @@ CVE-2024-11120,0,0,368b83ae5902e34b0c550f99a9e3cbb6abf3210b2f6a699d61899ee63a5aa CVE-2024-11121,0,0,78c7f01d1528f5af7c7c0921f9908f534edd8a79fcf13b8e8ba56ec04209ef7f,2024-11-12T16:15:20.770000 CVE-2024-11122,0,0,8b39eb171f905156949631c8c8e8a5af8e744e4719ba7b47f1a185280518c4e7,2024-11-12T16:15:20.873000 CVE-2024-11123,0,0,2c2c3a47aaef9d48349e1017759c96035abab5e51ba4d62444aa173a7ccd2b65,2024-11-12T16:15:20.990000 -CVE-2024-11124,0,0,efd601a275819de67bd20a9a8d3bf2e3170b2fecab4aaf15486a28875c9a9123,2024-11-12T15:48:59.103000 +CVE-2024-11124,0,1,85986f24f31ee4bef22b7f18f4c9a6da3c56a63086ac6bba2d472201c2da5cfd,2024-11-15T22:47:16.050000 CVE-2024-11125,0,0,122a7b88d4467b2583e8cd046c15116b4ff84a1dc79b401a73643c2cfd3066b9,2024-11-12T15:48:59.103000 CVE-2024-11126,0,0,b967d4c9797ae557d5008a2e89e34b56b8ab089540ce69fba53b421e80e1e708,2024-11-12T15:48:59.103000 CVE-2024-11127,0,0,7d1296cebc7c05fd3dd6b306ae87cbc2c9940166d503543487e9da9414a97cf7,2024-11-15T17:29:43.450000 @@ -243198,7 +243204,7 @@ CVE-2024-1116,0,0,4196b5c71a0d802f4c1e9b3a43ac71c958f929e96b26e1ebb01241c6bd176f CVE-2024-11165,0,0,95fe2b7c203ba5cc9c6e4fb2522e665475ea40e75b68e18a56b9dddf3a00ff2f,2024-11-14T16:35:05.493000 CVE-2024-11168,0,0,5e610ba56b770f0c45b8e5f1da8a18409af80ecc6fd32d397017d56ba5ace8ac,2024-11-13T17:01:16.850000 CVE-2024-1117,0,0,0eff4d8f06fdd3645727772834638be79e19128758cbe94b2a8e7a297167b8d0,2024-05-17T02:35:15.090000 -CVE-2024-11175,0,0,2129c1cdddb364757f82b16fba301982b34bdf0dfeb6c2bb6f48aa85e142eee1,2024-11-13T17:01:16.850000 +CVE-2024-11175,0,1,a70e7384355b41e57dbae42f60548787ddcd5e64369094201d6e3104c030e304,2024-11-15T22:50:48.817000 CVE-2024-1118,0,0,6c399aaded9e96cfac900ecbd30e202d5a6a42d5625667c3de9725b65dc62fc3,2024-02-10T04:13:01.030000 CVE-2024-11182,0,0,2c8b47b53840f1b2967586a65b9fa7c78b80f1c6c1c69d3e7c3505d211f5d54c,2024-11-15T13:58:08.913000 CVE-2024-1119,0,0,5426bc48e63724893c52e881a8535fb7954cf4e6383fc287bdb9896410f7d3a0,2024-03-20T13:00:16.367000 @@ -243215,6 +243221,7 @@ CVE-2024-11212,0,0,d580f98b2d893ad0ca823fed098b3da0e1374898a103c5afa4af95f7221aa CVE-2024-11213,0,0,0c495b874546c97440b3fe42e97782a656e128548583235ee69a0a31261b0052,2024-11-15T13:58:08.913000 CVE-2024-11214,0,0,d39fe330eb8d17269036227b36e62f47bf8007d5207bfeb9d874b55c9f476130,2024-11-15T13:58:08.913000 CVE-2024-11215,0,0,fb8a71cad5204690d7fc24b1c1787d6360fda1c469df5e0270b5ef3894a4902a,2024-11-15T13:58:08.913000 +CVE-2024-11217,1,1,5fc631148be96815ae3dccb931ec54e2a397e3be9cc132b7c1b1194566441529,2024-11-15T21:15:06.543000 CVE-2024-1122,0,0,0daea6a9b881beb2ea9e563443c7905c114cf68ea1093ef9f6fd6cdf2c48aad7,2024-02-15T19:17:26.630000 CVE-2024-1123,0,0,b973e4c54de6f241a32cf221a70e04068421d86df4d000867b2228a54e55ef35,2024-03-11T01:32:39.697000 CVE-2024-11237,0,0,8e8efac9e9fbe063a859c165ee378ecff565ba183a1a030817265309876770b7,2024-11-15T13:58:08.913000 @@ -243233,11 +243240,12 @@ CVE-2024-11248,0,0,05f63ae886ce8e4f4f6c9c95a9d19bf2bcd71685909c7308e46e3edf7854f CVE-2024-1125,0,0,f1d015036f4cdda32f03ba210c93a8838e991a1e1d168cce1bd81d56428097c5,2024-03-11T01:32:39.697000 CVE-2024-11250,0,0,8b0e6334f9dcad2b90092c4673840dfd4d860cb1e6e6f8d5be015dbe688bf885,2024-11-15T18:15:26.280000 CVE-2024-11251,0,0,e3365cd5b35beffead202860ed23ac651fd05ceb4020ebe0e15542749f7995ad,2024-11-15T18:15:26.653000 -CVE-2024-11256,1,1,a200740b98546397555a7010cd472bb40574fc7bd60c8575d49577892414e623,2024-11-15T20:15:17.957000 -CVE-2024-11257,1,1,ec4480984683bf3b8eebcd3579b1969108cf413555e22eb0ff85eb2e036f9f3b,2024-11-15T20:15:18.253000 -CVE-2024-11258,1,1,6e1f232e48a40af52ebee8cbe965f07a9117e4136a41242b3cd57c4adb465599,2024-11-15T20:15:18.523000 -CVE-2024-11259,1,1,26858f27f49adbee1bd63f6e54c6c9a5a54b03d28b7660f6c7e83b128f88a6cc,2024-11-15T20:15:18.797000 +CVE-2024-11256,0,0,a200740b98546397555a7010cd472bb40574fc7bd60c8575d49577892414e623,2024-11-15T20:15:17.957000 +CVE-2024-11257,0,0,ec4480984683bf3b8eebcd3579b1969108cf413555e22eb0ff85eb2e036f9f3b,2024-11-15T20:15:18.253000 +CVE-2024-11258,0,0,6e1f232e48a40af52ebee8cbe965f07a9117e4136a41242b3cd57c4adb465599,2024-11-15T20:15:18.523000 +CVE-2024-11259,0,0,26858f27f49adbee1bd63f6e54c6c9a5a54b03d28b7660f6c7e83b128f88a6cc,2024-11-15T20:15:18.797000 CVE-2024-1126,0,0,719cb9688eaad755b04db0e390abb1a9b0b6a5e25f632a929e6736322faf9c06,2024-03-13T18:16:18.563000 +CVE-2024-11261,1,1,d4990e22cfca44a02294d76909efed0131cd57bb247733c65dc562d3ac47a1b4,2024-11-15T22:15:14.970000 CVE-2024-1127,0,0,fc004f13d69dd65990588f481257d3c8dd60a3804cfac37ac389768e5b88f08c,2024-03-13T18:16:18.563000 CVE-2024-1128,0,0,de5352d9c421a908307277eb7da3f5f6fcfc08a095ea033ab740d4804aa5ccea,2024-02-29T13:49:29.390000 CVE-2024-1129,0,0,bb6d36851ed2d72741a575302302ac57d511f2bf349c6ca7db7385fd53c3529a,2024-02-29T13:49:29.390000 @@ -243347,7 +243355,7 @@ CVE-2024-1236,0,0,9d7e383554119a6eb8995bc3e3c594237fc2517d15212a162d538fac1156aa CVE-2024-1237,0,0,971489c96af173cd98795b7c46411895a847e87f027eb141f5511aec59ad2e5a,2024-03-13T18:16:18.563000 CVE-2024-1238,0,0,9f0a38233429658f32f8a976db71d716904de01ac4f7f996eed98f40cb8ba7b5,2024-04-01T01:12:59.077000 CVE-2024-1239,0,0,db432ab525693f47cc78135d0c2cedd8ee6bd0f1495c321fd41dc0e5a9f890b0,2024-03-17T22:38:29.433000 -CVE-2024-1240,0,1,8ca6c8e77172e1b496219558ece8ecfbf40ada3bc3daf93700232ad7bd3910de,2024-11-15T19:35:06.063000 +CVE-2024-1240,0,0,8ca6c8e77172e1b496219558ece8ecfbf40ada3bc3daf93700232ad7bd3910de,2024-11-15T19:35:06.063000 CVE-2024-1241,0,0,96fd44c6e5fabc6d4bff3dcf2753825594889b1a8245005a991dd6eafde3d621,2024-04-23T12:52:09.397000 CVE-2024-1242,0,0,77f2f4c11df61eb6748d46bb4a1f43701b90877f99a1028521d6b0a2e093dca9,2024-02-29T13:49:29.390000 CVE-2024-1245,0,0,9f0a6683f1d5096645febd5b42c6e25cc14953b1062510f4b421bd46b5a5a4fe,2024-02-15T04:44:27.987000 @@ -243643,7 +243651,7 @@ CVE-2024-1551,0,0,92353a25b78aed9a3875a0acd3ba7810ab4ec982e716be554b468147656f8b CVE-2024-1552,0,0,307682b68873a43cdafe24dafb6eac26e19ab3e38eeb9bd9141f362a83f2be97,2024-03-04T09:15:37.957000 CVE-2024-1553,0,0,d4e69432c11edaf26cb5ecef8a367b24963a2177b8e86262b661ecf0acdfe67c,2024-08-23T20:35:04.453000 CVE-2024-1554,0,0,94cfb6cc07ab1eefb4963abf2ff816e5d8e104e1eff443cecb73eef11729b877,2024-08-20T20:35:08.463000 -CVE-2024-1555,0,0,65f007452d03670d11abd2d0d619aa73a454e482a2468476c6547ed89e323774,2024-02-20T19:50:53.960000 +CVE-2024-1555,0,1,cc827552f53cefe7ea9b6093e830251abcca34d6831cb7d3ee42365f9b714c10,2024-11-15T21:35:03.400000 CVE-2024-1556,0,0,4a94d2fdf889ccc8aa6ea910de12200555f8d40d609519dd619bf98c3de1e735,2024-11-12T20:35:06.360000 CVE-2024-1557,0,0,51db3712932ec01c1eb8b1a021f210ee26b20d61c6eed4eadf04bb01c575f448,2024-08-12T17:35:01.353000 CVE-2024-1558,0,0,5408d260e40f39bd01d36a021872f3676b893d34da45c6b851a3176159106b0a,2024-04-16T13:24:07.103000 @@ -244128,7 +244136,7 @@ CVE-2024-20067,0,0,1f8b2f8c715bdcaed434516377e7c3641986c19edc4e9bc14558e6ec23837 CVE-2024-20068,0,0,679bf43563d4114fa5098e0c9b0aa62c3a9922c68431f8362f508d44bd4491dd,2024-06-03T14:46:24.250000 CVE-2024-20069,0,0,172335f530710667e7919bfa3b2133c1f2b8547ae34d6fb283548afd07a6be8a,2024-08-01T13:46:18.590000 CVE-2024-2007,0,0,a3fe3f3185f5699d68e2f942355bc2ef347eee74a5b1980d4a10ee9977afe62a,2024-05-17T02:37:59.197000 -CVE-2024-20070,0,0,ae885049fd2221a76bca2636832ad5f29da86da3a58d64d82733ecc73da349ae,2024-06-03T14:46:24.250000 +CVE-2024-20070,0,1,9201e3308eeabc9966ad873e04ddda2b0e95eae0c22618376f6162770939f464,2024-11-15T21:35:04.253000 CVE-2024-20071,0,0,88ec01cde687e5e65483ee95a4e6f5c3aa21fc1c2d03ca7ffc17bad8a2c7a3b3,2024-10-29T21:35:03.130000 CVE-2024-20072,0,0,639e86e3d37aa95f3c744b6c3fdbeb01d314bfccd155f1c09f5fa09f8c152367,2024-07-03T01:45:59.183000 CVE-2024-20073,0,0,b92b89689d99337a33ea65b4b166e8cf9f21aa160cfd841da21a2f3df1963e49,2024-07-03T01:45:59.423000 @@ -244965,7 +244973,7 @@ CVE-2024-21084,0,0,3ecf39fd228939a2dce5544ec5b78321dcd296bd51eedb006c227a11eff8a CVE-2024-21085,0,0,35f35fe8bd121dd226d197202c7e8879f1a74507a7dcab9fe69eee683b63b49a,2024-04-26T09:15:11.447000 CVE-2024-21086,0,0,6968d09fe669a4367750ca8567b719597691a3493bb1bcb4d376ae2557ab644a,2024-04-17T12:48:31.863000 CVE-2024-21087,0,0,f22c17e300fd89cdd43bd6bc1adad60f10eeb6246d92b880ac98e54ddab22cbb,2024-04-26T09:15:11.543000 -CVE-2024-21088,0,0,aa00a9c4365758bc939c7b726717079ef8e712539a10e2dbcffa942cabed4aae,2024-04-17T12:48:31.863000 +CVE-2024-21088,0,1,44f4aa7f99d194c57665e971a2800175653d07a9f7c8ab39ede03f04ff22008a,2024-11-15T22:35:06.793000 CVE-2024-21089,0,0,a802903839912e6ccd46d3ae2b8aaec7c725ef400dab1e68c738f51ab05539f2,2024-04-17T12:48:31.863000 CVE-2024-2109,0,0,94fea5557ca85707a8add26a16c9667c38681a6051b37cb4d81c4a444a805fe5,2024-05-02T18:00:37.360000 CVE-2024-21090,0,0,37a9329ca4ea88e58f19a40c712804df6aad8d3af015ccd127f2e694328d8e16,2024-04-17T12:48:31.863000 @@ -245027,7 +245035,7 @@ CVE-2024-21142,0,0,426d1a3f4d5eb091ec704405144203a0f68ebdfbeee6844133217e729852f CVE-2024-21143,0,0,00d3158bf58fdef1b0ea359eb4fd1877d407a38c8141a35ed2d92f7d5fd7ff90,2024-07-17T13:34:20.520000 CVE-2024-21144,0,0,47e09fd5fcc37ec82730b14b6c143601a9e80d79dcae6217efe43cc12a904fd4,2024-09-18T15:15:42.963000 CVE-2024-21145,0,0,0f20eb889de8290fa5c2ea280bb176cf511605c155717bdaded7ab58008b835d,2024-09-20T13:46:53.830000 -CVE-2024-21146,0,0,c75b160e4e3c99880ff62d36e7e801ade0e912daea3b1e5430c44ac99095338a,2024-07-17T13:34:20.520000 +CVE-2024-21146,0,1,7afb077336ce7ba3c6e73dd702aa8036e113fd3088789a47d72ac48f75e1b9ab,2024-11-15T21:35:04.493000 CVE-2024-21147,0,0,d581db22cc70629aa91eb51c988684be29e1ff1430ebd94500067b05edd568f0,2024-08-13T00:49:47.367000 CVE-2024-21148,0,0,5e054bb367a8e9656b43550b5962eaa7f739f26520f7472e3f916549fb13304b,2024-08-28T16:56:18.687000 CVE-2024-21149,0,0,ee2bd3223896d48493ed4bc80a50d18703c1a2b0e21db09049566849fca16635,2024-07-17T13:34:20.520000 @@ -245727,15 +245735,15 @@ CVE-2024-21939,0,0,a5aa41911721c7484fc24860471dbac89d11ee960d3fa252f5bfcdc696021 CVE-2024-2194,0,0,0e5ae4464806cff80b610073b7b679519a42660f4236dd411b709bf3ba1b49c9,2024-03-13T18:15:58.530000 CVE-2024-21945,0,0,b63a5e4db7d9db144e112b73c910ed034b0ba3b12564dd621c287899f5252553,2024-11-13T17:01:58.603000 CVE-2024-21946,0,0,e91350671d7fef838c1e33a6422004e0a45f2bbe81a9a8a8d8f829953040cd7c,2024-11-13T17:01:58.603000 -CVE-2024-21949,0,1,7a1e016e0f4a2eeb2b43069438979f7b8bebbb5dcd51b30c10a30f9b3dced5ee,2024-11-15T19:20:23.167000 +CVE-2024-21949,0,0,7a1e016e0f4a2eeb2b43069438979f7b8bebbb5dcd51b30c10a30f9b3dced5ee,2024-11-15T19:20:23.167000 CVE-2024-2195,0,0,bb0953f36325af10b37984088b8b1459185284ada2095a83a3bbf8eda597a9b0,2024-04-10T19:49:51.183000 CVE-2024-21957,0,0,78b8493cb09e98cba234648f190d1ba13da6601020de42b7e8cebd82789ca669,2024-11-13T17:01:58.603000 CVE-2024-21958,0,0,34cd32e28ea44b16cbdc79985425a463f4005aefdd6dfb509675c47d9ee7258e,2024-11-13T17:01:58.603000 CVE-2024-2196,0,0,8ec133a9075bc1567c504d98dff21f157cca962585a8b4ec57dc32003f56e460,2024-04-10T19:49:51.183000 CVE-2024-2197,0,0,c0f73e1956ff9edc11d589212e34e54996b4c99f318ed5889f3320f37bab4ded,2024-06-05T23:15:33.943000 CVE-2024-21972,0,0,faeb67500b1dc4ef8f1b7649334b23a7c70f07a8990a8b6dfa5400e248a30e42,2024-04-24T13:39:42.883000 -CVE-2024-21974,0,1,e945cdce0481a2236f8c3fc3597c2e09e0fcffcce9462be19907f54901a45889,2024-11-15T19:20:09.980000 -CVE-2024-21975,0,1,3d78cb740262f648775e64b558262f7d13f861a84d692c656d8015e29ef15d89,2024-11-15T19:15:18.770000 +CVE-2024-21974,0,0,e945cdce0481a2236f8c3fc3597c2e09e0fcffcce9462be19907f54901a45889,2024-11-15T19:20:09.980000 +CVE-2024-21975,0,0,3d78cb740262f648775e64b558262f7d13f861a84d692c656d8015e29ef15d89,2024-11-15T19:15:18.770000 CVE-2024-21976,0,0,316a014d75b9b72921e8ef227aeb700f1f1d9634c14a7f67ab46550a5882ed94,2024-11-13T17:01:58.603000 CVE-2024-21978,0,0,bd0ca29172ff67905ab419fb6e0b63fad45bf4b2c53567c94e0d7e696a373aa9,2024-08-06T16:30:24.547000 CVE-2024-21979,0,0,69d970687ec7fc10c2117ffd8a662f03f2976fe858767ebadf9aede1ce3bc7bd,2024-04-24T13:39:42.883000 @@ -245999,7 +246007,7 @@ CVE-2024-22261,0,0,e2aaf47933f2c31b10d9c24b8a02f4ff589724ecabd25b937075f097414a0 CVE-2024-22262,0,0,9be2a689a86ef414fbeac1ac9f909b61f22c440769cce8c765f035b3a2b5a24f,2024-08-27T14:35:01.160000 CVE-2024-22263,0,0,f896fa0a79a81d0e9a59972a76bdb3f38491a193f39dfa7074f7f8bf4c5f9aad,2024-07-03T01:47:11.083000 CVE-2024-22264,0,0,da64849d2957217dbd58b402df143805ad49bce0404b0354f2693ab5943acfc2,2024-05-08T13:15:00.690000 -CVE-2024-22266,0,1,ba5d4bbbae0cc0b22e67f7af5ba1c8ded568aa4a7232e6e81b6925454e8c4b78,2024-11-15T20:35:04.680000 +CVE-2024-22266,0,0,ba5d4bbbae0cc0b22e67f7af5ba1c8ded568aa4a7232e6e81b6925454e8c4b78,2024-11-15T20:35:04.680000 CVE-2024-22267,0,0,0580d7c131aebd95aa25892cd08f876d614d2fb71c023502992bac4873632a6e,2024-05-14T19:18:31.490000 CVE-2024-22268,0,0,823f1c8fe109f7318b4cb5fcaf25c94abb4b72eb405c2d208677e483171c233c,2024-05-14T19:18:31.490000 CVE-2024-22269,0,0,83ec4dd4286041c4360e0d35616ab25a9b861fe9ef36df2e2fc4ebcfa2a6967e,2024-07-03T01:47:12.157000 @@ -246497,7 +246505,7 @@ CVE-2024-23158,0,0,7c083896ae118c56bbbf5e942c8384ee2397bcd81ab6e0a549fde13b2ebb5 CVE-2024-23159,0,0,4caf10c46ce8846c250a24031e5b623ee32b37adaf5a74b6dad704236bf3795e,2024-07-03T01:47:36.637000 CVE-2024-2316,0,0,b886d554fbb39a8ab156ebbf04afa7dff2abe542e80901fe75a178728a777e10,2024-05-17T02:38:09.927000 CVE-2024-23168,0,0,6aa4882ac31311673d7105c255a4a4ab30277fc82315f262184f5cb226bf109c,2024-08-19T13:00:23.117000 -CVE-2024-23169,1,1,86d9a411adfc5d5e78823636989ccd9b5f9a1a73ce3bad11071cb87abb452677,2024-11-15T19:35:06.473000 +CVE-2024-23169,0,0,86d9a411adfc5d5e78823636989ccd9b5f9a1a73ce3bad11071cb87abb452677,2024-11-15T19:35:06.473000 CVE-2024-2317,0,0,8e30ab648286b0ea978301e5a5beda2d9abdf16065d34269cbb1824bfad23955,2024-05-17T02:38:10.027000 CVE-2024-23170,0,0,2d2c8288a6a12ddbc7a1710ba6e09b64e14fe785fb79b86b20a944c1ecfef869,2024-02-22T03:15:08.297000 CVE-2024-23171,0,0,f88bf803a0c4fbc4509407858b9247c6d4fbb766b717bcd811063458329b2ee7,2024-01-18T20:23:45.707000 @@ -247179,7 +247187,7 @@ CVE-2024-23938,0,0,f385512c9562a4125bf289d5854e0bf2cf71005be1d8a25303883b7e487b4 CVE-2024-2394,0,0,601af7bb68f57fdb63dc28b1a3be4e92facb0bb452d0b42ad5d6937b933c3deb,2024-05-17T02:38:12.620000 CVE-2024-23940,0,0,1c0bdede0fd3b02e7f9ad21f2aa27ec6ae45825d094730a07bddf507f926c4e8,2024-02-06T19:19:33.920000 CVE-2024-23941,0,0,9709bab66e0af4d3dc69e9a86a5316f0273a5a15f2aac5ab4098dcbc1f12f8f7,2024-02-06T21:37:12.433000 -CVE-2024-23944,0,0,a4577755ac8434d8001d5ca099627598af1709502b9a95ee3ffe1e5567b9fd5a,2024-05-01T17:15:29.330000 +CVE-2024-23944,0,1,059e0b3fa4f34735124e9cd8e76659f9f5aec58c1074fc08d9eb22ca6d411d27,2024-11-15T21:35:05.263000 CVE-2024-23946,0,0,84148e01db02d3b2895434dc823c0ae9f7d68159bffc3661e20f6a50ad8f107a,2024-08-13T19:35:04.530000 CVE-2024-23947,0,0,1b43998aed29857dd1e4a92954078f6f47907ebb41136612d597b54ebf732265,2024-06-10T17:16:19.513000 CVE-2024-23948,0,0,857b34d23def74a8136935341de0e448f0c93f2f46757187ac91997dca4cdefd,2024-06-10T17:16:19.623000 @@ -247402,23 +247410,23 @@ CVE-2024-24407,0,0,544874ccd7bf190605b1eed09e8dcc374c7eae5526ea68f4038bca85f79c4 CVE-2024-24409,0,0,dd8ff08f29b98b9528fdb2ee83855d6758a702d939ff7172a903f50f6071724d,2024-11-13T20:35:44.963000 CVE-2024-2441,0,0,748a7ac4d6ed599dc743b338d434f4fac66b4e81d9dc4afe98a976de37bf668f,2024-05-14T16:13:02.773000 CVE-2024-2442,0,0,da6587851d777a7caecc3fd36ba9b67242261a5b34dedee058c0f959b1280fc4,2024-03-20T13:00:16.367000 -CVE-2024-24425,1,1,b79517c27ddfb3c4c52c5ca4ea61f362c75eacb33ebe01e56666d4d2fb194390,2024-11-15T19:15:05.927000 -CVE-2024-24426,1,1,5f954247619c9506a09635317daea1739d1f7955f5146ab2cb8f96063ec13093,2024-11-15T19:15:06.057000 +CVE-2024-24425,0,0,b79517c27ddfb3c4c52c5ca4ea61f362c75eacb33ebe01e56666d4d2fb194390,2024-11-15T19:15:05.927000 +CVE-2024-24426,0,0,5f954247619c9506a09635317daea1739d1f7955f5146ab2cb8f96063ec13093,2024-11-15T19:15:06.057000 CVE-2024-2443,0,0,a8bbe87eac8a41399b1d0d3a72e714355872c34062df72f2bddd7214646f509e,2024-03-21T12:58:51.093000 -CVE-2024-24431,1,1,33c3bed5d3c5dd2cfbf9ccc66ea2d21c879c3bd4ff0a62e3b54ee65f0375a267,2024-11-15T19:15:06.137000 +CVE-2024-24431,0,0,33c3bed5d3c5dd2cfbf9ccc66ea2d21c879c3bd4ff0a62e3b54ee65f0375a267,2024-11-15T19:15:06.137000 CVE-2024-2444,0,0,4077967648b87af230c120a80abe8a1c3709647ab561500ac246716e12815b1b,2024-08-08T21:35:09.480000 -CVE-2024-24446,1,1,56ab657fc72d4fff5cf76366c6733408e4b9f7a136a9f7dfa1a5f6f154ba8704,2024-11-15T19:15:06.220000 -CVE-2024-24447,0,1,8e2b35c0302f9d4d60d9917365a16d9eff4c2735718c048ac7918628919ecfe4,2024-11-15T19:15:06.300000 +CVE-2024-24446,0,0,56ab657fc72d4fff5cf76366c6733408e4b9f7a136a9f7dfa1a5f6f154ba8704,2024-11-15T19:15:06.220000 +CVE-2024-24447,0,1,bed5865bf9df39f19158b1764a9e5edb678bc0fe4341cd3f77db348a92e140c1,2024-11-15T21:35:05.520000 CVE-2024-24449,0,0,c1cedd05172c4efc6df6d5d561bf0d004bf06abec1c0e01707406c0e914ff17f,2024-11-15T18:15:27.013000 CVE-2024-2445,0,0,4580fbdabeda1a44cff89d119283db83c12561dfbbac9584647c19bac102f840,2024-03-15T12:53:06.423000 -CVE-2024-24450,0,0,d81358a2964522ca6fb1f5769ded6178556fe128fbb0360faf4057187f926cee,2024-11-15T18:15:27.097000 -CVE-2024-24452,1,1,8749f1ad3b3cb4d795e5c071dc9bd32faac40c18bd66d2458c40a7095b496a77,2024-11-15T20:15:19.117000 -CVE-2024-24453,1,1,24f0ebc7d78581d8b7566ef03cb25c8b74cc06948cdc22bbb0cc27d1db0a6f4a,2024-11-15T20:15:19.203000 -CVE-2024-24454,1,1,9e157c0d329fa6dd1449b5e442f3b03a00acee32395385dacdea93db2dbb0f01,2024-11-15T20:15:19.300000 -CVE-2024-24455,1,1,29b3568718e4bc3714bb83d1ebb5e476a89cf1a3b53b2cdab55205543762428c,2024-11-15T20:15:19.403000 -CVE-2024-24457,1,1,0dc96b056ebdf9d01297b93b486a810c7f0e9bdc97154ceb0f306813644c2ea5,2024-11-15T20:15:19.510000 -CVE-2024-24458,1,1,4bd90cf66a02ca88f73d811cf897690fc256903dadedd406e6d07ce6d5f07fad,2024-11-15T20:15:19.610000 -CVE-2024-24459,1,1,0c36050982164d4e472771d0b15d29a88006773fb00f22ee03305a8a6157737f,2024-11-15T20:15:19.703000 +CVE-2024-24450,0,1,6a0b7b5ded00a8277fb325c1ecc37cd7ec612b58b513eed9797faafbeb200188,2024-11-15T21:35:06.360000 +CVE-2024-24452,0,1,f554e44a498c2268e0d196c5da5a7fb8302b221c9b89212e7c8e96e50d4e9b19,2024-11-15T21:35:07.200000 +CVE-2024-24453,0,1,405c556fbf8ff483c12e07c7fba52c38ab8a10d1e07527abda70d703786bad4b,2024-11-15T21:35:08.027000 +CVE-2024-24454,0,1,f85db7d99e3be955f6d96a83bd1e7a20170f3336fd080420781742869359006f,2024-11-15T21:35:08.870000 +CVE-2024-24455,0,1,410a255356df7aff732df54be2049904da6422e8e99f1ad0db89a5197543ac98,2024-11-15T21:35:09.713000 +CVE-2024-24457,0,1,578ce80f141b484680b203c3b49ce9adcd1af314734d32a4aa6eb0cc6063b37f,2024-11-15T21:35:10.550000 +CVE-2024-24458,0,1,7abaea1d736032318a78e812634f5db8f94df4be5ba869e92e4c42f608e5ee24,2024-11-15T21:35:11.383000 +CVE-2024-24459,0,1,899a825774254570132f41a8ac87ea2b2a4bc87f29bb72beb342d6064c62a294,2024-11-15T21:35:12.210000 CVE-2024-2446,0,0,ef51f957632ec98e360c50fa0db196c0f3cfe0183f1093005f40b796022ec810,2024-03-15T12:53:06.423000 CVE-2024-24468,0,0,bbac026196c9a5e8ca29f54a8d36ba3e229b24779335db2752c28502233c74ac,2024-02-07T22:03:09.897000 CVE-2024-24469,0,0,118364649006ddd6dd7a0282a82463969addbea3b241460c52f60a3b25b50f38,2024-08-26T19:35:10.113000 @@ -248892,7 +248900,7 @@ CVE-2024-26542,0,0,0552587f0d89665ed80dc12bb31e4bf79576fc07cfb6b7e3f69abcad15ec0 CVE-2024-26548,0,0,f455c865dc4374a0a4a4244e6b92be3619bcb05c42ae31697deaf30a36afaa44,2024-08-29T20:36:27.060000 CVE-2024-2655,0,0,1c645dd82a6d9fee39650c96a2d44383dd06975f6c270faedebb8baf614d4d6e,2024-04-10T13:23:38.787000 CVE-2024-26557,0,0,bce4bb7db30c44200534fa645c4e21a32632f06526ac89541f2afa8ce855d2c7,2024-03-22T12:45:36.130000 -CVE-2024-26559,0,1,b80332e133a33e46dec2587fae160cff8e9c8df6cb62f84da7f87724dbea40ae,2024-11-15T20:35:05.457000 +CVE-2024-26559,0,0,b80332e133a33e46dec2587fae160cff8e9c8df6cb62f84da7f87724dbea40ae,2024-11-15T20:35:05.457000 CVE-2024-2656,0,0,1e1bbc88c0161a3acb0637c745cf054774e0c8a58563824f7d11f0999806993d,2024-04-08T18:49:25.863000 CVE-2024-26566,0,0,178f5f9908b56a8ca7b57493a287d425d6858d98fae12d3e88663a8ab0cf6ac4,2024-08-06T14:35:06.510000 CVE-2024-2657,0,0,8d1ff58c39beea61aea6c79faeb579bd293dbee684695e94ca7134a1a41bac4a,2024-05-30T13:15:41.297000 @@ -249593,7 +249601,7 @@ CVE-2024-2722,0,0,3d547fbfae7104f0dbf6c0b76ddd02751536ed8c09a63381f891ff8e3f28de CVE-2024-27220,0,0,9e42cc406e1b16ddffbd424b62b76586911d68db1ef5ee823133d22916298517,2024-08-26T16:35:06.173000 CVE-2024-27221,0,0,0b9e9b937a1b9e138bd27417c292991204813b235d6b5129744f85ce4729872d,2024-08-27T21:35:16.047000 CVE-2024-27222,0,0,628d34a7a6bc07d71cb2e1c85581ef034de82cd46a15b7c424080a08ed0a02c0,2024-08-05T18:35:10.287000 -CVE-2024-27223,0,0,cf3a2ced12b4a3bf155534028aaccdd6d95cd0b4d2f10d3ca759d3a4dee62fdb,2024-03-12T12:40:13.500000 +CVE-2024-27223,0,1,fc9cd51cab8f4da67c2e7794cf7ee5a6f1936f992a7ebb2975acb9d55a9e0abb,2024-11-15T21:35:13.053000 CVE-2024-27224,0,0,a3ab635f09865455059477937ba40dabd5c75c049ca5d090f69e7a764213aabe,2024-08-01T13:48:20.053000 CVE-2024-27225,0,0,4066fc479d85e41bfc3a21ed1b56d094f7f8c2b2d6dbe050f5934705a2ae1195,2024-11-07T16:35:14.340000 CVE-2024-27226,0,0,09f15816885dbcfaf6362ca8e72640a49144f9653a0b3d4a746337108ce37a78,2024-08-27T15:35:10.130000 @@ -249980,7 +249988,7 @@ CVE-2024-27782,0,0,b22db7f85f1aa9710b9bbc1ac7360fcfc87b306ba5e47cbd2f266d8f05fbb CVE-2024-27783,0,0,30c00b0a58e52d130c4519322a2dc809ea017917d02feb4cfd023720071e6d70,2024-08-16T14:46:15.517000 CVE-2024-27784,0,0,9a431b6f577bcf9e8b5d1ea28d4205b9a51e63d8903285008583e39957f810a6,2024-09-09T16:16:47.253000 CVE-2024-27785,0,0,5aa2b1c34aa7772827060ffd1a09838ce85384459c438e6ee4f5946ddb57800f,2024-09-09T16:18:45.420000 -CVE-2024-27789,0,0,625befd347e45b8c24d91157af1e5aad171ebd7a087cfb5156bc4e61ad373596,2024-06-10T19:15:53.183000 +CVE-2024-27789,0,1,9e11896276314d268b6495530a30a9a370b410415ff7a8865f6d2d728d6cb4ac,2024-11-15T22:35:08.453000 CVE-2024-2779,0,0,2aa54c375187eea63fa6c956db70ce31dec68ec2b409a2e5d246e26b34790090,2024-05-17T02:38:30.057000 CVE-2024-27790,0,0,1b39da6789d4ef1f12b3b596beb188b9a11f1e783662eb312c24bcef2ae1da98,2024-07-03T01:50:47.493000 CVE-2024-27791,0,0,09b0597ca715a1f6ef86184b931742440fb3c3b5a01efc19b59894d859d878db,2024-07-03T01:50:48.290000 @@ -250957,7 +250965,7 @@ CVE-2024-29115,0,0,b12a9dbf612250a49df2e6948fc40b23d35ff13f6aa9d2beedd64c49a8ed8 CVE-2024-29116,0,0,d85dc6ae194d83c2dbd05b4e1cc8c25eaf9e91cd72cd7e6ae549c7eb131b7c33,2024-03-19T16:33:58.680000 CVE-2024-29117,0,0,7cbc86fd47b57aac5bdcb66853eac01c2823bf8c332ca79b8820d49cc7cba209,2024-03-19T16:33:58.680000 CVE-2024-29118,0,0,1cf920921a96fd5f0eb418dbd890604a04de50213d4066e1f2401f217f180df5,2024-03-19T16:33:58.680000 -CVE-2024-29119,0,0,738a7b7e804b6feffc33f998d5fbd83a1b05ef16b9a6d435f583f42a46ae6f6c,2024-11-12T13:55:21.227000 +CVE-2024-29119,0,1,0811f092679734deba80b812c98d1850ac3db34b4730f32fa57515f8c5fb65e2,2024-11-15T22:50:03.257000 CVE-2024-2912,0,0,f62836a8afe15e49afc11abef746f6e05f5ae0f68099e584fae53277c8c9f769,2024-05-22T16:15:09.713000 CVE-2024-29120,0,0,7f41b964c09ac8aa95a0035e77a220dee0c782999c30c100c6ecb39548161767,2024-11-14T17:35:05.343000 CVE-2024-29121,0,0,6325c10b522d77de76e2af8d35d0ad7dde2dffd7703677e5c3f9cd67ab864731,2024-03-19T16:33:58.680000 @@ -251101,7 +251109,7 @@ CVE-2024-29302,0,0,d9abe707740065eb1e46de0ca659947f36c93421f8110011a7bf9bee8bf0d CVE-2024-29303,0,0,37679fb63bf9f38f4f9cc53651a73974a7164616369c7f1ab3afdb3ecf05cb90,2024-08-07T21:35:03.913000 CVE-2024-29309,0,0,5f16c8c5101bbe6a7fe340fed41cfd483ccf194ab5d9cef153ac339623cd5967,2024-08-13T18:35:02.870000 CVE-2024-2931,0,0,8681da4e6a98287d6793458554ab4ea24f94bf4e8afb9a8ac5d31dc0735ec9f9,2024-04-02T12:50:42.233000 -CVE-2024-29316,0,0,bf79b73f40391754999830b90ca9fb7610ead48f76025066f6bbfd69a2114a92,2024-03-29T12:45:02.937000 +CVE-2024-29316,0,1,2f3c817c4f7c559ff4b0013399f8b474c64af5ae7bcfa59ae6059ebc1e3cf72b,2024-11-15T21:35:13.307000 CVE-2024-29318,0,0,3bd80ca4ed2a21d168ac76c12fc53877e0cf37b2c12f34546ddefc9f9e0a12f8,2024-07-08T16:39:39.810000 CVE-2024-29319,0,0,bbb0862aea68d5a01a34ecc5b39e1d6e8c1c3d81ce4dfc0412f430759d0ae56e,2024-07-09T16:22:26.077000 CVE-2024-2932,0,0,44a8d61038c752584673290a44e85a0e6ddb987cff5ca0c208afdec0eff4bd59,2024-05-17T02:38:37.813000 @@ -252235,7 +252243,7 @@ CVE-2024-30868,0,0,40572fc00d47dcab0a02e3b982268eb31daa0424a9f9ba994981729836c30 CVE-2024-3087,0,0,69d2e87c7c87bdc5c6a0aa1788aa50fe5b44316fc88ba1cd34f51a4a48534d4f,2024-05-17T02:39:42.787000 CVE-2024-30870,0,0,30e1e140bee6b30095d3a05cd84fe8f82c3aa6e140f2eb4d0b7d811e3ca16636,2024-08-16T19:35:10.750000 CVE-2024-30871,0,0,a922b83af83720bdaf0bdaf6a8fbbd91cfae311a46841e866add85841910b19e,2024-08-19T17:35:14.410000 -CVE-2024-30872,0,1,64734544ccb6f849f8e6b7c181bf35d2a96e6186e2801de85b4c087395773bf4,2024-11-15T20:35:06.470000 +CVE-2024-30872,0,0,64734544ccb6f849f8e6b7c181bf35d2a96e6186e2801de85b4c087395773bf4,2024-11-15T20:35:06.470000 CVE-2024-30875,0,0,1cda1f7e96707733b42fb351c9353bb46bc4382d5324d37a18f42fe89fb4a47a,2024-10-25T16:15:09.693000 CVE-2024-30878,0,0,21b1e9cb6e80d2eff229006b5f8418d6d6360e70820dbf7044b36f5f56cc5c12,2024-07-09T16:22:30.387000 CVE-2024-30879,0,0,93839d92eafd1cfae5881afc220b2fbe0e3f01fdcdacee7a1692cd18e78fca03,2024-10-27T03:35:03.670000 @@ -252593,7 +252601,7 @@ CVE-2024-31333,0,0,fffa52c47c5b8e1c2bcdc9fe3c080f43dd069e7ef7813f142892cae434fbd CVE-2024-31334,0,0,69828e729ce39e0f18173fda19e01cf9f4d39333d7345a58dacf94a302bbacd6,2024-07-11T15:05:41.960000 CVE-2024-31335,0,0,3a5c3c43b9344b158e79d76d5bd0e2d36d3e7822b50bec9afc211045c26c9812,2024-08-01T13:50:52.347000 CVE-2024-31336,0,0,e16f98988b82130b2e32557c399f0ea25778a1838eb9ccce21afc0b2ed5c5a95,2024-09-13T01:15:01.980000 -CVE-2024-31337,0,0,211cc0c863ee5c8d748051b42330bf23dfc862367b588e297bbc4c9eb5d837ca,2024-11-15T14:00:09.720000 +CVE-2024-31337,0,1,07dff38ce8dc544e656ac7c3f496be50a62b48a2297f04b9f73097a5633a3e04,2024-11-15T22:35:09.383000 CVE-2024-31339,0,0,cd4c96aade7176a5aa7427f1e13d7eb03c1e703de2eb92c3c6c97472cece1e5c,2024-07-12T16:11:34.910000 CVE-2024-3134,0,0,29c3b545a5da0a472480af2af3f9f3acedbe4b841a8f6f121606a369bcd8fa7c,2024-05-17T18:36:05.263000 CVE-2024-31340,0,0,69d2a170836208f6faad46a647a02e1d14f5dbc15c6da296b85bfb3a229fe567,2024-07-03T01:54:45.633000 @@ -254031,7 +254039,7 @@ CVE-2024-33332,0,0,d4616ec3d8fa6c2d14a3b8584e4c2b0a6bdaf97d03584623852ed717f43b9 CVE-2024-33335,0,0,a6cf66b4ab082555dd66294d501cc06d5dc2570dbd2ca86fdaeca4a73e9bd728,2024-07-03T01:57:53.270000 CVE-2024-33338,0,0,dc64e17746d1abab607747c6889c78b7b366c3abba84bde17473f7cc02765f3e,2024-11-06T22:35:06.803000 CVE-2024-33339,0,0,1bca262a290e7823541ac5c56ca607cb8f0a9af8877c53f0a0d3e60cf0f91403,2024-04-29T05:15:06.340000 -CVE-2024-3334,1,1,690229517d403dc25b1c35a49447814b209ca70fdd0de341b8228c12814872aa,2024-11-15T20:15:19.910000 +CVE-2024-3334,0,0,690229517d403dc25b1c35a49447814b209ca70fdd0de341b8228c12814872aa,2024-11-15T20:15:19.910000 CVE-2024-33342,0,0,060ace50da8b3f05ba7f67da31443071368333e101cc3fb61992e65c8481798b,2024-07-03T01:57:54.047000 CVE-2024-33343,0,0,0403ccc83281b5ef39242fa2607cb174a7fbc97f1fc5833b8133765daf81f98a,2024-07-03T01:57:54.823000 CVE-2024-33344,0,0,d3440b7441a8ba175b025336c345037d972b6caba49539eb2fcd5ae07cc7e54c,2024-07-03T01:57:55.620000 @@ -254536,7 +254544,7 @@ CVE-2024-34020,0,0,c4663f98778b76c33582b9d015039d06540b400c550bf7c9ee3e5b98d9ff4 CVE-2024-34021,0,0,ba9a52b25c7a77dfa7bf1a07f5ab53755e56e707c7456547716a3d28e95401ca,2024-08-01T14:35:09.920000 CVE-2024-34022,0,0,7b23e7a4942e184fec33b1bffa07086984aca57ed7d3dd370cec1e2a245271cf,2024-11-15T14:00:09.720000 CVE-2024-34023,0,0,4dad96a4b3405ff5975c0f7d1a940e81b4b229c6fe69b1b44167ee14d10f47a5,2024-11-15T14:00:09.720000 -CVE-2024-34024,0,0,0a0d832c0db4d58a70ccecce54b6344b3f181daaf3ed5285ed66313a40334a22,2024-06-20T12:44:01.637000 +CVE-2024-34024,0,1,436ff185980fb4887f6e90c4484ac03d00d9d240594d2b927342762d05845604,2024-11-15T21:35:13.637000 CVE-2024-34025,0,0,edd2792f368696b38d90328f1c1ccaaade65bc2e70f896834331ba779fb27dd0,2024-05-16T13:03:05.353000 CVE-2024-34026,0,0,d23e70be79ae55b32e18d5911869778bf5369290a7a856aaf669d9f9bc7f7d52,2024-09-26T20:52:39.357000 CVE-2024-34027,0,0,665288561aa105eb3ace1a2e821548dcc73a2a65b6f5aec99c3e8227e5375b1e,2024-11-05T15:35:13.297000 @@ -254868,7 +254876,7 @@ CVE-2024-34457,0,0,488e2de12358ba7ac2ecaef904903ac7bcb5c8ffea8ebfc53fe2dd66e2b38 CVE-2024-34458,0,0,ad9c57980a1196e03a7ff89c7cbce14805d2491f6af55e1053911cc733df4207,2024-08-21T13:31:38.380000 CVE-2024-34459,0,0,fa787ae7a4c8630112bbb06f81f3133274e5fdd9f7332b290019503934d44271,2024-08-22T18:35:08.623000 CVE-2024-3446,0,0,5ac77fa1865633043064ab1ffaeb59fe80c825b06632f0aec7d1674c1a671484,2024-09-25T01:15:40.827000 -CVE-2024-34460,0,0,441531d0808bd0543a3084d408b6b9ab77342b046b0f375a6d08c1971aedd3c7,2024-05-06T12:44:56.377000 +CVE-2024-34460,0,1,6353926884b168ea665b411f9a89e1bb0d0f21b5142b7a6d521425ffbbf4237a,2024-11-15T21:35:13.877000 CVE-2024-34461,0,0,cc374f56fc002b0ab8a1c4c41f3103778880e140f4d0402c66d5feb164fd7550,2024-07-03T02:00:09.560000 CVE-2024-34462,0,0,8a88747aa45fa0ff08468c03145b77f14c23a2c5a801117a3645ac9e35ca3df3,2024-07-03T02:00:09.780000 CVE-2024-34463,0,0,93e0b7a3eff8acce578e44f45931c5eaf5e6d1df4cebdc938c3a054fad258881,2024-09-03T15:12:16.467000 @@ -255117,7 +255125,7 @@ CVE-2024-34724,0,0,913fd057cda1c7d4c484876a49aa72529e900891c98a4a2d61e29b59d9444 CVE-2024-34725,0,0,71c51510eb6c519ede5c0bd5b935ecb821799239014d1b6c0035512d0bff6cbf,2024-08-01T13:52:25.887000 CVE-2024-34726,0,0,148667699b7fd62da52cb8a62c1c3c6fd756ca900c40298f1823e1d94f76998b,2024-07-11T15:05:45.340000 CVE-2024-34727,0,0,75befb2ba24a3b4b3047b7cd5fae93e6c869e1a4a8df4db9070d6b118a79dd7b,2024-09-11T12:43:45.260000 -CVE-2024-34729,0,0,54de913c260765be67c48041f77073710a2847abf55ca4fe236c2bf5de701ec8,2024-11-15T14:00:09.720000 +CVE-2024-34729,0,1,14522fc749ee1e0b788fbc2d96cfaff68d5620759da5fe76e950ab7e180eea45,2024-11-15T22:35:09.693000 CVE-2024-3473,0,0,174ffd5ba26767424b634a780ad377f8ae33849c44036babd665d0b98ce27738,2024-05-02T18:00:37.360000 CVE-2024-34731,0,0,c2796903b18972c85283f94e39f216adab1245ab24ab7429de75a096f2bef3ba,2024-08-19T13:00:23.117000 CVE-2024-34734,0,0,03ca469f8cd315011dd153921c263a875a2212423b28ba9a9477308f69d8631d,2024-10-24T20:35:05.433000 @@ -255130,7 +255138,7 @@ CVE-2024-34740,0,0,cd68171e55105c9a184cdc72c371579137a9ca2bcc91416cae3d7556d14ec CVE-2024-34741,0,0,92c683bbe77a7f293c2037090a232d821770d81c7905215e3ef6319cf6b5adba,2024-08-19T13:00:23.117000 CVE-2024-34742,0,0,ae7622882d0f2f3d011507be8bcb7493359b0ef6aaca92f56d7280395d35123c,2024-08-19T13:00:23.117000 CVE-2024-34743,0,0,9a08509f1ceb4bbb716866bb59161611c0588d77430a21c15b6c1621568bccf5,2024-08-19T20:35:16.253000 -CVE-2024-34747,0,0,2d28e87671e44808335b186af8072869a96462e808f2184392e92b73bb99c621,2024-11-15T14:00:09.720000 +CVE-2024-34747,0,1,54274e9091b3a0011b2ff0803398b57f8823e3a645921a5eb6d9ebe2e1bb8c96,2024-11-15T22:35:09.927000 CVE-2024-34749,0,0,048a4718a6adf63bcc95dd588dc6297f930a23113bd2619e190eb8b7852c3de9,2024-08-02T03:15:45.390000 CVE-2024-3475,0,0,3d68cde343ddcb97ac984b733d2ae7662c97a24c514b9a563c1c306f42f1759f,2024-05-02T13:27:25.103000 CVE-2024-34750,0,0,c670e390c383fbaa0e17449b121645c068a83500fff53e2ba8ec3633bed5a922,2024-07-09T16:22:37.120000 @@ -256154,7 +256162,7 @@ CVE-2024-36136,0,0,5d95909c13f0d8392324a7365478397dba5326ae554d2812281ea77aabac6 CVE-2024-36137,0,0,9438d2b71ef73887d75e6f454e33b7f397670092254d4a5da60582748cb22f74,2024-09-09T13:03:38.303000 CVE-2024-36138,0,0,e6354c672dea5a9efe6496da7c00037de66d6aa6e785f55fccdeccb25bc2c9b3,2024-09-09T18:35:09.367000 CVE-2024-3614,0,0,7d52e3588cbb3715dc858d110e11a928859b665db7d4d54abdbcae84467ecd9e,2024-05-17T02:40:01.707000 -CVE-2024-36140,0,0,339aa114c9b4ee85084777ff864435ce00ae50f8bdcd2f9c6e4c47ffb9909a55,2024-11-12T13:55:21.227000 +CVE-2024-36140,0,1,7bda1bcadac079ac13abda54cbaf16d9f22ad0e82ddd82e6b230bd54b41d2d6f,2024-11-15T22:53:26.063000 CVE-2024-36141,0,0,18db6c112ccc0d71f5b13b30aecab0a5f2370100cf994f0af07b87507f970796,2024-06-14T20:02:18.553000 CVE-2024-36142,0,0,6ae7dd3b3d84d3e60ab36df1a1df499d7a9063449a2d0a679757a0e6ad8f4e57,2024-06-14T20:00:46.803000 CVE-2024-36143,0,0,b9ffa4a4b0c08b2c09cabc08087789a8d9178358a74a11dff2dc25f2bba0c28f,2024-06-14T19:58:25.220000 @@ -257807,6 +257815,7 @@ CVE-2024-38367,0,0,ef3b5309f2c711755f4bc1341d871d57dcb340a68f69961e0160dca4bb6dc CVE-2024-38368,0,0,2f8143f8d00d367476eddebe8b3c5595b38d7c9548f03fa31bf0b2530474a056,2024-09-18T15:23:00.507000 CVE-2024-38369,0,0,8244568cb54133bd4b7c000807714a4126c5f985c9bed4f8d225a3d939b43204,2024-06-26T14:47:05.077000 CVE-2024-3837,0,0,83b07e73fbcd3bdc07d74ecd9200ace8bc3f655fb5ef786e0fb5447a3f989592,2024-07-03T02:06:37.303000 +CVE-2024-38370,1,1,2a7739a42ac119a79a6d88cdf8eaf101f5e8cf352457db3797f21dc353940baf,2024-11-15T22:15:15.317000 CVE-2024-38371,0,0,89525bd0cac36f8169b7c7660aac33ce1fe77dbe859f180f5d0a019c34cd3913,2024-07-01T12:37:24.220000 CVE-2024-38372,0,0,3d54cf49c69f5dcfca10b8ed801434d5b29c7aa6896635c0f913f2cd2b718834,2024-07-09T18:19:14.047000 CVE-2024-38373,0,0,871cf732e8d89daf91760031051bd3f20f88f5dad720fab8628df5921c7be18f,2024-06-26T15:02:05.100000 @@ -259185,7 +259194,7 @@ CVE-2024-40568,0,0,4e89eb42d593339b238d1e440516cb2ccd3f5095fd163b21c19673544e39a CVE-2024-4057,0,0,26b46aa52b04f4ef8890033772544e5e99ad730f84e9e0e97b479cd36cf89ace,2024-07-03T02:07:02.197000 CVE-2024-40575,0,0,267280fd6d1dce9620611aeb1f0d6276db3825fa55e9f5e7fc538f4804a7f026,2024-07-25T17:35:28.913000 CVE-2024-40576,0,0,8423823b913f3d1284aae2224b689bfefe0b7a1b018e49f904fd4948fdba6a99,2024-08-01T13:57:51.520000 -CVE-2024-40579,0,1,aed9bb41ab6e2fc5580c188aa250efad7de1629e44af77f0fe07dd2ceedf19f8,2024-11-15T19:35:07.323000 +CVE-2024-40579,0,0,aed9bb41ab6e2fc5580c188aa250efad7de1629e44af77f0fe07dd2ceedf19f8,2024-11-15T19:35:07.323000 CVE-2024-4058,0,0,517dff31dd649a4fc97ec9b0700bafce6dc3cd3c4729ffb175a77bfe0097ad6e,2024-08-01T13:59:23.240000 CVE-2024-4059,0,0,c49986e07be30ca2c850f4613369c1702dff21e7018832f61c83284c95e0cc00,2024-05-03T03:16:29.430000 CVE-2024-40592,0,0,5acfdff926c4ce1e8230567e18f89491dd35f3a5c402aaf623c0641f88ae3656,2024-11-14T20:37:06.040000 @@ -259696,10 +259705,10 @@ CVE-2024-41184,0,0,460d3d6d07916ac0f7c6ce162599c802c196ea0f25bca5ddf54b8e8b24963 CVE-2024-4119,0,0,1787463dab796293e9249fc34f7a40843b12d1d129a7d5ccdb513e5ec2672067,2024-06-04T19:20:30.247000 CVE-2024-4120,0,0,820754c86895fc4e7f3a6d10baae3c2abd537610acf37474f492c12f46cc8b59,2024-06-04T19:20:30.353000 CVE-2024-41200,0,0,c6634d5ee9208991d605965f74d59d477ce80a275c83b2ac8c83f9990bd5e19e,2024-11-05T22:35:06.980000 -CVE-2024-41206,0,1,6b34d8a4f8eb0ca37fbc5fec97e1cd8e6aaa772dfa42cec6df805a0418b292a0,2024-11-15T19:35:08.297000 -CVE-2024-41209,0,1,e65fe1f95013b4d1e68f077c50e8d961a21bc688ccc61972b6f988d0a65e2962,2024-11-15T19:35:09.147000 +CVE-2024-41206,0,0,6b34d8a4f8eb0ca37fbc5fec97e1cd8e6aaa772dfa42cec6df805a0418b292a0,2024-11-15T19:35:08.297000 +CVE-2024-41209,0,0,e65fe1f95013b4d1e68f077c50e8d961a21bc688ccc61972b6f988d0a65e2962,2024-11-15T19:35:09.147000 CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd920,2024-06-04T19:20:30.460000 -CVE-2024-41217,0,1,0c2636112e03d934d0d09fb45bc31eafc821e0c0c1c75ddfbecef08bccd71d27,2024-11-15T19:35:10 +CVE-2024-41217,0,0,0c2636112e03d934d0d09fb45bc31eafc821e0c0c1c75ddfbecef08bccd71d27,2024-11-15T19:35:10 CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd281,2024-06-04T19:20:30.560000 CVE-2024-41226,0,0,a3a85fa64d0c123f261294a19d764a3608a61e848957876669f922adbd8d3b3c,2024-09-03T21:15:15.923000 CVE-2024-41228,0,0,f3d365bd2199687dcff5eebde6177461134036d09c1cc3d7eb6b2cb72c0f76b0,2024-09-26T13:32:55.343000 @@ -259924,7 +259933,7 @@ CVE-2024-41675,0,0,99d7bb404b6db7a620ac267d34a06ef7dcdda9c80bdd1ecb6c741290a9b47 CVE-2024-41676,0,0,f8c727903895dd3f774fa8fafadf4d13b194d23bd32750d21228bccd7e3862a1,2024-08-23T13:44:42.487000 CVE-2024-41677,0,0,350177b79949244cfbc185c5f18aee412a8902a49d36a53e1d4b50536f1effd5,2024-08-12T18:51:29.497000 CVE-2024-41678,0,0,43bfd773fe0f389d4d2972065648cf80c04ab4504b31ed9b2e85f880173045d0,2024-11-15T18:15:27.720000 -CVE-2024-41679,1,1,30895d98a21b1efa39db3dfa62b7834f7f6581bb6d111c2b0d0989f68a696495,2024-11-15T19:15:06.527000 +CVE-2024-41679,0,0,30895d98a21b1efa39db3dfa62b7834f7f6581bb6d111c2b0d0989f68a696495,2024-11-15T19:15:06.527000 CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000 CVE-2024-41681,0,0,6dfdc16b96a5715c67e93e3b8e76db2de56f823b305a3ba2f49e1e9df8ebee6d,2024-08-14T18:37:06.540000 CVE-2024-41682,0,0,b98500d64915be62a0e5e2d6d50336319231d8c45c711d39d83e7568c61fc3c7,2024-08-14T18:37:24.413000 @@ -260706,7 +260715,7 @@ CVE-2024-42677,0,0,b97ab4f5686d6ff46f6aa7f7f9b4e7a78fadb921b4c0ab7041661656c5221 CVE-2024-42678,0,0,ce8a3f135d4f809369d6b75de9ff99127513c0db10a407cdd20ba786f1f3cdc9,2024-08-19T16:06:36.343000 CVE-2024-42679,0,0,e76aaa5887122d6232dc83073fc758cc42de2802e94141ff1ce4fac272e935d1,2024-09-06T17:35:14.393000 CVE-2024-4268,0,0,ed1b7008ff1a2549bc2f685279352d3a8f5b6d435592b2f29fd10fa9328ca71d,2024-07-02T18:08:17.817000 -CVE-2024-42680,0,0,b168ab4cd2e2150be7aaf36c84a318add99cf48e6e7026b9bd7262bb9f167200,2024-08-21T11:06:00.887000 +CVE-2024-42680,0,1,58693ad444a0076e8c2aed38637b138ca0db4c28c3b5f77c2b2ce98f6959fbaa,2024-11-15T21:15:07.623000 CVE-2024-42681,0,0,38014007bcc5735791461b793967c4dfbe475531f64d8682f14c63500277a9d8,2024-08-19T19:35:08.437000 CVE-2024-4269,0,0,3a0e07c5dbf72b66f7c37e018ba2f8991c2e2b5c26c8f2d595b33767cdbe4e7e,2024-08-01T13:59:29.737000 CVE-2024-42697,0,0,3f30501ddd948bd3dd87aa7e992970f54de2da95f223a929b6ab6b98833e0327,2024-09-26T13:32:55.343000 @@ -261201,8 +261210,8 @@ CVE-2024-43412,0,0,d8be950c692563feabe854c0542abee7aa58fa64820fe9c692a8fb330f15b CVE-2024-43413,0,0,8e6331055eff0a1fc21c13ac1aa5a910957effe87064f315927a5ac8c4d9163f,2024-09-12T20:18:46.097000 CVE-2024-43414,0,0,41d126c00be1a75ca1d7b9b05a3a92eaf49a5d7831c24ad21608856181f8c11a,2024-09-12T21:33:40.887000 CVE-2024-43415,0,0,33623038bce272467978985c7d034b7fd7d9931154f17ac64d12541af9ed8ac3,2024-11-13T19:15:08.580000 -CVE-2024-43417,1,1,aab5248f5a199e96281de3e8ba633e068cfce50aefda0254830d2ebd2d16b55a,2024-11-15T19:15:06.737000 -CVE-2024-43418,1,1,d2ce1fef34767053b97958e7039ef8b665cb5d80cc119d4e7b551ab12a87e9e7,2024-11-15T19:15:06.940000 +CVE-2024-43417,0,0,aab5248f5a199e96281de3e8ba633e068cfce50aefda0254830d2ebd2d16b55a,2024-11-15T19:15:06.737000 +CVE-2024-43418,0,0,d2ce1fef34767053b97958e7039ef8b665cb5d80cc119d4e7b551ab12a87e9e7,2024-11-15T19:15:06.940000 CVE-2024-4342,0,0,2403af0b003f5953a3d2a1b74bf46d64f4a354bc628b01d2ea5f60de4a4002c6,2024-06-03T14:46:24.250000 CVE-2024-43423,0,0,8fb21f51e563dd938c763581007e890cf5873a7efc6a39a36e929ea32ce34c0c,2024-10-01T15:41:32.537000 CVE-2024-43424,0,0,6d9ffac7d6eb9e50db381baa418d84f2f5d9932ec78b86526bf799eb43b3b4f3,2024-11-05T19:39:33.873000 @@ -262074,8 +262083,9 @@ CVE-2024-44739,0,0,48da2c283a8d53275b8fef0ca13127577bd8ad3471472700794962cf357a3 CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000 CVE-2024-44744,0,0,83942cbf0bc52b807dc374447d58331fdab7ca8540cec1aa4efb11011d74c6f7,2024-10-04T20:15:07.203000 CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000 -CVE-2024-44759,1,1,b9649314fac826d03abe6e58586192745a7059e4a9b66144d374bc1358b57b39,2024-11-15T20:15:20.163000 -CVE-2024-44760,0,1,c31c484463dbcf8debf14f8cb14c4edde2aeacb7ab3b47695b1fc32577e35939,2024-11-15T20:15:20.270000 +CVE-2024-44758,1,1,7e2c17fda7d66e4b4978ca78609d630df3e55b53cc04e7d8a3dc3130a137179f,2024-11-15T21:15:09.233000 +CVE-2024-44759,0,0,b9649314fac826d03abe6e58586192745a7059e4a9b66144d374bc1358b57b39,2024-11-15T20:15:20.163000 +CVE-2024-44760,0,0,c31c484463dbcf8debf14f8cb14c4edde2aeacb7ab3b47695b1fc32577e35939,2024-11-15T20:15:20.270000 CVE-2024-44761,0,0,2cb43df04a70791b0f0fb8982142da3403b663e9582e8c16ce12d7edd85714da,2024-08-30T16:00:30.557000 CVE-2024-44762,0,0,a4d9c40079155e25bc23610bf9eb4b9c915e9b457539684228b809ce3110b930,2024-10-18T12:53:04.627000 CVE-2024-44765,0,0,f49b0ddc47e501e666f4838593930e2064ad96de66f6bc89ed89c1395c14c839,2024-11-12T13:56:54.483000 @@ -262649,9 +262659,11 @@ CVE-2024-45604,0,0,8bf71581fc88ef149abd090a70890b5121cb8944654700250436e6871eed9 CVE-2024-45605,0,0,e2dcbd09111d51f02ed3dc28b06a6dfe1b2afb4b9e6f7d6992823c9eafceb7dc,2024-09-26T19:14:00.873000 CVE-2024-45606,0,0,74770cd60bba1a7e3534716f76d2f24e8f6b5a1c9090e259fc4bcbaa501443fe,2024-09-26T19:16:40.720000 CVE-2024-45607,0,0,9d199e13e4c36b979d30a8467667e188e65d4bf0165b27173d5a6e5dc2ce7529,2024-09-19T02:05:28.707000 -CVE-2024-45608,1,1,c692f8fe9893c192cd58fed893ade100507eb59a60353ebf14c7e4fa543e922f,2024-11-15T19:15:07.143000 -CVE-2024-45609,1,1,913b06e92e0c1bf11238525050a178ea0bed3b00bbfc86a83c4e6b38e2106c69,2024-11-15T20:15:20.410000 +CVE-2024-45608,0,0,c692f8fe9893c192cd58fed893ade100507eb59a60353ebf14c7e4fa543e922f,2024-11-15T19:15:07.143000 +CVE-2024-45609,0,0,913b06e92e0c1bf11238525050a178ea0bed3b00bbfc86a83c4e6b38e2106c69,2024-11-15T20:15:20.410000 CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000 +CVE-2024-45610,1,1,6fa74d30bf44c88ef160552ca204c3506802904d40f18cb2d33379537a28eee5,2024-11-15T21:15:09.370000 +CVE-2024-45611,1,1,40f7dbcdb95fcfd8fbd7bda741b3dbab96ad29839dea3a7571ea3c53c1327236,2024-11-15T21:15:09.627000 CVE-2024-45612,0,0,3e30286b1d723ddfef1522eda155227a0e1e8c66d0b8dce0d9a777734913d222,2024-09-23T19:33:04.650000 CVE-2024-45613,0,0,a2ff9b099297ab22455347765d4960198846769603bf11c2b22cdb95078fe454,2024-10-01T22:15:02.757000 CVE-2024-45614,0,0,ac4b7afda4571cd40367f25e5fa4ed4a95b6d96da3864aae950ca5538b1c5a35,2024-09-26T13:28:30.537000 @@ -262732,7 +262744,7 @@ CVE-2024-45771,0,0,754a0f27219aa2eb6179ec627ac31099e8e2882043a643cfa7921ddb03dbb CVE-2024-45772,0,0,d4fcff511ac9c702d11d2981d4f53f578a5b533222a07c5c21d8a62a8451fded,2024-10-04T13:20:58.327000 CVE-2024-45773,0,0,fa80a32ca25578799d772108a6e7f2b87164fbdfd3820c41dab7e96e6c83084e,2024-09-30T12:45:57.823000 CVE-2024-4578,0,0,de2bf1ab8b65cf8119579f63d8e64a9383c9519828d1fae8ddac21d6dcb5605a,2024-06-27T19:25:12.067000 -CVE-2024-45784,0,1,c50448792ca0bc70dc69110c69f0c1eaf6da89dad203eb3fb8490186b0e8b380,2024-11-15T20:35:07.697000 +CVE-2024-45784,0,0,c50448792ca0bc70dc69110c69f0c1eaf6da89dad203eb3fb8490186b0e8b380,2024-11-15T20:35:07.697000 CVE-2024-45785,0,0,edaf655206685301bfa1d23b3961ca90e190821a2f1da23140bfad50572d7731,2024-11-06T17:08:40.507000 CVE-2024-45786,0,0,1027a4a71b54e4ed926e7c4d82608ed7bf7290e7e8486a1ac94d8f7e4edfad02,2024-09-18T20:12:47.337000 CVE-2024-45787,0,0,46f8564066b3f70e712610c0aca9059d9bda6862d53c941af56b2ef72737a51d,2024-09-18T18:15:07.650000 @@ -262843,10 +262855,10 @@ CVE-2024-45962,0,0,410a38ff5223f4d49bf1514b127efbec05a242aa992c767afa2b00b3754e2 CVE-2024-45964,0,0,115c652e0870ab8284554895b46caa73ee13878a3a483a4a0704cf316ae20802,2024-10-04T13:50:43.727000 CVE-2024-45965,0,0,337eabe224912cc2b0cbadda62428cffb8300aa00cac2bea6d6188e8e9c18de6,2024-10-04T13:50:43.727000 CVE-2024-45967,0,0,6af6fb1bf8abc96b89a897208a34deb6484f333cf92fc60514a52d4661f8c7cf,2024-10-04T13:51:25.567000 -CVE-2024-45969,1,1,d865bf352dd17e303fb9cb7a0bf07aadd1a1c5fdd539ecf844c17fe8c81603a1,2024-11-15T19:35:11.467000 +CVE-2024-45969,0,0,d865bf352dd17e303fb9cb7a0bf07aadd1a1c5fdd539ecf844c17fe8c81603a1,2024-11-15T19:35:11.467000 CVE-2024-4597,0,0,098adbd2826136caa11e67cd45a2f45f6208425bc1c84711667f353f70d7a203,2024-05-14T16:11:39.510000 -CVE-2024-45970,1,1,df7bd90d0fd5d50e5abf391b1c572883ac9aee4953d26d7824e97b7aa4817c2c,2024-11-15T19:35:12.330000 -CVE-2024-45971,1,1,69ce485500e35d7ddd1ef9e0591aaf47d71dcb0b3ac7cf4897f01bbc1f5a00cd,2024-11-15T19:35:13.180000 +CVE-2024-45970,0,0,df7bd90d0fd5d50e5abf391b1c572883ac9aee4953d26d7824e97b7aa4817c2c,2024-11-15T19:35:12.330000 +CVE-2024-45971,0,0,69ce485500e35d7ddd1ef9e0591aaf47d71dcb0b3ac7cf4897f01bbc1f5a00cd,2024-11-15T19:35:13.180000 CVE-2024-45979,0,0,0482757b935fe16e8666637b8de38f7a7ad511da9e453512eb3d62b894d1236e,2024-09-30T12:46:20.237000 CVE-2024-45980,0,0,ded57935070da9b29c36c9f95713cf4ac252f503e27a31ee2114452772d0590b,2024-09-30T12:46:20.237000 CVE-2024-45981,0,0,ee65d3def52ce7ec5d6bf2c7e86cdebd6e620d115c275dfbcce303dfb9c98da4,2024-09-30T12:46:20.237000 @@ -262964,7 +262976,7 @@ CVE-2024-46376,0,0,f3c4758540f2ac7c03838f8eccd3f67c9d25fd080cb7169c664824c92406d CVE-2024-46377,0,0,dbd66064786bd129c8f0daf0f8e37ec51d021bf976974fef51557cd63106242d,2024-09-20T12:30:17.483000 CVE-2024-4638,0,0,fdd077899626129e208d16f53a9a5482358eca01d91f2895388a2a3863f13467,2024-09-24T17:13:43.997000 CVE-2024-46382,0,0,65cd8f8715b62b5a7598d3b8d6186f6e2f4b087b931ac8f129c8f64b10f1fd55,2024-09-25T16:56:09.927000 -CVE-2024-46383,0,1,c940113eb54c83050ae731934a303ca798964bc8736d5ca21108a0c20ba8f2b7,2024-11-15T20:35:07.907000 +CVE-2024-46383,0,0,c940113eb54c83050ae731934a303ca798964bc8736d5ca21108a0c20ba8f2b7,2024-11-15T20:35:07.907000 CVE-2024-4639,0,0,f02b5c58ae5a71f4f7afea4e263ab89427639817f2fb26164569232dacb74959,2024-10-10T10:39:06.410000 CVE-2024-46394,0,0,2516725e4bff704e46174a8f5632e7834a8075c579df9c6725759cf5ecdadeb1,2024-09-25T16:55:15.023000 CVE-2024-4640,0,0,561eb45560c6a2512cf49113a4a8a4e86a4cf3daabba823a155e6305f710bfc9,2024-09-18T15:48:43.557000 @@ -264560,6 +264572,7 @@ CVE-2024-49050,0,0,7f9392ea1a4bf88203fb43021b2368620daa51f821e70681a840b2ee1bd81 CVE-2024-49051,0,0,44f6ae7bff81d5005b198cc105e28816f70e74649012bdd37fd7f8773db7d846,2024-11-13T17:01:58.603000 CVE-2024-49056,0,0,45909acaf00cd3c64a19d5557ee0abf98abf49c50825d0cd6a263c45cc01e6bc,2024-11-13T17:01:58.603000 CVE-2024-4906,0,0,dcabb97348a8cb55b860a9e76b2d4e839fce25f207d8f1f73aadb53eff678110,2024-06-04T19:20:52.587000 +CVE-2024-49060,1,1,5a5b232a1362125286d642f24f655ac6dd933be96fcda8497cc4edb155d570c1,2024-11-15T21:15:10.863000 CVE-2024-4907,0,0,89cf000cbe1b65b5529bee88595d69713864cb4ca68c5cee750a10d4257b63ad,2024-06-07T20:15:12.077000 CVE-2024-4908,0,0,3762060553f2912238245a2ee2164293eb895a92d4f73c18aef2dad30449d1a2,2024-06-04T19:20:52.687000 CVE-2024-4909,0,0,ea0d933b3d2cd5595c3fbbee43ad0bc8cc6b1745afbc1d0aa36c8f7e8ca72f46,2024-06-04T19:20:52.787000 @@ -264792,7 +264805,7 @@ CVE-2024-49525,0,0,28a277ab9b52157a5e4549773b7a8750a6dbb7b4cb916799fff07dd0ec631 CVE-2024-49526,0,0,0871004c04b2341eb737b8d4e5693e458bc7c8461095a71ec5604d2d8a7a3e4f,2024-11-13T17:01:58.603000 CVE-2024-49527,0,0,90add3f65b96eee1f0b9fbf01f92dfd0e4ee77a768256f110d47e754c67f09f0,2024-11-13T17:01:58.603000 CVE-2024-49528,0,0,0e21c50648494dddb2e6f81fb4539064ca26c5177933d85140437daf91d91144,2024-11-13T17:01:58.603000 -CVE-2024-49536,1,1,b5bebd3e76ccc8dd27494c774698ac2911e07900ef9d359439a343734b2455b2,2024-11-15T20:15:20.683000 +CVE-2024-49536,0,0,b5bebd3e76ccc8dd27494c774698ac2911e07900ef9d359439a343734b2455b2,2024-11-15T20:15:20.683000 CVE-2024-49557,0,0,d5723680a20b941e0b929edc2959b845b0ec9b5d07125e59e1942c5e8991b90e,2024-11-15T17:36:47.110000 CVE-2024-49558,0,0,3c676b75de26a8476d548ed8b3e232d51677ecb4a62749082177600c22312603,2024-11-15T17:35:54.480000 CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000 @@ -264802,6 +264815,7 @@ CVE-2024-49579,0,0,0f0dd66a3db0fe299ae55b9b0e6c22f11c400dc3ee27d05103041b63e67e9 CVE-2024-4958,0,0,15591ba73d7708bbd560fadc0281274b5c7c2c12545797826fbf6e13e1222639,2024-06-03T14:46:24.250000 CVE-2024-49580,0,0,89085af96d96dbfcdc87aa1d40157bd1a1b8615e2e8f40b207dbbe916ae159de,2024-11-14T19:25:47.433000 CVE-2024-4959,0,0,862ee7700763d202e5d5dada80050e48cca3b83d56a63673f2017bcf5adb7503,2024-07-03T02:08:22.750000 +CVE-2024-49592,1,1,8d58881505aa5166b2d4228f1caec6539241e0d475e52eaca08116f92b39e272,2024-11-15T21:15:11.070000 CVE-2024-49593,0,0,28b8568333d09b89b040a623f287dcf302e51d7008368ee150b7fde946577e54,2024-10-18T12:53:04.627000 CVE-2024-4960,0,0,1e2962fabc78c9680506fb58bfd339ee733c096965130a77b4df6d334c6fc642,2024-08-01T21:15:53.753000 CVE-2024-49604,0,0,4130a6c1f975a0d07098374dd7fb4ff2ab97718728858633e395173b92657205,2024-10-23T15:49:25.567000 @@ -265246,9 +265260,9 @@ CVE-2024-5014,0,0,a159cfb950f4667dfac650da1dbd95c7b0726154dc655b46619c19dd5e035f CVE-2024-50140,0,0,eb0746926c420cc8d2090f5fca10ae981e81997ac8c1fdaad448b32c59f370bd,2024-11-08T19:01:03.880000 CVE-2024-50141,0,0,bae62305714eb5ec8c5bfe94e53b566f82f69bfdc7c3c2d2860ceb7d14e4fe27,2024-11-08T19:01:03.880000 CVE-2024-50142,0,0,081683ea498aec7e08e36c9792d1a986b4879eebc92b8bac2d87cfe2d81863a5,2024-11-08T19:01:03.880000 -CVE-2024-50143,0,0,225aa5dbc7963c527a87a475fd315c4d6cf88e38af436bff7f3a96ea656c9f8e,2024-11-08T19:01:03.880000 +CVE-2024-50143,0,1,7a8465c6c5e86219699475e0aac212071d8c08e38a0e388ea4ee3b273c23e38c,2024-11-15T22:22:40.397000 CVE-2024-50144,0,0,c55b4e7f7af67f90eda178a9ba2fa4c47d80901810b77811a8c947ce6e8532ea,2024-11-08T19:01:03.880000 -CVE-2024-50145,0,1,9aaca4c4bd27c56de1138e3b927e1f83dfbefe24220661e4c64f210cd7f4f3cf,2024-11-15T19:50:44.203000 +CVE-2024-50145,0,0,9aaca4c4bd27c56de1138e3b927e1f83dfbefe24220661e4c64f210cd7f4f3cf,2024-11-15T19:50:44.203000 CVE-2024-50146,0,0,021f17a71355e9c7da1a3fa872cce66adf431c69a2c8d8e36098a29d09e838bb,2024-11-08T19:01:03.880000 CVE-2024-50147,0,0,43ce628689773c231ddef91126d37c67bb5709ecfbe9aae9414366a036ef0103,2024-11-08T19:01:03.880000 CVE-2024-50148,0,0,7f0c6446839199adc93c3b0f21555587f022bb17548db4f7897fc0fadf3c850a,2024-11-08T19:01:03.880000 @@ -265631,7 +265645,7 @@ CVE-2024-50766,0,0,af3ada3641e5f900c68c3d98d58b715ce7a7d6da5b4d545f2ac59e163c2e3 CVE-2024-5077,0,0,58d61679dec16d0807ee3c6d8f70abda23dd3b8ef542c3a47286601f3d544039,2024-08-01T13:59:40.333000 CVE-2024-5079,0,0,03cab751fae6538cdd3ee0f9a467090b1b9dca8ded972c9a24812d90a2b62ab7,2024-08-01T13:59:40.517000 CVE-2024-5080,0,0,88ae00b43e12b64ab9ecc2d4c4ea1fe4d89b86d4c131aa05e4a989c5a4e3b207,2024-08-01T13:59:40.707000 -CVE-2024-50800,0,1,ab830a43039dc3b7687658827fe30858d8d98c5f738791670612919030dff069,2024-11-15T19:35:15.183000 +CVE-2024-50800,0,0,ab830a43039dc3b7687658827fe30858d8d98c5f738791670612919030dff069,2024-11-15T19:35:15.183000 CVE-2024-50801,0,0,b02fd2a4d914f47ebf18861bef14a429b26208dd8058232ee786f89bcea879c0,2024-11-04T19:35:13.810000 CVE-2024-50802,0,0,8492f5be24f5ad2918f47970062e4bc2c1c3f432ad972af1d330cb18adac5b2e,2024-11-04T19:35:14.907000 CVE-2024-50808,0,0,1a667410201903fdc8230c48df98057d6516bd370b3a4500e5037005f86c9f20,2024-11-12T13:56:54.483000 @@ -265640,20 +265654,20 @@ CVE-2024-5081,0,0,0bebffdc717b25462ccb5a198cb29076c0fa0475011c795b0df7ab25d1acf1 CVE-2024-50810,0,0,7da23b2ab88a2657cb76543548549613aa1f561df30582c648f7520bf514f0d4,2024-11-12T13:56:54.483000 CVE-2024-50811,0,0,d8ef1ac40dcb898d28bb949cb8cb9a8ce73f83d8e224524d33d6a2ba92df335a,2024-11-12T13:56:54.483000 CVE-2024-5082,0,0,3c0f951c5b33762a472b3ea33ccf88b6977979b0c14a32ab8b6cbf67889fd7af,2024-11-15T13:58:08.913000 -CVE-2024-50823,0,1,9e28ccd9a08403be9206c1fa5d06864983d2eb9e0ee859ed9196bb4a5749640a,2024-11-15T20:35:09.490000 -CVE-2024-50824,0,1,35fe569e5a2209990a7b50cac83c485bd9d4fc5c9126e62e9515102607295a98,2024-11-15T20:35:10.823000 -CVE-2024-50825,0,1,78721026e8bda92e94947b276b84f39730aacb6de8d193ace62a531df2853d94,2024-11-15T20:35:12.167000 -CVE-2024-50826,0,1,9ab314a9ae4299550f9cd1128db30ab75635e2b4df9acc44237f8ffee9257b76,2024-11-15T20:35:13.500000 -CVE-2024-50827,0,1,49d717d74c74f3cadb619530991fcd02c4fd10dbb2ae02cf88b0f9b5a884fe3b,2024-11-15T20:35:14.820000 -CVE-2024-50828,0,1,fafb0f73bc6df62cd1e6fb4e462fcaade9c676589e89a8cb22ddd2c1ff8a54d7,2024-11-15T20:35:16.143000 -CVE-2024-50829,0,1,0ee321663baac09b0aac9953d0386c900ebd5fbaf6aad0e241d3a7132ebb7371,2024-11-15T20:35:17.460000 +CVE-2024-50823,0,0,9e28ccd9a08403be9206c1fa5d06864983d2eb9e0ee859ed9196bb4a5749640a,2024-11-15T20:35:09.490000 +CVE-2024-50824,0,0,35fe569e5a2209990a7b50cac83c485bd9d4fc5c9126e62e9515102607295a98,2024-11-15T20:35:10.823000 +CVE-2024-50825,0,0,78721026e8bda92e94947b276b84f39730aacb6de8d193ace62a531df2853d94,2024-11-15T20:35:12.167000 +CVE-2024-50826,0,0,9ab314a9ae4299550f9cd1128db30ab75635e2b4df9acc44237f8ffee9257b76,2024-11-15T20:35:13.500000 +CVE-2024-50827,0,0,49d717d74c74f3cadb619530991fcd02c4fd10dbb2ae02cf88b0f9b5a884fe3b,2024-11-15T20:35:14.820000 +CVE-2024-50828,0,0,fafb0f73bc6df62cd1e6fb4e462fcaade9c676589e89a8cb22ddd2c1ff8a54d7,2024-11-15T20:35:16.143000 +CVE-2024-50829,0,0,0ee321663baac09b0aac9953d0386c900ebd5fbaf6aad0e241d3a7132ebb7371,2024-11-15T20:35:17.460000 CVE-2024-5083,0,0,732c694a7e1209ed2f8fc7bc4b33638dd34156f3bcdf08e1c465413b90acb66d,2024-11-15T13:58:08.913000 -CVE-2024-50830,0,1,d617c9b7d296513d184f5993b5ea43bd52583e401c6a04117d74d1cf54b1ac96,2024-11-15T20:35:18.800000 -CVE-2024-50831,0,1,44616a4beb14916ca1f00d30b19581dffc684be84504bda456a73fb7729c3ec4,2024-11-15T20:35:20.133000 -CVE-2024-50832,0,1,51c67e0f2769dec09ca7bb0843ab6c7d4db85991d6db2038381aa4452b822ef9,2024-11-15T20:35:21.483000 -CVE-2024-50833,0,1,077ac2f3a9ebcb59ea8cb006c25d9010cb0298acef393e3740698518e254fb50,2024-11-15T20:35:22.847000 -CVE-2024-50834,0,1,c0d48344d094c5c2f6cc477d614ce9495e8d41ba0d081b253eeb62cfbe5dfa7a,2024-11-15T20:35:24.163000 -CVE-2024-50835,0,0,d5fbc4b0d7032126c0f14b65179dabe6edfc46679aef0894f54588480863cf78,2024-11-15T13:58:08.913000 +CVE-2024-50830,0,0,d617c9b7d296513d184f5993b5ea43bd52583e401c6a04117d74d1cf54b1ac96,2024-11-15T20:35:18.800000 +CVE-2024-50831,0,0,44616a4beb14916ca1f00d30b19581dffc684be84504bda456a73fb7729c3ec4,2024-11-15T20:35:20.133000 +CVE-2024-50832,0,0,51c67e0f2769dec09ca7bb0843ab6c7d4db85991d6db2038381aa4452b822ef9,2024-11-15T20:35:21.483000 +CVE-2024-50833,0,0,077ac2f3a9ebcb59ea8cb006c25d9010cb0298acef393e3740698518e254fb50,2024-11-15T20:35:22.847000 +CVE-2024-50834,0,0,c0d48344d094c5c2f6cc477d614ce9495e8d41ba0d081b253eeb62cfbe5dfa7a,2024-11-15T20:35:24.163000 +CVE-2024-50835,0,1,583baa89a3c36b45de164b658380a4083975decf59ae9617f3c0dd1ec6abfbba,2024-11-15T21:35:17.397000 CVE-2024-50836,0,0,85766955476c98bd839d5b2de9f60973de1bd164e67470863e519d1cacd3f4a7,2024-11-15T13:58:08.913000 CVE-2024-50837,0,0,fa916683a3dbdfde4d576245ae8ebbe1bad5683debaaa4ab7d920a9d6cde4375,2024-11-15T13:58:08.913000 CVE-2024-50838,0,0,03dc014a97e8c40e12ccc27e79d2f7d1a4be7052e0e877e043248cf17a531f10,2024-11-15T13:58:08.913000 @@ -265681,13 +265695,14 @@ CVE-2024-50955,0,0,8157390cc8753ab3c3dc03f615378f98ac2c1983a215bd6243bc7dc27b803 CVE-2024-50956,0,0,61199958fcf25ae9206f0f8875ee79a0e783a402692b34e9d18c29f4a470b75f,2024-11-15T13:58:08.913000 CVE-2024-5096,0,0,5ed717834c38883681c6d180e391a0fccee5714f6ff3215bd896b6366e61be87,2024-06-04T19:20:58.687000 CVE-2024-50966,0,0,17999db3c119b65097d64bae028974d0e6d4cf5d6910c7a7a211536c5ff5b48a,2024-11-08T19:01:03.880000 -CVE-2024-50968,0,1,8c4a378aa29139c2d1edfb8be9d371ec199bf37fbc913c101e94bbcd552ffb7c,2024-11-15T19:55:17.097000 +CVE-2024-50968,0,0,8c4a378aa29139c2d1edfb8be9d371ec199bf37fbc913c101e94bbcd552ffb7c,2024-11-15T19:55:17.097000 CVE-2024-50969,0,0,f82f81fef8a82d72e4053f9ec8030a8d4d20833c5d6be0f5bb0e03f29d0491f9,2024-11-14T14:47:53.487000 CVE-2024-5097,0,0,f8c17c92eeab06c631c7e3bccbcd56a5be798bb0ae3554a5ecf4b2a49f948336,2024-06-04T19:20:58.787000 CVE-2024-50970,0,0,2e7889cd3277e474e337527bd160fa64940d7885ad18ecb1fd92dbeebea4ffd5,2024-11-14T14:52:08.097000 CVE-2024-50971,0,0,848df10022c9f75f1c9b9af05147f0923c3bc4a87738961451f1396fe9fbaab2,2024-11-14T14:54:33.787000 CVE-2024-50972,0,0,4e8fb2dd82bb709cf8c210bd21d32873aff8eb306d7b228bf00eb024671ceb3b,2024-11-14T14:55:08.567000 CVE-2024-5098,0,0,51bb68a404444dbad57c4444d3880f6dd34c8b10fc09ab7783a9da02fb8f5608,2024-06-04T19:20:58.887000 +CVE-2024-50983,1,1,84de45fb907a99039ccf14e66e9e37e3e137e1772ab203e8910a8d2f6cceb415,2024-11-15T22:15:15.907000 CVE-2024-50986,0,0,949bd035da5362255ed7ac7c9edff0cc7fd8e202111ff0c1f3097978f8821437,2024-11-15T15:15:07.773000 CVE-2024-50989,0,0,539ed9c0a64887e69fa9cae96035a115db3a8a96afe0045140278b0fb7737495,2024-11-12T18:35:31.437000 CVE-2024-5099,0,0,c449033239abbf7fd2bba4f64694ff77374623f364f0fa141d0a92a151a3ab2c,2024-06-04T19:20:58.993000 @@ -265734,7 +265749,7 @@ CVE-2024-5103,0,0,aef0baf1fd7c527670ecf099c59b541b0a60e91a3e6b8de1c582546f74d7df CVE-2024-51030,0,0,f2e747039aa1c94bb05e787f4d207222d754db12ded9f6bb6df83cbdf74d7a25,2024-11-13T16:47:16.060000 CVE-2024-51031,0,0,b86b8798942030d83468cd0fee37fbed37248c27fcb27a06dd2e8866d706c425,2024-11-13T19:34:52.990000 CVE-2024-51032,0,0,8ef48ff90dee211a4695fed712dc76f07ccf41b216d3f511e2ee570e4fc12c05,2024-11-13T19:35:03.467000 -CVE-2024-51037,1,1,227ae7b5cb9d86b36d7cd849e72d041623335a38cbfae0382a862c71b1bd6796,2024-11-15T19:15:07.803000 +CVE-2024-51037,0,0,227ae7b5cb9d86b36d7cd849e72d041623335a38cbfae0382a862c71b1bd6796,2024-11-15T19:15:07.803000 CVE-2024-5104,0,0,8d4ff1d965ca43b16b77c8055dc82631e6e8123b480d913038100bbc16c5fc14,2024-06-04T19:20:59.397000 CVE-2024-5105,0,0,c1afcbdfab9cbf8b7401c36e665ea5449fdb0423f5baf719d1747abc02484d12,2024-06-04T19:20:59.500000 CVE-2024-51054,0,0,5f7e39a7aaba6174905b6372920760418cc96f41e26463faa8167a7c26d82367,2024-11-12T20:35:17.823000 @@ -265763,8 +265778,8 @@ CVE-2024-51132,0,0,741849111477a3dea70a3f4f159f318bcb11e986e2637afecf8a608cf70fd CVE-2024-51135,0,0,14e718ab6bbce05ef8372500586cdca65e1edc88403906fd3621efeb1c3a8273,2024-11-12T17:35:13.127000 CVE-2024-51136,0,0,b7028b746c76b0b8db7064a5c94d8b9b8b4865b267652b712081099f88f87998,2024-11-06T19:31:15.230000 CVE-2024-5114,0,0,51655375bf74d88d0b44bf3106775b49d83b04b179d3446b4a92ffe727b17b66,2024-06-04T19:21:00.217000 -CVE-2024-51141,1,1,72704e13d12a17e571c3a7505e61832763889d7be7070a6bf2a4ed14cd771078,2024-11-15T19:35:16.037000 -CVE-2024-51142,1,1,fd30d68982f80038879876bcb7da202ea098b1b06829842cd1d2fd879f794ac7,2024-11-15T19:35:16.907000 +CVE-2024-51141,0,0,72704e13d12a17e571c3a7505e61832763889d7be7070a6bf2a4ed14cd771078,2024-11-15T19:35:16.037000 +CVE-2024-51142,0,0,fd30d68982f80038879876bcb7da202ea098b1b06829842cd1d2fd879f794ac7,2024-11-15T19:35:16.907000 CVE-2024-5115,0,0,566281473e2daa2487dd251e202869dc3059aeec07f7c63daa38b65c3bae3de7,2024-06-04T19:21:00.323000 CVE-2024-51152,0,0,2fc415b0efc6d5417097e1245b382b91c976aaa5917a1040e7761d3f03c4c572,2024-11-13T20:03:06.083000 CVE-2024-51156,0,0,ab531e15c589d8d218306e8fd6a6995b5bbbca61f7ac15e609aad877e064595a,2024-11-15T13:58:08.913000 @@ -265826,7 +265841,7 @@ CVE-2024-51327,0,0,6dff1d9ddb8570601185ec672ddf11cc5295d3cdce074e30aa360a3024bc5 CVE-2024-51328,0,0,2b00b7365b3324739a77fda3a7b20dd87707f9d87480b5fe651b2c4602f0e7fd,2024-11-04T19:35:16.150000 CVE-2024-51329,0,0,134d8b5a46fc76f9917a9aed6fc6c4366a039772d7dfe5acc179470dd93f05e6,2024-11-06T19:19:24.793000 CVE-2024-5133,0,0,ce2c3261ccf7a6af3656f0cd319a645240f50aa81e714a3f3634cc2f14d7c857,2024-10-17T16:41:53.717000 -CVE-2024-51330,1,1,623b675eccffcbf1cf55a5f779caf9f08fac1ee997e235e10f58c6709b1207ca,2024-11-15T19:15:08.057000 +CVE-2024-51330,0,0,623b675eccffcbf1cf55a5f779caf9f08fac1ee997e235e10f58c6709b1207ca,2024-11-15T19:15:08.057000 CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa19,2024-06-04T19:21:01.167000 CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000 CVE-2024-51358,0,0,15a6b357b2a15ba2efd09a7258436a688d09605b686100927239b26110c73a5e,2024-11-07T20:35:14.957000 @@ -266088,6 +266103,8 @@ CVE-2024-51760,0,0,ed9651aa9154a248687433de274acd9501a7b311268ff1812cf9f76a64d59 CVE-2024-51761,0,0,7fba3491ed17cbb0fcacf7e06dec1801a39b2cbb0c39394d461b327fba0f0b35,2024-11-12T13:56:24.513000 CVE-2024-51762,0,0,d2974582ab4193d4fadecd27c7279e3cb5c2f47e26174ca4e5af6a95c50b9465,2024-11-12T13:56:24.513000 CVE-2024-51763,0,0,1ab0b26c017f9714f7e7328b764552b7d7949949df835662c6f45441aac0b931,2024-11-12T13:56:24.513000 +CVE-2024-51764,1,1,8800ca929d396499daf3236208fd4ea66794e6173690a1c1b1f0ac3f2b68132e,2024-11-15T22:15:16.017000 +CVE-2024-51765,1,1,2b45b920dce3433278e2cb17cc21b3c3ec955264a5b038b22d8bab75a4c3fdc6,2024-11-15T22:15:16.090000 CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000 CVE-2024-51774,0,0,669a599ada079f107ff827e67143f083d374e9861d23daa36ef167763e62d529,2024-11-06T17:35:41.767000 CVE-2024-51776,0,0,5ca2c4eb522419754c0be1183c799032dcc5ffdbcb2b4aea116b020281ac6eec,2024-11-12T13:56:24.513000 @@ -266284,7 +266301,7 @@ CVE-2024-52519,0,0,ef167401ae9fc01ccb1f13f70e64122366cb19a9418bcd255bc301ab8d4f7 CVE-2024-5252,0,0,1b28d536afc88eae5088fe06ff49428bbad5ffcb2aa7139fe40c4c06d2601422,2024-07-19T15:29:35.447000 CVE-2024-52520,0,0,4de7d2e7a45bd842065c15f5be2bd96578b919552715d69160c2096043d8c3e4,2024-11-15T17:35:16.007000 CVE-2024-52521,0,0,faa46aebbec3a6f9761c605df33640c3789d02a577af493da0314de121761d4d,2024-11-15T17:15:22.580000 -CVE-2024-52522,0,1,95d6ce09113e93a246b361619724cd6885ae3117169da02763d180ee43e73efa,2024-11-15T19:35:18.670000 +CVE-2024-52522,0,0,95d6ce09113e93a246b361619724cd6885ae3117169da02763d180ee43e73efa,2024-11-15T19:35:18.670000 CVE-2024-52523,0,0,c73b3a3e311904286520f4e28b5eb14cf21a74cb1348dc035fd6fd39108922b4,2024-11-15T17:35:16.820000 CVE-2024-52524,0,0,71485345519193ae9ba542ea67056853a738d2240eb01cec0b89113cc24468ca,2024-11-15T13:58:08.913000 CVE-2024-52525,0,0,ec8e0a0bf9b687aeae95450e5373687e7d3db6b39b44f52647e90ceeb50d4278,2024-11-15T17:15:23.150000 @@ -269212,7 +269229,7 @@ CVE-2024-8750,0,0,6aa000b45a0c694359dda91e7e992492dcd4e93d6e7b8c131ee0a86fa36b56 CVE-2024-8751,0,0,dd4f77422f5dc981129a2e765da3e243ee86648b85be15172cd0c4e6601f992a,2024-09-13T14:06:04.777000 CVE-2024-8752,0,0,be5f97c0edf8e6ac8b5e8514ff7047e0f4fcd958517cc5377fbff739f62f1969,2024-09-20T22:42:20.367000 CVE-2024-8754,0,0,f8a4ca9a3c8c6c9af2a693c6565fade1a53b2c08d2db63ea33e154699f832b1a,2024-09-14T15:40:20.583000 -CVE-2024-8755,0,0,6df715314b1336790c7d97e006488029fc046357f7768aca9e76af35c90a4cf5,2024-10-15T12:58:51.050000 +CVE-2024-8755,0,1,ada2261a0d66bc88ffef4f3af38606726bc93eaeb8dab074f59d4d0069757373,2024-11-15T21:15:11.443000 CVE-2024-8756,0,0,267dc6d9d323b3ee60c214fb8c857bab77801af706c2ead75de38cc80f69f89e,2024-11-12T13:56:24.513000 CVE-2024-8757,0,0,ac7b458a171f940d51c6f598fa3e7660be88f90768b34e80d2717be5212da2e2,2024-10-15T12:57:46.880000 CVE-2024-8758,0,0,fea72da3ec447aa80df355b080e42aa6b936f28594d975635bc512eef8e85985,2024-10-07T21:35:03.193000 @@ -269484,7 +269501,7 @@ CVE-2024-9177,0,0,c4277901c0a37ba57d19438c33c0231133f774b6681a96af5a3a31a338af68 CVE-2024-9178,0,0,eca5aa915b955e4e0d7be79d1a2a855f18f7873a33fd6eb6846d12ead9d5fc40,2024-11-08T16:03:26.157000 CVE-2024-9180,0,0,43a25f270cfb7cd861387fae3760598de599a33ae7c6d1aa6e3f1a95d5d03b2a,2024-10-18T20:15:03.393000 CVE-2024-9184,0,0,a3ba82d979bc8561ae674a4ec58c26ce5e04750eca08a1e8b1f42f6ecf9aa161,2024-10-18T12:52:33.507000 -CVE-2024-9186,0,1,f4eaaf66520dd1dd546daa33a6861bcc369cf7d44acbcfde5a36d3ec579a2c15,2024-11-15T20:35:26.383000 +CVE-2024-9186,0,0,f4eaaf66520dd1dd546daa33a6861bcc369cf7d44acbcfde5a36d3ec579a2c15,2024-11-15T20:35:26.383000 CVE-2024-9187,0,0,ec7d5f1d630d180582cea6b34ef03e6ee8cc268d8686e0a61f71186e80a87f38,2024-10-15T12:57:46.880000 CVE-2024-9189,0,0,589dc859bd1b4dfe4aefe62d286159acb6f430185a125dd81b1568310ee1bb88,2024-10-03T17:26:19.397000 CVE-2024-9191,0,0,ee6dfe1b0c94de0c4973c32fd9b929e1fce6c45c7ed6900711a578d548548d42,2024-11-05T17:06:41.363000 @@ -269593,7 +269610,7 @@ CVE-2024-9350,0,0,aa8e581f7289e7bd37e76e94e3964b82de5f4fbd95aa75417bef570e71a86c CVE-2024-9351,0,0,33d034faa3e6b0aeb71bafa0ae8b2ea418555ae0b07eef9d890e7c43507fa47b,2024-10-18T12:53:04.627000 CVE-2024-9352,0,0,788f5bf16f633f8f02e340b198528b062bcda6aeec70a897601eaf656cd6ab6a,2024-10-18T12:52:33.507000 CVE-2024-9353,0,0,64ddffc3239a0d67e3b79e48af9889b2f8d89027aa9c53de3cc5595dbd6f2fd7,2024-10-08T18:50:51.357000 -CVE-2024-9355,0,1,570ad877d483bb09965789a55ded749f6bf93157d75b7c1bf9e468e102c889b7,2024-11-15T20:15:21.523000 +CVE-2024-9355,0,0,570ad877d483bb09965789a55ded749f6bf93157d75b7c1bf9e468e102c889b7,2024-11-15T20:15:21.523000 CVE-2024-9356,0,0,5ef3a6f6e42eeb70f3f0a3cf86d7f29bc317f9d12d447c962c47d2384419ce59,2024-11-15T13:58:08.913000 CVE-2024-9357,0,0,ecac5cca1d13ae41e27c64ccd21707ad2b9f6cb13725a3072faecffbc49d78e9,2024-11-12T13:55:21.227000 CVE-2024-9358,0,0,ad1311c8435fb7ce092ff9c8b7c1abe83209465bc92e72b7b733a8ea9fa4bf3c,2024-10-04T13:51:25.567000 @@ -269681,7 +269698,7 @@ CVE-2024-9472,0,0,6dc75bb8c902376e1f062a26c7a99982f272de37330a03e0fbfe9796bed76f CVE-2024-9473,0,0,2610a860a1ec132e11b499793a273ee08374ba46887944874ff47b7b5fdd4588,2024-10-17T06:15:04.983000 CVE-2024-9475,0,0,273622ecfea8dd0cb8d3a034084a5946e50b2bee83443e844bae24857067e968,2024-10-28T13:58:09.230000 CVE-2024-9476,0,0,e9d7dbd43229ebc9ea9972271d753666a58d144ea232688064d92b4b52fc9277,2024-11-15T14:00:09.720000 -CVE-2024-9477,0,0,d96fc519f7a9945d386fdd8950ef88a71881f191581b1624fa0de9c4a83d5a52,2024-11-13T17:01:16.850000 +CVE-2024-9477,0,1,cf43e95350fa7037b016e95ffdd76723a0091878a7d1f39dfbb116076ef07df2,2024-11-15T22:54:21.233000 CVE-2024-9481,0,0,00fc2967ba19d907f5a39395cc30079db3ef641b613179e4b9951bd38c8d6817,2024-11-08T20:49:03.597000 CVE-2024-9482,0,0,761865a3338cb95ad6952db46fced2e0b200e6722c7208c63ea4447e2930458e,2024-11-08T20:49:58.077000 CVE-2024-9483,0,0,ad5fedd0cd72fbc18365b7b114267513d576cf1b98379267d7018d384a26ba96,2024-11-08T20:54:30.980000 @@ -269690,6 +269707,7 @@ CVE-2024-9486,0,0,69b6721a825ab2624e7f19326bb9e1625f15ea4093ed6bc68f868f6a5c393d CVE-2024-9487,0,0,8c0f797a1267751cd655e097cc4e72301937e39ee2b0b43119e44c1b6d6e9879,2024-11-15T16:57:10.080000 CVE-2024-9488,0,0,7160e6226507ff679fbcba733953e2a0c67fe3c2a8e1dee05991bd941a40e8b2,2024-11-06T14:57:04.457000 CVE-2024-9489,0,0,da9917eda81b5ad40f78c98d3cdcfaa2ce360118ba030bb2ddb2e149e55b8a8e,2024-11-01T16:27:25.937000 +CVE-2024-9500,1,1,d17a5fe6d7405fdf2189b088b648e6a96752a76d7bfb6e4cf4e052611cd95656,2024-11-15T22:15:16.580000 CVE-2024-9501,0,0,d7be73289096f59e8614142ae5f23da8d3cd042d0cbe3c76d9c725d64a67b604,2024-10-28T13:58:09.230000 CVE-2024-9505,0,0,134fdf0964e1ec52ef4b47c0af3083cd4691e60ed884fd2512ddc6dbb615a8df,2024-10-31T16:39:41.193000 CVE-2024-9506,0,0,fc042b04aa147d17b390b33fa64fff12c26897968128764931f8bf3b1a3e0722,2024-10-16T16:38:43.170000 @@ -269703,7 +269721,7 @@ CVE-2024-9520,0,0,043b00f2bf4932488b29ee05bd55762d90704159cb97bf4c710160da6d1296 CVE-2024-9521,0,0,09a594ea849fc5009e458f6cc46742d3176f440810ef4457104bfe2103f1d0c7,2024-10-16T16:38:14.557000 CVE-2024-9522,0,0,884c9004d667a145fae3b3526c4cb56c9d9a1365bd2a57b2af580c0e3b9c19a1,2024-10-15T14:27:41.553000 CVE-2024-9528,0,0,ad76266403ba94311c1f58d7258b765d914c39ddcd1148706c2e05f82ca92e87,2024-10-07T17:48:28.117000 -CVE-2024-9529,0,1,a74498e9b247fb3cd22f5e7796c9032948030a8869b02aae9fc90324965437c4,2024-11-15T19:35:19.160000 +CVE-2024-9529,0,0,a74498e9b247fb3cd22f5e7796c9032948030a8869b02aae9fc90324965437c4,2024-11-15T19:35:19.160000 CVE-2024-9530,0,0,a4f4ec0ca4c538513c522bc25437bdee95aa200ea2c8ddaeaa2d301c3f668205,2024-10-25T18:52:10.810000 CVE-2024-9531,0,0,2d32cff16aa07ef9767a12c3b335b7a483cb4a13b1ba87080414d4508df82841,2024-10-25T12:56:07.750000 CVE-2024-9532,0,0,b7f2aba05edad35ecf41f43ec9640effe332d3189a3ed38d97f2bf49866ac50d,2024-10-09T11:18:49.027000