diff --git a/CVE-2006/CVE-2006-24xx/CVE-2006-2492.json b/CVE-2006/CVE-2006-24xx/CVE-2006-2492.json index 439eb68a1d2..bb26b9beeba 100644 --- a/CVE-2006/CVE-2006-24xx/CVE-2006-2492.json +++ b/CVE-2006/CVE-2006-24xx/CVE-2006-2492.json @@ -2,8 +2,8 @@ "id": "CVE-2006-2492", "sourceIdentifier": "cret@cert.org", "published": "2006-05-20T00:02:00.000", - "lastModified": "2024-11-21T00:11:26.077", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T17:31:05.543", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2007/CVE-2007-56xx/CVE-2007-5659.json b/CVE-2007/CVE-2007-56xx/CVE-2007-5659.json index 485240bae18..fe2f81a8678 100644 --- a/CVE-2007/CVE-2007-56xx/CVE-2007-5659.json +++ b/CVE-2007/CVE-2007-56xx/CVE-2007-5659.json @@ -2,8 +2,8 @@ "id": "CVE-2007-5659", "sourceIdentifier": "cve@mitre.org", "published": "2008-02-12T19:00:00.000", - "lastModified": "2024-11-21T00:38:24.780", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T17:30:59.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2008/CVE-2008-06xx/CVE-2008-0655.json b/CVE-2008/CVE-2008-06xx/CVE-2008-0655.json index 4a596ce1a6f..89d61f702c1 100644 --- a/CVE-2008/CVE-2008-06xx/CVE-2008-0655.json +++ b/CVE-2008/CVE-2008-06xx/CVE-2008-0655.json @@ -2,8 +2,8 @@ "id": "CVE-2008-0655", "sourceIdentifier": "cve@mitre.org", "published": "2008-02-07T21:00:00.000", - "lastModified": "2024-11-21T00:42:36.300", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:02:49.240", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2008/CVE-2008-29xx/CVE-2008-2992.json b/CVE-2008/CVE-2008-29xx/CVE-2008-2992.json index 14cecd21b23..b4aebf0ebb4 100644 --- a/CVE-2008/CVE-2008-29xx/CVE-2008-2992.json +++ b/CVE-2008/CVE-2008-29xx/CVE-2008-2992.json @@ -2,8 +2,8 @@ "id": "CVE-2008-2992", "sourceIdentifier": "cve@mitre.org", "published": "2008-11-04T18:29:47.667", - "lastModified": "2024-11-21T00:48:11.157", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T17:32:47.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2008/CVE-2008-34xx/CVE-2008-3431.json b/CVE-2008/CVE-2008-34xx/CVE-2008-3431.json index b358269d062..277befa54ae 100644 --- a/CVE-2008/CVE-2008-34xx/CVE-2008-3431.json +++ b/CVE-2008/CVE-2008-34xx/CVE-2008-3431.json @@ -2,8 +2,8 @@ "id": "CVE-2008-3431", "sourceIdentifier": "cve@mitre.org", "published": "2008-08-05T19:41:00.000", - "lastModified": "2024-11-21T00:49:14.297", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T17:31:40.990", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2009/CVE-2009-05xx/CVE-2009-0557.json b/CVE-2009/CVE-2009-05xx/CVE-2009-0557.json index 8088ec122c3..b4f3d32c326 100644 --- a/CVE-2009/CVE-2009-05xx/CVE-2009-0557.json +++ b/CVE-2009/CVE-2009-05xx/CVE-2009-0557.json @@ -2,8 +2,8 @@ "id": "CVE-2009-0557", "sourceIdentifier": "secure@microsoft.com", "published": "2009-06-10T18:30:00.203", - "lastModified": "2024-11-21T01:00:18.907", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:03:46.290", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2009/CVE-2009-05xx/CVE-2009-0563.json b/CVE-2009/CVE-2009-05xx/CVE-2009-0563.json index d97c929a461..6c2a8dfcc71 100644 --- a/CVE-2009/CVE-2009-05xx/CVE-2009-0563.json +++ b/CVE-2009/CVE-2009-05xx/CVE-2009-0563.json @@ -2,8 +2,8 @@ "id": "CVE-2009-0563", "sourceIdentifier": "secure@microsoft.com", "published": "2009-06-10T18:00:00.313", - "lastModified": "2024-11-21T01:00:19.833", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:03:17.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2009/CVE-2009-09xx/CVE-2009-0927.json b/CVE-2009/CVE-2009-09xx/CVE-2009-0927.json index 5de4b3fd12c..18564612d1b 100644 --- a/CVE-2009/CVE-2009-09xx/CVE-2009-0927.json +++ b/CVE-2009/CVE-2009-09xx/CVE-2009-0927.json @@ -2,8 +2,8 @@ "id": "CVE-2009-0927", "sourceIdentifier": "cve@mitre.org", "published": "2009-03-19T10:30:00.420", - "lastModified": "2024-11-21T01:01:14.700", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T17:39:50.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2009/CVE-2009-11xx/CVE-2009-1123.json b/CVE-2009/CVE-2009-11xx/CVE-2009-1123.json index 2dae608e2ff..d8c88ce3b51 100644 --- a/CVE-2009/CVE-2009-11xx/CVE-2009-1123.json +++ b/CVE-2009/CVE-2009-11xx/CVE-2009-1123.json @@ -2,8 +2,8 @@ "id": "CVE-2009-1123", "sourceIdentifier": "secure@microsoft.com", "published": "2009-06-10T18:30:00.327", - "lastModified": "2024-11-21T01:01:43.703", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:05:03.943", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2009/CVE-2009-11xx/CVE-2009-1151.json b/CVE-2009/CVE-2009-11xx/CVE-2009-1151.json index b8d8128ce4c..8bb69d64c11 100644 --- a/CVE-2009/CVE-2009-11xx/CVE-2009-1151.json +++ b/CVE-2009/CVE-2009-11xx/CVE-2009-1151.json @@ -2,8 +2,8 @@ "id": "CVE-2009-1151", "sourceIdentifier": "cve@mitre.org", "published": "2009-03-26T14:30:00.267", - "lastModified": "2024-11-21T01:01:47.257", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T17:45:24.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2009/CVE-2009-18xx/CVE-2009-1862.json b/CVE-2009/CVE-2009-18xx/CVE-2009-1862.json index dd7290c7ac3..04ef0bddfea 100644 --- a/CVE-2009/CVE-2009-18xx/CVE-2009-1862.json +++ b/CVE-2009/CVE-2009-18xx/CVE-2009-1862.json @@ -2,8 +2,8 @@ "id": "CVE-2009-1862", "sourceIdentifier": "cve@mitre.org", "published": "2009-07-23T20:30:00.233", - "lastModified": "2024-11-21T01:03:33.637", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:05:43.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2009/CVE-2009-31xx/CVE-2009-3129.json b/CVE-2009/CVE-2009-31xx/CVE-2009-3129.json index c6b0e4a134c..ceac53ae91c 100644 --- a/CVE-2009/CVE-2009-31xx/CVE-2009-3129.json +++ b/CVE-2009/CVE-2009-31xx/CVE-2009-3129.json @@ -2,8 +2,8 @@ "id": "CVE-2009-3129", "sourceIdentifier": "secure@microsoft.com", "published": "2009-11-11T19:30:00.530", - "lastModified": "2024-11-21T01:06:37.087", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:06:07.990", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2009/CVE-2009-39xx/CVE-2009-3953.json b/CVE-2009/CVE-2009-39xx/CVE-2009-3953.json index 997c7826c5e..6d254be1393 100644 --- a/CVE-2009/CVE-2009-39xx/CVE-2009-3953.json +++ b/CVE-2009/CVE-2009-39xx/CVE-2009-3953.json @@ -2,8 +2,8 @@ "id": "CVE-2009-3953", "sourceIdentifier": "psirt@adobe.com", "published": "2010-01-13T19:30:00.343", - "lastModified": "2024-11-21T01:08:35.723", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:08:14.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2009/CVE-2009-39xx/CVE-2009-3960.json b/CVE-2009/CVE-2009-39xx/CVE-2009-3960.json index a2882c26799..bafcd26a80a 100644 --- a/CVE-2009/CVE-2009-39xx/CVE-2009-3960.json +++ b/CVE-2009/CVE-2009-39xx/CVE-2009-3960.json @@ -2,8 +2,8 @@ "id": "CVE-2009-3960", "sourceIdentifier": "psirt@adobe.com", "published": "2010-02-15T18:30:00.407", - "lastModified": "2024-11-21T01:08:36.757", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:09:00.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2009/CVE-2009-43xx/CVE-2009-4324.json b/CVE-2009/CVE-2009-43xx/CVE-2009-4324.json index 81ad0a62bf6..8d37c3ee623 100644 --- a/CVE-2009/CVE-2009-43xx/CVE-2009-4324.json +++ b/CVE-2009/CVE-2009-43xx/CVE-2009-4324.json @@ -2,8 +2,8 @@ "id": "CVE-2009-4324", "sourceIdentifier": "psirt@adobe.com", "published": "2009-12-15T02:30:00.217", - "lastModified": "2024-11-21T01:09:22.217", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:07:41.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2010/CVE-2010-01xx/CVE-2010-0188.json b/CVE-2010/CVE-2010-01xx/CVE-2010-0188.json index 426b7a75ec9..4f39364e53b 100644 --- a/CVE-2010/CVE-2010-01xx/CVE-2010-0188.json +++ b/CVE-2010/CVE-2010-01xx/CVE-2010-0188.json @@ -2,8 +2,8 @@ "id": "CVE-2010-0188", "sourceIdentifier": "psirt@adobe.com", "published": "2010-02-22T13:00:02.127", - "lastModified": "2024-11-21T01:11:43.760", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T17:46:35.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2010/CVE-2010-02xx/CVE-2010-0232.json b/CVE-2010/CVE-2010-02xx/CVE-2010-0232.json index 5e5d202251f..c8cc8c930b7 100644 --- a/CVE-2010/CVE-2010-02xx/CVE-2010-0232.json +++ b/CVE-2010/CVE-2010-02xx/CVE-2010-0232.json @@ -2,8 +2,8 @@ "id": "CVE-2010-0232", "sourceIdentifier": "secure@microsoft.com", "published": "2010-01-21T19:30:00.900", - "lastModified": "2024-11-21T01:11:48.750", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:08:38.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2010/CVE-2010-18xx/CVE-2010-1871.json b/CVE-2010/CVE-2010-18xx/CVE-2010-1871.json index 31bc119eec7..709b3bc2535 100644 --- a/CVE-2010/CVE-2010-18xx/CVE-2010-1871.json +++ b/CVE-2010/CVE-2010-18xx/CVE-2010-1871.json @@ -2,8 +2,8 @@ "id": "CVE-2010-1871", "sourceIdentifier": "cve@mitre.org", "published": "2010-08-05T13:23:09.477", - "lastModified": "2024-11-21T01:15:22.060", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T17:52:39.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2010/CVE-2010-25xx/CVE-2010-2568.json b/CVE-2010/CVE-2010-25xx/CVE-2010-2568.json index babeb7d40c7..f7607404624 100644 --- a/CVE-2010/CVE-2010-25xx/CVE-2010-2568.json +++ b/CVE-2010/CVE-2010-25xx/CVE-2010-2568.json @@ -2,8 +2,8 @@ "id": "CVE-2010-2568", "sourceIdentifier": "secure@microsoft.com", "published": "2010-07-22T05:43:49.703", - "lastModified": "2024-11-21T01:16:55.293", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T17:52:28.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2010/CVE-2010-25xx/CVE-2010-2572.json b/CVE-2010/CVE-2010-25xx/CVE-2010-2572.json index 9c7788fe25a..b5c723a14e7 100644 --- a/CVE-2010/CVE-2010-25xx/CVE-2010-2572.json +++ b/CVE-2010/CVE-2010-25xx/CVE-2010-2572.json @@ -2,8 +2,8 @@ "id": "CVE-2010-2572", "sourceIdentifier": "secure@microsoft.com", "published": "2010-11-10T03:00:01.850", - "lastModified": "2024-11-21T01:16:55.737", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:01:47.840", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2861.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2861.json index f81ee193fb4..2e64399610e 100644 --- a/CVE-2010/CVE-2010-28xx/CVE-2010-2861.json +++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2861.json @@ -2,8 +2,8 @@ "id": "CVE-2010-2861", "sourceIdentifier": "psirt@adobe.com", "published": "2010-08-11T18:47:51.157", - "lastModified": "2024-11-21T01:17:31.210", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:00:44.410", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2010/CVE-2010-28xx/CVE-2010-2883.json b/CVE-2010/CVE-2010-28xx/CVE-2010-2883.json index a300e145744..1962a53984a 100644 --- a/CVE-2010/CVE-2010-28xx/CVE-2010-2883.json +++ b/CVE-2010/CVE-2010-28xx/CVE-2010-2883.json @@ -2,8 +2,8 @@ "id": "CVE-2010-2883", "sourceIdentifier": "psirt@adobe.com", "published": "2010-09-09T22:00:02.250", - "lastModified": "2024-11-21T01:17:33.657", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:19:37.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2010/CVE-2010-33xx/CVE-2010-3333.json b/CVE-2010/CVE-2010-33xx/CVE-2010-3333.json index b73e7531f9d..845f31baa61 100644 --- a/CVE-2010/CVE-2010-33xx/CVE-2010-3333.json +++ b/CVE-2010/CVE-2010-33xx/CVE-2010-3333.json @@ -2,8 +2,8 @@ "id": "CVE-2010-3333", "sourceIdentifier": "secure@microsoft.com", "published": "2010-11-10T03:00:02.087", - "lastModified": "2024-11-21T01:18:31.870", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:20:37.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2010/CVE-2010-43xx/CVE-2010-4344.json b/CVE-2010/CVE-2010-43xx/CVE-2010-4344.json index 72caba157b1..ac319bde291 100644 --- a/CVE-2010/CVE-2010-43xx/CVE-2010-4344.json +++ b/CVE-2010/CVE-2010-43xx/CVE-2010-4344.json @@ -2,8 +2,8 @@ "id": "CVE-2010-4344", "sourceIdentifier": "secalert@redhat.com", "published": "2010-12-14T16:00:04.163", - "lastModified": "2024-11-21T01:20:44.540", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:21:15.367", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2010/CVE-2010-43xx/CVE-2010-4345.json b/CVE-2010/CVE-2010-43xx/CVE-2010-4345.json index 3bc41b7144c..a314052476c 100644 --- a/CVE-2010/CVE-2010-43xx/CVE-2010-4345.json +++ b/CVE-2010/CVE-2010-43xx/CVE-2010-4345.json @@ -2,8 +2,8 @@ "id": "CVE-2010-4345", "sourceIdentifier": "secalert@redhat.com", "published": "2010-12-14T16:00:04.257", - "lastModified": "2024-11-21T01:20:44.713", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:21:54.323", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2011/CVE-2011-18xx/CVE-2011-1889.json b/CVE-2011/CVE-2011-18xx/CVE-2011-1889.json index 1da62e5b188..4bdd6529cee 100644 --- a/CVE-2011/CVE-2011-18xx/CVE-2011-1889.json +++ b/CVE-2011/CVE-2011-18xx/CVE-2011-1889.json @@ -2,8 +2,8 @@ "id": "CVE-2011-1889", "sourceIdentifier": "secure@microsoft.com", "published": "2011-06-16T20:55:02.543", - "lastModified": "2024-11-21T01:27:15.353", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:50:04.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2011/CVE-2011-20xx/CVE-2011-2005.json b/CVE-2011/CVE-2011-20xx/CVE-2011-2005.json index 3639f9feac8..e8822e61149 100644 --- a/CVE-2011/CVE-2011-20xx/CVE-2011-2005.json +++ b/CVE-2011/CVE-2011-20xx/CVE-2011-2005.json @@ -2,8 +2,8 @@ "id": "CVE-2011-2005", "sourceIdentifier": "secure@microsoft.com", "published": "2011-10-12T02:52:43.910", - "lastModified": "2024-11-21T01:27:28.260", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:53:05.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2012/CVE-2012-01xx/CVE-2012-0151.json b/CVE-2012/CVE-2012-01xx/CVE-2012-0151.json index fa68c7ac660..b3bcd198e2f 100644 --- a/CVE-2012/CVE-2012-01xx/CVE-2012-0151.json +++ b/CVE-2012/CVE-2012-01xx/CVE-2012-0151.json @@ -2,8 +2,8 @@ "id": "CVE-2012-0151", "sourceIdentifier": "secure@microsoft.com", "published": "2012-04-10T21:55:01.597", - "lastModified": "2024-11-21T01:34:28.853", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:53:24.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2012/CVE-2012-01xx/CVE-2012-0158.json b/CVE-2012/CVE-2012-01xx/CVE-2012-0158.json index ae9782f0458..47ebe7d55cf 100644 --- a/CVE-2012/CVE-2012-01xx/CVE-2012-0158.json +++ b/CVE-2012/CVE-2012-01xx/CVE-2012-0158.json @@ -2,8 +2,8 @@ "id": "CVE-2012-0158", "sourceIdentifier": "secure@microsoft.com", "published": "2012-04-10T21:55:01.687", - "lastModified": "2024-11-21T01:34:29.590", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:53:18.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2012/CVE-2012-18xx/CVE-2012-1856.json b/CVE-2012/CVE-2012-18xx/CVE-2012-1856.json index 94370a6ae6f..8c1157d8fe6 100644 --- a/CVE-2012/CVE-2012-18xx/CVE-2012-1856.json +++ b/CVE-2012/CVE-2012-18xx/CVE-2012-1856.json @@ -2,8 +2,8 @@ "id": "CVE-2012-1856", "sourceIdentifier": "secure@microsoft.com", "published": "2012-08-15T01:55:01.490", - "lastModified": "2024-11-21T01:37:55.253", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:30:16.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2013/CVE-2013-20xx/CVE-2013-2094.json b/CVE-2013/CVE-2013-20xx/CVE-2013-2094.json index d638e71c60e..12378c6b341 100644 --- a/CVE-2013/CVE-2013-20xx/CVE-2013-2094.json +++ b/CVE-2013/CVE-2013-20xx/CVE-2013-2094.json @@ -2,8 +2,8 @@ "id": "CVE-2013-2094", "sourceIdentifier": "secalert@redhat.com", "published": "2013-05-14T20:55:01.527", - "lastModified": "2024-11-21T01:51:01.253", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:30:26.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2013/CVE-2013-38xx/CVE-2013-3896.json b/CVE-2013/CVE-2013-38xx/CVE-2013-3896.json index b17824f673f..dba948a3969 100644 --- a/CVE-2013/CVE-2013-38xx/CVE-2013-3896.json +++ b/CVE-2013/CVE-2013-38xx/CVE-2013-3896.json @@ -2,8 +2,8 @@ "id": "CVE-2013-3896", "sourceIdentifier": "secure@microsoft.com", "published": "2013-10-09T14:53:25.230", - "lastModified": "2024-11-21T01:54:29.960", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:30:32.333", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2013/CVE-2013-38xx/CVE-2013-3897.json b/CVE-2013/CVE-2013-38xx/CVE-2013-3897.json index 9c4b6075444..9e30734f022 100644 --- a/CVE-2013/CVE-2013-38xx/CVE-2013-3897.json +++ b/CVE-2013/CVE-2013-38xx/CVE-2013-3897.json @@ -2,8 +2,8 @@ "id": "CVE-2013-3897", "sourceIdentifier": "secure@microsoft.com", "published": "2013-10-09T14:54:25.747", - "lastModified": "2024-11-21T01:54:30.080", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:30:40.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2013/CVE-2013-39xx/CVE-2013-3906.json b/CVE-2013/CVE-2013-39xx/CVE-2013-3906.json index af68cd2c9d7..7e172a4f44f 100644 --- a/CVE-2013/CVE-2013-39xx/CVE-2013-3906.json +++ b/CVE-2013/CVE-2013-39xx/CVE-2013-3906.json @@ -2,8 +2,8 @@ "id": "CVE-2013-3906", "sourceIdentifier": "secure@microsoft.com", "published": "2013-11-06T15:55:05.860", - "lastModified": "2024-11-21T01:54:30.950", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:31:14.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2013/CVE-2013-39xx/CVE-2013-3993.json b/CVE-2013/CVE-2013-39xx/CVE-2013-3993.json index 588afb4b9b2..c0105eda6f5 100644 --- a/CVE-2013/CVE-2013-39xx/CVE-2013-3993.json +++ b/CVE-2013/CVE-2013-39xx/CVE-2013-3993.json @@ -2,8 +2,8 @@ "id": "CVE-2013-3993", "sourceIdentifier": "psirt@us.ibm.com", "published": "2014-07-07T11:01:28.383", - "lastModified": "2024-11-21T01:54:40.693", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:25:29.590", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2014/CVE-2014-01xx/CVE-2014-0130.json b/CVE-2014/CVE-2014-01xx/CVE-2014-0130.json index 53d5cd2dec1..c40d729ea21 100644 --- a/CVE-2014/CVE-2014-01xx/CVE-2014-0130.json +++ b/CVE-2014/CVE-2014-01xx/CVE-2014-0130.json @@ -2,8 +2,8 @@ "id": "CVE-2014-0130", "sourceIdentifier": "secalert@redhat.com", "published": "2014-05-07T10:55:04.133", - "lastModified": "2024-11-21T02:01:26.570", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:23:09.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2014/CVE-2014-01xx/CVE-2014-0196.json b/CVE-2014/CVE-2014-01xx/CVE-2014-0196.json index dd7513e61a0..cfc5e98c1b6 100644 --- a/CVE-2014/CVE-2014-01xx/CVE-2014-0196.json +++ b/CVE-2014/CVE-2014-01xx/CVE-2014-0196.json @@ -2,8 +2,8 @@ "id": "CVE-2014-0196", "sourceIdentifier": "secalert@redhat.com", "published": "2014-05-07T10:55:04.337", - "lastModified": "2024-11-21T02:01:36.813", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:45:22.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -409,10 +409,13 @@ }, { "vulnerable": true, - "criteria": "cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:*", - "versionStartIncluding": "3.1.0", - "versionEndIncluding": "3.1.1", - "matchCriteriaId": "96A9D473-86E0-463E-94C3-0E76B2CB1EEF" + "criteria": "cpe:2.3:a:f5:enterprise_manager:3.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4C580F19-AF18-49EE-89FF-8C4F5C88314D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:f5:enterprise_manager:3.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D5F5FEE7-059A-4A9B-BCCD-18F0AA435040" } ] } diff --git a/CVE-2014/CVE-2014-07xx/CVE-2014-0780.json b/CVE-2014/CVE-2014-07xx/CVE-2014-0780.json index eb67cfdd924..e04172ebe0c 100644 --- a/CVE-2014/CVE-2014-07xx/CVE-2014-0780.json +++ b/CVE-2014/CVE-2014-07xx/CVE-2014-0780.json @@ -2,8 +2,8 @@ "id": "CVE-2014-0780", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2014-04-25T05:12:07.787", - "lastModified": "2024-11-21T02:02:47.540", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:22:59.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2014/CVE-2014-31xx/CVE-2014-3153.json b/CVE-2014/CVE-2014-31xx/CVE-2014-3153.json index 45862f7286d..274cc516df3 100644 --- a/CVE-2014/CVE-2014-31xx/CVE-2014-3153.json +++ b/CVE-2014/CVE-2014-31xx/CVE-2014-3153.json @@ -2,8 +2,8 @@ "id": "CVE-2014-3153", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2014-06-07T14:55:27.240", - "lastModified": "2024-11-21T02:07:33.063", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-19T18:24:49.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-93xx/CVE-2018-9391.json b/CVE-2018/CVE-2018-93xx/CVE-2018-9391.json index f74ce873e9b..b3dafde8af7 100644 --- a/CVE-2018/CVE-2018-93xx/CVE-2018-9391.json +++ b/CVE-2018/CVE-2018-93xx/CVE-2018-9391.json @@ -2,8 +2,8 @@ "id": "CVE-2018-9391", "sourceIdentifier": "security@android.com", "published": "2024-12-05T23:15:04.877", - "lastModified": "2024-12-06T17:15:06.967", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T17:18:26.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2018-06-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-93xx/CVE-2018-9392.json b/CVE-2018/CVE-2018-93xx/CVE-2018-9392.json index ec600052194..e0dacfcb615 100644 --- a/CVE-2018/CVE-2018-93xx/CVE-2018-9392.json +++ b/CVE-2018/CVE-2018-93xx/CVE-2018-9392.json @@ -2,8 +2,8 @@ "id": "CVE-2018-9392", "sourceIdentifier": "security@android.com", "published": "2024-12-04T18:15:08.833", - "lastModified": "2024-12-05T19:15:05.197", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T17:26:04.070", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2018-06-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-93xx/CVE-2018-9397.json b/CVE-2018/CVE-2018-93xx/CVE-2018-9397.json index 5ed3132edd2..2ea76e73277 100644 --- a/CVE-2018/CVE-2018-93xx/CVE-2018-9397.json +++ b/CVE-2018/CVE-2018-93xx/CVE-2018-9397.json @@ -2,8 +2,8 @@ "id": "CVE-2018-9397", "sourceIdentifier": "security@android.com", "published": "2024-12-05T00:15:16.720", - "lastModified": "2024-12-05T17:15:05.140", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T17:21:23.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2018-06-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-93xx/CVE-2018-9398.json b/CVE-2018/CVE-2018-93xx/CVE-2018-9398.json index e5beb9f2bcd..e3917bf1a6e 100644 --- a/CVE-2018/CVE-2018-93xx/CVE-2018-9398.json +++ b/CVE-2018/CVE-2018-93xx/CVE-2018-9398.json @@ -2,8 +2,8 @@ "id": "CVE-2018-9398", "sourceIdentifier": "security@android.com", "published": "2024-12-05T00:15:17.383", - "lastModified": "2024-12-05T17:15:06.133", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T17:11:55.793", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2018-06-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-93xx/CVE-2018-9399.json b/CVE-2018/CVE-2018-93xx/CVE-2018-9399.json index 8b7475dbeff..f697ff88417 100644 --- a/CVE-2018/CVE-2018-93xx/CVE-2018-9399.json +++ b/CVE-2018/CVE-2018-93xx/CVE-2018-9399.json @@ -2,8 +2,8 @@ "id": "CVE-2018-9399", "sourceIdentifier": "security@android.com", "published": "2024-12-05T00:15:17.477", - "lastModified": "2024-12-05T17:15:06.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T17:08:15.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2018-06-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9462.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9462.json index ca6b86f6229..91b7d2f97f9 100644 --- a/CVE-2018/CVE-2018-94xx/CVE-2018-9462.json +++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9462.json @@ -2,8 +2,8 @@ "id": "CVE-2018-9462", "sourceIdentifier": "security@android.com", "published": "2024-12-05T00:15:18.433", - "lastModified": "2024-12-05T16:15:19.503", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T17:05:52.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2018-08-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9463.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9463.json index 251ad33d9bb..9bfa0edfd7a 100644 --- a/CVE-2018/CVE-2018-94xx/CVE-2018-9463.json +++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9463.json @@ -2,8 +2,8 @@ "id": "CVE-2018-9463", "sourceIdentifier": "security@android.com", "published": "2024-12-05T00:15:18.527", - "lastModified": "2024-12-05T16:15:19.650", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T17:01:04.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2018-08-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-225xx/CVE-2021-22501.json b/CVE-2021/CVE-2021-225xx/CVE-2021-22501.json new file mode 100644 index 00000000000..c13316f4e2d --- /dev/null +++ b/CVE-2021/CVE-2021-225xx/CVE-2021-22501.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2021-22501", + "sourceIdentifier": "security@opentext.com", + "published": "2024-12-19T17:15:06.527", + "lastModified": "2024-12-19T17:15:06.527", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Restriction of XML External Entity Reference vulnerability in OpenText\u2122 Operations Bridge Manager allows Input Data Manipulation.\u00a0\n\nThe vulnerability could be exploited to confidential information\n\nThis issue affects Operations Bridge Manager: 2017.05, 2017.11, 2018.05, 2018.11, 2019.05, 2019.11, 2020.05, 2020.10." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:A/V:C/RE:M/U:Amber", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NEGLIGIBLE", + "automatable": "YES", + "recovery": "AUTOMATIC", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "AMBER" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://portal.microfocus.com/s/article/KM000037407?language=en_US", + "source": "security@opentext.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-325xx/CVE-2021-32589.json b/CVE-2021/CVE-2021-325xx/CVE-2021-32589.json index b3ed8987bbb..73430839438 100644 --- a/CVE-2021/CVE-2021-325xx/CVE-2021-32589.json +++ b/CVE-2021/CVE-2021-325xx/CVE-2021-32589.json @@ -2,13 +2,13 @@ "id": "CVE-2021-32589", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-12-19T13:15:05.707", - "lastModified": "2024-12-19T13:15:05.707", + "lastModified": "2024-12-19T17:15:07.167", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A use after free in Fortinet FortiManager, FortiAnalyzer allows attacker to execute unauthorized code or commands via " + "value": "A Use After Free (CWE-416) vulnerability in FortiManager version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.2.10 and below, version 5.0.12 and below and FortiAnalyzer version 7.0.0, version 6.4.5 and below, version 6.2.7 and below, version 6.0.10 and below, version 5.6.10 and below, version 5.4.7 and below, version 5.3.11, version 5.2.10 to 5.2.4 fgfmsd daemon may allow a remote, non-authenticated attacker to execute unauthorized code as root via sending a specifically crafted request to the fgfm port of the targeted device." } ], "metrics": { @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "psirt@fortinet.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2021/CVE-2021-43xx/CVE-2021-4314.json b/CVE-2021/CVE-2021-43xx/CVE-2021-4314.json index 48e72a27195..c70873d1c93 100644 --- a/CVE-2021/CVE-2021-43xx/CVE-2021-4314.json +++ b/CVE-2021/CVE-2021-43xx/CVE-2021-4314.json @@ -2,8 +2,8 @@ "id": "CVE-2021-4314", "sourceIdentifier": "zowe-security@lists.openmainframeproject.org", "published": "2023-01-18T16:15:11.130", - "lastModified": "2024-11-21T06:37:23.670", - "vulnStatus": "Modified", + "lastModified": "2024-12-19T17:00:28.533", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -71,9 +71,9 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:linuxfoundation:zowe_api_mediation_layer:*:*:*:*:*:*:*:*", - "versionStartIncluding": "1.16", - "versionEndIncluding": "1.19", - "matchCriteriaId": "0507A7C0-DF23-4451-83FD-F79D4D083BBE" + "versionStartIncluding": "1.16.0", + "versionEndExcluding": "1.19.0", + "matchCriteriaId": "E12D0354-4008-4E89-8AD4-DCE9AFB6BDA1" } ] } @@ -85,14 +85,14 @@ "url": "https://github.com/zowe/api-layer/", "source": "zowe-security@lists.openmainframeproject.org", "tags": [ - "Third Party Advisory" + "Product" ] }, { "url": "https://github.com/zowe/api-layer/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Third Party Advisory" + "Product" ] } ] diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7005.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7005.json new file mode 100644 index 00000000000..084fc5a9e7d --- /dev/null +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7005.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2023-7005", + "sourceIdentifier": "cret@cert.org", + "published": "2024-12-19T18:15:06.313", + "lastModified": "2024-12-19T18:15:06.313", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A specially crafted message can be sent to the TTLock App that downgrades the encryption protocol used for communication, and can be utilized to compromise the lock, such as through revealing the unlockKey field." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://alephsecurity.com/2024/03/07/kontrol-lux-lock-2/", + "source": "cret@cert.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12788.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12788.json new file mode 100644 index 00000000000..d368e30abe6 --- /dev/null +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12788.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-12788", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-19T17:15:08.270", + "lastModified": "2024-12-19T17:15:08.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Codezips Technical Discussion Forum 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file signinpost.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/laowuzi/cve/tree/main/Technical_Discussion_Forum", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.288968", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.288968", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.465094", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12789.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12789.json new file mode 100644 index 00000000000..34f1a48a199 --- /dev/null +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12789.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-12789", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-19T17:15:08.463", + "lastModified": "2024-12-19T17:15:08.463", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in PbootCMS up to 3.2.3. It has been classified as critical. This affects an unknown part of the file apps/home/controller/IndexController.php. The manipulation of the argument tag leads to code injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.2.4 is able to address this issue. It is recommended to upgrade the affected component." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/J1rrY-learn/8e52bf055fd1806ada81ae1ff25dd817", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.288969", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.288969", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.465122", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12790.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12790.json new file mode 100644 index 00000000000..b6e410c3d8a --- /dev/null +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12790.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2024-12790", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-19T17:15:08.650", + "lastModified": "2024-12-19T17:15:08.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Hostel Management Site 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file room-details.php. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/asd1238525/cve/blob/main/xss.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.288970", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.288970", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.465224", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12791.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12791.json new file mode 100644 index 00000000000..b48a5ff812d --- /dev/null +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12791.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-12791", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-19T18:15:08.263", + "lastModified": "2024-12-19T18:15:08.263", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Codezips E-Commerce Site 1.0. It has been rated as critical. This issue affects some unknown processing of the file signin.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/laowuzi/cve/blob/main/E-commerce/E-commerce-signin.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.288971", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.288971", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.465711", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12792.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12792.json new file mode 100644 index 00000000000..114b994cb04 --- /dev/null +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12792.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-12792", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-19T18:15:08.900", + "lastModified": "2024-12-19T18:15:08.900", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in Codezips E-Commerce Site 1.0. Affected by this vulnerability is an unknown functionality of the file newadmin.php. The manipulation of the argument email leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/laowuzi/cve/blob/main/E-commerce/E-commerce-newadmin.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.288973", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.288973", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.465715", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12793.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12793.json new file mode 100644 index 00000000000..3e21340f67b --- /dev/null +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12793.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-12793", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-19T18:15:09.403", + "lastModified": "2024-12-19T18:15:09.403", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, has been found in PbootCMS up to 5.2.3. Affected by this issue is some unknown functionality of the file apps/home/controller/IndexController.php. The manipulation of the argument tag leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 5.2.4 is able to address this issue. It is recommended to upgrade the affected component." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/J1rrY-learn/b939899001b2c6b59632d82df11da001", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.288974", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.288974", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.465779", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12794.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12794.json new file mode 100644 index 00000000000..c5aa9b9e279 --- /dev/null +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12794.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-12794", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-12-19T18:15:09.963", + "lastModified": "2024-12-19T18:15:09.963", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in Codezips E-Commerce Site 1.0. This affects an unknown part of the file /admin/editorder.php. The manipulation of the argument dstatus/quantity/ddate leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/laowuzi/cve/blob/main/E-commerce/E-commerce_editorder.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.288975", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.288975", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.466241", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12801.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12801.json new file mode 100644 index 00000000000..20494154ab0 --- /dev/null +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12801.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-12801", + "sourceIdentifier": "vulnerability@ncsc.ch", + "published": "2024-12-19T17:15:08.930", + "lastModified": "2024-12-19T17:15:08.930", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Server-Side Request Forgery (SSRF) in SaxEventRecorder by QOS.CH logback version 1.5.12 on the Java platform, allows an attacker to \nforge requests by compromising logback configuration files in XML.\n\n\n\nThe attacks involves the modification of DOCTYPE declaration in\u00a0 XML configuration files." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "vulnerability@ncsc.ch", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:N/VA:L/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:D/RE:X/U:Clear", + "baseScore": 2.4, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "DIFFUSE", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "CLEAR" + } + } + ] + }, + "weaknesses": [ + { + "source": "vulnerability@ncsc.ch", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://logback.qos.ch/news.html#1.5.13", + "source": "vulnerability@ncsc.ch" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1669.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1669.json index bb96d9fe8e4..42fc7157cf2 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1669.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1669.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1669", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-02-21T04:15:08.150", - "lastModified": "2024-11-21T08:51:02.537", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T17:32:13.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,38 +81,102 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "122.0.6261.57", + "matchCriteriaId": "96BC218C-A8E3-446D-BDF5-C6E0F7D8B6FC" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://issues.chromium.org/issues/41495060", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/41495060", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1670.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1670.json index 6972482358e..31074729835 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1670.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1670.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1670", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-02-21T04:15:08.210", - "lastModified": "2024-11-21T08:51:02.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T17:33:44.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,38 +81,102 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "122.0.6261.57", + "matchCriteriaId": "96BC218C-A8E3-446D-BDF5-C6E0F7D8B6FC" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://issues.chromium.org/issues/41481374", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/41481374", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1672.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1672.json index 1dea7a4c755..95a07e74356 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1672.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1672.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1672", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-02-21T04:15:08.297", - "lastModified": "2024-11-21T08:51:03.060", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T17:53:20.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,38 +81,102 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "122.0.6261.57", + "matchCriteriaId": "96BC218C-A8E3-446D-BDF5-C6E0F7D8B6FC" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://issues.chromium.org/issues/41485789", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/41485789", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1673.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1673.json index 73207a662cd..05a3197e09c 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1673.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1673.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1673", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-02-21T04:15:08.347", - "lastModified": "2024-11-21T08:51:03.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T17:54:58.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,38 +81,102 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "122.0.6261.57", + "matchCriteriaId": "96BC218C-A8E3-446D-BDF5-C6E0F7D8B6FC" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://issues.chromium.org/issues/41490491", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/41490491", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1676.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1676.json index 734dd1f295c..bd024a7c76c 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1676.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1676.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1676", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-02-21T04:15:08.580", - "lastModified": "2024-11-21T08:51:03.760", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T17:58:37.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,38 +81,102 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "122.0.6261.57", + "matchCriteriaId": "96BC218C-A8E3-446D-BDF5-C6E0F7D8B6FC" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/40944847", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://chromereleases.googleblog.com/2024/02/stable-channel-update-for-desktop_20.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/40944847", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PWWBMVQTSERVBXSXCZVUKIMEDNQUQ7O3/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QDCMYQ3J45NHQ4EJREM3BJNNKB5BK4Y7/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-388xx/CVE-2024-38819.json b/CVE-2024/CVE-2024-388xx/CVE-2024-38819.json new file mode 100644 index 00000000000..66ae801deb8 --- /dev/null +++ b/CVE-2024/CVE-2024-388xx/CVE-2024-38819.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38819", + "sourceIdentifier": "security@vmware.com", + "published": "2024-12-19T18:15:10.557", + "lastModified": "2024-12-19T18:15:10.557", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@vmware.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://spring.io/security/cve-2024-38819", + "source": "security@vmware.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4059.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4059.json index 31b0ea58215..924f4a896d1 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4059.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4059.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4059", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-01T13:15:52.253", - "lastModified": "2024-11-21T09:42:06.517", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T18:56:45.140", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,119 @@ "value": "La lectura fuera de los l\u00edmites en la API V8 en Google Chrome anterior a 124.0.6367.78 permiti\u00f3 a un atacante remoto filtrar datos entre sitios a trav\u00e9s de una p\u00e1gina HTML manipulada. (Severidad de seguridad de Chrome: alta)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "124.0.6367.78", + "matchCriteriaId": "3C052A48-22EC-4839-9065-D47C56599B4C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/333182464", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/333182464", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-40xx/CVE-2024-4060.json b/CVE-2024/CVE-2024-40xx/CVE-2024-4060.json index 475929aab8c..221b717cffc 100644 --- a/CVE-2024/CVE-2024-40xx/CVE-2024-4060.json +++ b/CVE-2024/CVE-2024-40xx/CVE-2024-4060.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4060", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-01T13:15:52.300", - "lastModified": "2024-11-21T09:42:06.620", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T18:54:01.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,30 +81,83 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*", + "versionEndExcluding": "124.0.6367.78", + "matchCriteriaId": "3C052A48-22EC-4839-9065-D47C56599B4C" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] + } + ], "references": [ { "url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/333420620", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/", - "source": "chrome-cve-admin@google.com" + "source": "chrome-cve-admin@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_24.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://issues.chromium.org/issues/333420620", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-420xx/CVE-2024-42004.json b/CVE-2024/CVE-2024-420xx/CVE-2024-42004.json index 60358a7259b..d15ee1a0e6c 100644 --- a/CVE-2024/CVE-2024-420xx/CVE-2024-42004.json +++ b/CVE-2024/CVE-2024-420xx/CVE-2024-42004.json @@ -2,20 +2,24 @@ "id": "CVE-2024-42004", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-12-18T23:15:08.450", - "lastModified": "2024-12-18T23:15:08.450", + "lastModified": "2024-12-19T17:15:09.120", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A library injection vulnerability exists in Microsoft Teams (work or school) 24046.2813.2770.1094 for macOS. A specially crafted library can leverage Teams's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de librer\u00eda en Microsoft Teams (trabajo o escuela) 24046.2813.2770.1094 para macOS. Una librer\u00eda especialmente manipulada puede aprovechar los privilegios de acceso de Teams, lo que lleva a una omisi\u00f3n de permisos. Una aplicaci\u00f3n malintencionada podr\u00eda inyectar una librer\u00eda e iniciar el programa para activar esta vulnerabilidad y luego hacer uso de los permisos de la aplicaci\u00f3n vulnerable." } ], "metrics": { "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +59,10 @@ { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1973", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1973", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-422xx/CVE-2024-42220.json b/CVE-2024/CVE-2024-422xx/CVE-2024-42220.json index 16a094a1bac..e03b974a162 100644 --- a/CVE-2024/CVE-2024-422xx/CVE-2024-42220.json +++ b/CVE-2024/CVE-2024-422xx/CVE-2024-42220.json @@ -2,20 +2,24 @@ "id": "CVE-2024-42220", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-12-18T23:15:08.597", - "lastModified": "2024-12-18T23:15:08.597", + "lastModified": "2024-12-19T17:15:09.243", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A library injection vulnerability exists in Microsoft Outlook 16.83.3 for macOS. A specially crafted library can leverage Outlook's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de librer\u00eda en Microsoft Outlook 16.83.3 para macOS. Una librer\u00eda especialmente manipulada puede aprovechar los privilegios de acceso de Outlook, lo que lleva a una omisi\u00f3n de permisos. Una aplicaci\u00f3n malintencionada podr\u00eda inyectar una librer\u00eda e iniciar el programa para activar esta vulnerabilidad y luego hacer uso de los permisos de la aplicaci\u00f3n vulnerable." } ], "metrics": { "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +59,10 @@ { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1972", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1972", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43106.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43106.json index 2908de5907e..283328babfd 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43106.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43106.json @@ -2,20 +2,24 @@ "id": "CVE-2024-43106", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-12-18T23:15:08.760", - "lastModified": "2024-12-18T23:15:08.760", + "lastModified": "2024-12-19T17:15:09.350", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A library injection vulnerability exists in Microsoft Excel 16.83 for macOS. A specially crafted library can leverage Excel's access privileges, leading to a permission bypass. A malicious application could inject a library and start the program to trigger this vulnerability and then make use of the vulnerable application's permissions." + }, + { + "lang": "es", + "value": "Existe una vulnerabilidad de inyecci\u00f3n de librer\u00eda en Microsoft Excel 16.83 para macOS. Una librer\u00eda especialmente manipulada puede aprovechar los privilegios de acceso de Excel, lo que lleva a una omisi\u00f3n de permisos. Una aplicaci\u00f3n malintencionada podr\u00eda inyectar una librer\u00eda e iniciar el programa para activar esta vulnerabilidad y luego hacer uso de los permisos de la aplicaci\u00f3n vulnerable." } ], "metrics": { "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", @@ -38,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +59,10 @@ { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1976", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1976", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49336.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49336.json new file mode 100644 index 00000000000..622842860a8 --- /dev/null +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49336.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49336", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-19T18:15:22.850", + "lastModified": "2024-12-19T18:15:22.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Security Guardium 11.5 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7179369", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49513.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49513.json index 143b2299f8f..22a871b8a35 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49513.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49513.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49513", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T21:15:16.343", - "lastModified": "2024-12-16T17:15:10.130", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T17:15:33.163", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,53 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:pdf_library_sdk:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.0.0.7", + "matchCriteriaId": "A7F26105-952D-4C47-84FF-E56E357BCB7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/pdfl-sdk1/apsb24-98.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50379.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50379.json index 1afde07c256..22b1d264e7d 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50379.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50379.json @@ -2,13 +2,13 @@ "id": "CVE-2024-50379", "sourceIdentifier": "security@apache.org", "published": "2024-12-17T13:15:18.810", - "lastModified": "2024-12-18T17:15:13.870", + "lastModified": "2024-12-19T18:15:23.000", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration).\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.08, which fixes the issue." + "value": "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability during JSP compilation in Apache Tomcat permits an RCE on case insensitive file systems when the default servlet is enabled for write (non-default configuration).\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.1, from 10.1.0-M1 through 10.1.33, from 9.0.0.M1 through 9.0.97.\n\nUsers are recommended to upgrade to version 11.0.2, 10.1.34 or 9.0.98, which fixes the issue." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51471.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51471.json new file mode 100644 index 00000000000..9da05aa94ab --- /dev/null +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51471.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51471", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-19T18:15:23.153", + "lastModified": "2024-12-19T18:15:23.153", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM MQ Appliance 9.3 LTS, 9.3 CD, and 9.4 LTS\u00a0web console could allow an authenticated user to cause a denial-of-service when trace is enabled due to information being written into memory outside of the intended buffer size." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7178243", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52896.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52896.json new file mode 100644 index 00000000000..2e751b1f863 --- /dev/null +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52896.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52896", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-19T17:15:09.797", + "lastModified": "2024-12-19T17:15:09.797", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM MQ Appliance 9.3 LTS, 9.3 CD, 9.4 LTS, and 9.4 CD web console could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7178244", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52897.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52897.json new file mode 100644 index 00000000000..08019182e58 --- /dev/null +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52897.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52897", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-19T18:15:23.357", + "lastModified": "2024-12-19T18:15:23.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM MQ Appliance 9.3 LTS, 9.3 CD, and 9.4 LTS\u00a0web console could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7178086", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53101.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53101.json index 44dfec7dee2..1898cf6b1aa 100644 --- a/CVE-2024/CVE-2024-531xx/CVE-2024-53101.json +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53101.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53101", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-25T22:15:17.163", - "lastModified": "2024-11-25T22:15:17.163", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T18:08:23.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,193 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: fs: Se soluciona el problema de los valores no inicializados en from_kuid y from_kgid ocfs2_setattr() utiliza attr->ia_mode, attr->ia_uid y attr->ia_gid en un punto de seguimiento aunque ATTR_MODE, ATTR_UID y ATTR_GID no est\u00e9n configurados. Inicializa todos los campos de newattrs para evitar variables no inicializadas, comprobando si ATTR_MODE, ATTR_UID, ATTR_GID est\u00e1n inicializados, de lo contrario, 0." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.19.324", + "matchCriteriaId": "0EBF3108-DBF4-4E6D-B699-384F2299858B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.286", + "matchCriteriaId": "9952C897-8A61-4D4B-9D6D-7D063E9EA15E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.230", + "matchCriteriaId": "BF5B32D0-72C9-41C3-A0BB-D4946153C134" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.173", + "matchCriteriaId": "B57DBF5A-67DF-4816-ABA5-ED8F60AF864C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.118", + "matchCriteriaId": "F3F65A42-F5DB-44BC-976C-05128A6A683D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.62", + "matchCriteriaId": "EBACFAEF-9696-41C6-8B03-B3C5947DCB1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.9", + "matchCriteriaId": "759504D4-BE53-492C-BA9B-70F6A9F409CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", + "matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*", + "matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*", + "matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc7:*:*:*:*:*:*", + "matchCriteriaId": "1EF8CD82-1EAE-4254-9545-F85AB94CF90F" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/15f34347481648a567db67fb473c23befb796af5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/17ecb40c5cc7755a321fb6148cba5797431ee5b8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1c28bca1256aecece6e94b26b85cd07e08b0dc90", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/1cb5bfc5bfc651982b6203c224d49b7ddacf28bc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/5a72b0d3497b818d8f000c347a7c11801eb27bfc", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9db25c2b41c34963c3ccf473b08171f87670652e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a0c77e5e3dcbffc7c6080ccc89c037f0c86496cf", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b3e612bd8f64ce62e731e95f635e06a2efe3c80c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54038.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54038.json index 875dbdd98bf..7ba2c9cdd18 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54038.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54038.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54038", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T21:15:21.210", - "lastModified": "2024-12-10T21:15:21.210", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T18:58:38.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", @@ -36,25 +36,83 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 } ] }, "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.4.9", + "matchCriteriaId": "599EEA89-BDA1-4FF2-9B78-103DDDD1E262" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0", + "versionEndExcluding": "12.7", + "matchCriteriaId": "E877A861-6761-4E6E-8589-34C30346DCEE" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/connect/apsb24-99.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54051.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54051.json index 82caded417f..8748c89c45d 100644 --- a/CVE-2024/CVE-2024-540xx/CVE-2024-54051.json +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54051.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54051", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T21:15:22.927", - "lastModified": "2024-12-10T21:15:22.927", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T18:59:21.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,10 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.4.9", + "matchCriteriaId": "599EEA89-BDA1-4FF2-9B78-103DDDD1E262" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0", + "versionEndExcluding": "12.7", + "matchCriteriaId": "E877A861-6761-4E6E-8589-34C30346DCEE" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/connect/apsb24-99.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55081.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55081.json new file mode 100644 index 00000000000..0c36897dd18 --- /dev/null +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55081.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-55081", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-19T17:15:09.950", + "lastModified": "2024-12-19T17:15:09.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An XML External Entity (XXE) injection vulnerability in the component /datagrip/upload of Chat2DB v0.3.5 allows attackers to execute arbitrary code via supplying a crafted XML input." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/summerxxoo/18b3ccc91aacd606aa4d48a02029e9e7", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/summerxxoo/VulnPoc/blob/main/chat2DB_XXE.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-83xx/CVE-2024-8355.json b/CVE-2024/CVE-2024-83xx/CVE-2024-8355.json index 79cbce72068..05ae137eb6b 100644 --- a/CVE-2024/CVE-2024-83xx/CVE-2024-8355.json +++ b/CVE-2024/CVE-2024-83xx/CVE-2024-8355.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8355", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T22:15:18.860", - "lastModified": "2024-11-22T22:15:18.860", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T18:47:39.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,10 +73,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:visteon:infotainment_firmware:74.00.311a:*:*:*:*:*:*:*", + "matchCriteriaId": "7AF67CD8-87ED-482D-85DC-118067DF268B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1208/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9112.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9112.json index 8b892d11fc2..c3eebbaf2b0 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9112.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9112.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9112", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T22:15:19.863", - "lastModified": "2024-11-22T22:15:19.863", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T18:15:52.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,10 +73,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:faststone:image_viewer:7.8:*:*:*:*:*:*:*", + "matchCriteriaId": "FECE2BD8-9A5C-43AA-994C-8F3D2D6DE135" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1273/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-91xx/CVE-2024-9113.json b/CVE-2024/CVE-2024-91xx/CVE-2024-9113.json index e80d0b75a5f..baf57f36374 100644 --- a/CVE-2024/CVE-2024-91xx/CVE-2024-9113.json +++ b/CVE-2024/CVE-2024-91xx/CVE-2024-9113.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9113", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T22:15:19.990", - "lastModified": "2024-11-22T22:15:19.990", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T18:15:21.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,10 +73,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:faststone:image_viewer:7.8:*:*:*:*:*:*:*", + "matchCriteriaId": "FECE2BD8-9A5C-43AA-994C-8F3D2D6DE135" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1274/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9727.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9727.json index 3eab84b2fd4..1c2fe97de1b 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9727.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9727.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9727", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T21:15:25.997", - "lastModified": "2024-11-22T21:15:25.997", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T17:46:11.723", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,10 +73,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trimble:sketchup_viewer:22.0.316.0:*:*:*:-:*:*:*", + "matchCriteriaId": "1E89E3C4-8010-4228-A3DC-E41FAA44F4C1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1476/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9728.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9728.json index 9461fb55064..0b92ba35319 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9728.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9728.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9728", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T21:15:26.130", - "lastModified": "2024-11-22T21:15:26.130", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-19T17:30:02.427", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,10 +73,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trimble:sketchup_viewer:22.0.316.0:*:*:*:*:*:*:*", + "matchCriteriaId": "589D3479-5680-4DB7-95CC-B1DC3C0D5E23" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1484/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9798.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9798.json index b9ca2ee104c..5b9ae9aab75 100644 --- a/CVE-2024/CVE-2024-97xx/CVE-2024-9798.json +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9798.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9798", "sourceIdentifier": "zowe-security@lists.openmainframeproject.org", "published": "2024-10-10T08:15:04.207", - "lastModified": "2024-11-25T18:00:47.637", + "lastModified": "2024-12-19T17:00:16.440", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -90,17 +90,17 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:linuxfoundation:api_mediation_layer:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:linuxfoundation:zowe_api_mediation_layer:*:*:*:*:*:*:*:*", "versionStartIncluding": "1.0.0", "versionEndExcluding": "1.28.8", - "matchCriteriaId": "8B9B17C8-D7CB-4E68-8FCB-DB748815328C" + "matchCriteriaId": "412BFD66-17AB-406D-8C88-F76896DCD663" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:linuxfoundation:api_mediation_layer:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:linuxfoundation:zowe_api_mediation_layer:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.0.0", "versionEndExcluding": "2.18.0", - "matchCriteriaId": "AE047C55-2406-49E6-A84D-29FC747A3C2B" + "matchCriteriaId": "80068574-74E5-4A47-B442-7457F42AA879" } ] } diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9802.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9802.json index 9b9a2eb9e3b..6b344761deb 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9802.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9802.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9802", "sourceIdentifier": "zowe-security@lists.openmainframeproject.org", "published": "2024-10-10T08:15:04.387", - "lastModified": "2024-11-25T17:56:58.937", + "lastModified": "2024-12-19T17:00:21.353", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -90,10 +90,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:linuxfoundation:api_mediation_layer:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:linuxfoundation:zowe_api_mediation_layer:*:*:*:*:*:*:*:*", "versionStartIncluding": "2.11.0", "versionEndExcluding": "2.17.0", - "matchCriteriaId": "9968ABF2-0BD5-41D7-AA9A-66FD32E21C6D" + "matchCriteriaId": "454F6E4D-504F-4080-95F4-4D0A771C52D3" } ] } diff --git a/README.md b/README.md index cc8ee34ff70..29ce9f60e52 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-19T17:00:20.703415+00:00 +2024-12-19T19:00:29.324360+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-19T16:54:09.743000+00:00 +2024-12-19T18:59:21.867000+00:00 ``` ### Last Data Feed Release @@ -33,54 +33,60 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -274379 +274395 ``` ### CVEs added in the last Commit -Recently added CVEs: `10` +Recently added CVEs: `16` -- [CVE-2024-12785](CVE-2024/CVE-2024-127xx/CVE-2024-12785.json) (`2024-12-19T15:15:05.980`) -- [CVE-2024-12786](CVE-2024/CVE-2024-127xx/CVE-2024-12786.json) (`2024-12-19T15:15:06.873`) -- [CVE-2024-12787](CVE-2024/CVE-2024-127xx/CVE-2024-12787.json) (`2024-12-19T16:15:06.810`) -- [CVE-2024-12798](CVE-2024/CVE-2024-127xx/CVE-2024-12798.json) (`2024-12-19T16:15:07.557`) -- [CVE-2024-25131](CVE-2024/CVE-2024-251xx/CVE-2024-25131.json) (`2024-12-19T15:15:07.070`) -- [CVE-2024-38864](CVE-2024/CVE-2024-388xx/CVE-2024-38864.json) (`2024-12-19T16:15:08.197`) -- [CVE-2024-47093](CVE-2024/CVE-2024-470xx/CVE-2024-47093.json) (`2024-12-19T15:15:07.250`) -- [CVE-2024-54790](CVE-2024/CVE-2024-547xx/CVE-2024-54790.json) (`2024-12-19T15:15:07.680`) -- [CVE-2024-55082](CVE-2024/CVE-2024-550xx/CVE-2024-55082.json) (`2024-12-19T16:15:09.127`) -- [CVE-2024-9154](CVE-2024/CVE-2024-91xx/CVE-2024-9154.json) (`2024-12-19T16:15:09.253`) +- [CVE-2021-22501](CVE-2021/CVE-2021-225xx/CVE-2021-22501.json) (`2024-12-19T17:15:06.527`) +- [CVE-2023-7005](CVE-2023/CVE-2023-70xx/CVE-2023-7005.json) (`2024-12-19T18:15:06.313`) +- [CVE-2024-12788](CVE-2024/CVE-2024-127xx/CVE-2024-12788.json) (`2024-12-19T17:15:08.270`) +- [CVE-2024-12789](CVE-2024/CVE-2024-127xx/CVE-2024-12789.json) (`2024-12-19T17:15:08.463`) +- [CVE-2024-12790](CVE-2024/CVE-2024-127xx/CVE-2024-12790.json) (`2024-12-19T17:15:08.650`) +- [CVE-2024-12791](CVE-2024/CVE-2024-127xx/CVE-2024-12791.json) (`2024-12-19T18:15:08.263`) +- [CVE-2024-12792](CVE-2024/CVE-2024-127xx/CVE-2024-12792.json) (`2024-12-19T18:15:08.900`) +- [CVE-2024-12793](CVE-2024/CVE-2024-127xx/CVE-2024-12793.json) (`2024-12-19T18:15:09.403`) +- [CVE-2024-12794](CVE-2024/CVE-2024-127xx/CVE-2024-12794.json) (`2024-12-19T18:15:09.963`) +- [CVE-2024-12801](CVE-2024/CVE-2024-128xx/CVE-2024-12801.json) (`2024-12-19T17:15:08.930`) +- [CVE-2024-38819](CVE-2024/CVE-2024-388xx/CVE-2024-38819.json) (`2024-12-19T18:15:10.557`) +- [CVE-2024-49336](CVE-2024/CVE-2024-493xx/CVE-2024-49336.json) (`2024-12-19T18:15:22.850`) +- [CVE-2024-51471](CVE-2024/CVE-2024-514xx/CVE-2024-51471.json) (`2024-12-19T18:15:23.153`) +- [CVE-2024-52896](CVE-2024/CVE-2024-528xx/CVE-2024-52896.json) (`2024-12-19T17:15:09.797`) +- [CVE-2024-52897](CVE-2024/CVE-2024-528xx/CVE-2024-52897.json) (`2024-12-19T18:15:23.357`) +- [CVE-2024-55081](CVE-2024/CVE-2024-550xx/CVE-2024-55081.json) (`2024-12-19T17:15:09.950`) ### CVEs modified in the last Commit -Recently modified CVEs: `43` +Recently modified CVEs: `70` -- [CVE-2024-12656](CVE-2024/CVE-2024-126xx/CVE-2024-12656.json) (`2024-12-19T15:11:39.287`) -- [CVE-2024-12666](CVE-2024/CVE-2024-126xx/CVE-2024-12666.json) (`2024-12-19T15:01:00.497`) -- [CVE-2024-12667](CVE-2024/CVE-2024-126xx/CVE-2024-12667.json) (`2024-12-19T15:10:22.963`) -- [CVE-2024-26848](CVE-2024/CVE-2024-268xx/CVE-2024-26848.json) (`2024-12-19T16:15:07.703`) -- [CVE-2024-2883](CVE-2024/CVE-2024-28xx/CVE-2024-2883.json) (`2024-12-19T16:02:31.763`) -- [CVE-2024-2885](CVE-2024/CVE-2024-28xx/CVE-2024-2885.json) (`2024-12-19T16:04:04.557`) -- [CVE-2024-2886](CVE-2024/CVE-2024-28xx/CVE-2024-2886.json) (`2024-12-19T16:09:30.553`) -- [CVE-2024-3157](CVE-2024/CVE-2024-31xx/CVE-2024-3157.json) (`2024-12-19T16:22:30.307`) -- [CVE-2024-3515](CVE-2024/CVE-2024-35xx/CVE-2024-3515.json) (`2024-12-19T16:19:23.533`) -- [CVE-2024-3845](CVE-2024/CVE-2024-38xx/CVE-2024-3845.json) (`2024-12-19T16:16:50.080`) -- [CVE-2024-3846](CVE-2024/CVE-2024-38xx/CVE-2024-3846.json) (`2024-12-19T15:15:21.020`) -- [CVE-2024-3847](CVE-2024/CVE-2024-38xx/CVE-2024-3847.json) (`2024-12-19T15:08:38.647`) -- [CVE-2024-4109](CVE-2024/CVE-2024-41xx/CVE-2024-4109.json) (`2024-12-19T16:15:08.740`) -- [CVE-2024-47524](CVE-2024/CVE-2024-475xx/CVE-2024-47524.json) (`2024-12-19T15:43:50.877`) -- [CVE-2024-47526](CVE-2024/CVE-2024-475xx/CVE-2024-47526.json) (`2024-12-19T15:49:50.127`) -- [CVE-2024-47528](CVE-2024/CVE-2024-475xx/CVE-2024-47528.json) (`2024-12-19T15:50:55.140`) -- [CVE-2024-47537](CVE-2024/CVE-2024-475xx/CVE-2024-47537.json) (`2024-12-19T15:20:52.377`) -- [CVE-2024-47825](CVE-2024/CVE-2024-478xx/CVE-2024-47825.json) (`2024-12-19T15:59:27.760`) -- [CVE-2024-48514](CVE-2024/CVE-2024-485xx/CVE-2024-48514.json) (`2024-12-19T16:15:08.340`) -- [CVE-2024-49203](CVE-2024/CVE-2024-492xx/CVE-2024-49203.json) (`2024-12-19T16:15:08.537`) -- [CVE-2024-54471](CVE-2024/CVE-2024-544xx/CVE-2024-54471.json) (`2024-12-19T15:25:31.960`) -- [CVE-2024-54476](CVE-2024/CVE-2024-544xx/CVE-2024-54476.json) (`2024-12-19T15:26:43.340`) -- [CVE-2024-54490](CVE-2024/CVE-2024-544xx/CVE-2024-54490.json) (`2024-12-19T15:27:32.170`) -- [CVE-2024-54492](CVE-2024/CVE-2024-544xx/CVE-2024-54492.json) (`2024-12-19T15:36:15.687`) -- [CVE-2024-54501](CVE-2024/CVE-2024-545xx/CVE-2024-54501.json) (`2024-12-19T15:37:07.973`) +- [CVE-2018-9463](CVE-2018/CVE-2018-94xx/CVE-2018-9463.json) (`2024-12-19T17:01:04.227`) +- [CVE-2021-32589](CVE-2021/CVE-2021-325xx/CVE-2021-32589.json) (`2024-12-19T17:15:07.167`) +- [CVE-2021-4314](CVE-2021/CVE-2021-43xx/CVE-2021-4314.json) (`2024-12-19T17:00:28.533`) +- [CVE-2024-1669](CVE-2024/CVE-2024-16xx/CVE-2024-1669.json) (`2024-12-19T17:32:13.720`) +- [CVE-2024-1670](CVE-2024/CVE-2024-16xx/CVE-2024-1670.json) (`2024-12-19T17:33:44.580`) +- [CVE-2024-1672](CVE-2024/CVE-2024-16xx/CVE-2024-1672.json) (`2024-12-19T17:53:20.020`) +- [CVE-2024-1673](CVE-2024/CVE-2024-16xx/CVE-2024-1673.json) (`2024-12-19T17:54:58.023`) +- [CVE-2024-1676](CVE-2024/CVE-2024-16xx/CVE-2024-1676.json) (`2024-12-19T17:58:37.093`) +- [CVE-2024-4059](CVE-2024/CVE-2024-40xx/CVE-2024-4059.json) (`2024-12-19T18:56:45.140`) +- [CVE-2024-4060](CVE-2024/CVE-2024-40xx/CVE-2024-4060.json) (`2024-12-19T18:54:01.637`) +- [CVE-2024-42004](CVE-2024/CVE-2024-420xx/CVE-2024-42004.json) (`2024-12-19T17:15:09.120`) +- [CVE-2024-42220](CVE-2024/CVE-2024-422xx/CVE-2024-42220.json) (`2024-12-19T17:15:09.243`) +- [CVE-2024-43106](CVE-2024/CVE-2024-431xx/CVE-2024-43106.json) (`2024-12-19T17:15:09.350`) +- [CVE-2024-49513](CVE-2024/CVE-2024-495xx/CVE-2024-49513.json) (`2024-12-19T17:15:33.163`) +- [CVE-2024-50379](CVE-2024/CVE-2024-503xx/CVE-2024-50379.json) (`2024-12-19T18:15:23.000`) +- [CVE-2024-53101](CVE-2024/CVE-2024-531xx/CVE-2024-53101.json) (`2024-12-19T18:08:23.857`) +- [CVE-2024-54038](CVE-2024/CVE-2024-540xx/CVE-2024-54038.json) (`2024-12-19T18:58:38.737`) +- [CVE-2024-54051](CVE-2024/CVE-2024-540xx/CVE-2024-54051.json) (`2024-12-19T18:59:21.867`) +- [CVE-2024-8355](CVE-2024/CVE-2024-83xx/CVE-2024-8355.json) (`2024-12-19T18:47:39.363`) +- [CVE-2024-9112](CVE-2024/CVE-2024-91xx/CVE-2024-9112.json) (`2024-12-19T18:15:52.733`) +- [CVE-2024-9113](CVE-2024/CVE-2024-91xx/CVE-2024-9113.json) (`2024-12-19T18:15:21.380`) +- [CVE-2024-9727](CVE-2024/CVE-2024-97xx/CVE-2024-9727.json) (`2024-12-19T17:46:11.723`) +- [CVE-2024-9728](CVE-2024/CVE-2024-97xx/CVE-2024-9728.json) (`2024-12-19T17:30:02.427`) +- [CVE-2024-9798](CVE-2024/CVE-2024-97xx/CVE-2024-9798.json) (`2024-12-19T17:00:16.440`) +- [CVE-2024-9802](CVE-2024/CVE-2024-98xx/CVE-2024-9802.json) (`2024-12-19T17:00:21.353`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 51f9e865a50..18d50b9e26f 100644 --- a/_state.csv +++ b/_state.csv @@ -18261,7 +18261,7 @@ CVE-2006-2488,0,0,6f54a6f0f16e1de529f576960862bf8ab43580a74c356b6100ee85e8188fd9 CVE-2006-2489,0,0,242a1d359f0787c1df44fced3aea299289b6a5ba69340e5e8a0780ad07b933f1,2024-11-21T00:11:25.650000 CVE-2006-2490,0,0,f0684e7fe9d35c222d5c086c6ba01c30aaac684ec4a14694ff0a1f5a659c82de,2024-11-21T00:11:25.787000 CVE-2006-2491,0,0,adb1b23aa6e1a2d956a452456294db4c5dbd9335ee6c993e51df408aafa3121a,2024-11-21T00:11:25.940000 -CVE-2006-2492,0,0,5a834f7aa4d8ecea940f2b1654348ba666511deb6ab564ed9f6ab5a1dac65bd4,2024-11-21T00:11:26.077000 +CVE-2006-2492,0,1,3ed759eb14c03a3a16253580d6ff9e79696cc04a31f13a03b5fcff50e1ad28b6,2024-12-19T17:31:05.543000 CVE-2006-2493,0,0,da14aedac2e0baba513ca93257937ed9fd0b8a6969922952b3168956a33088fc,2023-11-07T01:58:50.130000 CVE-2006-2494,0,0,18896680cda24fe120ab419c96eb9fb6774e95efe330af6945bbd37bc1807414,2024-11-21T00:11:26.223000 CVE-2006-2495,0,0,26a700e14326855689477a2cff89f46ba7f9b883ffc28cc12d3d0d0caf4b630d,2024-11-21T00:11:26.357000 @@ -28476,7 +28476,7 @@ CVE-2007-5655,0,0,6f3aa841b14e54c0cee839611683b1bebc257340fc06d5c64885f468ef4b64 CVE-2007-5656,0,0,97fab523e194ae7f09c0f5a44a98b65b256fdb69784e69085065d3d65c7a3d04,2024-11-21T00:38:24.360000 CVE-2007-5657,0,0,e99e80ca8bcce54896d5349753a77956e7d0eda374cb3be2076bd1184c3271fc,2024-11-21T00:38:24.497000 CVE-2007-5658,0,0,fc0f266c1b3541590fbadbeb29c96b0aceffb0e659b14a59c84972c8a8708c4c,2024-11-21T00:38:24.637000 -CVE-2007-5659,0,0,03416c7490bf7e6679b7ca0312112ca0267f1378d82392943532d0544cb48b04,2024-11-21T00:38:24.780000 +CVE-2007-5659,0,1,cd65b1753825707d9f8b00dc42c79501d2ec4fa564dd3bc6eaf1856d25692d6d,2024-12-19T17:30:59.963000 CVE-2007-5660,0,0,fa1478386e71651eb1e7ea1b3adb5d400da533a65f3b0f546fd99e2dc10bf125,2024-11-21T00:38:24.933000 CVE-2007-5661,0,0,054e881e9a5732c629b0315693c055b273d7ea504cbc78893ce576846abe63f3,2024-11-21T00:38:25.070000 CVE-2007-5663,0,0,5b40375157e96b82d382741a4a12d027cab209764aaf756004d82bd07d959ad8,2024-11-21T00:38:25.220000 @@ -30146,7 +30146,7 @@ CVE-2008-0651,0,0,136b007989d00f076c5aadbb57bf3faef0a1f6d2f5b1fd90efbdc6eb5d66f8 CVE-2008-0652,0,0,e1b5098ee73ead3a6da866ea8f0d8938564bfd54b581ff9921a725d51c1d79df,2024-11-21T00:42:35.893000 CVE-2008-0653,0,0,ac10199bd3e8be80806b3b0ef3cb993b37caa54ac48231f3a89aefea5344c234,2024-11-21T00:42:36.027000 CVE-2008-0654,0,0,8f8a257e280e4cfbcfe47eb53b4ced45ed0ab4be39508286000f2dee4a69a569,2024-11-21T00:42:36.163000 -CVE-2008-0655,0,0,4a7e83ea6bad34dff670a855d33ba5c2f11f2d083c68920e1c4332c7c5470bd2,2024-11-21T00:42:36.300000 +CVE-2008-0655,0,1,aa7b20335d49475d558ee59fa956b857bdf802bbf649cb8549d7fe7e0dc49cfa,2024-12-19T18:02:49.240000 CVE-2008-0656,0,0,2128d7dbede797e54ab38a7b2ed55ae5c8094b34bd2c4a125166d00515d46562,2024-11-21T00:42:36.470000 CVE-2008-0657,0,0,c5003decd03b25f7a656b2978b2ab0d711e91f8989dcf5004e0897ec3d9c006c,2024-11-21T00:42:36.643000 CVE-2008-0658,0,0,73032ab8ea63c74a55147fc441b6a14efbbae9773a74394fee627ffa1b5b7ae2,2024-11-21T00:42:36.807000 @@ -32429,7 +32429,7 @@ CVE-2008-2988,0,0,537d83846b733f191b5bd4cf9a6e680d0442cb19ac8e074de5196fef91675b CVE-2008-2989,0,0,a564e6d73db62c279491a9c9eed59c9b55085d1c4337edf209af578b122e553a,2024-11-21T00:48:10.743000 CVE-2008-2990,0,0,eba446fdb90523cef752ec8b2816ef2f0a0180e9194e5450344ed618d41db604,2024-11-21T00:48:10.877000 CVE-2008-2991,0,0,c06441c8d15072989775165f31107538fa46ff9c6d70cb1892d9c64fc09aae99,2024-11-21T00:48:11.017000 -CVE-2008-2992,0,0,62a1e9f91ec5541c3d2b40c651ed2442c784c7d0921af7b789534cb14758ef35,2024-11-21T00:48:11.157000 +CVE-2008-2992,0,1,b8bd61a1f7d318f392821e49af14ab395a24cf27d16f7b736d79fb5807e28f1f,2024-12-19T17:32:47.670000 CVE-2008-2993,0,0,4ff6dae709cc34854d1f786ba3620c8013380ad46239c929f68c8a8fa52a8ba5,2024-11-21T00:48:11.360000 CVE-2008-2994,0,0,0597746e117c9d7156e751fea86a7abeddefd2ede916fe2b98b5bae313c92409,2024-11-21T00:48:11.503000 CVE-2008-2995,0,0,8add2cd5a741a53ba8e416df70fbb49265d426028ba4fdf56ec03a42ffab5827,2024-11-21T00:48:11.647000 @@ -32864,7 +32864,7 @@ CVE-2008-3427,0,0,36b5330d2885f7444ccc42edfe8d8a4281ed1cb5eb7adb53ebc56e50f5fd90 CVE-2008-3428,0,0,86993c84bc06c2dac56bd7938b3ed64dfe851b78603c4c32122aacf9222c12ce,2024-11-21T00:49:13.843000 CVE-2008-3429,0,0,9f909a843e18995dcfc6fe60257a3a5247b8c38c6d6ac3b5a45453db2d9b9b80,2024-11-21T00:49:13.980000 CVE-2008-3430,0,0,40cbf522fed59873b4157ed9893abad669ba1efe62ccedb9070d8130b864b75e,2024-11-21T00:49:14.137000 -CVE-2008-3431,0,0,2298c6240ed4df0c77d1c8d1090099915adde402926e67b3ea5cdf71723059ff,2024-11-21T00:49:14.297000 +CVE-2008-3431,0,1,ddf55ca11933fc707607153f3f530baeed5c7dd8f5ef147249972335b9fc6399,2024-12-19T17:31:40.990000 CVE-2008-3432,0,0,22b35749a04694b0ec3b29b5933a1b71c257078f3c118a19c15ce532fa1bf0e3,2024-11-21T00:49:14.487000 CVE-2008-3433,0,0,d4c3710822272a55238b4b91dd7b9a729bff55cdefd7602b07ffdfffa86cd5b0,2024-11-21T00:49:14.620000 CVE-2008-3434,0,0,c7a5a50a0963dcc3f5c78b411217b06aa7bba74c1381f6590ac1999abe7fd22d,2024-11-21T00:49:14.757000 @@ -37237,13 +37237,13 @@ CVE-2009-0553,0,0,b20dd7a5c1daab57563c8b26fdc105e3ce3dc06bf26fff8adfbb69436962ae CVE-2009-0554,0,0,00396083ef6d95d8939d44f293e7ad4852420afe05fe3e43f606d976ae05bb03,2024-11-21T01:00:18.450000 CVE-2009-0555,0,0,c3eb664d5a34a861ca41a8c5012e7b76ee5fa8b437df3478f9d8030932dc0cef,2024-11-21T01:00:18.573000 CVE-2009-0556,0,0,ac776ce57bd85f67097b49d4a4d5697e2c55e1bc69a3194e5cdf42501a52b8ce,2024-11-21T01:00:18.737000 -CVE-2009-0557,0,0,c218070f1ecc5e28d0aaf21a1fbaff0d1950c6d76bd4c738f5e5175fced6501b,2024-11-21T01:00:18.907000 +CVE-2009-0557,0,1,6a27a13710792f6f1808c3deb9c5367bde04a877df9168839587826a0fcfd703,2024-12-19T18:03:46.290000 CVE-2009-0558,0,0,5119a9e24c47b1fdfb208d8ab6ac68ff32afd62b494907b9f6e6444b668cfb1f,2024-11-21T01:00:19.057000 CVE-2009-0559,0,0,af05df69472720f637ce2097d0f27932c011f28610e275ecfffe7ad897cecdb9,2024-11-21T01:00:19.210000 CVE-2009-0560,0,0,9aaf8de775ddc3eca7313902d3a90023467a88a05b13b79f0188d14bb8e8f0f2,2024-11-21T01:00:19.390000 CVE-2009-0561,0,0,d9abfee8995038f4698ff45864e9844cbb19b4488ccd525e25fbe0cb26713a1c,2024-11-21T01:00:19.540000 CVE-2009-0562,0,0,74a5c9d3bea04f857f1e8ed0fedfa2c8e392fa6a72654185cf956ff8d84cbba3,2024-11-21T01:00:19.693000 -CVE-2009-0563,0,0,429e7a30afd5ed1303f97e1c2f34efe9b26fa83163d2a022fe3d0368e42fe5cd,2024-11-21T01:00:19.833000 +CVE-2009-0563,0,1,525be6711e6d9178d89fb59261549dce357e66684e95d3ff61cdbb9a8c74a62a,2024-12-19T18:03:17.567000 CVE-2009-0565,0,0,bb93ce095bf58800d8082e86f2e8aed8b84a9d1163698696a58bf7207d1fb74b,2024-11-21T01:00:20.010000 CVE-2009-0566,0,0,e781d563cc74c8560c2e588eb99d06c1996be7195c64242cb11c2c41a709cc59,2024-11-21T01:00:20.157000 CVE-2009-0567,0,0,d7f934da1257a6334917753732a809ec68b696be2b4b849525322fe4a65c7ec2,2023-11-07T02:03:40.077000 @@ -37591,7 +37591,7 @@ CVE-2009-0923,0,0,9d6bc7aa2f532aeca2611a212fd1d01d7fa3b2e1808aa6c8131b0c233a67d8 CVE-2009-0924,0,0,1f976f6c0a294c03107a3b7fceebb6a46d75e27be1795d464608e48d6f4508d4,2024-11-21T01:01:14.270000 CVE-2009-0925,0,0,feec22dc0d278fb3ecad4119f3bcb4e6cc9aa8eb71fe8e012c6b352e24e4f2c1,2024-11-21T01:01:14.407000 CVE-2009-0926,0,0,912a33629cf2cefe3556a8ceedabd16b35be5a0efeac5595123bbfd790dd486c,2024-11-21T01:01:14.550000 -CVE-2009-0927,0,0,348358e9a0689d1e61b47ba18f3b33f4cdfb0200944fa39bb040314cd8a9dfea,2024-11-21T01:01:14.700000 +CVE-2009-0927,0,1,e56abb128a0c96ef83a2179be3caeba16255df6ddc6cff7c3f9f9573bc3c0f3d,2024-12-19T17:39:50.787000 CVE-2009-0928,0,0,c0fecc6255e02786116ce96b8321383c3b1ea994544a390fa423376b66ec4763,2024-11-21T01:01:14.860000 CVE-2009-0929,0,0,ae1f2ef9734ca0f38acbfbdcf2a24d40ade42afc84b7184d502d35b14ab58447,2024-11-21T01:01:15.020000 CVE-2009-0930,0,0,eff3d813782bb023f22ae8edfc659d7632990fa0410bacaa1567fb706b95087f,2024-11-21T01:01:15.157000 @@ -37779,7 +37779,7 @@ CVE-2009-1107,0,0,9f984f1d552809e3502a8d424df012452c424bb071b3674bd62f7f060b9afc CVE-2009-1119,0,0,6cd28efaef77462515a71cfbf429745ce99878b6ed3598eeecba677f64cc604e,2024-11-21T01:01:43.353000 CVE-2009-1120,0,0,c65612cc95a107087cf491e071dbb8aa1777c5869f16018deb414b800cb0d790,2024-11-21T01:01:43.470000 CVE-2009-1122,0,0,dd9a025141390140687914be431829765ea690f51d3d9d1d997baf93481b450f,2024-11-21T01:01:43.587000 -CVE-2009-1123,0,0,7b919942e149abdf13b62ad351b04efbb86d8feea541ded12eb3bd8b257f8ffe,2024-11-21T01:01:43.703000 +CVE-2009-1123,0,1,16ae261380304187505ac950d1eab0ebd6522fe032be5e7ea2bb02284b1edc77,2024-12-19T18:05:03.943000 CVE-2009-1124,0,0,4c0a153e4397a654869b6b4e571e94ec632b7b7b29937677dba776cfdd7ae61d,2024-11-21T01:01:43.833000 CVE-2009-1125,0,0,b0c57dc70759e70dcf7b08fe9a6dc4c4af279fae057dadcbcf1e9d1a8568ef57,2024-11-21T01:01:43.953000 CVE-2009-1126,0,0,c4c937b3d7d1d545f5a680fe98fb2de7f23bbec19169079dc935b9c7162f361b,2024-11-21T01:01:44.067000 @@ -37806,7 +37806,7 @@ CVE-2009-1147,0,0,e8ee82485ff79f01150e552ea664da6f4f85db4d4d909532efadaa8bb655d1 CVE-2009-1148,0,0,73c524e781a33fdf310b791c4655bc1edd06f3932bdb000dd6b0106c326ac680,2024-11-21T01:01:46.780000 CVE-2009-1149,0,0,86150a5401daf7352a0efc0499dec4e9c89decf9c160d306f63413231061a88e,2024-11-21T01:01:46.947000 CVE-2009-1150,0,0,5cc349a9e3971324cb61cc0a6a51047172880f8f6b734e3a6e9a0b75bb662523,2024-11-21T01:01:47.097000 -CVE-2009-1151,0,0,bfb8e3c1eb175a928287f378fba659857e7df5673a397c34bd215d677b811073,2024-11-21T01:01:47.257000 +CVE-2009-1151,0,1,766b9eae5abbf9baffa9696ce75d56c0fea94d1c374e7b3bebf96d508b5fd9b5,2024-12-19T17:45:24.963000 CVE-2009-1152,0,0,358dcd6e18da03e24a75a84ae4626b5b1ad88e6ee4c0bf8b08901e7ef26713fc,2024-11-21T01:01:47.427000 CVE-2009-1153,0,0,9ee254420d37f17a680057409bf7721a86b9060ce786c56f620e61ff9fdc3de4,2023-11-07T02:03:49.947000 CVE-2009-1154,0,0,8e6285222d5b3617dfea50193d32ccc34fed331bfacf02edfd1f34ae8f7b671a,2024-11-21T01:01:47.580000 @@ -38496,7 +38496,7 @@ CVE-2009-1858,0,0,a947562c2f4d341ff4bd5a2dd9777fab23b49bfaffecdc4e1c8653251a46ec CVE-2009-1859,0,0,76b99b843935363a7476fd12518dd2aac1efa47de7f3cb6565829d25fbe58138,2024-11-21T01:03:33.137000 CVE-2009-1860,0,0,fd3ff584e87006aff5502c574840024af55633748de4e9230257eb3f0871676a,2024-11-21T01:03:33.310000 CVE-2009-1861,0,0,122188232cd97a0ff9ef5d3471eb3c316cd4c746a1cc9e653924452ae1ac904d,2024-11-21T01:03:33.460000 -CVE-2009-1862,0,0,43c7a4ab5ead8f39a6e38ea4bf029cb95673d2fb49461e5b910ee9b007f56359,2024-11-21T01:03:33.637000 +CVE-2009-1862,0,1,1678c501f8239e1eac07a1871d249d979c1f3f8acc4e9915cbb13e70206fe790,2024-12-19T18:05:43.307000 CVE-2009-1863,0,0,87041bb148e306b25d826c5f36ac98a62f20eb70a752fb2f002d42120a3f3dd1,2024-11-21T01:03:33.847000 CVE-2009-1864,0,0,f2ac55e4d92929ad21f3d16dc80df723927292502611f109469492562ec1f7a8,2024-11-21T01:03:34.027000 CVE-2009-1865,0,0,292fff9c528667e2d0058a47481fe7a2039f0d27a838adf41f9f6e84f28461f3,2024-11-21T01:03:34.197000 @@ -39727,7 +39727,7 @@ CVE-2009-3125,0,0,80ea3dbe2945e7b4613662e652337d1498333b563c33ea7d1452f997613b51 CVE-2009-3126,0,0,68793012aa4a203bff0718b13df909efdb73f3845da1f2e654e99f9cbc9eaf93,2024-11-21T01:06:36.703000 CVE-2009-3127,0,0,595e6e98bcf671536b38c36fc8a193e07fcb81340ddc526ac95102a288213813,2024-11-21T01:06:36.843000 CVE-2009-3128,0,0,c32dd761de8b3483497ff785594f3a41198ee20742d5b853d3b8dd21646ebe42,2024-11-21T01:06:36.967000 -CVE-2009-3129,0,0,269295f2e473c70af23d65cd44fb288ce0d23322724b4dc0a60c66aaf3f4c041,2024-11-21T01:06:37.087000 +CVE-2009-3129,0,1,cab192f72ff0aac623c20047941399fe2c8caae1924f4245998662d09d3b68be,2024-12-19T18:06:07.990000 CVE-2009-3130,0,0,79e206d93210d90c54a93d10dc5b4b1e380a7b9c2c2807021ff01b94ca853843,2024-11-21T01:06:37.233000 CVE-2009-3131,0,0,331d402b4e0b17532e8b5d6d14151cc1f35f19159913a9488100bf821c4a0220,2024-11-21T01:06:37.357000 CVE-2009-3132,0,0,4e6e67694be65b66dad31ac4c17c9b708d842b9812f0cc1313553464e3b9041a,2024-11-21T01:06:37.483000 @@ -40542,14 +40542,14 @@ CVE-2009-3949,0,0,9bcf691068165b23b88dc2124f65aa901c161af5c40eb85cb4b34cc239b647 CVE-2009-3950,0,0,eb65599d7eecff9e169c459911fb573f87593345e55a3bb29d7e974abe49168f,2024-11-21T01:08:35.337000 CVE-2009-3951,0,0,797c8ec47f0f61270a91fe527e1babc42383d8c99d8994d33e7c64b79917696e,2024-11-21T01:08:35.473000 CVE-2009-3952,0,0,d1011522b20517148409be5a5aec8c9c310f966f52dc0951edb65389ff7fb3f0,2024-11-21T01:08:35.617000 -CVE-2009-3953,0,0,d386813ae950e64002b1dae5e46d2557f47b802648da175f3d70528b8354a526,2024-11-21T01:08:35.723000 +CVE-2009-3953,0,1,0a86cacd6ebe71665497b482c9d9522ffb9397771309d4033b03b91b3d72988a,2024-12-19T18:08:14.627000 CVE-2009-3954,0,0,4bb592500d431a68289417b14c4e99624c5ff7823cb567a1b656d1736e9e0dec,2024-11-21T01:08:35.870000 CVE-2009-3955,0,0,96c1b00e36584f12de84337f108c42d79b0fb5687406e9a6766574a522a010a2,2024-11-21T01:08:36.023000 CVE-2009-3956,0,0,4ba646051bdfa34cefc657c93fafdadf0315add9f3de0cb9c160be28ac40000e,2024-11-21T01:08:36.167000 CVE-2009-3957,0,0,702fc28e8c9e417e88daf4e1394bafd0864f091675a5589b374bdc8322490a65,2024-11-21T01:08:36.317000 CVE-2009-3958,0,0,709058b652a413e6fd7f513e68f60ae5c9c364eda27886095d5d83669b627350,2024-11-21T01:08:36.470000 CVE-2009-3959,0,0,1f41e5aa60350b547b3fa43259c3de8d87db6beb4cb1cabb27f05c30c628bd81,2024-11-21T01:08:36.613000 -CVE-2009-3960,0,0,a53c069b57120d0e719e6f7b3bb4f9bc484511c533cec7a551dd101f2baaa870,2024-11-21T01:08:36.757000 +CVE-2009-3960,0,1,bcdd13d96b1f1febfd4838c11dcf189ce96a164a6ac45618cfacb6c3fcc4dbe9,2024-12-19T18:09:00.497000 CVE-2009-3961,0,0,a10d1b6fedeea42c2cebe6a0d7f54b5a1aa0f61a360c3eaafab8fa3c807769a3,2024-11-21T01:08:36.877000 CVE-2009-3962,0,0,5d45ee67756faa1b6ebc9702c91e3631d10dbedee8046b1050f3573e306da029,2024-11-21T01:08:37.017000 CVE-2009-3963,0,0,3f9642ea26b7e9879f0f4bff388a45a2212dd477020c100250b258df0731b69e,2024-11-21T01:08:37.163000 @@ -40904,7 +40904,7 @@ CVE-2009-4320,0,0,002bb819beb54551f21b082b7b2c56239466715440bd50f50ccba2bd7d384a CVE-2009-4321,0,0,771a389a961dec02f119cdf31b05df576ab468d436ba3a851ef4f1a65341f892,2024-11-21T01:09:21.843000 CVE-2009-4322,0,0,1dda00491c226aba849f1f3b629d1207d7a2585714ac2d893d4f085d7bd7f87a,2024-11-21T01:09:21.970000 CVE-2009-4323,0,0,2333cbca2cdffb09e0b81e353de1aaafa11e93829ad31c61267578da96cf382c,2024-11-21T01:09:22.093000 -CVE-2009-4324,0,0,5e53e3f6f5c671447ddf5670e9de67a409374a1be53b167fb9bc8da0e6c21388,2024-11-21T01:09:22.217000 +CVE-2009-4324,0,1,f032d665ae624c48a5dff6bfccb583707704ca45f3bd74f724c2483e16186638,2024-12-19T18:07:41.467000 CVE-2009-4325,0,0,1224300f5ac1a3e9bab1c5b5daede8823a2eea9e3745303a8416d648e10638cc,2024-11-21T01:09:22.337000 CVE-2009-4326,0,0,7ebd5bab2137790ca8bc6368b8addd2a90025992fa600f128a7e1628a814fbeb,2024-11-21T01:09:22.483000 CVE-2009-4327,0,0,ad890c1a563c67e188bcab218bfe540e13ca33bbe27579e6c8547df5c1590280,2024-11-21T01:09:22.610000 @@ -41917,7 +41917,7 @@ CVE-2010-0184,0,0,aa4a3d6b08c4bd7a43ed95c2d69340bb056b51fa65054a091c356b77d012f8 CVE-2010-0185,0,0,f0dc1d16990633198cd3e94fe3fe12054d17aec9af85eddf035f226473a79b5f,2024-11-21T01:11:43.410000 CVE-2010-0186,0,0,7c9e69102e2d32717d2f8f57b7039e1ed1aca48c1ada329442a526d605d4d34c,2024-11-21T01:11:43.517000 CVE-2010-0187,0,0,acb00468f77680c23b1a39f1901c681ab03be9e84d63359a9b8fbe2874537c5e,2024-11-21T01:11:43.643000 -CVE-2010-0188,0,0,bff2da66c3a924b8b8223fe86ee088180e37ebe1dd0a4f97e99e27df5dfacda3,2024-11-21T01:11:43.760000 +CVE-2010-0188,0,1,2a9aa33e416664aa7e2301562881d1fb6b11348529c7df1933c561b32595c68b,2024-12-19T17:46:35.733000 CVE-2010-0189,0,0,884f1817673e5b34188d5b8239479a2dec7f71450de7969399caa1b04e3cbae2,2024-11-21T01:11:43.870000 CVE-2010-0190,0,0,88931488b0f0ddef044975aa8d959e1204f361eac5bcc88859423acf0675255c,2024-11-21T01:11:43.980000 CVE-2010-0191,0,0,4aac866e1b311e08f728f82250d1d7ca7705f84acb802f35352aac74ccf9150e,2024-11-21T01:11:44.087000 @@ -41959,7 +41959,7 @@ CVE-2010-0228,0,0,5877de212603510a2640cc816cb7d713ad98733e52f454098927dec8d47b16 CVE-2010-0229,0,0,d4d11a34275ca813b91387b0ed7d0c2a145a9fdab4826b2795a5956a104bedc0,2024-11-21T01:11:48.370000 CVE-2010-0230,0,0,569e994745de5e46d52faf0a328cd8c2fcca399f5c4a6a4e5d013ed0e9c2ed39,2024-11-21T01:11:48.510000 CVE-2010-0231,0,0,a2b5f696ead645ce177d3f75089302b9506b834d8f1ea18026b943a391bf1658,2024-11-21T01:11:48.643000 -CVE-2010-0232,0,0,27feac9a1b371ac6ffb461006c4c9d31a232a61d5c6d43154de0cf1cc0ccdea4,2024-11-21T01:11:48.750000 +CVE-2010-0232,0,1,78bd62f42155dc17f0917355730911850bf96f90fea6bc0990e17f22c523e710,2024-12-19T18:08:38.630000 CVE-2010-0233,0,0,1c3a6603a7b718759c9e3e8a80c6e789d2fdcc46fa3c3acf87c1a06f83bff33d,2024-11-21T01:11:48.893000 CVE-2010-0234,0,0,3b1577fcbb783180a2fc3c9b55a102b366b4f9788553e484ca557ce30ef611d7,2024-11-21T01:11:49.003000 CVE-2010-0235,0,0,b710c1c5e05787345711e2cd45aa6778b3033858c1039bdaa3414bedd1fdcbd4,2024-11-21T01:11:49.117000 @@ -43574,7 +43574,7 @@ CVE-2010-1867,0,0,9f511e9d4743436d028f80bf3a69cd36d72a2cfaa397728970aee579be933e CVE-2010-1868,0,0,3d7bec493893e4bf8f5c8d1dc6d63c95895080fe8f9f814380bddb9947a55afd,2024-11-21T01:15:21.637000 CVE-2010-1869,0,0,c2c9517c7ad4afc660a675e34a2d2eb1147666d0c5f6482c1a635eb8c5d5b121,2024-11-21T01:15:21.780000 CVE-2010-1870,0,0,ed481f41af60eb47098a8d32f7497645bede0c2a4caa8ee0ee92a02a51a0fd4e,2024-11-21T01:15:21.907000 -CVE-2010-1871,0,0,73e21f4b629b8404ee71396effbc0028b74e2fb0a0857844ed58f9408d6116bf,2024-11-21T01:15:22.060000 +CVE-2010-1871,0,1,b2cd1c87fc516d7b9d4101ae1f485b02beb2ee93638bc65a8685c3d41c299adb,2024-12-19T17:52:39.207000 CVE-2010-1872,0,0,ef54811d9caa36484e911a7bde2cab117116189f0048ddeea97e9c46face8c27,2024-11-21T01:15:22.223000 CVE-2010-1873,0,0,c5c6b98a9f8803f189cdb03e7e580f58bd74f97487bafcb371dd573aae7446cd,2024-11-21T01:15:22.360000 CVE-2010-1874,0,0,8f35731a67abc4694000e5c9e856adb1e376effbfcf3d409833a9e7b032745f8,2024-11-21T01:15:22.503000 @@ -44261,11 +44261,11 @@ CVE-2010-2564,0,0,f2e5f08342cb69b3d173d407fc1dc064ebc255a50b97e6599fbcd1aa378db5 CVE-2010-2565,0,0,4b2405b1e711e4c48f7b609f2747a6fc270a7b65cb87c15be6e6a9a03a7fc093,2023-11-07T02:05:40.273000 CVE-2010-2566,0,0,50726a7e56aba1c87abca675b53d9b8318eaf16dd20f329404a4917f2c06fc7a,2024-11-21T01:16:55.070000 CVE-2010-2567,0,0,ca4071cc7e04815e3bb103094ca2675119988ec1355897abb0baf142236a83d7,2024-11-21T01:16:55.177000 -CVE-2010-2568,0,0,47c9e2de61dc2411b16744f4857151e3543cd4a9c8cb4e1bba9211b2c64a193c,2024-11-21T01:16:55.293000 +CVE-2010-2568,0,1,28cea423bf3956b489af411df95e0cb5ef99d5f877dbff9baddc226d57577e7e,2024-12-19T17:52:28.123000 CVE-2010-2569,0,0,3fcc14fc9fd4127f3e62283c556f647e3bf90d3c09b9aad6c474cf0ce329997e,2024-11-21T01:16:55.423000 CVE-2010-2570,0,0,defd634aaf52e285feb09c26673c2bb653a0d1f5cc90ddebdb27d62098f073d8,2024-11-21T01:16:55.527000 CVE-2010-2571,0,0,8df54066b3ca2a146709bd05e0adc027ad74b233b1de20ae940d2478110f5cf0,2024-11-21T01:16:55.637000 -CVE-2010-2572,0,0,2a9e275c2d358491a21fd9427757500349020407bb57b6598d375502a7be4512,2024-11-21T01:16:55.737000 +CVE-2010-2572,0,1,5aba15a1db867f42b9cb12ed920c60dd3d7a30fd780fedb7861b94a91fcb7a49,2024-12-19T18:01:47.840000 CVE-2010-2573,0,0,66bca0bf4246c3ef12da4fadc931aa0ee6203524cab88fa4042bf03240b40458,2024-11-21T01:16:55.843000 CVE-2010-2574,0,0,42ca530ffa0d07c442deb4c9e5813bdf1b6bfa5e4e9230645dc696f814b5cbe9,2024-11-21T01:16:55.953000 CVE-2010-2575,0,0,b8371893598bd6e2df34f6be45b922062f12d5fc52abc43c289f97fc21a05616,2024-11-21T01:16:56.110000 @@ -44540,7 +44540,7 @@ CVE-2010-2857,0,0,be18323727fea42f16704f06516647c80f09de08423023428e60a2970651f8 CVE-2010-2858,0,0,104f733debcbdc7c702241debeb3f9855f9eff6698efd53ade0f5da0341126dc,2024-11-21T01:17:30.763000 CVE-2010-2859,0,0,64797eed88b245b1087825e99e18ca02524b0bf488d9c7f7d7d990ca94f82515,2024-11-21T01:17:30.927000 CVE-2010-2860,0,0,0d38e96fabf75b08514a885293aade779d8a0713406cde87f9d680d9b0041e26,2024-11-21T01:17:31.073000 -CVE-2010-2861,0,0,65e14f42690ade73d760e00a3a9efa6a90b39e9cfb89ce55a57e6ab0ccfbb227,2024-11-21T01:17:31.210000 +CVE-2010-2861,0,1,c70e96d19d2acc106aa618670a348c34e4cb6465121ca3a0467e35baa21ac62a,2024-12-19T18:00:44.410000 CVE-2010-2862,0,0,14bfa1db72fbbf0403c78f573bd5b980f42b59c2a7b9232af894763fffb7a481,2024-11-21T01:17:31.327000 CVE-2010-2863,0,0,431b768bc58be3a4c2fbc2617d864204fd2b05f9bdf55d5e457f0e5a8d381f84,2024-11-21T01:17:31.440000 CVE-2010-2864,0,0,b2c3c491afb62962a91cd1331f2ff2f0e2022db1e77d0f65ce27da1fa2337627,2024-11-21T01:17:31.550000 @@ -44562,7 +44562,7 @@ CVE-2010-2879,0,0,5fc04c9ca9d1663006789df490b9fcdfe79ce6fac87dc894cfded45cab22cc CVE-2010-2880,0,0,d2b7734ad627f37ef8fe2803806d21e25d43a0de15d8a882c08700a6efdb29bf,2024-11-21T01:17:33.320000 CVE-2010-2881,0,0,18f58a9723815258be9fa4085d9210a3db1dda107db0bd05e7e0518c27abe475,2024-11-21T01:17:33.433000 CVE-2010-2882,0,0,dabe1cd38c6c928834abd92951adf41db39c6996383c62385d881d75ea025e52,2024-11-21T01:17:33.543000 -CVE-2010-2883,0,0,42ef6c56a24995ffea2dadf1e86b9475d9aab2249e653df680a9ece57c012528,2024-11-21T01:17:33.657000 +CVE-2010-2883,0,1,c305e031590f720d7acb494e23592637e63b54c748d4c3c965f4713a3458851b,2024-12-19T18:19:37.077000 CVE-2010-2884,0,0,3a1844ddcf06cd8d84dd55a3fe0b94e3d8581ae863fac77d0e6276f53777e9a9,2024-11-21T01:17:33.803000 CVE-2010-2885,0,0,e1216d1855c1fac07fe10423fe7a7c39331fc0cc31ee1fb86306faba311a5758,2024-11-21T01:17:33.957000 CVE-2010-2886,0,0,ac5abb2cae8dd9afe807834dc0c18381efbdef8f6111ee040220cc51fd747e32,2024-11-21T01:17:34.070000 @@ -44998,7 +44998,7 @@ CVE-2010-3329,0,0,f4ec764214ea7e65d669b1685a5ffa0b4676fee832de6d3ab844acba8d18ec CVE-2010-3330,0,0,a2f8d14c0df9da41fabfd7bd10619ceda580d0df56485e750a9fd593b3d39475,2024-11-21T01:18:31.500000 CVE-2010-3331,0,0,52fc93ed5792397e57eb1165769c4292d40fa7a30d07a5e5b6f7ad3b18979abc,2024-11-21T01:18:31.627000 CVE-2010-3332,0,0,d49df4537a2cf96939e1e3281f7c51dd43e1b3f4b47093bdb6af3112e5785c66,2024-11-21T01:18:31.740000 -CVE-2010-3333,0,0,360ee57ebdb95e3e1e66e831bee0dea02b355e971fb2560d510b5650eb0c4346,2024-11-21T01:18:31.870000 +CVE-2010-3333,0,1,3c75b763ea57193e44d7c86e6a279722d8ec5621165309b1416a61ddc957cbcc,2024-12-19T18:20:37.733000 CVE-2010-3334,0,0,16c4e26bbaacf1d14532d81120116ae55958620b2640120a44592373b03fe02c,2024-11-21T01:18:31.990000 CVE-2010-3335,0,0,929523f22f18ad59a3f3ff621aca7c93a9a6d0c5080f5f327fe75ed42afea14a,2024-11-21T01:18:32.100000 CVE-2010-3336,0,0,7cf970ce7edd9624a81e4ba5bb921251b97c95bc65e8add1c9a2ba11daaf5d30,2024-11-21T01:18:32.210000 @@ -45959,8 +45959,8 @@ CVE-2010-4340,0,0,e7c6d5363512701f9d1e02d8c6dad2444d8d88c3f312d2535af66988f99584 CVE-2010-4341,0,0,fae206a83f14aeb5cd3630903d4abeeb04d2509bb0d6b7f78a1eb65c322d3d47,2024-11-21T01:20:44.133000 CVE-2010-4342,0,0,2d94a64a5f41fa0efe2d8ecc4ae453c7059c18654a78ea4b98dd6505ab00f3e1,2024-11-21T01:20:44.287000 CVE-2010-4343,0,0,60b3b0018afa4595a681a40a996bedd305d0344ecd6e64ed3568fd50f3fa636b,2024-11-21T01:20:44.403000 -CVE-2010-4344,0,0,27fd854cebc25f83d79aafff2cbdc08353d33197f0f45e49adb4995c96422701,2024-11-21T01:20:44.540000 -CVE-2010-4345,0,0,5a90c69e36b5604d0ba8495acbcd64a0833dd1ec26cb0c9811bb35872158d5ff,2024-11-21T01:20:44.713000 +CVE-2010-4344,0,1,a50f1ac6841c70e5198e2fe8f1d706ccfce1479a7a36c8930f062d6630c99d01,2024-12-19T18:21:15.367000 +CVE-2010-4345,0,1,48fcc722b49f129f984e0b196d2cd1a1e4aec93780e73df3a96b296e8142e8cb,2024-12-19T18:21:54.323000 CVE-2010-4346,0,0,15b2cde90bcfb4d83d01a6af5bba96bc1cd9a3810235d5a243cd14165c230cea,2024-11-21T01:20:44.853000 CVE-2010-4347,0,0,8f7fb218a11b84224dcd84580acc527eb87f87e8b8f10d42273cf8915c1930d6,2024-11-21T01:20:44.983000 CVE-2010-4348,0,0,8efdf52914dbe89eaa2cba1c0905f19a693bc3737adee5530d9cdea44f447a68,2024-11-21T01:20:45.110000 @@ -48658,7 +48658,7 @@ CVE-2011-1885,0,0,235f5b652586ba32f0bd01e8de671f3c772de402ffe9048c70f02161856a50 CVE-2011-1886,0,0,7e99cc50a9ff8fa4f67273ddd85dd2af831f00787259b64e0deb8d27b77ad202,2024-11-21T01:27:15.020000 CVE-2011-1887,0,0,0abfcea21404f3164abcc2648b58c48ab325dfb26277143b725f8917df88c50c,2024-11-21T01:27:15.127000 CVE-2011-1888,0,0,bd6e8216150e507a64e54855aa48a53c62997315e0740884638c8736ac1a5849,2024-11-21T01:27:15.240000 -CVE-2011-1889,0,0,0ff562f34085242432959a60f3106b6981b850cde8a4e352d9b989d2128be392,2024-11-21T01:27:15.353000 +CVE-2011-1889,0,1,98100233667cf0d8cb82b9b50f9498bc24cd3e3f0712a2ca96b8a0bbcd178947,2024-12-19T18:50:04.540000 CVE-2011-1890,0,0,8508aefd4e14f59123972755c57ac69988b243cde33c5bc2e5a1b4d1c2271418,2024-11-21T01:27:15.467000 CVE-2011-1891,0,0,a8dd73d68546053eda69788c01b3accba8d8ab166dcecf18fb161bde4313605f,2024-11-21T01:27:15.570000 CVE-2011-1892,0,0,6f9ae4dd2613d7bc25975cb5fdc8ee5ef9f03baaa7c664a5aec27f0ecbdf6338,2024-11-21T01:27:15.677000 @@ -48770,7 +48770,7 @@ CVE-2011-2001,0,0,3bbd163b6868de3dff6faeba5634c236647bfce9a34d5e5a49955e622926f0 CVE-2011-2002,0,0,396d416a091378def62d10739d567a14e9ca3bfddf6cdd6b8e0ea10e510f6d2d,2024-11-21T01:27:27.923000 CVE-2011-2003,0,0,73d35567751c6a0bd3b8fe9348e98bf39cd2adb3add9a643364bb984f742b628,2024-11-21T01:27:28.037000 CVE-2011-2004,0,0,a1b7e379ab2633af06e3ed47a99b84667ac50498c1c8531e38308b40e4578f52,2024-11-21T01:27:28.147000 -CVE-2011-2005,0,0,f101996308f783e6838a69762f868c2890a10854a64109bd41be2932b6cbeafa,2024-11-21T01:27:28.260000 +CVE-2011-2005,0,1,4334c67ee583db30a93d2049949a19f104bc4cda9e1c1d00e3d188e5f90c71f1,2024-12-19T18:53:05.397000 CVE-2011-2006,0,0,7735556bfa19b55ad9273f7f4b99b49944d6e7dfd78fd879b832e6f0a75a39df,2023-11-07T02:07:19.323000 CVE-2011-2007,0,0,2fce2bba6ecb79bcfad7ce04fb149e7b1c06f03ccc7aaef952de4174e3c60c50,2024-11-21T01:27:28.390000 CVE-2011-2008,0,0,20985c4bacd3524e23ed915cb3c019e0509a8b7c0f84323f08579c52662414ef,2024-11-21T01:27:28.497000 @@ -51961,14 +51961,14 @@ CVE-2012-0147,0,0,ba47252b80a5ab2f6b422ed8327fb1333a6b0298e60be42c0089830405c580 CVE-2012-0148,0,0,25cfd9c0acde94952a699f511d75fec71fc54ffb281a32bd5025d339efc80e61,2024-11-21T01:34:28.540000 CVE-2012-0149,0,0,4fc92eb5e4efe04db016571e9256804b45e34427ba5d6f2a4c9fdd0ba4496db6,2024-11-21T01:34:28.647000 CVE-2012-0150,0,0,9e61b76afd295dff201902e8d0e28d8e5d0509b291757eb4eeaf3ea510b28c94,2024-11-21T01:34:28.750000 -CVE-2012-0151,0,0,c6669219be7b5e37cb7e067c708a0bc049a4ffa6a7bbfde45b2d65ad16ab4e40,2024-11-21T01:34:28.853000 +CVE-2012-0151,0,1,6e3c43ea83dbbb5cd2a7ce4171ff206c4484d27f77d1c4a478d5fb5bdb9b4a37,2024-12-19T18:53:24.780000 CVE-2012-0152,0,0,0938408577139cf9606d5b406b6773c0d5beb30ba3b10726ccc622bdb4e11759,2024-11-21T01:34:28.970000 CVE-2012-0153,0,0,8cf862f43818ec16e3339f4cfe77d33b7ab784cde4db5f46ca0b6b81a2cdd167,2023-11-07T02:09:54.813000 CVE-2012-0154,0,0,f865d81aa0442de964d5532961642d91816dc7c8a91c7e4c93c805e49177a61b,2024-11-21T01:34:29.107000 CVE-2012-0155,0,0,815bf50e74766a74ac74edbfa63fddadf3fcf0173ecb4fd8348fe0ccfb9afb7a,2024-11-21T01:34:29.213000 CVE-2012-0156,0,0,5f84a57ddd6cf0ad8f458eb5c0b25351cc67ffbd66732f1c9bcc0dbfab6258ab,2024-11-21T01:34:29.323000 CVE-2012-0157,0,0,e66217d3f8540208543c9e7558028e6cb994ca3cd79d7152f5c8251ba1bbd7c2,2024-11-21T01:34:29.427000 -CVE-2012-0158,0,0,ddcb8f366f3b48d25b2edbcc517a4c037bd11ce476720e95d6d7ebe6756896d2,2024-11-21T01:34:29.590000 +CVE-2012-0158,0,1,bb21223e86bc31ada507fc315c8fde02d8f5fcaddfcb5db2d43a450609df7a97,2024-12-19T18:53:18.210000 CVE-2012-0159,0,0,b79bdd715d763d65e02e59f5d73368681b52426a8ee9a83b2279b91bc753007e,2024-11-21T01:34:29.723000 CVE-2012-0160,0,0,57b1522b2ab079684e0296765b9e56002ec685cb2a7a50a1fb3b6e5696185470,2024-11-21T01:34:29.843000 CVE-2012-0161,0,0,971da5e11b3da429493c6b967c33f09e4fb9ac3d336fbbacc9a8a016f00de07e,2024-11-21T01:34:29.950000 @@ -53499,7 +53499,7 @@ CVE-2012-1852,0,0,53094e12ce5e83b550a1cbee1da76fcf72378b5487e70487ff67745dd77223 CVE-2012-1853,0,0,24867a8eb16c3cb9ece53ebd5a5dd5d7380d6f37c140092cb97a74965880210e,2024-11-21T01:37:54.900000 CVE-2012-1854,0,0,a5f1833eeef7667d50ad2085da298584d02b7758a5f404f70a56eca530327250,2024-11-21T01:37:55.010000 CVE-2012-1855,0,0,44ba9efb6055a32873ceb08e174916d7ad5f91db1534db576782cb24d4a52396,2024-11-21T01:37:55.120000 -CVE-2012-1856,0,0,d2133e148084ad44111d461167a82b3c08e16ddcbdbc52aeaf0c428c05d9dd56,2024-11-21T01:37:55.253000 +CVE-2012-1856,0,1,87d26716a4f674c97740dced8b84fd1a5c5354ad4e0f51f0b6eac5f0dc8dab0c,2024-12-19T18:30:16.900000 CVE-2012-1857,0,0,2e6e8597fff16427442bb6ac60d0cb307871b62dbcb307a46c27efb2cf96d041,2024-11-21T01:37:55.380000 CVE-2012-1858,0,0,40318fd77d31255c82f4d083347f8a29594fee1fdd24e2e35379463d2d2f3f8e,2024-11-21T01:37:55.490000 CVE-2012-1859,0,0,6438f6c2a54adabd33f7d4646249ba09adac1fcd8e5bdb3399d510eacf910c65,2024-11-21T01:37:55.617000 @@ -59708,7 +59708,7 @@ CVE-2013-2090,0,0,19687ec675da4ed46a11456d350e7084cc9fb881cca8493719594a453619c6 CVE-2013-2091,0,0,7f19d46470cc4d3c105ab97647371e9616ef432d8e14c721fb78c1cbf2596cdf,2024-11-21T01:51:00.910000 CVE-2013-2092,0,0,7904ae1ec3047a5f57657abd1706efe14132ae0f82576f2661f2649551df2ad3,2024-11-21T01:51:01.017000 CVE-2013-2093,0,0,78f2dd86a3996d13c901e68d36afde1e472a9aef52c2731078a7b5a815feec40,2024-11-21T01:51:01.133000 -CVE-2013-2094,0,0,ab8c1643a818a2c74fa6676b64d51fc2d8fd2ad003efcd1ada0751bbc97477b3,2024-11-21T01:51:01.253000 +CVE-2013-2094,0,1,e66174cc3abbec2caefbfef77ba371f0e58ea779bb44c524bedc876e4883dacb,2024-12-19T18:30:26.137000 CVE-2013-2095,0,0,6039d52b146166fa40f62baf17ba285b23038aaaa646e8155da378985edb8421,2024-11-21T01:51:01.420000 CVE-2013-2096,0,0,2923e79a8729331de174a26e0dbdee3a3f5854a3eeaa8dd512715ab57a691517,2024-11-21T01:51:01.540000 CVE-2013-2097,0,0,ba2154df0c591d9c7cdffb5d7c6cedbaf4a1d1bbdeed2fc9ea06cfc1be6c5ffd,2024-11-21T01:51:01.673000 @@ -61298,8 +61298,8 @@ CVE-2013-3892,0,0,41e6a8077d53f9f28b706a03a9f912cad6e65640973c7fd1d20093adc24f9e CVE-2013-3893,0,0,0e357bfe8a077b0b4af2202721b1fb087ea7a95f354e13485e363d2a18b15cb8,2024-11-21T01:54:29.627000 CVE-2013-3894,0,0,a566c203952948afeba6a473d7aba3b9b3d277a7bb24923f0100847da2dc0c34,2024-11-21T01:54:29.743000 CVE-2013-3895,0,0,51c11ad29a344003d8e5fed04d4b8688d19cbb2a79a1c1fef2626ffbff2dcc5b,2024-11-21T01:54:29.853000 -CVE-2013-3896,0,0,7a7305e585c58a1cf13c2894b5e59f2bcb7bcf5603c9e81fd73e1a6386d1b011,2024-11-21T01:54:29.960000 -CVE-2013-3897,0,0,fe1449d66d28058b1805deb6e934c1a601bb72f2814d8cd8a31ba6aea6636bd7,2024-11-21T01:54:30.080000 +CVE-2013-3896,0,1,131d1bc819a0dddf074011f6a8364ed74baee78c458449ff3b42f62d5d8f017d,2024-12-19T18:30:32.333000 +CVE-2013-3897,0,1,d2e4a3f9d646907fa4ad805d68901af6f57df38cb0c4377709d9c14d9f4513cc,2024-12-19T18:30:40.597000 CVE-2013-3898,0,0,4001bc12078e48316fd3702cc157dba0b5051507f95b6e3e7fc2523b40acf50d,2024-11-21T01:54:30.203000 CVE-2013-3899,0,0,b203fcb7b7f954c5c53f099033f3627c7f45bc118b6b43a856d83b3807c750b5,2024-11-21T01:54:30.323000 CVE-2013-3900,0,0,5b9c41d9db22468a844fb6d1b6e3bb239a601008c11a3037cdfdfd591d1c8cd8,2024-11-21T01:54:30.420000 @@ -61308,7 +61308,7 @@ CVE-2013-3902,0,0,afbb46c14a2a8e1d241a4e7e29c6adedd4b2b0b00cd005689dabdd1906c4b2 CVE-2013-3903,0,0,e9d3a91ef46bd5f6620142601468a79651a22995de21afe2c8e9f924b37fb04c,2024-11-21T01:54:30.730000 CVE-2013-3904,0,0,f895a1ec47db3f9071dc02e2d6448fd75e692b985e48dc5fa59d39154f8d75db,2023-11-07T02:16:04.790000 CVE-2013-3905,0,0,7b48dc2bc9df1d7f8de0cf745686706d0074c87b8b927dea4a078690dbc53f72,2024-11-21T01:54:30.850000 -CVE-2013-3906,0,0,676cdaf0afe3a20049c382b37ab983d85c1c1b35ff1a4fdea266192b50dcfebe,2024-11-21T01:54:30.950000 +CVE-2013-3906,0,1,e191539047400ab0acd7d0a69e6e64d68861fe07b2d8983616ecd7cd97688820,2024-12-19T18:31:14.317000 CVE-2013-3907,0,0,41e942ce449f15984792a96271dabe3455afc0f706b354740a9c8c773c9dc141,2024-11-21T01:54:31.073000 CVE-2013-3908,0,0,63abf17cafd4458e4297c20a768d5767ec345d328b5a74ce6a7df987b32a99fe,2024-11-21T01:54:31.177000 CVE-2013-3909,0,0,b6f16bd3112a434b66cd82a4022bfa886f7cfd5c0b74a95b063a2ade5d9c5db3,2024-11-21T01:54:31.290000 @@ -61387,7 +61387,7 @@ CVE-2013-3988,0,0,32e7bb16d3cc6c2d6fa9be685b6d556611ac04e22f9603b389ff244d35104a CVE-2013-3989,0,0,5c43656deff50011a537a7ebea7b26a875471ef7d4ae6bce53a6d9cbcc9651dc,2024-11-21T01:54:40.370000 CVE-2013-3990,0,0,df32498b655fbfb8ccdfb0e2b04b708b3b91008d4789e7f8b3767b0684d00ea0,2024-11-21T01:54:40.477000 CVE-2013-3992,0,0,56bb2d0349fa2872b773d0acde9ff5007921784aa1fb44af79624f99881b7ff5,2024-11-21T01:54:40.587000 -CVE-2013-3993,0,0,bfdb52adcd5a03bcec086b074a8dd69f5e8c54711dc247fe3ee78cf51aa740cb,2024-11-21T01:54:40.693000 +CVE-2013-3993,0,1,3667c97d97f12d84852a362f268e5e5341eedf551e30ae587d2703a7763fd0b1,2024-12-19T18:25:29.590000 CVE-2013-3995,0,0,714937e2f1cb143331d3f0f7437a2403af7ef92ec6754de5dbe1b91c731fae8b,2024-11-21T01:54:40.807000 CVE-2013-3996,0,0,4878f157101348b226f7c20b378a3d3553e7d1b36313bd1918a52635757d1408,2024-11-21T01:54:40.917000 CVE-2013-3997,0,0,d074fbc335b163542f1aad4940897017082ec1649bf1d20d3dfd9c930c1ef8af,2024-11-21T01:54:41.020000 @@ -64613,7 +64613,7 @@ CVE-2014-0126,0,0,f419b91a8a51c8f3ff14517325e5ff2f32281033c3b253a00d2bbf05e2abc3 CVE-2014-0127,0,0,7e8e06eeada61d2f10622fbe18aea06d06c52db0b85e7777ab09107876efbf6b,2024-11-21T02:01:26.190000 CVE-2014-0128,0,0,1eca7e6b92cda3e5a98a847adc9ebb4064db9d276266f629bf9804ecee4f0d74,2024-11-21T02:01:26.307000 CVE-2014-0129,0,0,a8bc96f630c99c67f6b93ca40c8ecedc7c2b5404ecfd40b4b64d5c0b7b80f860,2024-11-21T02:01:26.443000 -CVE-2014-0130,0,0,8400b85c72c446da51126e0620c448915c8844f7da3b3d57cdc07ce09d8dda55,2024-11-21T02:01:26.570000 +CVE-2014-0130,0,1,c074b9163c8048e635f0276ed019b32015704efa9152dd2dab69058e6ff24f8d,2024-12-19T18:23:09.467000 CVE-2014-0131,0,0,fa511b8ab19d0c0fa2aec0b098472b5745b79440d1d7b2dcadd9f403b9630108,2024-11-21T02:01:26.730000 CVE-2014-0132,0,0,38a9190f82848f9d8e18f5278e6d213adaf5b516a965e57c1f4df35730dde17c,2024-11-21T02:01:26.867000 CVE-2014-0133,0,0,6774b69881d61779cfa32a0b613f85f1debd7fb1aa58022a5f91edcbf557223a,2024-11-21T02:01:26.993000 @@ -64679,7 +64679,7 @@ CVE-2014-0192,0,0,dd7a2259350ce50b1f0560041e5d1cedbbc4752ae357dd4e33d8684fbc5474 CVE-2014-0193,0,0,1b199ce9e7a940344525790ccf4e8c5c5052b29b16fed2c4ac94457de1a1ea0b,2024-11-21T02:01:36.230000 CVE-2014-0194,0,0,667af1cf5ce4eefcee093c5e9ec61dce43f6a2333d39ea411bc713c9998012da,2023-11-07T02:18:11.407000 CVE-2014-0195,0,0,89ab41a8cac46aed3f6785654177411e34d77541d8993252d774f31bb6ad41bf,2024-11-21T02:01:36.410000 -CVE-2014-0196,0,0,55c8cd5d52b92c313c621f0171f3208e580089304c489b8e2c1017daea8d1c65,2024-11-21T02:01:36.813000 +CVE-2014-0196,0,1,11a9d9e8e2e87099cc7b7999f405da44b60ebaf43a0e0df009e983c50178bb15,2024-12-19T18:45:22.253000 CVE-2014-0197,0,0,0f6c9fc2e1460a7dbd699bbaf3be5cd8929d94daea5d09c673cd87f43e22fe88,2024-11-21T02:01:37.003000 CVE-2014-0198,0,0,933bddc1da0de3410d1545a7c0091e8e49572876d0a8de2101ec294d44dc6872,2024-11-21T02:01:37.150000 CVE-2014-0199,0,0,f56fda3b5806fd9b5d8a1dbf0c8b3d954f6b188d88c6d16c318b3bb525111a85,2024-11-21T02:01:37.510000 @@ -65234,7 +65234,7 @@ CVE-2014-0775,0,0,1701042689349422b74af1e6edac4354c9fddeb4e7f51961e90601f90439b9 CVE-2014-0777,0,0,908f809ab3809f235c1ad43c59e58cb3fdb4d7cea7e129a7d7bfc00105c64696,2024-11-21T02:02:47.240000 CVE-2014-0778,0,0,5e112ac8361fe2b9acd441c2021494a2a8b8a4dace93d9b5813a5fd321454576,2024-11-21T02:02:47.337000 CVE-2014-0779,0,0,ee2629ec9d1afe6813b3ca06209db528db38a16165fa03981be0b650bb47f33a,2024-11-21T02:02:47.440000 -CVE-2014-0780,0,0,d217e029e0a3faecd2e56bd1d7ee376e88cf5517a09732b87ffbff6252efa787,2024-11-21T02:02:47.540000 +CVE-2014-0780,0,1,9680870c79e82c2b73cfc391b1d3dcaf48990d84996d8c2e69ce6351928e0811,2024-12-19T18:22:59.987000 CVE-2014-0781,0,0,6b23cec1a928c767fbda30291838638d2fee809231703a524b54720a32f7ed17,2024-11-21T02:02:47.663000 CVE-2014-0782,0,0,74355f3999a90ff6b9bbe58125f41b323ade28a322386c4033406c9f708783c9,2024-11-21T02:02:47.770000 CVE-2014-0783,0,0,39fced76a944e1c9146186ab5c18d439da0aab33e542e9614cf5be65f34c4449,2024-11-21T02:02:47.877000 @@ -67359,7 +67359,7 @@ CVE-2014-3148,0,0,baf833252ac20d7b12e591f03cf38b7a2e458beaf9f7edc522335820db1b3b CVE-2014-3149,0,0,ed0ea3ef1f1ae94443dd15ae3bafcd205198f72902146e927c11287e474d6704,2024-11-21T02:07:32.627000 CVE-2014-3150,0,0,a4e24e722bc545805e2c38734895052ece59f276fd4dbdf29a32edd7e864cbd0,2024-11-21T02:07:32.780000 CVE-2014-3152,0,0,3587b30c8b614dd97d015d727362d0fa9e60093bf2775f37fdc2b2f47e10d742,2024-11-21T02:07:32.923000 -CVE-2014-3153,0,0,5b9e1a3095c560286f4db35bf0fb4e1fe51cff39077f6f3d19df6b369b1a93c2,2024-11-21T02:07:33.063000 +CVE-2014-3153,0,1,dca323debf7608b7679d8bdafd79d676470be1ea26402f1d58fa5793a9ed8bd3,2024-12-19T18:24:49.963000 CVE-2014-3154,0,0,e7a582cb206da24c3abbd03d1bc8bc0d52bbff719e70a72da214743507240fa3,2024-11-21T02:07:33.270000 CVE-2014-3155,0,0,e053dc1a951ecdb73c4f88e8e838efd6ba84187ea981b18a073482e137477e55,2024-11-21T02:07:33.410000 CVE-2014-3156,0,0,1597b76f9398ba8760c6e216c612a712ad305fb0f6e841b7faae5811c8854b08,2024-11-21T02:07:33.553000 @@ -97059,7 +97059,7 @@ CVE-2017-13304,0,0,e762ae368b377aa7b17f23bcc359ee821443887be84854d81f90f3d562344 CVE-2017-13305,0,0,16b6bb047ae97dfefdb42562901079f55f26907e6f0eaf4f97bcdbaca2a76f79,2024-11-21T03:11:20.720000 CVE-2017-13306,0,0,560cd19b9be476161edaaf81dec4614abe12b1bf0059234558af62e2d012c244,2024-11-21T03:11:20.853000 CVE-2017-13307,0,0,83e3f4770d03d8b8c79da6a4dadf7ee99387708199c25fe226d8027afd3b5b60,2024-11-21T03:11:20.963000 -CVE-2017-13308,0,1,f75b61b5be4294bf211957ee018791b63d174e0d9584726739343d9bbf446dcc,2024-12-19T16:54:09.743000 +CVE-2017-13308,0,0,f75b61b5be4294bf211957ee018791b63d174e0d9584726739343d9bbf446dcc,2024-12-19T16:54:09.743000 CVE-2017-13309,0,0,3d8e7c6309c5c1cafb1c6dfedda758dfd05930dec41aa79ea05cff52c21999c9,2024-12-17T20:31:02.880000 CVE-2017-1331,0,0,792619ac2a7d190b79ad04ab26e4fcee4a33db57f943c84c9bb254e3cdb1243d,2024-11-21T03:21:43.777000 CVE-2017-13310,0,0,16fbc2a02fd9a331fd87bcb47c76c7495b76a04bb51e6d9523fb3a1c1a2317f1,2024-12-17T20:29:35.577000 @@ -126942,24 +126942,24 @@ CVE-2018-9377,0,0,843bba463f04d452c3f832d930dabcb8c3e2cfb14dd9ae952bb49dd88389ed CVE-2018-9380,0,0,e12a43dbeeb8da1df7c5ede895c56553a0364f94530599aafaca6e6f3326ce02,2024-12-18T19:42:11.093000 CVE-2018-9381,0,0,2ce1fffdcf5aa87d66006064137212243a0a262bfc7f2cf820777dea17a7c8cc,2024-12-18T19:39:05.097000 CVE-2018-9385,0,0,963ab87aab004413f51f225df7125c38dada01fc62280d1b6b2d796be35cbfda,2024-11-21T04:15:25.463000 -CVE-2018-9386,0,1,00c05564d802b59f0ce740fae1821c18eb3e04be32703f1b88fcf171f14e151d,2024-12-19T16:51:52.097000 -CVE-2018-9388,0,1,cd8b1868b6c78b44a87a461eb158bc8cba5eaf7d4a400099563232fceb850761,2024-12-19T16:50:58.733000 -CVE-2018-9390,0,1,03e5cf7608f8573a4867237edfa1da4ca8706d51cc54b5a571dacd98cdeb3ef7,2024-12-19T16:49:41.540000 -CVE-2018-9391,0,0,e732c1b84cd0af52f43477990ff0ed6183b20bf63bdea87dbc4650eab94195d3,2024-12-06T17:15:06.967000 -CVE-2018-9392,0,0,c32dba2c2a98106922261098b9038433eb88bfdab15b7f8a7fa0f36bbfd4c11c,2024-12-05T19:15:05.197000 +CVE-2018-9386,0,0,00c05564d802b59f0ce740fae1821c18eb3e04be32703f1b88fcf171f14e151d,2024-12-19T16:51:52.097000 +CVE-2018-9388,0,0,cd8b1868b6c78b44a87a461eb158bc8cba5eaf7d4a400099563232fceb850761,2024-12-19T16:50:58.733000 +CVE-2018-9390,0,0,03e5cf7608f8573a4867237edfa1da4ca8706d51cc54b5a571dacd98cdeb3ef7,2024-12-19T16:49:41.540000 +CVE-2018-9391,0,1,2f48dbaafd251d76bace45bec48a6a6822d89b365841aa01441c3d6fab74da2a,2024-12-19T17:18:26.910000 +CVE-2018-9392,0,1,a81398da058e04a84675f2ceb5ca20dc8d733a048fb3efe395ac35f304b71a06,2024-12-19T17:26:04.070000 CVE-2018-9393,0,0,276ec52efb720ec4f7cbc09d568b8de6f6519830d7111f840c9a1e2c366b486d,2024-12-18T20:27:59.163000 CVE-2018-9394,0,0,dd1b22b502a76f28db1661318b1e7aa53d3fb70606f3620cc610a250539181a2,2024-12-18T20:24:41.127000 CVE-2018-9395,0,0,6df53ebecfa4805a7db411ce2088f679dc44a95ac527f56723ef22448ea98681,2024-12-18T20:46:08.327000 CVE-2018-9396,0,0,fab4fde8e0d6aa76cc44131b28385a5f1b364ed9b6a14d4d25824c26df93acfd,2024-12-18T20:34:32.157000 -CVE-2018-9397,0,0,5ee67458f73d84f45b7dc473de7130bc5dc470ff78115df2c2c4cde8bd424855,2024-12-05T17:15:05.140000 -CVE-2018-9398,0,0,c17bfa5a79c25e0365fc937797f2aeac8e8b168df518f2c0ad13dc9f6f06ac45,2024-12-05T17:15:06.133000 -CVE-2018-9399,0,0,1f973ffd56dcd4ec36e7798d7ff9cd7fbe773ddf5340dc9bb6689bac7ad6201e,2024-12-05T17:15:06.303000 -CVE-2018-9400,0,1,29523d45cdafd598836ce2a4b8720a53971a0774008378f1306ff9abe0bb5da3,2024-12-19T16:44:18.670000 -CVE-2018-9402,0,1,8933a07544770cbdeacc339ffc963de192038d17676646257ca5874f8577ee44,2024-12-19T16:43:32.003000 -CVE-2018-9403,0,1,d70838cbd1983720a8279a18efc914175faad26ff03523c1b9852a2402b5213c,2024-12-19T16:42:42.670000 -CVE-2018-9404,0,1,43b16c4bd87fb57a678a75dfbb7264465ddd0a590164be8070509e928e887180,2024-12-19T16:39:46.807000 -CVE-2018-9407,0,1,b3ad459a642ed888363fadb16ef4b7071f82577e9745e7d759ce546d52d3b832,2024-12-19T16:38:07.783000 -CVE-2018-9408,0,1,d789fa912b087296f24deff1e2d30bd08f527fbce9788bd053320debca25ac99,2024-12-19T16:35:23.567000 +CVE-2018-9397,0,1,26269f1c9fcc6b1d423d4440d9c2507f2aec7b61ce25f05ba7d0c57d67ba53f6,2024-12-19T17:21:23.057000 +CVE-2018-9398,0,1,95e014471e6e71c69269bc94d8c70fce198b8668e93169584f00b3fa6b85d104,2024-12-19T17:11:55.793000 +CVE-2018-9399,0,1,b2462d7baa7c4eeaef223d1287aa13f98492fcc0bc383cbf07e373c2cee34191,2024-12-19T17:08:15.067000 +CVE-2018-9400,0,0,29523d45cdafd598836ce2a4b8720a53971a0774008378f1306ff9abe0bb5da3,2024-12-19T16:44:18.670000 +CVE-2018-9402,0,0,8933a07544770cbdeacc339ffc963de192038d17676646257ca5874f8577ee44,2024-12-19T16:43:32.003000 +CVE-2018-9403,0,0,d70838cbd1983720a8279a18efc914175faad26ff03523c1b9852a2402b5213c,2024-12-19T16:42:42.670000 +CVE-2018-9404,0,0,43b16c4bd87fb57a678a75dfbb7264465ddd0a590164be8070509e928e887180,2024-12-19T16:39:46.807000 +CVE-2018-9407,0,0,b3ad459a642ed888363fadb16ef4b7071f82577e9745e7d759ce546d52d3b832,2024-12-19T16:38:07.783000 +CVE-2018-9408,0,0,d789fa912b087296f24deff1e2d30bd08f527fbce9788bd053320debca25ac99,2024-12-19T16:35:23.567000 CVE-2018-9409,0,0,235ab4240b8f6a16f10dabebfc2a425e04d6055e3ccbd4af869fd3cdbdaa4a6d,2024-11-20T20:35:04.480000 CVE-2018-9410,0,0,df3ce3e6de4ffedbc96ebc88b1ffcfb3a929df188608608b94d23d5330115d42,2024-11-22T22:28:51.533000 CVE-2018-9411,0,0,18c6fd45cb373e5ef137d027fafac63305394d9c07fa2389a65d99934cccf131,2024-11-22T22:30:25.617000 @@ -126989,7 +126989,7 @@ CVE-2018-9435,0,0,c406cb4911498c54f535025a4ff9635d1532d0c17327395aede6e99a5f8250 CVE-2018-9436,0,0,c2b494efb154d7aaa9ed81b96c713d9c24fbb84694f572f4377509f9f74eaf9e,2024-11-21T04:15:27.740000 CVE-2018-9437,0,0,e59cb92832983cf48add0369fb79f47a847f559175a0f2d7a936cc44f1b7ae9f,2024-11-21T04:15:27.863000 CVE-2018-9438,0,0,5638af5c77f0754c7dfba896e5484ccb8bee81b5b17ae15260459cc484907261,2024-11-21T04:15:27.983000 -CVE-2018-9439,0,1,d9ae29707792e35782ae191b0786bdd25c64e7e55822f65ce8ab74178fa510b2,2024-12-19T16:34:09.840000 +CVE-2018-9439,0,0,d9ae29707792e35782ae191b0786bdd25c64e7e55822f65ce8ab74178fa510b2,2024-12-19T16:34:09.840000 CVE-2018-9440,0,0,55a52a7437a94b1783de56ba43189538bb9286960758454b2d5fcab8e0ee9654,2024-11-22T21:30:26.993000 CVE-2018-9441,0,0,575f828caed05d70445398c6546d07e6187af95dfab7246adaf485e88049a8e6,2024-12-18T20:00:17.290000 CVE-2018-9444,0,0,71c23de0a19dd0833cbf31bcd17198f1ee23b3012d3e983445d1d8427624bfea,2024-11-21T04:15:29.460000 @@ -127007,8 +127007,8 @@ CVE-2018-9456,0,0,1c78841b075bba5ba910247965bba0f6a8dc8a0b6c3b5076669b36b79f98bf CVE-2018-9457,0,0,e8a26c1972ecd6c85221150cea18ffdf38c6d3c4d9a4baa5448246cb021ab215,2024-11-21T04:15:30.743000 CVE-2018-9458,0,0,c7100da419412c0b9f77fb95c41b288cf97bb377a2e2af8a9bc1bff7997eb383,2024-11-21T04:15:30.877000 CVE-2018-9459,0,0,0c686c1b3705c9efe57e36ad035d7d33550c8fd1fcc57cd9d5855aab2376a3aa,2024-11-21T04:15:30.990000 -CVE-2018-9462,0,0,540ee33ffecd012f35f758009e680a6a3e25796e7f391013823a45d54277917d,2024-12-05T16:15:19.503000 -CVE-2018-9463,0,0,d4d844c05cd708ecfc7b2b2fe54aedf1979065835dec8bb48f0ba4759b3ac678,2024-12-05T16:15:19.650000 +CVE-2018-9462,0,1,39faca4eb976d0192e81611d25151cf64bcb25f02cb123eb3db2336fd5969704,2024-12-19T17:05:52.180000 +CVE-2018-9463,0,1,3e4f81bd8eae8c3f407afc4211cb341bc106a9bd2bc79075e64783fd4c9cf520,2024-12-19T17:01:04.227000 CVE-2018-9465,0,0,cb2efd2b80efc3b600077998298a31fa09fe425af40f55a1a9b3acceb259a706,2024-11-21T04:15:31.130000 CVE-2018-9466,0,0,a6ce5776a6a0bc572eb2fe9b93668c302dbc661dc68279f63c0e20dc3a242886,2024-11-22T21:29:09.617000 CVE-2018-9467,0,0,fc2dc1d34992c43bebd9ec5fb99a903623aaf110c20cb7b73e1288eb66ff9671,2024-11-22T21:27:26.783000 @@ -127030,8 +127030,8 @@ CVE-2018-9482,0,0,1c882c20917dbd75aef33559f7a722330101fe24c7678933c3722abef061a5 CVE-2018-9483,0,0,2302616cbfde9749f0f3f8d69c9a131852c9782df77fa8e7e76724afeadc599d,2024-12-18T18:47:49.167000 CVE-2018-9484,0,0,74d5e0d0fa974c3f941639cce2e318c13d0ac1ab0dcd9cb6f67f3dd6a99a2e8b,2024-12-18T18:46:16.473000 CVE-2018-9485,0,0,45e992e89977e540979e9e97bf11739ed3008ff31c66e3733418fcee71e1d7f6,2024-12-18T18:45:04.630000 -CVE-2018-9486,0,1,e7fa67002dbec3c344cc54b6b20866eb42958df346c0efa17b05094473e24c37,2024-12-19T15:56:46.503000 -CVE-2018-9487,0,1,c0cb2cda655c73a5c8be50eaf28b7a8862ce55d09edc178dcc75e74a15fe1987,2024-12-19T15:57:55.740000 +CVE-2018-9486,0,0,e7fa67002dbec3c344cc54b6b20866eb42958df346c0efa17b05094473e24c37,2024-12-19T15:56:46.503000 +CVE-2018-9487,0,0,c0cb2cda655c73a5c8be50eaf28b7a8862ce55d09edc178dcc75e74a15fe1987,2024-12-19T15:57:55.740000 CVE-2018-9488,0,0,ba1e6c4cbf374e16c43821f2607fb17d2575e745dd444ce40f3fff2c9ce5bafb,2024-11-21T04:15:34.417000 CVE-2018-9489,0,0,a8ea35ea306fe44c8548e155981010c782c22b2458df47c433f3a7bac5d1f3a1,2024-11-21T04:15:34.530000 CVE-2018-9490,0,0,61d281f4547708c0236d22daebb5d5955778b38b77b4a2d51ea168383fa7bed9,2024-11-21T04:15:34.640000 @@ -168959,6 +168959,7 @@ CVE-2021-22498,0,0,83423bac1d39694800ef9675555776f63cc301bfbe72adedefadf580a2986 CVE-2021-22499,0,0,9773921fb527ff3faefe67503447a688312356405bea14fe49b01c4adea2caf5,2024-11-21T05:50:13.990000 CVE-2021-2250,0,0,02e7143422d11b9d257071d54e49944945e5d2bc3e0da7730679505021efd656,2024-11-21T06:02:43.590000 CVE-2021-22500,0,0,d45eaf83292bac2c1e4765ee29adaa0cd554d96cd55907da1e11f572fadaa60f,2024-11-21T05:50:14.093000 +CVE-2021-22501,1,1,bdf0dc9efb074e87d9cd055db05326c86819e63ef0849b19985770d2f63a15e5,2024-12-19T17:15:06.527000 CVE-2021-22502,0,0,266d6db82fb770cda4377acc8746dc32e4268d8d1d1865f42733b02d30037bd7,2024-11-21T05:50:14.200000 CVE-2021-22503,0,0,599fd008966d76ce0dd0835db97b602770678be69077920ee3b77692b7561248,2024-09-19T14:25:42.487000 CVE-2021-22504,0,0,51ae3a4d3dd08bf23f364b37486c69f394fa86af9d5b6702868dc96271397db8,2024-11-21T05:50:14.387000 @@ -176438,7 +176439,7 @@ CVE-2021-32585,0,0,5768abccf57646b16f23da60be2ff4de982ce08fd70ce938bfb45c990c620 CVE-2021-32586,0,0,34e4c2125f96b38865aef7ca62056093a6679c5b5fcdc8f412729682e6b6545a,2024-11-21T06:07:19.600000 CVE-2021-32587,0,0,b3a3ebaa57939f1fce261725e56c8d4427307bf6a8feda4373094acc2be6caa8,2024-11-21T06:07:19.757000 CVE-2021-32588,0,0,3d733168babd74fe035c8a4800ddc796e3529db9c0dd80e7995ce4a3f10c1c5b,2024-11-21T06:07:19.903000 -CVE-2021-32589,0,0,d6738550d4f8537f060f62ce579d533dbba2870b6224d15e29f681418ebcee4f,2024-12-19T13:15:05.707000 +CVE-2021-32589,0,1,501dbe87a7d9f0483bd49dd77b265452ffa4580b6e5e552aba2bd5c71b15bf12,2024-12-19T17:15:07.167000 CVE-2021-32590,0,0,31e2aa593ab42693b927463e7677935f8e51214decf73d40bca768acdc83bf1c,2024-11-21T06:07:20.043000 CVE-2021-32591,0,0,a08df48a7b6fb917a33cfed960a11b4ba43aa20c94d83651237e38f63328427f,2024-11-21T06:07:20.180000 CVE-2021-32592,0,0,9abaf52755247a09b55286334808bbc822bf005d261fea183303a194b08befe7,2024-11-21T06:07:20.310000 @@ -184475,7 +184476,7 @@ CVE-2021-43130,0,0,7fbeb32ea516d24bcdbccf644b3bf93ef357a4d2b54e049ce9bfeeb76f0a3 CVE-2021-43136,0,0,ddbd894c0288f80b2f14e5e2b6995579d70423326eca1b92a6d9d55b95fcb03a,2024-11-21T06:28:43.073000 CVE-2021-43137,0,0,75041ac11b45d45d58b8e354e2699633a50e46f4993225f8e0247da220317b64,2024-11-21T06:28:43.250000 CVE-2021-43138,0,0,36c8c665c09a284260f334418a653da63fed0f6cb2985227b7f07d6b40bf5592,2024-11-21T06:28:43.393000 -CVE-2021-4314,0,0,9aa19cce00e4f6ac50b0d2c2d7a54184380976673dd334c98b3b389249995cb7,2024-11-21T06:37:23.670000 +CVE-2021-4314,0,1,8530ddc05575e119978712d90a2b436a5b3b65c13b1a34b33feb66ff0e3dff9f,2024-12-19T17:00:28.533000 CVE-2021-43140,0,0,f244dee670346aebeb4b2538a2204a3427f160adb69f3924493878723916ca14,2024-11-21T06:28:43.567000 CVE-2021-43141,0,0,dbcb1af886e69c2bcd62eba59fa928b34e18decfe33288dfe171ec5038e72798,2024-11-21T06:28:43.717000 CVE-2021-43142,0,0,f5a1f13cd611732a6ef4cf87b41ea581d01cff8d678281559bab8ff3506fda5e,2024-11-21T06:28:43.860000 @@ -217530,7 +217531,7 @@ CVE-2023-22860,0,0,e5615e04bec3d81c417ab60fa1c1fc3ade4fa45b3627ef7e6d93fe403deee CVE-2023-22862,0,0,dadcaebacd64131ef9e81479051edc0ba41de0aeab33debdeff1ec9a64abe564,2024-11-21T07:45:32.817000 CVE-2023-22863,0,0,e74cac72684833f98504dffc53dad41465cef576e0bc1dbbb88f255db3401635,2024-11-21T07:45:32.963000 CVE-2023-22868,0,0,5225754a7cbac17a0862e4697f7578952ee08bb3a8fc285ef8a12fe85316e2d1,2024-11-21T07:45:33.107000 -CVE-2023-22869,0,1,eb460deb53531fd2a5ab4f8838af0378194892d8711f8a8a66b548386c52e87e,2024-12-19T15:41:55.077000 +CVE-2023-22869,0,0,eb460deb53531fd2a5ab4f8838af0378194892d8711f8a8a66b548386c52e87e,2024-12-19T15:41:55.077000 CVE-2023-2287,0,0,2ed0946fdd6c5530f2109ce1757662a2895df54e54cc4328d63d1f4dc818ce5d,2024-11-21T07:58:18.847000 CVE-2023-22870,0,0,5ec1f75eacea8442f5d839893a47e3347a333b538c029e0833811a230f083142,2024-11-21T07:45:33.363000 CVE-2023-22874,0,0,54a14c70ce82511bdae6f7fbef627022818461d69e7cfda75ea30f1a27cd0c30,2024-11-21T07:45:33.503000 @@ -228801,10 +228802,10 @@ CVE-2023-37392,0,0,5d384d02d8631121044e3a4a15b16f1d9a0f4a021dabe4d8bb61a797ed5b1 CVE-2023-37393,0,0,5f8f09fae8cdcb705f9690d0759ddda2b79a794e330faf4cfaec7caf2ec598cb,2024-11-21T08:11:38.303000 CVE-2023-37394,0,0,0338eb93ab89f059f3206d02bfc24033e086b6f86189917b378799b18d81fa05,2024-11-21T08:11:38.443000 CVE-2023-37395,0,0,55dd15829fb7d7a6735c92903a07820b7d12b81ef7d6ede2345fc225c8d5e93c,2024-12-11T03:15:04.877000 -CVE-2023-37396,0,1,d153f1aeffbef9dae43a5086d1ceff3df8243a40d5d453bcd9d77e66af9665bb,2024-12-19T15:40:24.690000 +CVE-2023-37396,0,0,d153f1aeffbef9dae43a5086d1ceff3df8243a40d5d453bcd9d77e66af9665bb,2024-12-19T15:40:24.690000 CVE-2023-37397,0,0,495ea247e2c316b481151d70502bd709d1dab32c4174e2af8b8520a039b7ff2e,2024-11-21T08:11:38.713000 CVE-2023-3740,0,0,95c282366f230bbe869486165117092592fba41b4089df0587e4879cfea633c7,2024-11-21T08:17:57.383000 -CVE-2023-37400,0,1,be3704cb1104081f1dd220708905d6e5e97ae560bed0115a1e128e7cfcce3788,2024-12-19T15:41:42.607000 +CVE-2023-37400,0,0,be3704cb1104081f1dd220708905d6e5e97ae560bed0115a1e128e7cfcce3788,2024-12-19T15:41:42.607000 CVE-2023-37404,0,0,14062fbfb247d7eff73830bc3da8f5fe1a2fec40a3cca7bee10d3f475380647e,2024-11-21T08:11:39.010000 CVE-2023-37407,0,0,76d6111727d59ebe960e10392d5dcd8f8eb8327e3624ed86a819faf42a91646d,2024-11-21T08:11:39.140000 CVE-2023-3741,0,0,1ddd4fff44ed6da7a38f77e1cd87d0e1a51a839bcb171f62bcdf113f89dbd961,2024-11-21T08:17:57.493000 @@ -233297,7 +233298,7 @@ CVE-2023-43072,0,0,136811489d065b6668e0195080a2e78f62d51290723e0588de76e368b5278 CVE-2023-43073,0,0,075910ba0ed985a26ae6d6a2c1c78bfff46a383f35a0ec7192b98f003fa24874,2024-11-21T08:23:40.880000 CVE-2023-43074,0,0,3ec8b15fec9493db3a59a582609d2bd28ec1b97e594c9c9554cd9d665c0e9ad6,2024-11-21T08:23:41.010000 CVE-2023-43076,0,0,38c0c879e7151047cb3a1c77265d1b03178a427927adb392de4bb883335f37ee,2024-11-21T08:23:41.137000 -CVE-2023-43078,0,1,a15ba5a608a0b0a61d17e9c566c6a58bed3712e70add1697be7bda12fbdf6106,2024-12-19T15:53:24.717000 +CVE-2023-43078,0,0,a15ba5a608a0b0a61d17e9c566c6a58bed3712e70add1697be7bda12fbdf6106,2024-12-19T15:53:24.717000 CVE-2023-43079,0,0,c77cf013dd28ba935eb61260be6352a6a8414cf9d066bdde15be6b852e02081d,2024-11-21T08:23:41.450000 CVE-2023-4308,0,0,f3830df633326f7651d0cca67089e0e16920c46a5093566e980e9d164d46d5ae,2024-11-21T08:34:49.717000 CVE-2023-43081,0,0,58b63e401d69ccb7e57787b2daf9353f71b2bfb248a3b058ce77f784b76caaa4,2024-11-21T08:23:41.583000 @@ -241882,6 +241883,7 @@ CVE-2023-6999,0,0,20badeb2c238d441cb421c48ace480ea27b8151e674b990be35a0786113f4d CVE-2023-7002,0,0,84396c0bdf73e170d66b798921a49a9f0a13dde1ac20a4cf4c9ca68c4bd2e87e,2024-11-21T08:45:00.317000 CVE-2023-7003,0,0,090dbcb22a27ae8d1249b5396e7cb61a556fd7edf17cf3f654f7795066af7307,2024-11-21T08:45:00.443000 CVE-2023-7004,0,0,2b0a1c3f594514067c80c828d3cdf50833ef4cd40d9bad21bf097cc6e6910593,2024-11-21T08:45:00.633000 +CVE-2023-7005,1,1,06324bd3ddead253be014782a15f4b191f6b96547c2707715a8cd1e2c38b2ab9,2024-12-19T18:15:06.313000 CVE-2023-7006,0,0,4ed87f24fa2ac772a2f7b727b0e300912c42583637b6187ad692e5891d6c6604,2024-11-21T08:45:00.817000 CVE-2023-7007,0,0,f5e78178645c6c2c5f772707ce2e5c5b75e98e2d2f30a88b209671633b387a46,2024-11-21T08:45:00.997000 CVE-2023-7008,0,0,8f61c119937be8edfdf7101f886737120021ea2a8349db9b1b71fa74e2a2c59a,2024-11-22T12:15:17.590000 @@ -244917,8 +244919,8 @@ CVE-2024-12646,0,0,edf55cca2f63c5514783a7adeb1b585499807b56f798173f78bff573d5a90 CVE-2024-1265,0,0,b39c324e3936d2b2eba136bb9fb37e8f905e9dd3fbb95d7d724d951e7512509f,2024-11-21T08:50:11.610000 CVE-2024-12653,0,0,0bdff4965d01bd6aa73fcbedd02b053581ebdedd8d7404b8f9233029d8912bb7,2024-12-18T13:53:28.700000 CVE-2024-12654,0,0,dd847f86178d706ec068f649f759ab2d8fa9222fd8627ac6c45d7d35cd5983cc,2024-12-18T13:42:22.853000 -CVE-2024-12655,0,1,d668d85a2be3b9f6e14a38cfcf5e3b3a1d437cb49f715e30384850a9d66d0737,2024-12-19T15:11:26.210000 -CVE-2024-12656,0,1,4867cb9fd5a5daecb01da2877bf70cb6fe02b4c071368376d3382e11b72ec72f,2024-12-19T15:11:39.287000 +CVE-2024-12655,0,0,d668d85a2be3b9f6e14a38cfcf5e3b3a1d437cb49f715e30384850a9d66d0737,2024-12-19T15:11:26.210000 +CVE-2024-12656,0,0,4867cb9fd5a5daecb01da2877bf70cb6fe02b4c071368376d3382e11b72ec72f,2024-12-19T15:11:39.287000 CVE-2024-12657,0,0,59348b5485cc78202fc057085be62694153448bbd8102fd74b2dd0327231cf8c,2024-12-19T14:46:43.777000 CVE-2024-12658,0,0,5b6b569577dedcdf0d4d7e104eb92c626d5eee1ccb9eaa3aa5667fb3b7c9d19b,2024-12-19T14:47:23.380000 CVE-2024-12659,0,0,6c16300b58f1e5167184bcbd4880dc3e422630c66c66de4ab6a0cc9186836154,2024-12-19T14:49:24.747000 @@ -244929,8 +244931,8 @@ CVE-2024-12662,0,0,29cac34ce72f4480acb005697a648add46560bb84a61da6f86d8bf42debbf CVE-2024-12663,0,0,cb1a586129069ffa13466f4c6b4784e75a597b36a82749fcb1b049602849dc70,2024-12-16T20:15:08.963000 CVE-2024-12664,0,0,54d187c1eeaa5b0463ec5d372870555679a8fdc47e615fb58e7e5dce84cd53e1,2024-12-19T14:55:00.460000 CVE-2024-12665,0,0,3220ef21931044d081e07d6b4308f79cc6622e8130bf8cd7769065c704a3b096,2024-12-19T14:55:20.300000 -CVE-2024-12666,0,1,fc53cd778f7a5f04c78eee082e10b56f1f0dfdbcb60a351389f823d14c35b16b,2024-12-19T15:01:00.497000 -CVE-2024-12667,0,1,6f1e1f32e1a7d5feed0f20365ef72c9db26791385f98e5b86f63c4c280b994b8,2024-12-19T15:10:22.963000 +CVE-2024-12666,0,0,fc53cd778f7a5f04c78eee082e10b56f1f0dfdbcb60a351389f823d14c35b16b,2024-12-19T15:01:00.497000 +CVE-2024-12667,0,0,6f1e1f32e1a7d5feed0f20365ef72c9db26791385f98e5b86f63c4c280b994b8,2024-12-19T15:10:22.963000 CVE-2024-12668,0,0,2d75ced822d853be6c6d0f513771edc99398324227c8582be01ec3a2f5a7e3b4,2024-12-16T17:15:09.700000 CVE-2024-12669,0,0,cff9f2a304270add667ff179e86a9f065113db2e7e50955c8f0fd086a0592670,2024-12-17T16:15:25.020000 CVE-2024-1267,0,0,0747778ead3832a4ca40a6166ab0347567f6883def83eef1d70067a8b72b33c4,2024-11-21T08:50:11.937000 @@ -244957,11 +244959,19 @@ CVE-2024-1278,0,0,304f88731c9c2e93f283a152f19a1ac852d3cf0fda0d38c9b82c242ac46045 CVE-2024-12782,0,0,bc61a5ad6f30b948435381c8170b91d4f7a0de7c5aa6736826a6cbf390b49afa,2024-12-19T13:15:05.900000 CVE-2024-12783,0,0,58bac48d696a0ad6888cceb5e4c2f18a8dca69de1015bafa9e7ec5c861f38063,2024-12-19T13:15:06.217000 CVE-2024-12784,0,0,01c570031a8a1e6ad8356000972177a0e918fbccc207cb0ff470d63ebf279f33,2024-12-19T14:15:05.943000 -CVE-2024-12785,1,1,2b7afb7b5c41603c82bb0f83d5156003f9670eea88b930782b6490fa06f1b282,2024-12-19T15:15:05.980000 -CVE-2024-12786,1,1,a6cf74b92a2a1f37eee56eacc71e60e4dce2e83cf76649766ea700a46c0b0a87,2024-12-19T15:15:06.873000 -CVE-2024-12787,1,1,d5463c9b1bff1a6a381460aae1d81572b795839f2f12d78431d60bdbc98d11c7,2024-12-19T16:15:06.810000 +CVE-2024-12785,0,0,2b7afb7b5c41603c82bb0f83d5156003f9670eea88b930782b6490fa06f1b282,2024-12-19T15:15:05.980000 +CVE-2024-12786,0,0,a6cf74b92a2a1f37eee56eacc71e60e4dce2e83cf76649766ea700a46c0b0a87,2024-12-19T15:15:06.873000 +CVE-2024-12787,0,0,d5463c9b1bff1a6a381460aae1d81572b795839f2f12d78431d60bdbc98d11c7,2024-12-19T16:15:06.810000 +CVE-2024-12788,1,1,c256ab7400b86234bfe1a345815a3b484f8eb8d008413fc208e87d3eb63c89cd,2024-12-19T17:15:08.270000 +CVE-2024-12789,1,1,6f25a28d5faa756977d863cdb00fd06bf324dc5821dd9ab34ed8fb4f8308da9e,2024-12-19T17:15:08.463000 CVE-2024-1279,0,0,748039c92f5ca569335554a7f38080e94b49a821a92d564d52fc8ec18dfbf14a,2024-11-21T08:50:13.410000 -CVE-2024-12798,1,1,615aa02faa1546a4bcdbaffa1772011f8fa9ecfa3d40f9b90eddfea8efa01c41,2024-12-19T16:15:07.557000 +CVE-2024-12790,1,1,942ffb66df0ae48a7f3f26eba219be8d1d2b0c104bd968ddf938019cf5ef3e70,2024-12-19T17:15:08.650000 +CVE-2024-12791,1,1,66bd4cae7608bb1ae66877a2dbfe7ddbdf947761401752ec58d789dd1b79c792,2024-12-19T18:15:08.263000 +CVE-2024-12792,1,1,cca69bc616ddf83a5f00b7ac9eaab5dd0b11356cd752b7f4aaf1fddfd471bbb4,2024-12-19T18:15:08.900000 +CVE-2024-12793,1,1,68137f209e660288d0e6964599bb125523c1996d10cce60d57a8219dcc8bd618,2024-12-19T18:15:09.403000 +CVE-2024-12794,1,1,8d12d04ccce1b41a783ac525383e4200b0c5f882612df57c2c9daea1cf1115ef,2024-12-19T18:15:09.963000 +CVE-2024-12798,0,0,615aa02faa1546a4bcdbaffa1772011f8fa9ecfa3d40f9b90eddfea8efa01c41,2024-12-19T16:15:07.557000 +CVE-2024-12801,1,1,dbb8ac48c138a1f3ec7861cacd64880bb980722359886788ec50961942d98194,2024-12-19T17:15:08.930000 CVE-2024-1282,0,0,e6b07825f0f3597687613e3a6164d0e157f6f527c33c61eb8d90ec07193bdec2,2024-11-21T08:50:13.520000 CVE-2024-1283,0,0,b1c9571efecc70819ed9018aef1b79e079809dddea59c76e732d84247ac1db52,2024-11-21T08:50:13.640000 CVE-2024-1284,0,0,2e71db4897104f6683ee75152cd91e2f417b7912ff1c292da5c27be659017dd1,2024-11-21T08:50:13.780000 @@ -245322,14 +245332,14 @@ CVE-2024-1664,0,0,fc796a5cda9ab945ac2e01ad0d3d81c8417c6e40e09dc13c67abc31672246f CVE-2024-1665,0,0,a3c3185e1ed099faa2439b0c30b394f32019efc90b2215de07a537212ac7a098,2024-06-07T17:15:49.850000 CVE-2024-1666,0,0,332ddb995e5b78503770d93d4cb8bde232affa668f908b2fbb20acc87de0f9ee,2024-11-21T08:51:02.297000 CVE-2024-1668,0,0,c554786f14197afea48fe5d32ecff02cb5a486b44d4745ad9f0f7814f93d7c93,2024-11-21T08:51:02.413000 -CVE-2024-1669,0,0,859ec9d3fcd9904e6fdcb63cdfd51518b1d28b3852776cfb381d1f0fa7c20525,2024-11-21T08:51:02.537000 -CVE-2024-1670,0,0,e9b6ac6955a9a4b8b21a1d2a1f0da97573f825e8c365e377d26613e96f20d35c,2024-11-21T08:51:02.730000 +CVE-2024-1669,0,1,67b8eec966ddacedd4e70201d9e33c690767f007ef44b6e221a074947960a93a,2024-12-19T17:32:13.720000 +CVE-2024-1670,0,1,e643325c520a7a851aaa6d5c5034d3498bbfacaad698e63e558de9d2308fc412,2024-12-19T17:33:44.580000 CVE-2024-1671,0,0,6fd857ed8e49d57c866ab67a431487c43ed38119f3b000302a23833074e59abd,2024-12-06T14:28:01.590000 -CVE-2024-1672,0,0,662c3c34b44651b929ebf603a8c551ecdd1053110b9809be19a2a5a11f1ec427,2024-11-21T08:51:03.060000 -CVE-2024-1673,0,0,a64ef3e8cbd10f0ab7d453b819bcf187888fa8e058b86e76f0ea1b74afad5d6a,2024-11-21T08:51:03.250000 +CVE-2024-1672,0,1,a400dfb45976314f12cfa537274bc886172b15de0b2a1765521de83af338f943,2024-12-19T17:53:20.020000 +CVE-2024-1673,0,1,6164a803e9507fc575ed2827a4461e4a60cb6f46604a08c2b79c354e0c9fc3b8,2024-12-19T17:54:58.023000 CVE-2024-1674,0,0,4ba13d339c0085a8c6736e2e58ccbdd34850427ed620a2dbb72ff03c39afc724,2024-12-04T21:15:21.223000 CVE-2024-1675,0,0,6dc11c1ffd0c7e93efd7705d99983d7290104eca7113a2804027689feb726c3f,2024-12-02T19:54:08.677000 -CVE-2024-1676,0,0,eccee0c9584f65f411d6cbba715aa714fe05890a1ec78d06dfd200bb11e98c3a,2024-11-21T08:51:03.760000 +CVE-2024-1676,0,1,7e55cb96a33844ddc82c1544ec024ca7ca7115da046671ebe1c08d520f2d013a,2024-12-19T17:58:37.093000 CVE-2024-1677,0,0,f63085ae699930c2a7bccf4f5b27074bf865db350d11c7c74e303c37a2dc3c91,2024-11-21T08:51:03.970000 CVE-2024-1678,0,0,75019f724e358fb97543b3b015f8efae7da5666221e51f1dce3b747cd7025b61,2024-11-21T08:51:04.100000 CVE-2024-1679,0,0,85bedae9061b3720a8aac04bdfd64edd595c8634af6e409f360e6e8a3c24160d,2024-11-21T08:51:04.217000 @@ -249534,7 +249544,7 @@ CVE-2024-25128,0,0,2ad7110c12acfdd5d947ad6b1e56d039b61066bd86b0b8efef03d00b8c05b CVE-2024-25129,0,0,2604b0d083aa6b811ce626d5e0d68fa8a4d20df83b064e942d8925d782144e0f,2024-11-21T09:00:18.900000 CVE-2024-2513,0,0,36a2204c3fd6b7b0d5979029682413ad27d7399117bcab08af84ed0f3129ba46,2024-11-21T09:09:54.893000 CVE-2024-25130,0,0,857561f7163809aaab52302af2067a400725f38d7068fc40b7911a37097dbdc8,2024-11-21T09:00:19.023000 -CVE-2024-25131,1,1,3c434d03588e36c026d4d6df2c23ab62981d065dff43549a4c670fcfcd816639,2024-12-19T15:15:07.070000 +CVE-2024-25131,0,0,3c434d03588e36c026d4d6df2c23ab62981d065dff43549a4c670fcfcd816639,2024-12-19T15:15:07.070000 CVE-2024-25136,0,0,fd3e659838fe8e60e31caed167fe0a2ee44d58da08a3516e05cbf377e2acecc5,2024-11-21T09:00:19.150000 CVE-2024-25137,0,0,551f3b541fbbc9dcd6b47f5c71c8a46148d1a721582998d20fa87f2cf6578d35,2024-11-21T09:00:19.287000 CVE-2024-25138,0,0,1698c5f2bc9a0b670f8c6e4fc5e4345882415f9bfce2ea6fa639d6363cc0ad04,2024-11-21T09:00:19.407000 @@ -250822,7 +250832,7 @@ CVE-2024-26844,0,0,611b38c770b94c1fce4dca5df6a1f22a7d2c575242825737622d78cc55cb4 CVE-2024-26845,0,0,a146e1955ec3f1d00ef31b55978170d880fc368cff9fbb490f61d56ddc041ddd,2024-11-21T09:03:11.787000 CVE-2024-26846,0,0,adef312602c132ae5277b34b9b6d22f9bff8d94cab1120703054016313257733,2024-11-21T09:03:11.917000 CVE-2024-26847,0,0,5bf200b97f40200ea3f4c5fdb26ae6099a257b5d52b62ec285f4e0e9e2a25241,2024-11-21T09:03:12.127000 -CVE-2024-26848,0,1,ffc3816a37936f13d3499a1dca28cdbad7a2ad9759ea9c44a36194e432eb3857,2024-12-19T16:15:07.703000 +CVE-2024-26848,0,0,ffc3816a37936f13d3499a1dca28cdbad7a2ad9759ea9c44a36194e432eb3857,2024-12-19T16:15:07.703000 CVE-2024-26849,0,0,84980a05506b325bf9c379ed11fc96c2281a18972bfc92eb1f6fda1c0d10af75,2024-11-21T09:03:12.467000 CVE-2024-2685,0,0,553e765600a993f0723e0108601655294a1fcde42b394ba3115aef19aacda660,2024-11-21T09:10:17.413000 CVE-2024-26850,0,0,d820d9b62cb5f838cdf3f062c6888c860c3aa042b435fb9eabd5dafe96558407,2024-11-21T09:03:12.580000 @@ -252327,7 +252337,7 @@ CVE-2024-28826,0,0,077e8e0b407c9d0f41b5a56fc0a8c8515e3139f57d73c98dd94b70c9a5246 CVE-2024-28827,0,0,20a0a6c1eea7a3a4639aae044c1bd574f322bb4d2a2d3d499f43bf40de5de771,2024-12-04T15:32:27.407000 CVE-2024-28828,0,0,8f248f1744f3a4fd045374ac6f438339f19f7c0ee7413ec5c33c7ffcf52c5330,2024-11-21T09:07:00.780000 CVE-2024-28829,0,0,7a55640720947d8ce349cb378455ecd484e6615d62727837b8c36597f79843f6,2024-12-03T17:55:48.257000 -CVE-2024-2883,0,1,4f169605e5c81ffe782f5da15ba2da05bccdaecaebfe3caba77f265af2641459,2024-12-19T16:02:31.763000 +CVE-2024-2883,0,0,4f169605e5c81ffe782f5da15ba2da05bccdaecaebfe3caba77f265af2641459,2024-12-19T16:02:31.763000 CVE-2024-28830,0,0,4563cf5d707eaa76894bd58f2510a1e38e84669d1a700195533ebfc8719c1a4e,2024-12-04T16:12:51.557000 CVE-2024-28831,0,0,b9f078eda0bf7709be619841a17c72919a06273b6528b30f0ac3ef5ddb7c46d0,2024-12-04T16:26:19.433000 CVE-2024-28832,0,0,d36740d578b94e121524c78aca6be42c6639b820da2e5a247680f98779cbf78e,2024-12-04T16:15:21.077000 @@ -252339,7 +252349,7 @@ CVE-2024-2884,0,0,0f960eecd00a99c28c0967e9bf7b6b5acb44c0938ce2580d2bf9c52f104cc0 CVE-2024-28847,0,0,268bcd99493c8142c03138ae4c578b554dcd0966d72dfbc92319b075a2d99f62,2024-11-21T09:07:02.247000 CVE-2024-28848,0,0,ac0cc2f13d6479fa9ef5f40a6043a1e1afd98b06da363160eb2fde1d86caf54a,2024-11-21T09:07:02.380000 CVE-2024-28849,0,0,fce8d96d043a84934194a3ea53c2248ddb15ea8ac57d38977bd2580a60fca2aa,2024-11-21T09:07:02.530000 -CVE-2024-2885,0,1,633a142213b8958e55f192b95da07bd5bb8c23d90b6f6af638f09073f41aa90e,2024-12-19T16:04:04.557000 +CVE-2024-2885,0,0,633a142213b8958e55f192b95da07bd5bb8c23d90b6f6af638f09073f41aa90e,2024-12-19T16:04:04.557000 CVE-2024-28850,0,0,a37a4283ca549b0be7779ab2ea5db14c7133dfb0bbc8866eaa8e09216cd2a001,2024-11-21T09:07:02.667000 CVE-2024-28851,0,0,64684c9808bba072162a30e9b68edda03449afeb907ef399bbfbbb2b88661563,2024-11-21T09:07:02.793000 CVE-2024-28852,0,0,0fa34d2996926049a3853f8cfbd3cfe829b2800bca87371526216e20f7c662c0,2024-11-21T09:07:02.927000 @@ -252347,7 +252357,7 @@ CVE-2024-28853,0,0,c6b3d8ca5dc60e19f977b74c1f3c7e65504369ba6c0c2c39097a04ce40648 CVE-2024-28854,0,0,fc72a1af9a4423f23eb1c2bfab5673b3cdf91d9369b066233da617e99e87a321,2024-11-21T09:07:03.207000 CVE-2024-28855,0,0,5c10e368bf208600114926c324c0a69a67eda464442a881251a472800e3107b6,2024-11-21T09:07:03.350000 CVE-2024-28859,0,0,6f026de9f6ccdab17442bfff936b54d3f18997dbcded841f5c04513f5212d2c9,2024-11-21T09:07:03.500000 -CVE-2024-2886,0,1,394d8e95a7c910d17686664af11972d5aee835e493ecc95268e0fb8dd1bffa87,2024-12-19T16:09:30.553000 +CVE-2024-2886,0,0,394d8e95a7c910d17686664af11972d5aee835e493ecc95268e0fb8dd1bffa87,2024-12-19T16:09:30.553000 CVE-2024-28860,0,0,615b0e6dc4018679696c4d7b10ac840d76cd4c01792710452a17c3362532000e,2024-11-21T09:07:03.630000 CVE-2024-28861,0,0,91b8766631083f156e1aa3c97aef0422736858e553cc07c5e68f331bab68b22d,2024-11-21T09:07:03.770000 CVE-2024-28862,0,0,89d0e093402bd6601cb90bf8ad7d51712587ca0c9a18ec4ae831f726f4d4bd6f,2024-11-21T09:07:03.893000 @@ -254445,7 +254455,7 @@ CVE-2024-31551,0,0,fa356538791314352979c31c65625f7d3d1db76d8fbb563c6ca1908911c69 CVE-2024-31552,0,0,914ead9815931e20ff2181154b06c32ef7a3d8a7fa339ea2db19cc8be42d3e29,2024-11-21T09:13:41.820000 CVE-2024-31556,0,0,96444529630c53112af8d950fb6f11b36a11f269e7a01ba1ecf9567edabc9909,2024-11-21T09:13:42.030000 CVE-2024-3156,0,0,407efcecf2ac3b4aa4d040b2e2ca127d98fd5076def79500a939cda11ce1ccf2,2024-11-21T09:29:01.403000 -CVE-2024-3157,0,1,5bb582e8c69eaab1cf385ac3bb6b0aded38fa56c83c491168cd5ce2165c837c2,2024-12-19T16:22:30.307000 +CVE-2024-3157,0,0,5bb582e8c69eaab1cf385ac3bb6b0aded38fa56c83c491168cd5ce2165c837c2,2024-12-19T16:22:30.307000 CVE-2024-31570,0,0,c7fdb5046d4520e2262e4587513529624659baf1b342c0161aa56fd989afbbe1,2024-09-25T14:57:47.337000 CVE-2024-31574,0,0,a2ac2354a528ff32b7b04785fabcdce5ea0354f7e68b88be4a523c2925ecab18,2024-11-21T09:13:42.477000 CVE-2024-31576,0,0,5516a552c9c9455eff9be85911cca0846e5ef96c3e87d0189e8480595497f956,2024-04-15T16:15:07.270000 @@ -257038,7 +257048,7 @@ CVE-2024-35141,0,0,08fc451515428b620d6f79f758d938ee532e9ff371e232c9dc7e0fd78b85c CVE-2024-35142,0,0,e09c5238f96d6b53b763e5c8961455b72303122361b03a3c2392fee37019e072,2024-11-21T09:19:49.550000 CVE-2024-35143,0,0,5cb5e3449a374a30898ff7b59de5af975c3a54dcd7a31450775ca701ccf638fe,2024-09-11T14:34:13.590000 CVE-2024-35146,0,0,e7eacc636adf897d4c5c011e27d3e274a3de7c91ebf2fa6595e9899d9810f678,2024-11-06T18:17:17.287000 -CVE-2024-3515,0,1,34ca6c141b25b76cf038dbaf586f76e7d83b53d44af4d1d927517cbfe224c717,2024-12-19T16:19:23.533000 +CVE-2024-3515,0,0,34ca6c141b25b76cf038dbaf586f76e7d83b53d44af4d1d927517cbfe224c717,2024-12-19T16:19:23.533000 CVE-2024-35151,0,0,997e62f9e09bd79d901a818fa07d83a57b09161e5818037373bd99fb7a3f83e8,2024-08-23T15:32:15.270000 CVE-2024-35152,0,0,06c6f92d2caf727cd4e0214816e496c021be32e43d31786397f60659ca719146,2024-08-23T18:57:54.717000 CVE-2024-35153,0,0,72b7eff1e351197066dcedfe56c19ee4fca9d867b0c858ba84a516b5786df0b4,2024-11-21T09:19:49.987000 @@ -259649,14 +259659,14 @@ CVE-2024-38446,0,0,701cc2525c0d53c6716fd48172fea7d553f245fdd9150cff1c179a37285fa CVE-2024-38447,0,0,7b8507515389bad7e0c61be3ff3b5c755e883644162393c68fe20803c4233b58,2024-11-21T09:25:53.860000 CVE-2024-38448,0,0,0417f67feb174d17884f941d52455f2d13f88d869f807172ad5ede5ba4941b5d,2024-11-21T09:25:54.183000 CVE-2024-38449,0,0,567ec77a417153c4a9068f8dd75c90462ba9c3e28b98a3d42719e32f9950215a,2024-11-21T09:25:54.520000 -CVE-2024-3845,0,1,ca24bca207c074b469609aed2b8f96045d7dff9c57a2dac79d0d5320547bdd88,2024-12-19T16:16:50.080000 +CVE-2024-3845,0,0,ca24bca207c074b469609aed2b8f96045d7dff9c57a2dac79d0d5320547bdd88,2024-12-19T16:16:50.080000 CVE-2024-38453,0,0,b06e1636caffb9890de032863731515d8cd548e73c8a186d989d9233397e67b7,2024-11-21T09:25:54.890000 CVE-2024-38454,0,0,9601fd900c5953963986638f92f2a8f677963870ff7cf683ee9bdfaf6f6c4e36,2024-11-21T09:25:55.347000 CVE-2024-38456,0,0,a95fe1e20c3d17c8c8ab011aca7934f84a81097f592ad62257acad46a3f59fc7,2024-11-21T09:25:55.710000 CVE-2024-38457,0,0,530742572f3e0d8f598ff8d44b3e96d3e92201497f084c24a910b04443ee772a,2024-11-21T09:25:56.167000 CVE-2024-38458,0,0,316662ad255ffac546a1dfe9a2a83c5c4561a343c7d52202d1e09ec5b0c948b5,2024-11-21T09:25:56.687000 CVE-2024-38459,0,0,718ac2263702bcb446ad5fc66d486a111d9c07464f3c2a2055f11b5cfda8efdf,2024-11-21T09:25:57.203000 -CVE-2024-3846,0,1,22c0cf51b11cf3d39910782a06b2e81a9bbf2d5d56c3ddee4bce579336b840ee,2024-12-19T15:15:21.020000 +CVE-2024-3846,0,0,22c0cf51b11cf3d39910782a06b2e81a9bbf2d5d56c3ddee4bce579336b840ee,2024-12-19T15:15:21.020000 CVE-2024-38460,0,0,73349d8a8244ee6979660bbd1dffd1eac86844f0971acc52fd9c8630d05d63f6,2024-11-21T09:25:57.670000 CVE-2024-38461,0,0,78c97e597d8e82b771c12404c1710c09325a77b878d5733473a75786136ec909,2024-11-21T09:25:58.163000 CVE-2024-38462,0,0,b488562b6e1e3080d85ed256a57dff6b8f4c4d3e9b77930531ac1876a124f779,2024-11-21T09:25:58.743000 @@ -259665,7 +259675,7 @@ CVE-2024-38466,0,0,c2628e96404aac95bd4dcfd9c2f2c153a326a8af210e1e93dd5f3ea7c76cf CVE-2024-38467,0,0,caf9acd7cc458a3d14ff8cb7e6429702effcc0ca3533a6066e1ff41ba88e568b,2024-11-21T09:26:00 CVE-2024-38468,0,0,f9c8ba626246015283ec95ee672d5890382c7cb042b08d04e6efb4886ecbd5fe,2024-11-21T09:26:00.370000 CVE-2024-38469,0,0,709e5cc6e5aa933183c1136a6638ff0b784482a2d42a0ee2e4cc71f144247f6b,2024-11-21T09:26:00.630000 -CVE-2024-3847,0,1,21711e7b0912c812c2eee5766c676d73d26cd06684dcef9ab53e870dc31337d8,2024-12-19T15:08:38.647000 +CVE-2024-3847,0,0,21711e7b0912c812c2eee5766c676d73d26cd06684dcef9ab53e870dc31337d8,2024-12-19T15:08:38.647000 CVE-2024-38470,0,0,5e707236cb2e99d16551b25c24b90020007c67744e0b7a80bacccaf0b4dbbf90,2024-11-21T09:26:00.980000 CVE-2024-38471,0,0,1a067d100074a402cd5c38a7da3a3b3f2da04dd707eb167accc020f18ebb5050,2024-11-21T09:26:01.303000 CVE-2024-38472,0,0,b1123c48a89600eb7a31518ce0bb89b10b0778ec6be006c999b3121e02b83f79,2024-11-21T09:26:01.733000 @@ -260012,6 +260022,7 @@ CVE-2024-38815,0,0,c2f3d96806ad2c957e6f1813738eb63c778dd5bcfc2ca0fb6ff008ef1226a CVE-2024-38816,0,0,0b9be07313f5b4bae4c2668eaa8acd43a2bfb4e9eb1135724f123d6e85fcb6b1,2024-09-13T14:06:04.777000 CVE-2024-38817,0,0,d35b7b204aab6983c6c262b508cc4ec8ea32f0ec3634fab0504cad88bd52a03a,2024-10-10T12:51:56.987000 CVE-2024-38818,0,0,f3b0a463e446554a0bbb57d124414991153a9fb40d9dc2ce6360b72156684b2b,2024-10-10T12:51:56.987000 +CVE-2024-38819,1,1,1f5bbbda9a252ecd9727be9f400e350fab6b6dd7b8142970948675b20171c34d,2024-12-19T18:15:10.557000 CVE-2024-3882,0,0,d37dc3616c740393b4e1b16d38d2bd3ccee2a1af91c97d5fbd3f6f75e095d7d6,2024-11-21T09:30:37.540000 CVE-2024-38820,0,0,517fdb1091af57612900b39a11b0b83e3890144a7a4d4cb71cfb71c69b405fa9,2024-11-29T12:15:07.007000 CVE-2024-38821,0,0,0618f1513f6bbf25c713d315a6dad9b1bf80204f6b7dc5d1e77e053b31592951,2024-10-28T13:58:09.230000 @@ -260035,7 +260046,7 @@ CVE-2024-38860,0,0,2fe29335e4516ea3256064dfc26190ce7cc189e9ac31e94fea538574e1933 CVE-2024-38861,0,0,d90c23362d2b5bb6263f8e48f50317e3d53e04f0a4469c9dd3ff57b01dc1140b,2024-12-11T02:59:59.170000 CVE-2024-38862,0,0,9b3effa57af127d210fa99d38decd49715030f753336a9c99109dcc9d2bae0d1,2024-12-03T16:56:19.887000 CVE-2024-38863,0,0,19f40d0a8efdafcf1661471e0d88ded3ea1f1a6ed7ed00a5524865119c45bf20,2024-12-03T16:47:15.693000 -CVE-2024-38864,1,1,7cf8731e9c51bad4951a528c23c1b0408734f55fcddd88e6429508c444ccc918,2024-12-19T16:15:08.197000 +CVE-2024-38864,0,0,7cf8731e9c51bad4951a528c23c1b0408734f55fcddd88e6429508c444ccc918,2024-12-19T16:15:08.197000 CVE-2024-38867,0,0,99a6ceac214ee5f926f3536f5f9429a3f2ad1c8beb42ad2f5b0dde6e9884854d,2024-11-21T09:26:53.620000 CVE-2024-38868,0,0,f617565b943eecb1268c96959d081ed3b2d4ce7c428fb68cb30623b6faafb7c0,2024-09-04T19:13:29.983000 CVE-2024-38869,0,0,f770e86162bd7ed85445a4b54936e199dae2eea6001e0f8f44ad54b01ece9407,2024-08-30T18:15:07.150000 @@ -261003,7 +261014,7 @@ CVE-2024-40579,0,0,da11a1c0f7825d9658796f4408f8973703e2e8887ee02d7fb06e9fa156da1 CVE-2024-4058,0,0,41bd13730a967fba6dfa98e0a473274805b3a9521fbf9427b1f8ca715400dc8e,2024-11-21T09:42:06.270000 CVE-2024-40582,0,0,dd0f2a6d540adec2bb9dbc707f94fc9dff9972da1e4d33c84f17f86b02c0ca18,2024-12-11T16:15:10.873000 CVE-2024-40583,0,0,060f59166f99bc729cca84acecd51bc3d35affc7058999b403ee573e24158633,2024-12-11T16:15:11.080000 -CVE-2024-4059,0,0,2f671c74797f14e6bdcf4372cbe6dfb45567ca4b71a7df62ffe5d87b0fb0b9e0,2024-11-21T09:42:06.517000 +CVE-2024-4059,0,1,a7395c4133ca68cf195a746536b2a10391759a1b7af0981398c03fdffb32f8d2,2024-12-19T18:56:45.140000 CVE-2024-40592,0,0,70d588c7e0dd63c3f30c565c48cdd17864cf3988f3b717bd753beb73e71e83a3,2024-11-14T20:37:06.040000 CVE-2024-40594,0,0,bf65899143a2f4c0e93f528c3b9a7873123db8d586300b13b7dc1af3be463ad0,2024-11-21T09:31:20.467000 CVE-2024-40595,0,0,1086c58a18861988742c11b047f1900d16c515d21111ee56b1cf972adc3e9a0f,2024-10-25T12:56:07.750000 @@ -261011,7 +261022,7 @@ CVE-2024-40596,0,0,cc871acc0d8ab01520b1271fab5c6989d4ce86d645264de6e102f86e2b5a9 CVE-2024-40597,0,0,8a4ea522434a8353ffa3db1f66d48d9ec686cbf011d935aed3582970ab4fee33,2024-11-21T09:31:20.973000 CVE-2024-40598,0,0,b777ec9c9772520a1470d608939dab7025140fd1aab87049fa38ec83eb520e9a,2024-11-21T09:31:21.177000 CVE-2024-40599,0,0,0d26c1cac9c656d98f818270c22297fbe6223c78d20070058c67c37b64dc564b,2024-11-21T09:31:21.317000 -CVE-2024-4060,0,0,39ebef6c8dacee3229c038bbf375cc22ccb6d7a30aa9964b215a010a57badd95,2024-11-21T09:42:06.620000 +CVE-2024-4060,0,1,7ac7ff97e2b532e517142631d36d353c5d9e185ebe36091dcbfef60f873749b9,2024-12-19T18:54:01.637000 CVE-2024-40600,0,0,22bd00008fcd431c4e4910f7a8db138543cfb6c9d0816ca29c16e279d88f61ad,2024-11-21T09:31:21.450000 CVE-2024-40601,0,0,0aa50b76ad7f2dcb34c436272c0e3e3d55010312a8dc26be4224bc6521d6accd,2024-11-21T09:31:21.660000 CVE-2024-40602,0,0,e022549feee86fbc89f8fbf8ce3dfbde01d7ce40ae2524a08d7a96713545e379,2024-11-21T09:31:21.880000 @@ -261445,7 +261456,7 @@ CVE-2024-41086,0,0,0fe02eb9844a090bdca199e5ad62a105b2a4d9aaeffc6addd405c7e22990e CVE-2024-41087,0,0,2e61f3e7be1eacdb075b13a51b643098d8639780e9943507e16da696e299c52d,2024-11-21T09:32:13.063000 CVE-2024-41088,0,0,754ebc4f8ac7b57a5fff3fb2a7d9bdfa765fcddce74b7f844be0fc47aff866eb,2024-11-21T09:32:13.197000 CVE-2024-41089,0,0,2b23e7475804c066a4ea9b8a0f301e5008cbbfb9d5318eea5d282a397715808a,2024-11-21T09:32:13.320000 -CVE-2024-4109,0,1,636cbde909093dcf27b38def27a3e89c242c67141fedd66410ad931f271e69b9,2024-12-19T16:15:08.740000 +CVE-2024-4109,0,0,636cbde909093dcf27b38def27a3e89c242c67141fedd66410ad931f271e69b9,2024-12-19T16:15:08.740000 CVE-2024-41090,0,0,6e406ad9415fc1e7e6a216667df09c15b6ed6f6aaa3b1b114952b821deea1913,2024-11-21T09:32:13.460000 CVE-2024-41091,0,0,a0433796ee677d0c166a58c773745dbf539d3398d767f468c0128a83251368bd,2024-11-21T09:32:13.587000 CVE-2024-41092,0,0,313eda38a8533d8fba9497775d21071868685eb90955615a5d9e61f43ec4e28b,2024-11-21T09:32:13.713000 @@ -262023,7 +262034,7 @@ CVE-2024-41999,0,0,b97edfde7ae6eb79fac26588dc330cd7e8dfe8ef88db849221e314600b8cf CVE-2024-4200,0,0,f038714f68ea12f4c74fb21fbba21d18e23ff4002802fc658c541b8aad8db5b3,2024-11-21T09:42:22.677000 CVE-2024-42000,0,0,2e5e6eba94260d1248a64e384ab7190b55ba9e666e827b568cb017e068a9a34b,2024-11-14T16:48:30.013000 CVE-2024-42001,0,0,7b8b45588c9e661c6cad79b697fc90c37112d9be488e1f5fc1421e2d70534ef5,2024-08-20T16:37:05.447000 -CVE-2024-42004,0,0,817bffe189720697fa27094cb065692dab1e4b1f1fda226cf8e46b370d47891a,2024-12-18T23:15:08.450000 +CVE-2024-42004,0,1,90306491ccd1c91e80f123f2241268f48b350fe135466ebbcc213b1a721c656c,2024-12-19T17:15:09.120000 CVE-2024-42005,0,0,4b7a03a62388d79840f1dbc20489aec0bae7f52ed889bdc9e9f4ed295e447d04,2024-10-23T18:22:48.937000 CVE-2024-42006,0,0,db719e10e8f2437035bfb372f689cb5ad1b3ba987ed59129a01e11cdd446ff43,2024-08-21T13:26:54.577000 CVE-2024-42007,0,0,18023dc0188646143bd9484c36c6b41c6281c494fdb0237aba0cd6dd52e9a082,2024-11-21T09:33:24.887000 @@ -262201,7 +262212,7 @@ CVE-2024-4220,0,0,c10e6b612d929680611c4be467944f24a66f27a0712499a1f349b6953213d8 CVE-2024-42218,0,0,3bca921601eaa25faf0015687ed4f595ccacf0ae5ca15099cde7ba2db042877a,2024-08-12T18:27:54.660000 CVE-2024-42219,0,0,a97969401a201997f2184a96905a9ffb0133ef1ebb5bd9c9a8f1fdcbd582f6f4,2024-08-12T18:30:21.627000 CVE-2024-4222,0,0,404604444d77dc73b57c36b8a95aa3dc38057a1a3ba659619f4989018835c2b9,2024-11-21T09:42:25.043000 -CVE-2024-42220,0,0,3efaea9f9008d92d0d433576bd8e615ab7d920bd31eb633108deeefd65ebfba2,2024-12-18T23:15:08.597000 +CVE-2024-42220,0,1,e2df6d330a245d001c7572a1a1e358a83fe211a6e378dbfa0f00f37093294ceb,2024-12-19T17:15:09.243000 CVE-2024-42222,0,0,31d1ecceb29f6dc0a006287b8f36eb69950f688f623593894878e73f68b4744b,2024-11-21T09:33:45.030000 CVE-2024-42223,0,0,bfd3e9b2497c2cd4ce56cfc4b3f7c8c085d8282b329417cd9636c8478537873e,2024-11-21T09:33:45.160000 CVE-2024-42224,0,0,a2467d1fdcd4f892f0d1e376bc5d4807929bf44cfae506d429e598dfa3e2b882,2024-11-21T09:33:45.307000 @@ -262803,7 +262814,7 @@ CVE-2024-43099,0,0,dd4c6171d90425754eb8c361c1c6555117a95d6bcad5f992f28ec42a1deec CVE-2024-4310,0,0,dd5cf151edf7d2cd055572eb00e97620ec8e8024a5783f50f0a1b0ae59db4b35,2024-11-21T09:42:35.913000 CVE-2024-43102,0,0,b6aa6225bd8ed19c424a914e97c361ac2900c128d3e8c90742dfa8fa3a85a13f,2024-11-21T09:35:00.713000 CVE-2024-43105,0,0,e347f7b09a6bd72c4cce9575828cf84dd0078060fb85e7c631ae4a4f65e5a4e2,2024-08-23T16:18:28.547000 -CVE-2024-43106,0,0,7c35bd64ddd80049f7425ea57212cdb212a079b1dc41737dbd159b80835e180b,2024-12-18T23:15:08.760000 +CVE-2024-43106,0,1,b9404da1eab7945c9a6ade4f67993c5894badd4bb07ff08bbd7dec6824c5d2ce,2024-12-19T17:15:09.350000 CVE-2024-43108,0,0,77fa3735512d5828a3d75fa92bafe3bf54d868b127562dbed774be5fb641f858,2024-10-17T17:15:11.883000 CVE-2024-4311,0,0,76e51b82bcf102c4a7a18c5b03d4ba2a6e78929354b4c7d54c7e39e256fd7ef3,2024-11-18T16:35:13.737000 CVE-2024-43110,0,0,51650deb7aee7ab0cf914391f943f7fe2c91b657e3cdae3cff1f5f569194dcba,2024-09-05T21:22:04.810000 @@ -265521,7 +265532,7 @@ CVE-2024-47087,0,0,aadede43cd6982b03d609814fe13168dfb2ee6915d193c1af719e757a292b CVE-2024-47088,0,0,efc4d9edbe3ddab005f2b2845098209fc6282389589b324ea91fcecf3010d130,2024-09-26T19:12:58.083000 CVE-2024-47089,0,0,7c817288360e94794b37bdc1706058a816cc69e4972a94427a49b22937a99014,2024-09-26T19:09:44.377000 CVE-2024-4709,0,0,613e57ae1ceb02dcd7cd23d2e724aec8eab6480f5f138696ad2d1f217ee1ae65,2024-11-21T09:43:25.490000 -CVE-2024-47093,1,1,73357d58ac6b1da4fc70fd5c27e86c48c8e149d4bb627f19e2e802d224915ff8,2024-12-19T15:15:07.250000 +CVE-2024-47093,0,0,73357d58ac6b1da4fc70fd5c27e86c48c8e149d4bb627f19e2e802d224915ff8,2024-12-19T15:15:07.250000 CVE-2024-47094,0,0,d24e1f292f7d19d40d32d967d3e72cc931ea886edc80358cb771de69f5f1ca5a,2024-12-03T20:01:52.610000 CVE-2024-47095,0,0,ab3ae5fb8cc2610821c1dec2e1fa7073f06cbe80c80fa571d8c05d61db95648f,2024-10-10T12:56:30.817000 CVE-2024-4710,0,0,9c507813f9fc80a7b0290c71ebb56c5cafbe3613f57bf93e1120a9c56f52904d,2024-11-21T09:43:25.600000 @@ -265846,11 +265857,11 @@ CVE-2024-4751,0,0,323d34e4e60f2c798f82031d559639fb459a06390325463f51ec0a8dd20e43 CVE-2024-4752,0,0,710c56921216e1d7aca081e59c40f51db5ad035f8f7076b00214ce955a44b36f,2024-11-21T09:43:31.400000 CVE-2024-47522,0,0,c02f34b0206a3beffa01319045412a788f423598c15fe9aabedbdbabe223631f,2024-10-22T13:51:02.710000 CVE-2024-47523,0,0,c97d6eb97cc8d0172f2511cd438bb91b754c178ebc143b911ae3b2c8f936379d,2024-10-07T19:07:30.287000 -CVE-2024-47524,0,1,e4d42d0b194ce3c0402a53054852a6593b27aa59e8071d3d2c032cd906d11934,2024-12-19T15:43:50.877000 +CVE-2024-47524,0,0,e4d42d0b194ce3c0402a53054852a6593b27aa59e8071d3d2c032cd906d11934,2024-12-19T15:43:50.877000 CVE-2024-47525,0,0,364dacf60576b018309a04ebeec08c327d1c9e8981ee8174f648b489b0d4c3f6,2024-10-07T19:08:18.707000 -CVE-2024-47526,0,1,86d04d8cba87486a75885c09b4bfb191d63e912924182c96df9050cb3d19202c,2024-12-19T15:49:50.127000 +CVE-2024-47526,0,0,86d04d8cba87486a75885c09b4bfb191d63e912924182c96df9050cb3d19202c,2024-12-19T15:49:50.127000 CVE-2024-47527,0,0,1dcbf13d29fcb84d1e579a81ed4d69927be1c75466b6a541ab32ebdecfc8aa5f,2024-10-07T19:08:41.467000 -CVE-2024-47528,0,1,816074b28da6e1bb50caf3a1083e9df80fe0e8a153a11833171f3457286c2b9a,2024-12-19T15:50:55.140000 +CVE-2024-47528,0,0,816074b28da6e1bb50caf3a1083e9df80fe0e8a153a11833171f3457286c2b9a,2024-12-19T15:50:55.140000 CVE-2024-47529,0,0,a9b0336ebc517e6b99f42e4f010d2f2e59bda66b9cdceae417bf754098135fc3,2024-11-13T17:15:46.543000 CVE-2024-4753,0,0,6cb88657cc9cdcd163d97950cd1c5e06d9e39da73171d051883e9b5e56df07c3,2024-11-21T09:43:31.570000 CVE-2024-47530,0,0,059f55f31dd2067533b59f87cfbe90b48f1215a28a9b34ee8ca800e201dbc5b3,2024-11-15T18:03:06.497000 @@ -265860,7 +265871,7 @@ CVE-2024-47533,0,0,41a201694742c90b8f85fbbe30b794402c2192bad28c80f58c5f6f1e26bc1 CVE-2024-47534,0,0,df13f2ee68fa5e66e525b7b1f66f6aa0f0e1c060ce893dece259dc49bb6274b1,2024-11-21T17:15:17.047000 CVE-2024-47535,0,0,298d41133677422a8f6d390f12d2cec10b4d60092e295406e026ea754c8a295e,2024-11-13T17:01:58.603000 CVE-2024-47536,0,0,6f8a4b4f8220f9b26154b954ad727df271a73f901fc0c3d5863c162fae5afc51,2024-10-04T13:51:25.567000 -CVE-2024-47537,0,1,9ba26d9b92b65865b859ce26ecf17cb4e80757621a21379dd0bf7edec43394bf,2024-12-19T15:20:52.377000 +CVE-2024-47537,0,0,9ba26d9b92b65865b859ce26ecf17cb4e80757621a21379dd0bf7edec43394bf,2024-12-19T15:20:52.377000 CVE-2024-47538,0,0,ad7972197a18862beb8bdd90c0ae99acdd81ab31bd6496a51470f43a9079cf2c,2024-12-18T21:51:56.203000 CVE-2024-47539,0,0,e700345225afbdb189fa376bdd8d61a4fac3ed4f8377392883f6552c7cecac25,2024-12-18T21:52:56.307000 CVE-2024-4754,0,0,f946bc350cafc376503b251e8950814dfbf85a03e7ce93cc628c4f28533490c5,2024-11-21T09:43:31.777000 @@ -266142,7 +266153,7 @@ CVE-2024-47821,0,0,1ad5cc98b31fb97413a2af4b0b825f5fc2f8d897ba91f4430ae5ce2de36ae CVE-2024-47822,0,0,b0dd7d624684135dec669ccedea84427af774a23affb4e9cce1a3f560b12e605,2024-10-10T12:56:30.817000 CVE-2024-47823,0,0,336ac507480a6e31bc670e3eea63dd6c12b526e914a6141258cfa4b3d9c44b55,2024-10-10T12:56:30.817000 CVE-2024-47824,0,0,97bf5a27d2397e0f0377b54caf7f6a92074070c7778d6b1d1355aecbed8e7f6b,2024-11-21T17:15:17.650000 -CVE-2024-47825,0,1,f2c70b114484b175f9d75f5ebb125aac926bd889413c3088b95d536b95e4823b,2024-12-19T15:59:27.760000 +CVE-2024-47825,0,0,f2c70b114484b175f9d75f5ebb125aac926bd889413c3088b95d536b95e4823b,2024-12-19T15:59:27.760000 CVE-2024-47826,0,0,c4f33e7bebd2379ead32307d8a6391982ffd919a32cfb4a5d9b964741d396101,2024-11-08T15:41:00.787000 CVE-2024-47827,0,0,d3c16613487cd380de03335f1c8e5b08a0a4d0bf3e668170c381575f6a060fe9,2024-11-05T16:50:27.330000 CVE-2024-47828,0,0,f2c2241d50091646d8dc52a9b7faf3ab7da7e5424685ad1326bd33f9486f8035,2024-10-17T13:55:23.577000 @@ -266457,7 +266468,7 @@ CVE-2024-4849,0,0,7c7338e4b2ef8e6d928b2b56fb6f44a10225de9db2a372e1cf3d597fbe7ff8 CVE-2024-48509,0,0,93a9c48c9cf82da699ff95d30953f99800999991b78056a3ec4235c759a110b9,2024-10-29T13:38:16.893000 CVE-2024-4851,0,0,778c867c8873e919fd1508282d13b682099f8dccd85b91b6f2c07b18a85f9996,2024-11-21T09:43:43.997000 CVE-2024-48510,0,0,657bf60a1dca06dbc7d1985bc8869a3fb322c0603aca32f8bccfc2cb4278c49b,2024-11-21T17:15:19.780000 -CVE-2024-48514,0,1,7967601421b3f49e474281860b80dc24d12c1d46f138377d1b0496a28ce0b17a,2024-12-19T16:15:08.340000 +CVE-2024-48514,0,0,7967601421b3f49e474281860b80dc24d12c1d46f138377d1b0496a28ce0b17a,2024-12-19T16:15:08.340000 CVE-2024-4853,0,0,b09058f5d43e04db3d08963d7f9430149f4d79194ad2af008ff04b9f50bdba73,2024-11-21T09:43:44.133000 CVE-2024-48530,0,0,b5b83c3621089c062cd75d5999fd7edfe6d0c0349283534b9f9af54c99d88e42,2024-12-03T16:15:22.973000 CVE-2024-48531,0,0,2d5f5c69af7d8d63e472d50960b5146ad6192327ef32b1590083ac02190b5b73,2024-11-21T13:57:24.187000 @@ -266853,7 +266864,7 @@ CVE-2024-49195,0,0,f09eab8729e42b8f90de1ca9d2dd22f865dd713c9e6432237b0fc072c9131 CVE-2024-4920,0,0,fba2df33f6d5af1375476a2a95714547e5f0b6d1d9668d13156ac51cb8462e84,2024-11-21T09:43:52.290000 CVE-2024-49201,0,0,8b1f66cc9476326daf639ce90ea10fc49be4ec98dad343f339e234cc3009dd9a,2024-12-18T19:15:11.077000 CVE-2024-49202,0,0,74db207f798383815364036dea6222d4e8ee966960ba697ce2cfbf6aab9ab241,2024-12-18T19:15:11.203000 -CVE-2024-49203,0,1,a5f7ba34b89000941ebf8938140c16c4627d55d6ed61c01c2bfbacf4e90f5479,2024-12-19T16:15:08.537000 +CVE-2024-49203,0,0,a5f7ba34b89000941ebf8938140c16c4627d55d6ed61c01c2bfbacf4e90f5479,2024-12-19T16:15:08.537000 CVE-2024-49208,0,0,015cd020401085ebeb441a6e29c2c511b67ebda9206e8568e89e3ddff73bd4ca,2024-10-25T20:18:20.550000 CVE-2024-49209,0,0,9ae848f5908051a81c06c0975ec096052c93e9171594c97faafd9f3378f596d0,2024-10-25T20:17:36.353000 CVE-2024-4921,0,0,c5160c30c6dd10b7e85afce488c379853436f7a13bdb59331e968a6341180868,2024-11-21T09:43:52.440000 @@ -266986,6 +266997,7 @@ CVE-2024-49331,0,0,fc33cda51d0ae00f7fe88fbdfa0860d165096722e67220af6538ac02d3a62 CVE-2024-49332,0,0,163fc61e1aa5949d0dc085fe875d10ef86a8206eb7889644482dca315618c25c,2024-10-24T15:49:34.827000 CVE-2024-49334,0,0,c834d2b3cc4ff6e9dea6658a6f1e0bf3ee35911e84a97a8c123fb548c9607113,2024-10-23T16:08:01.277000 CVE-2024-49335,0,0,3160ec720c602cc52406d525d62eec9c1419d94d6b3a852f9810bce5470fe4e2,2024-10-24T14:50:16.557000 +CVE-2024-49336,1,1,ec57bb7d872a43bad97b822b048cb0492f81e6943d0b5e6db2b08867d3ca17d1,2024-12-19T18:15:22.850000 CVE-2024-4934,0,0,c48302b0b85313af5a6e75f2285d80b1e442db3b1b019c52648c5cb5dff0b2d3,2024-11-21T09:43:54.343000 CVE-2024-49340,0,0,121e4a69718b7eafa91c4d48c066b6562f54cd89bd7dd643eed0f1ac402e3c12,2024-11-08T15:06:21.730000 CVE-2024-49351,0,0,9d2fc2a435b61fd62d7b18f4f752bd55144b2c0d48ce521b6a020db1fccb6d13,2024-11-26T04:15:05.457000 @@ -267073,7 +267085,7 @@ CVE-2024-49509,0,0,15e897a9631a64e5146680986f3191fcf788babf34f3f0ba79ae3fe2c381d CVE-2024-49510,0,0,5e39a02e4fdffae2c7a663bfd00500c029c1db2acc5c0e5406cd285743c01041,2024-11-16T00:35:01.073000 CVE-2024-49511,0,0,1ccfa6e8c66c4ee14d0fcfa1d4c2c0cb523a129998f43db64fa514a90d65cbbe,2024-11-16T00:34:33.607000 CVE-2024-49512,0,0,a84d30bdef56eee22b653ecf431eedca8d6beb3b76f7aeffe4966ed165543146,2024-11-16T00:34:20.890000 -CVE-2024-49513,0,0,b2fb61682fed6cde802ab0730fb1c05405d7c8608105274c8ac6621cfcde654b,2024-12-16T17:15:10.130000 +CVE-2024-49513,0,1,c64d3775249227cb6feeaa2f514c265fa7c3e3b42d87e7341eafd3a185da69ff,2024-12-19T17:15:33.163000 CVE-2024-49514,0,0,49167289c5b9d01fc885a7ca0339bf6627a9365daa3fab2d195910d5101cdbe8,2024-11-18T18:06:39.030000 CVE-2024-49515,0,0,79d1cd1b41e183c3a6d8383ca22dee59ebc2441ad64ca67571e15c6d3f39714a,2024-11-13T19:14:24.320000 CVE-2024-49516,0,0,44da5d94482e4b65792e0d29a7ef15205438256f74e207e521457b4cb0fb7589,2024-11-13T18:52:31.573000 @@ -267845,7 +267857,7 @@ CVE-2024-50375,0,0,56fac947e422fb64269f533486d0dc1ba9144509c581ce0bcf7e3c3e84436 CVE-2024-50376,0,0,1c676d8cee989c82ac8ed765a7b894a6388eed787e438d8c71eaa753adab0d7f,2024-11-26T11:22:08.323000 CVE-2024-50377,0,0,f6840753b5713fbe96faae600e2c62c2c1e93f11e2b524402c997c7946e91ee2,2024-11-26T11:22:08.767000 CVE-2024-50378,0,0,900ee50327f5385f2403e248242013736ebb85dd213456a5c5c919b232de1cfd,2024-11-21T09:44:35.040000 -CVE-2024-50379,0,0,301173b39232c553099c3e32ce91026ab855e99278390b52f878f97b20ad4e86,2024-12-18T17:15:13.870000 +CVE-2024-50379,0,1,03833bf22c6c3492e9f1fd9676c46f3f7795036733ba2efffe6f5cee980a3030,2024-12-19T18:15:23 CVE-2024-5038,0,0,58120a5c504a9a5dd9c3a22b44d30b89afa2b5f02020ba28c9cce702a8c38af9,2024-11-21T09:46:49.963000 CVE-2024-50380,0,0,f10ef598ecccc7ed544ab2722f10c84c2a5e78255563c7513653ff94676d3b30,2024-12-02T17:15:11.980000 CVE-2024-50381,0,0,2c2c5a4847c05b7db6d3d96ff87c82f854de4222974bc5963df25dc7516f2d78,2024-12-02T17:15:12.160000 @@ -268382,6 +268394,7 @@ CVE-2024-51460,0,0,5ed8cb0bc6e7264a024f4fdc6bea49f8d819c03171033b2027328a825c325 CVE-2024-51465,0,0,b984a1f47331a027471db6ecd22c9db67a7b4679236a111706732d4e42cb3082,2024-12-04T14:15:20.223000 CVE-2024-5147,0,0,b4fda03873bf91b8aee1014c1d03851aae8f0afeab0edb3aed7529ff221065c3,2024-11-21T09:47:04.057000 CVE-2024-51470,0,0,9a68227a72c1064eab4055d83fe70a009177c8e62fdfec5f25404954fdd9cb78,2024-12-18T20:15:23.233000 +CVE-2024-51471,1,1,da4efc372fa124d54fa44eb99218e2e0080d03b73921d05f5529d8f942405e5d,2024-12-19T18:15:23.153000 CVE-2024-51478,0,0,f0595ed35f1f283d907e9d623fdb50e27981165a57dcab6e98c75f63ec12b3b4,2024-11-01T12:57:03.417000 CVE-2024-51479,0,0,f8882cf24e149811c918d20c88e96430268602fb924cb6ee911fba1ceace0aa7,2024-12-17T19:15:06.697000 CVE-2024-5148,0,0,f40c04de71d66c8857441b50b10a14db507d29d1691198e2bceac6bdc772cfd5,2024-09-03T12:59:02.453000 @@ -269371,6 +269384,8 @@ CVE-2024-52872,0,0,d5c137691ac8affde2eb9f0d98f11a2242b42b7ed558ce4003950a4392704 CVE-2024-52876,0,0,6fd21241a1a4f5f736d93e368fdcf08c204bdebd19eb249ace2fceb507212592,2024-11-18T17:35:08.900000 CVE-2024-5288,0,0,35888db4a5e323e6a29faa7e47d2416858cbeb598a42c21aa0c323691cd3d86c,2024-08-28T12:57:39.090000 CVE-2024-5289,0,0,45ad6e1c3a8134226122bea6b70bcd4aeb55721ddc7a695e24fb24c5dc173e1b,2024-11-21T09:47:21.990000 +CVE-2024-52896,1,1,2f214136fcc09a78547866440ba88fa08d3d22e5d3f82777f282c7990167bd1e,2024-12-19T17:15:09.797000 +CVE-2024-52897,1,1,ff5defb17bfeb3f5f90bd90ab4c0a4c835a97caecdf64efb419ab211ddb6ea0a,2024-12-19T18:15:23.357000 CVE-2024-52899,0,0,fd381e4ffbd82c5c3ae3119791a451a008b2780104bd8e38b6962694cf0bd562,2024-11-26T01:15:07.153000 CVE-2024-5290,0,0,63b2ebbbc89fe3009e69f8f9e716432542a09cc7bbb7656b9181d2882b05d010,2024-09-17T13:09:13.683000 CVE-2024-52901,0,0,b816b5cb98cf7a5b0d48398070b9006c656711b2b4741d0569a92b7898dcb78d,2024-12-12T16:15:54.807000 @@ -269502,7 +269517,7 @@ CVE-2024-53098,0,0,5580b97bce6f5b4830072d4f8a1a0d979c2074edd87e99c728a3432c787bf CVE-2024-53099,0,0,c7a82c0b65ac421355e95896d384658b1584d64b2ffcd26bf140b2f7f32b439f,2024-11-25T22:15:16.433000 CVE-2024-5310,0,0,2f7fe56905fa71b6c5244c78a7d9d6396f207d8efd7d5fc87cedf378b01f9572,2024-11-21T09:47:24.280000 CVE-2024-53100,0,0,d49b25334b205121a6433cd6ac9e5a316b0b4e79773dd5ed08c4e97fe398eaf8,2024-11-25T22:15:16.763000 -CVE-2024-53101,0,0,18942ab9b29f25bd752c3ab9f00057a2471d8b391133a8837d29de1938d54987,2024-11-25T22:15:17.163000 +CVE-2024-53101,0,1,c425bb46b3515da57dc87974bd0976857d07567982d62109b13f805737e7ca08,2024-12-19T18:08:23.857000 CVE-2024-53102,0,0,d1c3ad92d75c37363246642f8e4ba479d5a4bde44aee221d715666c203805e79,2024-12-12T16:15:54.967000 CVE-2024-53103,0,0,fea1df1ec4e010b077b8ce29997cc11c0435ec37a8a561a5de86032afeb9dcfc,2024-12-02T08:15:08.537000 CVE-2024-53104,0,0,063549a8c93277f1603e55e543da35e55c8ff1c1baaef95c67cc0358a7fba5da,2024-12-11T15:15:18.110000 @@ -269932,7 +269947,7 @@ CVE-2024-54032,0,0,09cba91a1df36e472a78f8f144bb0e8b61b676d406db1792f2031c6b3f2fb CVE-2024-54034,0,0,966edd017a57a1808f5de74caa3cb2bc440d3f55cf34a20417d369b2c7aa38e8,2024-12-10T21:15:20.817000 CVE-2024-54036,0,0,3018605477ed7dbca479c548307fd9bd3dfad4d0112e1f577cf4e868d3c9a01b,2024-12-10T21:15:20.947000 CVE-2024-54037,0,0,f556890ba3fe80df125187ebcadddc7ae2b89a3c8454bb4084a0b553458107af,2024-12-18T14:40:29.303000 -CVE-2024-54038,0,0,92ce715c583f62225c8c85cc0d83f79cb82abf9ebe1a12a974431832bf726201,2024-12-10T21:15:21.210000 +CVE-2024-54038,0,1,a3de0ea304413e66b7c2f1efe4c35ea1a749c76c58556ad8632148eac64c9742,2024-12-19T18:58:38.737000 CVE-2024-54039,0,0,71aebf25c5147d9790628c00b402ce1cee82b243f9de77d9f70b222872f7f46c,2024-12-18T14:40:37.587000 CVE-2024-5404,0,0,3740c7be3046d2190332188e66ec21e8b1d4282df75b875095c31d64e80fbe92,2024-11-21T09:47:35.213000 CVE-2024-54040,0,0,13233b484ebb0fc9bf3b9db7209ca33808cdf1c4b9bbbc04e46251909657b46e,2024-12-18T14:40:44.710000 @@ -269947,7 +269962,7 @@ CVE-2024-54048,0,0,1732d4671bbeea0157b6640f3723e4501447d2b687ba3a9a6cb84ef94950a CVE-2024-54049,0,0,b25add6c7f4972fe04c3adfdc0b2278f3dba4fd570c385f036735c8663a66627,2024-12-18T14:42:33.907000 CVE-2024-5405,0,0,8df36cd9ebb4aacfaea97c0ae9188e72e9768324f03849be72121f482af48749,2024-11-21T09:47:35.333000 CVE-2024-54050,0,0,ee890076fea5f3ad9c6bc161fd143e9721aca9308eee09b7d2528e630a5ae13a,2024-12-10T21:15:22.767000 -CVE-2024-54051,0,0,0b1f5c4d6a6660f6eca551d294b306144268ea170824a2e433c9ff96bee1678e,2024-12-10T21:15:22.927000 +CVE-2024-54051,0,1,3a9b3ab110d43a5a43f2119d4ad99971d223dd6716849a13bc9d084152928d39,2024-12-19T18:59:21.867000 CVE-2024-5406,0,0,5db0f501f7c712d4bcce798425460b3472165eeef82fd225689429d234120e5b,2024-11-21T09:47:35.457000 CVE-2024-5407,0,0,e082637321598f3dc8c3c9e1760b81a1e1197c4d13cd58fed3245c37f0bb71c9,2024-11-21T09:47:35.567000 CVE-2024-5408,0,0,0b23a712a85d13fef48f02294d854672174790bd624dfee1416450ccef66434a,2024-11-21T09:47:35.690000 @@ -270286,9 +270301,9 @@ CVE-2024-54457,0,0,4650b426eee32159d30e7a32d8784321d20bee2b8f64046d1eb650eb4815e CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61a99,2024-12-16T18:15:11.023000 CVE-2024-54466,0,0,cde2c633b064403c3330cf4e329fab2afdda24c70189b50f9e401743db80aa51,2024-12-18T17:59:28.667000 CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000 -CVE-2024-54471,0,1,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000 +CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000 CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000 -CVE-2024-54476,0,1,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000 +CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000 CVE-2024-54477,0,0,214101ca192690cd0de3dcf911bea71815c143b3087e79543d2b05745eb4fbe2,2024-12-13T19:15:09.067000 CVE-2024-54479,0,0,8bf37387c4dde8f9cdb0a9e834e8462f66fa3d4a2f05b2799b2fc0f12fb282aa,2024-12-13T18:24:34.090000 CVE-2024-5448,0,0,fb51af8aa43452e6336e86308a3b6b8f94eaece6d7d51fb1e15ce1d675c555ee,2024-11-21T09:47:42.227000 @@ -270297,16 +270312,16 @@ CVE-2024-54485,0,0,982a0baa0ac099695fc21f36de9b06236d26b846e1534a93622dae435e1fc CVE-2024-54486,0,0,e33ae333b83953b305014f4c92969aef413885dda3f3148e1a1844a776b4bece,2024-12-13T18:27:45.980000 CVE-2024-54489,0,0,1ce8b5ab65a55735f38feb96fae54ecbe9c5aa5b683277170ac859678b8dcc0a,2024-12-13T19:15:09.570000 CVE-2024-5449,0,0,1d8d63580d1cb9064d797bded58f9169ad76c503e92c814880090cdd281d631c,2024-11-21T09:47:42.400000 -CVE-2024-54490,0,1,2c61af9f099ad6e59b9a01082060a877b296ae3dacfdcd653badbfc16c369658,2024-12-19T15:27:32.170000 +CVE-2024-54490,0,0,2c61af9f099ad6e59b9a01082060a877b296ae3dacfdcd653badbfc16c369658,2024-12-19T15:27:32.170000 CVE-2024-54491,0,0,afc05a90c1d51c0b62bf52d12f45769b8d505c87568084c8c093af75ff19393c,2024-12-12T02:15:30.270000 -CVE-2024-54492,0,1,85af0b7e8310e62bdbb661f9396591c8a16f77bd78856ca16684e2e3405868de,2024-12-19T15:36:15.687000 +CVE-2024-54492,0,0,85af0b7e8310e62bdbb661f9396591c8a16f77bd78856ca16684e2e3405868de,2024-12-19T15:36:15.687000 CVE-2024-54493,0,0,fa153b7b9aa4539638e8a2a5a8a0f6bc0ba6e98aa0e9ed776ffdda5b5b98dbb4,2024-12-13T18:30:16.170000 CVE-2024-54494,0,0,ad0ca4adae0115148142da0f4fc562e3313919e91e70297d0cc4e22d056236b8,2024-12-16T19:15:08.730000 CVE-2024-54495,0,0,9de7394a007243c21eef47355e938cc3b90c9ebb24baa238e9871a1b4406c45c,2024-12-18T18:40:21.133000 CVE-2024-54498,0,0,fc98c473c1335953bb96a6e6cd9754f341ebec98c3d5942a318f55432f437ef8,2024-12-16T19:15:08.943000 CVE-2024-5450,0,0,24d03210219d9f2f3eeb200aadfbbd2297fa2c6b8d7ee9efe09cbafc9256a693,2024-11-21T09:47:42.517000 CVE-2024-54500,0,0,657f282c345a307f53f35dde04bf557f78e33359ddf485d7b8b3507dfe14769f,2024-12-13T18:34:26.490000 -CVE-2024-54501,0,1,2763466f88af5e8a583411004d269472e9944da5266e2034307684e680693876,2024-12-19T15:37:07.973000 +CVE-2024-54501,0,0,2763466f88af5e8a583411004d269472e9944da5266e2034307684e680693876,2024-12-19T15:37:07.973000 CVE-2024-54502,0,0,0d530603cb62daf612c8e9f528cce0e30598037590c6f193eadb47d9a4b82777,2024-12-18T14:13:13.297000 CVE-2024-54503,0,0,e82e1cc53ce4edc412c3815492fda2911d5e300ada63831244d44df64c1dffb7,2024-12-13T19:15:09.727000 CVE-2024-54504,0,0,bb03ec612268af63063ae51e589216e30653413b6baaf8d7e8860c5e5b629ab1,2024-12-16T18:15:11.317000 @@ -270361,7 +270376,7 @@ CVE-2024-54750,0,0,a2b9bd793ac60105835f796550f4eca54ad7139b40ad2fdf283a28d5ab764 CVE-2024-54751,0,0,1362ae63d46fa3e6e13ddf6e48994d99d3189782d67a09cf0bde552f8a9a1b0f,2024-12-11T16:15:14.910000 CVE-2024-5478,0,0,db0e3beae9848430f36a4effd5045d24657a32915031caa2ccdcaa2667957312,2024-11-21T09:47:45.637000 CVE-2024-5479,0,0,f92bceb83a5a9014c15956c2e58b8be8249c2eaaa0c8984e346563da1cce7cef,2024-11-21T09:47:45.750000 -CVE-2024-54790,1,1,8fec66ffbc140826588d94ea07a520e10cc9fe26cacbe26cda8fd1680daf2cab,2024-12-19T16:15:08.950000 +CVE-2024-54790,0,0,8fec66ffbc140826588d94ea07a520e10cc9fe26cacbe26cda8fd1680daf2cab,2024-12-19T16:15:08.950000 CVE-2024-5480,0,0,dcddee05a122e48deec7dd054d03a98cfc3767234733af70ab63ade31364815f,2024-10-02T16:15:10.913000 CVE-2024-5481,0,0,6aaa03c1e132f74e5c4e90ead29bd24eb7065ad2c73e1f2805fbc82099451674,2024-11-21T09:47:45.877000 CVE-2024-54810,0,0,98b1b32485df996df7d9929d6a4a4f3f6576d87de7e3a8405b0f88648f287e10,2024-12-13T18:15:21.707000 @@ -270419,7 +270434,8 @@ CVE-2024-55059,0,0,fe565951d935da233adc7e847414e185526505b80445d8ef8d941eb8351af CVE-2024-5506,0,0,3a939cb8d1b19c0888bb3cd98071317aca0cf323e5a9cf329a9932ae18f6a99c,2024-11-21T09:47:50.193000 CVE-2024-5507,0,0,cabca8bddf4a6d02e76f27981f16e33bb9535f789d53e187a16cce78138edc2d,2024-11-21T09:47:50.337000 CVE-2024-5508,0,0,115a25c08f43d4b8fec19f2a1d9db4d23c6ce2518b2cd0371fc64ad26ff5bfe0,2024-11-21T09:47:50.463000 -CVE-2024-55082,1,1,994e1b7dadc046c4801b223dac6c399931fe2dfd839452e36bc3ca930f4f04cd,2024-12-19T16:15:09.127000 +CVE-2024-55081,1,1,855a0457c7a798d5579026b29f72e3574c13fd1ab2902fbf356e5fbe01751d62,2024-12-19T17:15:09.950000 +CVE-2024-55082,0,0,994e1b7dadc046c4801b223dac6c399931fe2dfd839452e36bc3ca930f4f04cd,2024-12-19T16:15:09.127000 CVE-2024-55085,0,0,d6bcc24c3e520865e1ee191305765a610a91bdf0e859d65fb14733170ec8b40f,2024-12-17T15:15:15.840000 CVE-2024-55086,0,0,64abe15b6f257faa8eb16dcf3e1accc1838584371dde23252015b8f46f5a2727,2024-12-18T19:15:11.613000 CVE-2024-55088,0,0,18b9c1489022e0a179f40957d3a21048e8af2ea49529473dadb5343dc852825c,2024-12-18T18:15:07.527000 @@ -273058,7 +273074,7 @@ CVE-2024-8350,0,0,247a61b5673fa12b39c86038a1ca267c4286e5d27e653a001a01bc50474753 CVE-2024-8352,0,0,543cd051297bb82684ade6cc2d79378c56659a242e531daff38a69f59fa68e41,2024-10-08T14:17:34.707000 CVE-2024-8353,0,0,86208fbdc7bdfa6f4f2e7e777db587fb8c4c81fff4599145ad5b4470d2958b9a,2024-10-01T14:31:21.430000 CVE-2024-8354,0,0,901c3ae461c821606ad2205217d6275b4b37673a3ff80ebde8daf69668234eba,2024-11-21T09:53:05.777000 -CVE-2024-8355,0,0,342a4b6a3826e3e5b9ed671024bf3f5d646c4943928475c0eb639009919de576,2024-11-22T22:15:18.860000 +CVE-2024-8355,0,1,63472442425b5b332935cc40ff820972712b6b2a968e424ee44a8ac951d36687,2024-12-19T18:47:39.363000 CVE-2024-8356,0,0,4cc50a0cd0fc854319a533c56af330f5d1362482eab466e26933df9baec721d8,2024-12-11T04:10:37.263000 CVE-2024-8357,0,0,1d889408be1770076ad81711236c2a891b36406e9fc3a925e957f690d3e9af63,2024-12-11T04:05:34.840000 CVE-2024-8358,0,0,5fb394033ecc4990c585e13519c166d42fa3ff92798bd5136ede9dccb7b4708d,2024-12-11T04:00:11.233000 @@ -273674,8 +273690,8 @@ CVE-2024-9108,0,0,faea84220c148816dbbbe4c85a3bb857cc9636c369ae82341fa20990b41c9f CVE-2024-9109,0,0,fb548c987718d5b0f09528b96ece519c9c59d5672a83e706c42f5800de4d0fa9,2024-11-06T17:18:48.363000 CVE-2024-9110,0,0,6cdae4ea45ea56886159bd4b3be372a033888330c414e2456bb51f68ff8294f8,2024-11-01T12:57:03.417000 CVE-2024-9111,0,0,f87d9fa3fe3b3b35af7086004601bf611891d416924fbaf3140c414efa11e2f5,2024-11-21T13:57:24.187000 -CVE-2024-9112,0,0,93221642ca79acd308dfa4908cad118764854e5aab5efe9001a4a5e19b75eec1,2024-11-22T22:15:19.863000 -CVE-2024-9113,0,0,0fc8c400f80a8426b2762b8171687bddf7fa73c768cc2b9cf486f893890ebf68,2024-11-22T22:15:19.990000 +CVE-2024-9112,0,1,ad9285bae0af947302e87a70eca8fb8a43bf589d6b042b2fabf799a36eeb3d9c,2024-12-19T18:15:52.733000 +CVE-2024-9113,0,1,086e75e928d82cf2d2f08c8e9e7f848acb866a8208c9d4331092de762bbe830a,2024-12-19T18:15:21.380000 CVE-2024-9114,0,0,60b906f8f44fae8fcea1f0caf335eaffc083e04aca4866ccfb4f1332dddcb290,2024-11-26T20:58:01.907000 CVE-2024-9115,0,0,25542f2326bc6f5df099eec45b70d10434d94fd4a7ab6b86d1b5d71f062981f8,2024-10-01T13:47:25.403000 CVE-2024-9116,0,0,cfe74d37f77b6fa9df092f5223f72429b3619aa14bd52a27774aad87ecfb69b3,2024-10-28T13:58:09.230000 @@ -273701,7 +273717,7 @@ CVE-2024-9145,0,0,3dd9bcad2a2fee7d05e394a6c147376f977693416e207026532ba073c858cc CVE-2024-9146,0,0,b2bcae27bf136fac98f5cca96bf30e297b145f83fbf374484b4b69bb66a11534,2024-10-07T17:48:28.117000 CVE-2024-9147,0,0,4e12ed99087058c5ab273f6a2c5655dda51c7a05718eb2e9409e0779fbea7704,2024-11-06T15:53:59.983000 CVE-2024-9148,0,0,a904c9834abceb13922e1cc588509f574c6534f26c7e1a2e5af468520b2fb09c,2024-09-30T17:34:12.760000 -CVE-2024-9154,1,1,412dd3f3687ef04eab5885e622cf38160ea6ef56f09c11d2d1548a5871e0bb41,2024-12-19T16:15:09.253000 +CVE-2024-9154,0,0,412dd3f3687ef04eab5885e622cf38160ea6ef56f09c11d2d1548a5871e0bb41,2024-12-19T16:15:09.253000 CVE-2024-9155,0,0,6b831cc9815c7982fccb5bb1db903558181a3d9726f2c50e686b372d7d7ea737,2024-09-30T12:46:20.237000 CVE-2024-9156,0,0,f51f01b34d81b342f8758ec8a55450b2ee8e6ae57d651f88883c804dd1af5436,2024-10-15T14:40:45.093000 CVE-2024-9158,0,0,0b7269f695a88179972d1f8bd54450607592163690fc2a1df7db61f3d67ca9ad,2024-10-07T16:13:49.027000 @@ -274139,8 +274155,8 @@ CVE-2024-9723,0,0,f6729c6a3fdbff1070d3138457a992245d3c7d975b76699115bec00adde780 CVE-2024-9724,0,0,fa06b49849f9ba9b79ea0b101b85cdda445bb5a7408ed7d5c536ca60ee64f6e9,2024-11-22T21:15:25.637000 CVE-2024-9725,0,0,2af660e70b3395533d5cee8bda4e60c103265a3163cc58978e75221c35ba3f7f,2024-11-22T21:15:25.760000 CVE-2024-9726,0,0,40eccbe748392690afa551df9a99df91ae687dea306883363fbfd558a76ce74e,2024-11-22T21:15:25.880000 -CVE-2024-9727,0,0,ced9e6931a97b303f1cfd100ac8793e9d9eb0f1f271ac0051a9e04c143bfcb9a,2024-11-22T21:15:25.997000 -CVE-2024-9728,0,0,994d9ed98aad6c4c61db001b8339ca8c5144b8a08ad8a86ab8619fa9600b431b,2024-11-22T21:15:26.130000 +CVE-2024-9727,0,1,2483ba0a173b001b71fe47c42cf98d9cbea7f6a3586eae2b599f658041b9a97b,2024-12-19T17:46:11.723000 +CVE-2024-9728,0,1,3b1c4dad21ebd9f8aa87970acf3382ae4afc2818b33a22fc3b7925c14118799f,2024-12-19T17:30:02.427000 CVE-2024-9729,0,0,aa0ed69f5acf0d470a15a4907c6b30df808488f2d9f661f40cf37b6d127dcc4c,2024-11-22T21:15:26.270000 CVE-2024-9730,0,0,49ab99eb2b7ff2b97cea4a01d1ef72dd8e598524d60d4c9cdc6eed115ef05c90,2024-11-22T21:15:26.383000 CVE-2024-9731,0,0,1d68b675d757df5eae6c4bd327f69bdb028fec8656efe0eb47390b6b9448551d,2024-11-22T21:15:26.497000 @@ -274203,9 +274219,9 @@ CVE-2024-9793,0,0,af60274d1c53fcb85d39ba0e2bda626498f945017f49625f87b20fadf08e96 CVE-2024-9794,0,0,204bfee5b3290635ad38f14a0e36717ed61407eb2543aea40432256727c029ea,2024-10-15T19:12:36.503000 CVE-2024-9796,0,0,b719dd956356af754b2930263240ef9071fea55d4836015abfc5d8b3fdae52e4,2024-10-15T18:46:53.397000 CVE-2024-9797,0,0,b864ed7e0f3626d15fde6a5e2890c02ea163d82c81f4ebb7447dd34417d0f37a,2024-10-15T19:14:42.600000 -CVE-2024-9798,0,0,29b4f061ba5a73e18378c44e45d50d81ce7c5110d00b34fc883a489c371e45b7,2024-11-25T18:00:47.637000 +CVE-2024-9798,0,1,7c4e540e5a5dcc07f991e3dc85c44aea5b5af5fddea066673ae9f14065b1a867,2024-12-19T17:00:16.440000 CVE-2024-9799,0,0,56eac9bec08015513630b525a4d1118b83c4e4d9ae591f8b5da9450f70506123,2024-10-17T14:32:17.640000 -CVE-2024-9802,0,0,b9e965a2e7c3ab5daeda8da7dddfc99c65a9e32ccdf5c9c8c3c1489733a4db1a,2024-11-25T17:56:58.937000 +CVE-2024-9802,0,1,0e4a15fc91be7bb082ecd875743356b6e5ec12153bda993b4cc5bb2ce3947f83,2024-12-19T17:00:21.353000 CVE-2024-9803,0,0,964b0b7688d52adbcc056fc75cf791823d646fdd68d22391b353222245c32ba0,2024-10-16T16:21:14.933000 CVE-2024-9804,0,0,acff56f1036c55f2f3beb3fc86a57a69d83f8dd452a21728545506fe711b682f,2024-10-15T19:17:27.083000 CVE-2024-9805,0,0,832c5a185aeb550963e0abc80ad00019fc5bd69c818e405f451d9208dc6de6ee,2024-10-15T19:18:27.987000