Auto-Update: 2024-11-12T05:00:19.763116+00:00

This commit is contained in:
cad-safe-bot 2024-11-12 05:03:21 +00:00
parent 82e387e704
commit 3e73a0dd3d
16 changed files with 1137 additions and 40 deletions

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-10538",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-12T04:15:03.933",
"lastModified": "2024-11-12T04:15:03.933",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Happy Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the before_label parameter in the Image Comparison widget in all versions up to, and including, 3.12.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3182100%40happy-elementor-addons&new=3182100%40happy-elementor-addons&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fd192a52-ae12-4706-b3ea-aa69f7393bb8?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-10672",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-12T04:15:04.170",
"lastModified": "2024-11-12T04:15:04.170",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Multiple Page Generator Plugin \u2013 MPG plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the mpg_upsert_project_source_block() function in all versions up to, and including, 4.0.2. This makes it possible for authenticated attackers, with editor-level access and above, to delete limited files on the server."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-73"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/multiple-pages-generator-by-porthas/tags/3.4.8/controllers/ProjectController.php#L139",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/browser/multiple-pages-generator-by-porthas/tags/3.4.8/controllers/ProjectController.php#L147",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3183330/multiple-pages-generator-by-porthas/tags/4.0.3/controllers/ProjectController.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8c21de03-4d62-4ecf-a2f1-57e0e416792b?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-10685",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-12T04:15:04.410",
"lastModified": "2024-11-12T04:15:04.410",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Contact Form 7 Redirect & Thank You Page plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tab' parameter in all versions up to, and including, 1.0.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3184638%40cf7-redirect-thank-you-page&new=3184638%40cf7-redirect-thank-you-page&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f52285e0-e78d-4231-8ff9-53fbe568fcc2?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-10695",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-12T04:15:04.610",
"lastModified": "2024-11-12T04:15:04.610",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Futurio Extra plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.0.13 via the 'elementor-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private or draft posts that they should not have access to."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3184380%40futurio-extra&new=3184380%40futurio-extra&sfp_email=&sfph_mail=#file3",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/53871750-6437-459f-97e1-5cf524160f09?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-11100",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-12T04:15:04.823",
"lastModified": "2024-11-12T04:15:04.823",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in 1000 Projects Beauty Parlour Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php. The manipulation of the argument name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.9,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://1000projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/Hacker0xone/CVE/issues/6",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.283921",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.283921",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.441292",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-11101",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-12T04:15:05.080",
"lastModified": "2024-11-12T04:15:05.080",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in 1000 Projects Beauty Parlour Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/search-invoices.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:M/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "MULTIPLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 5.8
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 6.4,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://1000projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/Hacker0xone/CVE/issues/7",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.283920",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.283920",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.441314",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,149 @@
{
"id": "CVE-2024-11102",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-12T04:15:05.340",
"lastModified": "2024-11-12T04:15:05.340",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in SourceCodester Hospital Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /vm/doctor/edit-doc.php. The manipulation of the argument name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://drive.google.com/file/d/1Omjwoh6B2xh41c3Av0_VJsoR7tascb1_/view?usp=sharing",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/Salah-Tayeh/CVEs-and-Vulnerabilities/blob/main/Hospital%20Management%20System%20-%20Stored%20XSS.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.283922",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.283922",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.441694",
"source": "cna@vuldb.com"
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-48837",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-11-12T04:15:05.613",
"lastModified": "2024-11-12T04:15:05.613",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell SmartFabric OS10 Software, version(s) 10.5.6.x, 10.5.5.x, 10.5.4.x, 10.5.3.x, contain(s) an Execution with Unnecessary Privileges vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-250"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000247217/dsa-2024-425-security-update-for-dell-networking-os10-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-48838",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-11-12T04:15:05.833",
"lastModified": "2024-11-12T04:15:05.833",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell SmartFabric OS10 Software, version(s) 10.5.6.x, 10.5.5.x, 10.5.4.x, 10.5.3.x, contain(s) a Files or Directories Accessible to External Parties vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Filesystem access for attacker."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-552"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000247217/dsa-2024-425-security-update-for-dell-networking-os10-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-49394",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-11-12T03:15:03.677",
"lastModified": "2024-11-12T03:15:03.677",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In mutt and neomutt the In-Reply-To email header field is not protected by cryptographic signing which allows an attacker to reuse an unencrypted but signed email message to impersonate the original sender."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-49394",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2325330",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-49395",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-11-12T03:15:03.910",
"lastModified": "2024-11-12T03:15:03.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In mutt and neomutt, PGP encryption does not use the --hidden-recipient mode which may leak the Bcc email header field by inferring from the recipients info."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1230"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-49395",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2325332",
"source": "secalert@redhat.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-49557",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-11-12T04:15:06.040",
"lastModified": "2024-11-12T04:15:06.040",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell SmartFabric OS10 Software, version(s) 10.5.6.x, 10.5.5.x, 10.5.4.x, 10.5.3.x, contain(s) an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000247217/dsa-2024-425-security-update-for-dell-networking-os10-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-49558",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-11-12T04:15:06.243",
"lastModified": "2024-11-12T04:15:06.243",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell SmartFabric OS10 Software, version(s) 10.5.6.x, 10.5.5.x, 10.5.4.x, 10.5.3.x, contain(s) an Improper Privilege Management vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000247217/dsa-2024-425-security-update-for-dell-networking-os10-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-49560",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-11-12T04:15:06.443",
"lastModified": "2024-11-12T04:15:06.443",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell SmartFabric OS10 Software, version(s) 10.5.6.x, 10.5.5.x, 10.5.4.x, 10.5.3.x, contain(s) a command injection vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Command execution."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000247217/dsa-2024-425-security-update-for-dell-networking-os10-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-12T03:00:31.023370+00:00
2024-11-12T05:00:19.763116+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-12T02:35:04.850000+00:00
2024-11-12T04:15:06.443000+00:00
```
### Last Data Feed Release
@ -33,37 +33,33 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
269090
269104
```
### CVEs added in the last Commit
Recently added CVEs: `14`
- [CVE-2024-11096](CVE-2024/CVE-2024-110xx/CVE-2024-11096.json) (`2024-11-12T01:15:03.607`)
- [CVE-2024-11097](CVE-2024/CVE-2024-110xx/CVE-2024-11097.json) (`2024-11-12T02:15:17.817`)
- [CVE-2024-11099](CVE-2024/CVE-2024-110xx/CVE-2024-11099.json) (`2024-11-12T02:15:18.123`)
- [CVE-2024-42372](CVE-2024/CVE-2024-423xx/CVE-2024-42372.json) (`2024-11-12T01:15:03.940`)
- [CVE-2024-47586](CVE-2024/CVE-2024-475xx/CVE-2024-47586.json) (`2024-11-12T01:15:04.190`)
- [CVE-2024-47587](CVE-2024/CVE-2024-475xx/CVE-2024-47587.json) (`2024-11-12T01:15:04.470`)
- [CVE-2024-47588](CVE-2024/CVE-2024-475xx/CVE-2024-47588.json) (`2024-11-12T01:15:04.700`)
- [CVE-2024-47590](CVE-2024/CVE-2024-475xx/CVE-2024-47590.json) (`2024-11-12T01:15:04.933`)
- [CVE-2024-47592](CVE-2024/CVE-2024-475xx/CVE-2024-47592.json) (`2024-11-12T01:15:05.210`)
- [CVE-2024-47593](CVE-2024/CVE-2024-475xx/CVE-2024-47593.json) (`2024-11-12T01:15:05.480`)
- [CVE-2024-47595](CVE-2024/CVE-2024-475xx/CVE-2024-47595.json) (`2024-11-12T01:15:05.677`)
- [CVE-2024-49393](CVE-2024/CVE-2024-493xx/CVE-2024-49393.json) (`2024-11-12T02:15:18.443`)
- [CVE-2024-8881](CVE-2024/CVE-2024-88xx/CVE-2024-8881.json) (`2024-11-12T02:15:18.817`)
- [CVE-2024-8882](CVE-2024/CVE-2024-88xx/CVE-2024-8882.json) (`2024-11-12T02:15:19.160`)
- [CVE-2024-10538](CVE-2024/CVE-2024-105xx/CVE-2024-10538.json) (`2024-11-12T04:15:03.933`)
- [CVE-2024-10672](CVE-2024/CVE-2024-106xx/CVE-2024-10672.json) (`2024-11-12T04:15:04.170`)
- [CVE-2024-10685](CVE-2024/CVE-2024-106xx/CVE-2024-10685.json) (`2024-11-12T04:15:04.410`)
- [CVE-2024-10695](CVE-2024/CVE-2024-106xx/CVE-2024-10695.json) (`2024-11-12T04:15:04.610`)
- [CVE-2024-11100](CVE-2024/CVE-2024-111xx/CVE-2024-11100.json) (`2024-11-12T04:15:04.823`)
- [CVE-2024-11101](CVE-2024/CVE-2024-111xx/CVE-2024-11101.json) (`2024-11-12T04:15:05.080`)
- [CVE-2024-11102](CVE-2024/CVE-2024-111xx/CVE-2024-11102.json) (`2024-11-12T04:15:05.340`)
- [CVE-2024-48837](CVE-2024/CVE-2024-488xx/CVE-2024-48837.json) (`2024-11-12T04:15:05.613`)
- [CVE-2024-48838](CVE-2024/CVE-2024-488xx/CVE-2024-48838.json) (`2024-11-12T04:15:05.833`)
- [CVE-2024-49394](CVE-2024/CVE-2024-493xx/CVE-2024-49394.json) (`2024-11-12T03:15:03.677`)
- [CVE-2024-49395](CVE-2024/CVE-2024-493xx/CVE-2024-49395.json) (`2024-11-12T03:15:03.910`)
- [CVE-2024-49557](CVE-2024/CVE-2024-495xx/CVE-2024-49557.json) (`2024-11-12T04:15:06.040`)
- [CVE-2024-49558](CVE-2024/CVE-2024-495xx/CVE-2024-49558.json) (`2024-11-12T04:15:06.243`)
- [CVE-2024-49560](CVE-2024/CVE-2024-495xx/CVE-2024-49560.json) (`2024-11-12T04:15:06.443`)
### CVEs modified in the last Commit
Recently modified CVEs: `4`
Recently modified CVEs: `0`
- [CVE-2024-51187](CVE-2024/CVE-2024-511xx/CVE-2024-51187.json) (`2024-11-12T02:35:01.737`)
- [CVE-2024-51188](CVE-2024/CVE-2024-511xx/CVE-2024-51188.json) (`2024-11-12T02:35:03.130`)
- [CVE-2024-51189](CVE-2024/CVE-2024-511xx/CVE-2024-51189.json) (`2024-11-12T02:35:03.970`)
- [CVE-2024-51190](CVE-2024/CVE-2024-511xx/CVE-2024-51190.json) (`2024-11-12T02:35:04.850`)
## Download and Usage

View File

@ -242737,6 +242737,7 @@ CVE-2024-10525,0,0,cfad79154f466fe96736eabfa65cac8f6409e21deb7f07d79c02c68ee3f19
CVE-2024-10526,0,0,0fa46d8ccf5c219359a0535980da66887fa2b5cd7efbd75d68b15fd2b882e15b,2024-11-08T19:01:03.880000
CVE-2024-1053,0,0,3d9e5b8218feb39348551f4e96f20fbacd04f2b39830165bb00a553a3d3c5ccf,2024-02-22T19:07:27.197000
CVE-2024-10535,0,0,14a566633b856f0bcfd07185d246772590c919ba8cb5a244786d38adaffa8830,2024-11-08T21:19:27.540000
CVE-2024-10538,1,1,c87bbf0aeb915e3484230191c240f7b0bab8ee370e4e5fcfde4219fecca5a30b,2024-11-12T04:15:03.933000
CVE-2024-1054,0,0,f8e7e53b5707aaecdfe1ea6fba53413ba04bed5cdf673762252b510775f984b1,2024-02-29T13:49:29.390000
CVE-2024-10540,0,0,d72994b8ce256d6087bbd8c05a3cb9446a5f50c733a3ad70b615c2d8dd4c3c0c,2024-11-04T13:18:27.017000
CVE-2024-10543,0,0,78e6de226aa4ccb5cb5b260268ce156b234621147350989dafddd9817bf9323e,2024-11-08T21:19:02.700000
@ -242808,16 +242809,19 @@ CVE-2024-10667,0,0,6dfd53bb3768f7c8a89d936d6ceea2c11f1b34164ab629b2c232ae9e460c0
CVE-2024-10668,0,0,ad6a1e988aa7f35451b56c605706e2e8d28df7ceaf4537d00be5d4d05186782b,2024-11-08T19:01:03.880000
CVE-2024-10669,0,0,5f6353fae74a5b0f8f17e84dd883ed1579cd0691ca5865b1a673d619d1d115a6,2024-11-09T05:15:08.017000
CVE-2024-1067,0,0,54f094f38a51fcd0954e79c36caca8c799a450eda4559137980b77dd6d9caf6c,2024-05-03T14:17:53.690000
CVE-2024-10672,1,1,5dc7f93c45d6d4e279506fb5bfcc5fd8ef36f201bbff2e35f7b9065c511502d5,2024-11-12T04:15:04.170000
CVE-2024-10673,0,0,3cdb715bbe07db86d48950cd56fe4b19058ca51df9bb51d401be4381811d59f6,2024-11-09T04:15:04.363000
CVE-2024-10674,0,0,c1bf7848f51b55e6d4edbd69eb021ca6cdfdd0b9790f1dc514bb6bcef921fe8e,2024-11-09T04:15:04.677000
CVE-2024-10676,0,0,27be6003aea9132d1ddf329883e91f836176d3bc1ed0dbb6ed452cf8f1edce38,2024-11-09T10:15:04.117000
CVE-2024-1068,0,0,affccf40ed47a318eb2ecd8e307c56fa640a43f94e3b3e8b50a778ab4a9c998f,2024-08-26T19:35:04.287000
CVE-2024-10683,0,0,b307d74cf474a4a488d2c7a75458fc772aa40e17b4628c00b9fc64ea4f8803fb,2024-11-09T07:15:03.523000
CVE-2024-10685,1,1,6f5369186aa0362f5535f30037b7ede262921fa1c1f7c43124f7c21cddf13d89,2024-11-12T04:15:04.410000
CVE-2024-10687,0,0,2d74811f2fc6d3aaef423135ea18016bd4a20ce3a927ba94efb8aa3eac4c5b2f,2024-11-08T15:26:52.523000
CVE-2024-10688,0,0,b87010fae9ede3dbc09789e0772582c4276000ac6cb27b14936b5c62cabc817d,2024-11-09T07:15:05.720000
CVE-2024-1069,0,0,9f4b19e535b82e8b50b814b402985dc45959fb8eebaa25a120ba3f787349c9c3,2024-02-06T20:11:52.587000
CVE-2024-10693,0,0,0d972d4fb67fabef178798fca42d506d87be385cb4dc04f7a4ba35154ff77347,2024-11-09T04:15:04.943000
CVE-2024-10694,0,0,05c164a4732350edd5fee46247e775b1e69a11363b78cebc8b6784de8da1fb44,2024-11-11T21:15:06.030000
CVE-2024-10695,1,1,6cd13c9bddf0d94f5498831e9580949ccbe1a5d5d26bf84cd09e7701e67fd54e,2024-11-12T04:15:04.610000
CVE-2024-10697,0,0,5ee797b1e2524fad720ed5d33aa07ee55b1575ecedb30200e209173b28d177f2,2024-11-04T14:18:20.337000
CVE-2024-10698,0,0,a92f2679f791986edabfcd01d7de3581b39e330ef0fdfebb28883ec3d8b768c2,2024-11-04T14:20:58.853000
CVE-2024-10699,0,0,34f3ee81b53049f9113d5634ca7220c0a13ff33a1cbb6ebcca291fb5d022be13,2024-11-05T20:15:56.417000
@ -242993,10 +242997,13 @@ CVE-2024-11078,0,0,8190043eda67017a5363e09bea355d4c2dfef250f70e1b21db23c961bbf97
CVE-2024-11079,0,0,a13f7144a33d93e55e5f2f65a8534bfe507fba4c4162e528b7ea851542470459,2024-11-12T00:15:15.543000
CVE-2024-1108,0,0,72e8aa7ee320c630f0cd3020b574b902dcf572a1d2888f0afb29692e74e18247,2024-02-22T19:07:37.840000
CVE-2024-1109,0,0,54a246b33f975a42367e7b2f8f64c59b5c20293302ad365ae743bbdf357522c9,2024-02-10T04:13:21.610000
CVE-2024-11096,1,1,f1f558b8d3c01d2282cdeba900f31a1361eba08bf17ce985612822dce41593a9,2024-11-12T01:15:03.607000
CVE-2024-11097,1,1,8ec4fc7f9aa26b07595d596dfefc11ebce9490478ddadd080788274342a9b405,2024-11-12T02:15:17.817000
CVE-2024-11099,1,1,862127343849fbae5f05942fc4dc7dc3d3fc170348df48ec03c27b86de3789a1,2024-11-12T02:15:18.123000
CVE-2024-11096,0,0,f1f558b8d3c01d2282cdeba900f31a1361eba08bf17ce985612822dce41593a9,2024-11-12T01:15:03.607000
CVE-2024-11097,0,0,8ec4fc7f9aa26b07595d596dfefc11ebce9490478ddadd080788274342a9b405,2024-11-12T02:15:17.817000
CVE-2024-11099,0,0,862127343849fbae5f05942fc4dc7dc3d3fc170348df48ec03c27b86de3789a1,2024-11-12T02:15:18.123000
CVE-2024-1110,0,0,2a7a998b7b1ccd0c64d40f28b7bfefdfe0681031ac010f23e86b81b22a7f4df6,2024-02-10T04:13:13.260000
CVE-2024-11100,1,1,6b3aa96249c5b90322adbdd9719faf7fab227c1a1ec8e781c98e0cb1c39dc55a,2024-11-12T04:15:04.823000
CVE-2024-11101,1,1,73fcafea3f6f6e7581bd3593c4db07ee4acf0f063944ba8953fbaff14d71431e,2024-11-12T04:15:05.080000
CVE-2024-11102,1,1,b30da95d99ff3a0d395e899d299b427343f69fa0e3fc777ceea26d405e50ebe0,2024-11-12T04:15:05.340000
CVE-2024-1111,0,0,f15445887f26214e7eb2759298bdfed96c32a982bdf7c3d908e39f1fc291a984,2024-05-17T02:35:14.527000
CVE-2024-1112,0,0,a074043c8f95f29514c3f59ea2279c09f17d99731ab21d34b196cbe82c1cf23d,2024-02-09T14:34:41.827000
CVE-2024-1113,0,0,6955c6c679809523d129efea09ef779c898e264f7e3230a68d2b1fd615c8f410,2024-05-17T02:35:14.663000
@ -260067,7 +260074,7 @@ CVE-2024-42369,0,0,2db0203d9e1c9ed86d7e5fe91c7527c5d07f66504aa58aae16d195697c2be
CVE-2024-4237,0,0,c38818d0c288b1eec57a9be9e655b05254cb3f3487787a1ecd91e69d9c20b38c,2024-05-17T02:40:19.580000
CVE-2024-42370,0,0,62e839a91edcd64bb21dabf32c60522dd52dc9540883662a6d8c03c0ecbecadd,2024-08-12T13:41:36.517000
CVE-2024-42371,0,0,f8671ba77e17492262f6b6323bd0f75755bc55999a70f1247a3b42a51bbd5e7a,2024-09-10T12:09:50.377000
CVE-2024-42372,1,1,18e0d3ce3d87a3e533e1b9d5734d500fae86f144567f3f13d20e34f3d17e1571,2024-11-12T01:15:03.940000
CVE-2024-42372,0,0,18e0d3ce3d87a3e533e1b9d5734d500fae86f144567f3f13d20e34f3d17e1571,2024-11-12T01:15:03.940000
CVE-2024-42373,0,0,0a911f8c7b65a5ac6f64a8e43f34010f8e931ac83329dff9f7884c56f10ce33a,2024-09-12T13:26:37.753000
CVE-2024-42374,0,0,f269e9c4776cdc5b8dc54432285004e2049939b4c19e5a365ffb07a0c87786a3,2024-09-16T16:25:54.430000
CVE-2024-42375,0,0,f88914f78c046f57acc08161978ed742ad9df5262df6fb06ce5cd75ac24c71ad,2024-09-12T13:46:39.527000
@ -263242,15 +263249,15 @@ CVE-2024-47565,0,0,1f4de7ea43d4059fde3978664bf9271defcef7d2ededc73cf25a3c2fbdf29
CVE-2024-4757,0,0,8697ca9e70d5ba37736a0a67620900f7a3da7cbcb97e29086de20de73cd3bfef,2024-07-03T02:08:02.463000
CVE-2024-47575,0,0,3cf8bcedc769b7028fe6e8dbdea49ae873e037612d2dd7820ba5eca10d70f99d,2024-11-08T21:16:28.987000
CVE-2024-4758,0,0,725af37997323245576176c0490558b45926193602683436c3054da734872332,2024-07-03T02:08:02.707000
CVE-2024-47586,1,1,74166dbd59e66d63aa463956de5ccb0ef788b3516c6b4b537f8dcea2f939a805,2024-11-12T01:15:04.190000
CVE-2024-47587,1,1,531bea82fa3cdaaae1a20d5ffbc367e575fb35ec9fad61a5579201e1cb1f0903,2024-11-12T01:15:04.470000
CVE-2024-47588,1,1,b3f5e7a2afbbfb644098d49d6ec7b95be403bb423b0efe9a5bc331137e66624f,2024-11-12T01:15:04.700000
CVE-2024-47586,0,0,74166dbd59e66d63aa463956de5ccb0ef788b3516c6b4b537f8dcea2f939a805,2024-11-12T01:15:04.190000
CVE-2024-47587,0,0,531bea82fa3cdaaae1a20d5ffbc367e575fb35ec9fad61a5579201e1cb1f0903,2024-11-12T01:15:04.470000
CVE-2024-47588,0,0,b3f5e7a2afbbfb644098d49d6ec7b95be403bb423b0efe9a5bc331137e66624f,2024-11-12T01:15:04.700000
CVE-2024-4759,0,0,88e594c7c898a4e82a1a8532a1f049d1a9fe25baf60278988c21dabe64f2896b,2024-07-03T02:08:02.923000
CVE-2024-47590,1,1,9163e40cc516475c4b3db5cbbafb6b7710f49258fff08c47148397b3d3b3c00e,2024-11-12T01:15:04.933000
CVE-2024-47592,1,1,a7c88ed5a3422a483779c897d7999e1bed8e54cfeecb959bce1f6d593b1300cd,2024-11-12T01:15:05.210000
CVE-2024-47593,1,1,4eab83ac0588570c037e35af21dca1779eea75d83da83b8f6055a36c464c12dc,2024-11-12T01:15:05.480000
CVE-2024-47590,0,0,9163e40cc516475c4b3db5cbbafb6b7710f49258fff08c47148397b3d3b3c00e,2024-11-12T01:15:04.933000
CVE-2024-47592,0,0,a7c88ed5a3422a483779c897d7999e1bed8e54cfeecb959bce1f6d593b1300cd,2024-11-12T01:15:05.210000
CVE-2024-47593,0,0,4eab83ac0588570c037e35af21dca1779eea75d83da83b8f6055a36c464c12dc,2024-11-12T01:15:05.480000
CVE-2024-47594,0,0,1ae534f7a3c1c97ead2076790a49a30a6aebae2067756e88afe36b9237831ffa,2024-10-10T12:57:21.987000
CVE-2024-47595,1,1,167f5aecd14a937f3b82e43bc1d47ef84c35d8321cdd421e97b0e279c13d5472,2024-11-12T01:15:05.677000
CVE-2024-47595,0,0,167f5aecd14a937f3b82e43bc1d47ef84c35d8321cdd421e97b0e279c13d5472,2024-11-12T01:15:05.677000
CVE-2024-4760,0,0,b4849d754e19ff5b62ce1dfa55ef4652903c511172eef769e0d0e48dc2803d03,2024-05-16T15:44:44.683000
CVE-2024-47604,0,0,b0efef5184edb4bd92f957620365342f5c009f62a58e0b01524e6418b748fe0c,2024-10-04T13:51:25.567000
CVE-2024-47608,0,0,6780a5cb01bdd639af89827da283834e6f19c572d8e127e2ec22fed13c61e1be,2024-10-07T18:51:05.650000
@ -263859,6 +263866,8 @@ CVE-2024-48825,0,0,ad369d1cf502489a8c86407b4cab4059378b0524ef59b99c231bc11027e4f
CVE-2024-48826,0,0,75c9450df85723c7e5fe507735f7be7d84001c192ccab935bbc0ccf65a95117e,2024-10-29T19:35:27.303000
CVE-2024-48827,0,0,b8784c14c4c0a2af4d656264bee611472f424ecc32bdba68ae4a9cb4ecb6178a,2024-10-15T12:58:51.050000
CVE-2024-4883,0,0,66fd0c7113b75e4613bf51e6b10a097cc5dcf57aa3f97b3df0e5c31c4210be62,2024-09-06T22:46:17.103000
CVE-2024-48837,1,1,a7c5a3f54b8f98a05652278f775b4709e0ad4f49162da1b7832346db5938cce9,2024-11-12T04:15:05.613000
CVE-2024-48838,1,1,2e4d6a908fa948b2d9a0a38af5e8b8d90a29fbd3a3ee13c65314faf9545b506e,2024-11-12T04:15:05.833000
CVE-2024-4884,0,0,a2dcec8e16e916f3e6bf44fbf27e64f395ae27ac96c65779b6d04fbf5173b4c4,2024-09-06T22:45:59.233000
CVE-2024-4885,0,0,2608f2aa7fb5189467bda7bb610d4e03f1b43256b775a84e60ba9a3b8ac9b260,2024-09-06T22:44:27.840000
CVE-2024-4886,0,0,d27ca09c7d3a0108a7cfa4692eb479eab6127452085468fbf17d7a45144cc1ee,2024-06-11T17:14:56.323000
@ -264102,7 +264111,9 @@ CVE-2024-4939,0,0,02ebdbdecbb04fb797cb0e62af7790a7212959b717e5fa68d9d371341b4150
CVE-2024-49390,0,0,bf8e2af7ccbb4b660c65e9bd08fe703dbfad2824c259f85985bd9875cc0e074f,2024-10-18T20:11:32.270000
CVE-2024-49391,0,0,7f95620910cf80d65ac312e14b00de0efd9f4bd72d46b29596e3846aec7b2c93,2024-10-18T20:10:38.790000
CVE-2024-49392,0,0,56ddd6b8f3dc25b477998ea94d765b7032f9ba1bc48f4ba6c67a16ed201e6e0b,2024-10-18T20:10:05.850000
CVE-2024-49393,1,1,3c31d8e5fadf355e61e8da08c43bfe222d4f61665839f5d7e5e73293fe502a2f,2024-11-12T02:15:18.443000
CVE-2024-49393,0,0,3c31d8e5fadf355e61e8da08c43bfe222d4f61665839f5d7e5e73293fe502a2f,2024-11-12T02:15:18.443000
CVE-2024-49394,1,1,7fea685c60205a36cffee3f30b4718eec16eb666941b1a3f401b1e03ca97356c,2024-11-12T03:15:03.677000
CVE-2024-49395,1,1,28ffa8f19ba437680a3e428b154a06b30accd90b593b455ae410f0b11ee1411f,2024-11-12T03:15:03.910000
CVE-2024-49396,0,0,dbaa3d388154985d86e8594d731b97904294f985dcd6b939c9b3040fa96316c2,2024-10-18T12:52:33.507000
CVE-2024-49397,0,0,958762caa5006a67fc74324331d920e22a8fe3617537f208fec92361877cfad4,2024-10-18T12:52:33.507000
CVE-2024-49398,0,0,1964f2918f2b62a12a26449777ec3d512771c9e0a90e6a92142f1221cf2a6f15,2024-10-18T12:52:33.507000
@ -264132,7 +264143,10 @@ CVE-2024-49501,0,0,b68f4d3131dd45c8240c685b13eebbf7042a3a95ee975ccc7d0b4e65e2269
CVE-2024-49522,0,0,b49aefd5a73ccd26563c8b91d3f2d98c089948509c56be654cf3171337fc2496,2024-11-08T18:06:01.930000
CVE-2024-49523,0,0,f80724f56253226f78ea56271ee80d62b3ba148e1878999be1900b25d2719668,2024-11-08T19:01:03.880000
CVE-2024-49524,0,0,e7793eab2fff9b59c976da4b69592a395e034319e6c39d07f8b75673444fce47,2024-11-08T19:01:03.880000
CVE-2024-49557,1,1,56f3483a3917e3ecc72e8ce2077feecbf2a1e0613c979ac8e15c3a71b7829b3a,2024-11-12T04:15:06.040000
CVE-2024-49558,1,1,7e044f04407ec1af45f3db259c756d98e2c313865d25dcbfd0ed3557f8b91fdd,2024-11-12T04:15:06.243000
CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000
CVE-2024-49560,1,1,2e0a689994dc855bc709e1e3e9c09afebf988bb56ef9e577f2262273e88b89e3,2024-11-12T04:15:06.443000
CVE-2024-4957,0,0,e3bb8e47c8dfba146bed7647eff25fc6cc8427bb0bd54429262b4324d627abed,2024-07-03T02:08:22.473000
CVE-2024-49579,0,0,4674118b21cb39ebeef2b4743f0ed75dcd0002fe01b9b902589f8dc4995b5f10,2024-10-18T12:52:33.507000
CVE-2024-4958,0,0,15591ba73d7708bbd560fadc0281274b5c7c2c12545797826fbf6e13e1222639,2024-06-03T14:46:24.250000
@ -265022,11 +265036,11 @@ CVE-2024-5118,0,0,ede24973ef1505b96fcd3c614d177bf90baaafde820cda4461fa6280b3c2b4
CVE-2024-51180,0,0,291417569b0494624857cced13999289421aea811a146f5e21654eb2df5dd0c1,2024-11-04T13:37:15.737000
CVE-2024-51181,0,0,113da0b9d3296c95d5bef97b0c59442bc79ba9bb3dbb2c1b2baabdd141b84fe6,2024-11-04T13:39:48.413000
CVE-2024-51186,0,0,22a75f61af82d678a63881ed8d10c9a178a3d1960679c0862a84efb7646799de,2024-11-11T20:15:17.877000
CVE-2024-51187,0,1,9a67b518d46fc31c32122fcf0319d9e61d53f2fcbf131b56c5ef25bec66f02cf,2024-11-12T02:35:01.737000
CVE-2024-51188,0,1,e9828a68650152023528e4dc610f345553404c627f4bc9af2269add405326e09,2024-11-12T02:35:03.130000
CVE-2024-51189,0,1,0985908fe21f877ee5a26b68a6d4d809aa91aeeeabf391da7d290005b784e475,2024-11-12T02:35:03.970000
CVE-2024-51187,0,0,9a67b518d46fc31c32122fcf0319d9e61d53f2fcbf131b56c5ef25bec66f02cf,2024-11-12T02:35:01.737000
CVE-2024-51188,0,0,e9828a68650152023528e4dc610f345553404c627f4bc9af2269add405326e09,2024-11-12T02:35:03.130000
CVE-2024-51189,0,0,0985908fe21f877ee5a26b68a6d4d809aa91aeeeabf391da7d290005b784e475,2024-11-12T02:35:03.970000
CVE-2024-5119,0,0,6bb53ca9f8946448e1a7958af9df5b73fe1f36069f7b2aedbfc033eb827d83be,2024-06-04T19:21:00.657000
CVE-2024-51190,0,1,71991edd215e4e7a0815690b5b6d30cfbb98e6643908b58dad5c190e2a244486,2024-11-12T02:35:04.850000
CVE-2024-51190,0,0,71991edd215e4e7a0815690b5b6d30cfbb98e6643908b58dad5c190e2a244486,2024-11-12T02:35:04.850000
CVE-2024-5120,0,0,512e5b032e12a79292f06756f99bf223a47a4b934de5206e20b5529b01ef61b6,2024-06-04T19:21:00.760000
CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3bdb,2024-06-04T19:21:00.860000
CVE-2024-51211,0,0,9f7216f2f8d2a000da238cb20861cfda4ea040b75cc4ecdd6f811f2bee27be17,2024-11-08T19:15:06.347000
@ -268405,8 +268419,8 @@ CVE-2024-8876,0,0,adf401fb4b8b2c24f06ac7d28fd2360497bd835317abc655be39e3ccb04a97
CVE-2024-8877,0,0,072c8e486444961bae4945079e8c7eda87a37fe8ff462296a0eff944cb3f1801,2024-09-30T15:31:14.690000
CVE-2024-8878,0,0,d355a1999baf0c8606d16796b1d3b0e1dca83258ab14464d5a94be439e5488d1,2024-09-30T15:21:31.693000
CVE-2024-8880,0,0,4890b5d8ccfd73a7de9d70be358a6aa9c5c8f4db772389c703fb4d83ffb621f1,2024-09-20T16:41:38.030000
CVE-2024-8881,1,1,a371256a58d17c17394cba7918c298faaaaee6a96184fa8de20679192d62bc55,2024-11-12T02:15:18.817000
CVE-2024-8882,1,1,be431b4423ff2d70cf26e46385260b0eb175cd5f5983ec8e810ab0acd510d2de,2024-11-12T02:15:19.160000
CVE-2024-8881,0,0,a371256a58d17c17394cba7918c298faaaaee6a96184fa8de20679192d62bc55,2024-11-12T02:15:18.817000
CVE-2024-8882,0,0,be431b4423ff2d70cf26e46385260b0eb175cd5f5983ec8e810ab0acd510d2de,2024-11-12T02:15:19.160000
CVE-2024-8883,0,0,ef867150b75a006b88b657706b5ccab0ed5de191cb19aa041336ee55b15eac37,2024-11-05T04:15:03.467000
CVE-2024-8884,0,0,bbe657acd3b81809e4c38d289d4690d33ce15843f154a38b409847ce2483e4ec,2024-10-10T12:56:30.817000
CVE-2024-8885,0,0,3d17cd6b07f76e6b7b78ee39290572c27afe08953d025655a317633960052841,2024-10-04T13:50:43.727000

Can't render this file because it is too large.