Auto-Update: 2024-11-18T15:01:01.016198+00:00

This commit is contained in:
cad-safe-bot 2024-11-18 15:04:03 +00:00
parent fe75488780
commit 436d65e389
14 changed files with 619 additions and 47 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10529",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T03:15:03.700",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-18T14:59:15.043",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kognetiks:kognetiks_chatbot:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.1.8",
"matchCriteriaId": "917C98DD-406E-4E56-AF96-586C86C3E2EB"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/chatbot-chatgpt/trunk/includes/utilities/chatbot-assistants.php#L575",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3183413/chatbot-chatgpt/trunk/includes/utilities/chatbot-assistants.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f6b302c9-a6b9-4a91-acb5-2ad270817606?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10530",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-13T03:15:03.923",
"lastModified": "2024-11-13T17:01:16.850",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-18T14:59:30.173",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:kognetiks:kognetiks_chatbot:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.1.8",
"matchCriteriaId": "917C98DD-406E-4E56-AF96-586C86C3E2EB"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/chatbot-chatgpt/trunk/includes/utilities/chatbot-assistants.php#L596",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3183413/chatbot-chatgpt/trunk/includes/utilities/chatbot-assistants.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a4fd7e76-4d8b-4e4d-9ae9-c7f9933f8324?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-11303",
"sourceIdentifier": "office@cyberdanube.com",
"published": "2024-11-18T14:15:04.963",
"lastModified": "2024-11-18T14:15:04.963",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The pathname of the root directory to a Restricted Directory ('Path Traversal') vulnerability in Korenix JetPort 5601 allows Path Traversal.This issue affects JetPort 5601: through 1.2."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "office@cyberdanube.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "office@cyberdanube.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://cyberdanube.com/en/en-st-polten-uas-path-traversal-in-korenix-jetport/",
"source": "office@cyberdanube.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11318",
"sourceIdentifier": "cve-coordination@incibe.es",
"published": "2024-11-18T14:15:05.233",
"lastModified": "2024-11-18T14:15:05.233",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An IDOR (Insecure Direct Object Reference) vulnerability has been discovered in AbsysNet, affecting version 2.3.1. This vulnerability could allow a remote attacker to obtain the session of an unauthenticated user by brute-force attacking the session identifier on the \"/cgi-bin/ocap/\" endpoint."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve-coordination@incibe.es",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cve-coordination@incibe.es",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/idor-vulnerability-absysnet",
"source": "cve-coordination@incibe.es"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-3370",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-11-18T13:15:04.310",
"lastModified": "2024-11-18T13:15:04.310",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Egebilgi Software Website Template allows SQL Injection.This issue affects Website Template: before 29.04.2024."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "iletisim@usom.gov.tr",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.8,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-1860",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-43704",
"sourceIdentifier": "367425dc-4d06-4041-9650-c2dc6aaa27ce",
"published": "2024-11-18T05:15:04.687",
"lastModified": "2024-11-18T05:15:04.687",
"lastModified": "2024-11-18T14:35:02.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "Software installed and run as a non-privileged user may conduct improper GPU system calls to gain access to the graphics buffers of a parent process."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "367425dc-4d06-4041-9650-c2dc6aaa27ce",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-44765",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-08T19:15:05.590",
"lastModified": "2024-11-12T13:56:54.483",
"lastModified": "2024-11-18T14:35:03.200",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de autorizaci\u00f3n incorrecta (configuraci\u00f3n incorrecta del control de acceso) en MGT-COMMERCE GmbH v2.0.0 a v2.4.2 permite a los atacantes escalar privilegios y acceder a informaci\u00f3n confidencial mediante la manipulaci\u00f3n del archivo de configuraci\u00f3n de Nginx."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "http://mgt-commerce.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-50809",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-08T21:15:20.870",
"lastModified": "2024-11-12T13:56:54.483",
"lastModified": "2024-11-18T14:35:04.110",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "El archivo theme.php en SDCMS 2.8 tiene una vulnerabilidad de ejecuci\u00f3n de comandos que permite la ejecuci\u00f3n de comandos del sistema"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/v9d0g/CVEs/blob/main/CVE-2024-50809.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-5030",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-11-18T06:15:06.593",
"lastModified": "2024-11-18T06:15:06.593",
"lastModified": "2024-11-18T14:35:05.030",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "The CM Table Of Contents WordPress plugin before 1.2.3 does not have CSRF check in place when resetting its settings, which could allow attackers to make a logged in admin perform such action via a CSRF attack"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/2c2e994c-31bd-4de4-9480-b86f980d4130/",

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-52318",
"sourceIdentifier": "security@apache.org",
"published": "2024-11-18T13:15:04.490",
"lastModified": "2024-11-18T13:15:04.490",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect object recycling and reuse vulnerability in Apache Tomcat.\n\nThis issue affects Apache Tomcat: 11.0.0, 10.1.31, 9.0.96.\n\nUsers are recommended to upgrade to version 11.0.1, 10.1.32 or 9.0.97, which fixes the issue."
}
],
"metrics": {},
"references": [
{
"url": "https://lists.apache.org/thread/co243cw1nlh6p521c5265cm839wkqdp9",
"source": "security@apache.org"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2024-8781",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-11-18T14:15:05.730",
"lastModified": "2024-11-18T14:15:05.730",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Execution with Unnecessary Privileges, : Improper Protection of Alternate Path vulnerability in TR7 Application Security Platform (ASP) allows Privilege Escalation, -Privilege Abuse.This issue affects Application Security Platform (ASP): v1.4.25.188."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "iletisim@usom.gov.tr",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-250"
},
{
"lang": "en",
"value": "CWE-424"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-1861",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-9526",
"sourceIdentifier": "cve-coordination@google.com",
"published": "2024-11-18T14:15:05.873",
"lastModified": "2024-11-18T14:15:05.873",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "There exists a stored XSS Vulnerability in Kubeflow Pipeline View web UI.\u00a0The Kubeflow Web UI allows to create new pipelines. When creating a new pipeline, it is possible to add a description. The description field allows html tags, which are not filtered properly. Leading to a stored XSS. We recommend upgrading past commit\u00a0930c35f1c543998e60e8d648ce93185c9b5dbe8d"
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cve-coordination@google.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:P/VC:H/VI:H/VA:L/SC:H/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:Y/R:U/V:D/RE:L/U:Green",
"attackVector": "ADJACENT",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "HIGH",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "PRESENT",
"automatable": "YES",
"recovery": "USER",
"valueDensity": "DIFFUSE",
"vulnerabilityResponseEffort": "LOW",
"providerUrgency": "GREEN",
"baseScore": 7.1,
"baseSeverity": "HIGH"
}
}
]
},
"weaknesses": [
{
"source": "cve-coordination@google.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/kubeflow/pipelines/pull/10315",
"source": "cve-coordination@google.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-18T13:00:19.293486+00:00
2024-11-18T15:01:01.016198+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-18T12:15:18.727000+00:00
2024-11-18T14:59:30.173000+00:00
```
### Last Data Feed Release
@ -33,28 +33,31 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
270146
270152
```
### CVEs added in the last Commit
Recently added CVEs: `8`
Recently added CVEs: `6`
- [CVE-2024-11023](CVE-2024/CVE-2024-110xx/CVE-2024-11023.json) (`2024-11-18T11:15:05.507`)
- [CVE-2024-11319](CVE-2024/CVE-2024-113xx/CVE-2024-11319.json) (`2024-11-18T12:15:17.853`)
- [CVE-2024-48896](CVE-2024/CVE-2024-488xx/CVE-2024-48896.json) (`2024-11-18T12:15:18.093`)
- [CVE-2024-48897](CVE-2024/CVE-2024-488xx/CVE-2024-48897.json) (`2024-11-18T12:15:18.243`)
- [CVE-2024-48898](CVE-2024/CVE-2024-488xx/CVE-2024-48898.json) (`2024-11-18T12:15:18.363`)
- [CVE-2024-48901](CVE-2024/CVE-2024-489xx/CVE-2024-48901.json) (`2024-11-18T12:15:18.493`)
- [CVE-2024-52316](CVE-2024/CVE-2024-523xx/CVE-2024-52316.json) (`2024-11-18T12:15:18.600`)
- [CVE-2024-52317](CVE-2024/CVE-2024-523xx/CVE-2024-52317.json) (`2024-11-18T12:15:18.727`)
- [CVE-2024-11303](CVE-2024/CVE-2024-113xx/CVE-2024-11303.json) (`2024-11-18T14:15:04.963`)
- [CVE-2024-11318](CVE-2024/CVE-2024-113xx/CVE-2024-11318.json) (`2024-11-18T14:15:05.233`)
- [CVE-2024-3370](CVE-2024/CVE-2024-33xx/CVE-2024-3370.json) (`2024-11-18T13:15:04.310`)
- [CVE-2024-52318](CVE-2024/CVE-2024-523xx/CVE-2024-52318.json) (`2024-11-18T13:15:04.490`)
- [CVE-2024-8781](CVE-2024/CVE-2024-87xx/CVE-2024-8781.json) (`2024-11-18T14:15:05.730`)
- [CVE-2024-9526](CVE-2024/CVE-2024-95xx/CVE-2024-9526.json) (`2024-11-18T14:15:05.873`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `6`
- [CVE-2024-21534](CVE-2024/CVE-2024-215xx/CVE-2024-21534.json) (`2024-11-18T11:15:06.447`)
- [CVE-2024-10529](CVE-2024/CVE-2024-105xx/CVE-2024-10529.json) (`2024-11-18T14:59:15.043`)
- [CVE-2024-10530](CVE-2024/CVE-2024-105xx/CVE-2024-10530.json) (`2024-11-18T14:59:30.173`)
- [CVE-2024-43704](CVE-2024/CVE-2024-437xx/CVE-2024-43704.json) (`2024-11-18T14:35:02.840`)
- [CVE-2024-44765](CVE-2024/CVE-2024-447xx/CVE-2024-44765.json) (`2024-11-18T14:35:03.200`)
- [CVE-2024-5030](CVE-2024/CVE-2024-50xx/CVE-2024-5030.json) (`2024-11-18T14:35:05.030`)
- [CVE-2024-50809](CVE-2024/CVE-2024-508xx/CVE-2024-50809.json) (`2024-11-18T14:35:04.110`)
## Download and Usage

View File

@ -242868,9 +242868,9 @@ CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef
CVE-2024-10523,0,0,a761a52195ca091ecc100fefe31fd4eadda4d831fe94860e2a159923b6d0d68d,2024-11-08T15:14:30.070000
CVE-2024-10525,0,0,cfad79154f466fe96736eabfa65cac8f6409e21deb7f07d79c02c68ee3f19eb2,2024-11-01T12:57:03.417000
CVE-2024-10526,0,0,0fa46d8ccf5c219359a0535980da66887fa2b5cd7efbd75d68b15fd2b882e15b,2024-11-08T19:01:03.880000
CVE-2024-10529,0,0,ba448e61a25a3b9993953373775e32e46a89276debca722b149d2c20dac52146,2024-11-13T17:01:16.850000
CVE-2024-10529,0,1,9539d9165463c4ef6062f503e118501e5313e51d190262ed2198af5f2a5dc85d,2024-11-18T14:59:15.043000
CVE-2024-1053,0,0,3d9e5b8218feb39348551f4e96f20fbacd04f2b39830165bb00a553a3d3c5ccf,2024-02-22T19:07:27.197000
CVE-2024-10530,0,0,92621893a0cfce3bfe1fdd7c63ea167c697ca2f9bb15d05f6679b60616441ca2,2024-11-13T17:01:16.850000
CVE-2024-10530,0,1,e3e8a5aa8af87ef0e63a2252d7fc1dd4e05e13d53a5214a349201baf61c39609,2024-11-18T14:59:30.173000
CVE-2024-10531,0,0,e8a99e3947962fa1716c15c30d166a85cfe0edf0e3b4f56c81c0f6c7e992f302,2024-11-13T17:01:16.850000
CVE-2024-10533,0,0,74ef37a599912b5086a41dd08113d34c5b498ce14043f9595827a5922b8b41f9,2024-11-16T04:15:04.810000
CVE-2024-10534,0,0,df761b6d87b593c42e2ec312a2991a8ebb6274d59b353fff12911b0bdc63befd,2024-11-15T13:58:08.913000
@ -243157,7 +243157,7 @@ CVE-2024-11019,0,0,06c9591e4e5c6d656b8baab894d6c2f87e1056846bc80e098fe357c255272
CVE-2024-1102,0,0,0928bf44049eedf97e0b54e5fbfa6f0206fb5c0a5ae4e275eff0db0e3aa685dd,2024-10-16T15:15:15.150000
CVE-2024-11020,0,0,963165b309d98fa5de51d6a8811a97c5874fd64e0767359ebe01a6a8b627fb39,2024-11-12T13:55:21.227000
CVE-2024-11021,0,0,4d0c567ca6da32cdf6e4235111bcf9fdb7e328dc15e30ef740c5a8d047e64dcf,2024-11-12T13:55:21.227000
CVE-2024-11023,1,1,7f8f2a02c518743080070fe65ebb3bb1e6dddc4e4b1139f8776b4d018a742a81,2024-11-18T11:15:05.507000
CVE-2024-11023,0,0,7f8f2a02c518743080070fe65ebb3bb1e6dddc4e4b1139f8776b4d018a742a81,2024-11-18T11:15:05.507000
CVE-2024-11026,0,0,5bad097199e56ffd1f4b7755738c2445dc243d6c7a33468e0f417dfbc0b75e4b,2024-11-12T13:56:54.483000
CVE-2024-11028,0,0,a5fce876a39d3e00d472044131a8d336932258a82ff3a02e40bb7ab1cc37c8ff,2024-11-13T17:01:16.850000
CVE-2024-1103,0,0,7224a9abc8ad2624b19754063e5e3f1dd278d487bc1541d6b3a3ae6b5907a9fc,2024-05-17T02:35:14.273000
@ -243284,6 +243284,7 @@ CVE-2024-1127,0,0,fc004f13d69dd65990588f481257d3c8dd60a3804cfac37ac389768e5b88f0
CVE-2024-1128,0,0,de5352d9c421a908307277eb7da3f5f6fcfc08a095ea033ab740d4804aa5ccea,2024-02-29T13:49:29.390000
CVE-2024-1129,0,0,bb6d36851ed2d72741a575302302ac57d511f2bf349c6ca7db7385fd53c3529a,2024-02-29T13:49:29.390000
CVE-2024-1130,0,0,19461582000c347e1c07ca83a1d00e23feee8e20532d52fc093ba50686691b5b,2024-02-29T13:49:29.390000
CVE-2024-11303,1,1,9da6acbc13b8b94f12460b376e430401cf7dc7201a4560e3f86e7a663c5de78e,2024-11-18T14:15:04.963000
CVE-2024-11305,0,0,5328a95bbf7e662e12a857ef5dea77eab4ecc316fb4f536e8772e1db4fed63e6,2024-11-18T01:15:16.307000
CVE-2024-11306,0,0,f77aaaa67be9242d576d27dffde714b37bfb854f091ee9b96d0ca7ce4c9e08c4,2024-11-18T02:15:15.577000
CVE-2024-11308,0,0,7e0a566461a1a25058b504b1b076a10b434fc2fde4d7646a8b9f4bf31fc5a5d5,2024-11-18T06:15:04.263000
@ -243294,7 +243295,8 @@ CVE-2024-11312,0,0,71db06e2a096f0449f94df279bc5cb863b993686028b0aa9e878b169c9d8d
CVE-2024-11313,0,0,890f011cbf9b34450e7704907c25d098bdda5249e8660c02c0f3a68f1c57debc,2024-11-18T07:15:15.420000
CVE-2024-11314,0,0,77b62bdc6299b6d60a12b7a7152852e6fe05a08406e9a701a9a1af91def37fef,2024-11-18T07:15:15.993000
CVE-2024-11315,0,0,cc9ed50e7db63318901354c8ed077ff950a09534cf38b4d91deb60ae50f13e1d,2024-11-18T07:15:16.673000
CVE-2024-11319,1,1,cecbe2297dcb3803a189d8053634c3a4c17cea5ade2b89f632f2b5b9eca8384c,2024-11-18T12:15:17.853000
CVE-2024-11318,1,1,c8d49187a5efe2783469b03b708c4e2e5613cc8fbe66c94c34d585263b5d3164,2024-11-18T14:15:05.233000
CVE-2024-11319,0,0,cecbe2297dcb3803a189d8053634c3a4c17cea5ade2b89f632f2b5b9eca8384c,2024-11-18T12:15:17.853000
CVE-2024-1132,0,0,3de6e62885ac8497a4c1d8f4950ebedc171b13b33dfedd6a9eea9ae164fd993a,2024-07-03T01:45:01.507000
CVE-2024-1133,0,0,b8b851364368259dd533f1c71b437f741276dcf99770b03558b5d9cd5d3f095a,2024-02-29T13:49:29.390000
CVE-2024-1134,0,0,92ca7b611a6a52333e888fa3a581b5dbc5c29b22a5e7e62eb553cb40e2cb6d77,2024-05-24T13:03:05.093000
@ -245470,7 +245472,7 @@ CVE-2024-21530,0,0,1cd9789884a1ce72dfeb1a860d1947cabd2b932563c54dc2308d1b3820957
CVE-2024-21531,0,0,5cf47c591b7ac812976da2aea07f525fa384780c0c8ea5ef19705c9df1aef524,2024-10-04T13:51:25.567000
CVE-2024-21532,0,0,a24d27f47c5298fab706ab72282873a260fc61d5e510f460d432a2b7b9c38bac,2024-10-10T12:57:21.987000
CVE-2024-21533,0,0,b6d94b5290ee8a666e06ea3154c21a82f3a037332835b4cbc04bf2409f97ee11,2024-10-10T12:57:21.987000
CVE-2024-21534,0,1,9ac533dcca689f9e7455af7cbf2332420a35c484bd84c22299ec85a68ccdc9f0,2024-11-18T11:15:06.447000
CVE-2024-21534,0,0,9ac533dcca689f9e7455af7cbf2332420a35c484bd84c22299ec85a68ccdc9f0,2024-11-18T11:15:06.447000
CVE-2024-21535,0,0,2e7744380a1db7060122e5ae23002590579ae07efcc1f1beb06e6a3a8350e174,2024-10-17T20:36:29.213000
CVE-2024-21536,0,0,4f914cfe6666bcd465a58ac4926a267d85d3e48bad9af0623e3ff24aeb06f5b5,2024-11-01T18:03:15.897000
CVE-2024-21537,0,0,b5c780dab93a9075b9d24d6af4e9f73fa194b201a9c6953f660e67892e16f17b,2024-11-01T12:57:03.417000
@ -254361,6 +254363,7 @@ CVE-2024-33696,0,0,8adc0db7b8cce33b994e835fa3f282e25f1f4ef5644a2aed7cd50d800fe73
CVE-2024-33697,0,0,4a571113caa6ccf495d29be30608c42f9dddf9084d1562bed260e698c04aae88,2024-04-26T15:32:22.523000
CVE-2024-33698,0,0,80f9728a007b76bec9e55fcababf9ce2d8cb5c11944f565f0d36feef068c4511,2024-11-12T13:15:07.653000
CVE-2024-33699,0,0,81b1f37e6f990294e3d0e58469f3ce075096d2792432fa2b41bba58241b973e9,2024-11-08T17:09:29.790000
CVE-2024-3370,1,1,22a6725c7e1cbd619086f438626f44daba63173c7fa7a2ccfdbce153918ade8b,2024-11-18T13:15:04.310000
CVE-2024-33700,0,0,800096d409fd3a2a3a42bcca491373284624d5b7e93ac5ccde5cb0263c58657d,2024-11-08T17:06:16.147000
CVE-2024-3371,0,0,d2e6ea20ce5eb692a4e48c27aedae40a56c8f7db204eed4d633cbd78a04f68c4,2024-04-26T15:15:49.357000
CVE-2024-3372,0,0,a196d1e45ccce196e4deb1ea2387c2fe4f6bf89b27a8a7cd4be5ebcd31c9a0db,2024-05-14T19:17:55.627000
@ -261520,7 +261523,7 @@ CVE-2024-43699,0,0,78534d33d290678062dddcdfe24e803feecb99e21dbcb3ac97f746608e5c5
CVE-2024-4370,0,0,3c1f5b342c087fc6587c8bc9012541b58d80e50fdee9d14eea44daecdec82901,2024-05-15T16:40:19.330000
CVE-2024-43700,0,0,0a06b833e6fd1b1e874ef27bf2dcddebe6eeed2fb3b70101d743561cb29959e0,2024-10-15T14:35:01.987000
CVE-2024-43701,0,0,806d05bc9a9c57505164825be7dbf8680f4cf63f26e698ce90f59cb6324208a0,2024-10-15T15:35:16.050000
CVE-2024-43704,0,0,d894d800767f4d24d5db8cc651f3e2467718438c0e1b54995e70dd32d1bdb36d,2024-11-18T05:15:04.687000
CVE-2024-43704,0,1,4f037fb81f21fb6df9ec6ed12f104c8ae2db70fc795e157699f6df159f03a38c,2024-11-18T14:35:02.840000
CVE-2024-4371,0,0,a0b0e0fb8c98057b2328743d7da5c32e9a585001a67e08f1632ceab0df487dfa,2024-07-15T16:42:39.107000
CVE-2024-4372,0,0,9ae4f43bf2d0d90214ce2e4715e0031799e31627a4319bb26ad2a73cf60988cf,2024-05-21T12:37:59.687000
CVE-2024-4373,0,0,95ffe3cd6afce20664a5281c9740358c7cd9b7c7a4c9be8031ba5b0e36cac33d,2024-05-15T16:40:19.330000
@ -262155,7 +262158,7 @@ CVE-2024-44759,0,0,b9649314fac826d03abe6e58586192745a7059e4a9b66144d374bc1358b57
CVE-2024-44760,0,0,c31c484463dbcf8debf14f8cb14c4edde2aeacb7ab3b47695b1fc32577e35939,2024-11-15T20:15:20.270000
CVE-2024-44761,0,0,2cb43df04a70791b0f0fb8982142da3403b663e9582e8c16ce12d7edd85714da,2024-08-30T16:00:30.557000
CVE-2024-44762,0,0,a4d9c40079155e25bc23610bf9eb4b9c915e9b457539684228b809ce3110b930,2024-10-18T12:53:04.627000
CVE-2024-44765,0,0,f49b0ddc47e501e666f4838593930e2064ad96de66f6bc89ed89c1395c14c839,2024-11-12T13:56:54.483000
CVE-2024-44765,0,1,25fdaadf2c1ed2eab9647bf4bce6cea1d4c8cf1ff3e8ed1f0809e94c749aba6a,2024-11-18T14:35:03.200000
CVE-2024-4477,0,0,b275cf91a81ef0e33ced77c1c5ba5e17245e6b33fc991fd87901e463b723d83e,2024-07-12T16:12:03.717000
CVE-2024-44775,0,0,205ee8ae27d9197291c9317d68e5db327a872699c5adb78e1d5b21baab0f0fd4,2024-10-16T19:35:10.167000
CVE-2024-44776,0,0,553f0ea6859d4ff6b6f354ecc1fde63fb20d3cedbc33d036b9304dfd1b315c86,2024-09-03T18:33:26.287000
@ -264527,12 +264530,12 @@ CVE-2024-48870,0,0,b84b2a0a996d006ee4f5fea8401898b5086223eb9bced7a7565798c7f43b1
CVE-2024-48878,0,0,2b15f82c5be65c88d261c3882a75397babc580305d6a252ad1dbf2de5b50020f,2024-11-05T19:44:58.650000
CVE-2024-4888,0,0,ad5e456877e6c4225b3f983ebfcea1f0af64a03667e43f1cd6a0842bed4216c0,2024-11-03T17:15:14.137000
CVE-2024-4889,0,0,98c988bc305180dfde4233cdb25b83940a2a23ecd5fc7825e58f1cc0fbfe5628,2024-10-15T19:00:09.633000
CVE-2024-48896,1,1,777555d0f73f29600ab6caf64bfedf8c2806dacf20cb334d975bdac5e36061b2,2024-11-18T12:15:18.093000
CVE-2024-48897,1,1,cedced1f76d9370254c4282051d59e9499821e7c7e9c98552837ccbae8d6f332,2024-11-18T12:15:18.243000
CVE-2024-48898,1,1,bca3caea43810e9752cc6a873f900ac484aca95444990071dd6a11403a014c0d,2024-11-18T12:15:18.363000
CVE-2024-48896,0,0,777555d0f73f29600ab6caf64bfedf8c2806dacf20cb334d975bdac5e36061b2,2024-11-18T12:15:18.093000
CVE-2024-48897,0,0,cedced1f76d9370254c4282051d59e9499821e7c7e9c98552837ccbae8d6f332,2024-11-18T12:15:18.243000
CVE-2024-48898,0,0,bca3caea43810e9752cc6a873f900ac484aca95444990071dd6a11403a014c0d,2024-11-18T12:15:18.363000
CVE-2024-4890,0,0,ee7720239380ab5c638f0803999a779457a74687c16e858d2acf0798605f57a2,2024-10-10T20:11:44.610000
CVE-2024-48900,0,0,2b3a5e56342c363922328f10e6f3d06b5c266c3768636276b8919e3a3cee88b7,2024-11-13T17:01:16.850000
CVE-2024-48901,1,1,7d382d9c855e6ea4d3d15d13dd8dac5090844be34ed2c743269bf06b262c852f,2024-11-18T12:15:18.493000
CVE-2024-48901,0,0,7d382d9c855e6ea4d3d15d13dd8dac5090844be34ed2c743269bf06b262c852f,2024-11-18T12:15:18.493000
CVE-2024-48902,0,0,fed2bf5b719b321f64381a649376d7e0618bda5baab6f732c38dcd1211106c26,2024-10-16T16:57:23.463000
CVE-2024-48903,0,0,af1ee698040ee7f8c19b83dd0eb3404cde07c42231b0e3832a1aa5561c10194f,2024-10-23T15:12:34.673000
CVE-2024-48904,0,0,56bc56ed1722c08287266703a07bddbd88211e3eebee5fa1d299ad65c198bf37,2024-10-23T15:12:34.673000
@ -265468,7 +265471,7 @@ CVE-2024-50261,0,0,946c442cc56e3e8af45dc6329602e8261cd21844e512a68f35505737590fc
CVE-2024-50262,0,0,491da488ea3f6be70bbe09eed55bf84625143c296910fe98f090fd0f0e85c13c,2024-11-13T21:10:44.267000
CVE-2024-50263,0,0,031640c798eb6a3a8aeb817df2908ddb318a337ddb803a116f07c15a4af2eba6,2024-11-14T16:23:08.347000
CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000
CVE-2024-5030,0,0,a8ed0b3101399e3382eaf8f46c697791821accee3744c8ef02673180c6c5138d,2024-11-18T06:15:06.593000
CVE-2024-5030,0,1,e060a0debd631cb629968dfc8783c3f12caf31d98075661f64e60b5b9a3f945a,2024-11-18T14:35:05.030000
CVE-2024-50305,0,0,b03fd6d501d19d7b209a06f202d725af272151828bcd7418064455026a0a9df5,2024-11-15T13:58:08.913000
CVE-2024-50306,0,0,99b8de1207b2fdc71c13146c7372e7163a77f6f60a3176c55d7bfb57d63fa38c,2024-11-15T13:58:08.913000
CVE-2024-50307,0,0,6d2dcfccb50c0c30fd7d9bda3b36490982da8110db31d087befc4509a1d360cd,2024-10-28T13:58:09.230000
@ -265726,7 +265729,7 @@ CVE-2024-50800,0,0,ab830a43039dc3b7687658827fe30858d8d98c5f738791670612919030dff
CVE-2024-50801,0,0,b02fd2a4d914f47ebf18861bef14a429b26208dd8058232ee786f89bcea879c0,2024-11-04T19:35:13.810000
CVE-2024-50802,0,0,8492f5be24f5ad2918f47970062e4bc2c1c3f432ad972af1d330cb18adac5b2e,2024-11-04T19:35:14.907000
CVE-2024-50808,0,0,1a667410201903fdc8230c48df98057d6516bd370b3a4500e5037005f86c9f20,2024-11-12T13:56:54.483000
CVE-2024-50809,0,0,0543ed682b74f6a15eb703e6e2e2cbff22bee156f875bd21c519fc7274b9287c,2024-11-12T13:56:54.483000
CVE-2024-50809,0,1,c875db6c22acfe1e061d0cebbfeb9f3b7b26f693a5f07b91a9c5ce4621ac2b6f,2024-11-18T14:35:04.110000
CVE-2024-5081,0,0,0bebffdc717b25462ccb5a198cb29076c0fa0475011c795b0df7ab25d1acf197,2024-08-05T15:35:16.180000
CVE-2024-50810,0,0,7da23b2ab88a2657cb76543548549613aa1f561df30582c648f7520bf514f0d4,2024-11-12T13:56:54.483000
CVE-2024-50811,0,0,d8ef1ac40dcb898d28bb949cb8cb9a8ce73f83d8e224524d33d6a2ba92df335a,2024-11-12T13:56:54.483000
@ -266314,8 +266317,9 @@ CVE-2024-52311,0,0,440cc6f6193f2a4b57d7c7c4a4f4b3f01242ca6df6bc89770050e09d3b499
CVE-2024-52312,0,0,e095caa38b1d55aa1661d9e6b591e2f5164609c3e5c2884b5f60aa22d851bdcc,2024-11-12T13:56:54.483000
CVE-2024-52313,0,0,d6c72d2fda8c652aceb546ca4dc43f0485da383ec6c61ed73ed8a61cc3116669,2024-11-12T13:56:54.483000
CVE-2024-52314,0,0,1573621277321f9a5e33b224990557625938794cd01d39551dd04996aff05f9d,2024-11-12T13:56:54.483000
CVE-2024-52316,1,1,f475e511ab6499f225f06df35a95cebb1e527e3bab1146ac3762678b3e37ff9a,2024-11-18T12:15:18.600000
CVE-2024-52317,1,1,0a442788f1b1f07855040f3e082ccc4490d33a2dbf592a49e61163a9177af38a,2024-11-18T12:15:18.727000
CVE-2024-52316,0,0,f475e511ab6499f225f06df35a95cebb1e527e3bab1146ac3762678b3e37ff9a,2024-11-18T12:15:18.600000
CVE-2024-52317,0,0,0a442788f1b1f07855040f3e082ccc4490d33a2dbf592a49e61163a9177af38a,2024-11-18T12:15:18.727000
CVE-2024-52318,1,1,73ce82db0f7d9f694e1c73c32867c65cb58190f0628070e8affd1a263803cbe4,2024-11-18T13:15:04.490000
CVE-2024-5232,0,0,8d68905f3b69b3dadb32694d2c73f30dc32ad3c794d56bacf5b1c8bfed3d3bb6,2024-06-04T19:21:02.890000
CVE-2024-5233,0,0,d230ff373762a089849cb791769c151d4d1eb1a364270894bffa0dbac945e679,2024-06-04T19:21:02.993000
CVE-2024-5234,0,0,14a09ab7485c5dff6a0e2d37ff7f584b26da4a8cf075e00d5ab541632ac32bbb,2024-06-04T19:21:03.100000
@ -269370,6 +269374,7 @@ CVE-2024-8777,0,0,abf6497bbb9ed542a83ea295cf446b5b0a64e2a3685378272b7c6e8d7a6d84
CVE-2024-8778,0,0,04f76622204759cf035b6cf776488dd4e0117dc8a28cbc6a6f40333ff951b555,2024-09-20T14:23:37.697000
CVE-2024-8779,0,0,265c21235e2afe2292182db580bb12dd49935199c0a514bb7965dfbc0ef67e6b,2024-09-17T11:27:50.290000
CVE-2024-8780,0,0,390f3cd9aeaa4212ebd65fe7e603fc1df2783bc2afd801c860ac757dc6f09931,2024-09-20T14:35:20.250000
CVE-2024-8781,1,1,2c654bf661c293c959d06e86cc607a3c079300764b8e02259277654be925fbed,2024-11-18T14:15:05.730000
CVE-2024-8782,0,0,ec0da4baac22ae9eceb8ce2507375e0a71b6a51926de3cc40576bcd259fd7175,2024-09-19T01:46:07.003000
CVE-2024-8783,0,0,b434dfc5f50cf2811a1f5688ac574f745dec48e5af54cf5f568ce8560b0e2702,2024-09-19T01:38:57.033000
CVE-2024-8784,0,0,7bc5ed86fd42122481efd27561493828acec6a50cb9d34c0b1c40453c943431f,2024-09-19T01:38:35.177000
@ -269847,6 +269852,7 @@ CVE-2024-9519,0,0,2bb44dd736fdc130a04995624f7dece0b5eecdbbfca83c65536d849a586e04
CVE-2024-9520,0,0,043b00f2bf4932488b29ee05bd55762d90704159cb97bf4c710160da6d129691,2024-10-15T14:34:59.660000
CVE-2024-9521,0,0,09a594ea849fc5009e458f6cc46742d3176f440810ef4457104bfe2103f1d0c7,2024-10-16T16:38:14.557000
CVE-2024-9522,0,0,884c9004d667a145fae3b3526c4cb56c9d9a1365bd2a57b2af580c0e3b9c19a1,2024-10-15T14:27:41.553000
CVE-2024-9526,1,1,251fce6ca8df5cc44c0860f1fbb78180e4c258770ef7e2f7982582b4ddb743a6,2024-11-18T14:15:05.873000
CVE-2024-9528,0,0,ad76266403ba94311c1f58d7258b765d914c39ddcd1148706c2e05f82ca92e87,2024-10-07T17:48:28.117000
CVE-2024-9529,0,0,a74498e9b247fb3cd22f5e7796c9032948030a8869b02aae9fc90324965437c4,2024-11-15T19:35:19.160000
CVE-2024-9530,0,0,a4f4ec0ca4c538513c522bc25437bdee95aa200ea2c8ddaeaa2d301c3f668205,2024-10-25T18:52:10.810000

Can't render this file because it is too large.