Auto-Update: 2024-12-19T15:00:21.935449+00:00

This commit is contained in:
cad-safe-bot 2024-12-19 15:03:45 +00:00
parent 6fe36d000d
commit 451c39b2bb
29 changed files with 2347 additions and 241 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-3359",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2020-09-24T18:15:17.417",
"lastModified": "2024-11-21T05:30:52.443",
"lastModified": "2024-12-19T13:52:35.190",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -118,8 +118,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "20F47E46-DD4F-46B8-8A67-24EFA6D6AE4E"
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-3390",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2020-09-24T18:15:17.510",
"lastModified": "2024-11-21T05:30:56.207",
"lastModified": "2024-12-19T13:52:35.190",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -118,8 +118,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "20F47E46-DD4F-46B8-8A67-24EFA6D6AE4E"
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-3393",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2020-09-24T18:15:17.587",
"lastModified": "2024-11-21T05:30:56.567",
"lastModified": "2024-12-19T13:52:35.190",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -116,8 +116,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "20F47E46-DD4F-46B8-8A67-24EFA6D6AE4E"
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700"
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-3503",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2020-09-24T18:15:20.887",
"lastModified": "2024-11-21T05:31:12.317",
"lastModified": "2024-12-19T13:52:35.190",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -116,8 +116,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "20F47E46-DD4F-46B8-8A67-24EFA6D6AE4E"
"criteria": "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C98DED36-D4B5-48D6-964E-EEEE97936700"
}
]
},

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2021-26102",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-12-19T14:15:05.380",
"lastModified": "2024-12-19T14:15:05.380",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A relative path traversal vulnerability (CWE-23) in FortiWAN version 4.5.7 and below, 4.4 all versions may allow a remote non-authenticated attacker to delete files on the system by sending a crafted POST request. In particular, deleting specific configuration files will reset the Admin password to its default value."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-305"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-21-048",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2021-32589",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-12-19T13:15:05.707",
"lastModified": "2024-12-19T13:15:05.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A use after free in Fortinet FortiManager, FortiAnalyzer allows attacker to execute unauthorized code or commands via <insert attack vector here>"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-21-067",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-34398",
"sourceIdentifier": "security_alert@emc.com",
"published": "2023-02-01T06:15:08.710",
"lastModified": "2024-11-21T07:09:26.153",
"lastModified": "2024-12-19T14:25:44.370",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -1051,8 +1051,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:dell_latitude_3480:-:*:*:*:*:*:*:*",
"matchCriteriaId": "304D3113-E0AD-4401-B1CD-2ED3A2C84E0E"
"criteria": "cpe:2.3:h:dell:latitude_3480:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04009AD7-3BE3-4C94-8DBE-FD72879BD916"
}
]
}
@ -1079,8 +1079,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dell:dell_latitude_3580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "449960AB-8265-4874-976B-110486955C84"
"criteria": "cpe:2.3:h:dell:latitude_3580:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3351403-5904-480C-B9E1-6A2DF39B7431"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-10244",
"sourceIdentifier": "iletisim@usom.gov.tr",
"published": "2024-12-19T14:15:05.760",
"lastModified": "2024-12-19T14:15:05.760",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ISDO Software Web Software allows SQL Injection.This issue affects Web Software: before 3.6."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "iletisim@usom.gov.tr",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.usom.gov.tr/bildirim/tr-24-1893",
"source": "iletisim@usom.gov.tr"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12657",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-16T17:15:09.520",
"lastModified": "2024-12-16T17:15:09.520",
"vulnStatus": "Received",
"lastModified": "2024-12-19T14:46:43.777",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in IObit Advanced SystemCare Utimate up to 17.0.0 and classified as problematic. This vulnerability affects the function 0x8001E000 in the library AscRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en IObit Advanced SystemCare Ultimate hasta la versi\u00f3n 17.0.0 y se ha clasificado como problem\u00e1tica. Esta vulnerabilidad afecta a la funci\u00f3n 0x8001E000 en la librer\u00eda AscRegistryFilter.sys del componente IOCTL Handler. La manipulaci\u00f3n provoca la desreferenciaci\u00f3n de puntero nulo. El ataque debe realizarse de forma local. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,24 +142,68 @@
"value": "CWE-476"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:iobit:advanced_systemcare_ultimate:*:*:*:*:*:*:*:*",
"versionEndIncluding": "17.0.0",
"matchCriteriaId": "6B347268-396D-44DA-ABFD-9093A1989940"
}
]
}
]
}
],
"references": [
{
"url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E000-NPD-DOS-15160437bb1e8068a470ca1611fd7317",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.288526",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.288526",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.456035",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12658",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-16T18:15:10.120",
"lastModified": "2024-12-18T16:15:11.297",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-19T14:47:23.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -122,28 +142,76 @@
"value": "CWE-476"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:iobit:advanced_systemcare_ultimate:*:*:*:*:*:*:*:*",
"versionEndIncluding": "17.0.0",
"matchCriteriaId": "6B347268-396D-44DA-ABFD-9093A1989940"
}
]
}
]
}
],
"references": [
{
"url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E01C-NPD-DOS-15160437bb1e800eb1cadd53b224d088",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.288527",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.288527",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.456036",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E01C-NPD-DOS-15160437bb1e800eb1cadd53b224d088",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12659",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-16T18:15:10.320",
"lastModified": "2024-12-18T16:15:11.500",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-19T14:49:24.747",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -122,28 +142,76 @@
"value": "CWE-476"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:iobit:advanced_systemcare_ultimate:*:*:*:*:*:*:*:*",
"versionEndIncluding": "17.0.0",
"matchCriteriaId": "6B347268-396D-44DA-ABFD-9093A1989940"
}
]
}
]
}
],
"references": [
{
"url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E004-NPD-DOS-15160437bb1e804cbe8fd4d826f8564f",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.288528",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.288528",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.456038",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E004-NPD-DOS-15160437bb1e804cbe8fd4d826f8564f",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12660",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-16T18:15:10.533",
"lastModified": "2024-12-18T16:15:11.700",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-19T14:49:52.357",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -122,28 +142,76 @@
"value": "CWE-476"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:iobit:advanced_systemcare_ultimate:*:*:*:*:*:*:*:*",
"versionEndIncluding": "17.0.0",
"matchCriteriaId": "6B347268-396D-44DA-ABFD-9093A1989940"
}
]
}
]
}
],
"references": [
{
"url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E018-NPD-DOS-15260437bb1e80c5ab28da895ed46227",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.288529",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.288529",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.456337",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E018-NPD-DOS-15260437bb1e80c5ab28da895ed46227",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12662",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-16T19:15:07.027",
"lastModified": "2024-12-16T19:15:07.027",
"vulnStatus": "Received",
"lastModified": "2024-12-19T14:45:43.547",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in IObit Advanced SystemCare Utimate up to 17.0.0. This affects the function 0x8001E040 in the library AscRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en IObit Advanced SystemCare Ultimate hasta la versi\u00f3n 17.0.0. Afecta a la funci\u00f3n 0x8001E040 en la librer\u00eda AscRegistryFilter.sys del componente IOCTL Handler. La manipulaci\u00f3n provoca la desreferenciaci\u00f3n de puntero nulo. El ataque debe realizarse de forma local. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,24 +142,68 @@
"value": "CWE-476"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:iobit:advanced_systemcare_ultimate:*:*:*:*:*:*:*:*",
"versionEndIncluding": "17.0.0",
"matchCriteriaId": "6B347268-396D-44DA-ABFD-9093A1989940"
}
]
}
]
}
],
"references": [
{
"url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E040-NPD-DOS-15260437bb1e804e86b4e1de92ff0d09",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.288531",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.288531",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.457163",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12664",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-16T20:15:09.090",
"lastModified": "2024-12-16T20:15:09.090",
"vulnStatus": "Received",
"lastModified": "2024-12-19T14:55:00.460",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in ruifang-tech Rebuild 3.8.5. This issue affects some unknown processing of the component Project Task Comment Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad, que se ha clasificado como problem\u00e1tica, en ruifang-tech Rebuild 3.8.5. Este problema afecta a algunos procesos desconocidos del componente Project Task Comment Handler. La manipulaci\u00f3n conduce a cross site scripting. El ataque puede iniciarse de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,24 +142,67 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruifang-tech:rebuild:3.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EECAB45E-27C6-4333-A377-F5427A328D3F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/cydtseng/Vulnerability-Research/blob/main/rebuild/StoredXSS-TaskComments.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.288533",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.288533",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.458622",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12665",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-16T20:15:09.260",
"lastModified": "2024-12-16T20:15:09.260",
"vulnStatus": "Received",
"lastModified": "2024-12-19T14:55:20.300",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in ruifang-tech Rebuild 3.8.5. Affected is an unknown function of the component Task Comment Attachment Upload. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en ruifang-tech Rebuild 3.8.5. Se trata de una funci\u00f3n desconocida del componente Task Comment Attachment Upload. La manipulaci\u00f3n provoca cross site scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,24 +142,67 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ruifang-tech:rebuild:3.8.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EECAB45E-27C6-4333-A377-F5427A328D3F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/cydtseng/Vulnerability-Research/blob/main/rebuild/StoredXSS-TaskCommentAttachments.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.288534",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.288534",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.458623",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-12782",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-19T13:15:05.900",
"lastModified": "2024-12-19T13:15:05.900",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Fujifilm Apeos C3070, Apeos C5570 and Apeos C6580 up to 24.8.28 and classified as critical. This vulnerability affects unknown code of the file /home/index.html#hashHome of the component Web Interface. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-266"
},
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://github.com/dycccccccc/Fuji/blob/main/Fujifilm%20Business%20Innovation.docx",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.288958",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.288958",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.458897",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-12783",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-19T13:15:06.217",
"lastModified": "2024-12-19T13:15:06.217",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in itsourcecode Vehicle Management System 1.0 and classified as problematic. This issue affects some unknown processing of the file /billaction.php. The manipulation of the argument extra-cost leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/FinleyTang/Vehicle-Management-System/blob/main/Vehicle%20Management%20System%20billaction.php%20has%20Cross-site%20Scripting%20(XSS).pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://itsourcecode.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.288959",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.288959",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.462628",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-12784",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-19T14:15:05.943",
"lastModified": "2024-12-19T14:15:05.943",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in itsourcecode Vehicle Management System 1.0. It has been classified as critical. Affected is an unknown function of the file editbill.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/FinleyTang/Vehicle-Management-System/blob/main/Vehicle%20Management%20System%20editbill.php%20has%20Sqlinjection.pdf",
"source": "cna@vuldb.com"
},
{
"url": "https://itsourcecode.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.288960",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.288960",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.462629",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3516",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-04-10T19:15:49.717",
"lastModified": "2024-11-21T09:29:45.757",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-19T14:59:57.403",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -39,46 +59,133 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "123.0.6312.122",
"matchCriteriaId": "E8445CD7-B513-48C1-9EF0-4B57C9ED6654"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_10.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/328859176",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EW66LXDACTB5FCHLUPZOGD2KA2J62Q2/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDHNEFD76ORM7WBWAEZT6HSYDMZVIED4/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_10.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/328859176",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EW66LXDACTB5FCHLUPZOGD2KA2J62Q2/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EVEJEW7UCSUSK2J2FYQRZZPI74P2D3JP/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDHNEFD76ORM7WBWAEZT6HSYDMZVIED4/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3832",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-04-17T08:15:10.190",
"lastModified": "2024-11-21T09:30:29.353",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-19T14:53:34.190",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -39,46 +59,133 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "124.0.6367.60",
"matchCriteriaId": "AFB90495-B48B-4020-A2CC-51D77CABEB72"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/331358160",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/331358160",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3833",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-04-17T08:15:10.243",
"lastModified": "2024-11-21T09:30:29.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-19T14:46:01.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,70 +81,163 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "124.0.6367.60",
"matchCriteriaId": "AFB90495-B48B-4020-A2CC-51D77CABEB72"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/331383939",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/331383939",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3840",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-04-17T08:15:10.483",
"lastModified": "2024-11-21T09:30:30.660",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-19T14:35:08.377",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,70 +81,163 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "124.0.6367.60",
"matchCriteriaId": "AFB90495-B48B-4020-A2CC-51D77CABEB72"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/41493458",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/41493458",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3841",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-04-17T08:15:10.530",
"lastModified": "2024-11-21T09:30:30.860",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-19T14:23:44.970",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,70 +81,175 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "124.0.6367.60",
"matchCriteriaId": "AFB90495-B48B-4020-A2CC-51D77CABEB72"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/330376742",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/330376742",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3843",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-04-17T08:15:10.573",
"lastModified": "2024-11-21T09:30:31.057",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-19T14:12:42.743",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,70 +81,163 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "124.0.6367.60",
"matchCriteriaId": "AFB90495-B48B-4020-A2CC-51D77CABEB72"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/41486690",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/41486690",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3844",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-04-17T08:15:10.620",
"lastModified": "2024-11-21T09:30:31.250",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-19T13:59:12.247",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,70 +81,163 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
"versionEndExcluding": "124.0.6367.60",
"matchCriteriaId": "AFB90495-B48B-4020-A2CC-51D77CABEB72"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
"matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*",
"matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/40058873",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
"source": "chrome-cve-admin@google.com"
"source": "chrome-cve-admin@google.com",
"tags": [
"Mailing List"
]
},
{
"url": "https://chromereleases.googleblog.com/2024/04/stable-channel-update-for-desktop_16.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/40058873",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CWIVXXSVO5VB3NAZVFJ7CWVBN6W2735T/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IDLUD644WEWGOFKMZWC2K7Z4CQOKQYR7/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M4PCXKCOVBUUU6GOSN46DCPI4HMER3PJ/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCWPUBGTBNT4EW32YNZMRIPB3Y4R6XL6/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UOC3HLIZCGMIJLJ6LME5UWUUIFLXEGRN/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WEP5NJUWMDRLDQUKU4LFDUHF5PCYAPIO/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2024-9101",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2024-12-19T14:15:06.147",
"lastModified": "2024-12-19T14:15:06.147",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A reflected cross-site scripting (XSS) vulnerability in the 'Entry Chooser' of phpLDAPadmin (version 1.2.1 through the latest version, 1.2.6.7) allows attackers to execute arbitrary JavaScript in the user's browser via the 'element' parameter, which is unsafely passed to the JavaScript 'eval' function. However, exploitation is limited to specific conditions where 'opener' is correctly set."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 2.1,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/leenooks/phpLDAPadmin/blob/master/htdocs/entry_chooser.php",
"source": "vulnerability@ncsc.ch"
},
{
"url": "https://github.com/leenooks/phpLDAPadmin/commit/f713afc8d164169516c91b0988531f2accb9bce6#diff-c2d6d7678ada004e704ee055169395a58227aaec86a6f75fa74ca18ff49bca44R27",
"source": "vulnerability@ncsc.ch"
},
{
"url": "https://sourceforge.net/projects/phpldapadmin/files/phpldapadmin-php5/1.2.1/",
"source": "vulnerability@ncsc.ch"
},
{
"url": "https://www.redguard.ch/blog/2024/12/19/security-advisory-phpldapadmin/",
"source": "vulnerability@ncsc.ch"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2024-9102",
"sourceIdentifier": "vulnerability@ncsc.ch",
"published": "2024-12-19T14:15:06.327",
"lastModified": "2024-12-19T14:15:06.327",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "phpLDAPadmin since at least version 1.2.0 through the latest version 1.2.6.7 allows users to export elements from the LDAP directory into a Comma-Separated Value (CSV) file, but it does not neutralize special elements that could be interpreted as a command when the file is opened by a spreadsheet product. Thus, this could lead to CSV Formula Injection."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:H/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "vulnerability@ncsc.ch",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1236"
}
]
}
],
"references": [
{
"url": "https://github.com/leenooks/phpLDAPadmin/commit/ea17aadef46fd29850160987fe7740ceed1381ad#diff-93b9f3e6d4c5bdacf469ea0ec74c1e9217ca6272da9be5a1bfd711f7da16f9e3R240",
"source": "vulnerability@ncsc.ch"
},
{
"url": "https://sourceforge.net/projects/phpldapadmin/files/phpldapadmin-php5/1.2.0",
"source": "vulnerability@ncsc.ch"
},
{
"url": "https://www.redguard.ch/blog/2024/12/19/security-advisory-phpldapadmin/",
"source": "vulnerability@ncsc.ch"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-19T13:00:20.131768+00:00
2024-12-19T15:00:21.935449+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-19T12:15:16.673000+00:00
2024-12-19T14:59:57.403000+00:00
```
### Last Data Feed Release
@ -33,38 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
274361
274369
```
### CVEs added in the last Commit
Recently added CVEs: `8`
- [CVE-2020-12820](CVE-2020/CVE-2020-128xx/CVE-2020-12820.json) (`2024-12-19T11:15:05.700`)
- [CVE-2020-15934](CVE-2020/CVE-2020-159xx/CVE-2020-15934.json) (`2024-12-19T11:15:06.930`)
- [CVE-2021-26115](CVE-2021/CVE-2021-261xx/CVE-2021-26115.json) (`2024-12-19T11:15:07.103`)
- [CVE-2024-12331](CVE-2024/CVE-2024-123xx/CVE-2024-12331.json) (`2024-12-19T12:15:05.330`)
- [CVE-2024-12626](CVE-2024/CVE-2024-126xx/CVE-2024-12626.json) (`2024-12-19T12:15:06.160`)
- [CVE-2024-37962](CVE-2024/CVE-2024-379xx/CVE-2024-37962.json) (`2024-12-19T12:15:06.737`)
- [CVE-2024-45818](CVE-2024/CVE-2024-458xx/CVE-2024-45818.json) (`2024-12-19T12:15:16.540`)
- [CVE-2024-45819](CVE-2024/CVE-2024-458xx/CVE-2024-45819.json) (`2024-12-19T12:15:16.673`)
- [CVE-2021-26102](CVE-2021/CVE-2021-261xx/CVE-2021-26102.json) (`2024-12-19T14:15:05.380`)
- [CVE-2021-32589](CVE-2021/CVE-2021-325xx/CVE-2021-32589.json) (`2024-12-19T13:15:05.707`)
- [CVE-2024-10244](CVE-2024/CVE-2024-102xx/CVE-2024-10244.json) (`2024-12-19T14:15:05.760`)
- [CVE-2024-12782](CVE-2024/CVE-2024-127xx/CVE-2024-12782.json) (`2024-12-19T13:15:05.900`)
- [CVE-2024-12783](CVE-2024/CVE-2024-127xx/CVE-2024-12783.json) (`2024-12-19T13:15:06.217`)
- [CVE-2024-12784](CVE-2024/CVE-2024-127xx/CVE-2024-12784.json) (`2024-12-19T14:15:05.943`)
- [CVE-2024-9101](CVE-2024/CVE-2024-91xx/CVE-2024-9101.json) (`2024-12-19T14:15:06.147`)
- [CVE-2024-9102](CVE-2024/CVE-2024-91xx/CVE-2024-9102.json) (`2024-12-19T14:15:06.327`)
### CVEs modified in the last Commit
Recently modified CVEs: `11`
Recently modified CVEs: `19`
- [CVE-2021-47615](CVE-2021/CVE-2021-476xx/CVE-2021-47615.json) (`2024-12-19T11:15:07.277`)
- [CVE-2022-48700](CVE-2022/CVE-2022-487xx/CVE-2022-48700.json) (`2024-12-19T11:15:30.050`)
- [CVE-2023-52759](CVE-2023/CVE-2023-527xx/CVE-2023-52759.json) (`2024-12-19T11:15:30.140`)
- [CVE-2024-26713](CVE-2024/CVE-2024-267xx/CVE-2024-26713.json) (`2024-12-19T12:15:06.330`)
- [CVE-2024-26720](CVE-2024/CVE-2024-267xx/CVE-2024-26720.json) (`2024-12-19T12:15:06.417`)
- [CVE-2024-26972](CVE-2024/CVE-2024-269xx/CVE-2024-26972.json) (`2024-12-19T12:15:06.507`)
- [CVE-2024-35928](CVE-2024/CVE-2024-359xx/CVE-2024-35928.json) (`2024-12-19T12:15:06.590`)
- [CVE-2024-36885](CVE-2024/CVE-2024-368xx/CVE-2024-36885.json) (`2024-12-19T12:15:06.657`)
- [CVE-2024-41024](CVE-2024/CVE-2024-410xx/CVE-2024-41024.json) (`2024-12-19T12:15:06.900`)
- [CVE-2024-42116](CVE-2024/CVE-2024-421xx/CVE-2024-42116.json) (`2024-12-19T12:15:06.967`)
- [CVE-2024-43903](CVE-2024/CVE-2024-439xx/CVE-2024-43903.json) (`2024-12-19T12:15:07.040`)
- [CVE-2020-3359](CVE-2020/CVE-2020-33xx/CVE-2020-3359.json) (`2024-12-19T13:52:35.190`)
- [CVE-2020-3390](CVE-2020/CVE-2020-33xx/CVE-2020-3390.json) (`2024-12-19T13:52:35.190`)
- [CVE-2020-3393](CVE-2020/CVE-2020-33xx/CVE-2020-3393.json) (`2024-12-19T13:52:35.190`)
- [CVE-2020-3503](CVE-2020/CVE-2020-35xx/CVE-2020-3503.json) (`2024-12-19T13:52:35.190`)
- [CVE-2022-34398](CVE-2022/CVE-2022-343xx/CVE-2022-34398.json) (`2024-12-19T14:25:44.370`)
- [CVE-2024-12657](CVE-2024/CVE-2024-126xx/CVE-2024-12657.json) (`2024-12-19T14:46:43.777`)
- [CVE-2024-12658](CVE-2024/CVE-2024-126xx/CVE-2024-12658.json) (`2024-12-19T14:47:23.380`)
- [CVE-2024-12659](CVE-2024/CVE-2024-126xx/CVE-2024-12659.json) (`2024-12-19T14:49:24.747`)
- [CVE-2024-12660](CVE-2024/CVE-2024-126xx/CVE-2024-12660.json) (`2024-12-19T14:49:52.357`)
- [CVE-2024-12662](CVE-2024/CVE-2024-126xx/CVE-2024-12662.json) (`2024-12-19T14:45:43.547`)
- [CVE-2024-12664](CVE-2024/CVE-2024-126xx/CVE-2024-12664.json) (`2024-12-19T14:55:00.460`)
- [CVE-2024-12665](CVE-2024/CVE-2024-126xx/CVE-2024-12665.json) (`2024-12-19T14:55:20.300`)
- [CVE-2024-3516](CVE-2024/CVE-2024-35xx/CVE-2024-3516.json) (`2024-12-19T14:59:57.403`)
- [CVE-2024-3832](CVE-2024/CVE-2024-38xx/CVE-2024-3832.json) (`2024-12-19T14:53:34.190`)
- [CVE-2024-3833](CVE-2024/CVE-2024-38xx/CVE-2024-3833.json) (`2024-12-19T14:46:01.697`)
- [CVE-2024-3840](CVE-2024/CVE-2024-38xx/CVE-2024-3840.json) (`2024-12-19T14:35:08.377`)
- [CVE-2024-3841](CVE-2024/CVE-2024-38xx/CVE-2024-3841.json) (`2024-12-19T14:23:44.970`)
- [CVE-2024-3843](CVE-2024/CVE-2024-38xx/CVE-2024-3843.json) (`2024-12-19T14:12:42.743`)
- [CVE-2024-3844](CVE-2024/CVE-2024-38xx/CVE-2024-3844.json) (`2024-12-19T13:59:12.247`)
## Download and Usage

View File

@ -147830,7 +147830,7 @@ CVE-2020-12817,0,0,e98d3763d551f764083135cad61bc60ac9df18241e9743a5cc7008fcd5839
CVE-2020-12818,0,0,671fc9fbdbe3092c4779c13951027edfc290fea7c7ab7abd7d0208cd1bbcf899,2024-11-21T05:00:20.173000
CVE-2020-12819,0,0,55808baac491aaae6a7eac880b91ce002ae30d34f239a61c87cf56ec2a23132d,2024-12-19T08:15:11.770000
CVE-2020-1282,0,0,5dffd0f7490f04d4b38e703efd93f4aeaf53342feda449eb492337d8e143e58b,2024-11-21T05:10:09.537000
CVE-2020-12820,1,1,fabc96fd5243491a6098701b35c35443cbca96908edad8182cb3f5358592a491,2024-12-19T11:15:05.700000
CVE-2020-12820,0,0,fabc96fd5243491a6098701b35c35443cbca96908edad8182cb3f5358592a491,2024-12-19T11:15:05.700000
CVE-2020-12821,0,0,80bcfaffcfb668796236a3e35b815e8ec4146df6282fdf2e3e6375b32fcb8032,2024-11-21T05:00:20.317000
CVE-2020-12823,0,0,63ce9c2c4c1ef765c93695caf4139f7414cd4af512f7553968ad51b1ea50fa92,2024-11-21T05:00:20.483000
CVE-2020-12824,0,0,6534202f520baa89c97b25b54d55668d51bf5fbe629e32fb97e834206f437857,2024-11-21T05:00:20.660000
@ -150818,7 +150818,7 @@ CVE-2020-15930,0,0,ddf771fc6d87f6ced9204169d4acfef1c571c2a978ab816ce8b7fd853bc21
CVE-2020-15931,0,0,a10cb49292305ec6a808df00d3348e0e4db90c3f72b0471a15de535201f79707,2024-11-21T05:06:28.807000
CVE-2020-15932,0,0,753b5138d95055bc631356d86e2b858be1e912eb235704fc2a5dc0ad771b1951,2024-11-21T05:06:28.963000
CVE-2020-15933,0,0,c58c28ead27a2edd586e93aea5954b30d5e719ba78be7f7d53fd2f414e7f619e,2024-11-21T05:06:29.110000
CVE-2020-15934,1,1,fbf5e9e8c2d2db699f07d021deae47c1509d3770133d7f47c3aa618c468fb0ea,2024-12-19T11:15:06.930000
CVE-2020-15934,0,0,fbf5e9e8c2d2db699f07d021deae47c1509d3770133d7f47c3aa618c468fb0ea,2024-12-19T11:15:06.930000
CVE-2020-15935,0,0,3d44ad87ef52f836bf08b07849628b028d3f60cc6a3e7dd0c2e18d8d1ce440ee,2024-11-21T05:06:29.250000
CVE-2020-15936,0,0,f67304764b7eed9af18135dc77461ba4954f24074f19be7d3c356ca681372042,2024-11-21T05:06:29.380000
CVE-2020-15937,0,0,5c7d159a511897639fe925e50a3abb031ba9f39c82555f2dea6c23f4a0b2a723,2024-11-21T05:06:29.510000
@ -158020,7 +158020,7 @@ CVE-2020-3355,0,0,0753cc2134594794c8f65c82be029cfb722c8dfa81e11c72169ce3697a2cb3
CVE-2020-3356,0,0,7319a54cc68b40fe0ecd5645a3e8c1c3f3291a94c1f61b789be4a838f6db7611,2024-11-21T05:30:52.107000
CVE-2020-3357,0,0,1972f6206ba8f62ff474707781510603f3cfc543660db035ff09c82e84fe3b74,2024-11-21T05:30:52.210000
CVE-2020-3358,0,0,6baef50d36c1253be0a8f00a89a41f1ff404eac4d38c28eccb71dbdd3f10cb0e,2024-11-21T05:30:52.327000
CVE-2020-3359,0,0,b59e6f4dc87e121e996d956702cbe158184d90b34f6becf795664b9a85b0db3f,2024-11-21T05:30:52.443000
CVE-2020-3359,0,1,04b2e9a2324a69717c6edb79b0d64b5dccb33d20e03b5c74dfefbcb09e0a33ea,2024-12-19T13:52:35.190000
CVE-2020-3360,0,0,65e5efe6205de98c605b1a094c1380e007443e11181b408c85d233eef079b248,2024-11-21T05:30:52.567000
CVE-2020-3361,0,0,cf291cc66b5b534c117aba0c6ae1bad8fa2989964749318528b63dabe3d3e8c9,2024-11-21T05:30:52.717000
CVE-2020-3362,0,0,169869772cb31e60f1275ca6d634785d1796231011d38370aace094a60812d37,2024-11-21T05:30:52.837000
@ -158050,10 +158050,10 @@ CVE-2020-3386,0,0,f5692ae11f45d58264ddb8d6ff66a35a0ebddd3b52cc5f3d7919bdc835c0e3
CVE-2020-3387,0,0,4b93ac6efae7c90dfe534abae09055c79cbff7b0a9c14dbfa8c64257ed0663a1,2024-11-21T05:30:55.833000
CVE-2020-3388,0,0,22c32c10651ebf8b298fc898a7d40ab98e5099e6585996e8d220b1f59a9b2d39,2024-11-21T05:30:55.963000
CVE-2020-3389,0,0,8c2e85e272ec460b2a3e5633519b2c431adb53b86419300321e14a4be1ee4e5e,2024-11-21T05:30:56.097000
CVE-2020-3390,0,0,a11274fbcb4c4c3a5d77992236adf7e0dc4dcaf2c0c79ca035bfa3f9d48b1255,2024-11-21T05:30:56.207000
CVE-2020-3390,0,1,0b651df5da9d0920f0852f1c6b6585fc8fbf4fd717e8187d493809d77237d484,2024-12-19T13:52:35.190000
CVE-2020-3391,0,0,0b25594cf1c2d26768848273409cacbac6d254fcb4aafc3578041fe9774d8fe8,2024-11-21T05:30:56.340000
CVE-2020-3392,0,0,104474d1564235600d45fffcf193a3c8d8155e82ebbbd48ddf734e8706729400,2024-11-21T05:30:56.453000
CVE-2020-3393,0,0,cfe67e2d414cc7b40146629ba9e51b39ac5d185ee34cfacf17641fad21db99bb,2024-11-21T05:30:56.567000
CVE-2020-3393,0,1,0d6f1230c2b196e5d24f7f8104e0e611d412ef68e42ea9fe9ae4b3ef2294c2d8,2024-12-19T13:52:35.190000
CVE-2020-3394,0,0,25fca6a6684200fa0ada87cd25c0495147cfa85441051509526ced422c2ee69c,2024-11-21T05:30:56.723000
CVE-2020-3396,0,0,ef719e7b808c4de9cf5e5a74f82ba105dc7f6a99959dc6dd7e1066ab8839e01f,2024-11-21T05:30:56.857000
CVE-2020-3397,0,0,2d86635423b471e64bbae4a8d3d51f7fabbba054147e982523388d2abd06c28a,2024-11-21T05:30:57
@ -158158,7 +158158,7 @@ CVE-2020-3500,0,0,a0a6129343211679a02d4486d3af9c47b578067f77ae2ba33b66af9f64e67c
CVE-2020-3501,0,0,3b4f0fef4d8fe63611c421856606f5f9e75654123e2fb96e88425aea276769ff,2024-11-21T05:31:12.060000
CVE-2020-35012,0,0,2eccd8b4634d38c79c4a049614e16d992339530a03c38cac69e25306cfc5d63f,2024-11-21T05:26:47.150000
CVE-2020-3502,0,0,95b6b887a00506e85a7a00916e0619b18a4a2c381cd4cebbf37ed50740de376d,2024-11-21T05:31:12.200000
CVE-2020-3503,0,0,87026910b7dea5e94fec01d9ffcb75680461833492150da4113b712a84a1be11,2024-11-21T05:31:12.317000
CVE-2020-3503,0,1,ccc00cb5b034f9f32fa6d55d7071e827f3c092d5e6344b9f3f0a017192c4f51f,2024-12-19T13:52:35.190000
CVE-2020-35037,0,0,50483bb65cf6f2d2b2e13d30f299f20950668cee0807f1510510e253a5d74731,2024-11-21T05:26:47.290000
CVE-2020-3504,0,0,67103fe449687d9f3a9dbaaf8a97d5e0b6b547ad04a6c9ca0129467d674cc16e,2024-11-21T05:31:12.453000
CVE-2020-3505,0,0,77099b5686a878796cf0b7c22a22d3279cf78369b1ebedcc62205bb91d340bdf,2024-11-21T05:31:12.597000
@ -171890,6 +171890,7 @@ CVE-2021-26097,0,0,5492509e540c4b9490ee3ecc2fc9e19c927e8dd5d975d3f7f5bdd412c54ec
CVE-2021-26098,0,0,3a78a7a98f4df60c6a00e525ff05b85d5d44ada2a807d7c7d95ffc04905c1637,2024-11-21T05:55:51.797000
CVE-2021-26099,0,0,3e3b15c98ba7a020a9c3367c6e1c3eecdb1bbc4fd677e304269fa38f92e8ab14,2024-11-21T05:55:51.920000
CVE-2021-26100,0,0,ed053018eaf23e6bce5ff1257543fd9b49a4ccbc5175f03e01d9b5ca5a66c918,2024-11-21T05:55:52.050000
CVE-2021-26102,1,1,d0fe198b91edfd07b16c97f88e18675573b221290d85af27607022989b793bbf,2024-12-19T14:15:05.380000
CVE-2021-26103,0,0,3e0d5f7e10ed3bb8c2f0e6e30419d3e890d688617b5f5b7d1465896c87e7af6f,2024-11-21T05:55:52.177000
CVE-2021-26104,0,0,50ba7945ee1730d62d5768fd49dc86483435d5f7ffc0fd56b30e4dbdb152e85b,2024-11-21T05:55:52.310000
CVE-2021-26106,0,0,1156db33903c97c6180bd2eb70f02894bdb10adaf97b8483a1abada00d94d3b1,2024-11-21T05:55:52.487000
@ -171901,7 +171902,7 @@ CVE-2021-26111,0,0,65cfd7a7617da7e8096c4fc1d4834851a9a89795b381808a5ed837084e869
CVE-2021-26112,0,0,ad04a90f399279c6cb54924592c27b54612f21ed4f64ef28078cb3c6ac8d4aab,2024-11-21T05:55:53.290000
CVE-2021-26113,0,0,1239a1d8bfda55bded8d0633a9a803d0afe80a8d5a56bcca10ede0ba5a365e91,2024-11-21T05:55:53.423000
CVE-2021-26114,0,0,4e26ac22bb1817e738cd9fdb3acbb9510f49ffdd0a44f0853a50532b15c1012d,2024-11-21T05:55:53.553000
CVE-2021-26115,1,1,bd36fd5474004b24183f03ce0fd60d9f22ae13d2c0c06884aeddb3036ec610c4,2024-12-19T11:15:07.103000
CVE-2021-26115,0,0,bd36fd5474004b24183f03ce0fd60d9f22ae13d2c0c06884aeddb3036ec610c4,2024-12-19T11:15:07.103000
CVE-2021-26116,0,0,cce36364eeea643186b7df95f8898bc06762541228a4d98951c68bee64b93c3a,2024-11-21T05:55:53.683000
CVE-2021-26117,0,0,4247253501c6b016c1398ba584d37347914d71bb3bacba1824a141ac6d048539,2024-11-21T05:55:53.820000
CVE-2021-26118,0,0,28ea2534ddcf8aea0dfe0198838afbdd8bdfd393b7f85365babb96b975d0fa61,2024-11-21T05:55:54.040000
@ -176437,6 +176438,7 @@ CVE-2021-32585,0,0,5768abccf57646b16f23da60be2ff4de982ce08fd70ce938bfb45c990c620
CVE-2021-32586,0,0,34e4c2125f96b38865aef7ca62056093a6679c5b5fcdc8f412729682e6b6545a,2024-11-21T06:07:19.600000
CVE-2021-32587,0,0,b3a3ebaa57939f1fce261725e56c8d4427307bf6a8feda4373094acc2be6caa8,2024-11-21T06:07:19.757000
CVE-2021-32588,0,0,3d733168babd74fe035c8a4800ddc796e3529db9c0dd80e7995ce4a3f10c1c5b,2024-11-21T06:07:19.903000
CVE-2021-32589,1,1,d6738550d4f8537f060f62ce579d533dbba2870b6224d15e29f681418ebcee4f,2024-12-19T13:15:05.707000
CVE-2021-32590,0,0,31e2aa593ab42693b927463e7677935f8e51214decf73d40bca768acdc83bf1c,2024-11-21T06:07:20.043000
CVE-2021-32591,0,0,a08df48a7b6fb917a33cfed960a11b4ba43aa20c94d83651237e38f63328427f,2024-11-21T06:07:20.180000
CVE-2021-32592,0,0,9abaf52755247a09b55286334808bbc822bf005d261fea183303a194b08befe7,2024-11-21T06:07:20.310000
@ -187772,7 +187774,7 @@ CVE-2021-47611,0,0,72fed461ca248513af7a725249d88365519d130d94049f54dcda50a4f2cff
CVE-2021-47612,0,0,957ecdda3a8b98e1534a1b82e3aaa6c8f6122bd058e5113c51e195d118cea61c,2024-11-21T06:36:40.130000
CVE-2021-47613,0,0,19a04fd1f0584a867ff6d6f3c118207ceb6d9be93705d6bcbc67864890c29837,2024-11-21T06:36:40.277000
CVE-2021-47614,0,0,36e7357b7b81720992f860c50a94c0a0e767ab5f5631183c966cf01e7c962969,2024-11-21T06:36:40.410000
CVE-2021-47615,0,1,4ae4c3237eabb37cbb4e66774127ecf3513adf8017103d7fc9055396dd915646,2024-12-19T11:15:07.277000
CVE-2021-47615,0,0,4ae4c3237eabb37cbb4e66774127ecf3513adf8017103d7fc9055396dd915646,2024-12-19T11:15:07.277000
CVE-2021-47616,0,0,844339b9257190d77ca0e068698a60ae9a32d03d73850d8c85270493a13952b2,2024-11-21T06:36:40.680000
CVE-2021-47617,0,0,97ae21eefd31138fe6c12d734b67f4e215edd68910efec959cb47546cca1f752,2024-11-21T06:36:40.810000
CVE-2021-47618,0,0,0fa0dd97d1fdb5f1da0fd7171dd10a5a040e00c10e2e413c2e56d2d12f7f666d,2024-11-21T06:36:40.970000
@ -201893,7 +201895,7 @@ CVE-2022-34394,0,0,12529d5803139c324d92392a02b070380856c289b2e3cc8ba10436e2d18d9
CVE-2022-34395,0,0,3e610450fa3e2ded1776e6ff21c56d87d784ddeb6a7d36f171e32441c341f76e,2023-11-07T03:48:35.580000
CVE-2022-34396,0,0,43f4c66c05911687c5ca3f76d67da661b0a8c5a0ec572415bdbf2de54d73f09c,2024-11-21T07:09:25.880000
CVE-2022-34397,0,0,e4de43f6ea892758f07db9463a69b4acd670c8350b03710d660a3af85a8350a1,2024-11-21T07:09:26.017000
CVE-2022-34398,0,0,5e72d512b98ef8ad6bdda0c4dafa3587175838648a7491408056151028136f9a,2024-11-21T07:09:26.153000
CVE-2022-34398,0,1,76aefc48fb05dc81bb12ac53e0d682c00d449730e8e8e053801abf2527dbc99a,2024-12-19T14:25:44.370000
CVE-2022-34399,0,0,e78feacc06d4c1af740cf0ca8bfab1321193a36b66560e1bfd517614ebb4e10f,2024-11-21T07:09:26.500000
CVE-2022-3440,0,0,bc1605c5df870bd1f7eaeaef03dfc3bae5d686b6d8f9461275a8186ec03d69bb,2024-11-21T07:19:31.413000
CVE-2022-34400,0,0,e214ef06bb53710b8e350d276371d447129a03dfd452297ab3d24476c0a8d98f,2024-11-21T07:09:26.667000
@ -212623,7 +212625,7 @@ CVE-2022-48697,0,0,929abd519afd2d70713936962bbdba23f04f5766bcb86e4b1c902e9047e46
CVE-2022-48698,0,0,02c1690bff6c336e6ab17c3750cee520d0e856986dee5e0e93b475ff30ff2d27,2024-11-21T07:33:48.747000
CVE-2022-48699,0,0,4a65b916873eacb0ff3e3e320e4042125dd7b4593e08989ea9e1bb3148422bc9,2024-11-21T07:33:48.920000
CVE-2022-4870,0,0,0653c3f110427e600f4fff49760ee6f7023220e09583d1b4c2850e6f657116c1,2024-11-21T07:36:06.513000
CVE-2022-48700,0,1,df92ed3f7cac2bfbad90002c2f19832292b50de0d525a7db006f3a2f0869ac18,2024-12-19T11:15:30.050000
CVE-2022-48700,0,0,df92ed3f7cac2bfbad90002c2f19832292b50de0d525a7db006f3a2f0869ac18,2024-12-19T11:15:30.050000
CVE-2022-48701,0,0,d1e9cf0eb78fc885e1142bd9aee72edcf01dbaa0c0a6bd96dd014e0378a994ad,2024-11-21T07:33:49.133000
CVE-2022-48702,0,0,b296d534707e7559d5ae1f1c19f484a852ce125c5c24de9ff9fcec38fe00afd4,2024-11-21T07:33:49.250000
CVE-2022-48703,0,0,491e5c1beaea1e9f327f45a2e23267af3034415f31d723eee0c88c8d2251bbf1,2024-11-21T07:33:49.380000
@ -240143,7 +240145,7 @@ CVE-2023-52755,0,0,55709bd2f3dc1c87aa3471bddf97c6186d1e143b1093730a71b8875b73e2f
CVE-2023-52756,0,0,8c8da8a3db6a91519a62adce02f570a443b14cd0510ad082cfeda6a8c8ebbec4,2024-06-08T12:15:09.513000
CVE-2023-52757,0,0,d946e9b3acd074035e9e5dd8b5b179cc6e742e761c0a68d3271fc4b165eae453,2024-11-21T08:40:31.420000
CVE-2023-52758,0,0,1dec77a3ad2d46363a8d440866791b91e3ba2419e4f6b349bb352575fcbf86ba,2024-05-24T16:15:09.010000
CVE-2023-52759,0,1,d02de4f2e673632abe3697cddfe6669da6af361a999f03297379c860e218d9d0,2024-12-19T11:15:30.140000
CVE-2023-52759,0,0,d02de4f2e673632abe3697cddfe6669da6af361a999f03297379c860e218d9d0,2024-12-19T11:15:30.140000
CVE-2023-5276,0,0,0b7db42a0b69ca7893c46dd3bcba89bcdb20b2edc3fa2c1057d10c47dc3e90db,2024-11-21T08:41:26
CVE-2023-52760,0,0,98d3d4c8bacf4c312879ef9527d08a9e77d7aad79d38c26f0713e99c5d9dd931,2024-11-21T08:40:31.687000
CVE-2023-52761,0,0,2de2d44e86efe53326e55f7ec6f21c5145ed9df593be989838b4687490700a3c,2024-11-21T08:40:31.823000
@ -243239,6 +243241,7 @@ CVE-2024-10234,0,0,0a07df80914e66d5d85b955c292b2b3cf0e6c594aacdd956ae88b148b50f2
CVE-2024-1024,0,0,2ce6ea613c0f5fbd9eefb91502606b7a8afa5d8203c0988924a996fbe7be9c49,2024-11-21T08:49:37.560000
CVE-2024-10240,0,0,276dba492b8757d4f6f0835618fd41c3d6de1d38b01e674953d2dce8a8014991,2024-12-13T01:37:16.177000
CVE-2024-10241,0,0,fe3dcecfada7c3764490fec385526c423fea05ceb1d8cfae03a9be08ced791ff,2024-10-29T14:34:04.427000
CVE-2024-10244,1,1,a4c9a5b4987296d06889f094e30c5af28840780e70b9cab372ccb2893a2b3d53,2024-12-19T14:15:05.760000
CVE-2024-10245,0,0,5714c51fb85acb3984990d3d9b6159b31ef4484b309f1b36de23af150cc1fca1,2024-11-12T13:55:21.227000
CVE-2024-10247,0,0,5430b5d913fdfe2b748a2d5ec29b0a58e233e1700f121852ac0b90135a42f8bc,2024-12-06T04:15:04.190000
CVE-2024-10250,0,0,dce2ccadbd6e77d5f97f6e4ccb7b1ad74933eaf3de52e88abfac961c0db9fd4a,2024-10-25T16:37:32.777000
@ -244776,7 +244779,7 @@ CVE-2024-12325,0,0,46c6dbf8ab48a9529900a473106f832e082cd9f7d718e64a5c9e5edd2c3d1
CVE-2024-12326,0,0,528dcb8d7af4c778be7e7edffb51de59f5440438426b982c28bb8bdb99422951,2024-12-06T21:15:05.957000
CVE-2024-12329,0,0,66dd2e3f2af8b0b1aca8274acaafc22644d93ff908c884984769d59605f22905,2024-12-12T07:15:10.607000
CVE-2024-1233,0,0,9d758d75169c31056a2dd99a6ff761ac0a3c179827b3dc598c6fb0d83614dada,2024-11-21T08:50:07.317000
CVE-2024-12331,1,1,54f37a23a367c9b0a6eaf80a6c0bdac5fcdc6f7334a0073064ce545a04a0abfe,2024-12-19T12:15:05.330000
CVE-2024-12331,0,0,54f37a23a367c9b0a6eaf80a6c0bdac5fcdc6f7334a0073064ce545a04a0abfe,2024-12-19T12:15:05.330000
CVE-2024-12333,0,0,f9b36bf24b65a5eadc34be133c8efc135d615c6b77b9af6e424c71705bac5515,2024-12-12T09:15:05.390000
CVE-2024-12338,0,0,202a85d7d49dabb95d9680ff72787a60f1c4021e681feb9be8640c62beb774ef,2024-12-12T04:15:07.497000
CVE-2024-1234,0,0,6b4d1ae0b8159c98fb379447cf95a21f71a7514cfa9af5f48616ab89e3a52cca,2024-11-21T08:50:07.567000
@ -244900,7 +244903,7 @@ CVE-2024-12601,0,0,2ca4ea21e5bfaf124d19bbe4bee1a196aca18d8d864e8b042ec1fe94e0d48
CVE-2024-12603,0,0,b77b6c9527bd0798c4124cb6a67b3eb0384daf1c81bc149052bbc09ab0e74875,2024-12-13T03:15:05.187000
CVE-2024-1261,0,0,7451d11c24f2ac390a05020abbe5be1a7d1e877de58a9c0842a513a0e1790005,2024-11-21T08:50:11.030000
CVE-2024-1262,0,0,b26d9641a8cbc2c5642fa36dfff4a6fef92b6772e7113385af431217d75dfe5b,2024-11-21T08:50:11.167000
CVE-2024-12626,1,1,c507f48504ec07699c997cadd25d159f726e2c9fe718f1736d180501b3c257c9,2024-12-19T12:15:06.160000
CVE-2024-12626,0,0,c507f48504ec07699c997cadd25d159f726e2c9fe718f1736d180501b3c257c9,2024-12-19T12:15:06.160000
CVE-2024-12628,0,0,ac808889130fae56b4e45ff31e222138f9e55a8e7c6187e647f824762405f8ac,2024-12-14T07:15:07.213000
CVE-2024-1263,0,0,1ded99eb7dd7c25043d30fb557b1a5799a79150045deb56dc782cc48f4b0c898,2024-11-21T08:50:11.303000
CVE-2024-12632,0,0,b2981d9ae0d79f88557270498f7d8919df56f26fc08631dba371165f9d0f4233,2024-12-13T21:15:09.317000
@ -244916,16 +244919,16 @@ CVE-2024-12653,0,0,0bdff4965d01bd6aa73fcbedd02b053581ebdedd8d7404b8f9233029d8912
CVE-2024-12654,0,0,dd847f86178d706ec068f649f759ab2d8fa9222fd8627ac6c45d7d35cd5983cc,2024-12-18T13:42:22.853000
CVE-2024-12655,0,0,7ceaaca6f02716eece2d7e73d7d09c21cdb7429363dd024bbff0d12b620fab5c,2024-12-16T17:15:09.147000
CVE-2024-12656,0,0,d7ca036e72b675c7410eee2a09d0c8b1a09bf6f11bc270d361aec72d2859b2e9,2024-12-16T17:15:09.340000
CVE-2024-12657,0,0,d62bb2296e60c72ad405696503588543100255cd21c67ed32539ab7099fc2c10,2024-12-16T17:15:09.520000
CVE-2024-12658,0,0,d1603c6f162f68deb5fb3680f23894c8cd48abd18931637daa20165cc25f0652,2024-12-18T16:15:11.297000
CVE-2024-12659,0,0,0f1a25a790c3a06fdcd98e8fc222bbba905ef6e5e8eab8586918a744a057e2b5,2024-12-18T16:15:11.500000
CVE-2024-12657,0,1,59348b5485cc78202fc057085be62694153448bbd8102fd74b2dd0327231cf8c,2024-12-19T14:46:43.777000
CVE-2024-12658,0,1,5b6b569577dedcdf0d4d7e104eb92c626d5eee1ccb9eaa3aa5667fb3b7c9d19b,2024-12-19T14:47:23.380000
CVE-2024-12659,0,1,6c16300b58f1e5167184bcbd4880dc3e422630c66c66de4ab6a0cc9186836154,2024-12-19T14:49:24.747000
CVE-2024-1266,0,0,2a4a1a9a97982898c100d9d9cb94e7da9ed50410ea3a8e686081520943168bc9,2024-11-21T08:50:11.767000
CVE-2024-12660,0,0,9ebd9119d6a731311780c33f36a0848bab9bd76dae1d26fe89c7648d30991b8c,2024-12-18T16:15:11.700000
CVE-2024-12660,0,1,8796c4dc87e42e3eff07e858443bea5e3fd80cd78c07c6ca3d8f7dbec30035d3,2024-12-19T14:49:52.357000
CVE-2024-12661,0,0,b0a5ca69a8f43b38c9f7b899d0ebfd6b57a397e750bb735f317aa453d69aa5f4,2024-12-16T20:15:08.840000
CVE-2024-12662,0,0,b07855f7b8c9ee6bdfd1cdccd03234059b510edc4b4a3a8c0a44fc18dfc722aa,2024-12-16T19:15:07.027000
CVE-2024-12662,0,1,29cac34ce72f4480acb005697a648add46560bb84a61da6f86d8bf42debbf1b8,2024-12-19T14:45:43.547000
CVE-2024-12663,0,0,cb1a586129069ffa13466f4c6b4784e75a597b36a82749fcb1b049602849dc70,2024-12-16T20:15:08.963000
CVE-2024-12664,0,0,8b14bcf6274b4b1006a264a51c743fbc803a9a92a0774d499c88554da6e35aaa,2024-12-16T20:15:09.090000
CVE-2024-12665,0,0,20c012aa44cf6efbaec36428e27712f8278e734a812c7dd5afcce74ec2d8d152,2024-12-16T20:15:09.260000
CVE-2024-12664,0,1,54d187c1eeaa5b0463ec5d372870555679a8fdc47e615fb58e7e5dce84cd53e1,2024-12-19T14:55:00.460000
CVE-2024-12665,0,1,3220ef21931044d081e07d6b4308f79cc6622e8130bf8cd7769065c704a3b096,2024-12-19T14:55:20.300000
CVE-2024-12666,0,0,e6916594a0490686e8b3fa8e2eef1b08f1952d21ae56044d4a0b2592b3b950f1,2024-12-16T20:15:09.430000
CVE-2024-12667,0,0,8326e32b687aca9c189f301c70ca8cd23c53ed4f34213ac25fd52d1fe1bec45d,2024-12-16T20:15:09.600000
CVE-2024-12668,0,0,2d75ced822d853be6c6d0f513771edc99398324227c8582be01ec3a2f5a7e3b4,2024-12-16T17:15:09.700000
@ -244951,6 +244954,9 @@ CVE-2024-1275,0,0,55e303d499b7cd70146b064f11442ebd0ad45cafbb26b305d69871c04faa25
CVE-2024-1276,0,0,342e07ea1475f57185158b84be14279572eebbc1b91e4c07c491730599e6701d,2024-11-21T08:50:13.050000
CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de12942,2024-11-21T08:50:13.170000
CVE-2024-1278,0,0,304f88731c9c2e93f283a152f19a1ac852d3cf0fda0d38c9b82c242ac4604519,2024-11-21T08:50:13.287000
CVE-2024-12782,1,1,bc61a5ad6f30b948435381c8170b91d4f7a0de7c5aa6736826a6cbf390b49afa,2024-12-19T13:15:05.900000
CVE-2024-12783,1,1,58bac48d696a0ad6888cceb5e4c2f18a8dca69de1015bafa9e7ec5c861f38063,2024-12-19T13:15:06.217000
CVE-2024-12784,1,1,01c570031a8a1e6ad8356000972177a0e918fbccc207cb0ff470d63ebf279f33,2024-12-19T14:15:05.943000
CVE-2024-1279,0,0,748039c92f5ca569335554a7f38080e94b49a821a92d564d52fc8ec18dfbf14a,2024-11-21T08:50:13.410000
CVE-2024-1282,0,0,e6b07825f0f3597687613e3a6164d0e157f6f527c33c61eb8d90ec07193bdec2,2024-11-21T08:50:13.520000
CVE-2024-1283,0,0,b1c9571efecc70819ed9018aef1b79e079809dddea59c76e732d84247ac1db52,2024-11-21T08:50:13.640000
@ -250663,7 +250669,7 @@ CVE-2024-2671,0,0,7868b0c3d3bca338bc309b82ca1d0b8bd8df4ecbefb4e6a6f37eff750b8ed1
CVE-2024-26710,0,0,6ac3ed3e058c9245f76455df758aa5822954706d5927ffde47193e09cb8d8b8c,2024-11-21T09:02:53.723000
CVE-2024-26711,0,0,8dccb84b3c19a8be9b5c23386e56431114b107c936ab5d88e825fada25c33413,2024-11-21T09:02:53.837000
CVE-2024-26712,0,0,fb8685ddd0683cdabb2327df61ff8cea2e7e86fcfa201af9434b63269c960077,2024-11-21T09:02:53.947000
CVE-2024-26713,0,1,e7e300ec5bbfa68ba83e0a47cb90f58abff0db2ab2dd369821dd312aa798bced,2024-12-19T12:15:06.330000
CVE-2024-26713,0,0,e7e300ec5bbfa68ba83e0a47cb90f58abff0db2ab2dd369821dd312aa798bced,2024-12-19T12:15:06.330000
CVE-2024-26714,0,0,87db1e3510e7967d782bddedfcd8da69fbf9dd7de01e3acc10c009bc5f1ae976,2024-11-21T09:02:54.257000
CVE-2024-26715,0,0,04aa2f77569d66ac66b00bd01b2bfd2b5bcfa7bc37259db7e45c22c543648779,2024-11-21T09:02:54.377000
CVE-2024-26716,0,0,a4091ea8075b2b28902d3aa14725da458e5925fc8c8a163b005140f08fdc608e,2024-11-21T09:02:54.497000
@ -250671,7 +250677,7 @@ CVE-2024-26717,0,0,7b0bca736d524de19c0e00e378dd20b4e516f8a07cee5fa2f3ccb3c887524
CVE-2024-26718,0,0,b71c0a254c7aad42c306d673849eee87146b27e1c3e5db37335467c2a89b2d97,2024-11-21T09:02:54.723000
CVE-2024-26719,0,0,49272ffb2292f3d85039eb80d999203cc47568c7ee88d8dd11d75770d1415067,2024-11-21T09:02:54.847000
CVE-2024-2672,0,0,37c31eab6f5cd3fb8466d604392093c92b8e3eb9dce60eeef838946e4f379074,2024-11-21T09:10:15.560000
CVE-2024-26720,0,1,1ca9f5c1cf45272d711bbb341b9a3a3e8a66cb323b330efba47b2d4d73910e9a,2024-12-19T12:15:06.417000
CVE-2024-26720,0,0,1ca9f5c1cf45272d711bbb341b9a3a3e8a66cb323b330efba47b2d4d73910e9a,2024-12-19T12:15:06.417000
CVE-2024-26721,0,0,ca9a0496ef9381a3510ada8cf6ba88673a4cc89acefb09f26c80679837546878,2024-11-21T09:02:55.100000
CVE-2024-26722,0,0,fd9735c280802bb7daa832f4b82be89b1abda1eda19bc22cda9b7d5bdc48f305,2024-11-21T09:02:55.213000
CVE-2024-26723,0,0,f35d3a0170fc204ff63f3cb0d2c569463d0cc7f7c48d6a9fa170a41519069565,2024-11-21T09:02:55.350000
@ -250948,7 +250954,7 @@ CVE-2024-26969,0,0,e5f43935788ed4102251fcd0d628d5ccae7841fa16c09f7ad35d852b1e5f5
CVE-2024-2697,0,0,75185752f94c46a8517aa2b7e60fa3a9d28d1b1692134edfaaeea70946ab0b18,2024-11-21T09:10:19.120000
CVE-2024-26970,0,0,a672db4cc38f97538246e763011f8e043ad7cb6ea68c17c5902e1a5c00ecb7ca,2024-11-21T09:03:31.017000
CVE-2024-26971,0,0,d1b4d011905ed844146859edf5ec32a3c1c9f5591baf6ff9f2e2a1701bba2994,2024-11-21T09:03:31.260000
CVE-2024-26972,0,1,cb815d256c738176b35ac7d4b54a98540b3097e6a6f896002f385b4cd625ec4a,2024-12-19T12:15:06.507000
CVE-2024-26972,0,0,cb815d256c738176b35ac7d4b54a98540b3097e6a6f896002f385b4cd625ec4a,2024-12-19T12:15:06.507000
CVE-2024-26973,0,0,c8f1b7513166f4d8d868d293eabecb5dc618f18ae5a1c23488508504db0cd584,2024-11-21T09:03:31.523000
CVE-2024-26974,0,0,0f591009ac759735d90b261c7f218f848e9c210ca5fdf67c29e52f8bb9da6e97,2024-11-21T09:03:31.677000
CVE-2024-26975,0,0,ace6be83a19e827f3d1b2e6f8869ab3c870ead2fd02580bdd6ce004f1efbd2d8,2024-11-21T09:03:31.817000
@ -257034,7 +257040,7 @@ CVE-2024-35153,0,0,72b7eff1e351197066dcedfe56c19ee4fca9d867b0c858ba84a516b5786df
CVE-2024-35154,0,0,554b56dff004b88808df73c981811e239d11908d063d2af4082356f8429e1b4e,2024-11-21T09:19:50.140000
CVE-2024-35155,0,0,b581d8098316c46e30a871576c4a4f4237d9a4779584711c4eaaa70d1b897fae,2024-11-21T09:19:50.290000
CVE-2024-35156,0,0,b0df5a80c4a3b209661680ab79bf7ba83a331996691db2a5a3f19164eb81c71c,2024-11-21T09:19:50.443000
CVE-2024-3516,0,0,3d3300430ea374cb14b9a0a64ea889b74690531ef86d36c3db6e25158ab19328,2024-11-21T09:29:45.757000
CVE-2024-3516,0,1,a5df3ba320f02e10bec3a1c2b9e275212486e2abf989072d5e8f0437891203f6,2024-12-19T14:59:57.403000
CVE-2024-35160,0,0,318ce523570aa2a281e98ab12c2ca421a0d155ef6ca7820b4c93b91389e32554,2024-11-26T19:08:22.473000
CVE-2024-35161,0,0,74d1d58b7caf81c95e1ff919f262e1fd560e12cb383b56b749f45f557e6d48d2,2024-11-21T09:19:50.580000
CVE-2024-35162,0,0,cc3a1e9ad17185933b2ccd6c60215dad31a11f8c95ac23e34980d635d83969d3,2024-11-21T09:19:50.790000
@ -257651,7 +257657,7 @@ CVE-2024-35924,0,0,51a8e81a5087f6b00f86aef3df30b13903521527bd7c24804424b3f4f88b0
CVE-2024-35925,0,0,527fefad4777ff7cb6251a7bffe472b80d43edd30c48c261e4833904b72dcd03,2024-11-21T09:21:12.953000
CVE-2024-35926,0,0,c1b13d208fac57fe78f6933a263aa2f330043107ad1ad5de4da551ecec504628,2024-11-21T09:21:13.097000
CVE-2024-35927,0,0,278ce2f015c27adcc7ff8c3c6be22b3e8c5bb291856afb164b072d0d8d61b636,2024-11-21T09:21:13.223000
CVE-2024-35928,0,1,1c31dc8c665b8952880067e761bee324da2eee6fa320ed892680e88b3dd7b63e,2024-12-19T12:15:06.590000
CVE-2024-35928,0,0,1c31dc8c665b8952880067e761bee324da2eee6fa320ed892680e88b3dd7b63e,2024-12-19T12:15:06.590000
CVE-2024-35929,0,0,eb006570fe02d7ffc9e04d8f3f9763107832d753b0fe4a826e5c2d003f21ec4d,2024-11-21T09:21:13.567000
CVE-2024-3593,0,0,7dfe1a06ca99b709e0966f80e5fa7243762a8725a5825da6ebc20a944f2ce167,2024-11-21T09:29:56.757000
CVE-2024-35930,0,0,7e83c7b01877dbff724cb187134d16aa47e0859d84876cd4351e2229ddfcadf6,2024-11-21T09:21:13.707000
@ -258330,7 +258336,7 @@ CVE-2024-36881,0,0,865b117aacccbfe6f687a7a3084b4b43e2681e536659c100c63b5a33a1027
CVE-2024-36882,0,0,0f0f121d8fdb7782a4529834147427038a637e17603baf7ba025febdfe31fa89,2024-11-21T09:22:43.487000
CVE-2024-36883,0,0,7a8c98819cff9aad35478db9de8d5f7f50773b3af47bc48d336d6709ddf1efb2,2024-11-21T09:22:43.597000
CVE-2024-36884,0,0,687c65bbb2dd2f603c1ac47ebda44100b26697c1b7819311390c4f344eaf0a18,2024-11-21T09:22:43.727000
CVE-2024-36885,0,1,e42429ca105987b3123d1dd2686d7aa54f4c4825ae074f67ad5efea854c755f1,2024-12-19T12:15:06.657000
CVE-2024-36885,0,0,e42429ca105987b3123d1dd2686d7aa54f4c4825ae074f67ad5efea854c755f1,2024-12-19T12:15:06.657000
CVE-2024-36886,0,0,ee9fdfbec95f1abe836cd3b0b5d78a461d1302ed6631e8ff9dc750e6e886f601,2024-11-21T09:22:44.007000
CVE-2024-36887,0,0,a762f623af0796d1d3914ff021dbfc976ffe8e125e31079b0b5e027d7ee1ebf1,2024-11-21T09:22:44.220000
CVE-2024-36888,0,0,970978d503b68ff5aee4c9ba46a5a7ee7c69234a87d3a271e73799c354725e06,2024-11-21T09:22:44.343000
@ -259190,7 +259196,7 @@ CVE-2024-37959,0,0,2862307e6b6656e94395dac2d8ff6f12ad600e913a0f2b2e4ab9d9950e1d2
CVE-2024-3796,0,0,5e13880a616d837f5f87d8ca618a02d49accff6c61baaf75a0f5a9c0334540f3,2024-11-21T09:30:25.163000
CVE-2024-37960,0,0,88ecfceb39b7e0063b870ddb68c9129955f8d29f0184bea950ac004cc590cadd,2024-11-21T09:24:35.723000
CVE-2024-37961,0,0,cf66c48c044de3bddb607a0cf3c90167369e2890a5e938294c10f20a360a5cca,2024-11-21T09:24:35.847000
CVE-2024-37962,1,1,993324d3c9625881f8a97e806572df474c559c49a72b858e9a4eb814b17a913d,2024-12-19T12:15:06.737000
CVE-2024-37962,0,0,993324d3c9625881f8a97e806572df474c559c49a72b858e9a4eb814b17a913d,2024-12-19T12:15:06.737000
CVE-2024-37965,0,0,deadb6178df50344a99f4db0b1b0ac8cc220f77eb2f409ad573a3760355529c3,2024-09-10T17:43:14.410000
CVE-2024-37966,0,0,85e576d8e77ff0998b4d648e3f23ec422e9ce18077a2bb9cb430cd43a937e43f,2024-09-10T17:43:14.410000
CVE-2024-37968,0,0,54c65ab38f96c984d47f26d7973e70fed12b5bc92a49f3dcf7903784570e6447,2024-08-16T20:54:18.347000
@ -259540,12 +259546,12 @@ CVE-2024-38313,0,0,b4fccf4bc32a428a2ed3da857e5610d03364deeda806c6ba074978d77fa69
CVE-2024-38314,0,0,7f72becf752c493d63d9011af9e40e717b070fb953c18b5df93807710a713461,2024-10-25T12:56:07.750000
CVE-2024-38315,0,0,7f80cda9dd8e03aa7f11a3ebca194914cfdb9ca994dcb1bc1568ef69817f8f68,2024-09-20T14:09:24.733000
CVE-2024-38319,0,0,85d07cf6ac4c3d39aed41b78f9915ec0d57e1f4cef6712c4aaaab05d2f91be0b,2024-11-21T09:25:22.177000
CVE-2024-3832,0,0,92a7ae8720ad26d3e305f078c135d59194029e87c5d697f23712ba3423f2faae,2024-11-21T09:30:29.353000
CVE-2024-3832,0,1,54d7cd70608d6ebf4d58d321fb2c71a056073b40f73450ca63d747b8e4ec1006,2024-12-19T14:53:34.190000
CVE-2024-38321,0,0,451e43fd7c3ce8a95a4f1d37398e013e2483fd40917c790d6dc74b359b1d32d9,2024-09-06T14:50:53.583000
CVE-2024-38322,0,0,8e573827e3fa52cf97ec6d2ef345cd31ae55ff6b4c10220d85ef83b3ce3ac344,2024-11-21T09:25:22.520000
CVE-2024-38324,0,0,6983d8cad1fd6c0c78413c4456f22354583612d01ccc038ac7f0199fa2c57812,2024-09-30T14:10:18.597000
CVE-2024-38329,0,0,9da02cb1c1e6e0ee0df6910cf16cd32ad52cc4fe1d821c256d156fa9c41a4422,2024-11-21T09:25:22.867000
CVE-2024-3833,0,0,e3094fa977b5b8af715274c21734c75e4d1f902958fa008fa88a736e550fbc57,2024-11-21T09:30:29.563000
CVE-2024-3833,0,1,70f71fc362a5e7d48ef4a06bca848d6c2e550860bbb53e401c6074b0eadf1358,2024-12-19T14:46:01.697000
CVE-2024-38330,0,0,f29c2fed4aa255682376d1bf1fe6f029c9aeaf29cb91e5ed615ddc69bd26c654,2024-11-21T09:25:23.523000
CVE-2024-3834,0,0,947eb53652569d79e3c1cf44919e7a8749c280dc3486461656b1c499598740e9,2024-11-21T09:30:29.777000
CVE-2024-38344,0,0,c3f614f414d62cde3a55726244e500e4dd08719f2cd9a8082171daa986ea9b20,2024-12-06T18:15:24.490000
@ -259598,7 +259604,7 @@ CVE-2024-38395,0,0,46946bc80b6ec6d4325625e62e71814cc02619cf11adc6e28df221a54cc54
CVE-2024-38396,0,0,d3997f564c8b2a9c3991e11a4c6e0bdd14d02ff7f10ce84e788ea83e320f1273,2024-11-21T09:25:36.147000
CVE-2024-38397,0,0,d6dd613908370d993d9d8ecfa347a275bc14a2f13c3136f84e2570e346b335ce,2024-10-16T18:23:57.797000
CVE-2024-38399,0,0,031e4fe9c82d3f3717aafd1300d875f223006ff986e2da0972e9d12069de224e,2024-10-16T18:17:09.577000
CVE-2024-3840,0,0,1da0b9f0c7889bcc148bbaefcd5b56bb42145fc640b2809d7c7e7ea9c402e853,2024-11-21T09:30:30.660000
CVE-2024-3840,0,1,1bb444ece2c50ee91be73b80e517896cecc7def61ec1acbc1eea08d4edd6fa92,2024-12-19T14:35:08.377000
CVE-2024-38401,0,0,cd97ad2c7f4dcb03b183613d9efc2870df2773a08c367b61acfd1151e2e370f7,2024-09-04T17:05:39.320000
CVE-2024-38402,0,0,70e57cc93873c9fbfbdbcce3867a4bb9f12c20a42736139133eef646aca70162,2024-09-05T21:43:22.677000
CVE-2024-38403,0,0,b3d8cc87a0ad7dfa5dc1c4ed4fda1feb176588131411bccf16dd62b32f859d77,2024-11-07T20:06:51.473000
@ -259607,7 +259613,7 @@ CVE-2024-38406,0,0,d9cf89755a65c41382de654fb761fce234cf800234cc2f02099c72606bf0d
CVE-2024-38407,0,0,ffbfacdb380f854d1d6d65293346a1b0b1f4ec5f88ea83b6b3157c8e85519bef,2024-11-07T19:39:59.737000
CVE-2024-38408,0,0,7e9fd5c12dce845f318d5db01306efd03eb1963e42b91f132e5d8a048e28afba,2024-11-08T15:07:00.903000
CVE-2024-38409,0,0,d9dae6735755d290c1f3629055136085b4a823e2c26bf536b6e849810bb311a5,2024-11-07T19:40:46.783000
CVE-2024-3841,0,0,4513bbea4978f31b4148aa5c1ac58bdbaac8e5dfeb1e1e829015d8edfe5f91b4,2024-11-21T09:30:30.860000
CVE-2024-3841,0,1,24e639dfce9b2af431c3db13578b276fa338de6f3834f0d0ae09338f50f6a596,2024-12-19T14:23:44.970000
CVE-2024-38410,0,0,28659510621383984cf9cc744098441c39f70944826bdc1d40947ec694e59f5a,2024-11-07T19:41:06.217000
CVE-2024-38415,0,0,4f38aed727a81688c3012b9ffab939beddc13d0fb1a6fe95697008d97c5227cc,2024-11-07T19:41:31.973000
CVE-2024-38419,0,0,afd3d247b1b3b9e5e15ea15c80f7e3e24bfc95ee5af17efd6288668038ddb6ab,2024-11-07T19:44:17.137000
@ -259619,7 +259625,7 @@ CVE-2024-38425,0,0,e32a925c31eb52f678b53ceda419af6344b1d99e71a719366ec4341ee3e4c
CVE-2024-38427,0,0,e03f18230b0965ff85c2447bdfa04160304b37189e7d46e85ccfd347184198b3,2024-11-21T09:25:48.097000
CVE-2024-38428,0,0,ca429ab8620e857c2740a8b8cc185755a533a3afb8ba56ac4468e697f6bb9392,2024-11-21T09:25:48.560000
CVE-2024-38429,0,0,b538fc48e96d9ea292e38fa094ab837d9c16ca39e46b7d2aa04f5879b36ef5a5,2024-11-21T09:25:48.997000
CVE-2024-3843,0,0,110d2ab3c990e356be1d2b3f3cc98f3dbb9de4caea5034acc8307ae2fe664185,2024-11-21T09:30:31.057000
CVE-2024-3843,0,1,24522d8c268e04ee96e1eb3267665f0aabade4b40e231c67983061452f1d7b9f,2024-12-19T14:12:42.743000
CVE-2024-38430,0,0,06391b888b37c32bd396e288f10969027f9a85afbcf753d929198b114655413e,2024-11-21T09:25:49.360000
CVE-2024-38431,0,0,e482828110fa6c946df61e8de1e5965c007c8990a0d8f5c2175c638dca01f855,2024-11-21T09:25:49.600000
CVE-2024-38432,0,0,c6aafd8c739bb86c08fa2751a78bb38982b3adfb7939b207f67b631da000fa5b,2024-11-21T09:25:49.853000
@ -259630,7 +259636,7 @@ CVE-2024-38436,0,0,0ac081ea028f81b0eec180140463dc18d318896b6ba50d5a0b85c6abcd962
CVE-2024-38437,0,0,ccb22b800ca035bcc67eb76a0923d5bf4359b548903b49f1ee2f17d34af38d6e,2024-11-21T09:25:51.270000
CVE-2024-38438,0,0,3dc83134267dd01a65062427d3ff01cdd33a7e0398dee4466f7b390caa0819dd,2024-11-21T09:25:51.540000
CVE-2024-38439,0,0,e91372788a8b82b01307a76f45b0dbec1cb7a19a170d78cf3c93a9739cd3acc9,2024-11-21T09:25:51.770000
CVE-2024-3844,0,0,143d9d6baf9464d1061a52ce5da7f8d3e1b26ca0c81e5645338983e20219a5fa,2024-11-21T09:30:31.250000
CVE-2024-3844,0,1,411f44c7beffac7e4b6326ab389a4f30c5e05a5d7bd2c96e81023cefe43a60a4,2024-12-19T13:59:12.247000
CVE-2024-38440,0,0,821d76770250f5bb74131e589677bd4a9512d8c9462d2d1db6397554f562cb8e,2024-11-21T09:25:52.217000
CVE-2024-38441,0,0,876fb4ecab58feb1e8d0c7c50879f79f8314f2367e45e3ab08137414142234bd,2024-11-21T09:25:52.753000
CVE-2024-38443,0,0,d7f45b6e4b42b6c6cc7b1e3ba8f6c3c008035f970b0fb09d2408d339165fa7ad,2024-11-21T09:25:53.177000
@ -261362,7 +261368,7 @@ CVE-2024-41020,0,0,388363ca783b8ff606e303aa949ebe0fe44c028a3ba3d2711ef057fb8b92f
CVE-2024-41021,0,0,66764aba5cc0a5c5056e989ff515d25782a6a55671c8611b91ac5c440b5402b4,2024-11-21T09:32:04.980000
CVE-2024-41022,0,0,e5388dd233dedf6e0ea6968f1647488dbffbbbcd9bb61c2feac751c6fbb5d937,2024-11-21T09:32:05.103000
CVE-2024-41023,0,0,61eb2391e2a00c097f085b8585ad4dbd2090f1ee8adf05e710b084a222a3f0f9,2024-11-21T09:32:05.223000
CVE-2024-41024,0,1,9faa43cc5c0f4a4049a5bf7f7c881facd92c066a96211564626b0d84283451bf,2024-12-19T12:15:06.900000
CVE-2024-41024,0,0,9faa43cc5c0f4a4049a5bf7f7c881facd92c066a96211564626b0d84283451bf,2024-12-19T12:15:06.900000
CVE-2024-41025,0,0,e56722e33cb25bbb9a6ffefecbaf2bbf5b88e6631d6de37e35107f8d79d1611b,2024-11-21T09:32:05.460000
CVE-2024-41026,0,0,8124be7ddcb0df6adead65670a9a1962058fdeb9eb9d2a9d4d19132c4a090025,2024-11-21T09:32:05.570000
CVE-2024-41027,0,0,eaa63e74c3ce16129be48c23bd10b961f700b28c359c1860f0f1e79e575ef9f2,2024-11-21T09:32:05.680000
@ -262121,7 +262127,7 @@ CVE-2024-42112,0,0,0fc1f9b654ad0839964ab7aafe2cc6752af40f1f0a816245e9804aef26def
CVE-2024-42113,0,0,d8ca6887d800bc826aacec457ce652c9d411bc388658a8817ecc096a31aed08b,2024-11-21T09:33:37.777000
CVE-2024-42114,0,0,102e562dccb449510b823260685c412c290eca225a4e0bf6b94e90e0aa21bba3,2024-11-21T09:33:37.897000
CVE-2024-42115,0,0,318d7b0cf58f65c51c0305413ed9423fe143dba22d255432803d2cec6754f102,2024-11-21T09:33:38.053000
CVE-2024-42116,0,1,c87ddeed9b58fce4f19771124b58a0205767a0ba132a7586c9453bcf4d38e4e6,2024-12-19T12:15:06.967000
CVE-2024-42116,0,0,c87ddeed9b58fce4f19771124b58a0205767a0ba132a7586c9453bcf4d38e4e6,2024-12-19T12:15:06.967000
CVE-2024-42117,0,0,806c7bbaa47a63c79c153148308d6c18cdc47e890955b3b9c1e9c60deecd59dd,2024-11-21T09:33:38.313000
CVE-2024-42118,0,0,bfa5d9240584a5e4f4f49f97b36f2463fb85b4110cf08dde6942a6188e7d2aa3,2024-11-21T09:33:38.430000
CVE-2024-42119,0,0,03ea2af429e4e38171757ef1550057411fe944ad3248dd0045fd7f062df6b832,2024-11-21T09:33:38.543000
@ -263532,7 +263538,7 @@ CVE-2024-4390,0,0,80f0e9de9c052f246f99c6b6e366bafaa9499ded0b8e23a6609090d508a2d1
CVE-2024-43900,0,0,d12cc6a11ab14fc66060cf2e99226d6025bc20d76aa42fa476ccfd8be8c9d873,2024-08-27T14:38:32.967000
CVE-2024-43901,0,0,aee6dc17a3fdd24ed6674e068e6f33d7e8100d447298c857789b5a70f69d1c03,2024-08-27T14:38:44.187000
CVE-2024-43902,0,0,20f91e552c9aac439c19be3c9593bcdff5ebe1714daeecf37d0afd0df952c1a9,2024-08-27T14:38:51.730000
CVE-2024-43903,0,1,cde00aa7c69ceb3f916a026e976c1d8bacae9d239ed4d529bcd65af1769d4699,2024-12-19T12:15:07.040000
CVE-2024-43903,0,0,cde00aa7c69ceb3f916a026e976c1d8bacae9d239ed4d529bcd65af1769d4699,2024-12-19T12:15:07.040000
CVE-2024-43904,0,0,2f6c12de0a10f9886d1c0c4b0362667f7bad08735804a0c6129a2fea0c1ab7c5,2024-11-08T16:15:22.367000
CVE-2024-43905,0,0,e64450fff6df28d2c512571396455eb44d63c126d4c72183fc5c9fe63608a623,2024-09-12T12:15:51.260000
CVE-2024-43906,0,0,a11c19379737ca1150a8615b78ff271062afaa51010d3036c3045576af10ebfb,2024-08-27T13:41:30.093000
@ -264781,8 +264787,8 @@ CVE-2024-45813,0,0,619ea264c0f4bf8105d5e60e8f340f4fd92c635a69072623ce613a02ad440
CVE-2024-45815,0,0,c90f4ea2d8d874b28d9c98b77b7f4224aef95bd910a7a8e17372f74226fe05c1,2024-09-23T18:31:37.277000
CVE-2024-45816,0,0,3b2db7eacb164fb9608249c78f97bf532fd821e2ac5209a34e58d8579d4ad3b1,2024-09-23T18:41:15.603000
CVE-2024-45817,0,0,04338584e0c7a05d71a1be8997c9492e340dee2b5e7a9715004e750a41578782,2024-11-21T09:38:08.627000
CVE-2024-45818,1,1,1a85d3e3faa9720321fd7c714703c69802c3fe81a15744846b7bf89d0d3decd7,2024-12-19T12:15:16.540000
CVE-2024-45819,1,1,27b1734726e2b2f3b169ca082b86e86a5f53c7fb64a371c982f10c297a22d989,2024-12-19T12:15:16.673000
CVE-2024-45818,0,0,1a85d3e3faa9720321fd7c714703c69802c3fe81a15744846b7bf89d0d3decd7,2024-12-19T12:15:16.540000
CVE-2024-45819,0,0,27b1734726e2b2f3b169ca082b86e86a5f53c7fb64a371c982f10c297a22d989,2024-12-19T12:15:16.673000
CVE-2024-4582,0,0,b605981ff01420a78a98fb5233b1dc8843a1625834328d15dc7b493f5dcff0b7,2024-11-21T09:43:09.183000
CVE-2024-45823,0,0,cab38241202cd1b5f39ccc999566a0902486b77430bd0addb42cdbbc8510fbe3,2024-10-02T14:49:59.157000
CVE-2024-45824,0,0,052af77f2938c71d885f8780c684340b3e8def2ae196f2e001be1da99675d7b0,2024-09-12T18:14:03.913000
@ -273650,6 +273656,8 @@ CVE-2024-9092,0,0,6379751e1087929fe578fcc016fd8228ef68f77aece65ece28437d6dced0f0
CVE-2024-9093,0,0,1493b614914735d95fbf32dde0a735a3d3c11c89a8289bb8180b4aae2b8e9b40,2024-09-27T16:26:27.163000
CVE-2024-9094,0,0,88d2e32f26a5490c0327569b4a1e535a8d101ca5046b7d11e41b4bf6ab481342,2024-09-27T15:54:09.463000
CVE-2024-9100,0,0,e58afa1cb97571d6bb26bb26cbb4a088cc8bda6f2bd9320274e7188c14487c93,2024-10-04T13:50:43.727000
CVE-2024-9101,1,1,25e24918ed1f87cc319006085c88152515cf58c5f4e80d431301154ff719faa9,2024-12-19T14:15:06.147000
CVE-2024-9102,1,1,4db262c2fbc093aaf43fe84a6b5c2165df97ab0250ceabe15c339ea5155f4be4,2024-12-19T14:15:06.327000
CVE-2024-9104,0,0,d05aac963e970d19d86f09737afdb0f530aa8ac604a9cdf74eaaa2ae5408c2c5,2024-10-16T16:38:14.557000
CVE-2024-9105,0,0,d08b07c8a29b964e96e936aa239ff144cd55c86ead27669c25ad1b91b570e809,2024-10-16T16:38:14.557000
CVE-2024-9106,0,0,f3b7116df22e800ea9a25d9487e69f38b7cb25b646719ab1ed2832bc8f2af2fd,2024-10-04T13:51:25.567000

Can't render this file because it is too large.