Auto-Update: 2024-11-15T19:00:20.352944+00:00

This commit is contained in:
cad-safe-bot 2024-11-15 19:03:21 +00:00
parent 27d154bb2b
commit 5136f40281
97 changed files with 5592 additions and 351 deletions

View File

@ -0,0 +1,88 @@
{
"id": "CVE-2021-1464",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-11-15T17:15:07.350",
"lastModified": "2024-11-15T17:15:07.350",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization checking and gain restricted access to the configuration information of an affected system.\r\nThis vulnerability exists because the affected software has insufficient input validation for certain commands. An attacker could exploit this vulnerability by sending crafted requests to the affected commands of an affected system. A successful exploit could allow the attacker to bypass authorization checking and gain restricted access to the configuration data of the affected system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-sqlinj-HDJUeEAX",
"source": "ykramarz@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vdaemon-bo-RuzzEA2",
"source": "ykramarz@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-auth-bypass-Z3Zze5XC",
"source": "ykramarz@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-authorization-b-GUEpSLK",
"source": "ykramarz@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-cmdinj-nRHKgfHX",
"source": "ykramarz@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-dir-trav-Bpwc5gtm",
"source": "ykramarz@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-xml-ext-entity-q6Z7uVUg",
"source": "ykramarz@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-c7z9QqyB",
"source": "ykramarz@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-info-disclos-gGvm9Mfu",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2021-1466",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-11-15T17:15:07.670",
"lastModified": "2024-11-15T17:15:07.670",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the vDaemon service of Cisco SD-WAN vManage Software could allow an authenticated, local attacker to cause a buffer overflow on an affected system, resulting in a denial of service (DoS) condition.\r\nThe vulnerability is due to incomplete bounds checks for data that is provided to the vDaemon service of an affected system. An attacker could exploit this vulnerability by sending malicious data to the vDaemon listening service on the affected system. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected system, which could allow the attacker to cause the vDaemon listening service to reload and result in a DoS condition.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-vdaemon-bo-RuzzEA2",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,74 @@
{
"id": "CVE-2021-1470",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-11-15T17:15:07.977",
"lastModified": "2024-11-15T17:35:11.340",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct SQL injection attacks on an affected system.\r\nThis vulnerability is due to improper input validation of SQL queries to an affected system. An attacker could exploit this vulnerability by authenticating to the application and sending malicious SQL queries to an affected system. A successful exploit could allow the attacker to modify values on or return values from the vManage database or the underlying operating system.Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdw-sqlinj-HDJUeEAX",
"source": "ykramarz@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-auth-bypass-Z3Zze5XC",
"source": "ykramarz@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-c7z9QqyB",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2021-1481",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-11-15T17:15:08.277",
"lastModified": "2024-11-15T17:15:08.277",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct Cypher query language injection attacks on an affected system.\r\nThis vulnerability is due to insufficient input validation by the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the interface of an affected system. A successful exploit could allow the attacker to obtain sensitive information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-943"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-auth-bypass-Z3Zze5XC",
"source": "ykramarz@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-cql-inject-c7z9QqyB",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2021-1482",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-11-15T17:15:08.530",
"lastModified": "2024-11-15T17:15:08.530",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to bypass authorization checking and gain access to sensitive information on an affected system.\r\nThis vulnerability is due to insufficient authorization checks. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to bypass authorization checking and gain access to sensitive information on the affected system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-auth-bypass-Z3Zze5XC",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2021-1483",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-11-15T17:15:08.760",
"lastModified": "2024-11-15T17:15:08.760",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to gain read and write access to information that is stored on an affected system.\r\nThis vulnerability is due to improper handling of XML External Entity (XXE) entries when the affected software parses certain XML files. An attacker could exploit this vulnerability by persuading a user to import a crafted XML file with malicious entries. A successful exploit could allow the attacker to read and write files within the affected application.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-cmdinj-nRHKgfHX",
"source": "ykramarz@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-xml-ext-entity-q6Z7uVUg",
"source": "ykramarz@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-info-disclos-gGvm9Mfu",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2021-1484",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-11-15T17:15:08.983",
"lastModified": "2024-11-15T17:15:08.983",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web UI of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to inject arbitrary commands on an affected system and cause a denial of service (DoS) condition.\r\nThis vulnerability is due to improper input validation of user-supplied input to the device template configuration. An attacker could exploit this vulnerability by submitting crafted input to the device template configuration. A successful exploit could allow the attacker to cause a DoS condition on the affected system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-88"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vman-cmdinj-nRHKgfHX",
"source": "ykramarz@cisco.com"
},
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-info-disclos-gGvm9Mfu",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2021-1491",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-11-15T17:15:09.220",
"lastModified": "2024-11-15T17:15:09.220",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to read arbitrary files on the underlying file system of the device.\r\nThis vulnerability is due to insufficient file scope limiting. An attacker could exploit this vulnerability by creating a specific file reference on the file system and then accessing it through the web-based management interface. A successful exploit could allow the attacker to read arbitrary files from the file system of the underlying operating system.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-info-disclos-gGvm9Mfu",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2021-1494",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-11-15T17:15:09.423",
"lastModified": "2024-11-15T17:15:09.423",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple Cisco products are affected by a vulnerability in the Snort detection engine that could allow an unauthenticated, remote attacker to bypass a configured file policy for HTTP.\r\n The vulnerability is due to incorrect handling of specific HTTP header parameters. An attacker could exploit this vulnerability by sending crafted HTTP packets through an affected device. A successful exploit could allow the attacker to bypass a configured file policy for HTTP packets and deliver a malicious payload."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-693"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-http-fp-bp-KfDdcQhc",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-29038",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-02-20T22:15:08.010",
"lastModified": "2024-02-22T19:07:37.840",
"lastModified": "2024-11-15T18:35:29.580",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Liferay Portal 7.2.0 a 7.3.5 y versiones anteriores no compatibles, y Liferay DXP 7.3 anterior al fix pack 1, 7.2 anterior al fix pack 17 y versiones anteriores no compatibles no ofuscan las respuestas de recordatorio de contrase\u00f1a en la p\u00e1gina, lo que permite a los atacantes utilizar ataques de man-in-the-middle para robar las respuestas de recordatorio de contrase\u00f1a del usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-640"
}
]
}
],
"references": [
{
"url": "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/cve-2021-29038",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2021-34750",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-11-15T17:15:09.657",
"lastModified": "2024-11-15T17:15:09.657",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the administrative web-based GUI configuration manager of Cisco Firepower Management Center Software could allow an authenticated, remote attacker to access sensitive configuration information. The attacker would require low privilege credentials on an affected device.\r\nThis vulnerability is due to lack of proper encryption of sensitive information stored within the GUI configuration manager. An attacker could exploit this vulnerability by logging into the FMC GUI and navigating to certain sensitive configurations. A successful exploit could allow the attacker to view sensitive configuration parameters in clear text.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.[[Publication_URL{Layout()}]]This advisory is part of the October 2021 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see ."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-317"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infodisc-Ft2WVmNU",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2021-34751",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-11-15T17:15:09.883",
"lastModified": "2024-11-15T17:15:09.883",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the administrative web-based GUI configuration manager of Cisco Firepower Management Center (FMC) Software could allow an authenticated, remote attacker to access sensitive configuration information. The attacker would require low privilege credentials on an affected device.\r\nThis vulnerability exists because of improper encryption of sensitive information stored within the GUI configuration manager. An attacker could exploit this vulnerability by logging into the GUI of Cisco FMC Software and navigating to certain sensitive configurations. A successful exploit could allow the attacker to view sensitive configuration parameters in clear text.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.[[Publication_URL{Layout()}]]This advisory is part of the October 2021 release of the Cisco ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see . "
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-317"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-infodisc-Ft2WVmNU",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2021-34752",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-11-15T17:15:10.097",
"lastModified": "2024-11-15T17:15:10.097",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the CLI of Cisco FTD Software could allow an authenticated, local attacker with administrative privileges to execute arbitrary commands with root privileges on the underlying operating system of an affected device. \r\n\r\nThis vulnerability is due to insufficient validation of user-supplied command arguments. An attacker could exploit this vulnerability by submitting crafted input to the affected commands. A successful exploit could allow the attacker to execute commands with root privileges on the underlying operating system.\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-cmdinject-FmzsLN8",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2021-34753",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-11-15T17:15:10.303",
"lastModified": "2024-11-15T17:15:10.303",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the payload inspection for Ethernet Industrial Protocol (ENIP) traffic for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured rules for ENIP traffic.\r\n\r\nThis vulnerability is due to incomplete processing during deep packet inspection for ENIP packets. An attacker could exploit this vulnerability by sending a crafted ENIP packet to the targeted interface. A successful exploit could allow the attacker to bypass configured access control and intrusion policies that should trigger and drop for the ENIP packet."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-enip-bypass-eFsxd8KP",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2022-20632",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-11-15T17:15:10.583",
"lastModified": "2024-11-15T17:15:10.583",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco ECE could allow an unauthenticated, remote attacker to conduct an XSS attack against a user of the interface of an affected device.\r\nThe vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2022-20633",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-11-15T17:15:10.820",
"lastModified": "2024-11-15T17:15:10.820",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the web-based management interface of Cisco ECE could allow an unauthenticated, remote attacker to perform a username enumeration attack against an affected device.\r\n\r\nThis vulnerability is due to differences in authentication responses that are sent back from the application as part of an authentication attempt. An attacker could exploit this vulnerability by sending authentication requests to an affected device. A successful exploit could allow the attacker to confirm existing user accounts, which could be used in further attacks.\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ykramarz@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-204"
}
]
}
],
"references": [
{
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-multivulns-kbK2yVhR",
"source": "ykramarz@cisco.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-20846",
"sourceIdentifier": "ykramarz@cisco.com",
"published": "2024-11-15T16:15:23.120",
"lastModified": "2024-11-15T16:15:23.120",
"lastModified": "2024-11-15T17:15:11.147",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-0407",
"sourceIdentifier": "hp-security-alert@hp.com",
"published": "2024-02-21T01:15:07.753",
"lastModified": "2024-02-22T19:07:37.840",
"lastModified": "2024-11-15T18:35:31.860",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Ciertas impresoras HP Enterprise LaserJet y HP LaserJet Managed son potencialmente vulnerables a la divulgaci\u00f3n de informaci\u00f3n, cuando las conexiones realizadas por el dispositivo a los servicios habilitados por algunas soluciones pueden haber sido confiables sin el certificado CA apropiado en el almac\u00e9n de certificados del dispositivo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_10174094-10174120-16",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11062",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-11-11T08:15:05.530",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T18:21:42.127",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "twcert@cert.org.tw",
@ -24,6 +24,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
@ -58,14 +78,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dsl6740c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "702B0914-7B3E-4797-9D28-C1C680EC6668"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dsl6740c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04466F44-FDB1-4ABF-84F1-C88CC175BCB9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-8228-1fbb0-2.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-8221-601c3-1.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11063",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-11-11T08:15:06.120",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T18:21:55.407",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "twcert@cert.org.tw",
@ -58,14 +58,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dsl6740c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "702B0914-7B3E-4797-9D28-C1C680EC6668"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dsl6740c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04466F44-FDB1-4ABF-84F1-C88CC175BCB9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-8229-3c2ab-2.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-8222-eb5bb-1.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11064",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-11-11T08:15:06.653",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T18:22:07.027",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "twcert@cert.org.tw",
@ -58,14 +58,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dsl6740c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "702B0914-7B3E-4797-9D28-C1C680EC6668"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dsl6740c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04466F44-FDB1-4ABF-84F1-C88CC175BCB9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-8230-11430-2.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-8223-f6da0-1.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11065",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-11-11T08:15:07.180",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T18:22:28.430",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "twcert@cert.org.tw",
@ -58,14 +58,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dsl6740c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "702B0914-7B3E-4797-9D28-C1C680EC6668"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dsl6740c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04466F44-FDB1-4ABF-84F1-C88CC175BCB9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-8231-2432e-2.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-8224-d939e-1.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11066",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-11-11T08:15:07.730",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T18:22:45.323",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "twcert@cert.org.tw",
@ -58,14 +58,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dsl6740c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "702B0914-7B3E-4797-9D28-C1C680EC6668"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dsl6740c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04466F44-FDB1-4ABF-84F1-C88CC175BCB9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-8232-5d94e-2.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-8225-3d882-1.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11067",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-11-11T08:15:08.263",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T18:23:32.557",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "twcert@cert.org.tw",
@ -58,14 +58,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dsl6740c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "702B0914-7B3E-4797-9D28-C1C680EC6668"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dsl6740c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04466F44-FDB1-4ABF-84F1-C88CC175BCB9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-8233-903d9-2.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-8226-0b07b-1.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-11068",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2024-11-11T08:15:08.850",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T18:24:25.127",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "twcert@cert.org.tw",
@ -58,14 +58,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dsl6740c_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "702B0914-7B3E-4797-9D28-C1C680EC6668"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dsl6740c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04466F44-FDB1-4ABF-84F1-C88CC175BCB9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-8234-0514c-2.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-8227-f3f3b-1.html",
"source": "twcert@cert.org.tw"
"source": "twcert@cert.org.tw",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11127",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-12T15:15:06.920",
"lastModified": "2024-11-12T15:48:59.103",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T17:29:43.450",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Job Recruitment up to 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file admin.php. The manipulation of the argument userid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en code-projects Job Recruitment hasta la versi\u00f3n 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo admin.php. La manipulaci\u00f3n del argumento userid conduce a una inyecci\u00f3n SQL. El ataque se puede lanzar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -106,8 +130,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -120,26 +154,62 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "56E6381D-BF5F-4DC1-A525-4DEDA44D5C56"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/ljllll123/cve/blob/main/sql-1.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.283975",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.283975",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.441841",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11130",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-12T15:15:07.243",
"lastModified": "2024-11-12T15:48:59.103",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T17:57:53.270",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in ZZCMS up to 2023. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/msg.php. The manipulation of the argument keyword leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad en ZZCMS hasta 2023. Se ha calificado como problem\u00e1tica. Este problema afecta a una funcionalidad desconocida del archivo /admin/msg.php. La manipulaci\u00f3n de la palabra clave del argumento provoca Cross Site Scripting. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -106,8 +130,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -120,22 +154,55 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zzcms:zzcms:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2023",
"matchCriteriaId": "8FD00C13-599B-4944-99F6-83C9F44DB42F"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/En0t5/vul/blob/main/zzcms-msg-xss.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.283976",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.283976",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.439699",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-11247",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-15T17:15:19.237",
"lastModified": "2024-11-15T17:15:19.237",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in SourceCodester Online Eyewear Shop 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /oews/classes/Master.php?f=save_product of the component Inventory Page. The manipulation of the argument brand leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/Fl4g-Pshacker/cve/blob/main/xss.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.284683",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.284683",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.443194",
"source": "cna@vuldb.com"
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-11248",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-15T17:15:19.580",
"lastModified": "2024-11-15T17:15:19.580",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Tenda AC10 16.03.10.13 and classified as critical. Affected by this issue is the function formSetRebootTimer of the file /goform/SetSysAutoRebbotCfg. The manipulation of the argument rebootTime leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://tasty-foxtrot-3a8.notion.site/Tenda-AC10v4-formSetRebootTimer-stack-overflow-13d0448e619580bf8ab1df7cfb6c018b",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.284684",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.284684",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.443204",
"source": "cna@vuldb.com"
},
{
"url": "https://www.tenda.com.cn/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-11250",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-15T18:15:26.280",
"lastModified": "2024-11-15T18:15:26.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Inventory Management up to 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /model/editProduct.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/sh3rl0ckpggp/0day/blob/main/inventory-management_authenticated_sqli.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.284686",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.284686",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.443272",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-11251",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-15T18:15:26.653",
"lastModified": "2024-11-15T18:15:26.653",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in erzhongxmu Jeewms up to 20241108. It has been rated as critical. This issue affects some unknown processing of the file cgReportController.do of the component AuthInterceptor. The manipulation of the argument begin_date leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. Other parameters might be affected as well."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"baseScore": 6.5
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://gitee.com/erzhongxmu/JEEWMS/issues/IB2XZG",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.284687",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.284687",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-24447",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-15T18:15:26.930",
"lastModified": "2024-11-15T18:15:26.930",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based memcpy buffer overflow in the ngap_handle_pdu_session_resource_setup_response routine in OpenAirInterface CN5G AMF <= 2.0.0 allows a remote attacker with access to the N2 interface to carry out denial of service against the AMF and potentially execute code by sending a PDU Session Resource Setup Response with a ResourceFailedToSetupList containing zero elements."
}
],
"metrics": {},
"references": [
{
"url": "https://cellularsecurity.org/ransacked",
"source": "cve@mitre.org"
},
{
"url": "https://openairinterface.org/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-24449",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-15T18:15:27.013",
"lastModified": "2024-11-15T18:15:27.013",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An uninitialized pointer dereference in the NasPdu::NasPdu component of OpenAirInterface CN5G AMF up to v2.0.0 allows attackers to cause a Denial of Service (DoS) via a crafted InitialUEMessage message sent to the AMF."
}
],
"metrics": {},
"references": [
{
"url": "https://cellularsecurity.org/ransacked",
"source": "cve@mitre.org"
},
{
"url": "https://openairinterface.org/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-24450",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-15T18:15:27.097",
"lastModified": "2024-11-15T18:15:27.097",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Stack-based memcpy buffer overflow in the ngap_handle_pdu_session_resource_setup_response routine in OpenAirInterface CN5G AMF <= 2.0.0 allows a remote attacker with access to the N2 interface to carry out denial of service against the AMF and potentially execute code by sending a PDU Session Resource Setup Response with a suffciently large FailedToSetupList IE."
}
],
"metrics": {},
"references": [
{
"url": "https://cellularsecurity.org/ransacked",
"source": "cve@mitre.org"
},
{
"url": "https://openairinterface.org/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-34397",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-07T18:15:08.350",
"lastModified": "2024-06-10T18:15:34.863",
"lastModified": "2024-11-15T18:35:32.760",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 un problema en GNOME GLib anterior a 2.78.5 y en 2.79.x y 2.80.x anterior a 2.80.1. Cuando un cliente basado en GDBus se suscribe a se\u00f1ales de un servicio de sistema confiable, como NetworkManager, en un ordenador compartido, otros usuarios del mismo ordenador pueden enviar se\u00f1ales D-Bus falsificadas que el cliente basado en GDBus interpretar\u00e1 err\u00f3neamente como enviadas por el mismo. servicio de sistema confiable. Esto podr\u00eda provocar que el cliente basado en GDBus se comporte incorrectamente, con un impacto que depende de la aplicaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 5.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"references": [
{
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3268",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-39726",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-11-15T17:15:19.983",
"lastModified": "2024-11-15T17:15:19.983",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Engineering Lifecycle Optimization - Engineering Insights 7.0.2 and 7.0.3 is vulnerable to an XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7176208",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-40638",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T18:15:27.457",
"lastModified": "2024-11-15T18:15:27.457",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GLPI is a free asset and IT management software package. An authenticated user can exploit multiple SQL injection vulnerabilities. One of them can be used to alter another user account data and take control of it. Upgrade to 10.0.17."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-8843-r3m7-gfqx",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-41678",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T18:15:27.720",
"lastModified": "2024-11-15T18:15:27.720",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GLPI is a free asset and IT management software package. An unauthenticated user can provide a malicious link to a GLPI technician in order to exploit a reflected XSS vulnerability. Upgrade to 10.0.17."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-xwmx-mmrf-hqf9",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-44625",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-15T17:15:20.260",
"lastModified": "2024-11-15T17:15:20.260",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Gogs <=0.13.0 is vulnerable to Directory Traversal via the editFilePost function of internal/route/repo/editor.go."
}
],
"metrics": {},
"references": [
{
"url": "https://fysac.github.io/posts/2024/11/unpatched-remote-code-execution-in-gogs/",
"source": "cve@mitre.org"
},
{
"url": "https://gogs.io/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-46383",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-15T18:15:27.960",
"lastModified": "2024-11-15T18:15:27.960",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hathway Skyworth Router CM5100-511 v4.1.1.24 was discovered to store sensitive information about USB and Wifi connected devices in plaintext."
}
],
"metrics": {},
"references": [
{
"url": "http://skyworth.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/nitinronge91/Sensitive-Information-disclosure-via-SPI-flash-firmware-for-Hathway-router-CVE-2024-46383",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-46462",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-15T18:15:28.053",
"lastModified": "2024-11-15T18:15:28.053",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "By default, dedicated folders of ZEDMAIL for Windows up to 2024.3 can be accessed by other users to misuse technical files and make them perform tasks with higher privileges. Configuration of ZEDMAIL has to be modified to prevent this vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "https://www.primx.eu/en/bulletins/security-bulletin-24931936/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-46463",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-15T18:15:28.140",
"lastModified": "2024-11-15T18:15:28.140",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "By default, dedicated folders of ORIZON for Windows up to 2024.3 can be accessed by other users to misuse technical files and make them perform tasks with higher privileges. Configuration of ORIZON has to be modified to prevent this vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "https://www.primx.eu/en/bulletins/security-bulletin-24932297/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-46465",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-15T18:15:28.220",
"lastModified": "2024-11-15T18:15:28.220",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "By default, dedicated folders of CRYHOD for Windows up to 2024.3 can be accessed by other users to misuse technical files and make them perform tasks with higher privileges. Configuration of CRYHOD has to be modified to prevent this vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "https://www.primx.eu/en/bulletins/security-bulletin-24932296/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-46466",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-15T18:15:28.297",
"lastModified": "2024-11-15T18:15:28.297",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "By default, dedicated folders of ZONECENTRAL for Windows up to 2024.3 or up to Q.2021.2 (ANSSI qualification submission) can be accessed by other users to misuse technical files and make them perform tasks with higher privileges. Configuration of ZONECENTRAL has to be modified to prevent this vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "https://www.primx.eu/en/bulletins/security-bulletin-24931934/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-46467",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-15T18:15:28.377",
"lastModified": "2024-11-15T18:15:28.377",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "By default, dedicated folders of ZONEPOINT for Windows up to 2024.1 can be accessed by other users to misuse technical files and make them perform tasks with higher privileges. Configuration of ZONEPOINT has to be modified to prevent this vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "https://www.primx.eu/en/bulletins/security-bulletin-24932299/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47178",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-30T16:15:09.410",
"lastModified": "2024-10-04T13:51:25.567",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T18:05:22.603",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,12 +59,44 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,14 +105,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:expressjs:basic-auth-connect:*:*:*:*:*:node.js:*:*",
"versionEndExcluding": "1.1.0",
"matchCriteriaId": "B3E20E89-0B8A-47DF-BEB6-F8C12B7EAD83"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/expressjs/basic-auth-connect/commit/bac1e6a8530e1efd0028800b9b588a37adb0d203",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/expressjs/basic-auth-connect/security/advisories/GHSA-7p89-p6hx-q4fw",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47530",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-30T16:15:09.540",
"lastModified": "2024-10-04T13:51:25.567",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T18:03:06.497",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,14 +71,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clinical-genomics:scout:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.89",
"matchCriteriaId": "44ADA126-F97E-4ADC-AE4C-7C54D3375D19"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Clinical-Genomics/scout/commit/50055edfca9a7183b248019af97e1fb0b0065a02",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/Clinical-Genomics/scout/security/advisories/GHSA-3x45-2m34-x95v",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47531",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-30T16:15:09.750",
"lastModified": "2024-10-04T13:51:25.567",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T18:02:14.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -51,14 +71,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:clinical-genomics:scout:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.89",
"matchCriteriaId": "44ADA126-F97E-4ADC-AE4C-7C54D3375D19"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Clinical-Genomics/scout/commit/f59e50f8ea596e641da8a0e9c7a33c0696bcbea5",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/Clinical-Genomics/scout/security/advisories/GHSA-24xv-q29v-3h6r",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47532",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-30T16:15:09.960",
"lastModified": "2024-10-04T13:51:25.567",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T17:59:51.307",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,12 +59,44 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,14 +105,40 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zope:restrictedpython:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.3",
"matchCriteriaId": "F6D940AC-E4E1-48EC-BD41-24754C974F29"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/zopefoundation/RestrictedPython/commit/d701cc36cccac36b21fa200f1f2d1945a9a215e6",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/zopefoundation/RestrictedPython/security/advisories/GHSA-5rfv-66g4-jr8h",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Mitigation",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-47759",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T18:15:28.463",
"lastModified": "2024-11-15T18:35:34.290",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GLPI is a free Asset and IT management software package. An technician can upload a SVG containing a malicious script. The script will then be executed when any user will try to see the document contents. Upgrade to 10.0.17."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.7,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"baseSeverity": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 0.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/glpi-project/glpi/security/advisories/GHSA-474f-9vpp-xxq5",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48838",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-11-12T04:15:05.833",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-15T17:36:43.520",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -51,10 +71,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.5.4.0",
"versionEndExcluding": "10.5.4.13",
"matchCriteriaId": "0938D211-024F-4794-90D1-A34F19ACD70F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.5.5.0",
"versionEndExcluding": "10.5.5.12",
"matchCriteriaId": "22D34ABF-8002-42DE-8E21-DC66AF548F29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.5.6.0",
"versionEndExcluding": "10.5.6.6",
"matchCriteriaId": "BB6E5BA8-71D2-4908-9B2B-CEDA754654B6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000247217/dsa-2024-425-security-update-for-dell-networking-os10-vulnerabilities",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49557",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-11-12T04:15:06.040",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-15T17:36:47.110",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -51,10 +71,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.5.4.0",
"versionEndExcluding": "10.5.4.13",
"matchCriteriaId": "0938D211-024F-4794-90D1-A34F19ACD70F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.5.5.0",
"versionEndExcluding": "10.5.5.12",
"matchCriteriaId": "22D34ABF-8002-42DE-8E21-DC66AF548F29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.5.6.0",
"versionEndExcluding": "10.5.6.6",
"matchCriteriaId": "BB6E5BA8-71D2-4908-9B2B-CEDA754654B6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000247217/dsa-2024-425-security-update-for-dell-networking-os10-vulnerabilities",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49558",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-11-12T04:15:06.243",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-15T17:35:54.480",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -41,8 +61,18 @@
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +81,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.5.4.0",
"versionEndExcluding": "10.5.4.13",
"matchCriteriaId": "0938D211-024F-4794-90D1-A34F19ACD70F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.5.5.0",
"versionEndExcluding": "10.5.5.12",
"matchCriteriaId": "22D34ABF-8002-42DE-8E21-DC66AF548F29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.5.6.0",
"versionEndExcluding": "10.5.6.6",
"matchCriteriaId": "BB6E5BA8-71D2-4908-9B2B-CEDA754654B6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000247217/dsa-2024-425-security-update-for-dell-networking-os10-vulnerabilities",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49560",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-11-12T04:15:06.443",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-15T17:35:25.407",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "security_alert@emc.com",
"type": "Secondary",
@ -51,10 +71,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.5.4.0",
"versionEndExcluding": "10.5.4.13",
"matchCriteriaId": "0938D211-024F-4794-90D1-A34F19ACD70F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.5.5.0",
"versionEndExcluding": "10.5.5.12",
"matchCriteriaId": "22D34ABF-8002-42DE-8E21-DC66AF548F29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dell:smartfabric_os10:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.5.6.0",
"versionEndExcluding": "10.5.6.6",
"matchCriteriaId": "BB6E5BA8-71D2-4908-9B2B-CEDA754654B6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000247217/dsa-2024-425-security-update-for-dell-networking-os10-vulnerabilities",
"source": "security_alert@emc.com"
"source": "security_alert@emc.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-49776",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-14T23:15:05.457",
"lastModified": "2024-11-15T13:58:08.913",
"lastModified": "2024-11-15T18:35:34.550",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un par\u00e1metro de tama\u00f1o negativo en la versi\u00f3n nightly-2024-04-05-01-53-02 de tsMuxer permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un archivo de video TS manipulado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-131"
}
]
}
],
"references": [
{
"url": "https://github.com/justdan96/tsMuxer/issues/862",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-49777",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-14T23:15:05.547",
"lastModified": "2024-11-15T13:58:08.913",
"lastModified": "2024-11-15T18:35:35.413",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un desbordamiento de b\u00fafer basado en mont\u00f3n en tsMuxer versi\u00f3n nightly-2024-03-14-01-51-12 permite a los atacantes provocar denegaci\u00f3n de servicio (DoS), divulgaci\u00f3n de informaci\u00f3n y ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de un archivo de video MKV manipulado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/justdan96/tsMuxer/issues/842",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-49778",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-14T23:15:05.643",
"lastModified": "2024-11-15T13:58:08.913",
"lastModified": "2024-11-15T18:35:36.260",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un desbordamiento de b\u00fafer basado en mont\u00f3n en tsMuxer versi\u00f3n nightly-2024-05-12-02-01-18 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) y ejecuci\u00f3n de c\u00f3digo a trav\u00e9s de un archivo de video MOV manipulado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/justdan96/tsMuxer/issues/879",

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-50313",
"sourceIdentifier": "productcert@siemens.com",
"published": "2024-11-12T13:15:11.910",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-15T17:12:44.410",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been identified in Mendix Runtime V10 (All versions < V10.16.0 only if the basic authentication mechanism is used by the application), Mendix Runtime V10.12 (All versions < V10.12.7 only if the basic authentication mechanism is used by the application), Mendix Runtime V10.6 (All versions < V10.6.15 only if the basic authentication mechanism is used by the application), Mendix Runtime V8 (All versions), Mendix Runtime V9 (All versions < V9.24.29 only if the basic authentication mechanism is used by the application). The basic authentication implementation of affected applications contains a race condition vulnerability which could allow unauthenticated remote attackers to circumvent default account lockout measures."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad en Mendix Runtime V10 (todas las versiones anteriores a la V10.16.0, solo si la aplicaci\u00f3n utiliza el mecanismo de autenticaci\u00f3n b\u00e1sica), Mendix Runtime V10.12 (todas las versiones anteriores a la V10.12.7, solo si la aplicaci\u00f3n utiliza el mecanismo de autenticaci\u00f3n b\u00e1sica), Mendix Runtime V10.6 (todas las versiones anteriores a la V10.6.15, solo si la aplicaci\u00f3n utiliza el mecanismo de autenticaci\u00f3n b\u00e1sica), Mendix Runtime V8 (todas las versiones), Mendix Runtime V9 (todas las versiones anteriores a la V9.24.29, solo si la aplicaci\u00f3n utiliza el mecanismo de autenticaci\u00f3n b\u00e1sica). La implementaci\u00f3n de autenticaci\u00f3n b\u00e1sica de las aplicaciones afectadas contiene una vulnerabilidad de condici\u00f3n de ejecuci\u00f3n que podr\u00eda permitir a atacantes remotos no autenticados eludir las medidas de bloqueo de cuentas predeterminadas."
}
],
"metrics": {
@ -58,8 +62,28 @@
],
"cvssMetricV31": [
{
"source": "productcert@siemens.com",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.2,
"impactScore": 2.5
},
{
"source": "productcert@siemens.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
@ -91,10 +115,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mendix:mendix:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.0.0",
"versionEndExcluding": "9.24.29",
"matchCriteriaId": "F6087752-F90F-4674-8C24-A4D1EB5CB7AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mendix:mendix:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "10.6.15",
"matchCriteriaId": "774E44F6-A7DA-4903-9AA5-B41D4AC39B5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mendix:mendix:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.7.0",
"versionEndExcluding": "10.12.7",
"matchCriteriaId": "4B78566A-6B9D-4C40-9834-D16410CEE04F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mendix:mendix:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.13.0",
"versionEndExcluding": "10.16.0",
"matchCriteriaId": "243DDDBE-BA70-44F9-B363-A0DC51595876"
}
]
}
]
}
],
"references": [
{
"url": "https://cert-portal.siemens.com/productcert/html/ssa-914892.html",
"source": "productcert@siemens.com"
"source": "productcert@siemens.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-50653",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-15T17:15:20.417",
"lastModified": "2024-11-15T17:15:20.417",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CRMEB <=5.4.0 is vulnerable to Incorrect Access Control. Users can bypass the front-end restriction of only being able to claim coupons once by capturing packets and sending a large number of data packets for coupon collection, achieving unlimited coupon collection."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Yllxx03/CVE/tree/main/CVE-2024-50653",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/crmeb",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-50654",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-15T17:15:20.507",
"lastModified": "2024-11-15T17:15:20.507",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "lilishop <=4.2.4 is vulnerable to Incorrect Access Control, which can allow attackers to obtain coupons beyond the quantity limit by capturing and sending the data packets for coupon collection in high concurrency."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Yllxx03/CVE/blob/main/lilishop/CouponLogicVulnerability.md",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Yllxx03/CVE/tree/main/CVE-2024-50654",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-50655",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-15T17:15:20.613",
"lastModified": "2024-11-15T17:15:20.613",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "emlog pro <=2.3.18 is vulnerable to Cross Site Scripting (XSS), which allows attackers to write malicious JavaScript code in published articles."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Yllxx03/CVE/blob/main/emlog/XSS.md",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Yllxx03/CVE/tree/main/CVE-2024-50655",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-50800",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-15T18:15:28.727",
"lastModified": "2024-11-15T18:15:28.727",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in M2000 Smart4Web before v.5.020241004 allows a remote attacker to execute arbitrary code via the error parameter in URL"
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Jellyfishxoxo/vulnerability-research/tree/main/CVE-2024-50800",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51585",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-09T15:15:04.480",
"lastModified": "2024-11-12T13:56:24.513",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T17:17:47.730",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:nicheaddons:sales_page_addon:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.4.2",
"matchCriteriaId": "2E45C329-EBE4-4CBC-BEF5-329F2E7F71C8"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/sales-page-addon/wordpress-sales-page-addon-plugin-1-4-2-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51592",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-09T15:15:05.983",
"lastModified": "2024-11-12T13:56:24.513",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T17:04:52.197",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mysticalthemes:meta_store_elements:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.9",
"matchCriteriaId": "B709C841-2545-488B-89B2-FE917C3E845D"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/meta-store-elements/wordpress-meta-store-elements-plugin-1-0-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51594",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-09T15:15:06.403",
"lastModified": "2024-11-12T13:56:24.513",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T17:15:21.580",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rafelsanso:gmap_point_list:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.1.2",
"matchCriteriaId": "5F1A02B1-5CC3-4FBB-AD2B-E7F67DFAD9AF"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/gmap-point-list/wordpress-gmap-point-list-plugin-1-1-2-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51595",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-09T15:15:06.613",
"lastModified": "2024-11-12T13:56:24.513",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T17:03:07.770",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sksdev:sksdev_toolkit:1.0.0:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "BFF19CC2-6812-4059-840B-C5B3C48D37F1"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/sksdev-toolkit/wordpress-sksdev-toolkit-plugin-1-0-0-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51596",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-09T15:15:06.827",
"lastModified": "2024-11-12T13:56:24.513",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T17:01:15.687",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:snilesh:business:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.3",
"matchCriteriaId": "81371556-078D-44AC-943E-D7FBECD9479F"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/business/wordpress-business-plugin-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51662",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-09T14:15:17.617",
"lastModified": "2024-11-12T13:56:24.513",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T17:16:49.063",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:modernaweb:black_widgets_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.3.6",
"matchCriteriaId": "CBC9D329-B73C-4EAD-A5D3-2D9428EFC45E"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/black-widgets/wordpress-black-widgets-for-elementor-plugin-1-3-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52352",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-11T07:15:06.907",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T17:46:27.217",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:miloco:postcasa_shortcode:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0",
"matchCriteriaId": "6BE02E15-2D9D-4188-86CB-0A7144D3B435"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/postcasa/wordpress-postcasa-shortcode-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52353",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-11T07:15:07.223",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T17:49:31.553",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sharethepractice:christian_science_bible_lesson_subjects:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.1",
"matchCriteriaId": "2DCEFEA8-6059-4407-B81A-FBD3208967F8"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/christian-science-bible-lesson-subjects/wordpress-christian-science-bible-lesson-subjects-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52354",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-11T07:15:07.500",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T17:50:59.703",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:coolplugins:web_stories_widgets_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.1",
"matchCriteriaId": "47DD1AF9-B3A3-4EAE-B5FA-FDC68C7F50FB"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/shortcodes-for-amp-web-stories-and-elementor-widget/wordpress-web-stories-widgets-for-elementor-plugin-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52355",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-11T07:15:07.790",
"lastModified": "2024-11-12T13:55:21.227",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T17:51:44.273",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hyumika:openstreetmap:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "6.1.3",
"matchCriteriaId": "837BBC04-A553-4F08-A8DC-2313D0AD7455"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/osm/wordpress-osm-openstreetmap-plugin-6-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-52507",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T18:15:28.847",
"lastModified": "2024-11-15T18:15:28.847",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nextcloud Tables allows users to to create tables with individual columns. The information which Table (numeric ID) is shared with which groups and users and the respective permissions was not limited to affected users. It is recommended that the Nextcloud Tables app is upgraded to 0.8.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rgvc-xr2w-qq45",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/tables/commit/13ca45f1b9f70f694aea81b78bc7416ec840c332",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/tables/pull/1406",
"source": "security-advisories@github.com"
},
{
"url": "https://hackerone.com/reports/2705507",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-52508",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T18:15:29.060",
"lastModified": "2024-11-15T18:15:29.060",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nextcloud Mail is the mail app for Nextcloud, a self-hosted productivity platform. When a user is trying to set up a mail account with an email address like user@example.tld that does not support auto configuration, and an attacker managed to register autoconfig.tld, the used email details would be send to the server of the attacker. It is recommended that the Nextcloud Mail app is upgraded to 1.14.6, 1.15.4, 2.2.11, 3.6.3, 3.7.7 or 4.0.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW",
"baseScore": 8.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/mail/commit/a84c70e15d814dab6f0e8eda71bbaaf48152079b",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/mail/pull/9964",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vmhx-hwph-q6mc",
"source": "security-advisories@github.com"
},
{
"url": "https://hackerone.com/reports/2508422",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-52509",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T18:15:29.280",
"lastModified": "2024-11-15T18:15:29.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nextcloud Mail is the mail app for Nextcloud, a self-hosted productivity platform. The Nextcloud mail app incorrectly allowed attaching shared files without download permissions as attachments. This allowed users to send them the files to themselves and then downloading it from their mail clients. It is recommended that the Nextcloud Mail is upgraded to 2.2.10, 3.6.2 or 3.7.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/mail/commit/8d44f1ce44684022aa4e62a3e0462fdadcde6c8b",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/mail/pull/9592",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pwpp-fvcr-w862",
"source": "security-advisories@github.com"
},
{
"url": "https://hackerone.com/reports/1878255",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-52510",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T18:15:29.497",
"lastModified": "2024-11-15T18:15:29.497",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Nextcloud Desktop Client is a tool to synchronize files from Nextcloud Server with your computer. The Desktop client did not stop with an error but allowed by-passing the signature validation, if a manipulated server sends an empty initial signature. It is recommended that the Nextcloud Desktop client is upgraded to 3.14.2 or later."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/desktop/commit/97539218e6f63c3a3fd1694cb7d8aef27c5910d7",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/desktop/pull/7333",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-r4qc-m9mj-452v",
"source": "security-advisories@github.com"
},
{
"url": "https://hackerone.com/reports/2597504",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-52511",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T18:15:29.717",
"lastModified": "2024-11-15T18:15:29.717",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nextcloud Tables allows users to to create tables with individual columns. By directly specifying the ID of a table or view, a malicious user could blindly insert new rows into tables they have no access to. It is recommended that the Nextcloud Tables is upgraded to 0.8.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-4qqp-9h2g-7qg7",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/tables/commit/52846ad81fe192ee977f14c82a229b0d9cdc406c",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/tables/pull/1351",
"source": "security-advisories@github.com"
},
{
"url": "https://hackerone.com/reports/2671404",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-52512",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T18:15:29.933",
"lastModified": "2024-11-15T18:15:29.933",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "user_oidc app is an OpenID Connect user backend for Nextcloud. A malicious user could send a malformed login link that would redirect the user to a provided URL after successfully authenticating. It is recommended that the Nextcloud User OIDC app is upgraded to 6.1.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-784j-x2g5-4g7q",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/user_oidc/commit/c923428d51972f6d04636c6accbecdec0c1b88e9",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/user_oidc/pull/961",
"source": "security-advisories@github.com"
},
{
"url": "https://hackerone.com/reports/2720030",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-52513",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T18:15:30.157",
"lastModified": "2024-11-15T18:15:30.157",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nextcloud Server is a self hosted personal cloud system. After receiving a \"Files drop\" or \"Password protected\" share link a malicious user was able to download attachments that are referenced in Text files without providing the password. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gxph-5m4j-pfmj",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/text/commit/ca24b25c93b81626b4e457c260243edeab5f1548",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/text/pull/6485",
"source": "security-advisories@github.com"
},
{
"url": "https://hackerone.com/reports/2376900",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-52514",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T18:15:30.370",
"lastModified": "2024-11-15T18:15:30.370",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nextcloud Server is a self hosted personal cloud system. After a user received a share with some files inside being blocked by the files access control, the user would still be able to copy the intermediate folder inside Nextcloud allowing them to afterwards potentially access the blocked files depending on the user access control rules. It is recommended that the Nextcloud Server is upgraded to 27.1.9, 28.0.5 or 29.0.0 and Nextcloud Enterprise Server is upgraded to 21.0.9.18, 22.2.10.23, 23.0.12.18, 24.0.12.14, 25.0.13.9, 26.0.13.3, 27.1.9, 28.0.5 or 29.0.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g8pr-g25r-58xj",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/server/commit/5fffbcfe8650eab75b00e8d188fbc95b0e43f3a8",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/server/pull/44889",
"source": "security-advisories@github.com"
},
{
"url": "https://hackerone.com/reports/2447316",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-52515",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T17:15:20.837",
"lastModified": "2024-11-15T17:15:20.837",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nextcloud Server is a self hosted personal cloud system. After an admin enables the default-disabled SVG preview provider, a malicious user could upload a manipulated SVG file referencing paths. If the file would exist the preview of the SVG would preview the other file instead. It is recommended that the Nextcloud Server is upgraded to 27.1.10, 28.0.6 or 29.0.1 and Nextcloud Enterprise Server is upgraded to 24.0.12.15, 25.0.13.10, 26.0.13.4, 27.1.10, 28.0.6 or 29.0.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-706"
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5m5g-hw8c-2236",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/server/commit/7e1c30f82a63fbea8c269e0eec38291377f32604",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/server/pull/45340",
"source": "security-advisories@github.com"
},
{
"url": "https://hackerone.com/reports/2484499",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-52516",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T17:15:21.070",
"lastModified": "2024-11-15T17:15:21.070",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nextcloud Server is a self hosted personal cloud system. When a server is configured to only allow sharing with users that are in ones own groups, after a user was removed from a group, previously shared items were not unshared. It is recommended that the Nextcloud Server is upgraded to 22.2.11 or 23.0.11 or 24.0.6 and Nextcloud Enterprise Server is upgraded to 22.2.11 or 23.0.11 or 24.0.6."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.0,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.3,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-35gc-jc6x-29cm",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/server/commit/142b6e313ffa9d3b950bcd23cb58850d3ae7cf34",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/server/pull/47180",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-52517",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T17:15:21.297",
"lastModified": "2024-11-15T17:15:21.297",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nextcloud Server is a self hosted personal cloud system. After storing \"Global credentials\" on the server, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.11, 29.0.8 or 30.0.1 and Nextcloud Enterprise Server is upgraded to 25.0.13.13, 26.0.13.9, 27.1.11.9, 28.0.11, 29.0.8 or 30.0.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.2,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x9q3-c7f8-3rcg",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/server/commit/c45ed55f959ff54f3ea23dd2ae1a5868a075c9fe",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/server/pull/48359",
"source": "security-advisories@github.com"
},
{
"url": "https://hackerone.com/reports/2554079",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2024-52518",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T17:15:21.543",
"lastModified": "2024-11-15T17:15:21.543",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nextcloud Server is a self hosted personal cloud system. After an attacker got access to the session of a user or administrator, the attacker would be able to create, change or delete external storages without having to confirm the password. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.7,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vrhf-532w-99rg",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/server/pull/48373",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/server/pull/48788",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/server/pull/48992",
"source": "security-advisories@github.com"
},
{
"url": "https://hackerone.com/reports/2602973",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-52519",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T17:15:21.843",
"lastModified": "2024-11-15T17:15:21.843",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nextcloud Server is a self hosted personal cloud system. The OAuth2 client secrets were stored in a recoverable way, so that an attacker that got access to a backup of the database and the Nextcloud config file, would be able to decrypt them. It is recommended that the Nextcloud Server is upgraded to 28.0.10 or 29.0.7 and Nextcloud Enterprise Server is upgraded to 27.1.11.8, 28.0.10 or 29.0.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.1,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fvpc-8hq6-jgq2",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/server/commit/09b8aea8f6783514bffe00df6abbf9fa542faac5",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/server/pull/47635",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,74 @@
{
"id": "CVE-2024-52520",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T17:15:22.200",
"lastModified": "2024-11-15T17:35:16.007",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nextcloud Server is a self hosted personal cloud system. Due to a pre-flighted HEAD request, the link reference provider could be tricked into downloading bigger websites than intended, to find open-graph data. It is recommended that the Nextcloud Server is upgraded to 28.0.10 or 29.0.7 and Nextcloud Enterprise Server is upgraded to 27.1.11.8, 28.0.10 or 29.0.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pxqf-cfxw-mqmj",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/server/commit/873c42b0f1383d5b6f2b7a481e1d9620ed30f44a",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/server/pull/47627",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-52521",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T17:15:22.580",
"lastModified": "2024-11-15T17:15:22.580",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nextcloud Server is a self hosted personal cloud system. MD5 hashes were used to check background jobs for their uniqueness. This increased the chances of a background job with arguments falsely being identified as already existing and not be queued for execution. By changing the Hash to SHA256 the probability was heavily decreased. It is recommended that the Nextcloud Server is upgraded to 28.0.10, 29.0.7 or 30.0.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-328"
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2q6f-gjgj-7hp4",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/server/commit/a933ba1fdba77e7d8c6b8ff400e082cf853ea46d",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/server/pull/47769",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2024-52522",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T18:15:30.643",
"lastModified": "2024-11-15T18:15:30.643",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rclone is a command-line program to sync files and directories to and from different cloud storage providers. Insecure handling of symlinks with --links and --metadata in rclone while copying to local disk allows unprivileged users to indirectly modify ownership and permissions on symlink target files when a superuser or privileged process performs a copy. This vulnerability could enable privilege escalation and unauthorized access to critical system files, compromising system integrity, confidentiality, and availability. This vulnerability is fixed in 1.68.2."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "LOW",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-281"
},
{
"lang": "en",
"value": "CWE-59"
},
{
"lang": "en",
"value": "CWE-61"
}
]
}
],
"references": [
{
"url": "https://github.com/rclone/rclone/commit/01ccf204f42b4f68541b16843292439090a2dcf0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/rclone/rclone/security/advisories/GHSA-hrxh-9w67-g4cv",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,74 @@
{
"id": "CVE-2024-52523",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T17:15:22.870",
"lastModified": "2024-11-15T17:35:16.820",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nextcloud Server is a self hosted personal cloud system. After setting up a user or administrator defined external storage with fixed credentials, the API returns them and adds them into the frontend again, allowing to read them in plain text when an attacker already has access to an active session of a user. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2 and Nextcloud Enterprise Server is upgraded to 25.0.13.14, 26.0.13.10, 27.1.11.10, 28.0.12, 29.0.9 or 30.0.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.2,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-42w6-r45m-9w9j",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/server/commit/8a13f284765bd4606984e7d925c32ae6e82b8a27",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/server/pull/49009",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-52525",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T17:15:23.150",
"lastModified": "2024-11-15T17:15:23.150",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nextcloud Server is a self hosted personal cloud system. Under certain conditions the password of a user was stored unencrypted in the session data. The session data is encrypted before being saved in the session storage (Redis or disk), but it would allow a malicious process that gains access to the memory of the PHP process, to get access to the cleartext password of the user. It is recommended that the Nextcloud Server is upgraded to 28.0.12, 29.0.9 or 30.0.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 1.8,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
}
],
"references": [
{
"url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-w7v5-mgxm-v6gm",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/server/commit/d25a0a2896a2a981939cacb8ee0d555feef22b3b",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/nextcloud/server/pull/48915",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-52528",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-15T17:15:23.400",
"lastModified": "2024-11-15T17:15:23.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Budget Control Gateway acts as an entry point for incoming requests and routes them to the appropriate microservices for Budget Control. Budget Control Gateway does not properly validate auth tokens, which allows attackers to bypass intended restrictions. This vulnerability is fixed in 1.5.2."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://github.com/BudgetControl/Gateway/security/advisories/GHSA-jqx6-gm7f-vp7m",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-5474",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2024-10-11T16:15:14.440",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T17:00:35.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "psirt@lenovo.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
},
{
"source": "psirt@lenovo.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lenovo:dolby_vision_provisioning:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0.0.2",
"matchCriteriaId": "0A189EC9-ED49-4291-95E9-2F5BE2CB6595"
}
]
}
]
}
],
"references": [
{
"url": "https://support.lenovo.com/us/en/product_security/LEN-158394",
"source": "psirt@lenovo.com"
"source": "psirt@lenovo.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6985",
"sourceIdentifier": "security@huntr.dev",
"published": "2024-10-11T16:15:14.657",
"lastModified": "2024-10-15T12:58:51.050",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T17:10:59.157",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -16,6 +16,28 @@
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "security@huntr.dev",
@ -51,14 +73,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:lollms:lollms:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.9.0",
"matchCriteriaId": "A801CCA9-B08E-469F-B38C-21474B050AC4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/parisneo/lollms/commit/28ee567a9a120967215ff19b96ab7515ce469620",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Patch"
]
},
{
"url": "https://huntr.com/bounties/79c11579-47d8-4e68-8466-b47c3bf5ef6a",
"source": "security@huntr.dev"
"source": "security@huntr.dev",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8376",
"sourceIdentifier": "emo@eclipse.org",
"published": "2024-10-11T16:15:14.860",
"lastModified": "2024-10-31T10:15:05.930",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T17:21:02.327",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,49 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
},
{
"lang": "en",
"value": "CWE-416"
},
{
"lang": "en",
"value": "CWE-755"
}
]
},
{
"source": "emo@eclipse.org",
"type": "Secondary",
@ -81,38 +121,81 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:eclipse:mosquitto:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.0.19",
"matchCriteriaId": "427A4001-C682-433E-A653-B13B770BF193"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/eclipse-mosquitto/mosquitto/commit/1914b3ee2a18102d0a94cbdbbfeae1afa03edd17",
"source": "emo@eclipse.org"
"source": "emo@eclipse.org",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/eclipse/mosquitto/releases/tag/v2.0.19",
"source": "emo@eclipse.org"
"source": "emo@eclipse.org",
"tags": [
"Patch",
"Product"
]
},
{
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/26",
"source": "emo@eclipse.org"
"source": "emo@eclipse.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/216",
"source": "emo@eclipse.org"
"source": "emo@eclipse.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/217",
"source": "emo@eclipse.org"
"source": "emo@eclipse.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/218",
"source": "emo@eclipse.org"
"source": "emo@eclipse.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/227",
"source": "emo@eclipse.org"
"source": "emo@eclipse.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://mosquitto.org/",
"source": "emo@eclipse.org"
"source": "emo@eclipse.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9539",
"sourceIdentifier": "product-cna@github.com",
"published": "2024-10-11T18:15:08.887",
"lastModified": "2024-10-15T12:57:46.880",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-15T17:15:06.600",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,9 +59,41 @@
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "product-cna@github.com",
"type": "Secondary",
@ -73,22 +105,73 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.11.16",
"matchCriteriaId": "E624875C-FCF2-4538-8F3E-D64183154275"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.12.0",
"versionEndExcluding": "3.12.10",
"matchCriteriaId": "F70645DE-4DC2-40CB-B425-4E002B302FDB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.13.0",
"versionEndExcluding": "3.13.5",
"matchCriteriaId": "B08CBD2C-6DA7-4C0F-9812-42933F51C003"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:github:enterprise_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.14.0",
"versionEndExcluding": "3.14.2",
"matchCriteriaId": "59E74193-93FE-45FE-8C74-34EC30EEB03C"
}
]
}
]
}
],
"references": [
{
"url": "https://docs.github.com/en/enterprise-server@3.11/admin/release-notes#3.11.16",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.12/admin/release-notes#3.12.10",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.13/admin/release-notes#3.13.5",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.2",
"source": "product-cna@github.com"
"source": "product-cna@github.com",
"tags": [
"Release Notes"
]
}
]
}

110
README.md
View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-15T17:00:20.137202+00:00
2024-11-15T19:00:20.352944+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-15T16:57:10.080000+00:00
2024-11-15T18:35:36.260000+00:00
```
### Last Data Feed Release
@ -33,69 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
269906
269962
```
### CVEs added in the last Commit
Recently added CVEs: `71`
Recently added CVEs: `56`
- [CVE-2024-49754](CVE-2024/CVE-2024-497xx/CVE-2024-49754.json) (`2024-11-15T16:15:34.510`)
- [CVE-2024-49758](CVE-2024/CVE-2024-497xx/CVE-2024-49758.json) (`2024-11-15T16:15:34.880`)
- [CVE-2024-49759](CVE-2024/CVE-2024-497xx/CVE-2024-49759.json) (`2024-11-15T16:15:35.100`)
- [CVE-2024-49764](CVE-2024/CVE-2024-497xx/CVE-2024-49764.json) (`2024-11-15T16:15:35.323`)
- [CVE-2024-50350](CVE-2024/CVE-2024-503xx/CVE-2024-50350.json) (`2024-11-15T16:15:35.537`)
- [CVE-2024-50351](CVE-2024/CVE-2024-503xx/CVE-2024-50351.json) (`2024-11-15T16:15:35.750`)
- [CVE-2024-50352](CVE-2024/CVE-2024-503xx/CVE-2024-50352.json) (`2024-11-15T16:15:35.960`)
- [CVE-2024-50355](CVE-2024/CVE-2024-503xx/CVE-2024-50355.json) (`2024-11-15T16:15:36.160`)
- [CVE-2024-50647](CVE-2024/CVE-2024-506xx/CVE-2024-50647.json) (`2024-11-15T16:15:36.467`)
- [CVE-2024-50648](CVE-2024/CVE-2024-506xx/CVE-2024-50648.json) (`2024-11-15T16:15:36.547`)
- [CVE-2024-50649](CVE-2024/CVE-2024-506xx/CVE-2024-50649.json) (`2024-11-15T16:15:36.637`)
- [CVE-2024-50650](CVE-2024/CVE-2024-506xx/CVE-2024-50650.json) (`2024-11-15T16:15:36.710`)
- [CVE-2024-50651](CVE-2024/CVE-2024-506xx/CVE-2024-50651.json) (`2024-11-15T16:15:36.783`)
- [CVE-2024-50652](CVE-2024/CVE-2024-506xx/CVE-2024-50652.json) (`2024-11-15T16:15:36.863`)
- [CVE-2024-50724](CVE-2024/CVE-2024-507xx/CVE-2024-50724.json) (`2024-11-15T16:15:36.943`)
- [CVE-2024-50986](CVE-2024/CVE-2024-509xx/CVE-2024-50986.json) (`2024-11-15T15:15:07.773`)
- [CVE-2024-51164](CVE-2024/CVE-2024-511xx/CVE-2024-51164.json) (`2024-11-15T16:15:37.057`)
- [CVE-2024-51494](CVE-2024/CVE-2024-514xx/CVE-2024-51494.json) (`2024-11-15T16:15:37.140`)
- [CVE-2024-51495](CVE-2024/CVE-2024-514xx/CVE-2024-51495.json) (`2024-11-15T16:15:37.343`)
- [CVE-2024-51496](CVE-2024/CVE-2024-514xx/CVE-2024-51496.json) (`2024-11-15T16:15:37.553`)
- [CVE-2024-51497](CVE-2024/CVE-2024-514xx/CVE-2024-51497.json) (`2024-11-15T16:15:37.770`)
- [CVE-2024-52526](CVE-2024/CVE-2024-525xx/CVE-2024-52526.json) (`2024-11-15T16:15:38.107`)
- [CVE-2024-52555](CVE-2024/CVE-2024-525xx/CVE-2024-52555.json) (`2024-11-15T16:15:38.340`)
- [CVE-2024-6413](CVE-2024/CVE-2024-64xx/CVE-2024-6413.json) (`2024-11-15T16:15:38.573`)
- [CVE-2024-7865](CVE-2024/CVE-2024-78xx/CVE-2024-7865.json) (`2024-11-15T16:15:38.630`)
- [CVE-2024-46467](CVE-2024/CVE-2024-464xx/CVE-2024-46467.json) (`2024-11-15T18:15:28.377`)
- [CVE-2024-47759](CVE-2024/CVE-2024-477xx/CVE-2024-47759.json) (`2024-11-15T18:15:28.463`)
- [CVE-2024-50653](CVE-2024/CVE-2024-506xx/CVE-2024-50653.json) (`2024-11-15T17:15:20.417`)
- [CVE-2024-50654](CVE-2024/CVE-2024-506xx/CVE-2024-50654.json) (`2024-11-15T17:15:20.507`)
- [CVE-2024-50655](CVE-2024/CVE-2024-506xx/CVE-2024-50655.json) (`2024-11-15T17:15:20.613`)
- [CVE-2024-50800](CVE-2024/CVE-2024-508xx/CVE-2024-50800.json) (`2024-11-15T18:15:28.727`)
- [CVE-2024-52507](CVE-2024/CVE-2024-525xx/CVE-2024-52507.json) (`2024-11-15T18:15:28.847`)
- [CVE-2024-52508](CVE-2024/CVE-2024-525xx/CVE-2024-52508.json) (`2024-11-15T18:15:29.060`)
- [CVE-2024-52509](CVE-2024/CVE-2024-525xx/CVE-2024-52509.json) (`2024-11-15T18:15:29.280`)
- [CVE-2024-52510](CVE-2024/CVE-2024-525xx/CVE-2024-52510.json) (`2024-11-15T18:15:29.497`)
- [CVE-2024-52511](CVE-2024/CVE-2024-525xx/CVE-2024-52511.json) (`2024-11-15T18:15:29.717`)
- [CVE-2024-52512](CVE-2024/CVE-2024-525xx/CVE-2024-52512.json) (`2024-11-15T18:15:29.933`)
- [CVE-2024-52513](CVE-2024/CVE-2024-525xx/CVE-2024-52513.json) (`2024-11-15T18:15:30.157`)
- [CVE-2024-52514](CVE-2024/CVE-2024-525xx/CVE-2024-52514.json) (`2024-11-15T18:15:30.370`)
- [CVE-2024-52515](CVE-2024/CVE-2024-525xx/CVE-2024-52515.json) (`2024-11-15T17:15:20.837`)
- [CVE-2024-52516](CVE-2024/CVE-2024-525xx/CVE-2024-52516.json) (`2024-11-15T17:15:21.070`)
- [CVE-2024-52517](CVE-2024/CVE-2024-525xx/CVE-2024-52517.json) (`2024-11-15T17:15:21.297`)
- [CVE-2024-52518](CVE-2024/CVE-2024-525xx/CVE-2024-52518.json) (`2024-11-15T17:15:21.543`)
- [CVE-2024-52519](CVE-2024/CVE-2024-525xx/CVE-2024-52519.json) (`2024-11-15T17:15:21.843`)
- [CVE-2024-52520](CVE-2024/CVE-2024-525xx/CVE-2024-52520.json) (`2024-11-15T17:15:22.200`)
- [CVE-2024-52521](CVE-2024/CVE-2024-525xx/CVE-2024-52521.json) (`2024-11-15T17:15:22.580`)
- [CVE-2024-52522](CVE-2024/CVE-2024-525xx/CVE-2024-52522.json) (`2024-11-15T18:15:30.643`)
- [CVE-2024-52523](CVE-2024/CVE-2024-525xx/CVE-2024-52523.json) (`2024-11-15T17:15:22.870`)
- [CVE-2024-52525](CVE-2024/CVE-2024-525xx/CVE-2024-52525.json) (`2024-11-15T17:15:23.150`)
- [CVE-2024-52528](CVE-2024/CVE-2024-525xx/CVE-2024-52528.json) (`2024-11-15T17:15:23.400`)
### CVEs modified in the last Commit
Recently modified CVEs: `43`
Recently modified CVEs: `39`
- [CVE-2024-49009](CVE-2024/CVE-2024-490xx/CVE-2024-49009.json) (`2024-11-15T16:02:11.097`)
- [CVE-2024-49010](CVE-2024/CVE-2024-490xx/CVE-2024-49010.json) (`2024-11-15T15:59:36.937`)
- [CVE-2024-49011](CVE-2024/CVE-2024-490xx/CVE-2024-49011.json) (`2024-11-15T16:16:21.817`)
- [CVE-2024-49012](CVE-2024/CVE-2024-490xx/CVE-2024-49012.json) (`2024-11-15T16:16:05.507`)
- [CVE-2024-49013](CVE-2024/CVE-2024-490xx/CVE-2024-49013.json) (`2024-11-15T16:14:55.170`)
- [CVE-2024-49014](CVE-2024/CVE-2024-490xx/CVE-2024-49014.json) (`2024-11-15T15:55:46.947`)
- [CVE-2024-49015](CVE-2024/CVE-2024-490xx/CVE-2024-49015.json) (`2024-11-15T16:07:40.680`)
- [CVE-2024-49016](CVE-2024/CVE-2024-490xx/CVE-2024-49016.json) (`2024-11-15T16:07:22.397`)
- [CVE-2024-49017](CVE-2024/CVE-2024-490xx/CVE-2024-49017.json) (`2024-11-15T16:07:03.200`)
- [CVE-2024-49018](CVE-2024/CVE-2024-490xx/CVE-2024-49018.json) (`2024-11-15T16:06:29.407`)
- [CVE-2024-49021](CVE-2024/CVE-2024-490xx/CVE-2024-49021.json) (`2024-11-15T16:04:55.487`)
- [CVE-2024-49043](CVE-2024/CVE-2024-490xx/CVE-2024-49043.json) (`2024-11-15T16:05:30.773`)
- [CVE-2024-50623](CVE-2024/CVE-2024-506xx/CVE-2024-50623.json) (`2024-11-15T16:15:36.367`)
- [CVE-2024-5125](CVE-2024/CVE-2024-51xx/CVE-2024-5125.json) (`2024-11-15T16:35:09.290`)
- [CVE-2024-51599](CVE-2024/CVE-2024-515xx/CVE-2024-51599.json) (`2024-11-15T16:55:34.480`)
- [CVE-2024-51603](CVE-2024/CVE-2024-516xx/CVE-2024-51603.json) (`2024-11-15T16:24:18.843`)
- [CVE-2024-51604](CVE-2024/CVE-2024-516xx/CVE-2024-51604.json) (`2024-11-15T16:19:11.063`)
- [CVE-2024-51605](CVE-2024/CVE-2024-516xx/CVE-2024-51605.json) (`2024-11-15T16:31:12.773`)
- [CVE-2024-51610](CVE-2024/CVE-2024-516xx/CVE-2024-51610.json) (`2024-11-15T16:32:46.277`)
- [CVE-2024-51882](CVE-2024/CVE-2024-518xx/CVE-2024-51882.json) (`2024-11-15T16:08:40.333`)
- [CVE-2024-52356](CVE-2024/CVE-2024-523xx/CVE-2024-52356.json) (`2024-11-15T16:05:12.367`)
- [CVE-2024-52357](CVE-2024/CVE-2024-523xx/CVE-2024-52357.json) (`2024-11-15T16:04:45.767`)
- [CVE-2024-52358](CVE-2024/CVE-2024-523xx/CVE-2024-52358.json) (`2024-11-15T16:17:40.127`)
- [CVE-2024-9487](CVE-2024/CVE-2024-94xx/CVE-2024-9487.json) (`2024-11-15T16:57:10.080`)
- [CVE-2024-9822](CVE-2024/CVE-2024-98xx/CVE-2024-9822.json) (`2024-11-15T16:41:41.507`)
- [CVE-2024-47530](CVE-2024/CVE-2024-475xx/CVE-2024-47530.json) (`2024-11-15T18:03:06.497`)
- [CVE-2024-47531](CVE-2024/CVE-2024-475xx/CVE-2024-47531.json) (`2024-11-15T18:02:14.250`)
- [CVE-2024-47532](CVE-2024/CVE-2024-475xx/CVE-2024-47532.json) (`2024-11-15T17:59:51.307`)
- [CVE-2024-48838](CVE-2024/CVE-2024-488xx/CVE-2024-48838.json) (`2024-11-15T17:36:43.520`)
- [CVE-2024-49557](CVE-2024/CVE-2024-495xx/CVE-2024-49557.json) (`2024-11-15T17:36:47.110`)
- [CVE-2024-49558](CVE-2024/CVE-2024-495xx/CVE-2024-49558.json) (`2024-11-15T17:35:54.480`)
- [CVE-2024-49560](CVE-2024/CVE-2024-495xx/CVE-2024-49560.json) (`2024-11-15T17:35:25.407`)
- [CVE-2024-49776](CVE-2024/CVE-2024-497xx/CVE-2024-49776.json) (`2024-11-15T18:35:34.550`)
- [CVE-2024-49777](CVE-2024/CVE-2024-497xx/CVE-2024-49777.json) (`2024-11-15T18:35:35.413`)
- [CVE-2024-49778](CVE-2024/CVE-2024-497xx/CVE-2024-49778.json) (`2024-11-15T18:35:36.260`)
- [CVE-2024-50313](CVE-2024/CVE-2024-503xx/CVE-2024-50313.json) (`2024-11-15T17:12:44.410`)
- [CVE-2024-51585](CVE-2024/CVE-2024-515xx/CVE-2024-51585.json) (`2024-11-15T17:17:47.730`)
- [CVE-2024-51592](CVE-2024/CVE-2024-515xx/CVE-2024-51592.json) (`2024-11-15T17:04:52.197`)
- [CVE-2024-51594](CVE-2024/CVE-2024-515xx/CVE-2024-51594.json) (`2024-11-15T17:15:21.580`)
- [CVE-2024-51595](CVE-2024/CVE-2024-515xx/CVE-2024-51595.json) (`2024-11-15T17:03:07.770`)
- [CVE-2024-51596](CVE-2024/CVE-2024-515xx/CVE-2024-51596.json) (`2024-11-15T17:01:15.687`)
- [CVE-2024-51662](CVE-2024/CVE-2024-516xx/CVE-2024-51662.json) (`2024-11-15T17:16:49.063`)
- [CVE-2024-52352](CVE-2024/CVE-2024-523xx/CVE-2024-52352.json) (`2024-11-15T17:46:27.217`)
- [CVE-2024-52353](CVE-2024/CVE-2024-523xx/CVE-2024-52353.json) (`2024-11-15T17:49:31.553`)
- [CVE-2024-52354](CVE-2024/CVE-2024-523xx/CVE-2024-52354.json) (`2024-11-15T17:50:59.703`)
- [CVE-2024-52355](CVE-2024/CVE-2024-523xx/CVE-2024-52355.json) (`2024-11-15T17:51:44.273`)
- [CVE-2024-5474](CVE-2024/CVE-2024-54xx/CVE-2024-5474.json) (`2024-11-15T17:00:35.697`)
- [CVE-2024-6985](CVE-2024/CVE-2024-69xx/CVE-2024-6985.json) (`2024-11-15T17:10:59.157`)
- [CVE-2024-8376](CVE-2024/CVE-2024-83xx/CVE-2024-8376.json) (`2024-11-15T17:21:02.327`)
- [CVE-2024-9539](CVE-2024/CVE-2024-95xx/CVE-2024-9539.json) (`2024-11-15T17:15:06.600`)
## Download and Usage

View File

@ -165897,9 +165897,12 @@ CVE-2021-1458,0,0,263d7494ed4bb1b0a3432ebf81af384e2ec6ecfdaed8077bd168e517083deb
CVE-2021-1459,0,0,56b2fc01d86da20d71515cb6213cc91e2ec296f51bc138bcb5820738f8e3248e,2023-11-07T03:28:21.880000
CVE-2021-1460,0,0,47be0f201f45cd0b8ceb48b3499e1efa0d43c1877b8142245b65f7263a024596,2023-11-07T03:28:22.057000
CVE-2021-1463,0,0,ffc195d1166bc0d6787fdfc0cec2580a3b2a53f31d28fce59ec0c8b46d296b2b,2023-11-07T03:28:22.227000
CVE-2021-1464,1,1,69edcf99fca42452877c7d99e0481d6c6243b3bf0d342c9185950d620f44722b,2024-11-15T17:15:07.350000
CVE-2021-1466,1,1,144b47122f71eb87a6dfc75681d4034620a616551c642a5d0941c7094143eeb3,2024-11-15T17:15:07.670000
CVE-2021-1467,0,0,16d0ae18a4d2970e8bc1800d9eb7f8e62737768f457e02f2477f0502b07369d4,2023-11-07T03:28:22.400000
CVE-2021-1468,0,0,b25464624e6ccf5128973d4bf048ad5c527411837ef5d1b126d3a376b7afb008,2023-11-07T03:28:22.600000
CVE-2021-1469,0,0,bd141bfbb413c72f4175f3d230bbd06d7b95d511ced58c2fb5e5d84b94e51c9c,2023-11-07T03:28:22.787000
CVE-2021-1470,1,1,2e6e28520ccceb170365b941f3bfbe4d6f793cf1fa9fc71d2f2fe07f0ee4a45c,2024-11-15T17:35:11.340000
CVE-2021-1471,0,0,2ed8200049e51b6d7c3a7000c469f7d473f831b4dc4eb802e8c6662692462f3a,2023-11-07T03:28:22.960000
CVE-2021-1472,0,0,741c86b32193afd497d137042e32b87a97a950d8b7a1bbce814fd37a18694853,2023-11-07T03:28:23.127000
CVE-2021-1473,0,0,06e55996caf568e77ab9f88592bfa7a6c84580fd7dd89d962ac6095e3bd0c8fb,2023-11-07T03:28:23.327000
@ -165910,14 +165913,20 @@ CVE-2021-1477,0,0,ce4b0e06660cc36e91f4b739c1de03794220cace0d4f46d2d7ab91a8a91d7b
CVE-2021-1478,0,0,0a73c19d88561a03362db2711e06d63404108331636a97fd3769648c3609667c,2023-11-07T03:28:24.250000
CVE-2021-1479,0,0,03206262a2ad10b36e2bd9a6c464f6ff92d82ba06c821de662f3258be81971ca,2023-11-07T03:28:24.437000
CVE-2021-1480,0,0,fa4d61c697b5eb46a2c0e7b6a4f78ef1ae9eca007d7b580c9d9d852aeb21a0f6,2023-11-07T03:28:24.607000
CVE-2021-1481,1,1,b21a88f00dea192a0875ee705b85d0561e70266c1ccfc14aa3a403328a05a470,2024-11-15T17:15:08.277000
CVE-2021-1482,1,1,0476c0df73ef662b2b6f0f2840b91c04fbe05790f1471aeeffc90edfd16d31fe,2024-11-15T17:15:08.530000
CVE-2021-1483,1,1,cc1f0eab0f727d87a84bffa706316af41e2f9ebaadc9122759ef823e64b19443,2024-11-15T17:15:08.760000
CVE-2021-1484,1,1,ed06f966ff1a17a8d14eed009e5c0700b7e04a831af0ed038d2e9250c28441df,2024-11-15T17:15:08.983000
CVE-2021-1485,0,0,e4890f167b9430fa6559ddd87381a3e2cd7e165f9f9f713ee68aac837d657b8b,2023-11-07T03:28:24.777000
CVE-2021-1486,0,0,51c76d642672f3d43e8e0ec81b52ff874d878e9e6c2d81aa10deb18a80a13b94,2023-11-07T03:28:24.957000
CVE-2021-1487,0,0,88a69f88b70ea4d8163acbb4d132f134525cadf0fc0263d65a3fa79cb9c41927,2023-11-07T03:28:25.120000
CVE-2021-1488,0,0,8d507186241cf4ca8f136368d17565793565f1cbc266a9c9ada2ff6df3e9f97f,2023-11-07T03:28:25.300000
CVE-2021-1489,0,0,1df7ed8ed63ef77a936f8562cbeb8c0b409103fa24faf53519ceab2c50fddc15,2021-05-09T02:41:29.470000
CVE-2021-1490,0,0,d83f13a770baa445700cb222e2ffaf188dbb98ae0e300164d2ae22136186da73,2023-11-07T03:28:25.480000
CVE-2021-1491,1,1,1702cfcf21275fe33c8397437163bb99c396169ee42615c32ad7c8c80c1d42f8,2024-11-15T17:15:09.220000
CVE-2021-1492,0,0,a69047622f80854df4ebb0282bbd625633a27bc29349c6dd23618cf9df0f72be,2021-03-27T03:29:38.427000
CVE-2021-1493,0,0,1972fe993c347c9cea2e8eb1cb5110425f1d779b9b88aa05049e99c9a0ad82af,2023-11-07T03:28:25.657000
CVE-2021-1494,1,1,1f7b59aff15d7824f0ab33957eaca5131f497f08823befcd6c909de7471bd189,2024-11-15T17:15:09.423000
CVE-2021-1495,0,0,dc2985faadbc016aaf69732c00934b0bfe0e76ad4afb876f2b4d3c9fce405acd,2023-11-07T03:28:25.833000
CVE-2021-1496,0,0,8500d9350f301c5993471cace6bdea0ff38e1db7d30046ec6244f4d3b6c4fbb0,2023-11-07T03:28:26.017000
CVE-2021-1497,0,0,7aff829bd7102e7218ed7977e28442b8bd5c83b225095b13fe23f759d2a734f0,2024-07-25T17:32:35.267000
@ -173603,7 +173612,7 @@ CVE-2021-29030,0,0,668b234f031a9afddc3313c3706c3aabd60d8b142a10483bf025fb74d7980
CVE-2021-29031,0,0,75e7ebf82318e6e9f048bc211d75ab98a4eabb993013fc6de9161a17a4071c2c,2021-03-24T15:11:15.467000
CVE-2021-29032,0,0,76d754de11bd965f6651616a6d7b98c4e5dce137557c8bebf0bb2ab2db0e462e,2021-03-24T15:11:33.467000
CVE-2021-29033,0,0,60d767518da428a2005fca7ce27e0ca3a754e2b2837a161d9b6ff4ec9ed86b1d,2021-03-24T15:11:47.137000
CVE-2021-29038,0,0,5c2058106212a3134ab3f1e0eb26280032ab4a722985fd68a3b546b21dd2e2a8,2024-02-22T19:07:37.840000
CVE-2021-29038,0,1,372b679d0df0950850c0fee22b0e5db5e0afb4e9914d7ca6b773089e93b45b18,2024-11-15T18:35:29.580000
CVE-2021-29039,0,0,6aa5914f8ab5325d882a0d83275fe034bbcf3abf5b9a7bb89b18a9f0029ff38d,2021-05-24T19:26:32.200000
CVE-2021-29040,0,0,54ec79200ea8a2572e64518b3fadba87f883efa852528386d386a9aab10c4e70,2021-05-24T19:17:41.780000
CVE-2021-29041,0,0,aa55497562c8a420125fd12f4ba2303ac441fc5b7bf916164939105ac453158a,2021-05-24T19:00:08.610000
@ -178000,6 +178009,10 @@ CVE-2021-34746,0,0,5f1c9f950c5a7bdfb338a415b4f605c55da56a39232c402eddadf135d38b2
CVE-2021-34748,0,0,827d9e9dc0a23e7dfa19a7e36199b1eb91cf2be59987763b3d8d77aa72a9c62c,2023-11-07T03:36:18.053000
CVE-2021-34749,0,0,ac11e1c4f7cbb25a3e55c8936c31bd39a324d277bdb8c816e5f8460000095de2,2023-11-07T03:36:18.510000
CVE-2021-3475,0,0,11f13dc2193da9f811eb73ebe62f9b8e02d1bb42f041a704fb956e47200bb4d0,2023-02-03T23:53:29.553000
CVE-2021-34750,1,1,5be5097f0b46c08acb3b10bf1e03ca6590d854c0a993075c16cc5a3f97e40534,2024-11-15T17:15:09.657000
CVE-2021-34751,1,1,0d4ba3c4b24daac7b0de0220a70f9e2e04faa7cdd39553de5621a704a2e7abfa,2024-11-15T17:15:09.883000
CVE-2021-34752,1,1,73e1ee213770bf47ac96b0028a6af3d273ec66f6096cba730774d655805a4fb8,2024-11-15T17:15:10.097000
CVE-2021-34753,1,1,c9a6e295f9b82d0d7806f07a38b273f27c21d7a1b084d96ad869445d730dbee9,2024-11-15T17:15:10.303000
CVE-2021-34754,0,0,78316189d4816d16fbe2300d25329a00a2aa7a4fe282f57f3ba65151b9a8f75c,2023-11-07T03:36:18.717000
CVE-2021-34755,0,0,d847d28e5b0f9b3ea8e438a851e6118ab2f5fcc6b5efe4d3db27453d24cda1a0,2023-11-07T03:36:18.923000
CVE-2021-34756,0,0,a8bb35a7b253afd1195ba525bf5832d6023c4c71dfbcc9876714da89cd83c081,2023-11-07T03:36:19.103000
@ -190125,14 +190138,16 @@ CVE-2022-20622,0,0,21f8864443a2ef64c107280614b898e9b5d4c9e8c77661acad69cff2f1a46
CVE-2022-20623,0,0,7c797f2b6141740b167d12f60757b1cdad545053d3150326da5778540cb57a02,2023-11-07T03:42:28.110000
CVE-2022-20624,0,0,3c70791dc122586abc481fbd7bb7216723c3e6d202f07e63cbb1e6162b35f5fa,2023-11-07T03:42:28.307000
CVE-2022-20625,0,0,b2289228f7d56d599a0cac3cd2984eb7943c96e01df0e18df0052f01f8d4a9e0,2023-11-07T03:42:28.523000
CVE-2022-20626,1,1,71d7034560b3981ea3bd3ba6ca05c8a821b253c0fd58e019fbe642ed9e598ccb,2024-11-15T16:15:19.287000
CVE-2022-20626,0,0,71d7034560b3981ea3bd3ba6ca05c8a821b253c0fd58e019fbe642ed9e598ccb,2024-11-15T16:15:19.287000
CVE-2022-20627,0,0,61e6aaadc7256ae597e1358157a3f8a7ca5c65ceb03de865f99c00b8cc067e76,2023-11-07T03:42:28.730000
CVE-2022-20628,0,0,2d913383575108b406c6fd7f6d7b27f7042313f3ec94ec4b865b29c23ff51516,2023-11-07T03:42:28.940000
CVE-2022-20629,0,0,349b8459f865e323293bf05068ff9de40ca8c8ffdf8aa26427123369090292d1,2023-11-07T03:42:29.150000
CVE-2022-2063,0,0,d062d780a00017fb43c5ea9093ff0ade157df72419b34c1782bda4532983613e,2022-06-22T15:15:56.310000
CVE-2022-20630,0,0,13b8dfdcba520d48f3edc38534d08ff817268f168eafce0c2fa806a535bf598b,2023-11-07T03:42:29.340000
CVE-2022-20631,1,1,e7f1fe229b50433969790eff74efa4aae4b10defefdad753b836d39da4042706,2024-11-15T16:15:19.527000
CVE-2022-20634,1,1,48c40b6618c9373d684cf71f1c386b2094b7fd260584dffa83cb52e6f13c9c85,2024-11-15T16:15:19.747000
CVE-2022-20631,0,0,e7f1fe229b50433969790eff74efa4aae4b10defefdad753b836d39da4042706,2024-11-15T16:15:19.527000
CVE-2022-20632,1,1,092f04c16c87003ff0331633a2abc962051fbc319803b3a3b3ed638c10f500c7,2024-11-15T17:15:10.583000
CVE-2022-20633,1,1,84a931f94c69649be41e63c6c98a1073baebf4e9533cbc9297879cf6cb491e23,2024-11-15T17:15:10.820000
CVE-2022-20634,0,0,48c40b6618c9373d684cf71f1c386b2094b7fd260584dffa83cb52e6f13c9c85,2024-11-15T16:15:19.747000
CVE-2022-20635,0,0,312537bfc7fadc3f4a5ae453076f673da67ee7fd6d6c549bd850db6bbd3634f5,2023-11-07T03:42:29.527000
CVE-2022-20636,0,0,cb1e137161d1f8bb5eb5658fe185dcf66aa86cbb228fbedff5a38969384418c1,2023-11-07T03:42:29.713000
CVE-2022-20637,0,0,6c706a8e39f723ce20951f46cff7c8db43813cd9854833ae35aa389e314d6648,2023-11-07T03:42:29.910000
@ -190147,24 +190162,24 @@ CVE-2022-20644,0,0,0b78bd45d6c626c7de60e88864441db476f08a5174dd41f6637b7edccc7f2
CVE-2022-20645,0,0,160c71f81c35d36d8616f55bb4461f93f9d6e0502c187926122b382be552fc94,2023-11-07T03:42:31.427000
CVE-2022-20646,0,0,ef0f3bd90058a0fbc8ce4e9e70856731466565eb44005ab60f710d7413f85873,2023-11-07T03:42:31.623000
CVE-2022-20647,0,0,d692c23c3d73e41484cc8829c6fef8bb7f01eaadabaa22a077af57a682a118b8,2023-11-07T03:42:31.810000
CVE-2022-20648,1,1,562f23b1937d127df3ea41a2276f5e7197ae5ed5a0fa8cb86fcea1b92269b63d,2024-11-15T16:15:19.983000
CVE-2022-20649,1,1,8155ccf997bad476539f5908278a9fb6af22a844515ebeff02b78573f25b19cc,2024-11-15T16:15:20.247000
CVE-2022-20648,0,0,562f23b1937d127df3ea41a2276f5e7197ae5ed5a0fa8cb86fcea1b92269b63d,2024-11-15T16:15:19.983000
CVE-2022-20649,0,0,8155ccf997bad476539f5908278a9fb6af22a844515ebeff02b78573f25b19cc,2024-11-15T16:15:20.247000
CVE-2022-2065,0,0,571960ee80a382ed580e7d50315d006024f880324c003ffed0bd463503bb2a8a,2022-06-22T16:20:27.387000
CVE-2022-20650,0,0,390d5d5a31497df0829ae3a8fc18eb7f62e12fd0be6f7fb4d5181ea2eae9bff8,2023-11-07T03:42:31.993000
CVE-2022-20651,0,0,d94f842526344890878ca96e31695d88f10dc06979f9c817f5f2aba7d6da3f9d,2023-11-07T03:42:32.200000
CVE-2022-20652,1,1,f09523846e227026ee68c0eb35b1818ad786a9eddbdedfddee4965b8ae83736d,2024-11-15T16:15:20.520000
CVE-2022-20652,0,0,f09523846e227026ee68c0eb35b1818ad786a9eddbdedfddee4965b8ae83736d,2024-11-15T16:15:20.520000
CVE-2022-20653,0,0,970fcc0d6442596100c16b68df05f9dad01eb21b28dfd29c61acafe7da6b8ed4,2023-11-07T03:42:32.423000
CVE-2022-20654,1,1,6d5ad5888c06146b87ff8b655e3550807cdbee3f61d9fe4b625555b16f4a4d67,2024-11-15T16:15:20.767000
CVE-2022-20655,1,1,8f64410d345cab96b82fbe57818b3d1e3d9a6ea1a40fe710503a24b34cd3534c,2024-11-15T16:15:20.987000
CVE-2022-20656,1,1,94d0d175330b07bdd1dd64cfefab5a80bd81f2f0a1fbb504960830adc92aaeeb,2024-11-15T16:15:21.237000
CVE-2022-20657,1,1,7baaace96e123a6345b4bb4abaa834dde9cfba9ca99b0ed993ff6964c5a74a33,2024-11-15T16:15:21.473000
CVE-2022-20654,0,0,6d5ad5888c06146b87ff8b655e3550807cdbee3f61d9fe4b625555b16f4a4d67,2024-11-15T16:15:20.767000
CVE-2022-20655,0,0,8f64410d345cab96b82fbe57818b3d1e3d9a6ea1a40fe710503a24b34cd3534c,2024-11-15T16:15:20.987000
CVE-2022-20656,0,0,94d0d175330b07bdd1dd64cfefab5a80bd81f2f0a1fbb504960830adc92aaeeb,2024-11-15T16:15:21.237000
CVE-2022-20657,0,0,7baaace96e123a6345b4bb4abaa834dde9cfba9ca99b0ed993ff6964c5a74a33,2024-11-15T16:15:21.473000
CVE-2022-20658,0,0,774a5dde9c2ecf972fc765622b6d0329acd4851f27b3d1ab2d6b2cbfc1ac03cd,2023-11-07T03:42:32.603000
CVE-2022-20659,0,0,3fd61ea02c1112c94dc17c417ca780e8ee231b8cf54650606f53f7fde39a0294,2023-11-07T03:42:32.800000
CVE-2022-2066,0,0,568eafb08191ec2a4e1a7f2d0ecaf78921ed93b231ddacd6663ad37debc4f4d6,2022-06-22T16:21:24.417000
CVE-2022-20660,0,0,25e35575d22740895f29ecfa5b6f10e97e537332cd507b8a5a02cfdb0a151c82,2023-11-07T03:42:33
CVE-2022-20661,0,0,ebbc5bdda270769928f447c068a18170348fd8ac2a4054e266807c3234e50017,2023-11-07T03:42:33.230000
CVE-2022-20662,0,0,fb11ce878bd9e5767617bbb14056b29a23c7fb6e26be8d2cdbb2091ddaa1a1bf,2023-11-07T03:42:33.423000
CVE-2022-20663,1,1,36394921b0dcdb60ecef258e3301f4f1586711911ece1d2d90660247854d0552,2024-11-15T16:15:21.693000
CVE-2022-20663,0,0,36394921b0dcdb60ecef258e3301f4f1586711911ece1d2d90660247854d0552,2024-11-15T16:15:21.693000
CVE-2022-20664,0,0,be14e0a88f9bd5873e4e7d83da3f9a1ae1ddad4b757d0073bdb5b8e0e8b0b849,2023-11-07T03:42:33.617000
CVE-2022-20665,0,0,65ea883e8571a97a65aa5035f73402c0028f57d383f6bc792038f719cc5b4623,2023-11-07T03:42:33.803000
CVE-2022-20666,0,0,554438e89eef0f5407fb469b9bc4b48cb7fd326de5225a6475b70540a51c7fc5,2023-11-07T03:42:33.990000
@ -190188,7 +190203,7 @@ CVE-2022-20681,0,0,8ce88ca30f33ba86a2d4adc3dd9bbad9d36c51fccd8d2b3acc49b78d941ac
CVE-2022-20682,0,0,25a7eb9330f70ef9976d6c55d4569af37b05abd1af56d00ee24736136c649e0c,2023-11-07T03:42:37.030000
CVE-2022-20683,0,0,a354d3c0e5b0f24befc71439adf6bbcbde0e7e37e1c93f2b570b32d1492672af,2023-11-07T03:42:37.410000
CVE-2022-20684,0,0,ace0be60e7c6730ba3570013e8fe871c4b55baaaeff74811edd07de64469e799,2023-11-07T03:42:37.597000
CVE-2022-20685,1,1,bd96f0d54eae7ff5d0ea140707a16b5191f28fb92f723d510b739e1db809af63,2024-11-15T16:15:21.910000
CVE-2022-20685,0,0,bd96f0d54eae7ff5d0ea140707a16b5191f28fb92f723d510b739e1db809af63,2024-11-15T16:15:21.910000
CVE-2022-20686,0,0,63471bf91a63f74f5bc4dc22960373a5446fe8fcf9d0734fbd1b5b92fd83f77b,2024-01-25T17:15:14.263000
CVE-2022-20687,0,0,c86852782558780f02ecbadae1910d7d3d8aa5808e760b8d6bee105b7473f89d,2024-01-25T17:15:14.410000
CVE-2022-20688,0,0,349b788ecdc733c67c5b8c538600b2022545072f056bfdf0f4685151c41347d6,2024-01-25T17:15:14.540000
@ -190277,7 +190292,7 @@ CVE-2022-20762,0,0,288f61e6fd65ba791a1a7db2c5f51d79a13328f1955ce01c53ef82ffdb7b8
CVE-2022-20763,0,0,e6700aed27706764408fa6238a5bbf832a8e2d16b381788d9bafcb2d443e7342,2023-11-07T03:42:52.870000
CVE-2022-20764,0,0,9d232eabbd0c2be2319c5539459914b198378ecb409a966ef5a73adbeb491896,2023-11-07T03:42:53.053000
CVE-2022-20765,0,0,61b2c3dbcaea45db7f3243431662ba7c2881cbdb7a5d7d6956de355f8ab882d9,2023-11-07T03:42:53.240000
CVE-2022-20766,1,1,11eade385af401c66fba3bea146972bc7aaa61ec2923546c24dc6a13d120ab95,2024-11-15T16:15:22.133000
CVE-2022-20766,0,0,11eade385af401c66fba3bea146972bc7aaa61ec2923546c24dc6a13d120ab95,2024-11-15T16:15:22.133000
CVE-2022-20767,0,0,bf3e408f2ddb577255f2a65ca0d92afecbfac86b6c268999a1d91a15bb935a65,2023-11-07T03:42:53.413000
CVE-2022-20768,0,0,b31df78e6f7a1690a0e6dc9026760925463d8c56c3c89a6df70005c95c07a8b4,2023-11-07T03:42:53.597000
CVE-2022-20769,0,0,9b39cf5519304df5f8eb08403777d95fd8d0b56cec10c7963730515e4701a15c,2023-11-07T03:42:53.770000
@ -190307,7 +190322,7 @@ CVE-2022-2079,0,0,960f06c13a414a3705d83f5387631ce2fc7a4df365ebb43e16e4f2c0a1119b
CVE-2022-20790,0,0,8dfe9c0790bcdd9e5d24c882a8764e4f3efe0ffb7dfafa8ed6588c86d8874174,2023-11-07T03:42:57.763000
CVE-2022-20791,0,0,0a0d06758ea5b6a8a0bfa7e93734af692de69e6ae62272ab0563b7dca0259a54,2023-11-07T03:42:57.940000
CVE-2022-20792,0,0,9d31518fb1ecca5bf2eef7cab0f72d7aed9df73b04ddb2aa2f1a47344b6e4d20,2023-10-01T11:15:10.490000
CVE-2022-20793,1,1,d42474ba7afc1fa88b1811e630c9cc232b04180956634328a3450ec92af25992,2024-11-15T16:15:22.370000
CVE-2022-20793,0,0,d42474ba7afc1fa88b1811e630c9cc232b04180956634328a3450ec92af25992,2024-11-15T16:15:22.370000
CVE-2022-20794,0,0,db18b8afc597f4f3ca2303342cd61b95263cdf62a8397bee6efeefd72db9573f,2023-11-07T03:42:58.150000
CVE-2022-20795,0,0,401cda8a7f1773e7dc44867691432480a43fc9bb2bb011a5642d8e138d4bbbef,2023-11-07T03:42:58.327000
CVE-2022-20796,0,0,d10c97adcc8041fe2197f037ec61ff1033fc25e78b803756d801f9e39c0f073a,2023-11-07T03:42:58.520000
@ -190330,7 +190345,7 @@ CVE-2022-20810,0,0,d465eef9b8b49f6cfb2d6bafb33fa2e371f9e6acad1c0018859266ef98cb7
CVE-2022-20811,0,0,894662974debbe90d9048d04c2e89055d5abb1a4cf1c1d40eeea299833ae5fe9,2023-11-07T03:43:01.097000
CVE-2022-20812,0,0,ab77d59c65b8c3b8fa22769a2502e274cfb97592b7f62e8f7e615979b1069764,2023-11-07T03:43:01.317000
CVE-2022-20813,0,0,41ff039ab407da2aee799c0e1f824d1a5aed4332ff899eff1c4f22e18add2aca,2023-11-07T03:43:01.517000
CVE-2022-20814,1,1,2a51a8ad0b3a6aea61694eae4c68a3c856708276243d42739a7f8962ab6a8c3c,2024-11-15T16:15:22.670000
CVE-2022-20814,0,0,2a51a8ad0b3a6aea61694eae4c68a3c856708276243d42739a7f8962ab6a8c3c,2024-11-15T16:15:22.670000
CVE-2022-20815,0,0,3b286a33cd412277cd07ecc33c3a88fe24589d1bb8e68df238991b9f13826a97,2023-11-07T03:43:01.693000
CVE-2022-20816,0,0,f11ccbdc893ee80f99212c658d510a9d68a3c1dc64cf17744fc0ba52a820c978,2023-11-07T03:43:01.880000
CVE-2022-20817,0,0,d44f2aa7ff7acf966547c59d8fb64b08a5a1dc81ddb4d70dbf3284d5da7cd837,2023-11-07T03:43:02.067000
@ -190363,16 +190378,16 @@ CVE-2022-20841,0,0,e14c27fc3061f8b1830c57f8e521b083f3ab7f22e5a692520de69b6b21ca5
CVE-2022-20842,0,0,1d7d4435c2ef9a46ba9809bda8eab515ed9c7fc8e795761c86bc8df5d0a73cb5,2023-11-07T03:43:06.253000
CVE-2022-20843,0,0,6316d53e796b332df867738f37e3f529db0c0e2177960556c25cdb7820dae231,2024-01-25T17:15:17.370000
CVE-2022-20844,0,0,b1a64b1a4c5d7dcc8860c07126d6ed58b168d65f2b142dae84529b201148addd,2023-11-07T03:43:06.533000
CVE-2022-20845,1,1,31837f57a193b5de7f66c9b5307ced859f47e302726debf13e0c26ba2cb2ff84,2024-11-15T16:15:22.913000
CVE-2022-20846,1,1,1b03b1c123c48d1a360c4a170ea42c62a7566a09fc99da03090658cf6b439522,2024-11-15T16:15:23.120000
CVE-2022-20845,0,0,31837f57a193b5de7f66c9b5307ced859f47e302726debf13e0c26ba2cb2ff84,2024-11-15T16:15:22.913000
CVE-2022-20846,0,1,b266aef901830297af5ceb0ec26b4641fcef2dbd86d472d6ec9fb62c386bb1ca,2024-11-15T17:15:11.147000
CVE-2022-20847,0,0,d21ac3e78f416486eced7fa6cfc95babac837c7da6572789bb1ab30b56b84e30,2023-11-07T03:43:06.717000
CVE-2022-20848,0,0,6856ea2a34bbbf446a21aebecd96700714cd1b28252f9d8d45fbb3b93186ddbf,2023-11-07T03:43:06.903000
CVE-2022-20849,1,1,d0b7b0f488f1e88d4c0d5b5c4f1d0d1788625fb8a626a15634326e38180e40c3,2024-11-15T16:15:23.327000
CVE-2022-20849,0,0,d0b7b0f488f1e88d4c0d5b5c4f1d0d1788625fb8a626a15634326e38180e40c3,2024-11-15T16:15:23.327000
CVE-2022-2085,0,0,f4cc97e054d518a1b8e57be5dd18f72a26616e2d14ce992571496bd5c70179fd,2023-09-17T07:15:07.477000
CVE-2022-20850,0,0,24d532a63709c9c79d292d9ed54926b717811f58afab7f6b996c677a1adbd1d6,2023-11-07T03:43:07.130000
CVE-2022-20851,0,0,2e7bafafa01d45a84d4b2a8c580c4c75362d932b722c85590bceb09f3183033d,2023-11-07T03:43:07.323000
CVE-2022-20852,0,0,1bdd9d0b9d69398e7edb0f874a3fffa56b7b8b47091299d08b5674ce44cb70b3,2023-11-07T03:43:07.543000
CVE-2022-20853,1,1,4e2aa3c2ab3b57418dc6f78d60a93e0308d1f0dd505f9ecdfa4e1881453e3373,2024-11-15T16:15:23.540000
CVE-2022-20853,0,0,4e2aa3c2ab3b57418dc6f78d60a93e0308d1f0dd505f9ecdfa4e1881453e3373,2024-11-15T16:15:23.540000
CVE-2022-20854,0,0,1a05af98dc8d2ef15178eb96b0b76560c3e4cb96313975c5ea578841c47c60c1,2024-01-25T17:15:17.553000
CVE-2022-20855,0,0,9f6f93783492963335ac892a343dd4cdacef454e1b9b7dce8584d27bdc95e2a6,2023-11-07T03:43:07.853000
CVE-2022-20856,0,0,868e5ad39f52bfd78d3e7385f0e52869ec525ec684dde7ef1c1c7286d1dd3549,2023-11-07T03:43:08.077000
@ -190392,7 +190407,7 @@ CVE-2022-20868,0,0,4640e0357abedaa6546d966462561149d797bdbab2bbadadef49344d3fd11
CVE-2022-20869,0,0,8887b091e307a2f88853ff131574b445d6e7f0597cb704fb6a7c61e6418f8a49,2023-11-07T03:43:10.317000
CVE-2022-2087,0,0,fda9e6cd2c392bb72803e7dbda3914e31ca3ca5df0dd6e23a58310711305f386,2022-06-23T20:18:52.003000
CVE-2022-20870,0,0,6f92229442f62bfb5da21fcb7695aab7bb0921406738dfb31ff76b5d6bb0dcdd,2023-11-07T03:43:10.497000
CVE-2022-20871,1,1,c0532d5e751d14eba9b12dbc2b35817cb13c35611c95884f40f9e516900fb05e,2024-11-15T16:15:23.757000
CVE-2022-20871,0,0,c0532d5e751d14eba9b12dbc2b35817cb13c35611c95884f40f9e516900fb05e,2024-11-15T16:15:23.757000
CVE-2022-20872,0,0,1945a4dcb7945d859a19d40da445928f2094af2529e1e70a83a3bd202f8c41ee,2024-01-25T17:15:18.350000
CVE-2022-20873,0,0,d8bf430445adaf3263b8acd5192c1bd1d0db328031972aa64cfb0f60a4b16104,2023-11-07T03:43:10.800000
CVE-2022-20874,0,0,0e01d51ac565010ffd696d15a51e5ae7cc5c44445885b94d7f0d2d506e5aa9d1,2023-11-07T03:43:10.993000
@ -190458,7 +190473,7 @@ CVE-2022-20928,0,0,b4bd8b7eb9845a5dea83e785fb8c3899d259ad181c9b176e8422c105f318b
CVE-2022-20929,0,0,9f8c5dc9e36cc6b7f4e13cb5e0133b8ef9c8d1c97757a2f523c4c08c6c4607c4,2024-01-25T17:15:19.680000
CVE-2022-2093,0,0,f9b6c46d92ed3a273479f0aac6b074690a25c899c0a81056db6bb170ebe3407a,2022-07-15T21:04:01.350000
CVE-2022-20930,0,0,b8872f19944e1a2247dfb95b6faf0c0e7eaa3d2f18cea7fdfefae7f7900b33c7,2023-11-07T03:43:20.913000
CVE-2022-20931,1,1,e5fb10462a81b13c06dd06c488845db7d743f391aacd2eb72f311a695bbf6842,2024-11-15T16:15:23.967000
CVE-2022-20931,0,0,e5fb10462a81b13c06dd06c488845db7d743f391aacd2eb72f311a695bbf6842,2024-11-15T16:15:23.967000
CVE-2022-20932,0,0,7c4fcd146ede3d6f7ba677a46479a351e54f0aa5e1d73606f8df1118caa068ff,2024-01-25T17:15:19.803000
CVE-2022-20933,0,0,1e3f8165b47aa08c2f85f22683a82391e523ba4b3d0e0e05c77690809d7d71d4,2023-11-07T03:43:21.230000
CVE-2022-20934,0,0,3eca5a2d3b359874a263a3a14b4a938cd00d4932f8daa7be0579a8c705e9bdc8,2024-01-25T17:15:19.910000
@ -190466,7 +190481,7 @@ CVE-2022-20935,0,0,c6cd0d5563c829bcad9fdec873f413150075b70909f2cdd7967e28a06c665
CVE-2022-20936,0,0,79a4d834423e5e48bbc06de76ac7d3473907bd3fa94c8bdf1610226472c24195,2024-01-25T17:15:20.170000
CVE-2022-20937,0,0,8e5b375c4457ca31958f4afc7ba467afb9b666e17cd09da694c6761da19c3374,2024-01-25T17:15:20.310000
CVE-2022-20938,0,0,0716f27fa0cadcc725b3df26d6c7e6466d6941bf89479f43ef098c881ea48696,2024-01-25T17:15:20.443000
CVE-2022-20939,1,1,e07cbe365a6e87f2c336d694baaf775b629f4d76606c9e96fda3e9aa795547b0,2024-11-15T16:15:24.200000
CVE-2022-20939,0,0,e07cbe365a6e87f2c336d694baaf775b629f4d76606c9e96fda3e9aa795547b0,2024-11-15T16:15:24.200000
CVE-2022-2094,0,0,aa8e90b78fb16ce790f2711a054b3e1e1aff3fd1748a249ad1a0e41c3a136bb8,2023-11-07T03:46:12.680000
CVE-2022-20940,0,0,af53884143c8285046170dd4e82cf6cbdd440ae613a8d35ce9164ebe27f7d939,2024-01-25T17:15:20.583000
CVE-2022-20941,0,0,71446826ba7b5ebf325cbe0c4e0c055414ee6e18ba4a0637ac686f9ae7cb72c3,2024-01-25T17:15:20.713000
@ -190476,7 +190491,7 @@ CVE-2022-20944,0,0,d58bd4035167d677f318709b4ebea617d8d18c861ba0013d9b503a3010875
CVE-2022-20945,0,0,9ac7c9cd20a7de1d05f991eb10d16d7f1862b368e5a43a2c5aa867e25e186258,2023-11-07T03:43:22.547000
CVE-2022-20946,0,0,b0ea2682a6374774770e0bcbde525c8be07755eccbfc5b7daca4813803d1ed24,2024-01-25T17:15:21.187000
CVE-2022-20947,0,0,bc3e0c6e94591d9afa8eb56626954db5e7a8bf9b8f24b857429895e836356bb1,2024-01-25T17:15:21.303000
CVE-2022-20948,1,1,228c80ec66473cd1e93ed08690f05a2f53bf644debb790097de9e597079ad5a2,2024-11-15T16:15:24.427000
CVE-2022-20948,0,0,228c80ec66473cd1e93ed08690f05a2f53bf644debb790097de9e597079ad5a2,2024-11-15T16:15:24.427000
CVE-2022-20949,0,0,0c27a247c22579ca4e19d2d036bd7af81f0fba76711a1a7a70435d0fa406e580,2024-01-25T17:15:21.460000
CVE-2022-2095,0,0,3c251989bea580be837ba52fc5502217dfec5c99671ae55c970e8f7da9e0ae82,2022-08-11T15:01:36.410000
CVE-2022-20950,0,0,a1584a6de4bec827872a5671921aa2b3aac3dc26894b0a2f83afd677eb9cc1d3,2024-01-25T17:15:21.597000
@ -214726,7 +214741,7 @@ CVE-2023-1999,0,0,83389713b72fbb33f0448bb5b017209184e6ccef0d6519c942437609b0d8d1
CVE-2023-2000,0,0,8cd3accd68d360d71369e55670660f98528dc3de89fec28ade37ccac2b39579a,2023-05-09T16:31:00.540000
CVE-2023-20002,0,0,ff13495a0460fbbacc056e6923313814b51b36acd21f7c9330f556a50e5a03b3,2024-01-25T17:15:23.817000
CVE-2023-20003,0,0,8fe26b3bec3529a10e55876a22ec60b9ee58198c132d4ff5edf36301727ae87b,2023-11-07T04:05:41.743000
CVE-2023-20004,1,1,b8b8bb895d1c0ffae6c7a94554cf6f58305da8062a3b0cc143d9c959768e78e9,2024-11-15T16:15:24.657000
CVE-2023-20004,0,0,b8b8bb895d1c0ffae6c7a94554cf6f58305da8062a3b0cc143d9c959768e78e9,2024-11-15T16:15:24.657000
CVE-2023-20005,0,0,e6f8b8b85fb6df871de6707dd09891ba34946e80382eb4a813f86c4405f5b2e8,2024-01-25T17:15:23.923000
CVE-2023-20006,0,0,622425150ebc1a2988c05bbaea651c7a6ed670ba7f0e101f079ee845f25f6c12,2024-01-25T17:15:24.040000
CVE-2023-20007,0,0,1e7c88b95bdcf2290facf5bbacd178b32fa5b1d81010bee0a06d65a221ba36af,2024-01-25T17:15:24.170000
@ -214761,10 +214776,10 @@ CVE-2023-20032,0,0,0fee7d5743a2e252d59b0ededb2008bac10fa1267c3289a466f3942175317
CVE-2023-20033,0,0,bd6288e791dfb3c89867f4824e1ee919aae061f3e96f787678743266c88dcf23,2024-01-25T17:15:26.057000
CVE-2023-20034,0,0,afd24b3dbdd5e84fb716ee5384c251e519b4b7ebccb7a61a644c5b76dafe5b5b,2024-01-25T17:15:26.360000
CVE-2023-20035,0,0,bf990679f6d153aa28516a84b9951dc45b406e82f1842f688d0df62730227192,2023-11-07T04:05:49.507000
CVE-2023-20036,1,1,916e6764f208248dc43a0b22f54d555c1ce314abeb0e390cc5c0ab5ae85d622e,2024-11-15T16:15:24.950000
CVE-2023-20036,0,0,916e6764f208248dc43a0b22f54d555c1ce314abeb0e390cc5c0ab5ae85d622e,2024-11-15T16:15:24.950000
CVE-2023-20037,0,0,c2914760d5e410f5261b59e565cefb8d4f1ad623014e2dd1e8cb5eb583c1e599,2024-01-25T17:15:26.570000
CVE-2023-20038,0,0,57f68a49cbd3aba16d00a0b70502d11657968cc0f76448d9c73d428db9623a97,2024-01-25T17:15:26.670000
CVE-2023-20039,1,1,d65c08ea066f3359ebb27749600ec14b5f90b5612ef5e69d2cf14f12a603e408,2024-11-15T16:15:25.157000
CVE-2023-20039,0,0,d65c08ea066f3359ebb27749600ec14b5f90b5612ef5e69d2cf14f12a603e408,2024-11-15T16:15:25.157000
CVE-2023-2004,0,0,43f7bc74ef9fcd317532bd3537b64c658f91f5edb3bbc6123888b6bcd27ec49a,2023-11-07T04:11:40.947000
CVE-2023-20040,0,0,0922a655363fa1ec544d5405a43843e57a5d1d552046d1047b53c5b382f2b45c,2024-01-25T17:15:26.757000
CVE-2023-20041,0,0,fd5755bac85a4f3c718b0f1eb74d0c569a2cc18341d3c265f8df5cf4be80a077,2024-01-25T17:15:26.853000
@ -214787,7 +214802,7 @@ CVE-2023-20057,0,0,043792f5aee16aeaeb4241db65fe08863eb4a3d25ab39d0568d5bffb0a156
CVE-2023-20058,0,0,ad815c14d82ee176555edb6a4e2052d61f7ea3f63365c395b0328bebd76c78c0,2024-01-25T17:15:28.070000
CVE-2023-20059,0,0,b99d0f72dcc000eb953ace65e13282c926b8d14b4c6816adcddee8cc0dd72692,2023-11-07T04:05:53.953000
CVE-2023-2006,0,0,576ccd01f75cc25728924f4ed5e26d8b930bd4477bce9be56dd71bf07e1c6057,2023-08-25T15:23:55.877000
CVE-2023-20060,1,1,4fe227273b5e34e9cbc20e8fc1a831f4459e6cc67c0f6ea42c5c4cf1a0dfdf59,2024-11-15T16:15:25.357000
CVE-2023-20060,0,0,4fe227273b5e34e9cbc20e8fc1a831f4459e6cc67c0f6ea42c5c4cf1a0dfdf59,2024-11-15T16:15:25.357000
CVE-2023-20061,0,0,2ec24e7f0c8bcf98f0de0b7378a7de0b9009080959b3f6e60b70d985f8c0253b,2023-11-07T04:05:54.383000
CVE-2023-20062,0,0,74adefadccfa785110e4e05f634c8688933a1b2a514cb692712de49e45b87ba6,2023-11-07T04:05:54.797000
CVE-2023-20063,0,0,ab9aa4a035ed2a1055c8eae268aa7b6b803ad113e479a4dca4e69fb32738c3a9,2024-10-23T17:15:13.320000
@ -214820,11 +214835,11 @@ CVE-2023-20087,0,0,133c6492751092d6c28ab324bb58a12f819bd773f8708e73bfb29f97a2be8
CVE-2023-20088,0,0,705f2ea50f1d59a2e3ad7ebc85510dd9d8de6350673ed4bdfd84da5ef77c6e04,2023-11-07T04:06:01.113000
CVE-2023-20089,0,0,984606cfab01f8b8da767b529c591d341f255333dd5307e8011a8533079438b1,2023-11-07T04:06:01.503000
CVE-2023-2009,0,0,f993c356b46fc35d0cbf9d2c6587ae24636f78445d0fc0982a31ae802aada552,2023-11-07T04:11:41.033000
CVE-2023-20090,1,1,7d8ed5165f13ce8abe5c92710ba00fc6627539c932bfceefcd559e7d5c2d9c0c,2024-11-15T16:15:25.560000
CVE-2023-20091,1,1,7957d54a758c97d56ea8f39938f86e458704a25f7e6f0d0392c890dc728d5579,2024-11-15T16:15:25.770000
CVE-2023-20092,1,1,c4563a1f3434466be4aea0d7227c50c30aa74a790971fa8ffe4531c50241f35f,2024-11-15T16:15:25.980000
CVE-2023-20093,1,1,300b01ffe6545980e2d5e8da2c4875c20bcc800d9dad4aca9740acdc9fbd769b,2024-11-15T16:15:26.187000
CVE-2023-20094,1,1,c772b82858adcd41613402d4f19b1e84a24c9a0c5be417184c8d0d17eedefdc1,2024-11-15T16:15:26.390000
CVE-2023-20090,0,0,7d8ed5165f13ce8abe5c92710ba00fc6627539c932bfceefcd559e7d5c2d9c0c,2024-11-15T16:15:25.560000
CVE-2023-20091,0,0,7957d54a758c97d56ea8f39938f86e458704a25f7e6f0d0392c890dc728d5579,2024-11-15T16:15:25.770000
CVE-2023-20092,0,0,c4563a1f3434466be4aea0d7227c50c30aa74a790971fa8ffe4531c50241f35f,2024-11-15T16:15:25.980000
CVE-2023-20093,0,0,300b01ffe6545980e2d5e8da2c4875c20bcc800d9dad4aca9740acdc9fbd769b,2024-11-15T16:15:26.187000
CVE-2023-20094,0,0,c772b82858adcd41613402d4f19b1e84a24c9a0c5be417184c8d0d17eedefdc1,2024-11-15T16:15:26.390000
CVE-2023-20095,0,0,c1d39625b73fc4114d101d356e72bcbfa28ba08de7f2dbc09ec224218c1f83e0,2024-01-25T17:15:29.320000
CVE-2023-20096,0,0,5ec9d92a3c53d239a4bea6ac652028ebc9a4f75c4f12a87c04a0f5b9d268f7d1,2023-11-07T04:06:01.853000
CVE-2023-20097,0,0,0f1b759fa19d9d1fbf0d1fb932575fa350688fd85c697d74def63c42805ec83a,2023-11-07T04:06:02.180000
@ -214855,7 +214870,7 @@ CVE-2023-20121,0,0,358dbca94d32e6dcf0b3104823aa6eef27bbc41a499c165775feefef3dd70
CVE-2023-20122,0,0,7c9e16c7a0ee316d150ed9cf383eca40d39459afaa779ec2d9350f20bcf1e719,2023-11-07T04:06:06.620000
CVE-2023-20123,0,0,1938d04db810293056039009697e32a6b0e0e894259a64bf86651878bc0084e4,2023-11-07T04:06:06.960000
CVE-2023-20124,0,0,e83f8aaae6cd3d65ff2154227681c9318ae0e3b7070056480e66eb5d3b4ab066,2023-11-07T04:06:07.280000
CVE-2023-20125,1,1,4d3ece80bb2bc98d6b9179f7ff626afd566df172ea9eac0084c18d7ae4849bdd,2024-11-15T15:15:05.347000
CVE-2023-20125,0,0,4d3ece80bb2bc98d6b9179f7ff626afd566df172ea9eac0084c18d7ae4849bdd,2024-11-15T15:15:05.347000
CVE-2023-20126,0,0,f839d079229ba6c1e694033f3ce70a9f46e6c8795d13d51bd2484856d9f0674a,2023-11-07T04:06:07.613000
CVE-2023-20127,0,0,5dd1b97bf22fd06bfdbb3184f8e0d784536bbcfd9846484be1e70c5dfc0a2bdf,2023-11-07T04:06:07.933000
CVE-2023-20128,0,0,84d58c0ee921e563d643445e5800ae3cd231b79ec1aa65fe75f6d6b469342bc7,2023-11-07T04:06:08.293000
@ -214887,7 +214902,7 @@ CVE-2023-20150,0,0,94ea55c7c3cf20c73cbf1b524abac3dc9bbcc065627308840f1663af75b5b
CVE-2023-20151,0,0,88742a817c2df6fdace33e29b508ea48e1e2e1dc833b2f75c7b254b36e99152c,2023-11-07T04:06:15.360000
CVE-2023-20152,0,0,b285aade6162740e6dd931c919008308d719b96b4e7dc41373d9b5d41f9dc560,2023-11-07T04:06:15.710000
CVE-2023-20153,0,0,ae7f889caea069cd7690b5f9920f78358d15337fff658fe3de0d3daef91d68f0,2023-11-07T04:06:16.027000
CVE-2023-20154,1,1,4d0a0d038c8b5442778ad17b85c37cdb9cd722940a6cd558087f26d17561d095,2024-11-15T15:15:05.697000
CVE-2023-20154,0,0,4d0a0d038c8b5442778ad17b85c37cdb9cd722940a6cd558087f26d17561d095,2024-11-15T15:15:05.697000
CVE-2023-20155,0,0,33b71951116186ed9605c91d855e2b68ba331011dda75495bb098ec5b6e270bb,2024-01-25T17:15:31.683000
CVE-2023-20156,0,0,ea0e130fec2d57b54bae7e81d6b74b3374f2cc6170c056dd2fc367148eca7107,2023-11-07T04:06:16.423000
CVE-2023-20157,0,0,bbdecebb32e3e6b666e8da5d3dee094804414044129700721a781dd8705107e8,2023-11-07T04:06:16.923000
@ -241913,7 +241928,7 @@ CVE-2024-0403,0,0,60e2bc88e92810ed72ef2996e4d2d759ca3bc0f293ee405aa604a1736f0dd6
CVE-2024-0404,0,0,267abbe2ff290c3b77a55510b83fb776d7ef5ba08b1e7aa00fb99b1a3b94e009,2024-04-16T13:24:07.103000
CVE-2024-0405,0,0,66f278ea46b088f52ebb4b38f4ef42b6f80eccd9a2f6905641a7e3bb3c98f38b,2024-01-24T17:23:09.773000
CVE-2024-0406,0,0,00691f3e97095f7797b778e136f67313da4ee5005641a54e751fff886b78962c,2024-04-08T18:48:40.217000
CVE-2024-0407,0,0,0e84b3507983daa04b361f9ab4440365192ec477ea85d3878f953e6a1ca2e94f,2024-02-22T19:07:37.840000
CVE-2024-0407,0,1,845032af1abe4df4d480ed927b876c7e0caeb6b81b3bfd21922c9b1c715d366b,2024-11-15T18:35:31.860000
CVE-2024-0408,0,0,da14a0008a1f28062fd759482e67948d91b898dac00f491b3f46d1fd1f2d182e,2024-09-16T16:15:12.447000
CVE-2024-0409,0,0,b9b920cb31e8a9757b8815a5b45bb04b88a36f65a0bfb89820c247491a2aa112,2024-09-16T16:15:12.617000
CVE-2024-0410,0,0,8855b841f08bc0b807343dd7ef72faf063c406af2c68e097af1f2d342abe8bd4,2024-10-03T07:15:27.943000
@ -242927,7 +242942,7 @@ CVE-2024-10686,0,0,fcdad82b29385ae50029c826386214a0438adfef3126687e07ca7cc6d4975
CVE-2024-10687,0,0,2d74811f2fc6d3aaef423135ea18016bd4a20ce3a927ba94efb8aa3eac4c5b2f,2024-11-08T15:26:52.523000
CVE-2024-10688,0,0,2bcb0cc2d0a39373aaf27b3a9b6b49c4606abf5541b93372733fc379535c54ca,2024-11-12T13:56:24.513000
CVE-2024-1069,0,0,9f4b19e535b82e8b50b814b402985dc45959fb8eebaa25a120ba3f787349c9c3,2024-02-06T20:11:52.587000
CVE-2024-10691,1,1,db2c0688a52bf60c2a1055a856c5f32b6875efacbb339285fcf0094be8a5d17a,2024-11-15T15:15:05.943000
CVE-2024-10691,0,0,db2c0688a52bf60c2a1055a856c5f32b6875efacbb339285fcf0094be8a5d17a,2024-11-15T15:15:05.943000
CVE-2024-10693,0,0,2a11d3d5f51d0b8c3f7c9ca79b8ec09785ef4fc759c11326213a65170220169f,2024-11-12T13:56:24.513000
CVE-2024-10694,0,0,05c164a4732350edd5fee46247e775b1e69a11363b78cebc8b6784de8da1fb44,2024-11-11T21:15:06.030000
CVE-2024-10695,0,0,c91c88b2e014c926c977a623d612f44936109b69ef58435a4fdca68abda40e21,2024-11-14T19:44:16.020000
@ -243127,13 +243142,13 @@ CVE-2024-11059,0,0,de7cfb30a6274819a2f3576f81d64b58ec0837ba2b51799f2a317460e7cb2
CVE-2024-1106,0,0,20cb4a0a045157ac9e013fd166b9513d5a44a1304cf8a8ccabd3185b4a52ab40,2024-10-27T23:35:01.747000
CVE-2024-11060,0,0,59a41911bcfc298095aabf4f558a2377a774e2b5628861d2f98e8a12c664f388,2024-11-12T16:15:20.447000
CVE-2024-11061,0,0,d8f9bef48761b4e4749749cf732ccf55059f93d4170dee66c1cfe0b2a4ff086c,2024-11-13T23:04:25.633000
CVE-2024-11062,0,0,fd55df6ee60df3ac3e659d07193cf97542af5dcd211c78f8b53360e3a9e97cc9,2024-11-12T13:55:21.227000
CVE-2024-11063,0,0,1a3eff04d87f74bc64be56e4515d0ac1a1dad44d3ef5f9e41d9c2ff803dd28c6,2024-11-12T13:55:21.227000
CVE-2024-11064,0,0,fbc6fc46169b65b5e9f021a6e3aa02dddacbcbeaa8df4c510741f7cfa069b0a2,2024-11-12T13:55:21.227000
CVE-2024-11065,0,0,bfb35f980499608a9a3496379264eb51d60e25932db9b7623457d633eef9a55d,2024-11-12T13:55:21.227000
CVE-2024-11066,0,0,a4cbe189914f12c5d2c97a6da0947cc3e10eb247702d656a1dbe04db5cfbb7fb,2024-11-12T13:55:21.227000
CVE-2024-11067,0,0,5483dbfbd683f340236ce9255ef6a7c7f72011fb5216fc7269ab5aac0d5213a7,2024-11-12T13:55:21.227000
CVE-2024-11068,0,0,4b051dd1e90eddfcfc88c8711edd0209408a9ba2f8b4588824fefefed2e09378,2024-11-12T13:55:21.227000
CVE-2024-11062,0,1,382398a254813285a8ce00b946267d17abf1e43f0a04fb87d058a641703ccc25,2024-11-15T18:21:42.127000
CVE-2024-11063,0,1,c82d798dd5590a078b5d7d26840dc30b4d0e6afdb1c08ee601fbc34cd61d9b36,2024-11-15T18:21:55.407000
CVE-2024-11064,0,1,7bc630a0bda7c8d299c9c3d34681318b70b580b6ee835e3a35824920be4cbd1c,2024-11-15T18:22:07.027000
CVE-2024-11065,0,1,07ecc20a5dd82ce3ecccd8bd16ce6c9c834a7ee14450b7b733f59e01e4d5af6b,2024-11-15T18:22:28.430000
CVE-2024-11066,0,1,e16818aa9ce80078f2734ac486cf4eb542ac5bd17e4c391662d4998111e3a483,2024-11-15T18:22:45.323000
CVE-2024-11067,0,1,56467501c947edd55cd4613fd2ef381247159c27f7d35a83af06c94b6a86acf3,2024-11-15T18:23:32.557000
CVE-2024-11068,0,1,f7e9062074774d089c911b3e1747ffd8f63444b7d0cb3b7ce8ded4e6fed69b57,2024-11-15T18:24:25.127000
CVE-2024-1107,0,0,7fae6df9cdce298be180c2cb6d3dacceb0e976e847fc87cce19a7d73f37dfe2b,2024-09-16T19:08:27.840000
CVE-2024-11070,0,0,3b497257d1d87e8089d11256275eff956cb64bd2c8e5b58c0672dafc5015efdc,2024-11-12T13:55:21.227000
CVE-2024-11073,0,0,7b275d77346d3baae5145fae1e1bc949854bb720c1a66c386a5f1f31e520bae5,2024-11-12T13:55:21.227000
@ -243168,9 +243183,9 @@ CVE-2024-11123,0,0,2c2c3a47aaef9d48349e1017759c96035abab5e51ba4d62444aa173a7ccd2
CVE-2024-11124,0,0,efd601a275819de67bd20a9a8d3bf2e3170b2fecab4aaf15486a28875c9a9123,2024-11-12T15:48:59.103000
CVE-2024-11125,0,0,122a7b88d4467b2583e8cd046c15116b4ff84a1dc79b401a73643c2cfd3066b9,2024-11-12T15:48:59.103000
CVE-2024-11126,0,0,b967d4c9797ae557d5008a2e89e34b56b8ab089540ce69fba53b421e80e1e708,2024-11-12T15:48:59.103000
CVE-2024-11127,0,0,872c91b8fef54d334e58f460ad31540519bfcc5b745ac9da794cfe9b05f34fe8,2024-11-12T15:48:59.103000
CVE-2024-11127,0,1,7d1296cebc7c05fd3dd6b306ae87cbc2c9940166d503543487e9da9414a97cf7,2024-11-15T17:29:43.450000
CVE-2024-1113,0,0,6955c6c679809523d129efea09ef779c898e264f7e3230a68d2b1fd615c8f410,2024-05-17T02:35:14.663000
CVE-2024-11130,0,0,578a772ca1269be9bdc99bb966d7eb9c39dbd0e02e5dba4d3229d53dfaceb8e4,2024-11-12T15:48:59.103000
CVE-2024-11130,0,1,15b63aa205de6a4f54c182b134585f269cb8266092a000bd91d13bef5e0dadb4,2024-11-15T17:57:53.270000
CVE-2024-11136,0,0,24240577f7b850705f8148f1e2257c636c3b9dc696f019566c5d55e0511cc8a2,2024-11-15T13:58:08.913000
CVE-2024-11138,0,0,7b0edb369e2d9df427aea00759a3991acb4ee32080a1e83cba9502f5a7a362f2,2024-11-13T17:01:58.603000
CVE-2024-1114,0,0,4ba1cd03fbc35862ac6b2ce79da50122dd303ea22f4f4a45a352ffb5be12a8ee,2024-05-17T02:35:14.777000
@ -243206,13 +243221,17 @@ CVE-2024-11238,0,0,f196800203d7a40ea6fe71674205d5ffdaa3f312de9f25c1b832724bfe8a5
CVE-2024-11239,0,0,f1dab3b1bd9473b4d4db92608adf6e4ae1f9c5d4ed0e180c09e7deb1a37f009f,2024-11-15T14:23:55.747000
CVE-2024-1124,0,0,913ac2351f43d83be68411d873bf568715eb455fa7fe6219a9189bc1238726a9,2024-03-11T01:32:39.697000
CVE-2024-11240,0,0,4cbdc145e46050047bae82d06e6eca707b526afd40e8adf36873c1573b95ee6e,2024-11-15T14:23:55.747000
CVE-2024-11241,1,1,5adf62031ef29f2a6aff64af13c8577879fdb0eeb5c43426a2053134c8e9a63b,2024-11-15T15:15:06.003000
CVE-2024-11242,1,1,b664b9f9ca5ef78a8f76c90b02dcb3e79e313f2513ec5d029d7980fcef3095d0,2024-11-15T15:15:06.280000
CVE-2024-11243,1,1,07cdde05767a6c078a6880e496b4fc9b8dfe250fb9a8764bfb93c7dd52756f43,2024-11-15T15:15:06.557000
CVE-2024-11244,1,1,eb8845955460a34ff0f05caa9bffc40321db9bab2c0d6c5ab4b0b8a45f110b8d,2024-11-15T16:15:32.790000
CVE-2024-11245,1,1,1d3c3963003f652e39ad70e62873c3ce61143e6efc282e684e7f3305765b976f,2024-11-15T16:15:33.153000
CVE-2024-11246,1,1,03623f9d2973a20ed102a61231dd48a6ec42601438415081c5e6186dd1e755c3,2024-11-15T16:15:33.593000
CVE-2024-11241,0,0,5adf62031ef29f2a6aff64af13c8577879fdb0eeb5c43426a2053134c8e9a63b,2024-11-15T15:15:06.003000
CVE-2024-11242,0,0,b664b9f9ca5ef78a8f76c90b02dcb3e79e313f2513ec5d029d7980fcef3095d0,2024-11-15T15:15:06.280000
CVE-2024-11243,0,0,07cdde05767a6c078a6880e496b4fc9b8dfe250fb9a8764bfb93c7dd52756f43,2024-11-15T15:15:06.557000
CVE-2024-11244,0,0,eb8845955460a34ff0f05caa9bffc40321db9bab2c0d6c5ab4b0b8a45f110b8d,2024-11-15T16:15:32.790000
CVE-2024-11245,0,0,1d3c3963003f652e39ad70e62873c3ce61143e6efc282e684e7f3305765b976f,2024-11-15T16:15:33.153000
CVE-2024-11246,0,0,03623f9d2973a20ed102a61231dd48a6ec42601438415081c5e6186dd1e755c3,2024-11-15T16:15:33.593000
CVE-2024-11247,1,1,bce8b608709ee2f34f26a7ac0361a1afd401bbabed86d1e5122b198d8d891745,2024-11-15T17:15:19.237000
CVE-2024-11248,1,1,05f63ae886ce8e4f4f6c9c95a9d19bf2bcd71685909c7308e46e3edf7854f64c,2024-11-15T17:15:19.580000
CVE-2024-1125,0,0,f1d015036f4cdda32f03ba210c93a8838e991a1e1d168cce1bd81d56428097c5,2024-03-11T01:32:39.697000
CVE-2024-11250,1,1,8b0e6334f9dcad2b90092c4673840dfd4d860cb1e6e6f8d5be015dbe688bf885,2024-11-15T18:15:26.280000
CVE-2024-11251,1,1,e3365cd5b35beffead202860ed23ac651fd05ceb4020ebe0e15542749f7995ad,2024-11-15T18:15:26.653000
CVE-2024-1126,0,0,719cb9688eaad755b04db0e390abb1a9b0b6a5e25f632a929e6736322faf9c06,2024-03-13T18:16:18.563000
CVE-2024-1127,0,0,fc004f13d69dd65990588f481257d3c8dd60a3804cfac37ac389768e5b88f08c,2024-03-13T18:16:18.563000
CVE-2024-1128,0,0,de5352d9c421a908307277eb7da3f5f6fcfc08a095ea033ab740d4804aa5ccea,2024-02-29T13:49:29.390000
@ -244305,7 +244324,7 @@ CVE-2024-20369,0,0,e23910e4adf6ac7fe444b246c85eb12e2e56e7b12054f1339b9256c8ec4ec
CVE-2024-20370,0,0,9c8d802e115773847851e6a87a7c6331398027635ff6abdb8c313a21d8306cc9,2024-10-25T12:56:36.827000
CVE-2024-20371,0,0,5b763c21f0dad7933d07cd6f6f6dc5ca9ec50c488ae19c36eb22a1fb95a945ae,2024-11-06T18:17:17.287000
CVE-2024-20372,0,0,feaf3b98a24bdcf61707d881e5427a56c3f9e9ebde0774029fc1bd7580a0df31,2024-11-05T16:04:41.993000
CVE-2024-20373,1,1,a2c2841c5e75e2098b2545a81c3463193dde584ae470f938c5f5d2013afd2a94,2024-11-15T15:15:06.823000
CVE-2024-20373,0,0,a2c2841c5e75e2098b2545a81c3463193dde584ae470f938c5f5d2013afd2a94,2024-11-15T15:15:06.823000
CVE-2024-20374,0,0,e0c9fc3f494f29ebf625a888aaf98651649c668b7d5475f4297a0435038e214e,2024-10-25T12:56:36.827000
CVE-2024-20375,0,0,a4ae364a987d406a5046b71b718fe2e5ce4da208cd9db67ac24eb19997b1276b,2024-08-21T17:24:59.627000
CVE-2024-20376,0,0,616e740c2ab9d6be811f96c68e43db8bad88fc7cef9833f2acf95234fb3cc478,2024-05-01T19:50:25.633000
@ -247379,7 +247398,10 @@ CVE-2024-2441,0,0,748a7ac4d6ed599dc743b338d434f4fac66b4e81d9dc4afe98a976de37bf66
CVE-2024-2442,0,0,da6587851d777a7caecc3fd36ba9b67242261a5b34dedee058c0f959b1280fc4,2024-03-20T13:00:16.367000
CVE-2024-2443,0,0,a8bbe87eac8a41399b1d0d3a72e714355872c34062df72f2bddd7214646f509e,2024-03-21T12:58:51.093000
CVE-2024-2444,0,0,4077967648b87af230c120a80abe8a1c3709647ab561500ac246716e12815b1b,2024-08-08T21:35:09.480000
CVE-2024-24447,1,1,7de8a37bbcca3834bb348521e76c5fcdb7608e804ddf780fc7d72494a9b71a38,2024-11-15T18:15:26.930000
CVE-2024-24449,1,1,c1cedd05172c4efc6df6d5d561bf0d004bf06abec1c0e01707406c0e914ff17f,2024-11-15T18:15:27.013000
CVE-2024-2445,0,0,4580fbdabeda1a44cff89d119283db83c12561dfbbac9584647c19bac102f840,2024-03-15T12:53:06.423000
CVE-2024-24450,1,1,d81358a2964522ca6fb1f5769ded6178556fe128fbb0360faf4057187f926cee,2024-11-15T18:15:27.097000
CVE-2024-2446,0,0,ef51f957632ec98e360c50fa0db196c0f3cfe0183f1093005f40b796022ec810,2024-03-15T12:53:06.423000
CVE-2024-24468,0,0,bbac026196c9a5e8ca29f54a8d36ba3e229b24779335db2752c28502233c74ac,2024-02-07T22:03:09.897000
CVE-2024-24469,0,0,118364649006ddd6dd7a0282a82463969addbea3b241460c52f60a3b25b50f38,2024-08-26T19:35:10.113000
@ -254765,7 +254787,7 @@ CVE-2024-34391,0,0,fea0526d8b3f094ea1377906b102ca6f0f9ab852468be2342d35da7d8b322
CVE-2024-34392,0,0,95f700dedff586182f66d1ca5e7da764d337c16226845e0ee1ec7b84b40d651f,2024-08-01T13:52:21.033000
CVE-2024-34393,0,0,9d61a4306d036e5052fc5d8b364b63a626c2cc9af434ed24e38ecec71df608d5,2024-05-03T12:50:34.250000
CVE-2024-34394,0,0,9d971c1ec9518d2a1ce0c68b603eddff6cf55abad02bc9ebdbbffcbdf77796e3,2024-05-03T12:50:34.250000
CVE-2024-34397,0,0,16b5c41784e4f3ba325a2b1735509d7fce68bb2c9a1b2765d2c61257921c1fa2,2024-06-10T18:15:34.863000
CVE-2024-34397,0,1,fbe115fc17ef3ae402335dbe24a2a48fe58cd8036552f43e922fe8ad96767329,2024-11-15T18:35:32.760000
CVE-2024-34399,0,0,b575bfaa23d53510470a68bea01ab071e8876f6597cd9250405e7f9141fb6390,2024-09-20T12:30:17.483000
CVE-2024-3440,0,0,534ad01cc4d99b7aec93fa9eb5959ed4cc5d68a1c33a8c467ae485dbc87a6451,2024-05-17T02:39:56.370000
CVE-2024-34400,0,0,7810632e891837a80fc3ff6fe66a8824988f8d2b9291638447500bd6cfd0b44e,2024-11-05T15:35:14.213000
@ -255009,7 +255031,7 @@ CVE-2024-34659,0,0,dd3f9420e24bf859148c793c2123fe1fcf6f82da97ec67367518f44415c24
CVE-2024-3466,0,0,0337eeb2bb11dc2971562c8acd5fd5c98aad745dda4239343a7e69d2339c0489,2024-05-17T02:39:57.717000
CVE-2024-34660,0,0,0b2d2bea24d7fa6e914da9f7286c2cb2a544faaaec97dda10fa17e8966604e75,2024-09-05T13:30:28.343000
CVE-2024-34661,0,0,39eda7ed3fc18d4431971deb4f86b7b12866001e42dbec50f2575ba9405dbbce,2024-09-05T17:57:44.563000
CVE-2024-34662,0,1,606c004802ffd4bbbf92e055cc11b6c203b0ea6fc76b4b2f8bcb431031d349ac,2024-11-15T16:34:28.937000
CVE-2024-34662,0,0,606c004802ffd4bbbf92e055cc11b6c203b0ea6fc76b4b2f8bcb431031d349ac,2024-11-15T16:34:28.937000
CVE-2024-34663,0,0,bc7e792d3bf9cb19b3bac7de5e5f393eda73c48981c29bad44b4305bf7709bc5,2024-10-10T12:57:21.987000
CVE-2024-34664,0,0,b864c4351ccbb106aca6a04f609ab07081f58539736f6b0a259450595fc32b90,2024-10-10T12:57:21.987000
CVE-2024-34665,0,0,8e97b696e2825593cef2b60bbd5fe842a775ccd597e31a6a3daa4e47d15b624a,2024-10-30T14:28:55.223000
@ -258797,6 +258819,7 @@ CVE-2024-39720,0,0,d0abcb66b33d9eb5538e2c3f6b1c0a5ec90e4231fb92eae0b5bdb3698a665
CVE-2024-39721,0,0,a53f4a408292484f4e31830b23f4d1e9fa44faea82210aef0c3385e6a6ce66da,2024-11-01T16:35:24.357000
CVE-2024-39722,0,0,08a96543a5db4fbd3fecc413584aca3682c28f3fb47ec14ffd29adb20a7fbede,2024-11-01T15:35:17.693000
CVE-2024-39723,0,0,003097d794792a3e1194202f71608927b35e402887d5f5ddf07d35b5dd183916,2024-07-11T14:54:10.243000
CVE-2024-39726,1,1,0a5e81dbde3fa950422b79a0538ab8807c0f94b1a9dbcb7c4da57d86278a1408,2024-11-15T17:15:19.983000
CVE-2024-39728,0,0,fba26233ce0c4692619efffa132c45bfb836485ad2132e6f2e6d7ce0ec6f97d0,2024-07-16T13:57:37.203000
CVE-2024-39729,0,0,bfb0ee29aaef980e2b91ef648868f4c0e36729a7e019c3fc9d2073fdf0f8ba3f,2024-07-16T14:02:53.577000
CVE-2024-3973,0,0,1e562721e06ec34010a875bed42bd8dd124b3449743c9a2acf9ba1a2336534dd,2024-08-07T15:17:46.717000
@ -259182,6 +259205,7 @@ CVE-2024-40633,0,0,cb8b1e46d2fb0350ee65397b524eda33b035785c4ff54d8f631326909af07
CVE-2024-40634,0,0,f0b1b04d49b6a98a87295b9d83a3ab2b8cbfe90c15ea00701d78a02066d0251e,2024-07-24T12:55:13.223000
CVE-2024-40636,0,0,98744b954b3d196b3f10d684008952126f958b809a4f56d792514a1180b74df0,2024-07-18T12:28:43.707000
CVE-2024-40637,0,0,8f01e513c3194bcf30056752321b26e2f21549acaed31b1fc0f5890d359b45ae,2024-07-19T14:37:17.863000
CVE-2024-40638,1,1,db82f6838b27a691b85a6743c128cbf9ff57d7ead1ca3f936302168cd35bcc6b,2024-11-15T18:15:27.457000
CVE-2024-40639,0,0,8bbb50b2a25542a9b7af4d56fa6e5b2d2c32a2fc32f95961ce4984af08c80bab,2024-07-17T20:15:06.603000
CVE-2024-4064,0,0,3a1a40467a64f04bfa80ae5c066454b06b4092014a9e47cc1a50eb6eb22d315c,2024-05-17T02:40:14.223000
CVE-2024-40640,0,0,7e1f28a17873c57850e387e604bc4923eccdf39126e84bd67e6dd03b6e2f6417,2024-07-18T12:28:43.707000
@ -259881,6 +259905,7 @@ CVE-2024-41674,0,0,e673b8205e82a534b9a977608e67254dbf60c56054d2121630b866936cabb
CVE-2024-41675,0,0,99d7bb404b6db7a620ac267d34a06ef7dcdda9c80bdd1ecb6c741290a9b47f60,2024-08-23T17:07:28.247000
CVE-2024-41676,0,0,f8c727903895dd3f774fa8fafadf4d13b194d23bd32750d21228bccd7e3862a1,2024-08-23T13:44:42.487000
CVE-2024-41677,0,0,350177b79949244cfbc185c5f18aee412a8902a49d36a53e1d4b50536f1effd5,2024-08-12T18:51:29.497000
CVE-2024-41678,1,1,43bfd773fe0f389d4d2972065648cf80c04ab4504b31ed9b2e85f880173045d0,2024-11-15T18:15:27.720000
CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000
CVE-2024-41681,0,0,6dfdc16b96a5715c67e93e3b8e76db2de56f823b305a3ba2f49e1e9df8ebee6d,2024-08-14T18:37:06.540000
CVE-2024-41682,0,0,b98500d64915be62a0e5e2d6d50336319231d8c45c711d39d83e7568c61fc3c7,2024-08-14T18:37:24.413000
@ -259953,8 +259978,8 @@ CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d83
CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000
CVE-2024-41773,0,0,73b68ae1e3819b7d1bac9bdaf38a7a90512524d32ae7dfbb950bef5b99d479bb,2024-08-26T18:33:07.997000
CVE-2024-41774,0,0,efcbfdf7ce18fcd97c6ecc860adabe2a80f23f77068d5d032fbe380664ccfbc3,2024-08-24T11:15:05.670000
CVE-2024-41784,1,1,4b9bce87b99a4cb8633adeca46d5c13b7e94312b7a819f69309d37321034c793,2024-11-15T16:15:34.240000
CVE-2024-41785,1,1,acdd00f5f60c3a57c055b3330660e51341a71d97fcd9840019eb93d619819ff9,2024-11-15T15:15:07.047000
CVE-2024-41784,0,0,4b9bce87b99a4cb8633adeca46d5c13b7e94312b7a819f69309d37321034c793,2024-11-15T16:15:34.240000
CVE-2024-41785,0,0,acdd00f5f60c3a57c055b3330660e51341a71d97fcd9840019eb93d619819ff9,2024-11-15T15:15:07.047000
CVE-2024-41798,0,0,0376144119ee906fa3756a5ffda1af85d3678e11ad2cbd0913fd4be38d98ecf1,2024-10-10T12:56:30.817000
CVE-2024-41799,0,0,7695f1ee4025235dd7412142131ce8d75a7b17a18d3cf669cff383f93f7dba19,2024-07-29T16:21:52.517000
CVE-2024-4180,0,0,89f84993baa10ab5b41ed58678b5b9e31ff190980a67ee18130266156f7434fc,2024-06-04T16:57:41.053000
@ -260932,7 +260957,7 @@ CVE-2024-43177,0,0,2e91df99c102e520c2bb937f75df1229588c30ac5f4c9282ac32d182ae564
CVE-2024-4318,0,0,3bd63bc61468b7ca3d2d40c33a55eb01fa72ff95d7d5fb5f0e4f8d9b094da54b,2024-05-16T13:03:05.353000
CVE-2024-43180,0,0,abb2e48a138ce8e840850ec2c73107ac445b622170d298531958775b0aa3e8a2,2024-09-20T17:28:06.617000
CVE-2024-43188,0,0,e35d0111e2400440d7a3229650e46565d9a613f599bd61cb8e0041fbf0bfcd3f,2024-09-29T00:24:49.103000
CVE-2024-43189,1,1,8361501fcc1618295692fa4ffcd954b7028fa6b3347368e6559d4521dfeabfce,2024-11-15T15:15:07.307000
CVE-2024-43189,0,0,8361501fcc1618295692fa4ffcd954b7028fa6b3347368e6559d4521dfeabfce,2024-11-15T15:15:07.307000
CVE-2024-4319,0,0,7ca0245a01df3d5ced472265b32f90c6f6a22a37af3715d5589379ecac1f6a24,2024-06-11T13:54:12.057000
CVE-2024-43191,0,0,39f06d3c6ad8405bfc0c97c3e896524beacc5fba902e2cdc1730fdb616dc0623,2024-09-30T12:46:20.237000
CVE-2024-43199,0,0,94150f8459e19abf18625a946d8a507867275817cd3d9928084030fcb7fa8330,2024-08-12T12:59:48.253000
@ -261991,6 +262016,7 @@ CVE-2024-4461,0,0,51250da8bcd9ecf720caf9f3a7efd550d6e47af21e57f982fabb8237238dcf
CVE-2024-44610,0,0,04bd20e65597a0e47eb48d662767349876511b643e2309be49dec3988931a8cd,2024-10-04T13:51:25.567000
CVE-2024-4462,0,0,7de1c10fc651b37d9659e3e60da12a8c072b437874aeb6819554614b6acb9a58,2024-06-04T16:57:41.053000
CVE-2024-44623,0,0,be0881fa228aca782008c2748d4b046bd517031ec8a03bf9e09823e1f811d2b8,2024-09-25T14:53:20.253000
CVE-2024-44625,1,1,8b2d24925ebe1cc1d2ae855254c27874ba2f60efed82a7b89d29dab166144e27,2024-11-15T17:15:20.260000
CVE-2024-4463,0,0,697d96b65b3f5bb41384b58e0f6586cf3caa8378b8edc45503427d4f5bdd2d8e,2024-05-14T16:11:39.510000
CVE-2024-4465,0,0,26ef4c6776c9d416386e05785f538f3827353feee51318ae877b367823cc1915,2024-09-20T13:15:19.850000
CVE-2024-4466,0,0,b7aa09b25d001fa0ca3c8a92093b33e950eb38bf6c988ff6fde91a26b7231c00,2024-05-03T12:48:41.067000
@ -262911,6 +262937,7 @@ CVE-2024-46376,0,0,f3c4758540f2ac7c03838f8eccd3f67c9d25fd080cb7169c664824c92406d
CVE-2024-46377,0,0,dbd66064786bd129c8f0daf0f8e37ec51d021bf976974fef51557cd63106242d,2024-09-20T12:30:17.483000
CVE-2024-4638,0,0,fdd077899626129e208d16f53a9a5482358eca01d91f2895388a2a3863f13467,2024-09-24T17:13:43.997000
CVE-2024-46382,0,0,65cd8f8715b62b5a7598d3b8d6186f6e2f4b087b931ac8f129c8f64b10f1fd55,2024-09-25T16:56:09.927000
CVE-2024-46383,1,1,679a9ac2144cd9e31a21deb625c79a17a5bf284718910987c893d728cb144734,2024-11-15T18:15:27.960000
CVE-2024-4639,0,0,f02b5c58ae5a71f4f7afea4e263ab89427639817f2fb26164569232dacb74959,2024-10-10T10:39:06.410000
CVE-2024-46394,0,0,2516725e4bff704e46174a8f5632e7834a8075c579df9c6725759cf5ecdadeb1,2024-09-25T16:55:15.023000
CVE-2024-4640,0,0,561eb45560c6a2512cf49113a4a8a4e86a4cf3daabba823a155e6305f710bfc9,2024-09-18T15:48:43.557000
@ -262929,6 +262956,11 @@ CVE-2024-46451,0,0,d3a56959d528545e5d37d75143f0c1e0141235a2bd503adf0162594e2e188
CVE-2024-46453,0,0,f2e65264e0b1a5c3ff7f710d8d23db018673f8328ef08ecc489a300ea4d9bf1f,2024-10-07T13:53:04.767000
CVE-2024-4646,0,0,368f6c8b75aa07d035e1b1b12d3ee4faeb304323401bbcc5aa2596217dc42f5b,2024-06-04T19:20:44.390000
CVE-2024-46461,0,0,cc86f5c42464c26c4a36c6d59fbb4ac13932ea21683a14dbd86ef949d78638fc,2024-09-26T13:32:02.803000
CVE-2024-46462,1,1,412241a1e3ea10048c9b2ba97c03ea7b435094221628995ba93dbb1a6eb450aa,2024-11-15T18:15:28.053000
CVE-2024-46463,1,1,cc31280306f54abffe2fdba3f47cc0293a3070e30d773ace6dcf736f09c61578,2024-11-15T18:15:28.140000
CVE-2024-46465,1,1,80e1e0e5e7cd3c509168c0985f18a986cf700538a81b8f6ae79f33e43334316e,2024-11-15T18:15:28.220000
CVE-2024-46466,1,1,1e7d4313b8ccd32630e508af2a3ba08321509ccecff813069da7d2a62ea1defe,2024-11-15T18:15:28.297000
CVE-2024-46467,1,1,8ab1cfde961da426ea1c40bf65dba8b21a433e4bd6350031671a4736141b5ef6,2024-11-15T18:15:28.377000
CVE-2024-46468,0,0,d1dabc49a2c8f6666100b3e113a0965ffec605533a3aa178ac1056f150b98c3d,2024-10-15T18:35:14.680000
CVE-2024-4647,0,0,abfff49b4d0bc1323cd8c136d2663c14e45b73cbc22df4c684f6d02301cae0cc,2024-06-04T19:20:44.487000
CVE-2024-46470,0,0,4aeda2c990e579b9008226e62d5cbdc47a22a0fa6603152064e359fb3aa1bf47,2024-09-30T12:45:57.823000
@ -263382,7 +263414,7 @@ CVE-2024-47062,0,0,c88a3c374fa0eb0b07de5442f40e8a296375128149eedfb948b94e624d430
CVE-2024-47063,0,0,c726e0d37891011bf574e2ada4ecd35149371afeb49fe2d5efae62d1adcff659,2024-10-30T18:24:21
CVE-2024-47064,0,0,5ab2606b47a3954363f47ef08af3365b7f2a07e53b06c729e25edc8cc707330a,2024-10-30T18:23:17.020000
CVE-2024-47066,0,0,0b43b85d84d6edf2581c4495657e290f15385b4237a6d0903f4ed36005e8e711,2024-09-30T18:03:58.750000
CVE-2024-47067,0,1,8929a705056d33f2294d5cbfad444e9ca09934cfd86406b1d0bf38287cb7c1bd,2024-11-15T16:28:48.533000
CVE-2024-47067,0,0,8929a705056d33f2294d5cbfad444e9ca09934cfd86406b1d0bf38287cb7c1bd,2024-11-15T16:28:48.533000
CVE-2024-47068,0,0,264a648ddebf754f99098ce6835c5c225a8b5d43bf206a3d80cb7c7fc0e3a5d3,2024-10-29T16:15:05.583000
CVE-2024-47069,0,0,255d89cbb652b594a7eefdca5524a576b519375e297f09c89870c40566f1ba4a,2024-09-30T13:40:36.460000
CVE-2024-4707,0,0,8435cc27f87132831b9d3f5ec9dd9fe3cf2e85b8b55db14f2e03c7e1023e49fc,2024-07-24T17:59:29.230000
@ -263452,7 +263484,7 @@ CVE-2024-47174,0,0,45d61976806e6f261b6617173dfdd81cff9ff5aea1e4ed00e3593fe1fbbae
CVE-2024-47175,0,0,98b0f302dda13c9ca08be74248115e033049a678f05ea7e4015fd75a9b0cd66d,2024-09-30T12:46:20.237000
CVE-2024-47176,0,0,1236859fb548f3604f95f88a62b235a85b1497f9815e39d76c2bb849d27602db,2024-10-02T20:15:11.520000
CVE-2024-47177,0,0,c3d1fff6e6c651906b3b7b3db7e611572822f47ef60858bd0aa18bbf89a3315d,2024-09-30T12:46:20.237000
CVE-2024-47178,0,0,4b3608cd773dadb192e16beb77fa1e65e8ee51bd05c7dce0427d0f28ff63847b,2024-10-04T13:51:25.567000
CVE-2024-47178,0,1,1bdd2275367d5c24daee09db8a93a56adb2710840ffa9896a6e8530f12ab14d1,2024-11-15T18:05:22.603000
CVE-2024-47179,0,0,d53006137adae685c7c1c2137c456714ed89b092428bbe15520d76109ed40b36,2024-10-02T20:15:11.627000
CVE-2024-4718,0,0,2fda56f630ea417950b3260007ed553b407a44c514b05be289e283a21ee915c1,2024-06-06T20:15:14.717000
CVE-2024-47180,0,0,657c5516ab8b6145e58c8aac2b3c60b2287f164333060e376b2fc3a8acbd6fb3,2024-09-30T12:46:20.237000
@ -263715,9 +263747,9 @@ CVE-2024-47527,0,0,6448adfc6fe781d292ba5a9887205495de1e6ae1fd7107635f3ac2f0d1da5
CVE-2024-47528,0,0,f8a40bc5f3a1abfe246d4cda70316c63fc753979863ed711468abfa611b23cd8,2024-10-04T13:50:43.727000
CVE-2024-47529,0,0,a86e1b3d3c851df630bad3a7b24a37914280a02c935e97aec5b5217c5975635e,2024-11-13T17:15:46.543000
CVE-2024-4753,0,0,9e12d2c068502550c7c14176439a96816e2b604b1703bdae766fcb5d094be144,2024-08-01T13:59:33.903000
CVE-2024-47530,0,0,fed1c84544c0e51056ec77fc5d6317c40fbcbb8ff2284050a11260f26a3d0c29,2024-10-04T13:51:25.567000
CVE-2024-47531,0,0,3c1eac025448da4ef56a64b8782ce45f8d883f9cb11cc38200fa63f6c47d35ec,2024-10-04T13:51:25.567000
CVE-2024-47532,0,0,8782a61a2e6393b4eaa2920ce672fbaf71cd431530e5dbfab9dfea37a0c9da22,2024-10-04T13:51:25.567000
CVE-2024-47530,0,1,c6f97fa84b092a9eb2d48e14ff6f5d7de6955f2fff4d52714e57afe841f02fba,2024-11-15T18:03:06.497000
CVE-2024-47531,0,1,6b496437616d44c1687bfdf7c83e71a8a08a0e7190260cd72e0c9d19f65d8be8,2024-11-15T18:02:14.250000
CVE-2024-47532,0,1,ca603482a4e5336a13d9966dac0aa20f77d073c579719da9b8fe95ac7a0dc7d8,2024-11-15T17:59:51.307000
CVE-2024-47534,0,0,3fdf39e9d60bdd61b891053803d0cdd86e1d9b2f1594fae7730f1f0f0b99a057,2024-10-11T15:15:05.490000
CVE-2024-47535,0,0,63a4302cce4cbc5b98965ded88b399629f71758bc7b059f3ca8923cf2603f89c,2024-11-13T17:01:58.603000
CVE-2024-47536,0,0,353df15c5abe486c0bd2000eeee4b00375b2403ebe72a10be7f49c66f18c4bd4,2024-10-04T13:51:25.567000
@ -263912,6 +263944,7 @@ CVE-2024-47754,0,0,c998ddb7bc3dbcc169b2eae7169517ec00cc08562e1a7f8fb53bdf6d08fdc
CVE-2024-47755,0,0,8cf25d07e196e075734f98083f38dbef19fd8e91fd1c66d640e943585b9e2f41,2024-10-23T06:15:09.873000
CVE-2024-47756,0,0,b16b4f8db45f19a804a745ad54857c0866041580168f803472ffd8044edad7ec,2024-11-08T16:15:28.193000
CVE-2024-47757,0,0,5c3bc84bf0532d52f78dd383d4cc765ee17a323a7f5a7392a8d7f71add2c3618,2024-11-08T16:15:28.343000
CVE-2024-47759,1,1,acaa5f0db80802b75023a1647866e35eab454b244f852df9e8db4b6f687ae962,2024-11-15T18:35:34.290000
CVE-2024-4776,0,0,8d62a3fb449cd595ed01f29a43c4395459263028a3240838c3f471dfed40e010,2024-07-03T02:08:08.187000
CVE-2024-47762,0,0,faf4eb81ce6d805e421dff7a7d50a27f6affd6a56e4bb98171a2180279fc1ecf,2024-10-04T13:50:43.727000
CVE-2024-47763,0,0,0009d92633a66a995666b904976a3f571897c7b107ff706ed2173ff97f66c3ef,2024-10-10T12:51:56.987000
@ -263982,7 +264015,7 @@ CVE-2024-47850,0,0,9d437471ee4f1be7fe8d8f91eb2162f8d4a45526c516c7abe8fcc5930f99b
CVE-2024-47854,0,0,cef81393ed48661f146b05190eb5cd22e800b4711975bd0fc685986ac16438cf,2024-11-13T15:25:13.953000
CVE-2024-47855,0,0,55506bc59fb300d34c632b3a5f880b3df3b3b2206fd15f460c6853ba7eb245ef,2024-11-07T20:35:11.733000
CVE-2024-4786,0,0,bbc8c5b9b549878acd4ee1e5896d7add0ba995b55e84e619083dd37cca26f8f1,2024-07-29T14:12:08.783000
CVE-2024-47867,0,1,61f4df5a4a08eee13ad627f16450273fdbebcbdee4534b2d49b7e1adc602b8a3,2024-11-15T16:44:54.783000
CVE-2024-47867,0,0,61f4df5a4a08eee13ad627f16450273fdbebcbdee4534b2d49b7e1adc602b8a3,2024-11-15T16:44:54.783000
CVE-2024-47868,0,0,b1d3ae34e95c1b5cdfd4777e6cf22588fee5fb92f1e32bee19fdee66c93a7d46,2024-10-17T17:04:35.547000
CVE-2024-47869,0,0,d239f8cdf446e03965c640dcef85e018494089ffa7953a4e5e2539ab04b057de,2024-10-17T16:59:04.703000
CVE-2024-4787,0,0,6e9b8652de9328ef9248746b2fe52f715cb97566c59048ae6277a1aaed304f45,2024-06-20T12:44:01.637000
@ -264102,7 +264135,7 @@ CVE-2024-48059,0,0,f3391fb334843a3fc6d7e517bab31554559de5a31b6bcad37ec348d6020d4
CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000
CVE-2024-48061,0,0,3afb2ef6eba7f21135f7c2c854e268a2fe30714157a06ae965803eb7d12a5161,2024-11-06T20:35:30.633000
CVE-2024-48063,0,0,7dad3075f35e3bd4e2e591484ba350f38d4e17902517b9e5e6279458bc0b207a,2024-11-01T13:15:12.020000
CVE-2024-48068,1,1,06b45b29ce3f821e2db622a6716622dc89ea68129fc83706bd80927d88a3593e,2024-11-15T15:15:07.607000
CVE-2024-48068,0,0,06b45b29ce3f821e2db622a6716622dc89ea68129fc83706bd80927d88a3593e,2024-11-15T15:15:07.607000
CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000
CVE-2024-48073,0,0,410986e3bac5b99d20c35e908ba9e14361ecff8b8737388dcc22bfd8d08857aa,2024-11-12T13:56:54.483000
CVE-2024-48074,0,0,ad38eed7680db70af45f593399c08c1cb64e93854bc7fa5dd06ea3c6cdff4594,2024-11-08T22:15:20.877000
@ -264376,7 +264409,7 @@ CVE-2024-48826,0,0,75c9450df85723c7e5fe507735f7be7d84001c192ccab935bbc0ccf65a951
CVE-2024-48827,0,0,b8784c14c4c0a2af4d656264bee611472f424ecc32bdba68ae4a9cb4ecb6178a,2024-10-15T12:58:51.050000
CVE-2024-4883,0,0,66fd0c7113b75e4613bf51e6b10a097cc5dcf57aa3f97b3df0e5c31c4210be62,2024-09-06T22:46:17.103000
CVE-2024-48837,0,0,f5488c45b5b240917695042772d5a51760ce591b49d83868db6d3f484decff9e,2024-11-12T13:55:21.227000
CVE-2024-48838,0,0,2e9787182617613ac5c5c71a35da89da4e0da1fca7b29929c3f69c43fe9528d6,2024-11-12T13:55:21.227000
CVE-2024-48838,0,1,b9b13e45e7344ebfd4c931bb904861604db282988dc9483dd7d29d8be8b1d771,2024-11-15T17:36:43.520000
CVE-2024-4884,0,0,a2dcec8e16e916f3e6bf44fbf27e64f395ae27ac96c65779b6d04fbf5173b4c4,2024-09-06T22:45:59.233000
CVE-2024-4885,0,0,2608f2aa7fb5189467bda7bb610d4e03f1b43256b775a84e60ba9a3b8ac9b260,2024-09-06T22:44:27.840000
CVE-2024-4886,0,0,d27ca09c7d3a0108a7cfa4692eb479eab6127452085468fbf17d7a45144cc1ee,2024-06-11T17:14:56.323000
@ -264445,36 +264478,36 @@ CVE-2024-48987,0,0,bb1285db59c3075341f96aec62f9b4ce4709041d90082c7f3534792a4d32f
CVE-2024-48989,0,0,58124d2b058d3a194dfa580edaf9984afd1d4350d13e9d1063b31cfbc8902f5b,2024-11-13T17:01:16.850000
CVE-2024-4899,0,0,7d0ca1543842829897b22c32fd7c3ea389ea1c85b28761d045bc30da0b354462,2024-07-03T02:08:16.280000
CVE-2024-48993,0,0,0dab823074732093bc8d73d037071c26077efcc55f0a4da56d7b2a3ff60a512f,2024-11-13T17:01:58.603000
CVE-2024-48994,0,1,f318b3abe51a65c36b34811cd6779d9025e28bb0518b94d3d7c79c7579b1e1e4,2024-11-15T15:40:38.250000
CVE-2024-48995,0,1,c8a152b4d83ebd46a319f38f36cd95f3ce9fdb5043f9229f5986839789db7ebd,2024-11-15T15:41:26.280000
CVE-2024-48996,0,1,63c2449ddf3c17aa92c6f7edb44c8efc93ae248c076045e11c0bc6772ecc2dcb,2024-11-15T15:45:46.920000
CVE-2024-48997,0,1,809a5ae9097510048a583e48fefef3bfec1f102e64cf832ee44a1d74b0d2cd79,2024-11-15T15:46:44.917000
CVE-2024-48998,0,1,70ad12bbf3d2e3a049a22afd48ec9e5148477d4d2bb2bad66ee315a84a6b2057,2024-11-15T15:51:24.197000
CVE-2024-48999,0,1,557ea53a4d5db33249b0ce08f59e4afba8c2445967d6a9a4c87c2b91ac47c81e,2024-11-15T15:51:44.517000
CVE-2024-48994,0,0,f318b3abe51a65c36b34811cd6779d9025e28bb0518b94d3d7c79c7579b1e1e4,2024-11-15T15:40:38.250000
CVE-2024-48995,0,0,c8a152b4d83ebd46a319f38f36cd95f3ce9fdb5043f9229f5986839789db7ebd,2024-11-15T15:41:26.280000
CVE-2024-48996,0,0,63c2449ddf3c17aa92c6f7edb44c8efc93ae248c076045e11c0bc6772ecc2dcb,2024-11-15T15:45:46.920000
CVE-2024-48997,0,0,809a5ae9097510048a583e48fefef3bfec1f102e64cf832ee44a1d74b0d2cd79,2024-11-15T15:46:44.917000
CVE-2024-48998,0,0,70ad12bbf3d2e3a049a22afd48ec9e5148477d4d2bb2bad66ee315a84a6b2057,2024-11-15T15:51:24.197000
CVE-2024-48999,0,0,557ea53a4d5db33249b0ce08f59e4afba8c2445967d6a9a4c87c2b91ac47c81e,2024-11-15T15:51:44.517000
CVE-2024-4900,0,0,2074e15c0050e8989f750822fa85e67702dc13ece861470c246a4c4acb047889,2024-06-24T12:57:36.513000
CVE-2024-49000,0,1,784c045fc0596c9e0642c36b4b8f2ac0ab57e10e1a32b95efc1bf1bdb02864ac,2024-11-15T15:52:08.557000
CVE-2024-49001,0,1,06fd47831380c806b4bee6116a8c985746c5f6952a7e0c3793873d3412bf0bcb,2024-11-15T15:58:36.290000
CVE-2024-49002,0,1,e7f871d3ce352cffc0c373425650a6788d487f9947f789b179ef5ad36c05fdf9,2024-11-15T15:58:14.693000
CVE-2024-49003,0,1,5a592fa72515a983d73d29c561211092a9b91851e5d03aeedc0164ac6df45e7a,2024-11-15T15:57:52.277000
CVE-2024-49004,0,1,d52868406da97d18b407ad1a9fce860ed9e93cff6cd03153aff07ef6455908a2,2024-11-15T15:56:55.917000
CVE-2024-49005,0,1,4e1a42633da9f66381e9eb7fad5b051b9a4cd07b8a8756924c2df8f8a62048fe,2024-11-15T15:56:23.680000
CVE-2024-49006,0,1,239eda227c0a60b6c6e5013994d6fea02af0115bf54bb9d4853d304d22727dcf,2024-11-15T16:03:33.790000
CVE-2024-49007,0,1,4d209a87923d4eb39c2f50646b9124ece07c6ef85100bb37dec22f7045b578b5,2024-11-15T16:03:17.297000
CVE-2024-49008,0,1,4a2d6677dc40eb5691d14bf7cd6591d2473719cc7702de78d1912ce7772b5650,2024-11-15T16:02:22.743000
CVE-2024-49009,0,1,30770ccb7ad68c4e475f1386011b4fadd40c5114fdda7630d72ba718edec2908,2024-11-15T16:02:11.097000
CVE-2024-49000,0,0,784c045fc0596c9e0642c36b4b8f2ac0ab57e10e1a32b95efc1bf1bdb02864ac,2024-11-15T15:52:08.557000
CVE-2024-49001,0,0,06fd47831380c806b4bee6116a8c985746c5f6952a7e0c3793873d3412bf0bcb,2024-11-15T15:58:36.290000
CVE-2024-49002,0,0,e7f871d3ce352cffc0c373425650a6788d487f9947f789b179ef5ad36c05fdf9,2024-11-15T15:58:14.693000
CVE-2024-49003,0,0,5a592fa72515a983d73d29c561211092a9b91851e5d03aeedc0164ac6df45e7a,2024-11-15T15:57:52.277000
CVE-2024-49004,0,0,d52868406da97d18b407ad1a9fce860ed9e93cff6cd03153aff07ef6455908a2,2024-11-15T15:56:55.917000
CVE-2024-49005,0,0,4e1a42633da9f66381e9eb7fad5b051b9a4cd07b8a8756924c2df8f8a62048fe,2024-11-15T15:56:23.680000
CVE-2024-49006,0,0,239eda227c0a60b6c6e5013994d6fea02af0115bf54bb9d4853d304d22727dcf,2024-11-15T16:03:33.790000
CVE-2024-49007,0,0,4d209a87923d4eb39c2f50646b9124ece07c6ef85100bb37dec22f7045b578b5,2024-11-15T16:03:17.297000
CVE-2024-49008,0,0,4a2d6677dc40eb5691d14bf7cd6591d2473719cc7702de78d1912ce7772b5650,2024-11-15T16:02:22.743000
CVE-2024-49009,0,0,30770ccb7ad68c4e475f1386011b4fadd40c5114fdda7630d72ba718edec2908,2024-11-15T16:02:11.097000
CVE-2024-4901,0,0,038977315c18c98069a655ab35eb2b501ae92d62e5deb196337fd2891dd989fe,2024-06-28T13:18:19.407000
CVE-2024-49010,0,1,8dc6769987a70c8e901c43efaedf045ff627b8b5d66588b1cf1d8c71721eb88c,2024-11-15T15:59:36.937000
CVE-2024-49011,0,1,01c749f70821920c3c477877b9d9cfb54346eae8ef76d8020513d0754bda6a6a,2024-11-15T16:16:21.817000
CVE-2024-49012,0,1,929df80ba01c0711e6d4de2e89fa8304d1bf6a8a701e56efd9b6cff04ea88b34,2024-11-15T16:16:05.507000
CVE-2024-49013,0,1,d6e7f65f705950800f1774a16d44e92b41eabeb6640c763d719c65985b489e86,2024-11-15T16:14:55.170000
CVE-2024-49014,0,1,2ae717a1e7a00c91281675e1dd196ebf937d4372aaa95ea483d875af56032c7e,2024-11-15T15:55:46.947000
CVE-2024-49015,0,1,010b13c2c915010b0f12355795a3e7db594c11886ca0722fcb257bddfb91fbde,2024-11-15T16:07:40.680000
CVE-2024-49016,0,1,6e6a3e1e7d43f87788dff79da9bc35781bc8df562605244075a145d65f186874,2024-11-15T16:07:22.397000
CVE-2024-49017,0,1,725144d756c259d6e8e5930241ee20e0430c0d60f2d540c6eb59c09762345d3e,2024-11-15T16:07:03.200000
CVE-2024-49018,0,1,37682cb9b699fa423e654654a1734c21f63fb95a81f3e043a18fcb7be760f973,2024-11-15T16:06:29.407000
CVE-2024-49010,0,0,8dc6769987a70c8e901c43efaedf045ff627b8b5d66588b1cf1d8c71721eb88c,2024-11-15T15:59:36.937000
CVE-2024-49011,0,0,01c749f70821920c3c477877b9d9cfb54346eae8ef76d8020513d0754bda6a6a,2024-11-15T16:16:21.817000
CVE-2024-49012,0,0,929df80ba01c0711e6d4de2e89fa8304d1bf6a8a701e56efd9b6cff04ea88b34,2024-11-15T16:16:05.507000
CVE-2024-49013,0,0,d6e7f65f705950800f1774a16d44e92b41eabeb6640c763d719c65985b489e86,2024-11-15T16:14:55.170000
CVE-2024-49014,0,0,2ae717a1e7a00c91281675e1dd196ebf937d4372aaa95ea483d875af56032c7e,2024-11-15T15:55:46.947000
CVE-2024-49015,0,0,010b13c2c915010b0f12355795a3e7db594c11886ca0722fcb257bddfb91fbde,2024-11-15T16:07:40.680000
CVE-2024-49016,0,0,6e6a3e1e7d43f87788dff79da9bc35781bc8df562605244075a145d65f186874,2024-11-15T16:07:22.397000
CVE-2024-49017,0,0,725144d756c259d6e8e5930241ee20e0430c0d60f2d540c6eb59c09762345d3e,2024-11-15T16:07:03.200000
CVE-2024-49018,0,0,37682cb9b699fa423e654654a1734c21f63fb95a81f3e043a18fcb7be760f973,2024-11-15T16:06:29.407000
CVE-2024-49019,0,0,e08679fc365479f57d65d68203459387c13c3c1dd4e5679713ba188e89b8cabc,2024-11-13T17:01:58.603000
CVE-2024-4902,0,0,41bb791734595d42fd1c69ded99c61dc232bf3972633339d010380dd468a9fb6,2024-10-29T18:07:23.897000
CVE-2024-49021,0,1,85116f14375956c0e17b04e02d70108b9bbae302c7ed7fb6c441a5f54c8f1324,2024-11-15T16:04:55.487000
CVE-2024-49021,0,0,85116f14375956c0e17b04e02d70108b9bbae302c7ed7fb6c441a5f54c8f1324,2024-11-15T16:04:55.487000
CVE-2024-49023,0,0,af47ee9dc5b34537abe1e2a50e9a1a6dd7bec2ff89d9910cf199b8b7e8fc3c1a,2024-10-18T17:01:32.803000
CVE-2024-49025,0,0,35dc42d2dd7a2e760f68b11d7ba7c5916c688fb71c05374f7a2ecaa9b21d3c92,2024-11-15T13:58:08.913000
CVE-2024-49026,0,0,389b45fb365606f0dc850137e89a99d79b49e7936c4d322daa7512c8f2a443d1,2024-11-13T17:01:58.603000
@ -264490,7 +264523,7 @@ CVE-2024-49039,0,0,35081b6450a24914db672b1bfea30c0edc233e94d1f078f8c664cf196464b
CVE-2024-4904,0,0,e08155723dc24ff1bcb5adf9d2f839d33f4e022ac557667a35564764380e5202,2024-06-04T19:20:52.380000
CVE-2024-49040,0,0,be49458de740c9721130038142e1187759fb23950dfc8c806ecf7b0472546f4b,2024-11-13T17:01:58.603000
CVE-2024-49042,0,0,8550e6f45d8ccfb522aabce24120e04e03609dbaf334f8e26399de3cabfb4b51,2024-11-13T17:01:16.850000
CVE-2024-49043,0,1,7687f02e8c033046e84a25a54a1ddfa232890a08944ecd76f708f2aed0f5dc24,2024-11-15T16:05:30.773000
CVE-2024-49043,0,0,7687f02e8c033046e84a25a54a1ddfa232890a08944ecd76f708f2aed0f5dc24,2024-11-15T16:05:30.773000
CVE-2024-49044,0,0,d82fb98a7f5feaaff34665c3e5f2204ad3822610f6571f31342b781d5bf4f678,2024-11-13T17:01:58.603000
CVE-2024-49046,0,0,b644a86688d45b12601d38cbe6e9dc0cb7d8a26a2b34042f583e5aa086f28d23,2024-11-13T17:01:58.603000
CVE-2024-49048,0,0,3478b70374b682b5c968ed62afec830bb0af9b0a095d1ec23b524e486f51e98a,2024-11-13T17:01:58.603000
@ -264732,10 +264765,10 @@ CVE-2024-49525,0,0,28a277ab9b52157a5e4549773b7a8750a6dbb7b4cb916799fff07dd0ec631
CVE-2024-49526,0,0,0871004c04b2341eb737b8d4e5693e458bc7c8461095a71ec5604d2d8a7a3e4f,2024-11-13T17:01:58.603000
CVE-2024-49527,0,0,90add3f65b96eee1f0b9fbf01f92dfd0e4ee77a768256f110d47e754c67f09f0,2024-11-13T17:01:58.603000
CVE-2024-49528,0,0,0e21c50648494dddb2e6f81fb4539064ca26c5177933d85140437daf91d91144,2024-11-13T17:01:58.603000
CVE-2024-49557,0,0,2a5d766ad2ace9ca4473e381728b5667e6cadd8340da6faf7936ed125bc7364d,2024-11-12T13:55:21.227000
CVE-2024-49558,0,0,47432e1f54f695adb17b8dc00f9577022f45f8f0ba5da018a951249b00715362,2024-11-12T13:55:21.227000
CVE-2024-49557,0,1,d5723680a20b941e0b929edc2959b845b0ec9b5d07125e59e1942c5e8991b90e,2024-11-15T17:36:47.110000
CVE-2024-49558,0,1,3c676b75de26a8476d548ed8b3e232d51677ecb4a62749082177600c22312603,2024-11-15T17:35:54.480000
CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000
CVE-2024-49560,0,0,ab312f3dd70e163a5c72b63be519379ba38d0c543c55c0ea8821e33d6ab68e6b,2024-11-12T13:55:21.227000
CVE-2024-49560,0,1,0903f1d2d4b8ea486a494eda9aaa463e3a0d845c10ed5808d6808c17d2b3d951,2024-11-15T17:35:25.407000
CVE-2024-4957,0,0,e3bb8e47c8dfba146bed7647eff25fc6cc8427bb0bd54429262b4324d627abed,2024-07-03T02:08:22.473000
CVE-2024-49579,0,0,0f0dd66a3db0fe299ae55b9b0e6c22f11c400dc3ee27d05103041b63e67e9d3e,2024-11-14T19:24:45.603000
CVE-2024-4958,0,0,15591ba73d7708bbd560fadc0281274b5c7c2c12545797826fbf6e13e1222639,2024-06-03T14:46:24.250000
@ -264845,17 +264878,17 @@ CVE-2024-4975,0,0,d684ecfff12b84901405d8ee54394b9595e6fb8a06328936509cd0d9c15207
CVE-2024-49750,0,0,a4d8c273c7d01e1dcb69ab54945d9fa3ef0aafd14a5615789a19e3567d7b1d64,2024-11-06T14:58:19.993000
CVE-2024-49751,0,0,ff7d052700c88a06f3721dad1b8cfae38c2356a33cba16eba3e8bf2b6f89cf9e,2024-10-25T12:56:36.827000
CVE-2024-49753,0,0,e48f997c3307c7149c72669441f9343576b6be2cbdb15b89775e89497816dbec,2024-10-28T13:58:09.230000
CVE-2024-49754,1,1,3550e73273f425617ed28b59b36a9108486b5c28d588af30eef27d5785caf9d5,2024-11-15T16:15:34.510000
CVE-2024-49754,0,0,3550e73273f425617ed28b59b36a9108486b5c28d588af30eef27d5785caf9d5,2024-11-15T16:15:34.510000
CVE-2024-49755,0,0,b1c1713e62d1c6cff006bddd32caeacb7a00a5abd98bfdd4887a4a4fcdb0308a,2024-10-29T14:34:50.257000
CVE-2024-49756,0,0,17e2aa8675de07a9bb36aad326a0b90c2e6105df968303ed06bc9a1149a476bc,2024-10-25T12:56:36.827000
CVE-2024-49757,0,0,41883c0db2190e07eb75f1500b6be8583d0953bfe5f6820811285d92db2c4bda,2024-10-28T13:58:09.230000
CVE-2024-49758,1,1,b469460ce3b2b26871ada73252ec097b2120dacea45da1951a93146e86a8fd7a,2024-11-15T16:15:34.880000
CVE-2024-49759,1,1,ba9444879a3b53f14c62c77f0b4d72cd1329bbf91a3aad6f19fbe3de6c548660,2024-11-15T16:15:35.100000
CVE-2024-49758,0,0,b469460ce3b2b26871ada73252ec097b2120dacea45da1951a93146e86a8fd7a,2024-11-15T16:15:34.880000
CVE-2024-49759,0,0,ba9444879a3b53f14c62c77f0b4d72cd1329bbf91a3aad6f19fbe3de6c548660,2024-11-15T16:15:35.100000
CVE-2024-4976,0,0,fc4df77a0f9a74699614d42497ce42eb6f6db7897f4ce74b0071ab4cbdb2d9cf,2024-05-16T13:03:05.353000
CVE-2024-49760,0,0,ab1d2b1d3d6f87001d0ec0c674554d145fba544f43978860ab9f315317a9615d,2024-11-06T15:01:01.013000
CVE-2024-49761,0,0,cc77d1f33b16264261b43a7d1baebc02063ded1f31c9ab42da049e2bed05a708,2024-11-05T16:41:46.660000
CVE-2024-49762,0,0,e267f4df9b55b0cddd8b82283d5a577158c52194b354f86421be17fb0c5fcf65,2024-10-25T12:56:07.750000
CVE-2024-49764,1,1,6747ce98a9cc0f5e3f54775a8fffdb9c130835843da49143280334403b418cd0,2024-11-15T16:15:35.323000
CVE-2024-49764,0,0,6747ce98a9cc0f5e3f54775a8fffdb9c130835843da49143280334403b418cd0,2024-11-15T16:15:35.323000
CVE-2024-49766,0,0,555038e30b17856b98b1634207b04f50d3fce08a3c00047a5f41e29a9d10d5d9,2024-10-28T13:58:09.230000
CVE-2024-49767,0,0,b1abfb6c942255ecba6af733c92d4d0cb5e1d316b2b9040982ab9c6769c6893b,2024-11-05T20:03:04.847000
CVE-2024-49768,0,0,d1c7bee24c60a7682e6a57ee28bfb0a2fbc48c379b23053fbff091516cb1e066,2024-11-07T17:28:02.853000
@ -264866,9 +264899,9 @@ CVE-2024-49771,0,0,160fc663912b069ef891129905ae1be73f75e83c8368c487931bd9ae946e0
CVE-2024-49772,0,0,9281743e575857929b74a42ff17b0b9202ae9bb7ed1b47fefe705f7bd0b972d2,2024-11-13T20:19:54.597000
CVE-2024-49773,0,0,e7ad43d5c3fd7b249f682f0b65eb1709f39d3084c0fa75087a4fd4a2decb3591,2024-11-13T20:29:11.297000
CVE-2024-49774,0,0,ebd8a0eea0a53281f5f3ae3a93acb0432e3d9a4208605b56d1016ce02a10c1a5,2024-11-13T20:40:26.100000
CVE-2024-49776,0,0,b98b59521cd715d0ec617d2fd0db152a13cd8254e4dda962c91988b20e09de7f,2024-11-15T13:58:08.913000
CVE-2024-49777,0,0,9baeca1cafb37b9a950e665befe702cbd02f2ad8698e66a79c9b0d29d5965980,2024-11-15T13:58:08.913000
CVE-2024-49778,0,0,958fdd6c4862af8f1bd031bb3fc3cf3c4e3090a99baf545814260a0e74f7bb7b,2024-11-15T13:58:08.913000
CVE-2024-49776,0,1,43181081d16dff1c8572dc7efd12b0623a58d2321b4d135b6857413c0be83101,2024-11-15T18:35:34.550000
CVE-2024-49777,0,1,314466c2b7b0e20ad6728b0e7432b53a78d87374e0a21437c089e38cdba9aa08,2024-11-15T18:35:35.413000
CVE-2024-49778,0,1,b40056776286249c4f0e7d406280c79c53290f21552c8f5c4b72da612431d704,2024-11-15T18:35:36.260000
CVE-2024-4978,0,0,5928c3b846f5437fa931d5f8f8094b6c99b5e796eec27a2a5602f4b07774db40,2024-05-31T16:03:52.247000
CVE-2024-4980,0,0,1d2b61808b4cae121d6a29c34adc83b7ce102dcc100d7578fef807794b8506ae,2024-05-22T12:46:53.887000
CVE-2024-4983,0,0,47e5eccd768078063df4e275a1ffdcd617ddbc2b7b8451c89e2e261cf23ec523,2024-06-27T12:47:19.847000
@ -265324,7 +265357,7 @@ CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab1
CVE-2024-50310,0,0,cdbb51e1b47d1a9497998e60f58fb5fe87ced29e9d042b4c42b3a1b3ac7563d2,2024-11-13T23:15:38.657000
CVE-2024-50311,0,0,a911784e609d4ab74e0290e5d915dbb7b1471b8d97b5435937a13bc8c9811bb6,2024-10-30T18:39:40.617000
CVE-2024-50312,0,0,8b68d956a110cf88efd2db7bdd6fdd3dc5b02186497d9ae2cbca0852915a398f,2024-10-30T18:35:56.753000
CVE-2024-50313,0,0,1f9bfdd78a62f9b5771008b0c7fd93e4e221029be8c4ff06400d9d0c1dd48acc,2024-11-12T13:55:21.227000
CVE-2024-50313,0,1,57c773ed95d19cba8304d961904a015105ffc1450a840dde453d207457fba72c,2024-11-15T17:12:44.410000
CVE-2024-50315,0,0,4cc2faf3d8c489bc195ea9b1b71e3db71fb7f18259f91c4f6bf82e911f7ad06a,2024-11-06T18:15:06.173000
CVE-2024-50317,0,0,3ef7929b8ca37a83862b1a0ddb7f1ecbe9417af55e87d826ab8962ddad2d7d42,2024-11-13T17:01:58.603000
CVE-2024-50318,0,0,7c15c1e7658f71ae931d546a21c8e818b9c8d50f58c6d5d224584bee63f031ed,2024-11-13T17:01:58.603000
@ -265358,12 +265391,12 @@ CVE-2024-50346,0,0,fb25cbb7b8a23f8bc4a8f048afe511d7d942fe5a9bb027a602dbfa956ec82
CVE-2024-50347,0,0,27f16939f93088b46ca4735812513cca765a91a390b88a1aa60491d8fb6217f3,2024-11-01T12:57:03.417000
CVE-2024-50348,0,0,fa8a8e9e48d227df1afdc378e4ee00ffda2dd051bb15c8b477e290549096cb45,2024-11-06T14:49:46.073000
CVE-2024-5035,0,0,592ce94ebba91d65c9cac29085dbc465d14be23d13ac08f1e0101f9ce552a856,2024-05-29T05:16:08.793000
CVE-2024-50350,1,1,fe33fb1c52289387a103d60f99132eed80d6bd254f86a98de7b78a4c941057aa,2024-11-15T16:15:35.537000
CVE-2024-50351,1,1,ae2519e0c7bf4bfda7fca0bf4c148d971d247eeb107cc3d234d0973074b92910,2024-11-15T16:15:35.750000
CVE-2024-50352,1,1,e598f971ea4973919bec33ee98be0b76e78d3b7e47b4e2939d4342c0730209ed,2024-11-15T16:15:35.960000
CVE-2024-50350,0,0,fe33fb1c52289387a103d60f99132eed80d6bd254f86a98de7b78a4c941057aa,2024-11-15T16:15:35.537000
CVE-2024-50351,0,0,ae2519e0c7bf4bfda7fca0bf4c148d971d247eeb107cc3d234d0973074b92910,2024-11-15T16:15:35.750000
CVE-2024-50352,0,0,e598f971ea4973919bec33ee98be0b76e78d3b7e47b4e2939d4342c0730209ed,2024-11-15T16:15:35.960000
CVE-2024-50353,0,0,ccbaa89f0150ad038f7930bf7da95bdebd48b8dd8438583bd87ed80c0a277898,2024-11-13T15:15:19.900000
CVE-2024-50354,0,0,5fe2cfed42eb75a8865a8b156fa958f7af02063c60312ccd6714684eb18cee96,2024-11-01T12:57:03.417000
CVE-2024-50355,1,1,f1ef7d5e8f66469b3931f44256f6bd3ac9c89a211edc6ffbf7eafef6207e5929,2024-11-15T16:15:36.160000
CVE-2024-50355,0,0,f1ef7d5e8f66469b3931f44256f6bd3ac9c89a211edc6ffbf7eafef6207e5929,2024-11-15T16:15:36.160000
CVE-2024-50356,0,0,1007ed397ecbfac0c7e4779187113696b4d36207eb77ee96ff22c8fde6a29757,2024-11-01T14:35:08.330000
CVE-2024-5036,0,0,e97b40bd40cf208c311323e6564cb1ded96d8cc433059436a8705289f1e02a66,2024-06-20T12:43:25.663000
CVE-2024-5037,0,0,46d4a5c4b83922b1ee19bcb8bbc97a0a290a2086fb5a073395bdb9a5e03441e0,2024-08-19T17:15:09.807000
@ -265538,27 +265571,30 @@ CVE-2024-50614,0,0,e4dbc17db42a0c42579ba77a146705a8445a75f90546cb7b4c3dc14d7adb7
CVE-2024-50615,0,0,b7e43b47cd429a59ea1e65cb3383a96641f8d8401c0e7577999bdb52f4f71fe1,2024-10-30T20:35:37.310000
CVE-2024-50616,0,0,e123de96868e8818da5b7d193dee2e816ee0e81fabf6e652a87cb9726aad9098,2024-10-30T20:35:38.380000
CVE-2024-5062,0,0,1dce1f93ce1b9242e76ae9cf090eb76ee6afadb656622c6eb5a578a5eb76013f,2024-08-20T14:14:35.717000
CVE-2024-50623,0,1,ad30148e87f5246daa69bfdb66ae52252255d95d6629024623f3277543bd569d,2024-11-15T16:15:36.367000
CVE-2024-50623,0,0,ad30148e87f5246daa69bfdb66ae52252255d95d6629024623f3277543bd569d,2024-11-15T16:15:36.367000
CVE-2024-50624,0,0,2f6d7cbc06ddd09de063e5bd0feef072f438fbd478c20a099bcf6256ed039f90,2024-10-30T21:35:12.223000
CVE-2024-5063,0,0,3ea00cb3f53084b2393e5a818811e5957f116b348338ce87a59f64292b187a9f,2024-06-04T19:20:57.760000
CVE-2024-50634,0,0,fc2a161c2c755e76311d472b0c0ca48eeb524c368ea8177e76956b97738f2002,2024-11-14T20:40:43.690000
CVE-2024-50636,0,0,2fc9138fa183119876b777928207f426f13352402fa782392dc2b828754f0184,2024-11-12T13:55:21.227000
CVE-2024-50637,0,0,7cb3fd4c2566fc1d1593156e77d24b90af6dfd042618185e839399543b673bed,2024-11-07T14:15:16.780000
CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000
CVE-2024-50647,1,1,2e7f3d7e544ece0ccbd2aaa6f612b5dc159612e5869768624aaaad0a22d84340,2024-11-15T16:15:36.467000
CVE-2024-50648,1,1,30c2e10e651b32960de225f86256bd9fbaacf658adf0001ebfbed0c8c5c26fc0,2024-11-15T16:15:36.547000
CVE-2024-50649,1,1,7d22823a31c69e206ba178b089c551e50e81d6f9ee0c9cb53f27845845392f2c,2024-11-15T16:15:36.637000
CVE-2024-50647,0,0,2e7f3d7e544ece0ccbd2aaa6f612b5dc159612e5869768624aaaad0a22d84340,2024-11-15T16:15:36.467000
CVE-2024-50648,0,0,30c2e10e651b32960de225f86256bd9fbaacf658adf0001ebfbed0c8c5c26fc0,2024-11-15T16:15:36.547000
CVE-2024-50649,0,0,7d22823a31c69e206ba178b089c551e50e81d6f9ee0c9cb53f27845845392f2c,2024-11-15T16:15:36.637000
CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000
CVE-2024-50650,1,1,5bec41adc57062c51936e8c337bf1e936a3ecb43832b17672528a8666a80227d,2024-11-15T16:15:36.710000
CVE-2024-50651,1,1,4bf05b042e73c0bfe89a5dc5ae8bb550ea2493dde13bd6ee166a1ac311cf9dc2,2024-11-15T16:15:36.783000
CVE-2024-50652,1,1,4c6e0ebe8d90d732657f125730d362693c1bd46064ac0d862788dfb71947eb2e,2024-11-15T16:15:36.863000
CVE-2024-50650,0,0,5bec41adc57062c51936e8c337bf1e936a3ecb43832b17672528a8666a80227d,2024-11-15T16:15:36.710000
CVE-2024-50651,0,0,4bf05b042e73c0bfe89a5dc5ae8bb550ea2493dde13bd6ee166a1ac311cf9dc2,2024-11-15T16:15:36.783000
CVE-2024-50652,0,0,4c6e0ebe8d90d732657f125730d362693c1bd46064ac0d862788dfb71947eb2e,2024-11-15T16:15:36.863000
CVE-2024-50653,1,1,04aa223670ca8ac7e6e42eb750922eb1eddd03b40c75ac69ba2037e986b202fb,2024-11-15T17:15:20.417000
CVE-2024-50654,1,1,08c547c72106766138db6ec1da1c94ff7787e165e8917a63881abe77d6f40591,2024-11-15T17:15:20.507000
CVE-2024-50655,1,1,da0d9e781c2b1c6164c6a6f739060bdc8f25ef4722f41360417dac50f1ba609e,2024-11-15T17:15:20.613000
CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000
CVE-2024-50667,0,0,0dcbd7b35b311fe7a681d780dcbe2293327603709e31a27594acb760866d084d,2024-11-12T17:35:12.270000
CVE-2024-5067,0,0,7a5f09523c1a14d6651905f1f8853395c32eebb526caa99a81fddc9a443e16ea,2024-09-05T17:29:32.287000
CVE-2024-5069,0,0,9472ccb93cc67e368452ccbd7690fcdac2e9c6bf3a0a4c1febdda7b23dc05b96,2024-06-04T19:20:58.080000
CVE-2024-5071,0,0,1e84a840bf7fe6d05a333c61daff03721e2399762594abd260e8b415b74d49eb,2024-10-28T21:35:22.430000
CVE-2024-5072,0,0,b208332fdeb0349d564f3ae12700e597664b77bbcd409305187f03a8e1be9ee8,2024-05-17T18:35:35.070000
CVE-2024-50724,1,1,5876d658fd18659eb21f77ce4b57af6281fab952c0298d4065af6f6407d660a7,2024-11-15T16:15:36.943000
CVE-2024-50724,0,0,5876d658fd18659eb21f77ce4b57af6281fab952c0298d4065af6f6407d660a7,2024-11-15T16:15:36.943000
CVE-2024-5073,0,0,84e84c9e85d38ba2ba8fcac94cd632adf73ebd62caf103a5afc104149a6ce671,2024-05-30T13:15:41.297000
CVE-2024-5074,0,0,323ff3e4be9a1a01795a645c087210e0124e3c1100808fef1bff4cc986dff48b,2024-08-01T13:59:39.780000
CVE-2024-5075,0,0,3a68f5400be3fd65933ca2b54d2fe1b2cd42ebfc5586417b08ab71b3ebef46c2,2024-08-01T13:59:39.960000
@ -265567,6 +265603,7 @@ CVE-2024-50766,0,0,af3ada3641e5f900c68c3d98d58b715ce7a7d6da5b4d545f2ac59e163c2e3
CVE-2024-5077,0,0,58d61679dec16d0807ee3c6d8f70abda23dd3b8ef542c3a47286601f3d544039,2024-08-01T13:59:40.333000
CVE-2024-5079,0,0,03cab751fae6538cdd3ee0f9a467090b1b9dca8ded972c9a24812d90a2b62ab7,2024-08-01T13:59:40.517000
CVE-2024-5080,0,0,88ae00b43e12b64ab9ecc2d4c4ea1fe4d89b86d4c131aa05e4a989c5a4e3b207,2024-08-01T13:59:40.707000
CVE-2024-50800,1,1,9d292a12bf13cfbd45587c76c8936ec43dce5f2b439c7abba13d6cb654cf82c8,2024-11-15T18:15:28.727000
CVE-2024-50801,0,0,b02fd2a4d914f47ebf18861bef14a429b26208dd8058232ee786f89bcea879c0,2024-11-04T19:35:13.810000
CVE-2024-50802,0,0,8492f5be24f5ad2918f47970062e4bc2c1c3f432ad972af1d330cb18adac5b2e,2024-11-04T19:35:14.907000
CVE-2024-50808,0,0,1a667410201903fdc8230c48df98057d6516bd370b3a4500e5037005f86c9f20,2024-11-12T13:56:54.483000
@ -265623,7 +265660,7 @@ CVE-2024-50970,0,0,2e7889cd3277e474e337527bd160fa64940d7885ad18ecb1fd92dbeebea4f
CVE-2024-50971,0,0,848df10022c9f75f1c9b9af05147f0923c3bc4a87738961451f1396fe9fbaab2,2024-11-14T14:54:33.787000
CVE-2024-50972,0,0,4e8fb2dd82bb709cf8c210bd21d32873aff8eb306d7b228bf00eb024671ceb3b,2024-11-14T14:55:08.567000
CVE-2024-5098,0,0,51bb68a404444dbad57c4444d3880f6dd34c8b10fc09ab7783a9da02fb8f5608,2024-06-04T19:20:58.887000
CVE-2024-50986,1,1,949bd035da5362255ed7ac7c9edff0cc7fd8e202111ff0c1f3097978f8821437,2024-11-15T15:15:07.773000
CVE-2024-50986,0,0,949bd035da5362255ed7ac7c9edff0cc7fd8e202111ff0c1f3097978f8821437,2024-11-15T15:15:07.773000
CVE-2024-50989,0,0,539ed9c0a64887e69fa9cae96035a115db3a8a96afe0045140278b0fb7737495,2024-11-12T18:35:31.437000
CVE-2024-5099,0,0,c449033239abbf7fd2bba4f64694ff77374623f364f0fa141d0a92a151a3ab2c,2024-06-04T19:20:58.993000
CVE-2024-50990,0,0,3537d7668a1d8721c4b70a753dc5bd5ceae4b32dbcc1547432740e88301eb02f,2024-11-12T20:35:16.907000
@ -265702,7 +265739,7 @@ CVE-2024-51152,0,0,2fc415b0efc6d5417097e1245b382b91c976aaa5917a1040e7761d3f03c4c
CVE-2024-51156,0,0,ab531e15c589d8d218306e8fd6a6995b5bbbca61f7ac15e609aad877e064595a,2024-11-15T13:58:08.913000
CVE-2024-51157,0,0,15c268449f10cd3f5e2b0f898333f8df5f6a7a275257a0f4491ba5cb90f1b17e,2024-11-12T13:56:54.483000
CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000
CVE-2024-51164,1,1,b9f1776fc3ef4840650c14e1a3f3e7dd8ac91dd3773b241274f401af13a4a1cc,2024-11-15T16:15:37.057000
CVE-2024-51164,0,0,b9f1776fc3ef4840650c14e1a3f3e7dd8ac91dd3773b241274f401af13a4a1cc,2024-11-15T16:15:37.057000
CVE-2024-5117,0,0,8f71e5dda3348556d6b06143dcd47b79229dad0468d30aa7c38f8c5c1ecb8524,2024-06-04T19:21:00.547000
CVE-2024-51179,0,0,1ac36b7f8ecbb6442c3e82b8bfc190a784ef1fdb6227f3a1da3d4126f204bf98,2024-11-13T20:35:10.303000
CVE-2024-5118,0,0,ede24973ef1505b96fcd3c614d177bf90baaafde820cda4461fa6280b3c2b455,2024-05-20T13:00:04.957000
@ -265730,7 +265767,7 @@ CVE-2024-51246,0,0,aa194fa853a376377fe6819071cfa2916e0d00edaefe6d104071b5230b5ba
CVE-2024-51247,0,0,6f763214fc728651cee8f49e7f9d3466af02b1a87bcb320803295d2391bcc8af,2024-11-05T19:28:25.143000
CVE-2024-51248,0,0,24dce655c534c26b0b67ea327bc58bc6e5d7937e725965feb96bf75ba11def28,2024-11-05T19:28:29.730000
CVE-2024-51249,0,0,23dd85f23924e75ce199438298671d7b20ece05b7ee21f636e4f3929eb3f65e7,2024-11-04T18:50:05.607000
CVE-2024-5125,0,1,f1ae9e54b9f94555190f44a209aeee1e2465c5a5c1bc0183d9c12898cc0fe1e7,2024-11-15T16:35:09.290000
CVE-2024-5125,0,0,f1ae9e54b9f94555190f44a209aeee1e2465c5a5c1bc0183d9c12898cc0fe1e7,2024-11-15T16:35:09.290000
CVE-2024-51251,0,0,63152562fe66f261ed3205b0767b9a859ea9c0ff927b599c5c96705e6967a8f8,2024-11-04T18:50:05.607000
CVE-2024-51252,0,0,bf357f6855609c81237cb444d332859dc7316dc50aaeed6006dd85a3ea82ebf7,2024-11-05T20:54:38.960000
CVE-2024-51253,0,0,bd6b7c4e24728199770eb9a14af1e277c7168d7d6f853e011077c74df42885e3,2024-11-04T18:50:05.607000
@ -265808,10 +265845,10 @@ CVE-2024-5149,0,0,35aba13432990695b4ab26ada33d31578be519ff456b8edf807a15027d0b18
CVE-2024-51490,0,0,ce278c5bd11182b0f76e1306bfd4f5475ffe3bef255b34a2e09a247de41ed216,2024-11-14T20:13:01.587000
CVE-2024-51492,0,0,0a58c7013d2cd1abea36461b62b0843b3a8fe747b96ce2f6ac388e3c542b0b6c,2024-11-01T21:15:15.080000
CVE-2024-51493,0,0,905ca061a7e2249944cb0aec37c9054b75e237343bc05a733cf47492ea8f9f1d,2024-11-06T18:17:17.287000
CVE-2024-51494,1,1,3bf3dc12c3275774bba61fd80cb9b469c3d1558c31dcf555fea4131d1a96dff7,2024-11-15T16:15:37.140000
CVE-2024-51495,1,1,e5f07f08dba079d6dbed1b9bb4b396d9f02dcfcea5a5cfc1d096beea8d8ada12,2024-11-15T16:15:37.343000
CVE-2024-51496,1,1,74cb6333739e3cc4c8e4c5764cfdffa2904217e6fbc34f4ca72b325e67ebd30c,2024-11-15T16:15:37.553000
CVE-2024-51497,1,1,a39c34b7cc7817251d031d66b8a932ec72bf7d572c96a4983b8eae763d06c98b,2024-11-15T16:15:37.770000
CVE-2024-51494,0,0,3bf3dc12c3275774bba61fd80cb9b469c3d1558c31dcf555fea4131d1a96dff7,2024-11-15T16:15:37.140000
CVE-2024-51495,0,0,e5f07f08dba079d6dbed1b9bb4b396d9f02dcfcea5a5cfc1d096beea8d8ada12,2024-11-15T16:15:37.343000
CVE-2024-51496,0,0,74cb6333739e3cc4c8e4c5764cfdffa2904217e6fbc34f4ca72b325e67ebd30c,2024-11-15T16:15:37.553000
CVE-2024-51497,0,0,a39c34b7cc7817251d031d66b8a932ec72bf7d572c96a4983b8eae763d06c98b,2024-11-15T16:15:37.770000
CVE-2024-51498,0,0,a215c64a461c357224f24d4e16a3f3f3214ac081278e197bc9556945ad303f5e,2024-11-05T16:04:26.053000
CVE-2024-5150,0,0,af277f2642e60b6f0769d64573990279b6b64286b8d76d1359b09a52e223643b,2024-05-29T13:02:09.280000
CVE-2024-51500,0,0,42c2a285903076a2664ebb01d93e2fe7be0196e6180cfa0174e85e23f0ae008b,2024-11-05T16:04:26.053000
@ -265879,7 +265916,7 @@ CVE-2024-51581,0,0,092e2530027eae5b98691ff622c8b4e7c7c051dbeea02ee3ce6c68d4ccbeb
CVE-2024-51582,0,0,9c6a2abc6ff39ea954384c7b38779cdbe6d44511f3a75194c8ab9223c55c709b,2024-11-06T15:47:13.077000
CVE-2024-51583,0,0,010a1e766cc75cf146f9c46f237fd66f102136959cced374ac920d84a09d74b4,2024-11-14T02:17:13.323000
CVE-2024-51584,0,0,9c4a52f0d53ee42578cceb9af71c252fa973eb5d3948982134b3891bd8f24f09,2024-11-14T02:23:33.777000
CVE-2024-51585,0,0,f8f0159c16016c8277cf65597d8f99b43d67be3e4576e769b2c2d94060d5ff5c,2024-11-12T13:56:24.513000
CVE-2024-51585,0,1,0bc0ac1464e29ee44df8444d7c4cdb63f1fa2b443bcb1af0569bc42ab7621110,2024-11-15T17:17:47.730000
CVE-2024-51586,0,0,a8972424c5984945ec92c9d745b8e4e19d8648e53cf9bf4412423a5729e18a26,2024-11-12T13:56:24.513000
CVE-2024-51587,0,0,5012d2ea8e67b5c3d09827ef519aa6163b1c4ce17e7784b8af6d96ad392aa639,2024-11-14T20:26:14.467000
CVE-2024-51588,0,0,70526e1ab4d1d5c15696a10cecb0303b3b1171b870de0da3e9c134310aec09dc,2024-11-14T20:26:28.047000
@ -265887,26 +265924,26 @@ CVE-2024-51589,0,0,f74ef05c06e608fec4a8cb8e6637837c5709985a6e45866d77121ef9596fd
CVE-2024-5159,0,0,6487690749e64572084b0b1ffb84b7950e8b682c3129ca3d21d0dbc204e9ec91,2024-10-25T19:35:15.010000
CVE-2024-51590,0,0,2b2dd3629e58a1a0a584c789ff16e47b54d755aa79cd57fc09a49fbe103244b5,2024-11-12T13:56:24.513000
CVE-2024-51591,0,0,726468de391ad91b93d7baa9a968a1009926515da7cdc024a9ffcb433fe899c7,2024-11-14T17:51:14.717000
CVE-2024-51592,0,0,d7967d1b981bf412d08b0a25269c7d321b022b9cea0f3a4b67df42b6afa94a25,2024-11-12T13:56:24.513000
CVE-2024-51592,0,1,6dde9559fc706856c16fa16d5ca27161b15508ec6dfbe02d9bb0b204646f1a04,2024-11-15T17:04:52.197000
CVE-2024-51593,0,0,0b8922825fb0b901603d2f67d3b43c5b8e0349818c9523e9ebd1542dcf2e04bf,2024-11-12T13:56:24.513000
CVE-2024-51594,0,0,6349168b6c38502c80c5202765ac4a54912ffa4126b37a3166a4be8b98199c58,2024-11-12T13:56:24.513000
CVE-2024-51595,0,0,86c632a830d98810cba6685fef0932835324b783d480bd1e19dc70d238e88d12,2024-11-12T13:56:24.513000
CVE-2024-51596,0,0,68d56f326e86c174368dc8e5c4f277c0b65894f0149206735201856a3bb51840,2024-11-12T13:56:24.513000
CVE-2024-51594,0,1,23c2bde634ef42108d5f97125b3187b82c0cbc626b82203b6c3273a5f7560ce9,2024-11-15T17:15:21.580000
CVE-2024-51595,0,1,10c393f98a067c2f8e99f7ad9b6b4c58d89c36bcb5b68d6536bed94af2eb5437,2024-11-15T17:03:07.770000
CVE-2024-51596,0,1,01788e96d18557d9efd5f3a1c0cc87c5c59abd37f0da1cf910d07664ffc536c3,2024-11-15T17:01:15.687000
CVE-2024-51597,0,0,e580da6df611238773fd113640aa155cd0ddae703c31494078adb66dd981bd48,2024-11-14T20:27:46.943000
CVE-2024-51598,0,0,ab45aa537bf288c8af2bb6366c2e9a74b71582c9d0d27efbfe545b94537181da,2024-11-12T13:56:24.513000
CVE-2024-51599,0,1,7acfc4d03f6c4e0241e4f801826852b96d8755f6240b0f8a5702939c52f7cc5a,2024-11-15T16:55:34.480000
CVE-2024-51599,0,0,7acfc4d03f6c4e0241e4f801826852b96d8755f6240b0f8a5702939c52f7cc5a,2024-11-15T16:55:34.480000
CVE-2024-5160,0,0,761bdadb9ac3f89d156978519ca326c5704c62592c7f03e703ecc7e802a865d7,2024-07-03T02:08:36.807000
CVE-2024-51601,0,0,1c0dbdb8639065f7f5ea5f6062d0125a4c4ce4b0c601912e96fe5db543ebfd2a,2024-11-12T13:56:24.513000
CVE-2024-51602,0,0,822f9c86566535e8535c86995cf3af8d3cfe52baf5520ff85e767e1c3e7259ea,2024-11-12T13:56:24.513000
CVE-2024-51603,0,1,a730746ec59538833fb1b8d30890055ac7925dfae1cdd77b4fda1967b595a281,2024-11-15T16:24:18.843000
CVE-2024-51604,0,1,6a3e4a9375291be744614b2d5906671c19d1fe09996779b8dae193cdb2d50254,2024-11-15T16:19:11.063000
CVE-2024-51605,0,1,1ef48abb0eb49926eef25f707be1d8bf237a6deaa1172eb4cd87e118f053e35d,2024-11-15T16:31:12.773000
CVE-2024-51603,0,0,a730746ec59538833fb1b8d30890055ac7925dfae1cdd77b4fda1967b595a281,2024-11-15T16:24:18.843000
CVE-2024-51604,0,0,6a3e4a9375291be744614b2d5906671c19d1fe09996779b8dae193cdb2d50254,2024-11-15T16:19:11.063000
CVE-2024-51605,0,0,1ef48abb0eb49926eef25f707be1d8bf237a6deaa1172eb4cd87e118f053e35d,2024-11-15T16:31:12.773000
CVE-2024-51606,0,0,ee1e7a1b1dbbb608910d3a1a8045750337c3795b4002cbbe921c849cc6ea0c49,2024-11-14T17:17:28.997000
CVE-2024-51607,0,0,6430a32ad0ccdbe2b5e85b260802defe649419f41be04507feb4e50aaec51a17,2024-11-12T13:56:24.513000
CVE-2024-51608,0,0,fa8c1f71c1313549b1f07e9b16bbcd2db8cf2a03813dee88669910ab58470fe5,2024-11-14T17:14:55.070000
CVE-2024-51609,0,0,56872967e7644d93195c5d54b9b6037222a1a65a36a397a829075693cfee2bc9,2024-11-14T17:10:36.463000
CVE-2024-5161,0,0,f120c7db938e25c7983d6c400da502880d5ffbc93ab4e5e05351c3fca8fbd038,2024-07-24T17:54:42.387000
CVE-2024-51610,0,1,7648a3f8f67777cb52a0face6e2d46430e2e9cd0bf8a7468c0457d04e5d93ed9,2024-11-15T16:32:46.277000
CVE-2024-51610,0,0,7648a3f8f67777cb52a0face6e2d46430e2e9cd0bf8a7468c0457d04e5d93ed9,2024-11-15T16:32:46.277000
CVE-2024-51611,0,0,df71ebdad6b83784c059a213dbfeff0cd4ad4cfa07621a54c78ae28de90b182c,2024-11-12T13:56:24.513000
CVE-2024-51612,0,0,68d292e6c4edc9ad2cb6a4f4df85c4beb58f5e75eb303880d4a399c88b63d1b7,2024-11-12T13:56:24.513000
CVE-2024-51613,0,0,e5e09d28c859e2362905d8484d126a9fa39bc52028d1cd16464bb2210975b217,2024-11-12T13:56:24.513000
@ -265932,7 +265969,7 @@ CVE-2024-51658,0,0,435f4fb63039956e91b2b852b51372b029bcbaead7356ecd935124297917c
CVE-2024-51659,0,0,78d45b532178a143b0c2b377e8ea9093595088b2434d4e401a5f34f0a4ad9452,2024-11-15T13:58:08.913000
CVE-2024-5166,0,0,5c544eab21844e01fabd3874ed7776a55145987bd3a510311ad16f12f33bd2bc,2024-05-22T18:59:20.240000
CVE-2024-51661,0,0,7f81708d1fd43600536029afc897b01b4855aee3d2fe39c5692b8132139274de,2024-11-08T15:02:08.660000
CVE-2024-51662,0,0,f5359332d7a9d4e37aab99663d0e73af1a60912d65021c3415523622490d6f78,2024-11-12T13:56:24.513000
CVE-2024-51662,0,1,55b3b930a708e0b1f39e971bf0a8031fc7194c46e2d846ee33949a5396059d6a,2024-11-15T17:16:49.063000
CVE-2024-51663,0,0,ddfbfefbc7a60682ba4fd5adc3f91d6c6ef86922dae3505b62e59555b1a68629,2024-11-12T13:56:24.513000
CVE-2024-51664,0,0,f57811c0abc589cff3297f759189abd0529924ea2c107b407c1d4b0c093360b5,2024-11-12T13:56:24.513000
CVE-2024-51665,0,0,836ecda2a38ee75dca042d09339ec8247ed79262a6a8d01bd25035a2e84a5ce0,2024-11-06T22:07:10.707000
@ -266051,7 +266088,7 @@ CVE-2024-5185,0,0,0c09010aee9423412314c9f1cbba57fc2fd9ee19c760646e6502f5738cacb7
CVE-2024-5186,0,0,7baed0c201f742c44896dec767d6237c8df7ae961ab3d7ec09eb8b65736716f7,2024-09-24T14:04:47.170000
CVE-2024-5187,0,0,88fb29ce759c452b913d57a873a63220e31c82d475ca2c84fa3b804bf9736023,2024-10-23T13:36:11.643000
CVE-2024-5188,0,0,b2a939863f7779e6dba1e0e2aecd4047c60710495b7cac734003aec732566505,2024-06-11T17:41:17.087000
CVE-2024-51882,0,1,5d194411246929bd7d2c565494fb6c4858f77dd0f83ada9b5feee4075b6dc33c,2024-11-15T16:08:40.333000
CVE-2024-51882,0,0,5d194411246929bd7d2c565494fb6c4858f77dd0f83ada9b5feee4075b6dc33c,2024-11-15T16:08:40.333000
CVE-2024-5189,0,0,87ea6bb70c0f4e8e0e95d6725175819a83c6ff33cc484fc5f525db9ad5e385e9,2024-06-13T18:36:45.417000
CVE-2024-5190,0,0,d58b9fdaecdb1abec20ccf7764e52a460a4959870ee8917a6c4a9f4c686657e6,2024-05-22T03:15:08.273000
CVE-2024-5191,0,0,855a566258b8b88a588ebc49e507f9db3fa3e450b83819e0fe6599e7fdad210b,2024-06-24T19:25:23.943000
@ -266157,13 +266194,13 @@ CVE-2024-5234,0,0,14a09ab7485c5dff6a0e2d37ff7f584b26da4a8cf075e00d5ab541632ac32b
CVE-2024-5235,0,0,98bbbe6acfd408ea35eab71055bef5859edfdf3c3c90f82fa44b5b2f0c597f28,2024-06-04T19:21:03.207000
CVE-2024-52350,0,0,e1972ef2ed811c153b13903abf6cdb344f717306ca9175d9381f4d30088fc38a,2024-11-14T20:22:24.387000
CVE-2024-52351,0,0,bc8a69483160ec6542284bd2a28a21525e92c209bc39a02aab3ce5329e7f65b5,2024-11-14T20:24:39.083000
CVE-2024-52352,0,0,d000632140f71e44e942a3dbc2ddd9260fa470cb96bef8ac5f8ba3eea1f0382e,2024-11-12T13:55:21.227000
CVE-2024-52353,0,0,8f6fdbf8162ece41a08a7cc2a2dc9e5249ac6195297b0e830ced0d3f4bc5c84a,2024-11-12T13:55:21.227000
CVE-2024-52354,0,0,bd5ed3d68271f155fc3112a493679226950394a406d6f8e4021a12bfa7a3c4fe,2024-11-12T13:55:21.227000
CVE-2024-52355,0,0,ab138c81f8a6c2d78d8bf3737e35a8422aee1976da0dc3f8a86c63b65d3787dd,2024-11-12T13:55:21.227000
CVE-2024-52356,0,1,851c201d7c2106e058116183f3ef13ac524e944c93e92a0be8b5c856c91b9b6b,2024-11-15T16:05:12.367000
CVE-2024-52357,0,1,1972e22f599a1fd1b8d4152d07239a706a9c53ad0eb79683c3aab852fc4e443e,2024-11-15T16:04:45.767000
CVE-2024-52358,0,1,64a4a904a23151aab1b11ae172d146919fa43e3b57b368f1c78e5557900f2543,2024-11-15T16:17:40.127000
CVE-2024-52352,0,1,c96622c29cd330895f9beb2fe9ff89da9b80f902c68b78e2f7d6103ce4614e24,2024-11-15T17:46:27.217000
CVE-2024-52353,0,1,daef8ce50caff998506ffd0fef6c59a46e385066c4d0e0cadd19145c5978f5d1,2024-11-15T17:49:31.553000
CVE-2024-52354,0,1,7638d121a9657b0fa58bc3a68518ed0b3c2d06f335789558b0998388971e1384,2024-11-15T17:50:59.703000
CVE-2024-52355,0,1,9f82a4c6a6c3e61ee91aee7a03bac939ee5b60c2e6aff9270e8dd90a90f029dd,2024-11-15T17:51:44.273000
CVE-2024-52356,0,0,851c201d7c2106e058116183f3ef13ac524e944c93e92a0be8b5c856c91b9b6b,2024-11-15T16:05:12.367000
CVE-2024-52357,0,0,1972e22f599a1fd1b8d4152d07239a706a9c53ad0eb79683c3aab852fc4e443e,2024-11-15T16:04:45.767000
CVE-2024-52358,0,0,64a4a904a23151aab1b11ae172d146919fa43e3b57b368f1c78e5557900f2543,2024-11-15T16:17:40.127000
CVE-2024-5236,0,0,3a876190aab882c0110e09fef49a5c72516897cda47bddba2de12251cfa9a5e8,2024-05-24T01:15:30.977000
CVE-2024-52369,0,0,9bb6355bce4a4436b67b89be0df4c04ac56d16c7e0beb82cd7d9fa08a46a5e50,2024-11-15T13:58:08.913000
CVE-2024-5237,0,0,8803efe45da93d97b55082adbd1bb29281c1282514c20ec3608a648081cd56be,2024-06-04T19:21:03.317000
@ -266198,10 +266235,29 @@ CVE-2024-5248,0,0,6cfa5cec6de457c13d7096887dc7c2d8bd99f0e898238886822e69d1ee6603
CVE-2024-5249,0,0,7881e207dd06fe76500d559735f87b1084a494789351514ee988debe74e79673,2024-10-01T14:26:17.410000
CVE-2024-5250,0,0,b4b370273f1fe30d94b715ad219dda570a7dcb84192abd50c3cb746299bdbb93,2024-10-01T14:33:47.727000
CVE-2024-52505,0,0,7c58f328eee3b40bfcef13b278250e7509b58c18af26b7fe642ca2ce116c61a9,2024-11-15T13:58:08.913000
CVE-2024-52507,1,1,125f6e76ead970265ccbf72b03c073e885a41a8afed378315ad0eb723198acc7,2024-11-15T18:15:28.847000
CVE-2024-52508,1,1,d6130dd73205c2d46831c1d437b1c635c8d9ad98fc719be06f29835d91ebc3b6,2024-11-15T18:15:29.060000
CVE-2024-52509,1,1,a363fa464af35ac67493cdafcaded0d43fc1d98dbc897995ce1110859374e370,2024-11-15T18:15:29.280000
CVE-2024-5251,0,0,7d84d2df7bf6674f7d634954defb2f38b0363c19ae19f78012df0aa633abf27a,2024-07-19T15:25:30.980000
CVE-2024-52510,1,1,cc7d1ba4832e566babce4719fad7f982f1af06b53a3701790303c04d7ff7f69b,2024-11-15T18:15:29.497000
CVE-2024-52511,1,1,15a6ba2d4b341b2d290edee9136ece82582e18ea391c5106374d99a2c4c8a40c,2024-11-15T18:15:29.717000
CVE-2024-52512,1,1,6a63c39bd17573ecb0c00b9d4a77014e067a4b6f563641db935489603a22e52f,2024-11-15T18:15:29.933000
CVE-2024-52513,1,1,b77daa0a56ac4001634f9d8555d15be1089bfb834ae881cb5e9a31ddd82f2bc7,2024-11-15T18:15:30.157000
CVE-2024-52514,1,1,8473a595428b93d2147902d8b67b70903474e0a95b272cccc2ccd88e17eddb8d,2024-11-15T18:15:30.370000
CVE-2024-52515,1,1,01803eef0486d96e7b73173ce83da53fc736e13641607b187afa0d24eefa62ff,2024-11-15T17:15:20.837000
CVE-2024-52516,1,1,75e66465effc3863e439bb3f53f56098ce6985454a646030523f9b1919e4994d,2024-11-15T17:15:21.070000
CVE-2024-52517,1,1,ef287e5e3c0bc63233aaef19833d59a0a3b70f6f88c5fd6f9dbbdce130c37eff,2024-11-15T17:15:21.297000
CVE-2024-52518,1,1,6ebb5f9b29d8be57def26bafc7d4c9a9037ed95795b8a27881e57a224525b49e,2024-11-15T17:15:21.543000
CVE-2024-52519,1,1,ef167401ae9fc01ccb1f13f70e64122366cb19a9418bcd255bc301ab8d4f7f92,2024-11-15T17:15:21.843000
CVE-2024-5252,0,0,1b28d536afc88eae5088fe06ff49428bbad5ffcb2aa7139fe40c4c06d2601422,2024-07-19T15:29:35.447000
CVE-2024-52520,1,1,4de7d2e7a45bd842065c15f5be2bd96578b919552715d69160c2096043d8c3e4,2024-11-15T17:35:16.007000
CVE-2024-52521,1,1,faa46aebbec3a6f9761c605df33640c3789d02a577af493da0314de121761d4d,2024-11-15T17:15:22.580000
CVE-2024-52522,1,1,3fb25637642f297664e883d8e91f2ab58d790cdf1866dd3c39c494590bd043d5,2024-11-15T18:15:30.643000
CVE-2024-52523,1,1,c73b3a3e311904286520f4e28b5eb14cf21a74cb1348dc035fd6fd39108922b4,2024-11-15T17:35:16.820000
CVE-2024-52524,0,0,71485345519193ae9ba542ea67056853a738d2240eb01cec0b89113cc24468ca,2024-11-15T13:58:08.913000
CVE-2024-52526,1,1,db92b0ba845b721050dc5d75b07751c56b5840b3faec607c877ff07aee8d97f7,2024-11-15T16:15:38.107000
CVE-2024-52525,1,1,ec8e0a0bf9b687aeae95450e5373687e7d3db6b39b44f52647e90ceeb50d4278,2024-11-15T17:15:23.150000
CVE-2024-52526,0,0,db92b0ba845b721050dc5d75b07751c56b5840b3faec607c877ff07aee8d97f7,2024-11-15T16:15:38.107000
CVE-2024-52528,1,1,7c0284429d075ac8663d2766c53f75a5ea01338874404bdf68a356726c7ad40f,2024-11-15T17:15:23.400000
CVE-2024-5253,0,0,73f9562f224a9a11b8b8279a7bf00d920003fa046cb7c88a3a55caf281adabe4,2024-07-19T15:30:34.717000
CVE-2024-52530,0,0,9accb3b51708da4056e1b2d60bf748a8c8f27363e68e7120159317514b4fed53,2024-11-12T19:35:14.927000
CVE-2024-52531,0,0,4a9a627b31c610f608576c39893b61b41c0efeb9f9d97b523937261d20004d52,2024-11-12T19:35:15.807000
@ -266215,7 +266271,7 @@ CVE-2024-52551,0,0,a55fcfda0c856a7c2e6739ceee574cb85a24fabb6c3ff844edb014b969fe9
CVE-2024-52552,0,0,2f96ac448bf9b00ee8139fe2b1f83755e1d5e7ee62e44cc3e0f2925f12d3f6ce,2024-11-15T14:00:09.720000
CVE-2024-52553,0,0,11348c28b862f60d8b3c8dc11ab0fb5f1e53e1358b82b1f8a97199c0de1f5907,2024-11-15T14:00:09.720000
CVE-2024-52554,0,0,6589eaee43c4794afc2869f1e1fb69f264d40d3a38b215d2e67a517b5a3abbef,2024-11-15T13:58:08.913000
CVE-2024-52555,1,1,5bd2a197b9b62d1570e8e4e5ac858dca21aea78d7b7b9d312bc19de044b868c9,2024-11-15T16:15:38.340000
CVE-2024-52555,0,0,5bd2a197b9b62d1570e8e4e5ac858dca21aea78d7b7b9d312bc19de044b868c9,2024-11-15T16:15:38.340000
CVE-2024-5256,0,0,c0c79be075ef53b66bd4c726b840e366d70c6f0c56013178c0440e2e2bf91c1e,2024-09-24T18:41:40.007000
CVE-2024-5257,0,0,e4fba0a5c9dc635ae9582dcee356a08c90165a6e8c8a0a01b6dfbef5e885cd24,2024-07-12T16:54:34.517000
CVE-2024-5258,0,0,51134eb56f05332c584317818ff995de56b2de598a9752cb1990f31f73c535e3,2024-05-24T01:15:30.977000
@ -266421,7 +266477,7 @@ CVE-2024-5470,0,0,6ad8fffdbc9fc3c2ca94bc381d3be223e310676e26148212c497e243b6c174
CVE-2024-5471,0,0,b5058f52e9634b68f4d4000cb97858db03cd2fac3d75cd140cb047a19da1c69c,2024-07-18T14:09:17.740000
CVE-2024-5472,0,0,cbeafb08776655e35d6e47fe8a75d08cb39135639adca55be0cfb4cff69e0ec6,2024-08-01T13:59:47.140000
CVE-2024-5473,0,0,7a9289264d1a834c0b8e9151c353ddcb7a22a22f6b7d360897c02053aaaeb88c,2024-07-03T02:08:57.860000
CVE-2024-5474,0,0,0261380472823b7ef383b7b05cfdc57f13f0ff67f622b2c501faca79b6c35eba,2024-10-15T12:58:51.050000
CVE-2024-5474,0,1,20b2c41a331598795f754fc38fbdf69c26a3bdc540877e8ec1d3dfd8d963cecf,2024-11-15T17:00:35.697000
CVE-2024-5475,0,0,e09a66bd4d026df38a62a9d0642b82f2a5b9bf49c6a2d9e0e1e141414790fdd3,2024-07-03T02:08:58.050000
CVE-2024-5478,0,0,c601a39452cb705e9035daa72131a8a960693dee4deccdae668f9ad5d8466d4f,2024-07-19T18:29:50.137000
CVE-2024-5479,0,0,7bf7a94732a4ce28b83209c9d21f799503dcb5933696ba21b8f4bc98737c6d69,2024-07-09T18:19:14.047000
@ -267245,7 +267301,7 @@ CVE-2024-6409,0,0,9bcf73b7e73de600a40e8d67921dca9ee633e58d1be7205c1cbcd58e7e7c03
CVE-2024-6410,0,0,9db961a9e1824a35ea4ea0ac1b25800d120aafac2e5d4caf32d46e6051ad19d3,2024-07-11T13:05:54.930000
CVE-2024-6411,0,0,47c8df8c850420fccb0a9ac1089e4a10bdc49d8ecc38cd5ac33a449b2082a491,2024-07-11T13:05:54.930000
CVE-2024-6412,0,0,ac3e0b4dd9dc421ed7bc50bb0eaac729f5a46e72227bdeb5f2fc2db7ccb48399,2024-08-01T18:35:24.697000
CVE-2024-6413,1,1,b5f68fde45a9f778cbd0fdc1a3ab3968b7f6b50b44c8e25d6d6e5c144950ab51,2024-11-15T16:15:38.573000
CVE-2024-6413,0,0,b5f68fde45a9f778cbd0fdc1a3ab3968b7f6b50b44c8e25d6d6e5c144950ab51,2024-11-15T16:15:38.573000
CVE-2024-6414,0,0,ae0d661be5f3239fdfe6f0d08030fef27c03212dc1e12675bcf532fd90369002,2024-07-01T12:37:24.220000
CVE-2024-6415,0,0,2d930efbf55d72578aa6f6117194938fd91dbe48efc49659be82131c011d6129,2024-07-01T12:37:24.220000
CVE-2024-6416,0,0,1d3038bca30e2041aec4c6f6e9ac2c7cb38b0b032dbc11dcdc7f3d31ad18d01f,2024-07-01T12:37:24.220000
@ -267724,7 +267780,7 @@ CVE-2024-6980,0,0,f6625eb84b24e1b38c56cc3bb53a8be195d62bb4e9db2a7b8e6feb6123dc76
CVE-2024-6981,0,0,510d4c4925a1eb3b58785bbc8ab5a73c80a24b4283cae4ebe7ab898a6ac026fd,2024-09-30T12:45:57.823000
CVE-2024-6983,0,0,26d1c914038fe83b8e6a8b16fb4211c387129700e5470999eec99bc2e4f2518e,2024-09-30T12:45:57.823000
CVE-2024-6984,0,0,923e45bdbdeb390a80e72f79f52c794d2a4658d69ca6fdf4fb6edad3e12c000f,2024-09-11T16:39:37.253000
CVE-2024-6985,0,0,725ec504770a2860bc10fde289ec9c08990ebc76d2606157fcd4e8d4fef9068d,2024-10-15T12:58:51.050000
CVE-2024-6985,0,1,5f1c7f843f103283ef340d6aef84884ca87fbfcf1e850856d8d1ff0697d7a56e,2024-11-15T17:10:59.157000
CVE-2024-6987,0,0,330d8660e6c8d71a307c7f147e933f5e3b64b2ed81a202f0c00b33c60663824c,2024-08-08T13:04:18.753000
CVE-2024-6988,0,0,7c7b8d3e1cf6e7ad313fbb0065550bb07b14482a1596e2d1017c6e1750b4a915,2024-08-07T20:51:56.167000
CVE-2024-6989,0,0,ade79451132400d31d7ae605ff13fce7650d6dfcad5f07960cf60cc71279c505,2024-08-07T22:10:20.423000
@ -268445,7 +268501,7 @@ CVE-2024-7861,0,0,0a909509d97ae1cc7403adef3feb39aabff91c1c695789c3f097cacdbb9f06
CVE-2024-7862,0,0,93a56c5460193ed1b7a3fcd65df3704afa8a5142705928cac67e2d4cbedb7a4c,2024-09-30T14:15:37.093000
CVE-2024-7863,0,0,11d320db6ad42df94b7ce126cd0ba1a84504b8818a402a12b56e92e066aa845a,2024-09-27T21:27:07.640000
CVE-2024-7864,0,0,8cb55f9c6813f7ebb3e411de07404fd2812a548c1112fcc9ece6be38f8f1e98f,2024-09-27T21:26:50.067000
CVE-2024-7865,1,1,f7c647db6becccf9919112076e8e4feb9a32ead1a81ccabf732c60c97ebe93bd,2024-11-15T16:15:38.630000
CVE-2024-7865,0,0,f7c647db6becccf9919112076e8e4feb9a32ead1a81ccabf732c60c97ebe93bd,2024-11-15T16:15:38.630000
CVE-2024-7866,0,0,4c0cb0c858c0ff2de3d3bc9c6187348080bb51d5934bb16167513e626d441be5,2024-08-20T19:23:02.780000
CVE-2024-7867,0,0,cc4e8e2cbae6cc9c2393332b56b3dc1a7160836d4b3b7919e8d1234e73599a3b,2024-08-28T21:59:33.973000
CVE-2024-7868,0,0,c4ea1bb97a13baa8d231995b3d29c0db15f328b428d9b25a1a7a0b4c8b9c1d1a,2024-09-11T12:40:01.817000
@ -268833,7 +268889,7 @@ CVE-2024-8372,0,0,ed7416684bf8c992c4344af2dee1225532302d263529a8756259e179ed722a
CVE-2024-8373,0,0,d1a5cc99924a2151520a8ea490fb3d660801248a7f2168e9fe7f0fc9057db80c,2024-09-17T17:32:33.380000
CVE-2024-8374,0,0,d48dc520ae709311b13e321521d105dda894c6710801eb063d42db744b0094d0,2024-09-16T16:44:42.403000
CVE-2024-8375,0,0,58cea17ca7f7a98f8126bafea3caa90f64ce326ce0b828e067a1c86c7d982ac6,2024-09-20T12:30:17.483000
CVE-2024-8376,0,0,8755f13d2baf2ea4c1f32851a9e5c748f58fd57e01338c5081bda3b629604419,2024-10-31T10:15:05.930000
CVE-2024-8376,0,1,c73e1dac5f22c8265a05cae90e61c52c37270cb05b4b1cdafbf5199fe95ba0a8,2024-11-15T17:21:02.327000
CVE-2024-8378,0,0,3434914a3a4696d8c6e4be732060229a1888e16a9bb4c1b6ee051204dce8e665,2024-11-08T19:01:03.880000
CVE-2024-8379,0,0,085298af9559a314a9f72b50c0919e14d810bca9e3bf6d4dab66f461020341e6,2024-10-07T15:49:54.653000
CVE-2024-8380,0,0,036c8c11a05ec98776794766e58c3583b3eabb4c67c37c1216e0519e7baf5609,2024-09-04T14:58:49.450000
@ -269599,7 +269655,7 @@ CVE-2024-9482,0,0,761865a3338cb95ad6952db46fced2e0b200e6722c7208c63ea4447e293045
CVE-2024-9483,0,0,ad5fedd0cd72fbc18365b7b114267513d576cf1b98379267d7018d384a26ba96,2024-11-08T20:54:30.980000
CVE-2024-9484,0,0,86ad5ee84c3c6fb7cf3b149fe0f453f5a54885e17fbe04bacb6644367538b071,2024-11-08T20:55:14.283000
CVE-2024-9486,0,0,69b6721a825ab2624e7f19326bb9e1625f15ea4093ed6bc68f868f6a5c393d51,2024-11-08T20:56:54.807000
CVE-2024-9487,0,1,8c0f797a1267751cd655e097cc4e72301937e39ee2b0b43119e44c1b6d6e9879,2024-11-15T16:57:10.080000
CVE-2024-9487,0,0,8c0f797a1267751cd655e097cc4e72301937e39ee2b0b43119e44c1b6d6e9879,2024-11-15T16:57:10.080000
CVE-2024-9488,0,0,7160e6226507ff679fbcba733953e2a0c67fe3c2a8e1dee05991bd941a40e8b2,2024-11-06T14:57:04.457000
CVE-2024-9489,0,0,da9917eda81b5ad40f78c98d3cdcfaa2ce360118ba030bb2ddb2e149e55b8a8e,2024-11-01T16:27:25.937000
CVE-2024-9501,0,0,d7be73289096f59e8614142ae5f23da8d3cd042d0cbe3c76d9c725d64a67b604,2024-10-28T13:58:09.230000
@ -269625,7 +269681,7 @@ CVE-2024-9535,0,0,4a71ba0a2572a89f39d0b54033731c76d4c93435778a2b1285d18249bf7f61
CVE-2024-9536,0,0,56b0d71a5e1f747b35f1ac4fcfd42bf040a735cf796864344938e26d90f6930b,2024-10-07T17:47:48.410000
CVE-2024-9537,0,0,aa6888a9cfaabe7c166bed0948898b65f4ee4b8fc4b3ec78f2bc1cb749794abf,2024-10-22T17:33:23.837000
CVE-2024-9538,0,0,11f6571425b77352661bef56e196d840faf334a919cdd5771fb07fb3f313a4e6,2024-10-15T12:58:51.050000
CVE-2024-9539,0,0,a0cbd26a327675fb40fcaea93c0a3ea911dbc683021df526355995459666c7a0,2024-10-15T12:57:46.880000
CVE-2024-9539,0,1,11c46fc6a0754fafad9e15015d4146ba491e021bb291b9ec64e4cebcec8265c9,2024-11-15T17:15:06.600000
CVE-2024-9540,0,0,4cadd44c097aa3daf6f235c810f4f4366e2397875e1522a0c58f481ec8e438a3,2024-10-30T20:56:01.637000
CVE-2024-9541,0,0,54c1df5f396c57f877a5cd4cb59c8edc81b18e3e67e601f49a4b9fc18ad0b5e9,2024-10-25T21:16:12.447000
CVE-2024-9543,0,0,2a7de8e1e43a15761699f58c8b8bbb57c7e560a2fb555c13127ead0f3f3c7fd9,2024-10-15T12:58:51.050000
@ -269774,7 +269830,7 @@ CVE-2024-9817,0,0,f8de20e1a75881ef54f60bc313d87d714ab8deb93b0bb597962b93099db146
CVE-2024-9818,0,0,27036e755744f27c38d726a43ad1c9df4e3ef69bf87c77f10cf90295a9b03eec,2024-10-17T18:13:37.347000
CVE-2024-9820,0,0,c625b59d383479a78d36c1a053a231b239e4eac8d7ff5924cc83c93a44968c73,2024-10-19T00:44:10.420000
CVE-2024-9821,0,0,847982287e8db8d54661c5522d18fa833c3d9091b2ddb2afe78ab1e8077a47cb,2024-10-15T12:57:46.880000
CVE-2024-9822,0,1,82e3d945f4509fe65e88458324aa86a5fabdddc602a0f9734fd3049d36a53ed7,2024-11-15T16:41:41.507000
CVE-2024-9822,0,0,82e3d945f4509fe65e88458324aa86a5fabdddc602a0f9734fd3049d36a53ed7,2024-11-15T16:41:41.507000
CVE-2024-9823,0,0,9bd58749a01179ea21ca36b4d37feb833f368418a0a0359d3cad87b853574111,2024-10-15T12:57:46.880000
CVE-2024-9824,0,0,0b6b46e52b34b071e6f48e5304d76a541526a4368e490338503476fca424894a,2024-10-15T12:57:46.880000
CVE-2024-9825,0,0,43f77069eab20c6659796a5ca73cb04eb18b719fa0ad0721704c789de713790a,2024-10-29T14:34:50.257000

Can't render this file because it is too large.