Auto-Update: 2024-11-06T23:00:20.311060+00:00

This commit is contained in:
cad-safe-bot 2024-11-06 23:03:21 +00:00
parent 43ca830a78
commit 5579586833
60 changed files with 2794 additions and 300 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-47075",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-01T22:15:47.170",
"lastModified": "2024-03-01T22:22:25.913",
"lastModified": "2024-11-06T22:35:00.660",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvmet: repara la p\u00e9rdida de memoria en nvmet_alloc_ctrl() Al crear ctrl en nvmet_alloc_ctrl(), si cntlid_min es mayor que cntlid_max del subsistema y salta a la etiqueta \"out_free_changed_ns_list\", pero el ctrl->sqs falta para liberarse. Solucione este problema saltando a la etiqueta \"out_free_sqs\"."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-40113",
"sourceIdentifier": "security@android.com",
"published": "2024-02-15T23:15:08.597",
"lastModified": "2024-02-16T13:37:55.033",
"lastModified": "2024-11-06T21:35:01.543",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En varias ubicaciones, existe una forma posible para que las aplicaciones accedan a datos de mensajes entre usuarios debido a una falta de verificaci\u00f3n de permiso. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://android.googlesource.com/platform/packages/providers/TelephonyProvider/+/64ca6ba981745875dbf2064e0b2a47f8194c4f0a",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-46049",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-03-27T06:15:10.037",
"lastModified": "2024-08-02T21:15:49.197",
"lastModified": "2024-11-06T22:35:01.887",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
@ -22,7 +22,42 @@
"value": "LLVM 15.0.0 tiene una desreferencia de puntero NULL en la funci\u00f3n parseOneMetadata() a trav\u00e9s de un archivo pdflatex.fmt modificado (o quiz\u00e1s un archivo .o modificado) a llvm-lto. NOTA: esto est\u00e1 en disputa porque no se explica la relaci\u00f3n entre pdflatex.fmt y cualquier interfaz de lenguaje LLVM, y porque una falla de la aplicaci\u00f3n llvm-lto debe clasificarse como un problema de usabilidad."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Jan/66",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52433",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-20T13:15:08.140",
"lastModified": "2024-06-16T13:15:50.413",
"lastModified": "2024-11-06T22:35:02.950",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netfilter: nft_set_rbtree: omitir sincronizaci\u00f3n GC para nuevos elementos en esta transacci\u00f3n los nuevos elementos en esta transacci\u00f3n pueden caducar antes de que finalice dicha transacci\u00f3n. Omita la sincronizaci\u00f3n del GC para dichos elementos; de lo contrario, la ruta de confirmaci\u00f3n podr\u00eda pasar por encima de un objeto ya liberado. Una vez finalizada la transacci\u00f3n, async GC recopilar\u00e1 dicho elemento caducado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-273"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/03caf75da1059f0460666c826e9f50e13dfd0017",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52618",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-18T11:15:09.110",
"lastModified": "2024-11-04T13:16:41.660",
"lastModified": "2024-11-06T22:35:03.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: block/rnbd-srv: Comprueba si hay un desbordamiento de cadena improbable. Dado que \"dev_search_path\" t\u00e9cnicamente puede ser tan grande como PATH_MAX, exist\u00eda el riesgo de truncamiento al copiarlo y una segunda cadena en \" full_path\" ya que tambi\u00e9n ten\u00eda un tama\u00f1o PATH_MAX. Las compilaciones W=1 informaban esta advertencia: drivers/block/rnbd/rnbd-srv.c: En funci\u00f3n 'process_msg_open.isra': drivers/block/rnbd/rnbd-srv.c:616:51: advertencia: '% La salida de la directiva s se puede truncar escribiendo hasta 254 bytes en una regi\u00f3n de tama\u00f1o entre 0 y 4095 [-Wformat-truncation=] 616 | snprintf(full_path, PATH_MAX, \"%s/%s\", | ^~ En la funci\u00f3n 'rnbd_srv_get_full_path', insertada desde 'process_msg_open.isra' en drivers/block/rnbd/rnbd-srv.c:721:14: drivers/block /rnbd/rnbd-srv.c:616:17: nota: 'snprintf' genera entre 2 y 4351 bytes en un destino de tama\u00f1o 4096 616 | snprintf(full_path, PATH_MAX, \"%s/%s\", | ^~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 617 | dev_search_path, dev_name); | ~~~~~~~ ~~~~~~~~~~~~~~~~~~~ Para solucionar este problema, verifique incondicionalmente el truncamiento (como ya se hizo en el caso en el que \"%SESSNAME%\" estaba presente)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/5b9ea86e662035a886ccb5c76d56793cba618827",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52684",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-17T15:15:19.583",
"lastModified": "2024-05-17T18:35:35.070",
"lastModified": "2024-11-06T21:35:01.813",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: firmware: qcom: qseecom: corrige p\u00e9rdidas de memoria en rutas de error Corrija instancias de devoluci\u00f3n de c\u00f3digos de error directamente en lugar de saltar a las etiquetas relevantes donde se liberar\u00eda la memoria asignada para las llamadas SCM."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/6c57d7b593c4a4e60db65d5ce0fe1d9f79ccbe9b",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52738",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T16:15:13.740",
"lastModified": "2024-05-21T16:53:56.550",
"lastModified": "2024-11-06T21:35:02.090",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu/fence: se solucion\u00f3 el error debido a que drm_sched init/fini no coincide. Actualmente, amdgpu llama a drm_sched_fini() desde la rutina SW fini del controlador de valla; se espera que se llame a dicha funci\u00f3n. s\u00f3lo despu\u00e9s de que la funci\u00f3n de inicio respectiva, drm_sched_init(), se haya ejecutado correctamente. Sucede que recientemente nos enfrentamos a una falla en la sonda del controlador en Steam Deck, y se llam\u00f3 a la funci\u00f3n drm_sched_fini() incluso sin que su contraparte se hubiera llamado previamente, lo que provoc\u00f3 el siguiente error: amdgpu: la sonda de 0000:04:00.0 fall\u00f3 con error -110 ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000090 PGD 0 P4D 0 Ups: 0002 [#1] PREEMPT SMP NOPTI CPU: 0 PID: 609 Comm: systemd-udevd No contaminado 6.2.0-rc3-gpiccoli #338 Nombre del hardware : Valve Jupiter/Jupiter, BIOS F7A0113 04/11/2022 RIP: 0010:drm_sched_fini+0x84/0xa0 [gpu_sched] [...] Seguimiento de llamadas: amdgpu_fence_driver_sw_fini+0xc8/0xd0 [amdgpu] amdgpu_device_fini_sw+0x2b/0x3b0 [ amdgpu] amdgpu_driver_release_kms+0x16/0x30 [amdgpu] devm_drm_dev_init_release+0x49/0x70 [...] Para evitar eso, verifique si drm_sched se inicializ\u00f3 correctamente para un anillo determinado antes de llamar a su contraparte fini. Observe que idealmente usar\u00edamos sched.ready para eso; dicho campo se establece como lo \u00faltimo en drm_sched_init(). Pero amdgpu parece \"sobreescribir\" el significado de dicho campo; en el ejemplo anterior, por ejemplo, fue un anillo GFX el que provoc\u00f3 el bloqueo y el campo sched.ready se configur\u00f3 en verdadero en la rutina de inicio del anillo, independientemente del estado de el programador DRM. Por lo tanto, terminamos usando sched.ops seg\u00fan la sugerencia de Christian [0] y tambi\u00e9n eliminamos la verificaci\u00f3n no_scheduler [1]. [0] https://lore.kernel.org/amd-gfx/984ee981-2906-0eaf-ccec-9f80975cb136@amd.com/ [1] https://lore.kernel.org/amd-gfx/cd0e2994- f85f-d837-609f-7056d5fb7231@amd.com/"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/2bcbbef9cace772f5b7128b11401c515982de34b",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10122",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-18T19:15:13.990",
"lastModified": "2024-10-21T17:10:22.857",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-06T22:05:23.700",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,18 +140,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:topdata:inner_rep_plus:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "1EBD086E-B71F-47DC-B335-0228F1EB61FF"
}
]
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.280914",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.280914",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.421292",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10840",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-05T13:15:03.443",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-06T22:49:12.173",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in romadebrian WEB-Sekolah 1.0. Affected is an unknown function of the file /Admin/akun_edit.php of the component Backend. The manipulation of the argument kode leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": " Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en romadebrian WEB-Sekolah 1.0. Se trata de una funci\u00f3n desconocida del archivo /Admin/akun_edit.php del componente Backend. La manipulaci\u00f3n del argumento kode provoca ataques de Cross Site Scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -106,8 +130,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -124,18 +158,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:romadebrian:web-sekolah:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4AB95C15-C1D8-47EC-96B6-D38DD31920B3"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/2537463005/a/blob/main/WEB-Sekolah%E5%90%8E%E5%8F%B0%E5%AD%98%E5%82%A8%E5%9E%8Bxss.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.283086",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.283086",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10841",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-05T14:15:14.220",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-06T22:50:24.277",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in romadebrian WEB-Sekolah 1.0. Affected by this vulnerability is an unknown functionality of the file /Proses_Kirim.php of the component Mail Handler. The manipulation of the argument Name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
},
{
"lang": "es",
"value": "En la versi\u00f3n romadebrian WEB-Sekolah 1.0 se ha detectado una vulnerabilidad clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /Proses_Kirim.php del componente Mail Handler. La manipulaci\u00f3n del argumento Name provoca una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -106,8 +130,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -124,18 +158,47 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:romadebrian:web-sekolah:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4AB95C15-C1D8-47EC-96B6-D38DD31920B3"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/2537463005/a/blob/main/WEB-Sekolah%E5%90%8E%E5%8F%B0%E5%AD%98%E5%82%A8%E5%9E%8Bxss.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.283087",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.283087",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10842",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-05T14:15:14.543",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-06T22:43:19.327",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in romadebrian WEB-Sekolah 1.0. Affected by this issue is some unknown functionality of the file /Admin/Proses_Edit_Akun.php of the component Backend. The manipulation of the argument Username_Baru/Password leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": " Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en romadebrian WEB-Sekolah 1.0. Este problema afecta a una funcionalidad desconocida del archivo /Admin/Proses_Edit_Akun.php del componente Backend. La manipulaci\u00f3n del argumento Username_Baru/Password provoca Cross Site Scripting. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -106,8 +130,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -124,22 +158,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:romadebrian:web-sekolah:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4AB95C15-C1D8-47EC-96B6-D38DD31920B3"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/2537463005/a/blob/main/WEB-Sekolah%E5%90%8E%E5%8F%B0%E5%AD%98%E5%82%A8%E5%9E%8Bxss.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.283088",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.283088",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.429558",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10844",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-05T15:15:22.337",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-06T22:38:13.800",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in 1000 Projects Bookstore Management System 1.0. This affects an unknown part of the file search.php. The manipulation of the argument s leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en 1000 Projects Bookstore Management System 1.0. Afecta a una parte desconocida del archivo search.php. La manipulaci\u00f3n del argumento s provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -106,8 +130,18 @@
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -124,22 +158,52 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bookstore_management_system_project:bookstore_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BE1C0C4B-D037-42DD-8505-68508274BC10"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/sbm-98/CVE/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.283089",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.283089",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.436969",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10845",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-05T15:15:22.620",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-06T22:38:03.347",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in 1000 Projects Bookstore Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file book_detail.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": " Se ha encontrado una vulnerabilidad en 1000 Projects Bookstore Management System 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo book_detail.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -105,6 +129,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -124,22 +158,55 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bookstore_management_system_project:bookstore_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BE1C0C4B-D037-42DD-8505-68508274BC10"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/hbuzs/CVE/issues/3",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.283090",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.283090",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.436999",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-10926",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-06T21:15:04.927",
"lastModified": "2024-11-06T21:15:04.927",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in IBPhoenix ibWebAdmin up to 1.0.2 and classified as problematic. This issue affects some unknown processing of the file /toggle_fold_panel.php of the component Tabelas Section. The manipulation of the argument p leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://docs.google.com/document/d/1h9LlTV1FVvOSDBWc7qwU_5qcboCKd6H99Oqg3rZdBRQ/edit?usp=sharing",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.283325",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.283325",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.429635",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-10941",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-11-06T21:15:05.213",
"lastModified": "2024-11-06T21:15:05.213",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A malicious website could have included an iframe with an malformed URI resulting in a non-exploitable browser crash. This vulnerability affects Firefox < 126."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1880879",
"source": "security@mozilla.org"
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1887614",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-21/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21249",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:14.880",
"lastModified": "2024-10-31T15:35:25.647",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-06T22:53:50.587",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +61,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_fin_expenses:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "38221C8A-6D2C-47F1-A222-B42472AB7F5A"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21250",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:15.063",
"lastModified": "2024-10-17T14:35:19.303",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-06T22:54:57.887",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +61,35 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:process_manufacturing_product_development:12.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "A520C6E9-1006-43E6-98C2-332C89E398CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:process_manufacturing_product_development:12.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "137E4B4C-5286-445E-B347-B5D5BEBFAA23"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21257",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:16.220",
"lastModified": "2024-10-16T16:38:43.170",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-06T22:55:18.400",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,42 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:hyperion_bi\\+:11.2.18.0.000:*:*:*:*:*:*:*",
"matchCriteriaId": "8EC21BCB-FA89-475B-9A33-108FF5363829"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21258",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:16.410",
"lastModified": "2024-10-16T16:38:43.170",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-06T22:56:19.527",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +61,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:installed_base:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.2.3",
"versionEndIncluding": "12.2.14",
"matchCriteriaId": "4F2A7D80-68E3-4AAA-BD96-CE108A5CB0C6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21264",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:17.533",
"lastModified": "2024-10-16T16:38:43.170",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-06T22:56:41.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "secalert_us@oracle.com",
"type": "Secondary",
@ -39,10 +59,42 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_cost_center_common_application_objects:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D30BE00A-198B-4398-9404-BEA9D255B554"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com"
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22013",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-09-16T20:15:45.743",
"lastModified": "2024-09-20T12:31:20.110",
"lastModified": "2024-11-06T21:35:02.500",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El entorno U-Boot se lee desde una partici\u00f3n no autenticada."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://support.google.com/product-documentation/answer/14950962?hl=en&ref_topic=12974021&sjid=9595902703262170957-NA#zippy=%2Cwifi",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23560",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-04-15T20:15:10.873",
"lastModified": "2024-04-16T13:24:07.103",
"lastModified": "2024-11-06T22:35:04.240",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-281"
}
]
}
],
"references": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0111925",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26367",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-14T16:16:22.863",
"lastModified": "2024-05-14T19:18:31.490",
"lastModified": "2024-11-06T21:35:02.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de Cross Site Scripting en Evertz microsystems MViP-II Firmware 8.6.5, XPS-EDGE-* Build 1467, evEDGE-EO-* Build 0029, MMA10G-* Build 0498, 570IPG-X19-10G Build 0691 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para los par\u00e1metros de inicio de sesi\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "http://cc.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26648",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-26T18:15:10.220",
"lastModified": "2024-03-27T12:29:41.530",
"lastModified": "2024-11-06T22:35:04.950",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: se corrigi\u00f3 la diferenciaci\u00f3n de variables antes de la verificaci\u00f3n NULL en edp_setup_replay() En edp_setup_replay(), se elimin\u00f3 la referencia a 'struct dc *dc' y 'struct dmub_replay *replay' antes de la comprobaci\u00f3n NULL del puntero 'enlace' y 'repetici\u00f3n'. Corrige lo siguiente: drivers/gpu/drm/amd/amdgpu/../display/dc/link/protocols/link_edp_panel_control.c:947 edp_setup_replay() advertencia: variable desreferenciada antes de marcar 'enlace' (ver l\u00ednea 933)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/22ae604aea14756954e1c00ae653e34d2afd2935",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26731",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-03T17:15:50.927",
"lastModified": "2024-04-03T17:24:18.150",
"lastModified": "2024-11-06T22:35:05.197",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bpf, sockmap: corrigi\u00f3 la desreferencia del puntero NULL en sk_psock_verdict_data_ready() syzbot inform\u00f3 el siguiente problema de desreferencia del puntero NULL [1]: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000000 [... ] RIP: 0010:0x0 [...] Seguimiento de llamadas: sk_psock_verdict_data_ready+0x232/0x340 net/core/skmsg.c:1230 unix_stream_sendmsg+0x9b4/0x1230 net/unix/af_unix.c:2293 sock_sendmsg_nosec net/socket. c:730 [en l\u00ednea] __sock_sendmsg+0x221/0x270 net/socket.c:745 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584 ___sys_sendmsg net/socket.c:2638 [en l\u00ednea] __sys_sendmsg+0x2b0/0x3a0 net /socket. c:2667 do_syscall_64+0xf9/0x240 Entry_SYSCALL_64_after_hwframe+0x6f/0x77 Si sk_psock_verdict_data_ready() y sk_psock_stop_verdict() se llaman simult\u00e1neamente, psock-&gt;saved_data_ready puede ser NULL, causando el problema anterior. Este parche soluciona este problema llamando a la funci\u00f3n de preparaci\u00f3n de datos adecuada utilizando el asistente sk_psock_data_ready() y protegi\u00e9ndola de la concurrencia con sk-&gt;sk_callback_lock."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/4588b13abcbd561ec67f5b3c1cb2eff690990a54",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26744",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-03T17:15:51.627",
"lastModified": "2024-11-05T10:15:46.253",
"lastModified": "2024-11-06T21:35:03.883",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/srpt: admite la especificaci\u00f3n del par\u00e1metro srpt_service_guid. Hace que la carga de ib_srpt con este conjunto de par\u00e1metros funcione. El comportamiento actual es que configurar ese par\u00e1metro mientras se carga el m\u00f3dulo del kernel ib_srpt desencadena el siguiente fallo del kernel: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000000 Seguimiento de llamadas: parse_one+0x18c/0x1d0 parse_args+0xe1/0x230 load_module+0x8de/ 0xa60 init_module_from_file+0x8b/0xd0 idempotent_init_module+0x181/0x240 __x64_sys_finit_module+0x5a/0xb0 do_syscall_64+0x5f/0xe0 Entry_SYSCALL_64_after_hwframe+0x6e/0x76"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/5a5c039dac1b1b7ba3e91c791f4421052bf79b82",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26757",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-03T17:15:52.207",
"lastModified": "2024-04-03T17:24:18.150",
"lastModified": "2024-11-06T21:35:04.737",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: md: No ignorar la matriz de solo lectura en md_check_recovery() Generalmente, si la matriz no es de lectura y escritura, md_check_recovery() no registrar\u00e1 un nuevo sync_thread en primer lugar. Y si la matriz es de lectura y escritura y sync_thread est\u00e1 registrado, md_set_readonly() cancelar\u00e1 el registro de sync_thread antes de configurar la matriz como de solo lectura. md/raid sigue este comportamiento, por lo que no hay problema. Despu\u00e9s de commit f52f5c71f3d4 (\"md: arreglar la detenci\u00f3n del hilo de sincronizaci\u00f3n\"), el siguiente bloqueo puede activarse mediante test shell/integrity-caching.sh: 1) la matriz es de solo lectura. Superbloque de actualizaci\u00f3n dm-raid: rs_update_sbs ro = mddev-&gt;ro mddev-&gt;ro = 0 -&gt; establecer matriz de lectura y escritura md_update_sb 2) registrar un nuevo hilo de sincronizaci\u00f3n simult\u00e1neamente. 3) dm-raid vuelve a configurar la matriz en solo lectura: rs_update_sbs mddev-&gt;ro = ro 4) detiene la matriz: raid_dtr md_stop stop_sync_thread set_bit(MD_RECOVERY_INTR, &amp;mddev-&gt;recovery); md_wakeup_thread_directly(mddev-&gt;sync_thread); wait_event(..., !test_bit(MD_RECOVERY_RUNNING, &amp;mddev-&gt;recovery)) 5) hilo de sincronizaci\u00f3n realizado: md_do_sync set_bit(MD_RECOVERY_DONE, &amp;mddev-&gt;recovery); md_wakeup_thread(mddev-&gt;thread); 6) el hilo del demonio no puede cancelar el registro del hilo de sincronizaci\u00f3n: md_check_recovery if (!md_is_rdwr(mddev) &amp;&amp; !test_bit(MD_RECOVERY_NEEDED, &amp;mddev-&gt;recovery)) return; -&gt; -&gt; MD_RECOVERY_RUNNING no se puede borrar, por lo tanto el paso 4 se bloquea; La causa principal es que dm-raid manipula 'mddev-&gt;ro' por s\u00ed solo; sin embargo, dm-raid realmente deber\u00eda detener el hilo de sincronizaci\u00f3n antes de configurar la matriz como de solo lectura. Desafortunadamente, necesito leer m\u00e1s c\u00f3digo antes de poder refactorizar el controlador de 'mddev-&gt;ro' en dm-raid, por lo tanto, solucionemos el problema de la manera m\u00e1s f\u00e1cil por ahora para evitar la regresi\u00f3n de dm-raid."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-404"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2ea169c5a0b1134d573d07fc27a16f327ad0e7d3",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26779",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-03T17:15:53.423",
"lastModified": "2024-11-05T10:15:49.233",
"lastModified": "2024-11-06T22:35:05.993",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mac80211: corrige la condici\u00f3n de ejecuci\u00f3n al habilitar fast-xmit fast-xmit solo debe habilitarse despu\u00e9s de que el sta se haya cargado en el controlador; de lo contrario, podr\u00eda terminar pasando el error sta a\u00fan cargada a trav\u00e9s de llamadas drv_tx al controlador, lo que genera posibles fallas debido a datos drv_priv no inicializados. Agregue una estaci\u00f3n faltante-&gt;comprobaci\u00f3n cargada y vuelva a verificar la transmisi\u00f3n r\u00e1pida despu\u00e9s de insertar una estaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/281280276b70c822f55ce15b661f6d1d3228aaa9",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28895",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-04-01T01:15:46.890",
"lastModified": "2024-04-01T01:33:21.910",
"lastModified": "2024-11-06T21:35:05.843",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Yahoo! JAPAN' App para Android v2.3.1 a v3.161.1 y 'Yahoo! La aplicaci\u00f3n JAPAN para iOS v3.2.2 a v4.109.0 contiene una vulnerabilidad de cross-site scripting. Si se explota esta vulnerabilidad, se puede ejecutar un script arbitrario en WebView de Yahoo! JAPAN ' App a trav\u00e9s de otra aplicaci\u00f3n instalada en el dispositivo del usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN23528780/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-29948",
"sourceIdentifier": "hsrc@hikvision.com",
"published": "2024-04-02T11:15:51.813",
"lastModified": "2024-04-02T12:50:42.233",
"lastModified": "2024-11-06T21:35:06.680",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikvision-nvr-devices/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30122",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-10-23T15:15:30.390",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-06T22:33:46.797",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "psirt@hcl.com",
"type": "Secondary",
@ -39,10 +59,48 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:sametime:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.0.2",
"matchCriteriaId": "FDA15EE5-1675-469C-BF7B-DB9FDE95F338"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:sametime:12.0.2:-:*:*:*:*:*:*",
"matchCriteriaId": "D6A54E0B-DB62-4674-B57D-827A55BBE2CA"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0115627",
"source": "psirt@hcl.com"
"source": "psirt@hcl.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-33338",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-29T18:15:07.937",
"lastModified": "2024-04-30T13:11:16.690",
"lastModified": "2024-11-06T22:35:06.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de Cross Site Scripting en jizhicms v.2.5.4 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de una solicitud de publicaci\u00f3n de art\u00edculo manipulada."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/7akahash1/POC/blob/main/1.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35835",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-17T14:15:20.387",
"lastModified": "2024-11-05T10:16:42.810",
"lastModified": "2024-11-06T21:35:07.630",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net/mlx5e: corregido un double free en arfs_create_groups Cuando falla `in` asignado por kvzalloc, arfs_create_groups liberar\u00e1 ft-&gt;g y devolver\u00e1 un error. Sin embargo, arfs_create_table, el \u00fanico llamador de arfs_create_groups, mantendr\u00e1 este error y llamar\u00e1 a mlx5e_destroy_flow_table, en el que ft-&gt;g se liberar\u00e1 nuevamente."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/2501afe6c4c9829d03abe9a368b83d9ea1b611b7",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-36881",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-30T16:15:11.723",
"lastModified": "2024-05-30T18:18:58.870",
"lastModified": "2024-11-06T22:35:07.757",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/userfaultfd: restablece ptes al cerrar() para los protegidos por wr. Userfaultfd unregister incluye un paso para eliminar los bits de wr-protect de todas las entradas relevantes de pgtable, pero eso solo cubre una UFFDIO_UNREGISTER ioctl expl\u00edcito, no un close() en el propio userfaultfd. Cubre eso tambi\u00e9n. Esto corrige un rastro WARN. El \u00fanico efecto secundario visible para el usuario es que puede observar los bits wr-protect sobrantes incluso si el usuario cerr\u00f3 () en un userfaultfd al liberar la \u00faltima referencia del mismo. Sin embargo, es de esperar que eso sea inofensivo y, aun as\u00ed, no deber\u00eda pasar nada malo. Este cambio ahora es m\u00e1s importante despu\u00e9s del reciente parche de verificaci\u00f3n de tabla de p\u00e1ginas que fusionamos en mm-unstable (446dd9ad37d0 (\"mm/page_table_check: admite entradas de protecci\u00f3n wr de error de usuario\")), ya que haremos una verificaci\u00f3n de cordura en uffd-wp. bits sin contexto vma. Por lo tanto, es mejor si podemos garantizar al 100% que no queden restos de bits de uffd-wp, para asegurarnos de que cada informe sea v\u00e1lido."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/377f3a9a3d032a52325a5b110379a25dd1ab1931",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47253",
"sourceIdentifier": "product-security@axis.com",
"published": "2024-11-05T10:20:03.973",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-06T22:23:29.663",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "product-security@axis.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "product-security@axis.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:2n:access_commander:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.1.1.2",
"matchCriteriaId": "47A7B866-FF8F-4CA9-A34C-78D361E21730"
}
]
}
]
}
],
"references": [
{
"url": "https://www.2n.com/en-GB/about-2n/cybersecurity/",
"source": "product-security@axis.com"
"source": "product-security@axis.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47254",
"sourceIdentifier": "product-security@axis.com",
"published": "2024-11-05T10:20:04.843",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-06T22:22:01.623",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "product-security@axis.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "product-security@axis.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:2n:access_commander:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.1.1.2",
"matchCriteriaId": "47A7B866-FF8F-4CA9-A34C-78D361E21730"
}
]
}
]
}
],
"references": [
{
"url": "https://www.2n.com/en-GB/about-2n/cybersecurity/",
"source": "product-security@axis.com"
"source": "product-security@axis.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47255",
"sourceIdentifier": "product-security@axis.com",
"published": "2024-11-05T10:20:05.300",
"lastModified": "2024-11-05T16:04:26.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-06T22:23:05.770",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "product-security@axis.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "product-security@axis.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:2n:access_commander:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.1.1.2",
"matchCriteriaId": "47A7B866-FF8F-4CA9-A34C-78D361E21730"
}
]
}
]
}
],
"references": [
{
"url": "https://www.2n.com/en-GB/about-2n/cybersecurity/",
"source": "product-security@axis.com"
"source": "product-security@axis.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48050",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-04T23:15:04.250",
"lastModified": "2024-11-05T16:04:26.053",
"lastModified": "2024-11-06T21:35:07.863",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En agentscope &lt;=v0.0.4, el archivo agentscope\\web\\workstation\\workflow_utils.py tiene la funci\u00f3n is_callable_expression. Dentro de esta funci\u00f3n, la l\u00ednea result = eval(s) plantea un riesgo de seguridad, ya que puede ejecutar directamente comandos proporcionados por el usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/AfterSnows/0ad9d233a9d2a5b7e6e5273e2e23508d",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49370",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-23T15:15:31.987",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-06T22:31:30.160",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,12 +59,44 @@
"baseSeverity": "HIGH"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -73,10 +105,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.1.16",
"matchCriteriaId": "8E36A24C-B1EA-4E86-B87D-69AB12876830"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0",
"versionEndExcluding": "4.1.7",
"matchCriteriaId": "13395FFF-7B19-4774-B7FF-F9EF31064AD6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-74p5-77rq-gfqc",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49675",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-23T15:15:32.120",
"lastModified": "2024-10-25T12:56:36.827",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-06T22:24:22.907",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vitaliibryl:switch_user:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.1",
"matchCriteriaId": "AC4A7ABE-B11E-467C-B9E0-23C86844CABC"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ibryl-switch-user/wordpress-ibryl-switch-user-plugin-1-0-1-account-takeover-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-50340",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-06T21:15:05.527",
"lastModified": "2024-11-06T21:15:05.527",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "symfony/runtime is a module for the Symphony PHP framework which enables decoupling PHP applications from global state. When the `register_argv_argc` php directive is set to `on` , and users call any URL with a special crafted query string, they are able to change the environment or debug mode used by the kernel when handling the request. As of versions 5.4.46, 6.4.14, and 7.1.7 the `SymfonyRuntime` now ignores the `argv` values for non-SAPI PHP runtimes. All users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"references": [
{
"url": "https://github.com/symfony/symfony/commit/a77b308c3f179ed7c8a8bc295f82b2d6ee3493fa",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/symfony/symfony/security/advisories/GHSA-x8vp-gf4q-mw5j",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-50341",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-06T21:15:05.747",
"lastModified": "2024-11-06T21:15:05.747",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "symfony/security-bundle is a module for the Symphony PHP framework which provides a tight integration of the Security component into the Symfony full-stack framework. The custom `user_checker` defined on a firewall is not called when Login Programmaticaly with the `Security::login` method, leading to unwanted login. As of versions 6.4.10, 7.0.10 and 7.1.3 the `Security::login` method now ensure to call the configured `user_checker`. All users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://github.com/symfony/symfony/commit/22a0789a0085c3ee96f4ef715ecad8255cf0e105",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/symfony/symfony/security/advisories/GHSA-jxgr-3v7q-3w9v",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-50342",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-06T21:15:05.963",
"lastModified": "2024-11-06T21:15:05.963",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "symfony/http-client is a module for the Symphony PHP framework which provides powerful methods to fetch HTTP resources synchronously or asynchronously. When using the `NoPrivateNetworkHttpClient`, some internal information is still leaking during host resolution, which leads to possible IP/port enumeration. As of versions 5.4.46, 6.4.14, and 7.1.7 the `NoPrivateNetworkHttpClient` now filters blocked IPs earlier to prevent such leaks. All users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/symfony/symfony/commit/296d4b34a33b1a6ca5475c6040b3203622520f5b",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/symfony/symfony/security/advisories/GHSA-9c3x-r3wp-mgxm",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-50343",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-06T21:15:06.180",
"lastModified": "2024-11-06T21:15:06.180",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "symfony/validator is a module for the Symphony PHP framework which provides tools to validate values. It is possible to trick a `Validator` configured with a regular expression using the `$` metacharacters, with an input ending with `\\n`. Symfony as of versions 5.4.43, 6.4.11, and 7.1.4 now uses the `D` regex modifier to match the entire input. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://github.com/symfony/symfony/commit/7d1032bbead9a4229b32fa6ebca32681c80cb76f",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/symfony/symfony/security/advisories/GHSA-g3rh-rrhp-jhh9",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-50345",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-06T21:15:06.383",
"lastModified": "2024-11-06T21:15:06.383",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://github.com/symfony/symfony/security/advisories/GHSA-mrqx-rp3w-jpjp",
"source": "security-advisories@github.com"
},
{
"url": "https://url.spec.whatwg.org",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51408",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-04T14:15:16.603",
"lastModified": "2024-11-05T22:35:13.937",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-06T22:06:43.100",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "cve@mitre.org",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,18 +81,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:appsmith:appsmith:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.8.3",
"versionEndExcluding": "1.46",
"matchCriteriaId": "200066FD-141E-4023-A8CF-350F46C52870"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/appsmithorg/appsmith/pull/29286",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/appsmithorg/appsmith/releases/tag/v1.46",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/jahithoque/Vulnerability-Research/tree/main/CVE-2024-51408",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-51626",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-04T15:15:22.730",
"lastModified": "2024-11-04T18:50:05.607",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-06T22:10:20.517",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mansur Ahamed Woocommerce Quote Calculator allows Blind SQL Injection.This issue affects Woocommerce Quote Calculator: from n/a through 1.1."
},
{
"lang": "es",
"value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Woocommerce Quote Calculator de Mansur Ahamed permite la inyecci\u00f3n SQL ciega. Este problema afecta a Woocommerce Quote Calculator: desde n/a hasta 1.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -47,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mansurahamed:woocommerce_quote_calculator:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.1",
"matchCriteriaId": "A8F99F04-98CA-4DA4-B7CB-C6C16FD1156C"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woo-quote-calculator-order/wordpress-woocommerce-quote-calculator-plugin-1-1-sql-injection-vulnerability-2?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-51665",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-04T14:15:16.987",
"lastModified": "2024-11-04T18:50:05.607",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-06T22:07:10.707",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in Noor alam Magical Addons For Elementor allows Server Side Request Forgery.This issue affects Magical Addons For Elementor: from n/a through 1.2.1."
},
{
"lang": "es",
"value": " La vulnerabilidad de Server-Side Request Forgery (SSRF) en Noor alam Magical Addons For Elementor permite Server-Side Request Forgery. Este problema afecta a Magical Addons For Elementor: desde n/a hasta 1.2.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -47,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpthemespace:magical_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.2.3",
"matchCriteriaId": "0D7D471C-B15C-4B06-B247-025BA5FB9194"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/magical-addons-for-elementor/wordpress-magical-addons-for-elementor-plugin-1-2-1-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-51672",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-04T14:15:17.190",
"lastModified": "2024-11-04T18:50:05.607",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-06T22:08:22.747",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPDeveloper BetterLinks allows SQL Injection.This issue affects BetterLinks: from n/a through 2.1.7."
},
{
"lang": "es",
"value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en WPDeveloper BetterLinks permite la inyecci\u00f3n SQL. Este problema afecta a BetterLinks: desde n/a hasta 2.1.7."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -47,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpdeveloper:betterlinks:*:*:*:*:free:wordpress:*:*",
"versionEndExcluding": "2.1.8",
"matchCriteriaId": "F07AEFF7-CD0F-43EB-AD00-A1B4A2FCE774"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/betterlinks/wordpress-betterlinks-plugin-2-1-7-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-51677",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-04T15:15:22.947",
"lastModified": "2024-11-04T18:50:05.607",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-06T22:10:31.677",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WebberZone Knowledge Base allows Stored XSS.This issue affects Knowledge Base: from n/a through 2.2.0."
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en WebberZone Knowledge Base permite XSS almacenado. Este problema afecta a Knowledge Base: desde n/a hasta 2.2.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -47,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webberzone:knowledge_base:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.2.1",
"matchCriteriaId": "5E509AFC-6A96-4395-9950-021A25F856EB"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/knowledgebase/wordpress-knowledge-base-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-51678",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-04T15:15:23.163",
"lastModified": "2024-11-04T18:50:05.607",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-06T22:10:45.103",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Marcel Pol Elo Rating Shortcode allows Stored XSS.This issue affects Elo Rating Shortcode: from n/a through 1.0.3."
},
{
"lang": "es",
"value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Marcel Pol Elo Rating Shortcode permite XSS almacenado. Este problema afecta a Elo Rating Shortcode: desde n/a hasta 1.0.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -47,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:timelord:elo_rating_shortcode:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.0.4",
"matchCriteriaId": "DD6BD84D-7596-4867-846B-F1E3D3C850F1"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/elo-rating-shortcode/wordpress-elo-rating-shortcode-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-51680",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-04T15:15:23.367",
"lastModified": "2024-11-04T18:50:05.607",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-06T22:10:59.270",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CrestaProject \u2013 Rizzo Andrea Cresta Addons for Elementor allows Stored XSS.This issue affects Cresta Addons for Elementor: from n/a through 1.0.9."
},
{
"lang": "es",
"value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en CrestaProject \u2013 Rizzo Andrea Cresta Addons para Elementor permite XSS almacenado. Este problema afecta a Cresta Addons para Elementor: desde n/a hasta 1.0.9."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -47,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:crestaproject:cresta_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.0",
"matchCriteriaId": "BF5F07AA-0D63-4415-AD80-071F5F656550"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/cresta-addons-for-elementor/wordpress-cresta-addons-for-elementor-plugin-1-0-9-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-51681",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-04T15:15:23.577",
"lastModified": "2024-11-04T18:50:05.607",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-06T22:11:16.003",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CodeRevolution WP Pocket URLs allows Stored XSS.This issue affects WP Pocket URLs: from n/a through 1.0.3."
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en las URL de WP Pocket de CodeRevolution permite XSS almacenado. Este problema afecta a las URL de WP Pocket: desde n/a hasta 1.0.3."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -47,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:coderevolution:wp_pocket_urls:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.0.4",
"matchCriteriaId": "18E7B64D-FBAA-4F21-B18F-DF4162D68AE7"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-pocket-urls/wordpress-wp-pocket-urls-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-51682",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-04T15:15:23.787",
"lastModified": "2024-11-04T18:50:05.607",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-06T22:12:02.353",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in HasThemes HT Builder \u2013 WordPress Theme Builder for Elementor allows Stored XSS.This issue affects HT Builder \u2013 WordPress Theme Builder for Elementor: from n/a through 1.3.0."
},
{
"lang": "es",
"value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en HasThemes HT Builder \u2013 WordPress Theme Builder for Elementor permite XSS almacenado. Este problema afecta a HT Builder \u2013 WordPress Theme Builder for Elementor: desde n/a hasta 1.3.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -47,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hasthemes:ht_builder:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.3.1",
"matchCriteriaId": "FD23AE19-E68B-4DBF-9ED9-4B9DD085271E"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ht-builder/wordpress-ht-builder-wordpress-theme-builder-for-elementor-plugin-1-3-0-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-51683",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-04T15:15:24.013",
"lastModified": "2024-11-04T18:50:05.607",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-06T22:12:19.803",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Michael Gangolf Custom post type templates for Elementor allows Stored XSS.This issue affects Custom post type templates for Elementor: from n/a through 1.10.1."
},
{
"lang": "es",
"value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en las plantillas de tipo de publicaci\u00f3n personalizadas de Michael Gangolf para Elementor permite XSS almacenado. Este problema afecta a Custom post type templates for Elementor: desde n/a hasta 1.10.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "audit@patchstack.com",
"type": "Secondary",
@ -47,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:migaweb:custom_post_type_templates_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.12",
"matchCriteriaId": "BC28FA62-4EAC-4B4F-8E90-83862AFF1FDF"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/custom-post-type-templates-for-elementor/wordpress-custom-post-type-templates-for-elementor-plugin-1-10-1-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-51736",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-06T21:15:06.600",
"lastModified": "2024-11-06T21:15:06.600",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"baseSeverity": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 0.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/symfony/symfony/security/advisories/GHSA-qq5c-677p-737q",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/symfony/symfony/security/advisories/GHSA-qq5c-677p-737q",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51757",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-06T20:15:06.337",
"lastModified": "2024-11-06T20:15:06.337",
"lastModified": "2024-11-06T21:15:06.807",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -78,6 +78,10 @@
"url": "https://github.com/capricorn86/happy-dom/commit/5ee0b1676d4ce20cc2a70d1c9c8d6f1e3f57efac",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/capricorn86/happy-dom/commit/d23834c232f1cf5519c9418b073f1dcec6b2f0fd",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/capricorn86/happy-dom/issues/1585",
"source": "security-advisories@github.com"
@ -86,6 +90,10 @@
"url": "https://github.com/capricorn86/happy-dom/pull/1586",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/capricorn86/happy-dom/releases/tag/v15.10.2",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/capricorn86/happy-dom/security/advisories/GHSA-96g7-g7g9-jxw8",
"source": "security-advisories@github.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-5642",
"sourceIdentifier": "cna@python.org",
"published": "2024-06-27T21:15:16.070",
"lastModified": "2024-07-28T14:15:11.220",
"lastModified": "2024-11-06T21:35:08.690",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "CPython 3.9 y versiones anteriores no permiten la configuraci\u00f3n de una lista vac\u00eda (\"[]\") para SSLContext.set_npn_protocols(), que es un valor no v\u00e1lido para la API OpenSSL subyacente. Esto da como resultado una lectura excesiva del b\u00fafer cuando se utiliza NPN (consulte CVE-2024-5535 para OpenSSL). Esta vulnerabilidad es de baja gravedad debido a que NPN no se usa ampliamente y especificar una lista vac\u00eda probablemente sea poco com\u00fan en la pr\u00e1ctica (normalmente se configurar\u00eda un nombre de protocolo)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/06/28/4",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-06T21:00:21.583587+00:00
2024-11-06T23:00:20.311060+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-06T20:55:37.613000+00:00
2024-11-06T22:56:41.647000+00:00
```
### Last Data Feed Release
@ -33,49 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
268480
268488
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `8`
- [CVE-2024-51751](CVE-2024/CVE-2024-517xx/CVE-2024-51751.json) (`2024-11-06T20:15:05.557`)
- [CVE-2024-51754](CVE-2024/CVE-2024-517xx/CVE-2024-51754.json) (`2024-11-06T20:15:05.817`)
- [CVE-2024-51755](CVE-2024/CVE-2024-517xx/CVE-2024-51755.json) (`2024-11-06T20:15:06.077`)
- [CVE-2024-51757](CVE-2024/CVE-2024-517xx/CVE-2024-51757.json) (`2024-11-06T20:15:06.337`)
- [CVE-2024-51988](CVE-2024/CVE-2024-519xx/CVE-2024-51988.json) (`2024-11-06T20:15:06.513`)
- [CVE-2024-10926](CVE-2024/CVE-2024-109xx/CVE-2024-10926.json) (`2024-11-06T21:15:04.927`)
- [CVE-2024-10941](CVE-2024/CVE-2024-109xx/CVE-2024-10941.json) (`2024-11-06T21:15:05.213`)
- [CVE-2024-50340](CVE-2024/CVE-2024-503xx/CVE-2024-50340.json) (`2024-11-06T21:15:05.527`)
- [CVE-2024-50341](CVE-2024/CVE-2024-503xx/CVE-2024-50341.json) (`2024-11-06T21:15:05.747`)
- [CVE-2024-50342](CVE-2024/CVE-2024-503xx/CVE-2024-50342.json) (`2024-11-06T21:15:05.963`)
- [CVE-2024-50343](CVE-2024/CVE-2024-503xx/CVE-2024-50343.json) (`2024-11-06T21:15:06.180`)
- [CVE-2024-50345](CVE-2024/CVE-2024-503xx/CVE-2024-50345.json) (`2024-11-06T21:15:06.383`)
- [CVE-2024-51736](CVE-2024/CVE-2024-517xx/CVE-2024-51736.json) (`2024-11-06T21:15:06.600`)
### CVEs modified in the last Commit
Recently modified CVEs: `65`
Recently modified CVEs: `50`
- [CVE-2024-48052](CVE-2024/CVE-2024-480xx/CVE-2024-48052.json) (`2024-11-06T20:35:29.830`)
- [CVE-2024-48061](CVE-2024/CVE-2024-480xx/CVE-2024-48061.json) (`2024-11-06T20:35:30.633`)
- [CVE-2024-48463](CVE-2024/CVE-2024-484xx/CVE-2024-48463.json) (`2024-11-06T19:35:17.717`)
- [CVE-2024-48809](CVE-2024/CVE-2024-488xx/CVE-2024-48809.json) (`2024-11-06T19:33:54.977`)
- [CVE-2024-49217](CVE-2024/CVE-2024-492xx/CVE-2024-49217.json) (`2024-11-06T20:53:26.900`)
- [CVE-2024-49219](CVE-2024/CVE-2024-492xx/CVE-2024-49219.json) (`2024-11-06T20:45:08.233`)
- [CVE-2024-49220](CVE-2024/CVE-2024-492xx/CVE-2024-49220.json) (`2024-11-06T20:41:13.367`)
- [CVE-2024-49221](CVE-2024/CVE-2024-492xx/CVE-2024-49221.json) (`2024-11-06T20:54:50.527`)
- [CVE-2024-49223](CVE-2024/CVE-2024-492xx/CVE-2024-49223.json) (`2024-11-06T20:55:37.613`)
- [CVE-2024-49229](CVE-2024/CVE-2024-492xx/CVE-2024-49229.json) (`2024-11-06T20:40:30.740`)
- [CVE-2024-49237](CVE-2024/CVE-2024-492xx/CVE-2024-49237.json) (`2024-11-06T20:33:52.403`)
- [CVE-2024-50637](CVE-2024/CVE-2024-506xx/CVE-2024-50637.json) (`2024-11-06T20:35:33.010`)
- [CVE-2024-51127](CVE-2024/CVE-2024-511xx/CVE-2024-51127.json) (`2024-11-06T19:25:14.607`)
- [CVE-2024-51132](CVE-2024/CVE-2024-511xx/CVE-2024-51132.json) (`2024-11-06T20:35:34.173`)
- [CVE-2024-51136](CVE-2024/CVE-2024-511xx/CVE-2024-51136.json) (`2024-11-06T19:31:15.230`)
- [CVE-2024-51240](CVE-2024/CVE-2024-512xx/CVE-2024-51240.json) (`2024-11-06T20:35:34.963`)
- [CVE-2024-51329](CVE-2024/CVE-2024-513xx/CVE-2024-51329.json) (`2024-11-06T19:19:24.793`)
- [CVE-2024-51362](CVE-2024/CVE-2024-513xx/CVE-2024-51362.json) (`2024-11-06T20:35:35.750`)
- [CVE-2024-51685](CVE-2024/CVE-2024-516xx/CVE-2024-51685.json) (`2024-11-06T19:34:31.590`)
- [CVE-2024-8775](CVE-2024/CVE-2024-87xx/CVE-2024-8775.json) (`2024-11-06T20:15:06.763`)
- [CVE-2024-9341](CVE-2024/CVE-2024-93xx/CVE-2024-9341.json) (`2024-11-06T20:15:06.917`)
- [CVE-2024-9675](CVE-2024/CVE-2024-96xx/CVE-2024-9675.json) (`2024-11-06T20:15:07.083`)
- [CVE-2024-9676](CVE-2024/CVE-2024-96xx/CVE-2024-9676.json) (`2024-11-06T20:15:07.410`)
- [CVE-2024-9689](CVE-2024/CVE-2024-96xx/CVE-2024-9689.json) (`2024-11-06T19:14:53.737`)
- [CVE-2024-9902](CVE-2024/CVE-2024-99xx/CVE-2024-9902.json) (`2024-11-06T20:15:07.820`)
- [CVE-2024-26779](CVE-2024/CVE-2024-267xx/CVE-2024-26779.json) (`2024-11-06T22:35:05.993`)
- [CVE-2024-28895](CVE-2024/CVE-2024-288xx/CVE-2024-28895.json) (`2024-11-06T21:35:05.843`)
- [CVE-2024-29948](CVE-2024/CVE-2024-299xx/CVE-2024-29948.json) (`2024-11-06T21:35:06.680`)
- [CVE-2024-30122](CVE-2024/CVE-2024-301xx/CVE-2024-30122.json) (`2024-11-06T22:33:46.797`)
- [CVE-2024-33338](CVE-2024/CVE-2024-333xx/CVE-2024-33338.json) (`2024-11-06T22:35:06.803`)
- [CVE-2024-35835](CVE-2024/CVE-2024-358xx/CVE-2024-35835.json) (`2024-11-06T21:35:07.630`)
- [CVE-2024-36881](CVE-2024/CVE-2024-368xx/CVE-2024-36881.json) (`2024-11-06T22:35:07.757`)
- [CVE-2024-47253](CVE-2024/CVE-2024-472xx/CVE-2024-47253.json) (`2024-11-06T22:23:29.663`)
- [CVE-2024-47254](CVE-2024/CVE-2024-472xx/CVE-2024-47254.json) (`2024-11-06T22:22:01.623`)
- [CVE-2024-47255](CVE-2024/CVE-2024-472xx/CVE-2024-47255.json) (`2024-11-06T22:23:05.770`)
- [CVE-2024-48050](CVE-2024/CVE-2024-480xx/CVE-2024-48050.json) (`2024-11-06T21:35:07.863`)
- [CVE-2024-49370](CVE-2024/CVE-2024-493xx/CVE-2024-49370.json) (`2024-11-06T22:31:30.160`)
- [CVE-2024-49675](CVE-2024/CVE-2024-496xx/CVE-2024-49675.json) (`2024-11-06T22:24:22.907`)
- [CVE-2024-51408](CVE-2024/CVE-2024-514xx/CVE-2024-51408.json) (`2024-11-06T22:06:43.100`)
- [CVE-2024-51626](CVE-2024/CVE-2024-516xx/CVE-2024-51626.json) (`2024-11-06T22:10:20.517`)
- [CVE-2024-51665](CVE-2024/CVE-2024-516xx/CVE-2024-51665.json) (`2024-11-06T22:07:10.707`)
- [CVE-2024-51672](CVE-2024/CVE-2024-516xx/CVE-2024-51672.json) (`2024-11-06T22:08:22.747`)
- [CVE-2024-51677](CVE-2024/CVE-2024-516xx/CVE-2024-51677.json) (`2024-11-06T22:10:31.677`)
- [CVE-2024-51678](CVE-2024/CVE-2024-516xx/CVE-2024-51678.json) (`2024-11-06T22:10:45.103`)
- [CVE-2024-51680](CVE-2024/CVE-2024-516xx/CVE-2024-51680.json) (`2024-11-06T22:10:59.270`)
- [CVE-2024-51681](CVE-2024/CVE-2024-516xx/CVE-2024-51681.json) (`2024-11-06T22:11:16.003`)
- [CVE-2024-51682](CVE-2024/CVE-2024-516xx/CVE-2024-51682.json) (`2024-11-06T22:12:02.353`)
- [CVE-2024-51683](CVE-2024/CVE-2024-516xx/CVE-2024-51683.json) (`2024-11-06T22:12:19.803`)
- [CVE-2024-51757](CVE-2024/CVE-2024-517xx/CVE-2024-51757.json) (`2024-11-06T21:15:06.807`)
- [CVE-2024-5642](CVE-2024/CVE-2024-56xx/CVE-2024-5642.json) (`2024-11-06T21:35:08.690`)
## Download and Usage

View File

@ -159311,7 +159311,7 @@ CVE-2020-36760,0,0,d3d6bde66e39bfdfd4a841324d82e511491b3d42fe004f124c54ac6ba8cb5
CVE-2020-36761,0,0,c2eb02c7f5e6234f0a11001f3ccc54043ed97dd502248791c8d262b51058890e,2023-11-07T03:22:33.597000
CVE-2020-36762,0,0,f6173b7fd6f97d18fb02891c23a7c6178aa06e9b134b77ef08cd35cdcdc36681,2024-05-17T01:48:57.747000
CVE-2020-36763,0,0,e42a9e5e88fb81af0859cd97e3a2fb6d19d996764baf3706e8d6074686ad2768,2023-08-04T14:01:30.770000
CVE-2020-36765,0,1,8f5e53cdfa6de8b7bd007fab9b4b3fa9f738261de98aabc48e6fd805e67dd712,2024-11-06T20:35:02.123000
CVE-2020-36765,0,0,8f5e53cdfa6de8b7bd007fab9b4b3fa9f738261de98aabc48e6fd805e67dd712,2024-11-06T20:35:02.123000
CVE-2020-36766,0,0,114009cd5e840397d1acebf053cb444eb4c7cbfbe18f570ae9870647d1e8facf,2023-09-19T21:23:38.407000
CVE-2020-36767,0,0,05a3a61dc2792f45359316526a3d616e7f19a025ecb636a8fbad638d49ca9941,2024-09-09T20:35:00.707000
CVE-2020-36768,0,0,ecc80caa61f3e820e6276ca18cc7a867921e71d907d5691cbc8a6de956bf71d9,2024-05-17T01:48:57.980000
@ -186998,7 +186998,7 @@ CVE-2021-47071,0,0,b0504ff2034ae0c4cc16202b4cc6e9136ea7ef90af22d96415d8d13f21662
CVE-2021-47072,0,0,cf41cbf231f55b926ec73e3d5eeef7180bfd709e7f8ced7efd6dbec1d429bdcf,2024-03-01T22:22:25.913000
CVE-2021-47073,0,0,55717623a5e4775e6cdba866cbade7342e2c623e9f3852474ccdaf2b36202333,2024-03-01T22:22:25.913000
CVE-2021-47074,0,0,c944055c12bdbb473a00f06ba663e9aa59fbf07805a8b36dc68ca8eaece782c8,2024-03-01T22:22:25.913000
CVE-2021-47075,0,0,fbef03aac6a8106fd4f4c672eae599661287850b31546fdede7523cd1d19f393,2024-03-01T22:22:25.913000
CVE-2021-47075,0,1,27e8af01fd213c49f50653349ef0cf1ed22ebbd4ae6322143077ee7949c385c4,2024-11-06T22:35:00.660000
CVE-2021-47076,0,0,7c8622ce3d2f5da5194ef5fbe7d3dddeb59a9016a2e1d320c327f4bb4eeac7a7,2024-03-01T22:22:25.913000
CVE-2021-47077,0,0,094226e13a4d30639d25f36be3dfea47179d6a1794694d0d910952f9e632810a,2024-03-01T22:22:25.913000
CVE-2021-47078,0,0,e39a645f82e6ef83a23da18377ebefe42c441100a5fd642553de38a4fecea2c2,2024-11-01T08:35:01.573000
@ -187154,7 +187154,7 @@ CVE-2021-47227,0,0,d58b6e5d0039e2c73e223660c4806a8199d919f5d02b15eb3b8ec0875620e
CVE-2021-47228,0,0,9c1b787ae52c72cbfb8866da7935ec75c9a82081ae53aec3f3f0cce23cf65a07,2024-10-31T15:35:03.093000
CVE-2021-47229,0,0,fbd2921f2b86842d2838e402054523e81b9ec6072574e295a789287be69873f9,2024-05-21T16:54:26.047000
CVE-2021-47230,0,0,e93bfe980140e197128aeec8d8e071a295e8048bcae174dc11c0f6f8b98f2b67,2024-07-03T01:37:24.797000
CVE-2021-47231,0,1,1256bef4bbc75f826a04367ba6cc6ef92a8f6c223b664e3719ccc68eabc6d142,2024-11-06T20:35:02.850000
CVE-2021-47231,0,0,1256bef4bbc75f826a04367ba6cc6ef92a8f6c223b664e3719ccc68eabc6d142,2024-11-06T20:35:02.850000
CVE-2021-47232,0,0,815758cd4f06e69d867d33b6931ac610aa8caffc0e8fb7075a2a9e75b5c2f775,2024-07-03T01:37:25.720000
CVE-2021-47233,0,0,835070949da84097217f4d4e5033c3ff72191f49028f7bd22052b56b38fe9b03,2024-05-21T16:54:26.047000
CVE-2021-47234,0,0,5e090bb9140802a519feef1c4149d848ac7b86688c14a5e0d7f61b967b2d5c5b,2024-05-21T16:54:26.047000
@ -187220,7 +187220,7 @@ CVE-2021-47293,0,0,d4175717fac52bdecf0a051eab952d1932ea701c0d180eda92454abd07515
CVE-2021-47294,0,0,eed110f6ebe2f4f1f995b47d7666e7889aeb7fa2d87e2f53966418b3abc9e4bb,2024-05-21T16:54:26.047000
CVE-2021-47295,0,0,013087c79c3f331d9bb419ea80648c1fa718978367791e83c9506e16cd9f49b1,2024-07-03T01:37:35.127000
CVE-2021-47296,0,0,553ad20d7a60522641b80e942c788444f417324fcfe1677518267567a26cc7f8,2024-05-21T16:54:26.047000
CVE-2021-47297,0,1,333805ed4e79f0bc3b67d88c0e6192920afb3fddf5417e17801e321533d44e06,2024-11-06T20:35:03.380000
CVE-2021-47297,0,0,333805ed4e79f0bc3b67d88c0e6192920afb3fddf5417e17801e321533d44e06,2024-11-06T20:35:03.380000
CVE-2021-47298,0,0,2a6bc6b6da25d2e397b3047358e3f94e3be86c5fbb66b5f57b8901cb87aa771f,2024-05-21T16:54:26.047000
CVE-2021-47299,0,0,fba4b9b1cb0e64292a95658fd15d778e7dd5706d84eedb82deb4717ed9433da9,2024-05-21T16:54:26.047000
CVE-2021-47300,0,0,99d2f09c980dd38f30812bc5dbc2efbb17c499e36ca13769411dcadecf2f2dee,2024-05-21T16:54:26.047000
@ -187307,7 +187307,7 @@ CVE-2021-47380,0,0,6ef9d8f19e2d391d612177085eea92176c97933b61d761b5b210101aade90
CVE-2021-47381,0,0,7b85e763b1e6aa964beacb6a095e7a796de91e62f6b651bf54755e15c83c4be4,2024-05-21T16:54:26.047000
CVE-2021-47382,0,0,9902b5f0babaa9562f55cdcd44eda32880d1e10eda3b2384591d56d854c8420d,2024-05-21T16:54:26.047000
CVE-2021-47383,0,0,ff2552053b4f1b5e9d4e30daff68cd5b1b4bfd57e3ba2b4b2bab0caff135d3fa,2024-05-21T16:54:26.047000
CVE-2021-47384,0,1,2a53cff041f6cd283c6aba6c3e33acbe7cdf32bb789c5688d14d6402d59d7023,2024-11-06T19:35:00.697000
CVE-2021-47384,0,0,2a53cff041f6cd283c6aba6c3e33acbe7cdf32bb789c5688d14d6402d59d7023,2024-11-06T19:35:00.697000
CVE-2021-47385,0,0,6010a520bcd7b1504800904e8165de2217ee2ba960dce5e53887b1aaa9581f95,2024-05-21T16:54:26.047000
CVE-2021-47386,0,0,e158effddd011922f6bb1e239f3ac2ff0958ef62d3ee287d6927aa1acec73135,2024-05-21T16:54:26.047000
CVE-2021-47387,0,0,8b75eab51a871e46e57add98c9e15658762b300490120d757b7bbb028d38406c,2024-05-21T16:54:26.047000
@ -187400,7 +187400,7 @@ CVE-2021-47473,0,0,62c8562680eb4c53639001cda404b00fb742f1279f4684ea0674924bae10b
CVE-2021-47474,0,0,04fd221fb63a425b0cc8651869ddb014996f7867a1d0ff2cdc001afbfca8f702,2024-05-22T12:46:53.887000
CVE-2021-47475,0,0,946afe63fc7669980621eb147080dce8165a487bfe4fc5efdf98c317407e6aed,2024-05-22T12:46:53.887000
CVE-2021-47476,0,0,fa51be5b9d9f0fc66eedc2509899a798c0e108eebb09ae670114483c19895964,2024-11-01T15:35:04.050000
CVE-2021-47477,0,1,47f976030f46c20da49f298e5d3296ed2f0af2b5274eb733500f61bef980ebd3,2024-11-06T20:35:03.627000
CVE-2021-47477,0,0,47f976030f46c20da49f298e5d3296ed2f0af2b5274eb733500f61bef980ebd3,2024-11-06T20:35:03.627000
CVE-2021-47478,0,0,0c4d619a017b34a9e71fca60c9c78d1369044c99a73f7a9704ccc8d6d4213331,2024-05-22T12:46:53.887000
CVE-2021-47479,0,0,23846c9680437faaee8b60d655484b75ffbf3f6cfbaddf65bfa876ba4daa07c5,2024-05-22T12:46:53.887000
CVE-2021-47480,0,0,6fe0bcb80501304551f827c43dc962bcec63fb14686881c0934d1e7cba05e2dc,2024-05-22T12:46:53.887000
@ -187509,7 +187509,7 @@ CVE-2021-47582,0,0,a303bc490ed932a1afc5bb4b5129633bc3034bcabff4864f9a509289f08af
CVE-2021-47583,0,0,31fa0416a87d3ac15f0275ea6141b29b416ea02761d8c7a0b7bebf09c972c897,2024-06-20T12:43:25.663000
CVE-2021-47584,0,0,5e297524c53687d7062f536fc4ebf0eec9dd59e0e1b8ce2a1565481a5d020832,2024-08-19T18:35:20.133000
CVE-2021-47585,0,0,ce01987df681397de7d54893e5efcb2392f1d920c4c52cb4fe8e15c2b35f81ff,2024-08-19T18:29:03.543000
CVE-2021-47586,0,1,9999b29ebc4be5f8da91519ea116e955bba1883cec7a48554f483b4ba00be485,2024-11-06T20:35:03.827000
CVE-2021-47586,0,0,9999b29ebc4be5f8da91519ea116e955bba1883cec7a48554f483b4ba00be485,2024-11-06T20:35:03.827000
CVE-2021-47587,0,0,87a6481c75c4ef2a3e6251612b5954051141159c9762a4879438fd1aa646fa0c,2024-11-01T15:10:35.867000
CVE-2021-47588,0,0,0f7c2ddebf5230cc4da6aa5555c1f5261002923073136fff5e4910d65af55ae8,2024-06-20T12:43:25.663000
CVE-2021-47589,0,0,90b76d41b40e586a29ff9e2db3957fc07fd2120cba5363d84fdec4e79fc74d37,2024-08-27T03:16:19
@ -216927,7 +216927,7 @@ CVE-2023-22586,0,0,c0f6f379862442d3ccd46f1d01f35b2a6cd6c71022a896121eb7f131c67a1
CVE-2023-2259,0,0,9259ad9ceae0c8c1f4c656af51f2c18472350b622766660808a6aa2eb69bd018,2023-05-03T20:01:59.110000
CVE-2023-22591,0,0,75da081719215e85b169466ab96fafbcbf7d54cd5859377961ad331a00e45425,2023-11-07T04:07:04.387000
CVE-2023-22592,0,0,82b28f4ba2eac1f90837e550befeb0c1e0dcb9f94216a05d29c70063cff743b9,2023-11-07T04:07:04.477000
CVE-2023-22593,0,1,857bc2f70352828bb2de5e8a29e130b4a49b0e8b05230cc04409046b66a53189,2024-11-06T19:35:01.273000
CVE-2023-22593,0,0,857bc2f70352828bb2de5e8a29e130b4a49b0e8b05230cc04409046b66a53189,2024-11-06T19:35:01.273000
CVE-2023-22594,0,0,e7b22226fc5536c38dc1bfa9b8608c26d55fce01972e039872a3a3f6d24cb664,2023-11-07T04:07:04.730000
CVE-2023-22595,0,0,87c19ed494799c85280ecc5603d2d131eb58c4866c8bd25864baeef2d8d8a9b8,2023-08-04T17:25:00.243000
CVE-2023-22597,0,0,c5b8c532ce487ca0c3338f3c64fe075c749ce4ed59b601364427efe8a3f912d0,2023-11-07T04:07:04.990000
@ -223003,7 +223003,7 @@ CVE-2023-30307,0,0,9a4646bb9568f252fc01074e511568fce5daa83ca6ffc95bb5a8dd9c13ef0
CVE-2023-30308,0,0,3194094e704a260b61b3aca71ad9525f4004c473c591db53bbad11ae33f61923,2024-05-29T13:02:09.280000
CVE-2023-30309,0,0,7bed2cc00d974c0f21981e002db05aa1d9c9bb6eea8a85e53b56492f139e3535,2024-05-29T13:02:09.280000
CVE-2023-3031,0,0,10c1f10cf1613bd0a1bbf7200771584bf6866fde631eac26533eb7c4ae501aea,2023-06-12T16:48:57.833000
CVE-2023-30310,0,1,b64f22995dd6d4cf998abebda15f2f520a185af33c13f85f861bcf5fd0b99ea3,2024-11-06T20:35:04.160000
CVE-2023-30310,0,0,b64f22995dd6d4cf998abebda15f2f520a185af33c13f85f861bcf5fd0b99ea3,2024-11-06T20:35:04.160000
CVE-2023-30311,0,0,38ed413270d757fa6e6b0203aef5d67e96c045e85b6d145080f9751d7548d7fb,2024-08-20T19:35:00.850000
CVE-2023-30312,0,0,9bb840b5e08cc8b26537ea87c8910725e38e1ad08fef8fe39b89eeab371027a8,2024-06-19T04:15:10.477000
CVE-2023-30313,0,0,2cb0a9aa3f78a13a6e0375a643da2654e262a035ecaa4ef4f0a18ff3448b0de1,2024-11-05T21:35:00.983000
@ -230498,7 +230498,7 @@ CVE-2023-4011,0,0,ff845b3bec6fa1ec7ec6e3f06d521b3f25d1051621eed84e2a9da8c89b74f8
CVE-2023-40110,0,0,cec4af71facc1cc987deceb5b2ce57911065506adb95057b276212cf5b36338b,2024-08-22T14:35:01.077000
CVE-2023-40111,0,0,7ef7fdb4bf5f59a65adc27a98870222810b4869fe47d231ee6164556414c6387,2024-08-26T18:35:02.257000
CVE-2023-40112,0,0,3e814fd548a907e629b136506543b20b0c8bf4457d1103cb293d5b1296af5322,2024-10-31T14:35:03.023000
CVE-2023-40113,0,0,dad3819774db3e875db7c132fed9de97c7d6741efc9f62a28c01187a90cb75bc,2024-02-16T13:37:55.033000
CVE-2023-40113,0,1,3853dba4c9b94994cc638ea53bf05fb88a4a7ea3a12c121e5a59c2e1bb350fae,2024-11-06T21:35:01.543000
CVE-2023-40114,0,0,e6aec33bc1c8bc322f8db56fa5435f1230eb43cb85d03f30ffc4d82fb9d7da4e,2024-08-15T18:35:04
CVE-2023-40115,0,0,6ad67ef2c7829749737245dfadc3fcfd57b4fbfd7581d4abd8672c61e42143e0,2024-08-01T13:44:27.970000
CVE-2023-40116,0,0,fd7eabcb426fa5f4a29a166c8edb69a1f9a74a2f45f7b71a79b11321ea6b7183,2023-10-30T17:12:54.827000
@ -230783,7 +230783,7 @@ CVE-2023-40435,0,0,e7be1f239c3863a0eba73a76429a8b96807d5e85645d6b427822282e8a79d
CVE-2023-40436,0,0,9151fd8967ecc0125396416ce982a67888cf21bc1634d6a6aeba9d57e0d2aeb5,2024-09-25T01:35:59.353000
CVE-2023-40437,0,0,6941cb0456cc33ca3d33bbc99082f1df62f86f849fa6869631ecd6102a6298f7,2024-01-17T19:06:18.080000
CVE-2023-40438,0,0,08d009f7555bd3b6180dbaf950da9c59b188e58a9caa39b2a01d3c280b373e23,2024-01-16T23:51:13.887000
CVE-2023-40439,0,1,b59cf437acb175533643b5177fc84a9280077b61c863a7e6b1de22da28602d1e,2024-11-06T20:35:05.490000
CVE-2023-40439,0,0,b59cf437acb175533643b5177fc84a9280077b61c863a7e6b1de22da28602d1e,2024-11-06T20:35:05.490000
CVE-2023-40440,0,0,29069b9d0f2624195a3a6c5e937d855493bae53f7b8c7e0b2b74aba07a7e4e39,2024-01-30T21:15:08.517000
CVE-2023-40441,0,0,865a7fe67a1e12c20a0e54c9b60b5fddd74e863be31e8f7e01a43397e40c2016,2023-10-12T02:26:57.743000
CVE-2023-40442,0,0,371a54a2886702bdd120ac95d0338c00531e4b44258cb23feb2e8e3ccda1d1c1,2023-12-22T16:10:36.647000
@ -232591,7 +232591,7 @@ CVE-2023-4283,0,0,40c39331048450495c644559b354ee713768185b93e1269a4c183c39135e4c
CVE-2023-42830,0,0,9622822082e6d489decb51a66ff30e0a25a850d4f889ef38731f27c29845d8f1,2024-01-17T20:56:33.957000
CVE-2023-42831,0,0,15c2657a6cda93c32bf9e6d0e8961db6424b2c5d0a3a331db0a572f126ae013e,2024-01-17T20:51:35.577000
CVE-2023-42832,0,0,d4139f8d7ebcb6dbe3f816f6f2093afb5b55323ca863cc15652de2caab2f0de4,2024-01-17T21:16:29.277000
CVE-2023-42833,0,1,e734eedae2bb752eeb00548b60901154a053eb23181a33e00797702140032cb8,2024-11-06T20:35:06.280000
CVE-2023-42833,0,0,e734eedae2bb752eeb00548b60901154a053eb23181a33e00797702140032cb8,2024-11-06T20:35:06.280000
CVE-2023-42834,0,0,08d87def638a26a5eb9093b6708a8eacf657bb89462798c60d907ee1b3410e44,2024-11-06T15:35:05.580000
CVE-2023-42835,0,0,78785fec11e2de3eca12998532cc4e293a664be2c1386edf69f250c848f4be97,2024-02-22T19:07:27.197000
CVE-2023-42836,0,0,57dd9f5214333cc32869174710fab8ff9c58d3ed310e22708cf2b23e79addefb,2024-02-22T19:07:27.197000
@ -234666,7 +234666,7 @@ CVE-2023-46045,0,0,0e8abce2cbeee2bf608426602c7398443e9d61c9d45f545bf4f725e813250
CVE-2023-46046,0,0,555b8b8a7696393805aad9f9e82bc3d251f1a10afcfafafc77a77e46b5bc656d,2024-11-05T16:35:04.913000
CVE-2023-46047,0,0,c24e10e557ef6edbf0ab7d162e7557ecb1baed06f8bacef6ed95114dbb222d99,2024-08-22T18:35:01.467000
CVE-2023-46048,0,0,fdc0cbd47578c151a3373264bac42e14fbe5938d1d4d2542c8c29ee6e1717908,2024-08-19T19:35:04.860000
CVE-2023-46049,0,0,2315016d1ba4bba7f533371cd70ec259060eaeb7a90fd1662a78c0e2eff24ad7,2024-08-02T21:15:49.197000
CVE-2023-46049,0,1,8e6f7b6c7a7eac9ea78c6ce3bd00ffa3c645397b30e7e0d1d00f973f47c0bc45,2024-11-06T22:35:01.887000
CVE-2023-4605,0,0,4ca1198891ef7f19a4427afe916541ae6cc98eedaf95349b4181266b8438d380,2024-04-08T18:49:25.863000
CVE-2023-46050,0,0,87b655fafc2924f1174e71a2efa862ed9e13b897c527143d58a0e534f2058a50,2024-01-29T09:15:42.640000
CVE-2023-46051,0,0,2eb4bb56bef8fa961b472990c5ab8fe369fd9c4072f6f002726f3dd2b9de96c0,2024-08-02T21:15:49.273000
@ -237221,7 +237221,7 @@ CVE-2023-49508,0,0,04e9a38738b4cc108d703febb2c252d26aa82baa13d5ac7cd4f3585b5914b
CVE-2023-4951,0,0,a18642f9510452464e8d9524da7c3caa32fc5ff59f81d45c2b207c937616ee68,2023-09-22T15:15:14.253000
CVE-2023-49515,0,0,fba6ae4b9dbda87bf77d58079d1e7fdc5597e983326dac218dacc086c68e81b6,2024-07-03T01:42:36.150000
CVE-2023-49528,0,0,bcff757c4ee07f22736afa13a889e6d02ee86ae241b71b1c98b3c18a1dcdacf5,2024-07-03T01:42:36.973000
CVE-2023-49539,0,1,e1d330f05b14a326f19ff77ceaae494168e128af031cec81933a24aa6c4e263b,2024-11-06T20:35:07.133000
CVE-2023-49539,0,0,e1d330f05b14a326f19ff77ceaae494168e128af031cec81933a24aa6c4e263b,2024-11-06T20:35:07.133000
CVE-2023-49540,0,0,fc00996658e2e1a07b2142617d49b74a28a84c9993046a375e13324fccec29b2,2024-08-06T16:35:02.663000
CVE-2023-49543,0,0,5e9a28d34c8c9dccbca41948423cad2a9c85e5bdcb29ea577934b5fccba83d1b,2024-08-28T20:35:04.473000
CVE-2023-49544,0,0,4165df005ca812878112fcb221906d65322102731e6bd43d48afbe4e5ae39573,2024-08-01T13:45:11.667000
@ -239131,7 +239131,7 @@ CVE-2023-5243,0,0,e49838102a5721a273506f040a2a95bdeca1c43c3e414141d5a1a29f3ab700
CVE-2023-52430,0,0,9b119fede2bb0d45c16cf06aac5c3bb465a163e763f0ae820658b0f4e7b632b3,2024-10-16T13:11:53.423000
CVE-2023-52431,0,0,c64a02a0cf6c92acef7a3c67de07bba1d63a180e819e78f76030c959fd7430a0,2024-10-21T20:19:07.513000
CVE-2023-52432,0,0,33470768b31e3ca42f4e91386984f89611d22bbf917c9270afe6f040d18c0aa7,2024-03-05T13:41:01.900000
CVE-2023-52433,0,0,5c95197bc729cebc3540e26fddb8edd3d3fb52d95160d4c0a67697d37cf469ee,2024-06-16T13:15:50.413000
CVE-2023-52433,0,1,8d887de26d6dfe68d81d2421f14cfca93fcdcdb99a18edd116f8f8ba1a152a5e,2024-11-06T22:35:02.950000
CVE-2023-52434,0,0,5f6421438d786a20a52ed0cde51449021705adf52d40bb4e366d1e2bfbcf89c9,2024-11-04T13:16:26.490000
CVE-2023-52435,0,0,ae7b4fd4a171fec756dcf7f16bf33027a1ed1befebaf9b2d2ac0547ee44f8075,2024-09-04T12:15:03.967000
CVE-2023-52436,0,0,5082d9a933f70907f213f656684b4963f01c1f95bdc79d48ebfb69bdc95b2335,2024-11-04T13:16:27.173000
@ -239195,7 +239195,7 @@ CVE-2023-52489,0,0,8691663f32e0b87d6090652a9eefea760ece79f0cb2b6e57db1f7a8a5adc6
CVE-2023-5249,0,0,902c33c9dbd28cbe5075a17fccde01699ae9f0ae88d9ebb42328197dcacfdffa,2024-07-03T01:44:12.613000
CVE-2023-52490,0,0,5497ebcc533be995a69bc10424afce569aa011a4c97808cf492ed3f54baa7ba5,2024-03-12T12:40:13.500000
CVE-2023-52491,0,0,a9def7af26959496f75588e8fbb8ad6e1b25e764e66a488bb14f62e906c4089f,2024-11-04T13:16:34.917000
CVE-2023-52492,0,1,6cb2ff207cf9aafb6090c129739c6d74d7c082df5985572149d2b1df87d0d5d4,2024-11-06T19:35:03.290000
CVE-2023-52492,0,0,6cb2ff207cf9aafb6090c129739c6d74d7c082df5985572149d2b1df87d0d5d4,2024-11-06T19:35:03.290000
CVE-2023-52493,0,0,0056ac7b9a11ed734aa93836878423f074f7718f5ce8771fef288d1615f0aa89,2024-11-04T13:16:35.103000
CVE-2023-52494,0,0,ebe1d617d77329a0d9d56d0d6535311cfe7daa23b2498c41c7e912bcfaf261f7,2024-03-12T12:40:13.500000
CVE-2023-52495,0,0,c36feeccb5858e992af880f22a6164098203cb8ff165c7874d7ea3bb185fac52,2024-03-12T12:40:13.500000
@ -239216,7 +239216,7 @@ CVE-2023-52508,0,0,3df95157cefd88c2c70c60dc2487d4ca580bfd7d3fdbe934143d84c8e721d
CVE-2023-52509,0,0,bcfcbf5df8dadb5c77febe775be16b48e4efcb0ae7858106717d3661c9712efd,2024-03-04T13:58:23.447000
CVE-2023-5251,0,0,de8655b38a30642065bb297eb9a35bac6ebd60f43a29d54f33ad99175564509f,2023-11-08T02:15:53.437000
CVE-2023-52510,0,0,b0381f94ad157bbb54ab8605627db382c3f938399b2f02a5029ba8865071a1c0,2024-03-04T13:58:23.447000
CVE-2023-52511,0,1,01296eb26594b1e185bb600b7dc924facb05b3ec05d3adb36dc6800174e05e0a,2024-11-06T19:35:04.233000
CVE-2023-52511,0,0,01296eb26594b1e185bb600b7dc924facb05b3ec05d3adb36dc6800174e05e0a,2024-11-06T19:35:04.233000
CVE-2023-52512,0,0,7596373f786b6636f89cf16d29f325de01a9f27b0c6ad0696e922063bc5589ad,2024-11-06T16:35:07.700000
CVE-2023-52513,0,0,68cace4cbac4420bddff285689d43b129b233d8af8a4ea35d26ac73dcbdfbb33,2024-03-04T13:58:23.447000
CVE-2023-52514,0,0,96b3bc37b65a7f0f11caed4828897554155b5e08fde97001434005eb59164e32,2024-03-11T16:15:07.720000
@ -239228,7 +239228,7 @@ CVE-2023-52519,0,0,f79ce1035763550ef6afb964f7e85392eec938c2001b022078a43182525a6
CVE-2023-5252,0,0,10f9996951457224cec75839d378c1d5a53db0da5cae33c9f9a6fc2136cd44f0,2023-11-08T02:12:53.770000
CVE-2023-52520,0,0,dfb6be84ae9c08b205a8ea51f3a7f126c8fb64615069ff5cb9d3b51cb43ee2ef,2024-03-04T13:58:23.447000
CVE-2023-52521,0,0,26ba094f0a43e00b237fc666ea879d557b221b56ad6aeee17c07d7717bd0e4ca,2024-03-05T23:15:07.310000
CVE-2023-52522,0,1,b1ecf17729bb9b74f5dbf3546ec9de2d3c642cfd4f217702cac9956b0311d2f8,2024-11-06T20:35:08.150000
CVE-2023-52522,0,0,b1ecf17729bb9b74f5dbf3546ec9de2d3c642cfd4f217702cac9956b0311d2f8,2024-11-06T20:35:08.150000
CVE-2023-52523,0,0,2b8f78f901e030e63d8c8eb5395447753b7ff2211824258bf99a381a11aba125,2024-03-04T13:58:23.447000
CVE-2023-52524,0,0,2bb0786e3a461d7ca7f8c1c896ee359596adb6bf330c48f435cd78777cce4c48,2024-03-04T13:58:23.447000
CVE-2023-52525,0,0,da29f7fd4e888e13fc450d9b347a550d2ef7908097fa7df01f2173b5c063b678,2024-04-04T14:15:09.130000
@ -239333,10 +239333,10 @@ CVE-2023-52614,0,0,d94968612236477bba7745eee64229fa912817c484efb1fca20359c970e9a
CVE-2023-52615,0,0,749d512f79fef77d3fdca4cad7a7699f201211b1e7d2e923a5efa04789e1232b,2024-11-04T13:16:41.400000
CVE-2023-52616,0,0,dbf5b5c019f95e9f7e084e0052b1042c7b0204698debded51abfbb51fcf5bc41,2024-11-04T13:16:41.497000
CVE-2023-52617,0,0,4fdfa9fe396d100d9c46a2a78e479a182caae5cbb210cbb8a5ff9c9c9bce0255,2024-11-04T13:16:41.580000
CVE-2023-52618,0,0,28dfc591ae56b48f3e0ad097b4f43795724cf80136fbe5fa2e6d19df668b08d0,2024-11-04T13:16:41.660000
CVE-2023-52618,0,1,e99ffc5626a291ed7c9ac4eb79c56c6a064fd62237f676b60250fcf88da7dacc,2024-11-06T22:35:03.783000
CVE-2023-52619,0,0,20a7bb0cb2eaa7fa51742374ca05d5bd7fdb36e86539d53100b75675b035a409,2024-11-04T13:16:41.737000
CVE-2023-5262,0,0,dbc9cec6bb50e0a68a3b5ede7b08b3e3d8766566fd5a2a3e7793ec9100e6864d,2024-05-17T02:32:56.017000
CVE-2023-52620,0,1,7c3227f3d7abaa4e58b0c4ba62caf899d71083a6f645f11271d63eb138082c52,2024-11-06T20:35:08.343000
CVE-2023-52620,0,0,7c3227f3d7abaa4e58b0c4ba62caf899d71083a6f645f11271d63eb138082c52,2024-11-06T20:35:08.343000
CVE-2023-52621,0,0,26a33f9b008c64c6664e3e3a4869fe4d4572933cf6941e2f62ad48b2a923903f,2024-03-27T12:29:41.530000
CVE-2023-52622,0,0,1a4aa348f9b525ca69fe5a199e23d2ce602b346fde4c103318a5ea96e124b7a6,2024-11-04T13:16:41.973000
CVE-2023-52623,0,0,74f6264a0d4f8f612430a8ffd97335038e0648002eaa7642f7664a57b746597f,2024-11-04T17:35:08.873000
@ -239406,7 +239406,7 @@ CVE-2023-52680,0,0,e82e4387cefcb72f3626231c08d733fbbeee0a4339500eacb2170dc4151a1
CVE-2023-52681,0,0,524cd4977fea10c4065e85c75e427a13dce6ed3e1a3cad8c759b5ff8706d5faa,2024-05-17T18:35:35.070000
CVE-2023-52682,0,0,cc6799c17a2f081b667ffca3e6c764a8a9c44e0c1986a4909c37d26d7d17217e,2024-05-17T18:35:35.070000
CVE-2023-52683,0,0,10cf5db773a627f10f62e2b747504a42a9b761360a3c2b0570d6054a6128bc20,2024-11-04T13:16:46.517000
CVE-2023-52684,0,0,33c7802e83b0cacce3f4943922f9d7f250c042b0471e9f2d74c9792f85da2e19,2024-05-17T18:35:35.070000
CVE-2023-52684,0,1,51ae7d2a43eba5f5afdf160a7f780d7d593d4e2d03669e20e4d6cce8d2b31000,2024-11-06T21:35:01.813000
CVE-2023-52685,0,0,cf8140ec5f2b974bcd3641a1209ca634d3cb951fbfbcbdcc6560b6110e8da549,2024-06-18T14:15:10.603000
CVE-2023-52686,0,0,e035efa57ae3873f49aa0c8ed309f1cfd09bba774f28aff6bfa9af8bf3cd5628,2024-11-04T13:16:46.670000
CVE-2023-52687,0,0,b28f8c5460527301f61b9b984f4d389c8ddced6a4a6f85a3bf5048ab19f25e70,2024-11-06T17:35:25.900000
@ -239463,7 +239463,7 @@ CVE-2023-52734,0,0,2f76584608f90880dda5ed1cfe003cf8af38c50f85a7ba05f54382ff1ea93
CVE-2023-52735,0,0,179c3f86616fee02c6472500bdd41878f007d990a3ea0e8bcc41b49975c24734,2024-07-03T01:43:52.910000
CVE-2023-52736,0,0,df1befba83ff05c2a0d33711ab630a647dd341841417f5be872b0b202fdf8e4c,2024-05-21T16:53:56.550000
CVE-2023-52737,0,0,38cbe5e55641ebdafc5db964d325c9c266a1e7ec0b6e0d92c3a71b5417001004,2024-05-21T16:53:56.550000
CVE-2023-52738,0,0,c876063cd09e734f72ff43929eb012970dc4e31f27bd74cc3669d02c7f455d51,2024-05-21T16:53:56.550000
CVE-2023-52738,0,1,dc676761402004e11f6262bd178a76b0a97c37b209a47d729e14948a72f3b55f,2024-11-06T21:35:02.090000
CVE-2023-52739,0,0,0604a018a0e873dfcb2efbd5385f2a976fd9bccf7eaeca2825615c866a803dd1,2024-05-21T16:53:56.550000
CVE-2023-5274,0,0,864010d058c6ccc43d7cfa5280cf12d11d903e5a06c224a3c38c51a571ff7581,2023-12-05T18:20:39.937000
CVE-2023-52740,0,0,da86f48edd07a1ed6b3338b97bd3ad3fac2b70de7e362c30acbab6ea25eebd29,2024-05-21T16:53:56.550000
@ -239532,7 +239532,7 @@ CVE-2023-52797,0,0,b73a8fa6a4e76687f73e7ef3277e8c68588fa5517245ff16423bb4845b549
CVE-2023-52798,0,0,903a4612f669db82041c075124d4474cdd9cf4659c36c3c48aa9ccdd02833098,2024-05-21T16:53:56.550000
CVE-2023-52799,0,0,6fa89f7497ff6b75f31beef8e947309d06c41f701952588e6bb06313dc1fdef6,2024-05-21T16:53:56.550000
CVE-2023-5280,0,0,cf02e072cc72e580d64df88a732c123a0390498118112c202e656970398e1bca,2024-06-04T19:18:10.060000
CVE-2023-52800,0,1,14779273a0271f6f818fa65737c64c9364846719a230d118051fdc46a7303574,2024-11-06T19:35:04.477000
CVE-2023-52800,0,0,14779273a0271f6f818fa65737c64c9364846719a230d118051fdc46a7303574,2024-11-06T19:35:04.477000
CVE-2023-52801,0,0,b95bb5d93b24e9cbb6c35e0192140cfc3d31cdb66f52213d203f1a292ea4cc97,2024-07-03T01:43:59.217000
CVE-2023-52802,0,0,38a995833f5576e7c1a5ec4da3354344605bb944329f5f6f5f2b3f5909e6538e,2024-06-08T12:15:09.783000
CVE-2023-52803,0,0,694b6e6d733c1665ec8c85b7467bf8e595bd273683c4250c62b7d8067abc7346,2024-07-18T12:15:02.423000
@ -239609,7 +239609,7 @@ CVE-2023-52867,0,0,e3b1128fcef491f8e641a0d12897f04317e86b4b1298f61d59bdc866043f9
CVE-2023-52868,0,0,75bd5ccd052bd251c0e42c6807740befac18d5aabec3715f40791b5a99e23ad5,2024-05-21T16:53:56.550000
CVE-2023-52869,0,0,d37040a4a2cb7087cc996199bd2cd80e9806440599974a39ed1796463348598f,2024-07-03T01:44:08.950000
CVE-2023-5287,0,0,ce1ed467182937769fcb531729fdb4e9725d88b02f3d1fc370ffab1fa8fb95bd,2024-08-02T08:15:35.190000
CVE-2023-52870,0,1,27dae345b2e5970c9d3feba55d8322e50c1240ab8d505536cedb4d647d27a0d6,2024-11-06T19:35:05.403000
CVE-2023-52870,0,0,27dae345b2e5970c9d3feba55d8322e50c1240ab8d505536cedb4d647d27a0d6,2024-11-06T19:35:05.403000
CVE-2023-52871,0,0,fe9db8c2a60a638be83569a9528a947015c20fb1ca847cd7d6ee75b69b6f429f,2024-05-21T16:53:56.550000
CVE-2023-52872,0,0,95562b8fb0cc421a39b970c47689ca5dfb57a52adf4583e91f8091a32ec9fe9a,2024-11-06T15:35:08.170000
CVE-2023-52873,0,0,87939aab335722274ff9346609ace667795230b4a40e5a5c0583dd242243c124,2024-05-21T16:53:56.550000
@ -241492,7 +241492,7 @@ CVE-2024-0025,0,0,d28de8c9f19ab5ba79d0474f043c936cf414f4247e50396a672a60bd3b9be7
CVE-2024-0026,0,0,774ed6ba82d0d9c7a541b3db4a5a359cf56663a0f101d669bdf9d716d0a13278,2024-07-03T01:44:32.803000
CVE-2024-0027,0,0,8812c8953c6645d49bd5f62acac1b6ed41a4a4a9272988ed4e3b759e771e9ede,2024-05-08T13:15:00.690000
CVE-2024-0029,0,0,55e8334b75ebe900149ddbd8622fac8b29c21a3b953c0b848545a4ed036cbf2f,2024-02-16T13:37:55.033000
CVE-2024-0030,0,1,0dd9bca1dbcc5e3458318f715ab6b433aff63564ed4b03d63174ae833d93503d,2024-11-06T19:35:07.573000
CVE-2024-0030,0,0,0dd9bca1dbcc5e3458318f715ab6b433aff63564ed4b03d63174ae833d93503d,2024-11-06T19:35:07.573000
CVE-2024-0031,0,0,b1cddaec25187c54af4bebb0dcc796dbc4415ad876a9b9d3fa787304a60914ff,2024-08-01T13:45:54.900000
CVE-2024-0032,0,0,28a201a5282c4952746adae47b502afc7f863fa68b2049d01865c530c24bbb57,2024-08-29T20:35:54.413000
CVE-2024-0033,0,0,27344b7715a75d0aa82a7b18cd174c27fc55902f246df424d23b6d9f7df6dd01,2024-08-16T18:35:03.300000
@ -242423,7 +242423,7 @@ CVE-2024-1009,0,0,97af4237278897e4de60a52c929ac5642d8b709167b278dc1af6a70d4d177e
CVE-2024-10091,0,0,d0b808b13e4ac8a1cdb029b434d2f58c9a91ce65332255a3523a2d40d54e2bbc,2024-10-28T13:58:09.230000
CVE-2024-10092,0,0,96aeeb96773a5c0a6e4e68b9196f2f369ac89a58107c1085bc8eadc272cfbb94,2024-10-28T13:58:09.230000
CVE-2024-10093,0,0,94a330c294b313c7705272073b44baeb2e1acc1449e78c4e0c252c7b91c53316,2024-11-01T18:07:07.003000
CVE-2024-10097,0,1,ebed9ad10c7a648598c4572f4800c95ee8b1505f542b8454e9698f3995387b9d,2024-11-06T19:14:22.817000
CVE-2024-10097,0,0,ebed9ad10c7a648598c4572f4800c95ee8b1505f542b8454e9698f3995387b9d,2024-11-06T19:14:22.817000
CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615abb6,2024-10-21T21:03:53.647000
CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000
CVE-2024-10100,0,0,f9d8653b0b809755807a27c91859fa59733e823c9baf33fbd9ba6460baccb9d4,2024-11-04T19:15:05.297000
@ -242439,7 +242439,7 @@ CVE-2024-10119,0,0,49edb44a36719c29f8ad406ee8678c1d6a57c817986d9e175ffebf1849d72
CVE-2024-1012,0,0,261f4dda24c2aefd44892a1e7cff84e275a6853943a2bba059238594bb202f50,2024-05-17T02:35:10.090000
CVE-2024-10120,0,0,877872300e701fe4a1efb68fcccda192535f4ea8d014c4745e6d765239ef8603,2024-10-30T20:20:46.010000
CVE-2024-10121,0,0,4fac6e713d174c782f95945b8314e41c0820946450664e88d069ef79a5b04b0a,2024-10-30T21:21:02.083000
CVE-2024-10122,0,0,153862f3f9eb72281b1c72dbca34e4eb5ada0e8c96788af32355e9b86fecda30,2024-10-21T17:10:22.857000
CVE-2024-10122,0,1,4e5f619ae1411af7ba6427863c46c2d3289b70e0f0b6031ee87ce9e9971de5c8,2024-11-06T22:05:23.700000
CVE-2024-10123,0,0,e122097599e5662b16a80366258ebdfd607e11805ffbed77bafc707b3aec8a81,2024-10-28T16:06:53.747000
CVE-2024-10125,0,0,57aa34408f8260c656e1d34a999469d8529d9afe80be211b41d76ddc0eb4278d,2024-10-23T21:15:14.510000
CVE-2024-10128,0,0,f4621c94fde2e2c994e30c7fb126f4e421d19f40a100d08f3cba9307c37673b9,2024-10-30T20:31:33.213000
@ -242823,11 +242823,11 @@ CVE-2024-10826,0,0,e7caea17df9e50303e84eb12f606f4531bb8bb9449a87b4576ba355c7a719
CVE-2024-10827,0,0,c533f4c70607df301dc68c381588fa8b3325a3d893bbcbb9a6092f250e2c41fa,2024-11-06T18:17:17.287000
CVE-2024-1083,0,0,f65354685ac9d5e6ec0c7d89ef33fa98a96cad0e23da0316206039cbd9c94fda,2024-03-13T18:16:18.563000
CVE-2024-1084,0,0,b38be98d35d4290a3ce2408da5081c91dd802a2448815858b2cd8d2247674e10,2024-10-17T15:46:42.330000
CVE-2024-10840,0,0,7c13b48653833d393d956bfeba05dc2dd9647859d024272e6982bcc84d954739,2024-11-05T16:04:26.053000
CVE-2024-10841,0,0,cb468ec73cf79f50123b416f8630b7e95a6ee5ee80f06d5ca0c3e30ee71804b9,2024-11-05T16:04:26.053000
CVE-2024-10842,0,0,4f347a0fe404db0a70d46d9dfbb2bce6fdecc583b1df9d0e17ec6eb1dbdd1366,2024-11-05T16:04:26.053000
CVE-2024-10844,0,0,32322f050196865be4aae941a4bb5adece1ed82ba13b1f2493fc23a256fb69c2,2024-11-05T16:04:26.053000
CVE-2024-10845,0,0,a2864f4a8e52c61d4eaa5da9f3b813c3c867d63046f2a47c80f727d56a3ef7dc,2024-11-05T16:04:26.053000
CVE-2024-10840,0,1,3088ecb88b6f610106137e52cd92a9df0637e9f9f20cd58417274c10e35a041a,2024-11-06T22:49:12.173000
CVE-2024-10841,0,1,1914449d57ff1a3babaaf40b7a33b002037c2a6558bba70a8f37b24e8f3218c2,2024-11-06T22:50:24.277000
CVE-2024-10842,0,1,7aeafb02fa0f31956e4616acda70affdbdea4445fee41471b949ff3589528b00,2024-11-06T22:43:19.327000
CVE-2024-10844,0,1,ab92f6f85407dca15cb1e5a84778b8d496e0601ae883a0bd7f3db6703a1b0447,2024-11-06T22:38:13.800000
CVE-2024-10845,0,1,e23b6836533b6527e69274c9897179b623fe8ac43fca2950e064d79cbfdb6f9f,2024-11-06T22:38:03.347000
CVE-2024-1085,0,0,1d186f1dd445cf86c8be70ef01a658a198ecb65ca5305ee36e96f272e65874b8,2024-02-05T20:41:40.513000
CVE-2024-1086,0,0,3e819e2fff80149e3f377751fd1fb28a52f8791d9e5d08990c549613b15214b2,2024-08-14T19:41:08.673000
CVE-2024-1087,0,0,9751a2fe52b8f14e0fc1c9d86ee656c42465ba61ef03201895b6c1868f5679fd,2024-01-31T13:15:11.030000
@ -242841,8 +242841,10 @@ CVE-2024-10916,0,0,53443e54e55c3a54111ef55bbe8925e1700f77a586713f1c8fd853e1c516c
CVE-2024-10919,0,0,a9eb02ffc877d3649d3e97e181e7b5d396e5513925c1dfbc9593594bbb4efcef,2024-11-06T18:17:17.287000
CVE-2024-1092,0,0,4e514cbeb8cbdb0016fe4cb374f3dffe448e95b35a82b13ed7cb7be1b7fe61c2,2024-02-13T19:43:06.247000
CVE-2024-10920,0,0,2a084f5df50e8d62344f7fb5574910af35d9b3838be955d3bbcc07e777ed2e3c,2024-11-06T18:17:17.287000
CVE-2024-10926,1,1,836b6dad2f467cae785f28103c4c848e59141b80159f4c1ffe543f045d6be6ff,2024-11-06T21:15:04.927000
CVE-2024-1093,0,0,de7ad9b72d87a55cf339c2dc774b7bea1d33bb68e3b932a439fb6fd6a0ef5b53,2024-03-05T13:41:01.900000
CVE-2024-1094,0,0,e9e492360318e20689e515fe6138ed3b8630e834f4abf2efeafd987f7e7b2dc6,2024-06-17T12:42:04.623000
CVE-2024-10941,1,1,675a2a19161edc958e8a197cc6dc80c9908daf66aaab2775f6145c4f21c47875,2024-11-06T21:15:05.213000
CVE-2024-1095,0,0,e70da3b629cae08421ac3ff6db71fb525bf872b735f906aa9168a1a3feae7dcb,2024-03-05T13:41:01.900000
CVE-2024-1096,0,0,9e6ec92aa91c226f1dce82b660bd82ecda12366a7db0465d5ab79a9947cb0a51,2024-03-21T02:51:34.720000
CVE-2024-1098,0,0,7637c79f93f6fef4c2ad0472be16e5b2b85cffeb9436b7defda280fbd3390871,2024-05-17T02:35:14.017000
@ -244467,7 +244469,7 @@ CVE-2024-20962,0,0,bcf0fdf63a172649d862e0b60296a1507069b6b1d3f284da5e5091c27efe3
CVE-2024-20963,0,0,777b7cd2ebaadb4763a737f62544d35f548c2765fd413ec39c0e69f1d2e44eee,2024-02-02T17:36:33.743000
CVE-2024-20964,0,0,ab74670f7eba706fccff530b8fad5283c75afa505713ad1602df91d0111cf529,2024-02-20T19:50:53.960000
CVE-2024-20965,0,0,d41d12dc1f39ed4f3636fac85c63e6e6a8b99443b9015fee96d2868d746c8460,2024-02-02T17:42:20.270000
CVE-2024-20966,0,1,dab87e37585bb236d1417d0345775a702be652c48f5564f545a9e12473d94c75,2024-11-06T19:35:08.623000
CVE-2024-20966,0,0,dab87e37585bb236d1417d0345775a702be652c48f5564f545a9e12473d94c75,2024-11-06T19:35:08.623000
CVE-2024-20967,0,0,24e7161f6aa52b5a617854b182e26d8b3a2b8a2e00cfc6867379e3242f7ad4f6,2024-02-02T17:42:32.037000
CVE-2024-20968,0,0,f87c3ac120b069363cef49b73c4bea5dd9bdd52a2a03eea095a7ff8c6c344cb0,2024-02-20T19:50:53.960000
CVE-2024-20969,0,0,058e957bc600be5635dd584028438dce1629507fbbb938dc220b2cfe0d1cbacd,2024-02-02T17:24:44.617000
@ -244548,7 +244550,7 @@ CVE-2024-21039,0,0,5533a80506dc2a9584f3f0a1cb6213d349fbac4fc9f3be60fa10f69e60d73
CVE-2024-21040,0,0,9207f1539b8715e9de73bf8605d282f9258ecbde4b6b5af37d49fb9b9b73b544,2024-07-03T01:46:25.020000
CVE-2024-21041,0,0,53175e4f9f6fe9a06cdb65415f15e9860a5cc1810804215df4199c035c4956b1,2024-10-31T16:35:04.810000
CVE-2024-21042,0,0,a53b604b49a76162fbba6ea20fde9e5db3c2c63e25a2d34ff97af2cb2bb953ae,2024-04-17T12:48:31.863000
CVE-2024-21043,0,1,34b86fb6bc70d1cb3f2e8b52f242178af3e3c87a06302294640b6969cd919425,2024-11-06T19:35:09.460000
CVE-2024-21043,0,0,34b86fb6bc70d1cb3f2e8b52f242178af3e3c87a06302294640b6969cd919425,2024-11-06T19:35:09.460000
CVE-2024-21044,0,0,2cd88f43af07596557d9fca3fb13efe6eb725b0bbf07f13100392e30400b440d,2024-04-17T12:48:31.863000
CVE-2024-21045,0,0,8f4acd1404f7851517d6c66a40a7ade78fca2381123c6edde49776a3d7abd81c,2024-04-17T12:48:31.863000
CVE-2024-21046,0,0,6cd7417a9fe1dad42e5e390bd73f6c59f847ce1b22a979e6a850a74e46589580,2024-11-05T16:35:11.803000
@ -244755,23 +244757,23 @@ CVE-2024-21244,0,0,a2d8857947cab47435f13652b22d7660077ec99971dc97d0f1c04da6d4b60
CVE-2024-21246,0,0,ce26d4699cd66244be859e323ba861645fea4d7c63493af05a19982e79b3ffed,2024-10-18T19:04:57.587000
CVE-2024-21247,0,0,65e62ada788d7c8dd8f6bbcfcf373e355969c491bcf2b35cf52ed2528731ff42,2024-10-16T20:33:33.027000
CVE-2024-21248,0,0,9d2bec6b0c5bd428b3273089dc6de78cffbb45eee6dc4edb4da7a745f217bff7,2024-10-18T14:59:21.397000
CVE-2024-21249,0,0,561b0c05f80cd133fd2bf7f9570e926d43e2c7747cbbd22ee7f0f51bfa829c07,2024-10-31T15:35:25.647000
CVE-2024-21249,0,1,62dc164222266e9012addfd5a4c4b6cc91556280f972a8f370ed3479ce2dfab0,2024-11-06T22:53:50.587000
CVE-2024-2125,0,0,872a2657310e63ac8c9e764159a2a2b1b3991a1ff9d35b42d26ee113c654f515,2024-04-10T13:23:38.787000
CVE-2024-21250,0,0,c3a216316fd161ecf42e4b85935aab4377046a8c65dc40e8a08a09abcd439125,2024-10-17T14:35:19.303000
CVE-2024-21250,0,1,194dad5e2041a7f20ff44922c3cd68e8f11877affaaf0af77e6c9accdf6d7287,2024-11-06T22:54:57.887000
CVE-2024-21251,0,0,95021887cdea7aae31070af44e524d1ee6c9c77252dd0eef331bed470fbf412a,2024-10-31T13:35:08.347000
CVE-2024-21252,0,0,3562e5499767a042e190a60bfd9dbb9b6b695af77c5fafca40036938307414a4,2024-10-18T17:04:44.797000
CVE-2024-21253,0,0,82cb10003f4ec5bdfbeaba5304d2361b5866cecedb70f3ece91f971a87496d10,2024-10-18T14:59:43.660000
CVE-2024-21254,0,0,69ca4bf103295a9b35d72b61c0821b7611adf3b7f78c0a3144fa3da855147ce0,2024-10-18T17:05:58.723000
CVE-2024-21255,0,0,e030f05632b5a87ee9fbc0b2487a30eaf79a4e92eeff8a93914fc40aa8e258ce,2024-10-18T18:16:50.040000
CVE-2024-21257,0,0,4eb5b2386255bfe67a12d4f16c9687502d7809166e4f1a2b618c5f01aeaa9628,2024-10-16T16:38:43.170000
CVE-2024-21258,0,0,d66d60d8ebe1253680938995404bc802bc4b9dba35146ae97db380f0d8c97381,2024-10-16T16:38:43.170000
CVE-2024-21257,0,1,725e5cb13b95dde80a37c32a41b8094719a9fca76dfc8333734f482e81824a37,2024-11-06T22:55:18.400000
CVE-2024-21258,0,1,f6a4f5d7d1aa00a2377e749a4d3b06007d1ed6555c84462e00a1435f7514e74c,2024-11-06T22:56:19.527000
CVE-2024-21259,0,0,f4f5607ed9f1a78aaccb5e08790e38092d26477ddc636f65efb0050b27293955,2024-10-18T15:00:17.133000
CVE-2024-2126,0,0,4ce1f11f7bd5c084b75067cba762f3a64c791e384d09fc3623bdffa8d2aef429,2024-03-13T18:15:58.530000
CVE-2024-21260,0,0,7a47438a9729091b847bae11b79b0b39e45eeeb29dbb35a8c4d79bd78f465c02,2024-10-18T19:05:29.830000
CVE-2024-21261,0,0,0899d9cbcc2683b4e5f057eef455f1d9ca53b0f3260b8ba7058f26a504b9b734,2024-10-21T18:27:17.307000
CVE-2024-21262,0,0,82558944e30d58821a3281c570a2d377b7ec0772f885917aea1c19c8d3bb4a8f,2024-10-21T16:28:16.427000
CVE-2024-21263,0,0,7ac7bc00544efec065b7a3ea0c417046cafbfd2ff0aea2fefa7b4595b67183a3,2024-10-18T15:00:52.463000
CVE-2024-21264,0,0,43edc8b0674a64ea84e7381a14394594bbb3f638fa4e4e95e2e0a620c8f8163d,2024-10-16T16:38:43.170000
CVE-2024-21264,0,1,d9f928ae696c644062bfe905454106684d42ecbe4c3ee5dbcffcc7a85fd3bc2f,2024-11-06T22:56:41.647000
CVE-2024-21265,0,0,c55c1df1e1622cf6e643b1eb11b86f0a45ff8d2660ab5a45972681fbb6ed81df,2024-10-21T15:49:21.027000
CVE-2024-21266,0,0,eb9a8a34ffd00406d4abf6e4a3c73c351bf9d5c51c3a336b85b5cbd4050db042,2024-10-21T15:49:43.940000
CVE-2024-21267,0,0,badeabc98b9ebca68fd4a6f1dc13051a7275b459f1ba8064226c678286ad482a,2024-10-21T15:50:27.217000
@ -245006,7 +245008,7 @@ CVE-2024-21492,0,0,803eb1b38c0a3c364c8ed4dea2bf283518201c6c637d9dcb0eb2c40900b3f
CVE-2024-21493,0,0,8c569f1b0a59292e6c9cf7ec9ce82294e78d1d0805330784c9c6f403ab9b5f07,2024-02-20T19:50:53.960000
CVE-2024-21494,0,0,0bbab6d51758efdfbb0a7b2f9291f8e5deeed39eed0d020b8776487f79305949,2024-02-20T19:50:53.960000
CVE-2024-21495,0,0,d8114eaee60fb319f9f14d9bbb95c01136acc0dc9b681a7e416381982ba11775,2024-02-20T19:50:53.960000
CVE-2024-21496,0,1,fd2afde9cc348b878ada34cb6af6773012668bca46f1e822b57f2512814d4fea,2024-11-06T19:35:12.967000
CVE-2024-21496,0,0,fd2afde9cc348b878ada34cb6af6773012668bca46f1e822b57f2512814d4fea,2024-11-06T19:35:12.967000
CVE-2024-21497,0,0,8aedc196ee518fe8560cc512f459ccbfc6592e8201a18667b2196e5e6bb6b22b,2024-02-20T19:50:53.960000
CVE-2024-21498,0,0,3c9376a89b1471a3f3dcd2f26b2302ecf028dd3649469284754d6d6bbe15e588,2024-08-01T13:46:44.130000
CVE-2024-21499,0,0,056024a19cf11190da9415625f86200e7f99c9c1c15d5f4eac3772c0369f1c48,2024-02-20T19:50:53.960000
@ -245160,7 +245162,7 @@ CVE-2024-21686,0,0,4a77c3c56e7b5b00a78de09ce573bf8e0630b6f60379d0ccdce9209c8559b
CVE-2024-21687,0,0,b10f0ce22ddc5215abb86b2d036e862f5c36c964079edaaed2bac3d77de9097f,2024-10-24T20:35:05.307000
CVE-2024-21689,0,0,d8a79405abcb9c8abfdb03520e41049c9522145c88e975847ada5aebd53c39e7,2024-08-20T15:44:20.567000
CVE-2024-2169,0,0,25fcbf8b9d7008ea9954a41615969f4d36543f4a604eb878bcc8b4c5c18a9fe0,2024-08-02T17:35:41.760000
CVE-2024-21690,0,1,52f2f5bb1e3e94fbb3d7fb8fab564e88563477b86bcce8501f8853e0eaa6dfd8,2024-11-06T19:35:13.787000
CVE-2024-21690,0,0,52f2f5bb1e3e94fbb3d7fb8fab564e88563477b86bcce8501f8853e0eaa6dfd8,2024-11-06T19:35:13.787000
CVE-2024-2170,0,0,758d6332b5fccd657d38a7eddcc769e16fb72e0c1b6514443e29b8614302434a,2024-03-26T12:55:05.010000
CVE-2024-2171,0,0,17c18c0537b711b05cfdac779ba2d168e9830dc55b69168346eed3896c1fbc48,2024-10-11T14:15:32.983000
CVE-2024-2172,0,0,edf7001396454eaaf4557a9c3fcef53434431cfdf8112832b9dc273636d1d743,2024-03-13T18:15:58.530000
@ -245374,7 +245376,7 @@ CVE-2024-22009,0,0,b5b916a7d5e03fc859dbc7dc76ad79ca7e20552b5b212df09fe8f4b48b2af
CVE-2024-22010,0,0,064f021344a36df851e34619a798aa49214be75a65182801242af835352a2a15,2024-11-05T17:35:07.960000
CVE-2024-22011,0,0,f1daed51c903d88d263d46bfaefe467f13d6b47a3368a8cc0e99c1a391f6eea9,2024-03-12T12:40:13.500000
CVE-2024-22012,0,0,dc6a18ae7accb379105ae5b8c9fe53def4787e4dcb1f5ed3397b80bba457789c,2024-03-12T21:15:57.953000
CVE-2024-22013,0,0,7f532e6900797141a60e66fca5bd8ac368c382be95753f2e15222fe6285acb11,2024-09-20T12:31:20.110000
CVE-2024-22013,0,1,82c717c65faf8d538fe3d2eedeb4ed9751bc8b1763b263d1a92ee0f5afa87e71,2024-11-06T21:35:02.500000
CVE-2024-22014,0,0,b059d091724833d1bb51d32eadbd1be8dce585949d29de43319d8d8ddaed06d9,2024-10-25T21:35:05.193000
CVE-2024-22015,0,0,ab9198a00b8902f553a18672e99e37367cbd733d408a460d3e69564e986f708c,2024-07-03T01:46:59.010000
CVE-2024-22016,0,0,80ed0ed1953eb9bc819815a69c5782ab91648798b066ce1586fe70786fbfbdf5,2024-02-07T17:33:12.727000
@ -245435,7 +245437,7 @@ CVE-2024-22081,0,0,c0e23ef382492c7380a92e96cb3bb331fbab187b3695f4beebcf35389003e
CVE-2024-22082,0,0,459e25d191876c4f00cade807052f238137ad057437a31854486c01937977cf9,2024-08-05T19:35:02.233000
CVE-2024-22083,0,0,7a6168861b8307faff71dd88ea4edf4af71ed0e4a8c79dad79d5ed358e7010c6,2024-03-20T13:00:16.367000
CVE-2024-22084,0,0,0e122ae85d4de51fb69a5bdf68cc5b622f1fc44a5c7c74096438459ba25e7679,2024-08-03T20:35:04.983000
CVE-2024-22085,0,1,9bb660a953db76f501963932fc60e0d5afb5a0529b26a144a0fb7fc6555c5828,2024-11-06T19:35:14.630000
CVE-2024-22085,0,0,9bb660a953db76f501963932fc60e0d5afb5a0529b26a144a0fb7fc6555c5828,2024-11-06T19:35:14.630000
CVE-2024-22086,0,0,1d7696b944cd1a26a2cc7bdc48a35b3903f2aec00a961a7e53e9ced659d9458d,2024-01-11T17:04:07.660000
CVE-2024-22087,0,0,4384797ae7846daec0107426d58d87d7c4784c559db16808176350ae4c959dce,2024-01-11T17:03:51.967000
CVE-2024-22088,0,0,b895d73398c482c8e6acdb9bb17741aa9b7a4b9e58038e199e46754d5e3337bd,2024-09-04T21:35:06.700000
@ -246232,7 +246234,7 @@ CVE-2024-23294,0,0,6e53ba65116756c4100f8fe8d5569a0c62f61cbe9a5faf2cb1a478a60da66
CVE-2024-23295,0,0,888dad9ac3d8cb77923a71e92315d941876e8170cf4689e417e49228bdb9fd95,2024-10-27T14:35:05.370000
CVE-2024-23296,0,0,4c1c20e10d440a721ea56c440f9f9d49de01279fc6b58c55156def98607c7416,2024-08-14T19:32:48.817000
CVE-2024-23297,0,0,4e04bab05bbe7ec82e24a36797403e08fa4bc700957cd0b27eee797a80773cdb,2024-10-27T14:35:05.540000
CVE-2024-23298,0,1,11c25643b2811d3e7a7eaf30f2e6f582af0634ebd8c739f4afa1e19e40be1a63,2024-11-06T19:35:15.443000
CVE-2024-23298,0,0,11c25643b2811d3e7a7eaf30f2e6f582af0634ebd8c739f4afa1e19e40be1a63,2024-11-06T19:35:15.443000
CVE-2024-23299,0,0,fe4dd82d5102073a81be0172f4d91c213b490a3370bedc852ed979e38d0840d6,2024-08-20T15:35:03.893000
CVE-2024-2330,0,0,9ae945264bb052d68e9c213073b32e3a9e8de8241b1a06dd279470149a8f98ca,2024-05-17T02:38:10.540000
CVE-2024-23300,0,0,c517d8f3cd7384c2ec4a46a0a893833bb0df2ca0141a1842a58ab8296dd562b0,2024-08-26T15:35:06.113000
@ -246440,7 +246442,7 @@ CVE-2024-23556,0,0,4abe0589b741d76d8a6140e408a99fff6f784fc140eb8dd575aa458015e6a
CVE-2024-23557,0,0,4270afce746443b5193815936f76591ad043b307043acbde73eb7ec4d54cd34d,2024-08-07T19:35:03.190000
CVE-2024-23558,0,0,1aaffec8c09fd69e12702b79a89a97fa66d8cf8050a73827a56fcf9396bca5b5,2024-11-01T19:35:15.123000
CVE-2024-23559,0,0,1cfe950943db323f850a4ffa6fa09a9e594439fd864c25048ffda399bb0b3e4f,2024-04-15T19:15:09.577000
CVE-2024-23560,0,0,e362890ddaf504fd7ec860643e0e2bcce74ce536f1ff64f240f88b9ed03a4aad,2024-04-16T13:24:07.103000
CVE-2024-23560,0,1,611d6f496e671cc0d1d356211a118fce6e543142f0a1a253e80e1a53fcc9dde1,2024-11-06T22:35:04.240000
CVE-2024-23561,0,0,05ce6bff2b3c083c40d1cefd8ecfe83b9e8bac92f3576a18d3243c6c46e3bef3,2024-11-04T22:35:03.360000
CVE-2024-23562,0,0,4d517ea8a2763e5506a865d21e69db429e3d16d2d215329e0568829328a2181b,2024-10-23T23:15:12.397000
CVE-2024-2357,0,0,58f4675a1a89325da5d3ee44283ebc42e89a0cdd69475172a4baac455a4ffac1,2024-03-23T03:15:12.690000
@ -248402,7 +248404,7 @@ CVE-2024-26351,0,0,12fff75a6adfb2a49a1df2419d56c70a882606b31c647e6d0906250c15d15
CVE-2024-26352,0,0,8b15f4dcf8c7ba10be17fb174c1fc0c7dab8a3918429d96aacd6df61b16faa50,2024-08-14T20:35:07.913000
CVE-2024-2636,0,0,99a69aaffd46cfe65a84b6720d2f35122e16b65656b4791402aef2e645d8d6eb,2024-03-19T13:26:46
CVE-2024-26362,0,0,5faf69da8a67af4816d796fd5b51111ac2c788f77e8e8dd0cf83d9d0e45a369d,2024-07-03T01:49:39.793000
CVE-2024-26367,0,0,527c3fc48df6b7e73e05f006f7179ae46d331d377d9a28bb902941bd60f631f8,2024-05-14T19:18:31.490000
CVE-2024-26367,0,1,fb602fe640a36deea42d544a0bf5bbfec018fc1bce2e50bc4f6ba27f1fac9ba7,2024-11-06T21:35:02.850000
CVE-2024-26369,0,0,08c9f0525905502b41d2dcc09bd77683ee3501b8b43f7fda43dd5219f9780ed5,2024-08-01T13:48:09.673000
CVE-2024-2637,0,0,721622b64a65f273433032cdde0b2ce3d6c7d3ce5ea1581ad6c33c2a93b72687,2024-05-27T08:15:09.360000
CVE-2024-2639,0,0,1b2fbb8554a3bfbdfb75c8d2c4abee29a55fe420023a4469268f266088d766ca,2024-05-17T02:38:22.540000
@ -248542,7 +248544,7 @@ CVE-2024-26644,0,0,7934c2f59b6e30a2c4b4745bfbfa90280e322c49f0c2a186c87bb52bbd1ff
CVE-2024-26645,0,0,fcb784c6c783cccdf8ab1103cd462aaed01b5616113ac8c3b057371a72bdcc2d,2024-11-05T10:15:36.983000
CVE-2024-26646,0,0,37b8583bb8aa6b5d9135a9adf8c1cea7db38d580753ce18483b0a0263c262490,2024-03-27T12:29:41.530000
CVE-2024-26647,0,0,2352172cdf00eda3657e1ca2ad602c79475b6fdb427922a2ce2991151abd5140,2024-03-27T12:29:41.530000
CVE-2024-26648,0,0,4cedcf3cfff8479b6fed3984e33e00ae084d6a67309ed2c17e18f60de1bb7057,2024-03-27T12:29:41.530000
CVE-2024-26648,0,1,c17515eda5659d8a7ff11ea44fa35ca00ff75d317f4eddf403747bbe01bfe069,2024-11-06T22:35:04.950000
CVE-2024-26649,0,0,940fcd7e5d20bc1c18f4c974a09622f0b6b6d87231bbd7408e7118d35c4bade7,2024-03-27T12:29:41.530000
CVE-2024-2665,0,0,0d168a0d5dbe4804c9bebe4f21c0d1f4a27974809ea172b5979b5dccd55d97c3,2024-04-10T13:23:38.787000
CVE-2024-26650,0,0,c37b82afef74cba8f0a1b3081e8c53c80ac8f73689ed9f1c045183b9566d980d,2024-05-23T14:15:09.293000
@ -248634,7 +248636,7 @@ CVE-2024-26728,0,0,1d984fbbc09b2528ed0368e262b6925669160ac0081a20349d9ce1b0481cd
CVE-2024-26729,0,0,f2558d66284076d36d46e0aacf3fb55436eadb8de18e68f9386d43b00e2b9ac0,2024-04-03T17:24:18.150000
CVE-2024-2673,0,0,c0d60620ac5234f9d83256f6c8f0cc424d5b12f467b9d75fc363f57a06d6b86c,2024-06-27T20:15:20.927000
CVE-2024-26730,0,0,e3adf1f18e75f02eb4ddde1d65703597e8a59901e6d25e50ea9de5823f84b09a,2024-04-03T17:24:18.150000
CVE-2024-26731,0,0,a0b35e80e7d711c60a97912dc302c5db34b4fd9235fbfe456f2513f7ece65c03,2024-04-03T17:24:18.150000
CVE-2024-26731,0,1,444fd53cb325041c6066bba9c7011195568465765bfe4f679685b3d9f33781fd,2024-11-06T22:35:05.197000
CVE-2024-26732,0,0,ec7cbeff52970bd11884d825e88204cea9fe962424cd8f5b8fa233a8acdeb543,2024-04-03T17:24:18.150000
CVE-2024-26733,0,0,ffb3f90c0778d3f838c29091a428911e1aa8d896c4d95445af70c44f0420f3e2,2024-11-05T10:15:45.177000
CVE-2024-26734,0,0,0eb1b1feddc3c43838ae7b1cbb500208ff685270dbb18f151464783d19bf4c65,2024-04-03T17:24:18.150000
@ -248648,7 +248650,7 @@ CVE-2024-26740,0,0,1e1bef330b72fc7d544d8597ed7662f3757f2fd4d4713d8ba1cf34c542f65
CVE-2024-26741,0,0,e3c248718399fd38da7f7e0290c551d82b46ab3d7aa0a320a11762dcc655c816,2024-04-03T17:24:18.150000
CVE-2024-26742,0,0,d7af6623131612fa1c7fd4e052a63ef79bda58184e37bad2d9cdda66dda9e08a,2024-04-03T17:24:18.150000
CVE-2024-26743,0,0,4a7e68056af89e9c88fe98dfc22c3d733a12a894d9b16349f941d17c194d57a1,2024-11-05T10:15:46.150000
CVE-2024-26744,0,0,0ceec025040440e9ba41481335beedc9c2145c266bf1333f6ac942206f1c0ce5,2024-11-05T10:15:46.253000
CVE-2024-26744,0,1,0a89200e6dfae9bb0e1be2a7f590bdb3afcdd853d9d245ed930156cf4025f324,2024-11-06T21:35:03.883000
CVE-2024-26745,0,0,122c004116025bf61ab1b820e4608632aeed8cec5ef7c9fee61ffd6ee6d9d826,2024-10-31T18:35:09.190000
CVE-2024-26746,0,0,503c547cde060b718fd5c822ced0ef17967b19427780440c26d09b063f4a1e1e,2024-04-04T12:48:41.700000
CVE-2024-26747,0,0,09de0e643315d31c44b1583413acd72b2581d73c25656d42d1275770b236ac52,2024-11-05T15:35:09.820000
@ -248662,7 +248664,7 @@ CVE-2024-26753,0,0,3846eb71f07ae66d4f1ab1df6c9d443c98aca1924ebf110c33d4d08080433
CVE-2024-26754,0,0,4c9cfa7c31d874fcb7c7bccb3bab927e4d2ae66cd4f4c5042fa0e607d4d1901d,2024-11-05T10:15:47.167000
CVE-2024-26755,0,0,39f7695747b108842d59070ebf8576f95142b84dcd41ed480d2d853aa612b61c,2024-04-03T17:24:18.150000
CVE-2024-26756,0,0,655c17b37b1ef2579c61a87ebef153f2774027727f182f3917510b923fe0ccdc,2024-04-03T17:24:18.150000
CVE-2024-26757,0,0,6034152e03c1ca661ffc06ef00b2bfd06031f7a425df0cd8c48af8de3fbaa9da,2024-04-03T17:24:18.150000
CVE-2024-26757,0,1,90467e553fa06ea3a7c2ab3dea36e3f811f1f99408fa7e26a28d265d66f85785,2024-11-06T21:35:04.737000
CVE-2024-26758,0,0,13c69310718039924d9aab781258d9193abdbc64a782ef9279b6a2cb5e131a2b,2024-11-04T18:35:07.610000
CVE-2024-26759,0,0,fee904955decc510df312a537847d082dbb8683c61f8fb59034da4ba171b0bf7,2024-04-03T17:24:18.150000
CVE-2024-2676,0,0,c5aff2ba1e0c7344ce038e4f14ac4978d6bb29d1aa8d9b0c435541e971559719,2024-05-17T02:38:24.527000
@ -248686,7 +248688,7 @@ CVE-2024-26775,0,0,6fd84ebe1443aa1945a09fd4c48b2b5413a95fedab44014851d1e3de25fa4
CVE-2024-26776,0,0,231483d2965c1ba8393bd7449031e7bde3f34468b7fb6c2f373633060a8098c5,2024-11-05T10:15:48.947000
CVE-2024-26777,0,0,149a5e7ba07fc7fae23ca08bab697f35d178e4d6054d6fb6db6aa2ffb1dc45d8,2024-11-05T10:15:49.030000
CVE-2024-26778,0,0,ba27fdacb2617bc8c2e5f1f9ee53b0927010430cedb669781ea0cbeb302b5a02,2024-11-05T10:15:49.133000
CVE-2024-26779,0,0,ec4054c03218d2454c2d30dd1769a652bdebca802addb64ef26c3ae272a73208,2024-11-05T10:15:49.233000
CVE-2024-26779,0,1,5213496ece4af679413eec0c49002bd6c886a5728eec3dcb023c0c154d5e6da6,2024-11-06T22:35:05.993000
CVE-2024-2678,0,0,bcb8f0bc79308fc240a2e04032fecd11d29a05e517a407df60996ec6cc430105,2024-05-17T02:38:24.730000
CVE-2024-26780,0,0,910e1f464205bb4d61ae164984308d54dec4e128d9fce0100bb0bec47440e7b3,2024-04-04T14:15:09.667000
CVE-2024-26781,0,0,f985d7d52d3c00d388812605acd1c322cb3a9f3a0500eb44ae3d519cd75a2f91,2024-11-05T10:15:49.403000
@ -248721,7 +248723,7 @@ CVE-2024-26807,0,0,104a4e4d854016f8b324666da2a6519a8e2f2a9b7b206527a539918e69652
CVE-2024-26808,0,0,78f28d423840a66070d27b2f76e4cfdb21e72d03dc73ddafa1fe00afc26ddd06,2024-11-05T10:15:51.720000
CVE-2024-26809,0,0,01e5bd6a3e1086db6d390f88a74abf1dab95b48a5074d6a449e0ffc835016714,2024-11-05T10:15:51.820000
CVE-2024-2681,0,0,064400d4b0835279b0227ccac554f0cfa5438a53fe0a37509df7fe4d3bb69b80,2024-05-17T02:38:25.007000
CVE-2024-26810,0,1,3bcbd029ab3dc0530ec232fef8ab00be486fb08e0fc65e925a6e7547e08a8c3a,2024-11-06T20:35:09.833000
CVE-2024-26810,0,0,3bcbd029ab3dc0530ec232fef8ab00be486fb08e0fc65e925a6e7547e08a8c3a,2024-11-06T20:35:09.833000
CVE-2024-26811,0,0,b419aa5e7bfea8f6be9b0c18d47a04ffcdb7322b3bd6706c908ab4700cf29410,2024-04-28T12:15:20.780000
CVE-2024-26812,0,0,e15f8f2f69aee37cecc8fd71e141552acaf8bd02ff4a9774ac9f3745dc6faa03,2024-11-05T10:15:52.087000
CVE-2024-26813,0,0,1e161884c9c6bba988e090609d3e12222e5e93bf4b5b4ea55c3748df4f0005bd,2024-11-05T10:15:52.177000
@ -248757,7 +248759,7 @@ CVE-2024-2684,0,0,d36d2cea9eacbddac9e02987b1e26022fd6a893a6c0f09ee50bb451cfe4d7a
CVE-2024-26840,0,0,66612eb6e16c6bcdf27f2a13a7a8da4787be523c0173463ccb5d506ac9b20933,2024-11-05T10:15:54.040000
CVE-2024-26841,0,0,5e1f136ad87debfe07a19d1692bc4baeabe3ebee450bd39d508ed3155d7f3178,2024-04-17T12:48:07.510000
CVE-2024-26842,0,0,2fcacd7d46da00b8ed6abd9aff9babef4fef495c42a9c08855209ae79c6b7116,2024-04-17T12:48:07.510000
CVE-2024-26843,0,1,08c4fd5074176009c661d945c518162a34e07b9556d45a3623e3f7aac78eaafe,2024-11-06T20:35:10.390000
CVE-2024-26843,0,0,08c4fd5074176009c661d945c518162a34e07b9556d45a3623e3f7aac78eaafe,2024-11-06T20:35:10.390000
CVE-2024-26844,0,0,e7dd9fdbca55a3fe3d15e1a88aaa23b8bd8dc5bda58e0747f6bd61e00240dea4,2024-04-17T12:48:07.510000
CVE-2024-26845,0,0,d8720903c9d639d864f48e7c98cece1c82b5d1302754f3650c04c4d9b5ebfbf2,2024-11-05T10:15:54.423000
CVE-2024-26846,0,0,923f64cc2eb677ab6a3c4fbbb44af82280cbfbab47e28dac8f179259ef7d96ac,2024-11-05T10:15:54.533000
@ -248963,7 +248965,7 @@ CVE-2024-27029,0,0,6c081ff738eb90dc7d9bc74913c1f6e1efe7fc554037e9bb9b8506cffba2a
CVE-2024-2703,0,0,fb7268c6624632e5fa0c645fe7971240898e11ffe4f2cbdecab29aea976f669a,2024-05-17T02:38:25.893000
CVE-2024-27030,0,0,6cf033352f8b449cd788a898986efe2b6d73f55358a4b240c970dde448599393,2024-11-05T10:16:20.800000
CVE-2024-27031,0,0,87e5bf3aa11aa1c30fab50e95fb076e098520276691532d4f69eba3b6501fd89,2024-05-01T19:50:25.633000
CVE-2024-27032,0,1,4256b1faa9815988bb13d55dd8255d2df11f44c2836efb1cce4d42829ee07487,2024-11-06T19:35:15.673000
CVE-2024-27032,0,0,4256b1faa9815988bb13d55dd8255d2df11f44c2836efb1cce4d42829ee07487,2024-11-06T19:35:15.673000
CVE-2024-27033,0,0,99ae4dd52c39324cecbf4c22b710e291de26bae8f09204b4a9dcb711e784eb7c,2024-05-01T19:50:25.633000
CVE-2024-27034,0,0,a9e7de1105d11e28310eeb40c6007754a28705e0fc4756aadd06d5c333670f91,2024-05-01T19:50:25.633000
CVE-2024-27035,0,0,de6caa5353f29d207951f5c6cb0655ce88080de36a966a9e941d0bc22cc59584,2024-05-01T19:50:25.633000
@ -248987,7 +248989,7 @@ CVE-2024-27050,0,0,dd1eb20f7cebaf03087c82f7049e5087e8556c8b803e5a5d2fec557dfd4f9
CVE-2024-27051,0,0,a5f0f37dcf2988f5d46e492939e3fee8af550ad1a72bff52461dcb0b308f27dc,2024-11-05T10:16:24.617000
CVE-2024-27052,0,0,b1181b5fccdcf1dfe1970739e055eb9b25314d32d3dbc033144a22078b1e858d,2024-11-05T10:16:24.720000
CVE-2024-27053,0,0,8ef5fe8a862dfbc909fe138c33df28d8e01f8c7054d8543709bc08fc1a631712,2024-11-05T10:16:24.860000
CVE-2024-27054,0,1,07cae656266e4b957607ddcc6b44e4ae403eb66beb9e9e32950c2c983970e67a,2024-11-06T20:35:11.540000
CVE-2024-27054,0,0,07cae656266e4b957607ddcc6b44e4ae403eb66beb9e9e32950c2c983970e67a,2024-11-06T20:35:11.540000
CVE-2024-27055,0,0,f1f4f60e5be8e483ef7b713ef7c9c11c2b4e92b8e1ac3b8e82c2d3f18ccfe46b,2024-05-01T19:50:25.633000
CVE-2024-27056,0,0,eb9c42cff1d43c51ba37142ff49c7c647f598f278f30af80f297cea872e6d16b,2024-05-01T19:50:25.633000
CVE-2024-27057,0,0,c547d10d93717b1185795df41c7fbb63e300d75cd64ee01d7cffbe3a6007a3e8,2024-05-01T19:50:25.633000
@ -249008,7 +249010,7 @@ CVE-2024-2707,0,0,85c775d4cadcd703355fe22885699e6d3b33832ba1bf4a0f012eb92a76bd36
CVE-2024-27070,0,0,9019d5d00e2e557d6bbee725ec44c36e787b905ee46e216a705cd23f704a5b7b,2024-05-01T19:50:25.633000
CVE-2024-27071,0,0,4eba7924eed5d4a7c52b628064790bf6088c813be987aa811365f6d878e7223a,2024-05-01T19:50:25.633000
CVE-2024-27072,0,0,21e910cf50ea565953242c80b6cde258546166e0d36d0f32695af1f87df3652c,2024-10-31T17:35:03.127000
CVE-2024-27073,0,1,e46a75cf5fc003f1d71f465a90896b6249ef76a9bad5eda1a1b988838d2a6979,2024-11-06T19:35:15.903000
CVE-2024-27073,0,0,e46a75cf5fc003f1d71f465a90896b6249ef76a9bad5eda1a1b988838d2a6979,2024-11-06T19:35:15.903000
CVE-2024-27074,0,0,1eb80e2232cf51208db1f3cef68d3f425247e597c202b41d3d631a42906e1aca,2024-11-05T10:16:27.387000
CVE-2024-27075,0,0,b7b88762306d0403ff5ef3850347356e2cd48c2fda797c5c18c89bc098824519,2024-11-05T10:16:27.590000
CVE-2024-27076,0,0,27005424f15ce206aef745406456863fc53e2307c06546ea31f3e5740f638709,2024-11-05T10:16:27.753000
@ -249571,7 +249573,7 @@ CVE-2024-27812,0,0,e7c3223e43baf8d7f28688930e2d8c8938ef379a12a8d3feb5b2d21387591
CVE-2024-27813,0,0,7509894567bacd8024514a5dcee7ac821e790e4f4fe9721e1c69cc172a7632d5,2024-07-03T01:50:56.220000
CVE-2024-27814,0,0,4d984815b410e205b72405c2d467ac188e0b951fcaa72bcf867e3a4e9a308816,2024-07-03T01:50:56.430000
CVE-2024-27815,0,0,d4d929e969df5e6d126561402877d5f150bcfd9ba0154fd52fd603f8c3293f47,2024-07-03T01:50:56.640000
CVE-2024-27816,0,1,4ad7196d1d7777ac482b799fc1cf864678982df9348a3a55f6e8a16124bb5751,2024-11-06T19:35:16.133000
CVE-2024-27816,0,0,4ad7196d1d7777ac482b799fc1cf864678982df9348a3a55f6e8a16124bb5751,2024-11-06T19:35:16.133000
CVE-2024-27817,0,0,a6ab5e337d8094f63b0da74ff4d2361a68df33c6031350054ba5dcf0e38bfd15,2024-07-03T01:50:57.557000
CVE-2024-27818,0,0,195e34841c67a6c51f404c6aafece2a89e87db6332c4d32e1ca778a22a5fa453,2024-06-11T08:15:49.700000
CVE-2024-27819,0,0,b01d18af8106a4eb630a10d613bb8fd3a0b60e4d3d78300e68d51ac0725c6ff4,2024-07-03T01:50:58.300000
@ -250217,7 +250219,7 @@ CVE-2024-28804,0,0,f7e3d6c3e14215e831a96b931ea15f5f72cb16cc7bfabd09d8b34530beca5
CVE-2024-28805,0,0,cb27f95e8662e6f56b138761747243a7826d2330470c48886448473bebd0bb3c,2024-10-25T18:35:04.053000
CVE-2024-28806,0,0,b0870c92c612bc52e55ac5da958c74e320d7e205346206836a7ae598363f9d27,2024-08-05T11:35:01.757000
CVE-2024-28807,0,0,5a4650d9d919dd00d60ada425df7221ee51ecb76af44fdd9eca355c706e3553b,2024-10-04T13:51:25.567000
CVE-2024-28808,0,1,6fc8e572569d4866c6fa9429b9d27d19969ab5023429b014e564e428389657b1,2024-11-06T20:35:12.717000
CVE-2024-28808,0,0,6fc8e572569d4866c6fa9429b9d27d19969ab5023429b014e564e428389657b1,2024-11-06T20:35:12.717000
CVE-2024-28809,0,0,32a8202bed4dd3b9abf5e0e2fc819e903ef58b53b2fb296a3ab4e72cb018ad65,2024-10-04T13:51:25.567000
CVE-2024-2881,0,0,65fc535be8a815e92053ae1d797e8977602b99048c471a2a98041135b70a0df9,2024-09-04T14:27:24.057000
CVE-2024-28810,0,0,3739176212869d56c3a3e998caee9cc2562b0d9aff07961502c94d248b44c109,2024-10-04T13:51:25.567000
@ -250288,7 +250290,7 @@ CVE-2024-28890,0,0,75d08f12fbd468307e29dd7cbe4c7c3d5acf11ae18647e40fe18f61a37a2b
CVE-2024-28891,0,0,31c9d1ebf9f51d96b38fd3616c071c476c1bf3bdfafbca895cdab316c5bcd3e3,2024-03-22T12:45:36.130000
CVE-2024-28893,0,0,6bb6e7d4eb5ffccbd865059808a0bb14806c115db17b0c7b58ceaf6722125e36,2024-07-03T01:51:55.153000
CVE-2024-28894,0,0,52f5c99a2393e8296645b919b77395855b2fbf6ddfb3ce5fad5f6c31f90cae17,2024-08-01T13:49:21.557000
CVE-2024-28895,0,0,7f60c42026f8919d7327f07078b6071429a47272f57bf3ec7d964752af390988,2024-04-01T01:33:21.910000
CVE-2024-28895,0,1,cc9ec60ced6c4f6144882d61563736eb0ac7e1a82255f1711a9c93674e3ffa46,2024-11-06T21:35:05.843000
CVE-2024-28896,0,0,82c8e7dd995d4781c98f0d7c761e7b443ea0ceb397f6b58ed2e6c96c2843e057,2024-04-10T13:24:00.070000
CVE-2024-28897,0,0,f9f596567c4f5a1d1ef0ea2267dd4bdd40c07a7d3f8bde3d914da43c8724226d,2024-04-10T13:24:00.070000
CVE-2024-28898,0,0,e62fdbb651dac3d1f5bd9c36f1fb9b36d2bc8afc331691f95d20f220846dce98,2024-04-10T13:24:00.070000
@ -250781,7 +250783,7 @@ CVE-2024-29739,0,0,e1057fb9115257c9cc112890add5aab29e2addabc474164aa5dc49dc015af
CVE-2024-2974,0,0,f10703d4490e9d3ed63c6b4abd6c9bf87d6d9b2c11e56d030e360944602d03aa,2024-04-10T13:23:38.787000
CVE-2024-29740,0,0,b8da55b65cd03c8f279340fc383178e4918b6ddc001e65f509694a717508d4d0,2024-07-03T01:52:30.657000
CVE-2024-29741,0,0,a475db5d288fe89871088d062fc43a43c29a2a7a1fc8050faa6de7801796db92,2024-04-08T18:49:25.863000
CVE-2024-29742,0,1,3670333ea9fbb45ca159956c69b3ce18ac4d0f3cf08b138c36c7c46652b7f763,2024-11-06T20:35:13.483000
CVE-2024-29742,0,0,3670333ea9fbb45ca159956c69b3ce18ac4d0f3cf08b138c36c7c46652b7f763,2024-11-06T20:35:13.483000
CVE-2024-29743,0,0,84c45acac68285953d0f847d89629f6df4afe2ae0557e844a739860834244671,2024-04-08T18:49:25.863000
CVE-2024-29744,0,0,261c7417210a4d10590c39459d063b6a3382c5fabd76d0ef2ba580fc9b59de43,2024-04-08T18:49:25.863000
CVE-2024-29745,0,0,40250cabd067f394dda6fb03fe08d83fd93611782b23244c4a5077110391f2e7,2024-08-14T16:59:22.427000
@ -250993,7 +250995,7 @@ CVE-2024-29944,0,0,0c36a6d1c7372e4eb368749381c53b8250c9da970d136cfa0d6ab703ac139
CVE-2024-29945,0,0,545d8d8a5d454680f75ae96bc2bf76a65720f53d27f04c08caf122c1f6350f1e,2024-04-10T01:15:18.693000
CVE-2024-29946,0,0,fe7659ecbb6ae16d4fdd53bc892e5c7f96cebf8e48eee47ced0bee27647d82e8,2024-10-15T18:35:13.400000
CVE-2024-29947,0,0,8ad8469acdce0b9e6eead1629c69da154792700d4004eaaf5144ca5b844c0d04,2024-10-31T15:35:31.567000
CVE-2024-29948,0,0,7ed27d99c23307d6fd7f79bc81ee07d6524ce20c9d05b450c959d1b570daca5b,2024-04-02T12:50:42.233000
CVE-2024-29948,0,1,e90b613e60d3fcc3b6383faa88cb646693ff5f746ac5f86e3ba2e922d0499f32,2024-11-06T21:35:06.680000
CVE-2024-29949,0,0,8f69a1b2712eb97f7e6695f2c2705447de624d6bcea7462b789eaee89a32183e,2024-08-27T15:35:13.560000
CVE-2024-2995,0,0,5c930568d7253585b775f810f84df45baf66709200c70b2d2468f14a6758b594,2024-05-17T02:38:41.600000
CVE-2024-29950,0,0,9160d1bdf3252c379c3a5b7b30fcb4dec34616c1033f3f635941b6a0b940cac7,2024-04-17T20:08:21.887000
@ -251173,7 +251175,7 @@ CVE-2024-30118,0,0,a600cbc3312207feafbf7858618a61f6dd2c38296d39ec303171804559f68
CVE-2024-30119,0,0,4baed8c508a821c818525782701105249753896feab644ba3efffba269f578b9,2024-07-03T01:53:51.120000
CVE-2024-3012,0,0,ae30314159430e25e9f2b09f2e0a440cd8bb99b7d72b62fa4eb73b4affe20188,2024-05-17T02:39:40.620000
CVE-2024-30120,0,0,f704816cf356d01bbdb53903a0b14bef34a589a7c9185030672ca3a1f14e4a1c,2024-06-17T12:42:04.623000
CVE-2024-30122,0,0,b78e8f60e4d0df5148447073604013d9d8b1860e36c446b761d204643c69cb09,2024-10-25T12:56:36.827000
CVE-2024-30122,0,1,9f485dd65437a7051ea4a1c20434d3eb51730baba0c509d8f2633bcd688cd79c,2024-11-06T22:33:46.797000
CVE-2024-30124,0,0,40a4254bc1bc6d9de977773d0f614d8309c4c262777ba96571bd84dac137cd34,2024-10-29T15:35:22.230000
CVE-2024-30125,0,0,1e8984bc19e1a45cd2a6c4ac0b43f227ca7f3a8dcb96ab9c16c6ada82e4faa52,2024-07-19T13:01:44.567000
CVE-2024-30126,0,0,6fc62f044a7f0651037fa78da0350df1d81591508f3d5a2909dd34802958ba70,2024-10-30T17:35:02.160000
@ -252465,7 +252467,7 @@ CVE-2024-31874,0,0,2aaf0dfaa6414e1f138855d0f6d75787313d073eca635397ca103ff7f6449
CVE-2024-31878,0,0,c6557222267c2e9c166ed275e7cc9327cfea0693e0a8976b187deb7865aacef5,2024-06-11T18:23:27.153000
CVE-2024-31879,0,0,3d520028d5f0055139f730dd4a6eb2d11b7ab38a082798764c43108749c5b618,2024-05-20T13:00:34.807000
CVE-2024-3188,0,0,0566f9bb8e826930c137ba20908e573874a3f34d7900cbdeff699f1e3434f595,2024-07-08T14:19:01.160000
CVE-2024-31880,0,1,be8757c255692a002ba856efab44e4c34f4b168589ca30c0f60b6ad09580b3cc,2024-11-06T20:39:55.200000
CVE-2024-31880,0,0,be8757c255692a002ba856efab44e4c34f4b168589ca30c0f60b6ad09580b3cc,2024-11-06T20:39:55.200000
CVE-2024-31881,0,0,b3692d17c2d4f662273dec610556097ee0b8856656ac8f4835c5e840eb8a6228,2024-08-07T16:59:15.627000
CVE-2024-31882,0,0,2166c1d8e88429778073b60eb2a31c41e2b55293434c096888febf101419ae12,2024-09-21T10:15:05.403000
CVE-2024-31883,0,0,c4a2241ac7ebf5ea1afff59f8bf762360ac7a99942ee729cf3d03ae8864dc6f3,2024-08-02T15:06:08.297000
@ -253546,7 +253548,7 @@ CVE-2024-3333,0,0,07adae09fe4330a280bc63a18371de9b336f80bb47bd9644f6cd6164f000d8
CVE-2024-33331,0,0,9615eb671a81caf99447cfe3f11a47c5fdeef0f060420da831650ede0c65f0d0,2024-04-28T23:15:07.120000
CVE-2024-33332,0,0,d4616ec3d8fa6c2d14a3b8584e4c2b0a6bdaf97d03584623852ed717f43b90a3,2024-07-03T01:57:52.560000
CVE-2024-33335,0,0,a6cf66b4ab082555dd66294d501cc06d5dc2570dbd2ca86fdaeca4a73e9bd728,2024-07-03T01:57:53.270000
CVE-2024-33338,0,0,12ed0f94ef6bec704d8914890ae777ce00e44c5deae0f7e3194a77889af4a88d,2024-04-30T13:11:16.690000
CVE-2024-33338,0,1,dc64e17746d1abab607747c6889c78b7b366c3abba84bde17473f7cc02765f3e,2024-11-06T22:35:06.803000
CVE-2024-33339,0,0,1bca262a290e7823541ac5c56ca607cb8f0a9af8877c53f0a0d3e60cf0f91403,2024-04-29T05:15:06.340000
CVE-2024-33342,0,0,060ace50da8b3f05ba7f67da31443071368333e101cc3fb61992e65c8481798b,2024-07-03T01:57:54.047000
CVE-2024-33343,0,0,0403ccc83281b5ef39242fa2607cb174a7fbc97f1fc5833b8133765daf81f98a,2024-07-03T01:57:54.823000
@ -254715,10 +254717,10 @@ CVE-2024-34854,0,0,6f71aaf23a02a63a600f0bcc65e36559492677e420248555c46cf3409591d
CVE-2024-3486,0,0,62a4db44c896a78c795e29b3f9a0c80ac2a4afae964bf16e58e73f8540a6d627,2024-05-15T18:35:11.453000
CVE-2024-3487,0,0,4ff2b905105ca048d90a2e33e25fd9b26128f3e6906b07d6299f870ad63ad55f,2024-05-15T18:35:11.453000
CVE-2024-3488,0,0,61e15575c22ff5a767d1be731e2c78e99681dc33e8575bc1a8940edf28193df9,2024-05-15T18:35:11.453000
CVE-2024-34882,0,1,87af8750e4cb2492a1db05c6a474cbcbe5be6845ce5c5a5a7c082cfe43c24233,2024-11-06T19:28:48.523000
CVE-2024-34883,0,1,722d63ecfd95cb7389789f2d22dce1739cb8a5a04275a6b5ae60854c8f1c6842,2024-11-06T19:28:34.900000
CVE-2024-34882,0,0,87af8750e4cb2492a1db05c6a474cbcbe5be6845ce5c5a5a7c082cfe43c24233,2024-11-06T19:28:48.523000
CVE-2024-34883,0,0,722d63ecfd95cb7389789f2d22dce1739cb8a5a04275a6b5ae60854c8f1c6842,2024-11-06T19:28:34.900000
CVE-2024-34885,0,0,c31fa281dfa61082a4cb2f1ba2ae0a4d2fc44e82a0f4b8396c582b05683b39d0,2024-11-05T17:35:15.887000
CVE-2024-34887,0,1,f7d4e5d57e7e6933735283b4e369818932c8268719be24dd494c0cc41f5513e7,2024-11-06T19:28:15.613000
CVE-2024-34887,0,0,f7d4e5d57e7e6933735283b4e369818932c8268719be24dd494c0cc41f5513e7,2024-11-06T19:28:15.613000
CVE-2024-3489,0,0,ea9bd95a767998b3f2d98747bee17b3d4435734727140c279148a23c9826811b,2024-05-02T18:00:37.360000
CVE-2024-34891,0,0,111963e19005c729fbfb50630519cf497707d87e3cea6358972fd367cefea299,2024-11-05T17:35:17.710000
CVE-2024-34899,0,0,8587795bcb80eaac03ccdd83ddcd275c805b44aa37227142776a20079d894d2e,2024-05-14T16:12:23.490000
@ -255329,7 +255331,7 @@ CVE-2024-35831,0,0,e1fc7f0c23288b900631cc5188ff473f5fa3fdb4e972cc7bfb87b54902c97
CVE-2024-35832,0,0,16e51c73c8492f6c41ac59c1b69f8a852bd6d4b4a851405fa3ce91979c7ac289,2024-05-17T18:35:35.070000
CVE-2024-35833,0,0,844b1146e92e53029cbdbc55527e41e7896607bf9d9f2d333a13fe6ce9ec3a8c,2024-11-05T10:16:42.453000
CVE-2024-35834,0,0,5790f34b9247e53213fb9b46635ec2095a0128f0902ae39f44312cfee4914f39,2024-05-17T18:35:35.070000
CVE-2024-35835,0,0,a276855569c1738142e0a9a7f5c96bc15a43a0942b6ac67b52a0d390795b7723,2024-11-05T10:16:42.810000
CVE-2024-35835,0,1,ed8b4cf6c12992561ec5c36280ef97df65b951d69180a908fa49c8fe9773371a,2024-11-06T21:35:07.630000
CVE-2024-35836,0,0,9b23a77395582da383d04f18fcf78c45edf3e53bc59c70e097e42d6ca3f4fb8e,2024-05-17T18:35:35.070000
CVE-2024-35837,0,0,f29bf26182906cdda28aa14c299eef8b8b82348c3b88e46b3fbb87c2da0adaa9,2024-11-05T10:16:42.947000
CVE-2024-35838,0,0,0eb47f23eeab52dc3f477b4fcefe531f1dd8b9865cefb266d57aa7fa08848ac2,2024-05-17T18:35:35.070000
@ -256055,7 +256057,7 @@ CVE-2024-3687,0,0,0790df61296b0929bb9b469121387dd5b7cd2b562eeab594414896ab3fb872
CVE-2024-36877,0,0,b5940056cb3357be0fc404faf9d20c26624de04b24c3b32151a8171b19c64e1f,2024-10-24T20:35:06.353000
CVE-2024-3688,0,0,fd7741416f20e86cc9ace0c3d1680a96020807dd7ba69d4b2d23070e23e95bee,2024-06-04T19:20:23.107000
CVE-2024-36880,0,0,2b0302be5dbda2a151ebafe5b0e4ed1edd1c138757440601b5f7ee782f06f5e4,2024-05-30T18:18:58.870000
CVE-2024-36881,0,0,462fdd40c8930daf000297e318f0ca45e554b77fd5b7375bf9db7855ebe0f739,2024-05-30T18:18:58.870000
CVE-2024-36881,0,1,6142f77b57b8fb6af09e3dfaa3e3ba0665300e19134a7939c625c7275226d261,2024-11-06T22:35:07.757000
CVE-2024-36882,0,0,c4e89f47d00b2e43c4a551b216b884b27dd65ec4bd9b8e9c9ad6f421591d687e,2024-05-30T18:18:58.870000
CVE-2024-36883,0,0,b7145948b44d2808530c599d92df6ba80fb8f0f74fbae1c4590915a25c35142a,2024-11-05T10:17:08.927000
CVE-2024-36884,0,0,99fb9b488ff5facb16fca9a70e4acded4f568a909f2397c5349d3312ba4256b7,2024-06-10T19:21:50.973000
@ -257899,7 +257901,7 @@ CVE-2024-39332,0,0,c45d3a16d900c3a32f364ec197299d9fa083202fb226adfaa80ac6e38be04
CVE-2024-39334,0,0,94cae5ba65ec50bed6d17b2b54650000947aeee42b8249838d1ebdc24642a191,2024-06-24T12:57:36.513000
CVE-2024-39337,0,0,ae96e6e5658ac679eff4c9acfa518814cd5ee8874dd941939a565173aee28094,2024-06-24T12:57:36.513000
CVE-2024-39338,0,0,224e3a3c09358e014697d42ae118e958b11cd83a92fda65e581c38eeeb8c28af,2024-08-23T18:35:36.313000
CVE-2024-39339,0,1,8276759a0218cbee90798944cb0970f3daa8fd8e677793f3d23bb043b043c911,2024-11-06T20:35:19.170000
CVE-2024-39339,0,0,8276759a0218cbee90798944cb0970f3daa8fd8e677793f3d23bb043b043c911,2024-11-06T20:35:19.170000
CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453cac,2024-07-22T13:00:53.287000
CVE-2024-39340,0,0,fc621b442d86eea0a2e72227f2b14f23e2a67834630b902f47135788b8db4fd4,2024-09-23T15:15:13.907000
CVE-2024-39341,0,0,7c359c6b4015613fc52267fcd7e5d9646d4cfcd7e7964fd0c4b36316116d1347,2024-11-04T17:35:19.370000
@ -259567,7 +259569,7 @@ CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb0
CVE-2024-42010,0,0,f347d4c1e17b119f6d9851ca0a7b1b017e286c890135bf10b6afdc7ab31c6734,2024-08-12T14:15:07.370000
CVE-2024-42011,0,0,780f257b76975d0fa98da03e1cf55c93a899ebb5f320ce83ce248dea2ed98368,2024-10-30T18:35:10.283000
CVE-2024-42017,0,0,88bb092060ad69b0ffe1434d2d5d47cfc3d35d9b74da347db32bafd31660675d,2024-10-29T15:35:30.713000
CVE-2024-42018,0,1,d36c2d25618197055a9fa3c5f3f119418108bcdef04b170d040ef1fa8d21ed3f,2024-11-06T20:35:23.377000
CVE-2024-42018,0,0,d36c2d25618197055a9fa3c5f3f119418108bcdef04b170d040ef1fa8d21ed3f,2024-11-06T20:35:23.377000
CVE-2024-42019,0,0,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000
CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000
CVE-2024-42020,0,0,997daa67acd86090eb264416d8bd0f016260f05083a5b2dc041d5c995b94ddfa,2024-10-27T15:35:08.650000
@ -261685,7 +261687,7 @@ CVE-2024-45180,0,0,08348c7b1382a66372a71879585bc4b470bbbe0e7bc2a628091dcf790778c
CVE-2024-45181,0,0,c1b3f50892c5ad2964a42f2f7c4bb1e591fc78d268d80e02244df3b7c3d3d502,2024-09-18T20:26:26.873000
CVE-2024-45182,0,0,e32901d25899173bbdbcd4da8de2dfd78b6a7db5248414eaa56acb1cb3e78104,2024-10-29T21:35:21.720000
CVE-2024-45184,0,0,4b6497f365552ae587c6f2bb1b9a699bbd0812ac854bb52824296d2cb32eb74f,2024-11-06T17:35:34.223000
CVE-2024-45185,0,1,72bf9a166165415f673b127935e481d1ba969f414b40f9d8d7aa157b9fd36cb3,2024-11-06T19:35:16.420000
CVE-2024-45185,0,0,72bf9a166165415f673b127935e481d1ba969f414b40f9d8d7aa157b9fd36cb3,2024-11-06T19:35:16.420000
CVE-2024-45186,0,0,77c3f8977c3993383fb80894e402f55d5d22584cb41b5e73c31c8d88ae8792cc,2024-10-04T13:50:43.727000
CVE-2024-45187,0,0,b29c34a9281e147a1f2b33bdd2a8c272cd39081d36dd9d0273787cf191e54024,2024-08-26T12:47:20.187000
CVE-2024-45188,0,0,b715e0fd98dc9de103c52fc47a055822268226fc14af5f0a01f3a3eab3db9def,2024-08-26T12:47:20.187000
@ -262793,9 +262795,9 @@ CVE-2024-4724,0,0,1e35a8d6fb4d3f11b5f0d2a27ec10d126d5383267b650c161b24f017393ebb
CVE-2024-47240,0,0,831fca78a2032785727b73be16136073448f60052857b8463d392806d75f9e1e,2024-10-22T15:28:55.637000
CVE-2024-47241,0,0,58a524562b790b246361050e626ab15f35dfe376489ed5527ca425e0e170e59e,2024-10-21T17:10:22.857000
CVE-2024-4725,0,0,038fe38ac4531e61bf3177f0fb7b7333acb4571c75548945a25c993c1898f93c,2024-06-04T19:20:47.930000
CVE-2024-47253,0,0,d147a39553cbd3e23c9dc47e018d2a55806f90f34fa6d522e8f7794675a01185,2024-11-05T16:04:26.053000
CVE-2024-47254,0,0,b8a0db85c06b44009d222028a5b119afe28ca7a95e927816b7a664426e22a4bf,2024-11-05T16:04:26.053000
CVE-2024-47255,0,0,58719001e8fb814f33ea66a97cb372fbf5162fabaf050c7685b55017aa4f0c1f,2024-11-05T16:04:26.053000
CVE-2024-47253,0,1,769fd45217280faed8eb9286b7d777459d03159dafc71924f67681fa771cd1e3,2024-11-06T22:23:29.663000
CVE-2024-47254,0,1,7b2a0a7f61d863879927876e26f097e0efe10412130b78739d5752f40d5d539d,2024-11-06T22:22:01.623000
CVE-2024-47255,0,1,30fe59c20fea93289fc2e58d886b91b21c216954eb831592a00b542847a8017b,2024-11-06T22:23:05.770000
CVE-2024-4726,0,0,270a342f16ba50f480fb87849b5e08fe420ac808bade1fd45455bab1f318f402,2024-06-12T20:15:13.070000
CVE-2024-4727,0,0,944186dc32a6b9f919ede42bcb555e3e922a4782a833eff4d2f1edc6462e7155,2024-05-17T02:40:35.380000
CVE-2024-4728,0,0,4f079b987c555f4e946bc2da0c8ee767b411a220a728ca55c5e58bef9ad4770e,2024-05-17T02:40:35.490000
@ -263343,12 +263345,12 @@ CVE-2024-48047,0,0,3283398b8a8a75e7e31eaa0ac97fe84164a0704ec4cafc99d8da73b654c08
CVE-2024-48048,0,0,eca0ce0d3598806c22101f7f6a854102f0b0e3e7ffa812170ec79d143adac13e,2024-10-18T12:52:33.507000
CVE-2024-48049,0,0,ba765e8b87b10659dfbdf97a27a2e9aefb039f46631f1b6725a7dcd9a3bfe5d3,2024-10-23T16:12:12.127000
CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000
CVE-2024-48050,0,0,646bf231dbaea3acef4518aef21584a610338d98cdda355c55a38e4e6901cac1,2024-11-05T16:04:26.053000
CVE-2024-48052,0,1,6787dd59bbf6d5442afa73e6ab5a40a74adf87112b46990cfb17712cbdeff6c1,2024-11-06T20:35:29.830000
CVE-2024-48050,0,1,efe925e5e80ddffc7c6c5a86aa417aaf629e499121448166a60f26bea5bdb8f9,2024-11-06T21:35:07.863000
CVE-2024-48052,0,0,6787dd59bbf6d5442afa73e6ab5a40a74adf87112b46990cfb17712cbdeff6c1,2024-11-06T20:35:29.830000
CVE-2024-48057,0,0,8efebaa9314d97cebd20f7b67631fd55f5efc8a6a3e4bf2e70e24198b54d0deb,2024-11-05T18:35:10.987000
CVE-2024-48059,0,0,f3391fb334843a3fc6d7e517bab31554559de5a31b6bcad37ec348d6020d4ff8,2024-11-05T22:35:11.853000
CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000
CVE-2024-48061,0,1,3afb2ef6eba7f21135f7c2c854e268a2fe30714157a06ae965803eb7d12a5161,2024-11-06T20:35:30.633000
CVE-2024-48061,0,0,3afb2ef6eba7f21135f7c2c854e268a2fe30714157a06ae965803eb7d12a5161,2024-11-06T20:35:30.633000
CVE-2024-48063,0,0,7dad3075f35e3bd4e2e591484ba350f38d4e17902517b9e5e6279458bc0b207a,2024-11-01T13:15:12.020000
CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000
CVE-2024-48074,0,0,bca0d6dbb462c34776a53e7a729ed3fb0634f7f2ea1bca1d6a49bf976df47741,2024-10-29T19:35:18.963000
@ -263483,7 +263485,7 @@ CVE-2024-48454,0,0,6b6ca49a060c554891c90c2e114c529f7522d5800fbd375e9b33b5c669ae0
CVE-2024-48459,0,0,901474388331b2012a4633aead65b3a3d672e9f671a2126655443e04f1134f78,2024-10-29T20:35:32.737000
CVE-2024-4846,0,0,354213cecebbad5d2830809199864dadc70a5508c38afeb47a24b8f17c4c0fe1,2024-06-25T18:50:42.040000
CVE-2024-48461,0,0,1c2083218c3c3685e23b071a99b5af3e2d4f1a943e6f041925ac67eedb8db886,2024-11-01T12:57:35.843000
CVE-2024-48463,0,1,0bc7f3e7b8d54e56fe8dddcaa14275aa7a5820b50b73c79e9211e7d029e919b7,2024-11-06T19:35:17.717000
CVE-2024-48463,0,0,0bc7f3e7b8d54e56fe8dddcaa14275aa7a5820b50b73c79e9211e7d029e919b7,2024-11-06T19:35:17.717000
CVE-2024-48465,0,0,79a85011a870c4c08986e482d9ae1db011c8d568f8e3fabc9f719daa8800b0cb,2024-10-30T18:35:15.410000
CVE-2024-4847,0,0,3e175fcde7743d0dafc07697dcd3c0585505cba50a8840c440513434f4a1e2f1,2024-05-15T16:40:19.330000
CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000
@ -263603,7 +263605,7 @@ CVE-2024-48797,0,0,84ec47d2f0875bb5f244804e75fe25176b42fd271e656bf8a6c457b2cefda
CVE-2024-48798,0,0,456e6efd1999d161e08d7d92b829aad7f771e38427be013211a406399a3cd174,2024-10-15T16:35:14.783000
CVE-2024-48799,0,0,896d6d04e9dd29e6b7911e8a609c1f9aedfadec2fef931b761998c1ee9dd8f3e,2024-10-15T15:35:21.350000
CVE-2024-48807,0,0,0d144ac83f7e3b1760f53caa259e9e3c92797a393e9f0218e5e59721fbc1c4dc,2024-11-01T12:57:03.417000
CVE-2024-48809,0,1,47d6c9cea59d124dc3bf475183d772db66f12df1ce197c1776abbec8ee9e52a2,2024-11-06T19:33:54.977000
CVE-2024-48809,0,0,47d6c9cea59d124dc3bf475183d772db66f12df1ce197c1776abbec8ee9e52a2,2024-11-06T19:33:54.977000
CVE-2024-4881,0,0,d7fec9dc10ea1cda5c43b7baed66b19ac106fead894074c09a02df3073ad45bc,2024-10-17T15:17:00.590000
CVE-2024-48813,0,0,b3275c3656b3f4746c55f236fa34d6d816026c088db796644a052e298f356a4f,2024-10-15T12:58:51.050000
CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000
@ -263700,19 +263702,19 @@ CVE-2024-49211,0,0,69e61cc8ef233b9ff13db5267d11c58ce2f779bbae4d2a372191875e0959a
CVE-2024-49214,0,0,25aabfb69f8e67934aa819c25fb6d72399969fd517c067365488311d807f5b98,2024-10-29T16:35:14.877000
CVE-2024-49215,0,0,a819d161a1c5d99bae1a3537b9c18fdd18dd7d46b44a848b4173d70d0fe6177d,2024-10-24T14:10:17.137000
CVE-2024-49216,0,0,6acffa32d15c0271869a6ba3150ee4d41d9276ea01fbd76b60626657e8a8c6f0,2024-10-16T16:38:14.557000
CVE-2024-49217,0,1,85c8a2bd11800855c22552b1c5bc2a47d344ead2a19c71b4f2a282b639a5eb22,2024-11-06T20:53:26.900000
CVE-2024-49217,0,0,85c8a2bd11800855c22552b1c5bc2a47d344ead2a19c71b4f2a282b639a5eb22,2024-11-06T20:53:26.900000
CVE-2024-49218,0,0,671ff343da2f5231222648ce902558a11e99be4b95e42fa72739eb1b7f6df389,2024-10-16T16:38:14.557000
CVE-2024-49219,0,1,523812c25261161ba5e865409bca50593a9049b9d9f81554a1f3feb8b27a94b1,2024-11-06T20:45:08.233000
CVE-2024-49219,0,0,523812c25261161ba5e865409bca50593a9049b9d9f81554a1f3feb8b27a94b1,2024-11-06T20:45:08.233000
CVE-2024-4922,0,0,692b7adcf322621580a484f8f9b29edc18ffd7d0d7aa81554818742dd70afb00,2024-06-20T20:15:20.020000
CVE-2024-49220,0,1,0ef4eec8872e2d73dcc890c17ee54afbea8a47ddd760e9d6518b78fbad00b47c,2024-11-06T20:41:13.367000
CVE-2024-49221,0,1,435842c334a660a0805ff050e49b3b4e8374bf2d1ce8479072841cb5d6919f8a,2024-11-06T20:54:50.527000
CVE-2024-49223,0,1,09a19af6067ac9483c25986020d58f93da9bc5c27f813ea5fddcf3b973d0489b,2024-11-06T20:55:37.613000
CVE-2024-49220,0,0,0ef4eec8872e2d73dcc890c17ee54afbea8a47ddd760e9d6518b78fbad00b47c,2024-11-06T20:41:13.367000
CVE-2024-49221,0,0,435842c334a660a0805ff050e49b3b4e8374bf2d1ce8479072841cb5d6919f8a,2024-11-06T20:54:50.527000
CVE-2024-49223,0,0,09a19af6067ac9483c25986020d58f93da9bc5c27f813ea5fddcf3b973d0489b,2024-11-06T20:55:37.613000
CVE-2024-49224,0,0,d5ed60c2b9217ee9e685d58c35300fb4a2b5ee5fb2fabe8974de51c33541a1ab,2024-10-21T16:31:21.593000
CVE-2024-49225,0,0,e045d0de6712b0b413de59de2f5ec4e42e811096a71880e86b358673c2e0d271,2024-10-21T16:33:00.403000
CVE-2024-49226,0,0,df9f2172258cc4d19c6bc195be87c4c9b1bf3d29dd47d60cce8b8efee0aca1a0,2024-10-16T16:38:14.557000
CVE-2024-49227,0,0,982f5e93a814f85c16cf1657f4ba0ca40040816eb1de34f1d6cd0e6ad4881dc1,2024-10-16T16:38:14.557000
CVE-2024-49228,0,0,38437087aa9be3056a11c6798501f534e4b6d4e733ee6d1c2006add27aba0767,2024-10-21T16:34:41.267000
CVE-2024-49229,0,1,1e1752f517578bdb8e0d9073393d2366d6debf6a5e79cdf2932fb5c5b39d70c4,2024-11-06T20:40:30.740000
CVE-2024-49229,0,0,1e1752f517578bdb8e0d9073393d2366d6debf6a5e79cdf2932fb5c5b39d70c4,2024-11-06T20:40:30.740000
CVE-2024-4923,0,0,c83198e21d781e3384db11f118092c5fbfa4a06f25d53a21adb6fe23f4380f17,2024-06-04T19:20:53.833000
CVE-2024-49230,0,0,89342cb8496066491f5b3d74f112ed9eac62497b67d283852db13e34d1cb2199,2024-10-21T16:37:15.807000
CVE-2024-49231,0,0,f1bca784a02483c4e1958c6dd7981ec9ffd6a01b629138db999d0ecc3e3b5b78,2024-10-21T16:37:46.010000
@ -263721,7 +263723,7 @@ CVE-2024-49233,0,0,d15701a736a720d91ce7a393cddc119d365e279a269d1078a3d62a0f44c1e
CVE-2024-49234,0,0,00d6361d85da44a4fa5e98b0b1923a417577ef114f956e9a3a98833720c5555c,2024-10-21T17:16:51.053000
CVE-2024-49235,0,0,81b65049d9913937f83fbb02a460f07035b9a9b3cadf729eaa07645e1a8a845f,2024-10-18T12:52:33.507000
CVE-2024-49236,0,0,a834af1459ab83c1993774b31ad0e95a9120429d91f000710053f11c8b77484e,2024-10-21T17:12:00.583000
CVE-2024-49237,0,1,7c921f1ff6e06cda49ce0b96aba5ad95d5b8d4cbec93e4fa528982e38f3e12f5,2024-11-06T20:33:52.403000
CVE-2024-49237,0,0,7c921f1ff6e06cda49ce0b96aba5ad95d5b8d4cbec93e4fa528982e38f3e12f5,2024-11-06T20:33:52.403000
CVE-2024-49238,0,0,4f7144ebb272524e891d29605f6262832b81db89d137d3761af7eafcb87405b6,2024-10-21T17:02:51.280000
CVE-2024-49239,0,0,6bb7d5c1f1f1cff54f68d71e2aed5ac9078819a889d9132789e8a59fb72db7e3,2024-10-21T16:26:20.220000
CVE-2024-4924,0,0,1b70fe45b850b22b8585c0417300fcac708f98c59205a2cdb72b2f32602e7fb3,2024-10-28T21:35:21.157000
@ -263834,7 +263836,7 @@ CVE-2024-49361,0,0,f551e9abf09d421b2a081416ae11d1d19a91d21656c86d2519f1c7f0e2810
CVE-2024-49366,0,0,aa37188721af357c851b7fc33379d0188a960b9f96974610014dea2671948c2a,2024-10-23T15:13:58.783000
CVE-2024-49367,0,0,c9b869d3df961cbe6cd45089af2bd9e7675369053a02cc6adaf7052174946b00,2024-10-23T15:13:58.783000
CVE-2024-49368,0,0,8be4e296ee1ec30084981da91255270e2fb2a840014ea77ee3103f7dcd091363,2024-11-06T18:28:54.440000
CVE-2024-49370,0,0,53182a6ce2637f054e6cf92c623239d8b52a4ad6590d2f00fca7214b8ca5b926,2024-10-25T12:56:36.827000
CVE-2024-49370,0,1,a5cd1a59d8359f30b64653ed20bc47230e4ab479f61eed26e21f9e51248ce0d7,2024-11-06T22:31:30.160000
CVE-2024-49373,0,0,4aa9cfdbe744fd3ae046ca1eeb4ecc11fd5a7b167271bdbcafbe01dffbbbe75a,2024-10-30T21:16:59.213000
CVE-2024-49376,0,0,190dbce5bcb7aada06f0c8b342eac2772846cf5d2a5dcc8eecc468a0b9c5d5e3,2024-10-28T13:58:09.230000
CVE-2024-49377,0,0,f0a66be903c1ae0848c0330b2ecd5bcb10926f277636c57c6f6f956b317ea158,2024-11-06T18:17:17.287000
@ -263960,7 +263962,7 @@ CVE-2024-49671,0,0,3444bda7ece1f693d338db4cc79d717f379cdd40dbc44287f6100eec0598b
CVE-2024-49672,0,0,894e1f0624440e3d744307abfb9eb6064ef2e0f986134420bd1cb909f8951534,2024-10-29T14:34:04.427000
CVE-2024-49673,0,0,a91125aab1f7960fc60732cbd0b5d96ec0e4cbbc1297595b886e51864ee396a5,2024-10-29T14:34:04.427000
CVE-2024-49674,0,0,fd3d64b6e35b6eec27ee3c590860244c5a96a05725f767dbab9cf4cb455540e0,2024-11-01T12:57:03.417000
CVE-2024-49675,0,0,c6e09b39dfdaf468c89ebc29589596eee519705df1761375fc6ab1777046823b,2024-10-25T12:56:36.827000
CVE-2024-49675,0,1,c2223000da0c4ff77fd421192850d7f215252c939d91090d90395539c22636a9,2024-11-06T22:24:22.907000
CVE-2024-49676,0,0,dd890548fa1bcb69576eae4659e357c656125d877be6d06a44ddb178c101b43d,2024-10-25T12:56:36.827000
CVE-2024-49678,0,0,a75d300a9f5fa676504639fae81083885456f78da78e7660ba14ca16476d39c0,2024-10-29T14:34:04.427000
CVE-2024-49679,0,0,20c268334a4df168f30b45a50be9eb5ec235eddb6257303d5d7faf86cb14924e,2024-10-29T14:34:04.427000
@ -264341,7 +264343,12 @@ CVE-2024-50333,0,0,dec570600936fbd1d13d82c721e514d60fa6e5733b1c9746045163c28aeb4
CVE-2024-50334,0,0,15b97ca0de89b7422ca1338a576d4ef71067410db416afc03dccd883f0aa73cd,2024-11-01T12:57:35.843000
CVE-2024-50335,0,0,d56c49b3f816f27a07e453cd7f51250fd71a85087fc2558a07e34513c66fcd1a,2024-11-06T18:17:17.287000
CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000
CVE-2024-50340,1,1,0d8006f3dd7bf6960a884ab327616feab504d4fb3d7bece8ca7ec146ee406621,2024-11-06T21:15:05.527000
CVE-2024-50341,1,1,56f80142c8430d4c9e687f36f4de41fdceb7e6a5fedaed2403afd3e967693c45,2024-11-06T21:15:05.747000
CVE-2024-50342,1,1,ad2d68e63f0a467fed99a59db8fd904072ce7170031980e68557c0e58aa6b3be,2024-11-06T21:15:05.963000
CVE-2024-50343,1,1,13d5f6bf56d0ed34f1292154c100bba90a98e43cd4d2ee727daa489f454989ed,2024-11-06T21:15:06.180000
CVE-2024-50344,0,0,01bf6c563fd2a47d8f1655926ebf620cef86a1d975ff50e33bcc2ca54db6ff27,2024-11-01T12:57:03.417000
CVE-2024-50345,1,1,a906319e9df14e184a1c49f6767e11bdb542ba55960f07fbf1c2e373b98a833e,2024-11-06T21:15:06.383000
CVE-2024-50346,0,0,fb25cbb7b8a23f8bc4a8f048afe511d7d942fe5a9bb027a602dbfa956ec82a3d,2024-11-05T16:04:26.053000
CVE-2024-50347,0,0,09b35c9108a453337442f172c0c30bea977424cb455f7f1c26e8c5268b8f2c51,2024-11-01T12:57:03.417000
CVE-2024-50348,0,0,fa8a8e9e48d227df1afdc378e4ee00ffda2dd051bb15c8b477e290549096cb45,2024-11-06T14:49:46.073000
@ -264506,7 +264513,7 @@ CVE-2024-5062,0,0,1dce1f93ce1b9242e76ae9cf090eb76ee6afadb656622c6eb5a578a5eb7601
CVE-2024-50623,0,0,71c6fad96d3194eba7d5d7edd081f9ad30cc6decd08744ac71e97f086f12f546,2024-10-30T21:35:11.373000
CVE-2024-50624,0,0,2f6d7cbc06ddd09de063e5bd0feef072f438fbd478c20a099bcf6256ed039f90,2024-10-30T21:35:12.223000
CVE-2024-5063,0,0,3ea00cb3f53084b2393e5a818811e5957f116b348338ce87a59f64292b187a9f,2024-06-04T19:20:57.760000
CVE-2024-50637,0,1,856bb5c23e31310b984bfc1cc6773072f2db15e1db2b9091d52418ddd1c7384f,2024-11-06T20:35:33.010000
CVE-2024-50637,0,0,856bb5c23e31310b984bfc1cc6773072f2db15e1db2b9091d52418ddd1c7384f,2024-11-06T20:35:33.010000
CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000
CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000
CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000
@ -264594,10 +264601,10 @@ CVE-2024-5111,0,0,1e1510502a884c6f23b18cee848205aa75aeed3171cb87569d39e4078bf923
CVE-2024-51115,0,0,141fdcdabaf7c1ec8339c92338cf4045ebea4dbb9cb424f39276d597a3da7892,2024-11-06T18:17:17.287000
CVE-2024-51116,0,0,628a52b9257b50cdd3ccc07e8442fee438bd4b142b1a9d47d166ffcd98ae2965,2024-11-06T18:17:17.287000
CVE-2024-5112,0,0,689c76c95598a2f86ee6cadbc1c25854cf35ada5e2d2725de4638c44d7f73797,2024-06-04T19:21:00.007000
CVE-2024-51127,0,1,5cbf021500110127b38f6de54e9823061ea68366b333afb20ed57e2e95d1d646,2024-11-06T19:25:14.607000
CVE-2024-51127,0,0,5cbf021500110127b38f6de54e9823061ea68366b333afb20ed57e2e95d1d646,2024-11-06T19:25:14.607000
CVE-2024-5113,0,0,d52da1935c57c4016d19b1f0658aa6603ac8563b2af10cf87d5ce42568a3ed96,2024-06-04T19:21:00.113000
CVE-2024-51132,0,1,741849111477a3dea70a3f4f159f318bcb11e986e2637afecf8a608cf70fdf87,2024-11-06T20:35:34.173000
CVE-2024-51136,0,1,b7028b746c76b0b8db7064a5c94d8b9b8b4865b267652b712081099f88f87998,2024-11-06T19:31:15.230000
CVE-2024-51132,0,0,741849111477a3dea70a3f4f159f318bcb11e986e2637afecf8a608cf70fdf87,2024-11-06T20:35:34.173000
CVE-2024-51136,0,0,b7028b746c76b0b8db7064a5c94d8b9b8b4865b267652b712081099f88f87998,2024-11-06T19:31:15.230000
CVE-2024-5114,0,0,51655375bf74d88d0b44bf3106775b49d83b04b179d3446b4a92ffe727b17b66,2024-06-04T19:21:00.217000
CVE-2024-5115,0,0,566281473e2daa2487dd251e202869dc3059aeec07f7c63daa38b65c3bae3de7,2024-06-04T19:21:00.323000
CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000
@ -264611,7 +264618,7 @@ CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3b
CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b5e,2024-06-04T19:21:00.963000
CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000
CVE-2024-5124,0,0,ddf4d98394e08878019bd952c44f2cfd27f047274d82fb0e14f997780f16638c,2024-11-04T11:15:06.937000
CVE-2024-51240,0,1,7445c6ba47df36c0613eb4cb1195b6f0f9ac8d38ec29d4a0f09a129257d8d4ff,2024-11-06T20:35:34.963000
CVE-2024-51240,0,0,7445c6ba47df36c0613eb4cb1195b6f0f9ac8d38ec29d4a0f09a129257d8d4ff,2024-11-06T20:35:34.963000
CVE-2024-51242,0,0,e088a83b7d97849945ef8e4d907ce1041a9c29e696b96e8d85eb2989ae73aa7b,2024-11-01T12:57:03.417000
CVE-2024-51243,0,0,dc9a3bcceef7b79b773664e490e9177d288abe6b5bfadf448f185196016ec54c,2024-11-01T12:57:03.417000
CVE-2024-51244,0,0,1da847cb94e7afadbe7e923335974b45b31004bfdcaa7db1bb1325dae7dc5743,2024-11-05T19:28:09.403000
@ -264645,13 +264652,13 @@ CVE-2024-5132,0,0,1e1b0edf57956ef222afc7fdedc2f2211203f4402428303961b463cfc0ea97
CVE-2024-51326,0,0,86a38e3ec445ab1743629a943074bd136cc3a19613d33223b8410daa71b7467f,2024-11-06T15:02:12.403000
CVE-2024-51327,0,0,6dff1d9ddb8570601185ec672ddf11cc5295d3cdce074e30aa360a3024bc5c57,2024-11-06T15:02:55.710000
CVE-2024-51328,0,0,768f8be19425d8bf4cf9b5b89b937b298b5cc7b18ce12eea5265b64902006bbb,2024-11-04T19:35:16.150000
CVE-2024-51329,0,1,134d8b5a46fc76f9917a9aed6fc6c4366a039772d7dfe5acc179470dd93f05e6,2024-11-06T19:19:24.793000
CVE-2024-51329,0,0,134d8b5a46fc76f9917a9aed6fc6c4366a039772d7dfe5acc179470dd93f05e6,2024-11-06T19:19:24.793000
CVE-2024-5133,0,0,ce2c3261ccf7a6af3656f0cd319a645240f50aa81e714a3f3634cc2f14d7c857,2024-10-17T16:41:53.717000
CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa19,2024-06-04T19:21:01.167000
CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000
CVE-2024-51358,0,0,be0f7decc72be7973be0b54dbe7f4f5d0c6692a8b1099b27d3347b7c8184f47f,2024-11-06T18:17:17.287000
CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000
CVE-2024-51362,0,1,a6e1a40cf5e527208990e8a764ceb58cfefd7f1b5e4a2c9e1905064ef69946f2,2024-11-06T20:35:35.750000
CVE-2024-51362,0,0,a6e1a40cf5e527208990e8a764ceb58cfefd7f1b5e4a2c9e1905064ef69946f2,2024-11-06T20:35:35.750000
CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000
CVE-2024-51377,0,0,27e24251b8fbb0cd40dc4b3232759f12cbe7946bd501f1e15145c4cb45ca2b57,2024-11-04T21:35:12.543000
CVE-2024-51378,0,0,25041eea06e8de15fb868a226604237e266234c162cafb1c59832cc50427a9bb,2024-11-01T12:57:03.417000
@ -264664,7 +264671,7 @@ CVE-2024-51398,0,0,bf1065b8a7633fd26fe8d4034a94a303b4ea5c6fbbe5b2babb7e5454f0dc9
CVE-2024-51399,0,0,fc9a4f7feccdf87ac1072a742df0a1dc4f133fcfd9c1bf1ed214d196e18abc1b,2024-11-05T18:35:18.260000
CVE-2024-51406,0,0,219f1a907dc34e3139e40d74617f86db24d4b43908c87f25fb1a00f5ef8165d9,2024-11-04T19:35:17.410000
CVE-2024-51407,0,0,fda917e854eca07dcff49df0339535f103ba20de93b59699ac770c63d8521d21,2024-11-04T20:35:11.350000
CVE-2024-51408,0,0,d571e63af91ee1143469f4bb57d330653f7c5f692a2406715d228afd31a4069d,2024-11-05T22:35:13.937000
CVE-2024-51408,0,1,768985f0479d1b629ffaa63d05723a6cce6c2d94e338531281645d00b127aacd,2024-11-06T22:06:43.100000
CVE-2024-5141,0,0,5b006751fd2d8ca9e95fc8cef49a641b35089e8e5594eecd996fab7cf0d4e5e8,2024-07-24T17:58:54.867000
CVE-2024-51419,0,0,e145fdc3d6134b228049cf2c0ec561624aa79dc4de0c1da7a3c5f83de9d39a5f,2024-11-01T12:57:03.417000
CVE-2024-5142,0,0,8102929b9600e5392a308a1b7cfd863bc4b2848bde33508d601b388a9c02231d,2024-08-27T11:15:04.540000
@ -264738,22 +264745,22 @@ CVE-2024-5159,0,0,6487690749e64572084b0b1ffb84b7950e8b682c3129ca3d21d0dbc204e9ec
CVE-2024-5160,0,0,761bdadb9ac3f89d156978519ca326c5704c62592c7f03e703ecc7e802a865d7,2024-07-03T02:08:36.807000
CVE-2024-5161,0,0,f120c7db938e25c7983d6c400da502880d5ffbc93ab4e5e05351c3fca8fbd038,2024-07-24T17:54:42.387000
CVE-2024-5162,0,0,b916c521cfe3c1fb21956086b784f2a8541eeb514496e084206ecc726f921efe,2024-07-24T17:53:33.277000
CVE-2024-51626,0,0,18e5c511939be2558be617df0507b9f12fa7d0e50de2af2ea7459c488b192636,2024-11-04T18:50:05.607000
CVE-2024-51626,0,1,1464c1c98efb870dcd3b5a35eb6a7feff3782c73b32d47b788148d4cc3703554,2024-11-06T22:10:20.517000
CVE-2024-5163,0,0,1f45f157a740def8c3f1c2e097025198bc2166983108f63600058e7c57408d30,2024-08-21T06:15:07.277000
CVE-2024-5165,0,0,2b7469c3d25cc1e03e7fcca1607bc78daf489d82c018a0fbc4f3b815c328cf85,2024-05-24T01:15:30.977000
CVE-2024-5166,0,0,5c544eab21844e01fabd3874ed7776a55145987bd3a510311ad16f12f33bd2bc,2024-05-22T18:59:20.240000
CVE-2024-51661,0,0,9622f3634ba493f615ed2927ef92c179ee0dcb7280d813f52b441be81e048a8e,2024-11-04T18:50:05.607000
CVE-2024-51665,0,0,56bf9fcd202b3ea9001e454522be11bd5978f32ce441602f00aa1bbb031128ad,2024-11-04T18:50:05.607000
CVE-2024-51665,0,1,836ecda2a38ee75dca042d09339ec8247ed79262a6a8d01bd25035a2e84a5ce0,2024-11-06T22:07:10.707000
CVE-2024-5167,0,0,a26d674346a63d8730649864e3fcc22e33fb8b5877ed990bcd49874aef8d8c48,2024-08-01T13:59:41.660000
CVE-2024-51672,0,0,02f34342c7a243fc55088e6039256e7de98338fcdc98f8b95fb11a31d6c364d4,2024-11-04T18:50:05.607000
CVE-2024-51677,0,0,3a3f242a7ff6f80c9e763fd44464d5f149926414812ec89ee8be44bce14d131b,2024-11-04T18:50:05.607000
CVE-2024-51678,0,0,ca8e2772685847dbfa010764deeffa0341c2b977902afc49a77a90e54643e432,2024-11-04T18:50:05.607000
CVE-2024-51672,0,1,14a5ef0a87d874231b0f786642aa34aa9f0064d5c86f2b9992f4fe90d62559ab,2024-11-06T22:08:22.747000
CVE-2024-51677,0,1,8b0f7a3853108bd14021b832cd2914a4bbd49dc774029c03bf84670c6d192320,2024-11-06T22:10:31.677000
CVE-2024-51678,0,1,ce4086679232add4ebc40be30bdc12f20f02b66e38c181d2556e9473603941fd,2024-11-06T22:10:45.103000
CVE-2024-5168,0,0,cbe1b6c96aef7b506dd526cf00951c936dfc5233fd9563b4af0bf7fdab7a5899,2024-05-24T01:15:30.977000
CVE-2024-51680,0,0,6a0e4dc35b32086a537bd54899180c80ad01a8c6290d199cc8c4684b6784a87c,2024-11-04T18:50:05.607000
CVE-2024-51681,0,0,b2240f3aac7cf521a8583b6a4f2d4157a3e0c7b650f696a8fe56bed46dd560b4,2024-11-04T18:50:05.607000
CVE-2024-51682,0,0,12881b8ca373787a3c057bd1e8d9525a2539983e5a3ed6d65b201c2ff661d1fb,2024-11-04T18:50:05.607000
CVE-2024-51683,0,0,0f4d7566656d1bf0660d68c0ecfc6656f45f0a02e4da79c690f191f19760df22,2024-11-04T18:50:05.607000
CVE-2024-51685,0,1,3ec6f589ce8427b20bd90f3e3168669c47fda17fa0f474f038e9a6e94e0e60b9,2024-11-06T19:34:31.590000
CVE-2024-51680,0,1,e3d442fcfe0b4fceddb505a5eff13c52978f820716977fad69b0fdd39fa2c605,2024-11-06T22:10:59.270000
CVE-2024-51681,0,1,6987ab81beb2df0eaa9da220f2d791ed5d8df3f0e18bd37d9a9b390a4eaf5a17,2024-11-06T22:11:16.003000
CVE-2024-51682,0,1,aaba0581a3d811571ae104155388a45dd47ae531ed284c6ab0022efdb152fbe5,2024-11-06T22:12:02.353000
CVE-2024-51683,0,1,f59d50717ee7305489d521abf4c5c1ef491e4436568b0e3c6dd145e0ad77427b,2024-11-06T22:12:19.803000
CVE-2024-51685,0,0,3ec6f589ce8427b20bd90f3e3168669c47fda17fa0f474f038e9a6e94e0e60b9,2024-11-06T19:34:31.590000
CVE-2024-5169,0,0,882a6aa1fee4c71f4df51ce353ec6b27431ae776e2b2b23b3c5ba8c59ca21797,2024-08-02T15:00:10.200000
CVE-2024-5170,0,0,0357b8fbab1b76f01ca0dd625bf87ec8b80f7fd2d35927c69b68200ba07a11a4,2024-09-27T18:23:43.833000
CVE-2024-5171,0,0,dd574bf92e93c62d270c5e3b0cb384556e01dba1d43a5b9db2a02845fa564cb4,2024-07-23T18:09:56.753000
@ -264761,18 +264768,19 @@ CVE-2024-5172,0,0,b469524ff2309ced9aec08b056578c23e8b8b5248adb8fcea2b38cb214c812
CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da6464,2024-06-26T12:44:29.693000
CVE-2024-51734,0,0,1cd13d8635d39c437cbb33b350735ec8f4fced2309825670ef2275f584df030b,2024-11-05T20:35:26.167000
CVE-2024-51735,0,0,4d68a755141918a79130284871e942292c9f37924aba0b94103b08a16b1df114,2024-11-06T18:17:17.287000
CVE-2024-51736,1,1,379ee3f6d2d9accb42efa81e333f4e655bf347820c945b9b76849f1517ca172f,2024-11-06T21:15:06.600000
CVE-2024-51739,0,0,ee203b09953b612bf98226788bae2c648a3d93de0cc3326880af2a364d5bb790,2024-11-06T18:17:17.287000
CVE-2024-51740,0,0,8049b8be1065b4b8406a50a1cfde4cf3f6d43a64ebf12ea9e23c06d353369d55,2024-11-06T18:17:17.287000
CVE-2024-51744,0,0,df641a1b86566e97bb7074f2d337c50f51346569211bd554409b057e4c4da639,2024-11-05T16:04:26.053000
CVE-2024-51745,0,0,37db28606ad10f651e6f62f94e51def5fb50b1cfae8314bc96328b8b65ad324b,2024-11-06T18:17:17.287000
CVE-2024-51746,0,0,3cd98a267aedbbeeb4ad193a68e5bacd0a1a46a62f6ccca5880e9520a47fbe14,2024-11-06T18:17:17.287000
CVE-2024-51751,1,1,5be875fb03dd84c20f8d271d29f5d3af24259f1c25883a44af5c941f68ac278f,2024-11-06T20:15:05.557000
CVE-2024-51751,0,0,5be875fb03dd84c20f8d271d29f5d3af24259f1c25883a44af5c941f68ac278f,2024-11-06T20:15:05.557000
CVE-2024-51752,0,0,e4bd7dfff09e294fe713d9b76aba7fd50689256bee0d75d076093e0fe4805888,2024-11-06T18:17:17.287000
CVE-2024-51753,0,0,bf33e866ff4adcdc8169c4272817d8f4f57258218421ea7cafddbf38a1c6e30a,2024-11-06T18:17:17.287000
CVE-2024-51754,1,1,ab8a7bcd0aef3f8778ab7f9b5f45ed9ae1110b90fa03bf7f3d612cb847bb1caa,2024-11-06T20:15:05.817000
CVE-2024-51755,1,1,7150a21cdebe589f49ef7bb36b4fad5dd8f080a46c27ff91852f0fd345ca5552,2024-11-06T20:15:06.077000
CVE-2024-51754,0,0,ab8a7bcd0aef3f8778ab7f9b5f45ed9ae1110b90fa03bf7f3d612cb847bb1caa,2024-11-06T20:15:05.817000
CVE-2024-51755,0,0,7150a21cdebe589f49ef7bb36b4fad5dd8f080a46c27ff91852f0fd345ca5552,2024-11-06T20:15:06.077000
CVE-2024-51756,0,0,7e7db3439c4e45c36bf53dc70dbe779b982ce3f3056b8757e470dab737dd37ba,2024-11-06T18:17:17.287000
CVE-2024-51757,1,1,6469de8ff53e3c67b6dea69ecf92a7c1c9657d29eb32af44797d561418c06bb5,2024-11-06T20:15:06.337000
CVE-2024-51757,0,1,94efafdd8ea10b2a0656841928d239afab2750ddf6f06a644397622ff5d6eb53,2024-11-06T21:15:06.807000
CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000
CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000
CVE-2024-51774,0,0,669a599ada079f107ff827e67143f083d374e9861d23daa36ef167763e62d529,2024-11-06T17:35:41.767000
@ -264794,7 +264802,7 @@ CVE-2024-5194,0,0,8b46532d156b8b3c9309e51d70c9e0d478e4dda8959433d551fb9bae0e23a4
CVE-2024-5195,0,0,a944b3bf4d682f545e6cb40d57a8d207d6c568eeb84f910c894251f96395025e,2024-06-04T19:21:02.077000
CVE-2024-5196,0,0,fe96c1eeb1213602679ab014fd535da1193da9cfe24103856ca34e734451708d,2024-06-04T19:21:02.183000
CVE-2024-5197,0,0,01172b8d20369801e638a1092c2896c82735a2e04e92ac5031b21558c286d96f,2024-06-16T21:15:50.820000
CVE-2024-51988,1,1,2d17fe71a727874da6f8f6c999ae55f95138104406d5cbbc92ea592560164e88,2024-11-06T20:15:06.513000
CVE-2024-51988,0,0,2d17fe71a727874da6f8f6c999ae55f95138104406d5cbbc92ea592560164e88,2024-11-06T20:15:06.513000
CVE-2024-5199,0,0,8fdec235790e80ab25bf344b6e4e20c94c0a12c0bede9440d8c94965619f66eb,2024-10-28T21:35:23.237000
CVE-2024-5201,0,0,64f0da97aed099b7390504c61b2a584cf361827a66e92ad103d8b3995d82fd05,2024-05-24T01:15:30.977000
CVE-2024-52013,0,0,d9e82ae91803da33afed578345dc1a358b894658d92808fa986ec4533aa8b6bc,2024-11-05T16:35:36.337000
@ -265216,7 +265224,7 @@ CVE-2024-5638,0,0,68ca32104039c555501740b79d9d053899dfa4f77cf28bfda3416440a76684
CVE-2024-5639,0,0,492ad0d47d56549888d5f48237edc279d0d32d853604c73193623cce2eae0704,2024-06-24T19:24:23.883000
CVE-2024-5640,0,0,8f33c54e7012000a851267741a433d3aa85134979ee0675a7c8c94bf7d26740a,2024-10-28T18:32:59.690000
CVE-2024-5641,0,0,1f23612877686d6e5143238f62dc02125c3d0a0d8a2499e0ec524473edb424e6,2024-07-05T17:14:44.840000
CVE-2024-5642,0,0,bf58acd5f015124d4fa0c6ffb75779edb6afb99b41961d291eb7083813f4952e,2024-07-28T14:15:11.220000
CVE-2024-5642,0,1,4ed20babf058b3e506d0b66042a68f289ffcc8ee77fb96f7765ea8a1aca1a90e,2024-11-06T21:35:08.690000
CVE-2024-5644,0,0,35f5cce546de98cfce88cd6571a328f218696f426033c4c0d2e31a431c078a61,2024-08-01T13:59:56.260000
CVE-2024-5645,0,0,81ee0a48f8169b5fa6535595d6aeb783fba06dd48c6af38e338fa98641a45635,2024-06-11T17:57:47.197000
CVE-2024-5646,0,0,54dff546debf316c7620aa15614b89fe6dc050f45cfaa67554d377c50ceda179,2024-06-13T18:36:09.013000
@ -267758,7 +267766,7 @@ CVE-2024-8767,0,0,17744319861b5196f5a63bddf3c3c4ab0c9d11dd531ce1a95816c3c9e2193e
CVE-2024-8768,0,0,a982019cb3e87700eba7d9922c696779881e32d71a95f1662a9030bc9b15c0d2,2024-09-20T12:30:51.220000
CVE-2024-8770,0,0,092503c78b1ec747d9cd01983ee6d65a49e2eef82871ebe4802ea35253afc2e7,2024-09-27T13:49:29.690000
CVE-2024-8771,0,0,8440e358d9ef6f31cf81e66a5a83b441147afe75ee9c3ad99e3f4526f8f30874,2024-09-30T12:46:20.237000
CVE-2024-8775,0,1,b1c934c0f161c282b2ea9c3e55f934218dc75fc137b9f5d065788131a5d3a709,2024-11-06T20:15:06.763000
CVE-2024-8775,0,0,b1c934c0f161c282b2ea9c3e55f934218dc75fc137b9f5d065788131a5d3a709,2024-11-06T20:15:06.763000
CVE-2024-8776,0,0,5f24148b1f2c0e63f94c4b7c4eb112791a653befffb86dbacf9b6c99ebdd5088,2024-09-20T16:38:51.910000
CVE-2024-8777,0,0,abf6497bbb9ed542a83ea295cf446b5b0a64e2a3685378272b7c6e8d7a6d8418,2024-09-20T14:22:19.840000
CVE-2024-8778,0,0,04f76622204759cf035b6cf776488dd4e0117dc8a28cbc6a6f40333ff951b555,2024-09-20T14:23:37.697000
@ -268097,7 +268105,7 @@ CVE-2024-9327,0,0,9bb62fae114b1c29588ad2672d640859a17a9f3af7375a799fc34e218e9d39
CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000
CVE-2024-9329,0,0,45383f73609cef2d97bbcc2a37f0da26902c147f00f71a92dd725b6696a1e709,2024-10-07T15:52:47.267000
CVE-2024-9333,0,0,29d3d497691b594c7c49948d48e229bbe8c23108f2eef552b2f92cd89acf1f06,2024-10-04T13:50:43.727000
CVE-2024-9341,0,1,c98b60eddd0169df613fb8aaf3d2ac969a4fdceebcb7e9147fd8771afde7bcb8,2024-11-06T20:15:06.917000
CVE-2024-9341,0,0,c98b60eddd0169df613fb8aaf3d2ac969a4fdceebcb7e9147fd8771afde7bcb8,2024-11-06T20:15:06.917000
CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000
CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000
CVE-2024-9346,0,0,62d32d35d45fd426e51a0ed8886468a70178025d3407ee17aee209be78f55958,2024-10-15T12:58:51.050000
@ -268301,8 +268309,8 @@ CVE-2024-9667,0,0,4c2cf3e987949daa6f6783b329a60c01d9a6ec3570b24191ca01f99d0f544e
CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000
CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000
CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000
CVE-2024-9675,0,1,3cadd63f68fceef4cb7f647684ea61e6a2900e849efc03dcf4b2582d5452b03c,2024-11-06T20:15:07.083000
CVE-2024-9676,0,1,46624241f6a62cf8ced9778d99fdffe768deb7f9be20051bd0eb0c649c38f427,2024-11-06T20:15:07.410000
CVE-2024-9675,0,0,3cadd63f68fceef4cb7f647684ea61e6a2900e849efc03dcf4b2582d5452b03c,2024-11-06T20:15:07.083000
CVE-2024-9676,0,0,46624241f6a62cf8ced9778d99fdffe768deb7f9be20051bd0eb0c649c38f427,2024-11-06T20:15:07.410000
CVE-2024-9677,0,0,944e049c847e061867c66e6b586a0cd99260b04bc2e2059d736567bf47cae00c,2024-10-23T15:12:34.673000
CVE-2024-9680,0,0,db0e4e19e09673238ffe3dfbb8e95974e9346a75b4fd6d9319c03e5970bb644e,2024-10-16T15:07:36.123000
CVE-2024-9681,0,0,5184b45d0c5be56c6e66f5f4d21584d3fd220046fb9bac6604ac868b54d81bd8,2024-11-06T18:17:17.287000
@ -268310,7 +268318,7 @@ CVE-2024-9683,0,0,a648737766df3deb74ddc86e7dcd00883598b7b3c943d9054e11451b5f1854
CVE-2024-9685,0,0,a93c724a8b2ee6ce4a46c54a35028c939ad55b1fb441a5b479f473edc57de420,2024-10-15T14:30:00.483000
CVE-2024-9686,0,0,8a91e1ae5070fa70337820c934475166fa3e061411ab7464abf260ed961a0668,2024-11-06T16:19:04.333000
CVE-2024-9687,0,0,ae8c4791dae243694c67044fa0088a221548cce6d43bc08144a537d590a79ff2,2024-10-17T21:11:14.197000
CVE-2024-9689,0,1,3b3e5990fb9f08a51cd41a7e6a396c2471cfce792d4015e2d1365961bc64adf9,2024-11-06T19:14:53.737000
CVE-2024-9689,0,0,3b3e5990fb9f08a51cd41a7e6a396c2471cfce792d4015e2d1365961bc64adf9,2024-11-06T19:14:53.737000
CVE-2024-9692,0,0,6637a78c6a5a322d069f0f0384d674a49925fbfbbf719ba95a3af042d35fdc19,2024-10-25T12:56:07.750000
CVE-2024-9696,0,0,78e7cb06b620e1544d9c6811ae0c44cf981cc195d0067b351c711666292c356e,2024-10-15T12:57:46.880000
CVE-2024-9700,0,0,ee544a9b692e7ab9f9ab56395ca8011eb3604c34474b906ade007707a048f142,2024-11-01T12:57:03.417000
@ -268401,7 +268409,7 @@ CVE-2024-9896,0,0,09339b3269859e496224a4ee93cb949746eeb659cdbf7ff07d2c92a00e93ed
CVE-2024-9897,0,0,c000f038202bbdf161648c8f1d74fa0a88aad69aa13c730474d96a3fd2473014,2024-11-01T15:27:56.797000
CVE-2024-9898,0,0,34647a8f54872789fb9d153b7e32e611f940664cb6907ab09e4df7e32cdaa8ba,2024-10-18T12:52:33.507000
CVE-2024-9899,0,0,6c76ba1fcc7597d7958a7e74c7de009221352c8fe34414d847a1d4d85ee09e27,2024-10-23T21:15:15.050000
CVE-2024-9902,0,1,5a17b86729ea7d243eb9cea611038373d4bbb9ba8a32113c474ad669aed65087,2024-11-06T20:15:07.820000
CVE-2024-9902,0,0,5a17b86729ea7d243eb9cea611038373d4bbb9ba8a32113c474ad669aed65087,2024-11-06T20:15:07.820000
CVE-2024-9903,0,0,244e0ad624c75743e190bc7da6a1b45fe195aaf738d59f8decfde97c8722448f,2024-10-15T12:57:46.880000
CVE-2024-9904,0,0,b8f5bdf1fde920247f061f9c3939c42469f53e3148abd589ac11ba36d4728079,2024-10-15T12:57:46.880000
CVE-2024-9905,0,0,09e20420cf063b331c2f2444287faaf461bdb42e483d150bc77bc6c327c543d3,2024-10-16T22:12:18.153000

Can't render this file because it is too large.