diff --git a/CVE-2021/CVE-2021-470xx/CVE-2021-47075.json b/CVE-2021/CVE-2021-470xx/CVE-2021-47075.json index af500ffe482..a8e3014c645 100644 --- a/CVE-2021/CVE-2021-470xx/CVE-2021-47075.json +++ b/CVE-2021/CVE-2021-470xx/CVE-2021-47075.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47075", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-01T22:15:47.170", - "lastModified": "2024-03-01T22:22:25.913", + "lastModified": "2024-11-06T22:35:00.660", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvmet: repara la p\u00e9rdida de memoria en nvmet_alloc_ctrl() Al crear ctrl en nvmet_alloc_ctrl(), si cntlid_min es mayor que cntlid_max del subsistema y salta a la etiqueta \"out_free_changed_ns_list\", pero el ctrl->sqs falta para liberarse. Solucione este problema saltando a la etiqueta \"out_free_sqs\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb", diff --git a/CVE-2023/CVE-2023-401xx/CVE-2023-40113.json b/CVE-2023/CVE-2023-401xx/CVE-2023-40113.json index a5a41967c4a..9270bfd5d22 100644 --- a/CVE-2023/CVE-2023-401xx/CVE-2023-40113.json +++ b/CVE-2023/CVE-2023-401xx/CVE-2023-40113.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40113", "sourceIdentifier": "security@android.com", "published": "2024-02-15T23:15:08.597", - "lastModified": "2024-02-16T13:37:55.033", + "lastModified": "2024-11-06T21:35:01.543", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En varias ubicaciones, existe una forma posible para que las aplicaciones accedan a datos de mensajes entre usuarios debido a una falta de verificaci\u00f3n de permiso. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://android.googlesource.com/platform/packages/providers/TelephonyProvider/+/64ca6ba981745875dbf2064e0b2a47f8194c4f0a", diff --git a/CVE-2023/CVE-2023-460xx/CVE-2023-46049.json b/CVE-2023/CVE-2023-460xx/CVE-2023-46049.json index 7ca8a5d4cb3..fbf0fc3f7f3 100644 --- a/CVE-2023/CVE-2023-460xx/CVE-2023-46049.json +++ b/CVE-2023/CVE-2023-460xx/CVE-2023-46049.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46049", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T06:15:10.037", - "lastModified": "2024-08-02T21:15:49.197", + "lastModified": "2024-11-06T22:35:01.887", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "LLVM 15.0.0 tiene una desreferencia de puntero NULL en la funci\u00f3n parseOneMetadata() a trav\u00e9s de un archivo pdflatex.fmt modificado (o quiz\u00e1s un archivo .o modificado) a llvm-lto. NOTA: esto est\u00e1 en disputa porque no se explica la relaci\u00f3n entre pdflatex.fmt y cualquier interfaz de lenguaje LLVM, y porque una falla de la aplicaci\u00f3n llvm-lto debe clasificarse como un problema de usabilidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Jan/66", diff --git a/CVE-2023/CVE-2023-524xx/CVE-2023-52433.json b/CVE-2023/CVE-2023-524xx/CVE-2023-52433.json index c7ceab71cfa..01341ee4595 100644 --- a/CVE-2023/CVE-2023-524xx/CVE-2023-52433.json +++ b/CVE-2023/CVE-2023-524xx/CVE-2023-52433.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52433", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-02-20T13:15:08.140", - "lastModified": "2024-06-16T13:15:50.413", + "lastModified": "2024-11-06T22:35:02.950", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netfilter: nft_set_rbtree: omitir sincronizaci\u00f3n GC para nuevos elementos en esta transacci\u00f3n los nuevos elementos en esta transacci\u00f3n pueden caducar antes de que finalice dicha transacci\u00f3n. Omita la sincronizaci\u00f3n del GC para dichos elementos; de lo contrario, la ruta de confirmaci\u00f3n podr\u00eda pasar por encima de un objeto ya liberado. Una vez finalizada la transacci\u00f3n, async GC recopilar\u00e1 dicho elemento caducado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-273" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/03caf75da1059f0460666c826e9f50e13dfd0017", diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52618.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52618.json index 840a79ba72f..3f29a1102fe 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52618.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52618.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52618", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-18T11:15:09.110", - "lastModified": "2024-11-04T13:16:41.660", + "lastModified": "2024-11-06T22:35:03.783", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: block/rnbd-srv: Comprueba si hay un desbordamiento de cadena improbable. Dado que \"dev_search_path\" t\u00e9cnicamente puede ser tan grande como PATH_MAX, exist\u00eda el riesgo de truncamiento al copiarlo y una segunda cadena en \" full_path\" ya que tambi\u00e9n ten\u00eda un tama\u00f1o PATH_MAX. Las compilaciones W=1 informaban esta advertencia: drivers/block/rnbd/rnbd-srv.c: En funci\u00f3n 'process_msg_open.isra': drivers/block/rnbd/rnbd-srv.c:616:51: advertencia: '% La salida de la directiva s se puede truncar escribiendo hasta 254 bytes en una regi\u00f3n de tama\u00f1o entre 0 y 4095 [-Wformat-truncation=] 616 | snprintf(full_path, PATH_MAX, \"%s/%s\", | ^~ En la funci\u00f3n 'rnbd_srv_get_full_path', insertada desde 'process_msg_open.isra' en drivers/block/rnbd/rnbd-srv.c:721:14: drivers/block /rnbd/rnbd-srv.c:616:17: nota: 'snprintf' genera entre 2 y 4351 bytes en un destino de tama\u00f1o 4096 616 | snprintf(full_path, PATH_MAX, \"%s/%s\", | ^~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 617 | dev_search_path, dev_name); | ~~~~~~~ ~~~~~~~~~~~~~~~~~~~ Para solucionar este problema, verifique incondicionalmente el truncamiento (como ya se hizo en el caso en el que \"%SESSNAME%\" estaba presente)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/5b9ea86e662035a886ccb5c76d56793cba618827", diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52684.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52684.json index b8d5ecb3b81..2d17331ec8c 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52684.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52684.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52684", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T15:15:19.583", - "lastModified": "2024-05-17T18:35:35.070", + "lastModified": "2024-11-06T21:35:01.813", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: firmware: qcom: qseecom: corrige p\u00e9rdidas de memoria en rutas de error Corrija instancias de devoluci\u00f3n de c\u00f3digos de error directamente en lugar de saltar a las etiquetas relevantes donde se liberar\u00eda la memoria asignada para las llamadas SCM." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/6c57d7b593c4a4e60db65d5ce0fe1d9f79ccbe9b", diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52738.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52738.json index bff217bf4de..b4ddaf177f5 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52738.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52738.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52738", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T16:15:13.740", - "lastModified": "2024-05-21T16:53:56.550", + "lastModified": "2024-11-06T21:35:02.090", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu/fence: se solucion\u00f3 el error debido a que drm_sched init/fini no coincide. Actualmente, amdgpu llama a drm_sched_fini() desde la rutina SW fini del controlador de valla; se espera que se llame a dicha funci\u00f3n. s\u00f3lo despu\u00e9s de que la funci\u00f3n de inicio respectiva, drm_sched_init(), se haya ejecutado correctamente. Sucede que recientemente nos enfrentamos a una falla en la sonda del controlador en Steam Deck, y se llam\u00f3 a la funci\u00f3n drm_sched_fini() incluso sin que su contraparte se hubiera llamado previamente, lo que provoc\u00f3 el siguiente error: amdgpu: la sonda de 0000:04:00.0 fall\u00f3 con error -110 ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000090 PGD 0 P4D 0 Ups: 0002 [#1] PREEMPT SMP NOPTI CPU: 0 PID: 609 Comm: systemd-udevd No contaminado 6.2.0-rc3-gpiccoli #338 Nombre del hardware : Valve Jupiter/Jupiter, BIOS F7A0113 04/11/2022 RIP: 0010:drm_sched_fini+0x84/0xa0 [gpu_sched] [...] Seguimiento de llamadas: amdgpu_fence_driver_sw_fini+0xc8/0xd0 [amdgpu] amdgpu_device_fini_sw+0x2b/0x3b0 [ amdgpu] amdgpu_driver_release_kms+0x16/0x30 [amdgpu] devm_drm_dev_init_release+0x49/0x70 [...] Para evitar eso, verifique si drm_sched se inicializ\u00f3 correctamente para un anillo determinado antes de llamar a su contraparte fini. Observe que idealmente usar\u00edamos sched.ready para eso; dicho campo se establece como lo \u00faltimo en drm_sched_init(). Pero amdgpu parece \"sobreescribir\" el significado de dicho campo; en el ejemplo anterior, por ejemplo, fue un anillo GFX el que provoc\u00f3 el bloqueo y el campo sched.ready se configur\u00f3 en verdadero en la rutina de inicio del anillo, independientemente del estado de el programador DRM. Por lo tanto, terminamos usando sched.ops seg\u00fan la sugerencia de Christian [0] y tambi\u00e9n eliminamos la verificaci\u00f3n no_scheduler [1]. [0] https://lore.kernel.org/amd-gfx/984ee981-2906-0eaf-ccec-9f80975cb136@amd.com/ [1] https://lore.kernel.org/amd-gfx/cd0e2994- f85f-d837-609f-7056d5fb7231@amd.com/" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/2bcbbef9cace772f5b7128b11401c515982de34b", diff --git a/CVE-2024/CVE-2024-101xx/CVE-2024-10122.json b/CVE-2024/CVE-2024-101xx/CVE-2024-10122.json index bcde5cd61be..62197e184f1 100644 --- a/CVE-2024/CVE-2024-101xx/CVE-2024-10122.json +++ b/CVE-2024/CVE-2024-101xx/CVE-2024-10122.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10122", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-18T19:15:13.990", - "lastModified": "2024-10-21T17:10:22.857", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-06T22:05:23.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,18 +140,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:topdata:inner_rep_plus:2.01:*:*:*:*:*:*:*", + "matchCriteriaId": "1EBD086E-B71F-47DC-B335-0228F1EB61FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.280914", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.280914", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.421292", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10840.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10840.json index 6666a770007..cbfd2827b5f 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10840.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10840.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10840", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-05T13:15:03.443", - "lastModified": "2024-11-05T16:04:26.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-06T22:49:12.173", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic has been found in romadebrian WEB-Sekolah 1.0. Affected is an unknown function of the file /Admin/akun_edit.php of the component Backend. The manipulation of the argument kode leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": " Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en romadebrian WEB-Sekolah 1.0. Se trata de una funci\u00f3n desconocida del archivo /Admin/akun_edit.php del componente Backend. La manipulaci\u00f3n del argumento kode provoca ataques de Cross Site Scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -106,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -124,18 +158,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:romadebrian:web-sekolah:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4AB95C15-C1D8-47EC-96B6-D38DD31920B3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/2537463005/a/blob/main/WEB-Sekolah%E5%90%8E%E5%8F%B0%E5%AD%98%E5%82%A8%E5%9E%8Bxss.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.283086", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.283086", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10841.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10841.json index 2fe9d44fbfc..f2e0a46c6b4 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10841.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10841.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10841", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-05T14:15:14.220", - "lastModified": "2024-11-05T16:04:26.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-06T22:50:24.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in romadebrian WEB-Sekolah 1.0. Affected by this vulnerability is an unknown functionality of the file /Proses_Kirim.php of the component Mail Handler. The manipulation of the argument Name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "En la versi\u00f3n romadebrian WEB-Sekolah 1.0 se ha detectado una vulnerabilidad clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /Proses_Kirim.php del componente Mail Handler. La manipulaci\u00f3n del argumento Name provoca una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -106,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -124,18 +158,47 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:romadebrian:web-sekolah:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4AB95C15-C1D8-47EC-96B6-D38DD31920B3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/2537463005/a/blob/main/WEB-Sekolah%E5%90%8E%E5%8F%B0%E5%AD%98%E5%82%A8%E5%9E%8Bxss.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.283087", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.283087", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10842.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10842.json index 811df608e92..d024b75c5c5 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10842.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10842.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10842", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-05T14:15:14.543", - "lastModified": "2024-11-05T16:04:26.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-06T22:43:19.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in romadebrian WEB-Sekolah 1.0. Affected by this issue is some unknown functionality of the file /Admin/Proses_Edit_Akun.php of the component Backend. The manipulation of the argument Username_Baru/Password leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": " Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en romadebrian WEB-Sekolah 1.0. Este problema afecta a una funcionalidad desconocida del archivo /Admin/Proses_Edit_Akun.php del componente Backend. La manipulaci\u00f3n del argumento Username_Baru/Password provoca Cross Site Scripting. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -106,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -124,22 +158,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:romadebrian:web-sekolah:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "4AB95C15-C1D8-47EC-96B6-D38DD31920B3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/2537463005/a/blob/main/WEB-Sekolah%E5%90%8E%E5%8F%B0%E5%AD%98%E5%82%A8%E5%9E%8Bxss.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.283088", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.283088", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.429558", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10844.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10844.json index 9247e53dc33..cf882a7bc53 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10844.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10844.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10844", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-05T15:15:22.337", - "lastModified": "2024-11-05T16:04:26.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-06T22:38:13.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as critical, was found in 1000 Projects Bookstore Management System 1.0. This affects an unknown part of the file search.php. The manipulation of the argument s leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en 1000 Projects Bookstore Management System 1.0. Afecta a una parte desconocida del archivo search.php. La manipulaci\u00f3n del argumento s provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -106,8 +130,18 @@ }, "weaknesses": [ { - "source": "cna@vuldb.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, + { + "source": "cna@vuldb.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -124,22 +158,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bookstore_management_system_project:bookstore_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BE1C0C4B-D037-42DD-8505-68508274BC10" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/sbm-98/CVE/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.283089", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.283089", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.436969", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10845.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10845.json index c1b6c2acbdd..24f4044892a 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10845.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10845.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10845", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-05T15:15:22.620", - "lastModified": "2024-11-05T16:04:26.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-06T22:38:03.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability has been found in 1000 Projects Bookstore Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file book_detail.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": " Se ha encontrado una vulnerabilidad en 1000 Projects Bookstore Management System 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo book_detail.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -105,6 +129,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -124,22 +158,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bookstore_management_system_project:bookstore_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "BE1C0C4B-D037-42DD-8505-68508274BC10" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hbuzs/CVE/issues/3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.283090", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.283090", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.436999", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10926.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10926.json new file mode 100644 index 00000000000..ff461d3b91d --- /dev/null +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10926.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-10926", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-06T21:15:04.927", + "lastModified": "2024-11-06T21:15:04.927", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in IBPhoenix ibWebAdmin up to 1.0.2 and classified as problematic. This issue affects some unknown processing of the file /toggle_fold_panel.php of the component Tabelas Section. The manipulation of the argument p leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 4.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://docs.google.com/document/d/1h9LlTV1FVvOSDBWc7qwU_5qcboCKd6H99Oqg3rZdBRQ/edit?usp=sharing", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.283325", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.283325", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.429635", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10941.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10941.json new file mode 100644 index 00000000000..b65fdf9847e --- /dev/null +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10941.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-10941", + "sourceIdentifier": "security@mozilla.org", + "published": "2024-11-06T21:15:05.213", + "lastModified": "2024-11-06T21:15:05.213", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A malicious website could have included an iframe with an malformed URI resulting in a non-exploitable browser crash. This vulnerability affects Firefox < 126." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1880879", + "source": "security@mozilla.org" + }, + { + "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1887614", + "source": "security@mozilla.org" + }, + { + "url": "https://www.mozilla.org/security/advisories/mfsa2024-21/", + "source": "security@mozilla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21249.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21249.json index 9fcf6a1ac47..c033737901a 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21249.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21249.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21249", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:14.880", - "lastModified": "2024-10-31T15:35:25.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-06T22:53:50.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +61,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_fin_expenses:9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "38221C8A-6D2C-47F1-A222-B42472AB7F5A" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21250.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21250.json index 6b94612ba86..5319f9479ee 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21250.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21250.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21250", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:15.063", - "lastModified": "2024-10-17T14:35:19.303", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-06T22:54:57.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +61,35 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:process_manufacturing_product_development:12.2.13:*:*:*:*:*:*:*", + "matchCriteriaId": "A520C6E9-1006-43E6-98C2-332C89E398CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:process_manufacturing_product_development:12.2.14:*:*:*:*:*:*:*", + "matchCriteriaId": "137E4B4C-5286-445E-B347-B5D5BEBFAA23" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21257.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21257.json index 15ea240811f..1d9dc659bbc 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21257.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21257.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21257", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:16.220", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-06T22:55:18.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,10 +39,42 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:hyperion_bi\\+:11.2.18.0.000:*:*:*:*:*:*:*", + "matchCriteriaId": "8EC21BCB-FA89-475B-9A33-108FF5363829" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21258.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21258.json index 47bb5f03773..a51ed36268e 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21258.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21258.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21258", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:16.410", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-06T22:56:19.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +61,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:installed_base:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.2.3", + "versionEndIncluding": "12.2.14", + "matchCriteriaId": "4F2A7D80-68E3-4AAA-BD96-CE108A5CB0C6" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-212xx/CVE-2024-21264.json b/CVE-2024/CVE-2024-212xx/CVE-2024-21264.json index a9ffee7002b..a647f220ea2 100644 --- a/CVE-2024/CVE-2024-212xx/CVE-2024-21264.json +++ b/CVE-2024/CVE-2024-212xx/CVE-2024-21264.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21264", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-10-15T20:15:17.533", - "lastModified": "2024-10-16T16:38:43.170", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-06T22:56:41.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + }, { "source": "secalert_us@oracle.com", "type": "Secondary", @@ -39,10 +59,42 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_cost_center_common_application_objects:9.2:*:*:*:*:*:*:*", + "matchCriteriaId": "D30BE00A-198B-4398-9404-BEA9D255B554" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuoct2024.html", - "source": "secalert_us@oracle.com" + "source": "secalert_us@oracle.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22013.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22013.json index a382290040b..1b3ced0ddb5 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22013.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22013.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22013", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-09-16T20:15:45.743", - "lastModified": "2024-09-20T12:31:20.110", + "lastModified": "2024-11-06T21:35:02.500", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El entorno U-Boot se lee desde una partici\u00f3n no autenticada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://support.google.com/product-documentation/answer/14950962?hl=en&ref_topic=12974021&sjid=9595902703262170957-NA#zippy=%2Cwifi", diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23560.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23560.json index 07b88cde0c4..123f46ead2b 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23560.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23560.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23560", "sourceIdentifier": "psirt@hcl.com", "published": "2024-04-15T20:15:10.873", - "lastModified": "2024-04-16T13:24:07.103", + "lastModified": "2024-11-06T22:35:04.240", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-281" + } + ] + } + ], "references": [ { "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0111925", diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26367.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26367.json index fed50eb5b9f..b834c4d91bc 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26367.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26367.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26367", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-14T16:16:22.863", - "lastModified": "2024-05-14T19:18:31.490", + "lastModified": "2024-11-06T21:35:02.850", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de Cross Site Scripting en Evertz microsystems MViP-II Firmware 8.6.5, XPS-EDGE-* Build 1467, evEDGE-EO-* Build 0029, MMA10G-* Build 0498, 570IPG-X19-10G Build 0691 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para los par\u00e1metros de inicio de sesi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "http://cc.com", diff --git a/CVE-2024/CVE-2024-266xx/CVE-2024-26648.json b/CVE-2024/CVE-2024-266xx/CVE-2024-26648.json index 1ea42178e2b..cf97f3b5125 100644 --- a/CVE-2024/CVE-2024-266xx/CVE-2024-26648.json +++ b/CVE-2024/CVE-2024-266xx/CVE-2024-26648.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26648", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-26T18:15:10.220", - "lastModified": "2024-03-27T12:29:41.530", + "lastModified": "2024-11-06T22:35:04.950", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: se corrigi\u00f3 la diferenciaci\u00f3n de variables antes de la verificaci\u00f3n NULL en edp_setup_replay() En edp_setup_replay(), se elimin\u00f3 la referencia a 'struct dc *dc' y 'struct dmub_replay *replay' antes de la comprobaci\u00f3n NULL del puntero 'enlace' y 'repetici\u00f3n'. Corrige lo siguiente: drivers/gpu/drm/amd/amdgpu/../display/dc/link/protocols/link_edp_panel_control.c:947 edp_setup_replay() advertencia: variable desreferenciada antes de marcar 'enlace' (ver l\u00ednea 933)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/22ae604aea14756954e1c00ae653e34d2afd2935", diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26731.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26731.json index 91ddaa4a507..f70586fea55 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26731.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26731.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26731", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:50.927", - "lastModified": "2024-04-03T17:24:18.150", + "lastModified": "2024-11-06T22:35:05.197", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bpf, sockmap: corrigi\u00f3 la desreferencia del puntero NULL en sk_psock_verdict_data_ready() syzbot inform\u00f3 el siguiente problema de desreferencia del puntero NULL [1]: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000000 [... ] RIP: 0010:0x0 [...] Seguimiento de llamadas: sk_psock_verdict_data_ready+0x232/0x340 net/core/skmsg.c:1230 unix_stream_sendmsg+0x9b4/0x1230 net/unix/af_unix.c:2293 sock_sendmsg_nosec net/socket. c:730 [en l\u00ednea] __sock_sendmsg+0x221/0x270 net/socket.c:745 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584 ___sys_sendmsg net/socket.c:2638 [en l\u00ednea] __sys_sendmsg+0x2b0/0x3a0 net /socket. c:2667 do_syscall_64+0xf9/0x240 Entry_SYSCALL_64_after_hwframe+0x6f/0x77 Si sk_psock_verdict_data_ready() y sk_psock_stop_verdict() se llaman simult\u00e1neamente, psock->saved_data_ready puede ser NULL, causando el problema anterior. Este parche soluciona este problema llamando a la funci\u00f3n de preparaci\u00f3n de datos adecuada utilizando el asistente sk_psock_data_ready() y protegi\u00e9ndola de la concurrencia con sk->sk_callback_lock." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/4588b13abcbd561ec67f5b3c1cb2eff690990a54", diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26744.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26744.json index 264b02babce..377fb6bfbce 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26744.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26744.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26744", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:51.627", - "lastModified": "2024-11-05T10:15:46.253", + "lastModified": "2024-11-06T21:35:03.883", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/srpt: admite la especificaci\u00f3n del par\u00e1metro srpt_service_guid. Hace que la carga de ib_srpt con este conjunto de par\u00e1metros funcione. El comportamiento actual es que configurar ese par\u00e1metro mientras se carga el m\u00f3dulo del kernel ib_srpt desencadena el siguiente fallo del kernel: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000000 Seguimiento de llamadas: parse_one+0x18c/0x1d0 parse_args+0xe1/0x230 load_module+0x8de/ 0xa60 init_module_from_file+0x8b/0xd0 idempotent_init_module+0x181/0x240 __x64_sys_finit_module+0x5a/0xb0 do_syscall_64+0x5f/0xe0 Entry_SYSCALL_64_after_hwframe+0x6e/0x76" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/5a5c039dac1b1b7ba3e91c791f4421052bf79b82", diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26757.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26757.json index 4790970f72b..f84a0fb9289 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26757.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26757.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26757", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:52.207", - "lastModified": "2024-04-03T17:24:18.150", + "lastModified": "2024-11-06T21:35:04.737", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: md: No ignorar la matriz de solo lectura en md_check_recovery() Generalmente, si la matriz no es de lectura y escritura, md_check_recovery() no registrar\u00e1 un nuevo sync_thread en primer lugar. Y si la matriz es de lectura y escritura y sync_thread est\u00e1 registrado, md_set_readonly() cancelar\u00e1 el registro de sync_thread antes de configurar la matriz como de solo lectura. md/raid sigue este comportamiento, por lo que no hay problema. Despu\u00e9s de commit f52f5c71f3d4 (\"md: arreglar la detenci\u00f3n del hilo de sincronizaci\u00f3n\"), el siguiente bloqueo puede activarse mediante test shell/integrity-caching.sh: 1) la matriz es de solo lectura. Superbloque de actualizaci\u00f3n dm-raid: rs_update_sbs ro = mddev->ro mddev->ro = 0 -> establecer matriz de lectura y escritura md_update_sb 2) registrar un nuevo hilo de sincronizaci\u00f3n simult\u00e1neamente. 3) dm-raid vuelve a configurar la matriz en solo lectura: rs_update_sbs mddev->ro = ro 4) detiene la matriz: raid_dtr md_stop stop_sync_thread set_bit(MD_RECOVERY_INTR, &mddev->recovery); md_wakeup_thread_directly(mddev->sync_thread); wait_event(..., !test_bit(MD_RECOVERY_RUNNING, &mddev->recovery)) 5) hilo de sincronizaci\u00f3n realizado: md_do_sync set_bit(MD_RECOVERY_DONE, &mddev->recovery); md_wakeup_thread(mddev->thread); 6) el hilo del demonio no puede cancelar el registro del hilo de sincronizaci\u00f3n: md_check_recovery if (!md_is_rdwr(mddev) && !test_bit(MD_RECOVERY_NEEDED, &mddev->recovery)) return; -> -> MD_RECOVERY_RUNNING no se puede borrar, por lo tanto el paso 4 se bloquea; La causa principal es que dm-raid manipula 'mddev->ro' por s\u00ed solo; sin embargo, dm-raid realmente deber\u00eda detener el hilo de sincronizaci\u00f3n antes de configurar la matriz como de solo lectura. Desafortunadamente, necesito leer m\u00e1s c\u00f3digo antes de poder refactorizar el controlador de 'mddev->ro' en dm-raid, por lo tanto, solucionemos el problema de la manera m\u00e1s f\u00e1cil por ahora para evitar la regresi\u00f3n de dm-raid." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2ea169c5a0b1134d573d07fc27a16f327ad0e7d3", diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26779.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26779.json index 8a15e6b032d..0b1b17ac609 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26779.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26779.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26779", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T17:15:53.423", - "lastModified": "2024-11-05T10:15:49.233", + "lastModified": "2024-11-06T22:35:05.993", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mac80211: corrige la condici\u00f3n de ejecuci\u00f3n al habilitar fast-xmit fast-xmit solo debe habilitarse despu\u00e9s de que el sta se haya cargado en el controlador; de lo contrario, podr\u00eda terminar pasando el error sta a\u00fan cargada a trav\u00e9s de llamadas drv_tx al controlador, lo que genera posibles fallas debido a datos drv_priv no inicializados. Agregue una estaci\u00f3n faltante->comprobaci\u00f3n cargada y vuelva a verificar la transmisi\u00f3n r\u00e1pida despu\u00e9s de insertar una estaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/281280276b70c822f55ce15b661f6d1d3228aaa9", diff --git a/CVE-2024/CVE-2024-288xx/CVE-2024-28895.json b/CVE-2024/CVE-2024-288xx/CVE-2024-28895.json index 710053089d7..8b7d5b00e91 100644 --- a/CVE-2024/CVE-2024-288xx/CVE-2024-28895.json +++ b/CVE-2024/CVE-2024-288xx/CVE-2024-28895.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28895", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-04-01T01:15:46.890", - "lastModified": "2024-04-01T01:33:21.910", + "lastModified": "2024-11-06T21:35:05.843", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Yahoo! JAPAN' App para Android v2.3.1 a v3.161.1 y 'Yahoo! La aplicaci\u00f3n JAPAN para iOS v3.2.2 a v4.109.0 contiene una vulnerabilidad de cross-site scripting. Si se explota esta vulnerabilidad, se puede ejecutar un script arbitrario en WebView de Yahoo! JAPAN ' App a trav\u00e9s de otra aplicaci\u00f3n instalada en el dispositivo del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://jvn.jp/en/jp/JVN23528780/", diff --git a/CVE-2024/CVE-2024-299xx/CVE-2024-29948.json b/CVE-2024/CVE-2024-299xx/CVE-2024-29948.json index ba336d7520e..9281bb1d0d3 100644 --- a/CVE-2024/CVE-2024-299xx/CVE-2024-29948.json +++ b/CVE-2024/CVE-2024-299xx/CVE-2024-29948.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29948", "sourceIdentifier": "hsrc@hikvision.com", "published": "2024-04-02T11:15:51.813", - "lastModified": "2024-04-02T12:50:42.233", + "lastModified": "2024-11-06T21:35:06.680", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikvision-nvr-devices/", diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30122.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30122.json index a97a2c7ed06..64505b90133 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30122.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30122.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30122", "sourceIdentifier": "psirt@hcl.com", "published": "2024-10-23T15:15:30.390", - "lastModified": "2024-10-25T12:56:36.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-06T22:33:46.797", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "psirt@hcl.com", "type": "Secondary", @@ -39,10 +59,48 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:sametime:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.0.2", + "matchCriteriaId": "FDA15EE5-1675-469C-BF7B-DB9FDE95F338" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hcltech:sametime:12.0.2:-:*:*:*:*:*:*", + "matchCriteriaId": "D6A54E0B-DB62-4674-B57D-827A55BBE2CA" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0115627", - "source": "psirt@hcl.com" + "source": "psirt@hcl.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-333xx/CVE-2024-33338.json b/CVE-2024/CVE-2024-333xx/CVE-2024-33338.json index 8ff129b9aa4..6fdb35f4f36 100644 --- a/CVE-2024/CVE-2024-333xx/CVE-2024-33338.json +++ b/CVE-2024/CVE-2024-333xx/CVE-2024-33338.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33338", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-29T18:15:07.937", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-11-06T22:35:06.803", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de Cross Site Scripting en jizhicms v.2.5.4 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de una solicitud de publicaci\u00f3n de art\u00edculo manipulada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/7akahash1/POC/blob/main/1.md", diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35835.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35835.json index 9931b2a0c11..9dcdf1d842f 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35835.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35835.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35835", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:20.387", - "lastModified": "2024-11-05T10:16:42.810", + "lastModified": "2024-11-06T21:35:07.630", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net/mlx5e: corregido un double free en arfs_create_groups Cuando falla `in` asignado por kvzalloc, arfs_create_groups liberar\u00e1 ft->g y devolver\u00e1 un error. Sin embargo, arfs_create_table, el \u00fanico llamador de arfs_create_groups, mantendr\u00e1 este error y llamar\u00e1 a mlx5e_destroy_flow_table, en el que ft->g se liberar\u00e1 nuevamente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/2501afe6c4c9829d03abe9a368b83d9ea1b611b7", diff --git a/CVE-2024/CVE-2024-368xx/CVE-2024-36881.json b/CVE-2024/CVE-2024-368xx/CVE-2024-36881.json index 40a522e1cc9..a83662ffa03 100644 --- a/CVE-2024/CVE-2024-368xx/CVE-2024-36881.json +++ b/CVE-2024/CVE-2024-368xx/CVE-2024-36881.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36881", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:11.723", - "lastModified": "2024-05-30T18:18:58.870", + "lastModified": "2024-11-06T22:35:07.757", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/userfaultfd: restablece ptes al cerrar() para los protegidos por wr. Userfaultfd unregister incluye un paso para eliminar los bits de wr-protect de todas las entradas relevantes de pgtable, pero eso solo cubre una UFFDIO_UNREGISTER ioctl expl\u00edcito, no un close() en el propio userfaultfd. Cubre eso tambi\u00e9n. Esto corrige un rastro WARN. El \u00fanico efecto secundario visible para el usuario es que puede observar los bits wr-protect sobrantes incluso si el usuario cerr\u00f3 () en un userfaultfd al liberar la \u00faltima referencia del mismo. Sin embargo, es de esperar que eso sea inofensivo y, aun as\u00ed, no deber\u00eda pasar nada malo. Este cambio ahora es m\u00e1s importante despu\u00e9s del reciente parche de verificaci\u00f3n de tabla de p\u00e1ginas que fusionamos en mm-unstable (446dd9ad37d0 (\"mm/page_table_check: admite entradas de protecci\u00f3n wr de error de usuario\")), ya que haremos una verificaci\u00f3n de cordura en uffd-wp. bits sin contexto vma. Por lo tanto, es mejor si podemos garantizar al 100% que no queden restos de bits de uffd-wp, para asegurarnos de que cada informe sea v\u00e1lido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/377f3a9a3d032a52325a5b110379a25dd1ab1931", diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47253.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47253.json index 39bf02e4077..680101de339 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47253.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47253.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47253", "sourceIdentifier": "product-security@axis.com", "published": "2024-11-05T10:20:03.973", - "lastModified": "2024-11-05T16:04:26.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-06T22:23:29.663", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "product-security@axis.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "product-security@axis.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:2n:access_commander:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.1.1.2", + "matchCriteriaId": "47A7B866-FF8F-4CA9-A34C-78D361E21730" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.2n.com/en-GB/about-2n/cybersecurity/", - "source": "product-security@axis.com" + "source": "product-security@axis.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47254.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47254.json index f36063949ce..436e5e075f9 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47254.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47254.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47254", "sourceIdentifier": "product-security@axis.com", "published": "2024-11-05T10:20:04.843", - "lastModified": "2024-11-05T16:04:26.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-06T22:22:01.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "product-security@axis.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "product-security@axis.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:2n:access_commander:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.1.1.2", + "matchCriteriaId": "47A7B866-FF8F-4CA9-A34C-78D361E21730" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.2n.com/en-GB/about-2n/cybersecurity/", - "source": "product-security@axis.com" + "source": "product-security@axis.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47255.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47255.json index 44a7bd6c9c9..ec8011bb336 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47255.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47255.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47255", "sourceIdentifier": "product-security@axis.com", "published": "2024-11-05T10:20:05.300", - "lastModified": "2024-11-05T16:04:26.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-06T22:23:05.770", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "product-security@axis.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "product-security@axis.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:2n:access_commander:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.1.1.2", + "matchCriteriaId": "47A7B866-FF8F-4CA9-A34C-78D361E21730" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.2n.com/en-GB/about-2n/cybersecurity/", - "source": "product-security@axis.com" + "source": "product-security@axis.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48050.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48050.json index 8bd3e7b5f3a..e2c28cbe837 100644 --- a/CVE-2024/CVE-2024-480xx/CVE-2024-48050.json +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48050.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48050", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-04T23:15:04.250", - "lastModified": "2024-11-05T16:04:26.053", + "lastModified": "2024-11-06T21:35:07.863", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En agentscope <=v0.0.4, el archivo agentscope\\web\\workstation\\workflow_utils.py tiene la funci\u00f3n is_callable_expression. Dentro de esta funci\u00f3n, la l\u00ednea result = eval(s) plantea un riesgo de seguridad, ya que puede ejecutar directamente comandos proporcionados por el usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/AfterSnows/0ad9d233a9d2a5b7e6e5273e2e23508d", diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49370.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49370.json index c0ec70339bc..66d8247cffc 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49370.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49370.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49370", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-23T15:15:31.987", - "lastModified": "2024-10-25T12:56:36.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-06T22:31:30.160", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,12 +59,44 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } ] }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -73,10 +105,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.1.16", + "matchCriteriaId": "8E36A24C-B1EA-4E86-B87D-69AB12876830" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndExcluding": "4.1.7", + "matchCriteriaId": "13395FFF-7B19-4774-B7FF-F9EF31064AD6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-74p5-77rq-gfqc", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-496xx/CVE-2024-49675.json b/CVE-2024/CVE-2024-496xx/CVE-2024-49675.json index 9d8984596fe..389656244aa 100644 --- a/CVE-2024/CVE-2024-496xx/CVE-2024-49675.json +++ b/CVE-2024/CVE-2024-496xx/CVE-2024-49675.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49675", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-23T15:15:32.120", - "lastModified": "2024-10-25T12:56:36.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-06T22:24:22.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vitaliibryl:switch_user:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.0.1", + "matchCriteriaId": "AC4A7ABE-B11E-467C-B9E0-23C86844CABC" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ibryl-switch-user/wordpress-ibryl-switch-user-plugin-1-0-1-account-takeover-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50340.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50340.json new file mode 100644 index 00000000000..5ddf3c55607 --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50340.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-50340", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-06T21:15:05.527", + "lastModified": "2024-11-06T21:15:05.527", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "symfony/runtime is a module for the Symphony PHP framework which enables decoupling PHP applications from global state. When the `register_argv_argc` php directive is set to `on` , and users call any URL with a special crafted query string, they are able to change the environment or debug mode used by the kernel when handling the request. As of versions 5.4.46, 6.4.14, and 7.1.7 the `SymfonyRuntime` now ignores the `argv` values for non-SAPI PHP runtimes. All users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/symfony/symfony/commit/a77b308c3f179ed7c8a8bc295f82b2d6ee3493fa", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/symfony/symfony/security/advisories/GHSA-x8vp-gf4q-mw5j", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50341.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50341.json new file mode 100644 index 00000000000..6045c3652a0 --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50341.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-50341", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-06T21:15:05.747", + "lastModified": "2024-11-06T21:15:05.747", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "symfony/security-bundle is a module for the Symphony PHP framework which provides a tight integration of the Security component into the Symfony full-stack framework. The custom `user_checker` defined on a firewall is not called when Login Programmaticaly with the `Security::login` method, leading to unwanted login. As of versions 6.4.10, 7.0.10 and 7.1.3 the `Security::login` method now ensure to call the configured `user_checker`. All users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/symfony/symfony/commit/22a0789a0085c3ee96f4ef715ecad8255cf0e105", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/symfony/symfony/security/advisories/GHSA-jxgr-3v7q-3w9v", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50342.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50342.json new file mode 100644 index 00000000000..195d20b77c8 --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50342.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-50342", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-06T21:15:05.963", + "lastModified": "2024-11-06T21:15:05.963", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "symfony/http-client is a module for the Symphony PHP framework which provides powerful methods to fetch HTTP resources synchronously or asynchronously. When using the `NoPrivateNetworkHttpClient`, some internal information is still leaking during host resolution, which leads to possible IP/port enumeration. As of versions 5.4.46, 6.4.14, and 7.1.7 the `NoPrivateNetworkHttpClient` now filters blocked IPs earlier to prevent such leaks. All users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/symfony/symfony/commit/296d4b34a33b1a6ca5475c6040b3203622520f5b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/symfony/symfony/security/advisories/GHSA-9c3x-r3wp-mgxm", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50343.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50343.json new file mode 100644 index 00000000000..f22223f3210 --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50343.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-50343", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-06T21:15:06.180", + "lastModified": "2024-11-06T21:15:06.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "symfony/validator is a module for the Symphony PHP framework which provides tools to validate values. It is possible to trick a `Validator` configured with a regular expression using the `$` metacharacters, with an input ending with `\\n`. Symfony as of versions 5.4.43, 6.4.11, and 7.1.4 now uses the `D` regex modifier to match the entire input. Users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/symfony/symfony/commit/7d1032bbead9a4229b32fa6ebca32681c80cb76f", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/symfony/symfony/security/advisories/GHSA-g3rh-rrhp-jhh9", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50345.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50345.json new file mode 100644 index 00000000000..cf1fa25466a --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50345.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-50345", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-06T21:15:06.383", + "lastModified": "2024-11-06T21:15:06.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/symfony/symfony/security/advisories/GHSA-mrqx-rp3w-jpjp", + "source": "security-advisories@github.com" + }, + { + "url": "https://url.spec.whatwg.org", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51408.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51408.json index 0402d2f8e00..aaaaa4d2076 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51408.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51408.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51408", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-04T14:15:16.603", - "lastModified": "2024-11-05T22:35:13.937", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-06T22:06:43.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "cve@mitre.org", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,18 +81,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:appsmith:appsmith:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.8.3", + "versionEndExcluding": "1.46", + "matchCriteriaId": "200066FD-141E-4023-A8CF-350F46C52870" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/appsmithorg/appsmith/pull/29286", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/appsmithorg/appsmith/releases/tag/v1.46", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Release Notes" + ] }, { "url": "https://github.com/jahithoque/Vulnerability-Research/tree/main/CVE-2024-51408", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51626.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51626.json index 9f50d6d3650..3385b3ea999 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51626.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51626.json @@ -2,17 +2,41 @@ "id": "CVE-2024-51626", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T15:15:22.730", - "lastModified": "2024-11-04T18:50:05.607", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-06T22:10:20.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mansur Ahamed Woocommerce Quote Calculator allows Blind SQL Injection.This issue affects Woocommerce Quote Calculator: from n/a through 1.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Woocommerce Quote Calculator de Mansur Ahamed permite la inyecci\u00f3n SQL ciega. Este problema afecta a Woocommerce Quote Calculator: desde n/a hasta 1.1." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mansurahamed:woocommerce_quote_calculator:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.1", + "matchCriteriaId": "A8F99F04-98CA-4DA4-B7CB-C6C16FD1156C" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/woo-quote-calculator-order/wordpress-woocommerce-quote-calculator-plugin-1-1-sql-injection-vulnerability-2?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51665.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51665.json index 1801730c3ac..60ffbd36a81 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51665.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51665.json @@ -2,17 +2,41 @@ "id": "CVE-2024-51665", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T14:15:16.987", - "lastModified": "2024-11-04T18:50:05.607", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-06T22:07:10.707", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Server-Side Request Forgery (SSRF) vulnerability in Noor alam Magical Addons For Elementor allows Server Side Request Forgery.This issue affects Magical Addons For Elementor: from n/a through 1.2.1." + }, + { + "lang": "es", + "value": " La vulnerabilidad de Server-Side Request Forgery (SSRF) en Noor alam Magical Addons For Elementor permite Server-Side Request Forgery. Este problema afecta a Magical Addons For Elementor: desde n/a hasta 1.2.1." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpthemespace:magical_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.3", + "matchCriteriaId": "0D7D471C-B15C-4B06-B247-025BA5FB9194" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/magical-addons-for-elementor/wordpress-magical-addons-for-elementor-plugin-1-2-1-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51672.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51672.json index 10a7074651d..bd4f2b51c14 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51672.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51672.json @@ -2,17 +2,41 @@ "id": "CVE-2024-51672", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T14:15:17.190", - "lastModified": "2024-11-04T18:50:05.607", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-06T22:08:22.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPDeveloper BetterLinks allows SQL Injection.This issue affects BetterLinks: from n/a through 2.1.7." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en WPDeveloper BetterLinks permite la inyecci\u00f3n SQL. Este problema afecta a BetterLinks: desde n/a hasta 2.1.7." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpdeveloper:betterlinks:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "2.1.8", + "matchCriteriaId": "F07AEFF7-CD0F-43EB-AD00-A1B4A2FCE774" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/betterlinks/wordpress-betterlinks-plugin-2-1-7-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51677.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51677.json index 1c6e350950f..97896193b3a 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51677.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51677.json @@ -2,17 +2,41 @@ "id": "CVE-2024-51677", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T15:15:22.947", - "lastModified": "2024-11-04T18:50:05.607", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-06T22:10:31.677", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WebberZone Knowledge Base allows Stored XSS.This issue affects Knowledge Base: from n/a through 2.2.0." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en WebberZone Knowledge Base permite XSS almacenado. Este problema afecta a Knowledge Base: desde n/a hasta 2.2.0." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webberzone:knowledge_base:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.1", + "matchCriteriaId": "5E509AFC-6A96-4395-9950-021A25F856EB" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/knowledgebase/wordpress-knowledge-base-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51678.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51678.json index f8189a66d91..74419841851 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51678.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51678.json @@ -2,17 +2,41 @@ "id": "CVE-2024-51678", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T15:15:23.163", - "lastModified": "2024-11-04T18:50:05.607", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-06T22:10:45.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Marcel Pol Elo Rating Shortcode allows Stored XSS.This issue affects Elo Rating Shortcode: from n/a through 1.0.3." + }, + { + "lang": "es", + "value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Marcel Pol Elo Rating Shortcode permite XSS almacenado. Este problema afecta a Elo Rating Shortcode: desde n/a hasta 1.0.3." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:timelord:elo_rating_shortcode:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.4", + "matchCriteriaId": "DD6BD84D-7596-4867-846B-F1E3D3C850F1" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/elo-rating-shortcode/wordpress-elo-rating-shortcode-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51680.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51680.json index 8ec62ea4148..c6127355031 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51680.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51680.json @@ -2,17 +2,41 @@ "id": "CVE-2024-51680", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T15:15:23.367", - "lastModified": "2024-11-04T18:50:05.607", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-06T22:10:59.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CrestaProject \u2013 Rizzo Andrea Cresta Addons for Elementor allows Stored XSS.This issue affects Cresta Addons for Elementor: from n/a through 1.0.9." + }, + { + "lang": "es", + "value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en CrestaProject \u2013 Rizzo Andrea Cresta Addons para Elementor permite XSS almacenado. Este problema afecta a Cresta Addons para Elementor: desde n/a hasta 1.0.9." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:crestaproject:cresta_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.0", + "matchCriteriaId": "BF5F07AA-0D63-4415-AD80-071F5F656550" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/cresta-addons-for-elementor/wordpress-cresta-addons-for-elementor-plugin-1-0-9-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51681.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51681.json index 3fa83723cce..2f408a4ad17 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51681.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51681.json @@ -2,17 +2,41 @@ "id": "CVE-2024-51681", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T15:15:23.577", - "lastModified": "2024-11-04T18:50:05.607", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-06T22:11:16.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CodeRevolution WP Pocket URLs allows Stored XSS.This issue affects WP Pocket URLs: from n/a through 1.0.3." + }, + { + "lang": "es", + "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en las URL de WP Pocket de CodeRevolution permite XSS almacenado. Este problema afecta a las URL de WP Pocket: desde n/a hasta 1.0.3." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:coderevolution:wp_pocket_urls:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.4", + "matchCriteriaId": "18E7B64D-FBAA-4F21-B18F-DF4162D68AE7" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-pocket-urls/wordpress-wp-pocket-urls-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51682.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51682.json index 49799b3d5f7..1ad70d1a506 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51682.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51682.json @@ -2,17 +2,41 @@ "id": "CVE-2024-51682", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T15:15:23.787", - "lastModified": "2024-11-04T18:50:05.607", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-06T22:12:02.353", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in HasThemes HT Builder \u2013 WordPress Theme Builder for Elementor allows Stored XSS.This issue affects HT Builder \u2013 WordPress Theme Builder for Elementor: from n/a through 1.3.0." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en HasThemes HT Builder \u2013 WordPress Theme Builder for Elementor permite XSS almacenado. Este problema afecta a HT Builder \u2013 WordPress Theme Builder for Elementor: desde n/a hasta 1.3.0." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hasthemes:ht_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.3.1", + "matchCriteriaId": "FD23AE19-E68B-4DBF-9ED9-4B9DD085271E" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/ht-builder/wordpress-ht-builder-wordpress-theme-builder-for-elementor-plugin-1-3-0-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51683.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51683.json index 52d8db6164e..7f802470676 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51683.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51683.json @@ -2,17 +2,41 @@ "id": "CVE-2024-51683", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-04T15:15:24.013", - "lastModified": "2024-11-04T18:50:05.607", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-06T22:12:19.803", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Michael Gangolf Custom post type templates for Elementor allows Stored XSS.This issue affects Custom post type templates for Elementor: from n/a through 1.10.1." + }, + { + "lang": "es", + "value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en las plantillas de tipo de publicaci\u00f3n personalizadas de Michael Gangolf para Elementor permite XSS almacenado. Este problema afecta a Custom post type templates for Elementor: desde n/a hasta 1.10.1." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -47,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:migaweb:custom_post_type_templates_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.12", + "matchCriteriaId": "BC28FA62-4EAC-4B4F-8E90-83862AFF1FDF" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/custom-post-type-templates-for-elementor/wordpress-custom-post-type-templates-for-elementor-plugin-1-10-1-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51736.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51736.json new file mode 100644 index 00000000000..8ae4c5f8ee8 --- /dev/null +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51736.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-51736", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-06T21:15:06.600", + "lastModified": "2024-11-06T21:15:06.600", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 0.0, + "baseSeverity": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 0.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/symfony/symfony/security/advisories/GHSA-qq5c-677p-737q", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/symfony/symfony/security/advisories/GHSA-qq5c-677p-737q", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51757.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51757.json index 30053ed43da..0eff2bbfbfe 100644 --- a/CVE-2024/CVE-2024-517xx/CVE-2024-51757.json +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51757.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51757", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-06T20:15:06.337", - "lastModified": "2024-11-06T20:15:06.337", + "lastModified": "2024-11-06T21:15:06.807", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -78,6 +78,10 @@ "url": "https://github.com/capricorn86/happy-dom/commit/5ee0b1676d4ce20cc2a70d1c9c8d6f1e3f57efac", "source": "security-advisories@github.com" }, + { + "url": "https://github.com/capricorn86/happy-dom/commit/d23834c232f1cf5519c9418b073f1dcec6b2f0fd", + "source": "security-advisories@github.com" + }, { "url": "https://github.com/capricorn86/happy-dom/issues/1585", "source": "security-advisories@github.com" @@ -86,6 +90,10 @@ "url": "https://github.com/capricorn86/happy-dom/pull/1586", "source": "security-advisories@github.com" }, + { + "url": "https://github.com/capricorn86/happy-dom/releases/tag/v15.10.2", + "source": "security-advisories@github.com" + }, { "url": "https://github.com/capricorn86/happy-dom/security/advisories/GHSA-96g7-g7g9-jxw8", "source": "security-advisories@github.com" diff --git a/CVE-2024/CVE-2024-56xx/CVE-2024-5642.json b/CVE-2024/CVE-2024-56xx/CVE-2024-5642.json index 10d6eba67b7..7853a0a42fd 100644 --- a/CVE-2024/CVE-2024-56xx/CVE-2024-5642.json +++ b/CVE-2024/CVE-2024-56xx/CVE-2024-5642.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5642", "sourceIdentifier": "cna@python.org", "published": "2024-06-27T21:15:16.070", - "lastModified": "2024-07-28T14:15:11.220", + "lastModified": "2024-11-06T21:35:08.690", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "CPython 3.9 y versiones anteriores no permiten la configuraci\u00f3n de una lista vac\u00eda (\"[]\") para SSLContext.set_npn_protocols(), que es un valor no v\u00e1lido para la API OpenSSL subyacente. Esto da como resultado una lectura excesiva del b\u00fafer cuando se utiliza NPN (consulte CVE-2024-5535 para OpenSSL). Esta vulnerabilidad es de baja gravedad debido a que NPN no se usa ampliamente y especificar una lista vac\u00eda probablemente sea poco com\u00fan en la pr\u00e1ctica (normalmente se configurar\u00eda un nombre de protocolo)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/06/28/4", diff --git a/README.md b/README.md index 8bc508894e7..cb478e0d87f 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-06T21:00:21.583587+00:00 +2024-11-06T23:00:20.311060+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-06T20:55:37.613000+00:00 +2024-11-06T22:56:41.647000+00:00 ``` ### Last Data Feed Release @@ -33,49 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -268480 +268488 ``` ### CVEs added in the last Commit -Recently added CVEs: `5` +Recently added CVEs: `8` -- [CVE-2024-51751](CVE-2024/CVE-2024-517xx/CVE-2024-51751.json) (`2024-11-06T20:15:05.557`) -- [CVE-2024-51754](CVE-2024/CVE-2024-517xx/CVE-2024-51754.json) (`2024-11-06T20:15:05.817`) -- [CVE-2024-51755](CVE-2024/CVE-2024-517xx/CVE-2024-51755.json) (`2024-11-06T20:15:06.077`) -- [CVE-2024-51757](CVE-2024/CVE-2024-517xx/CVE-2024-51757.json) (`2024-11-06T20:15:06.337`) -- [CVE-2024-51988](CVE-2024/CVE-2024-519xx/CVE-2024-51988.json) (`2024-11-06T20:15:06.513`) +- [CVE-2024-10926](CVE-2024/CVE-2024-109xx/CVE-2024-10926.json) (`2024-11-06T21:15:04.927`) +- [CVE-2024-10941](CVE-2024/CVE-2024-109xx/CVE-2024-10941.json) (`2024-11-06T21:15:05.213`) +- [CVE-2024-50340](CVE-2024/CVE-2024-503xx/CVE-2024-50340.json) (`2024-11-06T21:15:05.527`) +- [CVE-2024-50341](CVE-2024/CVE-2024-503xx/CVE-2024-50341.json) (`2024-11-06T21:15:05.747`) +- [CVE-2024-50342](CVE-2024/CVE-2024-503xx/CVE-2024-50342.json) (`2024-11-06T21:15:05.963`) +- [CVE-2024-50343](CVE-2024/CVE-2024-503xx/CVE-2024-50343.json) (`2024-11-06T21:15:06.180`) +- [CVE-2024-50345](CVE-2024/CVE-2024-503xx/CVE-2024-50345.json) (`2024-11-06T21:15:06.383`) +- [CVE-2024-51736](CVE-2024/CVE-2024-517xx/CVE-2024-51736.json) (`2024-11-06T21:15:06.600`) ### CVEs modified in the last Commit -Recently modified CVEs: `65` +Recently modified CVEs: `50` -- [CVE-2024-48052](CVE-2024/CVE-2024-480xx/CVE-2024-48052.json) (`2024-11-06T20:35:29.830`) -- [CVE-2024-48061](CVE-2024/CVE-2024-480xx/CVE-2024-48061.json) (`2024-11-06T20:35:30.633`) -- [CVE-2024-48463](CVE-2024/CVE-2024-484xx/CVE-2024-48463.json) (`2024-11-06T19:35:17.717`) -- [CVE-2024-48809](CVE-2024/CVE-2024-488xx/CVE-2024-48809.json) (`2024-11-06T19:33:54.977`) -- [CVE-2024-49217](CVE-2024/CVE-2024-492xx/CVE-2024-49217.json) (`2024-11-06T20:53:26.900`) -- [CVE-2024-49219](CVE-2024/CVE-2024-492xx/CVE-2024-49219.json) (`2024-11-06T20:45:08.233`) -- [CVE-2024-49220](CVE-2024/CVE-2024-492xx/CVE-2024-49220.json) (`2024-11-06T20:41:13.367`) -- [CVE-2024-49221](CVE-2024/CVE-2024-492xx/CVE-2024-49221.json) (`2024-11-06T20:54:50.527`) -- [CVE-2024-49223](CVE-2024/CVE-2024-492xx/CVE-2024-49223.json) (`2024-11-06T20:55:37.613`) -- [CVE-2024-49229](CVE-2024/CVE-2024-492xx/CVE-2024-49229.json) (`2024-11-06T20:40:30.740`) -- [CVE-2024-49237](CVE-2024/CVE-2024-492xx/CVE-2024-49237.json) (`2024-11-06T20:33:52.403`) -- [CVE-2024-50637](CVE-2024/CVE-2024-506xx/CVE-2024-50637.json) (`2024-11-06T20:35:33.010`) -- [CVE-2024-51127](CVE-2024/CVE-2024-511xx/CVE-2024-51127.json) (`2024-11-06T19:25:14.607`) -- [CVE-2024-51132](CVE-2024/CVE-2024-511xx/CVE-2024-51132.json) (`2024-11-06T20:35:34.173`) -- [CVE-2024-51136](CVE-2024/CVE-2024-511xx/CVE-2024-51136.json) (`2024-11-06T19:31:15.230`) -- [CVE-2024-51240](CVE-2024/CVE-2024-512xx/CVE-2024-51240.json) (`2024-11-06T20:35:34.963`) -- [CVE-2024-51329](CVE-2024/CVE-2024-513xx/CVE-2024-51329.json) (`2024-11-06T19:19:24.793`) -- [CVE-2024-51362](CVE-2024/CVE-2024-513xx/CVE-2024-51362.json) (`2024-11-06T20:35:35.750`) -- [CVE-2024-51685](CVE-2024/CVE-2024-516xx/CVE-2024-51685.json) (`2024-11-06T19:34:31.590`) -- [CVE-2024-8775](CVE-2024/CVE-2024-87xx/CVE-2024-8775.json) (`2024-11-06T20:15:06.763`) -- [CVE-2024-9341](CVE-2024/CVE-2024-93xx/CVE-2024-9341.json) (`2024-11-06T20:15:06.917`) -- [CVE-2024-9675](CVE-2024/CVE-2024-96xx/CVE-2024-9675.json) (`2024-11-06T20:15:07.083`) -- [CVE-2024-9676](CVE-2024/CVE-2024-96xx/CVE-2024-9676.json) (`2024-11-06T20:15:07.410`) -- [CVE-2024-9689](CVE-2024/CVE-2024-96xx/CVE-2024-9689.json) (`2024-11-06T19:14:53.737`) -- [CVE-2024-9902](CVE-2024/CVE-2024-99xx/CVE-2024-9902.json) (`2024-11-06T20:15:07.820`) +- [CVE-2024-26779](CVE-2024/CVE-2024-267xx/CVE-2024-26779.json) (`2024-11-06T22:35:05.993`) +- [CVE-2024-28895](CVE-2024/CVE-2024-288xx/CVE-2024-28895.json) (`2024-11-06T21:35:05.843`) +- [CVE-2024-29948](CVE-2024/CVE-2024-299xx/CVE-2024-29948.json) (`2024-11-06T21:35:06.680`) +- [CVE-2024-30122](CVE-2024/CVE-2024-301xx/CVE-2024-30122.json) (`2024-11-06T22:33:46.797`) +- [CVE-2024-33338](CVE-2024/CVE-2024-333xx/CVE-2024-33338.json) (`2024-11-06T22:35:06.803`) +- [CVE-2024-35835](CVE-2024/CVE-2024-358xx/CVE-2024-35835.json) (`2024-11-06T21:35:07.630`) +- [CVE-2024-36881](CVE-2024/CVE-2024-368xx/CVE-2024-36881.json) (`2024-11-06T22:35:07.757`) +- [CVE-2024-47253](CVE-2024/CVE-2024-472xx/CVE-2024-47253.json) (`2024-11-06T22:23:29.663`) +- [CVE-2024-47254](CVE-2024/CVE-2024-472xx/CVE-2024-47254.json) (`2024-11-06T22:22:01.623`) +- [CVE-2024-47255](CVE-2024/CVE-2024-472xx/CVE-2024-47255.json) (`2024-11-06T22:23:05.770`) +- [CVE-2024-48050](CVE-2024/CVE-2024-480xx/CVE-2024-48050.json) (`2024-11-06T21:35:07.863`) +- [CVE-2024-49370](CVE-2024/CVE-2024-493xx/CVE-2024-49370.json) (`2024-11-06T22:31:30.160`) +- [CVE-2024-49675](CVE-2024/CVE-2024-496xx/CVE-2024-49675.json) (`2024-11-06T22:24:22.907`) +- [CVE-2024-51408](CVE-2024/CVE-2024-514xx/CVE-2024-51408.json) (`2024-11-06T22:06:43.100`) +- [CVE-2024-51626](CVE-2024/CVE-2024-516xx/CVE-2024-51626.json) (`2024-11-06T22:10:20.517`) +- [CVE-2024-51665](CVE-2024/CVE-2024-516xx/CVE-2024-51665.json) (`2024-11-06T22:07:10.707`) +- [CVE-2024-51672](CVE-2024/CVE-2024-516xx/CVE-2024-51672.json) (`2024-11-06T22:08:22.747`) +- [CVE-2024-51677](CVE-2024/CVE-2024-516xx/CVE-2024-51677.json) (`2024-11-06T22:10:31.677`) +- [CVE-2024-51678](CVE-2024/CVE-2024-516xx/CVE-2024-51678.json) (`2024-11-06T22:10:45.103`) +- [CVE-2024-51680](CVE-2024/CVE-2024-516xx/CVE-2024-51680.json) (`2024-11-06T22:10:59.270`) +- [CVE-2024-51681](CVE-2024/CVE-2024-516xx/CVE-2024-51681.json) (`2024-11-06T22:11:16.003`) +- [CVE-2024-51682](CVE-2024/CVE-2024-516xx/CVE-2024-51682.json) (`2024-11-06T22:12:02.353`) +- [CVE-2024-51683](CVE-2024/CVE-2024-516xx/CVE-2024-51683.json) (`2024-11-06T22:12:19.803`) +- [CVE-2024-51757](CVE-2024/CVE-2024-517xx/CVE-2024-51757.json) (`2024-11-06T21:15:06.807`) +- [CVE-2024-5642](CVE-2024/CVE-2024-56xx/CVE-2024-5642.json) (`2024-11-06T21:35:08.690`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 3abcd113924..8d427ca80e8 100644 --- a/_state.csv +++ b/_state.csv @@ -159311,7 +159311,7 @@ CVE-2020-36760,0,0,d3d6bde66e39bfdfd4a841324d82e511491b3d42fe004f124c54ac6ba8cb5 CVE-2020-36761,0,0,c2eb02c7f5e6234f0a11001f3ccc54043ed97dd502248791c8d262b51058890e,2023-11-07T03:22:33.597000 CVE-2020-36762,0,0,f6173b7fd6f97d18fb02891c23a7c6178aa06e9b134b77ef08cd35cdcdc36681,2024-05-17T01:48:57.747000 CVE-2020-36763,0,0,e42a9e5e88fb81af0859cd97e3a2fb6d19d996764baf3706e8d6074686ad2768,2023-08-04T14:01:30.770000 -CVE-2020-36765,0,1,8f5e53cdfa6de8b7bd007fab9b4b3fa9f738261de98aabc48e6fd805e67dd712,2024-11-06T20:35:02.123000 +CVE-2020-36765,0,0,8f5e53cdfa6de8b7bd007fab9b4b3fa9f738261de98aabc48e6fd805e67dd712,2024-11-06T20:35:02.123000 CVE-2020-36766,0,0,114009cd5e840397d1acebf053cb444eb4c7cbfbe18f570ae9870647d1e8facf,2023-09-19T21:23:38.407000 CVE-2020-36767,0,0,05a3a61dc2792f45359316526a3d616e7f19a025ecb636a8fbad638d49ca9941,2024-09-09T20:35:00.707000 CVE-2020-36768,0,0,ecc80caa61f3e820e6276ca18cc7a867921e71d907d5691cbc8a6de956bf71d9,2024-05-17T01:48:57.980000 @@ -186998,7 +186998,7 @@ CVE-2021-47071,0,0,b0504ff2034ae0c4cc16202b4cc6e9136ea7ef90af22d96415d8d13f21662 CVE-2021-47072,0,0,cf41cbf231f55b926ec73e3d5eeef7180bfd709e7f8ced7efd6dbec1d429bdcf,2024-03-01T22:22:25.913000 CVE-2021-47073,0,0,55717623a5e4775e6cdba866cbade7342e2c623e9f3852474ccdaf2b36202333,2024-03-01T22:22:25.913000 CVE-2021-47074,0,0,c944055c12bdbb473a00f06ba663e9aa59fbf07805a8b36dc68ca8eaece782c8,2024-03-01T22:22:25.913000 -CVE-2021-47075,0,0,fbef03aac6a8106fd4f4c672eae599661287850b31546fdede7523cd1d19f393,2024-03-01T22:22:25.913000 +CVE-2021-47075,0,1,27e8af01fd213c49f50653349ef0cf1ed22ebbd4ae6322143077ee7949c385c4,2024-11-06T22:35:00.660000 CVE-2021-47076,0,0,7c8622ce3d2f5da5194ef5fbe7d3dddeb59a9016a2e1d320c327f4bb4eeac7a7,2024-03-01T22:22:25.913000 CVE-2021-47077,0,0,094226e13a4d30639d25f36be3dfea47179d6a1794694d0d910952f9e632810a,2024-03-01T22:22:25.913000 CVE-2021-47078,0,0,e39a645f82e6ef83a23da18377ebefe42c441100a5fd642553de38a4fecea2c2,2024-11-01T08:35:01.573000 @@ -187154,7 +187154,7 @@ CVE-2021-47227,0,0,d58b6e5d0039e2c73e223660c4806a8199d919f5d02b15eb3b8ec0875620e CVE-2021-47228,0,0,9c1b787ae52c72cbfb8866da7935ec75c9a82081ae53aec3f3f0cce23cf65a07,2024-10-31T15:35:03.093000 CVE-2021-47229,0,0,fbd2921f2b86842d2838e402054523e81b9ec6072574e295a789287be69873f9,2024-05-21T16:54:26.047000 CVE-2021-47230,0,0,e93bfe980140e197128aeec8d8e071a295e8048bcae174dc11c0f6f8b98f2b67,2024-07-03T01:37:24.797000 -CVE-2021-47231,0,1,1256bef4bbc75f826a04367ba6cc6ef92a8f6c223b664e3719ccc68eabc6d142,2024-11-06T20:35:02.850000 +CVE-2021-47231,0,0,1256bef4bbc75f826a04367ba6cc6ef92a8f6c223b664e3719ccc68eabc6d142,2024-11-06T20:35:02.850000 CVE-2021-47232,0,0,815758cd4f06e69d867d33b6931ac610aa8caffc0e8fb7075a2a9e75b5c2f775,2024-07-03T01:37:25.720000 CVE-2021-47233,0,0,835070949da84097217f4d4e5033c3ff72191f49028f7bd22052b56b38fe9b03,2024-05-21T16:54:26.047000 CVE-2021-47234,0,0,5e090bb9140802a519feef1c4149d848ac7b86688c14a5e0d7f61b967b2d5c5b,2024-05-21T16:54:26.047000 @@ -187220,7 +187220,7 @@ CVE-2021-47293,0,0,d4175717fac52bdecf0a051eab952d1932ea701c0d180eda92454abd07515 CVE-2021-47294,0,0,eed110f6ebe2f4f1f995b47d7666e7889aeb7fa2d87e2f53966418b3abc9e4bb,2024-05-21T16:54:26.047000 CVE-2021-47295,0,0,013087c79c3f331d9bb419ea80648c1fa718978367791e83c9506e16cd9f49b1,2024-07-03T01:37:35.127000 CVE-2021-47296,0,0,553ad20d7a60522641b80e942c788444f417324fcfe1677518267567a26cc7f8,2024-05-21T16:54:26.047000 -CVE-2021-47297,0,1,333805ed4e79f0bc3b67d88c0e6192920afb3fddf5417e17801e321533d44e06,2024-11-06T20:35:03.380000 +CVE-2021-47297,0,0,333805ed4e79f0bc3b67d88c0e6192920afb3fddf5417e17801e321533d44e06,2024-11-06T20:35:03.380000 CVE-2021-47298,0,0,2a6bc6b6da25d2e397b3047358e3f94e3be86c5fbb66b5f57b8901cb87aa771f,2024-05-21T16:54:26.047000 CVE-2021-47299,0,0,fba4b9b1cb0e64292a95658fd15d778e7dd5706d84eedb82deb4717ed9433da9,2024-05-21T16:54:26.047000 CVE-2021-47300,0,0,99d2f09c980dd38f30812bc5dbc2efbb17c499e36ca13769411dcadecf2f2dee,2024-05-21T16:54:26.047000 @@ -187307,7 +187307,7 @@ CVE-2021-47380,0,0,6ef9d8f19e2d391d612177085eea92176c97933b61d761b5b210101aade90 CVE-2021-47381,0,0,7b85e763b1e6aa964beacb6a095e7a796de91e62f6b651bf54755e15c83c4be4,2024-05-21T16:54:26.047000 CVE-2021-47382,0,0,9902b5f0babaa9562f55cdcd44eda32880d1e10eda3b2384591d56d854c8420d,2024-05-21T16:54:26.047000 CVE-2021-47383,0,0,ff2552053b4f1b5e9d4e30daff68cd5b1b4bfd57e3ba2b4b2bab0caff135d3fa,2024-05-21T16:54:26.047000 -CVE-2021-47384,0,1,2a53cff041f6cd283c6aba6c3e33acbe7cdf32bb789c5688d14d6402d59d7023,2024-11-06T19:35:00.697000 +CVE-2021-47384,0,0,2a53cff041f6cd283c6aba6c3e33acbe7cdf32bb789c5688d14d6402d59d7023,2024-11-06T19:35:00.697000 CVE-2021-47385,0,0,6010a520bcd7b1504800904e8165de2217ee2ba960dce5e53887b1aaa9581f95,2024-05-21T16:54:26.047000 CVE-2021-47386,0,0,e158effddd011922f6bb1e239f3ac2ff0958ef62d3ee287d6927aa1acec73135,2024-05-21T16:54:26.047000 CVE-2021-47387,0,0,8b75eab51a871e46e57add98c9e15658762b300490120d757b7bbb028d38406c,2024-05-21T16:54:26.047000 @@ -187400,7 +187400,7 @@ CVE-2021-47473,0,0,62c8562680eb4c53639001cda404b00fb742f1279f4684ea0674924bae10b CVE-2021-47474,0,0,04fd221fb63a425b0cc8651869ddb014996f7867a1d0ff2cdc001afbfca8f702,2024-05-22T12:46:53.887000 CVE-2021-47475,0,0,946afe63fc7669980621eb147080dce8165a487bfe4fc5efdf98c317407e6aed,2024-05-22T12:46:53.887000 CVE-2021-47476,0,0,fa51be5b9d9f0fc66eedc2509899a798c0e108eebb09ae670114483c19895964,2024-11-01T15:35:04.050000 -CVE-2021-47477,0,1,47f976030f46c20da49f298e5d3296ed2f0af2b5274eb733500f61bef980ebd3,2024-11-06T20:35:03.627000 +CVE-2021-47477,0,0,47f976030f46c20da49f298e5d3296ed2f0af2b5274eb733500f61bef980ebd3,2024-11-06T20:35:03.627000 CVE-2021-47478,0,0,0c4d619a017b34a9e71fca60c9c78d1369044c99a73f7a9704ccc8d6d4213331,2024-05-22T12:46:53.887000 CVE-2021-47479,0,0,23846c9680437faaee8b60d655484b75ffbf3f6cfbaddf65bfa876ba4daa07c5,2024-05-22T12:46:53.887000 CVE-2021-47480,0,0,6fe0bcb80501304551f827c43dc962bcec63fb14686881c0934d1e7cba05e2dc,2024-05-22T12:46:53.887000 @@ -187509,7 +187509,7 @@ CVE-2021-47582,0,0,a303bc490ed932a1afc5bb4b5129633bc3034bcabff4864f9a509289f08af CVE-2021-47583,0,0,31fa0416a87d3ac15f0275ea6141b29b416ea02761d8c7a0b7bebf09c972c897,2024-06-20T12:43:25.663000 CVE-2021-47584,0,0,5e297524c53687d7062f536fc4ebf0eec9dd59e0e1b8ce2a1565481a5d020832,2024-08-19T18:35:20.133000 CVE-2021-47585,0,0,ce01987df681397de7d54893e5efcb2392f1d920c4c52cb4fe8e15c2b35f81ff,2024-08-19T18:29:03.543000 -CVE-2021-47586,0,1,9999b29ebc4be5f8da91519ea116e955bba1883cec7a48554f483b4ba00be485,2024-11-06T20:35:03.827000 +CVE-2021-47586,0,0,9999b29ebc4be5f8da91519ea116e955bba1883cec7a48554f483b4ba00be485,2024-11-06T20:35:03.827000 CVE-2021-47587,0,0,87a6481c75c4ef2a3e6251612b5954051141159c9762a4879438fd1aa646fa0c,2024-11-01T15:10:35.867000 CVE-2021-47588,0,0,0f7c2ddebf5230cc4da6aa5555c1f5261002923073136fff5e4910d65af55ae8,2024-06-20T12:43:25.663000 CVE-2021-47589,0,0,90b76d41b40e586a29ff9e2db3957fc07fd2120cba5363d84fdec4e79fc74d37,2024-08-27T03:16:19 @@ -216927,7 +216927,7 @@ CVE-2023-22586,0,0,c0f6f379862442d3ccd46f1d01f35b2a6cd6c71022a896121eb7f131c67a1 CVE-2023-2259,0,0,9259ad9ceae0c8c1f4c656af51f2c18472350b622766660808a6aa2eb69bd018,2023-05-03T20:01:59.110000 CVE-2023-22591,0,0,75da081719215e85b169466ab96fafbcbf7d54cd5859377961ad331a00e45425,2023-11-07T04:07:04.387000 CVE-2023-22592,0,0,82b28f4ba2eac1f90837e550befeb0c1e0dcb9f94216a05d29c70063cff743b9,2023-11-07T04:07:04.477000 -CVE-2023-22593,0,1,857bc2f70352828bb2de5e8a29e130b4a49b0e8b05230cc04409046b66a53189,2024-11-06T19:35:01.273000 +CVE-2023-22593,0,0,857bc2f70352828bb2de5e8a29e130b4a49b0e8b05230cc04409046b66a53189,2024-11-06T19:35:01.273000 CVE-2023-22594,0,0,e7b22226fc5536c38dc1bfa9b8608c26d55fce01972e039872a3a3f6d24cb664,2023-11-07T04:07:04.730000 CVE-2023-22595,0,0,87c19ed494799c85280ecc5603d2d131eb58c4866c8bd25864baeef2d8d8a9b8,2023-08-04T17:25:00.243000 CVE-2023-22597,0,0,c5b8c532ce487ca0c3338f3c64fe075c749ce4ed59b601364427efe8a3f912d0,2023-11-07T04:07:04.990000 @@ -223003,7 +223003,7 @@ CVE-2023-30307,0,0,9a4646bb9568f252fc01074e511568fce5daa83ca6ffc95bb5a8dd9c13ef0 CVE-2023-30308,0,0,3194094e704a260b61b3aca71ad9525f4004c473c591db53bbad11ae33f61923,2024-05-29T13:02:09.280000 CVE-2023-30309,0,0,7bed2cc00d974c0f21981e002db05aa1d9c9bb6eea8a85e53b56492f139e3535,2024-05-29T13:02:09.280000 CVE-2023-3031,0,0,10c1f10cf1613bd0a1bbf7200771584bf6866fde631eac26533eb7c4ae501aea,2023-06-12T16:48:57.833000 -CVE-2023-30310,0,1,b64f22995dd6d4cf998abebda15f2f520a185af33c13f85f861bcf5fd0b99ea3,2024-11-06T20:35:04.160000 +CVE-2023-30310,0,0,b64f22995dd6d4cf998abebda15f2f520a185af33c13f85f861bcf5fd0b99ea3,2024-11-06T20:35:04.160000 CVE-2023-30311,0,0,38ed413270d757fa6e6b0203aef5d67e96c045e85b6d145080f9751d7548d7fb,2024-08-20T19:35:00.850000 CVE-2023-30312,0,0,9bb840b5e08cc8b26537ea87c8910725e38e1ad08fef8fe39b89eeab371027a8,2024-06-19T04:15:10.477000 CVE-2023-30313,0,0,2cb0a9aa3f78a13a6e0375a643da2654e262a035ecaa4ef4f0a18ff3448b0de1,2024-11-05T21:35:00.983000 @@ -230498,7 +230498,7 @@ CVE-2023-4011,0,0,ff845b3bec6fa1ec7ec6e3f06d521b3f25d1051621eed84e2a9da8c89b74f8 CVE-2023-40110,0,0,cec4af71facc1cc987deceb5b2ce57911065506adb95057b276212cf5b36338b,2024-08-22T14:35:01.077000 CVE-2023-40111,0,0,7ef7fdb4bf5f59a65adc27a98870222810b4869fe47d231ee6164556414c6387,2024-08-26T18:35:02.257000 CVE-2023-40112,0,0,3e814fd548a907e629b136506543b20b0c8bf4457d1103cb293d5b1296af5322,2024-10-31T14:35:03.023000 -CVE-2023-40113,0,0,dad3819774db3e875db7c132fed9de97c7d6741efc9f62a28c01187a90cb75bc,2024-02-16T13:37:55.033000 +CVE-2023-40113,0,1,3853dba4c9b94994cc638ea53bf05fb88a4a7ea3a12c121e5a59c2e1bb350fae,2024-11-06T21:35:01.543000 CVE-2023-40114,0,0,e6aec33bc1c8bc322f8db56fa5435f1230eb43cb85d03f30ffc4d82fb9d7da4e,2024-08-15T18:35:04 CVE-2023-40115,0,0,6ad67ef2c7829749737245dfadc3fcfd57b4fbfd7581d4abd8672c61e42143e0,2024-08-01T13:44:27.970000 CVE-2023-40116,0,0,fd7eabcb426fa5f4a29a166c8edb69a1f9a74a2f45f7b71a79b11321ea6b7183,2023-10-30T17:12:54.827000 @@ -230783,7 +230783,7 @@ CVE-2023-40435,0,0,e7be1f239c3863a0eba73a76429a8b96807d5e85645d6b427822282e8a79d CVE-2023-40436,0,0,9151fd8967ecc0125396416ce982a67888cf21bc1634d6a6aeba9d57e0d2aeb5,2024-09-25T01:35:59.353000 CVE-2023-40437,0,0,6941cb0456cc33ca3d33bbc99082f1df62f86f849fa6869631ecd6102a6298f7,2024-01-17T19:06:18.080000 CVE-2023-40438,0,0,08d009f7555bd3b6180dbaf950da9c59b188e58a9caa39b2a01d3c280b373e23,2024-01-16T23:51:13.887000 -CVE-2023-40439,0,1,b59cf437acb175533643b5177fc84a9280077b61c863a7e6b1de22da28602d1e,2024-11-06T20:35:05.490000 +CVE-2023-40439,0,0,b59cf437acb175533643b5177fc84a9280077b61c863a7e6b1de22da28602d1e,2024-11-06T20:35:05.490000 CVE-2023-40440,0,0,29069b9d0f2624195a3a6c5e937d855493bae53f7b8c7e0b2b74aba07a7e4e39,2024-01-30T21:15:08.517000 CVE-2023-40441,0,0,865a7fe67a1e12c20a0e54c9b60b5fddd74e863be31e8f7e01a43397e40c2016,2023-10-12T02:26:57.743000 CVE-2023-40442,0,0,371a54a2886702bdd120ac95d0338c00531e4b44258cb23feb2e8e3ccda1d1c1,2023-12-22T16:10:36.647000 @@ -232591,7 +232591,7 @@ CVE-2023-4283,0,0,40c39331048450495c644559b354ee713768185b93e1269a4c183c39135e4c CVE-2023-42830,0,0,9622822082e6d489decb51a66ff30e0a25a850d4f889ef38731f27c29845d8f1,2024-01-17T20:56:33.957000 CVE-2023-42831,0,0,15c2657a6cda93c32bf9e6d0e8961db6424b2c5d0a3a331db0a572f126ae013e,2024-01-17T20:51:35.577000 CVE-2023-42832,0,0,d4139f8d7ebcb6dbe3f816f6f2093afb5b55323ca863cc15652de2caab2f0de4,2024-01-17T21:16:29.277000 -CVE-2023-42833,0,1,e734eedae2bb752eeb00548b60901154a053eb23181a33e00797702140032cb8,2024-11-06T20:35:06.280000 +CVE-2023-42833,0,0,e734eedae2bb752eeb00548b60901154a053eb23181a33e00797702140032cb8,2024-11-06T20:35:06.280000 CVE-2023-42834,0,0,08d87def638a26a5eb9093b6708a8eacf657bb89462798c60d907ee1b3410e44,2024-11-06T15:35:05.580000 CVE-2023-42835,0,0,78785fec11e2de3eca12998532cc4e293a664be2c1386edf69f250c848f4be97,2024-02-22T19:07:27.197000 CVE-2023-42836,0,0,57dd9f5214333cc32869174710fab8ff9c58d3ed310e22708cf2b23e79addefb,2024-02-22T19:07:27.197000 @@ -234666,7 +234666,7 @@ CVE-2023-46045,0,0,0e8abce2cbeee2bf608426602c7398443e9d61c9d45f545bf4f725e813250 CVE-2023-46046,0,0,555b8b8a7696393805aad9f9e82bc3d251f1a10afcfafafc77a77e46b5bc656d,2024-11-05T16:35:04.913000 CVE-2023-46047,0,0,c24e10e557ef6edbf0ab7d162e7557ecb1baed06f8bacef6ed95114dbb222d99,2024-08-22T18:35:01.467000 CVE-2023-46048,0,0,fdc0cbd47578c151a3373264bac42e14fbe5938d1d4d2542c8c29ee6e1717908,2024-08-19T19:35:04.860000 -CVE-2023-46049,0,0,2315016d1ba4bba7f533371cd70ec259060eaeb7a90fd1662a78c0e2eff24ad7,2024-08-02T21:15:49.197000 +CVE-2023-46049,0,1,8e6f7b6c7a7eac9ea78c6ce3bd00ffa3c645397b30e7e0d1d00f973f47c0bc45,2024-11-06T22:35:01.887000 CVE-2023-4605,0,0,4ca1198891ef7f19a4427afe916541ae6cc98eedaf95349b4181266b8438d380,2024-04-08T18:49:25.863000 CVE-2023-46050,0,0,87b655fafc2924f1174e71a2efa862ed9e13b897c527143d58a0e534f2058a50,2024-01-29T09:15:42.640000 CVE-2023-46051,0,0,2eb4bb56bef8fa961b472990c5ab8fe369fd9c4072f6f002726f3dd2b9de96c0,2024-08-02T21:15:49.273000 @@ -237221,7 +237221,7 @@ CVE-2023-49508,0,0,04e9a38738b4cc108d703febb2c252d26aa82baa13d5ac7cd4f3585b5914b CVE-2023-4951,0,0,a18642f9510452464e8d9524da7c3caa32fc5ff59f81d45c2b207c937616ee68,2023-09-22T15:15:14.253000 CVE-2023-49515,0,0,fba6ae4b9dbda87bf77d58079d1e7fdc5597e983326dac218dacc086c68e81b6,2024-07-03T01:42:36.150000 CVE-2023-49528,0,0,bcff757c4ee07f22736afa13a889e6d02ee86ae241b71b1c98b3c18a1dcdacf5,2024-07-03T01:42:36.973000 -CVE-2023-49539,0,1,e1d330f05b14a326f19ff77ceaae494168e128af031cec81933a24aa6c4e263b,2024-11-06T20:35:07.133000 +CVE-2023-49539,0,0,e1d330f05b14a326f19ff77ceaae494168e128af031cec81933a24aa6c4e263b,2024-11-06T20:35:07.133000 CVE-2023-49540,0,0,fc00996658e2e1a07b2142617d49b74a28a84c9993046a375e13324fccec29b2,2024-08-06T16:35:02.663000 CVE-2023-49543,0,0,5e9a28d34c8c9dccbca41948423cad2a9c85e5bdcb29ea577934b5fccba83d1b,2024-08-28T20:35:04.473000 CVE-2023-49544,0,0,4165df005ca812878112fcb221906d65322102731e6bd43d48afbe4e5ae39573,2024-08-01T13:45:11.667000 @@ -239131,7 +239131,7 @@ CVE-2023-5243,0,0,e49838102a5721a273506f040a2a95bdeca1c43c3e414141d5a1a29f3ab700 CVE-2023-52430,0,0,9b119fede2bb0d45c16cf06aac5c3bb465a163e763f0ae820658b0f4e7b632b3,2024-10-16T13:11:53.423000 CVE-2023-52431,0,0,c64a02a0cf6c92acef7a3c67de07bba1d63a180e819e78f76030c959fd7430a0,2024-10-21T20:19:07.513000 CVE-2023-52432,0,0,33470768b31e3ca42f4e91386984f89611d22bbf917c9270afe6f040d18c0aa7,2024-03-05T13:41:01.900000 -CVE-2023-52433,0,0,5c95197bc729cebc3540e26fddb8edd3d3fb52d95160d4c0a67697d37cf469ee,2024-06-16T13:15:50.413000 +CVE-2023-52433,0,1,8d887de26d6dfe68d81d2421f14cfca93fcdcdb99a18edd116f8f8ba1a152a5e,2024-11-06T22:35:02.950000 CVE-2023-52434,0,0,5f6421438d786a20a52ed0cde51449021705adf52d40bb4e366d1e2bfbcf89c9,2024-11-04T13:16:26.490000 CVE-2023-52435,0,0,ae7b4fd4a171fec756dcf7f16bf33027a1ed1befebaf9b2d2ac0547ee44f8075,2024-09-04T12:15:03.967000 CVE-2023-52436,0,0,5082d9a933f70907f213f656684b4963f01c1f95bdc79d48ebfb69bdc95b2335,2024-11-04T13:16:27.173000 @@ -239195,7 +239195,7 @@ CVE-2023-52489,0,0,8691663f32e0b87d6090652a9eefea760ece79f0cb2b6e57db1f7a8a5adc6 CVE-2023-5249,0,0,902c33c9dbd28cbe5075a17fccde01699ae9f0ae88d9ebb42328197dcacfdffa,2024-07-03T01:44:12.613000 CVE-2023-52490,0,0,5497ebcc533be995a69bc10424afce569aa011a4c97808cf492ed3f54baa7ba5,2024-03-12T12:40:13.500000 CVE-2023-52491,0,0,a9def7af26959496f75588e8fbb8ad6e1b25e764e66a488bb14f62e906c4089f,2024-11-04T13:16:34.917000 -CVE-2023-52492,0,1,6cb2ff207cf9aafb6090c129739c6d74d7c082df5985572149d2b1df87d0d5d4,2024-11-06T19:35:03.290000 +CVE-2023-52492,0,0,6cb2ff207cf9aafb6090c129739c6d74d7c082df5985572149d2b1df87d0d5d4,2024-11-06T19:35:03.290000 CVE-2023-52493,0,0,0056ac7b9a11ed734aa93836878423f074f7718f5ce8771fef288d1615f0aa89,2024-11-04T13:16:35.103000 CVE-2023-52494,0,0,ebe1d617d77329a0d9d56d0d6535311cfe7daa23b2498c41c7e912bcfaf261f7,2024-03-12T12:40:13.500000 CVE-2023-52495,0,0,c36feeccb5858e992af880f22a6164098203cb8ff165c7874d7ea3bb185fac52,2024-03-12T12:40:13.500000 @@ -239216,7 +239216,7 @@ CVE-2023-52508,0,0,3df95157cefd88c2c70c60dc2487d4ca580bfd7d3fdbe934143d84c8e721d CVE-2023-52509,0,0,bcfcbf5df8dadb5c77febe775be16b48e4efcb0ae7858106717d3661c9712efd,2024-03-04T13:58:23.447000 CVE-2023-5251,0,0,de8655b38a30642065bb297eb9a35bac6ebd60f43a29d54f33ad99175564509f,2023-11-08T02:15:53.437000 CVE-2023-52510,0,0,b0381f94ad157bbb54ab8605627db382c3f938399b2f02a5029ba8865071a1c0,2024-03-04T13:58:23.447000 -CVE-2023-52511,0,1,01296eb26594b1e185bb600b7dc924facb05b3ec05d3adb36dc6800174e05e0a,2024-11-06T19:35:04.233000 +CVE-2023-52511,0,0,01296eb26594b1e185bb600b7dc924facb05b3ec05d3adb36dc6800174e05e0a,2024-11-06T19:35:04.233000 CVE-2023-52512,0,0,7596373f786b6636f89cf16d29f325de01a9f27b0c6ad0696e922063bc5589ad,2024-11-06T16:35:07.700000 CVE-2023-52513,0,0,68cace4cbac4420bddff285689d43b129b233d8af8a4ea35d26ac73dcbdfbb33,2024-03-04T13:58:23.447000 CVE-2023-52514,0,0,96b3bc37b65a7f0f11caed4828897554155b5e08fde97001434005eb59164e32,2024-03-11T16:15:07.720000 @@ -239228,7 +239228,7 @@ CVE-2023-52519,0,0,f79ce1035763550ef6afb964f7e85392eec938c2001b022078a43182525a6 CVE-2023-5252,0,0,10f9996951457224cec75839d378c1d5a53db0da5cae33c9f9a6fc2136cd44f0,2023-11-08T02:12:53.770000 CVE-2023-52520,0,0,dfb6be84ae9c08b205a8ea51f3a7f126c8fb64615069ff5cb9d3b51cb43ee2ef,2024-03-04T13:58:23.447000 CVE-2023-52521,0,0,26ba094f0a43e00b237fc666ea879d557b221b56ad6aeee17c07d7717bd0e4ca,2024-03-05T23:15:07.310000 -CVE-2023-52522,0,1,b1ecf17729bb9b74f5dbf3546ec9de2d3c642cfd4f217702cac9956b0311d2f8,2024-11-06T20:35:08.150000 +CVE-2023-52522,0,0,b1ecf17729bb9b74f5dbf3546ec9de2d3c642cfd4f217702cac9956b0311d2f8,2024-11-06T20:35:08.150000 CVE-2023-52523,0,0,2b8f78f901e030e63d8c8eb5395447753b7ff2211824258bf99a381a11aba125,2024-03-04T13:58:23.447000 CVE-2023-52524,0,0,2bb0786e3a461d7ca7f8c1c896ee359596adb6bf330c48f435cd78777cce4c48,2024-03-04T13:58:23.447000 CVE-2023-52525,0,0,da29f7fd4e888e13fc450d9b347a550d2ef7908097fa7df01f2173b5c063b678,2024-04-04T14:15:09.130000 @@ -239333,10 +239333,10 @@ CVE-2023-52614,0,0,d94968612236477bba7745eee64229fa912817c484efb1fca20359c970e9a CVE-2023-52615,0,0,749d512f79fef77d3fdca4cad7a7699f201211b1e7d2e923a5efa04789e1232b,2024-11-04T13:16:41.400000 CVE-2023-52616,0,0,dbf5b5c019f95e9f7e084e0052b1042c7b0204698debded51abfbb51fcf5bc41,2024-11-04T13:16:41.497000 CVE-2023-52617,0,0,4fdfa9fe396d100d9c46a2a78e479a182caae5cbb210cbb8a5ff9c9c9bce0255,2024-11-04T13:16:41.580000 -CVE-2023-52618,0,0,28dfc591ae56b48f3e0ad097b4f43795724cf80136fbe5fa2e6d19df668b08d0,2024-11-04T13:16:41.660000 +CVE-2023-52618,0,1,e99ffc5626a291ed7c9ac4eb79c56c6a064fd62237f676b60250fcf88da7dacc,2024-11-06T22:35:03.783000 CVE-2023-52619,0,0,20a7bb0cb2eaa7fa51742374ca05d5bd7fdb36e86539d53100b75675b035a409,2024-11-04T13:16:41.737000 CVE-2023-5262,0,0,dbc9cec6bb50e0a68a3b5ede7b08b3e3d8766566fd5a2a3e7793ec9100e6864d,2024-05-17T02:32:56.017000 -CVE-2023-52620,0,1,7c3227f3d7abaa4e58b0c4ba62caf899d71083a6f645f11271d63eb138082c52,2024-11-06T20:35:08.343000 +CVE-2023-52620,0,0,7c3227f3d7abaa4e58b0c4ba62caf899d71083a6f645f11271d63eb138082c52,2024-11-06T20:35:08.343000 CVE-2023-52621,0,0,26a33f9b008c64c6664e3e3a4869fe4d4572933cf6941e2f62ad48b2a923903f,2024-03-27T12:29:41.530000 CVE-2023-52622,0,0,1a4aa348f9b525ca69fe5a199e23d2ce602b346fde4c103318a5ea96e124b7a6,2024-11-04T13:16:41.973000 CVE-2023-52623,0,0,74f6264a0d4f8f612430a8ffd97335038e0648002eaa7642f7664a57b746597f,2024-11-04T17:35:08.873000 @@ -239406,7 +239406,7 @@ CVE-2023-52680,0,0,e82e4387cefcb72f3626231c08d733fbbeee0a4339500eacb2170dc4151a1 CVE-2023-52681,0,0,524cd4977fea10c4065e85c75e427a13dce6ed3e1a3cad8c759b5ff8706d5faa,2024-05-17T18:35:35.070000 CVE-2023-52682,0,0,cc6799c17a2f081b667ffca3e6c764a8a9c44e0c1986a4909c37d26d7d17217e,2024-05-17T18:35:35.070000 CVE-2023-52683,0,0,10cf5db773a627f10f62e2b747504a42a9b761360a3c2b0570d6054a6128bc20,2024-11-04T13:16:46.517000 -CVE-2023-52684,0,0,33c7802e83b0cacce3f4943922f9d7f250c042b0471e9f2d74c9792f85da2e19,2024-05-17T18:35:35.070000 +CVE-2023-52684,0,1,51ae7d2a43eba5f5afdf160a7f780d7d593d4e2d03669e20e4d6cce8d2b31000,2024-11-06T21:35:01.813000 CVE-2023-52685,0,0,cf8140ec5f2b974bcd3641a1209ca634d3cb951fbfbcbdcc6560b6110e8da549,2024-06-18T14:15:10.603000 CVE-2023-52686,0,0,e035efa57ae3873f49aa0c8ed309f1cfd09bba774f28aff6bfa9af8bf3cd5628,2024-11-04T13:16:46.670000 CVE-2023-52687,0,0,b28f8c5460527301f61b9b984f4d389c8ddced6a4a6f85a3bf5048ab19f25e70,2024-11-06T17:35:25.900000 @@ -239463,7 +239463,7 @@ CVE-2023-52734,0,0,2f76584608f90880dda5ed1cfe003cf8af38c50f85a7ba05f54382ff1ea93 CVE-2023-52735,0,0,179c3f86616fee02c6472500bdd41878f007d990a3ea0e8bcc41b49975c24734,2024-07-03T01:43:52.910000 CVE-2023-52736,0,0,df1befba83ff05c2a0d33711ab630a647dd341841417f5be872b0b202fdf8e4c,2024-05-21T16:53:56.550000 CVE-2023-52737,0,0,38cbe5e55641ebdafc5db964d325c9c266a1e7ec0b6e0d92c3a71b5417001004,2024-05-21T16:53:56.550000 -CVE-2023-52738,0,0,c876063cd09e734f72ff43929eb012970dc4e31f27bd74cc3669d02c7f455d51,2024-05-21T16:53:56.550000 +CVE-2023-52738,0,1,dc676761402004e11f6262bd178a76b0a97c37b209a47d729e14948a72f3b55f,2024-11-06T21:35:02.090000 CVE-2023-52739,0,0,0604a018a0e873dfcb2efbd5385f2a976fd9bccf7eaeca2825615c866a803dd1,2024-05-21T16:53:56.550000 CVE-2023-5274,0,0,864010d058c6ccc43d7cfa5280cf12d11d903e5a06c224a3c38c51a571ff7581,2023-12-05T18:20:39.937000 CVE-2023-52740,0,0,da86f48edd07a1ed6b3338b97bd3ad3fac2b70de7e362c30acbab6ea25eebd29,2024-05-21T16:53:56.550000 @@ -239532,7 +239532,7 @@ CVE-2023-52797,0,0,b73a8fa6a4e76687f73e7ef3277e8c68588fa5517245ff16423bb4845b549 CVE-2023-52798,0,0,903a4612f669db82041c075124d4474cdd9cf4659c36c3c48aa9ccdd02833098,2024-05-21T16:53:56.550000 CVE-2023-52799,0,0,6fa89f7497ff6b75f31beef8e947309d06c41f701952588e6bb06313dc1fdef6,2024-05-21T16:53:56.550000 CVE-2023-5280,0,0,cf02e072cc72e580d64df88a732c123a0390498118112c202e656970398e1bca,2024-06-04T19:18:10.060000 -CVE-2023-52800,0,1,14779273a0271f6f818fa65737c64c9364846719a230d118051fdc46a7303574,2024-11-06T19:35:04.477000 +CVE-2023-52800,0,0,14779273a0271f6f818fa65737c64c9364846719a230d118051fdc46a7303574,2024-11-06T19:35:04.477000 CVE-2023-52801,0,0,b95bb5d93b24e9cbb6c35e0192140cfc3d31cdb66f52213d203f1a292ea4cc97,2024-07-03T01:43:59.217000 CVE-2023-52802,0,0,38a995833f5576e7c1a5ec4da3354344605bb944329f5f6f5f2b3f5909e6538e,2024-06-08T12:15:09.783000 CVE-2023-52803,0,0,694b6e6d733c1665ec8c85b7467bf8e595bd273683c4250c62b7d8067abc7346,2024-07-18T12:15:02.423000 @@ -239609,7 +239609,7 @@ CVE-2023-52867,0,0,e3b1128fcef491f8e641a0d12897f04317e86b4b1298f61d59bdc866043f9 CVE-2023-52868,0,0,75bd5ccd052bd251c0e42c6807740befac18d5aabec3715f40791b5a99e23ad5,2024-05-21T16:53:56.550000 CVE-2023-52869,0,0,d37040a4a2cb7087cc996199bd2cd80e9806440599974a39ed1796463348598f,2024-07-03T01:44:08.950000 CVE-2023-5287,0,0,ce1ed467182937769fcb531729fdb4e9725d88b02f3d1fc370ffab1fa8fb95bd,2024-08-02T08:15:35.190000 -CVE-2023-52870,0,1,27dae345b2e5970c9d3feba55d8322e50c1240ab8d505536cedb4d647d27a0d6,2024-11-06T19:35:05.403000 +CVE-2023-52870,0,0,27dae345b2e5970c9d3feba55d8322e50c1240ab8d505536cedb4d647d27a0d6,2024-11-06T19:35:05.403000 CVE-2023-52871,0,0,fe9db8c2a60a638be83569a9528a947015c20fb1ca847cd7d6ee75b69b6f429f,2024-05-21T16:53:56.550000 CVE-2023-52872,0,0,95562b8fb0cc421a39b970c47689ca5dfb57a52adf4583e91f8091a32ec9fe9a,2024-11-06T15:35:08.170000 CVE-2023-52873,0,0,87939aab335722274ff9346609ace667795230b4a40e5a5c0583dd242243c124,2024-05-21T16:53:56.550000 @@ -241492,7 +241492,7 @@ CVE-2024-0025,0,0,d28de8c9f19ab5ba79d0474f043c936cf414f4247e50396a672a60bd3b9be7 CVE-2024-0026,0,0,774ed6ba82d0d9c7a541b3db4a5a359cf56663a0f101d669bdf9d716d0a13278,2024-07-03T01:44:32.803000 CVE-2024-0027,0,0,8812c8953c6645d49bd5f62acac1b6ed41a4a4a9272988ed4e3b759e771e9ede,2024-05-08T13:15:00.690000 CVE-2024-0029,0,0,55e8334b75ebe900149ddbd8622fac8b29c21a3b953c0b848545a4ed036cbf2f,2024-02-16T13:37:55.033000 -CVE-2024-0030,0,1,0dd9bca1dbcc5e3458318f715ab6b433aff63564ed4b03d63174ae833d93503d,2024-11-06T19:35:07.573000 +CVE-2024-0030,0,0,0dd9bca1dbcc5e3458318f715ab6b433aff63564ed4b03d63174ae833d93503d,2024-11-06T19:35:07.573000 CVE-2024-0031,0,0,b1cddaec25187c54af4bebb0dcc796dbc4415ad876a9b9d3fa787304a60914ff,2024-08-01T13:45:54.900000 CVE-2024-0032,0,0,28a201a5282c4952746adae47b502afc7f863fa68b2049d01865c530c24bbb57,2024-08-29T20:35:54.413000 CVE-2024-0033,0,0,27344b7715a75d0aa82a7b18cd174c27fc55902f246df424d23b6d9f7df6dd01,2024-08-16T18:35:03.300000 @@ -242423,7 +242423,7 @@ CVE-2024-1009,0,0,97af4237278897e4de60a52c929ac5642d8b709167b278dc1af6a70d4d177e CVE-2024-10091,0,0,d0b808b13e4ac8a1cdb029b434d2f58c9a91ce65332255a3523a2d40d54e2bbc,2024-10-28T13:58:09.230000 CVE-2024-10092,0,0,96aeeb96773a5c0a6e4e68b9196f2f369ac89a58107c1085bc8eadc272cfbb94,2024-10-28T13:58:09.230000 CVE-2024-10093,0,0,94a330c294b313c7705272073b44baeb2e1acc1449e78c4e0c252c7b91c53316,2024-11-01T18:07:07.003000 -CVE-2024-10097,0,1,ebed9ad10c7a648598c4572f4800c95ee8b1505f542b8454e9698f3995387b9d,2024-11-06T19:14:22.817000 +CVE-2024-10097,0,0,ebed9ad10c7a648598c4572f4800c95ee8b1505f542b8454e9698f3995387b9d,2024-11-06T19:14:22.817000 CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615abb6,2024-10-21T21:03:53.647000 CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000 CVE-2024-10100,0,0,f9d8653b0b809755807a27c91859fa59733e823c9baf33fbd9ba6460baccb9d4,2024-11-04T19:15:05.297000 @@ -242439,7 +242439,7 @@ CVE-2024-10119,0,0,49edb44a36719c29f8ad406ee8678c1d6a57c817986d9e175ffebf1849d72 CVE-2024-1012,0,0,261f4dda24c2aefd44892a1e7cff84e275a6853943a2bba059238594bb202f50,2024-05-17T02:35:10.090000 CVE-2024-10120,0,0,877872300e701fe4a1efb68fcccda192535f4ea8d014c4745e6d765239ef8603,2024-10-30T20:20:46.010000 CVE-2024-10121,0,0,4fac6e713d174c782f95945b8314e41c0820946450664e88d069ef79a5b04b0a,2024-10-30T21:21:02.083000 -CVE-2024-10122,0,0,153862f3f9eb72281b1c72dbca34e4eb5ada0e8c96788af32355e9b86fecda30,2024-10-21T17:10:22.857000 +CVE-2024-10122,0,1,4e5f619ae1411af7ba6427863c46c2d3289b70e0f0b6031ee87ce9e9971de5c8,2024-11-06T22:05:23.700000 CVE-2024-10123,0,0,e122097599e5662b16a80366258ebdfd607e11805ffbed77bafc707b3aec8a81,2024-10-28T16:06:53.747000 CVE-2024-10125,0,0,57aa34408f8260c656e1d34a999469d8529d9afe80be211b41d76ddc0eb4278d,2024-10-23T21:15:14.510000 CVE-2024-10128,0,0,f4621c94fde2e2c994e30c7fb126f4e421d19f40a100d08f3cba9307c37673b9,2024-10-30T20:31:33.213000 @@ -242823,11 +242823,11 @@ CVE-2024-10826,0,0,e7caea17df9e50303e84eb12f606f4531bb8bb9449a87b4576ba355c7a719 CVE-2024-10827,0,0,c533f4c70607df301dc68c381588fa8b3325a3d893bbcbb9a6092f250e2c41fa,2024-11-06T18:17:17.287000 CVE-2024-1083,0,0,f65354685ac9d5e6ec0c7d89ef33fa98a96cad0e23da0316206039cbd9c94fda,2024-03-13T18:16:18.563000 CVE-2024-1084,0,0,b38be98d35d4290a3ce2408da5081c91dd802a2448815858b2cd8d2247674e10,2024-10-17T15:46:42.330000 -CVE-2024-10840,0,0,7c13b48653833d393d956bfeba05dc2dd9647859d024272e6982bcc84d954739,2024-11-05T16:04:26.053000 -CVE-2024-10841,0,0,cb468ec73cf79f50123b416f8630b7e95a6ee5ee80f06d5ca0c3e30ee71804b9,2024-11-05T16:04:26.053000 -CVE-2024-10842,0,0,4f347a0fe404db0a70d46d9dfbb2bce6fdecc583b1df9d0e17ec6eb1dbdd1366,2024-11-05T16:04:26.053000 -CVE-2024-10844,0,0,32322f050196865be4aae941a4bb5adece1ed82ba13b1f2493fc23a256fb69c2,2024-11-05T16:04:26.053000 -CVE-2024-10845,0,0,a2864f4a8e52c61d4eaa5da9f3b813c3c867d63046f2a47c80f727d56a3ef7dc,2024-11-05T16:04:26.053000 +CVE-2024-10840,0,1,3088ecb88b6f610106137e52cd92a9df0637e9f9f20cd58417274c10e35a041a,2024-11-06T22:49:12.173000 +CVE-2024-10841,0,1,1914449d57ff1a3babaaf40b7a33b002037c2a6558bba70a8f37b24e8f3218c2,2024-11-06T22:50:24.277000 +CVE-2024-10842,0,1,7aeafb02fa0f31956e4616acda70affdbdea4445fee41471b949ff3589528b00,2024-11-06T22:43:19.327000 +CVE-2024-10844,0,1,ab92f6f85407dca15cb1e5a84778b8d496e0601ae883a0bd7f3db6703a1b0447,2024-11-06T22:38:13.800000 +CVE-2024-10845,0,1,e23b6836533b6527e69274c9897179b623fe8ac43fca2950e064d79cbfdb6f9f,2024-11-06T22:38:03.347000 CVE-2024-1085,0,0,1d186f1dd445cf86c8be70ef01a658a198ecb65ca5305ee36e96f272e65874b8,2024-02-05T20:41:40.513000 CVE-2024-1086,0,0,3e819e2fff80149e3f377751fd1fb28a52f8791d9e5d08990c549613b15214b2,2024-08-14T19:41:08.673000 CVE-2024-1087,0,0,9751a2fe52b8f14e0fc1c9d86ee656c42465ba61ef03201895b6c1868f5679fd,2024-01-31T13:15:11.030000 @@ -242841,8 +242841,10 @@ CVE-2024-10916,0,0,53443e54e55c3a54111ef55bbe8925e1700f77a586713f1c8fd853e1c516c CVE-2024-10919,0,0,a9eb02ffc877d3649d3e97e181e7b5d396e5513925c1dfbc9593594bbb4efcef,2024-11-06T18:17:17.287000 CVE-2024-1092,0,0,4e514cbeb8cbdb0016fe4cb374f3dffe448e95b35a82b13ed7cb7be1b7fe61c2,2024-02-13T19:43:06.247000 CVE-2024-10920,0,0,2a084f5df50e8d62344f7fb5574910af35d9b3838be955d3bbcc07e777ed2e3c,2024-11-06T18:17:17.287000 +CVE-2024-10926,1,1,836b6dad2f467cae785f28103c4c848e59141b80159f4c1ffe543f045d6be6ff,2024-11-06T21:15:04.927000 CVE-2024-1093,0,0,de7ad9b72d87a55cf339c2dc774b7bea1d33bb68e3b932a439fb6fd6a0ef5b53,2024-03-05T13:41:01.900000 CVE-2024-1094,0,0,e9e492360318e20689e515fe6138ed3b8630e834f4abf2efeafd987f7e7b2dc6,2024-06-17T12:42:04.623000 +CVE-2024-10941,1,1,675a2a19161edc958e8a197cc6dc80c9908daf66aaab2775f6145c4f21c47875,2024-11-06T21:15:05.213000 CVE-2024-1095,0,0,e70da3b629cae08421ac3ff6db71fb525bf872b735f906aa9168a1a3feae7dcb,2024-03-05T13:41:01.900000 CVE-2024-1096,0,0,9e6ec92aa91c226f1dce82b660bd82ecda12366a7db0465d5ab79a9947cb0a51,2024-03-21T02:51:34.720000 CVE-2024-1098,0,0,7637c79f93f6fef4c2ad0472be16e5b2b85cffeb9436b7defda280fbd3390871,2024-05-17T02:35:14.017000 @@ -244467,7 +244469,7 @@ CVE-2024-20962,0,0,bcf0fdf63a172649d862e0b60296a1507069b6b1d3f284da5e5091c27efe3 CVE-2024-20963,0,0,777b7cd2ebaadb4763a737f62544d35f548c2765fd413ec39c0e69f1d2e44eee,2024-02-02T17:36:33.743000 CVE-2024-20964,0,0,ab74670f7eba706fccff530b8fad5283c75afa505713ad1602df91d0111cf529,2024-02-20T19:50:53.960000 CVE-2024-20965,0,0,d41d12dc1f39ed4f3636fac85c63e6e6a8b99443b9015fee96d2868d746c8460,2024-02-02T17:42:20.270000 -CVE-2024-20966,0,1,dab87e37585bb236d1417d0345775a702be652c48f5564f545a9e12473d94c75,2024-11-06T19:35:08.623000 +CVE-2024-20966,0,0,dab87e37585bb236d1417d0345775a702be652c48f5564f545a9e12473d94c75,2024-11-06T19:35:08.623000 CVE-2024-20967,0,0,24e7161f6aa52b5a617854b182e26d8b3a2b8a2e00cfc6867379e3242f7ad4f6,2024-02-02T17:42:32.037000 CVE-2024-20968,0,0,f87c3ac120b069363cef49b73c4bea5dd9bdd52a2a03eea095a7ff8c6c344cb0,2024-02-20T19:50:53.960000 CVE-2024-20969,0,0,058e957bc600be5635dd584028438dce1629507fbbb938dc220b2cfe0d1cbacd,2024-02-02T17:24:44.617000 @@ -244548,7 +244550,7 @@ CVE-2024-21039,0,0,5533a80506dc2a9584f3f0a1cb6213d349fbac4fc9f3be60fa10f69e60d73 CVE-2024-21040,0,0,9207f1539b8715e9de73bf8605d282f9258ecbde4b6b5af37d49fb9b9b73b544,2024-07-03T01:46:25.020000 CVE-2024-21041,0,0,53175e4f9f6fe9a06cdb65415f15e9860a5cc1810804215df4199c035c4956b1,2024-10-31T16:35:04.810000 CVE-2024-21042,0,0,a53b604b49a76162fbba6ea20fde9e5db3c2c63e25a2d34ff97af2cb2bb953ae,2024-04-17T12:48:31.863000 -CVE-2024-21043,0,1,34b86fb6bc70d1cb3f2e8b52f242178af3e3c87a06302294640b6969cd919425,2024-11-06T19:35:09.460000 +CVE-2024-21043,0,0,34b86fb6bc70d1cb3f2e8b52f242178af3e3c87a06302294640b6969cd919425,2024-11-06T19:35:09.460000 CVE-2024-21044,0,0,2cd88f43af07596557d9fca3fb13efe6eb725b0bbf07f13100392e30400b440d,2024-04-17T12:48:31.863000 CVE-2024-21045,0,0,8f4acd1404f7851517d6c66a40a7ade78fca2381123c6edde49776a3d7abd81c,2024-04-17T12:48:31.863000 CVE-2024-21046,0,0,6cd7417a9fe1dad42e5e390bd73f6c59f847ce1b22a979e6a850a74e46589580,2024-11-05T16:35:11.803000 @@ -244755,23 +244757,23 @@ CVE-2024-21244,0,0,a2d8857947cab47435f13652b22d7660077ec99971dc97d0f1c04da6d4b60 CVE-2024-21246,0,0,ce26d4699cd66244be859e323ba861645fea4d7c63493af05a19982e79b3ffed,2024-10-18T19:04:57.587000 CVE-2024-21247,0,0,65e62ada788d7c8dd8f6bbcfcf373e355969c491bcf2b35cf52ed2528731ff42,2024-10-16T20:33:33.027000 CVE-2024-21248,0,0,9d2bec6b0c5bd428b3273089dc6de78cffbb45eee6dc4edb4da7a745f217bff7,2024-10-18T14:59:21.397000 -CVE-2024-21249,0,0,561b0c05f80cd133fd2bf7f9570e926d43e2c7747cbbd22ee7f0f51bfa829c07,2024-10-31T15:35:25.647000 +CVE-2024-21249,0,1,62dc164222266e9012addfd5a4c4b6cc91556280f972a8f370ed3479ce2dfab0,2024-11-06T22:53:50.587000 CVE-2024-2125,0,0,872a2657310e63ac8c9e764159a2a2b1b3991a1ff9d35b42d26ee113c654f515,2024-04-10T13:23:38.787000 -CVE-2024-21250,0,0,c3a216316fd161ecf42e4b85935aab4377046a8c65dc40e8a08a09abcd439125,2024-10-17T14:35:19.303000 +CVE-2024-21250,0,1,194dad5e2041a7f20ff44922c3cd68e8f11877affaaf0af77e6c9accdf6d7287,2024-11-06T22:54:57.887000 CVE-2024-21251,0,0,95021887cdea7aae31070af44e524d1ee6c9c77252dd0eef331bed470fbf412a,2024-10-31T13:35:08.347000 CVE-2024-21252,0,0,3562e5499767a042e190a60bfd9dbb9b6b695af77c5fafca40036938307414a4,2024-10-18T17:04:44.797000 CVE-2024-21253,0,0,82cb10003f4ec5bdfbeaba5304d2361b5866cecedb70f3ece91f971a87496d10,2024-10-18T14:59:43.660000 CVE-2024-21254,0,0,69ca4bf103295a9b35d72b61c0821b7611adf3b7f78c0a3144fa3da855147ce0,2024-10-18T17:05:58.723000 CVE-2024-21255,0,0,e030f05632b5a87ee9fbc0b2487a30eaf79a4e92eeff8a93914fc40aa8e258ce,2024-10-18T18:16:50.040000 -CVE-2024-21257,0,0,4eb5b2386255bfe67a12d4f16c9687502d7809166e4f1a2b618c5f01aeaa9628,2024-10-16T16:38:43.170000 -CVE-2024-21258,0,0,d66d60d8ebe1253680938995404bc802bc4b9dba35146ae97db380f0d8c97381,2024-10-16T16:38:43.170000 +CVE-2024-21257,0,1,725e5cb13b95dde80a37c32a41b8094719a9fca76dfc8333734f482e81824a37,2024-11-06T22:55:18.400000 +CVE-2024-21258,0,1,f6a4f5d7d1aa00a2377e749a4d3b06007d1ed6555c84462e00a1435f7514e74c,2024-11-06T22:56:19.527000 CVE-2024-21259,0,0,f4f5607ed9f1a78aaccb5e08790e38092d26477ddc636f65efb0050b27293955,2024-10-18T15:00:17.133000 CVE-2024-2126,0,0,4ce1f11f7bd5c084b75067cba762f3a64c791e384d09fc3623bdffa8d2aef429,2024-03-13T18:15:58.530000 CVE-2024-21260,0,0,7a47438a9729091b847bae11b79b0b39e45eeeb29dbb35a8c4d79bd78f465c02,2024-10-18T19:05:29.830000 CVE-2024-21261,0,0,0899d9cbcc2683b4e5f057eef455f1d9ca53b0f3260b8ba7058f26a504b9b734,2024-10-21T18:27:17.307000 CVE-2024-21262,0,0,82558944e30d58821a3281c570a2d377b7ec0772f885917aea1c19c8d3bb4a8f,2024-10-21T16:28:16.427000 CVE-2024-21263,0,0,7ac7bc00544efec065b7a3ea0c417046cafbfd2ff0aea2fefa7b4595b67183a3,2024-10-18T15:00:52.463000 -CVE-2024-21264,0,0,43edc8b0674a64ea84e7381a14394594bbb3f638fa4e4e95e2e0a620c8f8163d,2024-10-16T16:38:43.170000 +CVE-2024-21264,0,1,d9f928ae696c644062bfe905454106684d42ecbe4c3ee5dbcffcc7a85fd3bc2f,2024-11-06T22:56:41.647000 CVE-2024-21265,0,0,c55c1df1e1622cf6e643b1eb11b86f0a45ff8d2660ab5a45972681fbb6ed81df,2024-10-21T15:49:21.027000 CVE-2024-21266,0,0,eb9a8a34ffd00406d4abf6e4a3c73c351bf9d5c51c3a336b85b5cbd4050db042,2024-10-21T15:49:43.940000 CVE-2024-21267,0,0,badeabc98b9ebca68fd4a6f1dc13051a7275b459f1ba8064226c678286ad482a,2024-10-21T15:50:27.217000 @@ -245006,7 +245008,7 @@ CVE-2024-21492,0,0,803eb1b38c0a3c364c8ed4dea2bf283518201c6c637d9dcb0eb2c40900b3f CVE-2024-21493,0,0,8c569f1b0a59292e6c9cf7ec9ce82294e78d1d0805330784c9c6f403ab9b5f07,2024-02-20T19:50:53.960000 CVE-2024-21494,0,0,0bbab6d51758efdfbb0a7b2f9291f8e5deeed39eed0d020b8776487f79305949,2024-02-20T19:50:53.960000 CVE-2024-21495,0,0,d8114eaee60fb319f9f14d9bbb95c01136acc0dc9b681a7e416381982ba11775,2024-02-20T19:50:53.960000 -CVE-2024-21496,0,1,fd2afde9cc348b878ada34cb6af6773012668bca46f1e822b57f2512814d4fea,2024-11-06T19:35:12.967000 +CVE-2024-21496,0,0,fd2afde9cc348b878ada34cb6af6773012668bca46f1e822b57f2512814d4fea,2024-11-06T19:35:12.967000 CVE-2024-21497,0,0,8aedc196ee518fe8560cc512f459ccbfc6592e8201a18667b2196e5e6bb6b22b,2024-02-20T19:50:53.960000 CVE-2024-21498,0,0,3c9376a89b1471a3f3dcd2f26b2302ecf028dd3649469284754d6d6bbe15e588,2024-08-01T13:46:44.130000 CVE-2024-21499,0,0,056024a19cf11190da9415625f86200e7f99c9c1c15d5f4eac3772c0369f1c48,2024-02-20T19:50:53.960000 @@ -245160,7 +245162,7 @@ CVE-2024-21686,0,0,4a77c3c56e7b5b00a78de09ce573bf8e0630b6f60379d0ccdce9209c8559b CVE-2024-21687,0,0,b10f0ce22ddc5215abb86b2d036e862f5c36c964079edaaed2bac3d77de9097f,2024-10-24T20:35:05.307000 CVE-2024-21689,0,0,d8a79405abcb9c8abfdb03520e41049c9522145c88e975847ada5aebd53c39e7,2024-08-20T15:44:20.567000 CVE-2024-2169,0,0,25fcbf8b9d7008ea9954a41615969f4d36543f4a604eb878bcc8b4c5c18a9fe0,2024-08-02T17:35:41.760000 -CVE-2024-21690,0,1,52f2f5bb1e3e94fbb3d7fb8fab564e88563477b86bcce8501f8853e0eaa6dfd8,2024-11-06T19:35:13.787000 +CVE-2024-21690,0,0,52f2f5bb1e3e94fbb3d7fb8fab564e88563477b86bcce8501f8853e0eaa6dfd8,2024-11-06T19:35:13.787000 CVE-2024-2170,0,0,758d6332b5fccd657d38a7eddcc769e16fb72e0c1b6514443e29b8614302434a,2024-03-26T12:55:05.010000 CVE-2024-2171,0,0,17c18c0537b711b05cfdac779ba2d168e9830dc55b69168346eed3896c1fbc48,2024-10-11T14:15:32.983000 CVE-2024-2172,0,0,edf7001396454eaaf4557a9c3fcef53434431cfdf8112832b9dc273636d1d743,2024-03-13T18:15:58.530000 @@ -245374,7 +245376,7 @@ CVE-2024-22009,0,0,b5b916a7d5e03fc859dbc7dc76ad79ca7e20552b5b212df09fe8f4b48b2af CVE-2024-22010,0,0,064f021344a36df851e34619a798aa49214be75a65182801242af835352a2a15,2024-11-05T17:35:07.960000 CVE-2024-22011,0,0,f1daed51c903d88d263d46bfaefe467f13d6b47a3368a8cc0e99c1a391f6eea9,2024-03-12T12:40:13.500000 CVE-2024-22012,0,0,dc6a18ae7accb379105ae5b8c9fe53def4787e4dcb1f5ed3397b80bba457789c,2024-03-12T21:15:57.953000 -CVE-2024-22013,0,0,7f532e6900797141a60e66fca5bd8ac368c382be95753f2e15222fe6285acb11,2024-09-20T12:31:20.110000 +CVE-2024-22013,0,1,82c717c65faf8d538fe3d2eedeb4ed9751bc8b1763b263d1a92ee0f5afa87e71,2024-11-06T21:35:02.500000 CVE-2024-22014,0,0,b059d091724833d1bb51d32eadbd1be8dce585949d29de43319d8d8ddaed06d9,2024-10-25T21:35:05.193000 CVE-2024-22015,0,0,ab9198a00b8902f553a18672e99e37367cbd733d408a460d3e69564e986f708c,2024-07-03T01:46:59.010000 CVE-2024-22016,0,0,80ed0ed1953eb9bc819815a69c5782ab91648798b066ce1586fe70786fbfbdf5,2024-02-07T17:33:12.727000 @@ -245435,7 +245437,7 @@ CVE-2024-22081,0,0,c0e23ef382492c7380a92e96cb3bb331fbab187b3695f4beebcf35389003e CVE-2024-22082,0,0,459e25d191876c4f00cade807052f238137ad057437a31854486c01937977cf9,2024-08-05T19:35:02.233000 CVE-2024-22083,0,0,7a6168861b8307faff71dd88ea4edf4af71ed0e4a8c79dad79d5ed358e7010c6,2024-03-20T13:00:16.367000 CVE-2024-22084,0,0,0e122ae85d4de51fb69a5bdf68cc5b622f1fc44a5c7c74096438459ba25e7679,2024-08-03T20:35:04.983000 -CVE-2024-22085,0,1,9bb660a953db76f501963932fc60e0d5afb5a0529b26a144a0fb7fc6555c5828,2024-11-06T19:35:14.630000 +CVE-2024-22085,0,0,9bb660a953db76f501963932fc60e0d5afb5a0529b26a144a0fb7fc6555c5828,2024-11-06T19:35:14.630000 CVE-2024-22086,0,0,1d7696b944cd1a26a2cc7bdc48a35b3903f2aec00a961a7e53e9ced659d9458d,2024-01-11T17:04:07.660000 CVE-2024-22087,0,0,4384797ae7846daec0107426d58d87d7c4784c559db16808176350ae4c959dce,2024-01-11T17:03:51.967000 CVE-2024-22088,0,0,b895d73398c482c8e6acdb9bb17741aa9b7a4b9e58038e199e46754d5e3337bd,2024-09-04T21:35:06.700000 @@ -246232,7 +246234,7 @@ CVE-2024-23294,0,0,6e53ba65116756c4100f8fe8d5569a0c62f61cbe9a5faf2cb1a478a60da66 CVE-2024-23295,0,0,888dad9ac3d8cb77923a71e92315d941876e8170cf4689e417e49228bdb9fd95,2024-10-27T14:35:05.370000 CVE-2024-23296,0,0,4c1c20e10d440a721ea56c440f9f9d49de01279fc6b58c55156def98607c7416,2024-08-14T19:32:48.817000 CVE-2024-23297,0,0,4e04bab05bbe7ec82e24a36797403e08fa4bc700957cd0b27eee797a80773cdb,2024-10-27T14:35:05.540000 -CVE-2024-23298,0,1,11c25643b2811d3e7a7eaf30f2e6f582af0634ebd8c739f4afa1e19e40be1a63,2024-11-06T19:35:15.443000 +CVE-2024-23298,0,0,11c25643b2811d3e7a7eaf30f2e6f582af0634ebd8c739f4afa1e19e40be1a63,2024-11-06T19:35:15.443000 CVE-2024-23299,0,0,fe4dd82d5102073a81be0172f4d91c213b490a3370bedc852ed979e38d0840d6,2024-08-20T15:35:03.893000 CVE-2024-2330,0,0,9ae945264bb052d68e9c213073b32e3a9e8de8241b1a06dd279470149a8f98ca,2024-05-17T02:38:10.540000 CVE-2024-23300,0,0,c517d8f3cd7384c2ec4a46a0a893833bb0df2ca0141a1842a58ab8296dd562b0,2024-08-26T15:35:06.113000 @@ -246440,7 +246442,7 @@ CVE-2024-23556,0,0,4abe0589b741d76d8a6140e408a99fff6f784fc140eb8dd575aa458015e6a CVE-2024-23557,0,0,4270afce746443b5193815936f76591ad043b307043acbde73eb7ec4d54cd34d,2024-08-07T19:35:03.190000 CVE-2024-23558,0,0,1aaffec8c09fd69e12702b79a89a97fa66d8cf8050a73827a56fcf9396bca5b5,2024-11-01T19:35:15.123000 CVE-2024-23559,0,0,1cfe950943db323f850a4ffa6fa09a9e594439fd864c25048ffda399bb0b3e4f,2024-04-15T19:15:09.577000 -CVE-2024-23560,0,0,e362890ddaf504fd7ec860643e0e2bcce74ce536f1ff64f240f88b9ed03a4aad,2024-04-16T13:24:07.103000 +CVE-2024-23560,0,1,611d6f496e671cc0d1d356211a118fce6e543142f0a1a253e80e1a53fcc9dde1,2024-11-06T22:35:04.240000 CVE-2024-23561,0,0,05ce6bff2b3c083c40d1cefd8ecfe83b9e8bac92f3576a18d3243c6c46e3bef3,2024-11-04T22:35:03.360000 CVE-2024-23562,0,0,4d517ea8a2763e5506a865d21e69db429e3d16d2d215329e0568829328a2181b,2024-10-23T23:15:12.397000 CVE-2024-2357,0,0,58f4675a1a89325da5d3ee44283ebc42e89a0cdd69475172a4baac455a4ffac1,2024-03-23T03:15:12.690000 @@ -248402,7 +248404,7 @@ CVE-2024-26351,0,0,12fff75a6adfb2a49a1df2419d56c70a882606b31c647e6d0906250c15d15 CVE-2024-26352,0,0,8b15f4dcf8c7ba10be17fb174c1fc0c7dab8a3918429d96aacd6df61b16faa50,2024-08-14T20:35:07.913000 CVE-2024-2636,0,0,99a69aaffd46cfe65a84b6720d2f35122e16b65656b4791402aef2e645d8d6eb,2024-03-19T13:26:46 CVE-2024-26362,0,0,5faf69da8a67af4816d796fd5b51111ac2c788f77e8e8dd0cf83d9d0e45a369d,2024-07-03T01:49:39.793000 -CVE-2024-26367,0,0,527c3fc48df6b7e73e05f006f7179ae46d331d377d9a28bb902941bd60f631f8,2024-05-14T19:18:31.490000 +CVE-2024-26367,0,1,fb602fe640a36deea42d544a0bf5bbfec018fc1bce2e50bc4f6ba27f1fac9ba7,2024-11-06T21:35:02.850000 CVE-2024-26369,0,0,08c9f0525905502b41d2dcc09bd77683ee3501b8b43f7fda43dd5219f9780ed5,2024-08-01T13:48:09.673000 CVE-2024-2637,0,0,721622b64a65f273433032cdde0b2ce3d6c7d3ce5ea1581ad6c33c2a93b72687,2024-05-27T08:15:09.360000 CVE-2024-2639,0,0,1b2fbb8554a3bfbdfb75c8d2c4abee29a55fe420023a4469268f266088d766ca,2024-05-17T02:38:22.540000 @@ -248542,7 +248544,7 @@ CVE-2024-26644,0,0,7934c2f59b6e30a2c4b4745bfbfa90280e322c49f0c2a186c87bb52bbd1ff CVE-2024-26645,0,0,fcb784c6c783cccdf8ab1103cd462aaed01b5616113ac8c3b057371a72bdcc2d,2024-11-05T10:15:36.983000 CVE-2024-26646,0,0,37b8583bb8aa6b5d9135a9adf8c1cea7db38d580753ce18483b0a0263c262490,2024-03-27T12:29:41.530000 CVE-2024-26647,0,0,2352172cdf00eda3657e1ca2ad602c79475b6fdb427922a2ce2991151abd5140,2024-03-27T12:29:41.530000 -CVE-2024-26648,0,0,4cedcf3cfff8479b6fed3984e33e00ae084d6a67309ed2c17e18f60de1bb7057,2024-03-27T12:29:41.530000 +CVE-2024-26648,0,1,c17515eda5659d8a7ff11ea44fa35ca00ff75d317f4eddf403747bbe01bfe069,2024-11-06T22:35:04.950000 CVE-2024-26649,0,0,940fcd7e5d20bc1c18f4c974a09622f0b6b6d87231bbd7408e7118d35c4bade7,2024-03-27T12:29:41.530000 CVE-2024-2665,0,0,0d168a0d5dbe4804c9bebe4f21c0d1f4a27974809ea172b5979b5dccd55d97c3,2024-04-10T13:23:38.787000 CVE-2024-26650,0,0,c37b82afef74cba8f0a1b3081e8c53c80ac8f73689ed9f1c045183b9566d980d,2024-05-23T14:15:09.293000 @@ -248634,7 +248636,7 @@ CVE-2024-26728,0,0,1d984fbbc09b2528ed0368e262b6925669160ac0081a20349d9ce1b0481cd CVE-2024-26729,0,0,f2558d66284076d36d46e0aacf3fb55436eadb8de18e68f9386d43b00e2b9ac0,2024-04-03T17:24:18.150000 CVE-2024-2673,0,0,c0d60620ac5234f9d83256f6c8f0cc424d5b12f467b9d75fc363f57a06d6b86c,2024-06-27T20:15:20.927000 CVE-2024-26730,0,0,e3adf1f18e75f02eb4ddde1d65703597e8a59901e6d25e50ea9de5823f84b09a,2024-04-03T17:24:18.150000 -CVE-2024-26731,0,0,a0b35e80e7d711c60a97912dc302c5db34b4fd9235fbfe456f2513f7ece65c03,2024-04-03T17:24:18.150000 +CVE-2024-26731,0,1,444fd53cb325041c6066bba9c7011195568465765bfe4f679685b3d9f33781fd,2024-11-06T22:35:05.197000 CVE-2024-26732,0,0,ec7cbeff52970bd11884d825e88204cea9fe962424cd8f5b8fa233a8acdeb543,2024-04-03T17:24:18.150000 CVE-2024-26733,0,0,ffb3f90c0778d3f838c29091a428911e1aa8d896c4d95445af70c44f0420f3e2,2024-11-05T10:15:45.177000 CVE-2024-26734,0,0,0eb1b1feddc3c43838ae7b1cbb500208ff685270dbb18f151464783d19bf4c65,2024-04-03T17:24:18.150000 @@ -248648,7 +248650,7 @@ CVE-2024-26740,0,0,1e1bef330b72fc7d544d8597ed7662f3757f2fd4d4713d8ba1cf34c542f65 CVE-2024-26741,0,0,e3c248718399fd38da7f7e0290c551d82b46ab3d7aa0a320a11762dcc655c816,2024-04-03T17:24:18.150000 CVE-2024-26742,0,0,d7af6623131612fa1c7fd4e052a63ef79bda58184e37bad2d9cdda66dda9e08a,2024-04-03T17:24:18.150000 CVE-2024-26743,0,0,4a7e68056af89e9c88fe98dfc22c3d733a12a894d9b16349f941d17c194d57a1,2024-11-05T10:15:46.150000 -CVE-2024-26744,0,0,0ceec025040440e9ba41481335beedc9c2145c266bf1333f6ac942206f1c0ce5,2024-11-05T10:15:46.253000 +CVE-2024-26744,0,1,0a89200e6dfae9bb0e1be2a7f590bdb3afcdd853d9d245ed930156cf4025f324,2024-11-06T21:35:03.883000 CVE-2024-26745,0,0,122c004116025bf61ab1b820e4608632aeed8cec5ef7c9fee61ffd6ee6d9d826,2024-10-31T18:35:09.190000 CVE-2024-26746,0,0,503c547cde060b718fd5c822ced0ef17967b19427780440c26d09b063f4a1e1e,2024-04-04T12:48:41.700000 CVE-2024-26747,0,0,09de0e643315d31c44b1583413acd72b2581d73c25656d42d1275770b236ac52,2024-11-05T15:35:09.820000 @@ -248662,7 +248664,7 @@ CVE-2024-26753,0,0,3846eb71f07ae66d4f1ab1df6c9d443c98aca1924ebf110c33d4d08080433 CVE-2024-26754,0,0,4c9cfa7c31d874fcb7c7bccb3bab927e4d2ae66cd4f4c5042fa0e607d4d1901d,2024-11-05T10:15:47.167000 CVE-2024-26755,0,0,39f7695747b108842d59070ebf8576f95142b84dcd41ed480d2d853aa612b61c,2024-04-03T17:24:18.150000 CVE-2024-26756,0,0,655c17b37b1ef2579c61a87ebef153f2774027727f182f3917510b923fe0ccdc,2024-04-03T17:24:18.150000 -CVE-2024-26757,0,0,6034152e03c1ca661ffc06ef00b2bfd06031f7a425df0cd8c48af8de3fbaa9da,2024-04-03T17:24:18.150000 +CVE-2024-26757,0,1,90467e553fa06ea3a7c2ab3dea36e3f811f1f99408fa7e26a28d265d66f85785,2024-11-06T21:35:04.737000 CVE-2024-26758,0,0,13c69310718039924d9aab781258d9193abdbc64a782ef9279b6a2cb5e131a2b,2024-11-04T18:35:07.610000 CVE-2024-26759,0,0,fee904955decc510df312a537847d082dbb8683c61f8fb59034da4ba171b0bf7,2024-04-03T17:24:18.150000 CVE-2024-2676,0,0,c5aff2ba1e0c7344ce038e4f14ac4978d6bb29d1aa8d9b0c435541e971559719,2024-05-17T02:38:24.527000 @@ -248686,7 +248688,7 @@ CVE-2024-26775,0,0,6fd84ebe1443aa1945a09fd4c48b2b5413a95fedab44014851d1e3de25fa4 CVE-2024-26776,0,0,231483d2965c1ba8393bd7449031e7bde3f34468b7fb6c2f373633060a8098c5,2024-11-05T10:15:48.947000 CVE-2024-26777,0,0,149a5e7ba07fc7fae23ca08bab697f35d178e4d6054d6fb6db6aa2ffb1dc45d8,2024-11-05T10:15:49.030000 CVE-2024-26778,0,0,ba27fdacb2617bc8c2e5f1f9ee53b0927010430cedb669781ea0cbeb302b5a02,2024-11-05T10:15:49.133000 -CVE-2024-26779,0,0,ec4054c03218d2454c2d30dd1769a652bdebca802addb64ef26c3ae272a73208,2024-11-05T10:15:49.233000 +CVE-2024-26779,0,1,5213496ece4af679413eec0c49002bd6c886a5728eec3dcb023c0c154d5e6da6,2024-11-06T22:35:05.993000 CVE-2024-2678,0,0,bcb8f0bc79308fc240a2e04032fecd11d29a05e517a407df60996ec6cc430105,2024-05-17T02:38:24.730000 CVE-2024-26780,0,0,910e1f464205bb4d61ae164984308d54dec4e128d9fce0100bb0bec47440e7b3,2024-04-04T14:15:09.667000 CVE-2024-26781,0,0,f985d7d52d3c00d388812605acd1c322cb3a9f3a0500eb44ae3d519cd75a2f91,2024-11-05T10:15:49.403000 @@ -248721,7 +248723,7 @@ CVE-2024-26807,0,0,104a4e4d854016f8b324666da2a6519a8e2f2a9b7b206527a539918e69652 CVE-2024-26808,0,0,78f28d423840a66070d27b2f76e4cfdb21e72d03dc73ddafa1fe00afc26ddd06,2024-11-05T10:15:51.720000 CVE-2024-26809,0,0,01e5bd6a3e1086db6d390f88a74abf1dab95b48a5074d6a449e0ffc835016714,2024-11-05T10:15:51.820000 CVE-2024-2681,0,0,064400d4b0835279b0227ccac554f0cfa5438a53fe0a37509df7fe4d3bb69b80,2024-05-17T02:38:25.007000 -CVE-2024-26810,0,1,3bcbd029ab3dc0530ec232fef8ab00be486fb08e0fc65e925a6e7547e08a8c3a,2024-11-06T20:35:09.833000 +CVE-2024-26810,0,0,3bcbd029ab3dc0530ec232fef8ab00be486fb08e0fc65e925a6e7547e08a8c3a,2024-11-06T20:35:09.833000 CVE-2024-26811,0,0,b419aa5e7bfea8f6be9b0c18d47a04ffcdb7322b3bd6706c908ab4700cf29410,2024-04-28T12:15:20.780000 CVE-2024-26812,0,0,e15f8f2f69aee37cecc8fd71e141552acaf8bd02ff4a9774ac9f3745dc6faa03,2024-11-05T10:15:52.087000 CVE-2024-26813,0,0,1e161884c9c6bba988e090609d3e12222e5e93bf4b5b4ea55c3748df4f0005bd,2024-11-05T10:15:52.177000 @@ -248757,7 +248759,7 @@ CVE-2024-2684,0,0,d36d2cea9eacbddac9e02987b1e26022fd6a893a6c0f09ee50bb451cfe4d7a CVE-2024-26840,0,0,66612eb6e16c6bcdf27f2a13a7a8da4787be523c0173463ccb5d506ac9b20933,2024-11-05T10:15:54.040000 CVE-2024-26841,0,0,5e1f136ad87debfe07a19d1692bc4baeabe3ebee450bd39d508ed3155d7f3178,2024-04-17T12:48:07.510000 CVE-2024-26842,0,0,2fcacd7d46da00b8ed6abd9aff9babef4fef495c42a9c08855209ae79c6b7116,2024-04-17T12:48:07.510000 -CVE-2024-26843,0,1,08c4fd5074176009c661d945c518162a34e07b9556d45a3623e3f7aac78eaafe,2024-11-06T20:35:10.390000 +CVE-2024-26843,0,0,08c4fd5074176009c661d945c518162a34e07b9556d45a3623e3f7aac78eaafe,2024-11-06T20:35:10.390000 CVE-2024-26844,0,0,e7dd9fdbca55a3fe3d15e1a88aaa23b8bd8dc5bda58e0747f6bd61e00240dea4,2024-04-17T12:48:07.510000 CVE-2024-26845,0,0,d8720903c9d639d864f48e7c98cece1c82b5d1302754f3650c04c4d9b5ebfbf2,2024-11-05T10:15:54.423000 CVE-2024-26846,0,0,923f64cc2eb677ab6a3c4fbbb44af82280cbfbab47e28dac8f179259ef7d96ac,2024-11-05T10:15:54.533000 @@ -248963,7 +248965,7 @@ CVE-2024-27029,0,0,6c081ff738eb90dc7d9bc74913c1f6e1efe7fc554037e9bb9b8506cffba2a CVE-2024-2703,0,0,fb7268c6624632e5fa0c645fe7971240898e11ffe4f2cbdecab29aea976f669a,2024-05-17T02:38:25.893000 CVE-2024-27030,0,0,6cf033352f8b449cd788a898986efe2b6d73f55358a4b240c970dde448599393,2024-11-05T10:16:20.800000 CVE-2024-27031,0,0,87e5bf3aa11aa1c30fab50e95fb076e098520276691532d4f69eba3b6501fd89,2024-05-01T19:50:25.633000 -CVE-2024-27032,0,1,4256b1faa9815988bb13d55dd8255d2df11f44c2836efb1cce4d42829ee07487,2024-11-06T19:35:15.673000 +CVE-2024-27032,0,0,4256b1faa9815988bb13d55dd8255d2df11f44c2836efb1cce4d42829ee07487,2024-11-06T19:35:15.673000 CVE-2024-27033,0,0,99ae4dd52c39324cecbf4c22b710e291de26bae8f09204b4a9dcb711e784eb7c,2024-05-01T19:50:25.633000 CVE-2024-27034,0,0,a9e7de1105d11e28310eeb40c6007754a28705e0fc4756aadd06d5c333670f91,2024-05-01T19:50:25.633000 CVE-2024-27035,0,0,de6caa5353f29d207951f5c6cb0655ce88080de36a966a9e941d0bc22cc59584,2024-05-01T19:50:25.633000 @@ -248987,7 +248989,7 @@ CVE-2024-27050,0,0,dd1eb20f7cebaf03087c82f7049e5087e8556c8b803e5a5d2fec557dfd4f9 CVE-2024-27051,0,0,a5f0f37dcf2988f5d46e492939e3fee8af550ad1a72bff52461dcb0b308f27dc,2024-11-05T10:16:24.617000 CVE-2024-27052,0,0,b1181b5fccdcf1dfe1970739e055eb9b25314d32d3dbc033144a22078b1e858d,2024-11-05T10:16:24.720000 CVE-2024-27053,0,0,8ef5fe8a862dfbc909fe138c33df28d8e01f8c7054d8543709bc08fc1a631712,2024-11-05T10:16:24.860000 -CVE-2024-27054,0,1,07cae656266e4b957607ddcc6b44e4ae403eb66beb9e9e32950c2c983970e67a,2024-11-06T20:35:11.540000 +CVE-2024-27054,0,0,07cae656266e4b957607ddcc6b44e4ae403eb66beb9e9e32950c2c983970e67a,2024-11-06T20:35:11.540000 CVE-2024-27055,0,0,f1f4f60e5be8e483ef7b713ef7c9c11c2b4e92b8e1ac3b8e82c2d3f18ccfe46b,2024-05-01T19:50:25.633000 CVE-2024-27056,0,0,eb9c42cff1d43c51ba37142ff49c7c647f598f278f30af80f297cea872e6d16b,2024-05-01T19:50:25.633000 CVE-2024-27057,0,0,c547d10d93717b1185795df41c7fbb63e300d75cd64ee01d7cffbe3a6007a3e8,2024-05-01T19:50:25.633000 @@ -249008,7 +249010,7 @@ CVE-2024-2707,0,0,85c775d4cadcd703355fe22885699e6d3b33832ba1bf4a0f012eb92a76bd36 CVE-2024-27070,0,0,9019d5d00e2e557d6bbee725ec44c36e787b905ee46e216a705cd23f704a5b7b,2024-05-01T19:50:25.633000 CVE-2024-27071,0,0,4eba7924eed5d4a7c52b628064790bf6088c813be987aa811365f6d878e7223a,2024-05-01T19:50:25.633000 CVE-2024-27072,0,0,21e910cf50ea565953242c80b6cde258546166e0d36d0f32695af1f87df3652c,2024-10-31T17:35:03.127000 -CVE-2024-27073,0,1,e46a75cf5fc003f1d71f465a90896b6249ef76a9bad5eda1a1b988838d2a6979,2024-11-06T19:35:15.903000 +CVE-2024-27073,0,0,e46a75cf5fc003f1d71f465a90896b6249ef76a9bad5eda1a1b988838d2a6979,2024-11-06T19:35:15.903000 CVE-2024-27074,0,0,1eb80e2232cf51208db1f3cef68d3f425247e597c202b41d3d631a42906e1aca,2024-11-05T10:16:27.387000 CVE-2024-27075,0,0,b7b88762306d0403ff5ef3850347356e2cd48c2fda797c5c18c89bc098824519,2024-11-05T10:16:27.590000 CVE-2024-27076,0,0,27005424f15ce206aef745406456863fc53e2307c06546ea31f3e5740f638709,2024-11-05T10:16:27.753000 @@ -249571,7 +249573,7 @@ CVE-2024-27812,0,0,e7c3223e43baf8d7f28688930e2d8c8938ef379a12a8d3feb5b2d21387591 CVE-2024-27813,0,0,7509894567bacd8024514a5dcee7ac821e790e4f4fe9721e1c69cc172a7632d5,2024-07-03T01:50:56.220000 CVE-2024-27814,0,0,4d984815b410e205b72405c2d467ac188e0b951fcaa72bcf867e3a4e9a308816,2024-07-03T01:50:56.430000 CVE-2024-27815,0,0,d4d929e969df5e6d126561402877d5f150bcfd9ba0154fd52fd603f8c3293f47,2024-07-03T01:50:56.640000 -CVE-2024-27816,0,1,4ad7196d1d7777ac482b799fc1cf864678982df9348a3a55f6e8a16124bb5751,2024-11-06T19:35:16.133000 +CVE-2024-27816,0,0,4ad7196d1d7777ac482b799fc1cf864678982df9348a3a55f6e8a16124bb5751,2024-11-06T19:35:16.133000 CVE-2024-27817,0,0,a6ab5e337d8094f63b0da74ff4d2361a68df33c6031350054ba5dcf0e38bfd15,2024-07-03T01:50:57.557000 CVE-2024-27818,0,0,195e34841c67a6c51f404c6aafece2a89e87db6332c4d32e1ca778a22a5fa453,2024-06-11T08:15:49.700000 CVE-2024-27819,0,0,b01d18af8106a4eb630a10d613bb8fd3a0b60e4d3d78300e68d51ac0725c6ff4,2024-07-03T01:50:58.300000 @@ -250217,7 +250219,7 @@ CVE-2024-28804,0,0,f7e3d6c3e14215e831a96b931ea15f5f72cb16cc7bfabd09d8b34530beca5 CVE-2024-28805,0,0,cb27f95e8662e6f56b138761747243a7826d2330470c48886448473bebd0bb3c,2024-10-25T18:35:04.053000 CVE-2024-28806,0,0,b0870c92c612bc52e55ac5da958c74e320d7e205346206836a7ae598363f9d27,2024-08-05T11:35:01.757000 CVE-2024-28807,0,0,5a4650d9d919dd00d60ada425df7221ee51ecb76af44fdd9eca355c706e3553b,2024-10-04T13:51:25.567000 -CVE-2024-28808,0,1,6fc8e572569d4866c6fa9429b9d27d19969ab5023429b014e564e428389657b1,2024-11-06T20:35:12.717000 +CVE-2024-28808,0,0,6fc8e572569d4866c6fa9429b9d27d19969ab5023429b014e564e428389657b1,2024-11-06T20:35:12.717000 CVE-2024-28809,0,0,32a8202bed4dd3b9abf5e0e2fc819e903ef58b53b2fb296a3ab4e72cb018ad65,2024-10-04T13:51:25.567000 CVE-2024-2881,0,0,65fc535be8a815e92053ae1d797e8977602b99048c471a2a98041135b70a0df9,2024-09-04T14:27:24.057000 CVE-2024-28810,0,0,3739176212869d56c3a3e998caee9cc2562b0d9aff07961502c94d248b44c109,2024-10-04T13:51:25.567000 @@ -250288,7 +250290,7 @@ CVE-2024-28890,0,0,75d08f12fbd468307e29dd7cbe4c7c3d5acf11ae18647e40fe18f61a37a2b CVE-2024-28891,0,0,31c9d1ebf9f51d96b38fd3616c071c476c1bf3bdfafbca895cdab316c5bcd3e3,2024-03-22T12:45:36.130000 CVE-2024-28893,0,0,6bb6e7d4eb5ffccbd865059808a0bb14806c115db17b0c7b58ceaf6722125e36,2024-07-03T01:51:55.153000 CVE-2024-28894,0,0,52f5c99a2393e8296645b919b77395855b2fbf6ddfb3ce5fad5f6c31f90cae17,2024-08-01T13:49:21.557000 -CVE-2024-28895,0,0,7f60c42026f8919d7327f07078b6071429a47272f57bf3ec7d964752af390988,2024-04-01T01:33:21.910000 +CVE-2024-28895,0,1,cc9ec60ced6c4f6144882d61563736eb0ac7e1a82255f1711a9c93674e3ffa46,2024-11-06T21:35:05.843000 CVE-2024-28896,0,0,82c8e7dd995d4781c98f0d7c761e7b443ea0ceb397f6b58ed2e6c96c2843e057,2024-04-10T13:24:00.070000 CVE-2024-28897,0,0,f9f596567c4f5a1d1ef0ea2267dd4bdd40c07a7d3f8bde3d914da43c8724226d,2024-04-10T13:24:00.070000 CVE-2024-28898,0,0,e62fdbb651dac3d1f5bd9c36f1fb9b36d2bc8afc331691f95d20f220846dce98,2024-04-10T13:24:00.070000 @@ -250781,7 +250783,7 @@ CVE-2024-29739,0,0,e1057fb9115257c9cc112890add5aab29e2addabc474164aa5dc49dc015af CVE-2024-2974,0,0,f10703d4490e9d3ed63c6b4abd6c9bf87d6d9b2c11e56d030e360944602d03aa,2024-04-10T13:23:38.787000 CVE-2024-29740,0,0,b8da55b65cd03c8f279340fc383178e4918b6ddc001e65f509694a717508d4d0,2024-07-03T01:52:30.657000 CVE-2024-29741,0,0,a475db5d288fe89871088d062fc43a43c29a2a7a1fc8050faa6de7801796db92,2024-04-08T18:49:25.863000 -CVE-2024-29742,0,1,3670333ea9fbb45ca159956c69b3ce18ac4d0f3cf08b138c36c7c46652b7f763,2024-11-06T20:35:13.483000 +CVE-2024-29742,0,0,3670333ea9fbb45ca159956c69b3ce18ac4d0f3cf08b138c36c7c46652b7f763,2024-11-06T20:35:13.483000 CVE-2024-29743,0,0,84c45acac68285953d0f847d89629f6df4afe2ae0557e844a739860834244671,2024-04-08T18:49:25.863000 CVE-2024-29744,0,0,261c7417210a4d10590c39459d063b6a3382c5fabd76d0ef2ba580fc9b59de43,2024-04-08T18:49:25.863000 CVE-2024-29745,0,0,40250cabd067f394dda6fb03fe08d83fd93611782b23244c4a5077110391f2e7,2024-08-14T16:59:22.427000 @@ -250993,7 +250995,7 @@ CVE-2024-29944,0,0,0c36a6d1c7372e4eb368749381c53b8250c9da970d136cfa0d6ab703ac139 CVE-2024-29945,0,0,545d8d8a5d454680f75ae96bc2bf76a65720f53d27f04c08caf122c1f6350f1e,2024-04-10T01:15:18.693000 CVE-2024-29946,0,0,fe7659ecbb6ae16d4fdd53bc892e5c7f96cebf8e48eee47ced0bee27647d82e8,2024-10-15T18:35:13.400000 CVE-2024-29947,0,0,8ad8469acdce0b9e6eead1629c69da154792700d4004eaaf5144ca5b844c0d04,2024-10-31T15:35:31.567000 -CVE-2024-29948,0,0,7ed27d99c23307d6fd7f79bc81ee07d6524ce20c9d05b450c959d1b570daca5b,2024-04-02T12:50:42.233000 +CVE-2024-29948,0,1,e90b613e60d3fcc3b6383faa88cb646693ff5f746ac5f86e3ba2e922d0499f32,2024-11-06T21:35:06.680000 CVE-2024-29949,0,0,8f69a1b2712eb97f7e6695f2c2705447de624d6bcea7462b789eaee89a32183e,2024-08-27T15:35:13.560000 CVE-2024-2995,0,0,5c930568d7253585b775f810f84df45baf66709200c70b2d2468f14a6758b594,2024-05-17T02:38:41.600000 CVE-2024-29950,0,0,9160d1bdf3252c379c3a5b7b30fcb4dec34616c1033f3f635941b6a0b940cac7,2024-04-17T20:08:21.887000 @@ -251173,7 +251175,7 @@ CVE-2024-30118,0,0,a600cbc3312207feafbf7858618a61f6dd2c38296d39ec303171804559f68 CVE-2024-30119,0,0,4baed8c508a821c818525782701105249753896feab644ba3efffba269f578b9,2024-07-03T01:53:51.120000 CVE-2024-3012,0,0,ae30314159430e25e9f2b09f2e0a440cd8bb99b7d72b62fa4eb73b4affe20188,2024-05-17T02:39:40.620000 CVE-2024-30120,0,0,f704816cf356d01bbdb53903a0b14bef34a589a7c9185030672ca3a1f14e4a1c,2024-06-17T12:42:04.623000 -CVE-2024-30122,0,0,b78e8f60e4d0df5148447073604013d9d8b1860e36c446b761d204643c69cb09,2024-10-25T12:56:36.827000 +CVE-2024-30122,0,1,9f485dd65437a7051ea4a1c20434d3eb51730baba0c509d8f2633bcd688cd79c,2024-11-06T22:33:46.797000 CVE-2024-30124,0,0,40a4254bc1bc6d9de977773d0f614d8309c4c262777ba96571bd84dac137cd34,2024-10-29T15:35:22.230000 CVE-2024-30125,0,0,1e8984bc19e1a45cd2a6c4ac0b43f227ca7f3a8dcb96ab9c16c6ada82e4faa52,2024-07-19T13:01:44.567000 CVE-2024-30126,0,0,6fc62f044a7f0651037fa78da0350df1d81591508f3d5a2909dd34802958ba70,2024-10-30T17:35:02.160000 @@ -252465,7 +252467,7 @@ CVE-2024-31874,0,0,2aaf0dfaa6414e1f138855d0f6d75787313d073eca635397ca103ff7f6449 CVE-2024-31878,0,0,c6557222267c2e9c166ed275e7cc9327cfea0693e0a8976b187deb7865aacef5,2024-06-11T18:23:27.153000 CVE-2024-31879,0,0,3d520028d5f0055139f730dd4a6eb2d11b7ab38a082798764c43108749c5b618,2024-05-20T13:00:34.807000 CVE-2024-3188,0,0,0566f9bb8e826930c137ba20908e573874a3f34d7900cbdeff699f1e3434f595,2024-07-08T14:19:01.160000 -CVE-2024-31880,0,1,be8757c255692a002ba856efab44e4c34f4b168589ca30c0f60b6ad09580b3cc,2024-11-06T20:39:55.200000 +CVE-2024-31880,0,0,be8757c255692a002ba856efab44e4c34f4b168589ca30c0f60b6ad09580b3cc,2024-11-06T20:39:55.200000 CVE-2024-31881,0,0,b3692d17c2d4f662273dec610556097ee0b8856656ac8f4835c5e840eb8a6228,2024-08-07T16:59:15.627000 CVE-2024-31882,0,0,2166c1d8e88429778073b60eb2a31c41e2b55293434c096888febf101419ae12,2024-09-21T10:15:05.403000 CVE-2024-31883,0,0,c4a2241ac7ebf5ea1afff59f8bf762360ac7a99942ee729cf3d03ae8864dc6f3,2024-08-02T15:06:08.297000 @@ -253546,7 +253548,7 @@ CVE-2024-3333,0,0,07adae09fe4330a280bc63a18371de9b336f80bb47bd9644f6cd6164f000d8 CVE-2024-33331,0,0,9615eb671a81caf99447cfe3f11a47c5fdeef0f060420da831650ede0c65f0d0,2024-04-28T23:15:07.120000 CVE-2024-33332,0,0,d4616ec3d8fa6c2d14a3b8584e4c2b0a6bdaf97d03584623852ed717f43b90a3,2024-07-03T01:57:52.560000 CVE-2024-33335,0,0,a6cf66b4ab082555dd66294d501cc06d5dc2570dbd2ca86fdaeca4a73e9bd728,2024-07-03T01:57:53.270000 -CVE-2024-33338,0,0,12ed0f94ef6bec704d8914890ae777ce00e44c5deae0f7e3194a77889af4a88d,2024-04-30T13:11:16.690000 +CVE-2024-33338,0,1,dc64e17746d1abab607747c6889c78b7b366c3abba84bde17473f7cc02765f3e,2024-11-06T22:35:06.803000 CVE-2024-33339,0,0,1bca262a290e7823541ac5c56ca607cb8f0a9af8877c53f0a0d3e60cf0f91403,2024-04-29T05:15:06.340000 CVE-2024-33342,0,0,060ace50da8b3f05ba7f67da31443071368333e101cc3fb61992e65c8481798b,2024-07-03T01:57:54.047000 CVE-2024-33343,0,0,0403ccc83281b5ef39242fa2607cb174a7fbc97f1fc5833b8133765daf81f98a,2024-07-03T01:57:54.823000 @@ -254715,10 +254717,10 @@ CVE-2024-34854,0,0,6f71aaf23a02a63a600f0bcc65e36559492677e420248555c46cf3409591d CVE-2024-3486,0,0,62a4db44c896a78c795e29b3f9a0c80ac2a4afae964bf16e58e73f8540a6d627,2024-05-15T18:35:11.453000 CVE-2024-3487,0,0,4ff2b905105ca048d90a2e33e25fd9b26128f3e6906b07d6299f870ad63ad55f,2024-05-15T18:35:11.453000 CVE-2024-3488,0,0,61e15575c22ff5a767d1be731e2c78e99681dc33e8575bc1a8940edf28193df9,2024-05-15T18:35:11.453000 -CVE-2024-34882,0,1,87af8750e4cb2492a1db05c6a474cbcbe5be6845ce5c5a5a7c082cfe43c24233,2024-11-06T19:28:48.523000 -CVE-2024-34883,0,1,722d63ecfd95cb7389789f2d22dce1739cb8a5a04275a6b5ae60854c8f1c6842,2024-11-06T19:28:34.900000 +CVE-2024-34882,0,0,87af8750e4cb2492a1db05c6a474cbcbe5be6845ce5c5a5a7c082cfe43c24233,2024-11-06T19:28:48.523000 +CVE-2024-34883,0,0,722d63ecfd95cb7389789f2d22dce1739cb8a5a04275a6b5ae60854c8f1c6842,2024-11-06T19:28:34.900000 CVE-2024-34885,0,0,c31fa281dfa61082a4cb2f1ba2ae0a4d2fc44e82a0f4b8396c582b05683b39d0,2024-11-05T17:35:15.887000 -CVE-2024-34887,0,1,f7d4e5d57e7e6933735283b4e369818932c8268719be24dd494c0cc41f5513e7,2024-11-06T19:28:15.613000 +CVE-2024-34887,0,0,f7d4e5d57e7e6933735283b4e369818932c8268719be24dd494c0cc41f5513e7,2024-11-06T19:28:15.613000 CVE-2024-3489,0,0,ea9bd95a767998b3f2d98747bee17b3d4435734727140c279148a23c9826811b,2024-05-02T18:00:37.360000 CVE-2024-34891,0,0,111963e19005c729fbfb50630519cf497707d87e3cea6358972fd367cefea299,2024-11-05T17:35:17.710000 CVE-2024-34899,0,0,8587795bcb80eaac03ccdd83ddcd275c805b44aa37227142776a20079d894d2e,2024-05-14T16:12:23.490000 @@ -255329,7 +255331,7 @@ CVE-2024-35831,0,0,e1fc7f0c23288b900631cc5188ff473f5fa3fdb4e972cc7bfb87b54902c97 CVE-2024-35832,0,0,16e51c73c8492f6c41ac59c1b69f8a852bd6d4b4a851405fa3ce91979c7ac289,2024-05-17T18:35:35.070000 CVE-2024-35833,0,0,844b1146e92e53029cbdbc55527e41e7896607bf9d9f2d333a13fe6ce9ec3a8c,2024-11-05T10:16:42.453000 CVE-2024-35834,0,0,5790f34b9247e53213fb9b46635ec2095a0128f0902ae39f44312cfee4914f39,2024-05-17T18:35:35.070000 -CVE-2024-35835,0,0,a276855569c1738142e0a9a7f5c96bc15a43a0942b6ac67b52a0d390795b7723,2024-11-05T10:16:42.810000 +CVE-2024-35835,0,1,ed8b4cf6c12992561ec5c36280ef97df65b951d69180a908fa49c8fe9773371a,2024-11-06T21:35:07.630000 CVE-2024-35836,0,0,9b23a77395582da383d04f18fcf78c45edf3e53bc59c70e097e42d6ca3f4fb8e,2024-05-17T18:35:35.070000 CVE-2024-35837,0,0,f29bf26182906cdda28aa14c299eef8b8b82348c3b88e46b3fbb87c2da0adaa9,2024-11-05T10:16:42.947000 CVE-2024-35838,0,0,0eb47f23eeab52dc3f477b4fcefe531f1dd8b9865cefb266d57aa7fa08848ac2,2024-05-17T18:35:35.070000 @@ -256055,7 +256057,7 @@ CVE-2024-3687,0,0,0790df61296b0929bb9b469121387dd5b7cd2b562eeab594414896ab3fb872 CVE-2024-36877,0,0,b5940056cb3357be0fc404faf9d20c26624de04b24c3b32151a8171b19c64e1f,2024-10-24T20:35:06.353000 CVE-2024-3688,0,0,fd7741416f20e86cc9ace0c3d1680a96020807dd7ba69d4b2d23070e23e95bee,2024-06-04T19:20:23.107000 CVE-2024-36880,0,0,2b0302be5dbda2a151ebafe5b0e4ed1edd1c138757440601b5f7ee782f06f5e4,2024-05-30T18:18:58.870000 -CVE-2024-36881,0,0,462fdd40c8930daf000297e318f0ca45e554b77fd5b7375bf9db7855ebe0f739,2024-05-30T18:18:58.870000 +CVE-2024-36881,0,1,6142f77b57b8fb6af09e3dfaa3e3ba0665300e19134a7939c625c7275226d261,2024-11-06T22:35:07.757000 CVE-2024-36882,0,0,c4e89f47d00b2e43c4a551b216b884b27dd65ec4bd9b8e9c9ad6f421591d687e,2024-05-30T18:18:58.870000 CVE-2024-36883,0,0,b7145948b44d2808530c599d92df6ba80fb8f0f74fbae1c4590915a25c35142a,2024-11-05T10:17:08.927000 CVE-2024-36884,0,0,99fb9b488ff5facb16fca9a70e4acded4f568a909f2397c5349d3312ba4256b7,2024-06-10T19:21:50.973000 @@ -257899,7 +257901,7 @@ CVE-2024-39332,0,0,c45d3a16d900c3a32f364ec197299d9fa083202fb226adfaa80ac6e38be04 CVE-2024-39334,0,0,94cae5ba65ec50bed6d17b2b54650000947aeee42b8249838d1ebdc24642a191,2024-06-24T12:57:36.513000 CVE-2024-39337,0,0,ae96e6e5658ac679eff4c9acfa518814cd5ee8874dd941939a565173aee28094,2024-06-24T12:57:36.513000 CVE-2024-39338,0,0,224e3a3c09358e014697d42ae118e958b11cd83a92fda65e581c38eeeb8c28af,2024-08-23T18:35:36.313000 -CVE-2024-39339,0,1,8276759a0218cbee90798944cb0970f3daa8fd8e677793f3d23bb043b043c911,2024-11-06T20:35:19.170000 +CVE-2024-39339,0,0,8276759a0218cbee90798944cb0970f3daa8fd8e677793f3d23bb043b043c911,2024-11-06T20:35:19.170000 CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453cac,2024-07-22T13:00:53.287000 CVE-2024-39340,0,0,fc621b442d86eea0a2e72227f2b14f23e2a67834630b902f47135788b8db4fd4,2024-09-23T15:15:13.907000 CVE-2024-39341,0,0,7c359c6b4015613fc52267fcd7e5d9646d4cfcd7e7964fd0c4b36316116d1347,2024-11-04T17:35:19.370000 @@ -259567,7 +259569,7 @@ CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb0 CVE-2024-42010,0,0,f347d4c1e17b119f6d9851ca0a7b1b017e286c890135bf10b6afdc7ab31c6734,2024-08-12T14:15:07.370000 CVE-2024-42011,0,0,780f257b76975d0fa98da03e1cf55c93a899ebb5f320ce83ce248dea2ed98368,2024-10-30T18:35:10.283000 CVE-2024-42017,0,0,88bb092060ad69b0ffe1434d2d5d47cfc3d35d9b74da347db32bafd31660675d,2024-10-29T15:35:30.713000 -CVE-2024-42018,0,1,d36c2d25618197055a9fa3c5f3f119418108bcdef04b170d040ef1fa8d21ed3f,2024-11-06T20:35:23.377000 +CVE-2024-42018,0,0,d36c2d25618197055a9fa3c5f3f119418108bcdef04b170d040ef1fa8d21ed3f,2024-11-06T20:35:23.377000 CVE-2024-42019,0,0,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000 CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000 CVE-2024-42020,0,0,997daa67acd86090eb264416d8bd0f016260f05083a5b2dc041d5c995b94ddfa,2024-10-27T15:35:08.650000 @@ -261685,7 +261687,7 @@ CVE-2024-45180,0,0,08348c7b1382a66372a71879585bc4b470bbbe0e7bc2a628091dcf790778c CVE-2024-45181,0,0,c1b3f50892c5ad2964a42f2f7c4bb1e591fc78d268d80e02244df3b7c3d3d502,2024-09-18T20:26:26.873000 CVE-2024-45182,0,0,e32901d25899173bbdbcd4da8de2dfd78b6a7db5248414eaa56acb1cb3e78104,2024-10-29T21:35:21.720000 CVE-2024-45184,0,0,4b6497f365552ae587c6f2bb1b9a699bbd0812ac854bb52824296d2cb32eb74f,2024-11-06T17:35:34.223000 -CVE-2024-45185,0,1,72bf9a166165415f673b127935e481d1ba969f414b40f9d8d7aa157b9fd36cb3,2024-11-06T19:35:16.420000 +CVE-2024-45185,0,0,72bf9a166165415f673b127935e481d1ba969f414b40f9d8d7aa157b9fd36cb3,2024-11-06T19:35:16.420000 CVE-2024-45186,0,0,77c3f8977c3993383fb80894e402f55d5d22584cb41b5e73c31c8d88ae8792cc,2024-10-04T13:50:43.727000 CVE-2024-45187,0,0,b29c34a9281e147a1f2b33bdd2a8c272cd39081d36dd9d0273787cf191e54024,2024-08-26T12:47:20.187000 CVE-2024-45188,0,0,b715e0fd98dc9de103c52fc47a055822268226fc14af5f0a01f3a3eab3db9def,2024-08-26T12:47:20.187000 @@ -262793,9 +262795,9 @@ CVE-2024-4724,0,0,1e35a8d6fb4d3f11b5f0d2a27ec10d126d5383267b650c161b24f017393ebb CVE-2024-47240,0,0,831fca78a2032785727b73be16136073448f60052857b8463d392806d75f9e1e,2024-10-22T15:28:55.637000 CVE-2024-47241,0,0,58a524562b790b246361050e626ab15f35dfe376489ed5527ca425e0e170e59e,2024-10-21T17:10:22.857000 CVE-2024-4725,0,0,038fe38ac4531e61bf3177f0fb7b7333acb4571c75548945a25c993c1898f93c,2024-06-04T19:20:47.930000 -CVE-2024-47253,0,0,d147a39553cbd3e23c9dc47e018d2a55806f90f34fa6d522e8f7794675a01185,2024-11-05T16:04:26.053000 -CVE-2024-47254,0,0,b8a0db85c06b44009d222028a5b119afe28ca7a95e927816b7a664426e22a4bf,2024-11-05T16:04:26.053000 -CVE-2024-47255,0,0,58719001e8fb814f33ea66a97cb372fbf5162fabaf050c7685b55017aa4f0c1f,2024-11-05T16:04:26.053000 +CVE-2024-47253,0,1,769fd45217280faed8eb9286b7d777459d03159dafc71924f67681fa771cd1e3,2024-11-06T22:23:29.663000 +CVE-2024-47254,0,1,7b2a0a7f61d863879927876e26f097e0efe10412130b78739d5752f40d5d539d,2024-11-06T22:22:01.623000 +CVE-2024-47255,0,1,30fe59c20fea93289fc2e58d886b91b21c216954eb831592a00b542847a8017b,2024-11-06T22:23:05.770000 CVE-2024-4726,0,0,270a342f16ba50f480fb87849b5e08fe420ac808bade1fd45455bab1f318f402,2024-06-12T20:15:13.070000 CVE-2024-4727,0,0,944186dc32a6b9f919ede42bcb555e3e922a4782a833eff4d2f1edc6462e7155,2024-05-17T02:40:35.380000 CVE-2024-4728,0,0,4f079b987c555f4e946bc2da0c8ee767b411a220a728ca55c5e58bef9ad4770e,2024-05-17T02:40:35.490000 @@ -263343,12 +263345,12 @@ CVE-2024-48047,0,0,3283398b8a8a75e7e31eaa0ac97fe84164a0704ec4cafc99d8da73b654c08 CVE-2024-48048,0,0,eca0ce0d3598806c22101f7f6a854102f0b0e3e7ffa812170ec79d143adac13e,2024-10-18T12:52:33.507000 CVE-2024-48049,0,0,ba765e8b87b10659dfbdf97a27a2e9aefb039f46631f1b6725a7dcd9a3bfe5d3,2024-10-23T16:12:12.127000 CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000 -CVE-2024-48050,0,0,646bf231dbaea3acef4518aef21584a610338d98cdda355c55a38e4e6901cac1,2024-11-05T16:04:26.053000 -CVE-2024-48052,0,1,6787dd59bbf6d5442afa73e6ab5a40a74adf87112b46990cfb17712cbdeff6c1,2024-11-06T20:35:29.830000 +CVE-2024-48050,0,1,efe925e5e80ddffc7c6c5a86aa417aaf629e499121448166a60f26bea5bdb8f9,2024-11-06T21:35:07.863000 +CVE-2024-48052,0,0,6787dd59bbf6d5442afa73e6ab5a40a74adf87112b46990cfb17712cbdeff6c1,2024-11-06T20:35:29.830000 CVE-2024-48057,0,0,8efebaa9314d97cebd20f7b67631fd55f5efc8a6a3e4bf2e70e24198b54d0deb,2024-11-05T18:35:10.987000 CVE-2024-48059,0,0,f3391fb334843a3fc6d7e517bab31554559de5a31b6bcad37ec348d6020d4ff8,2024-11-05T22:35:11.853000 CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000 -CVE-2024-48061,0,1,3afb2ef6eba7f21135f7c2c854e268a2fe30714157a06ae965803eb7d12a5161,2024-11-06T20:35:30.633000 +CVE-2024-48061,0,0,3afb2ef6eba7f21135f7c2c854e268a2fe30714157a06ae965803eb7d12a5161,2024-11-06T20:35:30.633000 CVE-2024-48063,0,0,7dad3075f35e3bd4e2e591484ba350f38d4e17902517b9e5e6279458bc0b207a,2024-11-01T13:15:12.020000 CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000 CVE-2024-48074,0,0,bca0d6dbb462c34776a53e7a729ed3fb0634f7f2ea1bca1d6a49bf976df47741,2024-10-29T19:35:18.963000 @@ -263483,7 +263485,7 @@ CVE-2024-48454,0,0,6b6ca49a060c554891c90c2e114c529f7522d5800fbd375e9b33b5c669ae0 CVE-2024-48459,0,0,901474388331b2012a4633aead65b3a3d672e9f671a2126655443e04f1134f78,2024-10-29T20:35:32.737000 CVE-2024-4846,0,0,354213cecebbad5d2830809199864dadc70a5508c38afeb47a24b8f17c4c0fe1,2024-06-25T18:50:42.040000 CVE-2024-48461,0,0,1c2083218c3c3685e23b071a99b5af3e2d4f1a943e6f041925ac67eedb8db886,2024-11-01T12:57:35.843000 -CVE-2024-48463,0,1,0bc7f3e7b8d54e56fe8dddcaa14275aa7a5820b50b73c79e9211e7d029e919b7,2024-11-06T19:35:17.717000 +CVE-2024-48463,0,0,0bc7f3e7b8d54e56fe8dddcaa14275aa7a5820b50b73c79e9211e7d029e919b7,2024-11-06T19:35:17.717000 CVE-2024-48465,0,0,79a85011a870c4c08986e482d9ae1db011c8d568f8e3fabc9f719daa8800b0cb,2024-10-30T18:35:15.410000 CVE-2024-4847,0,0,3e175fcde7743d0dafc07697dcd3c0585505cba50a8840c440513434f4a1e2f1,2024-05-15T16:40:19.330000 CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000 @@ -263603,7 +263605,7 @@ CVE-2024-48797,0,0,84ec47d2f0875bb5f244804e75fe25176b42fd271e656bf8a6c457b2cefda CVE-2024-48798,0,0,456e6efd1999d161e08d7d92b829aad7f771e38427be013211a406399a3cd174,2024-10-15T16:35:14.783000 CVE-2024-48799,0,0,896d6d04e9dd29e6b7911e8a609c1f9aedfadec2fef931b761998c1ee9dd8f3e,2024-10-15T15:35:21.350000 CVE-2024-48807,0,0,0d144ac83f7e3b1760f53caa259e9e3c92797a393e9f0218e5e59721fbc1c4dc,2024-11-01T12:57:03.417000 -CVE-2024-48809,0,1,47d6c9cea59d124dc3bf475183d772db66f12df1ce197c1776abbec8ee9e52a2,2024-11-06T19:33:54.977000 +CVE-2024-48809,0,0,47d6c9cea59d124dc3bf475183d772db66f12df1ce197c1776abbec8ee9e52a2,2024-11-06T19:33:54.977000 CVE-2024-4881,0,0,d7fec9dc10ea1cda5c43b7baed66b19ac106fead894074c09a02df3073ad45bc,2024-10-17T15:17:00.590000 CVE-2024-48813,0,0,b3275c3656b3f4746c55f236fa34d6d816026c088db796644a052e298f356a4f,2024-10-15T12:58:51.050000 CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000 @@ -263700,19 +263702,19 @@ CVE-2024-49211,0,0,69e61cc8ef233b9ff13db5267d11c58ce2f779bbae4d2a372191875e0959a CVE-2024-49214,0,0,25aabfb69f8e67934aa819c25fb6d72399969fd517c067365488311d807f5b98,2024-10-29T16:35:14.877000 CVE-2024-49215,0,0,a819d161a1c5d99bae1a3537b9c18fdd18dd7d46b44a848b4173d70d0fe6177d,2024-10-24T14:10:17.137000 CVE-2024-49216,0,0,6acffa32d15c0271869a6ba3150ee4d41d9276ea01fbd76b60626657e8a8c6f0,2024-10-16T16:38:14.557000 -CVE-2024-49217,0,1,85c8a2bd11800855c22552b1c5bc2a47d344ead2a19c71b4f2a282b639a5eb22,2024-11-06T20:53:26.900000 +CVE-2024-49217,0,0,85c8a2bd11800855c22552b1c5bc2a47d344ead2a19c71b4f2a282b639a5eb22,2024-11-06T20:53:26.900000 CVE-2024-49218,0,0,671ff343da2f5231222648ce902558a11e99be4b95e42fa72739eb1b7f6df389,2024-10-16T16:38:14.557000 -CVE-2024-49219,0,1,523812c25261161ba5e865409bca50593a9049b9d9f81554a1f3feb8b27a94b1,2024-11-06T20:45:08.233000 +CVE-2024-49219,0,0,523812c25261161ba5e865409bca50593a9049b9d9f81554a1f3feb8b27a94b1,2024-11-06T20:45:08.233000 CVE-2024-4922,0,0,692b7adcf322621580a484f8f9b29edc18ffd7d0d7aa81554818742dd70afb00,2024-06-20T20:15:20.020000 -CVE-2024-49220,0,1,0ef4eec8872e2d73dcc890c17ee54afbea8a47ddd760e9d6518b78fbad00b47c,2024-11-06T20:41:13.367000 -CVE-2024-49221,0,1,435842c334a660a0805ff050e49b3b4e8374bf2d1ce8479072841cb5d6919f8a,2024-11-06T20:54:50.527000 -CVE-2024-49223,0,1,09a19af6067ac9483c25986020d58f93da9bc5c27f813ea5fddcf3b973d0489b,2024-11-06T20:55:37.613000 +CVE-2024-49220,0,0,0ef4eec8872e2d73dcc890c17ee54afbea8a47ddd760e9d6518b78fbad00b47c,2024-11-06T20:41:13.367000 +CVE-2024-49221,0,0,435842c334a660a0805ff050e49b3b4e8374bf2d1ce8479072841cb5d6919f8a,2024-11-06T20:54:50.527000 +CVE-2024-49223,0,0,09a19af6067ac9483c25986020d58f93da9bc5c27f813ea5fddcf3b973d0489b,2024-11-06T20:55:37.613000 CVE-2024-49224,0,0,d5ed60c2b9217ee9e685d58c35300fb4a2b5ee5fb2fabe8974de51c33541a1ab,2024-10-21T16:31:21.593000 CVE-2024-49225,0,0,e045d0de6712b0b413de59de2f5ec4e42e811096a71880e86b358673c2e0d271,2024-10-21T16:33:00.403000 CVE-2024-49226,0,0,df9f2172258cc4d19c6bc195be87c4c9b1bf3d29dd47d60cce8b8efee0aca1a0,2024-10-16T16:38:14.557000 CVE-2024-49227,0,0,982f5e93a814f85c16cf1657f4ba0ca40040816eb1de34f1d6cd0e6ad4881dc1,2024-10-16T16:38:14.557000 CVE-2024-49228,0,0,38437087aa9be3056a11c6798501f534e4b6d4e733ee6d1c2006add27aba0767,2024-10-21T16:34:41.267000 -CVE-2024-49229,0,1,1e1752f517578bdb8e0d9073393d2366d6debf6a5e79cdf2932fb5c5b39d70c4,2024-11-06T20:40:30.740000 +CVE-2024-49229,0,0,1e1752f517578bdb8e0d9073393d2366d6debf6a5e79cdf2932fb5c5b39d70c4,2024-11-06T20:40:30.740000 CVE-2024-4923,0,0,c83198e21d781e3384db11f118092c5fbfa4a06f25d53a21adb6fe23f4380f17,2024-06-04T19:20:53.833000 CVE-2024-49230,0,0,89342cb8496066491f5b3d74f112ed9eac62497b67d283852db13e34d1cb2199,2024-10-21T16:37:15.807000 CVE-2024-49231,0,0,f1bca784a02483c4e1958c6dd7981ec9ffd6a01b629138db999d0ecc3e3b5b78,2024-10-21T16:37:46.010000 @@ -263721,7 +263723,7 @@ CVE-2024-49233,0,0,d15701a736a720d91ce7a393cddc119d365e279a269d1078a3d62a0f44c1e CVE-2024-49234,0,0,00d6361d85da44a4fa5e98b0b1923a417577ef114f956e9a3a98833720c5555c,2024-10-21T17:16:51.053000 CVE-2024-49235,0,0,81b65049d9913937f83fbb02a460f07035b9a9b3cadf729eaa07645e1a8a845f,2024-10-18T12:52:33.507000 CVE-2024-49236,0,0,a834af1459ab83c1993774b31ad0e95a9120429d91f000710053f11c8b77484e,2024-10-21T17:12:00.583000 -CVE-2024-49237,0,1,7c921f1ff6e06cda49ce0b96aba5ad95d5b8d4cbec93e4fa528982e38f3e12f5,2024-11-06T20:33:52.403000 +CVE-2024-49237,0,0,7c921f1ff6e06cda49ce0b96aba5ad95d5b8d4cbec93e4fa528982e38f3e12f5,2024-11-06T20:33:52.403000 CVE-2024-49238,0,0,4f7144ebb272524e891d29605f6262832b81db89d137d3761af7eafcb87405b6,2024-10-21T17:02:51.280000 CVE-2024-49239,0,0,6bb7d5c1f1f1cff54f68d71e2aed5ac9078819a889d9132789e8a59fb72db7e3,2024-10-21T16:26:20.220000 CVE-2024-4924,0,0,1b70fe45b850b22b8585c0417300fcac708f98c59205a2cdb72b2f32602e7fb3,2024-10-28T21:35:21.157000 @@ -263834,7 +263836,7 @@ CVE-2024-49361,0,0,f551e9abf09d421b2a081416ae11d1d19a91d21656c86d2519f1c7f0e2810 CVE-2024-49366,0,0,aa37188721af357c851b7fc33379d0188a960b9f96974610014dea2671948c2a,2024-10-23T15:13:58.783000 CVE-2024-49367,0,0,c9b869d3df961cbe6cd45089af2bd9e7675369053a02cc6adaf7052174946b00,2024-10-23T15:13:58.783000 CVE-2024-49368,0,0,8be4e296ee1ec30084981da91255270e2fb2a840014ea77ee3103f7dcd091363,2024-11-06T18:28:54.440000 -CVE-2024-49370,0,0,53182a6ce2637f054e6cf92c623239d8b52a4ad6590d2f00fca7214b8ca5b926,2024-10-25T12:56:36.827000 +CVE-2024-49370,0,1,a5cd1a59d8359f30b64653ed20bc47230e4ab479f61eed26e21f9e51248ce0d7,2024-11-06T22:31:30.160000 CVE-2024-49373,0,0,4aa9cfdbe744fd3ae046ca1eeb4ecc11fd5a7b167271bdbcafbe01dffbbbe75a,2024-10-30T21:16:59.213000 CVE-2024-49376,0,0,190dbce5bcb7aada06f0c8b342eac2772846cf5d2a5dcc8eecc468a0b9c5d5e3,2024-10-28T13:58:09.230000 CVE-2024-49377,0,0,f0a66be903c1ae0848c0330b2ecd5bcb10926f277636c57c6f6f956b317ea158,2024-11-06T18:17:17.287000 @@ -263960,7 +263962,7 @@ CVE-2024-49671,0,0,3444bda7ece1f693d338db4cc79d717f379cdd40dbc44287f6100eec0598b CVE-2024-49672,0,0,894e1f0624440e3d744307abfb9eb6064ef2e0f986134420bd1cb909f8951534,2024-10-29T14:34:04.427000 CVE-2024-49673,0,0,a91125aab1f7960fc60732cbd0b5d96ec0e4cbbc1297595b886e51864ee396a5,2024-10-29T14:34:04.427000 CVE-2024-49674,0,0,fd3d64b6e35b6eec27ee3c590860244c5a96a05725f767dbab9cf4cb455540e0,2024-11-01T12:57:03.417000 -CVE-2024-49675,0,0,c6e09b39dfdaf468c89ebc29589596eee519705df1761375fc6ab1777046823b,2024-10-25T12:56:36.827000 +CVE-2024-49675,0,1,c2223000da0c4ff77fd421192850d7f215252c939d91090d90395539c22636a9,2024-11-06T22:24:22.907000 CVE-2024-49676,0,0,dd890548fa1bcb69576eae4659e357c656125d877be6d06a44ddb178c101b43d,2024-10-25T12:56:36.827000 CVE-2024-49678,0,0,a75d300a9f5fa676504639fae81083885456f78da78e7660ba14ca16476d39c0,2024-10-29T14:34:04.427000 CVE-2024-49679,0,0,20c268334a4df168f30b45a50be9eb5ec235eddb6257303d5d7faf86cb14924e,2024-10-29T14:34:04.427000 @@ -264341,7 +264343,12 @@ CVE-2024-50333,0,0,dec570600936fbd1d13d82c721e514d60fa6e5733b1c9746045163c28aeb4 CVE-2024-50334,0,0,15b97ca0de89b7422ca1338a576d4ef71067410db416afc03dccd883f0aa73cd,2024-11-01T12:57:35.843000 CVE-2024-50335,0,0,d56c49b3f816f27a07e453cd7f51250fd71a85087fc2558a07e34513c66fcd1a,2024-11-06T18:17:17.287000 CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000 +CVE-2024-50340,1,1,0d8006f3dd7bf6960a884ab327616feab504d4fb3d7bece8ca7ec146ee406621,2024-11-06T21:15:05.527000 +CVE-2024-50341,1,1,56f80142c8430d4c9e687f36f4de41fdceb7e6a5fedaed2403afd3e967693c45,2024-11-06T21:15:05.747000 +CVE-2024-50342,1,1,ad2d68e63f0a467fed99a59db8fd904072ce7170031980e68557c0e58aa6b3be,2024-11-06T21:15:05.963000 +CVE-2024-50343,1,1,13d5f6bf56d0ed34f1292154c100bba90a98e43cd4d2ee727daa489f454989ed,2024-11-06T21:15:06.180000 CVE-2024-50344,0,0,01bf6c563fd2a47d8f1655926ebf620cef86a1d975ff50e33bcc2ca54db6ff27,2024-11-01T12:57:03.417000 +CVE-2024-50345,1,1,a906319e9df14e184a1c49f6767e11bdb542ba55960f07fbf1c2e373b98a833e,2024-11-06T21:15:06.383000 CVE-2024-50346,0,0,fb25cbb7b8a23f8bc4a8f048afe511d7d942fe5a9bb027a602dbfa956ec82a3d,2024-11-05T16:04:26.053000 CVE-2024-50347,0,0,09b35c9108a453337442f172c0c30bea977424cb455f7f1c26e8c5268b8f2c51,2024-11-01T12:57:03.417000 CVE-2024-50348,0,0,fa8a8e9e48d227df1afdc378e4ee00ffda2dd051bb15c8b477e290549096cb45,2024-11-06T14:49:46.073000 @@ -264506,7 +264513,7 @@ CVE-2024-5062,0,0,1dce1f93ce1b9242e76ae9cf090eb76ee6afadb656622c6eb5a578a5eb7601 CVE-2024-50623,0,0,71c6fad96d3194eba7d5d7edd081f9ad30cc6decd08744ac71e97f086f12f546,2024-10-30T21:35:11.373000 CVE-2024-50624,0,0,2f6d7cbc06ddd09de063e5bd0feef072f438fbd478c20a099bcf6256ed039f90,2024-10-30T21:35:12.223000 CVE-2024-5063,0,0,3ea00cb3f53084b2393e5a818811e5957f116b348338ce87a59f64292b187a9f,2024-06-04T19:20:57.760000 -CVE-2024-50637,0,1,856bb5c23e31310b984bfc1cc6773072f2db15e1db2b9091d52418ddd1c7384f,2024-11-06T20:35:33.010000 +CVE-2024-50637,0,0,856bb5c23e31310b984bfc1cc6773072f2db15e1db2b9091d52418ddd1c7384f,2024-11-06T20:35:33.010000 CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000 CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000 CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000 @@ -264594,10 +264601,10 @@ CVE-2024-5111,0,0,1e1510502a884c6f23b18cee848205aa75aeed3171cb87569d39e4078bf923 CVE-2024-51115,0,0,141fdcdabaf7c1ec8339c92338cf4045ebea4dbb9cb424f39276d597a3da7892,2024-11-06T18:17:17.287000 CVE-2024-51116,0,0,628a52b9257b50cdd3ccc07e8442fee438bd4b142b1a9d47d166ffcd98ae2965,2024-11-06T18:17:17.287000 CVE-2024-5112,0,0,689c76c95598a2f86ee6cadbc1c25854cf35ada5e2d2725de4638c44d7f73797,2024-06-04T19:21:00.007000 -CVE-2024-51127,0,1,5cbf021500110127b38f6de54e9823061ea68366b333afb20ed57e2e95d1d646,2024-11-06T19:25:14.607000 +CVE-2024-51127,0,0,5cbf021500110127b38f6de54e9823061ea68366b333afb20ed57e2e95d1d646,2024-11-06T19:25:14.607000 CVE-2024-5113,0,0,d52da1935c57c4016d19b1f0658aa6603ac8563b2af10cf87d5ce42568a3ed96,2024-06-04T19:21:00.113000 -CVE-2024-51132,0,1,741849111477a3dea70a3f4f159f318bcb11e986e2637afecf8a608cf70fdf87,2024-11-06T20:35:34.173000 -CVE-2024-51136,0,1,b7028b746c76b0b8db7064a5c94d8b9b8b4865b267652b712081099f88f87998,2024-11-06T19:31:15.230000 +CVE-2024-51132,0,0,741849111477a3dea70a3f4f159f318bcb11e986e2637afecf8a608cf70fdf87,2024-11-06T20:35:34.173000 +CVE-2024-51136,0,0,b7028b746c76b0b8db7064a5c94d8b9b8b4865b267652b712081099f88f87998,2024-11-06T19:31:15.230000 CVE-2024-5114,0,0,51655375bf74d88d0b44bf3106775b49d83b04b179d3446b4a92ffe727b17b66,2024-06-04T19:21:00.217000 CVE-2024-5115,0,0,566281473e2daa2487dd251e202869dc3059aeec07f7c63daa38b65c3bae3de7,2024-06-04T19:21:00.323000 CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000 @@ -264611,7 +264618,7 @@ CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3b CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b5e,2024-06-04T19:21:00.963000 CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000 CVE-2024-5124,0,0,ddf4d98394e08878019bd952c44f2cfd27f047274d82fb0e14f997780f16638c,2024-11-04T11:15:06.937000 -CVE-2024-51240,0,1,7445c6ba47df36c0613eb4cb1195b6f0f9ac8d38ec29d4a0f09a129257d8d4ff,2024-11-06T20:35:34.963000 +CVE-2024-51240,0,0,7445c6ba47df36c0613eb4cb1195b6f0f9ac8d38ec29d4a0f09a129257d8d4ff,2024-11-06T20:35:34.963000 CVE-2024-51242,0,0,e088a83b7d97849945ef8e4d907ce1041a9c29e696b96e8d85eb2989ae73aa7b,2024-11-01T12:57:03.417000 CVE-2024-51243,0,0,dc9a3bcceef7b79b773664e490e9177d288abe6b5bfadf448f185196016ec54c,2024-11-01T12:57:03.417000 CVE-2024-51244,0,0,1da847cb94e7afadbe7e923335974b45b31004bfdcaa7db1bb1325dae7dc5743,2024-11-05T19:28:09.403000 @@ -264645,13 +264652,13 @@ CVE-2024-5132,0,0,1e1b0edf57956ef222afc7fdedc2f2211203f4402428303961b463cfc0ea97 CVE-2024-51326,0,0,86a38e3ec445ab1743629a943074bd136cc3a19613d33223b8410daa71b7467f,2024-11-06T15:02:12.403000 CVE-2024-51327,0,0,6dff1d9ddb8570601185ec672ddf11cc5295d3cdce074e30aa360a3024bc5c57,2024-11-06T15:02:55.710000 CVE-2024-51328,0,0,768f8be19425d8bf4cf9b5b89b937b298b5cc7b18ce12eea5265b64902006bbb,2024-11-04T19:35:16.150000 -CVE-2024-51329,0,1,134d8b5a46fc76f9917a9aed6fc6c4366a039772d7dfe5acc179470dd93f05e6,2024-11-06T19:19:24.793000 +CVE-2024-51329,0,0,134d8b5a46fc76f9917a9aed6fc6c4366a039772d7dfe5acc179470dd93f05e6,2024-11-06T19:19:24.793000 CVE-2024-5133,0,0,ce2c3261ccf7a6af3656f0cd319a645240f50aa81e714a3f3634cc2f14d7c857,2024-10-17T16:41:53.717000 CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa19,2024-06-04T19:21:01.167000 CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000 CVE-2024-51358,0,0,be0f7decc72be7973be0b54dbe7f4f5d0c6692a8b1099b27d3347b7c8184f47f,2024-11-06T18:17:17.287000 CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000 -CVE-2024-51362,0,1,a6e1a40cf5e527208990e8a764ceb58cfefd7f1b5e4a2c9e1905064ef69946f2,2024-11-06T20:35:35.750000 +CVE-2024-51362,0,0,a6e1a40cf5e527208990e8a764ceb58cfefd7f1b5e4a2c9e1905064ef69946f2,2024-11-06T20:35:35.750000 CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000 CVE-2024-51377,0,0,27e24251b8fbb0cd40dc4b3232759f12cbe7946bd501f1e15145c4cb45ca2b57,2024-11-04T21:35:12.543000 CVE-2024-51378,0,0,25041eea06e8de15fb868a226604237e266234c162cafb1c59832cc50427a9bb,2024-11-01T12:57:03.417000 @@ -264664,7 +264671,7 @@ CVE-2024-51398,0,0,bf1065b8a7633fd26fe8d4034a94a303b4ea5c6fbbe5b2babb7e5454f0dc9 CVE-2024-51399,0,0,fc9a4f7feccdf87ac1072a742df0a1dc4f133fcfd9c1bf1ed214d196e18abc1b,2024-11-05T18:35:18.260000 CVE-2024-51406,0,0,219f1a907dc34e3139e40d74617f86db24d4b43908c87f25fb1a00f5ef8165d9,2024-11-04T19:35:17.410000 CVE-2024-51407,0,0,fda917e854eca07dcff49df0339535f103ba20de93b59699ac770c63d8521d21,2024-11-04T20:35:11.350000 -CVE-2024-51408,0,0,d571e63af91ee1143469f4bb57d330653f7c5f692a2406715d228afd31a4069d,2024-11-05T22:35:13.937000 +CVE-2024-51408,0,1,768985f0479d1b629ffaa63d05723a6cce6c2d94e338531281645d00b127aacd,2024-11-06T22:06:43.100000 CVE-2024-5141,0,0,5b006751fd2d8ca9e95fc8cef49a641b35089e8e5594eecd996fab7cf0d4e5e8,2024-07-24T17:58:54.867000 CVE-2024-51419,0,0,e145fdc3d6134b228049cf2c0ec561624aa79dc4de0c1da7a3c5f83de9d39a5f,2024-11-01T12:57:03.417000 CVE-2024-5142,0,0,8102929b9600e5392a308a1b7cfd863bc4b2848bde33508d601b388a9c02231d,2024-08-27T11:15:04.540000 @@ -264738,22 +264745,22 @@ CVE-2024-5159,0,0,6487690749e64572084b0b1ffb84b7950e8b682c3129ca3d21d0dbc204e9ec CVE-2024-5160,0,0,761bdadb9ac3f89d156978519ca326c5704c62592c7f03e703ecc7e802a865d7,2024-07-03T02:08:36.807000 CVE-2024-5161,0,0,f120c7db938e25c7983d6c400da502880d5ffbc93ab4e5e05351c3fca8fbd038,2024-07-24T17:54:42.387000 CVE-2024-5162,0,0,b916c521cfe3c1fb21956086b784f2a8541eeb514496e084206ecc726f921efe,2024-07-24T17:53:33.277000 -CVE-2024-51626,0,0,18e5c511939be2558be617df0507b9f12fa7d0e50de2af2ea7459c488b192636,2024-11-04T18:50:05.607000 +CVE-2024-51626,0,1,1464c1c98efb870dcd3b5a35eb6a7feff3782c73b32d47b788148d4cc3703554,2024-11-06T22:10:20.517000 CVE-2024-5163,0,0,1f45f157a740def8c3f1c2e097025198bc2166983108f63600058e7c57408d30,2024-08-21T06:15:07.277000 CVE-2024-5165,0,0,2b7469c3d25cc1e03e7fcca1607bc78daf489d82c018a0fbc4f3b815c328cf85,2024-05-24T01:15:30.977000 CVE-2024-5166,0,0,5c544eab21844e01fabd3874ed7776a55145987bd3a510311ad16f12f33bd2bc,2024-05-22T18:59:20.240000 CVE-2024-51661,0,0,9622f3634ba493f615ed2927ef92c179ee0dcb7280d813f52b441be81e048a8e,2024-11-04T18:50:05.607000 -CVE-2024-51665,0,0,56bf9fcd202b3ea9001e454522be11bd5978f32ce441602f00aa1bbb031128ad,2024-11-04T18:50:05.607000 +CVE-2024-51665,0,1,836ecda2a38ee75dca042d09339ec8247ed79262a6a8d01bd25035a2e84a5ce0,2024-11-06T22:07:10.707000 CVE-2024-5167,0,0,a26d674346a63d8730649864e3fcc22e33fb8b5877ed990bcd49874aef8d8c48,2024-08-01T13:59:41.660000 -CVE-2024-51672,0,0,02f34342c7a243fc55088e6039256e7de98338fcdc98f8b95fb11a31d6c364d4,2024-11-04T18:50:05.607000 -CVE-2024-51677,0,0,3a3f242a7ff6f80c9e763fd44464d5f149926414812ec89ee8be44bce14d131b,2024-11-04T18:50:05.607000 -CVE-2024-51678,0,0,ca8e2772685847dbfa010764deeffa0341c2b977902afc49a77a90e54643e432,2024-11-04T18:50:05.607000 +CVE-2024-51672,0,1,14a5ef0a87d874231b0f786642aa34aa9f0064d5c86f2b9992f4fe90d62559ab,2024-11-06T22:08:22.747000 +CVE-2024-51677,0,1,8b0f7a3853108bd14021b832cd2914a4bbd49dc774029c03bf84670c6d192320,2024-11-06T22:10:31.677000 +CVE-2024-51678,0,1,ce4086679232add4ebc40be30bdc12f20f02b66e38c181d2556e9473603941fd,2024-11-06T22:10:45.103000 CVE-2024-5168,0,0,cbe1b6c96aef7b506dd526cf00951c936dfc5233fd9563b4af0bf7fdab7a5899,2024-05-24T01:15:30.977000 -CVE-2024-51680,0,0,6a0e4dc35b32086a537bd54899180c80ad01a8c6290d199cc8c4684b6784a87c,2024-11-04T18:50:05.607000 -CVE-2024-51681,0,0,b2240f3aac7cf521a8583b6a4f2d4157a3e0c7b650f696a8fe56bed46dd560b4,2024-11-04T18:50:05.607000 -CVE-2024-51682,0,0,12881b8ca373787a3c057bd1e8d9525a2539983e5a3ed6d65b201c2ff661d1fb,2024-11-04T18:50:05.607000 -CVE-2024-51683,0,0,0f4d7566656d1bf0660d68c0ecfc6656f45f0a02e4da79c690f191f19760df22,2024-11-04T18:50:05.607000 -CVE-2024-51685,0,1,3ec6f589ce8427b20bd90f3e3168669c47fda17fa0f474f038e9a6e94e0e60b9,2024-11-06T19:34:31.590000 +CVE-2024-51680,0,1,e3d442fcfe0b4fceddb505a5eff13c52978f820716977fad69b0fdd39fa2c605,2024-11-06T22:10:59.270000 +CVE-2024-51681,0,1,6987ab81beb2df0eaa9da220f2d791ed5d8df3f0e18bd37d9a9b390a4eaf5a17,2024-11-06T22:11:16.003000 +CVE-2024-51682,0,1,aaba0581a3d811571ae104155388a45dd47ae531ed284c6ab0022efdb152fbe5,2024-11-06T22:12:02.353000 +CVE-2024-51683,0,1,f59d50717ee7305489d521abf4c5c1ef491e4436568b0e3c6dd145e0ad77427b,2024-11-06T22:12:19.803000 +CVE-2024-51685,0,0,3ec6f589ce8427b20bd90f3e3168669c47fda17fa0f474f038e9a6e94e0e60b9,2024-11-06T19:34:31.590000 CVE-2024-5169,0,0,882a6aa1fee4c71f4df51ce353ec6b27431ae776e2b2b23b3c5ba8c59ca21797,2024-08-02T15:00:10.200000 CVE-2024-5170,0,0,0357b8fbab1b76f01ca0dd625bf87ec8b80f7fd2d35927c69b68200ba07a11a4,2024-09-27T18:23:43.833000 CVE-2024-5171,0,0,dd574bf92e93c62d270c5e3b0cb384556e01dba1d43a5b9db2a02845fa564cb4,2024-07-23T18:09:56.753000 @@ -264761,18 +264768,19 @@ CVE-2024-5172,0,0,b469524ff2309ced9aec08b056578c23e8b8b5248adb8fcea2b38cb214c812 CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da6464,2024-06-26T12:44:29.693000 CVE-2024-51734,0,0,1cd13d8635d39c437cbb33b350735ec8f4fced2309825670ef2275f584df030b,2024-11-05T20:35:26.167000 CVE-2024-51735,0,0,4d68a755141918a79130284871e942292c9f37924aba0b94103b08a16b1df114,2024-11-06T18:17:17.287000 +CVE-2024-51736,1,1,379ee3f6d2d9accb42efa81e333f4e655bf347820c945b9b76849f1517ca172f,2024-11-06T21:15:06.600000 CVE-2024-51739,0,0,ee203b09953b612bf98226788bae2c648a3d93de0cc3326880af2a364d5bb790,2024-11-06T18:17:17.287000 CVE-2024-51740,0,0,8049b8be1065b4b8406a50a1cfde4cf3f6d43a64ebf12ea9e23c06d353369d55,2024-11-06T18:17:17.287000 CVE-2024-51744,0,0,df641a1b86566e97bb7074f2d337c50f51346569211bd554409b057e4c4da639,2024-11-05T16:04:26.053000 CVE-2024-51745,0,0,37db28606ad10f651e6f62f94e51def5fb50b1cfae8314bc96328b8b65ad324b,2024-11-06T18:17:17.287000 CVE-2024-51746,0,0,3cd98a267aedbbeeb4ad193a68e5bacd0a1a46a62f6ccca5880e9520a47fbe14,2024-11-06T18:17:17.287000 -CVE-2024-51751,1,1,5be875fb03dd84c20f8d271d29f5d3af24259f1c25883a44af5c941f68ac278f,2024-11-06T20:15:05.557000 +CVE-2024-51751,0,0,5be875fb03dd84c20f8d271d29f5d3af24259f1c25883a44af5c941f68ac278f,2024-11-06T20:15:05.557000 CVE-2024-51752,0,0,e4bd7dfff09e294fe713d9b76aba7fd50689256bee0d75d076093e0fe4805888,2024-11-06T18:17:17.287000 CVE-2024-51753,0,0,bf33e866ff4adcdc8169c4272817d8f4f57258218421ea7cafddbf38a1c6e30a,2024-11-06T18:17:17.287000 -CVE-2024-51754,1,1,ab8a7bcd0aef3f8778ab7f9b5f45ed9ae1110b90fa03bf7f3d612cb847bb1caa,2024-11-06T20:15:05.817000 -CVE-2024-51755,1,1,7150a21cdebe589f49ef7bb36b4fad5dd8f080a46c27ff91852f0fd345ca5552,2024-11-06T20:15:06.077000 +CVE-2024-51754,0,0,ab8a7bcd0aef3f8778ab7f9b5f45ed9ae1110b90fa03bf7f3d612cb847bb1caa,2024-11-06T20:15:05.817000 +CVE-2024-51755,0,0,7150a21cdebe589f49ef7bb36b4fad5dd8f080a46c27ff91852f0fd345ca5552,2024-11-06T20:15:06.077000 CVE-2024-51756,0,0,7e7db3439c4e45c36bf53dc70dbe779b982ce3f3056b8757e470dab737dd37ba,2024-11-06T18:17:17.287000 -CVE-2024-51757,1,1,6469de8ff53e3c67b6dea69ecf92a7c1c9657d29eb32af44797d561418c06bb5,2024-11-06T20:15:06.337000 +CVE-2024-51757,0,1,94efafdd8ea10b2a0656841928d239afab2750ddf6f06a644397622ff5d6eb53,2024-11-06T21:15:06.807000 CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000 CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000 CVE-2024-51774,0,0,669a599ada079f107ff827e67143f083d374e9861d23daa36ef167763e62d529,2024-11-06T17:35:41.767000 @@ -264794,7 +264802,7 @@ CVE-2024-5194,0,0,8b46532d156b8b3c9309e51d70c9e0d478e4dda8959433d551fb9bae0e23a4 CVE-2024-5195,0,0,a944b3bf4d682f545e6cb40d57a8d207d6c568eeb84f910c894251f96395025e,2024-06-04T19:21:02.077000 CVE-2024-5196,0,0,fe96c1eeb1213602679ab014fd535da1193da9cfe24103856ca34e734451708d,2024-06-04T19:21:02.183000 CVE-2024-5197,0,0,01172b8d20369801e638a1092c2896c82735a2e04e92ac5031b21558c286d96f,2024-06-16T21:15:50.820000 -CVE-2024-51988,1,1,2d17fe71a727874da6f8f6c999ae55f95138104406d5cbbc92ea592560164e88,2024-11-06T20:15:06.513000 +CVE-2024-51988,0,0,2d17fe71a727874da6f8f6c999ae55f95138104406d5cbbc92ea592560164e88,2024-11-06T20:15:06.513000 CVE-2024-5199,0,0,8fdec235790e80ab25bf344b6e4e20c94c0a12c0bede9440d8c94965619f66eb,2024-10-28T21:35:23.237000 CVE-2024-5201,0,0,64f0da97aed099b7390504c61b2a584cf361827a66e92ad103d8b3995d82fd05,2024-05-24T01:15:30.977000 CVE-2024-52013,0,0,d9e82ae91803da33afed578345dc1a358b894658d92808fa986ec4533aa8b6bc,2024-11-05T16:35:36.337000 @@ -265216,7 +265224,7 @@ CVE-2024-5638,0,0,68ca32104039c555501740b79d9d053899dfa4f77cf28bfda3416440a76684 CVE-2024-5639,0,0,492ad0d47d56549888d5f48237edc279d0d32d853604c73193623cce2eae0704,2024-06-24T19:24:23.883000 CVE-2024-5640,0,0,8f33c54e7012000a851267741a433d3aa85134979ee0675a7c8c94bf7d26740a,2024-10-28T18:32:59.690000 CVE-2024-5641,0,0,1f23612877686d6e5143238f62dc02125c3d0a0d8a2499e0ec524473edb424e6,2024-07-05T17:14:44.840000 -CVE-2024-5642,0,0,bf58acd5f015124d4fa0c6ffb75779edb6afb99b41961d291eb7083813f4952e,2024-07-28T14:15:11.220000 +CVE-2024-5642,0,1,4ed20babf058b3e506d0b66042a68f289ffcc8ee77fb96f7765ea8a1aca1a90e,2024-11-06T21:35:08.690000 CVE-2024-5644,0,0,35f5cce546de98cfce88cd6571a328f218696f426033c4c0d2e31a431c078a61,2024-08-01T13:59:56.260000 CVE-2024-5645,0,0,81ee0a48f8169b5fa6535595d6aeb783fba06dd48c6af38e338fa98641a45635,2024-06-11T17:57:47.197000 CVE-2024-5646,0,0,54dff546debf316c7620aa15614b89fe6dc050f45cfaa67554d377c50ceda179,2024-06-13T18:36:09.013000 @@ -267758,7 +267766,7 @@ CVE-2024-8767,0,0,17744319861b5196f5a63bddf3c3c4ab0c9d11dd531ce1a95816c3c9e2193e CVE-2024-8768,0,0,a982019cb3e87700eba7d9922c696779881e32d71a95f1662a9030bc9b15c0d2,2024-09-20T12:30:51.220000 CVE-2024-8770,0,0,092503c78b1ec747d9cd01983ee6d65a49e2eef82871ebe4802ea35253afc2e7,2024-09-27T13:49:29.690000 CVE-2024-8771,0,0,8440e358d9ef6f31cf81e66a5a83b441147afe75ee9c3ad99e3f4526f8f30874,2024-09-30T12:46:20.237000 -CVE-2024-8775,0,1,b1c934c0f161c282b2ea9c3e55f934218dc75fc137b9f5d065788131a5d3a709,2024-11-06T20:15:06.763000 +CVE-2024-8775,0,0,b1c934c0f161c282b2ea9c3e55f934218dc75fc137b9f5d065788131a5d3a709,2024-11-06T20:15:06.763000 CVE-2024-8776,0,0,5f24148b1f2c0e63f94c4b7c4eb112791a653befffb86dbacf9b6c99ebdd5088,2024-09-20T16:38:51.910000 CVE-2024-8777,0,0,abf6497bbb9ed542a83ea295cf446b5b0a64e2a3685378272b7c6e8d7a6d8418,2024-09-20T14:22:19.840000 CVE-2024-8778,0,0,04f76622204759cf035b6cf776488dd4e0117dc8a28cbc6a6f40333ff951b555,2024-09-20T14:23:37.697000 @@ -268097,7 +268105,7 @@ CVE-2024-9327,0,0,9bb62fae114b1c29588ad2672d640859a17a9f3af7375a799fc34e218e9d39 CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000 CVE-2024-9329,0,0,45383f73609cef2d97bbcc2a37f0da26902c147f00f71a92dd725b6696a1e709,2024-10-07T15:52:47.267000 CVE-2024-9333,0,0,29d3d497691b594c7c49948d48e229bbe8c23108f2eef552b2f92cd89acf1f06,2024-10-04T13:50:43.727000 -CVE-2024-9341,0,1,c98b60eddd0169df613fb8aaf3d2ac969a4fdceebcb7e9147fd8771afde7bcb8,2024-11-06T20:15:06.917000 +CVE-2024-9341,0,0,c98b60eddd0169df613fb8aaf3d2ac969a4fdceebcb7e9147fd8771afde7bcb8,2024-11-06T20:15:06.917000 CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000 CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000 CVE-2024-9346,0,0,62d32d35d45fd426e51a0ed8886468a70178025d3407ee17aee209be78f55958,2024-10-15T12:58:51.050000 @@ -268301,8 +268309,8 @@ CVE-2024-9667,0,0,4c2cf3e987949daa6f6783b329a60c01d9a6ec3570b24191ca01f99d0f544e CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000 CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000 CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000 -CVE-2024-9675,0,1,3cadd63f68fceef4cb7f647684ea61e6a2900e849efc03dcf4b2582d5452b03c,2024-11-06T20:15:07.083000 -CVE-2024-9676,0,1,46624241f6a62cf8ced9778d99fdffe768deb7f9be20051bd0eb0c649c38f427,2024-11-06T20:15:07.410000 +CVE-2024-9675,0,0,3cadd63f68fceef4cb7f647684ea61e6a2900e849efc03dcf4b2582d5452b03c,2024-11-06T20:15:07.083000 +CVE-2024-9676,0,0,46624241f6a62cf8ced9778d99fdffe768deb7f9be20051bd0eb0c649c38f427,2024-11-06T20:15:07.410000 CVE-2024-9677,0,0,944e049c847e061867c66e6b586a0cd99260b04bc2e2059d736567bf47cae00c,2024-10-23T15:12:34.673000 CVE-2024-9680,0,0,db0e4e19e09673238ffe3dfbb8e95974e9346a75b4fd6d9319c03e5970bb644e,2024-10-16T15:07:36.123000 CVE-2024-9681,0,0,5184b45d0c5be56c6e66f5f4d21584d3fd220046fb9bac6604ac868b54d81bd8,2024-11-06T18:17:17.287000 @@ -268310,7 +268318,7 @@ CVE-2024-9683,0,0,a648737766df3deb74ddc86e7dcd00883598b7b3c943d9054e11451b5f1854 CVE-2024-9685,0,0,a93c724a8b2ee6ce4a46c54a35028c939ad55b1fb441a5b479f473edc57de420,2024-10-15T14:30:00.483000 CVE-2024-9686,0,0,8a91e1ae5070fa70337820c934475166fa3e061411ab7464abf260ed961a0668,2024-11-06T16:19:04.333000 CVE-2024-9687,0,0,ae8c4791dae243694c67044fa0088a221548cce6d43bc08144a537d590a79ff2,2024-10-17T21:11:14.197000 -CVE-2024-9689,0,1,3b3e5990fb9f08a51cd41a7e6a396c2471cfce792d4015e2d1365961bc64adf9,2024-11-06T19:14:53.737000 +CVE-2024-9689,0,0,3b3e5990fb9f08a51cd41a7e6a396c2471cfce792d4015e2d1365961bc64adf9,2024-11-06T19:14:53.737000 CVE-2024-9692,0,0,6637a78c6a5a322d069f0f0384d674a49925fbfbbf719ba95a3af042d35fdc19,2024-10-25T12:56:07.750000 CVE-2024-9696,0,0,78e7cb06b620e1544d9c6811ae0c44cf981cc195d0067b351c711666292c356e,2024-10-15T12:57:46.880000 CVE-2024-9700,0,0,ee544a9b692e7ab9f9ab56395ca8011eb3604c34474b906ade007707a048f142,2024-11-01T12:57:03.417000 @@ -268401,7 +268409,7 @@ CVE-2024-9896,0,0,09339b3269859e496224a4ee93cb949746eeb659cdbf7ff07d2c92a00e93ed CVE-2024-9897,0,0,c000f038202bbdf161648c8f1d74fa0a88aad69aa13c730474d96a3fd2473014,2024-11-01T15:27:56.797000 CVE-2024-9898,0,0,34647a8f54872789fb9d153b7e32e611f940664cb6907ab09e4df7e32cdaa8ba,2024-10-18T12:52:33.507000 CVE-2024-9899,0,0,6c76ba1fcc7597d7958a7e74c7de009221352c8fe34414d847a1d4d85ee09e27,2024-10-23T21:15:15.050000 -CVE-2024-9902,0,1,5a17b86729ea7d243eb9cea611038373d4bbb9ba8a32113c474ad669aed65087,2024-11-06T20:15:07.820000 +CVE-2024-9902,0,0,5a17b86729ea7d243eb9cea611038373d4bbb9ba8a32113c474ad669aed65087,2024-11-06T20:15:07.820000 CVE-2024-9903,0,0,244e0ad624c75743e190bc7da6a1b45fe195aaf738d59f8decfde97c8722448f,2024-10-15T12:57:46.880000 CVE-2024-9904,0,0,b8f5bdf1fde920247f061f9c3939c42469f53e3148abd589ac11ba36d4728079,2024-10-15T12:57:46.880000 CVE-2024-9905,0,0,09e20420cf063b331c2f2444287faaf461bdb42e483d150bc77bc6c327c543d3,2024-10-16T22:12:18.153000