Auto-Update: 2024-11-06T23:00:20.311060+00:00

This commit is contained in:
cad-safe-bot 2024-11-06 23:03:21 +00:00
parent 43ca830a78
commit 5579586833
60 changed files with 2794 additions and 300 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-47075", "id": "CVE-2021-47075",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-01T22:15:47.170", "published": "2024-03-01T22:15:47.170",
"lastModified": "2024-03-01T22:22:25.913", "lastModified": "2024-11-06T22:35:00.660",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvmet: repara la p\u00e9rdida de memoria en nvmet_alloc_ctrl() Al crear ctrl en nvmet_alloc_ctrl(), si cntlid_min es mayor que cntlid_max del subsistema y salta a la etiqueta \"out_free_changed_ns_list\", pero el ctrl->sqs falta para liberarse. Solucione este problema saltando a la etiqueta \"out_free_sqs\"." "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nvmet: repara la p\u00e9rdida de memoria en nvmet_alloc_ctrl() Al crear ctrl en nvmet_alloc_ctrl(), si cntlid_min es mayor que cntlid_max del subsistema y salta a la etiqueta \"out_free_changed_ns_list\", pero el ctrl->sqs falta para liberarse. Solucione este problema saltando a la etiqueta \"out_free_sqs\"."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb", "url": "https://git.kernel.org/stable/c/4720f29acb3fe67aa8aa71e6b675b079d193aaeb",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-40113", "id": "CVE-2023-40113",
"sourceIdentifier": "security@android.com", "sourceIdentifier": "security@android.com",
"published": "2024-02-15T23:15:08.597", "published": "2024-02-15T23:15:08.597",
"lastModified": "2024-02-16T13:37:55.033", "lastModified": "2024-11-06T21:35:01.543",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,30 @@
"value": "En varias ubicaciones, existe una forma posible para que las aplicaciones accedan a datos de mensajes entre usuarios debido a una falta de verificaci\u00f3n de permiso. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." "value": "En varias ubicaciones, existe una forma posible para que las aplicaciones accedan a datos de mensajes entre usuarios debido a una falta de verificaci\u00f3n de permiso. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"references": [ "references": [
{ {
"url": "https://android.googlesource.com/platform/packages/providers/TelephonyProvider/+/64ca6ba981745875dbf2064e0b2a47f8194c4f0a", "url": "https://android.googlesource.com/platform/packages/providers/TelephonyProvider/+/64ca6ba981745875dbf2064e0b2a47f8194c4f0a",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-46049", "id": "CVE-2023-46049",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-03-27T06:15:10.037", "published": "2024-03-27T06:15:10.037",
"lastModified": "2024-08-02T21:15:49.197", "lastModified": "2024-11-06T22:35:01.887",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [ "cveTags": [
{ {
@ -22,7 +22,42 @@
"value": "LLVM 15.0.0 tiene una desreferencia de puntero NULL en la funci\u00f3n parseOneMetadata() a trav\u00e9s de un archivo pdflatex.fmt modificado (o quiz\u00e1s un archivo .o modificado) a llvm-lto. NOTA: esto est\u00e1 en disputa porque no se explica la relaci\u00f3n entre pdflatex.fmt y cualquier interfaz de lenguaje LLVM, y porque una falla de la aplicaci\u00f3n llvm-lto debe clasificarse como un problema de usabilidad." "value": "LLVM 15.0.0 tiene una desreferencia de puntero NULL en la funci\u00f3n parseOneMetadata() a trav\u00e9s de un archivo pdflatex.fmt modificado (o quiz\u00e1s un archivo .o modificado) a llvm-lto. NOTA: esto est\u00e1 en disputa porque no se explica la relaci\u00f3n entre pdflatex.fmt y cualquier interfaz de lenguaje LLVM, y porque una falla de la aplicaci\u00f3n llvm-lto debe clasificarse como un problema de usabilidad."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [ "references": [
{ {
"url": "http://seclists.org/fulldisclosure/2024/Jan/66", "url": "http://seclists.org/fulldisclosure/2024/Jan/66",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52433", "id": "CVE-2023-52433",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-20T13:15:08.140", "published": "2024-02-20T13:15:08.140",
"lastModified": "2024-06-16T13:15:50.413", "lastModified": "2024-11-06T22:35:02.950",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netfilter: nft_set_rbtree: omitir sincronizaci\u00f3n GC para nuevos elementos en esta transacci\u00f3n los nuevos elementos en esta transacci\u00f3n pueden caducar antes de que finalice dicha transacci\u00f3n. Omita la sincronizaci\u00f3n del GC para dichos elementos; de lo contrario, la ruta de confirmaci\u00f3n podr\u00eda pasar por encima de un objeto ya liberado. Una vez finalizada la transacci\u00f3n, async GC recopilar\u00e1 dicho elemento caducado." "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: netfilter: nft_set_rbtree: omitir sincronizaci\u00f3n GC para nuevos elementos en esta transacci\u00f3n los nuevos elementos en esta transacci\u00f3n pueden caducar antes de que finalice dicha transacci\u00f3n. Omita la sincronizaci\u00f3n del GC para dichos elementos; de lo contrario, la ruta de confirmaci\u00f3n podr\u00eda pasar por encima de un objeto ya liberado. Una vez finalizada la transacci\u00f3n, async GC recopilar\u00e1 dicho elemento caducado."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-273"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/03caf75da1059f0460666c826e9f50e13dfd0017", "url": "https://git.kernel.org/stable/c/03caf75da1059f0460666c826e9f50e13dfd0017",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52618", "id": "CVE-2023-52618",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-18T11:15:09.110", "published": "2024-03-18T11:15:09.110",
"lastModified": "2024-11-04T13:16:41.660", "lastModified": "2024-11-06T22:35:03.783",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: block/rnbd-srv: Comprueba si hay un desbordamiento de cadena improbable. Dado que \"dev_search_path\" t\u00e9cnicamente puede ser tan grande como PATH_MAX, exist\u00eda el riesgo de truncamiento al copiarlo y una segunda cadena en \" full_path\" ya que tambi\u00e9n ten\u00eda un tama\u00f1o PATH_MAX. Las compilaciones W=1 informaban esta advertencia: drivers/block/rnbd/rnbd-srv.c: En funci\u00f3n 'process_msg_open.isra': drivers/block/rnbd/rnbd-srv.c:616:51: advertencia: '% La salida de la directiva s se puede truncar escribiendo hasta 254 bytes en una regi\u00f3n de tama\u00f1o entre 0 y 4095 [-Wformat-truncation=] 616 | snprintf(full_path, PATH_MAX, \"%s/%s\", | ^~ En la funci\u00f3n 'rnbd_srv_get_full_path', insertada desde 'process_msg_open.isra' en drivers/block/rnbd/rnbd-srv.c:721:14: drivers/block /rnbd/rnbd-srv.c:616:17: nota: 'snprintf' genera entre 2 y 4351 bytes en un destino de tama\u00f1o 4096 616 | snprintf(full_path, PATH_MAX, \"%s/%s\", | ^~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 617 | dev_search_path, dev_name); | ~~~~~~~ ~~~~~~~~~~~~~~~~~~~ Para solucionar este problema, verifique incondicionalmente el truncamiento (como ya se hizo en el caso en el que \"%SESSNAME%\" estaba presente)." "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: block/rnbd-srv: Comprueba si hay un desbordamiento de cadena improbable. Dado que \"dev_search_path\" t\u00e9cnicamente puede ser tan grande como PATH_MAX, exist\u00eda el riesgo de truncamiento al copiarlo y una segunda cadena en \" full_path\" ya que tambi\u00e9n ten\u00eda un tama\u00f1o PATH_MAX. Las compilaciones W=1 informaban esta advertencia: drivers/block/rnbd/rnbd-srv.c: En funci\u00f3n 'process_msg_open.isra': drivers/block/rnbd/rnbd-srv.c:616:51: advertencia: '% La salida de la directiva s se puede truncar escribiendo hasta 254 bytes en una regi\u00f3n de tama\u00f1o entre 0 y 4095 [-Wformat-truncation=] 616 | snprintf(full_path, PATH_MAX, \"%s/%s\", | ^~ En la funci\u00f3n 'rnbd_srv_get_full_path', insertada desde 'process_msg_open.isra' en drivers/block/rnbd/rnbd-srv.c:721:14: drivers/block /rnbd/rnbd-srv.c:616:17: nota: 'snprintf' genera entre 2 y 4351 bytes en un destino de tama\u00f1o 4096 616 | snprintf(full_path, PATH_MAX, \"%s/%s\", | ^~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 617 | dev_search_path, dev_name); | ~~~~~~~ ~~~~~~~~~~~~~~~~~~~ Para solucionar este problema, verifique incondicionalmente el truncamiento (como ya se hizo en el caso en el que \"%SESSNAME%\" estaba presente)."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/5b9ea86e662035a886ccb5c76d56793cba618827", "url": "https://git.kernel.org/stable/c/5b9ea86e662035a886ccb5c76d56793cba618827",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52684", "id": "CVE-2023-52684",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-17T15:15:19.583", "published": "2024-05-17T15:15:19.583",
"lastModified": "2024-05-17T18:35:35.070", "lastModified": "2024-11-06T21:35:01.813",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,30 @@
"value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: firmware: qcom: qseecom: corrige p\u00e9rdidas de memoria en rutas de error Corrija instancias de devoluci\u00f3n de c\u00f3digos de error directamente en lugar de saltar a las etiquetas relevantes donde se liberar\u00eda la memoria asignada para las llamadas SCM." "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: firmware: qcom: qseecom: corrige p\u00e9rdidas de memoria en rutas de error Corrija instancias de devoluci\u00f3n de c\u00f3digos de error directamente en lugar de saltar a las etiquetas relevantes donde se liberar\u00eda la memoria asignada para las llamadas SCM."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/6c57d7b593c4a4e60db65d5ce0fe1d9f79ccbe9b", "url": "https://git.kernel.org/stable/c/6c57d7b593c4a4e60db65d5ce0fe1d9f79ccbe9b",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52738", "id": "CVE-2023-52738",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T16:15:13.740", "published": "2024-05-21T16:15:13.740",
"lastModified": "2024-05-21T16:53:56.550", "lastModified": "2024-11-06T21:35:02.090",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu/fence: se solucion\u00f3 el error debido a que drm_sched init/fini no coincide. Actualmente, amdgpu llama a drm_sched_fini() desde la rutina SW fini del controlador de valla; se espera que se llame a dicha funci\u00f3n. s\u00f3lo despu\u00e9s de que la funci\u00f3n de inicio respectiva, drm_sched_init(), se haya ejecutado correctamente. Sucede que recientemente nos enfrentamos a una falla en la sonda del controlador en Steam Deck, y se llam\u00f3 a la funci\u00f3n drm_sched_fini() incluso sin que su contraparte se hubiera llamado previamente, lo que provoc\u00f3 el siguiente error: amdgpu: la sonda de 0000:04:00.0 fall\u00f3 con error -110 ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000090 PGD 0 P4D 0 Ups: 0002 [#1] PREEMPT SMP NOPTI CPU: 0 PID: 609 Comm: systemd-udevd No contaminado 6.2.0-rc3-gpiccoli #338 Nombre del hardware : Valve Jupiter/Jupiter, BIOS F7A0113 04/11/2022 RIP: 0010:drm_sched_fini+0x84/0xa0 [gpu_sched] [...] Seguimiento de llamadas: amdgpu_fence_driver_sw_fini+0xc8/0xd0 [amdgpu] amdgpu_device_fini_sw+0x2b/0x3b0 [ amdgpu] amdgpu_driver_release_kms+0x16/0x30 [amdgpu] devm_drm_dev_init_release+0x49/0x70 [...] Para evitar eso, verifique si drm_sched se inicializ\u00f3 correctamente para un anillo determinado antes de llamar a su contraparte fini. Observe que idealmente usar\u00edamos sched.ready para eso; dicho campo se establece como lo \u00faltimo en drm_sched_init(). Pero amdgpu parece \"sobreescribir\" el significado de dicho campo; en el ejemplo anterior, por ejemplo, fue un anillo GFX el que provoc\u00f3 el bloqueo y el campo sched.ready se configur\u00f3 en verdadero en la rutina de inicio del anillo, independientemente del estado de el programador DRM. Por lo tanto, terminamos usando sched.ops seg\u00fan la sugerencia de Christian [0] y tambi\u00e9n eliminamos la verificaci\u00f3n no_scheduler [1]. [0] https://lore.kernel.org/amd-gfx/984ee981-2906-0eaf-ccec-9f80975cb136@amd.com/ [1] https://lore.kernel.org/amd-gfx/cd0e2994- f85f-d837-609f-7056d5fb7231@amd.com/" "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu/fence: se solucion\u00f3 el error debido a que drm_sched init/fini no coincide. Actualmente, amdgpu llama a drm_sched_fini() desde la rutina SW fini del controlador de valla; se espera que se llame a dicha funci\u00f3n. s\u00f3lo despu\u00e9s de que la funci\u00f3n de inicio respectiva, drm_sched_init(), se haya ejecutado correctamente. Sucede que recientemente nos enfrentamos a una falla en la sonda del controlador en Steam Deck, y se llam\u00f3 a la funci\u00f3n drm_sched_fini() incluso sin que su contraparte se hubiera llamado previamente, lo que provoc\u00f3 el siguiente error: amdgpu: la sonda de 0000:04:00.0 fall\u00f3 con error -110 ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000090 PGD 0 P4D 0 Ups: 0002 [#1] PREEMPT SMP NOPTI CPU: 0 PID: 609 Comm: systemd-udevd No contaminado 6.2.0-rc3-gpiccoli #338 Nombre del hardware : Valve Jupiter/Jupiter, BIOS F7A0113 04/11/2022 RIP: 0010:drm_sched_fini+0x84/0xa0 [gpu_sched] [...] Seguimiento de llamadas: amdgpu_fence_driver_sw_fini+0xc8/0xd0 [amdgpu] amdgpu_device_fini_sw+0x2b/0x3b0 [ amdgpu] amdgpu_driver_release_kms+0x16/0x30 [amdgpu] devm_drm_dev_init_release+0x49/0x70 [...] Para evitar eso, verifique si drm_sched se inicializ\u00f3 correctamente para un anillo determinado antes de llamar a su contraparte fini. Observe que idealmente usar\u00edamos sched.ready para eso; dicho campo se establece como lo \u00faltimo en drm_sched_init(). Pero amdgpu parece \"sobreescribir\" el significado de dicho campo; en el ejemplo anterior, por ejemplo, fue un anillo GFX el que provoc\u00f3 el bloqueo y el campo sched.ready se configur\u00f3 en verdadero en la rutina de inicio del anillo, independientemente del estado de el programador DRM. Por lo tanto, terminamos usando sched.ops seg\u00fan la sugerencia de Christian [0] y tambi\u00e9n eliminamos la verificaci\u00f3n no_scheduler [1]. [0] https://lore.kernel.org/amd-gfx/984ee981-2906-0eaf-ccec-9f80975cb136@amd.com/ [1] https://lore.kernel.org/amd-gfx/cd0e2994- f85f-d837-609f-7056d5fb7231@amd.com/"
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/2bcbbef9cace772f5b7128b11401c515982de34b", "url": "https://git.kernel.org/stable/c/2bcbbef9cace772f5b7128b11401c515982de34b",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10122", "id": "CVE-2024-10122",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-18T19:15:13.990", "published": "2024-10-18T19:15:13.990",
"lastModified": "2024-10-21T17:10:22.857", "lastModified": "2024-11-06T22:05:23.700",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -61,6 +61,26 @@
} }
], ],
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
},
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Secondary", "type": "Secondary",
@ -120,18 +140,44 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://vuldb.com/?ctiid.280914", "nodes": [
"source": "cna@vuldb.com"
},
{ {
"url": "https://vuldb.com/?id.280914", "operator": "OR",
"source": "cna@vuldb.com" "negate": false,
}, "cpeMatch": [
{ {
"url": "https://vuldb.com/?submit.421292", "vulnerable": true,
"source": "cna@vuldb.com" "criteria": "cpe:2.3:a:topdata:inner_rep_plus:2.01:*:*:*:*:*:*:*",
"matchCriteriaId": "1EBD086E-B71F-47DC-B335-0228F1EB61FF"
}
]
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?ctiid.280914",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.280914",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.421292",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10840", "id": "CVE-2024-10840",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-05T13:15:03.443", "published": "2024-11-05T13:15:03.443",
"lastModified": "2024-11-05T16:04:26.053", "lastModified": "2024-11-06T22:49:12.173",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability classified as problematic has been found in romadebrian WEB-Sekolah 1.0. Affected is an unknown function of the file /Admin/akun_edit.php of the component Backend. The manipulation of the argument kode leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." "value": "A vulnerability classified as problematic has been found in romadebrian WEB-Sekolah 1.0. Affected is an unknown function of the file /Admin/akun_edit.php of the component Backend. The manipulation of the argument kode leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": " Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en romadebrian WEB-Sekolah 1.0. Se trata de una funci\u00f3n desconocida del archivo /Admin/akun_edit.php del componente Backend. La manipulaci\u00f3n del argumento kode provoca ataques de Cross Site Scripting. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
} }
], ],
"metrics": { "metrics": {
@ -57,6 +61,26 @@
} }
], ],
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Secondary", "type": "Secondary",
@ -106,8 +130,18 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "cna@vuldb.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -124,18 +158,44 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://github.com/2537463005/a/blob/main/WEB-Sekolah%E5%90%8E%E5%8F%B0%E5%AD%98%E5%82%A8%E5%9E%8Bxss.md", "nodes": [
"source": "cna@vuldb.com"
},
{ {
"url": "https://vuldb.com/?ctiid.283086", "operator": "OR",
"source": "cna@vuldb.com" "negate": false,
}, "cpeMatch": [
{ {
"url": "https://vuldb.com/?id.283086", "vulnerable": true,
"source": "cna@vuldb.com" "criteria": "cpe:2.3:a:romadebrian:web-sekolah:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4AB95C15-C1D8-47EC-96B6-D38DD31920B3"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/2537463005/a/blob/main/WEB-Sekolah%E5%90%8E%E5%8F%B0%E5%AD%98%E5%82%A8%E5%9E%8Bxss.md",
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.283086",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.283086",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10841", "id": "CVE-2024-10841",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-05T14:15:14.220", "published": "2024-11-05T14:15:14.220",
"lastModified": "2024-11-05T16:04:26.053", "lastModified": "2024-11-06T22:50:24.277",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability classified as critical was found in romadebrian WEB-Sekolah 1.0. Affected by this vulnerability is an unknown functionality of the file /Proses_Kirim.php of the component Mail Handler. The manipulation of the argument Name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." "value": "A vulnerability classified as critical was found in romadebrian WEB-Sekolah 1.0. Affected by this vulnerability is an unknown functionality of the file /Proses_Kirim.php of the component Mail Handler. The manipulation of the argument Name leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
},
{
"lang": "es",
"value": "En la versi\u00f3n romadebrian WEB-Sekolah 1.0 se ha detectado una vulnerabilidad clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /Proses_Kirim.php del componente Mail Handler. La manipulaci\u00f3n del argumento Name provoca una inyecci\u00f3n SQL. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros."
} }
], ],
"metrics": { "metrics": {
@ -57,6 +61,26 @@
} }
], ],
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
},
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Secondary", "type": "Secondary",
@ -106,8 +130,18 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "cna@vuldb.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -124,18 +158,47 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://github.com/2537463005/a/blob/main/WEB-Sekolah%E5%90%8E%E5%8F%B0%E5%AD%98%E5%82%A8%E5%9E%8Bxss.md", "nodes": [
"source": "cna@vuldb.com"
},
{ {
"url": "https://vuldb.com/?ctiid.283087", "operator": "OR",
"source": "cna@vuldb.com" "negate": false,
}, "cpeMatch": [
{ {
"url": "https://vuldb.com/?id.283087", "vulnerable": true,
"source": "cna@vuldb.com" "criteria": "cpe:2.3:a:romadebrian:web-sekolah:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4AB95C15-C1D8-47EC-96B6-D38DD31920B3"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/2537463005/a/blob/main/WEB-Sekolah%E5%90%8E%E5%8F%B0%E5%AD%98%E5%82%A8%E5%9E%8Bxss.md",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.283087",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.283087",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
} }
] ]
} }

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10842", "id": "CVE-2024-10842",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-05T14:15:14.543", "published": "2024-11-05T14:15:14.543",
"lastModified": "2024-11-05T16:04:26.053", "lastModified": "2024-11-06T22:43:19.327",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in romadebrian WEB-Sekolah 1.0. Affected by this issue is some unknown functionality of the file /Admin/Proses_Edit_Akun.php of the component Backend. The manipulation of the argument Username_Baru/Password leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." "value": "A vulnerability, which was classified as problematic, has been found in romadebrian WEB-Sekolah 1.0. Affected by this issue is some unknown functionality of the file /Admin/Proses_Edit_Akun.php of the component Backend. The manipulation of the argument Username_Baru/Password leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": " Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en romadebrian WEB-Sekolah 1.0. Este problema afecta a una funcionalidad desconocida del archivo /Admin/Proses_Edit_Akun.php del componente Backend. La manipulaci\u00f3n del argumento Username_Baru/Password provoca Cross Site Scripting. El ataque puede ejecutarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
} }
], ],
"metrics": { "metrics": {
@ -57,6 +61,26 @@
} }
], ],
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Secondary", "type": "Secondary",
@ -106,8 +130,18 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "cna@vuldb.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -124,22 +158,52 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://github.com/2537463005/a/blob/main/WEB-Sekolah%E5%90%8E%E5%8F%B0%E5%AD%98%E5%82%A8%E5%9E%8Bxss.md", "nodes": [
"source": "cna@vuldb.com"
},
{ {
"url": "https://vuldb.com/?ctiid.283088", "operator": "OR",
"source": "cna@vuldb.com" "negate": false,
}, "cpeMatch": [
{ {
"url": "https://vuldb.com/?id.283088", "vulnerable": true,
"source": "cna@vuldb.com" "criteria": "cpe:2.3:a:romadebrian:web-sekolah:1.0:*:*:*:*:*:*:*",
}, "matchCriteriaId": "4AB95C15-C1D8-47EC-96B6-D38DD31920B3"
{ }
"url": "https://vuldb.com/?submit.429558", ]
"source": "cna@vuldb.com" }
]
}
],
"references": [
{
"url": "https://github.com/2537463005/a/blob/main/WEB-Sekolah%E5%90%8E%E5%8F%B0%E5%AD%98%E5%82%A8%E5%9E%8Bxss.md",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.283088",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.283088",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.429558",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10844", "id": "CVE-2024-10844",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-05T15:15:22.337", "published": "2024-11-05T15:15:22.337",
"lastModified": "2024-11-05T16:04:26.053", "lastModified": "2024-11-06T22:38:13.800",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability, which was classified as critical, was found in 1000 Projects Bookstore Management System 1.0. This affects an unknown part of the file search.php. The manipulation of the argument s leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." "value": "A vulnerability, which was classified as critical, was found in 1000 Projects Bookstore Management System 1.0. This affects an unknown part of the file search.php. The manipulation of the argument s leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en 1000 Projects Bookstore Management System 1.0. Afecta a una parte desconocida del archivo search.php. La manipulaci\u00f3n del argumento s provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
} }
], ],
"metrics": { "metrics": {
@ -57,6 +61,26 @@
} }
], ],
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Secondary", "type": "Secondary",
@ -106,8 +130,18 @@
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "cna@vuldb.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -124,22 +158,52 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://github.com/sbm-98/CVE/issues/1", "nodes": [
"source": "cna@vuldb.com"
},
{ {
"url": "https://vuldb.com/?ctiid.283089", "operator": "OR",
"source": "cna@vuldb.com" "negate": false,
}, "cpeMatch": [
{ {
"url": "https://vuldb.com/?id.283089", "vulnerable": true,
"source": "cna@vuldb.com" "criteria": "cpe:2.3:a:bookstore_management_system_project:bookstore_management_system:1.0:*:*:*:*:*:*:*",
}, "matchCriteriaId": "BE1C0C4B-D037-42DD-8505-68508274BC10"
{ }
"url": "https://vuldb.com/?submit.436969", ]
"source": "cna@vuldb.com" }
]
}
],
"references": [
{
"url": "https://github.com/sbm-98/CVE/issues/1",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.283089",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.283089",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.436969",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10845", "id": "CVE-2024-10845",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-05T15:15:22.620", "published": "2024-11-05T15:15:22.620",
"lastModified": "2024-11-05T16:04:26.053", "lastModified": "2024-11-06T22:38:03.347",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability has been found in 1000 Projects Bookstore Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file book_detail.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." "value": "A vulnerability has been found in 1000 Projects Bookstore Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file book_detail.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": " Se ha encontrado una vulnerabilidad en 1000 Projects Bookstore Management System 1.0 y se ha clasificado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo book_detail.php. La manipulaci\u00f3n del argumento id provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
} }
], ],
"metrics": { "metrics": {
@ -57,6 +61,26 @@
} }
], ],
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Secondary", "type": "Secondary",
@ -105,6 +129,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
},
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Secondary", "type": "Secondary",
@ -124,22 +158,55 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://github.com/hbuzs/CVE/issues/3", "nodes": [
"source": "cna@vuldb.com"
},
{ {
"url": "https://vuldb.com/?ctiid.283090", "operator": "OR",
"source": "cna@vuldb.com" "negate": false,
}, "cpeMatch": [
{ {
"url": "https://vuldb.com/?id.283090", "vulnerable": true,
"source": "cna@vuldb.com" "criteria": "cpe:2.3:a:bookstore_management_system_project:bookstore_management_system:1.0:*:*:*:*:*:*:*",
}, "matchCriteriaId": "BE1C0C4B-D037-42DD-8505-68508274BC10"
{ }
"url": "https://vuldb.com/?submit.436999", ]
"source": "cna@vuldb.com" }
]
}
],
"references": [
{
"url": "https://github.com/hbuzs/CVE/issues/3",
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.283090",
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.283090",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.436999",
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
} }
] ]
} }

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-10926",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-06T21:15:04.927",
"lastModified": "2024-11-06T21:15:04.927",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in IBPhoenix ibWebAdmin up to 1.0.2 and classified as problematic. This issue affects some unknown processing of the file /toggle_fold_panel.php of the component Tabelas Section. The manipulation of the argument p leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://docs.google.com/document/d/1h9LlTV1FVvOSDBWc7qwU_5qcboCKd6H99Oqg3rZdBRQ/edit?usp=sharing",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.283325",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.283325",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.429635",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-10941",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-11-06T21:15:05.213",
"lastModified": "2024-11-06T21:15:05.213",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A malicious website could have included an iframe with an malformed URI resulting in a non-exploitable browser crash. This vulnerability affects Firefox < 126."
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1880879",
"source": "security@mozilla.org"
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1887614",
"source": "security@mozilla.org"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2024-21/",
"source": "security@mozilla.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21249", "id": "CVE-2024-21249",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:14.880", "published": "2024-10-15T20:15:14.880",
"lastModified": "2024-10-31T15:35:25.647", "lastModified": "2024-11-06T22:53:50.587",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -40,6 +40,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Secondary",
@ -51,10 +61,30 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html", "nodes": [
"source": "secalert_us@oracle.com" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_fin_expenses:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "38221C8A-6D2C-47F1-A222-B42472AB7F5A"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21250", "id": "CVE-2024-21250",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:15.063", "published": "2024-10-15T20:15:15.063",
"lastModified": "2024-10-17T14:35:19.303", "lastModified": "2024-11-06T22:54:57.887",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -40,6 +40,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Secondary",
@ -51,10 +61,35 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html", "nodes": [
"source": "secalert_us@oracle.com" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:process_manufacturing_product_development:12.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "A520C6E9-1006-43E6-98C2-332C89E398CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:process_manufacturing_product_development:12.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "137E4B4C-5286-445E-B347-B5D5BEBFAA23"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21257", "id": "CVE-2024-21257",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:16.220", "published": "2024-10-15T20:15:16.220",
"lastModified": "2024-10-16T16:38:43.170", "lastModified": "2024-11-06T22:55:18.400",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,10 +39,42 @@
} }
] ]
}, },
"references": [ "weaknesses": [
{ {
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html", "source": "nvd@nist.gov",
"source": "secalert_us@oracle.com" "type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:hyperion_bi\\+:11.2.18.0.000:*:*:*:*:*:*:*",
"matchCriteriaId": "8EC21BCB-FA89-475B-9A33-108FF5363829"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21258", "id": "CVE-2024-21258",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:16.410", "published": "2024-10-15T20:15:16.410",
"lastModified": "2024-10-16T16:38:43.170", "lastModified": "2024-11-06T22:56:19.527",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -40,6 +40,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Secondary",
@ -51,10 +61,32 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html", "nodes": [
"source": "secalert_us@oracle.com" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:installed_base:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.2.3",
"versionEndIncluding": "12.2.14",
"matchCriteriaId": "4F2A7D80-68E3-4AAA-BD96-CE108A5CB0C6"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21264", "id": "CVE-2024-21264",
"sourceIdentifier": "secalert_us@oracle.com", "sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-10-15T20:15:17.533", "published": "2024-10-15T20:15:17.533",
"lastModified": "2024-10-16T16:38:43.170", "lastModified": "2024-11-06T22:56:41.647",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{ {
"source": "secalert_us@oracle.com", "source": "secalert_us@oracle.com",
"type": "Secondary", "type": "Secondary",
@ -39,10 +59,42 @@
} }
] ]
}, },
"references": [ "weaknesses": [
{ {
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html", "source": "nvd@nist.gov",
"source": "secalert_us@oracle.com" "type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:peoplesoft_enterprise_cost_center_common_application_objects:9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "D30BE00A-198B-4398-9404-BEA9D255B554"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuoct2024.html",
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22013", "id": "CVE-2024-22013",
"sourceIdentifier": "dsap-vuln-management@google.com", "sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-09-16T20:15:45.743", "published": "2024-09-16T20:15:45.743",
"lastModified": "2024-09-20T12:31:20.110", "lastModified": "2024-11-06T21:35:02.500",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,30 @@
"value": "El entorno U-Boot se lee desde una partici\u00f3n no autenticada." "value": "El entorno U-Boot se lee desde una partici\u00f3n no autenticada."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [ "references": [
{ {
"url": "https://support.google.com/product-documentation/answer/14950962?hl=en&ref_topic=12974021&sjid=9595902703262170957-NA#zippy=%2Cwifi", "url": "https://support.google.com/product-documentation/answer/14950962?hl=en&ref_topic=12974021&sjid=9595902703262170957-NA#zippy=%2Cwifi",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23560", "id": "CVE-2024-23560",
"sourceIdentifier": "psirt@hcl.com", "sourceIdentifier": "psirt@hcl.com",
"published": "2024-04-15T20:15:10.873", "published": "2024-04-15T20:15:10.873",
"lastModified": "2024-04-16T13:24:07.103", "lastModified": "2024-11-06T22:35:04.240",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -39,6 +39,18 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-281"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0111925", "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0111925",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26367", "id": "CVE-2024-26367",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-05-14T16:16:22.863", "published": "2024-05-14T16:16:22.863",
"lastModified": "2024-05-14T19:18:31.490", "lastModified": "2024-11-06T21:35:02.850",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de Cross Site Scripting en Evertz microsystems MViP-II Firmware 8.6.5, XPS-EDGE-* Build 1467, evEDGE-EO-* Build 0029, MMA10G-* Build 0498, 570IPG-X19-10G Build 0691 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para los par\u00e1metros de inicio de sesi\u00f3n." "value": "Vulnerabilidad de Cross Site Scripting en Evertz microsystems MViP-II Firmware 8.6.5, XPS-EDGE-* Build 1467, evEDGE-EO-* Build 0029, MMA10G-* Build 0498, 570IPG-X19-10G Build 0691 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado para los par\u00e1metros de inicio de sesi\u00f3n."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [ "references": [
{ {
"url": "http://cc.com", "url": "http://cc.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26648", "id": "CVE-2024-26648",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-03-26T18:15:10.220", "published": "2024-03-26T18:15:10.220",
"lastModified": "2024-03-27T12:29:41.530", "lastModified": "2024-11-06T22:35:04.950",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: se corrigi\u00f3 la diferenciaci\u00f3n de variables antes de la verificaci\u00f3n NULL en edp_setup_replay() En edp_setup_replay(), se elimin\u00f3 la referencia a 'struct dc *dc' y 'struct dmub_replay *replay' antes de la comprobaci\u00f3n NULL del puntero 'enlace' y 'repetici\u00f3n'. Corrige lo siguiente: drivers/gpu/drm/amd/amdgpu/../display/dc/link/protocols/link_edp_panel_control.c:947 edp_setup_replay() advertencia: variable desreferenciada antes de marcar 'enlace' (ver l\u00ednea 933)" "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: drm/amd/display: se corrigi\u00f3 la diferenciaci\u00f3n de variables antes de la verificaci\u00f3n NULL en edp_setup_replay() En edp_setup_replay(), se elimin\u00f3 la referencia a 'struct dc *dc' y 'struct dmub_replay *replay' antes de la comprobaci\u00f3n NULL del puntero 'enlace' y 'repetici\u00f3n'. Corrige lo siguiente: drivers/gpu/drm/amd/amdgpu/../display/dc/link/protocols/link_edp_panel_control.c:947 edp_setup_replay() advertencia: variable desreferenciada antes de marcar 'enlace' (ver l\u00ednea 933)"
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/22ae604aea14756954e1c00ae653e34d2afd2935", "url": "https://git.kernel.org/stable/c/22ae604aea14756954e1c00ae653e34d2afd2935",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26731", "id": "CVE-2024-26731",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-03T17:15:50.927", "published": "2024-04-03T17:15:50.927",
"lastModified": "2024-04-03T17:24:18.150", "lastModified": "2024-11-06T22:35:05.197",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bpf, sockmap: corrigi\u00f3 la desreferencia del puntero NULL en sk_psock_verdict_data_ready() syzbot inform\u00f3 el siguiente problema de desreferencia del puntero NULL [1]: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000000 [... ] RIP: 0010:0x0 [...] Seguimiento de llamadas: sk_psock_verdict_data_ready+0x232/0x340 net/core/skmsg.c:1230 unix_stream_sendmsg+0x9b4/0x1230 net/unix/af_unix.c:2293 sock_sendmsg_nosec net/socket. c:730 [en l\u00ednea] __sock_sendmsg+0x221/0x270 net/socket.c:745 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584 ___sys_sendmsg net/socket.c:2638 [en l\u00ednea] __sys_sendmsg+0x2b0/0x3a0 net /socket. c:2667 do_syscall_64+0xf9/0x240 Entry_SYSCALL_64_after_hwframe+0x6f/0x77 Si sk_psock_verdict_data_ready() y sk_psock_stop_verdict() se llaman simult\u00e1neamente, psock-&gt;saved_data_ready puede ser NULL, causando el problema anterior. Este parche soluciona este problema llamando a la funci\u00f3n de preparaci\u00f3n de datos adecuada utilizando el asistente sk_psock_data_ready() y protegi\u00e9ndola de la concurrencia con sk-&gt;sk_callback_lock." "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: bpf, sockmap: corrigi\u00f3 la desreferencia del puntero NULL en sk_psock_verdict_data_ready() syzbot inform\u00f3 el siguiente problema de desreferencia del puntero NULL [1]: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000000 [... ] RIP: 0010:0x0 [...] Seguimiento de llamadas: sk_psock_verdict_data_ready+0x232/0x340 net/core/skmsg.c:1230 unix_stream_sendmsg+0x9b4/0x1230 net/unix/af_unix.c:2293 sock_sendmsg_nosec net/socket. c:730 [en l\u00ednea] __sock_sendmsg+0x221/0x270 net/socket.c:745 ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584 ___sys_sendmsg net/socket.c:2638 [en l\u00ednea] __sys_sendmsg+0x2b0/0x3a0 net /socket. c:2667 do_syscall_64+0xf9/0x240 Entry_SYSCALL_64_after_hwframe+0x6f/0x77 Si sk_psock_verdict_data_ready() y sk_psock_stop_verdict() se llaman simult\u00e1neamente, psock-&gt;saved_data_ready puede ser NULL, causando el problema anterior. Este parche soluciona este problema llamando a la funci\u00f3n de preparaci\u00f3n de datos adecuada utilizando el asistente sk_psock_data_ready() y protegi\u00e9ndola de la concurrencia con sk-&gt;sk_callback_lock."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/4588b13abcbd561ec67f5b3c1cb2eff690990a54", "url": "https://git.kernel.org/stable/c/4588b13abcbd561ec67f5b3c1cb2eff690990a54",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26744", "id": "CVE-2024-26744",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-03T17:15:51.627", "published": "2024-04-03T17:15:51.627",
"lastModified": "2024-11-05T10:15:46.253", "lastModified": "2024-11-06T21:35:03.883",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/srpt: admite la especificaci\u00f3n del par\u00e1metro srpt_service_guid. Hace que la carga de ib_srpt con este conjunto de par\u00e1metros funcione. El comportamiento actual es que configurar ese par\u00e1metro mientras se carga el m\u00f3dulo del kernel ib_srpt desencadena el siguiente fallo del kernel: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000000 Seguimiento de llamadas: parse_one+0x18c/0x1d0 parse_args+0xe1/0x230 load_module+0x8de/ 0xa60 init_module_from_file+0x8b/0xd0 idempotent_init_module+0x181/0x240 __x64_sys_finit_module+0x5a/0xb0 do_syscall_64+0x5f/0xe0 Entry_SYSCALL_64_after_hwframe+0x6e/0x76" "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/srpt: admite la especificaci\u00f3n del par\u00e1metro srpt_service_guid. Hace que la carga de ib_srpt con este conjunto de par\u00e1metros funcione. El comportamiento actual es que configurar ese par\u00e1metro mientras se carga el m\u00f3dulo del kernel ib_srpt desencadena el siguiente fallo del kernel: ERROR: desreferencia del puntero NULL del kernel, direcci\u00f3n: 0000000000000000 Seguimiento de llamadas: parse_one+0x18c/0x1d0 parse_args+0xe1/0x230 load_module+0x8de/ 0xa60 init_module_from_file+0x8b/0xd0 idempotent_init_module+0x181/0x240 __x64_sys_finit_module+0x5a/0xb0 do_syscall_64+0x5f/0xe0 Entry_SYSCALL_64_after_hwframe+0x6e/0x76"
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/5a5c039dac1b1b7ba3e91c791f4421052bf79b82", "url": "https://git.kernel.org/stable/c/5a5c039dac1b1b7ba3e91c791f4421052bf79b82",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26757", "id": "CVE-2024-26757",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-03T17:15:52.207", "published": "2024-04-03T17:15:52.207",
"lastModified": "2024-04-03T17:24:18.150", "lastModified": "2024-11-06T21:35:04.737",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: md: No ignorar la matriz de solo lectura en md_check_recovery() Generalmente, si la matriz no es de lectura y escritura, md_check_recovery() no registrar\u00e1 un nuevo sync_thread en primer lugar. Y si la matriz es de lectura y escritura y sync_thread est\u00e1 registrado, md_set_readonly() cancelar\u00e1 el registro de sync_thread antes de configurar la matriz como de solo lectura. md/raid sigue este comportamiento, por lo que no hay problema. Despu\u00e9s de commit f52f5c71f3d4 (\"md: arreglar la detenci\u00f3n del hilo de sincronizaci\u00f3n\"), el siguiente bloqueo puede activarse mediante test shell/integrity-caching.sh: 1) la matriz es de solo lectura. Superbloque de actualizaci\u00f3n dm-raid: rs_update_sbs ro = mddev-&gt;ro mddev-&gt;ro = 0 -&gt; establecer matriz de lectura y escritura md_update_sb 2) registrar un nuevo hilo de sincronizaci\u00f3n simult\u00e1neamente. 3) dm-raid vuelve a configurar la matriz en solo lectura: rs_update_sbs mddev-&gt;ro = ro 4) detiene la matriz: raid_dtr md_stop stop_sync_thread set_bit(MD_RECOVERY_INTR, &amp;mddev-&gt;recovery); md_wakeup_thread_directly(mddev-&gt;sync_thread); wait_event(..., !test_bit(MD_RECOVERY_RUNNING, &amp;mddev-&gt;recovery)) 5) hilo de sincronizaci\u00f3n realizado: md_do_sync set_bit(MD_RECOVERY_DONE, &amp;mddev-&gt;recovery); md_wakeup_thread(mddev-&gt;thread); 6) el hilo del demonio no puede cancelar el registro del hilo de sincronizaci\u00f3n: md_check_recovery if (!md_is_rdwr(mddev) &amp;&amp; !test_bit(MD_RECOVERY_NEEDED, &amp;mddev-&gt;recovery)) return; -&gt; -&gt; MD_RECOVERY_RUNNING no se puede borrar, por lo tanto el paso 4 se bloquea; La causa principal es que dm-raid manipula 'mddev-&gt;ro' por s\u00ed solo; sin embargo, dm-raid realmente deber\u00eda detener el hilo de sincronizaci\u00f3n antes de configurar la matriz como de solo lectura. Desafortunadamente, necesito leer m\u00e1s c\u00f3digo antes de poder refactorizar el controlador de 'mddev-&gt;ro' en dm-raid, por lo tanto, solucionemos el problema de la manera m\u00e1s f\u00e1cil por ahora para evitar la regresi\u00f3n de dm-raid." "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: md: No ignorar la matriz de solo lectura en md_check_recovery() Generalmente, si la matriz no es de lectura y escritura, md_check_recovery() no registrar\u00e1 un nuevo sync_thread en primer lugar. Y si la matriz es de lectura y escritura y sync_thread est\u00e1 registrado, md_set_readonly() cancelar\u00e1 el registro de sync_thread antes de configurar la matriz como de solo lectura. md/raid sigue este comportamiento, por lo que no hay problema. Despu\u00e9s de commit f52f5c71f3d4 (\"md: arreglar la detenci\u00f3n del hilo de sincronizaci\u00f3n\"), el siguiente bloqueo puede activarse mediante test shell/integrity-caching.sh: 1) la matriz es de solo lectura. Superbloque de actualizaci\u00f3n dm-raid: rs_update_sbs ro = mddev-&gt;ro mddev-&gt;ro = 0 -&gt; establecer matriz de lectura y escritura md_update_sb 2) registrar un nuevo hilo de sincronizaci\u00f3n simult\u00e1neamente. 3) dm-raid vuelve a configurar la matriz en solo lectura: rs_update_sbs mddev-&gt;ro = ro 4) detiene la matriz: raid_dtr md_stop stop_sync_thread set_bit(MD_RECOVERY_INTR, &amp;mddev-&gt;recovery); md_wakeup_thread_directly(mddev-&gt;sync_thread); wait_event(..., !test_bit(MD_RECOVERY_RUNNING, &amp;mddev-&gt;recovery)) 5) hilo de sincronizaci\u00f3n realizado: md_do_sync set_bit(MD_RECOVERY_DONE, &amp;mddev-&gt;recovery); md_wakeup_thread(mddev-&gt;thread); 6) el hilo del demonio no puede cancelar el registro del hilo de sincronizaci\u00f3n: md_check_recovery if (!md_is_rdwr(mddev) &amp;&amp; !test_bit(MD_RECOVERY_NEEDED, &amp;mddev-&gt;recovery)) return; -&gt; -&gt; MD_RECOVERY_RUNNING no se puede borrar, por lo tanto el paso 4 se bloquea; La causa principal es que dm-raid manipula 'mddev-&gt;ro' por s\u00ed solo; sin embargo, dm-raid realmente deber\u00eda detener el hilo de sincronizaci\u00f3n antes de configurar la matriz como de solo lectura. Desafortunadamente, necesito leer m\u00e1s c\u00f3digo antes de poder refactorizar el controlador de 'mddev-&gt;ro' en dm-raid, por lo tanto, solucionemos el problema de la manera m\u00e1s f\u00e1cil por ahora para evitar la regresi\u00f3n de dm-raid."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-404"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/2ea169c5a0b1134d573d07fc27a16f327ad0e7d3", "url": "https://git.kernel.org/stable/c/2ea169c5a0b1134d573d07fc27a16f327ad0e7d3",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26779", "id": "CVE-2024-26779",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-03T17:15:53.423", "published": "2024-04-03T17:15:53.423",
"lastModified": "2024-11-05T10:15:49.233", "lastModified": "2024-11-06T22:35:05.993",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mac80211: corrige la condici\u00f3n de ejecuci\u00f3n al habilitar fast-xmit fast-xmit solo debe habilitarse despu\u00e9s de que el sta se haya cargado en el controlador; de lo contrario, podr\u00eda terminar pasando el error sta a\u00fan cargada a trav\u00e9s de llamadas drv_tx al controlador, lo que genera posibles fallas debido a datos drv_priv no inicializados. Agregue una estaci\u00f3n faltante-&gt;comprobaci\u00f3n cargada y vuelva a verificar la transmisi\u00f3n r\u00e1pida despu\u00e9s de insertar una estaci\u00f3n." "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mac80211: corrige la condici\u00f3n de ejecuci\u00f3n al habilitar fast-xmit fast-xmit solo debe habilitarse despu\u00e9s de que el sta se haya cargado en el controlador; de lo contrario, podr\u00eda terminar pasando el error sta a\u00fan cargada a trav\u00e9s de llamadas drv_tx al controlador, lo que genera posibles fallas debido a datos drv_priv no inicializados. Agregue una estaci\u00f3n faltante-&gt;comprobaci\u00f3n cargada y vuelva a verificar la transmisi\u00f3n r\u00e1pida despu\u00e9s de insertar una estaci\u00f3n."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/281280276b70c822f55ce15b661f6d1d3228aaa9", "url": "https://git.kernel.org/stable/c/281280276b70c822f55ce15b661f6d1d3228aaa9",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28895", "id": "CVE-2024-28895",
"sourceIdentifier": "vultures@jpcert.or.jp", "sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-04-01T01:15:46.890", "published": "2024-04-01T01:15:46.890",
"lastModified": "2024-04-01T01:33:21.910", "lastModified": "2024-11-06T21:35:05.843",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "Yahoo! JAPAN' App para Android v2.3.1 a v3.161.1 y 'Yahoo! La aplicaci\u00f3n JAPAN para iOS v3.2.2 a v4.109.0 contiene una vulnerabilidad de cross-site scripting. Si se explota esta vulnerabilidad, se puede ejecutar un script arbitrario en WebView de Yahoo! JAPAN ' App a trav\u00e9s de otra aplicaci\u00f3n instalada en el dispositivo del usuario." "value": "Yahoo! JAPAN' App para Android v2.3.1 a v3.161.1 y 'Yahoo! La aplicaci\u00f3n JAPAN para iOS v3.2.2 a v4.109.0 contiene una vulnerabilidad de cross-site scripting. Si se explota esta vulnerabilidad, se puede ejecutar un script arbitrario en WebView de Yahoo! JAPAN ' App a trav\u00e9s de otra aplicaci\u00f3n instalada en el dispositivo del usuario."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://jvn.jp/en/jp/JVN23528780/", "url": "https://jvn.jp/en/jp/JVN23528780/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-29948", "id": "CVE-2024-29948",
"sourceIdentifier": "hsrc@hikvision.com", "sourceIdentifier": "hsrc@hikvision.com",
"published": "2024-04-02T11:15:51.813", "published": "2024-04-02T11:15:51.813",
"lastModified": "2024-04-02T12:50:42.233", "lastModified": "2024-11-06T21:35:06.680",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -39,6 +39,18 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikvision-nvr-devices/", "url": "https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikvision-nvr-devices/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30122", "id": "CVE-2024-30122",
"sourceIdentifier": "psirt@hcl.com", "sourceIdentifier": "psirt@hcl.com",
"published": "2024-10-23T15:15:30.390", "published": "2024-10-23T15:15:30.390",
"lastModified": "2024-10-25T12:56:36.827", "lastModified": "2024-11-06T22:33:46.797",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{ {
"source": "psirt@hcl.com", "source": "psirt@hcl.com",
"type": "Secondary", "type": "Secondary",
@ -39,10 +59,48 @@
} }
] ]
}, },
"references": [ "weaknesses": [
{ {
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0115627", "source": "nvd@nist.gov",
"source": "psirt@hcl.com" "type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:sametime:*:*:*:*:*:*:*:*",
"versionEndExcluding": "12.0.2",
"matchCriteriaId": "FDA15EE5-1675-469C-BF7B-DB9FDE95F338"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hcltech:sametime:12.0.2:-:*:*:*:*:*:*",
"matchCriteriaId": "D6A54E0B-DB62-4674-B57D-827A55BBE2CA"
}
]
}
]
}
],
"references": [
{
"url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0115627",
"source": "psirt@hcl.com",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-33338", "id": "CVE-2024-33338",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-29T18:15:07.937", "published": "2024-04-29T18:15:07.937",
"lastModified": "2024-04-30T13:11:16.690", "lastModified": "2024-11-06T22:35:06.803",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de Cross Site Scripting en jizhicms v.2.5.4 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de una solicitud de publicaci\u00f3n de art\u00edculo manipulada." "value": "Una vulnerabilidad de Cross Site Scripting en jizhicms v.2.5.4 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de una solicitud de publicaci\u00f3n de art\u00edculo manipulada."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/7akahash1/POC/blob/main/1.md", "url": "https://github.com/7akahash1/POC/blob/main/1.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35835", "id": "CVE-2024-35835",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-17T14:15:20.387", "published": "2024-05-17T14:15:20.387",
"lastModified": "2024-11-05T10:16:42.810", "lastModified": "2024-11-06T21:35:07.630",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,30 @@
"value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net/mlx5e: corregido un double free en arfs_create_groups Cuando falla `in` asignado por kvzalloc, arfs_create_groups liberar\u00e1 ft-&gt;g y devolver\u00e1 un error. Sin embargo, arfs_create_table, el \u00fanico llamador de arfs_create_groups, mantendr\u00e1 este error y llamar\u00e1 a mlx5e_destroy_flow_table, en el que ft-&gt;g se liberar\u00e1 nuevamente." "value": " En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: net/mlx5e: corregido un double free en arfs_create_groups Cuando falla `in` asignado por kvzalloc, arfs_create_groups liberar\u00e1 ft-&gt;g y devolver\u00e1 un error. Sin embargo, arfs_create_table, el \u00fanico llamador de arfs_create_groups, mantendr\u00e1 este error y llamar\u00e1 a mlx5e_destroy_flow_table, en el que ft-&gt;g se liberar\u00e1 nuevamente."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/2501afe6c4c9829d03abe9a368b83d9ea1b611b7", "url": "https://git.kernel.org/stable/c/2501afe6c4c9829d03abe9a368b83d9ea1b611b7",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-36881", "id": "CVE-2024-36881",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-30T16:15:11.723", "published": "2024-05-30T16:15:11.723",
"lastModified": "2024-05-30T18:18:58.870", "lastModified": "2024-11-06T22:35:07.757",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/userfaultfd: restablece ptes al cerrar() para los protegidos por wr. Userfaultfd unregister incluye un paso para eliminar los bits de wr-protect de todas las entradas relevantes de pgtable, pero eso solo cubre una UFFDIO_UNREGISTER ioctl expl\u00edcito, no un close() en el propio userfaultfd. Cubre eso tambi\u00e9n. Esto corrige un rastro WARN. El \u00fanico efecto secundario visible para el usuario es que puede observar los bits wr-protect sobrantes incluso si el usuario cerr\u00f3 () en un userfaultfd al liberar la \u00faltima referencia del mismo. Sin embargo, es de esperar que eso sea inofensivo y, aun as\u00ed, no deber\u00eda pasar nada malo. Este cambio ahora es m\u00e1s importante despu\u00e9s del reciente parche de verificaci\u00f3n de tabla de p\u00e1ginas que fusionamos en mm-unstable (446dd9ad37d0 (\"mm/page_table_check: admite entradas de protecci\u00f3n wr de error de usuario\")), ya que haremos una verificaci\u00f3n de cordura en uffd-wp. bits sin contexto vma. Por lo tanto, es mejor si podemos garantizar al 100% que no queden restos de bits de uffd-wp, para asegurarnos de que cada informe sea v\u00e1lido." "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/userfaultfd: restablece ptes al cerrar() para los protegidos por wr. Userfaultfd unregister incluye un paso para eliminar los bits de wr-protect de todas las entradas relevantes de pgtable, pero eso solo cubre una UFFDIO_UNREGISTER ioctl expl\u00edcito, no un close() en el propio userfaultfd. Cubre eso tambi\u00e9n. Esto corrige un rastro WARN. El \u00fanico efecto secundario visible para el usuario es que puede observar los bits wr-protect sobrantes incluso si el usuario cerr\u00f3 () en un userfaultfd al liberar la \u00faltima referencia del mismo. Sin embargo, es de esperar que eso sea inofensivo y, aun as\u00ed, no deber\u00eda pasar nada malo. Este cambio ahora es m\u00e1s importante despu\u00e9s del reciente parche de verificaci\u00f3n de tabla de p\u00e1ginas que fusionamos en mm-unstable (446dd9ad37d0 (\"mm/page_table_check: admite entradas de protecci\u00f3n wr de error de usuario\")), ya que haremos una verificaci\u00f3n de cordura en uffd-wp. bits sin contexto vma. Por lo tanto, es mejor si podemos garantizar al 100% que no queden restos de bits de uffd-wp, para asegurarnos de que cada informe sea v\u00e1lido."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/377f3a9a3d032a52325a5b110379a25dd1ab1931", "url": "https://git.kernel.org/stable/c/377f3a9a3d032a52325a5b110379a25dd1ab1931",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47253", "id": "CVE-2024-47253",
"sourceIdentifier": "product-security@axis.com", "sourceIdentifier": "product-security@axis.com",
"published": "2024-11-05T10:20:03.973", "published": "2024-11-05T10:20:03.973",
"lastModified": "2024-11-05T16:04:26.053", "lastModified": "2024-11-06T22:23:29.663",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{ {
"source": "product-security@axis.com", "source": "product-security@axis.com",
"type": "Secondary", "type": "Secondary",
@ -40,6 +60,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{ {
"source": "product-security@axis.com", "source": "product-security@axis.com",
"type": "Secondary", "type": "Secondary",
@ -51,10 +81,31 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://www.2n.com/en-GB/about-2n/cybersecurity/", "nodes": [
"source": "product-security@axis.com" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:2n:access_commander:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.1.1.2",
"matchCriteriaId": "47A7B866-FF8F-4CA9-A34C-78D361E21730"
}
]
}
]
}
],
"references": [
{
"url": "https://www.2n.com/en-GB/about-2n/cybersecurity/",
"source": "product-security@axis.com",
"tags": [
"Product"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47254", "id": "CVE-2024-47254",
"sourceIdentifier": "product-security@axis.com", "sourceIdentifier": "product-security@axis.com",
"published": "2024-11-05T10:20:04.843", "published": "2024-11-05T10:20:04.843",
"lastModified": "2024-11-05T16:04:26.053", "lastModified": "2024-11-06T22:22:01.623",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{ {
"source": "product-security@axis.com", "source": "product-security@axis.com",
"type": "Secondary", "type": "Secondary",
@ -40,6 +60,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{ {
"source": "product-security@axis.com", "source": "product-security@axis.com",
"type": "Secondary", "type": "Secondary",
@ -51,10 +81,31 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://www.2n.com/en-GB/about-2n/cybersecurity/", "nodes": [
"source": "product-security@axis.com" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:2n:access_commander:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.1.1.2",
"matchCriteriaId": "47A7B866-FF8F-4CA9-A34C-78D361E21730"
}
]
}
]
}
],
"references": [
{
"url": "https://www.2n.com/en-GB/about-2n/cybersecurity/",
"source": "product-security@axis.com",
"tags": [
"Product"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-47255", "id": "CVE-2024-47255",
"sourceIdentifier": "product-security@axis.com", "sourceIdentifier": "product-security@axis.com",
"published": "2024-11-05T10:20:05.300", "published": "2024-11-05T10:20:05.300",
"lastModified": "2024-11-05T16:04:26.053", "lastModified": "2024-11-06T22:23:05.770",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{ {
"source": "product-security@axis.com", "source": "product-security@axis.com",
"type": "Secondary", "type": "Secondary",
@ -40,6 +60,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{ {
"source": "product-security@axis.com", "source": "product-security@axis.com",
"type": "Secondary", "type": "Secondary",
@ -51,10 +81,31 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://www.2n.com/en-GB/about-2n/cybersecurity/", "nodes": [
"source": "product-security@axis.com" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:2n:access_commander:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.1.1.2",
"matchCriteriaId": "47A7B866-FF8F-4CA9-A34C-78D361E21730"
}
]
}
]
}
],
"references": [
{
"url": "https://www.2n.com/en-GB/about-2n/cybersecurity/",
"source": "product-security@axis.com",
"tags": [
"Product"
]
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48050", "id": "CVE-2024-48050",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-11-04T23:15:04.250", "published": "2024-11-04T23:15:04.250",
"lastModified": "2024-11-05T16:04:26.053", "lastModified": "2024-11-06T21:35:07.863",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "En agentscope &lt;=v0.0.4, el archivo agentscope\\web\\workstation\\workflow_utils.py tiene la funci\u00f3n is_callable_expression. Dentro de esta funci\u00f3n, la l\u00ednea result = eval(s) plantea un riesgo de seguridad, ya que puede ejecutar directamente comandos proporcionados por el usuario." "value": "En agentscope &lt;=v0.0.4, el archivo agentscope\\web\\workstation\\workflow_utils.py tiene la funci\u00f3n is_callable_expression. Dentro de esta funci\u00f3n, la l\u00ednea result = eval(s) plantea un riesgo de seguridad, ya que puede ejecutar directamente comandos proporcionados por el usuario."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://gist.github.com/AfterSnows/0ad9d233a9d2a5b7e6e5273e2e23508d", "url": "https://gist.github.com/AfterSnows/0ad9d233a9d2a5b7e6e5273e2e23508d",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49370", "id": "CVE-2024-49370",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-10-23T15:15:31.987", "published": "2024-10-23T15:15:31.987",
"lastModified": "2024-10-25T12:56:36.827", "lastModified": "2024-11-06T22:31:30.160",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -59,12 +59,44 @@
"baseSeverity": "HIGH" "baseSeverity": "HIGH"
} }
} }
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
] ]
}, },
"weaknesses": [ "weaknesses": [
{ {
"source": "security-advisories@github.com", "source": "nvd@nist.gov",
"type": "Primary", "type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -73,10 +105,39 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-74p5-77rq-gfqc", "nodes": [
"source": "security-advisories@github.com" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.1.16",
"matchCriteriaId": "8E36A24C-B1EA-4E86-B87D-69AB12876830"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0",
"versionEndExcluding": "4.1.7",
"matchCriteriaId": "13395FFF-7B19-4774-B7FF-F9EF31064AD6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-74p5-77rq-gfqc",
"source": "security-advisories@github.com",
"tags": [
"Exploit",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49675", "id": "CVE-2024-49675",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-10-23T15:15:32.120", "published": "2024-10-23T15:15:32.120",
"lastModified": "2024-10-25T12:56:36.827", "lastModified": "2024-11-06T22:24:22.907",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{ {
"source": "audit@patchstack.com", "source": "audit@patchstack.com",
"type": "Secondary", "type": "Secondary",
@ -40,6 +60,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{ {
"source": "audit@patchstack.com", "source": "audit@patchstack.com",
"type": "Secondary", "type": "Secondary",
@ -51,10 +81,31 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://patchstack.com/database/vulnerability/ibryl-switch-user/wordpress-ibryl-switch-user-plugin-1-0-1-account-takeover-vulnerability?_s_id=cve", "nodes": [
"source": "audit@patchstack.com" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:vitaliibryl:switch_user:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.0.1",
"matchCriteriaId": "AC4A7ABE-B11E-467C-B9E0-23C86844CABC"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ibryl-switch-user/wordpress-ibryl-switch-user-plugin-1-0-1-account-takeover-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-50340",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-06T21:15:05.527",
"lastModified": "2024-11-06T21:15:05.527",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "symfony/runtime is a module for the Symphony PHP framework which enables decoupling PHP applications from global state. When the `register_argv_argc` php directive is set to `on` , and users call any URL with a special crafted query string, they are able to change the environment or debug mode used by the kernel when handling the request. As of versions 5.4.46, 6.4.14, and 7.1.7 the `SymfonyRuntime` now ignores the `argv` values for non-SAPI PHP runtimes. All users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 7.3,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"references": [
{
"url": "https://github.com/symfony/symfony/commit/a77b308c3f179ed7c8a8bc295f82b2d6ee3493fa",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/symfony/symfony/security/advisories/GHSA-x8vp-gf4q-mw5j",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-50341",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-06T21:15:05.747",
"lastModified": "2024-11-06T21:15:05.747",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "symfony/security-bundle is a module for the Symphony PHP framework which provides a tight integration of the Security component into the Symfony full-stack framework. The custom `user_checker` defined on a firewall is not called when Login Programmaticaly with the `Security::login` method, leading to unwanted login. As of versions 6.4.10, 7.0.10 and 7.1.3 the `Security::login` method now ensure to call the configured `user_checker`. All users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://github.com/symfony/symfony/commit/22a0789a0085c3ee96f4ef715ecad8255cf0e105",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/symfony/symfony/security/advisories/GHSA-jxgr-3v7q-3w9v",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-50342",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-06T21:15:05.963",
"lastModified": "2024-11-06T21:15:05.963",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "symfony/http-client is a module for the Symphony PHP framework which provides powerful methods to fetch HTTP resources synchronously or asynchronously. When using the `NoPrivateNetworkHttpClient`, some internal information is still leaking during host resolution, which leads to possible IP/port enumeration. As of versions 5.4.46, 6.4.14, and 7.1.7 the `NoPrivateNetworkHttpClient` now filters blocked IPs earlier to prevent such leaks. All users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/symfony/symfony/commit/296d4b34a33b1a6ca5475c6040b3203622520f5b",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/symfony/symfony/security/advisories/GHSA-9c3x-r3wp-mgxm",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-50343",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-06T21:15:06.180",
"lastModified": "2024-11-06T21:15:06.180",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "symfony/validator is a module for the Symphony PHP framework which provides tools to validate values. It is possible to trick a `Validator` configured with a regular expression using the `$` metacharacters, with an input ending with `\\n`. Symfony as of versions 5.4.43, 6.4.11, and 7.1.4 now uses the `D` regex modifier to match the entire input. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://github.com/symfony/symfony/commit/7d1032bbead9a4229b32fa6ebca32681c80cb76f",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/symfony/symfony/security/advisories/GHSA-g3rh-rrhp-jhh9",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-50345",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-06T21:15:06.383",
"lastModified": "2024-11-06T21:15:06.383",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "symfony/http-foundation is a module for the Symphony PHP framework which defines an object-oriented layer for the HTTP specification. The `Request` class, does not parse URI with special characters the same way browsers do. As a result, an attacker can trick a validator relying on the `Request` class to redirect users to another domain. The `Request::create` methods now assert the URI does not contain invalid characters as defined by https://url.spec.whatwg.org/. This issue has been patched in versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://github.com/symfony/symfony/security/advisories/GHSA-mrqx-rp3w-jpjp",
"source": "security-advisories@github.com"
},
{
"url": "https://url.spec.whatwg.org",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51408", "id": "CVE-2024-51408",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-11-04T14:15:16.603", "published": "2024-11-04T14:15:16.603",
"lastModified": "2024-11-05T22:35:13.937", "lastModified": "2024-11-06T22:06:43.100",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -17,6 +17,26 @@
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{ {
"source": "cve@mitre.org", "source": "cve@mitre.org",
"type": "Secondary", "type": "Secondary",
@ -40,6 +60,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
},
{ {
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary", "type": "Secondary",
@ -51,18 +81,46 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://github.com/appsmithorg/appsmith/pull/29286", "nodes": [
"source": "cve@mitre.org"
},
{ {
"url": "https://github.com/appsmithorg/appsmith/releases/tag/v1.46", "operator": "OR",
"source": "cve@mitre.org" "negate": false,
}, "cpeMatch": [
{ {
"url": "https://github.com/jahithoque/Vulnerability-Research/tree/main/CVE-2024-51408", "vulnerable": true,
"source": "cve@mitre.org" "criteria": "cpe:2.3:a:appsmith:appsmith:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.8.3",
"versionEndExcluding": "1.46",
"matchCriteriaId": "200066FD-141E-4023-A8CF-350F46C52870"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/appsmithorg/appsmith/pull/29286",
"source": "cve@mitre.org",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://github.com/appsmithorg/appsmith/releases/tag/v1.46",
"source": "cve@mitre.org",
"tags": [
"Release Notes"
]
},
{
"url": "https://github.com/jahithoque/Vulnerability-Research/tree/main/CVE-2024-51408",
"source": "cve@mitre.org",
"tags": [
"Exploit"
]
} }
] ]
} }

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-51626", "id": "CVE-2024-51626",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-04T15:15:22.730", "published": "2024-11-04T15:15:22.730",
"lastModified": "2024-11-04T18:50:05.607", "lastModified": "2024-11-06T22:10:20.517",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mansur Ahamed Woocommerce Quote Calculator allows Blind SQL Injection.This issue affects Woocommerce Quote Calculator: from n/a through 1.1." "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Mansur Ahamed Woocommerce Quote Calculator allows Blind SQL Injection.This issue affects Woocommerce Quote Calculator: from n/a through 1.1."
},
{
"lang": "es",
"value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en Woocommerce Quote Calculator de Mansur Ahamed permite la inyecci\u00f3n SQL ciega. Este problema afecta a Woocommerce Quote Calculator: desde n/a hasta 1.1."
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{ {
"source": "audit@patchstack.com", "source": "audit@patchstack.com",
"type": "Secondary", "type": "Secondary",
@ -47,10 +71,31 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://patchstack.com/database/vulnerability/woo-quote-calculator-order/wordpress-woocommerce-quote-calculator-plugin-1-1-sql-injection-vulnerability-2?_s_id=cve", "nodes": [
"source": "audit@patchstack.com" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mansurahamed:woocommerce_quote_calculator:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.1",
"matchCriteriaId": "A8F99F04-98CA-4DA4-B7CB-C6C16FD1156C"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/woo-quote-calculator-order/wordpress-woocommerce-quote-calculator-plugin-1-1-sql-injection-vulnerability-2?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-51665", "id": "CVE-2024-51665",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-04T14:15:16.987", "published": "2024-11-04T14:15:16.987",
"lastModified": "2024-11-04T18:50:05.607", "lastModified": "2024-11-06T22:07:10.707",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Server-Side Request Forgery (SSRF) vulnerability in Noor alam Magical Addons For Elementor allows Server Side Request Forgery.This issue affects Magical Addons For Elementor: from n/a through 1.2.1." "value": "Server-Side Request Forgery (SSRF) vulnerability in Noor alam Magical Addons For Elementor allows Server Side Request Forgery.This issue affects Magical Addons For Elementor: from n/a through 1.2.1."
},
{
"lang": "es",
"value": " La vulnerabilidad de Server-Side Request Forgery (SSRF) en Noor alam Magical Addons For Elementor permite Server-Side Request Forgery. Este problema afecta a Magical Addons For Elementor: desde n/a hasta 1.2.1."
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{ {
"source": "audit@patchstack.com", "source": "audit@patchstack.com",
"type": "Secondary", "type": "Secondary",
@ -47,10 +71,31 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://patchstack.com/database/vulnerability/magical-addons-for-elementor/wordpress-magical-addons-for-elementor-plugin-1-2-1-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", "nodes": [
"source": "audit@patchstack.com" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpthemespace:magical_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.2.3",
"matchCriteriaId": "0D7D471C-B15C-4B06-B247-025BA5FB9194"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/magical-addons-for-elementor/wordpress-magical-addons-for-elementor-plugin-1-2-1-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-51672", "id": "CVE-2024-51672",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-04T14:15:17.190", "published": "2024-11-04T14:15:17.190",
"lastModified": "2024-11-04T18:50:05.607", "lastModified": "2024-11-06T22:08:22.747",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPDeveloper BetterLinks allows SQL Injection.This issue affects BetterLinks: from n/a through 2.1.7." "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPDeveloper BetterLinks allows SQL Injection.This issue affects BetterLinks: from n/a through 2.1.7."
},
{
"lang": "es",
"value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de elementos especiales utilizados en un comando SQL ('Inyecci\u00f3n SQL') en WPDeveloper BetterLinks permite la inyecci\u00f3n SQL. Este problema afecta a BetterLinks: desde n/a hasta 2.1.7."
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{ {
"source": "audit@patchstack.com", "source": "audit@patchstack.com",
"type": "Secondary", "type": "Secondary",
@ -47,10 +71,31 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://patchstack.com/database/vulnerability/betterlinks/wordpress-betterlinks-plugin-2-1-7-sql-injection-vulnerability?_s_id=cve", "nodes": [
"source": "audit@patchstack.com" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpdeveloper:betterlinks:*:*:*:*:free:wordpress:*:*",
"versionEndExcluding": "2.1.8",
"matchCriteriaId": "F07AEFF7-CD0F-43EB-AD00-A1B4A2FCE774"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/betterlinks/wordpress-betterlinks-plugin-2-1-7-sql-injection-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-51677", "id": "CVE-2024-51677",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-04T15:15:22.947", "published": "2024-11-04T15:15:22.947",
"lastModified": "2024-11-04T18:50:05.607", "lastModified": "2024-11-06T22:10:31.677",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WebberZone Knowledge Base allows Stored XSS.This issue affects Knowledge Base: from n/a through 2.2.0." "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WebberZone Knowledge Base allows Stored XSS.This issue affects Knowledge Base: from n/a through 2.2.0."
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en WebberZone Knowledge Base permite XSS almacenado. Este problema afecta a Knowledge Base: desde n/a hasta 2.2.0."
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{ {
"source": "audit@patchstack.com", "source": "audit@patchstack.com",
"type": "Secondary", "type": "Secondary",
@ -47,10 +71,31 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://patchstack.com/database/vulnerability/knowledgebase/wordpress-knowledge-base-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", "nodes": [
"source": "audit@patchstack.com" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webberzone:knowledge_base:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.2.1",
"matchCriteriaId": "5E509AFC-6A96-4395-9950-021A25F856EB"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/knowledgebase/wordpress-knowledge-base-plugin-2-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-51678", "id": "CVE-2024-51678",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-04T15:15:23.163", "published": "2024-11-04T15:15:23.163",
"lastModified": "2024-11-04T18:50:05.607", "lastModified": "2024-11-06T22:10:45.103",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Marcel Pol Elo Rating Shortcode allows Stored XSS.This issue affects Elo Rating Shortcode: from n/a through 1.0.3." "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Marcel Pol Elo Rating Shortcode allows Stored XSS.This issue affects Elo Rating Shortcode: from n/a through 1.0.3."
},
{
"lang": "es",
"value": " La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en Marcel Pol Elo Rating Shortcode permite XSS almacenado. Este problema afecta a Elo Rating Shortcode: desde n/a hasta 1.0.3."
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{ {
"source": "audit@patchstack.com", "source": "audit@patchstack.com",
"type": "Secondary", "type": "Secondary",
@ -47,10 +71,31 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://patchstack.com/database/vulnerability/elo-rating-shortcode/wordpress-elo-rating-shortcode-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve", "nodes": [
"source": "audit@patchstack.com" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:timelord:elo_rating_shortcode:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.0.4",
"matchCriteriaId": "DD6BD84D-7596-4867-846B-F1E3D3C850F1"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/elo-rating-shortcode/wordpress-elo-rating-shortcode-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-51680", "id": "CVE-2024-51680",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-04T15:15:23.367", "published": "2024-11-04T15:15:23.367",
"lastModified": "2024-11-04T18:50:05.607", "lastModified": "2024-11-06T22:10:59.270",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CrestaProject \u2013 Rizzo Andrea Cresta Addons for Elementor allows Stored XSS.This issue affects Cresta Addons for Elementor: from n/a through 1.0.9." "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CrestaProject \u2013 Rizzo Andrea Cresta Addons for Elementor allows Stored XSS.This issue affects Cresta Addons for Elementor: from n/a through 1.0.9."
},
{
"lang": "es",
"value": " Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en CrestaProject \u2013 Rizzo Andrea Cresta Addons para Elementor permite XSS almacenado. Este problema afecta a Cresta Addons para Elementor: desde n/a hasta 1.0.9."
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{ {
"source": "audit@patchstack.com", "source": "audit@patchstack.com",
"type": "Secondary", "type": "Secondary",
@ -47,10 +71,31 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://patchstack.com/database/vulnerability/cresta-addons-for-elementor/wordpress-cresta-addons-for-elementor-plugin-1-0-9-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", "nodes": [
"source": "audit@patchstack.com" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:crestaproject:cresta_addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.0",
"matchCriteriaId": "BF5F07AA-0D63-4415-AD80-071F5F656550"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/cresta-addons-for-elementor/wordpress-cresta-addons-for-elementor-plugin-1-0-9-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-51681", "id": "CVE-2024-51681",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-04T15:15:23.577", "published": "2024-11-04T15:15:23.577",
"lastModified": "2024-11-04T18:50:05.607", "lastModified": "2024-11-06T22:11:16.003",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CodeRevolution WP Pocket URLs allows Stored XSS.This issue affects WP Pocket URLs: from n/a through 1.0.3." "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in CodeRevolution WP Pocket URLs allows Stored XSS.This issue affects WP Pocket URLs: from n/a through 1.0.3."
},
{
"lang": "es",
"value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en las URL de WP Pocket de CodeRevolution permite XSS almacenado. Este problema afecta a las URL de WP Pocket: desde n/a hasta 1.0.3."
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{ {
"source": "audit@patchstack.com", "source": "audit@patchstack.com",
"type": "Secondary", "type": "Secondary",
@ -47,10 +71,31 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://patchstack.com/database/vulnerability/wp-pocket-urls/wordpress-wp-pocket-urls-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve", "nodes": [
"source": "audit@patchstack.com" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:coderevolution:wp_pocket_urls:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.0.4",
"matchCriteriaId": "18E7B64D-FBAA-4F21-B18F-DF4162D68AE7"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wp-pocket-urls/wordpress-wp-pocket-urls-plugin-1-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-51682", "id": "CVE-2024-51682",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-04T15:15:23.787", "published": "2024-11-04T15:15:23.787",
"lastModified": "2024-11-04T18:50:05.607", "lastModified": "2024-11-06T22:12:02.353",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in HasThemes HT Builder \u2013 WordPress Theme Builder for Elementor allows Stored XSS.This issue affects HT Builder \u2013 WordPress Theme Builder for Elementor: from n/a through 1.3.0." "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in HasThemes HT Builder \u2013 WordPress Theme Builder for Elementor allows Stored XSS.This issue affects HT Builder \u2013 WordPress Theme Builder for Elementor: from n/a through 1.3.0."
},
{
"lang": "es",
"value": "Vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en HasThemes HT Builder \u2013 WordPress Theme Builder for Elementor permite XSS almacenado. Este problema afecta a HT Builder \u2013 WordPress Theme Builder for Elementor: desde n/a hasta 1.3.0."
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{ {
"source": "audit@patchstack.com", "source": "audit@patchstack.com",
"type": "Secondary", "type": "Secondary",
@ -36,6 +60,16 @@
] ]
}, },
"weaknesses": [ "weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{ {
"source": "audit@patchstack.com", "source": "audit@patchstack.com",
"type": "Secondary", "type": "Secondary",
@ -47,10 +81,31 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://patchstack.com/database/vulnerability/ht-builder/wordpress-ht-builder-wordpress-theme-builder-for-elementor-plugin-1-3-0-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", "nodes": [
"source": "audit@patchstack.com" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hasthemes:ht_builder:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.3.1",
"matchCriteriaId": "FD23AE19-E68B-4DBF-9ED9-4B9DD085271E"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/ht-builder/wordpress-ht-builder-wordpress-theme-builder-for-elementor-plugin-1-3-0-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-51683", "id": "CVE-2024-51683",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-11-04T15:15:24.013", "published": "2024-11-04T15:15:24.013",
"lastModified": "2024-11-04T18:50:05.607", "lastModified": "2024-11-06T22:12:19.803",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Michael Gangolf Custom post type templates for Elementor allows Stored XSS.This issue affects Custom post type templates for Elementor: from n/a through 1.10.1." "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Michael Gangolf Custom post type templates for Elementor allows Stored XSS.This issue affects Custom post type templates for Elementor: from n/a through 1.10.1."
},
{
"lang": "es",
"value": "Vulnerabilidad de neutralizaci\u00f3n inadecuada de la entrada durante la generaci\u00f3n de p\u00e1ginas web (XSS o 'Cross-site Scripting') en las plantillas de tipo de publicaci\u00f3n personalizadas de Michael Gangolf para Elementor permite XSS almacenado. Este problema afecta a Custom post type templates for Elementor: desde n/a hasta 1.10.1."
} }
], ],
"metrics": { "metrics": {
"cvssMetricV31": [ "cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{ {
"source": "audit@patchstack.com", "source": "audit@patchstack.com",
"type": "Secondary", "type": "Secondary",
@ -47,10 +71,31 @@
] ]
} }
], ],
"references": [ "configurations": [
{ {
"url": "https://patchstack.com/database/vulnerability/custom-post-type-templates-for-elementor/wordpress-custom-post-type-templates-for-elementor-plugin-1-10-1-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", "nodes": [
"source": "audit@patchstack.com" {
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:migaweb:custom_post_type_templates_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.12",
"matchCriteriaId": "BC28FA62-4EAC-4B4F-8E90-83862AFF1FDF"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/custom-post-type-templates-for-elementor/wordpress-custom-post-type-templates-for-elementor-plugin-1-10-1-stored-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-51736",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-06T21:15:06.600",
"lastModified": "2024-11-06T21:15:06.600",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Symphony process is a module for the Symphony PHP framework which executes commands in sub-processes. On Windows, when an executable file named `cmd.exe` is located in the current working directory it will be called by the `Process` class when preparing command arguments, leading to possible hijacking. This issue has been addressed in release versions 5.4.46, 6.4.14, and 7.1.7. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"baseSeverity": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 0.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/symfony/symfony/security/advisories/GHSA-qq5c-677p-737q",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/symfony/symfony/security/advisories/GHSA-qq5c-677p-737q",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51757", "id": "CVE-2024-51757",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-06T20:15:06.337", "published": "2024-11-06T20:15:06.337",
"lastModified": "2024-11-06T20:15:06.337", "lastModified": "2024-11-06T21:15:06.807",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -78,6 +78,10 @@
"url": "https://github.com/capricorn86/happy-dom/commit/5ee0b1676d4ce20cc2a70d1c9c8d6f1e3f57efac", "url": "https://github.com/capricorn86/happy-dom/commit/5ee0b1676d4ce20cc2a70d1c9c8d6f1e3f57efac",
"source": "security-advisories@github.com" "source": "security-advisories@github.com"
}, },
{
"url": "https://github.com/capricorn86/happy-dom/commit/d23834c232f1cf5519c9418b073f1dcec6b2f0fd",
"source": "security-advisories@github.com"
},
{ {
"url": "https://github.com/capricorn86/happy-dom/issues/1585", "url": "https://github.com/capricorn86/happy-dom/issues/1585",
"source": "security-advisories@github.com" "source": "security-advisories@github.com"
@ -86,6 +90,10 @@
"url": "https://github.com/capricorn86/happy-dom/pull/1586", "url": "https://github.com/capricorn86/happy-dom/pull/1586",
"source": "security-advisories@github.com" "source": "security-advisories@github.com"
}, },
{
"url": "https://github.com/capricorn86/happy-dom/releases/tag/v15.10.2",
"source": "security-advisories@github.com"
},
{ {
"url": "https://github.com/capricorn86/happy-dom/security/advisories/GHSA-96g7-g7g9-jxw8", "url": "https://github.com/capricorn86/happy-dom/security/advisories/GHSA-96g7-g7g9-jxw8",
"source": "security-advisories@github.com" "source": "security-advisories@github.com"

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-5642", "id": "CVE-2024-5642",
"sourceIdentifier": "cna@python.org", "sourceIdentifier": "cna@python.org",
"published": "2024-06-27T21:15:16.070", "published": "2024-06-27T21:15:16.070",
"lastModified": "2024-07-28T14:15:11.220", "lastModified": "2024-11-06T21:35:08.690",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,30 @@
"value": "CPython 3.9 y versiones anteriores no permiten la configuraci\u00f3n de una lista vac\u00eda (\"[]\") para SSLContext.set_npn_protocols(), que es un valor no v\u00e1lido para la API OpenSSL subyacente. Esto da como resultado una lectura excesiva del b\u00fafer cuando se utiliza NPN (consulte CVE-2024-5535 para OpenSSL). Esta vulnerabilidad es de baja gravedad debido a que NPN no se usa ampliamente y especificar una lista vac\u00eda probablemente sea poco com\u00fan en la pr\u00e1ctica (normalmente se configurar\u00eda un nombre de protocolo)." "value": "CPython 3.9 y versiones anteriores no permiten la configuraci\u00f3n de una lista vac\u00eda (\"[]\") para SSLContext.set_npn_protocols(), que es un valor no v\u00e1lido para la API OpenSSL subyacente. Esto da como resultado una lectura excesiva del b\u00fafer cuando se utiliza NPN (consulte CVE-2024-5535 para OpenSSL). Esta vulnerabilidad es de baja gravedad debido a que NPN no se usa ampliamente y especificar una lista vac\u00eda probablemente sea poco com\u00fan en la pr\u00e1ctica (normalmente se configurar\u00eda un nombre de protocolo)."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"references": [ "references": [
{ {
"url": "http://www.openwall.com/lists/oss-security/2024/06/28/4", "url": "http://www.openwall.com/lists/oss-security/2024/06/28/4",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2024-11-06T21:00:21.583587+00:00 2024-11-06T23:00:20.311060+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2024-11-06T20:55:37.613000+00:00 2024-11-06T22:56:41.647000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,49 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
268480 268488
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `5` Recently added CVEs: `8`
- [CVE-2024-51751](CVE-2024/CVE-2024-517xx/CVE-2024-51751.json) (`2024-11-06T20:15:05.557`) - [CVE-2024-10926](CVE-2024/CVE-2024-109xx/CVE-2024-10926.json) (`2024-11-06T21:15:04.927`)
- [CVE-2024-51754](CVE-2024/CVE-2024-517xx/CVE-2024-51754.json) (`2024-11-06T20:15:05.817`) - [CVE-2024-10941](CVE-2024/CVE-2024-109xx/CVE-2024-10941.json) (`2024-11-06T21:15:05.213`)
- [CVE-2024-51755](CVE-2024/CVE-2024-517xx/CVE-2024-51755.json) (`2024-11-06T20:15:06.077`) - [CVE-2024-50340](CVE-2024/CVE-2024-503xx/CVE-2024-50340.json) (`2024-11-06T21:15:05.527`)
- [CVE-2024-51757](CVE-2024/CVE-2024-517xx/CVE-2024-51757.json) (`2024-11-06T20:15:06.337`) - [CVE-2024-50341](CVE-2024/CVE-2024-503xx/CVE-2024-50341.json) (`2024-11-06T21:15:05.747`)
- [CVE-2024-51988](CVE-2024/CVE-2024-519xx/CVE-2024-51988.json) (`2024-11-06T20:15:06.513`) - [CVE-2024-50342](CVE-2024/CVE-2024-503xx/CVE-2024-50342.json) (`2024-11-06T21:15:05.963`)
- [CVE-2024-50343](CVE-2024/CVE-2024-503xx/CVE-2024-50343.json) (`2024-11-06T21:15:06.180`)
- [CVE-2024-50345](CVE-2024/CVE-2024-503xx/CVE-2024-50345.json) (`2024-11-06T21:15:06.383`)
- [CVE-2024-51736](CVE-2024/CVE-2024-517xx/CVE-2024-51736.json) (`2024-11-06T21:15:06.600`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `65` Recently modified CVEs: `50`
- [CVE-2024-48052](CVE-2024/CVE-2024-480xx/CVE-2024-48052.json) (`2024-11-06T20:35:29.830`) - [CVE-2024-26779](CVE-2024/CVE-2024-267xx/CVE-2024-26779.json) (`2024-11-06T22:35:05.993`)
- [CVE-2024-48061](CVE-2024/CVE-2024-480xx/CVE-2024-48061.json) (`2024-11-06T20:35:30.633`) - [CVE-2024-28895](CVE-2024/CVE-2024-288xx/CVE-2024-28895.json) (`2024-11-06T21:35:05.843`)
- [CVE-2024-48463](CVE-2024/CVE-2024-484xx/CVE-2024-48463.json) (`2024-11-06T19:35:17.717`) - [CVE-2024-29948](CVE-2024/CVE-2024-299xx/CVE-2024-29948.json) (`2024-11-06T21:35:06.680`)
- [CVE-2024-48809](CVE-2024/CVE-2024-488xx/CVE-2024-48809.json) (`2024-11-06T19:33:54.977`) - [CVE-2024-30122](CVE-2024/CVE-2024-301xx/CVE-2024-30122.json) (`2024-11-06T22:33:46.797`)
- [CVE-2024-49217](CVE-2024/CVE-2024-492xx/CVE-2024-49217.json) (`2024-11-06T20:53:26.900`) - [CVE-2024-33338](CVE-2024/CVE-2024-333xx/CVE-2024-33338.json) (`2024-11-06T22:35:06.803`)
- [CVE-2024-49219](CVE-2024/CVE-2024-492xx/CVE-2024-49219.json) (`2024-11-06T20:45:08.233`) - [CVE-2024-35835](CVE-2024/CVE-2024-358xx/CVE-2024-35835.json) (`2024-11-06T21:35:07.630`)
- [CVE-2024-49220](CVE-2024/CVE-2024-492xx/CVE-2024-49220.json) (`2024-11-06T20:41:13.367`) - [CVE-2024-36881](CVE-2024/CVE-2024-368xx/CVE-2024-36881.json) (`2024-11-06T22:35:07.757`)
- [CVE-2024-49221](CVE-2024/CVE-2024-492xx/CVE-2024-49221.json) (`2024-11-06T20:54:50.527`) - [CVE-2024-47253](CVE-2024/CVE-2024-472xx/CVE-2024-47253.json) (`2024-11-06T22:23:29.663`)
- [CVE-2024-49223](CVE-2024/CVE-2024-492xx/CVE-2024-49223.json) (`2024-11-06T20:55:37.613`) - [CVE-2024-47254](CVE-2024/CVE-2024-472xx/CVE-2024-47254.json) (`2024-11-06T22:22:01.623`)
- [CVE-2024-49229](CVE-2024/CVE-2024-492xx/CVE-2024-49229.json) (`2024-11-06T20:40:30.740`) - [CVE-2024-47255](CVE-2024/CVE-2024-472xx/CVE-2024-47255.json) (`2024-11-06T22:23:05.770`)
- [CVE-2024-49237](CVE-2024/CVE-2024-492xx/CVE-2024-49237.json) (`2024-11-06T20:33:52.403`) - [CVE-2024-48050](CVE-2024/CVE-2024-480xx/CVE-2024-48050.json) (`2024-11-06T21:35:07.863`)
- [CVE-2024-50637](CVE-2024/CVE-2024-506xx/CVE-2024-50637.json) (`2024-11-06T20:35:33.010`) - [CVE-2024-49370](CVE-2024/CVE-2024-493xx/CVE-2024-49370.json) (`2024-11-06T22:31:30.160`)
- [CVE-2024-51127](CVE-2024/CVE-2024-511xx/CVE-2024-51127.json) (`2024-11-06T19:25:14.607`) - [CVE-2024-49675](CVE-2024/CVE-2024-496xx/CVE-2024-49675.json) (`2024-11-06T22:24:22.907`)
- [CVE-2024-51132](CVE-2024/CVE-2024-511xx/CVE-2024-51132.json) (`2024-11-06T20:35:34.173`) - [CVE-2024-51408](CVE-2024/CVE-2024-514xx/CVE-2024-51408.json) (`2024-11-06T22:06:43.100`)
- [CVE-2024-51136](CVE-2024/CVE-2024-511xx/CVE-2024-51136.json) (`2024-11-06T19:31:15.230`) - [CVE-2024-51626](CVE-2024/CVE-2024-516xx/CVE-2024-51626.json) (`2024-11-06T22:10:20.517`)
- [CVE-2024-51240](CVE-2024/CVE-2024-512xx/CVE-2024-51240.json) (`2024-11-06T20:35:34.963`) - [CVE-2024-51665](CVE-2024/CVE-2024-516xx/CVE-2024-51665.json) (`2024-11-06T22:07:10.707`)
- [CVE-2024-51329](CVE-2024/CVE-2024-513xx/CVE-2024-51329.json) (`2024-11-06T19:19:24.793`) - [CVE-2024-51672](CVE-2024/CVE-2024-516xx/CVE-2024-51672.json) (`2024-11-06T22:08:22.747`)
- [CVE-2024-51362](CVE-2024/CVE-2024-513xx/CVE-2024-51362.json) (`2024-11-06T20:35:35.750`) - [CVE-2024-51677](CVE-2024/CVE-2024-516xx/CVE-2024-51677.json) (`2024-11-06T22:10:31.677`)
- [CVE-2024-51685](CVE-2024/CVE-2024-516xx/CVE-2024-51685.json) (`2024-11-06T19:34:31.590`) - [CVE-2024-51678](CVE-2024/CVE-2024-516xx/CVE-2024-51678.json) (`2024-11-06T22:10:45.103`)
- [CVE-2024-8775](CVE-2024/CVE-2024-87xx/CVE-2024-8775.json) (`2024-11-06T20:15:06.763`) - [CVE-2024-51680](CVE-2024/CVE-2024-516xx/CVE-2024-51680.json) (`2024-11-06T22:10:59.270`)
- [CVE-2024-9341](CVE-2024/CVE-2024-93xx/CVE-2024-9341.json) (`2024-11-06T20:15:06.917`) - [CVE-2024-51681](CVE-2024/CVE-2024-516xx/CVE-2024-51681.json) (`2024-11-06T22:11:16.003`)
- [CVE-2024-9675](CVE-2024/CVE-2024-96xx/CVE-2024-9675.json) (`2024-11-06T20:15:07.083`) - [CVE-2024-51682](CVE-2024/CVE-2024-516xx/CVE-2024-51682.json) (`2024-11-06T22:12:02.353`)
- [CVE-2024-9676](CVE-2024/CVE-2024-96xx/CVE-2024-9676.json) (`2024-11-06T20:15:07.410`) - [CVE-2024-51683](CVE-2024/CVE-2024-516xx/CVE-2024-51683.json) (`2024-11-06T22:12:19.803`)
- [CVE-2024-9689](CVE-2024/CVE-2024-96xx/CVE-2024-9689.json) (`2024-11-06T19:14:53.737`) - [CVE-2024-51757](CVE-2024/CVE-2024-517xx/CVE-2024-51757.json) (`2024-11-06T21:15:06.807`)
- [CVE-2024-9902](CVE-2024/CVE-2024-99xx/CVE-2024-9902.json) (`2024-11-06T20:15:07.820`) - [CVE-2024-5642](CVE-2024/CVE-2024-56xx/CVE-2024-5642.json) (`2024-11-06T21:35:08.690`)
## Download and Usage ## Download and Usage

View File

@ -159311,7 +159311,7 @@ CVE-2020-36760,0,0,d3d6bde66e39bfdfd4a841324d82e511491b3d42fe004f124c54ac6ba8cb5
CVE-2020-36761,0,0,c2eb02c7f5e6234f0a11001f3ccc54043ed97dd502248791c8d262b51058890e,2023-11-07T03:22:33.597000 CVE-2020-36761,0,0,c2eb02c7f5e6234f0a11001f3ccc54043ed97dd502248791c8d262b51058890e,2023-11-07T03:22:33.597000
CVE-2020-36762,0,0,f6173b7fd6f97d18fb02891c23a7c6178aa06e9b134b77ef08cd35cdcdc36681,2024-05-17T01:48:57.747000 CVE-2020-36762,0,0,f6173b7fd6f97d18fb02891c23a7c6178aa06e9b134b77ef08cd35cdcdc36681,2024-05-17T01:48:57.747000
CVE-2020-36763,0,0,e42a9e5e88fb81af0859cd97e3a2fb6d19d996764baf3706e8d6074686ad2768,2023-08-04T14:01:30.770000 CVE-2020-36763,0,0,e42a9e5e88fb81af0859cd97e3a2fb6d19d996764baf3706e8d6074686ad2768,2023-08-04T14:01:30.770000
CVE-2020-36765,0,1,8f5e53cdfa6de8b7bd007fab9b4b3fa9f738261de98aabc48e6fd805e67dd712,2024-11-06T20:35:02.123000 CVE-2020-36765,0,0,8f5e53cdfa6de8b7bd007fab9b4b3fa9f738261de98aabc48e6fd805e67dd712,2024-11-06T20:35:02.123000
CVE-2020-36766,0,0,114009cd5e840397d1acebf053cb444eb4c7cbfbe18f570ae9870647d1e8facf,2023-09-19T21:23:38.407000 CVE-2020-36766,0,0,114009cd5e840397d1acebf053cb444eb4c7cbfbe18f570ae9870647d1e8facf,2023-09-19T21:23:38.407000
CVE-2020-36767,0,0,05a3a61dc2792f45359316526a3d616e7f19a025ecb636a8fbad638d49ca9941,2024-09-09T20:35:00.707000 CVE-2020-36767,0,0,05a3a61dc2792f45359316526a3d616e7f19a025ecb636a8fbad638d49ca9941,2024-09-09T20:35:00.707000
CVE-2020-36768,0,0,ecc80caa61f3e820e6276ca18cc7a867921e71d907d5691cbc8a6de956bf71d9,2024-05-17T01:48:57.980000 CVE-2020-36768,0,0,ecc80caa61f3e820e6276ca18cc7a867921e71d907d5691cbc8a6de956bf71d9,2024-05-17T01:48:57.980000
@ -186998,7 +186998,7 @@ CVE-2021-47071,0,0,b0504ff2034ae0c4cc16202b4cc6e9136ea7ef90af22d96415d8d13f21662
CVE-2021-47072,0,0,cf41cbf231f55b926ec73e3d5eeef7180bfd709e7f8ced7efd6dbec1d429bdcf,2024-03-01T22:22:25.913000 CVE-2021-47072,0,0,cf41cbf231f55b926ec73e3d5eeef7180bfd709e7f8ced7efd6dbec1d429bdcf,2024-03-01T22:22:25.913000
CVE-2021-47073,0,0,55717623a5e4775e6cdba866cbade7342e2c623e9f3852474ccdaf2b36202333,2024-03-01T22:22:25.913000 CVE-2021-47073,0,0,55717623a5e4775e6cdba866cbade7342e2c623e9f3852474ccdaf2b36202333,2024-03-01T22:22:25.913000
CVE-2021-47074,0,0,c944055c12bdbb473a00f06ba663e9aa59fbf07805a8b36dc68ca8eaece782c8,2024-03-01T22:22:25.913000 CVE-2021-47074,0,0,c944055c12bdbb473a00f06ba663e9aa59fbf07805a8b36dc68ca8eaece782c8,2024-03-01T22:22:25.913000
CVE-2021-47075,0,0,fbef03aac6a8106fd4f4c672eae599661287850b31546fdede7523cd1d19f393,2024-03-01T22:22:25.913000 CVE-2021-47075,0,1,27e8af01fd213c49f50653349ef0cf1ed22ebbd4ae6322143077ee7949c385c4,2024-11-06T22:35:00.660000
CVE-2021-47076,0,0,7c8622ce3d2f5da5194ef5fbe7d3dddeb59a9016a2e1d320c327f4bb4eeac7a7,2024-03-01T22:22:25.913000 CVE-2021-47076,0,0,7c8622ce3d2f5da5194ef5fbe7d3dddeb59a9016a2e1d320c327f4bb4eeac7a7,2024-03-01T22:22:25.913000
CVE-2021-47077,0,0,094226e13a4d30639d25f36be3dfea47179d6a1794694d0d910952f9e632810a,2024-03-01T22:22:25.913000 CVE-2021-47077,0,0,094226e13a4d30639d25f36be3dfea47179d6a1794694d0d910952f9e632810a,2024-03-01T22:22:25.913000
CVE-2021-47078,0,0,e39a645f82e6ef83a23da18377ebefe42c441100a5fd642553de38a4fecea2c2,2024-11-01T08:35:01.573000 CVE-2021-47078,0,0,e39a645f82e6ef83a23da18377ebefe42c441100a5fd642553de38a4fecea2c2,2024-11-01T08:35:01.573000
@ -187154,7 +187154,7 @@ CVE-2021-47227,0,0,d58b6e5d0039e2c73e223660c4806a8199d919f5d02b15eb3b8ec0875620e
CVE-2021-47228,0,0,9c1b787ae52c72cbfb8866da7935ec75c9a82081ae53aec3f3f0cce23cf65a07,2024-10-31T15:35:03.093000 CVE-2021-47228,0,0,9c1b787ae52c72cbfb8866da7935ec75c9a82081ae53aec3f3f0cce23cf65a07,2024-10-31T15:35:03.093000
CVE-2021-47229,0,0,fbd2921f2b86842d2838e402054523e81b9ec6072574e295a789287be69873f9,2024-05-21T16:54:26.047000 CVE-2021-47229,0,0,fbd2921f2b86842d2838e402054523e81b9ec6072574e295a789287be69873f9,2024-05-21T16:54:26.047000
CVE-2021-47230,0,0,e93bfe980140e197128aeec8d8e071a295e8048bcae174dc11c0f6f8b98f2b67,2024-07-03T01:37:24.797000 CVE-2021-47230,0,0,e93bfe980140e197128aeec8d8e071a295e8048bcae174dc11c0f6f8b98f2b67,2024-07-03T01:37:24.797000
CVE-2021-47231,0,1,1256bef4bbc75f826a04367ba6cc6ef92a8f6c223b664e3719ccc68eabc6d142,2024-11-06T20:35:02.850000 CVE-2021-47231,0,0,1256bef4bbc75f826a04367ba6cc6ef92a8f6c223b664e3719ccc68eabc6d142,2024-11-06T20:35:02.850000
CVE-2021-47232,0,0,815758cd4f06e69d867d33b6931ac610aa8caffc0e8fb7075a2a9e75b5c2f775,2024-07-03T01:37:25.720000 CVE-2021-47232,0,0,815758cd4f06e69d867d33b6931ac610aa8caffc0e8fb7075a2a9e75b5c2f775,2024-07-03T01:37:25.720000
CVE-2021-47233,0,0,835070949da84097217f4d4e5033c3ff72191f49028f7bd22052b56b38fe9b03,2024-05-21T16:54:26.047000 CVE-2021-47233,0,0,835070949da84097217f4d4e5033c3ff72191f49028f7bd22052b56b38fe9b03,2024-05-21T16:54:26.047000
CVE-2021-47234,0,0,5e090bb9140802a519feef1c4149d848ac7b86688c14a5e0d7f61b967b2d5c5b,2024-05-21T16:54:26.047000 CVE-2021-47234,0,0,5e090bb9140802a519feef1c4149d848ac7b86688c14a5e0d7f61b967b2d5c5b,2024-05-21T16:54:26.047000
@ -187220,7 +187220,7 @@ CVE-2021-47293,0,0,d4175717fac52bdecf0a051eab952d1932ea701c0d180eda92454abd07515
CVE-2021-47294,0,0,eed110f6ebe2f4f1f995b47d7666e7889aeb7fa2d87e2f53966418b3abc9e4bb,2024-05-21T16:54:26.047000 CVE-2021-47294,0,0,eed110f6ebe2f4f1f995b47d7666e7889aeb7fa2d87e2f53966418b3abc9e4bb,2024-05-21T16:54:26.047000
CVE-2021-47295,0,0,013087c79c3f331d9bb419ea80648c1fa718978367791e83c9506e16cd9f49b1,2024-07-03T01:37:35.127000 CVE-2021-47295,0,0,013087c79c3f331d9bb419ea80648c1fa718978367791e83c9506e16cd9f49b1,2024-07-03T01:37:35.127000
CVE-2021-47296,0,0,553ad20d7a60522641b80e942c788444f417324fcfe1677518267567a26cc7f8,2024-05-21T16:54:26.047000 CVE-2021-47296,0,0,553ad20d7a60522641b80e942c788444f417324fcfe1677518267567a26cc7f8,2024-05-21T16:54:26.047000
CVE-2021-47297,0,1,333805ed4e79f0bc3b67d88c0e6192920afb3fddf5417e17801e321533d44e06,2024-11-06T20:35:03.380000 CVE-2021-47297,0,0,333805ed4e79f0bc3b67d88c0e6192920afb3fddf5417e17801e321533d44e06,2024-11-06T20:35:03.380000
CVE-2021-47298,0,0,2a6bc6b6da25d2e397b3047358e3f94e3be86c5fbb66b5f57b8901cb87aa771f,2024-05-21T16:54:26.047000 CVE-2021-47298,0,0,2a6bc6b6da25d2e397b3047358e3f94e3be86c5fbb66b5f57b8901cb87aa771f,2024-05-21T16:54:26.047000
CVE-2021-47299,0,0,fba4b9b1cb0e64292a95658fd15d778e7dd5706d84eedb82deb4717ed9433da9,2024-05-21T16:54:26.047000 CVE-2021-47299,0,0,fba4b9b1cb0e64292a95658fd15d778e7dd5706d84eedb82deb4717ed9433da9,2024-05-21T16:54:26.047000
CVE-2021-47300,0,0,99d2f09c980dd38f30812bc5dbc2efbb17c499e36ca13769411dcadecf2f2dee,2024-05-21T16:54:26.047000 CVE-2021-47300,0,0,99d2f09c980dd38f30812bc5dbc2efbb17c499e36ca13769411dcadecf2f2dee,2024-05-21T16:54:26.047000
@ -187307,7 +187307,7 @@ CVE-2021-47380,0,0,6ef9d8f19e2d391d612177085eea92176c97933b61d761b5b210101aade90
CVE-2021-47381,0,0,7b85e763b1e6aa964beacb6a095e7a796de91e62f6b651bf54755e15c83c4be4,2024-05-21T16:54:26.047000 CVE-2021-47381,0,0,7b85e763b1e6aa964beacb6a095e7a796de91e62f6b651bf54755e15c83c4be4,2024-05-21T16:54:26.047000
CVE-2021-47382,0,0,9902b5f0babaa9562f55cdcd44eda32880d1e10eda3b2384591d56d854c8420d,2024-05-21T16:54:26.047000 CVE-2021-47382,0,0,9902b5f0babaa9562f55cdcd44eda32880d1e10eda3b2384591d56d854c8420d,2024-05-21T16:54:26.047000
CVE-2021-47383,0,0,ff2552053b4f1b5e9d4e30daff68cd5b1b4bfd57e3ba2b4b2bab0caff135d3fa,2024-05-21T16:54:26.047000 CVE-2021-47383,0,0,ff2552053b4f1b5e9d4e30daff68cd5b1b4bfd57e3ba2b4b2bab0caff135d3fa,2024-05-21T16:54:26.047000
CVE-2021-47384,0,1,2a53cff041f6cd283c6aba6c3e33acbe7cdf32bb789c5688d14d6402d59d7023,2024-11-06T19:35:00.697000 CVE-2021-47384,0,0,2a53cff041f6cd283c6aba6c3e33acbe7cdf32bb789c5688d14d6402d59d7023,2024-11-06T19:35:00.697000
CVE-2021-47385,0,0,6010a520bcd7b1504800904e8165de2217ee2ba960dce5e53887b1aaa9581f95,2024-05-21T16:54:26.047000 CVE-2021-47385,0,0,6010a520bcd7b1504800904e8165de2217ee2ba960dce5e53887b1aaa9581f95,2024-05-21T16:54:26.047000
CVE-2021-47386,0,0,e158effddd011922f6bb1e239f3ac2ff0958ef62d3ee287d6927aa1acec73135,2024-05-21T16:54:26.047000 CVE-2021-47386,0,0,e158effddd011922f6bb1e239f3ac2ff0958ef62d3ee287d6927aa1acec73135,2024-05-21T16:54:26.047000
CVE-2021-47387,0,0,8b75eab51a871e46e57add98c9e15658762b300490120d757b7bbb028d38406c,2024-05-21T16:54:26.047000 CVE-2021-47387,0,0,8b75eab51a871e46e57add98c9e15658762b300490120d757b7bbb028d38406c,2024-05-21T16:54:26.047000
@ -187400,7 +187400,7 @@ CVE-2021-47473,0,0,62c8562680eb4c53639001cda404b00fb742f1279f4684ea0674924bae10b
CVE-2021-47474,0,0,04fd221fb63a425b0cc8651869ddb014996f7867a1d0ff2cdc001afbfca8f702,2024-05-22T12:46:53.887000 CVE-2021-47474,0,0,04fd221fb63a425b0cc8651869ddb014996f7867a1d0ff2cdc001afbfca8f702,2024-05-22T12:46:53.887000
CVE-2021-47475,0,0,946afe63fc7669980621eb147080dce8165a487bfe4fc5efdf98c317407e6aed,2024-05-22T12:46:53.887000 CVE-2021-47475,0,0,946afe63fc7669980621eb147080dce8165a487bfe4fc5efdf98c317407e6aed,2024-05-22T12:46:53.887000
CVE-2021-47476,0,0,fa51be5b9d9f0fc66eedc2509899a798c0e108eebb09ae670114483c19895964,2024-11-01T15:35:04.050000 CVE-2021-47476,0,0,fa51be5b9d9f0fc66eedc2509899a798c0e108eebb09ae670114483c19895964,2024-11-01T15:35:04.050000
CVE-2021-47477,0,1,47f976030f46c20da49f298e5d3296ed2f0af2b5274eb733500f61bef980ebd3,2024-11-06T20:35:03.627000 CVE-2021-47477,0,0,47f976030f46c20da49f298e5d3296ed2f0af2b5274eb733500f61bef980ebd3,2024-11-06T20:35:03.627000
CVE-2021-47478,0,0,0c4d619a017b34a9e71fca60c9c78d1369044c99a73f7a9704ccc8d6d4213331,2024-05-22T12:46:53.887000 CVE-2021-47478,0,0,0c4d619a017b34a9e71fca60c9c78d1369044c99a73f7a9704ccc8d6d4213331,2024-05-22T12:46:53.887000
CVE-2021-47479,0,0,23846c9680437faaee8b60d655484b75ffbf3f6cfbaddf65bfa876ba4daa07c5,2024-05-22T12:46:53.887000 CVE-2021-47479,0,0,23846c9680437faaee8b60d655484b75ffbf3f6cfbaddf65bfa876ba4daa07c5,2024-05-22T12:46:53.887000
CVE-2021-47480,0,0,6fe0bcb80501304551f827c43dc962bcec63fb14686881c0934d1e7cba05e2dc,2024-05-22T12:46:53.887000 CVE-2021-47480,0,0,6fe0bcb80501304551f827c43dc962bcec63fb14686881c0934d1e7cba05e2dc,2024-05-22T12:46:53.887000
@ -187509,7 +187509,7 @@ CVE-2021-47582,0,0,a303bc490ed932a1afc5bb4b5129633bc3034bcabff4864f9a509289f08af
CVE-2021-47583,0,0,31fa0416a87d3ac15f0275ea6141b29b416ea02761d8c7a0b7bebf09c972c897,2024-06-20T12:43:25.663000 CVE-2021-47583,0,0,31fa0416a87d3ac15f0275ea6141b29b416ea02761d8c7a0b7bebf09c972c897,2024-06-20T12:43:25.663000
CVE-2021-47584,0,0,5e297524c53687d7062f536fc4ebf0eec9dd59e0e1b8ce2a1565481a5d020832,2024-08-19T18:35:20.133000 CVE-2021-47584,0,0,5e297524c53687d7062f536fc4ebf0eec9dd59e0e1b8ce2a1565481a5d020832,2024-08-19T18:35:20.133000
CVE-2021-47585,0,0,ce01987df681397de7d54893e5efcb2392f1d920c4c52cb4fe8e15c2b35f81ff,2024-08-19T18:29:03.543000 CVE-2021-47585,0,0,ce01987df681397de7d54893e5efcb2392f1d920c4c52cb4fe8e15c2b35f81ff,2024-08-19T18:29:03.543000
CVE-2021-47586,0,1,9999b29ebc4be5f8da91519ea116e955bba1883cec7a48554f483b4ba00be485,2024-11-06T20:35:03.827000 CVE-2021-47586,0,0,9999b29ebc4be5f8da91519ea116e955bba1883cec7a48554f483b4ba00be485,2024-11-06T20:35:03.827000
CVE-2021-47587,0,0,87a6481c75c4ef2a3e6251612b5954051141159c9762a4879438fd1aa646fa0c,2024-11-01T15:10:35.867000 CVE-2021-47587,0,0,87a6481c75c4ef2a3e6251612b5954051141159c9762a4879438fd1aa646fa0c,2024-11-01T15:10:35.867000
CVE-2021-47588,0,0,0f7c2ddebf5230cc4da6aa5555c1f5261002923073136fff5e4910d65af55ae8,2024-06-20T12:43:25.663000 CVE-2021-47588,0,0,0f7c2ddebf5230cc4da6aa5555c1f5261002923073136fff5e4910d65af55ae8,2024-06-20T12:43:25.663000
CVE-2021-47589,0,0,90b76d41b40e586a29ff9e2db3957fc07fd2120cba5363d84fdec4e79fc74d37,2024-08-27T03:16:19 CVE-2021-47589,0,0,90b76d41b40e586a29ff9e2db3957fc07fd2120cba5363d84fdec4e79fc74d37,2024-08-27T03:16:19
@ -216927,7 +216927,7 @@ CVE-2023-22586,0,0,c0f6f379862442d3ccd46f1d01f35b2a6cd6c71022a896121eb7f131c67a1
CVE-2023-2259,0,0,9259ad9ceae0c8c1f4c656af51f2c18472350b622766660808a6aa2eb69bd018,2023-05-03T20:01:59.110000 CVE-2023-2259,0,0,9259ad9ceae0c8c1f4c656af51f2c18472350b622766660808a6aa2eb69bd018,2023-05-03T20:01:59.110000
CVE-2023-22591,0,0,75da081719215e85b169466ab96fafbcbf7d54cd5859377961ad331a00e45425,2023-11-07T04:07:04.387000 CVE-2023-22591,0,0,75da081719215e85b169466ab96fafbcbf7d54cd5859377961ad331a00e45425,2023-11-07T04:07:04.387000
CVE-2023-22592,0,0,82b28f4ba2eac1f90837e550befeb0c1e0dcb9f94216a05d29c70063cff743b9,2023-11-07T04:07:04.477000 CVE-2023-22592,0,0,82b28f4ba2eac1f90837e550befeb0c1e0dcb9f94216a05d29c70063cff743b9,2023-11-07T04:07:04.477000
CVE-2023-22593,0,1,857bc2f70352828bb2de5e8a29e130b4a49b0e8b05230cc04409046b66a53189,2024-11-06T19:35:01.273000 CVE-2023-22593,0,0,857bc2f70352828bb2de5e8a29e130b4a49b0e8b05230cc04409046b66a53189,2024-11-06T19:35:01.273000
CVE-2023-22594,0,0,e7b22226fc5536c38dc1bfa9b8608c26d55fce01972e039872a3a3f6d24cb664,2023-11-07T04:07:04.730000 CVE-2023-22594,0,0,e7b22226fc5536c38dc1bfa9b8608c26d55fce01972e039872a3a3f6d24cb664,2023-11-07T04:07:04.730000
CVE-2023-22595,0,0,87c19ed494799c85280ecc5603d2d131eb58c4866c8bd25864baeef2d8d8a9b8,2023-08-04T17:25:00.243000 CVE-2023-22595,0,0,87c19ed494799c85280ecc5603d2d131eb58c4866c8bd25864baeef2d8d8a9b8,2023-08-04T17:25:00.243000
CVE-2023-22597,0,0,c5b8c532ce487ca0c3338f3c64fe075c749ce4ed59b601364427efe8a3f912d0,2023-11-07T04:07:04.990000 CVE-2023-22597,0,0,c5b8c532ce487ca0c3338f3c64fe075c749ce4ed59b601364427efe8a3f912d0,2023-11-07T04:07:04.990000
@ -223003,7 +223003,7 @@ CVE-2023-30307,0,0,9a4646bb9568f252fc01074e511568fce5daa83ca6ffc95bb5a8dd9c13ef0
CVE-2023-30308,0,0,3194094e704a260b61b3aca71ad9525f4004c473c591db53bbad11ae33f61923,2024-05-29T13:02:09.280000 CVE-2023-30308,0,0,3194094e704a260b61b3aca71ad9525f4004c473c591db53bbad11ae33f61923,2024-05-29T13:02:09.280000
CVE-2023-30309,0,0,7bed2cc00d974c0f21981e002db05aa1d9c9bb6eea8a85e53b56492f139e3535,2024-05-29T13:02:09.280000 CVE-2023-30309,0,0,7bed2cc00d974c0f21981e002db05aa1d9c9bb6eea8a85e53b56492f139e3535,2024-05-29T13:02:09.280000
CVE-2023-3031,0,0,10c1f10cf1613bd0a1bbf7200771584bf6866fde631eac26533eb7c4ae501aea,2023-06-12T16:48:57.833000 CVE-2023-3031,0,0,10c1f10cf1613bd0a1bbf7200771584bf6866fde631eac26533eb7c4ae501aea,2023-06-12T16:48:57.833000
CVE-2023-30310,0,1,b64f22995dd6d4cf998abebda15f2f520a185af33c13f85f861bcf5fd0b99ea3,2024-11-06T20:35:04.160000 CVE-2023-30310,0,0,b64f22995dd6d4cf998abebda15f2f520a185af33c13f85f861bcf5fd0b99ea3,2024-11-06T20:35:04.160000
CVE-2023-30311,0,0,38ed413270d757fa6e6b0203aef5d67e96c045e85b6d145080f9751d7548d7fb,2024-08-20T19:35:00.850000 CVE-2023-30311,0,0,38ed413270d757fa6e6b0203aef5d67e96c045e85b6d145080f9751d7548d7fb,2024-08-20T19:35:00.850000
CVE-2023-30312,0,0,9bb840b5e08cc8b26537ea87c8910725e38e1ad08fef8fe39b89eeab371027a8,2024-06-19T04:15:10.477000 CVE-2023-30312,0,0,9bb840b5e08cc8b26537ea87c8910725e38e1ad08fef8fe39b89eeab371027a8,2024-06-19T04:15:10.477000
CVE-2023-30313,0,0,2cb0a9aa3f78a13a6e0375a643da2654e262a035ecaa4ef4f0a18ff3448b0de1,2024-11-05T21:35:00.983000 CVE-2023-30313,0,0,2cb0a9aa3f78a13a6e0375a643da2654e262a035ecaa4ef4f0a18ff3448b0de1,2024-11-05T21:35:00.983000
@ -230498,7 +230498,7 @@ CVE-2023-4011,0,0,ff845b3bec6fa1ec7ec6e3f06d521b3f25d1051621eed84e2a9da8c89b74f8
CVE-2023-40110,0,0,cec4af71facc1cc987deceb5b2ce57911065506adb95057b276212cf5b36338b,2024-08-22T14:35:01.077000 CVE-2023-40110,0,0,cec4af71facc1cc987deceb5b2ce57911065506adb95057b276212cf5b36338b,2024-08-22T14:35:01.077000
CVE-2023-40111,0,0,7ef7fdb4bf5f59a65adc27a98870222810b4869fe47d231ee6164556414c6387,2024-08-26T18:35:02.257000 CVE-2023-40111,0,0,7ef7fdb4bf5f59a65adc27a98870222810b4869fe47d231ee6164556414c6387,2024-08-26T18:35:02.257000
CVE-2023-40112,0,0,3e814fd548a907e629b136506543b20b0c8bf4457d1103cb293d5b1296af5322,2024-10-31T14:35:03.023000 CVE-2023-40112,0,0,3e814fd548a907e629b136506543b20b0c8bf4457d1103cb293d5b1296af5322,2024-10-31T14:35:03.023000
CVE-2023-40113,0,0,dad3819774db3e875db7c132fed9de97c7d6741efc9f62a28c01187a90cb75bc,2024-02-16T13:37:55.033000 CVE-2023-40113,0,1,3853dba4c9b94994cc638ea53bf05fb88a4a7ea3a12c121e5a59c2e1bb350fae,2024-11-06T21:35:01.543000
CVE-2023-40114,0,0,e6aec33bc1c8bc322f8db56fa5435f1230eb43cb85d03f30ffc4d82fb9d7da4e,2024-08-15T18:35:04 CVE-2023-40114,0,0,e6aec33bc1c8bc322f8db56fa5435f1230eb43cb85d03f30ffc4d82fb9d7da4e,2024-08-15T18:35:04
CVE-2023-40115,0,0,6ad67ef2c7829749737245dfadc3fcfd57b4fbfd7581d4abd8672c61e42143e0,2024-08-01T13:44:27.970000 CVE-2023-40115,0,0,6ad67ef2c7829749737245dfadc3fcfd57b4fbfd7581d4abd8672c61e42143e0,2024-08-01T13:44:27.970000
CVE-2023-40116,0,0,fd7eabcb426fa5f4a29a166c8edb69a1f9a74a2f45f7b71a79b11321ea6b7183,2023-10-30T17:12:54.827000 CVE-2023-40116,0,0,fd7eabcb426fa5f4a29a166c8edb69a1f9a74a2f45f7b71a79b11321ea6b7183,2023-10-30T17:12:54.827000
@ -230783,7 +230783,7 @@ CVE-2023-40435,0,0,e7be1f239c3863a0eba73a76429a8b96807d5e85645d6b427822282e8a79d
CVE-2023-40436,0,0,9151fd8967ecc0125396416ce982a67888cf21bc1634d6a6aeba9d57e0d2aeb5,2024-09-25T01:35:59.353000 CVE-2023-40436,0,0,9151fd8967ecc0125396416ce982a67888cf21bc1634d6a6aeba9d57e0d2aeb5,2024-09-25T01:35:59.353000
CVE-2023-40437,0,0,6941cb0456cc33ca3d33bbc99082f1df62f86f849fa6869631ecd6102a6298f7,2024-01-17T19:06:18.080000 CVE-2023-40437,0,0,6941cb0456cc33ca3d33bbc99082f1df62f86f849fa6869631ecd6102a6298f7,2024-01-17T19:06:18.080000
CVE-2023-40438,0,0,08d009f7555bd3b6180dbaf950da9c59b188e58a9caa39b2a01d3c280b373e23,2024-01-16T23:51:13.887000 CVE-2023-40438,0,0,08d009f7555bd3b6180dbaf950da9c59b188e58a9caa39b2a01d3c280b373e23,2024-01-16T23:51:13.887000
CVE-2023-40439,0,1,b59cf437acb175533643b5177fc84a9280077b61c863a7e6b1de22da28602d1e,2024-11-06T20:35:05.490000 CVE-2023-40439,0,0,b59cf437acb175533643b5177fc84a9280077b61c863a7e6b1de22da28602d1e,2024-11-06T20:35:05.490000
CVE-2023-40440,0,0,29069b9d0f2624195a3a6c5e937d855493bae53f7b8c7e0b2b74aba07a7e4e39,2024-01-30T21:15:08.517000 CVE-2023-40440,0,0,29069b9d0f2624195a3a6c5e937d855493bae53f7b8c7e0b2b74aba07a7e4e39,2024-01-30T21:15:08.517000
CVE-2023-40441,0,0,865a7fe67a1e12c20a0e54c9b60b5fddd74e863be31e8f7e01a43397e40c2016,2023-10-12T02:26:57.743000 CVE-2023-40441,0,0,865a7fe67a1e12c20a0e54c9b60b5fddd74e863be31e8f7e01a43397e40c2016,2023-10-12T02:26:57.743000
CVE-2023-40442,0,0,371a54a2886702bdd120ac95d0338c00531e4b44258cb23feb2e8e3ccda1d1c1,2023-12-22T16:10:36.647000 CVE-2023-40442,0,0,371a54a2886702bdd120ac95d0338c00531e4b44258cb23feb2e8e3ccda1d1c1,2023-12-22T16:10:36.647000
@ -232591,7 +232591,7 @@ CVE-2023-4283,0,0,40c39331048450495c644559b354ee713768185b93e1269a4c183c39135e4c
CVE-2023-42830,0,0,9622822082e6d489decb51a66ff30e0a25a850d4f889ef38731f27c29845d8f1,2024-01-17T20:56:33.957000 CVE-2023-42830,0,0,9622822082e6d489decb51a66ff30e0a25a850d4f889ef38731f27c29845d8f1,2024-01-17T20:56:33.957000
CVE-2023-42831,0,0,15c2657a6cda93c32bf9e6d0e8961db6424b2c5d0a3a331db0a572f126ae013e,2024-01-17T20:51:35.577000 CVE-2023-42831,0,0,15c2657a6cda93c32bf9e6d0e8961db6424b2c5d0a3a331db0a572f126ae013e,2024-01-17T20:51:35.577000
CVE-2023-42832,0,0,d4139f8d7ebcb6dbe3f816f6f2093afb5b55323ca863cc15652de2caab2f0de4,2024-01-17T21:16:29.277000 CVE-2023-42832,0,0,d4139f8d7ebcb6dbe3f816f6f2093afb5b55323ca863cc15652de2caab2f0de4,2024-01-17T21:16:29.277000
CVE-2023-42833,0,1,e734eedae2bb752eeb00548b60901154a053eb23181a33e00797702140032cb8,2024-11-06T20:35:06.280000 CVE-2023-42833,0,0,e734eedae2bb752eeb00548b60901154a053eb23181a33e00797702140032cb8,2024-11-06T20:35:06.280000
CVE-2023-42834,0,0,08d87def638a26a5eb9093b6708a8eacf657bb89462798c60d907ee1b3410e44,2024-11-06T15:35:05.580000 CVE-2023-42834,0,0,08d87def638a26a5eb9093b6708a8eacf657bb89462798c60d907ee1b3410e44,2024-11-06T15:35:05.580000
CVE-2023-42835,0,0,78785fec11e2de3eca12998532cc4e293a664be2c1386edf69f250c848f4be97,2024-02-22T19:07:27.197000 CVE-2023-42835,0,0,78785fec11e2de3eca12998532cc4e293a664be2c1386edf69f250c848f4be97,2024-02-22T19:07:27.197000
CVE-2023-42836,0,0,57dd9f5214333cc32869174710fab8ff9c58d3ed310e22708cf2b23e79addefb,2024-02-22T19:07:27.197000 CVE-2023-42836,0,0,57dd9f5214333cc32869174710fab8ff9c58d3ed310e22708cf2b23e79addefb,2024-02-22T19:07:27.197000
@ -234666,7 +234666,7 @@ CVE-2023-46045,0,0,0e8abce2cbeee2bf608426602c7398443e9d61c9d45f545bf4f725e813250
CVE-2023-46046,0,0,555b8b8a7696393805aad9f9e82bc3d251f1a10afcfafafc77a77e46b5bc656d,2024-11-05T16:35:04.913000 CVE-2023-46046,0,0,555b8b8a7696393805aad9f9e82bc3d251f1a10afcfafafc77a77e46b5bc656d,2024-11-05T16:35:04.913000
CVE-2023-46047,0,0,c24e10e557ef6edbf0ab7d162e7557ecb1baed06f8bacef6ed95114dbb222d99,2024-08-22T18:35:01.467000 CVE-2023-46047,0,0,c24e10e557ef6edbf0ab7d162e7557ecb1baed06f8bacef6ed95114dbb222d99,2024-08-22T18:35:01.467000
CVE-2023-46048,0,0,fdc0cbd47578c151a3373264bac42e14fbe5938d1d4d2542c8c29ee6e1717908,2024-08-19T19:35:04.860000 CVE-2023-46048,0,0,fdc0cbd47578c151a3373264bac42e14fbe5938d1d4d2542c8c29ee6e1717908,2024-08-19T19:35:04.860000
CVE-2023-46049,0,0,2315016d1ba4bba7f533371cd70ec259060eaeb7a90fd1662a78c0e2eff24ad7,2024-08-02T21:15:49.197000 CVE-2023-46049,0,1,8e6f7b6c7a7eac9ea78c6ce3bd00ffa3c645397b30e7e0d1d00f973f47c0bc45,2024-11-06T22:35:01.887000
CVE-2023-4605,0,0,4ca1198891ef7f19a4427afe916541ae6cc98eedaf95349b4181266b8438d380,2024-04-08T18:49:25.863000 CVE-2023-4605,0,0,4ca1198891ef7f19a4427afe916541ae6cc98eedaf95349b4181266b8438d380,2024-04-08T18:49:25.863000
CVE-2023-46050,0,0,87b655fafc2924f1174e71a2efa862ed9e13b897c527143d58a0e534f2058a50,2024-01-29T09:15:42.640000 CVE-2023-46050,0,0,87b655fafc2924f1174e71a2efa862ed9e13b897c527143d58a0e534f2058a50,2024-01-29T09:15:42.640000
CVE-2023-46051,0,0,2eb4bb56bef8fa961b472990c5ab8fe369fd9c4072f6f002726f3dd2b9de96c0,2024-08-02T21:15:49.273000 CVE-2023-46051,0,0,2eb4bb56bef8fa961b472990c5ab8fe369fd9c4072f6f002726f3dd2b9de96c0,2024-08-02T21:15:49.273000
@ -237221,7 +237221,7 @@ CVE-2023-49508,0,0,04e9a38738b4cc108d703febb2c252d26aa82baa13d5ac7cd4f3585b5914b
CVE-2023-4951,0,0,a18642f9510452464e8d9524da7c3caa32fc5ff59f81d45c2b207c937616ee68,2023-09-22T15:15:14.253000 CVE-2023-4951,0,0,a18642f9510452464e8d9524da7c3caa32fc5ff59f81d45c2b207c937616ee68,2023-09-22T15:15:14.253000
CVE-2023-49515,0,0,fba6ae4b9dbda87bf77d58079d1e7fdc5597e983326dac218dacc086c68e81b6,2024-07-03T01:42:36.150000 CVE-2023-49515,0,0,fba6ae4b9dbda87bf77d58079d1e7fdc5597e983326dac218dacc086c68e81b6,2024-07-03T01:42:36.150000
CVE-2023-49528,0,0,bcff757c4ee07f22736afa13a889e6d02ee86ae241b71b1c98b3c18a1dcdacf5,2024-07-03T01:42:36.973000 CVE-2023-49528,0,0,bcff757c4ee07f22736afa13a889e6d02ee86ae241b71b1c98b3c18a1dcdacf5,2024-07-03T01:42:36.973000
CVE-2023-49539,0,1,e1d330f05b14a326f19ff77ceaae494168e128af031cec81933a24aa6c4e263b,2024-11-06T20:35:07.133000 CVE-2023-49539,0,0,e1d330f05b14a326f19ff77ceaae494168e128af031cec81933a24aa6c4e263b,2024-11-06T20:35:07.133000
CVE-2023-49540,0,0,fc00996658e2e1a07b2142617d49b74a28a84c9993046a375e13324fccec29b2,2024-08-06T16:35:02.663000 CVE-2023-49540,0,0,fc00996658e2e1a07b2142617d49b74a28a84c9993046a375e13324fccec29b2,2024-08-06T16:35:02.663000
CVE-2023-49543,0,0,5e9a28d34c8c9dccbca41948423cad2a9c85e5bdcb29ea577934b5fccba83d1b,2024-08-28T20:35:04.473000 CVE-2023-49543,0,0,5e9a28d34c8c9dccbca41948423cad2a9c85e5bdcb29ea577934b5fccba83d1b,2024-08-28T20:35:04.473000
CVE-2023-49544,0,0,4165df005ca812878112fcb221906d65322102731e6bd43d48afbe4e5ae39573,2024-08-01T13:45:11.667000 CVE-2023-49544,0,0,4165df005ca812878112fcb221906d65322102731e6bd43d48afbe4e5ae39573,2024-08-01T13:45:11.667000
@ -239131,7 +239131,7 @@ CVE-2023-5243,0,0,e49838102a5721a273506f040a2a95bdeca1c43c3e414141d5a1a29f3ab700
CVE-2023-52430,0,0,9b119fede2bb0d45c16cf06aac5c3bb465a163e763f0ae820658b0f4e7b632b3,2024-10-16T13:11:53.423000 CVE-2023-52430,0,0,9b119fede2bb0d45c16cf06aac5c3bb465a163e763f0ae820658b0f4e7b632b3,2024-10-16T13:11:53.423000
CVE-2023-52431,0,0,c64a02a0cf6c92acef7a3c67de07bba1d63a180e819e78f76030c959fd7430a0,2024-10-21T20:19:07.513000 CVE-2023-52431,0,0,c64a02a0cf6c92acef7a3c67de07bba1d63a180e819e78f76030c959fd7430a0,2024-10-21T20:19:07.513000
CVE-2023-52432,0,0,33470768b31e3ca42f4e91386984f89611d22bbf917c9270afe6f040d18c0aa7,2024-03-05T13:41:01.900000 CVE-2023-52432,0,0,33470768b31e3ca42f4e91386984f89611d22bbf917c9270afe6f040d18c0aa7,2024-03-05T13:41:01.900000
CVE-2023-52433,0,0,5c95197bc729cebc3540e26fddb8edd3d3fb52d95160d4c0a67697d37cf469ee,2024-06-16T13:15:50.413000 CVE-2023-52433,0,1,8d887de26d6dfe68d81d2421f14cfca93fcdcdb99a18edd116f8f8ba1a152a5e,2024-11-06T22:35:02.950000
CVE-2023-52434,0,0,5f6421438d786a20a52ed0cde51449021705adf52d40bb4e366d1e2bfbcf89c9,2024-11-04T13:16:26.490000 CVE-2023-52434,0,0,5f6421438d786a20a52ed0cde51449021705adf52d40bb4e366d1e2bfbcf89c9,2024-11-04T13:16:26.490000
CVE-2023-52435,0,0,ae7b4fd4a171fec756dcf7f16bf33027a1ed1befebaf9b2d2ac0547ee44f8075,2024-09-04T12:15:03.967000 CVE-2023-52435,0,0,ae7b4fd4a171fec756dcf7f16bf33027a1ed1befebaf9b2d2ac0547ee44f8075,2024-09-04T12:15:03.967000
CVE-2023-52436,0,0,5082d9a933f70907f213f656684b4963f01c1f95bdc79d48ebfb69bdc95b2335,2024-11-04T13:16:27.173000 CVE-2023-52436,0,0,5082d9a933f70907f213f656684b4963f01c1f95bdc79d48ebfb69bdc95b2335,2024-11-04T13:16:27.173000
@ -239195,7 +239195,7 @@ CVE-2023-52489,0,0,8691663f32e0b87d6090652a9eefea760ece79f0cb2b6e57db1f7a8a5adc6
CVE-2023-5249,0,0,902c33c9dbd28cbe5075a17fccde01699ae9f0ae88d9ebb42328197dcacfdffa,2024-07-03T01:44:12.613000 CVE-2023-5249,0,0,902c33c9dbd28cbe5075a17fccde01699ae9f0ae88d9ebb42328197dcacfdffa,2024-07-03T01:44:12.613000
CVE-2023-52490,0,0,5497ebcc533be995a69bc10424afce569aa011a4c97808cf492ed3f54baa7ba5,2024-03-12T12:40:13.500000 CVE-2023-52490,0,0,5497ebcc533be995a69bc10424afce569aa011a4c97808cf492ed3f54baa7ba5,2024-03-12T12:40:13.500000
CVE-2023-52491,0,0,a9def7af26959496f75588e8fbb8ad6e1b25e764e66a488bb14f62e906c4089f,2024-11-04T13:16:34.917000 CVE-2023-52491,0,0,a9def7af26959496f75588e8fbb8ad6e1b25e764e66a488bb14f62e906c4089f,2024-11-04T13:16:34.917000
CVE-2023-52492,0,1,6cb2ff207cf9aafb6090c129739c6d74d7c082df5985572149d2b1df87d0d5d4,2024-11-06T19:35:03.290000 CVE-2023-52492,0,0,6cb2ff207cf9aafb6090c129739c6d74d7c082df5985572149d2b1df87d0d5d4,2024-11-06T19:35:03.290000
CVE-2023-52493,0,0,0056ac7b9a11ed734aa93836878423f074f7718f5ce8771fef288d1615f0aa89,2024-11-04T13:16:35.103000 CVE-2023-52493,0,0,0056ac7b9a11ed734aa93836878423f074f7718f5ce8771fef288d1615f0aa89,2024-11-04T13:16:35.103000
CVE-2023-52494,0,0,ebe1d617d77329a0d9d56d0d6535311cfe7daa23b2498c41c7e912bcfaf261f7,2024-03-12T12:40:13.500000 CVE-2023-52494,0,0,ebe1d617d77329a0d9d56d0d6535311cfe7daa23b2498c41c7e912bcfaf261f7,2024-03-12T12:40:13.500000
CVE-2023-52495,0,0,c36feeccb5858e992af880f22a6164098203cb8ff165c7874d7ea3bb185fac52,2024-03-12T12:40:13.500000 CVE-2023-52495,0,0,c36feeccb5858e992af880f22a6164098203cb8ff165c7874d7ea3bb185fac52,2024-03-12T12:40:13.500000
@ -239216,7 +239216,7 @@ CVE-2023-52508,0,0,3df95157cefd88c2c70c60dc2487d4ca580bfd7d3fdbe934143d84c8e721d
CVE-2023-52509,0,0,bcfcbf5df8dadb5c77febe775be16b48e4efcb0ae7858106717d3661c9712efd,2024-03-04T13:58:23.447000 CVE-2023-52509,0,0,bcfcbf5df8dadb5c77febe775be16b48e4efcb0ae7858106717d3661c9712efd,2024-03-04T13:58:23.447000
CVE-2023-5251,0,0,de8655b38a30642065bb297eb9a35bac6ebd60f43a29d54f33ad99175564509f,2023-11-08T02:15:53.437000 CVE-2023-5251,0,0,de8655b38a30642065bb297eb9a35bac6ebd60f43a29d54f33ad99175564509f,2023-11-08T02:15:53.437000
CVE-2023-52510,0,0,b0381f94ad157bbb54ab8605627db382c3f938399b2f02a5029ba8865071a1c0,2024-03-04T13:58:23.447000 CVE-2023-52510,0,0,b0381f94ad157bbb54ab8605627db382c3f938399b2f02a5029ba8865071a1c0,2024-03-04T13:58:23.447000
CVE-2023-52511,0,1,01296eb26594b1e185bb600b7dc924facb05b3ec05d3adb36dc6800174e05e0a,2024-11-06T19:35:04.233000 CVE-2023-52511,0,0,01296eb26594b1e185bb600b7dc924facb05b3ec05d3adb36dc6800174e05e0a,2024-11-06T19:35:04.233000
CVE-2023-52512,0,0,7596373f786b6636f89cf16d29f325de01a9f27b0c6ad0696e922063bc5589ad,2024-11-06T16:35:07.700000 CVE-2023-52512,0,0,7596373f786b6636f89cf16d29f325de01a9f27b0c6ad0696e922063bc5589ad,2024-11-06T16:35:07.700000
CVE-2023-52513,0,0,68cace4cbac4420bddff285689d43b129b233d8af8a4ea35d26ac73dcbdfbb33,2024-03-04T13:58:23.447000 CVE-2023-52513,0,0,68cace4cbac4420bddff285689d43b129b233d8af8a4ea35d26ac73dcbdfbb33,2024-03-04T13:58:23.447000
CVE-2023-52514,0,0,96b3bc37b65a7f0f11caed4828897554155b5e08fde97001434005eb59164e32,2024-03-11T16:15:07.720000 CVE-2023-52514,0,0,96b3bc37b65a7f0f11caed4828897554155b5e08fde97001434005eb59164e32,2024-03-11T16:15:07.720000
@ -239228,7 +239228,7 @@ CVE-2023-52519,0,0,f79ce1035763550ef6afb964f7e85392eec938c2001b022078a43182525a6
CVE-2023-5252,0,0,10f9996951457224cec75839d378c1d5a53db0da5cae33c9f9a6fc2136cd44f0,2023-11-08T02:12:53.770000 CVE-2023-5252,0,0,10f9996951457224cec75839d378c1d5a53db0da5cae33c9f9a6fc2136cd44f0,2023-11-08T02:12:53.770000
CVE-2023-52520,0,0,dfb6be84ae9c08b205a8ea51f3a7f126c8fb64615069ff5cb9d3b51cb43ee2ef,2024-03-04T13:58:23.447000 CVE-2023-52520,0,0,dfb6be84ae9c08b205a8ea51f3a7f126c8fb64615069ff5cb9d3b51cb43ee2ef,2024-03-04T13:58:23.447000
CVE-2023-52521,0,0,26ba094f0a43e00b237fc666ea879d557b221b56ad6aeee17c07d7717bd0e4ca,2024-03-05T23:15:07.310000 CVE-2023-52521,0,0,26ba094f0a43e00b237fc666ea879d557b221b56ad6aeee17c07d7717bd0e4ca,2024-03-05T23:15:07.310000
CVE-2023-52522,0,1,b1ecf17729bb9b74f5dbf3546ec9de2d3c642cfd4f217702cac9956b0311d2f8,2024-11-06T20:35:08.150000 CVE-2023-52522,0,0,b1ecf17729bb9b74f5dbf3546ec9de2d3c642cfd4f217702cac9956b0311d2f8,2024-11-06T20:35:08.150000
CVE-2023-52523,0,0,2b8f78f901e030e63d8c8eb5395447753b7ff2211824258bf99a381a11aba125,2024-03-04T13:58:23.447000 CVE-2023-52523,0,0,2b8f78f901e030e63d8c8eb5395447753b7ff2211824258bf99a381a11aba125,2024-03-04T13:58:23.447000
CVE-2023-52524,0,0,2bb0786e3a461d7ca7f8c1c896ee359596adb6bf330c48f435cd78777cce4c48,2024-03-04T13:58:23.447000 CVE-2023-52524,0,0,2bb0786e3a461d7ca7f8c1c896ee359596adb6bf330c48f435cd78777cce4c48,2024-03-04T13:58:23.447000
CVE-2023-52525,0,0,da29f7fd4e888e13fc450d9b347a550d2ef7908097fa7df01f2173b5c063b678,2024-04-04T14:15:09.130000 CVE-2023-52525,0,0,da29f7fd4e888e13fc450d9b347a550d2ef7908097fa7df01f2173b5c063b678,2024-04-04T14:15:09.130000
@ -239333,10 +239333,10 @@ CVE-2023-52614,0,0,d94968612236477bba7745eee64229fa912817c484efb1fca20359c970e9a
CVE-2023-52615,0,0,749d512f79fef77d3fdca4cad7a7699f201211b1e7d2e923a5efa04789e1232b,2024-11-04T13:16:41.400000 CVE-2023-52615,0,0,749d512f79fef77d3fdca4cad7a7699f201211b1e7d2e923a5efa04789e1232b,2024-11-04T13:16:41.400000
CVE-2023-52616,0,0,dbf5b5c019f95e9f7e084e0052b1042c7b0204698debded51abfbb51fcf5bc41,2024-11-04T13:16:41.497000 CVE-2023-52616,0,0,dbf5b5c019f95e9f7e084e0052b1042c7b0204698debded51abfbb51fcf5bc41,2024-11-04T13:16:41.497000
CVE-2023-52617,0,0,4fdfa9fe396d100d9c46a2a78e479a182caae5cbb210cbb8a5ff9c9c9bce0255,2024-11-04T13:16:41.580000 CVE-2023-52617,0,0,4fdfa9fe396d100d9c46a2a78e479a182caae5cbb210cbb8a5ff9c9c9bce0255,2024-11-04T13:16:41.580000
CVE-2023-52618,0,0,28dfc591ae56b48f3e0ad097b4f43795724cf80136fbe5fa2e6d19df668b08d0,2024-11-04T13:16:41.660000 CVE-2023-52618,0,1,e99ffc5626a291ed7c9ac4eb79c56c6a064fd62237f676b60250fcf88da7dacc,2024-11-06T22:35:03.783000
CVE-2023-52619,0,0,20a7bb0cb2eaa7fa51742374ca05d5bd7fdb36e86539d53100b75675b035a409,2024-11-04T13:16:41.737000 CVE-2023-52619,0,0,20a7bb0cb2eaa7fa51742374ca05d5bd7fdb36e86539d53100b75675b035a409,2024-11-04T13:16:41.737000
CVE-2023-5262,0,0,dbc9cec6bb50e0a68a3b5ede7b08b3e3d8766566fd5a2a3e7793ec9100e6864d,2024-05-17T02:32:56.017000 CVE-2023-5262,0,0,dbc9cec6bb50e0a68a3b5ede7b08b3e3d8766566fd5a2a3e7793ec9100e6864d,2024-05-17T02:32:56.017000
CVE-2023-52620,0,1,7c3227f3d7abaa4e58b0c4ba62caf899d71083a6f645f11271d63eb138082c52,2024-11-06T20:35:08.343000 CVE-2023-52620,0,0,7c3227f3d7abaa4e58b0c4ba62caf899d71083a6f645f11271d63eb138082c52,2024-11-06T20:35:08.343000
CVE-2023-52621,0,0,26a33f9b008c64c6664e3e3a4869fe4d4572933cf6941e2f62ad48b2a923903f,2024-03-27T12:29:41.530000 CVE-2023-52621,0,0,26a33f9b008c64c6664e3e3a4869fe4d4572933cf6941e2f62ad48b2a923903f,2024-03-27T12:29:41.530000
CVE-2023-52622,0,0,1a4aa348f9b525ca69fe5a199e23d2ce602b346fde4c103318a5ea96e124b7a6,2024-11-04T13:16:41.973000 CVE-2023-52622,0,0,1a4aa348f9b525ca69fe5a199e23d2ce602b346fde4c103318a5ea96e124b7a6,2024-11-04T13:16:41.973000
CVE-2023-52623,0,0,74f6264a0d4f8f612430a8ffd97335038e0648002eaa7642f7664a57b746597f,2024-11-04T17:35:08.873000 CVE-2023-52623,0,0,74f6264a0d4f8f612430a8ffd97335038e0648002eaa7642f7664a57b746597f,2024-11-04T17:35:08.873000
@ -239406,7 +239406,7 @@ CVE-2023-52680,0,0,e82e4387cefcb72f3626231c08d733fbbeee0a4339500eacb2170dc4151a1
CVE-2023-52681,0,0,524cd4977fea10c4065e85c75e427a13dce6ed3e1a3cad8c759b5ff8706d5faa,2024-05-17T18:35:35.070000 CVE-2023-52681,0,0,524cd4977fea10c4065e85c75e427a13dce6ed3e1a3cad8c759b5ff8706d5faa,2024-05-17T18:35:35.070000
CVE-2023-52682,0,0,cc6799c17a2f081b667ffca3e6c764a8a9c44e0c1986a4909c37d26d7d17217e,2024-05-17T18:35:35.070000 CVE-2023-52682,0,0,cc6799c17a2f081b667ffca3e6c764a8a9c44e0c1986a4909c37d26d7d17217e,2024-05-17T18:35:35.070000
CVE-2023-52683,0,0,10cf5db773a627f10f62e2b747504a42a9b761360a3c2b0570d6054a6128bc20,2024-11-04T13:16:46.517000 CVE-2023-52683,0,0,10cf5db773a627f10f62e2b747504a42a9b761360a3c2b0570d6054a6128bc20,2024-11-04T13:16:46.517000
CVE-2023-52684,0,0,33c7802e83b0cacce3f4943922f9d7f250c042b0471e9f2d74c9792f85da2e19,2024-05-17T18:35:35.070000 CVE-2023-52684,0,1,51ae7d2a43eba5f5afdf160a7f780d7d593d4e2d03669e20e4d6cce8d2b31000,2024-11-06T21:35:01.813000
CVE-2023-52685,0,0,cf8140ec5f2b974bcd3641a1209ca634d3cb951fbfbcbdcc6560b6110e8da549,2024-06-18T14:15:10.603000 CVE-2023-52685,0,0,cf8140ec5f2b974bcd3641a1209ca634d3cb951fbfbcbdcc6560b6110e8da549,2024-06-18T14:15:10.603000
CVE-2023-52686,0,0,e035efa57ae3873f49aa0c8ed309f1cfd09bba774f28aff6bfa9af8bf3cd5628,2024-11-04T13:16:46.670000 CVE-2023-52686,0,0,e035efa57ae3873f49aa0c8ed309f1cfd09bba774f28aff6bfa9af8bf3cd5628,2024-11-04T13:16:46.670000
CVE-2023-52687,0,0,b28f8c5460527301f61b9b984f4d389c8ddced6a4a6f85a3bf5048ab19f25e70,2024-11-06T17:35:25.900000 CVE-2023-52687,0,0,b28f8c5460527301f61b9b984f4d389c8ddced6a4a6f85a3bf5048ab19f25e70,2024-11-06T17:35:25.900000
@ -239463,7 +239463,7 @@ CVE-2023-52734,0,0,2f76584608f90880dda5ed1cfe003cf8af38c50f85a7ba05f54382ff1ea93
CVE-2023-52735,0,0,179c3f86616fee02c6472500bdd41878f007d990a3ea0e8bcc41b49975c24734,2024-07-03T01:43:52.910000 CVE-2023-52735,0,0,179c3f86616fee02c6472500bdd41878f007d990a3ea0e8bcc41b49975c24734,2024-07-03T01:43:52.910000
CVE-2023-52736,0,0,df1befba83ff05c2a0d33711ab630a647dd341841417f5be872b0b202fdf8e4c,2024-05-21T16:53:56.550000 CVE-2023-52736,0,0,df1befba83ff05c2a0d33711ab630a647dd341841417f5be872b0b202fdf8e4c,2024-05-21T16:53:56.550000
CVE-2023-52737,0,0,38cbe5e55641ebdafc5db964d325c9c266a1e7ec0b6e0d92c3a71b5417001004,2024-05-21T16:53:56.550000 CVE-2023-52737,0,0,38cbe5e55641ebdafc5db964d325c9c266a1e7ec0b6e0d92c3a71b5417001004,2024-05-21T16:53:56.550000
CVE-2023-52738,0,0,c876063cd09e734f72ff43929eb012970dc4e31f27bd74cc3669d02c7f455d51,2024-05-21T16:53:56.550000 CVE-2023-52738,0,1,dc676761402004e11f6262bd178a76b0a97c37b209a47d729e14948a72f3b55f,2024-11-06T21:35:02.090000
CVE-2023-52739,0,0,0604a018a0e873dfcb2efbd5385f2a976fd9bccf7eaeca2825615c866a803dd1,2024-05-21T16:53:56.550000 CVE-2023-52739,0,0,0604a018a0e873dfcb2efbd5385f2a976fd9bccf7eaeca2825615c866a803dd1,2024-05-21T16:53:56.550000
CVE-2023-5274,0,0,864010d058c6ccc43d7cfa5280cf12d11d903e5a06c224a3c38c51a571ff7581,2023-12-05T18:20:39.937000 CVE-2023-5274,0,0,864010d058c6ccc43d7cfa5280cf12d11d903e5a06c224a3c38c51a571ff7581,2023-12-05T18:20:39.937000
CVE-2023-52740,0,0,da86f48edd07a1ed6b3338b97bd3ad3fac2b70de7e362c30acbab6ea25eebd29,2024-05-21T16:53:56.550000 CVE-2023-52740,0,0,da86f48edd07a1ed6b3338b97bd3ad3fac2b70de7e362c30acbab6ea25eebd29,2024-05-21T16:53:56.550000
@ -239532,7 +239532,7 @@ CVE-2023-52797,0,0,b73a8fa6a4e76687f73e7ef3277e8c68588fa5517245ff16423bb4845b549
CVE-2023-52798,0,0,903a4612f669db82041c075124d4474cdd9cf4659c36c3c48aa9ccdd02833098,2024-05-21T16:53:56.550000 CVE-2023-52798,0,0,903a4612f669db82041c075124d4474cdd9cf4659c36c3c48aa9ccdd02833098,2024-05-21T16:53:56.550000
CVE-2023-52799,0,0,6fa89f7497ff6b75f31beef8e947309d06c41f701952588e6bb06313dc1fdef6,2024-05-21T16:53:56.550000 CVE-2023-52799,0,0,6fa89f7497ff6b75f31beef8e947309d06c41f701952588e6bb06313dc1fdef6,2024-05-21T16:53:56.550000
CVE-2023-5280,0,0,cf02e072cc72e580d64df88a732c123a0390498118112c202e656970398e1bca,2024-06-04T19:18:10.060000 CVE-2023-5280,0,0,cf02e072cc72e580d64df88a732c123a0390498118112c202e656970398e1bca,2024-06-04T19:18:10.060000
CVE-2023-52800,0,1,14779273a0271f6f818fa65737c64c9364846719a230d118051fdc46a7303574,2024-11-06T19:35:04.477000 CVE-2023-52800,0,0,14779273a0271f6f818fa65737c64c9364846719a230d118051fdc46a7303574,2024-11-06T19:35:04.477000
CVE-2023-52801,0,0,b95bb5d93b24e9cbb6c35e0192140cfc3d31cdb66f52213d203f1a292ea4cc97,2024-07-03T01:43:59.217000 CVE-2023-52801,0,0,b95bb5d93b24e9cbb6c35e0192140cfc3d31cdb66f52213d203f1a292ea4cc97,2024-07-03T01:43:59.217000
CVE-2023-52802,0,0,38a995833f5576e7c1a5ec4da3354344605bb944329f5f6f5f2b3f5909e6538e,2024-06-08T12:15:09.783000 CVE-2023-52802,0,0,38a995833f5576e7c1a5ec4da3354344605bb944329f5f6f5f2b3f5909e6538e,2024-06-08T12:15:09.783000
CVE-2023-52803,0,0,694b6e6d733c1665ec8c85b7467bf8e595bd273683c4250c62b7d8067abc7346,2024-07-18T12:15:02.423000 CVE-2023-52803,0,0,694b6e6d733c1665ec8c85b7467bf8e595bd273683c4250c62b7d8067abc7346,2024-07-18T12:15:02.423000
@ -239609,7 +239609,7 @@ CVE-2023-52867,0,0,e3b1128fcef491f8e641a0d12897f04317e86b4b1298f61d59bdc866043f9
CVE-2023-52868,0,0,75bd5ccd052bd251c0e42c6807740befac18d5aabec3715f40791b5a99e23ad5,2024-05-21T16:53:56.550000 CVE-2023-52868,0,0,75bd5ccd052bd251c0e42c6807740befac18d5aabec3715f40791b5a99e23ad5,2024-05-21T16:53:56.550000
CVE-2023-52869,0,0,d37040a4a2cb7087cc996199bd2cd80e9806440599974a39ed1796463348598f,2024-07-03T01:44:08.950000 CVE-2023-52869,0,0,d37040a4a2cb7087cc996199bd2cd80e9806440599974a39ed1796463348598f,2024-07-03T01:44:08.950000
CVE-2023-5287,0,0,ce1ed467182937769fcb531729fdb4e9725d88b02f3d1fc370ffab1fa8fb95bd,2024-08-02T08:15:35.190000 CVE-2023-5287,0,0,ce1ed467182937769fcb531729fdb4e9725d88b02f3d1fc370ffab1fa8fb95bd,2024-08-02T08:15:35.190000
CVE-2023-52870,0,1,27dae345b2e5970c9d3feba55d8322e50c1240ab8d505536cedb4d647d27a0d6,2024-11-06T19:35:05.403000 CVE-2023-52870,0,0,27dae345b2e5970c9d3feba55d8322e50c1240ab8d505536cedb4d647d27a0d6,2024-11-06T19:35:05.403000
CVE-2023-52871,0,0,fe9db8c2a60a638be83569a9528a947015c20fb1ca847cd7d6ee75b69b6f429f,2024-05-21T16:53:56.550000 CVE-2023-52871,0,0,fe9db8c2a60a638be83569a9528a947015c20fb1ca847cd7d6ee75b69b6f429f,2024-05-21T16:53:56.550000
CVE-2023-52872,0,0,95562b8fb0cc421a39b970c47689ca5dfb57a52adf4583e91f8091a32ec9fe9a,2024-11-06T15:35:08.170000 CVE-2023-52872,0,0,95562b8fb0cc421a39b970c47689ca5dfb57a52adf4583e91f8091a32ec9fe9a,2024-11-06T15:35:08.170000
CVE-2023-52873,0,0,87939aab335722274ff9346609ace667795230b4a40e5a5c0583dd242243c124,2024-05-21T16:53:56.550000 CVE-2023-52873,0,0,87939aab335722274ff9346609ace667795230b4a40e5a5c0583dd242243c124,2024-05-21T16:53:56.550000
@ -241492,7 +241492,7 @@ CVE-2024-0025,0,0,d28de8c9f19ab5ba79d0474f043c936cf414f4247e50396a672a60bd3b9be7
CVE-2024-0026,0,0,774ed6ba82d0d9c7a541b3db4a5a359cf56663a0f101d669bdf9d716d0a13278,2024-07-03T01:44:32.803000 CVE-2024-0026,0,0,774ed6ba82d0d9c7a541b3db4a5a359cf56663a0f101d669bdf9d716d0a13278,2024-07-03T01:44:32.803000
CVE-2024-0027,0,0,8812c8953c6645d49bd5f62acac1b6ed41a4a4a9272988ed4e3b759e771e9ede,2024-05-08T13:15:00.690000 CVE-2024-0027,0,0,8812c8953c6645d49bd5f62acac1b6ed41a4a4a9272988ed4e3b759e771e9ede,2024-05-08T13:15:00.690000
CVE-2024-0029,0,0,55e8334b75ebe900149ddbd8622fac8b29c21a3b953c0b848545a4ed036cbf2f,2024-02-16T13:37:55.033000 CVE-2024-0029,0,0,55e8334b75ebe900149ddbd8622fac8b29c21a3b953c0b848545a4ed036cbf2f,2024-02-16T13:37:55.033000
CVE-2024-0030,0,1,0dd9bca1dbcc5e3458318f715ab6b433aff63564ed4b03d63174ae833d93503d,2024-11-06T19:35:07.573000 CVE-2024-0030,0,0,0dd9bca1dbcc5e3458318f715ab6b433aff63564ed4b03d63174ae833d93503d,2024-11-06T19:35:07.573000
CVE-2024-0031,0,0,b1cddaec25187c54af4bebb0dcc796dbc4415ad876a9b9d3fa787304a60914ff,2024-08-01T13:45:54.900000 CVE-2024-0031,0,0,b1cddaec25187c54af4bebb0dcc796dbc4415ad876a9b9d3fa787304a60914ff,2024-08-01T13:45:54.900000
CVE-2024-0032,0,0,28a201a5282c4952746adae47b502afc7f863fa68b2049d01865c530c24bbb57,2024-08-29T20:35:54.413000 CVE-2024-0032,0,0,28a201a5282c4952746adae47b502afc7f863fa68b2049d01865c530c24bbb57,2024-08-29T20:35:54.413000
CVE-2024-0033,0,0,27344b7715a75d0aa82a7b18cd174c27fc55902f246df424d23b6d9f7df6dd01,2024-08-16T18:35:03.300000 CVE-2024-0033,0,0,27344b7715a75d0aa82a7b18cd174c27fc55902f246df424d23b6d9f7df6dd01,2024-08-16T18:35:03.300000
@ -242423,7 +242423,7 @@ CVE-2024-1009,0,0,97af4237278897e4de60a52c929ac5642d8b709167b278dc1af6a70d4d177e
CVE-2024-10091,0,0,d0b808b13e4ac8a1cdb029b434d2f58c9a91ce65332255a3523a2d40d54e2bbc,2024-10-28T13:58:09.230000 CVE-2024-10091,0,0,d0b808b13e4ac8a1cdb029b434d2f58c9a91ce65332255a3523a2d40d54e2bbc,2024-10-28T13:58:09.230000
CVE-2024-10092,0,0,96aeeb96773a5c0a6e4e68b9196f2f369ac89a58107c1085bc8eadc272cfbb94,2024-10-28T13:58:09.230000 CVE-2024-10092,0,0,96aeeb96773a5c0a6e4e68b9196f2f369ac89a58107c1085bc8eadc272cfbb94,2024-10-28T13:58:09.230000
CVE-2024-10093,0,0,94a330c294b313c7705272073b44baeb2e1acc1449e78c4e0c252c7b91c53316,2024-11-01T18:07:07.003000 CVE-2024-10093,0,0,94a330c294b313c7705272073b44baeb2e1acc1449e78c4e0c252c7b91c53316,2024-11-01T18:07:07.003000
CVE-2024-10097,0,1,ebed9ad10c7a648598c4572f4800c95ee8b1505f542b8454e9698f3995387b9d,2024-11-06T19:14:22.817000 CVE-2024-10097,0,0,ebed9ad10c7a648598c4572f4800c95ee8b1505f542b8454e9698f3995387b9d,2024-11-06T19:14:22.817000
CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615abb6,2024-10-21T21:03:53.647000 CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615abb6,2024-10-21T21:03:53.647000
CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000 CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000
CVE-2024-10100,0,0,f9d8653b0b809755807a27c91859fa59733e823c9baf33fbd9ba6460baccb9d4,2024-11-04T19:15:05.297000 CVE-2024-10100,0,0,f9d8653b0b809755807a27c91859fa59733e823c9baf33fbd9ba6460baccb9d4,2024-11-04T19:15:05.297000
@ -242439,7 +242439,7 @@ CVE-2024-10119,0,0,49edb44a36719c29f8ad406ee8678c1d6a57c817986d9e175ffebf1849d72
CVE-2024-1012,0,0,261f4dda24c2aefd44892a1e7cff84e275a6853943a2bba059238594bb202f50,2024-05-17T02:35:10.090000 CVE-2024-1012,0,0,261f4dda24c2aefd44892a1e7cff84e275a6853943a2bba059238594bb202f50,2024-05-17T02:35:10.090000
CVE-2024-10120,0,0,877872300e701fe4a1efb68fcccda192535f4ea8d014c4745e6d765239ef8603,2024-10-30T20:20:46.010000 CVE-2024-10120,0,0,877872300e701fe4a1efb68fcccda192535f4ea8d014c4745e6d765239ef8603,2024-10-30T20:20:46.010000
CVE-2024-10121,0,0,4fac6e713d174c782f95945b8314e41c0820946450664e88d069ef79a5b04b0a,2024-10-30T21:21:02.083000 CVE-2024-10121,0,0,4fac6e713d174c782f95945b8314e41c0820946450664e88d069ef79a5b04b0a,2024-10-30T21:21:02.083000
CVE-2024-10122,0,0,153862f3f9eb72281b1c72dbca34e4eb5ada0e8c96788af32355e9b86fecda30,2024-10-21T17:10:22.857000 CVE-2024-10122,0,1,4e5f619ae1411af7ba6427863c46c2d3289b70e0f0b6031ee87ce9e9971de5c8,2024-11-06T22:05:23.700000
CVE-2024-10123,0,0,e122097599e5662b16a80366258ebdfd607e11805ffbed77bafc707b3aec8a81,2024-10-28T16:06:53.747000 CVE-2024-10123,0,0,e122097599e5662b16a80366258ebdfd607e11805ffbed77bafc707b3aec8a81,2024-10-28T16:06:53.747000
CVE-2024-10125,0,0,57aa34408f8260c656e1d34a999469d8529d9afe80be211b41d76ddc0eb4278d,2024-10-23T21:15:14.510000 CVE-2024-10125,0,0,57aa34408f8260c656e1d34a999469d8529d9afe80be211b41d76ddc0eb4278d,2024-10-23T21:15:14.510000
CVE-2024-10128,0,0,f4621c94fde2e2c994e30c7fb126f4e421d19f40a100d08f3cba9307c37673b9,2024-10-30T20:31:33.213000 CVE-2024-10128,0,0,f4621c94fde2e2c994e30c7fb126f4e421d19f40a100d08f3cba9307c37673b9,2024-10-30T20:31:33.213000
@ -242823,11 +242823,11 @@ CVE-2024-10826,0,0,e7caea17df9e50303e84eb12f606f4531bb8bb9449a87b4576ba355c7a719
CVE-2024-10827,0,0,c533f4c70607df301dc68c381588fa8b3325a3d893bbcbb9a6092f250e2c41fa,2024-11-06T18:17:17.287000 CVE-2024-10827,0,0,c533f4c70607df301dc68c381588fa8b3325a3d893bbcbb9a6092f250e2c41fa,2024-11-06T18:17:17.287000
CVE-2024-1083,0,0,f65354685ac9d5e6ec0c7d89ef33fa98a96cad0e23da0316206039cbd9c94fda,2024-03-13T18:16:18.563000 CVE-2024-1083,0,0,f65354685ac9d5e6ec0c7d89ef33fa98a96cad0e23da0316206039cbd9c94fda,2024-03-13T18:16:18.563000
CVE-2024-1084,0,0,b38be98d35d4290a3ce2408da5081c91dd802a2448815858b2cd8d2247674e10,2024-10-17T15:46:42.330000 CVE-2024-1084,0,0,b38be98d35d4290a3ce2408da5081c91dd802a2448815858b2cd8d2247674e10,2024-10-17T15:46:42.330000
CVE-2024-10840,0,0,7c13b48653833d393d956bfeba05dc2dd9647859d024272e6982bcc84d954739,2024-11-05T16:04:26.053000 CVE-2024-10840,0,1,3088ecb88b6f610106137e52cd92a9df0637e9f9f20cd58417274c10e35a041a,2024-11-06T22:49:12.173000
CVE-2024-10841,0,0,cb468ec73cf79f50123b416f8630b7e95a6ee5ee80f06d5ca0c3e30ee71804b9,2024-11-05T16:04:26.053000 CVE-2024-10841,0,1,1914449d57ff1a3babaaf40b7a33b002037c2a6558bba70a8f37b24e8f3218c2,2024-11-06T22:50:24.277000
CVE-2024-10842,0,0,4f347a0fe404db0a70d46d9dfbb2bce6fdecc583b1df9d0e17ec6eb1dbdd1366,2024-11-05T16:04:26.053000 CVE-2024-10842,0,1,7aeafb02fa0f31956e4616acda70affdbdea4445fee41471b949ff3589528b00,2024-11-06T22:43:19.327000
CVE-2024-10844,0,0,32322f050196865be4aae941a4bb5adece1ed82ba13b1f2493fc23a256fb69c2,2024-11-05T16:04:26.053000 CVE-2024-10844,0,1,ab92f6f85407dca15cb1e5a84778b8d496e0601ae883a0bd7f3db6703a1b0447,2024-11-06T22:38:13.800000
CVE-2024-10845,0,0,a2864f4a8e52c61d4eaa5da9f3b813c3c867d63046f2a47c80f727d56a3ef7dc,2024-11-05T16:04:26.053000 CVE-2024-10845,0,1,e23b6836533b6527e69274c9897179b623fe8ac43fca2950e064d79cbfdb6f9f,2024-11-06T22:38:03.347000
CVE-2024-1085,0,0,1d186f1dd445cf86c8be70ef01a658a198ecb65ca5305ee36e96f272e65874b8,2024-02-05T20:41:40.513000 CVE-2024-1085,0,0,1d186f1dd445cf86c8be70ef01a658a198ecb65ca5305ee36e96f272e65874b8,2024-02-05T20:41:40.513000
CVE-2024-1086,0,0,3e819e2fff80149e3f377751fd1fb28a52f8791d9e5d08990c549613b15214b2,2024-08-14T19:41:08.673000 CVE-2024-1086,0,0,3e819e2fff80149e3f377751fd1fb28a52f8791d9e5d08990c549613b15214b2,2024-08-14T19:41:08.673000
CVE-2024-1087,0,0,9751a2fe52b8f14e0fc1c9d86ee656c42465ba61ef03201895b6c1868f5679fd,2024-01-31T13:15:11.030000 CVE-2024-1087,0,0,9751a2fe52b8f14e0fc1c9d86ee656c42465ba61ef03201895b6c1868f5679fd,2024-01-31T13:15:11.030000
@ -242841,8 +242841,10 @@ CVE-2024-10916,0,0,53443e54e55c3a54111ef55bbe8925e1700f77a586713f1c8fd853e1c516c
CVE-2024-10919,0,0,a9eb02ffc877d3649d3e97e181e7b5d396e5513925c1dfbc9593594bbb4efcef,2024-11-06T18:17:17.287000 CVE-2024-10919,0,0,a9eb02ffc877d3649d3e97e181e7b5d396e5513925c1dfbc9593594bbb4efcef,2024-11-06T18:17:17.287000
CVE-2024-1092,0,0,4e514cbeb8cbdb0016fe4cb374f3dffe448e95b35a82b13ed7cb7be1b7fe61c2,2024-02-13T19:43:06.247000 CVE-2024-1092,0,0,4e514cbeb8cbdb0016fe4cb374f3dffe448e95b35a82b13ed7cb7be1b7fe61c2,2024-02-13T19:43:06.247000
CVE-2024-10920,0,0,2a084f5df50e8d62344f7fb5574910af35d9b3838be955d3bbcc07e777ed2e3c,2024-11-06T18:17:17.287000 CVE-2024-10920,0,0,2a084f5df50e8d62344f7fb5574910af35d9b3838be955d3bbcc07e777ed2e3c,2024-11-06T18:17:17.287000
CVE-2024-10926,1,1,836b6dad2f467cae785f28103c4c848e59141b80159f4c1ffe543f045d6be6ff,2024-11-06T21:15:04.927000
CVE-2024-1093,0,0,de7ad9b72d87a55cf339c2dc774b7bea1d33bb68e3b932a439fb6fd6a0ef5b53,2024-03-05T13:41:01.900000 CVE-2024-1093,0,0,de7ad9b72d87a55cf339c2dc774b7bea1d33bb68e3b932a439fb6fd6a0ef5b53,2024-03-05T13:41:01.900000
CVE-2024-1094,0,0,e9e492360318e20689e515fe6138ed3b8630e834f4abf2efeafd987f7e7b2dc6,2024-06-17T12:42:04.623000 CVE-2024-1094,0,0,e9e492360318e20689e515fe6138ed3b8630e834f4abf2efeafd987f7e7b2dc6,2024-06-17T12:42:04.623000
CVE-2024-10941,1,1,675a2a19161edc958e8a197cc6dc80c9908daf66aaab2775f6145c4f21c47875,2024-11-06T21:15:05.213000
CVE-2024-1095,0,0,e70da3b629cae08421ac3ff6db71fb525bf872b735f906aa9168a1a3feae7dcb,2024-03-05T13:41:01.900000 CVE-2024-1095,0,0,e70da3b629cae08421ac3ff6db71fb525bf872b735f906aa9168a1a3feae7dcb,2024-03-05T13:41:01.900000
CVE-2024-1096,0,0,9e6ec92aa91c226f1dce82b660bd82ecda12366a7db0465d5ab79a9947cb0a51,2024-03-21T02:51:34.720000 CVE-2024-1096,0,0,9e6ec92aa91c226f1dce82b660bd82ecda12366a7db0465d5ab79a9947cb0a51,2024-03-21T02:51:34.720000
CVE-2024-1098,0,0,7637c79f93f6fef4c2ad0472be16e5b2b85cffeb9436b7defda280fbd3390871,2024-05-17T02:35:14.017000 CVE-2024-1098,0,0,7637c79f93f6fef4c2ad0472be16e5b2b85cffeb9436b7defda280fbd3390871,2024-05-17T02:35:14.017000
@ -244467,7 +244469,7 @@ CVE-2024-20962,0,0,bcf0fdf63a172649d862e0b60296a1507069b6b1d3f284da5e5091c27efe3
CVE-2024-20963,0,0,777b7cd2ebaadb4763a737f62544d35f548c2765fd413ec39c0e69f1d2e44eee,2024-02-02T17:36:33.743000 CVE-2024-20963,0,0,777b7cd2ebaadb4763a737f62544d35f548c2765fd413ec39c0e69f1d2e44eee,2024-02-02T17:36:33.743000
CVE-2024-20964,0,0,ab74670f7eba706fccff530b8fad5283c75afa505713ad1602df91d0111cf529,2024-02-20T19:50:53.960000 CVE-2024-20964,0,0,ab74670f7eba706fccff530b8fad5283c75afa505713ad1602df91d0111cf529,2024-02-20T19:50:53.960000
CVE-2024-20965,0,0,d41d12dc1f39ed4f3636fac85c63e6e6a8b99443b9015fee96d2868d746c8460,2024-02-02T17:42:20.270000 CVE-2024-20965,0,0,d41d12dc1f39ed4f3636fac85c63e6e6a8b99443b9015fee96d2868d746c8460,2024-02-02T17:42:20.270000
CVE-2024-20966,0,1,dab87e37585bb236d1417d0345775a702be652c48f5564f545a9e12473d94c75,2024-11-06T19:35:08.623000 CVE-2024-20966,0,0,dab87e37585bb236d1417d0345775a702be652c48f5564f545a9e12473d94c75,2024-11-06T19:35:08.623000
CVE-2024-20967,0,0,24e7161f6aa52b5a617854b182e26d8b3a2b8a2e00cfc6867379e3242f7ad4f6,2024-02-02T17:42:32.037000 CVE-2024-20967,0,0,24e7161f6aa52b5a617854b182e26d8b3a2b8a2e00cfc6867379e3242f7ad4f6,2024-02-02T17:42:32.037000
CVE-2024-20968,0,0,f87c3ac120b069363cef49b73c4bea5dd9bdd52a2a03eea095a7ff8c6c344cb0,2024-02-20T19:50:53.960000 CVE-2024-20968,0,0,f87c3ac120b069363cef49b73c4bea5dd9bdd52a2a03eea095a7ff8c6c344cb0,2024-02-20T19:50:53.960000
CVE-2024-20969,0,0,058e957bc600be5635dd584028438dce1629507fbbb938dc220b2cfe0d1cbacd,2024-02-02T17:24:44.617000 CVE-2024-20969,0,0,058e957bc600be5635dd584028438dce1629507fbbb938dc220b2cfe0d1cbacd,2024-02-02T17:24:44.617000
@ -244548,7 +244550,7 @@ CVE-2024-21039,0,0,5533a80506dc2a9584f3f0a1cb6213d349fbac4fc9f3be60fa10f69e60d73
CVE-2024-21040,0,0,9207f1539b8715e9de73bf8605d282f9258ecbde4b6b5af37d49fb9b9b73b544,2024-07-03T01:46:25.020000 CVE-2024-21040,0,0,9207f1539b8715e9de73bf8605d282f9258ecbde4b6b5af37d49fb9b9b73b544,2024-07-03T01:46:25.020000
CVE-2024-21041,0,0,53175e4f9f6fe9a06cdb65415f15e9860a5cc1810804215df4199c035c4956b1,2024-10-31T16:35:04.810000 CVE-2024-21041,0,0,53175e4f9f6fe9a06cdb65415f15e9860a5cc1810804215df4199c035c4956b1,2024-10-31T16:35:04.810000
CVE-2024-21042,0,0,a53b604b49a76162fbba6ea20fde9e5db3c2c63e25a2d34ff97af2cb2bb953ae,2024-04-17T12:48:31.863000 CVE-2024-21042,0,0,a53b604b49a76162fbba6ea20fde9e5db3c2c63e25a2d34ff97af2cb2bb953ae,2024-04-17T12:48:31.863000
CVE-2024-21043,0,1,34b86fb6bc70d1cb3f2e8b52f242178af3e3c87a06302294640b6969cd919425,2024-11-06T19:35:09.460000 CVE-2024-21043,0,0,34b86fb6bc70d1cb3f2e8b52f242178af3e3c87a06302294640b6969cd919425,2024-11-06T19:35:09.460000
CVE-2024-21044,0,0,2cd88f43af07596557d9fca3fb13efe6eb725b0bbf07f13100392e30400b440d,2024-04-17T12:48:31.863000 CVE-2024-21044,0,0,2cd88f43af07596557d9fca3fb13efe6eb725b0bbf07f13100392e30400b440d,2024-04-17T12:48:31.863000
CVE-2024-21045,0,0,8f4acd1404f7851517d6c66a40a7ade78fca2381123c6edde49776a3d7abd81c,2024-04-17T12:48:31.863000 CVE-2024-21045,0,0,8f4acd1404f7851517d6c66a40a7ade78fca2381123c6edde49776a3d7abd81c,2024-04-17T12:48:31.863000
CVE-2024-21046,0,0,6cd7417a9fe1dad42e5e390bd73f6c59f847ce1b22a979e6a850a74e46589580,2024-11-05T16:35:11.803000 CVE-2024-21046,0,0,6cd7417a9fe1dad42e5e390bd73f6c59f847ce1b22a979e6a850a74e46589580,2024-11-05T16:35:11.803000
@ -244755,23 +244757,23 @@ CVE-2024-21244,0,0,a2d8857947cab47435f13652b22d7660077ec99971dc97d0f1c04da6d4b60
CVE-2024-21246,0,0,ce26d4699cd66244be859e323ba861645fea4d7c63493af05a19982e79b3ffed,2024-10-18T19:04:57.587000 CVE-2024-21246,0,0,ce26d4699cd66244be859e323ba861645fea4d7c63493af05a19982e79b3ffed,2024-10-18T19:04:57.587000
CVE-2024-21247,0,0,65e62ada788d7c8dd8f6bbcfcf373e355969c491bcf2b35cf52ed2528731ff42,2024-10-16T20:33:33.027000 CVE-2024-21247,0,0,65e62ada788d7c8dd8f6bbcfcf373e355969c491bcf2b35cf52ed2528731ff42,2024-10-16T20:33:33.027000
CVE-2024-21248,0,0,9d2bec6b0c5bd428b3273089dc6de78cffbb45eee6dc4edb4da7a745f217bff7,2024-10-18T14:59:21.397000 CVE-2024-21248,0,0,9d2bec6b0c5bd428b3273089dc6de78cffbb45eee6dc4edb4da7a745f217bff7,2024-10-18T14:59:21.397000
CVE-2024-21249,0,0,561b0c05f80cd133fd2bf7f9570e926d43e2c7747cbbd22ee7f0f51bfa829c07,2024-10-31T15:35:25.647000 CVE-2024-21249,0,1,62dc164222266e9012addfd5a4c4b6cc91556280f972a8f370ed3479ce2dfab0,2024-11-06T22:53:50.587000
CVE-2024-2125,0,0,872a2657310e63ac8c9e764159a2a2b1b3991a1ff9d35b42d26ee113c654f515,2024-04-10T13:23:38.787000 CVE-2024-2125,0,0,872a2657310e63ac8c9e764159a2a2b1b3991a1ff9d35b42d26ee113c654f515,2024-04-10T13:23:38.787000
CVE-2024-21250,0,0,c3a216316fd161ecf42e4b85935aab4377046a8c65dc40e8a08a09abcd439125,2024-10-17T14:35:19.303000 CVE-2024-21250,0,1,194dad5e2041a7f20ff44922c3cd68e8f11877affaaf0af77e6c9accdf6d7287,2024-11-06T22:54:57.887000
CVE-2024-21251,0,0,95021887cdea7aae31070af44e524d1ee6c9c77252dd0eef331bed470fbf412a,2024-10-31T13:35:08.347000 CVE-2024-21251,0,0,95021887cdea7aae31070af44e524d1ee6c9c77252dd0eef331bed470fbf412a,2024-10-31T13:35:08.347000
CVE-2024-21252,0,0,3562e5499767a042e190a60bfd9dbb9b6b695af77c5fafca40036938307414a4,2024-10-18T17:04:44.797000 CVE-2024-21252,0,0,3562e5499767a042e190a60bfd9dbb9b6b695af77c5fafca40036938307414a4,2024-10-18T17:04:44.797000
CVE-2024-21253,0,0,82cb10003f4ec5bdfbeaba5304d2361b5866cecedb70f3ece91f971a87496d10,2024-10-18T14:59:43.660000 CVE-2024-21253,0,0,82cb10003f4ec5bdfbeaba5304d2361b5866cecedb70f3ece91f971a87496d10,2024-10-18T14:59:43.660000
CVE-2024-21254,0,0,69ca4bf103295a9b35d72b61c0821b7611adf3b7f78c0a3144fa3da855147ce0,2024-10-18T17:05:58.723000 CVE-2024-21254,0,0,69ca4bf103295a9b35d72b61c0821b7611adf3b7f78c0a3144fa3da855147ce0,2024-10-18T17:05:58.723000
CVE-2024-21255,0,0,e030f05632b5a87ee9fbc0b2487a30eaf79a4e92eeff8a93914fc40aa8e258ce,2024-10-18T18:16:50.040000 CVE-2024-21255,0,0,e030f05632b5a87ee9fbc0b2487a30eaf79a4e92eeff8a93914fc40aa8e258ce,2024-10-18T18:16:50.040000
CVE-2024-21257,0,0,4eb5b2386255bfe67a12d4f16c9687502d7809166e4f1a2b618c5f01aeaa9628,2024-10-16T16:38:43.170000 CVE-2024-21257,0,1,725e5cb13b95dde80a37c32a41b8094719a9fca76dfc8333734f482e81824a37,2024-11-06T22:55:18.400000
CVE-2024-21258,0,0,d66d60d8ebe1253680938995404bc802bc4b9dba35146ae97db380f0d8c97381,2024-10-16T16:38:43.170000 CVE-2024-21258,0,1,f6a4f5d7d1aa00a2377e749a4d3b06007d1ed6555c84462e00a1435f7514e74c,2024-11-06T22:56:19.527000
CVE-2024-21259,0,0,f4f5607ed9f1a78aaccb5e08790e38092d26477ddc636f65efb0050b27293955,2024-10-18T15:00:17.133000 CVE-2024-21259,0,0,f4f5607ed9f1a78aaccb5e08790e38092d26477ddc636f65efb0050b27293955,2024-10-18T15:00:17.133000
CVE-2024-2126,0,0,4ce1f11f7bd5c084b75067cba762f3a64c791e384d09fc3623bdffa8d2aef429,2024-03-13T18:15:58.530000 CVE-2024-2126,0,0,4ce1f11f7bd5c084b75067cba762f3a64c791e384d09fc3623bdffa8d2aef429,2024-03-13T18:15:58.530000
CVE-2024-21260,0,0,7a47438a9729091b847bae11b79b0b39e45eeeb29dbb35a8c4d79bd78f465c02,2024-10-18T19:05:29.830000 CVE-2024-21260,0,0,7a47438a9729091b847bae11b79b0b39e45eeeb29dbb35a8c4d79bd78f465c02,2024-10-18T19:05:29.830000
CVE-2024-21261,0,0,0899d9cbcc2683b4e5f057eef455f1d9ca53b0f3260b8ba7058f26a504b9b734,2024-10-21T18:27:17.307000 CVE-2024-21261,0,0,0899d9cbcc2683b4e5f057eef455f1d9ca53b0f3260b8ba7058f26a504b9b734,2024-10-21T18:27:17.307000
CVE-2024-21262,0,0,82558944e30d58821a3281c570a2d377b7ec0772f885917aea1c19c8d3bb4a8f,2024-10-21T16:28:16.427000 CVE-2024-21262,0,0,82558944e30d58821a3281c570a2d377b7ec0772f885917aea1c19c8d3bb4a8f,2024-10-21T16:28:16.427000
CVE-2024-21263,0,0,7ac7bc00544efec065b7a3ea0c417046cafbfd2ff0aea2fefa7b4595b67183a3,2024-10-18T15:00:52.463000 CVE-2024-21263,0,0,7ac7bc00544efec065b7a3ea0c417046cafbfd2ff0aea2fefa7b4595b67183a3,2024-10-18T15:00:52.463000
CVE-2024-21264,0,0,43edc8b0674a64ea84e7381a14394594bbb3f638fa4e4e95e2e0a620c8f8163d,2024-10-16T16:38:43.170000 CVE-2024-21264,0,1,d9f928ae696c644062bfe905454106684d42ecbe4c3ee5dbcffcc7a85fd3bc2f,2024-11-06T22:56:41.647000
CVE-2024-21265,0,0,c55c1df1e1622cf6e643b1eb11b86f0a45ff8d2660ab5a45972681fbb6ed81df,2024-10-21T15:49:21.027000 CVE-2024-21265,0,0,c55c1df1e1622cf6e643b1eb11b86f0a45ff8d2660ab5a45972681fbb6ed81df,2024-10-21T15:49:21.027000
CVE-2024-21266,0,0,eb9a8a34ffd00406d4abf6e4a3c73c351bf9d5c51c3a336b85b5cbd4050db042,2024-10-21T15:49:43.940000 CVE-2024-21266,0,0,eb9a8a34ffd00406d4abf6e4a3c73c351bf9d5c51c3a336b85b5cbd4050db042,2024-10-21T15:49:43.940000
CVE-2024-21267,0,0,badeabc98b9ebca68fd4a6f1dc13051a7275b459f1ba8064226c678286ad482a,2024-10-21T15:50:27.217000 CVE-2024-21267,0,0,badeabc98b9ebca68fd4a6f1dc13051a7275b459f1ba8064226c678286ad482a,2024-10-21T15:50:27.217000
@ -245006,7 +245008,7 @@ CVE-2024-21492,0,0,803eb1b38c0a3c364c8ed4dea2bf283518201c6c637d9dcb0eb2c40900b3f
CVE-2024-21493,0,0,8c569f1b0a59292e6c9cf7ec9ce82294e78d1d0805330784c9c6f403ab9b5f07,2024-02-20T19:50:53.960000 CVE-2024-21493,0,0,8c569f1b0a59292e6c9cf7ec9ce82294e78d1d0805330784c9c6f403ab9b5f07,2024-02-20T19:50:53.960000
CVE-2024-21494,0,0,0bbab6d51758efdfbb0a7b2f9291f8e5deeed39eed0d020b8776487f79305949,2024-02-20T19:50:53.960000 CVE-2024-21494,0,0,0bbab6d51758efdfbb0a7b2f9291f8e5deeed39eed0d020b8776487f79305949,2024-02-20T19:50:53.960000
CVE-2024-21495,0,0,d8114eaee60fb319f9f14d9bbb95c01136acc0dc9b681a7e416381982ba11775,2024-02-20T19:50:53.960000 CVE-2024-21495,0,0,d8114eaee60fb319f9f14d9bbb95c01136acc0dc9b681a7e416381982ba11775,2024-02-20T19:50:53.960000
CVE-2024-21496,0,1,fd2afde9cc348b878ada34cb6af6773012668bca46f1e822b57f2512814d4fea,2024-11-06T19:35:12.967000 CVE-2024-21496,0,0,fd2afde9cc348b878ada34cb6af6773012668bca46f1e822b57f2512814d4fea,2024-11-06T19:35:12.967000
CVE-2024-21497,0,0,8aedc196ee518fe8560cc512f459ccbfc6592e8201a18667b2196e5e6bb6b22b,2024-02-20T19:50:53.960000 CVE-2024-21497,0,0,8aedc196ee518fe8560cc512f459ccbfc6592e8201a18667b2196e5e6bb6b22b,2024-02-20T19:50:53.960000
CVE-2024-21498,0,0,3c9376a89b1471a3f3dcd2f26b2302ecf028dd3649469284754d6d6bbe15e588,2024-08-01T13:46:44.130000 CVE-2024-21498,0,0,3c9376a89b1471a3f3dcd2f26b2302ecf028dd3649469284754d6d6bbe15e588,2024-08-01T13:46:44.130000
CVE-2024-21499,0,0,056024a19cf11190da9415625f86200e7f99c9c1c15d5f4eac3772c0369f1c48,2024-02-20T19:50:53.960000 CVE-2024-21499,0,0,056024a19cf11190da9415625f86200e7f99c9c1c15d5f4eac3772c0369f1c48,2024-02-20T19:50:53.960000
@ -245160,7 +245162,7 @@ CVE-2024-21686,0,0,4a77c3c56e7b5b00a78de09ce573bf8e0630b6f60379d0ccdce9209c8559b
CVE-2024-21687,0,0,b10f0ce22ddc5215abb86b2d036e862f5c36c964079edaaed2bac3d77de9097f,2024-10-24T20:35:05.307000 CVE-2024-21687,0,0,b10f0ce22ddc5215abb86b2d036e862f5c36c964079edaaed2bac3d77de9097f,2024-10-24T20:35:05.307000
CVE-2024-21689,0,0,d8a79405abcb9c8abfdb03520e41049c9522145c88e975847ada5aebd53c39e7,2024-08-20T15:44:20.567000 CVE-2024-21689,0,0,d8a79405abcb9c8abfdb03520e41049c9522145c88e975847ada5aebd53c39e7,2024-08-20T15:44:20.567000
CVE-2024-2169,0,0,25fcbf8b9d7008ea9954a41615969f4d36543f4a604eb878bcc8b4c5c18a9fe0,2024-08-02T17:35:41.760000 CVE-2024-2169,0,0,25fcbf8b9d7008ea9954a41615969f4d36543f4a604eb878bcc8b4c5c18a9fe0,2024-08-02T17:35:41.760000
CVE-2024-21690,0,1,52f2f5bb1e3e94fbb3d7fb8fab564e88563477b86bcce8501f8853e0eaa6dfd8,2024-11-06T19:35:13.787000 CVE-2024-21690,0,0,52f2f5bb1e3e94fbb3d7fb8fab564e88563477b86bcce8501f8853e0eaa6dfd8,2024-11-06T19:35:13.787000
CVE-2024-2170,0,0,758d6332b5fccd657d38a7eddcc769e16fb72e0c1b6514443e29b8614302434a,2024-03-26T12:55:05.010000 CVE-2024-2170,0,0,758d6332b5fccd657d38a7eddcc769e16fb72e0c1b6514443e29b8614302434a,2024-03-26T12:55:05.010000
CVE-2024-2171,0,0,17c18c0537b711b05cfdac779ba2d168e9830dc55b69168346eed3896c1fbc48,2024-10-11T14:15:32.983000 CVE-2024-2171,0,0,17c18c0537b711b05cfdac779ba2d168e9830dc55b69168346eed3896c1fbc48,2024-10-11T14:15:32.983000
CVE-2024-2172,0,0,edf7001396454eaaf4557a9c3fcef53434431cfdf8112832b9dc273636d1d743,2024-03-13T18:15:58.530000 CVE-2024-2172,0,0,edf7001396454eaaf4557a9c3fcef53434431cfdf8112832b9dc273636d1d743,2024-03-13T18:15:58.530000
@ -245374,7 +245376,7 @@ CVE-2024-22009,0,0,b5b916a7d5e03fc859dbc7dc76ad79ca7e20552b5b212df09fe8f4b48b2af
CVE-2024-22010,0,0,064f021344a36df851e34619a798aa49214be75a65182801242af835352a2a15,2024-11-05T17:35:07.960000 CVE-2024-22010,0,0,064f021344a36df851e34619a798aa49214be75a65182801242af835352a2a15,2024-11-05T17:35:07.960000
CVE-2024-22011,0,0,f1daed51c903d88d263d46bfaefe467f13d6b47a3368a8cc0e99c1a391f6eea9,2024-03-12T12:40:13.500000 CVE-2024-22011,0,0,f1daed51c903d88d263d46bfaefe467f13d6b47a3368a8cc0e99c1a391f6eea9,2024-03-12T12:40:13.500000
CVE-2024-22012,0,0,dc6a18ae7accb379105ae5b8c9fe53def4787e4dcb1f5ed3397b80bba457789c,2024-03-12T21:15:57.953000 CVE-2024-22012,0,0,dc6a18ae7accb379105ae5b8c9fe53def4787e4dcb1f5ed3397b80bba457789c,2024-03-12T21:15:57.953000
CVE-2024-22013,0,0,7f532e6900797141a60e66fca5bd8ac368c382be95753f2e15222fe6285acb11,2024-09-20T12:31:20.110000 CVE-2024-22013,0,1,82c717c65faf8d538fe3d2eedeb4ed9751bc8b1763b263d1a92ee0f5afa87e71,2024-11-06T21:35:02.500000
CVE-2024-22014,0,0,b059d091724833d1bb51d32eadbd1be8dce585949d29de43319d8d8ddaed06d9,2024-10-25T21:35:05.193000 CVE-2024-22014,0,0,b059d091724833d1bb51d32eadbd1be8dce585949d29de43319d8d8ddaed06d9,2024-10-25T21:35:05.193000
CVE-2024-22015,0,0,ab9198a00b8902f553a18672e99e37367cbd733d408a460d3e69564e986f708c,2024-07-03T01:46:59.010000 CVE-2024-22015,0,0,ab9198a00b8902f553a18672e99e37367cbd733d408a460d3e69564e986f708c,2024-07-03T01:46:59.010000
CVE-2024-22016,0,0,80ed0ed1953eb9bc819815a69c5782ab91648798b066ce1586fe70786fbfbdf5,2024-02-07T17:33:12.727000 CVE-2024-22016,0,0,80ed0ed1953eb9bc819815a69c5782ab91648798b066ce1586fe70786fbfbdf5,2024-02-07T17:33:12.727000
@ -245435,7 +245437,7 @@ CVE-2024-22081,0,0,c0e23ef382492c7380a92e96cb3bb331fbab187b3695f4beebcf35389003e
CVE-2024-22082,0,0,459e25d191876c4f00cade807052f238137ad057437a31854486c01937977cf9,2024-08-05T19:35:02.233000 CVE-2024-22082,0,0,459e25d191876c4f00cade807052f238137ad057437a31854486c01937977cf9,2024-08-05T19:35:02.233000
CVE-2024-22083,0,0,7a6168861b8307faff71dd88ea4edf4af71ed0e4a8c79dad79d5ed358e7010c6,2024-03-20T13:00:16.367000 CVE-2024-22083,0,0,7a6168861b8307faff71dd88ea4edf4af71ed0e4a8c79dad79d5ed358e7010c6,2024-03-20T13:00:16.367000
CVE-2024-22084,0,0,0e122ae85d4de51fb69a5bdf68cc5b622f1fc44a5c7c74096438459ba25e7679,2024-08-03T20:35:04.983000 CVE-2024-22084,0,0,0e122ae85d4de51fb69a5bdf68cc5b622f1fc44a5c7c74096438459ba25e7679,2024-08-03T20:35:04.983000
CVE-2024-22085,0,1,9bb660a953db76f501963932fc60e0d5afb5a0529b26a144a0fb7fc6555c5828,2024-11-06T19:35:14.630000 CVE-2024-22085,0,0,9bb660a953db76f501963932fc60e0d5afb5a0529b26a144a0fb7fc6555c5828,2024-11-06T19:35:14.630000
CVE-2024-22086,0,0,1d7696b944cd1a26a2cc7bdc48a35b3903f2aec00a961a7e53e9ced659d9458d,2024-01-11T17:04:07.660000 CVE-2024-22086,0,0,1d7696b944cd1a26a2cc7bdc48a35b3903f2aec00a961a7e53e9ced659d9458d,2024-01-11T17:04:07.660000
CVE-2024-22087,0,0,4384797ae7846daec0107426d58d87d7c4784c559db16808176350ae4c959dce,2024-01-11T17:03:51.967000 CVE-2024-22087,0,0,4384797ae7846daec0107426d58d87d7c4784c559db16808176350ae4c959dce,2024-01-11T17:03:51.967000
CVE-2024-22088,0,0,b895d73398c482c8e6acdb9bb17741aa9b7a4b9e58038e199e46754d5e3337bd,2024-09-04T21:35:06.700000 CVE-2024-22088,0,0,b895d73398c482c8e6acdb9bb17741aa9b7a4b9e58038e199e46754d5e3337bd,2024-09-04T21:35:06.700000
@ -246232,7 +246234,7 @@ CVE-2024-23294,0,0,6e53ba65116756c4100f8fe8d5569a0c62f61cbe9a5faf2cb1a478a60da66
CVE-2024-23295,0,0,888dad9ac3d8cb77923a71e92315d941876e8170cf4689e417e49228bdb9fd95,2024-10-27T14:35:05.370000 CVE-2024-23295,0,0,888dad9ac3d8cb77923a71e92315d941876e8170cf4689e417e49228bdb9fd95,2024-10-27T14:35:05.370000
CVE-2024-23296,0,0,4c1c20e10d440a721ea56c440f9f9d49de01279fc6b58c55156def98607c7416,2024-08-14T19:32:48.817000 CVE-2024-23296,0,0,4c1c20e10d440a721ea56c440f9f9d49de01279fc6b58c55156def98607c7416,2024-08-14T19:32:48.817000
CVE-2024-23297,0,0,4e04bab05bbe7ec82e24a36797403e08fa4bc700957cd0b27eee797a80773cdb,2024-10-27T14:35:05.540000 CVE-2024-23297,0,0,4e04bab05bbe7ec82e24a36797403e08fa4bc700957cd0b27eee797a80773cdb,2024-10-27T14:35:05.540000
CVE-2024-23298,0,1,11c25643b2811d3e7a7eaf30f2e6f582af0634ebd8c739f4afa1e19e40be1a63,2024-11-06T19:35:15.443000 CVE-2024-23298,0,0,11c25643b2811d3e7a7eaf30f2e6f582af0634ebd8c739f4afa1e19e40be1a63,2024-11-06T19:35:15.443000
CVE-2024-23299,0,0,fe4dd82d5102073a81be0172f4d91c213b490a3370bedc852ed979e38d0840d6,2024-08-20T15:35:03.893000 CVE-2024-23299,0,0,fe4dd82d5102073a81be0172f4d91c213b490a3370bedc852ed979e38d0840d6,2024-08-20T15:35:03.893000
CVE-2024-2330,0,0,9ae945264bb052d68e9c213073b32e3a9e8de8241b1a06dd279470149a8f98ca,2024-05-17T02:38:10.540000 CVE-2024-2330,0,0,9ae945264bb052d68e9c213073b32e3a9e8de8241b1a06dd279470149a8f98ca,2024-05-17T02:38:10.540000
CVE-2024-23300,0,0,c517d8f3cd7384c2ec4a46a0a893833bb0df2ca0141a1842a58ab8296dd562b0,2024-08-26T15:35:06.113000 CVE-2024-23300,0,0,c517d8f3cd7384c2ec4a46a0a893833bb0df2ca0141a1842a58ab8296dd562b0,2024-08-26T15:35:06.113000
@ -246440,7 +246442,7 @@ CVE-2024-23556,0,0,4abe0589b741d76d8a6140e408a99fff6f784fc140eb8dd575aa458015e6a
CVE-2024-23557,0,0,4270afce746443b5193815936f76591ad043b307043acbde73eb7ec4d54cd34d,2024-08-07T19:35:03.190000 CVE-2024-23557,0,0,4270afce746443b5193815936f76591ad043b307043acbde73eb7ec4d54cd34d,2024-08-07T19:35:03.190000
CVE-2024-23558,0,0,1aaffec8c09fd69e12702b79a89a97fa66d8cf8050a73827a56fcf9396bca5b5,2024-11-01T19:35:15.123000 CVE-2024-23558,0,0,1aaffec8c09fd69e12702b79a89a97fa66d8cf8050a73827a56fcf9396bca5b5,2024-11-01T19:35:15.123000
CVE-2024-23559,0,0,1cfe950943db323f850a4ffa6fa09a9e594439fd864c25048ffda399bb0b3e4f,2024-04-15T19:15:09.577000 CVE-2024-23559,0,0,1cfe950943db323f850a4ffa6fa09a9e594439fd864c25048ffda399bb0b3e4f,2024-04-15T19:15:09.577000
CVE-2024-23560,0,0,e362890ddaf504fd7ec860643e0e2bcce74ce536f1ff64f240f88b9ed03a4aad,2024-04-16T13:24:07.103000 CVE-2024-23560,0,1,611d6f496e671cc0d1d356211a118fce6e543142f0a1a253e80e1a53fcc9dde1,2024-11-06T22:35:04.240000
CVE-2024-23561,0,0,05ce6bff2b3c083c40d1cefd8ecfe83b9e8bac92f3576a18d3243c6c46e3bef3,2024-11-04T22:35:03.360000 CVE-2024-23561,0,0,05ce6bff2b3c083c40d1cefd8ecfe83b9e8bac92f3576a18d3243c6c46e3bef3,2024-11-04T22:35:03.360000
CVE-2024-23562,0,0,4d517ea8a2763e5506a865d21e69db429e3d16d2d215329e0568829328a2181b,2024-10-23T23:15:12.397000 CVE-2024-23562,0,0,4d517ea8a2763e5506a865d21e69db429e3d16d2d215329e0568829328a2181b,2024-10-23T23:15:12.397000
CVE-2024-2357,0,0,58f4675a1a89325da5d3ee44283ebc42e89a0cdd69475172a4baac455a4ffac1,2024-03-23T03:15:12.690000 CVE-2024-2357,0,0,58f4675a1a89325da5d3ee44283ebc42e89a0cdd69475172a4baac455a4ffac1,2024-03-23T03:15:12.690000
@ -248402,7 +248404,7 @@ CVE-2024-26351,0,0,12fff75a6adfb2a49a1df2419d56c70a882606b31c647e6d0906250c15d15
CVE-2024-26352,0,0,8b15f4dcf8c7ba10be17fb174c1fc0c7dab8a3918429d96aacd6df61b16faa50,2024-08-14T20:35:07.913000 CVE-2024-26352,0,0,8b15f4dcf8c7ba10be17fb174c1fc0c7dab8a3918429d96aacd6df61b16faa50,2024-08-14T20:35:07.913000
CVE-2024-2636,0,0,99a69aaffd46cfe65a84b6720d2f35122e16b65656b4791402aef2e645d8d6eb,2024-03-19T13:26:46 CVE-2024-2636,0,0,99a69aaffd46cfe65a84b6720d2f35122e16b65656b4791402aef2e645d8d6eb,2024-03-19T13:26:46
CVE-2024-26362,0,0,5faf69da8a67af4816d796fd5b51111ac2c788f77e8e8dd0cf83d9d0e45a369d,2024-07-03T01:49:39.793000 CVE-2024-26362,0,0,5faf69da8a67af4816d796fd5b51111ac2c788f77e8e8dd0cf83d9d0e45a369d,2024-07-03T01:49:39.793000
CVE-2024-26367,0,0,527c3fc48df6b7e73e05f006f7179ae46d331d377d9a28bb902941bd60f631f8,2024-05-14T19:18:31.490000 CVE-2024-26367,0,1,fb602fe640a36deea42d544a0bf5bbfec018fc1bce2e50bc4f6ba27f1fac9ba7,2024-11-06T21:35:02.850000
CVE-2024-26369,0,0,08c9f0525905502b41d2dcc09bd77683ee3501b8b43f7fda43dd5219f9780ed5,2024-08-01T13:48:09.673000 CVE-2024-26369,0,0,08c9f0525905502b41d2dcc09bd77683ee3501b8b43f7fda43dd5219f9780ed5,2024-08-01T13:48:09.673000
CVE-2024-2637,0,0,721622b64a65f273433032cdde0b2ce3d6c7d3ce5ea1581ad6c33c2a93b72687,2024-05-27T08:15:09.360000 CVE-2024-2637,0,0,721622b64a65f273433032cdde0b2ce3d6c7d3ce5ea1581ad6c33c2a93b72687,2024-05-27T08:15:09.360000
CVE-2024-2639,0,0,1b2fbb8554a3bfbdfb75c8d2c4abee29a55fe420023a4469268f266088d766ca,2024-05-17T02:38:22.540000 CVE-2024-2639,0,0,1b2fbb8554a3bfbdfb75c8d2c4abee29a55fe420023a4469268f266088d766ca,2024-05-17T02:38:22.540000
@ -248542,7 +248544,7 @@ CVE-2024-26644,0,0,7934c2f59b6e30a2c4b4745bfbfa90280e322c49f0c2a186c87bb52bbd1ff
CVE-2024-26645,0,0,fcb784c6c783cccdf8ab1103cd462aaed01b5616113ac8c3b057371a72bdcc2d,2024-11-05T10:15:36.983000 CVE-2024-26645,0,0,fcb784c6c783cccdf8ab1103cd462aaed01b5616113ac8c3b057371a72bdcc2d,2024-11-05T10:15:36.983000
CVE-2024-26646,0,0,37b8583bb8aa6b5d9135a9adf8c1cea7db38d580753ce18483b0a0263c262490,2024-03-27T12:29:41.530000 CVE-2024-26646,0,0,37b8583bb8aa6b5d9135a9adf8c1cea7db38d580753ce18483b0a0263c262490,2024-03-27T12:29:41.530000
CVE-2024-26647,0,0,2352172cdf00eda3657e1ca2ad602c79475b6fdb427922a2ce2991151abd5140,2024-03-27T12:29:41.530000 CVE-2024-26647,0,0,2352172cdf00eda3657e1ca2ad602c79475b6fdb427922a2ce2991151abd5140,2024-03-27T12:29:41.530000
CVE-2024-26648,0,0,4cedcf3cfff8479b6fed3984e33e00ae084d6a67309ed2c17e18f60de1bb7057,2024-03-27T12:29:41.530000 CVE-2024-26648,0,1,c17515eda5659d8a7ff11ea44fa35ca00ff75d317f4eddf403747bbe01bfe069,2024-11-06T22:35:04.950000
CVE-2024-26649,0,0,940fcd7e5d20bc1c18f4c974a09622f0b6b6d87231bbd7408e7118d35c4bade7,2024-03-27T12:29:41.530000 CVE-2024-26649,0,0,940fcd7e5d20bc1c18f4c974a09622f0b6b6d87231bbd7408e7118d35c4bade7,2024-03-27T12:29:41.530000
CVE-2024-2665,0,0,0d168a0d5dbe4804c9bebe4f21c0d1f4a27974809ea172b5979b5dccd55d97c3,2024-04-10T13:23:38.787000 CVE-2024-2665,0,0,0d168a0d5dbe4804c9bebe4f21c0d1f4a27974809ea172b5979b5dccd55d97c3,2024-04-10T13:23:38.787000
CVE-2024-26650,0,0,c37b82afef74cba8f0a1b3081e8c53c80ac8f73689ed9f1c045183b9566d980d,2024-05-23T14:15:09.293000 CVE-2024-26650,0,0,c37b82afef74cba8f0a1b3081e8c53c80ac8f73689ed9f1c045183b9566d980d,2024-05-23T14:15:09.293000
@ -248634,7 +248636,7 @@ CVE-2024-26728,0,0,1d984fbbc09b2528ed0368e262b6925669160ac0081a20349d9ce1b0481cd
CVE-2024-26729,0,0,f2558d66284076d36d46e0aacf3fb55436eadb8de18e68f9386d43b00e2b9ac0,2024-04-03T17:24:18.150000 CVE-2024-26729,0,0,f2558d66284076d36d46e0aacf3fb55436eadb8de18e68f9386d43b00e2b9ac0,2024-04-03T17:24:18.150000
CVE-2024-2673,0,0,c0d60620ac5234f9d83256f6c8f0cc424d5b12f467b9d75fc363f57a06d6b86c,2024-06-27T20:15:20.927000 CVE-2024-2673,0,0,c0d60620ac5234f9d83256f6c8f0cc424d5b12f467b9d75fc363f57a06d6b86c,2024-06-27T20:15:20.927000
CVE-2024-26730,0,0,e3adf1f18e75f02eb4ddde1d65703597e8a59901e6d25e50ea9de5823f84b09a,2024-04-03T17:24:18.150000 CVE-2024-26730,0,0,e3adf1f18e75f02eb4ddde1d65703597e8a59901e6d25e50ea9de5823f84b09a,2024-04-03T17:24:18.150000
CVE-2024-26731,0,0,a0b35e80e7d711c60a97912dc302c5db34b4fd9235fbfe456f2513f7ece65c03,2024-04-03T17:24:18.150000 CVE-2024-26731,0,1,444fd53cb325041c6066bba9c7011195568465765bfe4f679685b3d9f33781fd,2024-11-06T22:35:05.197000
CVE-2024-26732,0,0,ec7cbeff52970bd11884d825e88204cea9fe962424cd8f5b8fa233a8acdeb543,2024-04-03T17:24:18.150000 CVE-2024-26732,0,0,ec7cbeff52970bd11884d825e88204cea9fe962424cd8f5b8fa233a8acdeb543,2024-04-03T17:24:18.150000
CVE-2024-26733,0,0,ffb3f90c0778d3f838c29091a428911e1aa8d896c4d95445af70c44f0420f3e2,2024-11-05T10:15:45.177000 CVE-2024-26733,0,0,ffb3f90c0778d3f838c29091a428911e1aa8d896c4d95445af70c44f0420f3e2,2024-11-05T10:15:45.177000
CVE-2024-26734,0,0,0eb1b1feddc3c43838ae7b1cbb500208ff685270dbb18f151464783d19bf4c65,2024-04-03T17:24:18.150000 CVE-2024-26734,0,0,0eb1b1feddc3c43838ae7b1cbb500208ff685270dbb18f151464783d19bf4c65,2024-04-03T17:24:18.150000
@ -248648,7 +248650,7 @@ CVE-2024-26740,0,0,1e1bef330b72fc7d544d8597ed7662f3757f2fd4d4713d8ba1cf34c542f65
CVE-2024-26741,0,0,e3c248718399fd38da7f7e0290c551d82b46ab3d7aa0a320a11762dcc655c816,2024-04-03T17:24:18.150000 CVE-2024-26741,0,0,e3c248718399fd38da7f7e0290c551d82b46ab3d7aa0a320a11762dcc655c816,2024-04-03T17:24:18.150000
CVE-2024-26742,0,0,d7af6623131612fa1c7fd4e052a63ef79bda58184e37bad2d9cdda66dda9e08a,2024-04-03T17:24:18.150000 CVE-2024-26742,0,0,d7af6623131612fa1c7fd4e052a63ef79bda58184e37bad2d9cdda66dda9e08a,2024-04-03T17:24:18.150000
CVE-2024-26743,0,0,4a7e68056af89e9c88fe98dfc22c3d733a12a894d9b16349f941d17c194d57a1,2024-11-05T10:15:46.150000 CVE-2024-26743,0,0,4a7e68056af89e9c88fe98dfc22c3d733a12a894d9b16349f941d17c194d57a1,2024-11-05T10:15:46.150000
CVE-2024-26744,0,0,0ceec025040440e9ba41481335beedc9c2145c266bf1333f6ac942206f1c0ce5,2024-11-05T10:15:46.253000 CVE-2024-26744,0,1,0a89200e6dfae9bb0e1be2a7f590bdb3afcdd853d9d245ed930156cf4025f324,2024-11-06T21:35:03.883000
CVE-2024-26745,0,0,122c004116025bf61ab1b820e4608632aeed8cec5ef7c9fee61ffd6ee6d9d826,2024-10-31T18:35:09.190000 CVE-2024-26745,0,0,122c004116025bf61ab1b820e4608632aeed8cec5ef7c9fee61ffd6ee6d9d826,2024-10-31T18:35:09.190000
CVE-2024-26746,0,0,503c547cde060b718fd5c822ced0ef17967b19427780440c26d09b063f4a1e1e,2024-04-04T12:48:41.700000 CVE-2024-26746,0,0,503c547cde060b718fd5c822ced0ef17967b19427780440c26d09b063f4a1e1e,2024-04-04T12:48:41.700000
CVE-2024-26747,0,0,09de0e643315d31c44b1583413acd72b2581d73c25656d42d1275770b236ac52,2024-11-05T15:35:09.820000 CVE-2024-26747,0,0,09de0e643315d31c44b1583413acd72b2581d73c25656d42d1275770b236ac52,2024-11-05T15:35:09.820000
@ -248662,7 +248664,7 @@ CVE-2024-26753,0,0,3846eb71f07ae66d4f1ab1df6c9d443c98aca1924ebf110c33d4d08080433
CVE-2024-26754,0,0,4c9cfa7c31d874fcb7c7bccb3bab927e4d2ae66cd4f4c5042fa0e607d4d1901d,2024-11-05T10:15:47.167000 CVE-2024-26754,0,0,4c9cfa7c31d874fcb7c7bccb3bab927e4d2ae66cd4f4c5042fa0e607d4d1901d,2024-11-05T10:15:47.167000
CVE-2024-26755,0,0,39f7695747b108842d59070ebf8576f95142b84dcd41ed480d2d853aa612b61c,2024-04-03T17:24:18.150000 CVE-2024-26755,0,0,39f7695747b108842d59070ebf8576f95142b84dcd41ed480d2d853aa612b61c,2024-04-03T17:24:18.150000
CVE-2024-26756,0,0,655c17b37b1ef2579c61a87ebef153f2774027727f182f3917510b923fe0ccdc,2024-04-03T17:24:18.150000 CVE-2024-26756,0,0,655c17b37b1ef2579c61a87ebef153f2774027727f182f3917510b923fe0ccdc,2024-04-03T17:24:18.150000
CVE-2024-26757,0,0,6034152e03c1ca661ffc06ef00b2bfd06031f7a425df0cd8c48af8de3fbaa9da,2024-04-03T17:24:18.150000 CVE-2024-26757,0,1,90467e553fa06ea3a7c2ab3dea36e3f811f1f99408fa7e26a28d265d66f85785,2024-11-06T21:35:04.737000
CVE-2024-26758,0,0,13c69310718039924d9aab781258d9193abdbc64a782ef9279b6a2cb5e131a2b,2024-11-04T18:35:07.610000 CVE-2024-26758,0,0,13c69310718039924d9aab781258d9193abdbc64a782ef9279b6a2cb5e131a2b,2024-11-04T18:35:07.610000
CVE-2024-26759,0,0,fee904955decc510df312a537847d082dbb8683c61f8fb59034da4ba171b0bf7,2024-04-03T17:24:18.150000 CVE-2024-26759,0,0,fee904955decc510df312a537847d082dbb8683c61f8fb59034da4ba171b0bf7,2024-04-03T17:24:18.150000
CVE-2024-2676,0,0,c5aff2ba1e0c7344ce038e4f14ac4978d6bb29d1aa8d9b0c435541e971559719,2024-05-17T02:38:24.527000 CVE-2024-2676,0,0,c5aff2ba1e0c7344ce038e4f14ac4978d6bb29d1aa8d9b0c435541e971559719,2024-05-17T02:38:24.527000
@ -248686,7 +248688,7 @@ CVE-2024-26775,0,0,6fd84ebe1443aa1945a09fd4c48b2b5413a95fedab44014851d1e3de25fa4
CVE-2024-26776,0,0,231483d2965c1ba8393bd7449031e7bde3f34468b7fb6c2f373633060a8098c5,2024-11-05T10:15:48.947000 CVE-2024-26776,0,0,231483d2965c1ba8393bd7449031e7bde3f34468b7fb6c2f373633060a8098c5,2024-11-05T10:15:48.947000
CVE-2024-26777,0,0,149a5e7ba07fc7fae23ca08bab697f35d178e4d6054d6fb6db6aa2ffb1dc45d8,2024-11-05T10:15:49.030000 CVE-2024-26777,0,0,149a5e7ba07fc7fae23ca08bab697f35d178e4d6054d6fb6db6aa2ffb1dc45d8,2024-11-05T10:15:49.030000
CVE-2024-26778,0,0,ba27fdacb2617bc8c2e5f1f9ee53b0927010430cedb669781ea0cbeb302b5a02,2024-11-05T10:15:49.133000 CVE-2024-26778,0,0,ba27fdacb2617bc8c2e5f1f9ee53b0927010430cedb669781ea0cbeb302b5a02,2024-11-05T10:15:49.133000
CVE-2024-26779,0,0,ec4054c03218d2454c2d30dd1769a652bdebca802addb64ef26c3ae272a73208,2024-11-05T10:15:49.233000 CVE-2024-26779,0,1,5213496ece4af679413eec0c49002bd6c886a5728eec3dcb023c0c154d5e6da6,2024-11-06T22:35:05.993000
CVE-2024-2678,0,0,bcb8f0bc79308fc240a2e04032fecd11d29a05e517a407df60996ec6cc430105,2024-05-17T02:38:24.730000 CVE-2024-2678,0,0,bcb8f0bc79308fc240a2e04032fecd11d29a05e517a407df60996ec6cc430105,2024-05-17T02:38:24.730000
CVE-2024-26780,0,0,910e1f464205bb4d61ae164984308d54dec4e128d9fce0100bb0bec47440e7b3,2024-04-04T14:15:09.667000 CVE-2024-26780,0,0,910e1f464205bb4d61ae164984308d54dec4e128d9fce0100bb0bec47440e7b3,2024-04-04T14:15:09.667000
CVE-2024-26781,0,0,f985d7d52d3c00d388812605acd1c322cb3a9f3a0500eb44ae3d519cd75a2f91,2024-11-05T10:15:49.403000 CVE-2024-26781,0,0,f985d7d52d3c00d388812605acd1c322cb3a9f3a0500eb44ae3d519cd75a2f91,2024-11-05T10:15:49.403000
@ -248721,7 +248723,7 @@ CVE-2024-26807,0,0,104a4e4d854016f8b324666da2a6519a8e2f2a9b7b206527a539918e69652
CVE-2024-26808,0,0,78f28d423840a66070d27b2f76e4cfdb21e72d03dc73ddafa1fe00afc26ddd06,2024-11-05T10:15:51.720000 CVE-2024-26808,0,0,78f28d423840a66070d27b2f76e4cfdb21e72d03dc73ddafa1fe00afc26ddd06,2024-11-05T10:15:51.720000
CVE-2024-26809,0,0,01e5bd6a3e1086db6d390f88a74abf1dab95b48a5074d6a449e0ffc835016714,2024-11-05T10:15:51.820000 CVE-2024-26809,0,0,01e5bd6a3e1086db6d390f88a74abf1dab95b48a5074d6a449e0ffc835016714,2024-11-05T10:15:51.820000
CVE-2024-2681,0,0,064400d4b0835279b0227ccac554f0cfa5438a53fe0a37509df7fe4d3bb69b80,2024-05-17T02:38:25.007000 CVE-2024-2681,0,0,064400d4b0835279b0227ccac554f0cfa5438a53fe0a37509df7fe4d3bb69b80,2024-05-17T02:38:25.007000
CVE-2024-26810,0,1,3bcbd029ab3dc0530ec232fef8ab00be486fb08e0fc65e925a6e7547e08a8c3a,2024-11-06T20:35:09.833000 CVE-2024-26810,0,0,3bcbd029ab3dc0530ec232fef8ab00be486fb08e0fc65e925a6e7547e08a8c3a,2024-11-06T20:35:09.833000
CVE-2024-26811,0,0,b419aa5e7bfea8f6be9b0c18d47a04ffcdb7322b3bd6706c908ab4700cf29410,2024-04-28T12:15:20.780000 CVE-2024-26811,0,0,b419aa5e7bfea8f6be9b0c18d47a04ffcdb7322b3bd6706c908ab4700cf29410,2024-04-28T12:15:20.780000
CVE-2024-26812,0,0,e15f8f2f69aee37cecc8fd71e141552acaf8bd02ff4a9774ac9f3745dc6faa03,2024-11-05T10:15:52.087000 CVE-2024-26812,0,0,e15f8f2f69aee37cecc8fd71e141552acaf8bd02ff4a9774ac9f3745dc6faa03,2024-11-05T10:15:52.087000
CVE-2024-26813,0,0,1e161884c9c6bba988e090609d3e12222e5e93bf4b5b4ea55c3748df4f0005bd,2024-11-05T10:15:52.177000 CVE-2024-26813,0,0,1e161884c9c6bba988e090609d3e12222e5e93bf4b5b4ea55c3748df4f0005bd,2024-11-05T10:15:52.177000
@ -248757,7 +248759,7 @@ CVE-2024-2684,0,0,d36d2cea9eacbddac9e02987b1e26022fd6a893a6c0f09ee50bb451cfe4d7a
CVE-2024-26840,0,0,66612eb6e16c6bcdf27f2a13a7a8da4787be523c0173463ccb5d506ac9b20933,2024-11-05T10:15:54.040000 CVE-2024-26840,0,0,66612eb6e16c6bcdf27f2a13a7a8da4787be523c0173463ccb5d506ac9b20933,2024-11-05T10:15:54.040000
CVE-2024-26841,0,0,5e1f136ad87debfe07a19d1692bc4baeabe3ebee450bd39d508ed3155d7f3178,2024-04-17T12:48:07.510000 CVE-2024-26841,0,0,5e1f136ad87debfe07a19d1692bc4baeabe3ebee450bd39d508ed3155d7f3178,2024-04-17T12:48:07.510000
CVE-2024-26842,0,0,2fcacd7d46da00b8ed6abd9aff9babef4fef495c42a9c08855209ae79c6b7116,2024-04-17T12:48:07.510000 CVE-2024-26842,0,0,2fcacd7d46da00b8ed6abd9aff9babef4fef495c42a9c08855209ae79c6b7116,2024-04-17T12:48:07.510000
CVE-2024-26843,0,1,08c4fd5074176009c661d945c518162a34e07b9556d45a3623e3f7aac78eaafe,2024-11-06T20:35:10.390000 CVE-2024-26843,0,0,08c4fd5074176009c661d945c518162a34e07b9556d45a3623e3f7aac78eaafe,2024-11-06T20:35:10.390000
CVE-2024-26844,0,0,e7dd9fdbca55a3fe3d15e1a88aaa23b8bd8dc5bda58e0747f6bd61e00240dea4,2024-04-17T12:48:07.510000 CVE-2024-26844,0,0,e7dd9fdbca55a3fe3d15e1a88aaa23b8bd8dc5bda58e0747f6bd61e00240dea4,2024-04-17T12:48:07.510000
CVE-2024-26845,0,0,d8720903c9d639d864f48e7c98cece1c82b5d1302754f3650c04c4d9b5ebfbf2,2024-11-05T10:15:54.423000 CVE-2024-26845,0,0,d8720903c9d639d864f48e7c98cece1c82b5d1302754f3650c04c4d9b5ebfbf2,2024-11-05T10:15:54.423000
CVE-2024-26846,0,0,923f64cc2eb677ab6a3c4fbbb44af82280cbfbab47e28dac8f179259ef7d96ac,2024-11-05T10:15:54.533000 CVE-2024-26846,0,0,923f64cc2eb677ab6a3c4fbbb44af82280cbfbab47e28dac8f179259ef7d96ac,2024-11-05T10:15:54.533000
@ -248963,7 +248965,7 @@ CVE-2024-27029,0,0,6c081ff738eb90dc7d9bc74913c1f6e1efe7fc554037e9bb9b8506cffba2a
CVE-2024-2703,0,0,fb7268c6624632e5fa0c645fe7971240898e11ffe4f2cbdecab29aea976f669a,2024-05-17T02:38:25.893000 CVE-2024-2703,0,0,fb7268c6624632e5fa0c645fe7971240898e11ffe4f2cbdecab29aea976f669a,2024-05-17T02:38:25.893000
CVE-2024-27030,0,0,6cf033352f8b449cd788a898986efe2b6d73f55358a4b240c970dde448599393,2024-11-05T10:16:20.800000 CVE-2024-27030,0,0,6cf033352f8b449cd788a898986efe2b6d73f55358a4b240c970dde448599393,2024-11-05T10:16:20.800000
CVE-2024-27031,0,0,87e5bf3aa11aa1c30fab50e95fb076e098520276691532d4f69eba3b6501fd89,2024-05-01T19:50:25.633000 CVE-2024-27031,0,0,87e5bf3aa11aa1c30fab50e95fb076e098520276691532d4f69eba3b6501fd89,2024-05-01T19:50:25.633000
CVE-2024-27032,0,1,4256b1faa9815988bb13d55dd8255d2df11f44c2836efb1cce4d42829ee07487,2024-11-06T19:35:15.673000 CVE-2024-27032,0,0,4256b1faa9815988bb13d55dd8255d2df11f44c2836efb1cce4d42829ee07487,2024-11-06T19:35:15.673000
CVE-2024-27033,0,0,99ae4dd52c39324cecbf4c22b710e291de26bae8f09204b4a9dcb711e784eb7c,2024-05-01T19:50:25.633000 CVE-2024-27033,0,0,99ae4dd52c39324cecbf4c22b710e291de26bae8f09204b4a9dcb711e784eb7c,2024-05-01T19:50:25.633000
CVE-2024-27034,0,0,a9e7de1105d11e28310eeb40c6007754a28705e0fc4756aadd06d5c333670f91,2024-05-01T19:50:25.633000 CVE-2024-27034,0,0,a9e7de1105d11e28310eeb40c6007754a28705e0fc4756aadd06d5c333670f91,2024-05-01T19:50:25.633000
CVE-2024-27035,0,0,de6caa5353f29d207951f5c6cb0655ce88080de36a966a9e941d0bc22cc59584,2024-05-01T19:50:25.633000 CVE-2024-27035,0,0,de6caa5353f29d207951f5c6cb0655ce88080de36a966a9e941d0bc22cc59584,2024-05-01T19:50:25.633000
@ -248987,7 +248989,7 @@ CVE-2024-27050,0,0,dd1eb20f7cebaf03087c82f7049e5087e8556c8b803e5a5d2fec557dfd4f9
CVE-2024-27051,0,0,a5f0f37dcf2988f5d46e492939e3fee8af550ad1a72bff52461dcb0b308f27dc,2024-11-05T10:16:24.617000 CVE-2024-27051,0,0,a5f0f37dcf2988f5d46e492939e3fee8af550ad1a72bff52461dcb0b308f27dc,2024-11-05T10:16:24.617000
CVE-2024-27052,0,0,b1181b5fccdcf1dfe1970739e055eb9b25314d32d3dbc033144a22078b1e858d,2024-11-05T10:16:24.720000 CVE-2024-27052,0,0,b1181b5fccdcf1dfe1970739e055eb9b25314d32d3dbc033144a22078b1e858d,2024-11-05T10:16:24.720000
CVE-2024-27053,0,0,8ef5fe8a862dfbc909fe138c33df28d8e01f8c7054d8543709bc08fc1a631712,2024-11-05T10:16:24.860000 CVE-2024-27053,0,0,8ef5fe8a862dfbc909fe138c33df28d8e01f8c7054d8543709bc08fc1a631712,2024-11-05T10:16:24.860000
CVE-2024-27054,0,1,07cae656266e4b957607ddcc6b44e4ae403eb66beb9e9e32950c2c983970e67a,2024-11-06T20:35:11.540000 CVE-2024-27054,0,0,07cae656266e4b957607ddcc6b44e4ae403eb66beb9e9e32950c2c983970e67a,2024-11-06T20:35:11.540000
CVE-2024-27055,0,0,f1f4f60e5be8e483ef7b713ef7c9c11c2b4e92b8e1ac3b8e82c2d3f18ccfe46b,2024-05-01T19:50:25.633000 CVE-2024-27055,0,0,f1f4f60e5be8e483ef7b713ef7c9c11c2b4e92b8e1ac3b8e82c2d3f18ccfe46b,2024-05-01T19:50:25.633000
CVE-2024-27056,0,0,eb9c42cff1d43c51ba37142ff49c7c647f598f278f30af80f297cea872e6d16b,2024-05-01T19:50:25.633000 CVE-2024-27056,0,0,eb9c42cff1d43c51ba37142ff49c7c647f598f278f30af80f297cea872e6d16b,2024-05-01T19:50:25.633000
CVE-2024-27057,0,0,c547d10d93717b1185795df41c7fbb63e300d75cd64ee01d7cffbe3a6007a3e8,2024-05-01T19:50:25.633000 CVE-2024-27057,0,0,c547d10d93717b1185795df41c7fbb63e300d75cd64ee01d7cffbe3a6007a3e8,2024-05-01T19:50:25.633000
@ -249008,7 +249010,7 @@ CVE-2024-2707,0,0,85c775d4cadcd703355fe22885699e6d3b33832ba1bf4a0f012eb92a76bd36
CVE-2024-27070,0,0,9019d5d00e2e557d6bbee725ec44c36e787b905ee46e216a705cd23f704a5b7b,2024-05-01T19:50:25.633000 CVE-2024-27070,0,0,9019d5d00e2e557d6bbee725ec44c36e787b905ee46e216a705cd23f704a5b7b,2024-05-01T19:50:25.633000
CVE-2024-27071,0,0,4eba7924eed5d4a7c52b628064790bf6088c813be987aa811365f6d878e7223a,2024-05-01T19:50:25.633000 CVE-2024-27071,0,0,4eba7924eed5d4a7c52b628064790bf6088c813be987aa811365f6d878e7223a,2024-05-01T19:50:25.633000
CVE-2024-27072,0,0,21e910cf50ea565953242c80b6cde258546166e0d36d0f32695af1f87df3652c,2024-10-31T17:35:03.127000 CVE-2024-27072,0,0,21e910cf50ea565953242c80b6cde258546166e0d36d0f32695af1f87df3652c,2024-10-31T17:35:03.127000
CVE-2024-27073,0,1,e46a75cf5fc003f1d71f465a90896b6249ef76a9bad5eda1a1b988838d2a6979,2024-11-06T19:35:15.903000 CVE-2024-27073,0,0,e46a75cf5fc003f1d71f465a90896b6249ef76a9bad5eda1a1b988838d2a6979,2024-11-06T19:35:15.903000
CVE-2024-27074,0,0,1eb80e2232cf51208db1f3cef68d3f425247e597c202b41d3d631a42906e1aca,2024-11-05T10:16:27.387000 CVE-2024-27074,0,0,1eb80e2232cf51208db1f3cef68d3f425247e597c202b41d3d631a42906e1aca,2024-11-05T10:16:27.387000
CVE-2024-27075,0,0,b7b88762306d0403ff5ef3850347356e2cd48c2fda797c5c18c89bc098824519,2024-11-05T10:16:27.590000 CVE-2024-27075,0,0,b7b88762306d0403ff5ef3850347356e2cd48c2fda797c5c18c89bc098824519,2024-11-05T10:16:27.590000
CVE-2024-27076,0,0,27005424f15ce206aef745406456863fc53e2307c06546ea31f3e5740f638709,2024-11-05T10:16:27.753000 CVE-2024-27076,0,0,27005424f15ce206aef745406456863fc53e2307c06546ea31f3e5740f638709,2024-11-05T10:16:27.753000
@ -249571,7 +249573,7 @@ CVE-2024-27812,0,0,e7c3223e43baf8d7f28688930e2d8c8938ef379a12a8d3feb5b2d21387591
CVE-2024-27813,0,0,7509894567bacd8024514a5dcee7ac821e790e4f4fe9721e1c69cc172a7632d5,2024-07-03T01:50:56.220000 CVE-2024-27813,0,0,7509894567bacd8024514a5dcee7ac821e790e4f4fe9721e1c69cc172a7632d5,2024-07-03T01:50:56.220000
CVE-2024-27814,0,0,4d984815b410e205b72405c2d467ac188e0b951fcaa72bcf867e3a4e9a308816,2024-07-03T01:50:56.430000 CVE-2024-27814,0,0,4d984815b410e205b72405c2d467ac188e0b951fcaa72bcf867e3a4e9a308816,2024-07-03T01:50:56.430000
CVE-2024-27815,0,0,d4d929e969df5e6d126561402877d5f150bcfd9ba0154fd52fd603f8c3293f47,2024-07-03T01:50:56.640000 CVE-2024-27815,0,0,d4d929e969df5e6d126561402877d5f150bcfd9ba0154fd52fd603f8c3293f47,2024-07-03T01:50:56.640000
CVE-2024-27816,0,1,4ad7196d1d7777ac482b799fc1cf864678982df9348a3a55f6e8a16124bb5751,2024-11-06T19:35:16.133000 CVE-2024-27816,0,0,4ad7196d1d7777ac482b799fc1cf864678982df9348a3a55f6e8a16124bb5751,2024-11-06T19:35:16.133000
CVE-2024-27817,0,0,a6ab5e337d8094f63b0da74ff4d2361a68df33c6031350054ba5dcf0e38bfd15,2024-07-03T01:50:57.557000 CVE-2024-27817,0,0,a6ab5e337d8094f63b0da74ff4d2361a68df33c6031350054ba5dcf0e38bfd15,2024-07-03T01:50:57.557000
CVE-2024-27818,0,0,195e34841c67a6c51f404c6aafece2a89e87db6332c4d32e1ca778a22a5fa453,2024-06-11T08:15:49.700000 CVE-2024-27818,0,0,195e34841c67a6c51f404c6aafece2a89e87db6332c4d32e1ca778a22a5fa453,2024-06-11T08:15:49.700000
CVE-2024-27819,0,0,b01d18af8106a4eb630a10d613bb8fd3a0b60e4d3d78300e68d51ac0725c6ff4,2024-07-03T01:50:58.300000 CVE-2024-27819,0,0,b01d18af8106a4eb630a10d613bb8fd3a0b60e4d3d78300e68d51ac0725c6ff4,2024-07-03T01:50:58.300000
@ -250217,7 +250219,7 @@ CVE-2024-28804,0,0,f7e3d6c3e14215e831a96b931ea15f5f72cb16cc7bfabd09d8b34530beca5
CVE-2024-28805,0,0,cb27f95e8662e6f56b138761747243a7826d2330470c48886448473bebd0bb3c,2024-10-25T18:35:04.053000 CVE-2024-28805,0,0,cb27f95e8662e6f56b138761747243a7826d2330470c48886448473bebd0bb3c,2024-10-25T18:35:04.053000
CVE-2024-28806,0,0,b0870c92c612bc52e55ac5da958c74e320d7e205346206836a7ae598363f9d27,2024-08-05T11:35:01.757000 CVE-2024-28806,0,0,b0870c92c612bc52e55ac5da958c74e320d7e205346206836a7ae598363f9d27,2024-08-05T11:35:01.757000
CVE-2024-28807,0,0,5a4650d9d919dd00d60ada425df7221ee51ecb76af44fdd9eca355c706e3553b,2024-10-04T13:51:25.567000 CVE-2024-28807,0,0,5a4650d9d919dd00d60ada425df7221ee51ecb76af44fdd9eca355c706e3553b,2024-10-04T13:51:25.567000
CVE-2024-28808,0,1,6fc8e572569d4866c6fa9429b9d27d19969ab5023429b014e564e428389657b1,2024-11-06T20:35:12.717000 CVE-2024-28808,0,0,6fc8e572569d4866c6fa9429b9d27d19969ab5023429b014e564e428389657b1,2024-11-06T20:35:12.717000
CVE-2024-28809,0,0,32a8202bed4dd3b9abf5e0e2fc819e903ef58b53b2fb296a3ab4e72cb018ad65,2024-10-04T13:51:25.567000 CVE-2024-28809,0,0,32a8202bed4dd3b9abf5e0e2fc819e903ef58b53b2fb296a3ab4e72cb018ad65,2024-10-04T13:51:25.567000
CVE-2024-2881,0,0,65fc535be8a815e92053ae1d797e8977602b99048c471a2a98041135b70a0df9,2024-09-04T14:27:24.057000 CVE-2024-2881,0,0,65fc535be8a815e92053ae1d797e8977602b99048c471a2a98041135b70a0df9,2024-09-04T14:27:24.057000
CVE-2024-28810,0,0,3739176212869d56c3a3e998caee9cc2562b0d9aff07961502c94d248b44c109,2024-10-04T13:51:25.567000 CVE-2024-28810,0,0,3739176212869d56c3a3e998caee9cc2562b0d9aff07961502c94d248b44c109,2024-10-04T13:51:25.567000
@ -250288,7 +250290,7 @@ CVE-2024-28890,0,0,75d08f12fbd468307e29dd7cbe4c7c3d5acf11ae18647e40fe18f61a37a2b
CVE-2024-28891,0,0,31c9d1ebf9f51d96b38fd3616c071c476c1bf3bdfafbca895cdab316c5bcd3e3,2024-03-22T12:45:36.130000 CVE-2024-28891,0,0,31c9d1ebf9f51d96b38fd3616c071c476c1bf3bdfafbca895cdab316c5bcd3e3,2024-03-22T12:45:36.130000
CVE-2024-28893,0,0,6bb6e7d4eb5ffccbd865059808a0bb14806c115db17b0c7b58ceaf6722125e36,2024-07-03T01:51:55.153000 CVE-2024-28893,0,0,6bb6e7d4eb5ffccbd865059808a0bb14806c115db17b0c7b58ceaf6722125e36,2024-07-03T01:51:55.153000
CVE-2024-28894,0,0,52f5c99a2393e8296645b919b77395855b2fbf6ddfb3ce5fad5f6c31f90cae17,2024-08-01T13:49:21.557000 CVE-2024-28894,0,0,52f5c99a2393e8296645b919b77395855b2fbf6ddfb3ce5fad5f6c31f90cae17,2024-08-01T13:49:21.557000
CVE-2024-28895,0,0,7f60c42026f8919d7327f07078b6071429a47272f57bf3ec7d964752af390988,2024-04-01T01:33:21.910000 CVE-2024-28895,0,1,cc9ec60ced6c4f6144882d61563736eb0ac7e1a82255f1711a9c93674e3ffa46,2024-11-06T21:35:05.843000
CVE-2024-28896,0,0,82c8e7dd995d4781c98f0d7c761e7b443ea0ceb397f6b58ed2e6c96c2843e057,2024-04-10T13:24:00.070000 CVE-2024-28896,0,0,82c8e7dd995d4781c98f0d7c761e7b443ea0ceb397f6b58ed2e6c96c2843e057,2024-04-10T13:24:00.070000
CVE-2024-28897,0,0,f9f596567c4f5a1d1ef0ea2267dd4bdd40c07a7d3f8bde3d914da43c8724226d,2024-04-10T13:24:00.070000 CVE-2024-28897,0,0,f9f596567c4f5a1d1ef0ea2267dd4bdd40c07a7d3f8bde3d914da43c8724226d,2024-04-10T13:24:00.070000
CVE-2024-28898,0,0,e62fdbb651dac3d1f5bd9c36f1fb9b36d2bc8afc331691f95d20f220846dce98,2024-04-10T13:24:00.070000 CVE-2024-28898,0,0,e62fdbb651dac3d1f5bd9c36f1fb9b36d2bc8afc331691f95d20f220846dce98,2024-04-10T13:24:00.070000
@ -250781,7 +250783,7 @@ CVE-2024-29739,0,0,e1057fb9115257c9cc112890add5aab29e2addabc474164aa5dc49dc015af
CVE-2024-2974,0,0,f10703d4490e9d3ed63c6b4abd6c9bf87d6d9b2c11e56d030e360944602d03aa,2024-04-10T13:23:38.787000 CVE-2024-2974,0,0,f10703d4490e9d3ed63c6b4abd6c9bf87d6d9b2c11e56d030e360944602d03aa,2024-04-10T13:23:38.787000
CVE-2024-29740,0,0,b8da55b65cd03c8f279340fc383178e4918b6ddc001e65f509694a717508d4d0,2024-07-03T01:52:30.657000 CVE-2024-29740,0,0,b8da55b65cd03c8f279340fc383178e4918b6ddc001e65f509694a717508d4d0,2024-07-03T01:52:30.657000
CVE-2024-29741,0,0,a475db5d288fe89871088d062fc43a43c29a2a7a1fc8050faa6de7801796db92,2024-04-08T18:49:25.863000 CVE-2024-29741,0,0,a475db5d288fe89871088d062fc43a43c29a2a7a1fc8050faa6de7801796db92,2024-04-08T18:49:25.863000
CVE-2024-29742,0,1,3670333ea9fbb45ca159956c69b3ce18ac4d0f3cf08b138c36c7c46652b7f763,2024-11-06T20:35:13.483000 CVE-2024-29742,0,0,3670333ea9fbb45ca159956c69b3ce18ac4d0f3cf08b138c36c7c46652b7f763,2024-11-06T20:35:13.483000
CVE-2024-29743,0,0,84c45acac68285953d0f847d89629f6df4afe2ae0557e844a739860834244671,2024-04-08T18:49:25.863000 CVE-2024-29743,0,0,84c45acac68285953d0f847d89629f6df4afe2ae0557e844a739860834244671,2024-04-08T18:49:25.863000
CVE-2024-29744,0,0,261c7417210a4d10590c39459d063b6a3382c5fabd76d0ef2ba580fc9b59de43,2024-04-08T18:49:25.863000 CVE-2024-29744,0,0,261c7417210a4d10590c39459d063b6a3382c5fabd76d0ef2ba580fc9b59de43,2024-04-08T18:49:25.863000
CVE-2024-29745,0,0,40250cabd067f394dda6fb03fe08d83fd93611782b23244c4a5077110391f2e7,2024-08-14T16:59:22.427000 CVE-2024-29745,0,0,40250cabd067f394dda6fb03fe08d83fd93611782b23244c4a5077110391f2e7,2024-08-14T16:59:22.427000
@ -250993,7 +250995,7 @@ CVE-2024-29944,0,0,0c36a6d1c7372e4eb368749381c53b8250c9da970d136cfa0d6ab703ac139
CVE-2024-29945,0,0,545d8d8a5d454680f75ae96bc2bf76a65720f53d27f04c08caf122c1f6350f1e,2024-04-10T01:15:18.693000 CVE-2024-29945,0,0,545d8d8a5d454680f75ae96bc2bf76a65720f53d27f04c08caf122c1f6350f1e,2024-04-10T01:15:18.693000
CVE-2024-29946,0,0,fe7659ecbb6ae16d4fdd53bc892e5c7f96cebf8e48eee47ced0bee27647d82e8,2024-10-15T18:35:13.400000 CVE-2024-29946,0,0,fe7659ecbb6ae16d4fdd53bc892e5c7f96cebf8e48eee47ced0bee27647d82e8,2024-10-15T18:35:13.400000
CVE-2024-29947,0,0,8ad8469acdce0b9e6eead1629c69da154792700d4004eaaf5144ca5b844c0d04,2024-10-31T15:35:31.567000 CVE-2024-29947,0,0,8ad8469acdce0b9e6eead1629c69da154792700d4004eaaf5144ca5b844c0d04,2024-10-31T15:35:31.567000
CVE-2024-29948,0,0,7ed27d99c23307d6fd7f79bc81ee07d6524ce20c9d05b450c959d1b570daca5b,2024-04-02T12:50:42.233000 CVE-2024-29948,0,1,e90b613e60d3fcc3b6383faa88cb646693ff5f746ac5f86e3ba2e922d0499f32,2024-11-06T21:35:06.680000
CVE-2024-29949,0,0,8f69a1b2712eb97f7e6695f2c2705447de624d6bcea7462b789eaee89a32183e,2024-08-27T15:35:13.560000 CVE-2024-29949,0,0,8f69a1b2712eb97f7e6695f2c2705447de624d6bcea7462b789eaee89a32183e,2024-08-27T15:35:13.560000
CVE-2024-2995,0,0,5c930568d7253585b775f810f84df45baf66709200c70b2d2468f14a6758b594,2024-05-17T02:38:41.600000 CVE-2024-2995,0,0,5c930568d7253585b775f810f84df45baf66709200c70b2d2468f14a6758b594,2024-05-17T02:38:41.600000
CVE-2024-29950,0,0,9160d1bdf3252c379c3a5b7b30fcb4dec34616c1033f3f635941b6a0b940cac7,2024-04-17T20:08:21.887000 CVE-2024-29950,0,0,9160d1bdf3252c379c3a5b7b30fcb4dec34616c1033f3f635941b6a0b940cac7,2024-04-17T20:08:21.887000
@ -251173,7 +251175,7 @@ CVE-2024-30118,0,0,a600cbc3312207feafbf7858618a61f6dd2c38296d39ec303171804559f68
CVE-2024-30119,0,0,4baed8c508a821c818525782701105249753896feab644ba3efffba269f578b9,2024-07-03T01:53:51.120000 CVE-2024-30119,0,0,4baed8c508a821c818525782701105249753896feab644ba3efffba269f578b9,2024-07-03T01:53:51.120000
CVE-2024-3012,0,0,ae30314159430e25e9f2b09f2e0a440cd8bb99b7d72b62fa4eb73b4affe20188,2024-05-17T02:39:40.620000 CVE-2024-3012,0,0,ae30314159430e25e9f2b09f2e0a440cd8bb99b7d72b62fa4eb73b4affe20188,2024-05-17T02:39:40.620000
CVE-2024-30120,0,0,f704816cf356d01bbdb53903a0b14bef34a589a7c9185030672ca3a1f14e4a1c,2024-06-17T12:42:04.623000 CVE-2024-30120,0,0,f704816cf356d01bbdb53903a0b14bef34a589a7c9185030672ca3a1f14e4a1c,2024-06-17T12:42:04.623000
CVE-2024-30122,0,0,b78e8f60e4d0df5148447073604013d9d8b1860e36c446b761d204643c69cb09,2024-10-25T12:56:36.827000 CVE-2024-30122,0,1,9f485dd65437a7051ea4a1c20434d3eb51730baba0c509d8f2633bcd688cd79c,2024-11-06T22:33:46.797000
CVE-2024-30124,0,0,40a4254bc1bc6d9de977773d0f614d8309c4c262777ba96571bd84dac137cd34,2024-10-29T15:35:22.230000 CVE-2024-30124,0,0,40a4254bc1bc6d9de977773d0f614d8309c4c262777ba96571bd84dac137cd34,2024-10-29T15:35:22.230000
CVE-2024-30125,0,0,1e8984bc19e1a45cd2a6c4ac0b43f227ca7f3a8dcb96ab9c16c6ada82e4faa52,2024-07-19T13:01:44.567000 CVE-2024-30125,0,0,1e8984bc19e1a45cd2a6c4ac0b43f227ca7f3a8dcb96ab9c16c6ada82e4faa52,2024-07-19T13:01:44.567000
CVE-2024-30126,0,0,6fc62f044a7f0651037fa78da0350df1d81591508f3d5a2909dd34802958ba70,2024-10-30T17:35:02.160000 CVE-2024-30126,0,0,6fc62f044a7f0651037fa78da0350df1d81591508f3d5a2909dd34802958ba70,2024-10-30T17:35:02.160000
@ -252465,7 +252467,7 @@ CVE-2024-31874,0,0,2aaf0dfaa6414e1f138855d0f6d75787313d073eca635397ca103ff7f6449
CVE-2024-31878,0,0,c6557222267c2e9c166ed275e7cc9327cfea0693e0a8976b187deb7865aacef5,2024-06-11T18:23:27.153000 CVE-2024-31878,0,0,c6557222267c2e9c166ed275e7cc9327cfea0693e0a8976b187deb7865aacef5,2024-06-11T18:23:27.153000
CVE-2024-31879,0,0,3d520028d5f0055139f730dd4a6eb2d11b7ab38a082798764c43108749c5b618,2024-05-20T13:00:34.807000 CVE-2024-31879,0,0,3d520028d5f0055139f730dd4a6eb2d11b7ab38a082798764c43108749c5b618,2024-05-20T13:00:34.807000
CVE-2024-3188,0,0,0566f9bb8e826930c137ba20908e573874a3f34d7900cbdeff699f1e3434f595,2024-07-08T14:19:01.160000 CVE-2024-3188,0,0,0566f9bb8e826930c137ba20908e573874a3f34d7900cbdeff699f1e3434f595,2024-07-08T14:19:01.160000
CVE-2024-31880,0,1,be8757c255692a002ba856efab44e4c34f4b168589ca30c0f60b6ad09580b3cc,2024-11-06T20:39:55.200000 CVE-2024-31880,0,0,be8757c255692a002ba856efab44e4c34f4b168589ca30c0f60b6ad09580b3cc,2024-11-06T20:39:55.200000
CVE-2024-31881,0,0,b3692d17c2d4f662273dec610556097ee0b8856656ac8f4835c5e840eb8a6228,2024-08-07T16:59:15.627000 CVE-2024-31881,0,0,b3692d17c2d4f662273dec610556097ee0b8856656ac8f4835c5e840eb8a6228,2024-08-07T16:59:15.627000
CVE-2024-31882,0,0,2166c1d8e88429778073b60eb2a31c41e2b55293434c096888febf101419ae12,2024-09-21T10:15:05.403000 CVE-2024-31882,0,0,2166c1d8e88429778073b60eb2a31c41e2b55293434c096888febf101419ae12,2024-09-21T10:15:05.403000
CVE-2024-31883,0,0,c4a2241ac7ebf5ea1afff59f8bf762360ac7a99942ee729cf3d03ae8864dc6f3,2024-08-02T15:06:08.297000 CVE-2024-31883,0,0,c4a2241ac7ebf5ea1afff59f8bf762360ac7a99942ee729cf3d03ae8864dc6f3,2024-08-02T15:06:08.297000
@ -253546,7 +253548,7 @@ CVE-2024-3333,0,0,07adae09fe4330a280bc63a18371de9b336f80bb47bd9644f6cd6164f000d8
CVE-2024-33331,0,0,9615eb671a81caf99447cfe3f11a47c5fdeef0f060420da831650ede0c65f0d0,2024-04-28T23:15:07.120000 CVE-2024-33331,0,0,9615eb671a81caf99447cfe3f11a47c5fdeef0f060420da831650ede0c65f0d0,2024-04-28T23:15:07.120000
CVE-2024-33332,0,0,d4616ec3d8fa6c2d14a3b8584e4c2b0a6bdaf97d03584623852ed717f43b90a3,2024-07-03T01:57:52.560000 CVE-2024-33332,0,0,d4616ec3d8fa6c2d14a3b8584e4c2b0a6bdaf97d03584623852ed717f43b90a3,2024-07-03T01:57:52.560000
CVE-2024-33335,0,0,a6cf66b4ab082555dd66294d501cc06d5dc2570dbd2ca86fdaeca4a73e9bd728,2024-07-03T01:57:53.270000 CVE-2024-33335,0,0,a6cf66b4ab082555dd66294d501cc06d5dc2570dbd2ca86fdaeca4a73e9bd728,2024-07-03T01:57:53.270000
CVE-2024-33338,0,0,12ed0f94ef6bec704d8914890ae777ce00e44c5deae0f7e3194a77889af4a88d,2024-04-30T13:11:16.690000 CVE-2024-33338,0,1,dc64e17746d1abab607747c6889c78b7b366c3abba84bde17473f7cc02765f3e,2024-11-06T22:35:06.803000
CVE-2024-33339,0,0,1bca262a290e7823541ac5c56ca607cb8f0a9af8877c53f0a0d3e60cf0f91403,2024-04-29T05:15:06.340000 CVE-2024-33339,0,0,1bca262a290e7823541ac5c56ca607cb8f0a9af8877c53f0a0d3e60cf0f91403,2024-04-29T05:15:06.340000
CVE-2024-33342,0,0,060ace50da8b3f05ba7f67da31443071368333e101cc3fb61992e65c8481798b,2024-07-03T01:57:54.047000 CVE-2024-33342,0,0,060ace50da8b3f05ba7f67da31443071368333e101cc3fb61992e65c8481798b,2024-07-03T01:57:54.047000
CVE-2024-33343,0,0,0403ccc83281b5ef39242fa2607cb174a7fbc97f1fc5833b8133765daf81f98a,2024-07-03T01:57:54.823000 CVE-2024-33343,0,0,0403ccc83281b5ef39242fa2607cb174a7fbc97f1fc5833b8133765daf81f98a,2024-07-03T01:57:54.823000
@ -254715,10 +254717,10 @@ CVE-2024-34854,0,0,6f71aaf23a02a63a600f0bcc65e36559492677e420248555c46cf3409591d
CVE-2024-3486,0,0,62a4db44c896a78c795e29b3f9a0c80ac2a4afae964bf16e58e73f8540a6d627,2024-05-15T18:35:11.453000 CVE-2024-3486,0,0,62a4db44c896a78c795e29b3f9a0c80ac2a4afae964bf16e58e73f8540a6d627,2024-05-15T18:35:11.453000
CVE-2024-3487,0,0,4ff2b905105ca048d90a2e33e25fd9b26128f3e6906b07d6299f870ad63ad55f,2024-05-15T18:35:11.453000 CVE-2024-3487,0,0,4ff2b905105ca048d90a2e33e25fd9b26128f3e6906b07d6299f870ad63ad55f,2024-05-15T18:35:11.453000
CVE-2024-3488,0,0,61e15575c22ff5a767d1be731e2c78e99681dc33e8575bc1a8940edf28193df9,2024-05-15T18:35:11.453000 CVE-2024-3488,0,0,61e15575c22ff5a767d1be731e2c78e99681dc33e8575bc1a8940edf28193df9,2024-05-15T18:35:11.453000
CVE-2024-34882,0,1,87af8750e4cb2492a1db05c6a474cbcbe5be6845ce5c5a5a7c082cfe43c24233,2024-11-06T19:28:48.523000 CVE-2024-34882,0,0,87af8750e4cb2492a1db05c6a474cbcbe5be6845ce5c5a5a7c082cfe43c24233,2024-11-06T19:28:48.523000
CVE-2024-34883,0,1,722d63ecfd95cb7389789f2d22dce1739cb8a5a04275a6b5ae60854c8f1c6842,2024-11-06T19:28:34.900000 CVE-2024-34883,0,0,722d63ecfd95cb7389789f2d22dce1739cb8a5a04275a6b5ae60854c8f1c6842,2024-11-06T19:28:34.900000
CVE-2024-34885,0,0,c31fa281dfa61082a4cb2f1ba2ae0a4d2fc44e82a0f4b8396c582b05683b39d0,2024-11-05T17:35:15.887000 CVE-2024-34885,0,0,c31fa281dfa61082a4cb2f1ba2ae0a4d2fc44e82a0f4b8396c582b05683b39d0,2024-11-05T17:35:15.887000
CVE-2024-34887,0,1,f7d4e5d57e7e6933735283b4e369818932c8268719be24dd494c0cc41f5513e7,2024-11-06T19:28:15.613000 CVE-2024-34887,0,0,f7d4e5d57e7e6933735283b4e369818932c8268719be24dd494c0cc41f5513e7,2024-11-06T19:28:15.613000
CVE-2024-3489,0,0,ea9bd95a767998b3f2d98747bee17b3d4435734727140c279148a23c9826811b,2024-05-02T18:00:37.360000 CVE-2024-3489,0,0,ea9bd95a767998b3f2d98747bee17b3d4435734727140c279148a23c9826811b,2024-05-02T18:00:37.360000
CVE-2024-34891,0,0,111963e19005c729fbfb50630519cf497707d87e3cea6358972fd367cefea299,2024-11-05T17:35:17.710000 CVE-2024-34891,0,0,111963e19005c729fbfb50630519cf497707d87e3cea6358972fd367cefea299,2024-11-05T17:35:17.710000
CVE-2024-34899,0,0,8587795bcb80eaac03ccdd83ddcd275c805b44aa37227142776a20079d894d2e,2024-05-14T16:12:23.490000 CVE-2024-34899,0,0,8587795bcb80eaac03ccdd83ddcd275c805b44aa37227142776a20079d894d2e,2024-05-14T16:12:23.490000
@ -255329,7 +255331,7 @@ CVE-2024-35831,0,0,e1fc7f0c23288b900631cc5188ff473f5fa3fdb4e972cc7bfb87b54902c97
CVE-2024-35832,0,0,16e51c73c8492f6c41ac59c1b69f8a852bd6d4b4a851405fa3ce91979c7ac289,2024-05-17T18:35:35.070000 CVE-2024-35832,0,0,16e51c73c8492f6c41ac59c1b69f8a852bd6d4b4a851405fa3ce91979c7ac289,2024-05-17T18:35:35.070000
CVE-2024-35833,0,0,844b1146e92e53029cbdbc55527e41e7896607bf9d9f2d333a13fe6ce9ec3a8c,2024-11-05T10:16:42.453000 CVE-2024-35833,0,0,844b1146e92e53029cbdbc55527e41e7896607bf9d9f2d333a13fe6ce9ec3a8c,2024-11-05T10:16:42.453000
CVE-2024-35834,0,0,5790f34b9247e53213fb9b46635ec2095a0128f0902ae39f44312cfee4914f39,2024-05-17T18:35:35.070000 CVE-2024-35834,0,0,5790f34b9247e53213fb9b46635ec2095a0128f0902ae39f44312cfee4914f39,2024-05-17T18:35:35.070000
CVE-2024-35835,0,0,a276855569c1738142e0a9a7f5c96bc15a43a0942b6ac67b52a0d390795b7723,2024-11-05T10:16:42.810000 CVE-2024-35835,0,1,ed8b4cf6c12992561ec5c36280ef97df65b951d69180a908fa49c8fe9773371a,2024-11-06T21:35:07.630000
CVE-2024-35836,0,0,9b23a77395582da383d04f18fcf78c45edf3e53bc59c70e097e42d6ca3f4fb8e,2024-05-17T18:35:35.070000 CVE-2024-35836,0,0,9b23a77395582da383d04f18fcf78c45edf3e53bc59c70e097e42d6ca3f4fb8e,2024-05-17T18:35:35.070000
CVE-2024-35837,0,0,f29bf26182906cdda28aa14c299eef8b8b82348c3b88e46b3fbb87c2da0adaa9,2024-11-05T10:16:42.947000 CVE-2024-35837,0,0,f29bf26182906cdda28aa14c299eef8b8b82348c3b88e46b3fbb87c2da0adaa9,2024-11-05T10:16:42.947000
CVE-2024-35838,0,0,0eb47f23eeab52dc3f477b4fcefe531f1dd8b9865cefb266d57aa7fa08848ac2,2024-05-17T18:35:35.070000 CVE-2024-35838,0,0,0eb47f23eeab52dc3f477b4fcefe531f1dd8b9865cefb266d57aa7fa08848ac2,2024-05-17T18:35:35.070000
@ -256055,7 +256057,7 @@ CVE-2024-3687,0,0,0790df61296b0929bb9b469121387dd5b7cd2b562eeab594414896ab3fb872
CVE-2024-36877,0,0,b5940056cb3357be0fc404faf9d20c26624de04b24c3b32151a8171b19c64e1f,2024-10-24T20:35:06.353000 CVE-2024-36877,0,0,b5940056cb3357be0fc404faf9d20c26624de04b24c3b32151a8171b19c64e1f,2024-10-24T20:35:06.353000
CVE-2024-3688,0,0,fd7741416f20e86cc9ace0c3d1680a96020807dd7ba69d4b2d23070e23e95bee,2024-06-04T19:20:23.107000 CVE-2024-3688,0,0,fd7741416f20e86cc9ace0c3d1680a96020807dd7ba69d4b2d23070e23e95bee,2024-06-04T19:20:23.107000
CVE-2024-36880,0,0,2b0302be5dbda2a151ebafe5b0e4ed1edd1c138757440601b5f7ee782f06f5e4,2024-05-30T18:18:58.870000 CVE-2024-36880,0,0,2b0302be5dbda2a151ebafe5b0e4ed1edd1c138757440601b5f7ee782f06f5e4,2024-05-30T18:18:58.870000
CVE-2024-36881,0,0,462fdd40c8930daf000297e318f0ca45e554b77fd5b7375bf9db7855ebe0f739,2024-05-30T18:18:58.870000 CVE-2024-36881,0,1,6142f77b57b8fb6af09e3dfaa3e3ba0665300e19134a7939c625c7275226d261,2024-11-06T22:35:07.757000
CVE-2024-36882,0,0,c4e89f47d00b2e43c4a551b216b884b27dd65ec4bd9b8e9c9ad6f421591d687e,2024-05-30T18:18:58.870000 CVE-2024-36882,0,0,c4e89f47d00b2e43c4a551b216b884b27dd65ec4bd9b8e9c9ad6f421591d687e,2024-05-30T18:18:58.870000
CVE-2024-36883,0,0,b7145948b44d2808530c599d92df6ba80fb8f0f74fbae1c4590915a25c35142a,2024-11-05T10:17:08.927000 CVE-2024-36883,0,0,b7145948b44d2808530c599d92df6ba80fb8f0f74fbae1c4590915a25c35142a,2024-11-05T10:17:08.927000
CVE-2024-36884,0,0,99fb9b488ff5facb16fca9a70e4acded4f568a909f2397c5349d3312ba4256b7,2024-06-10T19:21:50.973000 CVE-2024-36884,0,0,99fb9b488ff5facb16fca9a70e4acded4f568a909f2397c5349d3312ba4256b7,2024-06-10T19:21:50.973000
@ -257899,7 +257901,7 @@ CVE-2024-39332,0,0,c45d3a16d900c3a32f364ec197299d9fa083202fb226adfaa80ac6e38be04
CVE-2024-39334,0,0,94cae5ba65ec50bed6d17b2b54650000947aeee42b8249838d1ebdc24642a191,2024-06-24T12:57:36.513000 CVE-2024-39334,0,0,94cae5ba65ec50bed6d17b2b54650000947aeee42b8249838d1ebdc24642a191,2024-06-24T12:57:36.513000
CVE-2024-39337,0,0,ae96e6e5658ac679eff4c9acfa518814cd5ee8874dd941939a565173aee28094,2024-06-24T12:57:36.513000 CVE-2024-39337,0,0,ae96e6e5658ac679eff4c9acfa518814cd5ee8874dd941939a565173aee28094,2024-06-24T12:57:36.513000
CVE-2024-39338,0,0,224e3a3c09358e014697d42ae118e958b11cd83a92fda65e581c38eeeb8c28af,2024-08-23T18:35:36.313000 CVE-2024-39338,0,0,224e3a3c09358e014697d42ae118e958b11cd83a92fda65e581c38eeeb8c28af,2024-08-23T18:35:36.313000
CVE-2024-39339,0,1,8276759a0218cbee90798944cb0970f3daa8fd8e677793f3d23bb043b043c911,2024-11-06T20:35:19.170000 CVE-2024-39339,0,0,8276759a0218cbee90798944cb0970f3daa8fd8e677793f3d23bb043b043c911,2024-11-06T20:35:19.170000
CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453cac,2024-07-22T13:00:53.287000 CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453cac,2024-07-22T13:00:53.287000
CVE-2024-39340,0,0,fc621b442d86eea0a2e72227f2b14f23e2a67834630b902f47135788b8db4fd4,2024-09-23T15:15:13.907000 CVE-2024-39340,0,0,fc621b442d86eea0a2e72227f2b14f23e2a67834630b902f47135788b8db4fd4,2024-09-23T15:15:13.907000
CVE-2024-39341,0,0,7c359c6b4015613fc52267fcd7e5d9646d4cfcd7e7964fd0c4b36316116d1347,2024-11-04T17:35:19.370000 CVE-2024-39341,0,0,7c359c6b4015613fc52267fcd7e5d9646d4cfcd7e7964fd0c4b36316116d1347,2024-11-04T17:35:19.370000
@ -259567,7 +259569,7 @@ CVE-2024-4201,0,0,ee0badf63a3e9c653031fb01c45e3bab9160ffb251dc5a875d128957347bb0
CVE-2024-42010,0,0,f347d4c1e17b119f6d9851ca0a7b1b017e286c890135bf10b6afdc7ab31c6734,2024-08-12T14:15:07.370000 CVE-2024-42010,0,0,f347d4c1e17b119f6d9851ca0a7b1b017e286c890135bf10b6afdc7ab31c6734,2024-08-12T14:15:07.370000
CVE-2024-42011,0,0,780f257b76975d0fa98da03e1cf55c93a899ebb5f320ce83ce248dea2ed98368,2024-10-30T18:35:10.283000 CVE-2024-42011,0,0,780f257b76975d0fa98da03e1cf55c93a899ebb5f320ce83ce248dea2ed98368,2024-10-30T18:35:10.283000
CVE-2024-42017,0,0,88bb092060ad69b0ffe1434d2d5d47cfc3d35d9b74da347db32bafd31660675d,2024-10-29T15:35:30.713000 CVE-2024-42017,0,0,88bb092060ad69b0ffe1434d2d5d47cfc3d35d9b74da347db32bafd31660675d,2024-10-29T15:35:30.713000
CVE-2024-42018,0,1,d36c2d25618197055a9fa3c5f3f119418108bcdef04b170d040ef1fa8d21ed3f,2024-11-06T20:35:23.377000 CVE-2024-42018,0,0,d36c2d25618197055a9fa3c5f3f119418108bcdef04b170d040ef1fa8d21ed3f,2024-11-06T20:35:23.377000
CVE-2024-42019,0,0,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000 CVE-2024-42019,0,0,00604c99ddf544da3b62d7a84887b798a81cb0c15ced1dcc5fdbfa92f5dd8022,2024-09-09T17:35:05.247000
CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000 CVE-2024-4202,0,0,614a40ef1052d861451b397b9533024f5e9aecccff7f20e945fab06926a9f188,2024-05-15T18:35:11.453000
CVE-2024-42020,0,0,997daa67acd86090eb264416d8bd0f016260f05083a5b2dc041d5c995b94ddfa,2024-10-27T15:35:08.650000 CVE-2024-42020,0,0,997daa67acd86090eb264416d8bd0f016260f05083a5b2dc041d5c995b94ddfa,2024-10-27T15:35:08.650000
@ -261685,7 +261687,7 @@ CVE-2024-45180,0,0,08348c7b1382a66372a71879585bc4b470bbbe0e7bc2a628091dcf790778c
CVE-2024-45181,0,0,c1b3f50892c5ad2964a42f2f7c4bb1e591fc78d268d80e02244df3b7c3d3d502,2024-09-18T20:26:26.873000 CVE-2024-45181,0,0,c1b3f50892c5ad2964a42f2f7c4bb1e591fc78d268d80e02244df3b7c3d3d502,2024-09-18T20:26:26.873000
CVE-2024-45182,0,0,e32901d25899173bbdbcd4da8de2dfd78b6a7db5248414eaa56acb1cb3e78104,2024-10-29T21:35:21.720000 CVE-2024-45182,0,0,e32901d25899173bbdbcd4da8de2dfd78b6a7db5248414eaa56acb1cb3e78104,2024-10-29T21:35:21.720000
CVE-2024-45184,0,0,4b6497f365552ae587c6f2bb1b9a699bbd0812ac854bb52824296d2cb32eb74f,2024-11-06T17:35:34.223000 CVE-2024-45184,0,0,4b6497f365552ae587c6f2bb1b9a699bbd0812ac854bb52824296d2cb32eb74f,2024-11-06T17:35:34.223000
CVE-2024-45185,0,1,72bf9a166165415f673b127935e481d1ba969f414b40f9d8d7aa157b9fd36cb3,2024-11-06T19:35:16.420000 CVE-2024-45185,0,0,72bf9a166165415f673b127935e481d1ba969f414b40f9d8d7aa157b9fd36cb3,2024-11-06T19:35:16.420000
CVE-2024-45186,0,0,77c3f8977c3993383fb80894e402f55d5d22584cb41b5e73c31c8d88ae8792cc,2024-10-04T13:50:43.727000 CVE-2024-45186,0,0,77c3f8977c3993383fb80894e402f55d5d22584cb41b5e73c31c8d88ae8792cc,2024-10-04T13:50:43.727000
CVE-2024-45187,0,0,b29c34a9281e147a1f2b33bdd2a8c272cd39081d36dd9d0273787cf191e54024,2024-08-26T12:47:20.187000 CVE-2024-45187,0,0,b29c34a9281e147a1f2b33bdd2a8c272cd39081d36dd9d0273787cf191e54024,2024-08-26T12:47:20.187000
CVE-2024-45188,0,0,b715e0fd98dc9de103c52fc47a055822268226fc14af5f0a01f3a3eab3db9def,2024-08-26T12:47:20.187000 CVE-2024-45188,0,0,b715e0fd98dc9de103c52fc47a055822268226fc14af5f0a01f3a3eab3db9def,2024-08-26T12:47:20.187000
@ -262793,9 +262795,9 @@ CVE-2024-4724,0,0,1e35a8d6fb4d3f11b5f0d2a27ec10d126d5383267b650c161b24f017393ebb
CVE-2024-47240,0,0,831fca78a2032785727b73be16136073448f60052857b8463d392806d75f9e1e,2024-10-22T15:28:55.637000 CVE-2024-47240,0,0,831fca78a2032785727b73be16136073448f60052857b8463d392806d75f9e1e,2024-10-22T15:28:55.637000
CVE-2024-47241,0,0,58a524562b790b246361050e626ab15f35dfe376489ed5527ca425e0e170e59e,2024-10-21T17:10:22.857000 CVE-2024-47241,0,0,58a524562b790b246361050e626ab15f35dfe376489ed5527ca425e0e170e59e,2024-10-21T17:10:22.857000
CVE-2024-4725,0,0,038fe38ac4531e61bf3177f0fb7b7333acb4571c75548945a25c993c1898f93c,2024-06-04T19:20:47.930000 CVE-2024-4725,0,0,038fe38ac4531e61bf3177f0fb7b7333acb4571c75548945a25c993c1898f93c,2024-06-04T19:20:47.930000
CVE-2024-47253,0,0,d147a39553cbd3e23c9dc47e018d2a55806f90f34fa6d522e8f7794675a01185,2024-11-05T16:04:26.053000 CVE-2024-47253,0,1,769fd45217280faed8eb9286b7d777459d03159dafc71924f67681fa771cd1e3,2024-11-06T22:23:29.663000
CVE-2024-47254,0,0,b8a0db85c06b44009d222028a5b119afe28ca7a95e927816b7a664426e22a4bf,2024-11-05T16:04:26.053000 CVE-2024-47254,0,1,7b2a0a7f61d863879927876e26f097e0efe10412130b78739d5752f40d5d539d,2024-11-06T22:22:01.623000
CVE-2024-47255,0,0,58719001e8fb814f33ea66a97cb372fbf5162fabaf050c7685b55017aa4f0c1f,2024-11-05T16:04:26.053000 CVE-2024-47255,0,1,30fe59c20fea93289fc2e58d886b91b21c216954eb831592a00b542847a8017b,2024-11-06T22:23:05.770000
CVE-2024-4726,0,0,270a342f16ba50f480fb87849b5e08fe420ac808bade1fd45455bab1f318f402,2024-06-12T20:15:13.070000 CVE-2024-4726,0,0,270a342f16ba50f480fb87849b5e08fe420ac808bade1fd45455bab1f318f402,2024-06-12T20:15:13.070000
CVE-2024-4727,0,0,944186dc32a6b9f919ede42bcb555e3e922a4782a833eff4d2f1edc6462e7155,2024-05-17T02:40:35.380000 CVE-2024-4727,0,0,944186dc32a6b9f919ede42bcb555e3e922a4782a833eff4d2f1edc6462e7155,2024-05-17T02:40:35.380000
CVE-2024-4728,0,0,4f079b987c555f4e946bc2da0c8ee767b411a220a728ca55c5e58bef9ad4770e,2024-05-17T02:40:35.490000 CVE-2024-4728,0,0,4f079b987c555f4e946bc2da0c8ee767b411a220a728ca55c5e58bef9ad4770e,2024-05-17T02:40:35.490000
@ -263343,12 +263345,12 @@ CVE-2024-48047,0,0,3283398b8a8a75e7e31eaa0ac97fe84164a0704ec4cafc99d8da73b654c08
CVE-2024-48048,0,0,eca0ce0d3598806c22101f7f6a854102f0b0e3e7ffa812170ec79d143adac13e,2024-10-18T12:52:33.507000 CVE-2024-48048,0,0,eca0ce0d3598806c22101f7f6a854102f0b0e3e7ffa812170ec79d143adac13e,2024-10-18T12:52:33.507000
CVE-2024-48049,0,0,ba765e8b87b10659dfbdf97a27a2e9aefb039f46631f1b6725a7dcd9a3bfe5d3,2024-10-23T16:12:12.127000 CVE-2024-48049,0,0,ba765e8b87b10659dfbdf97a27a2e9aefb039f46631f1b6725a7dcd9a3bfe5d3,2024-10-23T16:12:12.127000
CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000 CVE-2024-4805,0,0,a2ff69b1db9dd7c01e8bcdbe532fffb4f68853ea688982e077b1b01529f57c85,2024-06-04T19:20:50.553000
CVE-2024-48050,0,0,646bf231dbaea3acef4518aef21584a610338d98cdda355c55a38e4e6901cac1,2024-11-05T16:04:26.053000 CVE-2024-48050,0,1,efe925e5e80ddffc7c6c5a86aa417aaf629e499121448166a60f26bea5bdb8f9,2024-11-06T21:35:07.863000
CVE-2024-48052,0,1,6787dd59bbf6d5442afa73e6ab5a40a74adf87112b46990cfb17712cbdeff6c1,2024-11-06T20:35:29.830000 CVE-2024-48052,0,0,6787dd59bbf6d5442afa73e6ab5a40a74adf87112b46990cfb17712cbdeff6c1,2024-11-06T20:35:29.830000
CVE-2024-48057,0,0,8efebaa9314d97cebd20f7b67631fd55f5efc8a6a3e4bf2e70e24198b54d0deb,2024-11-05T18:35:10.987000 CVE-2024-48057,0,0,8efebaa9314d97cebd20f7b67631fd55f5efc8a6a3e4bf2e70e24198b54d0deb,2024-11-05T18:35:10.987000
CVE-2024-48059,0,0,f3391fb334843a3fc6d7e517bab31554559de5a31b6bcad37ec348d6020d4ff8,2024-11-05T22:35:11.853000 CVE-2024-48059,0,0,f3391fb334843a3fc6d7e517bab31554559de5a31b6bcad37ec348d6020d4ff8,2024-11-05T22:35:11.853000
CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000 CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e7f,2024-06-04T19:20:50.670000
CVE-2024-48061,0,1,3afb2ef6eba7f21135f7c2c854e268a2fe30714157a06ae965803eb7d12a5161,2024-11-06T20:35:30.633000 CVE-2024-48061,0,0,3afb2ef6eba7f21135f7c2c854e268a2fe30714157a06ae965803eb7d12a5161,2024-11-06T20:35:30.633000
CVE-2024-48063,0,0,7dad3075f35e3bd4e2e591484ba350f38d4e17902517b9e5e6279458bc0b207a,2024-11-01T13:15:12.020000 CVE-2024-48063,0,0,7dad3075f35e3bd4e2e591484ba350f38d4e17902517b9e5e6279458bc0b207a,2024-11-01T13:15:12.020000
CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000 CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000
CVE-2024-48074,0,0,bca0d6dbb462c34776a53e7a729ed3fb0634f7f2ea1bca1d6a49bf976df47741,2024-10-29T19:35:18.963000 CVE-2024-48074,0,0,bca0d6dbb462c34776a53e7a729ed3fb0634f7f2ea1bca1d6a49bf976df47741,2024-10-29T19:35:18.963000
@ -263483,7 +263485,7 @@ CVE-2024-48454,0,0,6b6ca49a060c554891c90c2e114c529f7522d5800fbd375e9b33b5c669ae0
CVE-2024-48459,0,0,901474388331b2012a4633aead65b3a3d672e9f671a2126655443e04f1134f78,2024-10-29T20:35:32.737000 CVE-2024-48459,0,0,901474388331b2012a4633aead65b3a3d672e9f671a2126655443e04f1134f78,2024-10-29T20:35:32.737000
CVE-2024-4846,0,0,354213cecebbad5d2830809199864dadc70a5508c38afeb47a24b8f17c4c0fe1,2024-06-25T18:50:42.040000 CVE-2024-4846,0,0,354213cecebbad5d2830809199864dadc70a5508c38afeb47a24b8f17c4c0fe1,2024-06-25T18:50:42.040000
CVE-2024-48461,0,0,1c2083218c3c3685e23b071a99b5af3e2d4f1a943e6f041925ac67eedb8db886,2024-11-01T12:57:35.843000 CVE-2024-48461,0,0,1c2083218c3c3685e23b071a99b5af3e2d4f1a943e6f041925ac67eedb8db886,2024-11-01T12:57:35.843000
CVE-2024-48463,0,1,0bc7f3e7b8d54e56fe8dddcaa14275aa7a5820b50b73c79e9211e7d029e919b7,2024-11-06T19:35:17.717000 CVE-2024-48463,0,0,0bc7f3e7b8d54e56fe8dddcaa14275aa7a5820b50b73c79e9211e7d029e919b7,2024-11-06T19:35:17.717000
CVE-2024-48465,0,0,79a85011a870c4c08986e482d9ae1db011c8d568f8e3fabc9f719daa8800b0cb,2024-10-30T18:35:15.410000 CVE-2024-48465,0,0,79a85011a870c4c08986e482d9ae1db011c8d568f8e3fabc9f719daa8800b0cb,2024-10-30T18:35:15.410000
CVE-2024-4847,0,0,3e175fcde7743d0dafc07697dcd3c0585505cba50a8840c440513434f4a1e2f1,2024-05-15T16:40:19.330000 CVE-2024-4847,0,0,3e175fcde7743d0dafc07697dcd3c0585505cba50a8840c440513434f4a1e2f1,2024-05-15T16:40:19.330000
CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000 CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000
@ -263603,7 +263605,7 @@ CVE-2024-48797,0,0,84ec47d2f0875bb5f244804e75fe25176b42fd271e656bf8a6c457b2cefda
CVE-2024-48798,0,0,456e6efd1999d161e08d7d92b829aad7f771e38427be013211a406399a3cd174,2024-10-15T16:35:14.783000 CVE-2024-48798,0,0,456e6efd1999d161e08d7d92b829aad7f771e38427be013211a406399a3cd174,2024-10-15T16:35:14.783000
CVE-2024-48799,0,0,896d6d04e9dd29e6b7911e8a609c1f9aedfadec2fef931b761998c1ee9dd8f3e,2024-10-15T15:35:21.350000 CVE-2024-48799,0,0,896d6d04e9dd29e6b7911e8a609c1f9aedfadec2fef931b761998c1ee9dd8f3e,2024-10-15T15:35:21.350000
CVE-2024-48807,0,0,0d144ac83f7e3b1760f53caa259e9e3c92797a393e9f0218e5e59721fbc1c4dc,2024-11-01T12:57:03.417000 CVE-2024-48807,0,0,0d144ac83f7e3b1760f53caa259e9e3c92797a393e9f0218e5e59721fbc1c4dc,2024-11-01T12:57:03.417000
CVE-2024-48809,0,1,47d6c9cea59d124dc3bf475183d772db66f12df1ce197c1776abbec8ee9e52a2,2024-11-06T19:33:54.977000 CVE-2024-48809,0,0,47d6c9cea59d124dc3bf475183d772db66f12df1ce197c1776abbec8ee9e52a2,2024-11-06T19:33:54.977000
CVE-2024-4881,0,0,d7fec9dc10ea1cda5c43b7baed66b19ac106fead894074c09a02df3073ad45bc,2024-10-17T15:17:00.590000 CVE-2024-4881,0,0,d7fec9dc10ea1cda5c43b7baed66b19ac106fead894074c09a02df3073ad45bc,2024-10-17T15:17:00.590000
CVE-2024-48813,0,0,b3275c3656b3f4746c55f236fa34d6d816026c088db796644a052e298f356a4f,2024-10-15T12:58:51.050000 CVE-2024-48813,0,0,b3275c3656b3f4746c55f236fa34d6d816026c088db796644a052e298f356a4f,2024-10-15T12:58:51.050000
CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000 CVE-2024-4882,0,0,a4855f599041359b65e48a15f937a27e2ec2e91d9343d627eb58fe60c3b171c1,2024-07-09T18:19:14.047000
@ -263700,19 +263702,19 @@ CVE-2024-49211,0,0,69e61cc8ef233b9ff13db5267d11c58ce2f779bbae4d2a372191875e0959a
CVE-2024-49214,0,0,25aabfb69f8e67934aa819c25fb6d72399969fd517c067365488311d807f5b98,2024-10-29T16:35:14.877000 CVE-2024-49214,0,0,25aabfb69f8e67934aa819c25fb6d72399969fd517c067365488311d807f5b98,2024-10-29T16:35:14.877000
CVE-2024-49215,0,0,a819d161a1c5d99bae1a3537b9c18fdd18dd7d46b44a848b4173d70d0fe6177d,2024-10-24T14:10:17.137000 CVE-2024-49215,0,0,a819d161a1c5d99bae1a3537b9c18fdd18dd7d46b44a848b4173d70d0fe6177d,2024-10-24T14:10:17.137000
CVE-2024-49216,0,0,6acffa32d15c0271869a6ba3150ee4d41d9276ea01fbd76b60626657e8a8c6f0,2024-10-16T16:38:14.557000 CVE-2024-49216,0,0,6acffa32d15c0271869a6ba3150ee4d41d9276ea01fbd76b60626657e8a8c6f0,2024-10-16T16:38:14.557000
CVE-2024-49217,0,1,85c8a2bd11800855c22552b1c5bc2a47d344ead2a19c71b4f2a282b639a5eb22,2024-11-06T20:53:26.900000 CVE-2024-49217,0,0,85c8a2bd11800855c22552b1c5bc2a47d344ead2a19c71b4f2a282b639a5eb22,2024-11-06T20:53:26.900000
CVE-2024-49218,0,0,671ff343da2f5231222648ce902558a11e99be4b95e42fa72739eb1b7f6df389,2024-10-16T16:38:14.557000 CVE-2024-49218,0,0,671ff343da2f5231222648ce902558a11e99be4b95e42fa72739eb1b7f6df389,2024-10-16T16:38:14.557000
CVE-2024-49219,0,1,523812c25261161ba5e865409bca50593a9049b9d9f81554a1f3feb8b27a94b1,2024-11-06T20:45:08.233000 CVE-2024-49219,0,0,523812c25261161ba5e865409bca50593a9049b9d9f81554a1f3feb8b27a94b1,2024-11-06T20:45:08.233000
CVE-2024-4922,0,0,692b7adcf322621580a484f8f9b29edc18ffd7d0d7aa81554818742dd70afb00,2024-06-20T20:15:20.020000 CVE-2024-4922,0,0,692b7adcf322621580a484f8f9b29edc18ffd7d0d7aa81554818742dd70afb00,2024-06-20T20:15:20.020000
CVE-2024-49220,0,1,0ef4eec8872e2d73dcc890c17ee54afbea8a47ddd760e9d6518b78fbad00b47c,2024-11-06T20:41:13.367000 CVE-2024-49220,0,0,0ef4eec8872e2d73dcc890c17ee54afbea8a47ddd760e9d6518b78fbad00b47c,2024-11-06T20:41:13.367000
CVE-2024-49221,0,1,435842c334a660a0805ff050e49b3b4e8374bf2d1ce8479072841cb5d6919f8a,2024-11-06T20:54:50.527000 CVE-2024-49221,0,0,435842c334a660a0805ff050e49b3b4e8374bf2d1ce8479072841cb5d6919f8a,2024-11-06T20:54:50.527000
CVE-2024-49223,0,1,09a19af6067ac9483c25986020d58f93da9bc5c27f813ea5fddcf3b973d0489b,2024-11-06T20:55:37.613000 CVE-2024-49223,0,0,09a19af6067ac9483c25986020d58f93da9bc5c27f813ea5fddcf3b973d0489b,2024-11-06T20:55:37.613000
CVE-2024-49224,0,0,d5ed60c2b9217ee9e685d58c35300fb4a2b5ee5fb2fabe8974de51c33541a1ab,2024-10-21T16:31:21.593000 CVE-2024-49224,0,0,d5ed60c2b9217ee9e685d58c35300fb4a2b5ee5fb2fabe8974de51c33541a1ab,2024-10-21T16:31:21.593000
CVE-2024-49225,0,0,e045d0de6712b0b413de59de2f5ec4e42e811096a71880e86b358673c2e0d271,2024-10-21T16:33:00.403000 CVE-2024-49225,0,0,e045d0de6712b0b413de59de2f5ec4e42e811096a71880e86b358673c2e0d271,2024-10-21T16:33:00.403000
CVE-2024-49226,0,0,df9f2172258cc4d19c6bc195be87c4c9b1bf3d29dd47d60cce8b8efee0aca1a0,2024-10-16T16:38:14.557000 CVE-2024-49226,0,0,df9f2172258cc4d19c6bc195be87c4c9b1bf3d29dd47d60cce8b8efee0aca1a0,2024-10-16T16:38:14.557000
CVE-2024-49227,0,0,982f5e93a814f85c16cf1657f4ba0ca40040816eb1de34f1d6cd0e6ad4881dc1,2024-10-16T16:38:14.557000 CVE-2024-49227,0,0,982f5e93a814f85c16cf1657f4ba0ca40040816eb1de34f1d6cd0e6ad4881dc1,2024-10-16T16:38:14.557000
CVE-2024-49228,0,0,38437087aa9be3056a11c6798501f534e4b6d4e733ee6d1c2006add27aba0767,2024-10-21T16:34:41.267000 CVE-2024-49228,0,0,38437087aa9be3056a11c6798501f534e4b6d4e733ee6d1c2006add27aba0767,2024-10-21T16:34:41.267000
CVE-2024-49229,0,1,1e1752f517578bdb8e0d9073393d2366d6debf6a5e79cdf2932fb5c5b39d70c4,2024-11-06T20:40:30.740000 CVE-2024-49229,0,0,1e1752f517578bdb8e0d9073393d2366d6debf6a5e79cdf2932fb5c5b39d70c4,2024-11-06T20:40:30.740000
CVE-2024-4923,0,0,c83198e21d781e3384db11f118092c5fbfa4a06f25d53a21adb6fe23f4380f17,2024-06-04T19:20:53.833000 CVE-2024-4923,0,0,c83198e21d781e3384db11f118092c5fbfa4a06f25d53a21adb6fe23f4380f17,2024-06-04T19:20:53.833000
CVE-2024-49230,0,0,89342cb8496066491f5b3d74f112ed9eac62497b67d283852db13e34d1cb2199,2024-10-21T16:37:15.807000 CVE-2024-49230,0,0,89342cb8496066491f5b3d74f112ed9eac62497b67d283852db13e34d1cb2199,2024-10-21T16:37:15.807000
CVE-2024-49231,0,0,f1bca784a02483c4e1958c6dd7981ec9ffd6a01b629138db999d0ecc3e3b5b78,2024-10-21T16:37:46.010000 CVE-2024-49231,0,0,f1bca784a02483c4e1958c6dd7981ec9ffd6a01b629138db999d0ecc3e3b5b78,2024-10-21T16:37:46.010000
@ -263721,7 +263723,7 @@ CVE-2024-49233,0,0,d15701a736a720d91ce7a393cddc119d365e279a269d1078a3d62a0f44c1e
CVE-2024-49234,0,0,00d6361d85da44a4fa5e98b0b1923a417577ef114f956e9a3a98833720c5555c,2024-10-21T17:16:51.053000 CVE-2024-49234,0,0,00d6361d85da44a4fa5e98b0b1923a417577ef114f956e9a3a98833720c5555c,2024-10-21T17:16:51.053000
CVE-2024-49235,0,0,81b65049d9913937f83fbb02a460f07035b9a9b3cadf729eaa07645e1a8a845f,2024-10-18T12:52:33.507000 CVE-2024-49235,0,0,81b65049d9913937f83fbb02a460f07035b9a9b3cadf729eaa07645e1a8a845f,2024-10-18T12:52:33.507000
CVE-2024-49236,0,0,a834af1459ab83c1993774b31ad0e95a9120429d91f000710053f11c8b77484e,2024-10-21T17:12:00.583000 CVE-2024-49236,0,0,a834af1459ab83c1993774b31ad0e95a9120429d91f000710053f11c8b77484e,2024-10-21T17:12:00.583000
CVE-2024-49237,0,1,7c921f1ff6e06cda49ce0b96aba5ad95d5b8d4cbec93e4fa528982e38f3e12f5,2024-11-06T20:33:52.403000 CVE-2024-49237,0,0,7c921f1ff6e06cda49ce0b96aba5ad95d5b8d4cbec93e4fa528982e38f3e12f5,2024-11-06T20:33:52.403000
CVE-2024-49238,0,0,4f7144ebb272524e891d29605f6262832b81db89d137d3761af7eafcb87405b6,2024-10-21T17:02:51.280000 CVE-2024-49238,0,0,4f7144ebb272524e891d29605f6262832b81db89d137d3761af7eafcb87405b6,2024-10-21T17:02:51.280000
CVE-2024-49239,0,0,6bb7d5c1f1f1cff54f68d71e2aed5ac9078819a889d9132789e8a59fb72db7e3,2024-10-21T16:26:20.220000 CVE-2024-49239,0,0,6bb7d5c1f1f1cff54f68d71e2aed5ac9078819a889d9132789e8a59fb72db7e3,2024-10-21T16:26:20.220000
CVE-2024-4924,0,0,1b70fe45b850b22b8585c0417300fcac708f98c59205a2cdb72b2f32602e7fb3,2024-10-28T21:35:21.157000 CVE-2024-4924,0,0,1b70fe45b850b22b8585c0417300fcac708f98c59205a2cdb72b2f32602e7fb3,2024-10-28T21:35:21.157000
@ -263834,7 +263836,7 @@ CVE-2024-49361,0,0,f551e9abf09d421b2a081416ae11d1d19a91d21656c86d2519f1c7f0e2810
CVE-2024-49366,0,0,aa37188721af357c851b7fc33379d0188a960b9f96974610014dea2671948c2a,2024-10-23T15:13:58.783000 CVE-2024-49366,0,0,aa37188721af357c851b7fc33379d0188a960b9f96974610014dea2671948c2a,2024-10-23T15:13:58.783000
CVE-2024-49367,0,0,c9b869d3df961cbe6cd45089af2bd9e7675369053a02cc6adaf7052174946b00,2024-10-23T15:13:58.783000 CVE-2024-49367,0,0,c9b869d3df961cbe6cd45089af2bd9e7675369053a02cc6adaf7052174946b00,2024-10-23T15:13:58.783000
CVE-2024-49368,0,0,8be4e296ee1ec30084981da91255270e2fb2a840014ea77ee3103f7dcd091363,2024-11-06T18:28:54.440000 CVE-2024-49368,0,0,8be4e296ee1ec30084981da91255270e2fb2a840014ea77ee3103f7dcd091363,2024-11-06T18:28:54.440000
CVE-2024-49370,0,0,53182a6ce2637f054e6cf92c623239d8b52a4ad6590d2f00fca7214b8ca5b926,2024-10-25T12:56:36.827000 CVE-2024-49370,0,1,a5cd1a59d8359f30b64653ed20bc47230e4ab479f61eed26e21f9e51248ce0d7,2024-11-06T22:31:30.160000
CVE-2024-49373,0,0,4aa9cfdbe744fd3ae046ca1eeb4ecc11fd5a7b167271bdbcafbe01dffbbbe75a,2024-10-30T21:16:59.213000 CVE-2024-49373,0,0,4aa9cfdbe744fd3ae046ca1eeb4ecc11fd5a7b167271bdbcafbe01dffbbbe75a,2024-10-30T21:16:59.213000
CVE-2024-49376,0,0,190dbce5bcb7aada06f0c8b342eac2772846cf5d2a5dcc8eecc468a0b9c5d5e3,2024-10-28T13:58:09.230000 CVE-2024-49376,0,0,190dbce5bcb7aada06f0c8b342eac2772846cf5d2a5dcc8eecc468a0b9c5d5e3,2024-10-28T13:58:09.230000
CVE-2024-49377,0,0,f0a66be903c1ae0848c0330b2ecd5bcb10926f277636c57c6f6f956b317ea158,2024-11-06T18:17:17.287000 CVE-2024-49377,0,0,f0a66be903c1ae0848c0330b2ecd5bcb10926f277636c57c6f6f956b317ea158,2024-11-06T18:17:17.287000
@ -263960,7 +263962,7 @@ CVE-2024-49671,0,0,3444bda7ece1f693d338db4cc79d717f379cdd40dbc44287f6100eec0598b
CVE-2024-49672,0,0,894e1f0624440e3d744307abfb9eb6064ef2e0f986134420bd1cb909f8951534,2024-10-29T14:34:04.427000 CVE-2024-49672,0,0,894e1f0624440e3d744307abfb9eb6064ef2e0f986134420bd1cb909f8951534,2024-10-29T14:34:04.427000
CVE-2024-49673,0,0,a91125aab1f7960fc60732cbd0b5d96ec0e4cbbc1297595b886e51864ee396a5,2024-10-29T14:34:04.427000 CVE-2024-49673,0,0,a91125aab1f7960fc60732cbd0b5d96ec0e4cbbc1297595b886e51864ee396a5,2024-10-29T14:34:04.427000
CVE-2024-49674,0,0,fd3d64b6e35b6eec27ee3c590860244c5a96a05725f767dbab9cf4cb455540e0,2024-11-01T12:57:03.417000 CVE-2024-49674,0,0,fd3d64b6e35b6eec27ee3c590860244c5a96a05725f767dbab9cf4cb455540e0,2024-11-01T12:57:03.417000
CVE-2024-49675,0,0,c6e09b39dfdaf468c89ebc29589596eee519705df1761375fc6ab1777046823b,2024-10-25T12:56:36.827000 CVE-2024-49675,0,1,c2223000da0c4ff77fd421192850d7f215252c939d91090d90395539c22636a9,2024-11-06T22:24:22.907000
CVE-2024-49676,0,0,dd890548fa1bcb69576eae4659e357c656125d877be6d06a44ddb178c101b43d,2024-10-25T12:56:36.827000 CVE-2024-49676,0,0,dd890548fa1bcb69576eae4659e357c656125d877be6d06a44ddb178c101b43d,2024-10-25T12:56:36.827000
CVE-2024-49678,0,0,a75d300a9f5fa676504639fae81083885456f78da78e7660ba14ca16476d39c0,2024-10-29T14:34:04.427000 CVE-2024-49678,0,0,a75d300a9f5fa676504639fae81083885456f78da78e7660ba14ca16476d39c0,2024-10-29T14:34:04.427000
CVE-2024-49679,0,0,20c268334a4df168f30b45a50be9eb5ec235eddb6257303d5d7faf86cb14924e,2024-10-29T14:34:04.427000 CVE-2024-49679,0,0,20c268334a4df168f30b45a50be9eb5ec235eddb6257303d5d7faf86cb14924e,2024-10-29T14:34:04.427000
@ -264341,7 +264343,12 @@ CVE-2024-50333,0,0,dec570600936fbd1d13d82c721e514d60fa6e5733b1c9746045163c28aeb4
CVE-2024-50334,0,0,15b97ca0de89b7422ca1338a576d4ef71067410db416afc03dccd883f0aa73cd,2024-11-01T12:57:35.843000 CVE-2024-50334,0,0,15b97ca0de89b7422ca1338a576d4ef71067410db416afc03dccd883f0aa73cd,2024-11-01T12:57:35.843000
CVE-2024-50335,0,0,d56c49b3f816f27a07e453cd7f51250fd71a85087fc2558a07e34513c66fcd1a,2024-11-06T18:17:17.287000 CVE-2024-50335,0,0,d56c49b3f816f27a07e453cd7f51250fd71a85087fc2558a07e34513c66fcd1a,2024-11-06T18:17:17.287000
CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000 CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000
CVE-2024-50340,1,1,0d8006f3dd7bf6960a884ab327616feab504d4fb3d7bece8ca7ec146ee406621,2024-11-06T21:15:05.527000
CVE-2024-50341,1,1,56f80142c8430d4c9e687f36f4de41fdceb7e6a5fedaed2403afd3e967693c45,2024-11-06T21:15:05.747000
CVE-2024-50342,1,1,ad2d68e63f0a467fed99a59db8fd904072ce7170031980e68557c0e58aa6b3be,2024-11-06T21:15:05.963000
CVE-2024-50343,1,1,13d5f6bf56d0ed34f1292154c100bba90a98e43cd4d2ee727daa489f454989ed,2024-11-06T21:15:06.180000
CVE-2024-50344,0,0,01bf6c563fd2a47d8f1655926ebf620cef86a1d975ff50e33bcc2ca54db6ff27,2024-11-01T12:57:03.417000 CVE-2024-50344,0,0,01bf6c563fd2a47d8f1655926ebf620cef86a1d975ff50e33bcc2ca54db6ff27,2024-11-01T12:57:03.417000
CVE-2024-50345,1,1,a906319e9df14e184a1c49f6767e11bdb542ba55960f07fbf1c2e373b98a833e,2024-11-06T21:15:06.383000
CVE-2024-50346,0,0,fb25cbb7b8a23f8bc4a8f048afe511d7d942fe5a9bb027a602dbfa956ec82a3d,2024-11-05T16:04:26.053000 CVE-2024-50346,0,0,fb25cbb7b8a23f8bc4a8f048afe511d7d942fe5a9bb027a602dbfa956ec82a3d,2024-11-05T16:04:26.053000
CVE-2024-50347,0,0,09b35c9108a453337442f172c0c30bea977424cb455f7f1c26e8c5268b8f2c51,2024-11-01T12:57:03.417000 CVE-2024-50347,0,0,09b35c9108a453337442f172c0c30bea977424cb455f7f1c26e8c5268b8f2c51,2024-11-01T12:57:03.417000
CVE-2024-50348,0,0,fa8a8e9e48d227df1afdc378e4ee00ffda2dd051bb15c8b477e290549096cb45,2024-11-06T14:49:46.073000 CVE-2024-50348,0,0,fa8a8e9e48d227df1afdc378e4ee00ffda2dd051bb15c8b477e290549096cb45,2024-11-06T14:49:46.073000
@ -264506,7 +264513,7 @@ CVE-2024-5062,0,0,1dce1f93ce1b9242e76ae9cf090eb76ee6afadb656622c6eb5a578a5eb7601
CVE-2024-50623,0,0,71c6fad96d3194eba7d5d7edd081f9ad30cc6decd08744ac71e97f086f12f546,2024-10-30T21:35:11.373000 CVE-2024-50623,0,0,71c6fad96d3194eba7d5d7edd081f9ad30cc6decd08744ac71e97f086f12f546,2024-10-30T21:35:11.373000
CVE-2024-50624,0,0,2f6d7cbc06ddd09de063e5bd0feef072f438fbd478c20a099bcf6256ed039f90,2024-10-30T21:35:12.223000 CVE-2024-50624,0,0,2f6d7cbc06ddd09de063e5bd0feef072f438fbd478c20a099bcf6256ed039f90,2024-10-30T21:35:12.223000
CVE-2024-5063,0,0,3ea00cb3f53084b2393e5a818811e5957f116b348338ce87a59f64292b187a9f,2024-06-04T19:20:57.760000 CVE-2024-5063,0,0,3ea00cb3f53084b2393e5a818811e5957f116b348338ce87a59f64292b187a9f,2024-06-04T19:20:57.760000
CVE-2024-50637,0,1,856bb5c23e31310b984bfc1cc6773072f2db15e1db2b9091d52418ddd1c7384f,2024-11-06T20:35:33.010000 CVE-2024-50637,0,0,856bb5c23e31310b984bfc1cc6773072f2db15e1db2b9091d52418ddd1c7384f,2024-11-06T20:35:33.010000
CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000 CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000
CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000 CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000
CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000 CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000
@ -264594,10 +264601,10 @@ CVE-2024-5111,0,0,1e1510502a884c6f23b18cee848205aa75aeed3171cb87569d39e4078bf923
CVE-2024-51115,0,0,141fdcdabaf7c1ec8339c92338cf4045ebea4dbb9cb424f39276d597a3da7892,2024-11-06T18:17:17.287000 CVE-2024-51115,0,0,141fdcdabaf7c1ec8339c92338cf4045ebea4dbb9cb424f39276d597a3da7892,2024-11-06T18:17:17.287000
CVE-2024-51116,0,0,628a52b9257b50cdd3ccc07e8442fee438bd4b142b1a9d47d166ffcd98ae2965,2024-11-06T18:17:17.287000 CVE-2024-51116,0,0,628a52b9257b50cdd3ccc07e8442fee438bd4b142b1a9d47d166ffcd98ae2965,2024-11-06T18:17:17.287000
CVE-2024-5112,0,0,689c76c95598a2f86ee6cadbc1c25854cf35ada5e2d2725de4638c44d7f73797,2024-06-04T19:21:00.007000 CVE-2024-5112,0,0,689c76c95598a2f86ee6cadbc1c25854cf35ada5e2d2725de4638c44d7f73797,2024-06-04T19:21:00.007000
CVE-2024-51127,0,1,5cbf021500110127b38f6de54e9823061ea68366b333afb20ed57e2e95d1d646,2024-11-06T19:25:14.607000 CVE-2024-51127,0,0,5cbf021500110127b38f6de54e9823061ea68366b333afb20ed57e2e95d1d646,2024-11-06T19:25:14.607000
CVE-2024-5113,0,0,d52da1935c57c4016d19b1f0658aa6603ac8563b2af10cf87d5ce42568a3ed96,2024-06-04T19:21:00.113000 CVE-2024-5113,0,0,d52da1935c57c4016d19b1f0658aa6603ac8563b2af10cf87d5ce42568a3ed96,2024-06-04T19:21:00.113000
CVE-2024-51132,0,1,741849111477a3dea70a3f4f159f318bcb11e986e2637afecf8a608cf70fdf87,2024-11-06T20:35:34.173000 CVE-2024-51132,0,0,741849111477a3dea70a3f4f159f318bcb11e986e2637afecf8a608cf70fdf87,2024-11-06T20:35:34.173000
CVE-2024-51136,0,1,b7028b746c76b0b8db7064a5c94d8b9b8b4865b267652b712081099f88f87998,2024-11-06T19:31:15.230000 CVE-2024-51136,0,0,b7028b746c76b0b8db7064a5c94d8b9b8b4865b267652b712081099f88f87998,2024-11-06T19:31:15.230000
CVE-2024-5114,0,0,51655375bf74d88d0b44bf3106775b49d83b04b179d3446b4a92ffe727b17b66,2024-06-04T19:21:00.217000 CVE-2024-5114,0,0,51655375bf74d88d0b44bf3106775b49d83b04b179d3446b4a92ffe727b17b66,2024-06-04T19:21:00.217000
CVE-2024-5115,0,0,566281473e2daa2487dd251e202869dc3059aeec07f7c63daa38b65c3bae3de7,2024-06-04T19:21:00.323000 CVE-2024-5115,0,0,566281473e2daa2487dd251e202869dc3059aeec07f7c63daa38b65c3bae3de7,2024-06-04T19:21:00.323000
CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000 CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000
@ -264611,7 +264618,7 @@ CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3b
CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b5e,2024-06-04T19:21:00.963000 CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b5e,2024-06-04T19:21:00.963000
CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000 CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000
CVE-2024-5124,0,0,ddf4d98394e08878019bd952c44f2cfd27f047274d82fb0e14f997780f16638c,2024-11-04T11:15:06.937000 CVE-2024-5124,0,0,ddf4d98394e08878019bd952c44f2cfd27f047274d82fb0e14f997780f16638c,2024-11-04T11:15:06.937000
CVE-2024-51240,0,1,7445c6ba47df36c0613eb4cb1195b6f0f9ac8d38ec29d4a0f09a129257d8d4ff,2024-11-06T20:35:34.963000 CVE-2024-51240,0,0,7445c6ba47df36c0613eb4cb1195b6f0f9ac8d38ec29d4a0f09a129257d8d4ff,2024-11-06T20:35:34.963000
CVE-2024-51242,0,0,e088a83b7d97849945ef8e4d907ce1041a9c29e696b96e8d85eb2989ae73aa7b,2024-11-01T12:57:03.417000 CVE-2024-51242,0,0,e088a83b7d97849945ef8e4d907ce1041a9c29e696b96e8d85eb2989ae73aa7b,2024-11-01T12:57:03.417000
CVE-2024-51243,0,0,dc9a3bcceef7b79b773664e490e9177d288abe6b5bfadf448f185196016ec54c,2024-11-01T12:57:03.417000 CVE-2024-51243,0,0,dc9a3bcceef7b79b773664e490e9177d288abe6b5bfadf448f185196016ec54c,2024-11-01T12:57:03.417000
CVE-2024-51244,0,0,1da847cb94e7afadbe7e923335974b45b31004bfdcaa7db1bb1325dae7dc5743,2024-11-05T19:28:09.403000 CVE-2024-51244,0,0,1da847cb94e7afadbe7e923335974b45b31004bfdcaa7db1bb1325dae7dc5743,2024-11-05T19:28:09.403000
@ -264645,13 +264652,13 @@ CVE-2024-5132,0,0,1e1b0edf57956ef222afc7fdedc2f2211203f4402428303961b463cfc0ea97
CVE-2024-51326,0,0,86a38e3ec445ab1743629a943074bd136cc3a19613d33223b8410daa71b7467f,2024-11-06T15:02:12.403000 CVE-2024-51326,0,0,86a38e3ec445ab1743629a943074bd136cc3a19613d33223b8410daa71b7467f,2024-11-06T15:02:12.403000
CVE-2024-51327,0,0,6dff1d9ddb8570601185ec672ddf11cc5295d3cdce074e30aa360a3024bc5c57,2024-11-06T15:02:55.710000 CVE-2024-51327,0,0,6dff1d9ddb8570601185ec672ddf11cc5295d3cdce074e30aa360a3024bc5c57,2024-11-06T15:02:55.710000
CVE-2024-51328,0,0,768f8be19425d8bf4cf9b5b89b937b298b5cc7b18ce12eea5265b64902006bbb,2024-11-04T19:35:16.150000 CVE-2024-51328,0,0,768f8be19425d8bf4cf9b5b89b937b298b5cc7b18ce12eea5265b64902006bbb,2024-11-04T19:35:16.150000
CVE-2024-51329,0,1,134d8b5a46fc76f9917a9aed6fc6c4366a039772d7dfe5acc179470dd93f05e6,2024-11-06T19:19:24.793000 CVE-2024-51329,0,0,134d8b5a46fc76f9917a9aed6fc6c4366a039772d7dfe5acc179470dd93f05e6,2024-11-06T19:19:24.793000
CVE-2024-5133,0,0,ce2c3261ccf7a6af3656f0cd319a645240f50aa81e714a3f3634cc2f14d7c857,2024-10-17T16:41:53.717000 CVE-2024-5133,0,0,ce2c3261ccf7a6af3656f0cd319a645240f50aa81e714a3f3634cc2f14d7c857,2024-10-17T16:41:53.717000
CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa19,2024-06-04T19:21:01.167000 CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa19,2024-06-04T19:21:01.167000
CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000 CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000
CVE-2024-51358,0,0,be0f7decc72be7973be0b54dbe7f4f5d0c6692a8b1099b27d3347b7c8184f47f,2024-11-06T18:17:17.287000 CVE-2024-51358,0,0,be0f7decc72be7973be0b54dbe7f4f5d0c6692a8b1099b27d3347b7c8184f47f,2024-11-06T18:17:17.287000
CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000 CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000
CVE-2024-51362,0,1,a6e1a40cf5e527208990e8a764ceb58cfefd7f1b5e4a2c9e1905064ef69946f2,2024-11-06T20:35:35.750000 CVE-2024-51362,0,0,a6e1a40cf5e527208990e8a764ceb58cfefd7f1b5e4a2c9e1905064ef69946f2,2024-11-06T20:35:35.750000
CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000 CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000
CVE-2024-51377,0,0,27e24251b8fbb0cd40dc4b3232759f12cbe7946bd501f1e15145c4cb45ca2b57,2024-11-04T21:35:12.543000 CVE-2024-51377,0,0,27e24251b8fbb0cd40dc4b3232759f12cbe7946bd501f1e15145c4cb45ca2b57,2024-11-04T21:35:12.543000
CVE-2024-51378,0,0,25041eea06e8de15fb868a226604237e266234c162cafb1c59832cc50427a9bb,2024-11-01T12:57:03.417000 CVE-2024-51378,0,0,25041eea06e8de15fb868a226604237e266234c162cafb1c59832cc50427a9bb,2024-11-01T12:57:03.417000
@ -264664,7 +264671,7 @@ CVE-2024-51398,0,0,bf1065b8a7633fd26fe8d4034a94a303b4ea5c6fbbe5b2babb7e5454f0dc9
CVE-2024-51399,0,0,fc9a4f7feccdf87ac1072a742df0a1dc4f133fcfd9c1bf1ed214d196e18abc1b,2024-11-05T18:35:18.260000 CVE-2024-51399,0,0,fc9a4f7feccdf87ac1072a742df0a1dc4f133fcfd9c1bf1ed214d196e18abc1b,2024-11-05T18:35:18.260000
CVE-2024-51406,0,0,219f1a907dc34e3139e40d74617f86db24d4b43908c87f25fb1a00f5ef8165d9,2024-11-04T19:35:17.410000 CVE-2024-51406,0,0,219f1a907dc34e3139e40d74617f86db24d4b43908c87f25fb1a00f5ef8165d9,2024-11-04T19:35:17.410000
CVE-2024-51407,0,0,fda917e854eca07dcff49df0339535f103ba20de93b59699ac770c63d8521d21,2024-11-04T20:35:11.350000 CVE-2024-51407,0,0,fda917e854eca07dcff49df0339535f103ba20de93b59699ac770c63d8521d21,2024-11-04T20:35:11.350000
CVE-2024-51408,0,0,d571e63af91ee1143469f4bb57d330653f7c5f692a2406715d228afd31a4069d,2024-11-05T22:35:13.937000 CVE-2024-51408,0,1,768985f0479d1b629ffaa63d05723a6cce6c2d94e338531281645d00b127aacd,2024-11-06T22:06:43.100000
CVE-2024-5141,0,0,5b006751fd2d8ca9e95fc8cef49a641b35089e8e5594eecd996fab7cf0d4e5e8,2024-07-24T17:58:54.867000 CVE-2024-5141,0,0,5b006751fd2d8ca9e95fc8cef49a641b35089e8e5594eecd996fab7cf0d4e5e8,2024-07-24T17:58:54.867000
CVE-2024-51419,0,0,e145fdc3d6134b228049cf2c0ec561624aa79dc4de0c1da7a3c5f83de9d39a5f,2024-11-01T12:57:03.417000 CVE-2024-51419,0,0,e145fdc3d6134b228049cf2c0ec561624aa79dc4de0c1da7a3c5f83de9d39a5f,2024-11-01T12:57:03.417000
CVE-2024-5142,0,0,8102929b9600e5392a308a1b7cfd863bc4b2848bde33508d601b388a9c02231d,2024-08-27T11:15:04.540000 CVE-2024-5142,0,0,8102929b9600e5392a308a1b7cfd863bc4b2848bde33508d601b388a9c02231d,2024-08-27T11:15:04.540000
@ -264738,22 +264745,22 @@ CVE-2024-5159,0,0,6487690749e64572084b0b1ffb84b7950e8b682c3129ca3d21d0dbc204e9ec
CVE-2024-5160,0,0,761bdadb9ac3f89d156978519ca326c5704c62592c7f03e703ecc7e802a865d7,2024-07-03T02:08:36.807000 CVE-2024-5160,0,0,761bdadb9ac3f89d156978519ca326c5704c62592c7f03e703ecc7e802a865d7,2024-07-03T02:08:36.807000
CVE-2024-5161,0,0,f120c7db938e25c7983d6c400da502880d5ffbc93ab4e5e05351c3fca8fbd038,2024-07-24T17:54:42.387000 CVE-2024-5161,0,0,f120c7db938e25c7983d6c400da502880d5ffbc93ab4e5e05351c3fca8fbd038,2024-07-24T17:54:42.387000
CVE-2024-5162,0,0,b916c521cfe3c1fb21956086b784f2a8541eeb514496e084206ecc726f921efe,2024-07-24T17:53:33.277000 CVE-2024-5162,0,0,b916c521cfe3c1fb21956086b784f2a8541eeb514496e084206ecc726f921efe,2024-07-24T17:53:33.277000
CVE-2024-51626,0,0,18e5c511939be2558be617df0507b9f12fa7d0e50de2af2ea7459c488b192636,2024-11-04T18:50:05.607000 CVE-2024-51626,0,1,1464c1c98efb870dcd3b5a35eb6a7feff3782c73b32d47b788148d4cc3703554,2024-11-06T22:10:20.517000
CVE-2024-5163,0,0,1f45f157a740def8c3f1c2e097025198bc2166983108f63600058e7c57408d30,2024-08-21T06:15:07.277000 CVE-2024-5163,0,0,1f45f157a740def8c3f1c2e097025198bc2166983108f63600058e7c57408d30,2024-08-21T06:15:07.277000
CVE-2024-5165,0,0,2b7469c3d25cc1e03e7fcca1607bc78daf489d82c018a0fbc4f3b815c328cf85,2024-05-24T01:15:30.977000 CVE-2024-5165,0,0,2b7469c3d25cc1e03e7fcca1607bc78daf489d82c018a0fbc4f3b815c328cf85,2024-05-24T01:15:30.977000
CVE-2024-5166,0,0,5c544eab21844e01fabd3874ed7776a55145987bd3a510311ad16f12f33bd2bc,2024-05-22T18:59:20.240000 CVE-2024-5166,0,0,5c544eab21844e01fabd3874ed7776a55145987bd3a510311ad16f12f33bd2bc,2024-05-22T18:59:20.240000
CVE-2024-51661,0,0,9622f3634ba493f615ed2927ef92c179ee0dcb7280d813f52b441be81e048a8e,2024-11-04T18:50:05.607000 CVE-2024-51661,0,0,9622f3634ba493f615ed2927ef92c179ee0dcb7280d813f52b441be81e048a8e,2024-11-04T18:50:05.607000
CVE-2024-51665,0,0,56bf9fcd202b3ea9001e454522be11bd5978f32ce441602f00aa1bbb031128ad,2024-11-04T18:50:05.607000 CVE-2024-51665,0,1,836ecda2a38ee75dca042d09339ec8247ed79262a6a8d01bd25035a2e84a5ce0,2024-11-06T22:07:10.707000
CVE-2024-5167,0,0,a26d674346a63d8730649864e3fcc22e33fb8b5877ed990bcd49874aef8d8c48,2024-08-01T13:59:41.660000 CVE-2024-5167,0,0,a26d674346a63d8730649864e3fcc22e33fb8b5877ed990bcd49874aef8d8c48,2024-08-01T13:59:41.660000
CVE-2024-51672,0,0,02f34342c7a243fc55088e6039256e7de98338fcdc98f8b95fb11a31d6c364d4,2024-11-04T18:50:05.607000 CVE-2024-51672,0,1,14a5ef0a87d874231b0f786642aa34aa9f0064d5c86f2b9992f4fe90d62559ab,2024-11-06T22:08:22.747000
CVE-2024-51677,0,0,3a3f242a7ff6f80c9e763fd44464d5f149926414812ec89ee8be44bce14d131b,2024-11-04T18:50:05.607000 CVE-2024-51677,0,1,8b0f7a3853108bd14021b832cd2914a4bbd49dc774029c03bf84670c6d192320,2024-11-06T22:10:31.677000
CVE-2024-51678,0,0,ca8e2772685847dbfa010764deeffa0341c2b977902afc49a77a90e54643e432,2024-11-04T18:50:05.607000 CVE-2024-51678,0,1,ce4086679232add4ebc40be30bdc12f20f02b66e38c181d2556e9473603941fd,2024-11-06T22:10:45.103000
CVE-2024-5168,0,0,cbe1b6c96aef7b506dd526cf00951c936dfc5233fd9563b4af0bf7fdab7a5899,2024-05-24T01:15:30.977000 CVE-2024-5168,0,0,cbe1b6c96aef7b506dd526cf00951c936dfc5233fd9563b4af0bf7fdab7a5899,2024-05-24T01:15:30.977000
CVE-2024-51680,0,0,6a0e4dc35b32086a537bd54899180c80ad01a8c6290d199cc8c4684b6784a87c,2024-11-04T18:50:05.607000 CVE-2024-51680,0,1,e3d442fcfe0b4fceddb505a5eff13c52978f820716977fad69b0fdd39fa2c605,2024-11-06T22:10:59.270000
CVE-2024-51681,0,0,b2240f3aac7cf521a8583b6a4f2d4157a3e0c7b650f696a8fe56bed46dd560b4,2024-11-04T18:50:05.607000 CVE-2024-51681,0,1,6987ab81beb2df0eaa9da220f2d791ed5d8df3f0e18bd37d9a9b390a4eaf5a17,2024-11-06T22:11:16.003000
CVE-2024-51682,0,0,12881b8ca373787a3c057bd1e8d9525a2539983e5a3ed6d65b201c2ff661d1fb,2024-11-04T18:50:05.607000 CVE-2024-51682,0,1,aaba0581a3d811571ae104155388a45dd47ae531ed284c6ab0022efdb152fbe5,2024-11-06T22:12:02.353000
CVE-2024-51683,0,0,0f4d7566656d1bf0660d68c0ecfc6656f45f0a02e4da79c690f191f19760df22,2024-11-04T18:50:05.607000 CVE-2024-51683,0,1,f59d50717ee7305489d521abf4c5c1ef491e4436568b0e3c6dd145e0ad77427b,2024-11-06T22:12:19.803000
CVE-2024-51685,0,1,3ec6f589ce8427b20bd90f3e3168669c47fda17fa0f474f038e9a6e94e0e60b9,2024-11-06T19:34:31.590000 CVE-2024-51685,0,0,3ec6f589ce8427b20bd90f3e3168669c47fda17fa0f474f038e9a6e94e0e60b9,2024-11-06T19:34:31.590000
CVE-2024-5169,0,0,882a6aa1fee4c71f4df51ce353ec6b27431ae776e2b2b23b3c5ba8c59ca21797,2024-08-02T15:00:10.200000 CVE-2024-5169,0,0,882a6aa1fee4c71f4df51ce353ec6b27431ae776e2b2b23b3c5ba8c59ca21797,2024-08-02T15:00:10.200000
CVE-2024-5170,0,0,0357b8fbab1b76f01ca0dd625bf87ec8b80f7fd2d35927c69b68200ba07a11a4,2024-09-27T18:23:43.833000 CVE-2024-5170,0,0,0357b8fbab1b76f01ca0dd625bf87ec8b80f7fd2d35927c69b68200ba07a11a4,2024-09-27T18:23:43.833000
CVE-2024-5171,0,0,dd574bf92e93c62d270c5e3b0cb384556e01dba1d43a5b9db2a02845fa564cb4,2024-07-23T18:09:56.753000 CVE-2024-5171,0,0,dd574bf92e93c62d270c5e3b0cb384556e01dba1d43a5b9db2a02845fa564cb4,2024-07-23T18:09:56.753000
@ -264761,18 +264768,19 @@ CVE-2024-5172,0,0,b469524ff2309ced9aec08b056578c23e8b8b5248adb8fcea2b38cb214c812
CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da6464,2024-06-26T12:44:29.693000 CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da6464,2024-06-26T12:44:29.693000
CVE-2024-51734,0,0,1cd13d8635d39c437cbb33b350735ec8f4fced2309825670ef2275f584df030b,2024-11-05T20:35:26.167000 CVE-2024-51734,0,0,1cd13d8635d39c437cbb33b350735ec8f4fced2309825670ef2275f584df030b,2024-11-05T20:35:26.167000
CVE-2024-51735,0,0,4d68a755141918a79130284871e942292c9f37924aba0b94103b08a16b1df114,2024-11-06T18:17:17.287000 CVE-2024-51735,0,0,4d68a755141918a79130284871e942292c9f37924aba0b94103b08a16b1df114,2024-11-06T18:17:17.287000
CVE-2024-51736,1,1,379ee3f6d2d9accb42efa81e333f4e655bf347820c945b9b76849f1517ca172f,2024-11-06T21:15:06.600000
CVE-2024-51739,0,0,ee203b09953b612bf98226788bae2c648a3d93de0cc3326880af2a364d5bb790,2024-11-06T18:17:17.287000 CVE-2024-51739,0,0,ee203b09953b612bf98226788bae2c648a3d93de0cc3326880af2a364d5bb790,2024-11-06T18:17:17.287000
CVE-2024-51740,0,0,8049b8be1065b4b8406a50a1cfde4cf3f6d43a64ebf12ea9e23c06d353369d55,2024-11-06T18:17:17.287000 CVE-2024-51740,0,0,8049b8be1065b4b8406a50a1cfde4cf3f6d43a64ebf12ea9e23c06d353369d55,2024-11-06T18:17:17.287000
CVE-2024-51744,0,0,df641a1b86566e97bb7074f2d337c50f51346569211bd554409b057e4c4da639,2024-11-05T16:04:26.053000 CVE-2024-51744,0,0,df641a1b86566e97bb7074f2d337c50f51346569211bd554409b057e4c4da639,2024-11-05T16:04:26.053000
CVE-2024-51745,0,0,37db28606ad10f651e6f62f94e51def5fb50b1cfae8314bc96328b8b65ad324b,2024-11-06T18:17:17.287000 CVE-2024-51745,0,0,37db28606ad10f651e6f62f94e51def5fb50b1cfae8314bc96328b8b65ad324b,2024-11-06T18:17:17.287000
CVE-2024-51746,0,0,3cd98a267aedbbeeb4ad193a68e5bacd0a1a46a62f6ccca5880e9520a47fbe14,2024-11-06T18:17:17.287000 CVE-2024-51746,0,0,3cd98a267aedbbeeb4ad193a68e5bacd0a1a46a62f6ccca5880e9520a47fbe14,2024-11-06T18:17:17.287000
CVE-2024-51751,1,1,5be875fb03dd84c20f8d271d29f5d3af24259f1c25883a44af5c941f68ac278f,2024-11-06T20:15:05.557000 CVE-2024-51751,0,0,5be875fb03dd84c20f8d271d29f5d3af24259f1c25883a44af5c941f68ac278f,2024-11-06T20:15:05.557000
CVE-2024-51752,0,0,e4bd7dfff09e294fe713d9b76aba7fd50689256bee0d75d076093e0fe4805888,2024-11-06T18:17:17.287000 CVE-2024-51752,0,0,e4bd7dfff09e294fe713d9b76aba7fd50689256bee0d75d076093e0fe4805888,2024-11-06T18:17:17.287000
CVE-2024-51753,0,0,bf33e866ff4adcdc8169c4272817d8f4f57258218421ea7cafddbf38a1c6e30a,2024-11-06T18:17:17.287000 CVE-2024-51753,0,0,bf33e866ff4adcdc8169c4272817d8f4f57258218421ea7cafddbf38a1c6e30a,2024-11-06T18:17:17.287000
CVE-2024-51754,1,1,ab8a7bcd0aef3f8778ab7f9b5f45ed9ae1110b90fa03bf7f3d612cb847bb1caa,2024-11-06T20:15:05.817000 CVE-2024-51754,0,0,ab8a7bcd0aef3f8778ab7f9b5f45ed9ae1110b90fa03bf7f3d612cb847bb1caa,2024-11-06T20:15:05.817000
CVE-2024-51755,1,1,7150a21cdebe589f49ef7bb36b4fad5dd8f080a46c27ff91852f0fd345ca5552,2024-11-06T20:15:06.077000 CVE-2024-51755,0,0,7150a21cdebe589f49ef7bb36b4fad5dd8f080a46c27ff91852f0fd345ca5552,2024-11-06T20:15:06.077000
CVE-2024-51756,0,0,7e7db3439c4e45c36bf53dc70dbe779b982ce3f3056b8757e470dab737dd37ba,2024-11-06T18:17:17.287000 CVE-2024-51756,0,0,7e7db3439c4e45c36bf53dc70dbe779b982ce3f3056b8757e470dab737dd37ba,2024-11-06T18:17:17.287000
CVE-2024-51757,1,1,6469de8ff53e3c67b6dea69ecf92a7c1c9657d29eb32af44797d561418c06bb5,2024-11-06T20:15:06.337000 CVE-2024-51757,0,1,94efafdd8ea10b2a0656841928d239afab2750ddf6f06a644397622ff5d6eb53,2024-11-06T21:15:06.807000
CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000 CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000
CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000 CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000
CVE-2024-51774,0,0,669a599ada079f107ff827e67143f083d374e9861d23daa36ef167763e62d529,2024-11-06T17:35:41.767000 CVE-2024-51774,0,0,669a599ada079f107ff827e67143f083d374e9861d23daa36ef167763e62d529,2024-11-06T17:35:41.767000
@ -264794,7 +264802,7 @@ CVE-2024-5194,0,0,8b46532d156b8b3c9309e51d70c9e0d478e4dda8959433d551fb9bae0e23a4
CVE-2024-5195,0,0,a944b3bf4d682f545e6cb40d57a8d207d6c568eeb84f910c894251f96395025e,2024-06-04T19:21:02.077000 CVE-2024-5195,0,0,a944b3bf4d682f545e6cb40d57a8d207d6c568eeb84f910c894251f96395025e,2024-06-04T19:21:02.077000
CVE-2024-5196,0,0,fe96c1eeb1213602679ab014fd535da1193da9cfe24103856ca34e734451708d,2024-06-04T19:21:02.183000 CVE-2024-5196,0,0,fe96c1eeb1213602679ab014fd535da1193da9cfe24103856ca34e734451708d,2024-06-04T19:21:02.183000
CVE-2024-5197,0,0,01172b8d20369801e638a1092c2896c82735a2e04e92ac5031b21558c286d96f,2024-06-16T21:15:50.820000 CVE-2024-5197,0,0,01172b8d20369801e638a1092c2896c82735a2e04e92ac5031b21558c286d96f,2024-06-16T21:15:50.820000
CVE-2024-51988,1,1,2d17fe71a727874da6f8f6c999ae55f95138104406d5cbbc92ea592560164e88,2024-11-06T20:15:06.513000 CVE-2024-51988,0,0,2d17fe71a727874da6f8f6c999ae55f95138104406d5cbbc92ea592560164e88,2024-11-06T20:15:06.513000
CVE-2024-5199,0,0,8fdec235790e80ab25bf344b6e4e20c94c0a12c0bede9440d8c94965619f66eb,2024-10-28T21:35:23.237000 CVE-2024-5199,0,0,8fdec235790e80ab25bf344b6e4e20c94c0a12c0bede9440d8c94965619f66eb,2024-10-28T21:35:23.237000
CVE-2024-5201,0,0,64f0da97aed099b7390504c61b2a584cf361827a66e92ad103d8b3995d82fd05,2024-05-24T01:15:30.977000 CVE-2024-5201,0,0,64f0da97aed099b7390504c61b2a584cf361827a66e92ad103d8b3995d82fd05,2024-05-24T01:15:30.977000
CVE-2024-52013,0,0,d9e82ae91803da33afed578345dc1a358b894658d92808fa986ec4533aa8b6bc,2024-11-05T16:35:36.337000 CVE-2024-52013,0,0,d9e82ae91803da33afed578345dc1a358b894658d92808fa986ec4533aa8b6bc,2024-11-05T16:35:36.337000
@ -265216,7 +265224,7 @@ CVE-2024-5638,0,0,68ca32104039c555501740b79d9d053899dfa4f77cf28bfda3416440a76684
CVE-2024-5639,0,0,492ad0d47d56549888d5f48237edc279d0d32d853604c73193623cce2eae0704,2024-06-24T19:24:23.883000 CVE-2024-5639,0,0,492ad0d47d56549888d5f48237edc279d0d32d853604c73193623cce2eae0704,2024-06-24T19:24:23.883000
CVE-2024-5640,0,0,8f33c54e7012000a851267741a433d3aa85134979ee0675a7c8c94bf7d26740a,2024-10-28T18:32:59.690000 CVE-2024-5640,0,0,8f33c54e7012000a851267741a433d3aa85134979ee0675a7c8c94bf7d26740a,2024-10-28T18:32:59.690000
CVE-2024-5641,0,0,1f23612877686d6e5143238f62dc02125c3d0a0d8a2499e0ec524473edb424e6,2024-07-05T17:14:44.840000 CVE-2024-5641,0,0,1f23612877686d6e5143238f62dc02125c3d0a0d8a2499e0ec524473edb424e6,2024-07-05T17:14:44.840000
CVE-2024-5642,0,0,bf58acd5f015124d4fa0c6ffb75779edb6afb99b41961d291eb7083813f4952e,2024-07-28T14:15:11.220000 CVE-2024-5642,0,1,4ed20babf058b3e506d0b66042a68f289ffcc8ee77fb96f7765ea8a1aca1a90e,2024-11-06T21:35:08.690000
CVE-2024-5644,0,0,35f5cce546de98cfce88cd6571a328f218696f426033c4c0d2e31a431c078a61,2024-08-01T13:59:56.260000 CVE-2024-5644,0,0,35f5cce546de98cfce88cd6571a328f218696f426033c4c0d2e31a431c078a61,2024-08-01T13:59:56.260000
CVE-2024-5645,0,0,81ee0a48f8169b5fa6535595d6aeb783fba06dd48c6af38e338fa98641a45635,2024-06-11T17:57:47.197000 CVE-2024-5645,0,0,81ee0a48f8169b5fa6535595d6aeb783fba06dd48c6af38e338fa98641a45635,2024-06-11T17:57:47.197000
CVE-2024-5646,0,0,54dff546debf316c7620aa15614b89fe6dc050f45cfaa67554d377c50ceda179,2024-06-13T18:36:09.013000 CVE-2024-5646,0,0,54dff546debf316c7620aa15614b89fe6dc050f45cfaa67554d377c50ceda179,2024-06-13T18:36:09.013000
@ -267758,7 +267766,7 @@ CVE-2024-8767,0,0,17744319861b5196f5a63bddf3c3c4ab0c9d11dd531ce1a95816c3c9e2193e
CVE-2024-8768,0,0,a982019cb3e87700eba7d9922c696779881e32d71a95f1662a9030bc9b15c0d2,2024-09-20T12:30:51.220000 CVE-2024-8768,0,0,a982019cb3e87700eba7d9922c696779881e32d71a95f1662a9030bc9b15c0d2,2024-09-20T12:30:51.220000
CVE-2024-8770,0,0,092503c78b1ec747d9cd01983ee6d65a49e2eef82871ebe4802ea35253afc2e7,2024-09-27T13:49:29.690000 CVE-2024-8770,0,0,092503c78b1ec747d9cd01983ee6d65a49e2eef82871ebe4802ea35253afc2e7,2024-09-27T13:49:29.690000
CVE-2024-8771,0,0,8440e358d9ef6f31cf81e66a5a83b441147afe75ee9c3ad99e3f4526f8f30874,2024-09-30T12:46:20.237000 CVE-2024-8771,0,0,8440e358d9ef6f31cf81e66a5a83b441147afe75ee9c3ad99e3f4526f8f30874,2024-09-30T12:46:20.237000
CVE-2024-8775,0,1,b1c934c0f161c282b2ea9c3e55f934218dc75fc137b9f5d065788131a5d3a709,2024-11-06T20:15:06.763000 CVE-2024-8775,0,0,b1c934c0f161c282b2ea9c3e55f934218dc75fc137b9f5d065788131a5d3a709,2024-11-06T20:15:06.763000
CVE-2024-8776,0,0,5f24148b1f2c0e63f94c4b7c4eb112791a653befffb86dbacf9b6c99ebdd5088,2024-09-20T16:38:51.910000 CVE-2024-8776,0,0,5f24148b1f2c0e63f94c4b7c4eb112791a653befffb86dbacf9b6c99ebdd5088,2024-09-20T16:38:51.910000
CVE-2024-8777,0,0,abf6497bbb9ed542a83ea295cf446b5b0a64e2a3685378272b7c6e8d7a6d8418,2024-09-20T14:22:19.840000 CVE-2024-8777,0,0,abf6497bbb9ed542a83ea295cf446b5b0a64e2a3685378272b7c6e8d7a6d8418,2024-09-20T14:22:19.840000
CVE-2024-8778,0,0,04f76622204759cf035b6cf776488dd4e0117dc8a28cbc6a6f40333ff951b555,2024-09-20T14:23:37.697000 CVE-2024-8778,0,0,04f76622204759cf035b6cf776488dd4e0117dc8a28cbc6a6f40333ff951b555,2024-09-20T14:23:37.697000
@ -268097,7 +268105,7 @@ CVE-2024-9327,0,0,9bb62fae114b1c29588ad2672d640859a17a9f3af7375a799fc34e218e9d39
CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000 CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000
CVE-2024-9329,0,0,45383f73609cef2d97bbcc2a37f0da26902c147f00f71a92dd725b6696a1e709,2024-10-07T15:52:47.267000 CVE-2024-9329,0,0,45383f73609cef2d97bbcc2a37f0da26902c147f00f71a92dd725b6696a1e709,2024-10-07T15:52:47.267000
CVE-2024-9333,0,0,29d3d497691b594c7c49948d48e229bbe8c23108f2eef552b2f92cd89acf1f06,2024-10-04T13:50:43.727000 CVE-2024-9333,0,0,29d3d497691b594c7c49948d48e229bbe8c23108f2eef552b2f92cd89acf1f06,2024-10-04T13:50:43.727000
CVE-2024-9341,0,1,c98b60eddd0169df613fb8aaf3d2ac969a4fdceebcb7e9147fd8771afde7bcb8,2024-11-06T20:15:06.917000 CVE-2024-9341,0,0,c98b60eddd0169df613fb8aaf3d2ac969a4fdceebcb7e9147fd8771afde7bcb8,2024-11-06T20:15:06.917000
CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000 CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000
CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000 CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000
CVE-2024-9346,0,0,62d32d35d45fd426e51a0ed8886468a70178025d3407ee17aee209be78f55958,2024-10-15T12:58:51.050000 CVE-2024-9346,0,0,62d32d35d45fd426e51a0ed8886468a70178025d3407ee17aee209be78f55958,2024-10-15T12:58:51.050000
@ -268301,8 +268309,8 @@ CVE-2024-9667,0,0,4c2cf3e987949daa6f6783b329a60c01d9a6ec3570b24191ca01f99d0f544e
CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000 CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000
CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000 CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000
CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000 CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000
CVE-2024-9675,0,1,3cadd63f68fceef4cb7f647684ea61e6a2900e849efc03dcf4b2582d5452b03c,2024-11-06T20:15:07.083000 CVE-2024-9675,0,0,3cadd63f68fceef4cb7f647684ea61e6a2900e849efc03dcf4b2582d5452b03c,2024-11-06T20:15:07.083000
CVE-2024-9676,0,1,46624241f6a62cf8ced9778d99fdffe768deb7f9be20051bd0eb0c649c38f427,2024-11-06T20:15:07.410000 CVE-2024-9676,0,0,46624241f6a62cf8ced9778d99fdffe768deb7f9be20051bd0eb0c649c38f427,2024-11-06T20:15:07.410000
CVE-2024-9677,0,0,944e049c847e061867c66e6b586a0cd99260b04bc2e2059d736567bf47cae00c,2024-10-23T15:12:34.673000 CVE-2024-9677,0,0,944e049c847e061867c66e6b586a0cd99260b04bc2e2059d736567bf47cae00c,2024-10-23T15:12:34.673000
CVE-2024-9680,0,0,db0e4e19e09673238ffe3dfbb8e95974e9346a75b4fd6d9319c03e5970bb644e,2024-10-16T15:07:36.123000 CVE-2024-9680,0,0,db0e4e19e09673238ffe3dfbb8e95974e9346a75b4fd6d9319c03e5970bb644e,2024-10-16T15:07:36.123000
CVE-2024-9681,0,0,5184b45d0c5be56c6e66f5f4d21584d3fd220046fb9bac6604ac868b54d81bd8,2024-11-06T18:17:17.287000 CVE-2024-9681,0,0,5184b45d0c5be56c6e66f5f4d21584d3fd220046fb9bac6604ac868b54d81bd8,2024-11-06T18:17:17.287000
@ -268310,7 +268318,7 @@ CVE-2024-9683,0,0,a648737766df3deb74ddc86e7dcd00883598b7b3c943d9054e11451b5f1854
CVE-2024-9685,0,0,a93c724a8b2ee6ce4a46c54a35028c939ad55b1fb441a5b479f473edc57de420,2024-10-15T14:30:00.483000 CVE-2024-9685,0,0,a93c724a8b2ee6ce4a46c54a35028c939ad55b1fb441a5b479f473edc57de420,2024-10-15T14:30:00.483000
CVE-2024-9686,0,0,8a91e1ae5070fa70337820c934475166fa3e061411ab7464abf260ed961a0668,2024-11-06T16:19:04.333000 CVE-2024-9686,0,0,8a91e1ae5070fa70337820c934475166fa3e061411ab7464abf260ed961a0668,2024-11-06T16:19:04.333000
CVE-2024-9687,0,0,ae8c4791dae243694c67044fa0088a221548cce6d43bc08144a537d590a79ff2,2024-10-17T21:11:14.197000 CVE-2024-9687,0,0,ae8c4791dae243694c67044fa0088a221548cce6d43bc08144a537d590a79ff2,2024-10-17T21:11:14.197000
CVE-2024-9689,0,1,3b3e5990fb9f08a51cd41a7e6a396c2471cfce792d4015e2d1365961bc64adf9,2024-11-06T19:14:53.737000 CVE-2024-9689,0,0,3b3e5990fb9f08a51cd41a7e6a396c2471cfce792d4015e2d1365961bc64adf9,2024-11-06T19:14:53.737000
CVE-2024-9692,0,0,6637a78c6a5a322d069f0f0384d674a49925fbfbbf719ba95a3af042d35fdc19,2024-10-25T12:56:07.750000 CVE-2024-9692,0,0,6637a78c6a5a322d069f0f0384d674a49925fbfbbf719ba95a3af042d35fdc19,2024-10-25T12:56:07.750000
CVE-2024-9696,0,0,78e7cb06b620e1544d9c6811ae0c44cf981cc195d0067b351c711666292c356e,2024-10-15T12:57:46.880000 CVE-2024-9696,0,0,78e7cb06b620e1544d9c6811ae0c44cf981cc195d0067b351c711666292c356e,2024-10-15T12:57:46.880000
CVE-2024-9700,0,0,ee544a9b692e7ab9f9ab56395ca8011eb3604c34474b906ade007707a048f142,2024-11-01T12:57:03.417000 CVE-2024-9700,0,0,ee544a9b692e7ab9f9ab56395ca8011eb3604c34474b906ade007707a048f142,2024-11-01T12:57:03.417000
@ -268401,7 +268409,7 @@ CVE-2024-9896,0,0,09339b3269859e496224a4ee93cb949746eeb659cdbf7ff07d2c92a00e93ed
CVE-2024-9897,0,0,c000f038202bbdf161648c8f1d74fa0a88aad69aa13c730474d96a3fd2473014,2024-11-01T15:27:56.797000 CVE-2024-9897,0,0,c000f038202bbdf161648c8f1d74fa0a88aad69aa13c730474d96a3fd2473014,2024-11-01T15:27:56.797000
CVE-2024-9898,0,0,34647a8f54872789fb9d153b7e32e611f940664cb6907ab09e4df7e32cdaa8ba,2024-10-18T12:52:33.507000 CVE-2024-9898,0,0,34647a8f54872789fb9d153b7e32e611f940664cb6907ab09e4df7e32cdaa8ba,2024-10-18T12:52:33.507000
CVE-2024-9899,0,0,6c76ba1fcc7597d7958a7e74c7de009221352c8fe34414d847a1d4d85ee09e27,2024-10-23T21:15:15.050000 CVE-2024-9899,0,0,6c76ba1fcc7597d7958a7e74c7de009221352c8fe34414d847a1d4d85ee09e27,2024-10-23T21:15:15.050000
CVE-2024-9902,0,1,5a17b86729ea7d243eb9cea611038373d4bbb9ba8a32113c474ad669aed65087,2024-11-06T20:15:07.820000 CVE-2024-9902,0,0,5a17b86729ea7d243eb9cea611038373d4bbb9ba8a32113c474ad669aed65087,2024-11-06T20:15:07.820000
CVE-2024-9903,0,0,244e0ad624c75743e190bc7da6a1b45fe195aaf738d59f8decfde97c8722448f,2024-10-15T12:57:46.880000 CVE-2024-9903,0,0,244e0ad624c75743e190bc7da6a1b45fe195aaf738d59f8decfde97c8722448f,2024-10-15T12:57:46.880000
CVE-2024-9904,0,0,b8f5bdf1fde920247f061f9c3939c42469f53e3148abd589ac11ba36d4728079,2024-10-15T12:57:46.880000 CVE-2024-9904,0,0,b8f5bdf1fde920247f061f9c3939c42469f53e3148abd589ac11ba36d4728079,2024-10-15T12:57:46.880000
CVE-2024-9905,0,0,09e20420cf063b331c2f2444287faaf461bdb42e483d150bc77bc6c327c543d3,2024-10-16T22:12:18.153000 CVE-2024-9905,0,0,09e20420cf063b331c2f2444287faaf461bdb42e483d150bc77bc6c327c543d3,2024-10-16T22:12:18.153000

Can't render this file because it is too large.