From 570bac39793d768e80d7706d09770113c94a4b71 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 15 Nov 2024 03:03:23 +0000 Subject: [PATCH] Auto-Update: 2024-11-15T03:00:20.217619+00:00 --- CVE-2024/CVE-2024-111xx/CVE-2024-11120.json | 67 +++++++++++++++++++++ CVE-2024/CVE-2024-523xx/CVE-2024-52308.json | 4 +- CVE-2024/CVE-2024-94xx/CVE-2024-9463.json | 6 +- CVE-2024/CVE-2024-94xx/CVE-2024-9465.json | 6 +- README.md | 26 +++----- _state.csv | 29 ++++----- 6 files changed, 103 insertions(+), 35 deletions(-) create mode 100644 CVE-2024/CVE-2024-111xx/CVE-2024-11120.json diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11120.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11120.json new file mode 100644 index 00000000000..ff33b2529d5 --- /dev/null +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11120.json @@ -0,0 +1,67 @@ +{ + "id": "CVE-2024-11120", + "sourceIdentifier": "twcert@cert.org.tw", + "published": "2024-11-15T02:15:17.757", + "lastModified": "2024-11-15T02:15:17.757", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "twcert@cert.org.tw", + "tags": [ + "unsupported-when-assigned" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "twcert@cert.org.tw", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://www.twcert.org.tw/en/cp-139-8237-26d7a-2.html", + "source": "twcert@cert.org.tw" + }, + { + "url": "https://www.twcert.org.tw/tw/cp-132-8236-d4836-1.html", + "source": "twcert@cert.org.tw" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52308.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52308.json index c03cfee8047..845e9de5173 100644 --- a/CVE-2024/CVE-2024-523xx/CVE-2024-52308.json +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52308.json @@ -2,13 +2,13 @@ "id": "CVE-2024-52308", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-14T23:15:05.727", - "lastModified": "2024-11-14T23:15:05.727", + "lastModified": "2024-11-15T01:15:03.740", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "The GitHub CLI version 2.6.1 and earlier are vulnerable to remote code execution through a malicious codespace SSH server when using `gh codespace ssh` or `gh codespace logs` commands. This has been patched in the cli v2.62.0.\n\nDevelopers connect to remote codespaces through an SSH server running within the devcontainer, which is generally provided through the [default devcontainer image](https://docs.github.com/en/codespaces/setting-up-your-project-for-codespaces/adding-a-dev-container-configuration/introduction-to-dev-containers#using-the-default-dev-container-configuration). GitHub CLI [retrieves SSH connection details](https://github.com/cli/cli/blob/30066b0042d0c5928d959e288144300cb28196c9/internal/codespaces/rpc/invoker.go#L230-L244), such as remote username, which is used in [executing `ssh` commands](https://github.com/cli/cli/blob/e356c69a6f0125cfaac782c35acf77314f18908d/pkg/cmd/codespace/ssh.go#L263) for `gh codespace ssh` or `gh codespace logs` commands.\n\nThis exploit occurs when a malicious third-party devcontainer contains a modified SSH server that injects `ssh` arguments within the SSH connection details. `gh codespace ssh` and `gh codespace logs` commands could execute arbitrary code on the user's workstation if the remote username contains something like `-oProxyCommand=\"echo hacked\" #`. The `-oProxyCommand` flag causes `ssh` to execute the provided command while `#` shell comment causes any other `ssh` arguments to be ignored.\n\nIn `2.62.0`, the remote username information is being validated before being used." + "value": "The GitHub CLI version 2.6.1 and earlier are vulnerable to remote code execution through a malicious codespace SSH server when using `gh codespace ssh` or `gh codespace logs` commands. This has been patched in the cli v2.62.0.\n\nDevelopers connect to remote codespaces through an SSH server running within the devcontainer, which is generally provided through the [default devcontainer image]( https://docs.github.com/en/codespaces/setting-up-your-project-for-codespaces/adding-a-dev-container-... https://docs.github.com/en/codespaces/setting-up-your-project-for-codespaces/adding-a-dev-container-configuration/introduction-to-dev-containers#using-the-default-dev-container-configuration) . GitHub CLI [retrieves SSH connection details]( https://github.com/cli/cli/blob/30066b0042d0c5928d959e288144300cb28196c9/internal/codespaces/rpc/inv... https://github.com/cli/cli/blob/30066b0042d0c5928d959e288144300cb28196c9/internal/codespaces/rpc/invoker.go#L230-L244 ), such as remote username, which is used in [executing `ssh` commands]( https://github.com/cli/cli/blob/e356c69a6f0125cfaac782c35acf77314f18908d/pkg/cmd/codespace/ssh.go#L2... https://github.com/cli/cli/blob/e356c69a6f0125cfaac782c35acf77314f18908d/pkg/cmd/codespace/ssh.go#L263 ) for `gh codespace ssh` or `gh codespace logs` commands.\n\nThis exploit occurs when a malicious third-party devcontainer contains a modified SSH server that injects `ssh` arguments within the SSH connection details. `gh codespace ssh` and `gh codespace logs` commands could execute arbitrary code on the user's workstation if the remote username contains something like `-oProxyCommand=\"echo hacked\" #`. The `-oProxyCommand` flag causes `ssh` to execute the provided command while `#` shell comment causes any other `ssh` arguments to be ignored.\n\nIn `2.62.0`, the remote username information is being validated before being used." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9463.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9463.json index 0fb6eeaf1ef..48eaeb10787 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9463.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9463.json @@ -2,9 +2,13 @@ "id": "CVE-2024-9463", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-10-09T17:15:19.973", - "lastModified": "2024-10-15T15:05:25.997", + "lastModified": "2024-11-15T02:00:01.687", "vulnStatus": "Analyzed", "cveTags": [], + "cisaExploitAdd": "2024-11-14", + "cisaActionDue": "2024-12-05", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Palo Alto Networks Expedition OS Command Injection Vulnerability", "descriptions": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9465.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9465.json index 089f16b7143..3b9b94997e8 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9465.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9465.json @@ -2,9 +2,13 @@ "id": "CVE-2024-9465", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-10-09T17:15:20.287", - "lastModified": "2024-10-17T06:15:04.510", + "lastModified": "2024-11-15T02:00:01.687", "vulnStatus": "Modified", "cveTags": [], + "cisaExploitAdd": "2024-11-14", + "cisaActionDue": "2024-12-05", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Palo Alto Networks Expedition SQL Injection Vulnerability", "descriptions": [ { "lang": "en", diff --git a/README.md b/README.md index 4078d2debce..dee27d5bdb6 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-15T00:55:42.101322+00:00 +2024-11-15T03:00:20.217619+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-14T23:23:52.997000+00:00 +2024-11-15T02:15:17.757000+00:00 ``` ### Last Data Feed Release @@ -27,37 +27,29 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2024-11-14T01:00:10.090725+00:00 +2024-11-15T01:00:10.103322+00:00 ``` ### Total Number of included CVEs ```plain -269788 +269789 ``` ### CVEs added in the last Commit -Recently added CVEs: `9` +Recently added CVEs: `1` -- [CVE-2017-13227](CVE-2017/CVE-2017-132xx/CVE-2017-13227.json) (`2024-11-14T23:15:05.013`) -- [CVE-2024-41206](CVE-2024/CVE-2024-412xx/CVE-2024-41206.json) (`2024-11-14T23:15:05.197`) -- [CVE-2024-41209](CVE-2024/CVE-2024-412xx/CVE-2024-41209.json) (`2024-11-14T23:15:05.277`) -- [CVE-2024-41217](CVE-2024/CVE-2024-412xx/CVE-2024-41217.json) (`2024-11-14T23:15:05.370`) -- [CVE-2024-49776](CVE-2024/CVE-2024-497xx/CVE-2024-49776.json) (`2024-11-14T23:15:05.457`) -- [CVE-2024-49777](CVE-2024/CVE-2024-497xx/CVE-2024-49777.json) (`2024-11-14T23:15:05.547`) -- [CVE-2024-49778](CVE-2024/CVE-2024-497xx/CVE-2024-49778.json) (`2024-11-14T23:15:05.643`) -- [CVE-2024-52308](CVE-2024/CVE-2024-523xx/CVE-2024-52308.json) (`2024-11-14T23:15:05.727`) -- [CVE-2024-52613](CVE-2024/CVE-2024-526xx/CVE-2024-52613.json) (`2024-11-14T23:15:05.967`) +- [CVE-2024-11120](CVE-2024/CVE-2024-111xx/CVE-2024-11120.json) (`2024-11-15T02:15:17.757`) ### CVEs modified in the last Commit Recently modified CVEs: `3` -- [CVE-2024-48428](CVE-2024/CVE-2024-484xx/CVE-2024-48428.json) (`2024-11-14T23:15:02.760`) -- [CVE-2024-49381](CVE-2024/CVE-2024-493xx/CVE-2024-49381.json) (`2024-11-14T23:04:21.637`) -- [CVE-2024-51377](CVE-2024/CVE-2024-513xx/CVE-2024-51377.json) (`2024-11-14T23:23:52.997`) +- [CVE-2024-52308](CVE-2024/CVE-2024-523xx/CVE-2024-52308.json) (`2024-11-15T01:15:03.740`) +- [CVE-2024-9463](CVE-2024/CVE-2024-94xx/CVE-2024-9463.json) (`2024-11-15T02:00:01.687`) +- [CVE-2024-9465](CVE-2024/CVE-2024-94xx/CVE-2024-9465.json) (`2024-11-15T02:00:01.687`) ## Download and Usage diff --git a/_state.csv b/_state.csv index c6f7d744078..b5413b172f7 100644 --- a/_state.csv +++ b/_state.csv @@ -96969,7 +96969,7 @@ CVE-2017-13221,0,0,57e3b08fba40dbad7e13f1ecaef036f44baab1a7137260bac79cedbd0aaba CVE-2017-13222,0,0,ebfdf42baf601798adad1e504ba051d585896884b139bf563ee706b616493897,2018-01-24T16:09:05.727000 CVE-2017-13225,0,0,435256662af53bc84b96c8ecfbcc5e36a7df54bbec82fdff4a451c067fc3516f,2018-01-25T14:42:54.447000 CVE-2017-13226,0,0,a63799b06443b94461c2cc06e2e1817db591c161b20b7ad48cffc3add8fc02f9,2019-10-03T00:03:26.223000 -CVE-2017-13227,1,1,2363cf93995a6f4a056a60aae17e50895cee0cf2a76cdbce9de1dc6613a4ef0f,2024-11-14T23:15:05.013000 +CVE-2017-13227,0,0,2363cf93995a6f4a056a60aae17e50895cee0cf2a76cdbce9de1dc6613a4ef0f,2024-11-14T23:15:05.013000 CVE-2017-13228,0,0,d6d00cc11b40a6f7cf8c7c7b74c3a16d54ba4bf0782c9a7d7071e50c41c579df,2018-03-13T14:41:27.033000 CVE-2017-13229,0,0,7ebc8fa8286ba1d5821a34ad554783788a44485aedcb5ab1d772a4b9b365c210,2018-03-06T19:52:36.463000 CVE-2017-13230,0,0,d8a847f5c7c6d9cdce8e19c6fc7435655e7234b7d29ac67a202b7766226c4533,2018-03-13T14:40:12.123000 @@ -243095,6 +243095,7 @@ CVE-2024-11115,0,0,6752a3f15fe7742272035ac5069774108f37f03dae8259d5e310243c06e07 CVE-2024-11116,0,0,50b6a7b0baae7d93d967770820ad4acb1265e0c8d7e355f7414e720fb7141658,2024-11-13T17:01:16.850000 CVE-2024-11117,0,0,44ab0c5f984ce9aed4e52f00adac2e7b146a348c1dbadd3cdaa1ba5594ee10da,2024-11-13T17:01:16.850000 CVE-2024-1112,0,0,a074043c8f95f29514c3f59ea2279c09f17d99731ab21d34b196cbe82c1cf23d,2024-02-09T14:34:41.827000 +CVE-2024-11120,1,1,419abe138b2f7cd49e5a7bf2988b4cdc20f78889f5b3881f13b8849759bcb762,2024-11-15T02:15:17.757000 CVE-2024-11121,0,0,78c7f01d1528f5af7c7c0921f9908f534edd8a79fcf13b8e8ba56ec04209ef7f,2024-11-12T16:15:20.770000 CVE-2024-11122,0,0,8b39eb171f905156949631c8c8e8a5af8e744e4719ba7b47f1a185280518c4e7,2024-11-12T16:15:20.873000 CVE-2024-11123,0,0,2c2c3a47aaef9d48349e1017759c96035abab5e51ba4d62444aa173a7ccd2b65,2024-11-12T16:15:20.990000 @@ -259573,10 +259574,10 @@ CVE-2024-41184,0,0,460d3d6d07916ac0f7c6ce162599c802c196ea0f25bca5ddf54b8e8b24963 CVE-2024-4119,0,0,1787463dab796293e9249fc34f7a40843b12d1d129a7d5ccdb513e5ec2672067,2024-06-04T19:20:30.247000 CVE-2024-4120,0,0,820754c86895fc4e7f3a6d10baae3c2abd537610acf37474f492c12f46cc8b59,2024-06-04T19:20:30.353000 CVE-2024-41200,0,0,c6634d5ee9208991d605965f74d59d477ce80a275c83b2ac8c83f9990bd5e19e,2024-11-05T22:35:06.980000 -CVE-2024-41206,1,1,7e6eccccc069d737de1b776f4e9312e30c44dcadcdc2055f772810c0c5b346e7,2024-11-14T23:15:05.197000 -CVE-2024-41209,1,1,a4e7aaed923cefcf23362f8e10e2d838de14426aa8be093076feb4ce9f5618ba,2024-11-14T23:15:05.277000 +CVE-2024-41206,0,0,7e6eccccc069d737de1b776f4e9312e30c44dcadcdc2055f772810c0c5b346e7,2024-11-14T23:15:05.197000 +CVE-2024-41209,0,0,a4e7aaed923cefcf23362f8e10e2d838de14426aa8be093076feb4ce9f5618ba,2024-11-14T23:15:05.277000 CVE-2024-4121,0,0,62ca255cdda2e26a7a0224389681466727634cf0831afab2f14e58a1cb5bd920,2024-06-04T19:20:30.460000 -CVE-2024-41217,1,1,ac2469ae081aee00a6ebee50dac48eceae280554daf52e5d74373d7e6d88920f,2024-11-14T23:15:05.370000 +CVE-2024-41217,0,0,ac2469ae081aee00a6ebee50dac48eceae280554daf52e5d74373d7e6d88920f,2024-11-14T23:15:05.370000 CVE-2024-4122,0,0,3d81c7d42348f56045cc538515e4a2e136e243adec928773370fb697e11bd281,2024-06-04T19:20:30.560000 CVE-2024-41226,0,0,a3a85fa64d0c123f261294a19d764a3608a61e848957876669f922adbd8d3b3c,2024-09-03T21:15:15.923000 CVE-2024-41228,0,0,f3d365bd2199687dcff5eebde6177461134036d09c1cc3d7eb6b2cb72c0f76b0,2024-09-26T13:32:55.343000 @@ -264142,7 +264143,7 @@ CVE-2024-48424,0,0,40269a486047942b0c54d704b8b037cd3035d9ce415f6a7c6672231218b45 CVE-2024-48425,0,0,b7eeb0390e7509460e2ea67ebb1efb7a20815aad1587b963750ef8a2fc35ee7d,2024-10-28T19:35:28.823000 CVE-2024-48426,0,0,22eae115788dfb6a3644903c8f26a6434c39a09ebbab312f7ce1d4567eeebedc,2024-10-29T20:35:31.967000 CVE-2024-48427,0,0,7d45011eb8c4b754b119852367badea7e81893db34682583fff9c26b665752d1,2024-10-31T00:07:25.997000 -CVE-2024-48428,0,1,aa3d04fa35bedb24aa57faf7fb824ad94ab29d91873983596e253a94900b8c80,2024-11-14T23:15:02.760000 +CVE-2024-48428,0,0,aa3d04fa35bedb24aa57faf7fb824ad94ab29d91873983596e253a94900b8c80,2024-11-14T23:15:02.760000 CVE-2024-4843,0,0,b365eeabe96e8dec3f961357ff342df21bbefef716d14e64f95fe3929d1e363a,2024-05-16T13:03:05.353000 CVE-2024-4844,0,0,b1cdfd63abb8075cb2a12dc44eacca2f75c6048adf9c4ea8b8b7c6072669030d,2024-05-16T13:03:05.353000 CVE-2024-48440,0,0,3e5da93f3d98711cf31668d28b9aca8f0ae7e630b3695e355db661d67a615b49,2024-10-25T20:35:11.890000 @@ -264580,7 +264581,7 @@ CVE-2024-49377,0,0,f0a66be903c1ae0848c0330b2ecd5bcb10926f277636c57c6f6f956b317ea CVE-2024-49378,0,0,09a13f2bc12578e659c5acb1c73f93e5796dca0b69672708f3a85d0256e97128,2024-10-28T13:58:09.230000 CVE-2024-49379,0,0,3d849c956546825875132535f54762320e63df7b50f3a78cf46a30babea614e8,2024-11-14T16:35:15.103000 CVE-2024-49380,0,0,f56d412280c28c68a65e58c4bcb66239a0fd300a5ecc1079da487338d842284a,2024-10-28T13:58:09.230000 -CVE-2024-49381,0,1,bb9988af81733ccd03de48d75bc197c7dec21a72eb70ce010eb71fafccaa1274,2024-11-14T23:04:21.637000 +CVE-2024-49381,0,0,bb9988af81733ccd03de48d75bc197c7dec21a72eb70ce010eb71fafccaa1274,2024-11-14T23:04:21.637000 CVE-2024-49382,0,0,cd14c2989a948ff9829f4d119b31d603af2c2c459b5f5d9afd11a73e5c1e5fec,2024-10-16T13:53:45.860000 CVE-2024-49383,0,0,8836e7d175d405b86f6d0105b03c4862827296be5b39fe5cde78189dfe892bb0,2024-10-16T13:53:04.380000 CVE-2024-49384,0,0,3ee9c94c4e7d62f73d98e9003a41428dea707c45ee737dda67404986a9c936b6,2024-10-16T13:52:19.317000 @@ -264775,9 +264776,9 @@ CVE-2024-49771,0,0,160fc663912b069ef891129905ae1be73f75e83c8368c487931bd9ae946e0 CVE-2024-49772,0,0,9281743e575857929b74a42ff17b0b9202ae9bb7ed1b47fefe705f7bd0b972d2,2024-11-13T20:19:54.597000 CVE-2024-49773,0,0,e7ad43d5c3fd7b249f682f0b65eb1709f39d3084c0fa75087a4fd4a2decb3591,2024-11-13T20:29:11.297000 CVE-2024-49774,0,0,ebd8a0eea0a53281f5f3ae3a93acb0432e3d9a4208605b56d1016ce02a10c1a5,2024-11-13T20:40:26.100000 -CVE-2024-49776,1,1,3d1ccd317f10894624792651edb12d0e80e06fe989d1fab4fe4cc74edd78eb45,2024-11-14T23:15:05.457000 -CVE-2024-49777,1,1,576c93bcbcdf87d22f75f1a7dfd252079adb9fc9dbf7209565d6f02cf537a981,2024-11-14T23:15:05.547000 -CVE-2024-49778,1,1,081fab9aa864a56a56b8081043da17977fbd331dbc940ba837e857bf2fe36645,2024-11-14T23:15:05.643000 +CVE-2024-49776,0,0,3d1ccd317f10894624792651edb12d0e80e06fe989d1fab4fe4cc74edd78eb45,2024-11-14T23:15:05.457000 +CVE-2024-49777,0,0,576c93bcbcdf87d22f75f1a7dfd252079adb9fc9dbf7209565d6f02cf537a981,2024-11-14T23:15:05.547000 +CVE-2024-49778,0,0,081fab9aa864a56a56b8081043da17977fbd331dbc940ba837e857bf2fe36645,2024-11-14T23:15:05.643000 CVE-2024-4978,0,0,5928c3b846f5437fa931d5f8f8094b6c99b5e796eec27a2a5602f4b07774db40,2024-05-31T16:03:52.247000 CVE-2024-4980,0,0,1d2b61808b4cae121d6a29c34adc83b7ce102dcc100d7578fef807794b8506ae,2024-05-22T12:46:53.887000 CVE-2024-4983,0,0,47e5eccd768078063df4e275a1ffdcd617ddbc2b7b8451c89e2e261cf23ec523,2024-06-27T12:47:19.847000 @@ -265660,7 +265661,7 @@ CVE-2024-51358,0,0,15a6b357b2a15ba2efd09a7258436a688d09605b686100927239b26110c73 CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000 CVE-2024-51362,0,0,a6e1a40cf5e527208990e8a764ceb58cfefd7f1b5e4a2c9e1905064ef69946f2,2024-11-06T20:35:35.750000 CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000 -CVE-2024-51377,0,1,cf00c0a6e7d0ac48895095961c732d7f23ec2a7e49679df67603156d82aefffb,2024-11-14T23:23:52.997000 +CVE-2024-51377,0,0,cf00c0a6e7d0ac48895095961c732d7f23ec2a7e49679df67603156d82aefffb,2024-11-14T23:23:52.997000 CVE-2024-51378,0,0,25041eea06e8de15fb868a226604237e266234c162cafb1c59832cc50427a9bb,2024-11-01T12:57:03.417000 CVE-2024-51379,0,0,2ac9e22a4ada4c046a62bb7cfce4898a690b6639726f7e96ec64275e3571bb6f,2024-11-06T18:17:17.287000 CVE-2024-5138,0,0,47c03094386326d2315f3415dc7d3ef94b00cbe65c94e42ace003fc1a8714791,2024-09-06T20:35:18.950000 @@ -266037,7 +266038,7 @@ CVE-2024-52301,0,0,091c40845cee35a6db54cae490564bdae10317d21b9b1b70a65b6fc331191 CVE-2024-52302,0,0,bec456bb6d847ca2f982f444c73f49a605fb31e8a54bf47ab023a23471898db3,2024-11-14T16:15:20.087000 CVE-2024-52305,0,0,dc609877fc9dfb62c6c6bc68486e8898c1a92ac08e89f322ce436991076d7cdb,2024-11-13T19:15:08.853000 CVE-2024-52306,0,0,59f18663771ceab92cba47c3e31ee5dd3eed1ee3c6f7144187a60ded4a98f970,2024-11-13T17:01:16.850000 -CVE-2024-52308,1,1,ce2fe749d6574c45534f7ff28c650824fb22a37edc3670a723e9f9b4e7f78f2f,2024-11-14T23:15:05.727000 +CVE-2024-52308,0,1,5f2903faaa6af73bb516cae7a392d6b05fcfeb189ded112b08497d75479336bb,2024-11-15T01:15:03.740000 CVE-2024-5231,0,0,255bed42ab2a064a39e6f8c88880296d2f7a7d154f3db6dc7f4df2fa244d299f,2024-06-04T19:21:02.640000 CVE-2024-52311,0,0,440cc6f6193f2a4b57d7c7c4a4f4b3f01242ca6df6bc89770050e09d3b499acf,2024-11-12T13:56:54.483000 CVE-2024-52312,0,0,e095caa38b1d55aa1661d9e6b591e2f5164609c3e5c2884b5f60aa22d851bdcc,2024-11-12T13:56:54.483000 @@ -266112,7 +266113,7 @@ CVE-2024-5258,0,0,51134eb56f05332c584317818ff995de56b2de598a9752cb1990f31f73c535 CVE-2024-5259,0,0,b3c664cd11ddb9db1b34b50011b18499fc5ac06e8b6b6a588e8cf7d8bc26fc37,2024-06-11T17:44:42.783000 CVE-2024-5260,0,0,1ea9956e2812efb1ad02a50e6e15b3c5419e86ea96923b6afc83449c65511582,2024-07-02T12:09:16.907000 CVE-2024-5261,0,0,0592ac8c89e0cb8027f6648912b9536cab36db7fb70868109d4e1f51168ecc2f,2024-06-25T18:50:42.040000 -CVE-2024-52613,1,1,3e383ee6275a668108ed2d62ea0f0dad8cbfea7922ad0b4d35817148dbb199c1,2024-11-14T23:15:05.967000 +CVE-2024-52613,0,0,3e383ee6275a668108ed2d62ea0f0dad8cbfea7922ad0b4d35817148dbb199c1,2024-11-14T23:15:05.967000 CVE-2024-5262,0,0,83603483afb7387d019b476baa2cae004e6d4e7f9b65a5997b6545bcd7a41b63,2024-06-11T17:18:50.600000 CVE-2024-5263,0,0,997be873c6f28955b5d0d8cb5df3c06ebeb17c50a7068003806eac08a0ed2846,2024-08-07T16:01:35.217000 CVE-2024-5264,0,0,7660c1edaddd779c29789898410be8f6784b9b682f1b3f0cb339e7e58b29768e,2024-06-21T17:18:00.973000 @@ -269464,9 +269465,9 @@ CVE-2024-9457,0,0,9e423d4cda70891a0b74c4852459db88bd5163f875d32e19ac8dac4b758e8e CVE-2024-9459,0,0,f79fcf5e24399662f2c8fe8a61d79ad22521a784ff705bf6fa7dcce2b4df0ff8,2024-11-06T15:29:04.917000 CVE-2024-9460,0,0,d6ff22c922d7573d861145a9f9c7a3aa2a44b6806bef76282f2615732b02479a,2024-10-08T14:33:42.703000 CVE-2024-9462,0,0,da874134bd4c6d4628ad3a17d1671b7f5c2018935fed477a57fc0d0990ff5d0e,2024-10-28T13:58:09.230000 -CVE-2024-9463,0,0,833fbe5400df3e16652b73757d66400db6c2e58ea10075ce0e9e52ee535a69f7,2024-10-15T15:05:25.997000 +CVE-2024-9463,0,1,4113bfcc0359b86f4600f4bd332ad0fb25180b65c5beb0ba03a5a18a0d79965c,2024-11-15T02:00:01.687000 CVE-2024-9464,0,0,2a950a39fbd8d03d9c46c09cf06c881d311182236743fa872a3d09d866901a80,2024-10-17T06:15:04.190000 -CVE-2024-9465,0,0,b0530209090d1bed821bb19c0251bb2e431fffeec23de7704111ce15419a57a6,2024-10-17T06:15:04.510000 +CVE-2024-9465,0,1,4ecfaf32a41dbb8eba12ed8cfc02218dbd1e623e37487ebd8f09d7020eb91be6,2024-11-15T02:00:01.687000 CVE-2024-9466,0,0,fd9458b730d3a9a669f2d9d658488af28ef360506c84b0ff287be2e6f400846d,2024-10-17T06:15:04.720000 CVE-2024-9467,0,0,75d04ab03e69b7f9e1a38d891f6aaa266a750bf286ffd9f476545cea603cc1a5,2024-10-15T15:09:13.297000 CVE-2024-9468,0,0,f7accbeda6900e100e8aad354b4e5585f782571ee82a35557f7f3b3ab3e92447,2024-10-10T12:51:56.987000