From 577c2d5ddaaa6da5ebc45ad636d2ed8cb5d702a3 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 12 Nov 2024 21:03:22 +0000 Subject: [PATCH] Auto-Update: 2024-11-12T21:00:19.683540+00:00 --- CVE-2023/CVE-2023-303xx/CVE-2023-30308.json | 39 +- CVE-2023/CVE-2023-398xx/CVE-2023-39804.json | 27 +- CVE-2023/CVE-2023-422xx/CVE-2023-42286.json | 14 +- CVE-2023/CVE-2023-442xx/CVE-2023-44255.json | 56 +++ CVE-2023/CVE-2023-475xx/CVE-2023-47543.json | 56 +++ CVE-2023/CVE-2023-501xx/CVE-2023-50176.json | 56 +++ CVE-2023/CVE-2023-512xx/CVE-2023-51219.json | 39 +- CVE-2023/CVE-2023-522xx/CVE-2023-52268.json | 29 ++ CVE-2023/CVE-2023-526xx/CVE-2023-52601.json | 39 +- CVE-2024/CVE-2024-102xx/CVE-2024-10217.json | 66 +++ CVE-2024/CVE-2024-102xx/CVE-2024-10218.json | 66 +++ CVE-2024/CVE-2024-15xx/CVE-2024-1556.json | 39 +- CVE-2024/CVE-2024-209xx/CVE-2024-20945.json | 22 +- CVE-2024/CVE-2024-210xx/CVE-2024-21021.json | 14 +- CVE-2024/CVE-2024-22xx/CVE-2024-2207.json | 56 +++ CVE-2024/CVE-2024-22xx/CVE-2024-2208.json | 56 +++ CVE-2024/CVE-2024-231xx/CVE-2024-23149.json | 27 +- CVE-2024/CVE-2024-236xx/CVE-2024-23666.json | 56 +++ CVE-2024/CVE-2024-247xx/CVE-2024-24795.json | 37 +- CVE-2024/CVE-2024-256xx/CVE-2024-25622.json | 68 ++- CVE-2024/CVE-2024-257xx/CVE-2024-25737.json | 39 +- CVE-2024/CVE-2024-260xx/CVE-2024-26011.json | 56 +++ CVE-2024/CVE-2024-263xx/CVE-2024-26311.json | 34 +- CVE-2024/CVE-2024-313xx/CVE-2024-31309.json | 27 +- CVE-2024/CVE-2024-314xx/CVE-2024-31496.json | 56 +++ CVE-2024/CVE-2024-321xx/CVE-2024-32116.json | 56 +++ CVE-2024/CVE-2024-321xx/CVE-2024-32117.json | 56 +++ CVE-2024/CVE-2024-321xx/CVE-2024-32118.json | 56 +++ CVE-2024/CVE-2024-335xx/CVE-2024-33505.json | 56 +++ CVE-2024/CVE-2024-335xx/CVE-2024-33510.json | 56 +++ CVE-2024/CVE-2024-338xx/CVE-2024-33803.json | 39 +- CVE-2024/CVE-2024-352xx/CVE-2024-35274.json | 56 +++ CVE-2024/CVE-2024-364xx/CVE-2024-36457.json | 14 +- CVE-2024/CVE-2024-365xx/CVE-2024-36507.json | 56 +++ CVE-2024/CVE-2024-365xx/CVE-2024-36509.json | 56 +++ CVE-2024/CVE-2024-365xx/CVE-2024-36513.json | 56 +++ CVE-2024/CVE-2024-38xx/CVE-2024-3855.json | 39 +- CVE-2024/CVE-2024-405xx/CVE-2024-40592.json | 56 +++ CVE-2024/CVE-2024-434xx/CVE-2024-43429.json | 14 +- CVE-2024/CVE-2024-436xx/CVE-2024-43613.json | 56 +++ CVE-2024/CVE-2024-439xx/CVE-2024-43928.json | 47 +- CVE-2024/CVE-2024-439xx/CVE-2024-43929.json | 47 +- CVE-2024/CVE-2024-451xx/CVE-2024-45114.json | 56 +++ CVE-2024/CVE-2024-451xx/CVE-2024-45147.json | 56 +++ CVE-2024/CVE-2024-453xx/CVE-2024-45396.json | 52 +- CVE-2024/CVE-2024-453xx/CVE-2024-45397.json | 69 ++- CVE-2024/CVE-2024-454xx/CVE-2024-45402.json | 53 ++- CVE-2024/CVE-2024-454xx/CVE-2024-45403.json | 63 ++- CVE-2024/CVE-2024-469xx/CVE-2024-46955.json | 41 +- CVE-2024/CVE-2024-469xx/CVE-2024-46956.json | 41 +- CVE-2024/CVE-2024-470xx/CVE-2024-47074.json | 54 ++- CVE-2024/CVE-2024-473xx/CVE-2024-47302.json | 47 +- CVE-2024/CVE-2024-473xx/CVE-2024-47308.json | 47 +- CVE-2024/CVE-2024-473xx/CVE-2024-47311.json | 47 +- CVE-2024/CVE-2024-473xx/CVE-2024-47314.json | 47 +- CVE-2024/CVE-2024-473xx/CVE-2024-47317.json | 49 +- CVE-2024/CVE-2024-473xx/CVE-2024-47318.json | 57 ++- CVE-2024/CVE-2024-473xx/CVE-2024-47321.json | 49 +- CVE-2024/CVE-2024-473xx/CVE-2024-47358.json | 47 +- CVE-2024/CVE-2024-473xx/CVE-2024-47359.json | 47 +- CVE-2024/CVE-2024-473xx/CVE-2024-47361.json | 47 +- CVE-2024/CVE-2024-474xx/CVE-2024-47426.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47427.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47428.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47429.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47430.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47431.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47432.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47433.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47434.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47435.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47436.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47437.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47438.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47439.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47440.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47441.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47442.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47443.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47444.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47445.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47446.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47449.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47450.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47451.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47452.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47453.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47454.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47455.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47456.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47457.json | 56 +++ CVE-2024/CVE-2024-474xx/CVE-2024-47458.json | 56 +++ CVE-2024/CVE-2024-476xx/CVE-2024-47636.json | 6 +- CVE-2024/CVE-2024-478xx/CVE-2024-47830.json | 63 ++- CVE-2024/CVE-2024-490xx/CVE-2024-49042.json | 56 +++ CVE-2024/CVE-2024-495xx/CVE-2024-49515.json | 56 +++ CVE-2024/CVE-2024-495xx/CVE-2024-49516.json | 56 +++ CVE-2024/CVE-2024-495xx/CVE-2024-49517.json | 56 +++ CVE-2024/CVE-2024-495xx/CVE-2024-49518.json | 56 +++ CVE-2024/CVE-2024-495xx/CVE-2024-49519.json | 56 +++ CVE-2024/CVE-2024-495xx/CVE-2024-49520.json | 56 +++ CVE-2024/CVE-2024-495xx/CVE-2024-49525.json | 56 +++ CVE-2024/CVE-2024-500xx/CVE-2024-50095.json | 117 ++++- CVE-2024/CVE-2024-509xx/CVE-2024-50990.json | 39 +- CVE-2024/CVE-2024-509xx/CVE-2024-50991.json | 39 +- CVE-2024/CVE-2024-510xx/CVE-2024-51054.json | 39 +- CVE-2024/CVE-2024-511xx/CVE-2024-51186.json | 39 +- CVE-2024/CVE-2024-517xx/CVE-2024-51720.json | 14 +- CVE-2024/CVE-2024-517xx/CVE-2024-51721.json | 56 +++ CVE-2024/CVE-2024-517xx/CVE-2024-51722.json | 56 +++ CVE-2024/CVE-2024-520xx/CVE-2024-52010.json | 24 +- CVE-2024/CVE-2024-523xx/CVE-2024-52301.json | 78 +++ CVE-2024/CVE-2024-525xx/CVE-2024-52530.json | 39 +- CVE-2024/CVE-2024-525xx/CVE-2024-52531.json | 39 +- CVE-2024/CVE-2024-525xx/CVE-2024-52532.json | 39 +- CVE-2024/CVE-2024-64xx/CVE-2024-6400.json | 49 +- CVE-2024/CVE-2024-64xx/CVE-2024-6443.json | 62 ++- CVE-2024/CVE-2024-75xx/CVE-2024-7516.json | 78 +++ CVE-2024/CVE-2024-80xx/CVE-2024-8074.json | 24 +- CVE-2024/CVE-2024-85xx/CVE-2024-8534.json | 78 +++ CVE-2024/CVE-2024-85xx/CVE-2024-8535.json | 66 +++ CVE-2024/CVE-2024-95xx/CVE-2024-9576.json | 58 ++- README.md | 110 ++--- _state.csv | 497 +++++++++++--------- 124 files changed, 6339 insertions(+), 413 deletions(-) create mode 100644 CVE-2023/CVE-2023-442xx/CVE-2023-44255.json create mode 100644 CVE-2023/CVE-2023-475xx/CVE-2023-47543.json create mode 100644 CVE-2023/CVE-2023-501xx/CVE-2023-50176.json create mode 100644 CVE-2023/CVE-2023-522xx/CVE-2023-52268.json create mode 100644 CVE-2024/CVE-2024-102xx/CVE-2024-10217.json create mode 100644 CVE-2024/CVE-2024-102xx/CVE-2024-10218.json create mode 100644 CVE-2024/CVE-2024-22xx/CVE-2024-2207.json create mode 100644 CVE-2024/CVE-2024-22xx/CVE-2024-2208.json create mode 100644 CVE-2024/CVE-2024-236xx/CVE-2024-23666.json create mode 100644 CVE-2024/CVE-2024-260xx/CVE-2024-26011.json create mode 100644 CVE-2024/CVE-2024-314xx/CVE-2024-31496.json create mode 100644 CVE-2024/CVE-2024-321xx/CVE-2024-32116.json create mode 100644 CVE-2024/CVE-2024-321xx/CVE-2024-32117.json create mode 100644 CVE-2024/CVE-2024-321xx/CVE-2024-32118.json create mode 100644 CVE-2024/CVE-2024-335xx/CVE-2024-33505.json create mode 100644 CVE-2024/CVE-2024-335xx/CVE-2024-33510.json create mode 100644 CVE-2024/CVE-2024-352xx/CVE-2024-35274.json create mode 100644 CVE-2024/CVE-2024-365xx/CVE-2024-36507.json create mode 100644 CVE-2024/CVE-2024-365xx/CVE-2024-36509.json create mode 100644 CVE-2024/CVE-2024-365xx/CVE-2024-36513.json create mode 100644 CVE-2024/CVE-2024-405xx/CVE-2024-40592.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43613.json create mode 100644 CVE-2024/CVE-2024-451xx/CVE-2024-45114.json create mode 100644 CVE-2024/CVE-2024-451xx/CVE-2024-45147.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47426.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47427.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47428.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47429.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47430.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47431.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47432.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47433.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47434.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47435.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47436.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47437.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47438.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47439.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47440.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47441.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47442.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47443.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47444.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47445.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47446.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47449.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47450.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47451.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47452.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47453.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47454.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47455.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47456.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47457.json create mode 100644 CVE-2024/CVE-2024-474xx/CVE-2024-47458.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49042.json create mode 100644 CVE-2024/CVE-2024-495xx/CVE-2024-49515.json create mode 100644 CVE-2024/CVE-2024-495xx/CVE-2024-49516.json create mode 100644 CVE-2024/CVE-2024-495xx/CVE-2024-49517.json create mode 100644 CVE-2024/CVE-2024-495xx/CVE-2024-49518.json create mode 100644 CVE-2024/CVE-2024-495xx/CVE-2024-49519.json create mode 100644 CVE-2024/CVE-2024-495xx/CVE-2024-49520.json create mode 100644 CVE-2024/CVE-2024-495xx/CVE-2024-49525.json create mode 100644 CVE-2024/CVE-2024-517xx/CVE-2024-51721.json create mode 100644 CVE-2024/CVE-2024-517xx/CVE-2024-51722.json create mode 100644 CVE-2024/CVE-2024-523xx/CVE-2024-52301.json create mode 100644 CVE-2024/CVE-2024-75xx/CVE-2024-7516.json create mode 100644 CVE-2024/CVE-2024-85xx/CVE-2024-8534.json create mode 100644 CVE-2024/CVE-2024-85xx/CVE-2024-8535.json diff --git a/CVE-2023/CVE-2023-303xx/CVE-2023-30308.json b/CVE-2023/CVE-2023-303xx/CVE-2023-30308.json index 362c3b76544..2914ef970ce 100644 --- a/CVE-2023/CVE-2023-303xx/CVE-2023-30308.json +++ b/CVE-2023/CVE-2023-303xx/CVE-2023-30308.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30308", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T20:16:20.453", - "lastModified": "2024-05-29T13:02:09.280", + "lastModified": "2024-11-12T19:35:00.843", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema descubierto en los enrutadores Ruijie EG210G-P, Ruijie EG105G-V2, Ruijie NBR y Ruijie EG105G permite a los atacantes secuestrar sesiones TCP, lo que podr\u00eda provocar una denegaci\u00f3n de servicio." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], "references": [ { "url": "https://www.ndss-symposium.org/ndss-paper/exploiting-sequence-number-leakage-tcp-hijacking-in-nat-enabled-wi-fi-networks/", diff --git a/CVE-2023/CVE-2023-398xx/CVE-2023-39804.json b/CVE-2023/CVE-2023-398xx/CVE-2023-39804.json index 20958361a3e..6ba64cea962 100644 --- a/CVE-2023/CVE-2023-398xx/CVE-2023-39804.json +++ b/CVE-2023/CVE-2023-398xx/CVE-2023-39804.json @@ -2,7 +2,7 @@ "id": "CVE-2023-39804", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-27T04:15:08.897", - "lastModified": "2024-03-27T12:29:30.307", + "lastModified": "2024-11-12T19:35:01.960", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En GNU tar anterior a 1.35, los atributos de extensi\u00f3n mal manejados en un archivo PAX pueden provocar un bloqueo de la aplicaci\u00f3n en xheader.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1058079", diff --git a/CVE-2023/CVE-2023-422xx/CVE-2023-42286.json b/CVE-2023/CVE-2023-422xx/CVE-2023-42286.json index a5f6ffe1cad..a7e82614566 100644 --- a/CVE-2023/CVE-2023-422xx/CVE-2023-42286.json +++ b/CVE-2023/CVE-2023-422xx/CVE-2023-42286.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42286", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-14T22:15:22.277", - "lastModified": "2024-03-15T12:53:06.423", + "lastModified": "2024-11-12T19:35:02.187", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -16,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://github.com/Nacl122/CVEReport/blob/main/CVE-2023-42286/CVE-2023-42286.md", diff --git a/CVE-2023/CVE-2023-442xx/CVE-2023-44255.json b/CVE-2023/CVE-2023-442xx/CVE-2023-44255.json new file mode 100644 index 00000000000..34a8c51d801 --- /dev/null +++ b/CVE-2023/CVE-2023-442xx/CVE-2023-44255.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-44255", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-11-12T19:15:06.850", + "lastModified": "2024-11-12T19:15:06.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An exposure of sensitive information to an unauthorized actor [CWE-200] in Fortinet FortiManager before 7.4.2, FortiAnalyzer before 7.4.2 and FortiAnalyzer-BigData before 7.2.5 may allow a privileged attacker with administrative read permissions to read event logs of another adom via crafted HTTP or HTTPs requests." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-359" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-267", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-475xx/CVE-2023-47543.json b/CVE-2023/CVE-2023-475xx/CVE-2023-47543.json new file mode 100644 index 00000000000..2a95f7a4840 --- /dev/null +++ b/CVE-2023/CVE-2023-475xx/CVE-2023-47543.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-47543", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-11-12T19:15:07.110", + "lastModified": "2024-11-12T19:15:07.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authorization bypass through user-controlled key vulnerability [CWE-639] in Fortinet FortiPortal version 7.0.0 through 7.0.3 allows an authenticated attacker to interact with ressources of other organizations via HTTP or HTTPS requests." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-448", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-501xx/CVE-2023-50176.json b/CVE-2023/CVE-2023-501xx/CVE-2023-50176.json new file mode 100644 index 00000000000..1f855882124 --- /dev/null +++ b/CVE-2023/CVE-2023-501xx/CVE-2023-50176.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-50176", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-11-12T19:15:07.360", + "lastModified": "2024-11-12T19:15:07.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A session fixation in Fortinet FortiOS version 7.4.0 through 7.4.3 and 7.2.0 through 7.2.7 and 7.0.0 through 7.0.13 allows attacker to execute unauthorized code or commands via phishing SAML authentication link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-475", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-512xx/CVE-2023-51219.json b/CVE-2023/CVE-2023-512xx/CVE-2023-51219.json index 38fd1f42040..021463ab273 100644 --- a/CVE-2023/CVE-2023-512xx/CVE-2023-51219.json +++ b/CVE-2023/CVE-2023-512xx/CVE-2023-51219.json @@ -2,7 +2,7 @@ "id": "CVE-2023-51219", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-03T20:15:08.810", - "lastModified": "2024-06-25T20:15:11.020", + "lastModified": "2024-11-12T20:35:04.087", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema de validaci\u00f3n de enlace profundo en KakaoTalk 10.4.3 permiti\u00f3 que un adversario remoto dirigiera a los usuarios a ejecutar cualquier JavaScript controlador de atacante dentro de un WebView. El impacto se intensific\u00f3 a\u00fan m\u00e1s al activar otro WebView que filtr\u00f3 su token de acceso en un encabezado de solicitud HTTP. En \u00faltima instancia, este token de acceso podr\u00eda usarse para hacerse cargo de la cuenta de otro usuario y leer sus mensajes de chat." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-444" + } + ] + } + ], "references": [ { "url": "https://news.ycombinator.com/item?id=40776880", diff --git a/CVE-2023/CVE-2023-522xx/CVE-2023-52268.json b/CVE-2023/CVE-2023-522xx/CVE-2023-52268.json new file mode 100644 index 00000000000..c9b5ab28b93 --- /dev/null +++ b/CVE-2023/CVE-2023-522xx/CVE-2023-52268.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2023-52268", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-12T19:15:07.580", + "lastModified": "2024-11-12T19:15:07.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The End-User Portal module before 1.0.65 for FreeScout sometimes allows an attacker to authenticate as an arbitrary user because a session token can be sent to the /auth endpoint. NOTE: this module is not part of freescout-helpdesk/freescout on GitHub." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://freescout.net/module/end-user-portal/", + "source": "cve@mitre.org" + }, + { + "url": "https://freescout.net/modules-faq/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/squ1dw3rm/CVE-2023-52268", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-526xx/CVE-2023-52601.json b/CVE-2023/CVE-2023-526xx/CVE-2023-52601.json index 9c2c58ae548..ffe304ddf42 100644 --- a/CVE-2023/CVE-2023-526xx/CVE-2023-52601.json +++ b/CVE-2023/CVE-2023-526xx/CVE-2023-52601.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52601", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-03-06T07:15:10.680", - "lastModified": "2024-11-04T13:16:40.320", + "lastModified": "2024-11-12T19:35:02.970", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: jfs: corrige el \u00edndice de matriz fuera de los l\u00edmites en dbAdjTree Actualmente falta una verificaci\u00f3n de los l\u00edmite en dbAdjTree al acceder a dmt_stree. Para agregar la verificaci\u00f3n requerida, se agreg\u00f3 el bool is_ctl que se requiere para determinar el tama\u00f1o como se sugiere en el siguiente commit. https://lore.kernel.org/linux-kernel-mentees/f9475918-2186-49b8-b801-6f0f9e75f4fa@oracle.com/" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-129" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2037cb9d95f1741885f7daf50e8a028c4ade5317", diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10217.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10217.json new file mode 100644 index 00000000000..8c3c16a9a69 --- /dev/null +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10217.json @@ -0,0 +1,66 @@ +{ + "id": "CVE-2024-10217", + "sourceIdentifier": "security@tibco.com", + "published": "2024-11-12T20:15:05.807", + "lastModified": "2024-11-12T20:15:05.807", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "XSS Attack in mar.jar, Monitoring Archive Utility (MAR Utility),\u00a0monitoringconsolecommon.jar\u00a0in TIBCO Software Inc\u00a0TIBCO Hawk and\u00a0TIBCO Operational Intelligence" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@tibco.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:N/SC:L/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:X/U:Green", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "GREEN", + "baseScore": 9.2, + "baseSeverity": "CRITICAL" + } + } + ] + }, + "references": [ + { + "url": "https://community.tibco.com/advisories", + "source": "security@tibco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10218.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10218.json new file mode 100644 index 00000000000..3214e2d8144 --- /dev/null +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10218.json @@ -0,0 +1,66 @@ +{ + "id": "CVE-2024-10218", + "sourceIdentifier": "security@tibco.com", + "published": "2024-11-12T20:15:05.913", + "lastModified": "2024-11-12T20:15:05.913", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "XSS Attack in mar.jar, Monitoring Archive Utility (MAR Utility),\u00a0monitoringconsolecommon.jar\u00a0in TIBCO Software Inc\u00a0TIBCO Hawk and\u00a0TIBCO Operational Intelligence" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@tibco.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:N/SC:L/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:X/U:Green", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "USER", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "GREEN", + "baseScore": 9.2, + "baseSeverity": "CRITICAL" + } + } + ] + }, + "references": [ + { + "url": "https://community.tibco.com/advisories", + "source": "security@tibco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1556.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1556.json index ce15b00c632..904b5f8c3ee 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1556.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1556.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1556", "sourceIdentifier": "security@mozilla.org", "published": "2024-02-20T14:15:09.053", - "lastModified": "2024-02-20T19:50:53.960", + "lastModified": "2024-11-12T20:35:06.360", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se comprob\u00f3 que el objeto incorrecto era NULL en el generador de perfiles integrado, lo que podr\u00eda provocar un acceso no v\u00e1lido a la memoria y un comportamiento indefinido. *Nota:* Este problema solo afecta a la aplicaci\u00f3n cuando el generador de perfiles se est\u00e1 ejecutando. Esta vulnerabilidad afecta a Firefox < 123." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1870414", diff --git a/CVE-2024/CVE-2024-209xx/CVE-2024-20945.json b/CVE-2024/CVE-2024-209xx/CVE-2024-20945.json index 3c49f3ce7ba..809fca1a56f 100644 --- a/CVE-2024/CVE-2024-209xx/CVE-2024-20945.json +++ b/CVE-2024/CVE-2024-209xx/CVE-2024-20945.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20945", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-02-17T02:15:48.880", - "lastModified": "2024-02-20T19:51:05.510", + "lastModified": "2024-11-12T19:35:05.470", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.4, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21021.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21021.json index e071dc64456..2b1b70fffb9 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21021.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21021.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21021", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:17.153", - "lastModified": "2024-04-17T12:48:31.863", + "lastModified": "2024-11-12T20:35:07.200", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2207.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2207.json new file mode 100644 index 00000000000..0035ed12e78 --- /dev/null +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2207.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-2207", + "sourceIdentifier": "hp-security-alert@hp.com", + "published": "2024-11-12T20:15:06.120", + "lastModified": "2024-11-12T20:15:06.120", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Potential vulnerabilities have been identified in the audio package for certain HP PC products using the Sound Research SECOMN64 driver, which might allow escalation of privilege. Sound Research has released driver updates to mitigate the potential vulnerabilities." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "hp-security-alert@hp.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "hp-security-alert@hp.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://support.hp.com/us-en/document/ish_11567250-11567490-16/hpsbhf03987", + "source": "hp-security-alert@hp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2208.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2208.json new file mode 100644 index 00000000000..0a995c1ace1 --- /dev/null +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2208.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-2208", + "sourceIdentifier": "hp-security-alert@hp.com", + "published": "2024-11-12T20:15:06.323", + "lastModified": "2024-11-12T20:15:06.323", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Potential vulnerabilities have been identified in the audio package for certain HP PC products using the Sound Research SECOMN64 driver, which might allow escalation of privilege. Sound Research has released driver updates to mitigate the potential vulnerabilities." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "hp-security-alert@hp.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "hp-security-alert@hp.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], + "references": [ + { + "url": "https://support.hp.com/us-en/document/ish_11567250-11567490-16/hpsbhf03987", + "source": "hp-security-alert@hp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23149.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23149.json index e70959796f6..9c46ad78f6e 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23149.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23149.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23149", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-06-25T03:15:10.370", - "lastModified": "2024-06-25T12:24:17.873", + "lastModified": "2024-11-12T20:35:08.300", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un archivo SLDDRW creado con fines malintencionados, cuando se analiza en ODXSW_DLL.dll a trav\u00e9s de aplicaciones de Autodesk, puede forzar una lectura fuera de los l\u00edmites. Un actor malintencionado puede aprovechar esta vulnerabilidad para provocar un bloqueo, leer datos confidenciales o ejecutar c\u00f3digo arbitrario en el contexto del proceso actual." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, "weaknesses": [ { "source": "psirt@autodesk.com", diff --git a/CVE-2024/CVE-2024-236xx/CVE-2024-23666.json b/CVE-2024/CVE-2024-236xx/CVE-2024-23666.json new file mode 100644 index 00000000000..7093b478ac0 --- /dev/null +++ b/CVE-2024/CVE-2024-236xx/CVE-2024-23666.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-23666", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-11-12T19:15:07.970", + "lastModified": "2024-11-12T19:15:07.970", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A client-side enforcement of server-side security in Fortinet FortiAnalyzer-BigData \r\nat least version 7.4.0 and 7.2.0 through 7.2.6 and 7.0.1 through 7.0.6 and 6.4.5 through 6.4.7 and 6.2.5, FortiManager version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.4 and 7.0.0 through 7.0.11 and 6.4.0 through 6.4.14, FortiAnalyzer version 7.4.0 through 7.4.1 and 7.2.0 through 7.2.4 and 7.0.0 through 7.0.11 and 6.4.0 through 6.4.14 allows attacker to improper access control via crafted requests." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-602" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-396", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-247xx/CVE-2024-24795.json b/CVE-2024/CVE-2024-247xx/CVE-2024-24795.json index a2e8cfeaa7f..54ad2cb9acf 100644 --- a/CVE-2024/CVE-2024-247xx/CVE-2024-24795.json +++ b/CVE-2024/CVE-2024-247xx/CVE-2024-24795.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24795", "sourceIdentifier": "security@apache.org", "published": "2024-04-04T20:15:08.663", - "lastModified": "2024-10-03T13:15:14.233", + "lastModified": "2024-11-12T20:35:08.640", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "La divisi\u00f3n de la respuesta HTTP en varios m\u00f3dulos en el servidor HTTP Apache permite que un atacante pueda inyectar encabezados de respuesta maliciosos en aplicaciones backend para provocar un ataque de desincronizaci\u00f3n HTTP. Se recomienda a los usuarios actualizar a la versi\u00f3n 2.4.59, que soluciona este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", @@ -26,6 +49,16 @@ "value": "CWE-113" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-444" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-256xx/CVE-2024-25622.json b/CVE-2024/CVE-2024-256xx/CVE-2024-25622.json index d4bb091bd96..6ac204196d4 100644 --- a/CVE-2024/CVE-2024-256xx/CVE-2024-25622.json +++ b/CVE-2024/CVE-2024-256xx/CVE-2024-25622.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25622", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-11T15:15:03.947", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T20:04:39.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-670" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,18 +81,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dena:h2o:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2024-02-11", + "matchCriteriaId": "EC5F2FE2-7FF7-428D-9EC7-0201D0077BA8" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/h2o/h2o/commit/123f5e2b65dcdba8f7ef659a00d24bd1249141be", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/h2o/h2o/issues/3332", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/h2o/h2o/security/advisories/GHSA-5m7v-cj65-h6pj", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25737.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25737.json index f337a5a38dc..c6c4e98989d 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25737.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25737.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25737", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-22T19:15:08.657", - "lastModified": "2024-05-24T01:15:30.977", + "lastModified": "2024-11-12T19:35:06.243", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de Server-Side Request Forgery (SSRF) en la ruta /Cover/Show (showAction en CoverController.php) en Open Library Foundation VuFind 2.4 a 9.1 anterior a 9.1.1 permite a atacantes remotos acceder a servidores HTTP internos y realizar Cross-Site Scripting (XSS) mediante proxy de URL arbitrarias a trav\u00e9s del par\u00e1metro GET del proxy." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/vufind-org/vufind/commit/345d00f7d7f1c581f46742effdac70e803b3847b", diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26011.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26011.json new file mode 100644 index 00000000000..b0685f4e15e --- /dev/null +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26011.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-26011", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-11-12T19:15:08.320", + "lastModified": "2024-11-12T19:15:08.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A missing authentication for critical function in Fortinet FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.4, 7.0.0 through 7.0.11, 6.4.0 through 6.4.14, FortiPAM version 1.2.0, 1.1.0 through 1.1.2, 1.0.0 through 1.0.3, FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.9, 7.0.0 through 7.0.17, 2.0.0 through 2.0.14, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6, 1.0.0 through 1.0.7, FortiSwitchManager version 7.2.0 through 7.2.3, 7.0.0 through 7.0.3, FortiPortal version 6.0.0 through 6.0.14, FortiOS version 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0.0 through 7.0.14, 6.4.0 through 6.4.15, 6.2.0 through 6.2.16, 6.0.0 through 6.0.18 allows attacker to execute unauthorized code or commands via specially crafted packets." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-032", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26311.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26311.json index f54306dd0f2..9950ff7c00c 100644 --- a/CVE-2024/CVE-2024-263xx/CVE-2024-26311.json +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26311.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26311", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-21T20:15:46.967", - "lastModified": "2024-02-22T19:07:27.197", + "lastModified": "2024-11-12T20:35:09.710", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,9 +36,41 @@ }, "exploitabilityScore": 2.1, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://archerirm.com", diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31309.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31309.json index 7ae72a868fa..3840dafa6bb 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31309.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31309.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31309", "sourceIdentifier": "security@apache.org", "published": "2024-04-10T12:15:09.257", - "lastModified": "2024-05-01T18:15:23.233", + "lastModified": "2024-11-12T19:35:07.513", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Un ataque de HTTP/2 CONTINUATION DoS puede hacer que Apache Traffic Server consuma m\u00e1s recursos en el servidor. Las versiones de 8.0.0 a 8.1.9 y de 9.0.0 a 9.2.3 se ven afectadas. Los usuarios pueden establecer una nueva configuraci\u00f3n (proxy.config.http2.max_continuation_frames_per_minuto) para limitar el n\u00famero de fotogramas de CONTINUACI\u00d3N por minuto. ATS tiene una cantidad fija de memoria que una solicitud puede usar y ATS cumple con estos l\u00edmites en versiones anteriores. Se recomienda a los usuarios actualizar a las versiones 8.1.10 o 9.2.4, que solucionan el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31496.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31496.json new file mode 100644 index 00000000000..44a62d5f5a8 --- /dev/null +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31496.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-31496", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-11-12T19:15:08.617", + "lastModified": "2024-11-12T19:15:08.617", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A stack-based buffer overflow vulnerability [CWE-121] in Fortinet FortiManager version 7.4.0 through 7.4.2 and before 7.2.5, FortiAnalyzer version 7.4.0 through 7.4.2 and before 7.2.5 and FortiAnalyzer-BigData 7.4.0 and before 7.2.7 allows a privileged attacker to execute unauthorized code or commands via crafted CLI requests." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-098", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32116.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32116.json new file mode 100644 index 00000000000..75df6b488c1 --- /dev/null +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32116.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-32116", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-11-12T19:15:08.860", + "lastModified": "2024-11-12T19:15:08.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Multiple relative path traversal vulnerabilities [CWE-23] in Fortinet FortiManager version 7.4.0 through 7.4.2 and before 7.2.5, FortiAnalyzer version 7.4.0 through 7.4.2 and before 7.2.5 and FortiAnalyzer-BigData version 7.4.0 and before 7.2.7 allows a privileged attacker to delete files from the underlying filesystem via crafted CLI requests." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-099", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32117.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32117.json new file mode 100644 index 00000000000..657f4f3e092 --- /dev/null +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32117.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-32117", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-11-12T19:15:09.073", + "lastModified": "2024-11-12T19:15:09.073", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability [CWE-22] in Fortinet FortiManager version 7.4.0 through 7.4.2 and below 7.2.5, FortiAnalyzer version 7.4.0 through 7.4.2 and below 7.2.5 & FortiAnalyzer-BigData version 7.4.0 and below 7.2.7 allows a privileged attacker to read arbitrary files from the underlying system via crafted HTTP or HTTPs requests." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-115", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-321xx/CVE-2024-32118.json b/CVE-2024/CVE-2024-321xx/CVE-2024-32118.json new file mode 100644 index 00000000000..f611b48cb0c --- /dev/null +++ b/CVE-2024/CVE-2024-321xx/CVE-2024-32118.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-32118", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-11-12T19:15:09.287", + "lastModified": "2024-11-12T19:15:09.287", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Multiple improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerabilities [CWE-78] in Fortinet FortiManager version 7.4.0 through 7.4.2 and before 7.2.5, Fortinet FortiAnalyzer version 7.4.0 through 7.4.2 and before 7.2.5 and Fortinet FortiAnalyzer-BigData before 7.4.0 allows an authenticated privileged attacker to execute unauthorized code or commands via crafted CLI requests." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-116", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33505.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33505.json new file mode 100644 index 00000000000..e472960fae6 --- /dev/null +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33505.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-33505", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-11-12T19:15:09.500", + "lastModified": "2024-11-12T19:15:09.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A heap-based buffer overflow in Fortinet FortiAnalyzer version 7.4.0 through 7.4.2, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14, FortiManager version 7.4.0 through 7.4.2, 7.2.0 through 7.2.5, 7.0.0 through 7.0.12, 6.4.0 through 6.4.14 allows attacker to escalation of privilege via specially crafted http requests" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-125", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-335xx/CVE-2024-33510.json b/CVE-2024/CVE-2024-335xx/CVE-2024-33510.json new file mode 100644 index 00000000000..d5398039873 --- /dev/null +++ b/CVE-2024/CVE-2024-335xx/CVE-2024-33510.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-33510", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-11-12T19:15:09.723", + "lastModified": "2024-11-12T19:15:09.723", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An\u00a0improper neutralization of special elements in output used by a downstream component ('Injection') vulnerability [CWE-74] in FortiOS version 7.4.3 and below, version 7.2.8 and below, version 7.0.16 and below; FortiProxy version 7.4.3 and below, version 7.2.9 and below, version 7.0.16 and below; FortiSASE version 24.2.b SSL-VPN web user interface may allow a remote unauthenticated attacker to perform phishing attempts via crafted requests." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-358" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-033", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-338xx/CVE-2024-33803.json b/CVE-2024/CVE-2024-338xx/CVE-2024-33803.json index 1a4ec7ee34b..5fbb13005a1 100644 --- a/CVE-2024/CVE-2024-338xx/CVE-2024-33803.json +++ b/CVE-2024/CVE-2024-338xx/CVE-2024-33803.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33803", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T16:15:16.413", - "lastModified": "2024-05-28T17:11:47.007", + "lastModified": "2024-11-12T19:35:08.007", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en /model/get_exam.php en campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro id." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%2011.pdf", diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35274.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35274.json new file mode 100644 index 00000000000..4e8b0e9733d --- /dev/null +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35274.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-35274", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-11-12T19:15:09.993", + "lastModified": "2024-11-12T19:15:09.993", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability [CWE-22] in Fortinet FortiAnalyzer versions below 7.4.2, Fortinet FortiManager versions below 7.4.2 and Fortinet FortiAnalyzer-BigData version 7.4.0 and below 7.2.7 allows a privileged attacker with read write administrative privileges to create non-arbitrary files on a chosen directory via crafted CLI requests." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-179", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36457.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36457.json index 316ca34ea2f..4b4d1311e7e 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36457.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36457.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36457", "sourceIdentifier": "secure@symantec.com", "published": "2024-07-15T14:15:02.917", - "lastModified": "2024-07-16T13:43:58.773", + "lastModified": "2024-11-12T19:35:08.833", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -61,6 +61,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24678", diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36507.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36507.json new file mode 100644 index 00000000000..542fad98b8b --- /dev/null +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36507.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-36507", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-11-12T19:15:10.233", + "lastModified": "2024-11-12T19:15:10.233", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A untrusted search path in Fortinet FortiClientWindows versions 7.4.0, versions 7.2.4 through 7.2.0, versions 7.0.12 through 7.0.0 allows an attacker to run arbitrary code via DLL hijacking and social engineering." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-205", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36509.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36509.json new file mode 100644 index 00000000000..0d2b65a446f --- /dev/null +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36509.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-36509", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-11-12T19:15:10.440", + "lastModified": "2024-11-12T19:15:10.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An exposure of sensitive system information to an unauthorized control sphere vulnerability [CWE-497] in FortiWeb version 7.6.0, version 7.4.3 and below, version 7.2.10 and below, version 7.0.10 and below, version 6.3.23 and below may allow an authenticated attacker to access the encrypted passwords of other administrators via the \"Log Access Event\" logs page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.6, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-497" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-180", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-365xx/CVE-2024-36513.json b/CVE-2024/CVE-2024-365xx/CVE-2024-36513.json new file mode 100644 index 00000000000..1c6524dba81 --- /dev/null +++ b/CVE-2024/CVE-2024-365xx/CVE-2024-36513.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-36513", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-11-12T19:15:10.633", + "lastModified": "2024-11-12T19:15:10.633", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A privilege context switching error vulnerability [CWE-270] in FortiClient Windows version 7.2.4 and below, version 7.0.12 and below, 6.4 all versions may allow an authenticated user to escalate their privileges via lua auto patch scripts." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-270" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-144", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3855.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3855.json index e4851ad1606..88b8eb4ccfc 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3855.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3855.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3855", "sourceIdentifier": "security@mozilla.org", "published": "2024-04-16T16:15:08.487", - "lastModified": "2024-04-17T12:48:31.863", + "lastModified": "2024-11-12T19:35:09.877", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En ciertos casos, el JIT optimiz\u00f3 incorrectamente las operaciones de MSubstr, lo que provoc\u00f3 lecturas fuera de los l\u00edmites. Esta vulnerabilidad afecta a Firefox < 125." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1885828", diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40592.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40592.json new file mode 100644 index 00000000000..c9d7c8503d3 --- /dev/null +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40592.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-40592", + "sourceIdentifier": "psirt@fortinet.com", + "published": "2024-11-12T19:15:11.013", + "lastModified": "2024-11-12T19:15:11.013", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper verification of cryptographic signature vulnerability [CWE-347] in FortiClient MacOS version 7.4.0, version 7.2.4 and below, version 7.0.10 and below, version 6.4.10 and below may allow a local authenticated attacker to\u00a0swap the installer with a malicious package via a race condition during the installation process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@fortinet.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@fortinet.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + } + ], + "references": [ + { + "url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-022", + "source": "psirt@fortinet.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43429.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43429.json index 3bea43ea6a2..95598b16485 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43429.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43429.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43429", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-11-11T13:15:03.880", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T20:35:11.370", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304257", diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43613.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43613.json new file mode 100644 index 00000000000..57f792bfa43 --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43613.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43613", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T19:15:11.560", + "lastModified": "2024-11-12T19:15:11.560", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Azure Database for PostgreSQL Flexible Server Extension Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43613", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43928.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43928.json index 8f32666ad44..84132a191a3 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43928.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43928.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43928", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:49.080", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T20:49:01.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eyecix:jobsearch_wp_job_board:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.5.6", + "matchCriteriaId": "07DF4154-B368-4731-BD9C-6DCC5CE5F69A" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-jobsearch/wordpress-jobsearch-wp-job-board-wordpress-plugin-plugin-2-5-4-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-439xx/CVE-2024-43929.json b/CVE-2024/CVE-2024-439xx/CVE-2024-43929.json index b804e56e7b7..d5a561ca495 100644 --- a/CVE-2024/CVE-2024-439xx/CVE-2024-43929.json +++ b/CVE-2024/CVE-2024-439xx/CVE-2024-43929.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43929", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:49.293", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T20:49:57.193", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eyecix:jobsearch_wp_job_board:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.5.6", + "matchCriteriaId": "07DF4154-B368-4731-BD9C-6DCC5CE5F69A" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-jobsearch/wordpress-jobsearch-wp-job-board-wordpress-plugin-plugin-2-5-4-broken-access-control-vulnerability-2?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45114.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45114.json new file mode 100644 index 00000000000..f08fdd78505 --- /dev/null +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45114.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45114", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T19:15:12.860", + "lastModified": "2024-11-12T19:15:12.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 28.7.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb24-87.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45147.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45147.json new file mode 100644 index 00000000000..c8bae73afa8 --- /dev/null +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45147.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-45147", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T19:15:13.090", + "lastModified": "2024-11-12T19:15:13.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Bridge versions 13.0.9, 14.1.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/bridge/apsb24-77.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45396.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45396.json index 637e2517040..451458d1b69 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45396.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45396.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45396", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-11T15:15:04.457", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T20:05:09.367", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dena:quicly:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024-10-10", + "matchCriteriaId": "8A1D2045-0B2C-490A-BF1E-A71AA3E9E4B3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/h2o/quicly/commit/2a95896104901589c495bc41460262e64ffcad5c", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/h2o/quicly/security/advisories/GHSA-mp3c-h5gg-mm6p", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-453xx/CVE-2024-45397.json b/CVE-2024/CVE-2024-453xx/CVE-2024-45397.json index 6eb74780dbc..39281256ad6 100644 --- a/CVE-2024/CVE-2024-453xx/CVE-2024-45397.json +++ b/CVE-2024/CVE-2024-453xx/CVE-2024-45397.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45397", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-11T15:15:04.690", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T20:14:25.083", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -41,8 +61,18 @@ }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,18 +81,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dena:h2o:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024-10-10", + "matchCriteriaId": "A7760480-4001-4F10-B91B-CF59236F1427" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/h2o/h2o/commit/15ed15a2efb83a77bb4baaa5a119e639c2f6898a", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/h2o/h2o/security/advisories/GHSA-jf2c-xjcp-wg4c", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://h2o.examp1e.net/configure/http3_directives.html", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45402.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45402.json index 68073721d67..c45a55c4763 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45402.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45402.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45402", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-11T15:15:04.903", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T20:02:56.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +71,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dena:picotls:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2024-08-12", + "versionEndExcluding": "2024-10-10", + "matchCriteriaId": "C8B44BB8-1995-4076-BA61-135AFD0E512D" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/h2o/picotls/commit/9b88159ce763d680e4a13b6e8f3171ae923a535d", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/h2o/picotls/security/advisories/GHSA-w7c8-wjx9-vvvv", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-454xx/CVE-2024-45403.json b/CVE-2024/CVE-2024-454xx/CVE-2024-45403.json index 412c900f453..63e499280f8 100644 --- a/CVE-2024/CVE-2024-454xx/CVE-2024-45403.json +++ b/CVE-2024/CVE-2024-454xx/CVE-2024-45403.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45403", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-11T15:15:05.123", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T19:59:51.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,22 +71,53 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dena:h2o:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2024-06-18", + "versionEndExcluding": "2024-09-04", + "matchCriteriaId": "150B718B-AB9A-4FA0-AAFD-AB3E7CA96120" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/h2o/h2o/commit/16b13eee8ad7895b4fe3fcbcabee53bd52782562", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/h2o/h2o/commit/1ed32b23f999acf0c5029f09c8525f93eb1d354c", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/h2o/h2o/security/advisories/GHSA-4xp5-3jhc-3m92", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://h2o.examp1e.net/configure/http3_directives.html", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46955.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46955.json index 904067e4e08..73462f4c086 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46955.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46955.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46955", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-10T22:15:12.887", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-12T20:35:12.407", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en psi/zcolor.c en Artifex Ghostscript anterior a la versi\u00f3n 10.04.0. Hay una lectura fuera de los l\u00edmites al leer colores en el espacio de color indexado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://bugs.ghostscript.com/show_bug.cgi?id=707990", diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46956.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46956.json index 8a3c65b6919..63a149a2c97 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46956.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46956.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46956", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-10T22:15:12.943", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-12T20:35:13.723", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 un problema en psi/zfile.c en Artifex Ghostscript anterior a la versi\u00f3n 10.04.0. El acceso a datos fuera de los l\u00edmites en filenameforall puede provocar la ejecuci\u00f3n de c\u00f3digo arbitrario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://bugs.ghostscript.com/show_bug.cgi?id=707895", diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47074.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47074.json index 776ec9770bb..42fc62d9742 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47074.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47074.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47074", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-11T15:15:05.353", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T19:52:38.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "baseSeverity": "CRITICAL" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -73,14 +95,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.18.25", + "matchCriteriaId": "D508B577-F415-41D2-99AC-DC412C371CE0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/dataease/dataease/commit/86eafc4d77f0bbc0eaa7fc58e5076a085257f259", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/dataease/dataease/security/advisories/GHSA-jgg7-w629-wcpc", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47302.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47302.json index 37d9903cc3e..ce075669e11 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47302.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47302.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47302", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:53.547", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T20:40:46.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpmanageninja:fluent_support:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.8.1", + "matchCriteriaId": "1CC5733A-0031-42D9-B820-CC71EFC22D27" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/fluent-support/wordpress-fluent-support-plugin-1-8-0-broken-access-control-on-email-verification-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47308.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47308.json index d1c5f05878b..cbd2ed9759e 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47308.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47308.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47308", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:53.743", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T20:35:53.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:templately:templately:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.1.3", + "matchCriteriaId": "08E8BDAF-AB5F-4FFA-8809-44093A4833D4" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/templately/wordpress-templately-plugin-3-1-2-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47311.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47311.json index f0796e64d1f..2ef98062a68 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47311.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47311.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47311", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:53.960", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T20:35:03.010", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kraftplugins:wheel_of_life:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.9", + "matchCriteriaId": "2B9C3C84-EE18-4301-804A-F0ED2A05C65D" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wheel-of-life/wordpress-wheel-of-life-plugin-1-1-8-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47314.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47314.json index a98b16aac9c..b17e1f892d1 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47314.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47314.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47314", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:54.170", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T20:34:11.720", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sunshinephotocart:sunshine_photo_cart:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.2.9", + "matchCriteriaId": "DC7AD9B2-BA4E-4D38-8A9B-95C21F09A33A" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/sunshine-photo-cart/wordpress-sunshine-photo-cart-plugin-3-2-8-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47317.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47317.json index c22a5d5b389..7cb97e6cfa3 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47317.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47317.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47317", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:54.400", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T20:33:17.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -12,11 +12,31 @@ }, { "lang": "es", - "value": " La vulnerabilidad de autorizaci\u00f3n faltante en WP Quads Ads de WPQuads (Adsense Ads, Banner Ads, Popup Ads) permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Ads by WPQuads (Adsense Ads, Banner Ads, Popup Ads): desde n/a hasta 2.0.84." + "value": " La vulnerabilidad de autorizaci\u00f3n faltante en WP Quads Ads by WPQuads \u2013 Adsense Ads, Banner Ads, Popup Ads permite explotar los niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Ads by WPQuads \u2013 Adsense Ads, Banner Ads, Popup Ads: desde n/a hasta 2.0.84." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpquads:ads:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.0.85", + "matchCriteriaId": "88F53029-AA9F-4607-B374-8E7716A94223" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/quick-adsense-reloaded/wordpress-ads-by-wpquads-plugin-2-0-84-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47318.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47318.json index f0b2366be6e..68bc26b14e9 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47318.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47318.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47318", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:54.617", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T20:32:35.303", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:magazine3:pwa_for_wp_\\&_amp:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.7.73", + "matchCriteriaId": "F91B0A73-D8F5-4D8B-80DF-6A01D7694AF6" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/pwa-for-wp/wordpress-pwa-for-wp-amp-plugin-1-7-72-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47321.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47321.json index 7586cfe7d07..3d179c47896 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47321.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47321.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47321", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:54.840", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T20:29:51.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -12,11 +12,31 @@ }, { "lang": "es", - "value": " La vulnerabilidad de autorizaci\u00f3n faltante en Fahad Mahmood WP Datepicker permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a WP Datepicker: desde n/a hasta 2.1.1." + "value": "La vulnerabilidad de autorizaci\u00f3n faltante en Fahad Mahmood WP Datepicker permite acceder a funcionalidades que no est\u00e1n correctamente restringidas por las ACL. Este problema afecta a WP Datepicker: desde n/a hasta 2.1.1." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:androidbubbles:wp_datepicker:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.2", + "matchCriteriaId": "902921D1-B15E-43F0-864A-CF1B5E2AB366" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/wp-datepicker/wordpress-wp-datepicker-plugin-2-1-1-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47358.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47358.json index ed834042b43..512569b1b05 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47358.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47358.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47358", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:55.043", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T20:28:55.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-atlantic:popup_maker:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.20.0", + "matchCriteriaId": "1AF385E1-1958-43F8-80F0-874EE6940504" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/popup-maker/wordpress-popup-maker-plugin-1-19-2-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47359.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47359.json index 7d38afd3b78..e013c36dca5 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47359.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47359.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47359", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:55.270", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T20:26:27.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:depicter:depicter:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.5.0", + "matchCriteriaId": "BADA2753-A953-420D-B435-E2128BBEA0B9" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/depicter/wordpress-depicter-plugin-3-2-2-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47361.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47361.json index 49acbe06b82..18bbe3faf21 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47361.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47361.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47361", "sourceIdentifier": "audit@patchstack.com", "published": "2024-11-01T15:15:55.490", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T20:25:04.763", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "audit@patchstack.com", "type": "Secondary", @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webtechstreet:elementor_addon_elements:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.13.7", + "matchCriteriaId": "C495BB62-6ECA-4679-89D8-91F47D07B463" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/addon-elements-for-elementor-page-builder/wordpress-elementor-addon-elements-plugin-1-13-6-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47426.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47426.json new file mode 100644 index 00000000000..74f6fdab8c7 --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47426.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47426", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T20:15:08.313", + "lastModified": "2024-11-12T20:15:08.313", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.0 and earlier are affected by a Double Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47427.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47427.json new file mode 100644 index 00000000000..a6192557229 --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47427.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47427", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T20:15:08.523", + "lastModified": "2024-11-12T20:15:08.523", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47428.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47428.json new file mode 100644 index 00000000000..51f8be6e917 --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47428.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47428", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T20:15:08.720", + "lastModified": "2024-11-12T20:15:08.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47429.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47429.json new file mode 100644 index 00000000000..d0636d123a6 --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47429.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47429", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T20:15:08.930", + "lastModified": "2024-11-12T20:15:08.930", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47430.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47430.json new file mode 100644 index 00000000000..92ffff598e5 --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47430.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47430", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T20:15:09.127", + "lastModified": "2024-11-12T20:15:09.127", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47431.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47431.json new file mode 100644 index 00000000000..25c74d5ce23 --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47431.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47431", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T20:15:09.323", + "lastModified": "2024-11-12T20:15:09.323", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47432.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47432.json new file mode 100644 index 00000000000..7c6beb77f5b --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47432.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47432", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T20:15:09.523", + "lastModified": "2024-11-12T20:15:09.523", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47433.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47433.json new file mode 100644 index 00000000000..01a9080d2cb --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47433.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47433", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T20:15:09.720", + "lastModified": "2024-11-12T20:15:09.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47434.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47434.json new file mode 100644 index 00000000000..70f6f24651d --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47434.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47434", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T20:15:09.920", + "lastModified": "2024-11-12T20:15:09.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47435.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47435.json new file mode 100644 index 00000000000..eea73996208 --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47435.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47435", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T20:15:10.117", + "lastModified": "2024-11-12T20:15:10.117", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47436.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47436.json new file mode 100644 index 00000000000..77577491642 --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47436.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47436", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T20:15:10.317", + "lastModified": "2024-11-12T20:15:10.317", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47437.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47437.json new file mode 100644 index 00000000000..d9e232bf7d3 --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47437.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47437", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T20:15:10.513", + "lastModified": "2024-11-12T20:15:10.513", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47438.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47438.json new file mode 100644 index 00000000000..b62ea8d69b1 --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47438.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47438", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T20:15:10.720", + "lastModified": "2024-11-12T20:15:10.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.0 and earlier are affected by a Write-what-where Condition vulnerability that could lead to a memory leak. This vulnerability allows an attacker to write a controlled value at a controlled memory location, which could result in the disclosure of sensitive memory content. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-123" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47439.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47439.json new file mode 100644 index 00000000000..287d54b4658 --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47439.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47439", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T20:15:10.933", + "lastModified": "2024-11-12T20:15:10.933", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.0 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47440.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47440.json new file mode 100644 index 00000000000..f18f58a59ef --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47440.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47440", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T20:15:11.140", + "lastModified": "2024-11-12T20:15:11.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47441.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47441.json new file mode 100644 index 00000000000..a8e65704a34 --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47441.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47441", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T19:15:13.310", + "lastModified": "2024-11-12T19:15:13.310", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "After Effects versions 23.6.9, 24.6.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/after_effects/apsb24-85.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47442.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47442.json new file mode 100644 index 00000000000..79b047546fe --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47442.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47442", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T19:15:13.517", + "lastModified": "2024-11-12T19:15:13.517", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "After Effects versions 23.6.9, 24.6.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/after_effects/apsb24-85.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47443.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47443.json new file mode 100644 index 00000000000..2525abf5d67 --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47443.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47443", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T19:15:13.730", + "lastModified": "2024-11-12T19:15:13.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "After Effects versions 23.6.9, 24.6.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/after_effects/apsb24-85.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47444.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47444.json new file mode 100644 index 00000000000..d2c193351ac --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47444.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47444", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T19:15:13.947", + "lastModified": "2024-11-12T19:15:13.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "After Effects versions 23.6.9, 24.6.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/after_effects/apsb24-85.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47445.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47445.json new file mode 100644 index 00000000000..9e0491a5d2a --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47445.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47445", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T19:15:14.157", + "lastModified": "2024-11-12T19:15:14.157", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "After Effects versions 23.6.9, 24.6.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/after_effects/apsb24-85.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47446.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47446.json new file mode 100644 index 00000000000..db20ad3a3e9 --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47446.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47446", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T19:15:14.377", + "lastModified": "2024-11-12T19:15:14.377", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "After Effects versions 23.6.9, 24.6.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/after_effects/apsb24-85.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47449.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47449.json new file mode 100644 index 00000000000..487baf51a7b --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47449.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47449", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T19:15:14.597", + "lastModified": "2024-11-12T19:15:14.597", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Audition versions 23.6.9, 24.4.6 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/audition/apsb24-83.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47450.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47450.json new file mode 100644 index 00000000000..4a84f5e3101 --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47450.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47450", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T19:15:14.823", + "lastModified": "2024-11-12T19:15:14.823", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 28.7.1 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb24-87.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47451.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47451.json new file mode 100644 index 00000000000..83a38a56378 --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47451.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47451", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T19:15:15.037", + "lastModified": "2024-11-12T19:15:15.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 28.7.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb24-87.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47452.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47452.json new file mode 100644 index 00000000000..fc712a674c9 --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47452.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47452", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T19:15:15.240", + "lastModified": "2024-11-12T19:15:15.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 28.7.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb24-87.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47453.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47453.json new file mode 100644 index 00000000000..156350a1f64 --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47453.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47453", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T19:15:15.443", + "lastModified": "2024-11-12T19:15:15.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 28.7.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb24-87.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47454.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47454.json new file mode 100644 index 00000000000..a05b731912c --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47454.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47454", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T19:15:15.647", + "lastModified": "2024-11-12T19:15:15.647", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 28.7.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb24-87.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47455.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47455.json new file mode 100644 index 00000000000..17797d79303 --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47455.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47455", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T19:15:15.853", + "lastModified": "2024-11-12T19:15:15.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 28.7.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb24-87.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47456.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47456.json new file mode 100644 index 00000000000..2f8f2d45b4d --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47456.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47456", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T19:15:16.060", + "lastModified": "2024-11-12T19:15:16.060", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 28.7.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb24-87.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47457.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47457.json new file mode 100644 index 00000000000..b1c64dfa630 --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47457.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47457", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T19:15:16.263", + "lastModified": "2024-11-12T19:15:16.263", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Illustrator versions 28.7.1 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial-of-service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/illustrator/apsb24-87.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-474xx/CVE-2024-47458.json b/CVE-2024/CVE-2024-474xx/CVE-2024-47458.json new file mode 100644 index 00000000000..6fa9c69ba6d --- /dev/null +++ b/CVE-2024/CVE-2024-474xx/CVE-2024-47458.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47458", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T19:15:16.480", + "lastModified": "2024-11-12T19:15:16.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Bridge versions 13.0.9, 14.1.2 and earlier are affected by a NULL Pointer Dereference vulnerability that could result in an application denial-of-service. An attacker could exploit this vulnerability to crash the application, leading to a denial of service condition. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/bridge/apsb24-77.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-476xx/CVE-2024-47636.json b/CVE-2024/CVE-2024-476xx/CVE-2024-47636.json index a2f2197f06b..0853c241039 100644 --- a/CVE-2024/CVE-2024-476xx/CVE-2024-47636.json +++ b/CVE-2024/CVE-2024-476xx/CVE-2024-47636.json @@ -2,7 +2,7 @@ "id": "CVE-2024-47636", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-10T18:15:07.920", - "lastModified": "2024-10-30T14:32:17.523", + "lastModified": "2024-11-12T20:52:49.130", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:eyecix:jobsearch:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:eyecix:jobsearch_wp_job_board:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "2.5.9", - "matchCriteriaId": "1B1622BA-5F68-411F-A676-45E1626F043E" + "matchCriteriaId": "993BA74C-BF07-4252-B669-AC06E5C8019A" } ] } diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47830.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47830.json index 2e54f229ffc..52c02b28efa 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47830.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47830.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47830", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-11T15:15:05.613", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T19:55:58.010", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + }, { "source": "security-advisories@github.com", "type": "Secondary", @@ -51,14 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:plane:plane:*:*:*:*:*:*:*:*", + "versionEndExcluding": "0.23.0", + "matchCriteriaId": "B71D6DB9-FD53-489A-AF83-855FBF28B78F" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/makeplane/plane/commit/b9f78ba42b70461c8c1d26638fa8b9beef6a96a1", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/makeplane/plane/security/advisories/GHSA-39gx-38xf-c348", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49042.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49042.json new file mode 100644 index 00000000000..47502eba1e1 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49042.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49042", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T19:15:17.507", + "lastModified": "2024-11-12T19:15:17.507", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Azure Database for PostgreSQL Flexible Server Extension Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49042", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49515.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49515.json new file mode 100644 index 00000000000..1c06dc01be2 --- /dev/null +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49515.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49515", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T20:15:12.477", + "lastModified": "2024-11-12T20:15:12.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.0 and earlier are affected by an Untrusted Search Path vulnerability that might allow attackers to execute arbitrary code. If the application uses a search path to locate critical resources such as programs, then an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. The problem extends to any type of critical resource that the application trusts. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49516.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49516.json new file mode 100644 index 00000000000..d104df7b423 --- /dev/null +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49516.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49516", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T20:15:12.680", + "lastModified": "2024-11-12T20:15:12.680", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49517.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49517.json new file mode 100644 index 00000000000..a6a478cfb91 --- /dev/null +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49517.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49517", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T20:15:12.877", + "lastModified": "2024-11-12T20:15:12.877", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49518.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49518.json new file mode 100644 index 00000000000..01a98414278 --- /dev/null +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49518.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49518", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T20:15:13.087", + "lastModified": "2024-11-12T20:15:13.087", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49519.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49519.json new file mode 100644 index 00000000000..3e5ba9d14b1 --- /dev/null +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49519.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49519", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T20:15:13.297", + "lastModified": "2024-11-12T20:15:13.297", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49520.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49520.json new file mode 100644 index 00000000000..e6e83a7b418 --- /dev/null +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49520.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49520", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T20:15:13.497", + "lastModified": "2024-11-12T20:15:13.497", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49525.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49525.json new file mode 100644 index 00000000000..48563634ef5 --- /dev/null +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49525.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49525", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T20:15:13.690", + "lastModified": "2024-11-12T20:15:13.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Substance3D - Painter versions 10.1.0 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-86.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50095.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50095.json index 63376e687a2..2e9ed39869d 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50095.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50095.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50095", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T17:15:06.797", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T20:26:00.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,31 +15,130 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: RDMA/mad: Mejorar el manejo de los WR con tiempo de espera agotado del agente mad El controlador de tiempo de espera actual del agente mad adquiere/libera el bloqueo mad_agent_priv para cada WR con tiempo de espera agotado. Esto provoca una fuerte contenci\u00f3n de bloqueo cuando se deben manejar una mayor cantidad de WR dentro del controlador de tiempo de espera. Esto conduce a un bloqueo suave con el siguiente seguimiento en algunos casos de uso donde se usa la ruta rdma-cm para establecer la conexi\u00f3n entre nodos pares Seguimiento: ----- ERROR: bloqueo suave: \u00a1CPU n.\u00ba 4 atascada durante 26 s! [kworker/u128:3:19767] CPU: 4 PID: 19767 Comm: kworker/u128:3 Kdump: cargado Contaminado: G OE ------- --- 5.14.0-427.13.1.el9_4.x86_64 #1 Nombre del hardware: Dell Inc. PowerEdge R740/01YM03, BIOS 2.4.8 26/11/2019 Cola de trabajo: ib_mad1 timeout_sends [ib_core] RIP: 0010:__do_softirq+0x78/0x2ac RSP: 0018:ffffb253449e4f98 EFLAGS: 00000246 RAX: 00000000ffffffff RBX: 0000000000000000 RCX: 000000000000001f RDX: 000000000000001d RSI: 000000003d1879ab RDI: fff363b66fd3a86b RBP: ffffb253604cbcd8 R08: 0000009065635f3b R09: 0000000000000000 R10: 0000000000000040 R11: ffffb253449e4ff8 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000040 FS: 000000000000000(0000) GS:ffff8caa1fc80000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00007fd9ec9db900 CR3: 0000000891934006 CR4: 00000000007706e0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 00000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 00000000000000400 PKRU: 55555554 Seguimiento de llamadas: ? show_trace_log_lvl+0x1c4/0x2df ? show_trace_log_lvl+0x1c4/0x2df ? __irq_exit_rcu+0xa1/0xc0 ? watchdog_timer_fn+0x1b2/0x210 ? __pfx_watchdog_timer_fn+0x10/0x10 ? __hrtimer_run_queues+0x127/0x2c0 ? hrtimer_interrupt+0xfc/0x210 ? __sysvec_apic_timer_interrupt+0x5c/0x110 ? sysvec_apic_timer_interrupt+0x37/0x90 ? asm_sysvec_apic_timer_interrupt+0x16/0x20 ? __do_softirq+0x78/0x2ac ? asm_sysvec_call_function_single+0x16/0x20 RIP: 0010:_raw_spin_unlock_irq+0x14/0x30 RSP: 0018:ffffb253604cbd88 EFLAGS: 00000247 RAX: 000000000001960d RBX: 0000000000000002 RCX: ffff8cad2a064800 RDX: 000000008020001b RSI: 00000000000000001 RDI: ffff8cad5d39f66c RBP: ffff8cad5d39f600 R08: 0000000000000001 R09: 0000000000000000 R10: ffff8caa443e0c00 R11: ffffb253604cbcd8 R12: ffff8cacb8682538 R13: 0000000000000005 R14: ffffb253604cbd90 R15: ffff8cad5d39f66c cm_process_send_error+0x122/0x1d0 [ib_cm] timeout_sends+0x1dd/0x270 [ib_core] process_one_work+0x1e2/0x3b0 ? __pfx_worker_thread+0x10/0x10 worker_thread+0x50/0x3a0 ? __pfx_worker_thread+0x10/0x10 kthread+0xdd/0x100 ? __pfx_kthread+0x10/0x10 ret_from_fork+0x29/0x50 Se simplific\u00f3 el controlador de tiempo de espera al crear una lista local de los WR que han expirado y al invocar el controlador de env\u00edo despu\u00e9s de crear la lista. El nuevo m\u00e9todo adquiere/libera el bloqueo una vez para obtener la lista y, por lo tanto, ayuda a reducir la contenci\u00f3n del bloqueo cuando se procesa una cantidad mayor de WR." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.10.227", + "matchCriteriaId": "EB525A44-6338-4857-AD90-EA2860D1AD1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.168", + "matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.57", + "matchCriteriaId": "05D83DB8-7465-4F88-AFB2-980011992AC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.4", + "matchCriteriaId": "AA84D336-CE9A-4535-B901-1AD77EC17C34" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/2a777679b8ccd09a9a65ea0716ef10365179caac", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3e799fa463508abe7a738ce5d0f62a8dfd05262a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7022a517bf1ca37ef5a474365bcc5eafd345a13a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/713adaf0ecfc49405f6e5d9e409d984f628de818", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a195a42dd25ca4f12489687065d00be64939409f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/e80eadb3604a92d2d086e956b8b2692b699d4d0a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50990.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50990.json index 6c1fb801081..ae03c4b4b3b 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50990.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50990.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50990", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T15:15:06.470", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T20:35:16.907", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se encontr\u00f3 una vulnerabilidad de tipo Cross Site Scriptng (XSS) reflejado en /omrs/user/search.php en PHPGurukul Online Marriage Registration System v1.0, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de solicitud POST \"searchdata\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/vkcyberexpert/CVE-Writeup/blob/main/PHPGurukul/Marriage%20Registration/Marriage%20reflected%20in%20userpage.pdf", diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50991.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50991.json index 3b281bd380e..02d27794ad7 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50991.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50991.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50991", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T15:15:06.527", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T19:35:12.040", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se encontr\u00f3 una vulnerabilidad de Cross Site Scripting (XSS) en /ums-sp/admin/registered-users.php en PHPGurukul User Management System v1.0, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de solicitud POST \"fname\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/vkcyberexpert/CVE-Writeup/blob/main/PHPGurukul/User%20Management/Ums%20%20XSS%20pdf.pdf", diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51054.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51054.json index e17db49aa15..aadb93285c6 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51054.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51054.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51054", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T15:15:06.603", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T20:35:17.823", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se encontr\u00f3 una vulnerabilidad de Cross Site Scriptng (XSS) en /omrs/admin/search.php en PHPGurukul Online Marriage Registration System 1.0, que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro de solicitud POST \"searchdata\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/vkcyberexpert/CVE-Writeup/blob/main/PHPGurukul/Marriage%20Registration/Reflected%20Cross%20Site%20Scriptng%20o.pdf", diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51186.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51186.json index fb4335392ee..bafbeec9189 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51186.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51186.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51186", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T20:15:17.877", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T19:35:13.080", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "Se descubri\u00f3 que D-Link DIR-820L 1.05b03 contiene una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo (RCE) a trav\u00e9s del par\u00e1metro ping_addr en las funciones ping_v4 y ping_v6." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], "references": [ { "url": "https://github.com/4hsien/CVE-vulns/blob/main/D-Link/DIR-820L/CI_ping_addr/README.md", diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51720.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51720.json index 1541eb02579..76b5e5a4fea 100644 --- a/CVE-2024/CVE-2024-517xx/CVE-2024-51720.json +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51720.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51720", "sourceIdentifier": "secure@blackberry.com", "published": "2024-11-12T18:15:46.693", - "lastModified": "2024-11-12T18:15:46.693", + "lastModified": "2024-11-12T19:15:18.123", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "secure@blackberry.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], "references": [ { "url": "https://support.blackberry.com/pkb/s/article/140220", diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51721.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51721.json new file mode 100644 index 00000000000..af371ab48fa --- /dev/null +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51721.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51721", + "sourceIdentifier": "secure@blackberry.com", + "published": "2024-11-12T19:15:18.220", + "lastModified": "2024-11-12T19:15:18.220", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A code injection vulnerability in the SecuSUITE Server Web Administration Portal of SecuSUITE versions 5.0.420 and earlier could allow an attacker to potentially inject script commands or other executable content into the server that would run with root privilege." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@blackberry.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 0.7, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@blackberry.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://support.blackberry.com/pkb/s/article/140220", + "source": "secure@blackberry.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51722.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51722.json new file mode 100644 index 00000000000..1b12f65af2d --- /dev/null +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51722.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51722", + "sourceIdentifier": "secure@blackberry.com", + "published": "2024-11-12T19:15:18.397", + "lastModified": "2024-11-12T19:15:18.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A local privilege escalation vulnerability in the SecuSUITE Server (System Configuration) of SecuSUITE versions 5.0.420 and earlier could allow a successful attacker that had gained control of code running under one of the system accounts listed in the configuration file to potentially issue privileged script commands." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@blackberry.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@blackberry.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-250" + } + ] + } + ], + "references": [ + { + "url": "https://support.blackberry.com/pkb/s/article/140220", + "source": "secure@blackberry.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52010.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52010.json index 743da08f10c..93a11abd5c6 100644 --- a/CVE-2024/CVE-2024-520xx/CVE-2024-52010.json +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52010.json @@ -2,7 +2,7 @@ "id": "CVE-2024-52010", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-12T17:15:10.370", - "lastModified": "2024-11-12T17:15:10.370", + "lastModified": "2024-11-12T19:35:14.590", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -55,6 +55,28 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 0.0, + "baseSeverity": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 0.0 + } ] }, "weaknesses": [ diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52301.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52301.json new file mode 100644 index 00000000000..1a15b033e9d --- /dev/null +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52301.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-52301", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-12T20:15:14.087", + "lastModified": "2024-11-12T20:15:14.087", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Laravel is a web application framework. When the register_argc_argv php directive is set to on , and users call any URL with a special crafted query string, they are able to change the environment used by the framework when handling the request. The vulnerability fixed in 6.20.45, 7.30.7, 8.83.28, 9.52.17, 10.48.23, and 11.31.0. The framework now ignores argv values for environment detection on non-cli SAPIs." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.7, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-88" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/laravel/framework/security/advisories/GHSA-gv7v-rgg6-548h", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52530.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52530.json index 119c59b8372..59b092c177f 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52530.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52530.json @@ -2,7 +2,7 @@ "id": "CVE-2024-52530", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T20:15:20.247", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T19:35:14.927", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La librer\u00eda libsoup de GNOME anterior a 3.6.0 permite el contrabando de solicitudes HTTP en algunas configuraciones porque se ignoran los caracteres '\\0' al final de los nombres de encabezado, es decir, un encabezado \"Transfer-Encoding\\0: chunked\" se trata de la misma manera que un encabezado \"Transfer-Encoding: chunked\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-444" + } + ] + } + ], "references": [ { "url": "https://gitlab.gnome.org/GNOME/libsoup/-/issues/377", diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52531.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52531.json index bb0e759b4bf..61771d1097a 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52531.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52531.json @@ -2,7 +2,7 @@ "id": "CVE-2024-52531", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T20:15:20.313", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T19:35:15.807", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Las versiones anteriores a 3.6.1 libsoup de GNOME permiten un desbordamiento de b\u00fafer en aplicaciones que realizan conversiones a UTF-8 en soup_header_parse_param_list_strict. La entrada recibida a trav\u00e9s de la red no puede provocar este desbordamiento." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://gitlab.gnome.org/GNOME/libsoup/-/merge_requests/407", diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52532.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52532.json index 46e217581ea..4ea7da29df9 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52532.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52532.json @@ -2,7 +2,7 @@ "id": "CVE-2024-52532", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T20:15:20.370", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T19:35:16.970", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La versi\u00f3n libsoup de GNOME anterior a 3.6.1 tiene un bucle infinito y consumo de memoria durante la lectura de ciertos patrones de datos WebSocket de los clientes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], "references": [ { "url": "https://gitlab.gnome.org/GNOME/libsoup/-/issues/391", diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6400.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6400.json index e40457446cc..20d8ec5c610 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6400.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6400.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6400", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-10-04T12:15:12.930", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T19:32:52.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -81,10 +103,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:finrota:finrota:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.21.10", + "matchCriteriaId": "9C25428A-EB83-49EC-ACDD-8B42664A2555" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.usom.gov.tr/bildirim/tr-24-1611", - "source": "iletisim@usom.gov.tr" + "source": "iletisim@usom.gov.tr", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-64xx/CVE-2024-6443.json b/CVE-2024/CVE-2024-64xx/CVE-2024-6443.json index ec08f196840..835ec5e4fbc 100644 --- a/CVE-2024/CVE-2024-64xx/CVE-2024-6443.json +++ b/CVE-2024/CVE-2024-64xx/CVE-2024-6443.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6443", "sourceIdentifier": "vulnerabilities@zephyrproject.org", "published": "2024-10-04T06:15:05.160", - "lastModified": "2024-10-04T13:50:43.727", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T19:29:43.793", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, { "source": "vulnerabilities@zephyrproject.org", "type": "Secondary", @@ -40,6 +60,20 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "vulnerabilities@zephyrproject.org", "type": "Secondary", @@ -55,10 +89,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*", + "versionEndIncluding": "3.6.0", + "matchCriteriaId": "8BA5725B-1797-45C0-846C-FE2EC98D6440" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-gg46-3rh2-v765", - "source": "vulnerabilities@zephyrproject.org" + "source": "vulnerabilities@zephyrproject.org", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7516.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7516.json new file mode 100644 index 00000000000..133d4036fb3 --- /dev/null +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7516.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-7516", + "sourceIdentifier": "sirt@brocade.com", + "published": "2024-11-12T19:15:18.753", + "lastModified": "2024-11-12T19:15:18.753", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in Brocade Fabric OS versions before 9.2.2 could allow man-in-the-middle attackers to conduct remote Service Session Hijacking that may arise from the attacker's ability to forge an SSH key while the Brocade Fabric OS Switch is performing various remote operations initiated by a switch admin." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "sirt@brocade.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 7.0, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "sirt@brocade.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-322" + } + ] + } + ], + "references": [ + { + "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25177", + "source": "sirt@brocade.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8074.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8074.json index 376bb7d434a..11732827acd 100644 --- a/CVE-2024/CVE-2024-80xx/CVE-2024-8074.json +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8074.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8074", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-11-12T15:15:11.673", - "lastModified": "2024-11-12T15:48:59.103", + "lastModified": "2024-11-12T19:35:17.893", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -55,6 +55,28 @@ "baseSeverity": "CRITICAL" } } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 + } ] }, "weaknesses": [ diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8534.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8534.json new file mode 100644 index 00000000000..04e261c3cf6 --- /dev/null +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8534.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-8534", + "sourceIdentifier": "secure@citrix.com", + "published": "2024-11-12T19:15:18.907", + "lastModified": "2024-11-12T19:15:18.907", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Memory safety vulnerability leading to memory corruption and Denial of Service\u00a0in NetScaler ADC and Gateway if the appliance must be configured as a Gateway (VPN Vserver) with RDP Feature enabled\u00a0OR the appliance must be configured as a Gateway (VPN Vserver) and RDP Proxy Server Profile is created and set to Gateway (VPN Vserver)\u00a0OR the appliance must be configured as a Auth Server (AAA Vserver) with RDP Feature enabled" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@citrix.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.4, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "secure@citrix.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://support.citrix.com/s/article/CTX691608-netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20248534-and-cve20248535?language=en_US", + "source": "secure@citrix.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8535.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8535.json new file mode 100644 index 00000000000..21515c3ac18 --- /dev/null +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8535.json @@ -0,0 +1,66 @@ +{ + "id": "CVE-2024-8535", + "sourceIdentifier": "secure@citrix.com", + "published": "2024-11-12T19:15:19.040", + "lastModified": "2024-11-12T19:15:19.040", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Authenticated user can access unintended user capabilities\u00a0in\u00a0NetScaler ADC and NetScaler Gateway if the appliance must be configured as a Gateway (SSL VPN, ICA Proxy, CVPN, RDP Proxy) with KCDAccount configuration for Kerberos SSO to access backend resources\u00a0OR\u00a0the appliance must be configured as an\u00a0Auth Server (AAA Vserver) with KCDAccount configuration for Kerberos SSO to access backend resources" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@citrix.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.8, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "references": [ + { + "url": "https://support.citrix.com/s/article/CTX691608-netscaler-adc-and-netscaler-gateway-security-bulletin-for-cve20248534-and-cve20248535?language=en_US", + "source": "secure@citrix.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9576.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9576.json index aa48fe0e72c..f1270c41ff2 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9576.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9576.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9576", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-10-07T15:15:10.467", - "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T19:34:37.910", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "cve-coordination@incibe.es", @@ -24,6 +24,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "cve-coordination@incibe.es", "type": "Secondary", @@ -48,8 +68,18 @@ }, "weaknesses": [ { - "source": "cve-coordination@incibe.es", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", "description": [ { "lang": "en", @@ -58,10 +88,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:workbooth_project:workbooth:2.5:*:*:*:*:*:*:*", + "matchCriteriaId": "D0BEEFCB-078A-4302-B639-E362350A7CC3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/improper-access-control-linux-workbooth-distro", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index f5520cb3819..714ee28bb3c 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-12T19:00:22.928945+00:00 +2024-11-12T21:00:19.683540+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-12T18:35:33.433000+00:00 +2024-11-12T20:52:49.130000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -269311 +269380 ``` ### CVEs added in the last Commit -Recently added CVEs: `125` +Recently added CVEs: `69` -- [CVE-2024-49044](CVE-2024/CVE-2024-490xx/CVE-2024-49044.json) (`2024-11-12T18:15:44.867`) -- [CVE-2024-49046](CVE-2024/CVE-2024-490xx/CVE-2024-49046.json) (`2024-11-12T18:15:45.100`) -- [CVE-2024-49048](CVE-2024/CVE-2024-490xx/CVE-2024-49048.json) (`2024-11-12T18:15:45.353`) -- [CVE-2024-49049](CVE-2024/CVE-2024-490xx/CVE-2024-49049.json) (`2024-11-12T18:15:45.587`) -- [CVE-2024-49050](CVE-2024/CVE-2024-490xx/CVE-2024-49050.json) (`2024-11-12T18:15:45.810`) -- [CVE-2024-49051](CVE-2024/CVE-2024-490xx/CVE-2024-49051.json) (`2024-11-12T18:15:46.037`) -- [CVE-2024-49056](CVE-2024/CVE-2024-490xx/CVE-2024-49056.json) (`2024-11-12T18:15:46.273`) -- [CVE-2024-49369](CVE-2024/CVE-2024-493xx/CVE-2024-49369.json) (`2024-11-12T17:15:08.250`) -- [CVE-2024-49514](CVE-2024/CVE-2024-495xx/CVE-2024-49514.json) (`2024-11-12T17:15:08.490`) -- [CVE-2024-49521](CVE-2024/CVE-2024-495xx/CVE-2024-49521.json) (`2024-11-12T17:15:08.783`) -- [CVE-2024-49526](CVE-2024/CVE-2024-495xx/CVE-2024-49526.json) (`2024-11-12T17:15:09.020`) -- [CVE-2024-49527](CVE-2024/CVE-2024-495xx/CVE-2024-49527.json) (`2024-11-12T17:15:09.240`) -- [CVE-2024-49528](CVE-2024/CVE-2024-495xx/CVE-2024-49528.json) (`2024-11-12T17:15:09.453`) -- [CVE-2024-50336](CVE-2024/CVE-2024-503xx/CVE-2024-50336.json) (`2024-11-12T17:15:09.680`) -- [CVE-2024-51720](CVE-2024/CVE-2024-517xx/CVE-2024-51720.json) (`2024-11-12T18:15:46.693`) -- [CVE-2024-51749](CVE-2024/CVE-2024-517xx/CVE-2024-51749.json) (`2024-11-12T17:15:09.910`) -- [CVE-2024-51750](CVE-2024/CVE-2024-517xx/CVE-2024-51750.json) (`2024-11-12T17:15:10.130`) -- [CVE-2024-52010](CVE-2024/CVE-2024-520xx/CVE-2024-52010.json) (`2024-11-12T17:15:10.370`) -- [CVE-2024-7571](CVE-2024/CVE-2024-75xx/CVE-2024-7571.json) (`2024-11-12T17:15:10.973`) -- [CVE-2024-8068](CVE-2024/CVE-2024-80xx/CVE-2024-8068.json) (`2024-11-12T18:15:47.450`) -- [CVE-2024-8069](CVE-2024/CVE-2024-80xx/CVE-2024-8069.json) (`2024-11-12T18:15:47.603`) -- [CVE-2024-8539](CVE-2024/CVE-2024-85xx/CVE-2024-8539.json) (`2024-11-12T17:15:11.357`) -- [CVE-2024-9842](CVE-2024/CVE-2024-98xx/CVE-2024-9842.json) (`2024-11-12T17:15:11.580`) -- [CVE-2024-9843](CVE-2024/CVE-2024-98xx/CVE-2024-9843.json) (`2024-11-12T17:15:11.793`) -- [CVE-2024-9999](CVE-2024/CVE-2024-99xx/CVE-2024-9999.json) (`2024-11-12T17:15:12.013`) +- [CVE-2024-47446](CVE-2024/CVE-2024-474xx/CVE-2024-47446.json) (`2024-11-12T19:15:14.377`) +- [CVE-2024-47449](CVE-2024/CVE-2024-474xx/CVE-2024-47449.json) (`2024-11-12T19:15:14.597`) +- [CVE-2024-47450](CVE-2024/CVE-2024-474xx/CVE-2024-47450.json) (`2024-11-12T19:15:14.823`) +- [CVE-2024-47451](CVE-2024/CVE-2024-474xx/CVE-2024-47451.json) (`2024-11-12T19:15:15.037`) +- [CVE-2024-47452](CVE-2024/CVE-2024-474xx/CVE-2024-47452.json) (`2024-11-12T19:15:15.240`) +- [CVE-2024-47453](CVE-2024/CVE-2024-474xx/CVE-2024-47453.json) (`2024-11-12T19:15:15.443`) +- [CVE-2024-47454](CVE-2024/CVE-2024-474xx/CVE-2024-47454.json) (`2024-11-12T19:15:15.647`) +- [CVE-2024-47455](CVE-2024/CVE-2024-474xx/CVE-2024-47455.json) (`2024-11-12T19:15:15.853`) +- [CVE-2024-47456](CVE-2024/CVE-2024-474xx/CVE-2024-47456.json) (`2024-11-12T19:15:16.060`) +- [CVE-2024-47457](CVE-2024/CVE-2024-474xx/CVE-2024-47457.json) (`2024-11-12T19:15:16.263`) +- [CVE-2024-47458](CVE-2024/CVE-2024-474xx/CVE-2024-47458.json) (`2024-11-12T19:15:16.480`) +- [CVE-2024-49042](CVE-2024/CVE-2024-490xx/CVE-2024-49042.json) (`2024-11-12T19:15:17.507`) +- [CVE-2024-49515](CVE-2024/CVE-2024-495xx/CVE-2024-49515.json) (`2024-11-12T20:15:12.477`) +- [CVE-2024-49516](CVE-2024/CVE-2024-495xx/CVE-2024-49516.json) (`2024-11-12T20:15:12.680`) +- [CVE-2024-49517](CVE-2024/CVE-2024-495xx/CVE-2024-49517.json) (`2024-11-12T20:15:12.877`) +- [CVE-2024-49518](CVE-2024/CVE-2024-495xx/CVE-2024-49518.json) (`2024-11-12T20:15:13.087`) +- [CVE-2024-49519](CVE-2024/CVE-2024-495xx/CVE-2024-49519.json) (`2024-11-12T20:15:13.297`) +- [CVE-2024-49520](CVE-2024/CVE-2024-495xx/CVE-2024-49520.json) (`2024-11-12T20:15:13.497`) +- [CVE-2024-49525](CVE-2024/CVE-2024-495xx/CVE-2024-49525.json) (`2024-11-12T20:15:13.690`) +- [CVE-2024-51721](CVE-2024/CVE-2024-517xx/CVE-2024-51721.json) (`2024-11-12T19:15:18.220`) +- [CVE-2024-51722](CVE-2024/CVE-2024-517xx/CVE-2024-51722.json) (`2024-11-12T19:15:18.397`) +- [CVE-2024-52301](CVE-2024/CVE-2024-523xx/CVE-2024-52301.json) (`2024-11-12T20:15:14.087`) +- [CVE-2024-7516](CVE-2024/CVE-2024-75xx/CVE-2024-7516.json) (`2024-11-12T19:15:18.753`) +- [CVE-2024-8534](CVE-2024/CVE-2024-85xx/CVE-2024-8534.json) (`2024-11-12T19:15:18.907`) +- [CVE-2024-8535](CVE-2024/CVE-2024-85xx/CVE-2024-8535.json) (`2024-11-12T19:15:19.040`) ### CVEs modified in the last Commit -Recently modified CVEs: `38` +Recently modified CVEs: `53` -- [CVE-2024-35878](CVE-2024/CVE-2024-358xx/CVE-2024-35878.json) (`2024-11-12T17:35:06.573`) -- [CVE-2024-36061](CVE-2024/CVE-2024-360xx/CVE-2024-36061.json) (`2024-11-12T17:35:07.450`) -- [CVE-2024-37086](CVE-2024/CVE-2024-370xx/CVE-2024-37086.json) (`2024-11-12T18:35:10.230`) -- [CVE-2024-38480](CVE-2024/CVE-2024-384xx/CVE-2024-38480.json) (`2024-11-12T18:35:13.150`) -- [CVE-2024-39226](CVE-2024/CVE-2024-392xx/CVE-2024-39226.json) (`2024-11-12T17:35:08.293`) -- [CVE-2024-41992](CVE-2024/CVE-2024-419xx/CVE-2024-41992.json) (`2024-11-12T18:35:14.290`) -- [CVE-2024-45769](CVE-2024/CVE-2024-457xx/CVE-2024-45769.json) (`2024-11-12T18:15:35.427`) -- [CVE-2024-45770](CVE-2024/CVE-2024-457xx/CVE-2024-45770.json) (`2024-11-12T18:15:35.643`) -- [CVE-2024-46965](CVE-2024/CVE-2024-469xx/CVE-2024-46965.json) (`2024-11-12T17:35:09.427`) -- [CVE-2024-47779](CVE-2024/CVE-2024-477xx/CVE-2024-47779.json) (`2024-11-12T17:15:08.037`) -- [CVE-2024-48322](CVE-2024/CVE-2024-483xx/CVE-2024-48322.json) (`2024-11-12T17:35:10.953`) -- [CVE-2024-50667](CVE-2024/CVE-2024-506xx/CVE-2024-50667.json) (`2024-11-12T17:35:12.270`) -- [CVE-2024-50989](CVE-2024/CVE-2024-509xx/CVE-2024-50989.json) (`2024-11-12T18:35:31.437`) -- [CVE-2024-51026](CVE-2024/CVE-2024-510xx/CVE-2024-51026.json) (`2024-11-12T18:35:32.357`) -- [CVE-2024-51135](CVE-2024/CVE-2024-511xx/CVE-2024-51135.json) (`2024-11-12T17:35:13.127`) -- [CVE-2024-51213](CVE-2024/CVE-2024-512xx/CVE-2024-51213.json) (`2024-11-12T18:35:33.433`) -- [CVE-2024-5742](CVE-2024/CVE-2024-57xx/CVE-2024-5742.json) (`2024-11-12T18:15:46.973`) -- [CVE-2024-6239](CVE-2024/CVE-2024-62xx/CVE-2024-6239.json) (`2024-11-12T17:15:10.520`) -- [CVE-2024-6655](CVE-2024/CVE-2024-66xx/CVE-2024-6655.json) (`2024-11-12T17:15:10.680`) -- [CVE-2024-7409](CVE-2024/CVE-2024-74xx/CVE-2024-7409.json) (`2024-11-12T17:15:10.833`) -- [CVE-2024-8235](CVE-2024/CVE-2024-82xx/CVE-2024-8235.json) (`2024-11-12T17:15:11.197`) -- [CVE-2024-9341](CVE-2024/CVE-2024-93xx/CVE-2024-9341.json) (`2024-11-12T18:15:47.840`) -- [CVE-2024-9407](CVE-2024/CVE-2024-94xx/CVE-2024-9407.json) (`2024-11-12T18:15:48.057`) -- [CVE-2024-9675](CVE-2024/CVE-2024-96xx/CVE-2024-9675.json) (`2024-11-12T18:15:48.180`) -- [CVE-2024-9676](CVE-2024/CVE-2024-96xx/CVE-2024-9676.json) (`2024-11-12T18:15:48.340`) +- [CVE-2024-47308](CVE-2024/CVE-2024-473xx/CVE-2024-47308.json) (`2024-11-12T20:35:53.600`) +- [CVE-2024-47311](CVE-2024/CVE-2024-473xx/CVE-2024-47311.json) (`2024-11-12T20:35:03.010`) +- [CVE-2024-47314](CVE-2024/CVE-2024-473xx/CVE-2024-47314.json) (`2024-11-12T20:34:11.720`) +- [CVE-2024-47317](CVE-2024/CVE-2024-473xx/CVE-2024-47317.json) (`2024-11-12T20:33:17.257`) +- [CVE-2024-47318](CVE-2024/CVE-2024-473xx/CVE-2024-47318.json) (`2024-11-12T20:32:35.303`) +- [CVE-2024-47321](CVE-2024/CVE-2024-473xx/CVE-2024-47321.json) (`2024-11-12T20:29:51.207`) +- [CVE-2024-47358](CVE-2024/CVE-2024-473xx/CVE-2024-47358.json) (`2024-11-12T20:28:55.623`) +- [CVE-2024-47359](CVE-2024/CVE-2024-473xx/CVE-2024-47359.json) (`2024-11-12T20:26:27.230`) +- [CVE-2024-47361](CVE-2024/CVE-2024-473xx/CVE-2024-47361.json) (`2024-11-12T20:25:04.763`) +- [CVE-2024-47636](CVE-2024/CVE-2024-476xx/CVE-2024-47636.json) (`2024-11-12T20:52:49.130`) +- [CVE-2024-47830](CVE-2024/CVE-2024-478xx/CVE-2024-47830.json) (`2024-11-12T19:55:58.010`) +- [CVE-2024-50095](CVE-2024/CVE-2024-500xx/CVE-2024-50095.json) (`2024-11-12T20:26:00.470`) +- [CVE-2024-50990](CVE-2024/CVE-2024-509xx/CVE-2024-50990.json) (`2024-11-12T20:35:16.907`) +- [CVE-2024-50991](CVE-2024/CVE-2024-509xx/CVE-2024-50991.json) (`2024-11-12T19:35:12.040`) +- [CVE-2024-51054](CVE-2024/CVE-2024-510xx/CVE-2024-51054.json) (`2024-11-12T20:35:17.823`) +- [CVE-2024-51186](CVE-2024/CVE-2024-511xx/CVE-2024-51186.json) (`2024-11-12T19:35:13.080`) +- [CVE-2024-51720](CVE-2024/CVE-2024-517xx/CVE-2024-51720.json) (`2024-11-12T19:15:18.123`) +- [CVE-2024-52010](CVE-2024/CVE-2024-520xx/CVE-2024-52010.json) (`2024-11-12T19:35:14.590`) +- [CVE-2024-52530](CVE-2024/CVE-2024-525xx/CVE-2024-52530.json) (`2024-11-12T19:35:14.927`) +- [CVE-2024-52531](CVE-2024/CVE-2024-525xx/CVE-2024-52531.json) (`2024-11-12T19:35:15.807`) +- [CVE-2024-52532](CVE-2024/CVE-2024-525xx/CVE-2024-52532.json) (`2024-11-12T19:35:16.970`) +- [CVE-2024-6400](CVE-2024/CVE-2024-64xx/CVE-2024-6400.json) (`2024-11-12T19:32:52.187`) +- [CVE-2024-6443](CVE-2024/CVE-2024-64xx/CVE-2024-6443.json) (`2024-11-12T19:29:43.793`) +- [CVE-2024-8074](CVE-2024/CVE-2024-80xx/CVE-2024-8074.json) (`2024-11-12T19:35:17.893`) +- [CVE-2024-9576](CVE-2024/CVE-2024-95xx/CVE-2024-9576.json) (`2024-11-12T19:34:37.910`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 5adf0893d1b..26d6390c1e1 100644 --- a/_state.csv +++ b/_state.csv @@ -223024,7 +223024,7 @@ CVE-2023-30300,0,0,712083f4252997953a3815109f3c4759ffd7f7694e786bef5f73c3854e091 CVE-2023-30305,0,0,9d5a4d1798210c57e74a62da74a262e6c7cec25e7dd21dd9bc85531b6ee59eda,2024-11-05T21:35:00.770000 CVE-2023-30306,0,0,093f4e372495af6db15f15345a5ce28779c69e96e116fe4dc4c334698eb3749d,2024-05-29T13:02:09.280000 CVE-2023-30307,0,0,9a4646bb9568f252fc01074e511568fce5daa83ca6ffc95bb5a8dd9c13ef0895,2024-05-29T13:02:09.280000 -CVE-2023-30308,0,0,3194094e704a260b61b3aca71ad9525f4004c473c591db53bbad11ae33f61923,2024-05-29T13:02:09.280000 +CVE-2023-30308,0,1,6670a334abf1a4f4c6d62920341120de3fed7bd7ced70153545b6f1f9129daad,2024-11-12T19:35:00.843000 CVE-2023-30309,0,0,7bed2cc00d974c0f21981e002db05aa1d9c9bb6eea8a85e53b56492f139e3535,2024-05-29T13:02:09.280000 CVE-2023-3031,0,0,10c1f10cf1613bd0a1bbf7200771584bf6866fde631eac26533eb7c4ae501aea,2023-06-12T16:48:57.833000 CVE-2023-30310,0,0,b64f22995dd6d4cf998abebda15f2f520a185af33c13f85f861bcf5fd0b99ea3,2024-11-06T20:35:04.160000 @@ -230287,7 +230287,7 @@ CVE-2023-3979,0,0,dbb5b8e490d6ca3eb60bc52d3652867cbac5fa16a85b6a4a455987f8145423 CVE-2023-39796,0,0,6a2c1ab94254f2f8cf0378a98b40e5c6f4b4152e04666f8f48c2227947be748c,2023-11-16T19:20:34.407000 CVE-2023-3980,0,0,db4ab419538d058a1ecc5d1dd4fa70525d3496f3743f29ba62e48f47a9e597fb,2023-08-03T13:41:37.933000 CVE-2023-39801,0,0,c0b9e001fb588b44c181d9c45b0068f521185f245e1de4b3270c337bcbe073dc,2023-08-29T16:10:38.307000 -CVE-2023-39804,0,0,5a5c061a4f44e720fb5f9c3b13d230955542fed06b96530435f2fd629ff21d99,2024-03-27T12:29:30.307000 +CVE-2023-39804,0,1,0c8dd4c6c44b0254772d2286ddd2dd92698585a9ab27e566c5c3a2efaa44ad48,2024-11-12T19:35:01.960000 CVE-2023-39805,0,0,380539e7a17ecab7b5c22e76f61c87dd1f20af10cc09511a1b3bf32e61762de3,2023-08-15T19:44:14.640000 CVE-2023-39806,0,0,56634abb3fee55c2f1e780c80860cf341e01850454ce520c28e0c59138dfc831,2023-08-15T19:44:26.260000 CVE-2023-39807,0,0,2948c4710296d56fcc333ddf3c02315c7f14de0f04b5291fe230574526fd7cc1,2023-08-24T17:53:53.093000 @@ -230827,7 +230827,7 @@ CVE-2023-40453,0,0,130c1ba245794699f114636eda3c5cf90574ba5b46bd6a704fe406b89dec0 CVE-2023-40454,0,0,c10b12346537ef1e5c8787b1e2fe9d4cb45cf0b585647c357d5bb525587ce317,2023-11-07T04:20:15.070000 CVE-2023-40455,0,0,058abdb8c2eae30e165ec5b264dbf295ba8e09c6c3830c69886965016a5de75b,2023-10-12T02:29:35.947000 CVE-2023-40456,0,0,7169803686183a5f1d426b39f88228ec6dce3691ab53bc177c949c7a8fd9efca,2023-11-07T04:20:15.193000 -CVE-2023-40457,0,1,f66f1d5e2e0ac40e6f32530b5b5610f48deb1491ee6ad3c3cb1657188a034168,2024-11-12T18:35:01.990000 +CVE-2023-40457,0,0,f66f1d5e2e0ac40e6f32530b5b5610f48deb1491ee6ad3c3cb1657188a034168,2024-11-12T18:35:01.990000 CVE-2023-40458,0,0,79a445a17e1f85e1f6c9345cf6a43d9301aed3a647416fbf1fc2770253362cdc,2023-12-05T01:55:09.410000 CVE-2023-40459,0,0,72958d07cda00b0c6d4ae1b61eff24e072a6de9dcd7e9245179ab8da7c7dd63d,2023-12-08T15:47:51.637000 CVE-2023-4046,0,0,74357e4a22d4d6aa6afa8fb2beea6097492a98a519070e944818d05926f858bb,2024-10-22T16:35:14.267000 @@ -232205,7 +232205,7 @@ CVE-2023-42280,0,0,338f1e80580ca1989719a71ec7d0b94dc9c2d9206091f2586bdd5dcdcbeba CVE-2023-42282,0,0,5372ebc66cdacc2f51e8cdc27180dd1a7cf8d8e17f9e4e0c886380bec3ab6925,2024-10-09T15:14:21.817000 CVE-2023-42283,0,0,eb1dd33ed81d2cda0b1cc9c01a925283f91fb7dc61ff23d14f3504998d98d90f,2023-11-14T19:39:46.053000 CVE-2023-42284,0,0,6ab160dd02f58913692c1d76b9bf09e29104d4837d03edcab143adf85652f8a6,2023-11-14T20:35:27.577000 -CVE-2023-42286,0,0,1ff902e0c529d433cb875766830d3d5c7e1b312f2a66bbf37d0991d655f68bc2,2024-03-15T12:53:06.423000 +CVE-2023-42286,0,1,47682b73ddb9ff83fc4ef26dacd4757461596e3617e1ab1a765afa6b2ead2547,2024-11-12T19:35:02.187000 CVE-2023-4229,0,0,c8878fe9348d1225eac93b90b7ee6931b407f842422705c5faeac51f6db8ccd9,2023-08-29T23:35:40.940000 CVE-2023-42295,0,0,cc44feed62e63d3e98abd798cacc55eafbcbeda664828aa937917a38bda526c6,2023-10-28T03:19:16.690000 CVE-2023-42298,0,0,325bd6dcacae03a8901546ecf6a68800fcd55993f137c16c4a30439b947a39a4,2023-10-17T14:11:02.190000 @@ -233582,6 +233582,7 @@ CVE-2023-44251,0,0,60ad3e8bd99914522574db812b53a318cb7fe0b1057fd5d59a8fb8c991bcc CVE-2023-44252,0,0,c18e31969fe55318dc34cdcae06d8b35b920d99915cca01a86c8e6e9e5d91093,2023-12-18T17:34:39.763000 CVE-2023-44253,0,0,b94586d93ff7b12102ad0c3e79155b5172e9e5dab827ce60a53904c92536ddba,2024-03-11T22:15:54.337000 CVE-2023-44254,0,0,7fbef97960cab8fb6cf8b24da4075570bf745a8c0b57aa02900c6347ac296ed3,2024-09-25T20:17:40.970000 +CVE-2023-44255,1,1,0158ec2fe0b118f697963e8fa8b3edaaf77a5e943d65472f2bed6bb241aa1a4d,2024-11-12T19:15:06.850000 CVE-2023-44256,0,0,3a47f8714449fba575f4306ec8fb3c9c1958c7bc0c5e1b109cba6f7638ba3dde,2023-11-07T04:21:34.997000 CVE-2023-44257,0,0,6d9b01019b2cfe81d2e4c80b77f48870a867993b0ccc3f7e8616b833975a5d04,2023-10-12T01:48:28.493000 CVE-2023-44259,0,0,e536f0c314a79ffaadd8d22b948548f70b43b3a40f213b998434d3188c2c6c0b,2023-10-12T00:41:15.513000 @@ -235789,6 +235790,7 @@ CVE-2023-4754,0,0,935915c581d254cda2189eadfff9465b8454797de75257e0d80bf8a1d166a4 CVE-2023-47540,0,0,fd1741d76de1fb29ac7d37d278137c2b9bb49f6cf941d638968b52bf0a42f6e9,2024-04-10T13:24:22.187000 CVE-2023-47541,0,0,70d2d1e02c8ca71e734a9cd26b714a82923d0b120a601a2b3de70f0a90db5a71,2024-04-10T13:24:22.187000 CVE-2023-47542,0,0,536e3751f56b487efa490cf272f0d9ae54ae7bb6b6020e26852fb81c2357eed9,2024-04-10T13:24:22.187000 +CVE-2023-47543,1,1,00fb5b30e6f94fbd7b8e3ad5d8f6a1f6b7dc3defbfa76184f6503b48de5651e1,2024-11-12T19:15:07.110000 CVE-2023-47544,0,0,7a7b854f49423922f593c72a698f138905ac6e0ba2c59d1a31c9581c144849fd,2023-11-20T20:29:18.980000 CVE-2023-47545,0,0,7d8de35f3a3ccd88639d46c5fa70ceb8f83dc675156038fe8712d01a850025c4,2023-11-20T20:28:54.547000 CVE-2023-47546,0,0,59bc18d760f6562e5da7078d0efa3856b2dbe92167372366ba6dac13c8913c66,2023-11-20T20:28:19.373000 @@ -237664,6 +237666,7 @@ CVE-2023-50170,0,0,35e958ca9e1e87a9a58954076b33cef095d0c7756fd04b778caa16ac16118 CVE-2023-50172,0,0,0e77f8672f5cf0fb47b8becab367b19a56d5395eded77044b2dad65f5dff69cb,2024-01-18T14:28:59.977000 CVE-2023-50174,0,0,5231481744a295e82b51c5724a4a3afbdad4616950b393d426cf684f8bc4019b,2024-02-14T18:15:46.640000 CVE-2023-50175,0,0,1f4c148f2ad49dc23cadeda416bba9717617a9eed1ffebc27bb2042d761f8318,2024-01-02T19:53:20.863000 +CVE-2023-50176,1,1,772a75244d6fd569bb74acd9160985408a7871bc4a6a954d7af173969b6a3459,2024-11-12T19:15:07.360000 CVE-2023-50178,0,0,e70c7f9333304ad169a3d817a8261a36cae8eb5c6f191d06e5ee03e53b449db7,2024-09-19T16:06:36.073000 CVE-2023-50179,0,0,d7024dbdef420a4bf550a9373a8d6fb995c92f579a6b24fe5fa75e2141103990,2024-09-09T15:54:14.980000 CVE-2023-5018,0,0,cae5f64430f83fdd33bf69324906a6cb5316c44f52a942103dd4a7b86daf8ff3,2024-05-17T02:32:46.463000 @@ -238285,7 +238288,7 @@ CVE-2023-51208,0,0,2e1f21f8e5d857887c3f899fd4593f10b397e3a39401d099d98d6c5bd6ee5 CVE-2023-5121,0,0,46287db8a217d3d5ab4deb4dee376afdccc5bbf3df6e7937e02f24621bb62643,2023-11-07T04:23:28.827000 CVE-2023-51210,0,0,408d109f353125fcbc9e4024f5c91829754158e94898530652d1462aff8aabd9,2024-01-29T19:38:28.213000 CVE-2023-51217,0,0,804003af226f05ce2da0aae9a1b2b53a296e5ba5852a1145267b45b6e8b01d07,2024-01-26T14:40:49.700000 -CVE-2023-51219,0,0,224214ec43f7edf7652e340261967af4873d7012cd198464ea752949f8fc6847,2024-06-25T20:15:11.020000 +CVE-2023-51219,0,1,62ff5ca08fe0b837afd90bd562329b5e4c83acf0c1cdb3798b3221278d0ba459,2024-11-12T20:35:04.087000 CVE-2023-5122,0,0,fe76f2610a8efa1fcfd693c92d5281a39b05e8b633407f90e66c7dcbc7e04923,2024-10-23T15:50:43.897000 CVE-2023-5123,0,0,cca3c3f4fbb21f5c6a6d6265e33aa2e87141d3923657e91283715ae631af137b,2024-06-18T10:15:09.937000 CVE-2023-5124,0,0,0483628dd0304bc2218edc0adec9562db891718cb630f07e9b08db9d21711017,2024-02-05T16:48:58.247000 @@ -239038,6 +239041,7 @@ CVE-2023-52264,0,0,9b2ff78f1b876fa1ed0a22169927fe0b9df14333dbd58be130a0170557049 CVE-2023-52265,0,0,d76308d493ddec97e5a9af6160653c91db8aca54e222e0b0f6f03ebefe6a6952,2024-01-11T20:17:16.273000 CVE-2023-52266,0,0,392e79410dd28494b88c098222c23fa3ab292d50b98fa168a723aeada84a1be0,2024-09-09T21:35:09.117000 CVE-2023-52267,0,0,a333985231dc167d1838ad07c7f5412f41c783b53ac052753e0394b8194796a8,2024-01-09T21:19:32.343000 +CVE-2023-52268,1,1,a440749df204d286a0eb8231f8bb5a110396eba5c3351ff960e5cc3747320e12,2024-11-12T19:15:07.580000 CVE-2023-52269,0,0,ae7fc490058617ae4584a64bab235e35ba38d09972835c8ece18357ffb1a0dec,2024-01-05T23:00:11.447000 CVE-2023-5227,0,0,d4daee66405b8a1d06a941435a285f2115b931497ec0b99c34cdc1308378d03b,2023-10-02T16:52:16.400000 CVE-2023-52271,0,0,5a7356e907e854f9c1c062688218b967fa769317102d847875b30ea40a5822eb,2024-01-11T19:59:26.420000 @@ -239341,7 +239345,7 @@ CVE-2023-52598,0,0,bbff85f6da88960238e28c6f0a121efc0c4a66ccf1ba1c1067a97f6e8d703 CVE-2023-52599,0,0,d55446618a9898e606b15663834a5e93b1f33b0e8f71ed5cccd2ccba73a05358,2024-11-04T13:16:40.127000 CVE-2023-5260,0,0,eea990ee194786c0ea758019a51c9ffc454af1aecc04aa0aed3120bf95b39b00,2024-05-17T02:32:55.730000 CVE-2023-52600,0,0,b934246fbf7034aeddea89183da9baee386182bfe57172eca17dc29adf16395e,2024-11-04T13:16:40.210000 -CVE-2023-52601,0,0,abd1dd5e508f0382c77e8e77b1ed756dddb12fcf24ea1432dfa9bafb3746cc65,2024-11-04T13:16:40.320000 +CVE-2023-52601,0,1,8f129eb0d2368d06b5259c6a59d836300d2f9c12ddbba67e1fc2844cf090950f,2024-11-12T19:35:02.970000 CVE-2023-52602,0,0,ef8823d9c7776f4fdb5d045103dcbea9a904b8275327a2f6bb5f9bd1fe9d4fc1,2024-11-04T13:16:40.407000 CVE-2023-52603,0,0,3c26667f771564ab761ffffb35c5c32c1010d331b6ccdc7b37a4b6c152533b19,2024-11-04T13:16:40.520000 CVE-2023-52604,0,0,157b3c9ecd8457663c736c89c0c477f5eb3406ee5e3fe4f02d777431f3d331ed,2024-11-04T13:16:40.603000 @@ -240950,7 +240954,7 @@ CVE-2023-6677,0,0,e8d7b2ac483abddd5fb5246b0ccb58f2167ff8c7d9bb3d75a435f4c19bbf40 CVE-2023-6678,0,0,1b6b891a0a4426afd1f075411ff63c2743633b69b418dac3850de8598da1bdb5,2024-10-03T07:15:25.903000 CVE-2023-6679,0,0,8a553df1f73da3c3f6a8806f65fbad51b05599efca34aa3bb086ca5c7375d091,2024-09-16T16:15:11.767000 CVE-2023-6680,0,0,c6542118c55ee22c9b7c10aee5216ffa75acaf15d09a32564befb52a8c8ef3f4,2023-12-19T20:51:03.237000 -CVE-2023-6681,0,1,ed277c59f3d312dc8556dfc6a1d1c9b2636fac1d961e3e3f2341af755c66b76d,2024-11-12T18:15:17.333000 +CVE-2023-6681,0,0,ed277c59f3d312dc8556dfc6a1d1c9b2636fac1d961e3e3f2341af755c66b76d,2024-11-12T18:15:17.333000 CVE-2023-6682,0,0,69333011d542843f9f8a1cff6b2418572503758c6c0e55bd5de3a41edb291769,2024-10-03T07:15:26.070000 CVE-2023-6683,0,0,b645b2687895ad9ffdd472ae3eb052dcc4d9790cb61e30172f134f068042e89a,2024-09-14T00:15:14.397000 CVE-2023-6684,0,0,da2814d561e54fcd1c06571b2900d34494328fc42cf13ea916a741c8e290cd99,2024-01-17T20:41:05.143000 @@ -241461,7 +241465,7 @@ CVE-2023-7246,0,0,050d4503ff5d2fc1e4ed53053f9ee9630c64fe69870c591a8ba326c5d224f6 CVE-2023-7247,0,0,11dff8be09894b40cbed69114f71626bb57aa842b25cc2bedf8081784fe369f7,2024-08-12T14:35:03.053000 CVE-2023-7248,0,0,89fb0153d5d95a0d63adb7f25676b5b6c97388e661ba5f8924ac36ffce0f3f87,2024-07-26T19:11:49.893000 CVE-2023-7249,0,0,edc651203a9405def51a7acf8d5e1ea94a3c703618e6136a6e052f78ab77b7a0,2024-08-13T17:13:50.917000 -CVE-2023-7250,0,1,d2697716e6fb6d3106b6b6ee93de27e1a2aa1cee868a8468ee5a044250f1319b,2024-11-12T17:15:05.750000 +CVE-2023-7250,0,0,d2697716e6fb6d3106b6b6ee93de27e1a2aa1cee868a8468ee5a044250f1319b,2024-11-12T17:15:05.750000 CVE-2023-7251,0,0,dd7a7df27ce68aab327ba0baa92251358ec7e4d2777ca1ea9021ce7d40f54021,2024-03-26T12:55:05.010000 CVE-2023-7252,0,0,a96b97f43999a9df13dd6b86a1c20c7b99309234cadd0538e19b9a3c2d31e5fc,2024-07-03T01:44:29.993000 CVE-2023-7253,0,0,4436e6df0abbc2be66c875c1a3b7421386cfdc4e7cfd00a94031f9b2a2d0783b,2024-07-03T01:44:30.193000 @@ -242538,6 +242542,8 @@ CVE-2024-10202,0,0,bbf4778e12a2d6f664529db53cb3cf049c2b3a3bf45111e5ee15b039098bf CVE-2024-10203,0,0,2281dae8a6da10bb152783d708df85babb66d3a8b4310b54237aa5d49f660e26,2024-11-08T19:01:03.880000 CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000 CVE-2024-10214,0,0,f1ffbc47d38f848fe742b18a6312c0e8ed0dcf6ee0fac4acd3827be3368439e7,2024-11-05T17:03:22.953000 +CVE-2024-10217,1,1,c1a001313771a02762110fcb8a2ca7a7e5a709a59a3a8f020c865fbde518a63c,2024-11-12T20:15:05.807000 +CVE-2024-10218,1,1,d224507cde3433162eee7dbf93018449f00f3a58f9f3b12f0497a5ee149ff713,2024-11-12T20:15:05.913000 CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4debd,2024-05-17T02:35:11.070000 CVE-2024-10223,0,0,237ebcbe1a44551c4c262c272427d3817a64977114a9e921cdeb1f7ff3ea65fd,2024-11-01T12:57:03.417000 CVE-2024-10226,0,0,6d4cd561e79cc1ca7a5d9390efd20e7ca0cce098a56a2c4eb01cd0ded7623cbf,2024-10-31T16:48:41.553000 @@ -242924,16 +242930,16 @@ CVE-2024-10919,0,0,e8fbb923eb829e965254205b876d7ef672d5aac59877ea419609aa8d8f6bb CVE-2024-1092,0,0,4e514cbeb8cbdb0016fe4cb374f3dffe448e95b35a82b13ed7cb7be1b7fe61c2,2024-02-13T19:43:06.247000 CVE-2024-10920,0,0,2cf9a2b6fa319444c301d4d5e50d2260546d202b9ce9ceed0622f3257443827f,2024-11-06T18:17:17.287000 CVE-2024-10922,0,0,2e8ad1bbe2c22b2f860e82caba9eca723e865a4e9bffae87682e3cfa53e59e0d,2024-11-08T19:01:25.633000 -CVE-2024-10923,1,1,82c317d92ab1af3f47ad0ad4c35f20bd39aa6b7b5483e38f4b25d2b1b0295625,2024-11-12T17:15:05.947000 +CVE-2024-10923,0,0,82c317d92ab1af3f47ad0ad4c35f20bd39aa6b7b5483e38f4b25d2b1b0295625,2024-11-12T17:15:05.947000 CVE-2024-10926,0,0,d4b8448490b176d20ac7d5dd5d9abfb0445d0f8f33211ac22e460a561e976123,2024-11-08T19:01:25.633000 CVE-2024-10927,0,0,89d2896b297590d0b070dc2d6fc3af12d21eeade74b7d5af5a8c30243a174669,2024-11-08T19:01:25.633000 CVE-2024-10928,0,0,d7b9ae13d8f86fa638d0e1d42acef5c90ca0f7e31aac0a4c1ed2473457ce5298,2024-11-08T19:01:25.633000 CVE-2024-1093,0,0,de7ad9b72d87a55cf339c2dc774b7bea1d33bb68e3b932a439fb6fd6a0ef5b53,2024-03-05T13:41:01.900000 CVE-2024-1094,0,0,e9e492360318e20689e515fe6138ed3b8630e834f4abf2efeafd987f7e7b2dc6,2024-06-17T12:42:04.623000 CVE-2024-10941,0,0,13c9aa5648736117eddcc05b7c7bbd41bd256da81c39332a1bd9e9e846bf4626,2024-11-08T19:01:25.633000 -CVE-2024-10943,1,1,84c07fdcd8c5106d81f33b83afbfffe38cf4ca09d97554fa1a2524231064ce3f,2024-11-12T17:15:06.147000 -CVE-2024-10944,1,1,fad9252603f4f5e633aab60761cddb765b5389cacf71dca515252fac65e41aa6,2024-11-12T17:15:06.397000 -CVE-2024-10945,1,1,4e477166a1f6f50ebc376c175bf644c0d42879d182fdd9cbb451bcdfb5071cc7,2024-11-12T17:15:06.640000 +CVE-2024-10943,0,0,84c07fdcd8c5106d81f33b83afbfffe38cf4ca09d97554fa1a2524231064ce3f,2024-11-12T17:15:06.147000 +CVE-2024-10944,0,0,fad9252603f4f5e633aab60761cddb765b5389cacf71dca515252fac65e41aa6,2024-11-12T17:15:06.397000 +CVE-2024-10945,0,0,4e477166a1f6f50ebc376c175bf644c0d42879d182fdd9cbb451bcdfb5071cc7,2024-11-12T17:15:06.640000 CVE-2024-10946,0,0,53c127b5d01f3eb86df399cdeeb942bf199714aabfb134ba6a8dac66d645a2f4,2024-11-08T19:01:25.633000 CVE-2024-10947,0,0,0411e4a4d7c1a87e65d7d83c82156a4ec968e1f848bfec751aba34746b5cca7a,2024-11-08T19:01:03.880000 CVE-2024-1095,0,0,e70da3b629cae08421ac3ff6db71fb525bf872b735f906aa9168a1a3feae7dcb,2024-03-05T13:41:01.900000 @@ -242947,7 +242953,7 @@ CVE-2024-10966,0,0,3df47cfeba07424dbca1650d45cf844f6cc1bcda5f1462544d39e404a912c CVE-2024-10967,0,0,045953be48e7bafc650cdaba1889b3cce653fc03383c0343e3292851109279a3,2024-11-08T19:01:03.880000 CVE-2024-10968,0,0,f600c79ff6183eb1b51f4003b01ba4a417fb853b88c9cd1f3e9f06879ffd32fe,2024-11-08T19:01:03.880000 CVE-2024-10969,0,0,34fb384baf8f9b6070297fa30997eac3a4fc91278070bd97f872695ea721a856,2024-11-08T19:01:03.880000 -CVE-2024-10971,0,1,b4b82dfc872fef33ddffdd14312b6666aaa239c31cf44b5ba468870e23f38075,2024-11-12T17:15:06.870000 +CVE-2024-10971,0,0,b4b82dfc872fef33ddffdd14312b6666aaa239c31cf44b5ba468870e23f38075,2024-11-12T17:15:06.870000 CVE-2024-10975,0,0,f38693c9a402e208f0de21f91edcefa5c1f789073d3e380787ea5dd138f197fa,2024-11-08T19:01:03.880000 CVE-2024-1098,0,0,7637c79f93f6fef4c2ad0472be16e5b2b85cffeb9436b7defda280fbd3390871,2024-05-17T02:35:14.017000 CVE-2024-10987,0,0,0f5f40b95778e745d3c36eceef208d20fa1e84c6479725fa9e8e4c2b6e2464d8,2024-11-08T19:01:03.880000 @@ -242965,9 +242971,9 @@ CVE-2024-10998,0,0,41f387fbf1645aa90b35c52ac0db0cc1b6181351deba62e7b43db2377129b CVE-2024-10999,0,0,25c169fccdcc9e88a3876005f32d4643213fc0492b1ed51816b7a93f6109fc6e,2024-11-08T19:01:03.880000 CVE-2024-1100,0,0,f004473b9cf0d9d95a81c6b2db685e986de4389d0d38ab5c3537c8bbd36c025b,2024-07-03T01:44:59.517000 CVE-2024-11000,0,0,4fb6c84b88e18aeb98d1b738e518210fb6a3e1010153945ab3cfa9fceb300001,2024-11-08T19:01:03.880000 -CVE-2024-11004,1,1,bdd615d7fc4237dd1e34b18175b7a4bd23ea93fdaf86a550ff5db989d73c3b40,2024-11-12T17:15:06.943000 -CVE-2024-11005,1,1,6625a7034e44e3470d0593f642bc7d15f05d206a40a9f5a10fb4cb5474d25cf2,2024-11-12T17:15:07.130000 -CVE-2024-11006,1,1,68e6bf66f299a92baed5e7aaa3945d18465ada80a70b895680302f34e929ef13,2024-11-12T17:15:07.333000 +CVE-2024-11004,0,0,bdd615d7fc4237dd1e34b18175b7a4bd23ea93fdaf86a550ff5db989d73c3b40,2024-11-12T17:15:06.943000 +CVE-2024-11005,0,0,6625a7034e44e3470d0593f642bc7d15f05d206a40a9f5a10fb4cb5474d25cf2,2024-11-12T17:15:07.130000 +CVE-2024-11006,0,0,68e6bf66f299a92baed5e7aaa3945d18465ada80a70b895680302f34e929ef13,2024-11-12T17:15:07.333000 CVE-2024-11007,0,0,b6b07f0f1b717bb71ca1b4cfa8c9c66fbc9870ae254868dd40a59be0d6f05465,2024-11-12T16:15:20.050000 CVE-2024-11016,0,0,e06fd1e37d2bc29c8627eb88aec0c98e8edfc5d8e9aa4e4b0a05b03aac4f15bc,2024-11-12T13:55:21.227000 CVE-2024-11017,0,0,b6f5a0fdb93950e300deb11212bccdb1604dbaaea57c853aac4276b5e817e85e,2024-11-12T13:55:21.227000 @@ -243029,7 +243035,7 @@ CVE-2024-11126,0,0,b967d4c9797ae557d5008a2e89e34b56b8ab089540ce69fba53b421e80e1e CVE-2024-11127,0,0,872c91b8fef54d334e58f460ad31540519bfcc5b745ac9da794cfe9b05f34fe8,2024-11-12T15:48:59.103000 CVE-2024-1113,0,0,6955c6c679809523d129efea09ef779c898e264f7e3230a68d2b1fd615c8f410,2024-05-17T02:35:14.663000 CVE-2024-11130,0,0,578a772ca1269be9bdc99bb966d7eb9c39dbd0e02e5dba4d3229d53dfaceb8e4,2024-11-12T15:48:59.103000 -CVE-2024-11138,1,1,880c841f831a3231f2a2e94e0c11fd28807c2a95758488ce39dcd6a3792cc342,2024-11-12T18:15:17.543000 +CVE-2024-11138,0,0,880c841f831a3231f2a2e94e0c11fd28807c2a95758488ce39dcd6a3792cc342,2024-11-12T18:15:17.543000 CVE-2024-1114,0,0,4ba1cd03fbc35862ac6b2ce79da50122dd303ea22f4f4a45a352ffb5be12a8ee,2024-05-17T02:35:14.777000 CVE-2024-1115,0,0,4dae9d3d8bef65fab3d547368288cc3126446be18b7fc740123f9a96bd6241e2,2024-05-17T02:35:14.880000 CVE-2024-1116,0,0,4196b5c71a0d802f4c1e9b3a43ac71c958f929e96b26e1ebb01241c6bd176fa3,2024-05-17T02:35:14.983000 @@ -243448,7 +243454,7 @@ CVE-2024-1552,0,0,307682b68873a43cdafe24dafb6eac26e19ab3e38eeb9bd9141f362a83f2be CVE-2024-1553,0,0,d4e69432c11edaf26cb5ecef8a367b24963a2177b8e86262b661ecf0acdfe67c,2024-08-23T20:35:04.453000 CVE-2024-1554,0,0,94cfb6cc07ab1eefb4963abf2ff816e5d8e104e1eff443cecb73eef11729b877,2024-08-20T20:35:08.463000 CVE-2024-1555,0,0,65f007452d03670d11abd2d0d619aa73a454e482a2468476c6547ed89e323774,2024-02-20T19:50:53.960000 -CVE-2024-1556,0,0,aed72754d6ff6ef4bf3de10f175055dc5ade8417a3f0589e0e6af354e65dba1f,2024-02-20T19:50:53.960000 +CVE-2024-1556,0,1,4a94d2fdf889ccc8aa6ea910de12200555f8d40d609519dd619bf98c3de1e735,2024-11-12T20:35:06.360000 CVE-2024-1557,0,0,51db3712932ec01c1eb8b1a021f210ee26b20d61c6eed4eadf04bb01c575f448,2024-08-12T17:35:01.353000 CVE-2024-1558,0,0,5408d260e40f39bd01d36a021872f3676b893d34da45c6b851a3176159106b0a,2024-04-16T13:24:07.103000 CVE-2024-1559,0,0,9bd16e4aef27e2e890b260b64d16a4c57572898eaa69db912a135654b10e551d,2024-02-20T19:50:53.960000 @@ -244617,7 +244623,7 @@ CVE-2024-20941,0,0,432097a0e08365dd57f0447a52ded0a281b4295456f7af31a527d203b7335 CVE-2024-20942,0,0,138cd75b35d318f86006ff20a4b3b9623740d177f3b79d48f82f62a57936df7d,2024-01-20T18:34:14.440000 CVE-2024-20943,0,0,c893b8e5b6540c97f966b32b9f9335406bebc3fc0fcebe2041732294e6d7a03c,2024-03-12T14:56:31.537000 CVE-2024-20944,0,0,455869c6c4218017ed3052a739e20e96a49e80460128731305c47837c36967b5,2024-01-20T18:33:55 -CVE-2024-20945,0,0,6fc39018c3d26af45c5b79c696b722ae8491bbebdf51cb3600d1b30887d929bb,2024-02-20T19:51:05.510000 +CVE-2024-20945,0,1,c9a7660aedc8461cf49457ff4506ab3c831d2d70e2229c352a5ff786b482ec6f,2024-11-12T19:35:05.470000 CVE-2024-20946,0,0,56e0cf0754ba8e278ccf7edaa24692b76328344031645b099a23b6122dd523b3,2024-01-20T18:33:39.923000 CVE-2024-20947,0,0,0a2e4d20648a1d06c26162eb28926c103f307728c3ed375718ac4fd8da927958,2024-02-20T19:51:05.510000 CVE-2024-20948,0,0,12e9e8a4ba5f0d4d5a3ec7d1b0d3211c79a9e2d1eccf174b1829b4aa21974fac,2024-01-20T18:33:19.560000 @@ -244696,7 +244702,7 @@ CVE-2024-21018,0,0,cb52a8fdc7a4ae231f24e399d225f4515ac33de79654502635708c1e90c2b CVE-2024-21019,0,0,73923fdd6992d7670932a7bcfccad8b39eb82569c95d5e913e0b30282fa52c3b,2024-04-17T12:48:31.863000 CVE-2024-2102,0,0,063af9520b1c53909e19a4c543dd4e89e92c8386c428fad7438fe729761d527f,2024-08-01T13:49:41.380000 CVE-2024-21020,0,0,d93fbad604c8e8745c1fad68359513bcf3ca7a5201c226f17ea97a532899c166,2024-04-17T12:48:31.863000 -CVE-2024-21021,0,0,b6e440cb47f4455a8f7f21333abe159a9793be0fa8a8c63ca1e08d9c4c708934,2024-04-17T12:48:31.863000 +CVE-2024-21021,0,1,64827289a059e7d96255e1e78c913ce22eb2f8c3fa061b78e9bca939974553d5,2024-11-12T20:35:07.200000 CVE-2024-21022,0,0,7ccbb7b797124115a160253b5a2400bd740ca6dfa914b0db3e9b919856d02d6b,2024-04-17T12:48:31.863000 CVE-2024-21023,0,0,927d06c9c846b66c85686832a7d8ba13dd57e57adc9551190b6fa4a25e207424,2024-10-31T15:35:24.947000 CVE-2024-21024,0,0,4b07a3985eeac45f7d54b09efd6441e42ce548c3dd1c1f08e54387e9dd30c772,2024-04-17T12:48:31.863000 @@ -245515,22 +245521,22 @@ CVE-2024-21918,0,0,742b173c7dcca847586b3391775dbdbe8cf845cb3792806068b182f51bb9a CVE-2024-21919,0,0,17b9ef89ab049d67d3ba5d623527fb2d2cb4b013bdd1ced697ea307068eedea1,2024-03-26T17:09:53.043000 CVE-2024-21920,0,0,efae5f91f3c13ea098899efbd9298ae4cffb0d59d9536b3843182476a9397fd1,2024-03-26T17:09:53.043000 CVE-2024-2193,0,0,122bbc4272c132b83a700a76d93edb5ac61ae458bc4cc3c2f2865bcd2babf1e6,2024-10-29T16:35:13.023000 -CVE-2024-21937,1,1,b87d98de42bebe23153f1c85305668cdcab2c19da20ad82edffca7413220d104,2024-11-12T18:15:17.863000 -CVE-2024-21938,1,1,19cb3b969e423af3ddf9fa03d8569d3ab03a534e36cce19e8f302e7b62131c14,2024-11-12T18:15:18.073000 -CVE-2024-21939,1,1,6031d9497f6ed5b812aca4d315348c36f381cc5040f6b4853a63411f8c1ca3f1,2024-11-12T18:15:18.263000 +CVE-2024-21937,0,0,b87d98de42bebe23153f1c85305668cdcab2c19da20ad82edffca7413220d104,2024-11-12T18:15:17.863000 +CVE-2024-21938,0,0,19cb3b969e423af3ddf9fa03d8569d3ab03a534e36cce19e8f302e7b62131c14,2024-11-12T18:15:18.073000 +CVE-2024-21939,0,0,6031d9497f6ed5b812aca4d315348c36f381cc5040f6b4853a63411f8c1ca3f1,2024-11-12T18:15:18.263000 CVE-2024-2194,0,0,0e5ae4464806cff80b610073b7b679519a42660f4236dd411b709bf3ba1b49c9,2024-03-13T18:15:58.530000 -CVE-2024-21945,1,1,fce2d6482929a4c763e216d2b52fd868431cc616fde27464f2f8a716a2c8a46e,2024-11-12T18:15:18.450000 -CVE-2024-21946,1,1,6ed223a95b2c1fe4e4585a27575c1126b2d5e2b1a7711ff12062b5f784306b9e,2024-11-12T18:15:18.633000 -CVE-2024-21949,1,1,d5eb277f64774a74419a2c56d5e5c2e576b86aa93a11ad54cafa679cfef6117f,2024-11-12T18:15:18.813000 +CVE-2024-21945,0,0,fce2d6482929a4c763e216d2b52fd868431cc616fde27464f2f8a716a2c8a46e,2024-11-12T18:15:18.450000 +CVE-2024-21946,0,0,6ed223a95b2c1fe4e4585a27575c1126b2d5e2b1a7711ff12062b5f784306b9e,2024-11-12T18:15:18.633000 +CVE-2024-21949,0,0,d5eb277f64774a74419a2c56d5e5c2e576b86aa93a11ad54cafa679cfef6117f,2024-11-12T18:15:18.813000 CVE-2024-2195,0,0,bb0953f36325af10b37984088b8b1459185284ada2095a83a3bbf8eda597a9b0,2024-04-10T19:49:51.183000 -CVE-2024-21957,1,1,0e04ca86e4884bcf65ba6dc9408acf9feaa42d17dbb76c2a5c98adf0a6a978e1,2024-11-12T18:15:19.050000 -CVE-2024-21958,1,1,e172cd0f194b977f7aab4d3f449d45211998847f61fa00467dc4a01e059b3871,2024-11-12T18:15:19.340000 +CVE-2024-21957,0,0,0e04ca86e4884bcf65ba6dc9408acf9feaa42d17dbb76c2a5c98adf0a6a978e1,2024-11-12T18:15:19.050000 +CVE-2024-21958,0,0,e172cd0f194b977f7aab4d3f449d45211998847f61fa00467dc4a01e059b3871,2024-11-12T18:15:19.340000 CVE-2024-2196,0,0,8ec133a9075bc1567c504d98dff21f157cca962585a8b4ec57dc32003f56e460,2024-04-10T19:49:51.183000 CVE-2024-2197,0,0,c0f73e1956ff9edc11d589212e34e54996b4c99f318ed5889f3320f37bab4ded,2024-06-05T23:15:33.943000 CVE-2024-21972,0,0,faeb67500b1dc4ef8f1b7649334b23a7c70f07a8990a8b6dfa5400e248a30e42,2024-04-24T13:39:42.883000 -CVE-2024-21974,1,1,cd40f31d16999fa460c0102d6164e9d81abe62fce1a64935eb8f5e40b45dc4a4,2024-11-12T18:15:19.533000 -CVE-2024-21975,1,1,c98e05c5a1f279f46603da105def4a0f441343f2fb77dd7362537810a4e189d0,2024-11-12T18:15:19.723000 -CVE-2024-21976,1,1,197c9e566528c5421dc8bbd01435a12444da8c485f4acae12f5a05472f30e7b7,2024-11-12T18:35:03.770000 +CVE-2024-21974,0,0,cd40f31d16999fa460c0102d6164e9d81abe62fce1a64935eb8f5e40b45dc4a4,2024-11-12T18:15:19.533000 +CVE-2024-21975,0,0,c98e05c5a1f279f46603da105def4a0f441343f2fb77dd7362537810a4e189d0,2024-11-12T18:15:19.723000 +CVE-2024-21976,0,0,197c9e566528c5421dc8bbd01435a12444da8c485f4acae12f5a05472f30e7b7,2024-11-12T18:35:03.770000 CVE-2024-21978,0,0,bd0ca29172ff67905ab419fb6e0b63fad45bf4b2c53567c94e0d7e696a373aa9,2024-08-06T16:30:24.547000 CVE-2024-21979,0,0,69d970687ec7fc10c2117ffd8a662f03f2976fe858767ebadf9aede1ce3bc7bd,2024-04-24T13:39:42.883000 CVE-2024-2198,0,0,1df4cff98d86f3bfed69b5c9a5afedec636b00bc821bafe7fe3fd5ac8b6e5483,2024-04-10T13:23:38.787000 @@ -245608,12 +245614,14 @@ CVE-2024-22065,0,0,0787c7694397a7c698dcdd055072a6446d70ea428a21429fa1b1a63fb9554 CVE-2024-22066,0,0,04a1f5193e3d1cd4c2ff5e8b00e85bd78f3fa88fdda81531a689089e114ff7c4,2024-11-08T14:31:32.933000 CVE-2024-22068,0,0,0d00619c52fbf410991eb6fb75db8e695c1b871ad9ed5a9a9a67d1976582dc23,2024-10-10T12:51:56.987000 CVE-2024-22069,0,0,4264d807f7b5f6c2c545419e352dc9886522b6dff10818d72b9f5fb46c144466,2024-08-20T17:22:39.500000 +CVE-2024-2207,1,1,86e4cab71a0aa2e5ddf354acd9e24d59da92f6b54645ab62cba38b3363f7a731,2024-11-12T20:15:06.120000 CVE-2024-22074,0,0,597eb5b51f6f6f2c4d569289cef4a67d7a503bfba7b03a39a3d413dc000d2aae,2024-10-16T15:39:58.847000 CVE-2024-22075,0,0,a5af4a36684a159511579f89d3ce85206e57c3558ab3a4b37d02f2a846a5e5f1,2024-01-10T15:06:42.563000 CVE-2024-22076,0,0,ad579321d212e2fb374b8124959febe687d1d1197907430ed2ba5046da4cb421,2024-02-22T02:15:49.207000 CVE-2024-22077,0,0,0d574f900f6ba15af6753de47087b404e70b7e744d15c464a0473f8e5a0b02bf,2024-08-03T20:35:03.080000 CVE-2024-22078,0,0,c3b627a8d9530c86e600e0d77428d42d2cac56a9e2e764e54289f580eb21986a,2024-08-03T20:35:03.900000 CVE-2024-22079,0,0,a5fb20f55d8f9537903329da7f5c9ffbfc7d484fdf2939c2e12794fce7097349,2024-08-05T17:35:06.653000 +CVE-2024-2208,1,1,fc886e54fe67bcfa68fea00b80af45a905f1cad6bab110ddb4d257b163da8ad3,2024-11-12T20:15:06.323000 CVE-2024-22080,0,0,3c2aa85feb9de94fb127eeb3fca8bdefb063fc3762182aefb69679535f4aa9bb,2024-08-02T17:35:32.227000 CVE-2024-22081,0,0,c0e23ef382492c7380a92e96cb3bb331fbab187b3695f4beebcf35389003ecab,2024-10-28T19:35:18.730000 CVE-2024-22082,0,0,459e25d191876c4f00cade807052f238137ad057437a31854486c01937977cf9,2024-08-05T19:35:02.233000 @@ -245875,7 +245883,7 @@ CVE-2024-22356,0,0,d7816a9ba601446ddf2f1791b2a20c669256f6d1556e00ed5243ed494ceab CVE-2024-22357,0,0,0bb0c823fb3ba54d21074ab797aca42f7312b217f24630a0cf642d75fe688e72,2024-04-12T12:43:57.400000 CVE-2024-22358,0,0,c07de741e1bd331a637c3117a238b4cd328eb061aeff477aa27560ea4017f135,2024-04-15T13:15:31.997000 CVE-2024-22359,0,0,7527962a22af823da8ade98e556ee19eb46f6b251e797d4d139c988ae5d9426a,2024-04-15T13:15:31.997000 -CVE-2024-2236,0,1,8e184bdc8f2c69c7b2b70ce72648e36e8e4d44abd1be0153d52d871c11afeb43,2024-11-12T18:15:20.150000 +CVE-2024-2236,0,0,8e184bdc8f2c69c7b2b70ce72648e36e8e4d44abd1be0153d52d871c11afeb43,2024-11-12T18:15:20.150000 CVE-2024-22360,0,0,794526f63f464dad1a4d5860395245506ca742cb67b982581354267152f1e10b,2024-06-10T17:16:19.007000 CVE-2024-22361,0,0,e267f7a58b4385dec5a7f5aef03064380edb1a73a3ecd2124af7f1bc930e0f03,2024-02-16T21:35:31.953000 CVE-2024-22362,0,0,2767965890a6410063670fad313b54e2e770a22b941b7425a3750acfeece9725,2024-08-01T23:15:33.430000 @@ -246274,7 +246282,7 @@ CVE-2024-23145,0,0,8ea13e97df27b66102973a2f35f0e884ddede3e94a7bd4b932c7e1bda1139 CVE-2024-23146,0,0,c9ab3b2b65b697d473465cd7dcbbd37ee7743393b6257d030c7d43f735d4eb7a,2024-07-03T01:47:34.180000 CVE-2024-23147,0,0,5501f17ecc0a7e07475f9f72a63761eb8934129647aa8037d87bee0bdf7e043a,2024-07-03T01:47:34.407000 CVE-2024-23148,0,0,f163092e189644bb6f69811a212b9b411504f9f98d2b1dd4d6e9852bde1c5117,2024-07-03T01:47:34.640000 -CVE-2024-23149,0,0,7651a42b0863370940c42057e714040687fb0f0a0647b4edfeea6ae3db85c5d5,2024-06-25T12:24:17.873000 +CVE-2024-23149,0,1,7c57ed203edc1558cd41202f741e4761acfb47884dd52e44868f7b2f02f25622,2024-11-12T20:35:08.300000 CVE-2024-2315,0,0,82ac007adc37f93efa55750ad424520c02632a1e6baef3a0d159ff1d04fed436,2024-11-12T16:35:08.840000 CVE-2024-23150,0,0,2ec2a3f5ae0ed899b10a9a3ad1ef287d5eb257340d2b38f86c7e5aa0270d1e52,2024-07-03T01:47:35.010000 CVE-2024-23151,0,0,53d13e8b9ba2cd63d85aa3df3bb17c4d39810557d3e3d9a803388619628364a3,2024-07-11T15:05:24.300000 @@ -246714,6 +246722,7 @@ CVE-2024-23662,0,0,0bd2fe423ff125cd6b426da805efebc9c554fb6e799e24e8d56e6d24f2b3b CVE-2024-23663,0,0,372849f95ab60375b328b2ae0c61e020002a890602eeef15e2074b076e06680a,2024-09-09T16:05:49.647000 CVE-2024-23664,0,0,d011c75099554e936d176a3c9a5468d2477ab8b77d1d9dbc825df199147abb3b,2024-06-03T14:46:24.250000 CVE-2024-23665,0,0,ccfa4de2b1b28a8c2ff6771f6bb08ec6cd2560932d59d5a7f456cced5fbbb5ed,2024-06-03T14:46:24.250000 +CVE-2024-23666,1,1,5e059106d6a50298dd768ce9d675e825d09ff8074229f3430656107477c610e6,2024-11-12T19:15:07.970000 CVE-2024-23667,0,0,08d118467751e068d01ea69371b6be0268151b83859ef5f994ee6bdd4d8baae1,2024-06-03T14:46:24.250000 CVE-2024-23668,0,0,dabcb641b2d1ceab2002e51740c8426746a055cb43d3a6f8dee0ecb55a579928,2024-06-03T14:46:24.250000 CVE-2024-23669,0,0,9df2d4be5f7c556ec628f8bec9cf09481c993f32181d80740172ad032ec1212a,2024-06-11T17:09:43.840000 @@ -247389,7 +247398,7 @@ CVE-2024-24791,0,0,47d95c50753471e151a6eea3dba3db3a2ed137995344fbfddcc8757be9c73 CVE-2024-24792,0,0,fc8d65092f6cca5efb8fd01d1ad855c18addacabc045b62e3e589a869025923e,2024-08-01T13:47:30.627000 CVE-2024-24793,0,0,349151d270c21b594bab79bdfa0af81cee9b2c5e85b1f357f09ce5695483cbcc,2024-02-20T19:50:53.960000 CVE-2024-24794,0,0,2ec7aaa5fb034c52f8b00845d9c4c8227ed450c5193d69bd944efff082e59c10,2024-02-20T19:50:53.960000 -CVE-2024-24795,0,0,9b9dd61f6278a2805f43add70bd5f500b812e3c07bf29007fae7bbb2713c297e,2024-10-03T13:15:14.233000 +CVE-2024-24795,0,1,f14177a71e36c2c7b49eb7be9b5fd9150c3666a2c018b0c73af335e4c5263cac,2024-11-12T20:35:08.640000 CVE-2024-24796,0,0,85eed318d88587914f28f0ebe16e879f7f13ca66da6c278d2c8f005b6e417987,2024-10-08T16:27:19.487000 CVE-2024-24797,0,0,0ac1a2afc243bdf4159fe23f3838030dc5f8b6bb51e688188fe702679ce090f8,2024-10-08T16:31:14.093000 CVE-2024-24798,0,0,cd85ec8a42d6d377caab8567c4fbee58fe370929d305cf392fd538d90722fe41,2024-02-22T19:07:27.197000 @@ -247818,9 +247827,9 @@ CVE-2024-25359,0,0,0fb20cbc3a9d97e4b1c7aeba16baa279c02f24b91366fceb9801ea8cdef6c CVE-2024-2536,0,0,65acd52804d1fab5b7f8fb23c09b74c0bf5acd3bf488cb768800ded49c99706e,2024-04-10T13:23:38.787000 CVE-2024-25360,0,0,18228c4da58d3befde1ec0cbe2994e34acc50177b9c54cf9ce9c4f0991b9e948,2024-10-30T20:35:11.017000 CVE-2024-25366,0,0,fcf0bd0bcec5d3ac613d0f087b722a9736b6c16fe60db374ab304707fd794e91,2024-08-16T18:35:06.990000 -CVE-2024-25369,0,1,eb1896ca06c5544b92ef50e2b7bebd94259dfff6718ea6ef2bb6382a8fbf3c8b,2024-11-12T18:35:04.640000 +CVE-2024-25369,0,0,eb1896ca06c5544b92ef50e2b7bebd94259dfff6718ea6ef2bb6382a8fbf3c8b,2024-11-12T18:35:04.640000 CVE-2024-2537,0,0,ce9753e7852cdca037deeb9816f11b74c3d1bde3479050982fbbe15f57049a4a,2024-03-17T22:38:29.433000 -CVE-2024-25373,0,1,cfb937e26000a1ecebf4805de7b25129439b2f8f73f7e5676e7d2361e7774201,2024-11-12T18:35:05.530000 +CVE-2024-25373,0,0,cfb937e26000a1ecebf4805de7b25129439b2f8f73f7e5676e7d2361e7774201,2024-11-12T18:35:05.530000 CVE-2024-25376,0,0,6a816dff6e980af2ce9830b28c1e10df0bab9ab3e8e9a695c06849f72c23c21a,2024-07-08T14:17:44.317000 CVE-2024-2538,0,0,96690084e77867f632925185565058513a74653c4a93273678766dca17a7e737,2024-03-20T13:00:16.367000 CVE-2024-25381,0,0,b4fb94c2ff759334b95a9dd33df801dc79f3dc0507b3672549ff1ba98cbfc56a,2024-08-26T14:35:03.033000 @@ -247977,7 +247986,7 @@ CVE-2024-25618,0,0,521c40d6483be23c844eadaa045ad9d81526af9d0f0bb15136fa0c5a206a3 CVE-2024-25619,0,0,8779b5460540f75c401ccd25f8dbe7701a4130884fad041c3d9ce354daffff0f,2024-02-15T06:23:39.303000 CVE-2024-2562,0,0,19a87309d0aee720c095694c940b1c491bc221c82ab64cac6db44d1a3b485bf7,2024-05-17T02:38:19.323000 CVE-2024-25620,0,0,300c4d5071efb47a78a0fb6f763869e8a3b4f9eb84a3a8b58578d91ae7032adc,2024-02-15T06:23:39.303000 -CVE-2024-25622,0,0,4958207198bbe12d25d2b9c23a4cd611f0cde9ef679b8e5e520c417c92c218d6,2024-10-15T12:58:51.050000 +CVE-2024-25622,0,1,b37611b52c237e592b0bf790b53e8b8f42f048ab94c1bbe7837c06b620ba10f3,2024-11-12T20:04:39.957000 CVE-2024-25623,0,0,f8aa2dcefcad5cecc7d7e57a874064d3a0b27ee38334e8a58338063ed42280e1,2024-02-20T19:50:53.960000 CVE-2024-25624,0,0,f71711e300e3eaed808809e7a9b2c0205a6a35fe783a8ef447c3f23895a43c9c,2024-04-25T17:24:59.967000 CVE-2024-25625,0,0,aeab25de3fe3426b54f1a4e56db1601e91367a113c3d5e8c5bad9b4b6dbc113e,2024-02-20T19:50:53.960000 @@ -248072,7 +248081,7 @@ CVE-2024-25731,0,0,b66ecf83a3f22031891274bd77adc2362c09b771f3c2acdf7176838dfa707 CVE-2024-25734,0,0,4ee66182e097f4f56b6291ef1e6f0e392b286ce02b5247ef63df668ee1fb65d5,2024-03-27T12:29:30.307000 CVE-2024-25735,0,0,fe1bf7640c6ebe405e9dcb90575bae0052c2f9aa0e418d1ae75160bffe5a2ec0,2024-10-28T19:35:19.527000 CVE-2024-25736,0,0,e656e37839c1ec7c7b63871d566a91468e6f49c6416723c6764b550ab05e5670,2024-08-05T22:35:01.947000 -CVE-2024-25737,0,0,2e40edda2bf8f11be62e123472d611b88082a8433647751d6e9fa8369863db2e,2024-05-24T01:15:30.977000 +CVE-2024-25737,0,1,568a7aeb7b950149c321709a53d5973e375b86795df10065f33b214dd4b95e0f,2024-11-12T19:35:06.243000 CVE-2024-25738,0,0,708ab77db4798450f178306dfdce8e54e50af183337435b77974d77b7119e627,2024-08-22T20:35:05.737000 CVE-2024-25739,0,0,976dd73cb281097b08298328a4164e038521b14231c5653569f9d2458078f4f3,2024-06-27T13:15:55.520000 CVE-2024-2574,0,0,0663b3bf620e7eaea35e1b3237dc263b6d897527ed31c7e8166e509390c6cb16,2024-05-17T02:38:20.537000 @@ -248268,6 +248277,7 @@ CVE-2024-26004,0,0,339e2df0f2a66d2f51de2b2daab023ea4699cfa93f488c0f3f4f084b719f3 CVE-2024-26005,0,0,d7747b5e2f088b172b1a4b499ddd44f15dbf75c021bae634b0baaa69faaf4efd,2024-03-12T12:40:13.500000 CVE-2024-26007,0,0,55d7b1fce907ea25befd432aea4727d2b4a2ea48da2392fbb80290b5b9503286,2024-05-14T19:17:55.627000 CVE-2024-26010,0,0,0e2e4323cef6d8344800a888bb1e02076ffd37daaab8c643e84c0ccb4ef637e8,2024-06-13T18:36:45.417000 +CVE-2024-26011,1,1,7c4706e10cde20ed03052a5ba1c8cc2509556e4a71d571b3c724e6c0fbc49adc,2024-11-12T19:15:08.320000 CVE-2024-26015,0,0,eda3ef05e78350dbdf4bafb3ceec1e42a75ece53c103b8d65ceafa697330841d,2024-09-09T16:12:36.640000 CVE-2024-26016,0,0,53e5a707ce7137aca290d896e582e8d2a49565424594d76b59ea5a9464cdabc2,2024-02-28T15:15:09.320000 CVE-2024-26018,0,0,3b204ab00ea9e5a4e89dbbd72602f66cfac87fb0fd92b5110c31c614c83a90a6,2024-10-31T18:35:08.353000 @@ -248568,7 +248578,7 @@ CVE-2024-26308,0,0,b4d73560210ad1a249254bb49e208942ee75ee7f41147c3b9e47cd68fff84 CVE-2024-26309,0,0,2640b5966073fd3d518fa5abac6bf90144529b272adda5f9f180e91c567c3f6b,2024-03-08T14:02:57.420000 CVE-2024-2631,0,0,c40f6cd20ef48d6d5340c38d8cfe42cec4782b3ae9f2af1e0914d012954c4b8c,2024-04-01T15:23:45.590000 CVE-2024-26310,0,0,69cee22c675c3146c38aababff9be493f09176b7ddb80cd90cd4be608f2c217c,2024-08-28T15:35:16.490000 -CVE-2024-26311,0,0,28ff8a1b0384f422415c01ccf263a2e9d55cfdafba39542393811f1550f890d2,2024-02-22T19:07:27.197000 +CVE-2024-26311,0,1,8c7d0533474b817b621671c9c2ba1a932fe0024a18dae3479962749832a10a83,2024-11-12T20:35:09.710000 CVE-2024-26312,0,0,63211e4b9a2e957457396397837a5777078f70d897b833c1c389cff9a53a6fcc,2024-07-03T01:49:37.810000 CVE-2024-26313,0,0,40d878a5b034a5e76298671fa18c69a19be48f32c783c3571c3a3a33cbdaebf5,2024-11-05T17:35:09.817000 CVE-2024-26314,0,0,f3cacea21befb6fab1c2f5adbf9b7d87324473051fc4cd28a38bbaae7b0985b7,2024-07-05T17:04:58.450000 @@ -248906,7 +248916,7 @@ CVE-2024-26800,0,0,d9626497fc0514a06475f8f757d41af46eae3f75d016b2bd5949325f1e198 CVE-2024-26801,0,0,17f4b5c68dab5b5a7663dd6bd5f0c9475aac821e31bdb1ca0b817c579fea55e4,2024-11-05T10:15:51.107000 CVE-2024-26802,0,0,e88ecfd83cde660c90d62c8ec8f6d09fcab3b0e798e249611f11031273c5aa1e,2024-04-04T12:48:22.650000 CVE-2024-26803,0,0,790ca232a01e4848a2dbe4fcf8f810964fda874268a106da8300da28d3787b70,2024-04-04T12:48:22.650000 -CVE-2024-26804,0,1,d61c296f026473ac17a7c776907f2cde0a388e8bfb3e0d463ca3ad6448a3c754,2024-11-12T17:35:03.920000 +CVE-2024-26804,0,0,d61c296f026473ac17a7c776907f2cde0a388e8bfb3e0d463ca3ad6448a3c754,2024-11-12T17:35:03.920000 CVE-2024-26805,0,0,bb47bd469c267c732eb9b710b891fdcd2fa28f148836a061a5205e3498f86415,2024-11-05T10:15:51.440000 CVE-2024-26806,0,0,b6725acf00439752a6ccaf38cc0125393e82403fa930840dc236717f44eb4a77,2024-04-04T12:48:22.650000 CVE-2024-26807,0,0,104a4e4d854016f8b324666da2a6519a8e2f2a9b7b206527a539918e69652d81,2024-06-20T10:15:09.303000 @@ -249651,7 +249661,7 @@ CVE-2024-2762,0,0,979c743da794d07a0349103a85145b617e85e603af562156eb1dfe0982ad17 CVE-2024-27620,0,0,a6cd517087288a476282a828ad06f1425f605eb49a5acbc3c4b9fdfa51cf4c1e,2024-08-01T13:48:33.830000 CVE-2024-27622,0,0,d36e42f80fadc01b57dce713d0e942cdb5061aeef02f106f66a87171df29d206,2024-08-05T21:35:04.990000 CVE-2024-27623,0,0,908e722a38df81c5e163df23fcc18187660fed41610c0b2838365cfd8fe61d3a,2024-08-03T20:35:05.903000 -CVE-2024-27625,0,1,4f20a4d64999286db2136c2b3159d6621c9bb45fb126cf59c99198f7d644139b,2024-11-12T18:35:06.473000 +CVE-2024-27625,0,0,4f20a4d64999286db2136c2b3159d6621c9bb45fb126cf59c99198f7d644139b,2024-11-12T18:35:06.473000 CVE-2024-27626,0,0,5bf5940d7781229a9f7ff240be2a4af6b20f5041c7d9a167792650ddcfcced0e,2024-08-05T15:35:13.137000 CVE-2024-27627,0,0,8abb75ad84b16904abb94e78ca7c6cc9c26036e320c7934e825972d299570c58,2024-08-05T17:35:08.113000 CVE-2024-27628,0,0,4ce05c55412fc4c447421f46fe72c28be9e75420f28dfb2af66d8c4d8126c7d2,2024-07-11T15:05:31.010000 @@ -250589,7 +250599,7 @@ CVE-2024-29001,0,0,ea0999e7ae3252c47574d76ad7b90323f375b0c9a9c410d4dd593d389b503 CVE-2024-29003,0,0,c1d9289fd327b3b3fe2922e6699b27bde12063e2b9ba45e1eb1bf9261fa9b314,2024-04-23T15:15:49.640000 CVE-2024-29004,0,0,9ef5b203a98e2d1eebce75b708b2ffc086e9812d18fc5bf73722cd72675a4664,2024-06-06T19:05:52.730000 CVE-2024-29006,0,0,03ea486bf400d900d0dbda2f2d6e252ead6c17c2d66dc02317ddc11f9fe45793,2024-04-04T12:48:41.700000 -CVE-2024-29007,0,1,4a1ceba513fb4f5159f9ebcc5fd71727bd28110957beefaf2caeb6534dd7158d,2024-11-12T18:35:07.403000 +CVE-2024-29007,0,0,4a1ceba513fb4f5159f9ebcc5fd71727bd28110957beefaf2caeb6534dd7158d,2024-11-12T18:35:07.403000 CVE-2024-29008,0,0,42fe22c1bb27681010ec9f7d44bd7d4e548e909f0ccf7819d30641f2fff39d5c,2024-08-29T21:35:08.120000 CVE-2024-29009,0,0,c999c21ebc8ce72023b158b0839d7fb43384cfe622c24110433dc886fa8798b2,2024-08-27T21:35:19.367000 CVE-2024-2901,0,0,e2df063e5347fadf4cf214e5695112bea43ff5509c25d82b3b42077531327e19,2024-05-17T02:38:36.427000 @@ -251380,7 +251390,7 @@ CVE-2024-30128,0,0,c924b379265c859e8daf7f44eeec6d1dc40d7540b45d81bbd3137e5592a1e CVE-2024-3013,0,0,6f68abb10d211d077c48c60372c20fba216cedafa08cc66982d3e5be234b2590,2024-05-17T02:39:40.710000 CVE-2024-30130,0,0,8448ce55a01a9b4e45eabf08a2080330d22dcd23bef5d840e0a0228a0f910b0f,2024-07-19T13:01:44.567000 CVE-2024-30132,0,0,2755ce31fca62f5cb6c9467e2e9dd0f46b1eb8e96cf72e2eba3ab725581a0713,2024-10-29T21:35:05.643000 -CVE-2024-30133,1,1,22ce94cfbfa55e7ff92bf64ba04e6010d48cef6835c442bcc58f93ee083ee251,2024-11-12T18:35:07.980000 +CVE-2024-30133,0,0,22ce94cfbfa55e7ff92bf64ba04e6010d48cef6835c442bcc58f93ee083ee251,2024-11-12T18:35:07.980000 CVE-2024-30134,0,0,b5401f953dda8a57b606a9ace80dca0a0a00325ba4573c5e6f1c325a9f248829,2024-09-30T12:46:20.237000 CVE-2024-30135,0,0,434c5499719264a4e2ad07af1f36d8ed1af6151b19467e0009865806919aee63,2024-06-28T10:27:00.920000 CVE-2024-3014,0,0,c46983235075ad6c61a858c21d5be28ec226124df8363686d4a4d1cade05d3fc,2024-05-17T02:39:40.800000 @@ -252303,7 +252313,7 @@ CVE-2024-31305,0,0,ba630548d21f5bcb859413b613afaffd13fe4d3cfb6029f7796902d4c4fce CVE-2024-31306,0,0,26454973d3e48a12aa1c62605179694675e7fc184ffd76682fb3b25703d6402e,2024-04-08T18:48:40.217000 CVE-2024-31307,0,0,2d6e060289b3008a1e418b6eb280724b777b09f9b6617ba46e545a295020204e,2024-06-10T02:52:08.267000 CVE-2024-31308,0,0,8606ad4cae26aa1286e03fe0d008d3f9130be2161e208c576d36c6c7ac675659,2024-04-08T18:48:40.217000 -CVE-2024-31309,0,0,ca12cd2686364246003ec4c4d38c5113be1d9d0085fddb7dc5f385b2b6a92468,2024-05-01T18:15:23.233000 +CVE-2024-31309,0,1,d78a9e6160400ae186973d59ccd995853253d6dd5d950501f74cc8a9fe7014bb,2024-11-12T19:35:07.513000 CVE-2024-3131,0,0,c105af314f6cd2a67026a981250eb1886cf285c372d5dbe1b84a99c03d0161a7,2024-05-17T02:39:44.143000 CVE-2024-31310,0,0,18d1418ec38f7c8ff17788048da0079aa6b632f7675bd0da4820aeaa7280cd83,2024-08-01T13:50:49.710000 CVE-2024-31311,0,0,bc87f5eff00ede1d1c04389c216e60b2a2a407288e31ea28ec5028c636a65054,2024-07-11T15:05:38.153000 @@ -252490,6 +252500,7 @@ CVE-2024-31491,0,0,a256f5e0e4e8048b4dc739c834231f6c11313abc3e9f6f4080e9c9cbce9e2 CVE-2024-31492,0,0,b06ceb7c9f7436cf71baa2d42bf8bc10377af2691ce98c83805eb2ca0bae07bf,2024-04-10T19:49:51.183000 CVE-2024-31493,0,0,23786918c0e6bb606f80dfbf3cc1cf7aa62322ef3147c75ab2836cfafd79af54,2024-06-03T14:46:24.250000 CVE-2024-31495,0,0,cc64a104bd02c0ad2ecb59ee5b7d31fe176ceb300f836393c6f4ac68db9adc74,2024-06-13T18:36:45.417000 +CVE-2024-31496,1,1,2841e68913d42e6decb63c10cdcd9e40f43df1e5319a1da45f540d35eab845d9,2024-11-12T19:15:08.617000 CVE-2024-31497,0,0,8d8d7f6d342d19eead9a597122971bd1c38180baf81620a11231640a58ff9af9,2024-06-20T19:15:49.960000 CVE-2024-31498,0,0,64e912cb7273640f524a86a4c4b92bedddd325f11af3ca69081c43f6ca10cd7a,2024-08-27T19:35:26.363000 CVE-2024-3150,0,0,ef6f618f928176cd12f09359295625fa66fd9aea18e896cbdd69e529dc00bd2a,2024-11-04T11:15:05.923000 @@ -252568,7 +252579,7 @@ CVE-2024-31678,0,0,45c8b2607673d8af8b3ec231962e66bcea8064211e1867ed0addb4c93b773 CVE-2024-3168,0,0,e53f03656f19e0e47c6622c3da3e06f5dd93aaeae623b38784e05f0c565a375b,2024-08-01T13:56:21.960000 CVE-2024-31680,0,0,c4628bff4524f4ba02ba3d3e5f2d1afd3e6b045a8d32604fb16cfbf01a187619,2024-09-06T22:35:01.557000 CVE-2024-31682,0,0,6ad84277376005bde3c5be691a4699ed2a494d2e47836225d1c8ccbe4273b358,2024-10-29T14:35:17.517000 -CVE-2024-31684,0,1,a58e80e535316094d398f75f99933a7946ff10472558d364c59331628a9ef154,2024-11-12T18:35:08.927000 +CVE-2024-31684,0,0,a58e80e535316094d398f75f99933a7946ff10472558d364c59331628a9ef154,2024-11-12T18:35:08.927000 CVE-2024-3169,0,0,b6d2ffb09103c8b8a3976e1d11af5d86787ae2ffc33eb4178c248279d95ed274,2024-08-01T13:56:22.240000 CVE-2024-3170,0,0,e5d3e527beb338f17b4d7e88e470a76429efa4bde538f57bcfe45fe38f4493ae,2024-08-01T13:56:23.270000 CVE-2024-31705,0,0,360c5213fb2e781c07e5b26068537bfd39f5bcae9363979b2bff285237ce8d8a,2024-08-20T17:35:05.360000 @@ -252872,6 +252883,9 @@ CVE-2024-32111,0,0,36d25ebb6a4d3cdecc46a227566c18afac6c12223eb1db73c0460a8cc7143 CVE-2024-32112,0,0,f9404c5b848522fc2ea82100e298d27e46d5e23ef3e92373a4c86a5207d51496,2024-04-11T12:47:44.137000 CVE-2024-32113,0,0,033af325abbe7cbcad6e1b8efeddc40601a2c3b9d5dcb5001318869b3b455a0d,2024-08-08T13:38:57.533000 CVE-2024-32114,0,0,0a1004ba7b41008e227d6b2bdcd73bdfb692f643fe06a5069723fec32f720edf,2024-05-02T13:27:25.103000 +CVE-2024-32116,1,1,46e2fd7f6ccdbb7d809e2f6b386cc929300fb678ae5f3dc0cf73c3ec5f56cf7f,2024-11-12T19:15:08.860000 +CVE-2024-32117,1,1,deb90b3b27a9beecd379b7ae6f90a9070b3adb8a25d8d1366221f7873fd9da8b,2024-11-12T19:15:09.073000 +CVE-2024-32118,1,1,955ce8951e1b99cf88da6bcf1cf67d6a20a05caa7183c0b791c5eac56aeeacf0,2024-11-12T19:15:09.287000 CVE-2024-32125,0,0,a446a01590e1b118a7d25d957642229fd41ce3f6d80dd7a23c882dbf2c72c5ed,2024-04-15T13:15:31.997000 CVE-2024-32126,0,0,16f5b1c04f8ae363897666f54d65b10d9319b0b987a3dd5aab35faf530ed8b78,2024-04-18T13:04:28.900000 CVE-2024-32127,0,0,81ce8fde94ae27c54b54c2818b566b4d4f4fd87e6319462484536ddacef436b6,2024-04-15T13:15:31.997000 @@ -253832,10 +253846,12 @@ CVE-2024-33498,0,0,4ba880f4da642b35a01b59acc526b8efa609f227ba180bef70cff2474457f CVE-2024-33499,0,0,e1c6b22865cd9e8e386bae301b66bd9b73b37abc782106e33f7da12179559c10,2024-06-11T12:15:15.850000 CVE-2024-3350,0,0,73390a7fa244b3222b6af399a560b7e7938ab475c75bc9de2220d3279630acc8,2024-05-17T02:39:51.583000 CVE-2024-33500,0,0,951d86a0511934af03ca85b48f9110bb08038dc052f2625d3ab09642d8ba80a9,2024-06-11T13:54:12.057000 +CVE-2024-33505,1,1,ecbef8fea4cce9b500f7ea4c1a19147211c1f2c14c217e210539f5f20c7985db,2024-11-12T19:15:09.500000 CVE-2024-33506,0,0,7e135c0eb9d1832d58c1d4c41fb8dd62c0e9db3a03b33180973e0c8b868cc823,2024-10-10T12:56:30.817000 CVE-2024-33508,0,0,d23a8b5401a28ba62ac0963d4eaed374c04d8dedc9f220c45a2db9dd2382c9ce,2024-09-20T19:48:06.197000 CVE-2024-33509,0,0,6b9621bd236ae3fb7e5746778fba5a74fec5e03470e8fd83d110500351f31c12,2024-09-09T17:06:37.737000 CVE-2024-3351,0,0,2d444d04a071c972bf019c9f444260881949f9b31576f665a6e90d6ec68f63c1,2024-05-17T02:39:51.683000 +CVE-2024-33510,1,1,43d5bd276d917ff59efff4f03129ba219dd5018974c52ee27c2c9ae2f7e19701,2024-11-12T19:15:09.723000 CVE-2024-33511,0,0,fc70fe6b0a596d6a09769f1b8403860f36c39e5f9d265f34a0625ad60ef9eda2,2024-07-03T01:58:19.517000 CVE-2024-33512,0,0,ed3fd30b2c7f54d5b77a7a17b80f11ae07a7c55c7ea654de4b6fe924d93e8a85,2024-07-03T01:58:20.207000 CVE-2024-33513,0,0,85ad3015e89a3a26e3466fad66308dcf32b20fde6d6456d47acbefc0ee4cc405,2024-08-01T13:52:00.640000 @@ -254060,7 +254076,7 @@ CVE-2024-3380,0,0,2dff51ddbee3af980b9cfb6cf09776d99cf02d06821df7efa0940e1572fc05 CVE-2024-33800,0,0,8911abf85fe51e5e023f96ba4492011fcb3585a3a38882544cad727e4d927466,2024-09-04T20:35:15.600000 CVE-2024-33801,0,0,383edbe255017d36a3f80e7a95d80ea991a96b279313ea8f636ba2617e7f4948,2024-07-03T01:58:50.903000 CVE-2024-33802,0,0,f7e8f11f0f50e76cb80d887fcc8efc43ff16481323dfc06befaf6248f46261e7,2024-08-01T13:52:07.557000 -CVE-2024-33803,0,0,3903110335c3f4a5555b9c75678d77501a3d508f001cfefe41ceb0fe3e59d047,2024-05-28T17:11:47.007000 +CVE-2024-33803,0,1,3fef843f563d1d4e43028b5189ea0b1eb6b438bee689c34221493cd81972f098,2024-11-12T19:35:08.007000 CVE-2024-33804,0,0,6621966fba27f3dd0da67323c048a53a2b132469f199bc736e2057ed57961b5d,2024-07-03T01:58:51.660000 CVE-2024-33805,0,0,58af49a7c74149ca9f823d30f922778154c6ecf6b330b510d828d2d1dcc56f01,2024-07-03T01:58:52.423000 CVE-2024-33806,0,0,cd37d24c5641912eb3eb7cbcda0ba766c42dac09f73c57888f9150ea991d2a36,2024-08-20T15:35:09.913000 @@ -254259,7 +254275,7 @@ CVE-2024-34032,0,0,f382d8e9e535c3e35473773ca93bbe1fa995e376c547e3ef1cae2ee436ce2 CVE-2024-34033,0,0,e74c4015073921eba0b380055240c50d190f0b5a639f065734e866639ffc0d74,2024-05-03T12:50:34.250000 CVE-2024-3404,0,0,10c208e9c1c33ee7dcd03a739682ca2312353eb2114ec4d6a2398be396bdd59b,2024-09-24T14:11:26.940000 CVE-2024-34043,0,0,53746d879667589cb2311df11a4aae652da57dcc560b773c0549055163d481d1,2024-08-01T13:52:14.133000 -CVE-2024-34044,0,1,8248cda349e007d967c48664b98468ff114052b264ae77a92508400a112bef56,2024-11-12T17:35:04.873000 +CVE-2024-34044,0,0,8248cda349e007d967c48664b98468ff114052b264ae77a92508400a112bef56,2024-11-12T17:35:04.873000 CVE-2024-34045,0,0,79bd65de67c0efbec24a2f08a1536c9cc87b90b692934d062800de780d7b669e,2024-07-03T01:59:18.230000 CVE-2024-34046,0,0,3af63485a8307d182b057fc6835d7e7e37c1dbc1f2b63b0c05e957ed68af1c33,2024-11-01T16:35:17.327000 CVE-2024-34047,0,0,e066e60743914316ea4d7d917884e0cba407f608337595ec8ca6f0119046db4a,2024-11-06T16:35:17.080000 @@ -255144,6 +255160,7 @@ CVE-2024-35267,0,0,8d2f4a11b808fec8563f241fc658cf43f5e54d7aaadc09b793c2bc37e252e CVE-2024-35270,0,0,d1dc880d5375baa19c5c22ae22578f8e8a49aa76e4f7bae55a316a718926e765,2024-07-17T15:00:46.870000 CVE-2024-35271,0,0,3f199c76ff3f5650b64bac70365416389832a7a31f0f804814fbf23ea034da6e,2024-08-20T15:47:07.247000 CVE-2024-35272,0,0,4c1a47b56d7417b088998b4603214b936945d403bf6190e9e2c7cd926cf7a2a4,2024-08-20T15:47:09.880000 +CVE-2024-35274,1,1,e95b5a34c532f39558f051898fd64d7f759f56920aae5319c399c1a23ff3ab3b,2024-11-12T19:15:09.993000 CVE-2024-3528,0,0,c96e1e132295c243d4fa4a90d8abf77e41d771305ddbcf81d644bca2cdde7da0,2024-05-17T02:39:59.157000 CVE-2024-35282,0,0,fe23f4116601299cd085746b33d91adab4014743ea1af63d79bf69af6ebb68e0,2024-09-20T19:44:17.557000 CVE-2024-35283,0,0,517940d61eca1185fcc5d68a59f62111cbe8fdc81301b4e7c0610afefcc22645,2024-05-29T19:50:25.303000 @@ -255505,7 +255522,7 @@ CVE-2024-35793,0,0,3bdab6aefbdb92609dd5d1d2221b1fd9e877cefdad437c4799c3b5ed0e463 CVE-2024-35794,0,0,98eed75e6df024f22b4bb41a36fc36e3e9baa5185ab79fb95f0f4482b261c48a,2024-05-17T18:35:35.070000 CVE-2024-35795,0,0,c4375eb0dac66668e1eb3c75468506dbe063c57de76a5bbc7908d84ae07fa095,2024-05-17T18:35:35.070000 CVE-2024-35796,0,0,ae4abcb8ad9f6f490bd16b1eba9dc94eab40136dc368dbb51a897b6a16bd8836,2024-11-05T10:16:37.803000 -CVE-2024-35797,0,1,fc40034f33fd113f5dde1c6de83ad778a174ddbe1c0d42a9a2504386df9c1593,2024-11-12T17:35:05.710000 +CVE-2024-35797,0,0,fc40034f33fd113f5dde1c6de83ad778a174ddbe1c0d42a9a2504386df9c1593,2024-11-12T17:35:05.710000 CVE-2024-35798,0,0,c6621222abaf060f395461638bd7c76ec0183db720d30b3003bc12d1b0276d22,2024-05-17T18:35:35.070000 CVE-2024-35799,0,0,2dce7d3c01c6b462983682ed86f45e0447833392232f61fcdb54d3cb67bf0d68,2024-07-03T02:02:11.170000 CVE-2024-3580,0,0,ac379b7c61198dcc5d9b9e5b61b78e72864de0a9836d2f6b5f591e1184a84d66,2024-11-07T17:35:21.603000 @@ -255593,7 +255610,7 @@ CVE-2024-35874,0,0,3f9cf166158c93dc476fb8654991540d2336f2d5d38b587de46fb9ac634f5 CVE-2024-35875,0,0,8ab9621867535870defa53a806e98a2282aeda1bda484993ec9b5afbb0ec82ec,2024-05-20T13:00:04.957000 CVE-2024-35876,0,0,21d4e04307171f23eb20581ae687ed873b8b572985d4124c23ec05853b41f51c,2024-05-23T14:15:09.830000 CVE-2024-35877,0,0,b8a3600906e93a36a74422104fb1b31b46c153811d076aee87bef6ab0300bd6d,2024-11-05T10:16:48.080000 -CVE-2024-35878,0,1,74497324101b664530bba888b14a5640c2af6f23f0241985b182aad27d33a01f,2024-11-12T17:35:06.573000 +CVE-2024-35878,0,0,74497324101b664530bba888b14a5640c2af6f23f0241985b182aad27d33a01f,2024-11-12T17:35:06.573000 CVE-2024-35879,0,0,597429864a470884e5e756c3df3fe8e5a0bdd1fa9904af526ac68ec0fda1fe39,2024-11-05T10:16:48.390000 CVE-2024-3588,0,0,4dedbcc4313ba8cb11aaace549e0dd1c777d3f65d96b9f644afcfeb2c777e541,2024-05-02T18:00:37.360000 CVE-2024-35880,0,0,b61a1904bbe5a8757c8c8dcb2ea7338c39ae9ea79235b0c7cefd4210649437e6,2024-05-20T13:00:04.957000 @@ -255787,7 +255804,7 @@ CVE-2024-36056,0,0,1ad654e1db1ea66b26b566d0bde36516eb16d5510c8338c17ed9148cd915f CVE-2024-36059,0,0,1bfcf57b05ec1b5718039a8c5e3ecbe365e021b33c057bee57a114304a3b8db6,2024-07-09T16:22:38.580000 CVE-2024-3606,0,0,d0a3a8d7c3b8995b719f693dd3907a6cc0220e7bd0b5d59f68093556b8c3a6af,2024-05-02T18:00:37.360000 CVE-2024-36060,0,0,0aa7d62145c5618b7f76bb2535f9fc77a196990e59fda038d7a6d0a4665703fe,2024-11-01T12:57:03.417000 -CVE-2024-36061,0,1,1aff6eb5914cfa2aecdff1eeb735beacd175daa744ac3ba38e1c642f11faa093,2024-11-12T17:35:07.450000 +CVE-2024-36061,0,0,1aff6eb5914cfa2aecdff1eeb735beacd175daa744ac3ba38e1c642f11faa093,2024-11-12T17:35:07.450000 CVE-2024-36062,0,0,b3531d0a2dc0e87d59ab63f084c9edf17440e45c41fc2b9fc6cd7ee0d3d225ea,2024-11-08T19:01:03.880000 CVE-2024-36063,0,0,137e9651a11a86729a19db077a10e17c476e8bdc06700335b2e00d6c3dad3c82,2024-11-08T19:01:03.880000 CVE-2024-36064,0,0,783529a7ed67c566f9b5978c94a6c15f086f6661d090c8cd3e70b94f4926834f,2024-11-08T19:01:03.880000 @@ -256088,7 +256105,7 @@ CVE-2024-36453,0,0,efca45484a3a71be4f0dc069d91e048becd696d111c8ab1e0db7c868c0b24 CVE-2024-36454,0,0,816c415a87f617604c488d901c0fc2b8393ca69168077c58a5065524582c3a9b,2024-08-01T13:52:52.033000 CVE-2024-36455,0,0,a4f757c32c6a48191e26edfd50be9dbe6a08fe7d25f45a8d5e490b5e7653d1ea,2024-08-01T13:52:52.813000 CVE-2024-36456,0,0,48da099fd740150d38c29e88de4be636b5045c8ca1374d249af99d549e9607be,2024-08-01T13:52:53.540000 -CVE-2024-36457,0,0,72760e3039fa35b5fe26ddad9fdef8608f653e7f7685e05328a58a9de033d19e,2024-07-16T13:43:58.773000 +CVE-2024-36457,0,1,ed49a7bdc593db4a4eabe6372811490012916288d3d9ca56bbf22f83f795e28a,2024-11-12T19:35:08.833000 CVE-2024-36458,0,0,8cc25938d2d5cd1d323ce70bc7a8d0cc38a394cde01025dc622780ae5428e886,2024-07-16T13:43:58.773000 CVE-2024-36459,0,0,474bfa332c926d073eec1319c6b0bf17fa1f15902b9a2385d1d4aa60eeefb843,2024-07-03T02:03:12.833000 CVE-2024-3646,0,0,09fb4454fc243991c509642fa1713408149b474f66cbbd7885e81a3ea360afe7,2024-04-19T16:19:49.043000 @@ -256124,8 +256141,11 @@ CVE-2024-36501,0,0,e9cab9d7dda9a217e690001b6c798a6fbb4e54d85ebb6ee3110f4200709cc CVE-2024-36502,0,0,ce6106b712ac934aa3d46433d1d90bd69a47142ad6fe94c097ce1ae7a55cb590,2024-07-16T15:19:59.157000 CVE-2024-36503,0,0,cf0c7df8eb5d0563a3adb9382b90b37caa70a1002731797c28a41bd8794b11f6,2024-07-16T15:19:45.557000 CVE-2024-36505,0,0,5f3f0cdeca57fafe761af488854e771d0523077cbcea5a41dd4a6b4cc9d56e84,2024-08-22T14:36:31.643000 +CVE-2024-36507,1,1,24e5b399347d92bb8bdf4a7fe13549adcd09556a390716eaaddf0304b29c29ee,2024-11-12T19:15:10.233000 +CVE-2024-36509,1,1,f12a82072312ed32e384ef8a4b0271c46ec365840be066eadba02d51380c123d,2024-11-12T19:15:10.440000 CVE-2024-3651,0,0,3337eb59719c2f9e59e57f7ed588f3375e47160773d149a8aeb60c1398d8674e,2024-07-11T14:58:01.803000 CVE-2024-36511,0,0,1807360f38a62bd1fc293a7868ee622ad3fd5e209d6556e4181a75075ebcfb2f,2024-09-20T19:43:25.023000 +CVE-2024-36513,1,1,4fa2730c9084128c0d296b941eda6ac97e9fe46e33d6ca0389ca492aebb0bfd4,2024-11-12T19:15:10.633000 CVE-2024-36514,0,0,ae3ea1b58c1af4d84bf3b1df047767075b97747b2aba92d2b8d841814d31aaad,2024-08-27T13:28:33.090000 CVE-2024-36515,0,0,6ffc0af4d6ea6411f00106c20aa28bb8637cbfea07924d2fe59b402d34c14e64,2024-08-27T13:28:09.360000 CVE-2024-36516,0,0,e91b35cc04e821b0b30ba2e7773979c84dc2aa68f475c208014155f8bd934996,2024-08-27T13:28:52.227000 @@ -256468,7 +256488,7 @@ CVE-2024-37081,0,0,1657c2c6215fa861c8bf708a3b65df9501dd8a14588c6f7d5718007f5ce77 CVE-2024-37082,0,0,cdf7ab7ec235a04ab3547ac9302ea8fb37a25e6b12903e2e739c3b31068e7382,2024-07-12T17:15:10.220000 CVE-2024-37084,0,0,e8df0694fdec2710f267b23abcc1607a09f45be7ad027071682046814f69bbe8,2024-08-26T16:11:27.507000 CVE-2024-37085,0,0,be808461657e3f85c79619a0be351a3b72207b354595ab61cabce57cc7cf3b37,2024-08-08T14:48:49.303000 -CVE-2024-37086,0,1,2e25451f3b134f0441eef6a18fecdcf95a8356f98bb426dbca09ace240a08533,2024-11-12T18:35:10.230000 +CVE-2024-37086,0,0,2e25451f3b134f0441eef6a18fecdcf95a8356f98bb426dbca09ace240a08533,2024-11-12T18:35:10.230000 CVE-2024-37087,0,0,43aed8bcf7bf19587f693af8d68aefcbb6d8364f5ad3ee6823f45607d542a0c4,2024-10-31T14:35:15.630000 CVE-2024-37089,0,0,4079e469a0b9c8eff7513f19c004b5889c685b5a744b48949620385f99d2cae6,2024-08-20T20:15:43.643000 CVE-2024-37090,0,0,5d012601ead052938e64a5cf6fbacb664a926b0431e026ab44832a3c42b6a7e0,2024-08-16T14:19:42.403000 @@ -257336,7 +257356,7 @@ CVE-2024-3820,0,0,8985e7d1e7aecc5fe081b43705d723ec0ca067093ca4a65f30dd280cab8408 CVE-2024-38200,0,0,d566a27ccd0b19f8229e9b6ce0a19c6b80662cfcd111693b799cdefa30455084,2024-08-13T18:15:29.720000 CVE-2024-38201,0,0,53005100dd7a84f045f26370f955e41247a7f9394ca3dbb51556ee597d1af3a2,2024-08-15T20:30:00.737000 CVE-2024-38202,0,0,d8ddfa5317ca7a8f5c085e0bd9baf44e75fb52705e1273330d4eed88c0e41067,2024-10-16T02:15:05.713000 -CVE-2024-38203,1,1,ed7d5509e2c5a230a3712333b4f596681a2a583b7c57939e9ca00dabc9b21d3f,2024-11-12T18:15:20.720000 +CVE-2024-38203,0,0,ed7d5509e2c5a230a3712333b4f596681a2a583b7c57939e9ca00dabc9b21d3f,2024-11-12T18:15:20.720000 CVE-2024-38204,0,0,9cc89ba83302b9bd215e463218ee1cc7be153f8e1ca4eb483b926bd28092eec5,2024-11-08T15:34:14.467000 CVE-2024-38206,0,0,159422281702f43b217eea303b5c7354ebb2179d51ac658c6c0c018b5ec16a40,2024-08-14T00:15:08.213000 CVE-2024-38207,0,0,48fecb3171f70b225df97b5c11256a860a73d4f7fff133be4c81b71e774668c7,2024-09-19T22:15:05.710000 @@ -257390,7 +257410,7 @@ CVE-2024-38250,0,0,acc8c041b5bb5ffe101c2b85cbef2b6922f42f19867f7d0b00ea1d0a8cc19 CVE-2024-38252,0,0,6469f2116fecff10b3fac36d53cdeb28de763c385aca7d73b3649b24b01808d9,2024-09-13T15:23:18.010000 CVE-2024-38253,0,0,3419bc908b3c8eca0a5649994b4df17f0edf85700f941607866ddc31d72da0a4,2024-09-13T15:20:59.970000 CVE-2024-38254,0,0,51e07d963269d194219f11a7f07791c63d4b27fc12cb6d3b8ac346f9bf2c86ec,2024-09-13T15:16:48.427000 -CVE-2024-38255,1,1,9059d2a6819bc714c0aabeee50f6558faa52832179d416b6aae0eeca8d66287b,2024-11-12T18:15:21.043000 +CVE-2024-38255,0,0,9059d2a6819bc714c0aabeee50f6558faa52832179d416b6aae0eeca8d66287b,2024-11-12T18:15:21.043000 CVE-2024-38256,0,0,2716cfae0f1f9233f52a2225afa7ed0b6aac310a887e60636554d0b32b5b97e3,2024-09-13T15:05:30.070000 CVE-2024-38257,0,0,3a8b2af4adcb4bdfc01df1b0ecd23bc52fe1bc4f0791eb3347f047cb2790f5a2,2024-09-13T15:03:00.917000 CVE-2024-38258,0,0,6c786148de3caa551f00d4f5be537f09b4e147b1bb4e421666b8f6ad512325e1,2024-09-13T15:00:54.153000 @@ -257400,7 +257420,7 @@ CVE-2024-38260,0,0,73cef9e77ce89bf4b93fa7a1c854f856e4e4e75ffa70f23f415d57a3b75d2 CVE-2024-38261,0,0,a036027ac3cc4115cfd09259c55f148edfe89fd6345b9787b8699b3ba958bdb8,2024-10-22T19:33:29.160000 CVE-2024-38262,0,0,058977b60bd52839342064fbab52f3e208a09db53eaf57c3ad301c83ca1834f0,2024-10-22T12:54:48.080000 CVE-2024-38263,0,0,f46aea6861be934017dd7285d8a02938dbd0902e0b8a60fe9326066622646e6c,2024-09-13T14:55:01.400000 -CVE-2024-38264,1,1,6113fb235ef175594720be48c34bf8026a99de059c934bdfbf7ec3a401d274dd,2024-11-12T18:15:21.390000 +CVE-2024-38264,0,0,6113fb235ef175594720be48c34bf8026a99de059c934bdfbf7ec3a401d274dd,2024-11-12T18:15:21.390000 CVE-2024-38265,0,0,b987041af82bf224d305440dfe3a1e78cb0c2c2842cb9ac29ad480c0d374426a,2024-10-22T19:33:43.260000 CVE-2024-38266,0,0,24812493931b23eb9f9c734be2317a33135a030c22860333943c8effa1ea4408,2024-09-26T13:32:55.343000 CVE-2024-38267,0,0,e71850959c90aba1f66e5470156760ebdd22f551c837bdf538f552a253eba944,2024-09-30T15:52:52.787000 @@ -257565,7 +257585,7 @@ CVE-2024-38475,0,0,4434bbc9e26235e103b2ea8722d70e74e682dd306d9d4b03d295c12ec512f CVE-2024-38476,0,0,4dc405e6abe8ebf298b73a343c8daaff34dea74ec39521b4e5e4a255a423f89d,2024-10-29T17:35:06.547000 CVE-2024-38477,0,0,f870fe888c8d23cfdfdc0433edf103c8cad01a9d525dd04e1a70d1ea4bc3e13e,2024-08-21T15:11:30.857000 CVE-2024-3848,0,0,3a1e7dbb50cc54ecdbcc89881c429869965f00f9d2e1eb9f088acc297fe8920f,2024-05-16T13:03:05.353000 -CVE-2024-38480,0,1,6eb9cee6c02610ad5600c451b6902c31f702ef5c26caea9038a07913b62ebd8a,2024-11-12T18:35:13.150000 +CVE-2024-38480,0,0,6eb9cee6c02610ad5600c451b6902c31f702ef5c26caea9038a07913b62ebd8a,2024-11-12T18:35:13.150000 CVE-2024-38481,0,0,a84ef873be05988cbfb5d94abd02b4ab54b65ea0e48ede31f1ebc6095538ede7,2024-08-02T13:54:44.360000 CVE-2024-38482,0,0,9abc0a21b4d338765e493606e519fec01088c089d21089e2acce085b7e1d0261,2024-09-05T16:04:53.577000 CVE-2024-38483,0,0,51f88f94318796eba13a7aef4a0099bdc9ac91b78081d907e8da9e4b8d885fde,2024-09-18T19:19:24.453000 @@ -257632,7 +257652,7 @@ CVE-2024-38546,0,0,eea58266196a873fad4b4b919d579fb6ca82bf25773f04562985e9491c7b0 CVE-2024-38547,0,0,0fd46903a324a4303feb1a86ea138cad132aadfdd07434ca776aa7fc69875c87,2024-08-27T19:56:36.727000 CVE-2024-38548,0,0,1d4fefaae21b3ed24304889bd09e4edcb3023c2a1ebfd220e7dddd4bd428095e,2024-11-07T17:35:20.360000 CVE-2024-38549,0,0,23759d651c75e71c7abf259e3346236d359121811ca890a80b4abdbeb6d53463,2024-08-27T19:57:48.560000 -CVE-2024-3855,0,0,7262bd57b27d1b3d3103ab661d1f7d85ee277817264f21911d91b4fa573922bc,2024-04-17T12:48:31.863000 +CVE-2024-3855,0,1,57d302d27635145d61a95db6a0512476639baf9c65b0abb258b3ec70264e661b,2024-11-12T19:35:09.877000 CVE-2024-38550,0,0,f9339cdf187581dae1984489b06e040b122b4127b3752a57e3768453458373c0,2024-11-01T15:35:15.507000 CVE-2024-38551,0,0,0b4ae073cfbbe4b0131d149b2e79376d2a7c6c6f05a8b9f2866abb58f3a22942,2024-08-27T19:54:39.717000 CVE-2024-38552,0,0,ecea6b3e5ffeb2a780fed1733ff56fe00eda9e1e0386e144355e86643e1cc270,2024-08-27T19:55:05.303000 @@ -258061,7 +258081,7 @@ CVE-2024-3922,0,0,d93b594e75035330ffbe6c52b35218aa3c4c95531df86f73f7a2c93c08b19b CVE-2024-39220,0,0,cffdc7781bb5a48c8af1f6973408b621ad60d81fad4d0ce74cb4feeeca56b86d,2024-07-09T16:22:52.750000 CVE-2024-39223,0,0,f54ba99b81aef6a1a473e3f0b32cd7be01aae3fd33418d38ef44eeff204ead38,2024-10-25T18:35:06.463000 CVE-2024-39225,0,0,967bd0a79163136bba6e3e394c24ab42a107f2cade4053bebd45ebbe7a971cdb,2024-08-15T16:15:19.317000 -CVE-2024-39226,0,1,43cdd6783d22a0f4195d75d906be3723fb60bbc50a9f82410ce8a213baf6f593,2024-11-12T17:35:08.293000 +CVE-2024-39226,0,0,43cdd6783d22a0f4195d75d906be3723fb60bbc50a9f82410ce8a213baf6f593,2024-11-12T17:35:08.293000 CVE-2024-39227,0,0,9b9dd0fff6f6efe1b1b7968ed33a92edd9262d57a609d9726e0c0ac59c14becb,2024-08-15T16:15:19.650000 CVE-2024-39228,0,0,77a80a8a1bc69fecf027e961f4d8b2052c1f2e33e082a913fa56c2ae65ea23b1,2024-08-15T16:15:19.800000 CVE-2024-39229,0,0,b4b3823124f3bc9ea90ea2bf51960fefa03fffb294236ab9c3c28ca969852c64,2024-08-15T16:15:19.953000 @@ -258829,6 +258849,7 @@ CVE-2024-40575,0,0,267280fd6d1dce9620611aeb1f0d6276db3825fa55e9f5e7fc538f4804a7f CVE-2024-40576,0,0,8423823b913f3d1284aae2224b689bfefe0b7a1b018e49f904fd4948fdba6a99,2024-08-01T13:57:51.520000 CVE-2024-4058,0,0,517dff31dd649a4fc97ec9b0700bafce6dc3cd3c4729ffb175a77bfe0097ad6e,2024-08-01T13:59:23.240000 CVE-2024-4059,0,0,c49986e07be30ca2c850f4613369c1702dff21e7018832f61c83284c95e0cc00,2024-05-03T03:16:29.430000 +CVE-2024-40592,1,1,6fb98d7f90b4cf2254c6a5a23dcb3fc337b93eb46dd1b859d9eafc154acc0553,2024-11-12T19:15:11.013000 CVE-2024-40594,0,0,e1d4d027c9dcda2da83b02bb549097245bef0193d8569c5563a5fbe8b55ccbb0,2024-11-04T21:35:06.433000 CVE-2024-40595,0,0,c44d4f6c466d7ef5eae926dc07df3df9a34ba4de6b2deba6d973ce015e367bf0,2024-10-25T12:56:07.750000 CVE-2024-40596,0,0,eba237165708995f6d88799cc22362156aa815eb2255f3ea66a6ad9f417cfe2d,2024-07-09T16:45:08.760000 @@ -259788,7 +259809,7 @@ CVE-2024-41989,0,0,e902f47b7607adc4839df00802ec4b9f801f5195050e557f24fe6e1b06bac CVE-2024-4199,0,0,fcf36265d6a610d83a178901804339aadd89406ac8a1349d6da6f71c3e13bfe9,2024-05-15T16:40:19.330000 CVE-2024-41990,0,0,a9d3bfe1152ea007eb5df4a4d15c3972fabe2ab7cf6c4dc84957655472913a10,2024-08-07T20:49:50.480000 CVE-2024-41991,0,0,c38f7b679bd3e48c46db9fd1c6390ab9383b0c22d8669d807f374055f46ee42b,2024-08-07T20:48:22.403000 -CVE-2024-41992,0,1,d3e22822172edc97c99de26fd87c6501303884a14874a305b9f919f079d1083b,2024-11-12T18:35:14.290000 +CVE-2024-41992,0,0,d3e22822172edc97c99de26fd87c6501303884a14874a305b9f919f079d1083b,2024-11-12T18:35:14.290000 CVE-2024-41995,0,0,79638f0d10c16b237f07db3242d98d294e87bf4205be8c6d9c3c7b90790704bd,2024-08-06T16:30:24.547000 CVE-2024-41996,0,0,29b8c50df43b1c66bff4b5734acbca34adccc097a107dedf36398e589357d13d,2024-08-26T16:35:11.247000 CVE-2024-41997,0,0,84a3f0ea395077fa02b4a334ab8509ff391bef43bdcea38ddd875b5794f83bfd,2024-10-16T20:35:12.430000 @@ -260817,7 +260838,7 @@ CVE-2024-43425,0,0,938233c36f296352d9985e1fd2ce4b16f2764e2564dfb74da585a57129507 CVE-2024-43426,0,0,2e98ed8cd0fe3bbd03bc31edcafe875e17ec3c3fbf69dc03657573f422300921,2024-11-08T19:01:03.880000 CVE-2024-43427,0,0,c0afa9190bfbd3a42daa26b3156ede180ba7e66263d84fafeb811083b81b57ec,2024-11-12T15:35:06.950000 CVE-2024-43428,0,0,b5ed04eb9991b8a533d52401aafbeac39cc5aa45a83db20224d68df7b23b336a,2024-11-08T19:01:03.880000 -CVE-2024-43429,0,0,d5111a217563ee616d3370639b319524d6cbcf7a4714cd852bf9ababc3df3c3b,2024-11-12T13:55:21.227000 +CVE-2024-43429,0,1,f5ddfa56b018dea7dd2df903532e997853780531d9960a7743dc3f510200d05d,2024-11-12T20:35:11.370000 CVE-2024-43430,0,0,56b9aa97c4cdbeb7d02668c0a21fc9e420a493aa45c3ca05f334d7cfa97343ea,2024-11-12T15:35:07.837000 CVE-2024-43431,0,0,b9005a05e5507a46df12a8ffbb839f8f4313b143d14ebe18ef1c5cef640c905e,2024-11-08T19:01:03.880000 CVE-2024-43432,0,0,6882cdf5acd71ff08ac60ea8ef39b61d02a539f240a4304bb1e0c1af091cba8f,2024-11-12T16:35:17.560000 @@ -260833,23 +260854,23 @@ CVE-2024-43440,0,0,3deee55ee11303962828a1a1b49c99d7d9284f6df5f48904a5eb9b6fe3a55 CVE-2024-43442,0,0,5431c5e587ae45a37d19d37e97d6aeb67638f78f0db0677df8b847e3725ec6a3,2024-08-26T16:35:12.860000 CVE-2024-43443,0,0,41bfb91b7f7c9bee48be0f5c8ffcdaa9039df695b92734c0f1b611ea064f9e04,2024-08-26T12:47:20.187000 CVE-2024-43444,0,0,869e12b3e86ded10c38d8795cc34fa22bd804c0b1d5e73f28a97d45f8e95ed59,2024-08-26T12:47:20.187000 -CVE-2024-43447,1,1,fd5dc05f53671d6e56806be84ae616fa8c21743882389a6d301dbdf7371f9492,2024-11-12T18:15:21.707000 -CVE-2024-43449,1,1,a9d39682e29a7558796782d77b36f45700e4a3a35fea1199a237b2086f7730d0,2024-11-12T18:15:21.977000 +CVE-2024-43447,0,0,fd5dc05f53671d6e56806be84ae616fa8c21743882389a6d301dbdf7371f9492,2024-11-12T18:15:21.707000 +CVE-2024-43449,0,0,a9d39682e29a7558796782d77b36f45700e4a3a35fea1199a237b2086f7730d0,2024-11-12T18:15:21.977000 CVE-2024-4345,0,0,991a52fb88968c952c460a76f59f283c0ad80fedc25d9533338fbc3b0d515f60,2024-05-07T13:39:32.710000 -CVE-2024-43450,1,1,7df4e2c6bdc2de57eedf815ed01c76f77185d9316d9f5dd85ddb20c7f799fd74,2024-11-12T18:15:22.237000 -CVE-2024-43451,1,1,6e278dc59b3dd08ae7d0e162b1026695587a953c50aa1a5eb37eb44a9e3db640,2024-11-12T18:15:22.483000 -CVE-2024-43452,1,1,192c33eb1252a75f8c2aab86957281998f0d88198ec9948f6cd7dad5aee3b49b,2024-11-12T18:15:22.737000 +CVE-2024-43450,0,0,7df4e2c6bdc2de57eedf815ed01c76f77185d9316d9f5dd85ddb20c7f799fd74,2024-11-12T18:15:22.237000 +CVE-2024-43451,0,0,6e278dc59b3dd08ae7d0e162b1026695587a953c50aa1a5eb37eb44a9e3db640,2024-11-12T18:15:22.483000 +CVE-2024-43452,0,0,192c33eb1252a75f8c2aab86957281998f0d88198ec9948f6cd7dad5aee3b49b,2024-11-12T18:15:22.737000 CVE-2024-43453,0,0,987e6c8ce7e8f2e1d3f9232b14d73438f55ce61f84bbe67fdf49d3284ca0d7f9,2024-10-22T19:29:44.997000 CVE-2024-43454,0,0,f0995c64c71167afbbf899e7ce1038e4a80441f5a273809866a5c3103af339c0,2024-09-13T14:52:28.570000 CVE-2024-43455,0,0,7effa4d2d49733857a939b9c56001fb62c3a8618d5be7fb4155055d0a4466b05,2024-09-13T14:50:02.390000 CVE-2024-43456,0,0,7e33172df2a3bcdeebebada3a1490c286c11a1e92c4e5a2d00db0b809ed4d2cc,2024-10-21T21:28:15.323000 CVE-2024-43457,0,0,2d39da1954a904290cdb655f8413466318bc2fb9e79e95d1239baead98599e5b,2024-09-17T16:25:03.037000 CVE-2024-43458,0,0,d510a08722ad4b01e3bd416a3ff1688485cee9b82fed026222465a1f7268669b,2024-09-17T16:24:06.837000 -CVE-2024-43459,1,1,d5037f8a4f48f5c3d66ded9dd4a60ea3063b2ad1d7c85d2e60934c7ecffd39cd,2024-11-12T18:15:23.090000 +CVE-2024-43459,0,0,d5037f8a4f48f5c3d66ded9dd4a60ea3063b2ad1d7c85d2e60934c7ecffd39cd,2024-11-12T18:15:23.090000 CVE-2024-4346,0,0,9d7617b39f85e35f3b425bc36c01c8cc51c24d84e65ff0d34bf4ea7488f000ec,2024-05-07T13:39:32.710000 CVE-2024-43460,0,0,9c3132d78cea7fa8b50b764b3c03f944da46eae998a999bbcb3ad24e42826c5d,2024-09-25T19:18:53.350000 CVE-2024-43461,0,0,f99d1573520331446defc217a57faaa313e0a37923c807afd46dd8502623f146,2024-09-17T11:17:22.597000 -CVE-2024-43462,1,1,dcb118ab6310d15cee3c6688c2508510c40179ca42a32a7c36bf5535fa374c7e,2024-11-12T18:15:23.370000 +CVE-2024-43462,0,0,dcb118ab6310d15cee3c6688c2508510c40179ca42a32a7c36bf5535fa374c7e,2024-11-12T18:15:23.370000 CVE-2024-43463,0,0,82ed3b86032aeae7f20effff7ac01fc984a98742e5e7914a0bb7560978dad83f,2024-09-17T16:08:58.350000 CVE-2024-43464,0,0,42956114f68b1d67be14842639914b420d38d850d63203f2075370bc159d7270,2024-09-13T14:48:05.247000 CVE-2024-43465,0,0,5d9250aa7e038ca65d71b1061a2d776c0916a5a9d4039f0bae2a50bea6fdecc1,2024-09-13T14:46:33.210000 @@ -260881,8 +260902,8 @@ CVE-2024-43492,0,0,af0e73844988f19d42832ecb20006b5ce23817c5aa51bd592ac57ea711827 CVE-2024-43495,0,0,d2a8d4c3f203ea859641059613f0257436e0f701c3b0d8de8a57b0ddb10ca75e,2024-09-18T13:55:07.100000 CVE-2024-43496,0,0,1e4f277010291ea8388e3463633269924e9ec7b9c2f947668d81da4d3ef80c37,2024-09-23T17:32:54.663000 CVE-2024-43497,0,0,2537458188d3ab9aa76faa081a4fee596da658de243be9f1924628f34744e854,2024-10-17T21:15:30.827000 -CVE-2024-43498,1,1,1f35ed1545d6c5166cb859e2d06e662c8324baa4f30ecd41ed7be561583a4462,2024-11-12T18:15:24.110000 -CVE-2024-43499,1,1,a450a73950e2c11952b9119a41547ce6f3f50f48bde59e5b11a00eee4fad1964,2024-11-12T18:15:24.363000 +CVE-2024-43498,0,0,1f35ed1545d6c5166cb859e2d06e662c8324baa4f30ecd41ed7be561583a4462,2024-11-12T18:15:24.110000 +CVE-2024-43499,0,0,a450a73950e2c11952b9119a41547ce6f3f50f48bde59e5b11a00eee4fad1964,2024-11-12T18:15:24.363000 CVE-2024-4350,0,0,064be752b5def38b2ae127a671a2419b00cbe1db7bc8e8e49beca0c95658f61b,2024-08-30T18:18:37.130000 CVE-2024-43500,0,0,78bdbde8586a4aeadf73d960935866ca71ecb415ed1914c17c331c1e31d9dae2,2024-10-17T21:01:08.067000 CVE-2024-43501,0,0,3dab9521c0cc7c6361671a7526673e1c684c3d41e5a05cbd155304b95f78c3a9,2024-10-17T21:06:07.377000 @@ -260915,7 +260936,7 @@ CVE-2024-43527,0,0,b6eaaba86dd8df9b16e2ceea37b465e563d9f1276c446132f9cd04caa2aba CVE-2024-43528,0,0,c078a6601673a23e9f5cb9927d553390a34b2f1fb3f3c869076da972c659e11d,2024-10-16T21:47:05.543000 CVE-2024-43529,0,0,6d2e5c631923a97dc2fc3a94b6294dc3ad5e559d16d70ff1d0c82c75d4ea2458,2024-10-16T21:48:07.683000 CVE-2024-4353,0,0,aba01e17f5523fea8114a858821f92c407b11c64f22dee184f29d8c270ca2d70,2024-08-07T19:15:48.223000 -CVE-2024-43530,1,1,3e81581a01c8173b2ded33dca3212e4dd708e3d259691c77f9757e3a122d237b,2024-11-12T18:15:25.997000 +CVE-2024-43530,0,0,3e81581a01c8173b2ded33dca3212e4dd708e3d259691c77f9757e3a122d237b,2024-11-12T18:15:25.997000 CVE-2024-43532,0,0,c4a5dec645ee682c2fb747712fd0b31ac99f4ae71f14f2366a2b1d631440f236,2024-10-16T21:51:34.370000 CVE-2024-43533,0,0,0f9ce0b0dadab4dc53059badbfdc228def8a270b47abc0d441c46b976784c440,2024-10-16T21:48:30.067000 CVE-2024-43534,0,0,a57be74fbdb76e88ff1715c3f432c68cba04c18e2f38436ceafe7daae64c58a1,2024-10-16T21:49:06.767000 @@ -260980,11 +261001,11 @@ CVE-2024-43592,0,0,66ef8868710faf1076b1b13051f2c75eebafbfe5976017df5a4f00073c2c6 CVE-2024-43593,0,0,7e17c95f595bed9729f21273d821a92cb32423e919d0faf83c37ed5dcd8b802f,2024-10-22T19:30:19.870000 CVE-2024-43595,0,0,c9530dd7915099d4a86e6d6506504fdd984e781ac89cb128030fa646bffdb2c0,2024-10-18T16:55:06.487000 CVE-2024-43596,0,0,0f30448ecbbf09d34768a5a54fbdb251259ce851c310b81f9cbc1d14d274f939,2024-10-18T16:59:08.667000 -CVE-2024-43598,1,1,8ded11a76338fff282c0dfec3dad15abd8849affc64cc49be07bbb6a0ac929d0,2024-11-12T18:15:28.277000 +CVE-2024-43598,0,0,8ded11a76338fff282c0dfec3dad15abd8849affc64cc49be07bbb6a0ac929d0,2024-11-12T18:15:28.277000 CVE-2024-43599,0,0,46d81ec2898b49efc1d06eab918dd819a14dff6d746dfc96a1846004d908dfe9,2024-10-17T20:03:28.687000 CVE-2024-4360,0,0,ecc9c2c2d55d835e0dd1d5a0ca496992d866a587cb1717ba0b6dc8cd29acfd1c,2024-08-12T13:41:36.517000 CVE-2024-43601,0,0,70d1af092a29e0256385b0b1eb94d28b1b04d755b5d71c8bb3ee4a255fe9335f,2024-11-08T22:15:20.270000 -CVE-2024-43602,1,1,52cfc3551a8b0c140d6cfebbb01b18cf93906ca4992dcfa4de2723bf6edbfa57,2024-11-12T18:15:28.563000 +CVE-2024-43602,0,0,52cfc3551a8b0c140d6cfebbb01b18cf93906ca4992dcfa4de2723bf6edbfa57,2024-11-12T18:15:28.563000 CVE-2024-43603,0,0,d2fca24eb56e369fa155c253fb46551545c3a138800b20bacb862233e9cfec55,2024-10-17T19:55:34.360000 CVE-2024-43604,0,0,f6faaab53dedc3cc5ca882966371cef6b85571d62bbd9d0efe6e399cbea7c221,2024-10-17T19:54:24.387000 CVE-2024-43607,0,0,f77e9baeaed71ae01585aac88f6e4a22dbbcabcaaded574a516f1ff34eb6e860,2024-10-22T19:03:17.993000 @@ -260994,38 +261015,39 @@ CVE-2024-4361,0,0,59805155c6666ce54d8263fcaceec5e0fc128f8100df5fb2e590f4610d5a88 CVE-2024-43610,0,0,e05bc7d7fba9921ddb28639aa2d807e02a712368195686314d74c31cc0c1b1bd,2024-10-10T12:51:56.987000 CVE-2024-43611,0,0,4cc7faddbc4a0042c9b0d18e623cdb2e65033905714d4e2435ea5507fb9866e2,2024-10-22T16:01:19.373000 CVE-2024-43612,0,0,2d63857a7410863939630233bd3c57b8a869ef6d82a1dc4e625bbf528ee43c0a,2024-10-21T20:48:02.050000 +CVE-2024-43613,1,1,7d120dfcb7fc43290d2d1ebc55186497ce6cf0d63e12646adb196ce1e9daf50f,2024-11-12T19:15:11.560000 CVE-2024-43614,0,0,37f86979c4c4ec96d0dd61c1d9daa59ec511d8fd5452834efe232d695cc74469,2024-10-21T20:50:38.370000 CVE-2024-43615,0,0,841e5833e1934c639d3a9a11a43505704ba14c449fb8c86b43a2c5341378c86b,2024-10-21T21:00:34.967000 CVE-2024-43616,0,0,15ca7e9be3a91b920fd3f7c8d4a29e60f6c23503343614efbabdf7dee4793679,2024-10-21T20:47:00.313000 CVE-2024-4362,0,0,16bcb3e7fd20cddcf2afd5e423805494786dbf969e82eb67d1ba08cf8ffd4c26,2024-05-22T12:46:53.887000 -CVE-2024-43620,1,1,a89f3687014cfa76446e03cdef447409a9bb3ca1ff342423a4833ce6ee910b93,2024-11-12T18:15:29.037000 -CVE-2024-43621,1,1,5e4ca447b30ec22517bee91fc8aee55ec5079eca6e081a3ac8377a4bf17895fa,2024-11-12T18:15:29.270000 -CVE-2024-43622,1,1,eb07a52098d836214810f5143267be5c4a8191069ad2bb293131a33d343e48f9,2024-11-12T18:15:29.513000 -CVE-2024-43623,1,1,24cfd714e82858dbff9864b5a63659ea7ac1925ba1c0cb1f3dbe358166dfc089,2024-11-12T18:15:29.743000 -CVE-2024-43624,1,1,27ece5de752d6c8d3edf5caf81d528c8a17fbcebb01ea27b7612896ed4e8f796,2024-11-12T18:15:29.987000 -CVE-2024-43625,1,1,476042d81912eb9699e913cbc9e957d8c61e6522a288ea02ce3e817c97e192ae,2024-11-12T18:15:30.230000 -CVE-2024-43626,1,1,cfb4dde7fe1ebce8110fb3f9e83bd0fc67dfe7aadf721b67b0f60c7574567ef1,2024-11-12T18:15:30.443000 -CVE-2024-43627,1,1,1a13f18a248e3ad01daa04f78bdb55c367ac28d74da28b3eaa066ea3ed56a3aa,2024-11-12T18:15:30.663000 -CVE-2024-43628,1,1,da79ae0ff44f74b03cf1bdc4c6d2ef3c9fa6312e718d119a163944088c82b055,2024-11-12T18:15:30.900000 -CVE-2024-43629,1,1,9c7673f5d8988c67bdedca35c716a40114af9b4a0cd31e4aeb55cbdb52655a62,2024-11-12T18:15:31.133000 +CVE-2024-43620,0,0,a89f3687014cfa76446e03cdef447409a9bb3ca1ff342423a4833ce6ee910b93,2024-11-12T18:15:29.037000 +CVE-2024-43621,0,0,5e4ca447b30ec22517bee91fc8aee55ec5079eca6e081a3ac8377a4bf17895fa,2024-11-12T18:15:29.270000 +CVE-2024-43622,0,0,eb07a52098d836214810f5143267be5c4a8191069ad2bb293131a33d343e48f9,2024-11-12T18:15:29.513000 +CVE-2024-43623,0,0,24cfd714e82858dbff9864b5a63659ea7ac1925ba1c0cb1f3dbe358166dfc089,2024-11-12T18:15:29.743000 +CVE-2024-43624,0,0,27ece5de752d6c8d3edf5caf81d528c8a17fbcebb01ea27b7612896ed4e8f796,2024-11-12T18:15:29.987000 +CVE-2024-43625,0,0,476042d81912eb9699e913cbc9e957d8c61e6522a288ea02ce3e817c97e192ae,2024-11-12T18:15:30.230000 +CVE-2024-43626,0,0,cfb4dde7fe1ebce8110fb3f9e83bd0fc67dfe7aadf721b67b0f60c7574567ef1,2024-11-12T18:15:30.443000 +CVE-2024-43627,0,0,1a13f18a248e3ad01daa04f78bdb55c367ac28d74da28b3eaa066ea3ed56a3aa,2024-11-12T18:15:30.663000 +CVE-2024-43628,0,0,da79ae0ff44f74b03cf1bdc4c6d2ef3c9fa6312e718d119a163944088c82b055,2024-11-12T18:15:30.900000 +CVE-2024-43629,0,0,9c7673f5d8988c67bdedca35c716a40114af9b4a0cd31e4aeb55cbdb52655a62,2024-11-12T18:15:31.133000 CVE-2024-4363,0,0,2c7c654c7422e9473b7010560ae2a1c2e3350cf44cdf9b6cc5ffb58dc4446aff,2024-05-15T16:40:19.330000 -CVE-2024-43630,1,1,a5c7bf7c3ef0d1ee850ba78ff0b1a2f0fc7bd842c4a77736ab003d4f2bb9a80a,2024-11-12T18:15:31.353000 -CVE-2024-43631,1,1,0bd1b0a0289a5e6c9804e3247ed45b108e6f5c084be7609274a509940e580dcf,2024-11-12T18:15:31.580000 -CVE-2024-43633,1,1,86868102ac0ad8bcd8ae7aa208615a24c96332718596ae24b257d0c334426af1,2024-11-12T18:15:31.800000 -CVE-2024-43634,1,1,aa53f0e61132a8691e2baf0cbb16a868d792e11c5adb7fed7ce98c0b1ff11432,2024-11-12T18:15:32.050000 -CVE-2024-43635,1,1,49c5b316cabc011ab4743d0cae9393e5b46b1ebb17a90877cdd29cd7c61fa01b,2024-11-12T18:15:32.287000 -CVE-2024-43636,1,1,53d6284ad6dca106bdc09c16c5472a1c40c6fe43f810305c433c33f36d2c47a5,2024-11-12T18:15:32.537000 -CVE-2024-43637,1,1,f368c069d2871e756ea863018a036b8a217ba90f8b961b2073691067fe827995,2024-11-12T18:15:32.773000 -CVE-2024-43638,1,1,d9eeb1ecb58aec08c00d4d8d60f5a98c6738bc00cd652bff5433e7b58bdd2a83,2024-11-12T18:15:33.013000 -CVE-2024-43639,1,1,ab466b0fcf3cab315de53821e916473489c1a8a2197d93350688431bb3aa5d4c,2024-11-12T18:15:33.267000 +CVE-2024-43630,0,0,a5c7bf7c3ef0d1ee850ba78ff0b1a2f0fc7bd842c4a77736ab003d4f2bb9a80a,2024-11-12T18:15:31.353000 +CVE-2024-43631,0,0,0bd1b0a0289a5e6c9804e3247ed45b108e6f5c084be7609274a509940e580dcf,2024-11-12T18:15:31.580000 +CVE-2024-43633,0,0,86868102ac0ad8bcd8ae7aa208615a24c96332718596ae24b257d0c334426af1,2024-11-12T18:15:31.800000 +CVE-2024-43634,0,0,aa53f0e61132a8691e2baf0cbb16a868d792e11c5adb7fed7ce98c0b1ff11432,2024-11-12T18:15:32.050000 +CVE-2024-43635,0,0,49c5b316cabc011ab4743d0cae9393e5b46b1ebb17a90877cdd29cd7c61fa01b,2024-11-12T18:15:32.287000 +CVE-2024-43636,0,0,53d6284ad6dca106bdc09c16c5472a1c40c6fe43f810305c433c33f36d2c47a5,2024-11-12T18:15:32.537000 +CVE-2024-43637,0,0,f368c069d2871e756ea863018a036b8a217ba90f8b961b2073691067fe827995,2024-11-12T18:15:32.773000 +CVE-2024-43638,0,0,d9eeb1ecb58aec08c00d4d8d60f5a98c6738bc00cd652bff5433e7b58bdd2a83,2024-11-12T18:15:33.013000 +CVE-2024-43639,0,0,ab466b0fcf3cab315de53821e916473489c1a8a2197d93350688431bb3aa5d4c,2024-11-12T18:15:33.267000 CVE-2024-4364,0,0,9332cb50f761fbdff3ec7a6ec045f13accb15b963b30845c4aa93399b834b7a1,2024-07-24T20:23:31.487000 -CVE-2024-43640,1,1,a29916ec781fc13a4728099e9ca82db63cae0680c2104623f2070932a6f26dc1,2024-11-12T18:15:33.507000 -CVE-2024-43641,1,1,d2452db9e83f520151066fdb972ae0d85ecdd1a2faf421aea0ad149c5cc32841,2024-11-12T18:15:33.727000 -CVE-2024-43642,1,1,84180c72d76f52f700354c063eff146964e41a3e719de5a2376331be8c17f7b0,2024-11-12T18:15:33.960000 -CVE-2024-43643,1,1,6f884d626134a66e6ec21cee99f125bbdd80a321f415c6f42fdac96b91342925,2024-11-12T18:15:34.370000 -CVE-2024-43644,1,1,33ade150481c4249d5d54b50b7a8d371133283c1a34a7a35c1a7d2758baedfa6,2024-11-12T18:15:34.643000 -CVE-2024-43645,1,1,054266445ff72ddabafc074684f7f09b40f7de4b23894a781d79f1ebfe6e32ab,2024-11-12T18:15:34.903000 -CVE-2024-43646,1,1,2974bb49a8cf15910c7030c2ed6052330b4a4c0707a373b34075e3e12a730a7a,2024-11-12T18:15:35.150000 +CVE-2024-43640,0,0,a29916ec781fc13a4728099e9ca82db63cae0680c2104623f2070932a6f26dc1,2024-11-12T18:15:33.507000 +CVE-2024-43641,0,0,d2452db9e83f520151066fdb972ae0d85ecdd1a2faf421aea0ad149c5cc32841,2024-11-12T18:15:33.727000 +CVE-2024-43642,0,0,84180c72d76f52f700354c063eff146964e41a3e719de5a2376331be8c17f7b0,2024-11-12T18:15:33.960000 +CVE-2024-43643,0,0,6f884d626134a66e6ec21cee99f125bbdd80a321f415c6f42fdac96b91342925,2024-11-12T18:15:34.370000 +CVE-2024-43644,0,0,33ade150481c4249d5d54b50b7a8d371133283c1a34a7a35c1a7d2758baedfa6,2024-11-12T18:15:34.643000 +CVE-2024-43645,0,0,054266445ff72ddabafc074684f7f09b40f7de4b23894a781d79f1ebfe6e32ab,2024-11-12T18:15:34.903000 +CVE-2024-43646,0,0,2974bb49a8cf15910c7030c2ed6052330b4a4c0707a373b34075e3e12a730a7a,2024-11-12T18:15:35.150000 CVE-2024-43647,0,0,ee5840489343f77483691f4446146948d3f18b1595eba8d71ff6f621d4acd601,2024-09-10T12:09:50.377000 CVE-2024-4365,0,0,63c2db9b70aba81bf4acd057c8457c31612ae1811b001c9773701935bfb8f554,2024-05-24T01:15:30.977000 CVE-2024-4366,0,0,bbfa79c99a69a6ab3a1454de708e5610ad18f6066e78d9171ac36b6f6e6eece9,2024-05-24T13:03:05.093000 @@ -261225,8 +261247,8 @@ CVE-2024-43923,0,0,2b5b5078806af11e754bee3b220c94f3a77bd497e53afc47bf4a0bf326cd3 CVE-2024-43924,0,0,f4c232d5f7541d1030f4431c6fd8b2d52bd38910980d7fed5b8d5cc784463639,2024-11-06T17:03:52.480000 CVE-2024-43925,0,0,c253e5ed20f0a643cb01db8c4b79c3d736f9b8dfe996ec3bb51f7a049aa375f0,2024-11-01T20:24:53.730000 CVE-2024-43926,0,0,afe6ba4a11196449e0acf87526616d8bc217e24dbfcd1f8bfd3b6ef863d1044f,2024-09-03T15:15:45.160000 -CVE-2024-43928,0,0,7b16271e011bba3c6b61f0b00b9867b2efe89ae06ef30e674103c1844067f327,2024-11-01T20:24:53.730000 -CVE-2024-43929,0,0,ff7bc69258fa862ed9f4b94806b3d5bb00ce2fac23c31cc802c83c022c85aaad,2024-11-01T20:24:53.730000 +CVE-2024-43928,0,1,547dc66f0c4426c53cff05d73bcf22bcd2e507fa1cae9f24630cedd49b47e8ad,2024-11-12T20:49:01.817000 +CVE-2024-43929,0,1,4d0f760130a3601409855424474b55103de73fefcf2b48cf7ee09d2885a276bb,2024-11-12T20:49:57.193000 CVE-2024-4393,0,0,4e00802830a11f2dfec38985ebf8ec82363098448bfe6d2b274aa9f7d7f56b33,2024-05-08T13:15:00.690000 CVE-2024-43930,0,0,f483102c3decb002ca0bdadbf9f33ed6833d5e2a40470492f9988e5387a99518,2024-11-01T12:57:03.417000 CVE-2024-43931,0,0,e4b487ce16111f7507cab3f7997c98054a40435c39d10d2eeeecf16baa2d636f,2024-09-13T21:22:51.923000 @@ -261917,6 +261939,7 @@ CVE-2024-4511,0,0,4d9dcedc762dab13753e2b0a6fba06d0880c8f0afe543668ff587ed1c4cea3 CVE-2024-45111,0,0,9fb0acaa2cfe1365ae260bae686a5d90e02d1dda50ec2516e7d6462b0987e021,2024-09-13T17:20:53.993000 CVE-2024-45112,0,0,fe220e89b9c90418cf9256ec0d1a61e1fb615761854b12c59226a9746bbe3106,2024-09-19T14:56:53.697000 CVE-2024-45113,0,0,9a4e89176a7b5c7d3845f7aafd6d39f3276ba5c23e86960f62b502204f186b6b,2024-09-13T16:56:53.673000 +CVE-2024-45114,1,1,e7c32ec15b2396e115f3aa9d0ed1b1feab4c55745f067d62a84286967f97b197,2024-11-12T19:15:12.860000 CVE-2024-45115,0,0,44f3d3d7e6cbfb9716d2aeed4c6872f67380791fa0673db900d919e23d985787,2024-10-10T21:51:56.040000 CVE-2024-45116,0,0,ba10c288fa12238b6e33057da35cf808f94ca4309d8804acd55bde0bef485b3d,2024-10-10T21:47:27.763000 CVE-2024-45117,0,0,63140a3dbb3f93a46a50aeaca1736c76d20d9a07045b8eb34614ba33b13e95d9,2024-10-10T21:47:11.257000 @@ -261951,6 +261974,7 @@ CVE-2024-45143,0,0,b7c913115514a2c2f5aae9cdeb64ec1457c94d908c1b9475a3d586b79d76c CVE-2024-45144,0,0,3d483b46971de80e33f27e9a69ef1aff9c95949bf9f7528efc12dc9a0282cb88,2024-10-18T14:42:45.377000 CVE-2024-45145,0,0,156066466313240ebda80ab859dcbc1ed184f5b9ec3fb8fddbdd07c70d4185e9,2024-10-18T14:26:54.053000 CVE-2024-45146,0,0,44126b8c652d70a444824785bf8fbde83205909d2793e4dabd8e2b0b32e4a035,2024-10-18T14:35:50.380000 +CVE-2024-45147,1,1,9a3cc75e8bc427a38ba6a806fae58cd6be371c78063074f9e09ec64515ec3200,2024-11-12T19:15:13.090000 CVE-2024-45148,0,0,0e90a71edeeb1f6c08cc4e8f74179b58bc7185e9e9129d62d43635e1d8f74649,2024-10-16T13:27:46.397000 CVE-2024-45149,0,0,daf87a7836b76bd56fac2770e905e7b6c1fea6089c2a616c772a21c525fb4727,2024-10-11T22:12:25.263000 CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000 @@ -262127,15 +262151,15 @@ CVE-2024-45392,0,0,9fbc5e30fa3bc562debe7349b4449c2781517f74b4c1565d7b7acedf814cb CVE-2024-45393,0,0,6f436bc32d420db4f8aef33efc64d5a86243ff621c73802c298c0db31d80b7a3,2024-09-10T15:50:47.237000 CVE-2024-45394,0,0,087a53dae86480e9cc9b0f35c92b2e1955ad080485b753f37f05c38b033a4e79,2024-10-09T15:15:13.600000 CVE-2024-45395,0,0,5d56a4af61ec059101686b1e7cb37e5e2b811fdef7d02e3f80cc3ab9c9de60ec,2024-09-24T16:50:07.930000 -CVE-2024-45396,0,0,145ce5f64a797314ac414fa4a42e9f18380b9e63de2ac05958f9cc66510f8155,2024-10-15T12:58:51.050000 -CVE-2024-45397,0,0,bd4e925f6bae33bb58cb9795a2fc96e40b6eaa1ce454f86da9c061615ab217e4,2024-10-15T12:58:51.050000 +CVE-2024-45396,0,1,c8ac17501d66c580f5aaa0fa1658f5fe8b582d56c0633d8f09c52e0f2d33bfe6,2024-11-12T20:05:09.367000 +CVE-2024-45397,0,1,52a7d4bad71a76119b2cc8aad12b532d932b19778028918a3f19d99f7eb542ea,2024-11-12T20:14:25.083000 CVE-2024-45398,0,0,7d0ffef7297178b253d2c7dc1d3134ea1f5d20b5e1c2ba29b34a3e96958f60bb,2024-09-25T19:20:52.527000 CVE-2024-45399,0,0,00e25ddf2914c9fa87aad2e5386f06040c0acda61d936c8ae5f89b710f3a24c9,2024-09-24T16:48:10.083000 CVE-2024-4540,0,0,56ac6cff101cc91d96d8daf4bfda0c052b655471dc0698e77d798366d59b9124,2024-06-03T23:15:08.930000 CVE-2024-45400,0,0,23d149ef7bada976fce9d2c89ea0cb38e5ff315577519b49e805da7db09942df,2024-09-19T18:04:36.627000 CVE-2024-45401,0,0,954ab622986edfe93d770dee5aae8a96aecaff4645097c85021d65007f0d9f05,2024-09-19T18:12:52.220000 -CVE-2024-45402,0,0,9d902c2d69fb49278ebc5190705073700ab0450b4465734030e07e0f3939ad50,2024-10-15T12:58:51.050000 -CVE-2024-45403,0,0,e43a1e7c6c164fe7f8bff8a27a689ee237d6db2840de66a15a2d5e071e7270b4,2024-10-15T12:58:51.050000 +CVE-2024-45402,0,1,922d4b3d4256664d2df8dced914e7f319307d21bfb9d07e89118795bd577dc16,2024-11-12T20:02:56.167000 +CVE-2024-45403,0,1,eb6e2e0f8a9da45f19121c8fa023a42becb36a7bdd887acc7c2293b6a25d2f88,2024-11-12T19:59:51.097000 CVE-2024-45405,0,0,fcb9dae5692e8d4d27671ebdd5ac9faa600b717293c20df4e46e96d26ca1730f,2024-09-06T16:46:26.830000 CVE-2024-45406,0,0,fccecd6532f18f7e1ea06f6cc62abb2faeaefa7fcd57ba441a0597b2a31370da,2024-09-13T15:30:45.380000 CVE-2024-45407,0,0,761b4924e4b46db1752cf42f388ca76c7e573211ea8b116cb02c0d2e460e33eb,2024-09-20T16:18:46.717000 @@ -262318,9 +262342,9 @@ CVE-2024-45764,0,0,e55812b3262ad9c7b90a9a57055a85b654c45e8378b7440ff062b836e6265 CVE-2024-45765,0,0,324589effb5b27643e9f79a9ce88d0d046eea5e6cb4756946ff245c0d7153827,2024-11-08T19:01:03.880000 CVE-2024-45766,0,0,1ac6d864cfa84a9455e326aaa02a3b21331a9d91fce801a33cf0dbf2664ff28d,2024-10-18T12:53:04.627000 CVE-2024-45767,0,0,eb5f868ea4691213c1364b02500bffd0f089d1b21eaacec7a6a56a798a8a0e81,2024-10-18T12:53:04.627000 -CVE-2024-45769,0,1,68a2a61eadf42c80605ce04117a3301a4bc932c0f0fb7e1da09aa7ee31344d24,2024-11-12T18:15:35.427000 +CVE-2024-45769,0,0,68a2a61eadf42c80605ce04117a3301a4bc932c0f0fb7e1da09aa7ee31344d24,2024-11-12T18:15:35.427000 CVE-2024-4577,0,0,b55cac970df35b2daf21f1bc20cfa9dd0965f08c49eae1007fc9a139f9980913,2024-08-14T19:23:47.253000 -CVE-2024-45770,0,1,9c8c7fc9fdf0b72fbb9d716faed9837ec24c65464a5ce38c4a50fad0b84880d1,2024-11-12T18:15:35.643000 +CVE-2024-45770,0,0,9c8c7fc9fdf0b72fbb9d716faed9837ec24c65464a5ce38c4a50fad0b84880d1,2024-11-12T18:15:35.643000 CVE-2024-45771,0,0,754a0f27219aa2eb6179ec627ac31099e8e2882043a643cfa7921ddb03dbb66f,2024-09-09T15:35:11.567000 CVE-2024-45772,0,0,d4fcff511ac9c702d11d2981d4f53f578a5b533222a07c5c21d8a62a8451fded,2024-10-04T13:20:58.327000 CVE-2024-45773,0,0,fa80a32ca25578799d772108a6e7f2b87164fbdfd3820c41dab7e96e6c83084e,2024-09-30T12:45:57.823000 @@ -262927,8 +262951,8 @@ CVE-2024-46951,0,0,f7856a5dde7937a47da4c48bb63b279f0e9e01244c8373bc9a31b359d037a CVE-2024-46952,0,0,85d50c97437fea65cc1151115a97820312883ddfd70f6ca7b643c8ac38b503ee,2024-11-12T13:55:21.227000 CVE-2024-46953,0,0,71ad7cf837c73b0dfabae1ff0b361a18613eb03fffe5758938e28582f6cbdca2,2024-11-12T13:55:21.227000 CVE-2024-46954,0,0,b3b00bcbbff3d63d8397974f1b0bf40209c369e9b725dcf5b355cafb51e6bd9d,2024-11-12T13:55:21.227000 -CVE-2024-46955,0,0,b6a31120fcfb9f044c1f71394c8ace5986db0bf3dbf67db1e1e44230460fd384,2024-11-12T13:55:21.227000 -CVE-2024-46956,0,0,60f19518a0b8606474b10d47490d2efd8ca6c2bc275be981da1ce0be913f6317,2024-11-12T13:55:21.227000 +CVE-2024-46955,0,1,69cd3ec5e6e1131251e5e097a754373dc2f6b57542daa951132de6ea88dc1feb,2024-11-12T20:35:12.407000 +CVE-2024-46956,0,1,d97941c29272a8785e7eed871c50021e8c7af6d31794d5ac1c57d8bc8cd6c620,2024-11-12T20:35:13.723000 CVE-2024-46957,0,0,1a1f161c8d8bab3db62f1fa9272e11eb4217a378f1fb9334b95d7f852bd44900,2024-09-26T16:15:08.883000 CVE-2024-46958,0,0,a066074c8ea90ca6497e29c818dbf400ff90cc8827530871d9d45fb4a3abe93e,2024-09-20T22:41:38.223000 CVE-2024-46959,0,0,49609311db8eb2484a5bda279fc39cc9dccd98f1d151343e94689d8818c061d9,2024-09-20T14:35:13.063000 @@ -262938,7 +262962,7 @@ CVE-2024-46961,0,0,6281dfd23f05aedb5a57016518bf840f9c3236bd7244aca077f0eeaa5baad CVE-2024-46962,0,0,0548157d7c5de74bb44620f2ef4d424089f2c91f1caa9ef46af393d2ab234d0d,2024-11-12T16:35:18.293000 CVE-2024-46963,0,0,b3eeeff171042ae94da59aca70d325e187226ed1b77924489ea1d0cb9ef2bff9,2024-11-12T16:35:19.117000 CVE-2024-46964,0,0,9566b7e7fac378fec90f5c4450fce11c64d6e1ff19e90136f23f197651aeb491,2024-11-12T16:35:19.933000 -CVE-2024-46965,0,1,97ca4b72439238ebe100af52f81acd4f8393bf48297283fc3a2578dd3a15fc61,2024-11-12T17:35:09.427000 +CVE-2024-46965,0,0,97ca4b72439238ebe100af52f81acd4f8393bf48297283fc3a2578dd3a15fc61,2024-11-12T17:35:09.427000 CVE-2024-46966,0,0,2dc70b10b093ab52972025bec2f51704bf269615cf39a0a1e82c4c898655227f,2024-11-12T16:35:20.790000 CVE-2024-4697,0,0,3bc62a9bb9952d026af8ecd13a98f81fa60290945109a2f6023ef384956822fe,2024-06-04T16:57:41.053000 CVE-2024-46970,0,0,6ef16041ee18068670ae3579af5d9c59d6c6488d479945d9220353b5e1ab4205,2024-09-20T13:23:29.700000 @@ -263027,7 +263051,7 @@ CVE-2024-47070,0,0,eb4e046cb0db7f50fe7115a81e47e9b3e2a8d6720f2cc6fa65783765e5390 CVE-2024-47071,0,0,2a2727cf2aa9f31ddc31166413e132f87e7e569f257fdb08eb6f77a7cd1bf2ac,2024-10-04T13:51:25.567000 CVE-2024-47072,0,0,0e35b2a8d8fc5d55d46fabe70f892995ce54782bcdf9f6055325a82c63d5f14b,2024-11-08T19:01:03.880000 CVE-2024-47073,0,0,5e9a39ce407ce0e80790a37166780ab582a628936b21fe14c192cef183ac3468,2024-11-08T19:01:03.880000 -CVE-2024-47074,0,0,85b0d20db18cba6f1618ee108f15353bb747058cd84a8ac0cfd5d8f3f78ff07f,2024-10-15T12:58:51.050000 +CVE-2024-47074,0,1,267a945e17f4a8e8e3ad906b4a73babdb13651aee69ba771912b3792671fd5bd,2024-11-12T19:52:38.023000 CVE-2024-47075,0,0,fc6fb563183ec73ff3cc748ab21f019299b633a8e98bafeae8d21bcd8012663d,2024-09-30T12:46:20.237000 CVE-2024-47076,0,0,82c29f0b96fa3aec0681c5bff18d4d64d621f66fcd11bafc7be54b1c376fa105,2024-09-30T12:46:20.237000 CVE-2024-47077,0,0,da6225ab755733389945bc8204b7e8eb730152eea799320a5a148837369aa9ea,2024-09-30T12:45:57.823000 @@ -263145,28 +263169,28 @@ CVE-2024-47299,0,0,69ddc217eb16e2f207164d9621a98f8efcecc43a8fd19b4abba37eee03e8e CVE-2024-4730,0,0,055c30f8bd03259d264f17e44955582c75615e93d958180e12436700bac392ab,2024-06-12T20:15:13.300000 CVE-2024-47300,0,0,e5260e77ae485ce7444a2bca3985a3a48c649071ed7d73d1439a6a493c414714,2024-10-07T17:47:48.410000 CVE-2024-47301,0,0,ac90c43742dd943ad9767aa191ce247a301b3e33f4d7e439daf4f0d3b09b6647,2024-10-07T17:47:48.410000 -CVE-2024-47302,0,0,68601654804cd386279abcfe312b7a3da5310b899cbeabe8c72587ec15fee3f7,2024-11-01T20:24:53.730000 +CVE-2024-47302,0,1,1215b332e6af413dc1f20a68897518f0ed42618d786aeb87268964950ef0925d,2024-11-12T20:40:46.890000 CVE-2024-47303,0,0,bf8d75e01dd1aa85338666dfdc484b4a62ecc62745a2e39a6913339b9fa92fed,2024-10-02T19:00:24.750000 CVE-2024-47304,0,0,7406b4c650ebd707369265ef4b8f5066b713c8b353b6dde674c1a19490c8893f,2024-10-18T12:52:33.507000 CVE-2024-47305,0,0,7c018d03a71f28200e41a87d693293b1e365b3b52710d7dc9c8bc548afdcc447,2024-10-02T16:35:40.077000 CVE-2024-47306,0,0,eaf32b36bbd3f14919162085488bb2ae7d4855fa0c613850748fc5c60d229a8c,2024-10-07T17:47:48.410000 CVE-2024-47307,0,0,487f26513afaa1868dd378174c9d3f7237a2ae92bed0d1dfde1647ea1d3fe506,2024-10-07T17:47:48.410000 -CVE-2024-47308,0,0,7fa912fe904d28b80557bb11620cf88a92ab3fb60d26da1aad4da68874ac7b92,2024-11-01T20:24:53.730000 +CVE-2024-47308,0,1,70f6acf5986d4c66337fb6628556eaf01de6c748be5fe670de0fe4d1149e24aa,2024-11-12T20:35:53.600000 CVE-2024-47309,0,0,21dcfe3c0636d6932b8735e4db0f75a20433cb361cb491f225d3cc92dcd30979,2024-10-07T17:48:28.117000 CVE-2024-4731,0,0,ff0f4697afac2eb26d16b700c40cb0a3947b6039ec9b762c8c08a8e49bc998ce,2024-06-04T19:20:48.130000 CVE-2024-47310,0,0,8663484ee2c5b72222f0e4f9365fdd142731c8f04d18b42bdd48041cae516b98,2024-10-07T17:47:48.410000 -CVE-2024-47311,0,0,6edea16e58f1d66319cb3fc63bf218fa6561b7f8bd0127eda8f886e232db47ab,2024-11-01T20:24:53.730000 +CVE-2024-47311,0,1,129300d938f1416427c147b1e7e82622cb15b87dbd0f201e37274edba49c34de,2024-11-12T20:35:03.010000 CVE-2024-47312,0,0,21a9fd1102fbd401b51ac00c291ad86e50be8ec9dc455fe13fa5a7d20b8d0b36,2024-10-18T12:52:33.507000 CVE-2024-47313,0,0,bc2ecdde437531f392b35f4f3c15088fd858be1b53245b6e08dfe84901b6ce9a,2024-10-07T17:47:48.410000 -CVE-2024-47314,0,0,4ac6a9af466af4dcd964460471f5c3cd12275f47cae951e74da6e632352349f1,2024-11-01T20:24:53.730000 +CVE-2024-47314,0,1,77806d8f246f384654b9658cb91a6dabd92d4fda77970cfb60aa2066d9d47cd3,2024-11-12T20:34:11.720000 CVE-2024-47315,0,0,f8fc8e04ef461f394697878d14c77fa20555585c6db931561c38f9edd4a9ab5c,2024-09-30T18:06:36.060000 CVE-2024-47316,0,0,4bb4520f5213b3c8bde177c73e6a9c0ba6ad3dd3b6425b0d46c411f50cc87fcb,2024-10-07T17:48:28.117000 -CVE-2024-47317,0,0,dcba996ede8836de97a65fb2f5096e95053eb84a750816c636affd589a3028bc,2024-11-01T20:24:53.730000 -CVE-2024-47318,0,0,5faf119e2cdac99b50b5ef6c13fbc3f976ac60433ba7701d85d2e475fc69d81a,2024-11-01T20:24:53.730000 +CVE-2024-47317,0,1,9de8146c83ea624cd0bcc108b697f2b2aaa7ae780c48011189b9e244eb05f1f2,2024-11-12T20:33:17.257000 +CVE-2024-47318,0,1,7941846dc91fa81247a4a15a2600b010006fa8b7d4abc6eeabc02c8a6c856eaf,2024-11-12T20:32:35.303000 CVE-2024-47319,0,0,ec119580ae92baaeaa77fbe02b724f0292ddb7d31e4363cd49fd4eca14bb6e47,2024-10-07T17:48:28.117000 CVE-2024-4732,0,0,2f9d1622a74bcf5d144d47d69a297d840c0353e903036f272ef15e7560aa5dbf,2024-06-04T19:20:48.237000 CVE-2024-47320,0,0,34657895a2dc740604de3ed70971ec71840d6f541e4b1dab5738b65bfae578d8,2024-10-07T17:47:48.410000 -CVE-2024-47321,0,0,a802fc0151aca378c223559d333005ac13c9b40eed20f659ac68779146b5c386,2024-11-01T20:24:53.730000 +CVE-2024-47321,0,1,a79d0dcca24b12582e8e311ab37ff849bd4d30816ad4d89d46d451d2a7f80daf,2024-11-12T20:29:51.207000 CVE-2024-47322,0,0,8b232be4cdc689515d55262ec30fa58411c26ba1e6f796e82a1afc447dc811dd,2024-10-07T17:47:48.410000 CVE-2024-47323,0,0,9437c7effa68c712270b139ca11dd61e48e93b311d9f840ede69c45aa4843c11,2024-10-07T17:48:28.117000 CVE-2024-47324,0,0,9d0a8be9058b908dcef652c569e8b2141d19736e2ee3f4e8dc4463e949bd1e2a,2024-10-07T17:48:28.117000 @@ -263206,11 +263230,11 @@ CVE-2024-47354,0,0,6134434fa97da25d9165870f5853ccace7086e06da2c04b706195994fa4c1 CVE-2024-47355,0,0,12a7099a9d6cdd27b256bc5c48c3a41afec28615356ab2b2ea1493ea2e2ae12f,2024-10-07T17:47:48.410000 CVE-2024-47356,0,0,ca86bef3a64488bb151757babe27aa9ffdd4ef292d24e939d9d6f108a98fd589,2024-10-07T17:47:48.410000 CVE-2024-47357,0,0,ef34fc816e0519499aa111866aaf198aae04b83f86c74c4b0f6800883576b819,2024-10-07T17:47:48.410000 -CVE-2024-47358,0,0,fb1c0d5431500381806be62467b46d27c49742db04b30578754d9383f65032b4,2024-11-01T20:24:53.730000 -CVE-2024-47359,0,0,395bb3ca2488f71881e174a1ec2d8ff9e7b11f78f741cf7bdd8a30a3b3ff2512,2024-11-01T20:24:53.730000 +CVE-2024-47358,0,1,da61318926c7232b3bbbf45d5003f382f546a4151337d121c6cb098dda743694,2024-11-12T20:28:55.623000 +CVE-2024-47359,0,1,cd512f0a97e70b6f78b04cfe329c80b6a40c284448673aafa8ecb66441889ba3,2024-11-12T20:26:27.230000 CVE-2024-4736,0,0,d66d2cb2e0afad57d9d4fb0dd29db1ae480425b093ff5e46c35972ad67bf1599,2024-06-04T19:20:48.497000 CVE-2024-47360,0,0,1370af71473e797c73fb7a35ee179cd61bb339e10b621d15447efd016876e9dc,2024-10-07T17:47:48.410000 -CVE-2024-47361,0,0,a35554c430fd5881cea143f1982deb8f9726bf40b4f9b226dba8719d6401a16f,2024-11-01T20:24:53.730000 +CVE-2024-47361,0,1,7bfd38fe0e97c8b5314dde75041b058a7d5c9cfc7b2824396cb6ee551429210b,2024-11-12T20:25:04.763000 CVE-2024-47362,0,0,7148f12e08f02f92c2e045d4f1bbb54866ce118ab050ff910f9693d1b2c46836,2024-11-05T21:44:55.657000 CVE-2024-47363,0,0,18825c79d1c9c0244e45a7e0436baf5e08868c270732d6301d9ac1e64471bf85,2024-10-07T17:47:48.410000 CVE-2024-47364,0,0,4910605e0fad6d4d34926b035fe4ababa3ed531d70996b5e931af1da39a2cb00,2024-10-07T17:47:48.410000 @@ -263271,9 +263295,40 @@ CVE-2024-47422,0,0,3bbf36fa36b5c6358f977c905f990252fa8401c1b57d47ffc0ba4a3568977 CVE-2024-47423,0,0,cc7599d4f9aba9030b710df146f3ce8c3737d1537814cfc48d4e8bb94e388ea4,2024-10-18T14:15:01.977000 CVE-2024-47424,0,0,6202b5d48861afda0a9d7468b3fdf2592bb01c4b56758dc4272ede18401ef7d6,2024-10-18T14:15:12.930000 CVE-2024-47425,0,0,e832dc60d6b0a911f7b82219c1b7e7050a04085decdafb9accbb9c4ea24ed63e,2024-10-18T14:13:08.090000 +CVE-2024-47426,1,1,6fc06f14bc1767658c8a0a30a7a38ddc4cacd4bcff1030032918435b1e36e7da,2024-11-12T20:15:08.313000 +CVE-2024-47427,1,1,e649fe8a5c34119a8770aad0a3c546fcad1d82425218422bbccf96ffb187cfc9,2024-11-12T20:15:08.523000 +CVE-2024-47428,1,1,af236e3c49a7053cc0365dbf1cc6bf7bc1b304b3a65574d9473b16e8b6c87034,2024-11-12T20:15:08.720000 +CVE-2024-47429,1,1,39b0cbb7c3cebb13febbda3f3e280b12a158c79855d97dcb19532f8eba5d976f,2024-11-12T20:15:08.930000 CVE-2024-4743,0,0,213080d2ce7e290785906918b766d2dd6153d7beb42f4a36c418fabdb6096c44,2024-06-11T17:32:50.367000 +CVE-2024-47430,1,1,e58bd415f801571e85f6c71dcc5f4c04f3443a96306a204193692d9e09def892,2024-11-12T20:15:09.127000 +CVE-2024-47431,1,1,dc542506fa9a53feaa5448d6ef8d295d317153a4be4c2a45bfc4614480dba7d4,2024-11-12T20:15:09.323000 +CVE-2024-47432,1,1,0b6e24bcefad64a84b2bd9faf0d0b3ff4aa7c94f77998d93593c51e35f037ad2,2024-11-12T20:15:09.523000 +CVE-2024-47433,1,1,cf5a986dbfdd292b92372a6cabf2c727ed50cd66521dfe90d0f3f6bf639795f3,2024-11-12T20:15:09.720000 +CVE-2024-47434,1,1,7983142b2dc766913cde94d086c889460105267dfcc4e9ba8d2b42c565b949d3,2024-11-12T20:15:09.920000 +CVE-2024-47435,1,1,bb89e395a2cdd5d46345f8cd4a3900b4b772136691d726e9d1807c0e623bcade,2024-11-12T20:15:10.117000 +CVE-2024-47436,1,1,bb7515657d9b879d3fdfd7911c21db20c51d450bfd2b2e14ffae52208213208c,2024-11-12T20:15:10.317000 +CVE-2024-47437,1,1,49cf6a91de408de97b966ab80dfd7aefddffb9fa1434a4b4620ae59b23161f57,2024-11-12T20:15:10.513000 +CVE-2024-47438,1,1,41cafa70cd01c5d9cd4ecc9cda26ba413d29aac344ee696e027a4901fa5a422d,2024-11-12T20:15:10.720000 +CVE-2024-47439,1,1,b4a0d7a6dcf1a7c45ed93eb71beb7b95d1f2a1d03d0f5f2a83ffa21eb4613b01,2024-11-12T20:15:10.933000 CVE-2024-4744,0,0,f2a62275342fb4e02e31ad60fb7b37b3a8ac2b2376213a1fba752ece8166ef2e,2024-06-12T16:44:12.157000 +CVE-2024-47440,1,1,591e81e4dd42bc256dcf6ee413977864ab8c46dcad6e130916e835859638d75f,2024-11-12T20:15:11.140000 +CVE-2024-47441,1,1,adc6ca5cf1d07c5934a89cee552c58353eac4d08f587915178bdd99925acae1d,2024-11-12T19:15:13.310000 +CVE-2024-47442,1,1,f8369480bb0af7601ab3b36855faa3ad074579af0f0a5deee6e56d895135da18,2024-11-12T19:15:13.517000 +CVE-2024-47443,1,1,c2b2a8a2a8a45310b242a564f5d632473b09f52f097d46420f426d625cd9a2b5,2024-11-12T19:15:13.730000 +CVE-2024-47444,1,1,b117c8b9a57c0e1e9898bef8024d127211a88c98b6d80654ae37fcd1af3cec28,2024-11-12T19:15:13.947000 +CVE-2024-47445,1,1,db10f0d23eefcf3670cee69508f18984d73a21a467f998770cdc413646081175,2024-11-12T19:15:14.157000 +CVE-2024-47446,1,1,70490e17278cdb1ee44ed48345de3212786c3458967efc527fe1f6b94b727d9e,2024-11-12T19:15:14.377000 +CVE-2024-47449,1,1,aa3e9e3f065b565415ca55ccbbf1c5a10149fab79b3e524b143a764263296d34,2024-11-12T19:15:14.597000 CVE-2024-4745,0,0,54a19ac018881ab94cc09206a38557755449249c459a354d473ddea48bafd7eb,2024-06-12T16:23:34.197000 +CVE-2024-47450,1,1,f5a0fe61283c0edd478a43ec1d5a5b1303a93814fceb6764f27124ef3c0585bc,2024-11-12T19:15:14.823000 +CVE-2024-47451,1,1,23be5e8afe5211672fa4a375c22e5ce9615f8a5054adeb0e504b29662ff0e1ca,2024-11-12T19:15:15.037000 +CVE-2024-47452,1,1,6d9ef389a064b858e86273d33bdb1662f7f33cb408c66e14e3250d31b6bf7496,2024-11-12T19:15:15.240000 +CVE-2024-47453,1,1,e764173414d188bcf68034e1b40a02e17d4db82fb8c37a9ec52149af42d89fde,2024-11-12T19:15:15.443000 +CVE-2024-47454,1,1,6102a1a92a4756a4e2c5b66483ef31e252ad464b546652330cd1419a82250bc0,2024-11-12T19:15:15.647000 +CVE-2024-47455,1,1,70689a810867149f83adda827f8b95315984dfde6a7622a7f6eabb079e2051b1,2024-11-12T19:15:15.853000 +CVE-2024-47456,1,1,e274c297ec24ddc70b84c74607f088d66e2aed11899c346d3ff90f7416429d88,2024-11-12T19:15:16.060000 +CVE-2024-47457,1,1,81522668c88e07bfafd355133039f8b862fcfb219505872bc1a54dd9ffb7384a,2024-11-12T19:15:16.263000 +CVE-2024-47458,1,1,4f994625aa82c2bf536235ada25dc5dadd862b4d48702781e1807471325bb3f2,2024-11-12T19:15:16.480000 CVE-2024-47459,0,0,dc476e38be60b6a1efda7726261f4c9f051d293bb6f4f7193aea3c1108a67e3c,2024-10-23T14:17:23.557000 CVE-2024-4746,0,0,764da2d2faf52d5d8b005efc01764a8e4bfb42f0a65f0b328618a43b312322fb,2024-06-12T16:17:42.223000 CVE-2024-47460,0,0,946f764f812f97a57e8d995c98f9d8feee9df1e1204facd7e314537096c19b1b,2024-11-06T18:17:17.287000 @@ -263382,7 +263437,7 @@ CVE-2024-47632,0,0,86e12c89344fd18c9940736a7e6a5db1287861f4d951d9a231cba9485bf7a CVE-2024-47633,0,0,7b59299b7ab0b71990c59d871565371c288abbd036b35f6cb6499efd86c70120,2024-10-07T17:47:48.410000 CVE-2024-47634,0,0,0db14a24577ad4cd4c39f4bd8ffd8db1b7fe5abb8b811c8dc32585acbe7b55c5,2024-10-22T18:46:02.253000 CVE-2024-47635,0,0,f0938227f4d08edb6147f27db4a3110fa41d32874c7b3f4eb3d409a9071f6c87,2024-10-07T17:47:48.410000 -CVE-2024-47636,0,0,a3c5fd8a893af234192301cc917defd8faccc1c54a6bcbd7ad791f7393b694ca,2024-10-30T14:32:17.523000 +CVE-2024-47636,0,1,6ffc2e68f1d46a2aab397cb0c05b425fde49352f9b31c9a8dba1050437a5f555,2024-11-12T20:52:49.130000 CVE-2024-47637,0,0,e4b543420eae93f2afe4e99f554aa703bb23d396109484c61c62fa5d0986af60,2024-10-16T16:38:14.557000 CVE-2024-47638,0,0,f0c22183891875150f00de26c51ae04bc878b43d7b02fc8f2c1801fe764630f5,2024-10-07T17:47:48.410000 CVE-2024-47639,0,0,4ec7325cbe24ae0ca33ddb45827142885ef58b3113bb6ddb4d5e479f788b21cb,2024-10-07T17:47:48.410000 @@ -263529,7 +263584,7 @@ CVE-2024-4777,0,0,96d0d896ebb105a32ed437e794c8fc4ba926ad921436ba17bdb49a1a49737b CVE-2024-47771,0,0,c2cc2e4162d5c6e4f811bab9afb437dc72be4e038984be37caa0528862aa918c,2024-10-16T16:38:43.170000 CVE-2024-47772,0,0,93ca3579d4342831fe2d471a4caadcb35a70b0d6469fc266411c3792b3d90e0a,2024-10-19T00:58:21.947000 CVE-2024-47773,0,0,9ec3c242835bf576bc0968a82a3b46699041f8e41d118ea66f5704cf28b5d58f,2024-10-10T12:56:30.817000 -CVE-2024-47779,0,1,5f35e8aa4452b188a7ed79805178dc2710160d52596e1c24b8778a31542e007a,2024-11-12T17:15:08.037000 +CVE-2024-47779,0,0,5f35e8aa4452b188a7ed79805178dc2710160d52596e1c24b8778a31542e007a,2024-11-12T17:15:08.037000 CVE-2024-4778,0,0,e3020a287fa6ceae8ff9c78434f10af4d17cf4058dd5bf80208c921b6bc68bef,2024-07-03T02:08:09.053000 CVE-2024-47780,0,0,ff94d6824af803f8c7126d802f9a510e2f7e61826db064781dbb229b5b3ef329,2024-10-10T12:56:30.817000 CVE-2024-47781,0,0,942905ddf0e252a3fb77e10ba3da26f7a3985ae743d3e1737c070a7332d5f79d,2024-10-10T12:57:21.987000 @@ -263568,7 +263623,7 @@ CVE-2024-47826,0,0,227f5de2bbfb082dccecbb42efbc7003b1edab4fa7b7573bd2f95a3320505 CVE-2024-47827,0,0,ecc916f5d4aa49e00574b51201e7140af48e7555de60eae2b6bb64bb43bee3fd,2024-11-05T16:50:27.330000 CVE-2024-47828,0,0,a6b81ff1073f19581e05e8c790863d706cba88272fb227df996495bf444dca26,2024-10-17T13:55:23.577000 CVE-2024-4783,0,0,413c0436e6758a988a0c847533b21e34b17a9d936626eba8cda1a5d1f87e0181,2024-05-24T01:15:30.977000 -CVE-2024-47830,0,0,0a3e7634a8f6db5c685ec1dd760fec41a52917e4b5692587972274bc64e8a754,2024-10-15T12:58:51.050000 +CVE-2024-47830,0,1,c1622105d2fe8958ad0d54c3abfdd85114b1d770066042ed713daf76c515d574,2024-11-12T19:55:58.010000 CVE-2024-47831,0,0,3f99b5fb6f2a0f82d4c4aa41364a72b96237a6105ba799e35540a2ef86af0ccc,2024-11-08T15:39:21.823000 CVE-2024-47832,0,0,6eaf4cba1d0f1ac09d634a837b942c4a4d31fbca5ff514618ce9cde402d23db0,2024-10-10T12:51:56.987000 CVE-2024-47833,0,0,6fec3debcf8c22e7cca5edd580a7219cef06b49b718a5106f83d6e8ff52a9663,2024-10-16T16:33:34.493000 @@ -263798,7 +263853,7 @@ CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc33808 CVE-2024-48307,0,0,935ee3e0328307bbb03111416c4595c4eff3ac408a08578a24f622dddb9d0c64,2024-11-01T12:57:03.417000 CVE-2024-48311,0,0,354d288e073d9064d21602cf2204c79fdbedf6cf54999e8a50b7d788e057c63f,2024-11-01T12:57:03.417000 CVE-2024-48312,0,0,ed565171c6e4291e871155bd5278a308c07670573cfb5e604423e67b93f19726,2024-11-06T18:17:17.287000 -CVE-2024-48322,0,1,5014dc4df55f26b1dca9f29be8de14165ec82c00bf9c57fe11ac1db7b65d8ee8,2024-11-12T17:35:10.953000 +CVE-2024-48322,0,0,5014dc4df55f26b1dca9f29be8de14165ec82c00bf9c57fe11ac1db7b65d8ee8,2024-11-12T17:35:10.953000 CVE-2024-48325,0,0,e332aafd0b1c5c187131f74a886273143993554010ab80fd42869ff8b361baa6,2024-11-08T19:01:25.633000 CVE-2024-48336,0,0,fc603531e511f454d9e88137c47d1879fc0b1949207c95b33f03f4156054a935,2024-11-04T20:35:10.193000 CVE-2024-48342,0,0,cab27a7526b8debabab042631051135b3c12f9f8dc84e657f2f251a3750f9436,2024-11-04T07:15:11.437000 @@ -264033,59 +264088,60 @@ CVE-2024-4897,0,0,b80483aa02f533d1f5c4695afa1f7ec5dae4ecfa8b472cf561efa5d05f8ff1 CVE-2024-4898,0,0,a64ada88476e7dbd5dca1f8ed9406bed15a3acb87fadbe7d9a4f3102502b7a67,2024-07-23T17:50:44.033000 CVE-2024-48987,0,0,bb1285db59c3075341f96aec62f9b4ce4709041d90082c7f3534792a4d32fb84,2024-10-15T12:58:51.050000 CVE-2024-4899,0,0,7d0ca1543842829897b22c32fd7c3ea389ea1c85b28761d045bc30da0b354462,2024-07-03T02:08:16.280000 -CVE-2024-48993,1,1,4aa3474fb9be5265fd715e9087c0fb8d42da2cadb7c5e0de118eac24d9462c1b,2024-11-12T18:15:35.840000 -CVE-2024-48994,1,1,552421b92673fa07495920552477c16d668d05f05bf83bc63d1f3ef090be75c8,2024-11-12T18:15:36.117000 -CVE-2024-48995,1,1,653f6e396fa20d6dabdcf9bb90eb50e56dfacf4fef02ff1047984567e5060b43,2024-11-12T18:15:36.360000 -CVE-2024-48996,1,1,4ec76bdd6dfc64511a23331244301c0b48a3317df18e4113c55f9324ff6b7f6a,2024-11-12T18:15:36.637000 -CVE-2024-48997,1,1,0d7eba61679db9a577258cdabc3a0ee9e706e499ab5d5e219cbb9495b214f0b1,2024-11-12T18:15:36.870000 -CVE-2024-48998,1,1,89380a7df552e91c4963a30424b195f41861837559e3274f22d4ed9470e5299a,2024-11-12T18:15:37.110000 -CVE-2024-48999,1,1,b43e594557d3fb7da0f94c18d9f035ab327604c2039b3a6d71defd41e731e8a4,2024-11-12T18:15:37.340000 +CVE-2024-48993,0,0,4aa3474fb9be5265fd715e9087c0fb8d42da2cadb7c5e0de118eac24d9462c1b,2024-11-12T18:15:35.840000 +CVE-2024-48994,0,0,552421b92673fa07495920552477c16d668d05f05bf83bc63d1f3ef090be75c8,2024-11-12T18:15:36.117000 +CVE-2024-48995,0,0,653f6e396fa20d6dabdcf9bb90eb50e56dfacf4fef02ff1047984567e5060b43,2024-11-12T18:15:36.360000 +CVE-2024-48996,0,0,4ec76bdd6dfc64511a23331244301c0b48a3317df18e4113c55f9324ff6b7f6a,2024-11-12T18:15:36.637000 +CVE-2024-48997,0,0,0d7eba61679db9a577258cdabc3a0ee9e706e499ab5d5e219cbb9495b214f0b1,2024-11-12T18:15:36.870000 +CVE-2024-48998,0,0,89380a7df552e91c4963a30424b195f41861837559e3274f22d4ed9470e5299a,2024-11-12T18:15:37.110000 +CVE-2024-48999,0,0,b43e594557d3fb7da0f94c18d9f035ab327604c2039b3a6d71defd41e731e8a4,2024-11-12T18:15:37.340000 CVE-2024-4900,0,0,2074e15c0050e8989f750822fa85e67702dc13ece861470c246a4c4acb047889,2024-06-24T12:57:36.513000 -CVE-2024-49000,1,1,60f748b10decd71d30d54f7b79d3830017b1cace1043996f2b013d9a711e017f,2024-11-12T18:15:37.577000 -CVE-2024-49001,1,1,85bce25075340bab1720e8aa9bec179d87b1c940dbbc87243a52531071c69eb5,2024-11-12T18:15:37.807000 -CVE-2024-49002,1,1,06c23743160dae54eeb5ec3a2b981759c8dd403bbeeca2433c7393399a2ee4e3,2024-11-12T18:15:38.040000 -CVE-2024-49003,1,1,814584cf889f73888d9707f7a3b40ba45ec00bcbec725f00774d715b23fa52a8,2024-11-12T18:15:38.257000 -CVE-2024-49004,1,1,6835419d010b1bf3bd4b4fab335fb9d501797ee94978e958b6810022fa9e6481,2024-11-12T18:15:38.500000 -CVE-2024-49005,1,1,150da98046359373514b30f3b75524045a7f42d8bdcb2db080c2ccd69995f9ba,2024-11-12T18:15:38.740000 -CVE-2024-49006,1,1,1fbc3e76f663287d4b6f83ed6af0c40aa4fc3cd89f3700eaad35d71a60ed7f13,2024-11-12T18:15:38.963000 -CVE-2024-49007,1,1,a948e38f3656824d5e76054d5b28a449633195ab7c3d217d5532c34c0372cc9b,2024-11-12T18:15:39.203000 -CVE-2024-49008,1,1,df30a0699d80d1c513cbbfe380c65e5791a2edff9f5a494966ace72aac28c9ca,2024-11-12T18:15:39.423000 -CVE-2024-49009,1,1,ee65240657ccb84cf8418a6fbc2faa681e13085fea3545634d764108e1c236f3,2024-11-12T18:15:39.650000 +CVE-2024-49000,0,0,60f748b10decd71d30d54f7b79d3830017b1cace1043996f2b013d9a711e017f,2024-11-12T18:15:37.577000 +CVE-2024-49001,0,0,85bce25075340bab1720e8aa9bec179d87b1c940dbbc87243a52531071c69eb5,2024-11-12T18:15:37.807000 +CVE-2024-49002,0,0,06c23743160dae54eeb5ec3a2b981759c8dd403bbeeca2433c7393399a2ee4e3,2024-11-12T18:15:38.040000 +CVE-2024-49003,0,0,814584cf889f73888d9707f7a3b40ba45ec00bcbec725f00774d715b23fa52a8,2024-11-12T18:15:38.257000 +CVE-2024-49004,0,0,6835419d010b1bf3bd4b4fab335fb9d501797ee94978e958b6810022fa9e6481,2024-11-12T18:15:38.500000 +CVE-2024-49005,0,0,150da98046359373514b30f3b75524045a7f42d8bdcb2db080c2ccd69995f9ba,2024-11-12T18:15:38.740000 +CVE-2024-49006,0,0,1fbc3e76f663287d4b6f83ed6af0c40aa4fc3cd89f3700eaad35d71a60ed7f13,2024-11-12T18:15:38.963000 +CVE-2024-49007,0,0,a948e38f3656824d5e76054d5b28a449633195ab7c3d217d5532c34c0372cc9b,2024-11-12T18:15:39.203000 +CVE-2024-49008,0,0,df30a0699d80d1c513cbbfe380c65e5791a2edff9f5a494966ace72aac28c9ca,2024-11-12T18:15:39.423000 +CVE-2024-49009,0,0,ee65240657ccb84cf8418a6fbc2faa681e13085fea3545634d764108e1c236f3,2024-11-12T18:15:39.650000 CVE-2024-4901,0,0,038977315c18c98069a655ab35eb2b501ae92d62e5deb196337fd2891dd989fe,2024-06-28T13:18:19.407000 -CVE-2024-49010,1,1,3dab60e769a9f644e35c93b4a004707359378bf9513ba186e54033bea6f71f61,2024-11-12T18:15:39.870000 -CVE-2024-49011,1,1,5ba8a2882f8f24407a62b041576f38a0f350979bc69588225c89c56ddab32e75,2024-11-12T18:15:40.087000 -CVE-2024-49012,1,1,838a9a4c10874935f79466ffabb516d97b5d11a2bdaa8b67f1068f3434089049,2024-11-12T18:15:40.307000 -CVE-2024-49013,1,1,6ef0bbc7aa928e1a6a08ee1075bd6a883f85d2be9c4bbd497786ce867cdbecd8,2024-11-12T18:15:40.530000 -CVE-2024-49014,1,1,43dc904e9156da2390b269c474ec4b93c168be252c4571e6535135e7b18e459e,2024-11-12T18:15:40.737000 -CVE-2024-49015,1,1,86ee6a5bcc07a85ec567923b7eeeeaf2439547c7e192b8db4d6ab2030e6af3e4,2024-11-12T18:15:40.953000 -CVE-2024-49016,1,1,16214ec6bb7fe4aa2ade3e55455e98d18465e0b421d6069624afe3a208832445,2024-11-12T18:15:41.177000 -CVE-2024-49017,1,1,dcb9cbeed4f1a551674fcdc7d73ce07143b7fede04b17051094ff809cc2472c3,2024-11-12T18:15:41.407000 -CVE-2024-49018,1,1,4a24e8cc7cde3239de7d5468b3f264730bfbc184f075b9071aab26fd77ea9c85,2024-11-12T18:15:41.637000 -CVE-2024-49019,1,1,cee470b1ab6bd4a64376470650617561a54547a9eccb11a3dac588f87e24fcff,2024-11-12T18:15:41.863000 +CVE-2024-49010,0,0,3dab60e769a9f644e35c93b4a004707359378bf9513ba186e54033bea6f71f61,2024-11-12T18:15:39.870000 +CVE-2024-49011,0,0,5ba8a2882f8f24407a62b041576f38a0f350979bc69588225c89c56ddab32e75,2024-11-12T18:15:40.087000 +CVE-2024-49012,0,0,838a9a4c10874935f79466ffabb516d97b5d11a2bdaa8b67f1068f3434089049,2024-11-12T18:15:40.307000 +CVE-2024-49013,0,0,6ef0bbc7aa928e1a6a08ee1075bd6a883f85d2be9c4bbd497786ce867cdbecd8,2024-11-12T18:15:40.530000 +CVE-2024-49014,0,0,43dc904e9156da2390b269c474ec4b93c168be252c4571e6535135e7b18e459e,2024-11-12T18:15:40.737000 +CVE-2024-49015,0,0,86ee6a5bcc07a85ec567923b7eeeeaf2439547c7e192b8db4d6ab2030e6af3e4,2024-11-12T18:15:40.953000 +CVE-2024-49016,0,0,16214ec6bb7fe4aa2ade3e55455e98d18465e0b421d6069624afe3a208832445,2024-11-12T18:15:41.177000 +CVE-2024-49017,0,0,dcb9cbeed4f1a551674fcdc7d73ce07143b7fede04b17051094ff809cc2472c3,2024-11-12T18:15:41.407000 +CVE-2024-49018,0,0,4a24e8cc7cde3239de7d5468b3f264730bfbc184f075b9071aab26fd77ea9c85,2024-11-12T18:15:41.637000 +CVE-2024-49019,0,0,cee470b1ab6bd4a64376470650617561a54547a9eccb11a3dac588f87e24fcff,2024-11-12T18:15:41.863000 CVE-2024-4902,0,0,41bb791734595d42fd1c69ded99c61dc232bf3972633339d010380dd468a9fb6,2024-10-29T18:07:23.897000 -CVE-2024-49021,1,1,a066c3ba4969c320f3aa5ec139d951df96eac307afe8afdc1475b4aa03f96552,2024-11-12T18:15:42.100000 +CVE-2024-49021,0,0,a066c3ba4969c320f3aa5ec139d951df96eac307afe8afdc1475b4aa03f96552,2024-11-12T18:15:42.100000 CVE-2024-49023,0,0,af47ee9dc5b34537abe1e2a50e9a1a6dd7bec2ff89d9910cf199b8b7e8fc3c1a,2024-10-18T17:01:32.803000 -CVE-2024-49026,1,1,1651dbbb13962c4d9c55558a2ad9b67dd4fb1094d8891ffe03f694b688ae4e70,2024-11-12T18:15:42.357000 -CVE-2024-49027,1,1,983cbf68b040e30c362cfd5eccc66679f6adb9f011501133103faa1c18d90d98,2024-11-12T18:15:42.590000 -CVE-2024-49028,1,1,014642fed3b67124bbaf0a16bffcc8291badb91217450981b4aa6d593607edf7,2024-11-12T18:15:42.810000 -CVE-2024-49029,1,1,eaf292e8fe053720568f3d201a1924255818066402ef01790720e28e9a8acbd3,2024-11-12T18:15:43.017000 +CVE-2024-49026,0,0,1651dbbb13962c4d9c55558a2ad9b67dd4fb1094d8891ffe03f694b688ae4e70,2024-11-12T18:15:42.357000 +CVE-2024-49027,0,0,983cbf68b040e30c362cfd5eccc66679f6adb9f011501133103faa1c18d90d98,2024-11-12T18:15:42.590000 +CVE-2024-49028,0,0,014642fed3b67124bbaf0a16bffcc8291badb91217450981b4aa6d593607edf7,2024-11-12T18:15:42.810000 +CVE-2024-49029,0,0,eaf292e8fe053720568f3d201a1924255818066402ef01790720e28e9a8acbd3,2024-11-12T18:15:43.017000 CVE-2024-4903,0,0,9834633a0ed5c23d729720f750c23f97a9d35acd2a8ef750805e2c39c4f8bfe7,2024-06-07T20:15:11.967000 -CVE-2024-49030,1,1,a771b57b99a22d1a23bb3eb48aac03817808b18f2b135636ab2f6178056ba314,2024-11-12T18:15:43.260000 -CVE-2024-49031,1,1,4d19c8a975caa24e6b9da7542a9780cbb167fa0186406d2762380989d57ff550,2024-11-12T18:15:43.483000 -CVE-2024-49032,1,1,bee7c4c9b814c413805fa15e83f6e73bf7788b208af3fa41e1d1d2dc00139626,2024-11-12T18:15:43.737000 -CVE-2024-49033,1,1,0ba4d0e17dce154819dd20cf81db8b1f1924b2e20b0e94b205f98469cd600002,2024-11-12T18:15:43.950000 -CVE-2024-49039,1,1,d2e1e0ebe6ada843cc40e1e7d15e746ad3fe4eae3d601db11112a7c883d7d711,2024-11-12T18:15:44.160000 +CVE-2024-49030,0,0,a771b57b99a22d1a23bb3eb48aac03817808b18f2b135636ab2f6178056ba314,2024-11-12T18:15:43.260000 +CVE-2024-49031,0,0,4d19c8a975caa24e6b9da7542a9780cbb167fa0186406d2762380989d57ff550,2024-11-12T18:15:43.483000 +CVE-2024-49032,0,0,bee7c4c9b814c413805fa15e83f6e73bf7788b208af3fa41e1d1d2dc00139626,2024-11-12T18:15:43.737000 +CVE-2024-49033,0,0,0ba4d0e17dce154819dd20cf81db8b1f1924b2e20b0e94b205f98469cd600002,2024-11-12T18:15:43.950000 +CVE-2024-49039,0,0,d2e1e0ebe6ada843cc40e1e7d15e746ad3fe4eae3d601db11112a7c883d7d711,2024-11-12T18:15:44.160000 CVE-2024-4904,0,0,e08155723dc24ff1bcb5adf9d2f839d33f4e022ac557667a35564764380e5202,2024-06-04T19:20:52.380000 -CVE-2024-49040,1,1,dec61fae24fb566a69ad68ad2aaa7a5a6789b873a1b8bef8517c5dbdbb51d507,2024-11-12T18:15:44.410000 -CVE-2024-49043,1,1,32929d48a7e0b95b4e01f89996060723a654c3b651a61ae467ec5aff07482c9f,2024-11-12T18:15:44.637000 -CVE-2024-49044,1,1,b77357c2a07ac0180bab063805a6c9c3970741c08e0232d72872ae2ed3f2afa8,2024-11-12T18:15:44.867000 -CVE-2024-49046,1,1,03e0514c649fd6a24dab2859fd6c7092da43daa6c90daf283dec52ddc8d1ffce,2024-11-12T18:15:45.100000 -CVE-2024-49048,1,1,2a5d63efeebb6bcea92423e855e3404c0b055ec0291d36b753d6b7d1fa3dba89,2024-11-12T18:15:45.353000 -CVE-2024-49049,1,1,0bd83fee3a2cb4b027aa8356f5562a63ef444b7c78b8bce694d0ad5fb18d6ec7,2024-11-12T18:15:45.587000 +CVE-2024-49040,0,0,dec61fae24fb566a69ad68ad2aaa7a5a6789b873a1b8bef8517c5dbdbb51d507,2024-11-12T18:15:44.410000 +CVE-2024-49042,1,1,766092d03f8cba2ef5721d29deebd9fea15d7d2b32427df25645d5df3f1c9f9b,2024-11-12T19:15:17.507000 +CVE-2024-49043,0,0,32929d48a7e0b95b4e01f89996060723a654c3b651a61ae467ec5aff07482c9f,2024-11-12T18:15:44.637000 +CVE-2024-49044,0,0,b77357c2a07ac0180bab063805a6c9c3970741c08e0232d72872ae2ed3f2afa8,2024-11-12T18:15:44.867000 +CVE-2024-49046,0,0,03e0514c649fd6a24dab2859fd6c7092da43daa6c90daf283dec52ddc8d1ffce,2024-11-12T18:15:45.100000 +CVE-2024-49048,0,0,2a5d63efeebb6bcea92423e855e3404c0b055ec0291d36b753d6b7d1fa3dba89,2024-11-12T18:15:45.353000 +CVE-2024-49049,0,0,0bd83fee3a2cb4b027aa8356f5562a63ef444b7c78b8bce694d0ad5fb18d6ec7,2024-11-12T18:15:45.587000 CVE-2024-4905,0,0,acf7154e104fe12ce44ad2e90ccc9d1c19899bcc28d8f8bfc61002cc40187062,2024-06-04T19:20:52.480000 -CVE-2024-49050,1,1,7ad647f6e89650bc52dc3df1190408951223db456bd7cea1bb3006c1fadb459d,2024-11-12T18:15:45.810000 -CVE-2024-49051,1,1,62ba82fa8287d5ee244fbcfd7893487223083a64bcb9ff1c85b45252c604a537,2024-11-12T18:15:46.037000 -CVE-2024-49056,1,1,00997cecb947dc90cb5357beb05ac805b0b12cfb601822ca6a85f635ee238a54,2024-11-12T18:15:46.273000 +CVE-2024-49050,0,0,7ad647f6e89650bc52dc3df1190408951223db456bd7cea1bb3006c1fadb459d,2024-11-12T18:15:45.810000 +CVE-2024-49051,0,0,62ba82fa8287d5ee244fbcfd7893487223083a64bcb9ff1c85b45252c604a537,2024-11-12T18:15:46.037000 +CVE-2024-49056,0,0,00997cecb947dc90cb5357beb05ac805b0b12cfb601822ca6a85f635ee238a54,2024-11-12T18:15:46.273000 CVE-2024-4906,0,0,dcabb97348a8cb55b860a9e76b2d4e839fce25f207d8f1f73aadb53eff678110,2024-06-04T19:20:52.587000 CVE-2024-4907,0,0,89cf000cbe1b65b5529bee88595d69713864cb4ca68c5cee750a10d4257b63ad,2024-06-07T20:15:12.077000 CVE-2024-4908,0,0,3762060553f2912238245a2ee2164293eb895a92d4f73c18aef2dad30449d1a2,2024-06-04T19:20:52.687000 @@ -264245,7 +264301,7 @@ CVE-2024-49361,0,0,f551e9abf09d421b2a081416ae11d1d19a91d21656c86d2519f1c7f0e2810 CVE-2024-49366,0,0,1ea5441e3f8684e26cb3e2ee03927aa37cfc22f8ddf1688cacc08e4a6c38e9c1,2024-11-07T15:15:04.587000 CVE-2024-49367,0,0,a00a7c814532ad3abb0f836142856607dc752da167ff2cb313965be7a6e5269e,2024-11-07T14:57:17.393000 CVE-2024-49368,0,0,8be4e296ee1ec30084981da91255270e2fb2a840014ea77ee3103f7dcd091363,2024-11-06T18:28:54.440000 -CVE-2024-49369,1,1,9e26291cd584e06158ca310cfdd788844b4d39482aaebbb0e1389563be2688fe,2024-11-12T17:15:08.250000 +CVE-2024-49369,0,0,9e26291cd584e06158ca310cfdd788844b4d39482aaebbb0e1389563be2688fe,2024-11-12T17:15:08.250000 CVE-2024-49370,0,0,a5cd1a59d8359f30b64653ed20bc47230e4ab479f61eed26e21f9e51248ce0d7,2024-11-06T22:31:30.160000 CVE-2024-49373,0,0,4aa9cfdbe744fd3ae046ca1eeb4ecc11fd5a7b167271bdbcafbe01dffbbbe75a,2024-10-30T21:16:59.213000 CVE-2024-49376,0,0,190dbce5bcb7aada06f0c8b342eac2772846cf5d2a5dcc8eecc468a0b9c5d5e3,2024-10-28T13:58:09.230000 @@ -264293,14 +264349,21 @@ CVE-2024-4948,0,0,b89edbe3d3547ee2159af9ec22fd67b98f6c6885f88dc0c929a5ea68a98b8f CVE-2024-4949,0,0,5c7ef1902f4beea866d1c7d9373440674707dc0a06c9e278c0f4652ccc170adc,2024-07-03T02:08:21.370000 CVE-2024-4950,0,0,e5fcb740f07c681c8eb3b4901aae32c365007c0ebdd7c7b0ee473dbffae68af1,2024-07-03T02:08:22.150000 CVE-2024-49501,0,0,b68f4d3131dd45c8240c685b13eebbf7042a3a95ee975ccc7d0b4e65e2269371,2024-11-01T12:57:03.417000 -CVE-2024-49514,1,1,fe3cd61e6edb3a955f917fd1f98aedf45300f5ff0f3fe7aa55d6e408449890a9,2024-11-12T17:15:08.490000 -CVE-2024-49521,1,1,7e8e66f083bd756531bba6a14d7aad9b1d63ed72dfc4381deebc9aec9cd79d4e,2024-11-12T17:15:08.783000 +CVE-2024-49514,0,0,fe3cd61e6edb3a955f917fd1f98aedf45300f5ff0f3fe7aa55d6e408449890a9,2024-11-12T17:15:08.490000 +CVE-2024-49515,1,1,27c21978bf10137639223bfaafa4cf0bb6d6e976ff58d0cb59f5dfae4ee54f48,2024-11-12T20:15:12.477000 +CVE-2024-49516,1,1,96743e8aed30fc3ac77948f70b43805d534cf3c48725ab1d46a145228fcd3d71,2024-11-12T20:15:12.680000 +CVE-2024-49517,1,1,15497d575652987481b84a050cf8dda2057dac37d9cab8480c0038488c0daf7e,2024-11-12T20:15:12.877000 +CVE-2024-49518,1,1,ee84377243e3183fda6c97a5b61c52796040c8a262ed6dab45900df0a1b9b45a,2024-11-12T20:15:13.087000 +CVE-2024-49519,1,1,1f16f5c0cc8b3dfa11817d9be2e4f2ab41cfcc3887bea16590605557d690eaab,2024-11-12T20:15:13.297000 +CVE-2024-49520,1,1,633c50a6573ca1c6b223dd62ce7d447144d4a3e368d032d83668a22bd0cce099,2024-11-12T20:15:13.497000 +CVE-2024-49521,0,0,7e8e66f083bd756531bba6a14d7aad9b1d63ed72dfc4381deebc9aec9cd79d4e,2024-11-12T17:15:08.783000 CVE-2024-49522,0,0,b49aefd5a73ccd26563c8b91d3f2d98c089948509c56be654cf3171337fc2496,2024-11-08T18:06:01.930000 CVE-2024-49523,0,0,f80724f56253226f78ea56271ee80d62b3ba148e1878999be1900b25d2719668,2024-11-08T19:01:03.880000 CVE-2024-49524,0,0,e7793eab2fff9b59c976da4b69592a395e034319e6c39d07f8b75673444fce47,2024-11-08T19:01:03.880000 -CVE-2024-49526,1,1,051e7f12fb7ac4367f11e983ab3f961f563e63bf5e90a5f3139fe918f907e26c,2024-11-12T17:15:09.020000 -CVE-2024-49527,1,1,7970df5db528123d9e02fe0b1537fc193026570b6d54e63f7e3ca88303f92c4b,2024-11-12T17:15:09.240000 -CVE-2024-49528,1,1,c765fb8951c4f632df5c650432cd82aa37c54cfcfd972e9020621dc7157abc06,2024-11-12T17:15:09.453000 +CVE-2024-49525,1,1,572c1766b343bce8cbedd1c3603fbb97f99132da6d919ffa0017db295227dd1e,2024-11-12T20:15:13.690000 +CVE-2024-49526,0,0,051e7f12fb7ac4367f11e983ab3f961f563e63bf5e90a5f3139fe918f907e26c,2024-11-12T17:15:09.020000 +CVE-2024-49527,0,0,7970df5db528123d9e02fe0b1537fc193026570b6d54e63f7e3ca88303f92c4b,2024-11-12T17:15:09.240000 +CVE-2024-49528,0,0,c765fb8951c4f632df5c650432cd82aa37c54cfcfd972e9020621dc7157abc06,2024-11-12T17:15:09.453000 CVE-2024-49557,0,0,2a5d766ad2ace9ca4473e381728b5667e6cadd8340da6faf7936ed125bc7364d,2024-11-12T13:55:21.227000 CVE-2024-49558,0,0,47432e1f54f695adb17b8dc00f9577022f45f8f0ba5da018a951249b00715362,2024-11-12T13:55:21.227000 CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000 @@ -264694,7 +264757,7 @@ CVE-2024-50091,0,0,82381c2b9504f7dc7c838a67c6e3fb93acdf98ec96453d78bb976e75e873c CVE-2024-50092,0,0,1bae9326eae1f879c38112725312fe16a36edc58131a09667f9f496857ede197,2024-11-06T18:17:17.287000 CVE-2024-50093,0,0,419eb8dddfe2833bb713253843fa8eb7e9c480ddcfa4547a406e999eb86f6dab,2024-11-08T16:49:33.143000 CVE-2024-50094,0,0,8d554d91d10f3417f68354112f98d683c81490048baf5a5ec9ac8bffadb7c106,2024-11-06T18:17:17.287000 -CVE-2024-50095,0,0,7be15323a65def7978ea05e4974ba938ad3e79e6f92c2da07d665bf4a6736f61,2024-11-06T18:17:17.287000 +CVE-2024-50095,0,1,fd636b3b56962a9ecbdb56a7384affb2f3f67b3cc674dbdb9ebae41490b8ebe2,2024-11-12T20:26:00.470000 CVE-2024-50096,0,0,59e9e22e22a35fc41761fb6664d3b0e7ffc6127f6a63b7a2456268dcccdbe871,2024-11-12T16:16:33.703000 CVE-2024-50097,0,0,6a3e01ed40c6f1cc408bee915019f76f6de63ed3a690ad6a8a96d61449cd92c4,2024-11-12T16:18:00.477000 CVE-2024-50098,0,0,230ad2bf5f50188402342a41640634e743511b0d9a5c8add0ac5aed1f1d611c2,2024-11-12T16:25:48.717000 @@ -264906,7 +264969,7 @@ CVE-2024-50332,0,0,9656d38bcfb11514c440d951a58b16e4a5fcba542ce41e8a3824831aeb409 CVE-2024-50333,0,0,4401ab12299711f5c870abfc6cd15c77232e2aa5f01bc8c09f095498f866c9c7,2024-11-06T18:17:17.287000 CVE-2024-50334,0,0,f1904bf4f599c0615877538d390ce8a4f2f074393bfa4b43c380ab7ec9b0624c,2024-11-08T19:51:58.433000 CVE-2024-50335,0,0,30b0738ceedc1a1fb3bb1288fecf67aef4015dca447e6a6bbd65ec5d7cafcbc2,2024-11-08T15:09:07.440000 -CVE-2024-50336,1,1,a2fd7051b5ec00d745cea5bff6a53de142cd24f54ac4cdb2e9100668bebdf01e,2024-11-12T17:15:09.680000 +CVE-2024-50336,0,0,a2fd7051b5ec00d745cea5bff6a53de142cd24f54ac4cdb2e9100668bebdf01e,2024-11-12T17:15:09.680000 CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000 CVE-2024-50340,0,0,7fe99995b303f24a1e9f1f89a7fb3e3a3b6b19d546946b79fcfc20de0db067df,2024-11-08T19:01:25.633000 CVE-2024-50341,0,0,2e9917337f37c3b47e4050a6c46cfbe9a68961d285ca45432129645fe2fcaf2f,2024-11-08T19:01:25.633000 @@ -265103,7 +265166,7 @@ CVE-2024-50637,0,0,7cb3fd4c2566fc1d1593156e77d24b90af6dfd042618185e839399543b673 CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000 CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000 CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000 -CVE-2024-50667,0,1,0dcbd7b35b311fe7a681d780dcbe2293327603709e31a27594acb760866d084d,2024-11-12T17:35:12.270000 +CVE-2024-50667,0,0,0dcbd7b35b311fe7a681d780dcbe2293327603709e31a27594acb760866d084d,2024-11-12T17:35:12.270000 CVE-2024-5067,0,0,7a5f09523c1a14d6651905f1f8853395c32eebb526caa99a81fddc9a443e16ea,2024-09-05T17:29:32.287000 CVE-2024-5069,0,0,9472ccb93cc67e368452ccbd7690fcdac2e9c6bf3a0a4c1febdda7b23dc05b96,2024-06-04T19:20:58.080000 CVE-2024-5071,0,0,1e84a840bf7fe6d05a333c61daff03721e2399762594abd260e8b415b74d49eb,2024-10-28T21:35:22.430000 @@ -265139,10 +265202,10 @@ CVE-2024-5096,0,0,5ed717834c38883681c6d180e391a0fccee5714f6ff3215bd896b6366e61be CVE-2024-50966,0,0,17999db3c119b65097d64bae028974d0e6d4cf5d6910c7a7a211536c5ff5b48a,2024-11-08T19:01:03.880000 CVE-2024-5097,0,0,f8c17c92eeab06c631c7e3bccbcd56a5be798bb0ae3554a5ecf4b2a49f948336,2024-06-04T19:20:58.787000 CVE-2024-5098,0,0,51bb68a404444dbad57c4444d3880f6dd34c8b10fc09ab7783a9da02fb8f5608,2024-06-04T19:20:58.887000 -CVE-2024-50989,0,1,539ed9c0a64887e69fa9cae96035a115db3a8a96afe0045140278b0fb7737495,2024-11-12T18:35:31.437000 +CVE-2024-50989,0,0,539ed9c0a64887e69fa9cae96035a115db3a8a96afe0045140278b0fb7737495,2024-11-12T18:35:31.437000 CVE-2024-5099,0,0,c449033239abbf7fd2bba4f64694ff77374623f364f0fa141d0a92a151a3ab2c,2024-06-04T19:20:58.993000 -CVE-2024-50990,0,0,3e42f63cb4cce2bde832528585cd9a59c20bb79b20e8a372aa48cab82b38c511,2024-11-12T13:55:21.227000 -CVE-2024-50991,0,0,d7b9dadf9ffde3571101ab4cd85a569d9cef8837174cd0bebf677a2bed448c13,2024-11-12T13:55:21.227000 +CVE-2024-50990,0,1,3537d7668a1d8721c4b70a753dc5bd5ceae4b32dbcc1547432740e88301eb02f,2024-11-12T20:35:16.907000 +CVE-2024-50991,0,1,ecad9cee382934b7923952504f41e672f82bb8c3208b9598893aa6b1fa6c9f76,2024-11-12T19:35:12.040000 CVE-2024-50993,0,0,a9de4dd48dde3ac3fa9f8b5743f41b5b56dac32227b8c8bf2e6472e6c2af5c67,2024-11-05T17:35:19.567000 CVE-2024-50994,0,0,a5cc8cf1e738761f065a4f27d82e61f2db641d34c682578fe3c2a1afe6ece327,2024-11-05T17:35:20.363000 CVE-2024-50995,0,0,60f0d71d86c3ab99e9e53c92c51f008106e52e339b3ed722bcfbc442b7e04dd9,2024-11-05T17:35:21.167000 @@ -265178,14 +265241,14 @@ CVE-2024-51021,0,0,b06ad1dc7caa63f0b78f2a692ebfbc7dc3db4861942e25ad61d65ea6408ad CVE-2024-51022,0,0,9c971f391f021663a674f6ebedab01c215349ea525c288aa5349243311884419,2024-11-05T16:35:35 CVE-2024-51023,0,0,b12f806c39027dd585f6605b170e48144a3513f557c323acb9850f669a22caef,2024-11-05T21:35:11.923000 CVE-2024-51024,0,0,2602616b46cde149e40ad1ec2305c8463ebfa9f137264738865d2534ea931b9c,2024-11-05T20:35:25.253000 -CVE-2024-51026,0,1,62fad2f07d50146e8433d063d38894194ce538e71bf191ac14b4c471f5cbc87a,2024-11-12T18:35:32.357000 +CVE-2024-51026,0,0,62fad2f07d50146e8433d063d38894194ce538e71bf191ac14b4c471f5cbc87a,2024-11-12T18:35:32.357000 CVE-2024-5103,0,0,aef0baf1fd7c527670ecf099c59b541b0a60e91a3e6b8de1c582546f74d7df46,2024-06-04T19:20:59.297000 CVE-2024-51030,0,0,8864f5f848b4bd116cf6c117fc9413494345870c652480a21b492e7685b9b04b,2024-11-08T19:01:03.880000 CVE-2024-51031,0,0,1e5ab5cf9c7a25d9afff4cfa33f3918bc3dcf7d5460284d217623f0076ca881a,2024-11-08T19:01:03.880000 CVE-2024-51032,0,0,ec7a3f58b1b13bff81847fdcad7b6dc259b873fcbfe047be514b3d445ebe4aca,2024-11-08T19:01:03.880000 CVE-2024-5104,0,0,8d4ff1d965ca43b16b77c8055dc82631e6e8123b480d913038100bbc16c5fc14,2024-06-04T19:20:59.397000 CVE-2024-5105,0,0,c1afcbdfab9cbf8b7401c36e665ea5449fdb0423f5baf719d1747abc02484d12,2024-06-04T19:20:59.500000 -CVE-2024-51054,0,0,679f1ab11a6bd17f8826d1e56c02f08fe3c1b163f6815abb310103211e2f5032,2024-11-12T13:55:21.227000 +CVE-2024-51054,0,1,5f7e39a7aaba6174905b6372920760418cc96f41e26463faa8167a7c26d82367,2024-11-12T20:35:17.823000 CVE-2024-51055,0,0,bc6e923abc09fb516723039d0c80e2e1c973506d67c4fd7e8b98b13ae600002a,2024-11-12T13:56:54.483000 CVE-2024-5106,0,0,0c609f41f655027086ae34a799c5dba7518161802bc29d490607b24bb6cca58b,2024-05-20T13:00:04.957000 CVE-2024-51060,0,0,402a659a58502cf6652d1569d08a8e1bb7141b9ef84b5e613167d10864e0cd4d,2024-11-01T17:35:08.443000 @@ -265206,7 +265269,7 @@ CVE-2024-5112,0,0,689c76c95598a2f86ee6cadbc1c25854cf35ada5e2d2725de4638c44d7f737 CVE-2024-51127,0,0,5cbf021500110127b38f6de54e9823061ea68366b333afb20ed57e2e95d1d646,2024-11-06T19:25:14.607000 CVE-2024-5113,0,0,d52da1935c57c4016d19b1f0658aa6603ac8563b2af10cf87d5ce42568a3ed96,2024-06-04T19:21:00.113000 CVE-2024-51132,0,0,741849111477a3dea70a3f4f159f318bcb11e986e2637afecf8a608cf70fdf87,2024-11-06T20:35:34.173000 -CVE-2024-51135,0,1,14e718ab6bbce05ef8372500586cdca65e1edc88403906fd3621efeb1c3a8273,2024-11-12T17:35:13.127000 +CVE-2024-51135,0,0,14e718ab6bbce05ef8372500586cdca65e1edc88403906fd3621efeb1c3a8273,2024-11-12T17:35:13.127000 CVE-2024-51136,0,0,b7028b746c76b0b8db7064a5c94d8b9b8b4865b267652b712081099f88f87998,2024-11-06T19:31:15.230000 CVE-2024-5114,0,0,51655375bf74d88d0b44bf3106775b49d83b04b179d3446b4a92ffe727b17b66,2024-06-04T19:21:00.217000 CVE-2024-5115,0,0,566281473e2daa2487dd251e202869dc3059aeec07f7c63daa38b65c3bae3de7,2024-06-04T19:21:00.323000 @@ -265217,7 +265280,7 @@ CVE-2024-5117,0,0,8f71e5dda3348556d6b06143dcd47b79229dad0468d30aa7c38f8c5c1ecb85 CVE-2024-5118,0,0,ede24973ef1505b96fcd3c614d177bf90baaafde820cda4461fa6280b3c2b455,2024-05-20T13:00:04.957000 CVE-2024-51180,0,0,291417569b0494624857cced13999289421aea811a146f5e21654eb2df5dd0c1,2024-11-04T13:37:15.737000 CVE-2024-51181,0,0,113da0b9d3296c95d5bef97b0c59442bc79ba9bb3dbb2c1b2baabdd141b84fe6,2024-11-04T13:39:48.413000 -CVE-2024-51186,0,0,ecbd09b77ae77cdfbdab2ab6628b77e4371c5a546df67d7dbfc3646e5b2ec142,2024-11-12T13:55:21.227000 +CVE-2024-51186,0,1,56826365490b6b2d1d0864ea7f3256c4a8e1f6321d8577d41277a7b7f5df013c,2024-11-12T19:35:13.080000 CVE-2024-51187,0,0,985002ca904865da616607b236f148770176f709bfa535fdb33cee1be9676e5a,2024-11-12T13:55:21.227000 CVE-2024-51188,0,0,13986d2935d4cbbb06b61af21788a3b856d3586938aa3348b0a9519fa9c62c69,2024-11-12T13:55:21.227000 CVE-2024-51189,0,0,35e25bc3ffc29f26f90767c986f34840e3ceb43dde83583aa3e60434ef9d49e5,2024-11-12T13:55:21.227000 @@ -265226,7 +265289,7 @@ CVE-2024-51190,0,0,02493ace343d801c2c96f83a09a920c8f88e12adfc58225d3b0b4f5c18c7e CVE-2024-5120,0,0,512e5b032e12a79292f06756f99bf223a47a4b934de5206e20b5529b01ef61b6,2024-06-04T19:21:00.760000 CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3bdb,2024-06-04T19:21:00.860000 CVE-2024-51211,0,0,581556a1bd92632bbd04cf9aebe233d1f5e96f417c538ff40e3ed80078a79ca9,2024-11-12T13:56:54.483000 -CVE-2024-51213,0,1,a598a44042c959028b27d1b964937a81a14ecccc57789a4658084176eb433102,2024-11-12T18:35:33.433000 +CVE-2024-51213,0,0,a598a44042c959028b27d1b964937a81a14ecccc57789a4658084176eb433102,2024-11-12T18:35:33.433000 CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b5e,2024-06-04T19:21:00.963000 CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000 CVE-2024-5124,0,0,ddf4d98394e08878019bd952c44f2cfd27f047274d82fb0e14f997780f16638c,2024-11-04T11:15:06.937000 @@ -265487,7 +265550,9 @@ CVE-2024-51717,0,0,0528e0c7d07059ca5fe41ea6d661ea92cc786d699804e48039ef2d1479e3a CVE-2024-51718,0,0,9aa3261b8e536504ad8ba3c429c49299ec7c49e625e7595a30d4e4107362d460,2024-11-12T13:56:24.513000 CVE-2024-51719,0,0,7154cc207b4cfbe8cd3be353a6dbfab77953efea32b8e79fce767fd25daf7885,2024-11-12T13:56:24.513000 CVE-2024-5172,0,0,b469524ff2309ced9aec08b056578c23e8b8b5248adb8fcea2b38cb214c81275,2024-07-05T14:05:48.213000 -CVE-2024-51720,1,1,434c7f1cd608c8a8e0929d5e78edaeaa4f00f076ce1382a343572fb11633fea7,2024-11-12T18:15:46.693000 +CVE-2024-51720,0,1,37b7e1b30a45feda0caee3bf34f4203885bb953a4c1f16c405ae7f96cfc14f7c,2024-11-12T19:15:18.123000 +CVE-2024-51721,1,1,b3d49fd948f21c1c08a064b802704b08fdee4c7ae1d4170d6b68f96058134e8e,2024-11-12T19:15:18.220000 +CVE-2024-51722,1,1,eca3a251db0d1418d51a623de2cd2946283a2c00a98a500abb99374ee5248ee2,2024-11-12T19:15:18.397000 CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da6464,2024-06-26T12:44:29.693000 CVE-2024-51734,0,0,1cd13d8635d39c437cbb33b350735ec8f4fced2309825670ef2275f584df030b,2024-11-05T20:35:26.167000 CVE-2024-51735,0,0,4d68a755141918a79130284871e942292c9f37924aba0b94103b08a16b1df114,2024-11-06T18:17:17.287000 @@ -265499,8 +265564,8 @@ CVE-2024-51745,0,0,37db28606ad10f651e6f62f94e51def5fb50b1cfae8314bc96328b8b65ad3 CVE-2024-51746,0,0,3cd98a267aedbbeeb4ad193a68e5bacd0a1a46a62f6ccca5880e9520a47fbe14,2024-11-06T18:17:17.287000 CVE-2024-51747,0,0,25d6bd0ff3f85d39d80ee11112a05e1ad8216b6c2fd2794d35d1e9542fc2ceb9,2024-11-12T13:55:21.227000 CVE-2024-51748,0,0,9b7477705169f4bb30c6616f4b3aeff3f2e76cd4ce9e40c06c7b918e82c19551,2024-11-12T13:55:21.227000 -CVE-2024-51749,1,1,44a4006a3d05df466dcd484279d411d9075929ddca60bc79c3ac80e5632c0e7a,2024-11-12T17:15:09.910000 -CVE-2024-51750,1,1,4fbf34437a32eb55b4cefc7911497e2e839218b9573cf66a27093479e70dcf8e,2024-11-12T17:15:10.130000 +CVE-2024-51749,0,0,44a4006a3d05df466dcd484279d411d9075929ddca60bc79c3ac80e5632c0e7a,2024-11-12T17:15:09.910000 +CVE-2024-51750,0,0,4fbf34437a32eb55b4cefc7911497e2e839218b9573cf66a27093479e70dcf8e,2024-11-12T17:15:10.130000 CVE-2024-51751,0,0,5e82f37cf3dfc23b4c489447a3752cbf986237e64e94f63b0a07a70b000b7b12,2024-11-08T19:01:25.633000 CVE-2024-51752,0,0,e4bd7dfff09e294fe713d9b76aba7fd50689256bee0d75d076093e0fe4805888,2024-11-06T18:17:17.287000 CVE-2024-51753,0,0,bf33e866ff4adcdc8169c4272817d8f4f57258218421ea7cafddbf38a1c6e30a,2024-11-06T18:17:17.287000 @@ -265575,7 +265640,7 @@ CVE-2024-52004,0,0,5fa07d0a35480bd23f86ea684f2a0f66c5e4b9b2bf1fbc1961b6e8f9dcc62 CVE-2024-52007,0,0,9b9844f37c4a4c3cef932fa358d8594e2305c52695217b7622048372b9ab612f,2024-11-12T13:56:54.483000 CVE-2024-52009,0,0,8bbf25e6f645e131b823aafb60173e6af960fce613c6d8dadc55e928f3ee2540,2024-11-12T13:56:54.483000 CVE-2024-5201,0,0,64f0da97aed099b7390504c61b2a584cf361827a66e92ad103d8b3995d82fd05,2024-05-24T01:15:30.977000 -CVE-2024-52010,1,1,a8505d4d20a2ff8b67f096529a55be288529a590cb7065e29ae652896c8efa93,2024-11-12T17:15:10.370000 +CVE-2024-52010,0,1,1c23a60bb28d3dd63cc3a93e076e9eda82c3ff944599bfc6bddf7ce53580af12,2024-11-12T19:35:14.590000 CVE-2024-52013,0,0,dc6fa1208648c6e0d094b332c10d38b0f7c8c8c6d93ae518d64f679a86a6ec4c,2024-11-05T16:35:36.337000 CVE-2024-52014,0,0,545c92489d8cb508f0bdcb65d9f6b19ac8bf6a61dd5add79060ed642cb14b442,2024-11-05T16:35:37.113000 CVE-2024-52015,0,0,a5e53232b1f16aa28db7ce5cbb2aada710eba0b2a30b6ad4f54922682b071803,2024-11-05T16:35:37.890000 @@ -265628,6 +265693,7 @@ CVE-2024-5229,0,0,787c92e076dbd9dca682f832ee22f0e31b439c91ed2d6b58a8c544f86d4189 CVE-2024-52296,0,0,e1d3676ac45354462ec68621ba5d0e3065cda95d7796d7a3da6af17f09b9d248,2024-11-12T16:15:26.030000 CVE-2024-52297,0,0,476242ed3a5f6d85484bec0586307ad55a8c506bda5fa6246f3822c9b0f980d0,2024-11-12T16:15:26.230000 CVE-2024-5230,0,0,f45c8274ba28e0dc58bed98870ed092580a9c18662584e7c3debbd7f7cd359f4,2024-06-04T19:21:02.540000 +CVE-2024-52301,1,1,a5dc5b1e8b92237294807a0610767f88f65e07230cbfcc159531183490ed7794,2024-11-12T20:15:14.087000 CVE-2024-5231,0,0,255bed42ab2a064a39e6f8c88880296d2f7a7d154f3db6dc7f4df2fa244d299f,2024-06-04T19:21:02.640000 CVE-2024-52311,0,0,440cc6f6193f2a4b57d7c7c4a4f4b3f01242ca6df6bc89770050e09d3b499acf,2024-11-12T13:56:54.483000 CVE-2024-52312,0,0,e095caa38b1d55aa1661d9e6b591e2f5164609c3e5c2884b5f60aa22d851bdcc,2024-11-12T13:56:54.483000 @@ -265664,9 +265730,9 @@ CVE-2024-5250,0,0,b4b370273f1fe30d94b715ad219dda570a7dcb84192abd50c3cb746299bdbb CVE-2024-5251,0,0,7d84d2df7bf6674f7d634954defb2f38b0363c19ae19f78012df0aa633abf27a,2024-07-19T15:25:30.980000 CVE-2024-5252,0,0,1b28d536afc88eae5088fe06ff49428bbad5ffcb2aa7139fe40c4c06d2601422,2024-07-19T15:29:35.447000 CVE-2024-5253,0,0,73f9562f224a9a11b8b8279a7bf00d920003fa046cb7c88a3a55caf281adabe4,2024-07-19T15:30:34.717000 -CVE-2024-52530,0,0,33b7429eb7eb3be95001923a1f89646e5a1cfe585e3ad31147ffb8fafc52d42f,2024-11-12T13:55:21.227000 -CVE-2024-52531,0,0,8cb0e01e69eb879d3a531e10dfc8fc193c666536142557a776eb4bc19dd211cb,2024-11-12T13:55:21.227000 -CVE-2024-52532,0,0,ceac3c72c1c60bdab26132bf0ee3396fe51ade03b31a6af19ddc21f1a4f3dd27,2024-11-12T13:55:21.227000 +CVE-2024-52530,0,1,9accb3b51708da4056e1b2d60bf748a8c8f27363e68e7120159317514b4fed53,2024-11-12T19:35:14.927000 +CVE-2024-52531,0,1,4a9a627b31c610f608576c39893b61b41c0efeb9f9d97b523937261d20004d52,2024-11-12T19:35:15.807000 +CVE-2024-52532,0,1,82ab4898c82b79d45f58347a35d13014aa77e1fd942e3edcc771ee91b2c6c3ad,2024-11-12T19:35:16.970000 CVE-2024-52533,0,0,81d75647e8fcacbe880bcd9f7eaf399938e1df4314078c30bc37f40639859c7b,2024-11-12T16:35:24.297000 CVE-2024-5254,0,0,78882d871be0a19bc95888168cf12372f503de77ac359f287536c8f062c38532,2024-07-19T15:32:05.560000 CVE-2024-5255,0,0,a9d47c22e8985fc8d8b40f4bef3272595484bdbc8485e44830cb58ee997ab90f,2024-07-19T15:32:18.850000 @@ -266101,7 +266167,7 @@ CVE-2024-5736,0,0,542f55758b5fdb7d00740d25c91b14abb056e9aea19176254ebe8a8a94099d CVE-2024-5737,0,0,d0320412366343a8bfdfa83f09ec33ad8bab76c39c727d4c2240c621c15a4ff2,2024-07-03T14:09:22.483000 CVE-2024-5739,0,0,607ae99ef991c260ab7d753d294117f20a4326531a649cb8963e8228c76ca454,2024-06-13T18:36:09.013000 CVE-2024-5741,0,0,b15f10a28254188cb533f28bdc6de62f4cf75bad53d1465adcc506123fe667cc,2024-08-16T20:38:08.053000 -CVE-2024-5742,0,1,2dbc0be584cf2e6f101407cb819e6e1c9b28fd50abc0c32dd4c3e2d2cf8a9da5,2024-11-12T18:15:46.973000 +CVE-2024-5742,0,0,2dbc0be584cf2e6f101407cb819e6e1c9b28fd50abc0c32dd4c3e2d2cf8a9da5,2024-11-12T18:15:46.973000 CVE-2024-5744,0,0,fa6836e3173f8cf048b3a987cfb64279b64d7f456da598f49d9aa4b85f5c51d9,2024-08-01T13:59:58.940000 CVE-2024-5745,0,0,45e4cce1990a5332f3fc13a691f25e40551bee96d698b0361d8c0089ac80523d,2024-08-06T14:37:59.943000 CVE-2024-5746,0,0,08e42433314420a93bea44176cf4cc0a169742251a575020722ab2e02c28ff80,2024-06-21T11:22:01.687000 @@ -266536,7 +266602,7 @@ CVE-2024-6235,0,0,3389c73a6ea8d57ad4659a54003738203401403add7f113413f0341ee66fc3 CVE-2024-6236,0,0,ea4366a2dacd229dc05ea79ccc864c81d00975b5a5c000367714796c8eb1d7e4,2024-08-01T14:00:16.777000 CVE-2024-6237,0,0,42d974b137e9f6fa213536980d088f395c1fe724ef5f0786bbfbf5436af83280,2024-08-29T18:15:14.947000 CVE-2024-6238,0,0,ed9c2d1c6c6b7ce98df1d438dedd8db9b89c4dbb8c302ebc32aa84b1d702412d,2024-10-30T16:35:29.987000 -CVE-2024-6239,0,1,58265368843e2e1a60d2defda07ec1d9f9e15a7d13a9c4cde54a90c9e90e9c03,2024-11-12T17:15:10.520000 +CVE-2024-6239,0,0,58265368843e2e1a60d2defda07ec1d9f9e15a7d13a9c4cde54a90c9e90e9c03,2024-11-12T17:15:10.520000 CVE-2024-6240,0,0,ac0ea1c33037082252bc61d50d67379872fe94c26d657b4cc70544d56df4853f,2024-06-24T19:10:38.983000 CVE-2024-6241,0,0,6290249fb2556f2c86210bd1da990f0543c81351c0646b54f9f1e8ad7a654dfa,2024-06-24T19:42:44.280000 CVE-2024-6242,0,0,3710863ac72ff4e84ea0fd78a36f5e9434d67cfe63e5360760beb47932695486,2024-08-01T16:45:25.400000 @@ -266681,7 +266747,7 @@ CVE-2024-6395,0,0,8949d2f54703284d3b545906a65282811d0c7a0bd7bd2d1ca2dc3e2d333d4c CVE-2024-6396,0,0,9e4b547b4d90c33704c90a7cfe67a136b4a49a6d0168d4ba570b6960a74fd1cc,2024-07-12T12:49:07.030000 CVE-2024-6397,0,0,69c6adc6e74f8320b438655fc21122936f7ec03e924b3cf51bf011308451b2af,2024-07-12T17:02:56.110000 CVE-2024-6398,0,0,5e78ff46f697643e5cc753102552fe7954080f3b71babda50e4591659f0fb988,2024-07-19T18:25:44.247000 -CVE-2024-6400,0,0,b97035774591a9d32c9bf3734c287bce2a61e9a927e81befdb11994d85a94f4b,2024-10-04T13:50:43.727000 +CVE-2024-6400,0,1,6340b63c179fdeace7c035d50db0b0bab7a903e873f1bd95cd115f0ea2c3ea40,2024-11-12T19:32:52.187000 CVE-2024-6401,0,0,75f35c467a7667b8ee07e8ffaab5805a621ce217810e5427bec74047890dc99b,2024-09-20T17:07:55.740000 CVE-2024-6402,0,0,2dbb843b8ac3a7858f42e0a7205d0fe42cc4e1a6d0db6e5033a007b00a2a1ef3,2024-08-30T21:08:54.327000 CVE-2024-6403,0,0,9d6874f85ed8785db48c417cc57cf1b425db80cf3f43ac931de3a37049d75945,2024-08-30T21:08:04.557000 @@ -266717,7 +266783,7 @@ CVE-2024-6439,0,0,17c8c0dedf84f798cc0f5ae1eb12bcfee8d03a9530b75eee07a6ecb983f8a0 CVE-2024-6440,0,0,2c5be04f311531a7679fd469afc24458b735968d4c5b698cdcf03804f39d3eef,2024-07-02T17:58:15.410000 CVE-2024-6441,0,0,15383e1684ea64dc1d374e71fe60467b8bfc18bde94b0e73415ebe68688c2118,2024-07-02T17:44:45.700000 CVE-2024-6442,0,0,d58033de190f84c06f1911337c55c18136c198fda1c9e49c55dd45b4e125c45f,2024-10-04T13:50:43.727000 -CVE-2024-6443,0,0,1f5e0feb68edb28ac0a64952477896f97a6bb02f3f5df169ea05c0e678838b96,2024-10-04T13:50:43.727000 +CVE-2024-6443,0,1,f94991d4bf2e119628e1914b252c0e9b52e3eda9423a8c9268bde20f09ae1f68,2024-11-12T19:29:43.793000 CVE-2024-6444,0,0,ba0e95ea1c09a59af91663628d86e511ed5245425b381e9bbc862266cbfae283,2024-10-04T13:50:43.727000 CVE-2024-6445,0,0,d4bd07ae9eba462d90eb79dcc7204c56bd4679ce8063eb2ebe32db5f30ce9fc7,2024-09-12T16:14:51.480000 CVE-2024-6446,0,0,40ba33596a31d7c54c56d318bcab067473a99b16234df2e24accf4e6227c9e31,2024-09-14T15:17:11.720000 @@ -266902,7 +266968,7 @@ CVE-2024-6651,0,0,ea873d27b7e6cf0926f77a6ff240509b7d4aeaa1088e1cf3aab190452e4555 CVE-2024-6652,0,0,3ff791c25c8f732c3947124509e73704873817ec6683dce373132d784d769eca,2024-10-17T12:39:41.690000 CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000 CVE-2024-6654,0,0,33944ebc74d30c3cdd06834dbc588c95f63dc73814119ce0f62926870f548873,2024-10-09T09:15:06.713000 -CVE-2024-6655,0,1,4d06a36663441a51ec98ad7b55317ee7b839f9c6dd933c193603d639d10a05e0,2024-11-12T17:15:10.680000 +CVE-2024-6655,0,0,4d06a36663441a51ec98ad7b55317ee7b839f9c6dd933c193603d639d10a05e0,2024-11-12T17:15:10.680000 CVE-2024-6656,0,0,fccb6ec07442f587d9028dc0c59041af34b9eaf4dddb92d180741d5c3d5aee87,2024-09-19T13:05:44.953000 CVE-2024-6657,0,0,f0f99d433013d36173a76c2d6f29d8b00e049abe2c9619ab26aa1901dbe42314,2024-11-04T15:15:24.440000 CVE-2024-6658,0,0,c59a5bc453b7b50f1c8c3eefda7e3a6df21ab1a88b2d2e9df9362f9733c6e2a7,2024-09-23T20:15:05.560000 @@ -267502,7 +267568,7 @@ CVE-2024-7399,0,0,94de8cab81b119f815fa73c008811f38562f3609d3da13634aecbd720ea861 CVE-2024-7400,0,0,880bea0e2ff4ceadacbe376968f4ebe20bb468fa58e2ed97aa47316bc459f45c,2024-09-30T12:46:20.237000 CVE-2024-7401,0,0,43ffed7b6ca165f2a0da7944b4e4cef6faa3da0b6dbd419986732fe262f21587,2024-09-05T18:34:17.433000 CVE-2024-7408,0,0,a5191010d29cd8fd3daea07e74870b9bf130ede8610ab518fb24ce3a11a386f4,2024-08-13T16:06:08.213000 -CVE-2024-7409,0,1,a0a6addbe3c2f0cc1db031d3b6ccbc76b45c7e3857a91ea8908f269e71f57171,2024-11-12T17:15:10.833000 +CVE-2024-7409,0,0,a0a6addbe3c2f0cc1db031d3b6ccbc76b45c7e3857a91ea8908f269e71f57171,2024-11-12T17:15:10.833000 CVE-2024-7410,0,0,d4e8b81d7bab3d90baf0746a6fdf1d2e1dd63b1bd2599e20b73bae4467a0729b,2024-08-12T13:41:36.517000 CVE-2024-7411,0,0,233fe970a370850f5b652951fe7b5f603c4b4a66cd3c44f0b67dc9d466e3271d,2024-08-15T13:01:10.150000 CVE-2024-7412,0,0,b7efc7f691385d07c16b9c98953749b4113f5c7d6e2cc5e240ac710642b7a973,2024-08-12T13:41:36.517000 @@ -267592,6 +267658,7 @@ CVE-2024-7512,0,0,64969c8356c27f20386cdfa0c38d50ded85817d5026c9d96e7d342b04fbd9f CVE-2024-7513,0,0,9e0dea33b007eccb273e626ffa6cce86e938d130dbfcfa937121ca05aa4099ce,2024-08-15T13:01:10.150000 CVE-2024-7514,0,0,655c87ffa4ff4008320c4821d9c63bb232bfab91cd0bfa739db07a9e11bd1757,2024-10-15T12:58:51.050000 CVE-2024-7515,0,0,3a174c853c7ff7ac11f06a078625d3fec604b25f74f3c9dd6a512b7295373686,2024-08-15T13:01:10.150000 +CVE-2024-7516,1,1,b8a9828413c70858a95301990cfaf7f068a5658466826d258c7cb604ce02b278,2024-11-12T19:15:18.753000 CVE-2024-7518,0,0,9415ffd03a6bd0db1eeec3e299c6a6e287c86d70550126d9de8ce19171619aab,2024-10-29T20:35:43.097000 CVE-2024-7519,0,0,d6b76960785055c5e3c2658ffad1f8ba4c01f9383c9459dab1efa4da32737657,2024-08-12T16:04:20 CVE-2024-7520,0,0,f9e9090d09f3e3bdf7bb5b1e415fd5962f71ad30fc0e4e64eb0eb80aba152203,2024-08-12T16:04:46.790000 @@ -267638,7 +267705,7 @@ CVE-2024-7567,0,0,8d84928fabcffd92f0ffc65ee27fdbbaa4428b293e351afb4071fd1cdbd8df CVE-2024-7568,0,0,fc850c4dc7382eb1c532a12fdb074c868e94a69ea2940a03f3f65bba93f8ff11,2024-09-27T00:41:18.483000 CVE-2024-7569,0,0,7a3c8e4eac2ebf96df0505057d22d968c760196f85eb753352a8b6e99487f183,2024-09-06T21:57:23.037000 CVE-2024-7570,0,0,a798807066be1648665e55a9f25a11b0e98e29601d4d1c9335361e48181aae93,2024-09-06T21:59:00.830000 -CVE-2024-7571,1,1,5c0533dd4ecdb63a7ac7493e32da992f80b34c401fc4396f8c1aa9a3b784ef28,2024-11-12T17:15:10.973000 +CVE-2024-7571,0,0,5c0533dd4ecdb63a7ac7493e32da992f80b34c401fc4396f8c1aa9a3b784ef28,2024-11-12T17:15:10.973000 CVE-2024-7573,0,0,7b157c1bc586485011758f6317cb8548eaad83544501bf2e76c604287d08292a,2024-08-28T12:57:27.610000 CVE-2024-7574,0,0,20d9970481b83bc1831e248b5fd88e17f245f697fcf3310f9ca87d287eec943e,2024-08-12T13:41:36.517000 CVE-2024-7575,0,0,e8306ce8528f787b0f27b2039d1a16892d7951cab83d446a20e0ed4cab1e1e05,2024-10-03T13:52:23.060000 @@ -268036,13 +268103,13 @@ CVE-2024-8056,0,0,7d94e922f5f6064358baece439e000bb5b536e03070693d567d210e7b17a44 CVE-2024-8059,0,0,bdae740e9708e98c12d1deb7f7b4958a4e9e21cc3d70a47ecc6f19d9246061d0,2024-09-14T11:47:14.677000 CVE-2024-8064,0,0,9afbec42e91ccdf5ae5f9527bb691367cd47bbf3ee2caa0cb5423b43e5fdd860,2024-08-30T16:15:11.120000 CVE-2024-8067,0,0,21c0729ad9dc772677b9fbf75bb24db3bcf4512001a88b1eef9d39bf31f69153,2024-09-26T13:32:02.803000 -CVE-2024-8068,1,1,df5bb5cbd57ee571f3a69df64a9005315a4220113d4ece4ae527c7a4c22e2236,2024-11-12T18:15:47.450000 -CVE-2024-8069,1,1,f54e8a7820a67cb4ee6825af332233688e897633a7f16db4082a6a76ee2050cc,2024-11-12T18:15:47.603000 +CVE-2024-8068,0,0,df5bb5cbd57ee571f3a69df64a9005315a4220113d4ece4ae527c7a4c22e2236,2024-11-12T18:15:47.450000 +CVE-2024-8069,0,0,f54e8a7820a67cb4ee6825af332233688e897633a7f16db4082a6a76ee2050cc,2024-11-12T18:15:47.603000 CVE-2024-8070,0,0,fe9b454067f74b13c9d22e1bfea14cc77320169fffe5e56dce182517c870c1a6,2024-10-15T12:57:46.880000 CVE-2024-8071,0,0,ac7c2c7e7df896f6bfe7f17a6e74f8de236e5ec843865384cdf53fde1e533098,2024-08-23T15:34:53.913000 CVE-2024-8072,0,0,08fafb0bed7b0568fefcb8938e0e01cf4acf3cb153d4b847bc3e1d9427344a62,2024-08-22T14:35:18.797000 CVE-2024-8073,0,0,10b7625a2313189ee3b842662d1479fc9c76da034a2ab4b4a904df4cf34a67e5,2024-09-12T20:58:56.413000 -CVE-2024-8074,0,0,076dc0b186a0afea61c1a9a5ea4ed9867805411ce7c2a803d30f87fae20b0c22,2024-11-12T15:48:59.103000 +CVE-2024-8074,0,1,e682ca0423cfbf27a980c29293665d5a2430557104ef6acd4f46d21f6a824b14,2024-11-12T19:35:17.893000 CVE-2024-8075,0,0,ade4c273165c7aec4765c6326040b76c5f63a113e2ed288ff931d9df9094655a,2024-08-29T21:57:51.377000 CVE-2024-8076,0,0,17f13fca60dc9f294e50e141a5e871f314ee6e5e737c4e528c1768c1265f9d75,2024-08-29T21:58:31.820000 CVE-2024-8077,0,0,52c1674bca408deb5f4af1cbc16aa8747d849ce452283a87adbc49089818e7d0,2024-08-29T21:59:08.997000 @@ -268168,7 +268235,7 @@ CVE-2024-8230,0,0,51972d3a01eef60d4ec2fcebcc43d9f517d40a0a396b61ca7c24bdef0d5fcb CVE-2024-8231,0,0,446131483e8b45e43bdf8638b1d57bddc78ae79290a43024fb0cbf42d668bb64,2024-10-16T20:01:30.877000 CVE-2024-8232,0,0,5572b7d7bb007c2d5d81196fae90ff25fc17db53d2496173f3c02b5439ff5273,2024-09-11T16:26:11.920000 CVE-2024-8234,0,0,870a131a53db84d6497bde7de38de6b7411ad7686be0738cd78fff93fab14909,2024-08-30T13:00:05.390000 -CVE-2024-8235,0,1,5e9780352477158854c36359d48e25d3513888b0f7edea2fdcc69371ba803fc8,2024-11-12T17:15:11.197000 +CVE-2024-8235,0,0,5e9780352477158854c36359d48e25d3513888b0f7edea2fdcc69371ba803fc8,2024-11-12T17:15:11.197000 CVE-2024-8239,0,0,9ef6151772b4426305cdb3a97d7dc90da8f7e43d6a503c000880c7bb8166db9a,2024-10-07T15:48:35.887000 CVE-2024-8241,0,0,a45702ddf12409bcabe5a92099c2b574d3c26b3fd7159f1bd1748fa16b9a5652,2024-09-26T22:03:42.123000 CVE-2024-8242,0,0,0ef1d79e78cd55267ee51ab0995f6e2480e4463ebaece6d40e7de318a22ccc8c,2024-09-18T15:47:56.553000 @@ -268386,9 +268453,11 @@ CVE-2024-8529,0,0,12671b61ed295efe6d3d38d0b158765da76f16b719201c5bbfb86ca5ed8c38 CVE-2024-8530,0,0,5cbf4b30a0ece93db500dd3f52e859197f6064be344f9481ef25107f4686b11c,2024-10-15T12:58:51.050000 CVE-2024-8531,0,0,6247771452e4454422e50e876a5da9e38ac5a7aad08135621b5b288e87bf9b96,2024-10-15T12:58:51.050000 CVE-2024-8533,0,0,ceba1d609043d018dd2a5c62af783c64aebd2125e63ee811ba18e8a1d6a8510b,2024-09-19T01:57:23.830000 +CVE-2024-8534,1,1,3a4af318e8428eecec8a4d946546f8544dc9bfe2a3d0a01d0d3f97e097daf900,2024-11-12T19:15:18.907000 +CVE-2024-8535,1,1,e9cac48950f8834ffb96d140a720f8a78a705a98d78a4dbb2d405e88c1ee6a30,2024-11-12T19:15:19.040000 CVE-2024-8536,0,0,a7b1e09acaf4ac1b8946f962d2bb0e6dee99d2fed00608df37ed579fb4435262,2024-10-03T18:16:17.740000 CVE-2024-8538,0,0,037a1de419d434bcf3dba0ee797a8b9a465b537393317b1c47cc2bb770ec2f49,2024-09-26T16:28:02.990000 -CVE-2024-8539,1,1,ab508558deccf561edf9fbd11e9cd3c77778b51668042bb9ac7ffa9072153a75,2024-11-12T17:15:11.357000 +CVE-2024-8539,0,0,ab508558deccf561edf9fbd11e9cd3c77778b51668042bb9ac7ffa9072153a75,2024-11-12T17:15:11.357000 CVE-2024-8541,0,0,1d636de0a06aff3dc69296630bf4988ffb67af97b387ae9a3d55e4d7f8f169de,2024-11-08T15:07:08.400000 CVE-2024-8543,0,0,1827ebc325d7546f1e75a8e16ffad13bc42c9eac828d9fdcb95bbdde0c532bed,2024-09-27T16:46:26.243000 CVE-2024-8544,0,0,029a23631e96ee15c1045dd3fa22aca85d39405998de7d891aefcd30e632fd70,2024-09-27T12:57:21.617000 @@ -268916,7 +268985,7 @@ CVE-2024-9327,0,0,9bb62fae114b1c29588ad2672d640859a17a9f3af7375a799fc34e218e9d39 CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000 CVE-2024-9329,0,0,45383f73609cef2d97bbcc2a37f0da26902c147f00f71a92dd725b6696a1e709,2024-10-07T15:52:47.267000 CVE-2024-9333,0,0,29d3d497691b594c7c49948d48e229bbe8c23108f2eef552b2f92cd89acf1f06,2024-10-04T13:50:43.727000 -CVE-2024-9341,0,1,cbd9ba7700b736ca77295d40baf5d6006565a235e3e2c6893b45c65c02e66af9,2024-11-12T18:15:47.840000 +CVE-2024-9341,0,0,cbd9ba7700b736ca77295d40baf5d6006565a235e3e2c6893b45c65c02e66af9,2024-11-12T18:15:47.840000 CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000 CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000 CVE-2024-9346,0,0,62d32d35d45fd426e51a0ed8886468a70178025d3407ee17aee209be78f55958,2024-10-15T12:58:51.050000 @@ -268965,7 +269034,7 @@ CVE-2024-9401,0,0,9842edf4bc941b30860cfd929934eb8ba10b8d9f58d891f69f78bdfbf96f46 CVE-2024-9402,0,0,04bb4c5739f014caa4b772ec804b7222edbe186c7bb2fe331673658400879b23,2024-10-04T13:51:25.567000 CVE-2024-9403,0,0,c1afe1062aca6f3e2bbfc345cdb3697cf0c5243163e1e418a6944c658c5bb841,2024-10-04T13:51:25.567000 CVE-2024-9405,0,0,5a1aaacdf03c4deeb5787d411c40d8ad3aed60be9320ac0ab9cd4983368bffee,2024-10-04T13:51:25.567000 -CVE-2024-9407,0,1,97b0f3234f51cc30c3a97226cb930f5fbbe39fd25f9f23131a758552af9f8ee9,2024-11-12T18:15:48.057000 +CVE-2024-9407,0,0,97b0f3234f51cc30c3a97226cb930f5fbbe39fd25f9f23131a758552af9f8ee9,2024-11-12T18:15:48.057000 CVE-2024-9410,0,0,f1caeb057101bc11b923104c4939c2a18b358804c54a293851a2bbe945ca8cb5,2024-10-07T17:48:28.117000 CVE-2024-9411,0,0,09446adc9a52ba88acfc951352e9088b24cfd1cdb8a001643ee070875c43ffef,2024-10-04T13:51:25.567000 CVE-2024-9412,0,0,aa9a3d3cdb3659b02012ef158f2f0c675ff0de511272afae470c48f556502feb,2024-10-10T12:51:56.987000 @@ -269072,7 +269141,7 @@ CVE-2024-9572,0,0,6aa8ec5096cffb49c05ffcb187e769f5454844eed5ebf1e91e8e45ef57650b CVE-2024-9573,0,0,58c75dd5695e86f3dd5971604e3d0b5f4fa9518dd900d56e54c2dcc37c5c3326,2024-10-08T18:45:09.057000 CVE-2024-9574,0,0,a60670a65a4470a80e62c618e77fec3e5e5071e32e3c874874eb23f89671df72,2024-10-08T18:45:13.147000 CVE-2024-9575,0,0,902a179ba291c73f1ff19f974c0569ed05c8dbb3d8914c4f7409455feb2bd5d7,2024-10-14T08:15:02.970000 -CVE-2024-9576,0,0,8951fce62906502da47a1a14d346f6d3a0ab552a2a1307ec37410d86b47884ad,2024-10-07T17:47:48.410000 +CVE-2024-9576,0,1,25aab792d43a0a086c5d940f3b1aaa375cf80fdc479a0c88e1a0265fb0e046cd,2024-11-12T19:34:37.910000 CVE-2024-9579,0,0,e2993f144efd5aa9c48a1ec5bcd5f3b9005733d0240c41dfc1522a865c26a6aa,2024-11-08T18:08:02.683000 CVE-2024-9581,0,0,fb1d34fab9f94525003a0f26c830b830dcb7b4bdc92dd8a95590c26db891e7c3,2024-10-15T14:28:35.283000 CVE-2024-9582,0,0,6ec198135418f168eaebdeafd2e2fe73c3f44201fb3d949937a7b4e70c974bf6,2024-10-16T16:38:14.557000 @@ -269122,8 +269191,8 @@ CVE-2024-9667,0,0,db0574de12822738c38c8016441ce46841c68ee532fe6a4e072cebc9412ff1 CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000 CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000 CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000 -CVE-2024-9675,0,1,1b7950bbf002083ee4e53e944da02c5d76cc5e5eff0c248f9219501dde315b12,2024-11-12T18:15:48.180000 -CVE-2024-9676,0,1,f335a00e94a1cdc6c48644a159e81b69c2cad1467f7b2e1ae370b9d47106ad4d,2024-11-12T18:15:48.340000 +CVE-2024-9675,0,0,1b7950bbf002083ee4e53e944da02c5d76cc5e5eff0c248f9219501dde315b12,2024-11-12T18:15:48.180000 +CVE-2024-9676,0,0,f335a00e94a1cdc6c48644a159e81b69c2cad1467f7b2e1ae370b9d47106ad4d,2024-11-12T18:15:48.340000 CVE-2024-9677,0,0,944e049c847e061867c66e6b586a0cd99260b04bc2e2059d736567bf47cae00c,2024-10-23T15:12:34.673000 CVE-2024-9680,0,0,db0e4e19e09673238ffe3dfbb8e95974e9346a75b4fd6d9319c03e5970bb644e,2024-10-16T15:07:36.123000 CVE-2024-9681,0,0,5184b45d0c5be56c6e66f5f4d21584d3fd220046fb9bac6604ac868b54d81bd8,2024-11-06T18:17:17.287000 @@ -269192,8 +269261,8 @@ CVE-2024-9835,0,0,ca18e7b41fab9b483950f5f59199903f1b661b24923c7a18a4c44cf7bcb08f CVE-2024-9836,0,0,5d120048cea246a15edceb1ecc1c13de92be1dc1c21567e1e478f7428ef25fec,2024-11-12T15:35:18.093000 CVE-2024-9837,0,0,bb8fbc31e530027dfddbaf6dae2f5d1b4333d91b7cafcea32a3d82a1ea54dea9,2024-10-15T12:57:46.880000 CVE-2024-9841,0,0,ebdd51eec8479d80c9266cdceb915506aec1278560e194f65ea2f5d20595b81b,2024-11-08T19:01:03.880000 -CVE-2024-9842,1,1,5d3c7d33c46623a6a4c130167cdaba2fd4966b2d78a512bcd127a5ed3a622d91,2024-11-12T17:15:11.580000 -CVE-2024-9843,1,1,3f6b82b935801794016ddce6f74345815fb60145546c8b6ecadc582329b1f681,2024-11-12T17:15:11.793000 +CVE-2024-9842,0,0,5d3c7d33c46623a6a4c130167cdaba2fd4966b2d78a512bcd127a5ed3a622d91,2024-11-12T17:15:11.580000 +CVE-2024-9843,0,0,3f6b82b935801794016ddce6f74345815fb60145546c8b6ecadc582329b1f681,2024-11-12T17:15:11.793000 CVE-2024-9846,0,0,173656afdffd3fc8df737b5cdb277d7e27d47fc010c3df17216e30b52661a1bb,2024-11-06T14:58:04.160000 CVE-2024-9848,0,0,b402d34d635014e43cf3d9b875728458bb9e45308a715285ac01e2036b42d252,2024-10-22T16:42:25.867000 CVE-2024-9853,0,0,b003ea260222d309866f9bc6bcac4c0549c1930cf36d8d49eac92c8d99d9053c,2024-10-28T13:58:09.230000 @@ -269309,4 +269378,4 @@ CVE-2024-9991,0,0,adb978eaa002da8be608de3b4e550af4ed1a2d2f51d6542eb9fa168b402820 CVE-2024-9996,0,0,d5e7827ad5391d78a31addd2ca4c41dc6e5d45abf975a0bf7cf45c9296bda120,2024-11-01T16:27:30.387000 CVE-2024-9997,0,0,a8e0d075074a0193393843d7836722691de5269a9c302917e51ae6ca5570db59,2024-11-01T16:27:34.960000 CVE-2024-9998,0,0,0419a3dad23ae850906f2650ca4d40b180999b4a5d360bcc1b838f8893ae2af5,2024-11-12T11:15:03.840000 -CVE-2024-9999,1,1,bb030ee002ce7e75d47116d14be8ec7d0062c1687025da8684bec130b2c84a87,2024-11-12T17:15:12.013000 +CVE-2024-9999,0,0,bb030ee002ce7e75d47116d14be8ec7d0062c1687025da8684bec130b2c84a87,2024-11-12T17:15:12.013000