diff --git a/CVE-2013/CVE-2013-39xx/CVE-2013-3900.json b/CVE-2013/CVE-2013-39xx/CVE-2013-3900.json index 667393a4841..41fced2b17e 100644 --- a/CVE-2013/CVE-2013-39xx/CVE-2013-3900.json +++ b/CVE-2013/CVE-2013-39xx/CVE-2013-3900.json @@ -2,8 +2,8 @@ "id": "CVE-2013-3900", "sourceIdentifier": "secure@microsoft.com", "published": "2013-12-11T00:55:03.693", - "lastModified": "2022-11-02T15:15:43.850", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-14T21:15:06.097", + "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2022-01-10", "cisaActionDue": "2022-07-10", @@ -12,7 +12,7 @@ "descriptions": [ { "lang": "en", - "value": "The WinVerifyTrust function in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 does not properly validate PE file digests during Authenticode signature verification, which allows remote attackers to execute arbitrary code via a crafted PE file, aka \"WinVerifyTrust Signature Validation Vulnerability.\"" + "value": "Why is Microsoft republishing a CVE from 2013?\nWe are republishing CVE-2013-3900 in the Security Update Guide to update the Security Updates table and to inform customers that the EnableCertPaddingCheck is available in all currently supported versions of Windows 10 and Windows 11. While the format is different from the original CVE published in 2013, the information herein remains unchanged from the original text published on December 10, 2013.\nMicrosoft does not plan to enforce the stricter verification behavior as a default functionality on supported releases of Microsoft Windows. This behavior remains available as an opt-in feature via reg key setting, and is available on supported editions of Windows released since December 10, 2013. This includes all currently supported versions of Windows 10 and Windows 11. The supporting code for this reg key was incorporated at the time of release for Windows 10 and Windows 11, so no security update is required; however, the reg key must be set. See the Security Updates table for the list of affected software.\nVulnerability Description\nA remote code execution vulnerability exists in the way that the WinVerifyTrust function handles Windows Authenticode signature verification for portable executable (PE) files. An anonymous attacker could exploit the vulnerability by modifying an existing signed executable file to leverage unverified portions of the file in such a way as to add malicious code to the file without invalidating the signature. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\nIf a user is logged on with administrative user rights, an attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\nExploitation of this vulnerability requires that a user or application run or install a specially crafted, signed PE file. An attacker could modify an existing signed file to include malicious code without invalidating the signature. This code would... See more at https://msrc.microsoft.com/update-guide/vulnerability/CVE-2013-3900" }, { "lang": "es", @@ -20,6 +20,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 + } + ], "cvssMetricV2": [ { "source": "nvd@nist.gov", @@ -191,21 +213,6 @@ } ], "references": [ - { - "url": "http://blogs.technet.com/b/srd/archive/2013/12/10/ms13-098-update-to-enhance-the-security-of-authenticode.aspx", - "source": "secure@microsoft.com", - "tags": [ - "Vendor Advisory" - ] - }, - { - "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-098", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] - }, { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2013-3900", "source": "secure@microsoft.com", diff --git a/CVE-2014/CVE-2014-21xx/CVE-2014-2120.json b/CVE-2014/CVE-2014-21xx/CVE-2014-2120.json index f2a0dc795aa..0e43a02b009 100644 --- a/CVE-2014/CVE-2014-21xx/CVE-2014-2120.json +++ b/CVE-2014/CVE-2014-21xx/CVE-2014-2120.json @@ -2,8 +2,8 @@ "id": "CVE-2014-2120", "sourceIdentifier": "ykramarz@cisco.com", "published": "2014-03-19T01:15:04.007", - "lastModified": "2024-11-13T15:35:00.870", - "vulnStatus": "Modified", + "lastModified": "2024-11-14T21:42:05.887", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-11-12", "cisaActionDue": "2024-12-03", @@ -21,6 +21,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -112,16 +132,27 @@ "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-2120", "source": "ykramarz@cisco.com", "tags": [ + "Broken Link", "Vendor Advisory" ] }, { "url": "http://www.securityfocus.com/bid/66290", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "http://www.securitytracker.com/id/1029935", - "source": "ykramarz@cisco.com" + "source": "ykramarz@cisco.com", + "tags": [ + "Broken Link", + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21833.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21833.json index 2788269b609..cc411c9b3c3 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21833.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21833.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21833", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:09.090", - "lastModified": "2023-12-21T01:15:14.560", + "lastModified": "2024-11-14T21:15:07.293", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -210,12 +210,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21833", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21833", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21834.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21834.json index 1ff6e1d5265..5a9cd70a01a 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21834.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21834.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21834", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:09.153", - "lastModified": "2023-12-21T01:15:16.020", + "lastModified": "2024-11-14T21:15:07.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -210,12 +210,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21834", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21834", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21835.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21835.json index 6ba4b8972e5..bdfc343bddd 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21835.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21835.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21835", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:09.213", - "lastModified": "2023-12-21T01:15:16.160", + "lastModified": "2024-11-14T21:15:07.670", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21835", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21835", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21836.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21836.json index d050afe7b6f..7625e7e840c 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21836.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21836.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21836", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:09.270", - "lastModified": "2023-12-21T01:15:16.313", + "lastModified": "2024-11-14T21:15:07.820", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21836", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21836", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21837.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21837.json index 3eecf97cbec..dbc63b4892c 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21837.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21837.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21837", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:09.323", - "lastModified": "2023-12-21T01:15:16.440", + "lastModified": "2024-11-14T21:15:07.980", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -130,12 +130,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21837", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21837", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21838.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21838.json index bed8c40578a..2092361e864 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21838.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21838.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21838", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:09.373", - "lastModified": "2023-12-21T01:15:16.633", + "lastModified": "2024-11-14T21:15:08.083", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,20 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21838", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] - }, - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-049/", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory", - "VDB Entry" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21838", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21839.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21839.json index 308bfa21b3e..35788dd150a 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21839.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21839.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21839", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:09.430", - "lastModified": "2023-12-21T01:15:16.800", + "lastModified": "2024-11-14T21:15:08.247", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -120,12 +120,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21839", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21839", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21840.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21840.json index 98971194777..3a124632f6f 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21840.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21840.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21840", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:09.483", - "lastModified": "2023-12-21T01:15:16.927", + "lastModified": "2024-11-14T21:15:08.377", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -225,12 +225,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21840", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21840", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21841.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21841.json index c6efe1d78d9..20416d6d540 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21841.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21841.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21841", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:09.537", - "lastModified": "2023-12-21T01:15:17.100", + "lastModified": "2024-11-14T21:15:08.523", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -155,12 +155,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21841", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21841", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21842.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21842.json index 99ca0aaebe8..adbd06eb00e 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21842.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21842.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21842", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:09.590", - "lastModified": "2023-12-21T01:15:17.227", + "lastModified": "2024-11-14T21:15:08.647", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -105,12 +105,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21842", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21842", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21843.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21843.json index a09eb8fbf36..7db24de58d9 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21843.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21843.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21843", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:09.643", - "lastModified": "2023-12-21T01:15:17.373", + "lastModified": "2024-11-14T21:15:08.760", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -245,12 +245,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21843", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21843", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21846.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21846.json index 5c36b8e1563..7ed03893ba2 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21846.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21846.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21846", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:09.700", - "lastModified": "2023-12-21T01:15:17.570", + "lastModified": "2024-11-14T21:15:08.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -135,12 +135,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21846", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21846", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21847.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21847.json index 799baf63aa1..63636bbeeba 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21847.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21847.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21847", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:09.750", - "lastModified": "2023-12-21T01:15:17.770", + "lastModified": "2024-11-14T21:15:09.013", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -135,12 +135,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21847", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21847", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21848.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21848.json index 22a267e2e32..0b8dfde3813 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21848.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21848.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21848", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:09.807", - "lastModified": "2023-12-21T01:15:17.863", + "lastModified": "2024-11-14T21:15:09.140", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -265,12 +265,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21848", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21848", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21849.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21849.json index 5a9faf89eca..bada10d0143 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21849.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21849.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21849", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:09.860", - "lastModified": "2023-12-21T01:15:17.963", + "lastModified": "2024-11-14T21:15:09.307", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -215,12 +215,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21849", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21849", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21850.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21850.json index 0a28b61bea8..811c2c23131 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21850.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21850.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21850", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:09.917", - "lastModified": "2023-12-21T01:15:18.070", + "lastModified": "2024-11-14T21:15:09.447", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -265,12 +265,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21850", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21850", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21851.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21851.json index bdc7be6ea94..33df7affb99 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21851.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21851.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21851", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:09.973", - "lastModified": "2023-12-21T01:15:18.177", + "lastModified": "2024-11-14T21:15:09.597", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -265,12 +265,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21851", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21851", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21852.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21852.json index 3eec96c27d7..9ad51df0cf9 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21852.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21852.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21852", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:10.033", - "lastModified": "2023-12-21T01:15:18.290", + "lastModified": "2024-11-14T21:15:09.743", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21852", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21852", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21855.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21855.json index 36eb81def92..ac549c7221b 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21855.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21855.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21855", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:10.087", - "lastModified": "2023-12-21T01:15:18.390", + "lastModified": "2024-11-14T21:15:09.870", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -115,12 +115,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21855", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21855", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21857.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21857.json index de3ba50fa63..4e0902934aa 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21857.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21857.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21857", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:10.143", - "lastModified": "2023-12-21T01:15:18.480", + "lastModified": "2024-11-14T21:15:09.973", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -265,12 +265,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21857", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21857", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21858.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21858.json index c7bbac75b6d..ffece0600a5 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21858.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21858.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21858", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:10.200", - "lastModified": "2023-12-21T01:15:18.583", + "lastModified": "2024-11-14T21:15:10.127", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21858", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21858", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21859.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21859.json index a09b2d189a1..ecb8c1826ee 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21859.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21859.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21859", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:10.257", - "lastModified": "2023-12-21T01:15:18.690", + "lastModified": "2024-11-14T21:15:10.287", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -225,12 +225,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21859", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21859", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21860.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21860.json index e554fb13abd..3e091232ccf 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21860.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21860.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21860", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:10.313", - "lastModified": "2023-12-21T01:15:18.793", + "lastModified": "2024-11-14T21:15:10.440", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21860", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21860", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21861.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21861.json index 59cce49a9f5..afe5caa1478 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21861.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21861.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21861", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:10.367", - "lastModified": "2023-12-21T01:15:18.907", + "lastModified": "2024-11-14T21:15:10.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -210,12 +210,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21861", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21861", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21862.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21862.json index df8bcdafc61..022b28714ca 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21862.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21862.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21862", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:10.420", - "lastModified": "2023-12-21T01:15:19.007", + "lastModified": "2024-11-14T21:15:10.803", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -265,12 +265,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21862", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21862", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21863.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21863.json index d65773f848d..c2587b3d5b7 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21863.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21863.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21863", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:10.477", - "lastModified": "2023-12-21T01:15:19.117", + "lastModified": "2024-11-14T21:15:10.957", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -195,12 +195,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21863", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21863", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21864.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21864.json index b555eaa91df..388506c9a8b 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21864.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21864.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21864", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:10.530", - "lastModified": "2023-12-21T01:15:19.210", + "lastModified": "2024-11-14T21:15:11.087", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -240,12 +240,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21864", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21864", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21865.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21865.json index 7ffb99a2b7e..962b59c6498 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21865.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21865.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21865", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:10.587", - "lastModified": "2023-12-21T01:15:19.317", + "lastModified": "2024-11-14T21:15:11.240", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -180,12 +180,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21865", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21865", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21866.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21866.json index 06a82c443dd..233a0bca4da 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21866.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21866.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21866", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:10.640", - "lastModified": "2023-12-21T01:15:19.420", + "lastModified": "2024-11-14T21:15:11.380", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -215,12 +215,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21866", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21866", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21867.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21867.json index 92357e99f55..b247f5eb324 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21867.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21867.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21867", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:10.697", - "lastModified": "2023-12-21T01:15:19.513", + "lastModified": "2024-11-14T21:15:11.527", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -230,12 +230,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21867", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21867", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21868.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21868.json index 89dd7e52668..c2e31672df3 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21868.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21868.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21868", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:10.750", - "lastModified": "2023-12-21T01:15:19.600", + "lastModified": "2024-11-14T21:15:11.667", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -225,12 +225,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21868", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21868", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21869.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21869.json index 189207567c9..23f1d8062c5 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21869.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21869.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21869", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:10.800", - "lastModified": "2023-12-21T01:15:19.697", + "lastModified": "2024-11-14T21:15:11.793", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -200,12 +200,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21869", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21869", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21870.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21870.json index 11e1da97301..7af61b0e778 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21870.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21870.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21870", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:10.857", - "lastModified": "2023-12-21T01:15:19.787", + "lastModified": "2024-11-14T21:15:11.907", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -260,12 +260,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21870", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21870", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21871.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21871.json index 9807466f931..ee2fb45634f 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21871.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21871.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21871", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:10.913", - "lastModified": "2023-12-21T01:15:19.883", + "lastModified": "2024-11-14T21:15:12.033", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -211,12 +211,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21871", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21871", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21872.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21872.json index ec12a4c060d..10eacb40fcf 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21872.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21872.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21872", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:10.963", - "lastModified": "2023-12-21T01:15:19.990", + "lastModified": "2024-11-14T21:15:12.180", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -210,12 +210,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21872", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21872", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21873.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21873.json index d846e95b787..f3cc2ce1480 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21873.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21873.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21873", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:11.017", - "lastModified": "2023-12-21T01:15:20.093", + "lastModified": "2024-11-14T21:15:12.313", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -235,12 +235,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21873", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21873", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21874.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21874.json index 2490eda520e..b5c202f42b8 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21874.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21874.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21874", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:11.073", - "lastModified": "2023-12-21T01:15:20.190", + "lastModified": "2024-11-14T21:15:12.453", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -235,12 +235,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21874", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21874", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21875.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21875.json index c512627e614..756f4beeb8e 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21875.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21875.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21875", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:11.127", - "lastModified": "2023-12-21T01:15:20.280", + "lastModified": "2024-11-14T21:15:12.587", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -245,12 +245,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21875", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21875", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21876.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21876.json index 5298cf281c6..676103e1e1c 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21876.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21876.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21876", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:11.183", - "lastModified": "2023-12-21T01:15:20.367", + "lastModified": "2024-11-14T21:15:12.720", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -220,19 +220,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21876", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] - }, - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-051/", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21876", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21877.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21877.json index a8cba643fa5..8cb3c6a2245 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21877.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21877.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21877", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:11.237", - "lastModified": "2023-12-21T01:15:20.463", + "lastModified": "2024-11-14T21:15:12.867", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,19 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21877", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] - }, - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-048/", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21877", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21878.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21878.json index bf52457c4e5..3eabf0f053b 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21878.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21878.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21878", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:11.290", - "lastModified": "2023-12-21T01:15:20.563", + "lastModified": "2024-11-14T21:15:12.993", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21878", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21878", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21879.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21879.json index 9e89ba021ab..13f77479035 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21879.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21879.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21879", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:11.343", - "lastModified": "2023-12-21T01:15:20.683", + "lastModified": "2024-11-14T21:15:13.137", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -200,12 +200,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21879", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21879", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21880.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21880.json index 8b33b38d85f..6355b516d04 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21880.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21880.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21880", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:11.400", - "lastModified": "2023-12-21T01:15:20.787", + "lastModified": "2024-11-14T21:15:13.267", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -280,12 +280,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21880", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21880", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21881.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21881.json index df4dd5d14b4..94d354dfcd4 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21881.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21881.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21881", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:11.453", - "lastModified": "2023-12-21T01:15:20.893", + "lastModified": "2024-11-14T21:15:13.413", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -245,20 +245,8 @@ ], "references": [ { - "url": "http://packetstormsecurity.com/files/168097/Race-Against-The-Sandbox.html", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory", - "VDB Entry" - ] - }, - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21881", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21881", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21882.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21882.json index 3907269c6cf..cebde9dc276 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21882.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21882.json @@ -2,8 +2,8 @@ "id": "CVE-2022-21882", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:11.507", - "lastModified": "2024-07-24T16:48:20.753", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-14T21:15:13.590", + "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2022-02-04", "cisaActionDue": "2022-02-18", @@ -168,21 +168,8 @@ ], "references": [ { - "url": "http://packetstormsecurity.com/files/166169/Win32k-ConsoleControl-Offset-Confusion-Privilege-Escalation.html", - "source": "secure@microsoft.com", - "tags": [ - "Exploit", - "Third Party Advisory", - "VDB Entry" - ] - }, - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21882", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21882", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21883.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21883.json index 5216af91bfd..4fee176c77d 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21883.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21883.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21883", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:11.560", - "lastModified": "2023-12-21T01:15:21.110", + "lastModified": "2024-11-14T21:15:13.757", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -240,12 +240,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21883", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21883", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21884.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21884.json index 400f7a7921a..45c5b89b396 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21884.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21884.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21884", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:11.640", - "lastModified": "2023-12-21T01:15:21.210", + "lastModified": "2024-11-14T21:15:13.913", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -135,12 +135,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21884", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21884", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21885.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21885.json index 6ba40806c9c..e1a82b2b46e 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21885.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21885.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21885", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:11.693", - "lastModified": "2023-12-21T01:15:21.293", + "lastModified": "2024-11-14T21:15:14.033", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -250,12 +250,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21885", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21885", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21887.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21887.json index deaf24ac1cf..2b2bcea996d 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21887.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21887.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21887", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:11.747", - "lastModified": "2023-12-21T01:15:21.390", + "lastModified": "2024-11-14T21:15:14.200", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -120,12 +120,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21887", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21887", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21888.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21888.json index 02fea710918..d9d13c36b0e 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21888.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21888.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21888", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:11.800", - "lastModified": "2023-12-21T01:15:21.510", + "lastModified": "2024-11-14T21:15:14.310", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21888", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21888", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21889.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21889.json index 214f06528da..70ca99ca0b2 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21889.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21889.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21889", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:11.853", - "lastModified": "2023-12-21T01:15:21.687", + "lastModified": "2024-11-14T21:15:14.450", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -250,12 +250,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21889", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21889", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21890.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21890.json index 50b1abe19fc..5ff13c75497 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21890.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21890.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21890", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:11.910", - "lastModified": "2023-12-21T01:15:21.807", + "lastModified": "2024-11-14T21:15:14.620", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -250,12 +250,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21890", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21890", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21891.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21891.json index 885d18f07be..f252fdc10ef 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21891.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21891.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21891", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:11.963", - "lastModified": "2023-12-21T01:15:21.927", + "lastModified": "2024-11-14T21:15:14.780", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -115,12 +115,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21891", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21891", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21892.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21892.json index 596064c5e65..8d823bc0263 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21892.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21892.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21892", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:12.017", - "lastModified": "2023-12-21T01:15:22.040", + "lastModified": "2024-11-14T21:15:14.897", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -235,12 +235,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21892", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21892", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21893.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21893.json index 0b2511b423a..da54fc967fc 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21893.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21893.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21893", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:12.073", - "lastModified": "2023-12-21T01:15:22.173", + "lastModified": "2024-11-14T21:15:15.040", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -270,12 +270,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21893", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21893", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21894.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21894.json index 2e00d93e832..421f4f2482d 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21894.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21894.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21894", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:12.130", - "lastModified": "2024-08-01T13:42:32.223", + "lastModified": "2024-11-14T21:15:15.190", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -245,12 +245,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21894", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21894", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21895.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21895.json index 324ea9f72dd..d22f7872707 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21895.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21895.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21895", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:12.187", - "lastModified": "2023-12-21T01:15:22.610", + "lastModified": "2024-11-14T21:15:15.340", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -225,19 +225,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21895", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] - }, - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-050/", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21895", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21896.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21896.json index 7dff422a527..8bc0f2ca45a 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21896.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21896.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21896", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:12.243", - "lastModified": "2023-12-21T01:15:22.823", + "lastModified": "2024-11-14T21:15:15.503", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21896", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21896", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21897.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21897.json index e1c1091b43d..18a349b7d09 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21897.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21897.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21897", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:12.300", - "lastModified": "2023-12-21T01:15:23.017", + "lastModified": "2024-11-14T21:15:15.660", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -255,12 +255,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21897", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21897", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21898.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21898.json index c923eb45652..b48804db976 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21898.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21898.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21898", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:12.357", - "lastModified": "2023-12-21T01:15:23.140", + "lastModified": "2024-11-14T21:15:15.840", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -200,12 +200,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21898", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21898", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-218xx/CVE-2022-21899.json b/CVE-2022/CVE-2022-218xx/CVE-2022-21899.json index 1e9d8bd51cb..379ec04a431 100644 --- a/CVE-2022/CVE-2022-218xx/CVE-2022-21899.json +++ b/CVE-2022/CVE-2022-218xx/CVE-2022-21899.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21899", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:12.413", - "lastModified": "2023-12-21T01:15:23.280", + "lastModified": "2024-11-14T21:15:15.970", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -135,19 +135,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21899", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] - }, - { - "url": "https://www.zerodayinitiative.com/advisories/ZDI-22-052/", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21899", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21900.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21900.json index 5775418d8b9..c1dd1400353 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21900.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21900.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21900", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:12.473", - "lastModified": "2023-12-21T01:15:23.387", + "lastModified": "2024-11-14T21:15:16.090", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -175,12 +175,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21900", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21900", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21901.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21901.json index 77cc5847981..9ad5da154cd 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21901.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21901.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21901", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:12.527", - "lastModified": "2023-12-21T01:15:23.507", + "lastModified": "2024-11-14T21:15:16.220", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -185,12 +185,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21901", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21901", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21902.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21902.json index e860f5a5735..20e163fab80 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21902.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21902.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21902", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:12.580", - "lastModified": "2023-12-21T01:15:23.663", + "lastModified": "2024-11-14T21:15:16.357", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -205,12 +205,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21902", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21902", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21903.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21903.json index a192e136806..bad6070a97f 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21903.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21903.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21903", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:12.637", - "lastModified": "2023-12-21T01:15:23.773", + "lastModified": "2024-11-14T21:15:16.477", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -220,12 +220,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21903", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21903", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21904.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21904.json index 36bc24faed9..77f3f68eb64 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21904.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21904.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21904", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:12.690", - "lastModified": "2023-12-21T01:15:23.873", + "lastModified": "2024-11-14T21:15:16.620", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -250,12 +250,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21904", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21904", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21905.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21905.json index b06c4f43912..2cdcdf92675 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21905.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21905.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21905", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:12.750", - "lastModified": "2023-12-21T01:15:23.990", + "lastModified": "2024-11-14T21:15:16.767", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -195,12 +195,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21905", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21905", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21906.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21906.json index c2d619da965..1d79d7f7f7c 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21906.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21906.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21906", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:12.807", - "lastModified": "2023-12-21T01:15:24.107", + "lastModified": "2024-11-14T21:15:16.900", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -210,12 +210,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21906", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21906", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21907.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21907.json index 6bce1ffd9cf..7100e3f622d 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21907.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21907.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21907", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:12.863", - "lastModified": "2023-12-21T01:15:24.233", + "lastModified": "2024-11-14T21:15:17.050", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -175,22 +175,8 @@ ], "references": [ { - "url": "http://packetstormsecurity.com/files/166730/Microsoft-HTTP-Protocol-Stack-Denial-Of-Service.html", - "source": "secure@microsoft.com", - "tags": [ - "Exploit", - "Third Party Advisory", - "VDB Entry" - ] - }, - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21907", - "source": "secure@microsoft.com", - "tags": [ - "Mitigation", - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21907", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21908.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21908.json index 00f3b6f3811..6ff0c2af71c 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21908.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21908.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21908", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:12.917", - "lastModified": "2023-12-21T01:15:24.357", + "lastModified": "2024-11-14T21:15:17.180", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -260,12 +260,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21908", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21908", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21910.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21910.json index 5dda590ca4a..7588bc4163e 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21910.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21910.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21910", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:12.970", - "lastModified": "2023-12-21T01:15:24.470", + "lastModified": "2024-11-14T21:15:17.330", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -110,12 +110,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21910", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21910", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21911.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21911.json index 046c1ac825c..7f4f1bb9e67 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21911.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21911.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21911", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:13.027", - "lastModified": "2023-12-21T01:15:24.580", + "lastModified": "2024-11-14T21:15:17.437", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -1972,12 +1972,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21911", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21911", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21912.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21912.json index b63b0b05712..902a759c703 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21912.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21912.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21912", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:13.083", - "lastModified": "2023-12-21T01:15:24.813", + "lastModified": "2024-11-14T21:15:17.647", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -195,12 +195,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21912", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21912", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21913.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21913.json index 4bf741533bd..e474c41f902 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21913.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21913.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21913", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:13.137", - "lastModified": "2023-12-21T01:15:24.950", + "lastModified": "2024-11-14T21:15:17.790", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -280,12 +280,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21913", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21913", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21914.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21914.json index 27f6b34f83d..1910b2489b3 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21914.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21914.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21914", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:13.197", - "lastModified": "2023-12-21T01:15:25.090", + "lastModified": "2024-11-14T21:15:17.940", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -265,12 +265,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21914", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21914", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21915.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21915.json index 12261b2f755..42fd25af049 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21915.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21915.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21915", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:13.250", - "lastModified": "2023-12-21T01:15:25.220", + "lastModified": "2024-11-14T21:15:18.087", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -265,12 +265,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21915", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21915", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21916.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21916.json index f955b73afdc..9d0e0184455 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21916.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21916.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21916", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:13.307", - "lastModified": "2023-12-21T01:15:25.343", + "lastModified": "2024-11-14T21:15:18.240", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -265,12 +265,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21916", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21916", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21917.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21917.json index 108324d516e..f747669d034 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21917.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21917.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21917", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:13.360", - "lastModified": "2023-12-21T01:15:25.470", + "lastModified": "2024-11-14T21:15:18.403", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -116,19 +116,8 @@ ], "references": [ { - "url": "https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0008/MNDT-2022-0008.md", - "source": "secure@microsoft.com", - "tags": [ - "Third Party Advisory" - ] - }, - { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21917", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21917", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21918.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21918.json index e015a578fe0..0d969c46c53 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21918.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21918.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21918", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:13.410", - "lastModified": "2023-12-21T01:15:25.640", + "lastModified": "2024-11-14T21:15:18.533", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -190,12 +190,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21918", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21918", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21919.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21919.json index ab9e789fa6b..f17ec3e2904 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21919.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21919.json @@ -2,8 +2,8 @@ "id": "CVE-2022-21919", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:13.463", - "lastModified": "2024-07-02T17:03:57.950", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-14T21:15:18.723", + "vulnStatus": "Modified", "cveTags": [], "cisaExploitAdd": "2022-04-25", "cisaActionDue": "2022-05-16", @@ -201,12 +201,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21919", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21919", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21920.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21920.json index 007d00d752a..089c782105d 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21920.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21920.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21920", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:13.520", - "lastModified": "2023-12-21T01:15:25.843", + "lastModified": "2024-11-14T21:15:18.927", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -285,12 +285,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21920", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21920", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21921.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21921.json index 22465a95bea..fdba4fba8fd 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21921.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21921.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21921", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:13.567", - "lastModified": "2023-12-21T01:15:26.097", + "lastModified": "2024-11-14T21:15:19.123", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -155,12 +155,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21921", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21921", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21922.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21922.json index 1d31e0120bf..6570334a401 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21922.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21922.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21922", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:13.623", - "lastModified": "2023-12-21T01:15:26.220", + "lastModified": "2024-11-14T21:15:19.243", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -280,12 +280,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21922", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21922", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21924.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21924.json index 9a06efbf9f3..aa4995e886d 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21924.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21924.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21924", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:13.667", - "lastModified": "2023-12-21T01:15:26.450", + "lastModified": "2024-11-14T21:15:19.420", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -260,12 +260,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21924", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21924", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21925.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21925.json index 31e774b3fae..069b7ccc662 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21925.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21925.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21925", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:13.723", - "lastModified": "2023-12-21T01:15:26.577", + "lastModified": "2024-11-14T21:15:19.577", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -115,12 +115,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21925", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21925", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21928.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21928.json index bb592c6e23d..f88fd6ee77a 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21928.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21928.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21928", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:13.777", - "lastModified": "2023-12-21T01:15:26.770", + "lastModified": "2024-11-14T21:15:19.693", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -255,12 +255,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21928", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21928", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21929.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21929.json index 7c912d37010..4732752b937 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21929.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21929.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21929", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:13.830", - "lastModified": "2023-12-21T01:15:26.870", + "lastModified": "2024-11-14T21:15:19.833", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,12 +96,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21929", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21929", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21930.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21930.json index bcd718bbdbf..5b12b19778c 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21930.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21930.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21930", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:13.887", - "lastModified": "2023-12-21T01:15:26.990", + "lastModified": "2024-11-14T21:15:19.957", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,12 +96,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21930", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21930", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21931.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21931.json index 62209fb4ae6..cfe0a99f09e 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21931.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21931.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21931", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:13.937", - "lastModified": "2023-12-21T01:15:27.110", + "lastModified": "2024-11-14T21:15:20.080", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,12 +96,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21931", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21931", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21932.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21932.json index 3602d486b9a..3f75247bbb9 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21932.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21932.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21932", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:13.993", - "lastModified": "2023-12-21T01:15:27.207", + "lastModified": "2024-11-14T21:15:20.190", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -115,12 +115,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21932", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21932", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21954.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21954.json index f4ba631d1eb..a12e585852f 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21954.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21954.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21954", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:14.047", - "lastModified": "2023-12-21T01:15:27.307", + "lastModified": "2024-11-14T21:15:20.303", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,12 +96,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21954", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21954", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21958.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21958.json index 1bbf998b5f7..9a931922351 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21958.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21958.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21958", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:14.100", - "lastModified": "2023-12-21T01:15:27.537", + "lastModified": "2024-11-14T21:15:20.420", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -235,12 +235,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21958", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21958", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21959.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21959.json index 32d2c74ec21..1c7e1cd7d15 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21959.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21959.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21959", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:14.150", - "lastModified": "2023-12-21T01:15:27.680", + "lastModified": "2024-11-14T21:15:20.580", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -235,12 +235,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21959", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21959", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21960.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21960.json index 9a0a8ca6f92..1d404aa5402 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21960.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21960.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21960", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:14.203", - "lastModified": "2023-12-21T01:15:27.813", + "lastModified": "2024-11-14T21:15:20.750", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -235,12 +235,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21960", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21960", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21961.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21961.json index 26f1af1843f..bece6d382ba 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21961.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21961.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21961", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:14.260", - "lastModified": "2023-12-21T01:15:27.917", + "lastModified": "2024-11-14T21:15:20.887", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -235,12 +235,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21961", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21961", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21962.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21962.json index 1404613fb10..d21fd2861fb 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21962.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21962.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21962", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:14.310", - "lastModified": "2023-12-21T01:15:28.027", + "lastModified": "2024-11-14T21:15:21.053", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -235,12 +235,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21962", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21962", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21963.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21963.json index 3ef9a73d0d4..9554885a248 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21963.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21963.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21963", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:14.377", - "lastModified": "2023-12-21T01:15:28.250", + "lastModified": "2024-11-14T21:15:21.210", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -255,12 +255,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21963", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21963", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21964.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21964.json index 9639d576ca7..e4a7a0dafb5 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21964.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21964.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21964", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:14.433", - "lastModified": "2023-12-21T01:15:28.407", + "lastModified": "2024-11-14T21:15:21.363", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -100,12 +100,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21964", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21964", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21969.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21969.json index bb3669ae393..b5407a69c93 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21969.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21969.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21969", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:14.487", - "lastModified": "2023-12-21T01:15:28.663", + "lastModified": "2024-11-14T21:15:21.470", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -135,12 +135,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21969", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21969", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-219xx/CVE-2022-21970.json b/CVE-2022/CVE-2022-219xx/CVE-2022-21970.json index 62b5ad6378f..66ff8350d76 100644 --- a/CVE-2022/CVE-2022-219xx/CVE-2022-21970.json +++ b/CVE-2022/CVE-2022-219xx/CVE-2022-21970.json @@ -2,7 +2,7 @@ "id": "CVE-2022-21970", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-11T21:15:14.537", - "lastModified": "2023-12-21T01:15:28.763", + "lastModified": "2024-11-14T21:15:21.587", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -116,12 +116,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-21970", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-21970", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-232xx/CVE-2022-23258.json b/CVE-2022/CVE-2022-232xx/CVE-2022-23258.json index 4299e680670..e5725dce5c7 100644 --- a/CVE-2022/CVE-2022-232xx/CVE-2022-23258.json +++ b/CVE-2022/CVE-2022-232xx/CVE-2022-23258.json @@ -2,8 +2,8 @@ "id": "CVE-2022-23258", "sourceIdentifier": "secure@microsoft.com", "published": "2022-01-25T22:15:07.837", - "lastModified": "2023-08-02T17:26:03.810", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-14T21:15:21.700", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -128,12 +128,8 @@ ], "references": [ { - "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23258", - "source": "secure@microsoft.com", - "tags": [ - "Patch", - "Vendor Advisory" - ] + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23258", + "source": "secure@microsoft.com" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-53xx/CVE-2023-5388.json b/CVE-2023/CVE-2023-53xx/CVE-2023-5388.json index 1cd5c09188f..7b6c2fe049b 100644 --- a/CVE-2023/CVE-2023-53xx/CVE-2023-5388.json +++ b/CVE-2023/CVE-2023-53xx/CVE-2023-5388.json @@ -2,7 +2,7 @@ "id": "CVE-2023-5388", "sourceIdentifier": "security@mozilla.org", "published": "2024-03-19T12:15:07.537", - "lastModified": "2024-03-25T17:15:51.337", + "lastModified": "2024-11-14T22:35:01.873", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "NSS era susceptible a un ataque de canal lateral de sincronizaci\u00f3n al realizar el descifrado RSA. Este ataque podr\u00eda permitir potencialmente que un atacante recupere los datos privados. Esta vulnerabilidad afecta a Firefox < 124, Firefox ESR < 115.9 y Thunderbird < 115.9." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1780432", diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10381.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10381.json index c3955526a1e..779089fb951 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10381.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10381.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10381", "sourceIdentifier": "vdisclose@cert-in.org.in", "published": "2024-10-25T13:15:17.810", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T21:44:53.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,12 +59,44 @@ "baseSeverity": "CRITICAL" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ { - "source": "vdisclose@cert-in.org.in", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, + { + "source": "vdisclose@cert-in.org.in", + "type": "Secondary", "description": [ { "lang": "en", @@ -73,10 +105,43 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:matrixcomsec:cosec_vega_faxq_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "v2r17", + "matchCriteriaId": "555B4F91-2923-4F99-9FA5-61149CA5D1C5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:matrixcomsec:cosec_vega_faxq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9156114-135B-4378-9315-A027E36910B3" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2024-0328", - "source": "vdisclose@cert-in.org.in" + "source": "vdisclose@cert-in.org.in", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11016.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11016.json index 2bda96a696f..caabe2d2118 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11016.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11016.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11016", "sourceIdentifier": "twcert@cert.org.tw", "published": "2024-11-11T07:15:04.400", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T21:53:49.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + }, { "source": "twcert@cert.org.tw", "type": "Secondary", @@ -51,14 +61,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vice:webopac:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6", + "versionEndExcluding": "6.5.1", + "matchCriteriaId": "05F9B655-8FA4-48EC-A45C-2023F4C74AF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:vice:webopac:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7", + "versionEndExcluding": "7.2.3", + "matchCriteriaId": "A2179D8C-B827-4464-918B-5C74013AC527" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.twcert.org.tw/en/cp-139-8210-46322-2.html", - "source": "twcert@cert.org.tw" + "source": "twcert@cert.org.tw", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.twcert.org.tw/tw/cp-132-8209-bf75d-1.html", - "source": "twcert@cert.org.tw" + "source": "twcert@cert.org.tw", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11206.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11206.json index 7b669280eb3..c279c57a573 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11206.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11206.json @@ -2,16 +2,43 @@ "id": "CVE-2024-11206", "sourceIdentifier": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea", "published": "2024-11-14T07:15:17.203", - "lastModified": "2024-11-14T07:15:17.203", + "lastModified": "2024-11-14T22:35:02.177", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unauthorized access vulnerability in the mobile application (com.transsion.phoenix) can lead to the leakage of user information." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de acceso no autorizado en la aplicaci\u00f3n m\u00f3vil (com.transsion.phoenix) puede provocar la fuga de informaci\u00f3n del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea", diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23765.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23765.json index d7f72ccd5f6..0d8245ff22d 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23765.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23765.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23765", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-26T21:15:12.897", - "lastModified": "2024-06-27T12:47:19.847", + "lastModified": "2024-11-14T22:35:02.433", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Se descubri\u00f3 un problema en los dispositivos HMS Anybus X-Gateway AB7832-F 3. La puerta de enlace expone un servicio no identificado en el puerto 7412 de la red. Todos los servicios de red de la puerta de enlace dejan de responder despu\u00e9s de enviar 85 solicitudes a este puerto. El contenido y la longitud del fotograma no importan. Es necesario reiniciar el dispositivo para reanudar las operaciones." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://sensepost.com/blog/2024/targeting-an-industrial-protocol-gateway/", diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24539.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24539.json index d56e35f16a3..a437297de64 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24539.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24539.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24539", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-18T03:15:06.067", - "lastModified": "2024-03-18T12:38:25.490", + "lastModified": "2024-11-14T21:35:04.137", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "FusionPBX anterior a 5.2.0 no valida una sesi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://github.com/fusionpbx/fusionpbx/commit/2f8bed375c124c1d7e36138acc6903fcfcf15a8f", diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27230.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27230.json index 53639c5f122..4df97f01406 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27230.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27230.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27230", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-03-11T19:15:48.920", - "lastModified": "2024-03-12T12:40:13.500", + "lastModified": "2024-11-14T21:35:04.697", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En ProtocolPsKeepAliveStatusAdapter::getCode() de protocolpsadapter.cpp, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda dar lugar a la divulgaci\u00f3n de informaci\u00f3n local y comprometer el firmware de banda base. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.4, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-03-01", diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31695.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31695.json new file mode 100644 index 00000000000..73ef27483fe --- /dev/null +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31695.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-31695", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-14T22:15:15.953", + "lastModified": "2024-11-14T22:15:15.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A misconfiguration in the fingerprint authentication mechanism of Binance: BTC, Crypto and NFTS v2.85.4, allows attackers to bypass authentication when adding a new fingerprint." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://zzzxiin.github.io/post/binance/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34000.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34000.json index d099d9c8f1a..0836f38d56d 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34000.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34000.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34000", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-05-31T20:15:10.080", - "lastModified": "2024-06-03T14:46:24.250", + "lastModified": "2024-11-14T21:35:05.657", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Los n\u00fameros de identificaci\u00f3n que se muestran en el informe de descripci\u00f3n general de la lecci\u00f3n requirieron una sanitizaci\u00f3n adicional para evitar un riesgo de XSS almacenado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ { "source": "patrick@puiterwijk.org", diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39707.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39707.json new file mode 100644 index 00000000000..4d0e5e4247f --- /dev/null +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39707.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-39707", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-14T22:15:16.147", + "lastModified": "2024-11-14T22:15:16.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insyde IHISI function 0x49 can restore factory defaults for certain UEFI variables without further authentication by default, which could lead to a possible roll-back attack in certain platforms. This is fixed in: kernel 5.2, version 05.29.19; kernel 5.3, version 05.38.19; kernel 5.4, version 05.46.19; kernel 5.5, version 05.54.19; kernel 5.6, version 05.61.19." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.insyde.com/security-pledge/SA-2024007", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40579.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40579.json new file mode 100644 index 00000000000..20ecf1ebb12 --- /dev/null +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40579.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-40579", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-14T22:15:16.230", + "lastModified": "2024-11-14T22:15:16.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Scripting vulnerability in Virtuozzo Hybrid Server for WHMCS Open Source v.1.7.1 allows a remote attacker to obtain sensitive information via modification of the hostname parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://vxcyber.com/cve-2024-40579.html", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43093.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43093.json index 3f266b8c4a3..3be28428951 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43093.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43093.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43093", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:21.713", - "lastModified": "2024-11-14T15:15:17.020", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-14T21:42:34.923", + "vulnStatus": "Analyzed", "cveTags": [], "cisaExploitAdd": "2024-11-07", "cisaActionDue": "2024-11-28", @@ -21,6 +21,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -43,14 +63,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/67d6e08322019f7ed8e3f80bd6cd16f8bcb809ed", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-11-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48966.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48966.json new file mode 100644 index 00000000000..8789e45e50e --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48966.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48966", + "sourceIdentifier": "productsecurity@baxter.com", + "published": "2024-11-14T22:15:17.727", + "lastModified": "2024-11-14T22:15:17.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The software tools used by service personnel to test & calibrate the ventilator do not support user authentication. An attacker with access to the Service PC where the tools are installed could obtain diagnostic information through the test tool or manipulate the ventilator's settings and embedded software via the calibration tool, without having to authenticate to either tool. This could result in unauthorized disclosure of information and/or have unintended impacts on device settings and performance." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productsecurity@baxter.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "productsecurity@baxter.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-319-01", + "source": "productsecurity@baxter.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48967.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48967.json new file mode 100644 index 00000000000..51270dc0b18 --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48967.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48967", + "sourceIdentifier": "productsecurity@baxter.com", + "published": "2024-11-14T22:15:17.927", + "lastModified": "2024-11-14T22:15:17.927", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The ventilator and the Service PC lack sufficient audit logging capabilities to allow for detection of malicious activity and subsequent forensic examination. An attacker with access to the ventilator and/or the Service PC could, without detection, make unauthorized changes to ventilator settings that result in unauthorized disclosure of information and/or have unintended impacts on device performance." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productsecurity@baxter.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 10.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "productsecurity@baxter.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-778" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-319-01", + "source": "productsecurity@baxter.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48970.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48970.json new file mode 100644 index 00000000000..ea979a33e8a --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48970.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48970", + "sourceIdentifier": "productsecurity@baxter.com", + "published": "2024-11-14T22:15:18.137", + "lastModified": "2024-11-14T22:15:18.137", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The ventilator's microcontroller lacks memory protection. An attacker could connect to the internal JTAG interface and read or write to flash memory using an off-the-shelf debugging tool, which could disrupt the function of the device and/or cause unauthorized information disclosure." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productsecurity@baxter.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "productsecurity@baxter.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1191" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-319-01", + "source": "productsecurity@baxter.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48971.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48971.json new file mode 100644 index 00000000000..13f348dc611 --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48971.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48971", + "sourceIdentifier": "productsecurity@baxter.com", + "published": "2024-11-14T22:15:18.327", + "lastModified": "2024-11-14T22:15:18.327", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Clinician Password and Serial Number Clinician Password are hard-coded into the ventilator in plaintext form. This could allow an attacker to obtain the password off the ventilator and use it to gain unauthorized access to the device, with clinician privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productsecurity@baxter.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "productsecurity@baxter.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-319-01", + "source": "productsecurity@baxter.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48973.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48973.json new file mode 100644 index 00000000000..824f794488e --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48973.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48973", + "sourceIdentifier": "productsecurity@baxter.com", + "published": "2024-11-14T22:15:18.510", + "lastModified": "2024-11-14T22:15:18.510", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The debug port on the ventilator's serial interface is enabled by default. This could allow an attacker to send and receive messages over the debug port (which are unencrypted; see 3.2.1) that result in unauthorized disclosure of information and/or have unintended impacts on device settings and performance." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productsecurity@baxter.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "productsecurity@baxter.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1263" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-319-01", + "source": "productsecurity@baxter.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48974.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48974.json new file mode 100644 index 00000000000..93f88b35206 --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48974.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48974", + "sourceIdentifier": "productsecurity@baxter.com", + "published": "2024-11-14T22:15:18.727", + "lastModified": "2024-11-14T22:15:18.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The ventilator does not perform proper file integrity checks when adopting firmware updates. This makes it possible for an attacker to force unauthorized changes to the device's configuration settings and/or compromise device functionality by pushing a compromised/illegitimate firmware file. This could disrupt the function of the device and/or cause unauthorized information disclosure." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productsecurity@baxter.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "productsecurity@baxter.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-494" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-319-01", + "source": "productsecurity@baxter.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49376.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49376.json index 6d89e76ea5a..0d330e0dcf4 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49376.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49376.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49376", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-25T13:15:17.957", - "lastModified": "2024-10-28T13:58:09.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T22:49:50.667", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,12 +59,44 @@ "baseSeverity": "HIGH" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } ] }, "weaknesses": [ { - "source": "security-advisories@github.com", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + }, + { + "source": "security-advisories@github.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -73,14 +105,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:autolabproject:autolab:3.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3701E85A-2BE3-4080-AADD-6FBFACCFF57E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/autolab/Autolab/commit/301689ab5c5e39d13bab47b71eaf8998d04bcc9b", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/autolab/Autolab/security/advisories/GHSA-v46j-h43h-rwrm", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50968.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50968.json new file mode 100644 index 00000000000..075f1c52907 --- /dev/null +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50968.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-50968", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-14T22:15:19.900", + "lastModified": "2024-11-14T22:15:19.900", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A business logic vulnerability exists in the Add to Cart function of itsourcecode Agri-Trading Online Shopping System 1.0, which allows remote attackers to manipulate the quant parameter when adding a product to the cart. By setting the quantity value to -0, an attacker can exploit a flaw in the application's total price calculation logic. This vulnerability causes the total price to be reduced to zero, allowing the attacker to add items to the cart and proceed to checkout." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Akhlak2511/CVE-2024-50968", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51093.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51093.json index 65ec3b1f1a7..2a5a126be29 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51093.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51093.json @@ -2,13 +2,13 @@ "id": "CVE-2024-51093", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-12T21:15:14.027", - "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-14T22:15:19.993", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Cross Site Scripting vulnerability in Snipe-IT v.7.0.13 allows a remote attacker to escalate privileges via an unknown part of the file /users/{{user-id}}/#files." + "value": "Stored Cross-Site Scripting (XSS) vulnerability in Snipe-IT - v7.0.13 allows an attacker to upload a malicious XML file containing JavaScript code. This can lead to privilege escalation when the payload is executed, granting the attacker super admin permissions within the Snipe-IT system." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51156.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51156.json new file mode 100644 index 00000000000..2b121a82e21 --- /dev/null +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51156.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-51156", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-14T22:15:20.100", + "lastModified": "2024-11-14T22:15:20.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "07FLYCMS V1.3.9 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component 'erp.07fly.net:80/admin/SysNotifyUser/del.html?id=93'." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/SamParkerXd/cms/tree/main/1", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51658.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51658.json new file mode 100644 index 00000000000..a03c819a252 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51658.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51658", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-14T22:15:20.187", + "lastModified": "2024-11-14T22:15:20.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Henrik Hoff WP Course Manager allows Stored XSS.This issue affects WP Course Manager: from n/a through 1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-course-manager/wordpress-wp-course-manager-plugin-1-3-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51659.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51659.json new file mode 100644 index 00000000000..0ca8fc30aa5 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51659.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51659", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-14T22:15:20.390", + "lastModified": "2024-11-14T22:15:20.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in GeekRMX Twitter @Anywhere Plus allows Stored XSS.This issue affects Twitter @Anywhere Plus: from n/a through 2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/twitter-anywhere-plus/wordpress-twitter-atanywhere-plus-plugin-2-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51679.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51679.json new file mode 100644 index 00000000000..398a5f45daf --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51679.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51679", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-14T22:15:20.610", + "lastModified": "2024-11-14T22:15:20.610", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in GentleSource Appointmind allows Stored XSS.This issue affects Appointmind: from n/a through 4.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/appointmind/wordpress-appointmind-plugin-4-0-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51684.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51684.json new file mode 100644 index 00000000000..d98e1ec57fb --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51684.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51684", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-14T21:15:22.140", + "lastModified": "2024-11-14T21:15:22.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Ciprian Popescu W3P SEO allows Stored XSS.This issue affects W3P SEO: from n/a before 1.8.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/wp-perfect-plugin/wordpress-w3p-seo-plugin-1-8-6-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51687.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51687.json new file mode 100644 index 00000000000..9e7752389e6 --- /dev/null +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51687.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51687", + "sourceIdentifier": "audit@patchstack.com", + "published": "2024-11-14T21:15:22.353", + "lastModified": "2024-11-14T21:15:22.353", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Platform.Ly Platform.Ly Official allows Stored XSS.This issue affects Platform.Ly Official: from n/a through 1.1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/vulnerability/platformly/wordpress-platform-ly-official-plugin-1-1-3-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9832.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9832.json new file mode 100644 index 00000000000..396d033b484 --- /dev/null +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9832.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-9832", + "sourceIdentifier": "productsecurity@baxter.com", + "published": "2024-11-14T21:15:22.593", + "lastModified": "2024-11-14T21:15:22.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "There is no limit on the number of failed login attempts permitted with the Clinician Password or the Serial Number Clinician Password. An attacker could execute a brute-force attack to gain unauthorized access to the ventilator, and then make changes to device settings that could disrupt the function of the device and/or result in unauthorized information disclosure." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productsecurity@baxter.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "productsecurity@baxter.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-319-01", + "source": "productsecurity@baxter.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9834.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9834.json new file mode 100644 index 00000000000..0f583a52f15 --- /dev/null +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9834.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-9834", + "sourceIdentifier": "productsecurity@baxter.com", + "published": "2024-11-14T21:15:22.803", + "lastModified": "2024-11-14T21:15:22.803", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper data protection on the ventilator's serial interface could allow an attacker to send and receive messages that result in unauthorized disclosure of information and/or have unintended impacts on device settings and performance." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "productsecurity@baxter.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.5, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "productsecurity@baxter.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], + "references": [ + { + "url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-319-01", + "source": "productsecurity@baxter.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index abd732e98db..d133ae5559a 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-14T21:00:20.459715+00:00 +2024-11-14T23:00:33.968313+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-14T20:51:29.847000+00:00 +2024-11-14T22:49:50.667000+00:00 ``` ### Last Data Feed Release @@ -33,52 +33,62 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -269761 +269779 ``` ### CVEs added in the last Commit -Recently added CVEs: `8` +Recently added CVEs: `18` -- [CVE-2024-10394](CVE-2024/CVE-2024-103xx/CVE-2024-10394.json) (`2024-11-14T20:15:20.777`) -- [CVE-2024-10396](CVE-2024/CVE-2024-103xx/CVE-2024-10396.json) (`2024-11-14T20:15:20.917`) -- [CVE-2024-10397](CVE-2024/CVE-2024-103xx/CVE-2024-10397.json) (`2024-11-14T20:15:21.057`) -- [CVE-2024-3760](CVE-2024/CVE-2024-37xx/CVE-2024-3760.json) (`2024-11-14T19:15:06.327`) -- [CVE-2024-49025](CVE-2024/CVE-2024-490xx/CVE-2024-49025.json) (`2024-11-14T20:15:25.207`) -- [CVE-2024-51688](CVE-2024/CVE-2024-516xx/CVE-2024-51688.json) (`2024-11-14T20:15:25.810`) -- [CVE-2024-52369](CVE-2024/CVE-2024-523xx/CVE-2024-52369.json) (`2024-11-14T19:15:09.533`) -- [CVE-2024-52370](CVE-2024/CVE-2024-523xx/CVE-2024-52370.json) (`2024-11-14T19:15:09.760`) +- [CVE-2024-31695](CVE-2024/CVE-2024-316xx/CVE-2024-31695.json) (`2024-11-14T22:15:15.953`) +- [CVE-2024-39707](CVE-2024/CVE-2024-397xx/CVE-2024-39707.json) (`2024-11-14T22:15:16.147`) +- [CVE-2024-40579](CVE-2024/CVE-2024-405xx/CVE-2024-40579.json) (`2024-11-14T22:15:16.230`) +- [CVE-2024-48966](CVE-2024/CVE-2024-489xx/CVE-2024-48966.json) (`2024-11-14T22:15:17.727`) +- [CVE-2024-48967](CVE-2024/CVE-2024-489xx/CVE-2024-48967.json) (`2024-11-14T22:15:17.927`) +- [CVE-2024-48970](CVE-2024/CVE-2024-489xx/CVE-2024-48970.json) (`2024-11-14T22:15:18.137`) +- [CVE-2024-48971](CVE-2024/CVE-2024-489xx/CVE-2024-48971.json) (`2024-11-14T22:15:18.327`) +- [CVE-2024-48973](CVE-2024/CVE-2024-489xx/CVE-2024-48973.json) (`2024-11-14T22:15:18.510`) +- [CVE-2024-48974](CVE-2024/CVE-2024-489xx/CVE-2024-48974.json) (`2024-11-14T22:15:18.727`) +- [CVE-2024-50968](CVE-2024/CVE-2024-509xx/CVE-2024-50968.json) (`2024-11-14T22:15:19.900`) +- [CVE-2024-51156](CVE-2024/CVE-2024-511xx/CVE-2024-51156.json) (`2024-11-14T22:15:20.100`) +- [CVE-2024-51658](CVE-2024/CVE-2024-516xx/CVE-2024-51658.json) (`2024-11-14T22:15:20.187`) +- [CVE-2024-51659](CVE-2024/CVE-2024-516xx/CVE-2024-51659.json) (`2024-11-14T22:15:20.390`) +- [CVE-2024-51679](CVE-2024/CVE-2024-516xx/CVE-2024-51679.json) (`2024-11-14T22:15:20.610`) +- [CVE-2024-51684](CVE-2024/CVE-2024-516xx/CVE-2024-51684.json) (`2024-11-14T21:15:22.140`) +- [CVE-2024-51687](CVE-2024/CVE-2024-516xx/CVE-2024-51687.json) (`2024-11-14T21:15:22.353`) +- [CVE-2024-9832](CVE-2024/CVE-2024-98xx/CVE-2024-9832.json) (`2024-11-14T21:15:22.593`) +- [CVE-2024-9834](CVE-2024/CVE-2024-98xx/CVE-2024-9834.json) (`2024-11-14T21:15:22.803`) ### CVEs modified in the last Commit -Recently modified CVEs: `72` +Recently modified CVEs: `114` -- [CVE-2024-47446](CVE-2024/CVE-2024-474xx/CVE-2024-47446.json) (`2024-11-14T19:10:24.197`) -- [CVE-2024-49579](CVE-2024/CVE-2024-495xx/CVE-2024-49579.json) (`2024-11-14T19:24:45.603`) -- [CVE-2024-49580](CVE-2024/CVE-2024-495xx/CVE-2024-49580.json) (`2024-11-14T19:25:47.433`) -- [CVE-2024-50305](CVE-2024/CVE-2024-503xx/CVE-2024-50305.json) (`2024-11-14T19:35:16.650`) -- [CVE-2024-50634](CVE-2024/CVE-2024-506xx/CVE-2024-50634.json) (`2024-11-14T20:40:43.690`) -- [CVE-2024-50837](CVE-2024/CVE-2024-508xx/CVE-2024-50837.json) (`2024-11-14T19:35:17.623`) -- [CVE-2024-50838](CVE-2024/CVE-2024-508xx/CVE-2024-50838.json) (`2024-11-14T19:35:18.427`) -- [CVE-2024-50839](CVE-2024/CVE-2024-508xx/CVE-2024-50839.json) (`2024-11-14T19:35:19.240`) -- [CVE-2024-50840](CVE-2024/CVE-2024-508xx/CVE-2024-50840.json) (`2024-11-14T19:35:20.033`) -- [CVE-2024-50841](CVE-2024/CVE-2024-508xx/CVE-2024-50841.json) (`2024-11-14T19:35:20.837`) -- [CVE-2024-50842](CVE-2024/CVE-2024-508xx/CVE-2024-50842.json) (`2024-11-14T19:35:21.650`) -- [CVE-2024-50843](CVE-2024/CVE-2024-508xx/CVE-2024-50843.json) (`2024-11-14T19:35:22.450`) -- [CVE-2024-51484](CVE-2024/CVE-2024-514xx/CVE-2024-51484.json) (`2024-11-14T20:14:44.360`) -- [CVE-2024-51485](CVE-2024/CVE-2024-514xx/CVE-2024-51485.json) (`2024-11-14T20:06:12.627`) -- [CVE-2024-51486](CVE-2024/CVE-2024-514xx/CVE-2024-51486.json) (`2024-11-14T19:55:34.890`) -- [CVE-2024-51487](CVE-2024/CVE-2024-514xx/CVE-2024-51487.json) (`2024-11-14T19:37:53.107`) -- [CVE-2024-51488](CVE-2024/CVE-2024-514xx/CVE-2024-51488.json) (`2024-11-14T20:12:58.443`) -- [CVE-2024-51489](CVE-2024/CVE-2024-514xx/CVE-2024-51489.json) (`2024-11-14T20:12:52.027`) -- [CVE-2024-51490](CVE-2024/CVE-2024-514xx/CVE-2024-51490.json) (`2024-11-14T20:13:01.587`) -- [CVE-2024-51587](CVE-2024/CVE-2024-515xx/CVE-2024-51587.json) (`2024-11-14T20:26:14.467`) -- [CVE-2024-51588](CVE-2024/CVE-2024-515xx/CVE-2024-51588.json) (`2024-11-14T20:26:28.047`) -- [CVE-2024-51589](CVE-2024/CVE-2024-515xx/CVE-2024-51589.json) (`2024-11-14T20:26:41.497`) -- [CVE-2024-51597](CVE-2024/CVE-2024-515xx/CVE-2024-51597.json) (`2024-11-14T20:27:46.943`) -- [CVE-2024-52350](CVE-2024/CVE-2024-523xx/CVE-2024-52350.json) (`2024-11-14T20:22:24.387`) -- [CVE-2024-52351](CVE-2024/CVE-2024-523xx/CVE-2024-52351.json) (`2024-11-14T20:24:39.083`) +- [CVE-2022-21930](CVE-2022/CVE-2022-219xx/CVE-2022-21930.json) (`2024-11-14T21:15:19.957`) +- [CVE-2022-21931](CVE-2022/CVE-2022-219xx/CVE-2022-21931.json) (`2024-11-14T21:15:20.080`) +- [CVE-2022-21932](CVE-2022/CVE-2022-219xx/CVE-2022-21932.json) (`2024-11-14T21:15:20.190`) +- [CVE-2022-21954](CVE-2022/CVE-2022-219xx/CVE-2022-21954.json) (`2024-11-14T21:15:20.303`) +- [CVE-2022-21958](CVE-2022/CVE-2022-219xx/CVE-2022-21958.json) (`2024-11-14T21:15:20.420`) +- [CVE-2022-21959](CVE-2022/CVE-2022-219xx/CVE-2022-21959.json) (`2024-11-14T21:15:20.580`) +- [CVE-2022-21960](CVE-2022/CVE-2022-219xx/CVE-2022-21960.json) (`2024-11-14T21:15:20.750`) +- [CVE-2022-21961](CVE-2022/CVE-2022-219xx/CVE-2022-21961.json) (`2024-11-14T21:15:20.887`) +- [CVE-2022-21962](CVE-2022/CVE-2022-219xx/CVE-2022-21962.json) (`2024-11-14T21:15:21.053`) +- [CVE-2022-21963](CVE-2022/CVE-2022-219xx/CVE-2022-21963.json) (`2024-11-14T21:15:21.210`) +- [CVE-2022-21964](CVE-2022/CVE-2022-219xx/CVE-2022-21964.json) (`2024-11-14T21:15:21.363`) +- [CVE-2022-21969](CVE-2022/CVE-2022-219xx/CVE-2022-21969.json) (`2024-11-14T21:15:21.470`) +- [CVE-2022-21970](CVE-2022/CVE-2022-219xx/CVE-2022-21970.json) (`2024-11-14T21:15:21.587`) +- [CVE-2022-23258](CVE-2022/CVE-2022-232xx/CVE-2022-23258.json) (`2024-11-14T21:15:21.700`) +- [CVE-2023-5388](CVE-2023/CVE-2023-53xx/CVE-2023-5388.json) (`2024-11-14T22:35:01.873`) +- [CVE-2024-10381](CVE-2024/CVE-2024-103xx/CVE-2024-10381.json) (`2024-11-14T21:44:53.280`) +- [CVE-2024-11016](CVE-2024/CVE-2024-110xx/CVE-2024-11016.json) (`2024-11-14T21:53:49.530`) +- [CVE-2024-11206](CVE-2024/CVE-2024-112xx/CVE-2024-11206.json) (`2024-11-14T22:35:02.177`) +- [CVE-2024-23765](CVE-2024/CVE-2024-237xx/CVE-2024-23765.json) (`2024-11-14T22:35:02.433`) +- [CVE-2024-24539](CVE-2024/CVE-2024-245xx/CVE-2024-24539.json) (`2024-11-14T21:35:04.137`) +- [CVE-2024-27230](CVE-2024/CVE-2024-272xx/CVE-2024-27230.json) (`2024-11-14T21:35:04.697`) +- [CVE-2024-34000](CVE-2024/CVE-2024-340xx/CVE-2024-34000.json) (`2024-11-14T21:35:05.657`) +- [CVE-2024-43093](CVE-2024/CVE-2024-430xx/CVE-2024-43093.json) (`2024-11-14T21:42:34.923`) +- [CVE-2024-49376](CVE-2024/CVE-2024-493xx/CVE-2024-49376.json) (`2024-11-14T22:49:50.667`) +- [CVE-2024-51093](CVE-2024/CVE-2024-510xx/CVE-2024-51093.json) (`2024-11-14T22:15:19.993`) ## Download and Usage diff --git a/_state.csv b/_state.csv index dda0ed7a91b..38720530455 100644 --- a/_state.csv +++ b/_state.csv @@ -11997,7 +11997,7 @@ CVE-2005-0999,0,0,ecca03fc38e9f5ae3e58e3725ca38d3553d21cd1060d462173b32ea09b9c08 CVE-2005-1000,0,0,876733ec970e875daec33609ebf439cfdd17ab98e8699b5ea8b6434b457f0939,2017-07-11T01:32:28.970000 CVE-2005-10001,0,0,2693db2d9b06c7ac36b92ee416e4e3effc2afa7e0b62b3415561be1db7294514,2024-08-08T00:15:23.127000 CVE-2005-10002,0,0,dc6fd831307ffcb4928dc15e5f0d4bca55123aa5ffaf8e97bc126f60e3f9b493,2024-05-17T00:24:26.580000 -CVE-2005-10003,0,1,367ed1bdab9b1c724256e2f713521055b99a14b98489eb580101edbb999a0048,2024-11-14T19:35:58.467000 +CVE-2005-10003,0,0,367ed1bdab9b1c724256e2f713521055b99a14b98489eb580101edbb999a0048,2024-11-14T19:35:58.467000 CVE-2005-1001,0,0,15f915129c529eb106d656586fee07bf3a049367ce9223cf255e6d44dfb5abdc,2017-07-11T01:32:29.047000 CVE-2005-1002,0,0,9c4a3a87f279404d6b0eb0a64f730f2b1c061844b6065693972fceeec1e57e20,2016-10-18T03:16:25.287000 CVE-2005-1003,0,0,a961fab12b3a0362183c5cb7e641f0b1d0fc1fc8dc55e4a55bb9ee3700911bfa,2017-07-11T01:32:29.110000 @@ -61302,7 +61302,7 @@ CVE-2013-3896,0,0,2f16407b73ada215f5106e639dcd7a3a77019c2bff5360cdd75e9173d86c6e CVE-2013-3897,0,0,b72882d4e43715dd810e1a5c9b26720bf797f23fb9f46c20bf600fe2a406ffa1,2024-07-16T17:35:10.297000 CVE-2013-3898,0,0,adce080d90c6ab18e43ee5f8aeefa7f5c6eacaaeca0c2f14d949b429f34843bb,2018-10-12T22:05:15.477000 CVE-2013-3899,0,0,b949ae26d8e682596affc2c3cac842b5f50e14a7098ef4be97cbc20478609e8a,2019-02-26T14:04:00.993000 -CVE-2013-3900,0,0,dc950899a659b3adee239c3915c54c62918a55751d003f40e84fe383521f0b12,2022-11-02T15:15:43.850000 +CVE-2013-3900,0,1,48db4be12ff7c022c6cd5f59b1bd2c4a7cb0beb2ffc27a26406b2eb086f53241,2024-11-14T21:15:06.097000 CVE-2013-3901,0,0,909726abe80e061ae6e2dd321fecfa4d619bac1c32ab43350c89c79f858d262c,2023-11-07T02:16:04.560000 CVE-2013-3902,0,0,c3268eb845cc61f648c0f924f7aea32bf035b177d6afdc3b4618f8fae3570fc9,2020-09-28T12:58:30.503000 CVE-2013-3903,0,0,ba33c71cb834f29161cb041ea3ea2cb9e5593eb9759c9e34363de18a0ee9ff62,2019-05-08T22:03:15.720000 @@ -66488,7 +66488,7 @@ CVE-2014-2116,0,0,7f4c0a5a9ba818702fecf4ad94d6b79c56fa970de259bad7e52d57e6601d8d CVE-2014-2117,0,0,744be558787fc734743db5fb08a2f104e326248eca1df2541936e657776f0211,2015-09-16T19:14:51.373000 CVE-2014-2118,0,0,d9c523cd8458c23ad4f67136e8abd038df8311fabdee2ee882e82595957c6524,2015-09-16T19:15:13.013000 CVE-2014-2119,0,0,dc59e4b20e1cb6a86521df22d9afd3d7bf9a254360551160345301637ac028ed,2018-10-30T16:27:22.513000 -CVE-2014-2120,0,0,ce1677e694d6686cadce37384537bbc99d0e017b1045af9565a3bb98f4ea42b3,2024-11-13T15:35:00.870000 +CVE-2014-2120,0,1,a9c84b0dcdd4ff9ca132b45c887300392f2ef0f000f8177de7fc0fecc84ea9fd,2024-11-14T21:42:05.887000 CVE-2014-2121,0,0,4afd2d28e42c18f0900f208743e465831fa3c8ab3ebc9ca414773139091c6201,2016-09-07T18:12:06.607000 CVE-2014-2122,0,0,dbb6dbf5774baace51218f4cf4f2a00e09f23a90b7e8640df5ad1439a89ab10a,2017-08-29T01:34:29.327000 CVE-2014-2124,0,0,3586bbe7c97b507b4cf47d1d50fb4baf8f4a4def2f13cc87faaf14b676b4a63c,2017-08-29T01:34:29.390000 @@ -191219,110 +191219,110 @@ CVE-2022-21829,0,0,5bf1c323a8248797317c75ce84b3d683c9a78e64388afadd21198f03f9d0b CVE-2022-2183,0,0,3ae31a55cd0ed3c5e6f025ae104894c95e10dc39dab33d432320c91ac3b90fe4,2023-11-07T03:46:16.460000 CVE-2022-21830,0,0,b00ae084fefaeb5672b2fbb1d332ec872e45ed4440b4241d09d763403dbbb380,2022-04-08T19:55:43.887000 CVE-2022-21831,0,0,b9a911088767b6f4c9dc6327d7519c33e7f2a79ee11cf547319713274bb098a8,2023-03-14T08:15:12.423000 -CVE-2022-21833,0,0,f16f59cbddb92e733112f74e55763884e13fbd0c9756a3a982fcc739d5de06d6,2023-12-21T01:15:14.560000 -CVE-2022-21834,0,0,3be321665fb67ef28259308c426f9133adf32e9fbd00fb061f02007fc3381a45,2023-12-21T01:15:16.020000 -CVE-2022-21835,0,0,15398a6111c438bc0073150620af07d80b55d445d95b014f24cd50b02c7b2b8c,2023-12-21T01:15:16.160000 -CVE-2022-21836,0,0,1d9f3c0501fab67923c907b18e3d01179812375681e6c251dd18ab3c24077440,2023-12-21T01:15:16.313000 -CVE-2022-21837,0,0,ed823e3b85d9ca966e4bc084d8c69355c1d79f7863f2ff16e3d43cf2489dc2c3,2023-12-21T01:15:16.440000 -CVE-2022-21838,0,0,d691b2f5c75fd33687bfb0262fde3f437f4cf8698719c61b160099d19d496f75,2023-12-21T01:15:16.633000 -CVE-2022-21839,0,0,8f6c19f58c16924e1393d457aa0f1d9cd5893501ec726425ef50ebd17ef21f51,2023-12-21T01:15:16.800000 +CVE-2022-21833,0,1,e123e62f08a97ec5059231b18a2d92e725a0e0097722a66c6a7801153ce4f8af,2024-11-14T21:15:07.293000 +CVE-2022-21834,0,1,c47ecec00c87c5f685d1a21e9537c5859ea72ddec92757fa19bed598ddd288c6,2024-11-14T21:15:07.510000 +CVE-2022-21835,0,1,661ddc5d8b17b7019692b13ad6652e92bf9997015f5df93f760304e0aefeeb70,2024-11-14T21:15:07.670000 +CVE-2022-21836,0,1,43269666ef5793d560cad1ae329cc83bc0e0d9c16f22a83b61415c66a799e1f3,2024-11-14T21:15:07.820000 +CVE-2022-21837,0,1,436af2f7578dc3ddc80537e6477a3482c2185b5a1cbc6c5f1184299fb34fdac7,2024-11-14T21:15:07.980000 +CVE-2022-21838,0,1,bffe5a197280424902f3820c95d945e74b8e03442709354c25f9ad07cbe3fb6a,2024-11-14T21:15:08.083000 +CVE-2022-21839,0,1,f9203e355647232aa980e47ba8de2b3a647c558bf01361c2638d2904bd3918e8,2024-11-14T21:15:08.247000 CVE-2022-2184,0,0,a2aa5a13639178f1e3424c6fc6925f48a776d4a592f86f2a5aacb759d204d308,2022-08-05T22:27:24.233000 -CVE-2022-21840,0,0,7efa29947a9abbee7ceca321accb22177e1853947957d37c4ddfec3387cfd2c3,2023-12-21T01:15:16.927000 -CVE-2022-21841,0,0,9ed971ea1be53d4a15e9df21b49e1b8fbcaa44e272c40197e4188fe763f840d8,2023-12-21T01:15:17.100000 -CVE-2022-21842,0,0,e5e7436eaaf60dbce8f389c2989abc4a72bdf63354216e451e3fde4bf56f8be2,2023-12-21T01:15:17.227000 -CVE-2022-21843,0,0,a167768086710d604d0fbce26d987a2f2fa2f8c91b1f17e01b225fdc8604c78b,2023-12-21T01:15:17.373000 +CVE-2022-21840,0,1,2f556b1655cd95ff985770b888b38f8a4d1ab84779aa659c188a58827123973c,2024-11-14T21:15:08.377000 +CVE-2022-21841,0,1,95c39e32e36bacbeb7aa215b24a655308ec9c0f4c4d2f4864d238a8abcd64d53,2024-11-14T21:15:08.523000 +CVE-2022-21842,0,1,6929c23c391cb21feb8f7b72587074743ca605dc042dedf8b616321b2d3d1a4f,2024-11-14T21:15:08.647000 +CVE-2022-21843,0,1,b17184bf17cf893bcd88e78738639fa97b1ec22b893017b708bbd6732ffeefc1,2024-11-14T21:15:08.760000 CVE-2022-21844,0,0,8546c3e47dff4da30b751fb0dc4648124955b89876d8c90c9bf3fbbb8d4621f5,2023-06-29T05:15:09.313000 CVE-2022-21845,0,0,fdafd128729839f707e73078c0b7b323c88416fbb14c7e46113b518a9319bf19,2023-08-08T14:22:24.967000 -CVE-2022-21846,0,0,0a58def7bbb43c910c043414b17eb45d33ee4d2ab0f366f5293caea292deb840,2023-12-21T01:15:17.570000 -CVE-2022-21847,0,0,d401844321febdbebc514677181e00f20676e60fa565549e23b0313ac23ccd4c,2023-12-21T01:15:17.770000 -CVE-2022-21848,0,0,9968589863e102ce7f4994f7f172c2c1e3ba0adb71b56a785f81bfc5e627bf3e,2023-12-21T01:15:17.863000 -CVE-2022-21849,0,0,538113781d990caa69f07d638bda85f0a237d04036294501eca6b751a75f34a1,2023-12-21T01:15:17.963000 +CVE-2022-21846,0,1,c8e6658e711f7312779662cf21124286467e88613a9be02858a695f7168dca00,2024-11-14T21:15:08.910000 +CVE-2022-21847,0,1,0ee9d81c61be86865276d4289c459ce80c8727574b1214b1efc25c87418c0237,2024-11-14T21:15:09.013000 +CVE-2022-21848,0,1,cf6003957a6724292e3816c835beeaff31df60d22b04bc2d76728e4eb57691cc,2024-11-14T21:15:09.140000 +CVE-2022-21849,0,1,b1e66e55521ae42fe8e86598cc390e896ca7caa070057606182778dd72909f46,2024-11-14T21:15:09.307000 CVE-2022-2185,0,0,5588759ddf347dade7b0667df984fec2471ee3dd452adb3ad04a7de780435fe6,2023-08-08T14:22:24.967000 -CVE-2022-21850,0,0,cb1ae742ddadbda4c068f2c35e4a5861e81e4c3b2d4efb9690eef787f3c3f8a7,2023-12-21T01:15:18.070000 -CVE-2022-21851,0,0,0ac725d7895b552ad67785b27ad6bfc8cc185ecc5e8324bc517c0241d13bf02c,2023-12-21T01:15:18.177000 -CVE-2022-21852,0,0,2dc34c5b23916800f13b2eedd93c574147cbabb6e37bf18ade5a7362d390bf5e,2023-12-21T01:15:18.290000 -CVE-2022-21855,0,0,318a63669c9bd81db39b70793fa2b851027f139ecf08d0e1007f40109d32f3d1,2023-12-21T01:15:18.390000 -CVE-2022-21857,0,0,eebade4dbcb00aac0245a00cfcfea4d67218d3705767d22c6a33f8e622892065,2023-12-21T01:15:18.480000 -CVE-2022-21858,0,0,8f4efdbecc00579f3476d656ead3c60c4a7b6e6b38e56e3a9347e40d21def879,2023-12-21T01:15:18.583000 -CVE-2022-21859,0,0,c3ad14dca0f2a3c3ae7e1e2b05928ac8bae26fc4e2c18a8287724e79bd7289f3,2023-12-21T01:15:18.690000 +CVE-2022-21850,0,1,f11af5b21ea345e7391a35d7a74498b36037662fefadff77cec4eac538fcddeb,2024-11-14T21:15:09.447000 +CVE-2022-21851,0,1,a4ba346ea497a32547e9fa9d380dbe0b1804069db3fb693dfd172c9b9326bee0,2024-11-14T21:15:09.597000 +CVE-2022-21852,0,1,884b36569f9be219c196ac494716bb80980e8bb3b8b206a3c6e4f38a2b4037ec,2024-11-14T21:15:09.743000 +CVE-2022-21855,0,1,40e8668333615b3483a701fb83541d1edab334ea3f9dd74360d020f6c5d93eb3,2024-11-14T21:15:09.870000 +CVE-2022-21857,0,1,a0b3d3807900ef0d8f9e7a95d12bab41da4277944e42e5d6449bc19803e23e70,2024-11-14T21:15:09.973000 +CVE-2022-21858,0,1,a8d3a011f0466da3f1d000d6110cc3f85c03dcec59b436859c646ca403773fa0,2024-11-14T21:15:10.127000 +CVE-2022-21859,0,1,b0102ff8b624fff6124cbd183a8d85b417b59c6f426ee69a05188b553f4d74f8,2024-11-14T21:15:10.287000 CVE-2022-2186,0,0,c8076b32831e16dc809930af54f548fab368831219108c017c743a0371a74e5f,2022-07-18T10:37:42.227000 -CVE-2022-21860,0,0,d36dd2cd7daf67ceece0169959b1cab07c1e672d7494a9af94a4f07d5a67a8de,2023-12-21T01:15:18.793000 -CVE-2022-21861,0,0,fe166899d16cf311645d25da7f2e877afc2adfe928b9531051ad261da3bfddbe,2023-12-21T01:15:18.907000 -CVE-2022-21862,0,0,e9380a12370d08a880367ff6d2f4434a4834a7f649225eda97a60f05614e1d4f,2023-12-21T01:15:19.007000 -CVE-2022-21863,0,0,51d428011cd1eada1090eee445b523c4def4efcea258de7046f301a856fb1952,2023-12-21T01:15:19.117000 -CVE-2022-21864,0,0,98ba9228b1a777c883fd12b73ee90e5cc9d2a22ae32308570466d12ef2923bda,2023-12-21T01:15:19.210000 -CVE-2022-21865,0,0,68147d7209ee076fbaf69449c32d09cb85941b13f0d1ad180fbdf3ef0af2ddce,2023-12-21T01:15:19.317000 -CVE-2022-21866,0,0,50743fb393bcdb7ca0b0bd499e903e205a9e49cfa035b521eebca57e2758022b,2023-12-21T01:15:19.420000 -CVE-2022-21867,0,0,8515dd81fbead08e7823bcdaeaaf796d792f88e9e301caf27c7db480660ba195,2023-12-21T01:15:19.513000 -CVE-2022-21868,0,0,b09e55410fe0bfa83bcd0d0e2176829ca1ffbd6312fb3730119ad4813c5d9147,2023-12-21T01:15:19.600000 -CVE-2022-21869,0,0,849fab5455885b8b67ff868ac0add0dec1c1fee68022436a8f8cd67cc839add5,2023-12-21T01:15:19.697000 +CVE-2022-21860,0,1,84158e85d90826f1ec6a45f249c2107a02a655ec5892789321e0d77f79c31c91,2024-11-14T21:15:10.440000 +CVE-2022-21861,0,1,9fe22dac94ee6fb486bcc8d788117ab87fe396df5b937d505159de1fa080fd8a,2024-11-14T21:15:10.650000 +CVE-2022-21862,0,1,2749de90a89cd83bd021c9679c2f258cb8f26d9f585bee2f3331abad2a531776,2024-11-14T21:15:10.803000 +CVE-2022-21863,0,1,90c89306f96080c0a83bbef58d07649182cf95f94157961c536989861971da77,2024-11-14T21:15:10.957000 +CVE-2022-21864,0,1,9903169e012f711f96147577b5969e63b9930d9ceaa26cc0e8457cb4d176c033,2024-11-14T21:15:11.087000 +CVE-2022-21865,0,1,01413d54071fac4d09d6e8ef3f955896af4b0c06c120817418bcdb0e8d6cca7f,2024-11-14T21:15:11.240000 +CVE-2022-21866,0,1,148ca4f2040b9a3f9d5fda2d0a1b2f51faa88a91b7d437d62d2fb2d37182f72b,2024-11-14T21:15:11.380000 +CVE-2022-21867,0,1,14705a818eba065f492b7708166ad0169f5144456a1aaa0b94217846aeab6a4a,2024-11-14T21:15:11.527000 +CVE-2022-21868,0,1,210dcb0f6e39e5b56b9ee30e7b5916886cd5ca4b4272aba8ad8870e410e895aa,2024-11-14T21:15:11.667000 +CVE-2022-21869,0,1,6690a4b8a55d38a1af0c044acd9f35b0d25365187224ab18ab83c92f91424e31,2024-11-14T21:15:11.793000 CVE-2022-2187,0,0,2fb832cddbec194fd664697667b03a861459aabf169d3d51ad090820be5b9f4b,2022-07-18T10:37:00.777000 -CVE-2022-21870,0,0,58fc9919565eed40d6618718668f23e026ef9de0f1ca04cf6beab3401adfdb6e,2023-12-21T01:15:19.787000 -CVE-2022-21871,0,0,6fb0ab8d0273d10b012c9a2ca0e0c6b8f4ecfb24ded8a89256fd2437c9813dde,2023-12-21T01:15:19.883000 -CVE-2022-21872,0,0,ec4e65ab68b2817d2189b8d6d0adef56a9fbee78e082f42b3b173536fc29e99a,2023-12-21T01:15:19.990000 -CVE-2022-21873,0,0,49136d04de09501964b2165dd6f33f5d5fc7407460725ab76a9fe9eba7c4bd9f,2023-12-21T01:15:20.093000 -CVE-2022-21874,0,0,2c2957718155e2980039411f2c59238d5ea648cb2890aa432cb96ad6aa266a70,2023-12-21T01:15:20.190000 -CVE-2022-21875,0,0,48d37a68e1c94649e36f20cff3be09c4c5d8b0312d064c1b46d3d44f3753bd35,2023-12-21T01:15:20.280000 -CVE-2022-21876,0,0,b41dcfe3a3378dee5d69da3ccde6391b2bcf783eeb9505046776c8f8e426485f,2023-12-21T01:15:20.367000 -CVE-2022-21877,0,0,6275598ed2d26357025da6c4b7ee639576c86649286edb39d7d139a734c57efe,2023-12-21T01:15:20.463000 -CVE-2022-21878,0,0,b41fded781ea5b0cf4d506e01ac162daba7cb85695c9855c53c7c5c497c02bc2,2023-12-21T01:15:20.563000 -CVE-2022-21879,0,0,ff10478b137844addef54a37aff3ef6f71272cad209e9e87da434fcabbbd14f4,2023-12-21T01:15:20.683000 +CVE-2022-21870,0,1,e3816a094fcdad2dc39c8c75c33a784ac6d79e5ba8acbb9af30fb19d24b888d9,2024-11-14T21:15:11.907000 +CVE-2022-21871,0,1,5cf9034bd624e865a4fdca6425d9a7471d91208e58524168d02f583e9905fe45,2024-11-14T21:15:12.033000 +CVE-2022-21872,0,1,d2b5c165d6c4c5cdcefbc791a769c003f40479ce79f48ad811876b65eb257e3c,2024-11-14T21:15:12.180000 +CVE-2022-21873,0,1,2a3134b34c8168a60d65c60ddf053d1b8b2394135b9052dc2e6441b3fe0674fe,2024-11-14T21:15:12.313000 +CVE-2022-21874,0,1,c238257e54cc4d321b4eebc088216e5803224b873cefb8c509eff62453084fc6,2024-11-14T21:15:12.453000 +CVE-2022-21875,0,1,20602a1e29da7817c825c279b53532aaa89c49e578558a8fef7f221cd6705a10,2024-11-14T21:15:12.587000 +CVE-2022-21876,0,1,4613bf99d22506c695fa51782c9177e4fe8cc36ce4d47005136a9cd090d11b05,2024-11-14T21:15:12.720000 +CVE-2022-21877,0,1,b0e042afb14d3ce430652d0d07d4b9c3a3f27f9d45ce4419bfdd23ccd49e5971,2024-11-14T21:15:12.867000 +CVE-2022-21878,0,1,fd88b8d0b917e0bd2762066b2688b998e3de17f093c57d1b65d33b8b2016afec,2024-11-14T21:15:12.993000 +CVE-2022-21879,0,1,b80571e02e45b4c3bc6fa1ec4c41715878dbab32c3cc02c5d5aa57f8c121e608,2024-11-14T21:15:13.137000 CVE-2022-2188,0,0,55d3398b17c8580970a402b3138b19fbf105bc319e31fecf24a3789446c85770,2023-11-07T03:46:16.607000 -CVE-2022-21880,0,0,3e4bce6dbe10e720568d4cd6170bc597b091365cc6215ef549f240fc7fdfb9dc,2023-12-21T01:15:20.787000 -CVE-2022-21881,0,0,faa7bc7865e63c9c2138161e7ff86fb6bfa7b9b85fd878fbcade9eeca8822d86,2023-12-21T01:15:20.893000 -CVE-2022-21882,0,0,7cdb0a1ed548284b4379b35a0f0519645f7067e1efe888e384bd178e2a99d400,2024-07-24T16:48:20.753000 -CVE-2022-21883,0,0,ef75141eb63acbee76c00f255783bc90261ceb27b41574c978cd7f1bf71a6c8c,2023-12-21T01:15:21.110000 -CVE-2022-21884,0,0,9c4bc11382b71b55140ef262a8369dcafcf999d99dc21fb170cc829e75d2edae,2023-12-21T01:15:21.210000 -CVE-2022-21885,0,0,ea24b3565fd7074dbed52d3fbd3199588b3a763082d097c5af22ca4251de7c43,2023-12-21T01:15:21.293000 -CVE-2022-21887,0,0,e73024f1f78f8eb833aa1f72daacdd5cf49cc29a3d477569633d590a273cde54,2023-12-21T01:15:21.390000 -CVE-2022-21888,0,0,e031e4f302b87e57952cc77de73720b4878d4ad59c7fa899181aab56d99072bd,2023-12-21T01:15:21.510000 -CVE-2022-21889,0,0,77d6762379cf20cf1daf0c023b57558a3c7efc181e0b4a0ffcd32ef26ffb602a,2023-12-21T01:15:21.687000 +CVE-2022-21880,0,1,291621ef85ecd1019b86f86cb4969733e4105e27c85639aaa97536fe96f54759,2024-11-14T21:15:13.267000 +CVE-2022-21881,0,1,d77a4cb00d202cd2aaa4cccc2d7a26120d1f5e676e87acd6db156de620f89f4c,2024-11-14T21:15:13.413000 +CVE-2022-21882,0,1,206c7272c8c7267a828073182bc732487ac2fcd1d72b705fa396e322e274672a,2024-11-14T21:15:13.590000 +CVE-2022-21883,0,1,5026326689733caed3be4860695075313a3399d1989a0ca93427982eff2d0932,2024-11-14T21:15:13.757000 +CVE-2022-21884,0,1,02410fb143314217c18457c2c0a8c4c1fd5aa4619687bf5c3a1db4c13912f90b,2024-11-14T21:15:13.913000 +CVE-2022-21885,0,1,336986904607e485c8f0fab2e3f60eba916e67195be8494ceed55d04efc9dac6,2024-11-14T21:15:14.033000 +CVE-2022-21887,0,1,8cc9d2c5aab9a1478a34e425d72245b4d83259e81da7c9dc8d871f9be0ae148a,2024-11-14T21:15:14.200000 +CVE-2022-21888,0,1,2b1499d2affbaf7493e58ec1180a5cc797489b31819b38ba2751a41c6ee957d3,2024-11-14T21:15:14.310000 +CVE-2022-21889,0,1,f5d1dab5be89146da58c17eaeecfed5a331e5755635d32f449c91edb438ea8fb,2024-11-14T21:15:14.450000 CVE-2022-2189,0,0,71145a8a521c2e03cdea9479d8a43b068b861eb8710c343b00e20c5293f45998,2022-07-29T15:57:51.297000 -CVE-2022-21890,0,0,38eb8b403e97a68ab1047293ba9d2a468a82d9acb7d7eeef83380d3c2bae3070,2023-12-21T01:15:21.807000 -CVE-2022-21891,0,0,35bfb5e2cfb208e109b287b2edd277d7b903a6399b66dfd6e5f4bd9aad6e5a7d,2023-12-21T01:15:21.927000 -CVE-2022-21892,0,0,9bc3dba70e61496813b9092c184f9350f23abd44e53dd78a64c4abc23ce99462,2023-12-21T01:15:22.040000 -CVE-2022-21893,0,0,eb4034bdd95651c96b47ee9074e1f7dad0620b10690b9b1569187da096fa133e,2023-12-21T01:15:22.173000 -CVE-2022-21894,0,0,af493f05907909eec3b640b085e18e52e184fbe9c259133b2f25171b89c98233,2024-08-01T13:42:32.223000 -CVE-2022-21895,0,0,5b824406cc302075779348ea2b22099e494f2cc88ede519a576306dd25209b62,2023-12-21T01:15:22.610000 -CVE-2022-21896,0,0,3fe7cb0584be031df72e264ee5b68fd188a61fcf400c0c5f6ad8f9df02a58c0b,2023-12-21T01:15:22.823000 -CVE-2022-21897,0,0,a66f9704552b4ad9e63a76d038f0d6e77ed83e169bf2619901fc3cd3dce65e57,2023-12-21T01:15:23.017000 -CVE-2022-21898,0,0,1a261a3df676da1e3c43adafc15a0fa368e0e859be003305f6a79c710ec15b5f,2023-12-21T01:15:23.140000 -CVE-2022-21899,0,0,e73ddbb2882383dbeaf9b4b5820b7f18119bb286d0f8af78f9cd7dce0c4c3be2,2023-12-21T01:15:23.280000 +CVE-2022-21890,0,1,7b6191c45678571cea1044dda8de65bd6c1be1bc4f287830dfd5c51a871fe285,2024-11-14T21:15:14.620000 +CVE-2022-21891,0,1,4cba0d186b6a2a833ba58643b25fa5cf6c575fcfbd041a642804160937261b24,2024-11-14T21:15:14.780000 +CVE-2022-21892,0,1,3c921d4919947c61b8f2c3ccf18c956349890143a4e2b2714275557ed0823444,2024-11-14T21:15:14.897000 +CVE-2022-21893,0,1,f745220c039fd6561d6fc72a6e4d63a93f58a5d36979557c5d05644843d1fe89,2024-11-14T21:15:15.040000 +CVE-2022-21894,0,1,67c903fe36b9445af513ae5c39637760e0af3116c1c4290f28913bc3d8cd1ca4,2024-11-14T21:15:15.190000 +CVE-2022-21895,0,1,2f6cfbc69a369477a7ea9a37aaf067abc74f907c091f7ed654a3378703571c93,2024-11-14T21:15:15.340000 +CVE-2022-21896,0,1,b914468b2fc6a74ad178bc48187535239c596e023fa8a8f861dce05e4d9524a0,2024-11-14T21:15:15.503000 +CVE-2022-21897,0,1,1492c383a05388b4916d54aee738088858c07cc97fc9a09d8789bd7b06a4ddec,2024-11-14T21:15:15.660000 +CVE-2022-21898,0,1,3b709ec64c9ffc4f6288d4f0a941debc8039ceac20d17c107aa4c2bc13a34a3b,2024-11-14T21:15:15.840000 +CVE-2022-21899,0,1,b91f26758afafb6e2b51929f07259a1500404d7e9a3ac67d9c933a53eacd47f1,2024-11-14T21:15:15.970000 CVE-2022-2190,0,0,cb029725df50fd61b27524b1fbc5449cb5920741afeef7a245abcb0ef2ea921f,2022-11-01T14:03:56.393000 -CVE-2022-21900,0,0,aeead30d8dd4a05b9cafb0fb3c2f4ab9213e036e32ea45d186c9959c369512f5,2023-12-21T01:15:23.387000 -CVE-2022-21901,0,0,4ff39ec898e828a908cfb392308bc76f67bcb8edeabb6b3b41924e8c46d05bdb,2023-12-21T01:15:23.507000 -CVE-2022-21902,0,0,4aa0999d6ea03dd7ee4f8115462ec87dbf7c198838bafd06ebdea75cf7bfb1b4,2023-12-21T01:15:23.663000 -CVE-2022-21903,0,0,b54d47b15f754b6159aac37313120f4cd6081fba85490eac1f0f6f5464ca179d,2023-12-21T01:15:23.773000 -CVE-2022-21904,0,0,8b28b090a7d8b9b8b96a3d39cb9901e5fe546a30334ba89780af9d8c72c29d5a,2023-12-21T01:15:23.873000 -CVE-2022-21905,0,0,13c1e712c5981c65ee9970f9cacbad4513f3b13e4bc3b71171c434ab77f36b5c,2023-12-21T01:15:23.990000 -CVE-2022-21906,0,0,398ed57ff8d954f36817056b6ce0f8d1895937ba5eaf97a33b2e4a098e94a34d,2023-12-21T01:15:24.107000 -CVE-2022-21907,0,0,dea01587f760096e588743bfe76ce82c06c477301636f6d5ddaed8dfd4a07598,2023-12-21T01:15:24.233000 -CVE-2022-21908,0,0,b10fd8ecc8a75d8ea9c3b35c141afd01f87c9c3cfa4a70c9c22f91b33f851e5a,2023-12-21T01:15:24.357000 +CVE-2022-21900,0,1,88ceba776cb08f9c33b37f7a830298bf97d6bb06d25b65d2e8985b287a8e5112,2024-11-14T21:15:16.090000 +CVE-2022-21901,0,1,af89d0c597d17ebe9e44bd16bff9b2a09db75d77d92c75846e9b3c21343a02b3,2024-11-14T21:15:16.220000 +CVE-2022-21902,0,1,e5bd1bfaeb5b56017708c4ceaff2255bcaa2b1155becd80cb1413eb72795ad16,2024-11-14T21:15:16.357000 +CVE-2022-21903,0,1,5f8552a5505b9031218ce9cfe6899a46705f5145d29ee516cd0c2f6e9bcfd25b,2024-11-14T21:15:16.477000 +CVE-2022-21904,0,1,cfef4dfbb3321efd8700c8b143ba3166edbbe66c7c26b85255a255cd57c1861e,2024-11-14T21:15:16.620000 +CVE-2022-21905,0,1,487bb382e0189816792da8a8e427b828283594e41e1b28292978da4f1cd62d08,2024-11-14T21:15:16.767000 +CVE-2022-21906,0,1,7e8a7d5515e44414bd39ac1d38f152004907d3e5ebeb10b2642d83bf48bcf27c,2024-11-14T21:15:16.900000 +CVE-2022-21907,0,1,fbeead8dee16ac92c16af66a5563467d65328edecb822cba3ddc82565f6d86d2,2024-11-14T21:15:17.050000 +CVE-2022-21908,0,1,d26f69c0d20d321eb6f961363b3204f53392be79ff29d357bfdae05290e3d2d3,2024-11-14T21:15:17.180000 CVE-2022-2191,0,0,debbb90ae34511dd3a0db34f1bf32278033a2fa949888e54710c2a9eb0bd1416,2022-09-23T16:30:23.470000 -CVE-2022-21910,0,0,d17009eba5057bb15ff82ecee346579b6f11cf20154dfc12d10bbfc90ce4b50c,2023-12-21T01:15:24.470000 -CVE-2022-21911,0,0,43d299594fc9670c3630e37c342fdaf2976111911019392ef56063f5bb99cc66,2023-12-21T01:15:24.580000 -CVE-2022-21912,0,0,e957cc0ef197fb15556b45006fc6ccd4f61759de0db8bb0b5b0727a63f7fdab0,2023-12-21T01:15:24.813000 -CVE-2022-21913,0,0,d717f3bf1022c8fabed2ae6555ab265e6205c8422ebaf2ae92278b1c6401b28e,2023-12-21T01:15:24.950000 -CVE-2022-21914,0,0,7c62f28363eda0808fe7f642acf9bca36079c100f720a73f91ed023e5b60cf42,2023-12-21T01:15:25.090000 -CVE-2022-21915,0,0,bb04cefc497e8df7716c23ed64d3c2b7792de18f12c7b3a6c032e7e52de0b326,2023-12-21T01:15:25.220000 -CVE-2022-21916,0,0,a99092814dfd18a5d9ff86a3a7e564c2cd009e417297c817a78b8de7baf2a478,2023-12-21T01:15:25.343000 -CVE-2022-21917,0,0,df5b3e2bb46086c6cb30961563699390cd64b922e75e6c5ad94805bcb4adeb97,2023-12-21T01:15:25.470000 -CVE-2022-21918,0,0,845c86ba6cd44df0f9d3556d0bb7e7b23a654ef44a0080ed8bf7480c9a0a59bf,2023-12-21T01:15:25.640000 -CVE-2022-21919,0,0,97c2d42c0163a4d392c499da18d85ffa5f8644ddcbd04d972636fd264711f8bc,2024-07-02T17:03:57.950000 +CVE-2022-21910,0,1,856a0360a987f35fa1f2f0d2fd63ec444a7fe175f00824c97f89934344b0e88d,2024-11-14T21:15:17.330000 +CVE-2022-21911,0,1,7203b5c2f70166a923569e651f9a4b48d5be5d9ab184f0e57a56360c66dddfeb,2024-11-14T21:15:17.437000 +CVE-2022-21912,0,1,ef9831de64dc785f3d8d3d2faf29c07bc0e9d94b713a1ab2b0da97abb6cb88ce,2024-11-14T21:15:17.647000 +CVE-2022-21913,0,1,8a48720834b09ea2a17141f899a1bb3d02548e295a222a7abc7a18bcd15237e6,2024-11-14T21:15:17.790000 +CVE-2022-21914,0,1,f030e55f8bac79c08f6d02e7a4f8fc35ffa7338de9a3f8b36a5f1d0fee546eeb,2024-11-14T21:15:17.940000 +CVE-2022-21915,0,1,412f473c876d5413c82bb33406d924797bf5f9904cce39a1af57a204d534628c,2024-11-14T21:15:18.087000 +CVE-2022-21916,0,1,9679c658551086dbc3cb9abe43d1f6925b622c73df732e23cf30fbb0ec907bca,2024-11-14T21:15:18.240000 +CVE-2022-21917,0,1,8d972592ce7c74763004b2445e4570f851a5ddf3b05f3882b45aaa3f6f9247f8,2024-11-14T21:15:18.403000 +CVE-2022-21918,0,1,253fe40c009402fe3b7cf678ddff57641f6a3bdb714317a50bbec45230f4c336,2024-11-14T21:15:18.533000 +CVE-2022-21919,0,1,fb63c888b9e9110378672183f99bf3488918203e8250fd2113503669ba34e677,2024-11-14T21:15:18.723000 CVE-2022-2192,0,0,3d00254e7291c01d08e36868688becfdfa79dc421a888feb0112fc918c4c9771,2022-07-27T07:23:43.320000 -CVE-2022-21920,0,0,ee13fda2cfe01e8bf6f939fdc215bae2c506311363267c2c57856a762610ac8f,2023-12-21T01:15:25.843000 -CVE-2022-21921,0,0,c8636684a73d4761478a6d1de3619ebeee4c4d3e668bd48cb4d5efe4e7ef5fea,2023-12-21T01:15:26.097000 -CVE-2022-21922,0,0,3088b6ef23f8cdf72b463889f1dda2befdbd9f7bc09437b8bca0b2feaffc3596,2023-12-21T01:15:26.220000 -CVE-2022-21924,0,0,43404ad926df13f46f1d7cca403d2ac559547bfd3fe660a250543cb668b23ced,2023-12-21T01:15:26.450000 -CVE-2022-21925,0,0,cb28d30c6d95369b0fc7f828fe45655f840f263cac3fa00654619522bfc2cb05,2023-12-21T01:15:26.577000 +CVE-2022-21920,0,1,fb6d2c0bb191175a3862953de48f2977bffc54b4daf5b0834f288d3f08dcb56e,2024-11-14T21:15:18.927000 +CVE-2022-21921,0,1,38695df0b4898eb385b53bb50d763987b320ae69b4601f7d446a34b3acc5b0ef,2024-11-14T21:15:19.123000 +CVE-2022-21922,0,1,5a53a86a42cb99e1740d7e005e7e84a85c52130d87981dc720e82e28ae7a37e8,2024-11-14T21:15:19.243000 +CVE-2022-21924,0,1,a6fc7986ca1eba2ecdc1c4715c574095ce4567f4665a363a990ae3f944c8441a,2024-11-14T21:15:19.420000 +CVE-2022-21925,0,1,6ce1e892ff06283c7ebaeeb095a8b547bfa53ec470c0cd45d034b914e8eed549,2024-11-14T21:15:19.577000 CVE-2022-21926,0,0,537778c7a25018be3b4812e1e1c727e04247dbfa840b17dbd850c973798f8406,2023-06-29T05:15:09.590000 CVE-2022-21927,0,0,65dcf7e5f14798b26e273feeaae9ef57c607b2055a3cb849740dea9b6fe3ce00,2023-06-29T05:15:09.690000 -CVE-2022-21928,0,0,e02c525debd79da4f75e56adff0a1d8f2e853da132c43aae5a709f9bceab9575,2023-12-21T01:15:26.770000 -CVE-2022-21929,0,0,cb3f9df2a9eac43e33697552e47ca58e2710d5a9e51dadb342730683b2e0c413,2023-12-21T01:15:26.870000 +CVE-2022-21928,0,1,236ed9bb6831c71761f5f9640de7896a2d4465fc8b7a328089d87a1279e62138,2024-11-14T21:15:19.693000 +CVE-2022-21929,0,1,7c6b909160f4714e13bb628ceffe9a6637515b4fe8e1d0b711e375f3cde8198d,2024-11-14T21:15:19.833000 CVE-2022-2193,0,0,ac9aebceba8dc444f1019834b131b62e7457eac45812853fd599e5726d500a63,2022-07-27T07:31:17.513000 -CVE-2022-21930,0,0,3e7254502c3b0ab8783d945a4e157c76a738caa9f26ab139b38444f81d115ee7,2023-12-21T01:15:26.990000 -CVE-2022-21931,0,0,e1954d304560aa2ba4f324fd56f4189d6eab2d6362f7ca43251ebc18021a9c8f,2023-12-21T01:15:27.110000 -CVE-2022-21932,0,0,d138906f64c2c5bbeaf1e5f730c75a1b20cf07e553e87fec8898578ab0376c66,2023-12-21T01:15:27.207000 +CVE-2022-21930,0,1,18b1e45aff34681e6181c67ac3a40ce5634f619fb26405cbe43dbed4cd15bff4,2024-11-14T21:15:19.957000 +CVE-2022-21931,0,1,ef279d8ba2abbb679cd80baf4d51ababab63077efd33972d6c96671083d01380,2024-11-14T21:15:20.080000 +CVE-2022-21932,0,1,b45516c0aec9bdbe8fdacfaf49c2af4c8d4c3cd7aff79599d2b56579fe915966,2024-11-14T21:15:20.190000 CVE-2022-21933,0,0,f1f7365873934423a8b5fc10b0137c3c8e05dae5923f1a1e0036abb6e488fedc,2023-07-24T13:53:02.023000 CVE-2022-21934,0,0,a56eef3f2c983929fe066e0e3e511aaed1270c6907554f4790da7c2ed5c48762,2022-05-16T19:40:43.127000 CVE-2022-21935,0,0,74b1b22ee83595d93e5d7a8c3e2aa33d4c3f218015e9a316f17ae601f3da31cb,2022-06-24T19:40:47.367000 @@ -191343,22 +191343,22 @@ CVE-2022-21950,0,0,9bdc0b74994c0fd4f81d6e60314c458d30d0bedd309b5ca84d65cda351dda CVE-2022-21951,0,0,83a5cd74ddb6146bd97e2ce33ee0c3283b22a46267cda0193119cb50520ab225,2024-09-16T21:15:42.413000 CVE-2022-21952,0,0,438ed0426cf214f8145fd10b778c7561486548cd5d1a2e97cf63191f3fd66f28,2024-09-16T19:16:01.623000 CVE-2022-21953,0,0,32099fa5202f19d1f1a3b344df8399de18857a716f5531299fd9764cb4f61289,2023-02-16T22:23:01.503000 -CVE-2022-21954,0,0,53813251535790b1182fc8adda8c4e1fb2af1df5addb36fa6bedab6dd38dc8e6,2023-12-21T01:15:27.307000 +CVE-2022-21954,0,1,5fa00229c88ca95763cd5cc0a5e23b5551a6f0c11223ff1a7783172130183c0f,2024-11-14T21:15:20.303000 CVE-2022-21957,0,0,4d5f0b939990dc13637d6c946d392cca4fcb8519f1c8236cfc8ce760a2b185da,2023-12-21T01:15:27.397000 -CVE-2022-21958,0,0,aeaf99998a5eff492a5753c644add8244231f79384815a1068df1dc5735b1ea5,2023-12-21T01:15:27.537000 -CVE-2022-21959,0,0,4e76945c5f686d4c0e8f9188ee957986d96aca038264e2eff206e14230ea73f2,2023-12-21T01:15:27.680000 +CVE-2022-21958,0,1,369b5a006bc970f25c869933f1e21978caa37f3ef2c82a600bc92fc6d8619f1c,2024-11-14T21:15:20.420000 +CVE-2022-21959,0,1,74ec9fa4f43dac4a9740ff7bd920c115a8e84337da692999cf019eee9fb77d2a,2024-11-14T21:15:20.580000 CVE-2022-2196,0,0,c3aa99bbaf772893b152b34af8caf08ea777198a8c383eb6e70bf4ed4c105226,2023-08-18T18:56:16.323000 -CVE-2022-21960,0,0,fd0fb0f54d6754cd3ca97c2de57528a481d5e75afb492cd091e9ff9c776d8b24,2023-12-21T01:15:27.813000 -CVE-2022-21961,0,0,8fb43575a3273104e01985ae954cc9746dd4f0cebc59243e06d6fbe577dd0ec2,2023-12-21T01:15:27.917000 -CVE-2022-21962,0,0,6f36f6da75b878a4dbe15bcb0b3d470f3b9b604828dfa6ff133be59dfc7a6427,2023-12-21T01:15:28.027000 -CVE-2022-21963,0,0,74d887bb3b1bf2dc05e070b9c892ea7a40d6ce2227f438048331023e6d106121,2023-12-21T01:15:28.250000 -CVE-2022-21964,0,0,88507b5d97212498fdea7ffe244781e08c4a2b5ccddba95a72bddc8c3481df44,2023-12-21T01:15:28.407000 +CVE-2022-21960,0,1,306fe97b5266d9522b6d611fad907f4c55badd411a93589704c2fccc0f5ffbeb,2024-11-14T21:15:20.750000 +CVE-2022-21961,0,1,7b49ccb99aebe2ecb4ee6d70d825aee67a35f3ff1689dfb72e72f9dc2c4bb28d,2024-11-14T21:15:20.887000 +CVE-2022-21962,0,1,4d87098f071c701f136072ecddef23f03be9527f0e690fd69bc823bd84fec4a6,2024-11-14T21:15:21.053000 +CVE-2022-21963,0,1,c4bebe39e0dad0e868f6b0ece33a77f5bb30fbaf25854a9fb1aaf7e011f4fc83,2024-11-14T21:15:21.210000 +CVE-2022-21964,0,1,94c9867d64a508a46857a6501a17efd5da793b225081bb7a3c3acdcf957a8122,2024-11-14T21:15:21.363000 CVE-2022-21965,0,0,b847e0001dcf42593ed12a2093c7fc1ca67efbfa43c1561bf2a687f14345d41d,2023-12-21T01:15:28.513000 CVE-2022-21967,0,0,ef7ac285414f266afb0357809dd6db76f25d69dabaf1a25e754d5fcebf9a8384,2023-08-08T14:21:49.707000 CVE-2022-21968,0,0,5fea94806fe150f0078841a86e627ba5866eff6cf5f8c505fba9d417ca78c232,2023-08-08T14:22:24.967000 -CVE-2022-21969,0,0,0f04092288bc0e0c51a149c996cb781e792ecc12e0549a6f49875c6e1f0bb20f,2023-12-21T01:15:28.663000 +CVE-2022-21969,0,1,b4fe1af5b9f0de2967bede4f83ada90680252a08765a623cf8203fd2d27fc018,2024-11-14T21:15:21.470000 CVE-2022-2197,0,0,c6518c7d0d7a84acc48fbb36923d2a58a9536b40afa4be9b9e477d05093929dd,2022-07-13T18:24:27.743000 -CVE-2022-21970,0,0,0c017138ddd2f61de9dcf0605c7306a920bd15365a0beb64187a91889c0bbad8,2023-12-21T01:15:28.763000 +CVE-2022-21970,0,1,94a997d8139fca0009b85264a60d50e1739e54a35b4a49aa6e97c3a7e349c84b,2024-11-14T21:15:21.587000 CVE-2022-21971,0,0,911e54f4788372cd93b3828f26c70564f047b78419dc7136da6c00866e4eae84,2024-06-28T14:12:22.867000 CVE-2022-21972,0,0,e00652770f654d150651d402ad1bd1441b3dffebc68cd35f93e32ffe35e2e308,2023-12-21T00:15:09.640000 CVE-2022-21973,0,0,9ad8d4b09c3574599a7d023c86a828ed0c7c7abdacf259bd2c0302bc511c4f40,2023-06-29T02:15:09.550000 @@ -192540,7 +192540,7 @@ CVE-2022-23254,0,0,356b638ab8d6a9ef9c20c0fe16a8a0382ce3a79323f919e2b36d4aabc6adf CVE-2022-23255,0,0,d154dcb929f88d63024394d1270b9d3faea8d4b30309f4d46f5922d2c9a39627,2023-08-08T14:22:24.967000 CVE-2022-23256,0,0,b681fc5f374269c3a2f25ffa68cba0cc1928a24f8a63df6887ed891233b8597b,2023-12-21T01:15:29.447000 CVE-2022-23257,0,0,7e8fdac1c060ab5ea5616ddc562c91e0c47e1ccc717db6a288c83539b353064e,2023-06-29T01:15:26.927000 -CVE-2022-23258,0,0,7510cdf7b9d04f017c9b3b793580791ee042c61ac2dff8fe5a7bea3af99e1dae,2023-08-02T17:26:03.810000 +CVE-2022-23258,0,1,cbc9c883d370cf7c53ba5e99c4e5187ec159d2d8e331ca16aeca3ab7a4ed52c3,2024-11-14T21:15:21.700000 CVE-2022-23259,0,0,2b03d05f4164f817093b3459491174849f6ad82910389d6f2dd4de31fed874b2,2023-08-08T14:21:49.707000 CVE-2022-2326,0,0,dfafa2eb5b120be98bef16095ec3e3eb8b538674e65cf0a288aea765899eb8d6,2022-08-11T15:40:03.410000 CVE-2022-23261,0,0,880a3369445e4c06def324174e65eadb17131c5c32318ad206457f120b2c7555,2023-06-29T05:15:12.950000 @@ -228634,7 +228634,7 @@ CVE-2023-37759,0,0,1415b636fde1d1e674552edec835a4b3f13774f91e7a6f36739442bfd5509 CVE-2023-3776,0,0,9b9e6fdf1c4bc5c96e654d9815690fa791039ca2db35eb2aa960559d73c92292,2024-08-22T20:24:45.973000 CVE-2023-37765,0,0,fb5a4ab315cc617fe99ad635daf21b9c79c91c61de43c4e314280f3386a0498a,2024-11-08T15:35:06.813000 CVE-2023-37766,0,0,ce98ea852fb52f0469c90b820fae6227fe146452d537f4ff6e92411f9ad946cd,2024-11-08T15:35:07.720000 -CVE-2023-37767,0,1,f823bf48e7d8332b29718e3997d8b10cff2429fa94b0b410b71d2eaeac048ffd,2024-11-14T19:35:01.150000 +CVE-2023-37767,0,0,f823bf48e7d8332b29718e3997d8b10cff2429fa94b0b410b71d2eaeac048ffd,2024-11-14T19:35:01.150000 CVE-2023-37769,0,0,371b615184f3bd513f2ca6abbebf9bd837602f137112e4a844bb2ff233999791,2023-07-28T13:22:09.480000 CVE-2023-3777,0,0,321a63c9d284567c8aae4befb0438a62ebf3ef396cb82b681c3d1067ce1fcd33,2024-08-26T16:08:25.727000 CVE-2023-37770,0,0,4f05dc848203776d620f57ea5888526c8203866e548c30aa9fb65dc5e4e7d188,2023-07-27T03:41:54.570000 @@ -232642,7 +232642,7 @@ CVE-2023-42836,0,0,57dd9f5214333cc32869174710fab8ff9c58d3ed310e22708cf2b23e79add CVE-2023-42838,0,0,d2c7cb1076afde325efe19ebd9189ea0f891ccc309473cf4021fe8881f3b600e,2024-08-09T16:35:01.893000 CVE-2023-42839,0,0,765dd4087b9c648a2614e4f77e8cb2a77a0f084da4aebcff5c956301f137e1c8,2024-02-22T19:07:27.197000 CVE-2023-4284,0,0,61fe561181169a40965e309f813ea607fd0daab2834cbef8e665fe00162fc64c,2023-11-07T04:22:25.233000 -CVE-2023-42840,0,1,cd82264bc86c6b2cae0cfb802b7b76d55587d9910f0b6c0aa67585421b1bd358,2024-11-14T19:35:02.180000 +CVE-2023-42840,0,0,cd82264bc86c6b2cae0cfb802b7b76d55587d9910f0b6c0aa67585421b1bd358,2024-11-14T19:35:02.180000 CVE-2023-42841,0,0,1ba74cc5d5e854bd871cdd5a2c1321cd1721679505b9b640a088d8b01d078fa3,2024-09-10T21:35:05.947000 CVE-2023-42842,0,0,e6c3110fb32fb31efa637e19595877e38152993b501001f3e91f7f4195c48558,2023-12-13T01:15:08.050000 CVE-2023-42843,0,0,fdcaee2947060de20442c439e087fd1ee28a11ba66828a8d78ea7542fc20bb0f,2024-11-04T17:35:05.077000 @@ -237879,7 +237879,7 @@ CVE-2023-50431,0,0,ce67465e9f1496f406cce0377694b14ad4509f4122055381a78462991a530 CVE-2023-50432,0,0,c08f27e1996614a80b06549eae73e36c5ce5ae51536270832f0a5c16afd3388e,2024-04-30T13:11:16.690000 CVE-2023-50433,0,0,1236cb1d1900890c10f0cec86536128d745a880515430cbaebcfc664a41166fd,2024-11-01T20:35:02.620000 CVE-2023-50434,0,0,dcae0085efa2a160f35308b2cfed9a6c4c97f96728c51d0e99c64b121bad7ee3,2024-08-01T13:45:24.853000 -CVE-2023-50436,0,1,ae24d4384178993c11802f29b1b73d6ccd72915a5daa0b3c8c1118e509cedd1f,2024-11-14T20:35:08.293000 +CVE-2023-50436,0,0,ae24d4384178993c11802f29b1b73d6ccd72915a5daa0b3c8c1118e509cedd1f,2024-11-14T20:35:08.293000 CVE-2023-50437,0,0,5d04fa2c2abb29eb8832a1e8bf568c0f0a216e516c111aa1d77c21b68cee54fb,2024-08-13T20:35:01.850000 CVE-2023-50439,0,0,6b771bac02a72f028393ea4844a2183a7f75d742009abba66069d074c7166b89,2023-12-20T18:29:44.920000 CVE-2023-5044,0,0,70d08631485d3df486bfde2a9938b1cd4cc232cbf333408306960d4923f33474,2024-03-07T17:15:12.073000 @@ -239127,7 +239127,7 @@ CVE-2023-52354,0,0,b83a0ae26910aeb4d8be73792a9bb48b3e532279f0f31aeebd210df1fbcb6 CVE-2023-52355,0,0,461ea908f7dd6b61786b879539aa67641b818dbc1dc97626ddbece62684b7542,2024-05-17T17:37:57.793000 CVE-2023-52356,0,0,7dccc26c119ffd507dca45bc259afb8dfb8baea8acfee17fa269d8f7d722129f,2024-09-16T20:15:45.480000 CVE-2023-52357,0,0,26288d103cd637bbcda04e71a721251665a0c23a32b663f57db1b9fc577e9b50,2024-02-20T19:50:53.960000 -CVE-2023-52358,0,1,7c9601112ec312a1dc4d0e883a26142a68f2368228707be8b0f1eb6cd36b27ff,2024-11-14T20:35:09.213000 +CVE-2023-52358,0,0,7c9601112ec312a1dc4d0e883a26142a68f2368228707be8b0f1eb6cd36b27ff,2024-11-14T20:35:09.213000 CVE-2023-52359,0,0,c42a0504fa8d5279c90e2ecc0d752e3045b67971944e9a1090f1657f4d4452b1,2024-04-08T18:48:40.217000 CVE-2023-5236,0,0,fb6c3d46b555cdb6e2e8cfed896e892086c77c4bb29daa7e1e3231fc7a825bf9,2024-09-16T14:15:13.093000 CVE-2023-52360,0,0,ecfeb27a76b3cb4fc769668e2502fbe290543c70b0ad7217d769381a048f79b6,2024-08-01T13:45:37.677000 @@ -239157,7 +239157,7 @@ CVE-2023-52381,0,0,612a15eb78d5f66fad16ca7ce12c6865c6ce501f4c4f47c30f542596a8c6d CVE-2023-52382,0,0,ff68df838ff80bf3e32ebfcc4daa22b26645bb5f933b0ba12d2f456af89feb1f,2024-04-17T07:15:07.860000 CVE-2023-52383,0,0,c4deca95a8f07fb7c22e4b0e0a89d522f9cee543c8642a4a0eb87f9ff81520a5,2024-05-14T16:13:02.773000 CVE-2023-52384,0,0,1b28b5db39952ebab24cd0a63a53f39f49ccb355e1098aabd754534aa358eb82,2024-05-14T16:13:02.773000 -CVE-2023-52385,0,1,561fc607f16ade31646311120f49c331cbd56a95de1d2c8d93f073ef13e4d9d9,2024-11-14T20:35:09.457000 +CVE-2023-52385,0,0,561fc607f16ade31646311120f49c331cbd56a95de1d2c8d93f073ef13e4d9d9,2024-11-14T20:35:09.457000 CVE-2023-52386,0,0,2a4cd33d840fba69ad11f548bc845cd6f6c618831136cbd5b4aaca4a2cf8bb8e,2024-04-08T18:48:40.217000 CVE-2023-52387,0,0,b2650028ac123e8e842277def6205aab4a35adb4993f16c1142f88bb1bfd4c25,2024-02-20T19:50:53.960000 CVE-2023-52388,0,0,fba652f56323ecabc4b9d2851593ecc2735d11f138371eaf93b02c0479a98a71,2024-08-29T20:35:48.347000 @@ -239314,7 +239314,7 @@ CVE-2023-52552,0,0,263d078676b8ab80374bf1a1af537e9950d34ffb536f631dc6fba4ba090af CVE-2023-52553,0,0,5e22a2db35ff14a3185f1e3a5a41a0a5f1eb054fee3abb62e16eda3a347f57d8,2024-11-05T16:35:06.793000 CVE-2023-52554,0,0,7c787c5730bd1ba7c71a82d47c4e7d44ddec67c0569424251b431e6010a9a5a6,2024-11-05T20:35:14.087000 CVE-2023-52555,0,0,5e36334335ab678d55bf6cac0b324af1ed187d2c730be3da7b4f852afbed6d98,2024-08-29T20:35:49.350000 -CVE-2023-52556,0,1,f1f75b940389db0870ae4241ca39f9296fd800bfd62f55176223a4222383bf4c,2024-11-14T20:35:09.700000 +CVE-2023-52556,0,0,f1f75b940389db0870ae4241ca39f9296fd800bfd62f55176223a4222383bf4c,2024-11-14T20:35:09.700000 CVE-2023-52557,0,0,5ed6bf0a491f3ec717ecac7d6471909703923a149768b3b4e52317d23f8d24e0,2024-08-01T13:45:39.150000 CVE-2023-52558,0,0,7a2164a6ea51bedc215ff5cabec224ee6fc723b56d536531a97955800cae293d,2024-03-01T22:22:25.913000 CVE-2023-52559,0,0,04af586fb20ce25776f7cc5f46253da9986ceb3c1247d4979acb72706c00df50,2024-03-04T13:58:23.447000 @@ -239486,7 +239486,7 @@ CVE-2023-5271,0,0,6ca5aae6cfeafe6825b7b5b7a5960426f19016861ea4d7372261699d3ccb81 CVE-2023-52710,0,0,ff58675472b7f5253b62ab393b160b1cf349e6c1ae9c4d19bd1e0fd775a66fcd,2024-05-28T12:39:28.377000 CVE-2023-52711,0,0,7f19105f212eeeb82211cb5994a99c19f7a30d3dc3b433f91a0f9224ea063ce7,2024-05-28T12:39:28.377000 CVE-2023-52712,0,0,73fcfe56ef063242282f261e724c58a36beee3e73b4f79775b264a51d001342d,2024-05-28T12:39:28.377000 -CVE-2023-52713,0,1,bdf8d958353ec868d361ade9a3e967148b0b330845268fe3373dfde7a9053cbf,2024-11-14T20:35:09.950000 +CVE-2023-52713,0,0,bdf8d958353ec868d361ade9a3e967148b0b330845268fe3373dfde7a9053cbf,2024-11-14T20:35:09.950000 CVE-2023-52714,0,0,64949270c571827fa0b1878e73815a64c054140ffbbc1db3039e41e2500fc2d8,2024-08-14T19:35:16.973000 CVE-2023-52715,0,0,9d265f7602d20da9561a5e602d40ae6467560b79969c95ff6054722335d07e0d,2024-04-08T18:48:40.217000 CVE-2023-52716,0,0,04aef122aa6e9fa538042470d9e6c3bb7020a52932e8cd0f2e1328b4a81042f6,2024-08-29T20:35:50.213000 @@ -239812,7 +239812,7 @@ CVE-2023-5384,0,0,1000c607494762940b71277094a6b9b9c55e967c6f3e176971d609e2406f5e CVE-2023-5385,0,0,74fa7287b9ab75725fbdf6ab6c6907c958a915985c0b9124552f7b4ea83c1e2b,2023-11-27T20:13:07.160000 CVE-2023-5386,0,0,2c825b4196dd681b3bcb3a5d18e8c90690ab1f6d05f49c745e93a99ae367e789,2023-11-27T20:14:47.710000 CVE-2023-5387,0,0,6a92e646894a164e14f5525cb0fa8d79de8719682a631c1e3d58b85b83e180d2,2023-11-27T20:15:21.673000 -CVE-2023-5388,0,0,33568d501c9b90e92d5f20ce66d9f2fc6ac7df722f573d5899e8fc0cb14e81df,2024-03-25T17:15:51.337000 +CVE-2023-5388,0,1,4ea1d4b0d0fda897d9ab8b1252ba5fe0d188f9a83927701bef799efa18f54b85,2024-11-14T22:35:01.873000 CVE-2023-5389,0,0,56408d00ae0c17404d587f7c51e460e6f50ca0ced102729b25b5bb4f521c2dce,2024-02-08T15:20:04.057000 CVE-2023-5390,0,0,4a64a0addec4f6fd7cd054aca94d82ad03076d51edf88745b0c37f9619f971ea,2024-07-09T20:15:08.647000 CVE-2023-5391,0,0,a06ab360a756bfe3daf620819da60eecbfa4b5bcbdb32ef8298019d4d0846cfd,2024-02-01T00:49:46.897000 @@ -242512,7 +242512,7 @@ CVE-2024-1014,0,0,8e546db835ee0e62e0f6ed5b95e90d5586231fc78746cbbfef7db3d61b3c5f CVE-2024-10140,0,0,ec9d51c2fc14eea2e4cdb7aa8f8bd180db2ec005ceca8608d4d081404a2e210c,2024-10-22T14:19:08.420000 CVE-2024-10141,0,0,1a2024f75553982bce647b93dbf2bff672eefec5950fa457467c64b98f6e45c7,2024-10-23T20:27:09.370000 CVE-2024-10142,0,0,f8d897c68f0699e753bf4964aa75eec3baa1d06414695c8d5256c262c45a3b84,2024-10-22T18:11:20.450000 -CVE-2024-10146,0,1,a6ea98fb4b84357fa99272a99b0f27b60fff4866bf525eca471cf9c7afe292b6,2024-11-14T19:35:05.160000 +CVE-2024-10146,0,0,a6ea98fb4b84357fa99272a99b0f27b60fff4866bf525eca471cf9c7afe292b6,2024-11-14T19:35:05.160000 CVE-2024-10148,0,0,83c51017fcaad8303b49e241d62740cf9ee14ff3b98ac6e60e27203bec158551,2024-11-06T16:02:22.120000 CVE-2024-1015,0,0,5516b1d1af5a9d3814b8a6e102d3692fcdb9c463b2e2645787afdcb157946f20,2024-02-02T02:04:13.267000 CVE-2024-10150,0,0,980e5c556ba92cfe6f78a7c5edf14225adf63d1f935caa703239c8f6c3933115,2024-11-05T17:47:35.353000 @@ -242673,15 +242673,15 @@ CVE-2024-10378,0,0,0519ccfb9ffb217aa5525f603630d31015664bf59560310b4f925870ef4eb CVE-2024-10379,0,0,214be4d491421db3527c631a39011912a259f53e90e222f386f0e0be59c2557a,2024-10-30T18:54:15.323000 CVE-2024-1038,0,0,c7b47d6608546def6f3304631405edc76ac6151bae95644217fe0b19e7498b5e,2024-03-13T18:16:18.563000 CVE-2024-10380,0,0,251c7695ebdffe14f2a561bb3be22f7946019d2ec5c5cf9081e853969f1037dd,2024-11-01T16:11:00.217000 -CVE-2024-10381,0,0,63addd0f8191b1c4cfb4d8f0e97d60f16153f091ecece1db9c0d0bcf5f8350fa,2024-10-28T13:58:09.230000 +CVE-2024-10381,0,1,c0308fe75631e6e478c4bb91d489e96b1c2dde80a7b938a5a315dee1135c5bea,2024-11-14T21:44:53.280000 CVE-2024-10386,0,0,92094aeb70b25026044a453c13f522af4eb391b2229044481dc021518acdc439,2024-11-05T20:07:59.487000 CVE-2024-10387,0,0,5a1f42d28f618e614b5301c0b94be55a535432bf7194e0692256ccf6aa332018,2024-11-05T20:05:55.323000 CVE-2024-10389,0,0,5c3e383a622dd2c962c1328ad97e7119997516337f3c204f5e02dea9bf077b56,2024-11-04T18:50:05.607000 CVE-2024-1039,0,0,823ba846a6d7c1759f085b54cf23829cdbadd28135927175e007d2b5df85a6ad,2024-02-07T14:09:47.017000 CVE-2024-10392,0,0,6e1e37299a52c0d29351f7b918b5ce63e7a851a7204714ad635a0d36b7f4f628,2024-11-01T12:57:03.417000 -CVE-2024-10394,1,1,4cdc66d522045d131b62bdfb9e89fa2c725ded5ae77d9c9a336284d0b06165be,2024-11-14T20:15:20.777000 -CVE-2024-10396,1,1,c092919609de9bd4dd7de7dc30b35cfdf8abab6f06aaf1fb65271dd7702e20cf,2024-11-14T20:15:20.917000 -CVE-2024-10397,1,1,4228f9e0bc2b26997ae55684f775720995f3ce71af3c6095d90bd9baad018ccd,2024-11-14T20:15:21.057000 +CVE-2024-10394,0,0,4cdc66d522045d131b62bdfb9e89fa2c725ded5ae77d9c9a336284d0b06165be,2024-11-14T20:15:20.777000 +CVE-2024-10396,0,0,c092919609de9bd4dd7de7dc30b35cfdf8abab6f06aaf1fb65271dd7702e20cf,2024-11-14T20:15:20.917000 +CVE-2024-10397,0,0,4228f9e0bc2b26997ae55684f775720995f3ce71af3c6095d90bd9baad018ccd,2024-11-14T20:15:21.057000 CVE-2024-10399,0,0,3874273dcd61d00780364abd4b80bff26291db4f2fcc766c950b26117fafe39a,2024-11-01T12:57:03.417000 CVE-2024-1040,0,0,b32f85342f197693d2db41df3bf264f5b00d802b0a5fb12822762c63c498621d,2024-02-07T17:11:40.623000 CVE-2024-10402,0,0,2443718b847d5ad0a7e8e6883b9aca46725ab83d65a53ced89e927dfa1ec15f4,2024-10-28T13:58:09.230000 @@ -242861,14 +242861,14 @@ CVE-2024-10676,0,0,c4d26028c65dae8ee24a6ae71fbafbbbdf2f434e1b4ee4c7591876108357a CVE-2024-1068,0,0,affccf40ed47a318eb2ecd8e307c56fa640a43f94e3b3e8b50a778ab4a9c998f,2024-08-26T19:35:04.287000 CVE-2024-10683,0,0,81b5edc9806b9d41a626cf134b47e67b5d64e10aaf06aa6e2f1151e4509d5dd6,2024-11-12T13:56:24.513000 CVE-2024-10684,0,0,dd46c46b63d005f5eba7cd0edc585eb1b3eb2cd540c331f34ccb08dcb21efeb7,2024-11-13T17:01:16.850000 -CVE-2024-10685,0,1,1d5e3517448dda5f262310078551ab26523509e6a1746aada937566f5315b2a6,2024-11-14T19:40:14.953000 +CVE-2024-10685,0,0,1d5e3517448dda5f262310078551ab26523509e6a1746aada937566f5315b2a6,2024-11-14T19:40:14.953000 CVE-2024-10686,0,0,fcdad82b29385ae50029c826386214a0438adfef3126687e07ca7cc6d49750a6,2024-11-14T18:15:17.943000 CVE-2024-10687,0,0,2d74811f2fc6d3aaef423135ea18016bd4a20ce3a927ba94efb8aa3eac4c5b2f,2024-11-08T15:26:52.523000 CVE-2024-10688,0,0,2bcb0cc2d0a39373aaf27b3a9b6b49c4606abf5541b93372733fc379535c54ca,2024-11-12T13:56:24.513000 CVE-2024-1069,0,0,9f4b19e535b82e8b50b814b402985dc45959fb8eebaa25a120ba3f787349c9c3,2024-02-06T20:11:52.587000 CVE-2024-10693,0,0,2a11d3d5f51d0b8c3f7c9ca79b8ec09785ef4fc759c11326213a65170220169f,2024-11-12T13:56:24.513000 CVE-2024-10694,0,0,05c164a4732350edd5fee46247e775b1e69a11363b78cebc8b6784de8da1fb44,2024-11-11T21:15:06.030000 -CVE-2024-10695,0,1,c91c88b2e014c926c977a623d612f44936109b69ef58435a4fdca68abda40e21,2024-11-14T19:44:16.020000 +CVE-2024-10695,0,0,c91c88b2e014c926c977a623d612f44936109b69ef58435a4fdca68abda40e21,2024-11-14T19:44:16.020000 CVE-2024-10697,0,0,5ee797b1e2524fad720ed5d33aa07ee55b1575ecedb30200e209173b28d177f2,2024-11-04T14:18:20.337000 CVE-2024-10698,0,0,a92f2679f791986edabfcd01d7de3581b39e330ef0fdfebb28883ec3d8b768c2,2024-11-04T14:20:58.853000 CVE-2024-10699,0,0,34f3ee81b53049f9113d5634ca7220c0a13ff33a1cbb6ebcca291fb5d022be13,2024-11-05T20:15:56.417000 @@ -243034,7 +243034,7 @@ CVE-2024-11004,0,0,ae81cd254161ae2b32edcbdeb3c8b9257e0a408bd5a5695d4038ccc9e5ada CVE-2024-11005,0,0,18600e5d1e147dc33df6674b63d788b55c4a385ff97d609bb37b926f35b08fad,2024-11-13T17:01:58.603000 CVE-2024-11006,0,0,061dbbb4d5e160bf001f7720eb41186dcf120f20d17fa119f965812b96c1ebfa,2024-11-13T17:01:58.603000 CVE-2024-11007,0,0,c57943ee3d95fce3da1c2fd2bdd2106dd0e6ac3cc62d4cee44cb18e666dcdd4f,2024-11-13T17:01:58.603000 -CVE-2024-11016,0,0,e06fd1e37d2bc29c8627eb88aec0c98e8edfc5d8e9aa4e4b0a05b03aac4f15bc,2024-11-12T13:55:21.227000 +CVE-2024-11016,0,1,d24a4ef547b8db93612dd948add59f18f08d5f729dd643b0e0ee56cabc76c4d5,2024-11-14T21:53:49.530000 CVE-2024-11017,0,0,b6f5a0fdb93950e300deb11212bccdb1604dbaaea57c853aac4276b5e817e85e,2024-11-12T13:55:21.227000 CVE-2024-11018,0,0,f910e24d784d244818fd4780466645417572116f0165d15d5cf863939db2411e,2024-11-12T13:55:21.227000 CVE-2024-11019,0,0,f89d8e239acf21c689103a90bda0330a82b8f8c0eafd269b988be5a36b1bf94e,2024-11-12T13:55:21.227000 @@ -243070,8 +243070,8 @@ CVE-2024-11068,0,0,4b051dd1e90eddfcfc88c8711edd0209408a9ba2f8b4588824fefefed2e09 CVE-2024-1107,0,0,7fae6df9cdce298be180c2cb6d3dacceb0e976e847fc87cce19a7d73f37dfe2b,2024-09-16T19:08:27.840000 CVE-2024-11070,0,0,3b497257d1d87e8089d11256275eff956cb64bd2c8e5b58c0672dafc5015efdc,2024-11-12T13:55:21.227000 CVE-2024-11073,0,0,7b275d77346d3baae5145fae1e1bc949854bb720c1a66c386a5f1f31e520bae5,2024-11-12T13:55:21.227000 -CVE-2024-11074,0,1,c7750b58e84d96425502da7e4796f4a1eb10b1d5fe8862bb87f009301db1cc6f,2024-11-14T19:06:54.750000 -CVE-2024-11076,0,1,69ee715ef78401e705669ce150a70ba620de69a2c6f89189a55ec0bcea2e068a,2024-11-14T19:14:26.717000 +CVE-2024-11074,0,0,c7750b58e84d96425502da7e4796f4a1eb10b1d5fe8862bb87f009301db1cc6f,2024-11-14T19:06:54.750000 +CVE-2024-11076,0,0,69ee715ef78401e705669ce150a70ba620de69a2c6f89189a55ec0bcea2e068a,2024-11-14T19:14:26.717000 CVE-2024-11077,0,0,017b8d255e80754134e620d058a9d65876d81581be37ad0ebd6cdd417d3b7ba9,2024-11-14T18:57:17.743000 CVE-2024-11078,0,0,d133c6201a7de964272170f882ab0586a90d59fac96ab8e0ce223d3687fb9309,2024-11-12T13:55:21.227000 CVE-2024-11079,0,0,d1a710289b6254268300773c7c9b113893f43edc23893d87d06dbeefe81deb1d,2024-11-12T13:55:21.227000 @@ -243119,7 +243119,7 @@ CVE-2024-1118,0,0,6c399aaded9e96cfac900ecbd30e202d5a6a42d5625667c3de9725b65dc62f CVE-2024-1119,0,0,5426bc48e63724893c52e881a8535fb7954cf4e6383fc287bdb9896410f7d3a0,2024-03-20T13:00:16.367000 CVE-2024-11193,0,0,444d5e431a5f364ce974b83b336c1383f189c8a9ea01d483f54d9727862b851c,2024-11-14T15:35:06.770000 CVE-2024-1120,0,0,4ae965ad3da5f8a3235e6e58dd82dd504b21e474d229ae465351f9f2ed6318d2,2024-03-01T14:04:04.827000 -CVE-2024-11206,0,0,8a1d9e5ef2c63e35f4e83f2e82606d66784e8c4f9a87e9cb79b8e5df0bab5819,2024-11-14T07:15:17.203000 +CVE-2024-11206,0,1,62582adb7c31c981ff8b17a1a690607adba3d9e4b3935494335280526e1acb7a,2024-11-14T22:35:02.177000 CVE-2024-11207,0,0,024c4797bd1d1d32d9a74f037a4ea043aa8c39cc5149453e07ab16481993cd3e,2024-11-14T13:15:04.603000 CVE-2024-11208,0,0,7acfc0d5ed23c52da09f59a7646b9c68ba6eb5051d4ac6d41bbd6289d3dca8bb,2024-11-14T14:15:17.787000 CVE-2024-11209,0,0,c160f1217e298cfc2b4ea4c66bd7fff6bc5de06dc33ddcb58badda8b6cd0450a,2024-11-14T14:15:18.090000 @@ -246905,7 +246905,7 @@ CVE-2024-23761,0,0,eda1ae06d63c9fc9e8f75b66566b9108bbb2c3391a729a6fbb5107c0ae6b7 CVE-2024-23762,0,0,dccea0d0f4f72e935db3cd4738ae0afc7e81200fb78885cb904f8f8d8505bb99,2024-02-15T04:49:42.123000 CVE-2024-23763,0,0,fd6bb7068b643be895795866753868b545c9ff02dc3b3575d3900d3b7ddc29be,2024-02-15T04:49:47.153000 CVE-2024-23764,0,0,e6776799806671e89b40fb29cea011f49ce6380839da8b1fc02e631b1db62327,2024-02-15T17:57:25.633000 -CVE-2024-23765,0,0,06c410fc3cf16eeddff78c760088188768ab51319095babe2779c4b543e1454d,2024-06-27T12:47:19.847000 +CVE-2024-23765,0,1,ad984bb55aa2b7293b22f686ec7669b8d24074597409383fc1ee4d585ed7d0a6,2024-11-14T22:35:02.433000 CVE-2024-23766,0,0,5f5a0ec5e5d0bbb4ae98974aaf53d329daaf5cd414e4b4f2a2a0e897689a4b74,2024-10-25T18:35:03.847000 CVE-2024-23767,0,0,6f43d09d7d5e03bec0de213ab6d6435f3d55689189694bafd3c00cc2823ce4ac,2024-07-11T15:05:27.593000 CVE-2024-23768,0,0,cfab380f6caada116bf310137e7bf68190f1658747da2207737dea42a2db4a9c,2024-01-26T19:15:05.400000 @@ -246926,7 +246926,7 @@ CVE-2024-23786,0,0,6ae4fe60ce393a411ea48b9876215e539a050978e709da57dec7a256f2428 CVE-2024-23787,0,0,7a8ddce6195bf931c799fcf4083a75cf1b9842febd9c3da44a75515daf822e08,2024-08-13T14:35:10.747000 CVE-2024-23788,0,0,64abbc30839e8d16e55707492265880e002ac43878f4aa04dd4b122fd59c9c73,2024-08-09T16:35:04.550000 CVE-2024-23789,0,0,ebe69de329ce3066ddae75bf202509726e55e928e26b7120b9a03b158a88c139,2024-08-14T19:35:20.280000 -CVE-2024-2379,0,1,bf50084b0f6625e9f2f932a65a78a5f1b45a21762f6b47e6f1c8cee00bfd1e05,2024-11-14T20:35:22.613000 +CVE-2024-2379,0,0,bf50084b0f6625e9f2f932a65a78a5f1b45a21762f6b47e6f1c8cee00bfd1e05,2024-11-14T20:35:22.613000 CVE-2024-23790,0,0,10fd61ba3db4d7c66d81b3afd519574867d168f5ef59d8caac21df5f30755ae0,2024-02-02T02:07:58.653000 CVE-2024-23791,0,0,244621ff2d433005513b939ef7ab8ae44d25c483ec850474bc054b795de67574,2024-02-02T02:07:28.850000 CVE-2024-23792,0,0,f34fcbde7640056d2156c42bbb24f1d1b396f26de8a742cdc375ac91a383f3c8,2024-02-02T02:07:40.577000 @@ -247335,7 +247335,7 @@ CVE-2024-24524,0,0,61939d34114517af38312bcfbce13ad9e833fb758fc861ac1b9c4d60456d9 CVE-2024-24525,0,0,98de9cf6db32e9ffb6417e6f41a95fb152f35ff505eaa6d97f1c59ceff46abec,2024-08-29T20:36:14.840000 CVE-2024-24528,0,0,374625039d4e55aaef0472920b1cd43a7902bba896a485fc4b291d918d2db83e,2024-02-26T19:15:07.247000 CVE-2024-2453,0,0,1e1da5852c7e5a4e263c59d608467f91847cc0f70298274a982e2b49faeec49a,2024-03-22T12:45:36.130000 -CVE-2024-24539,0,0,ea2b06118fb4ab0dda0a5c17a6d492fd01d3bc7dfa939af9055cc4352c7acaca,2024-03-18T12:38:25.490000 +CVE-2024-24539,0,1,8117bf475f3a198050581ee4118adcbfd9bbfccd9094a89b668e695853e29ad9,2024-11-14T21:35:04.137000 CVE-2024-2454,0,0,c3abdbdc4c03ce442d9698003ff8b7b916836453e928376d3b534ebef9e7432e,2024-10-03T07:15:29.810000 CVE-2024-24543,0,0,6385de143d1b0b1fdcac1d167b2fcd059d27448a1d2af20c5a3fd2632900f66a,2024-02-14T17:13:32.827000 CVE-2024-24548,0,0,b2630c3d24a789753fdaa109f39bed000429d845fa16c1ba7d96c172523068ec,2024-07-03T01:48:20.620000 @@ -247968,8 +247968,8 @@ CVE-2024-25422,0,0,183c4ec0faabad98f4264a6cd25b9f8acfe9ee005e0931f44bde0815e323c CVE-2024-25423,0,0,9c38591521533b12d0d8640f97867e59ae0ba009f0e2d3612c6f7b4eda265498,2024-07-03T01:48:50.347000 CVE-2024-25428,0,0,a1baa90ebade4117b4da7a9052f9f7b7385230216b8f9a62456cca560644c28a,2024-08-01T13:47:44.563000 CVE-2024-2543,0,0,90e05f36a3d2dfc0c0cb0570a48a9a80b8042b66097a9bbd3537fdf34c177bc6,2024-04-10T13:23:38.787000 -CVE-2024-25431,0,1,f8fa003a847bb4543088b3781a569aaae2e4aa029e3153cd371cce5663cfcfcd,2024-11-14T20:42:47.297000 -CVE-2024-25434,0,1,63dc4e430ec66833460d8a2f31e4264b2ff025b996c4a8f44483af6e7e8189f7,2024-11-14T20:35:13.403000 +CVE-2024-25431,0,0,f8fa003a847bb4543088b3781a569aaae2e4aa029e3153cd371cce5663cfcfcd,2024-11-14T20:42:47.297000 +CVE-2024-25434,0,0,63dc4e430ec66833460d8a2f31e4264b2ff025b996c4a8f44483af6e7e8189f7,2024-11-14T20:35:13.403000 CVE-2024-25435,0,0,b518f964ef14d92ab1a5ca1db15bba6ee80949a3cea6fd366efd019d37dc656f,2024-02-29T13:49:47.277000 CVE-2024-25436,0,0,16fb2e1f886d8db1c20751b88d1af87dc346511e3a7b7468111bb026aa3d1366,2024-03-04T13:58:23.447000 CVE-2024-25438,0,0,7a94e2bcbb6935042e8614eb14df1b32d07f24ed5598dfbc3b09e64d13fe9544,2024-08-15T21:35:08.530000 @@ -248240,7 +248240,7 @@ CVE-2024-25844,0,0,1efbddea52e96516cb009d14a44c252f988b870416e9c0cb454ea358f81c1 CVE-2024-25845,0,0,f312beb2aa8aad65c6f2e2cd8b391abcdec4221175ade5509f4776c9d68bd6f9,2024-08-27T20:35:14.373000 CVE-2024-25846,0,0,1b01ded1319f85d0e1b31b4bad3147fa711a456779b7a8a2cc484b2fe23c37c9,2024-08-08T20:35:05.147000 CVE-2024-25847,0,0,768589b83f1428c67363b11073f1a1ed8713927725c83f5055ba58a636fde784,2024-08-01T13:47:53.253000 -CVE-2024-25848,0,1,94e717b82be5b6df9a732c7bc789b8a92af8746fc6d8d5b662ce1272090a4840,2024-11-14T20:35:14.383000 +CVE-2024-25848,0,0,94e717b82be5b6df9a732c7bc789b8a92af8746fc6d8d5b662ce1272090a4840,2024-11-14T20:35:14.383000 CVE-2024-25849,0,0,ff1448816af02e5feb5f816e4bcbbe340dd06d99e43025948714f4eb8f651531,2024-08-01T13:47:54.067000 CVE-2024-2585,0,0,09f7de950868ec14db3e38701fc5881ee82655225ee04ef5941127f736832c98,2024-03-18T19:40:00.173000 CVE-2024-25850,0,0,9b8c642b39958e632d1cf5b6a4c613d6256616e4a43ffeb3ab8d505ab2755097,2024-08-22T19:35:16.957000 @@ -248696,7 +248696,7 @@ CVE-2024-26318,0,0,e49f81956340b47d12c2b6c8e60e793f3ff0ae30227c439a8cc649c04f3ff CVE-2024-2632,0,0,68039af9d391e4f53fc42bf0bf9c6a75cff13780e172f64ceb26ab23a8a8d5db,2024-03-19T13:26:46 CVE-2024-26327,0,0,30d08d577d44d38c98e8d09a3ca2e28a354f8d84b13e8b7475d667e0aa1a602c,2024-07-03T01:49:38.810000 CVE-2024-26328,0,0,8e220872ce6fda1bf070a0407dc485e9fea465cf19de6295b3aa4e1694aacee0,2024-11-06T15:35:12.510000 -CVE-2024-26329,0,1,6cf7072c8c7ab5f09657771928ed8ed0d8504124fb97a810035e6c97c6ae3c1a,2024-11-14T20:35:15.287000 +CVE-2024-26329,0,0,6cf7072c8c7ab5f09657771928ed8ed0d8504124fb97a810035e6c97c6ae3c1a,2024-11-14T20:35:15.287000 CVE-2024-2633,0,0,5cbc6482108bfabb58a338263ca9ce41f75b102c0fb9b1f68c08206c04598c5e,2024-03-19T13:26:46 CVE-2024-26330,0,0,57903b982740769cb2bfceb4ed7ca578f76569bff9879a33cdaca56e77a02b3c,2024-11-01T20:35:07.497000 CVE-2024-26331,0,0,1ee618c6a83f1d80e2b7639e36ef676bbc9cac1ae9fe1beda2944758bd324a0a,2024-08-06T19:35:02.510000 @@ -249481,7 +249481,7 @@ CVE-2024-27227,0,0,07bb188ed9b66fc7fd965d8a240bed8b19d74680ddaf7fc1bf461b043fbb3 CVE-2024-27228,0,0,5262c725eb223b05821eaec558c5d806b0071760b0a14d4556c2fbb1a42bc548,2024-08-28T19:35:11.443000 CVE-2024-27229,0,0,b8b459ee0fc242831e7e68eb1fe9ed70ba0320038a180145828d0bdce79101e7,2024-03-12T12:40:13.500000 CVE-2024-2723,0,0,a5d6e6fcb13799b6bac3165664e5b326db07e4b162d1f25e3d1dd5f10681ec04,2024-03-22T15:34:43.663000 -CVE-2024-27230,0,0,9420863bbd94fd05dcdfd0ca39954afd3c251ba38b740d930d8e5974939f128d,2024-03-12T12:40:13.500000 +CVE-2024-27230,0,1,88b39cd1454faf6416d3a6ba7200a6d0a1063eefbd9e9f88e3222f1d6afdc5db,2024-11-14T21:35:04.697000 CVE-2024-27231,0,0,cb6c833d389f9377c9592e3868a50b649339743a051bcf66fdda4f2a40b61535,2024-04-08T18:49:25.863000 CVE-2024-27232,0,0,64ecd9a830c9b30b766707b244dd77aa970adc2152fb16fddd12d23820aced02,2024-04-08T18:49:25.863000 CVE-2024-27233,0,0,4f805b66de1371a2d4417bd116c04ac1324a59b0f4fedad25c9d0195537442f4,2024-08-05T18:35:11.120000 @@ -249757,7 +249757,7 @@ CVE-2024-27574,0,0,3445d7e232fea473b297543f2639b454fd942ac9a4758abe8e2e7d31ea60e CVE-2024-27575,0,0,be8794a9d53d194bc575e7dee32b34180e95b0c9ca647d9bec212ab94e155297,2024-07-03T01:50:43.093000 CVE-2024-2758,0,0,83f18458ab99013ac8c623c0e7eb4bfe2c9f8eaa4e32e7c3d8c905cc1a10e95f,2024-10-30T19:35:10.840000 CVE-2024-2759,0,0,e8d40e2aa3d5ddadb06d4937582d68fa485ec4260787871b32ec114c396183da,2024-10-10T16:15:08.360000 -CVE-2024-27592,0,1,2bb1866167f07ee9274a3bf581a1ca5a19a85b09e387c0707a33412074dd7fff,2024-11-14T20:35:16.207000 +CVE-2024-27592,0,0,2bb1866167f07ee9274a3bf581a1ca5a19a85b09e387c0707a33412074dd7fff,2024-11-14T20:35:16.207000 CVE-2024-27593,0,0,029f3c2e91f81eb13ffd203db20809d92acce3f5ac8b5078e84e11d1f4fdb2ab,2024-07-03T01:50:43.897000 CVE-2024-2760,0,0,85c06c3412f2f06c20f37186e39e8f13a8e65a1960bf456bbd20de54d50a8907,2024-09-05T23:15:12.103000 CVE-2024-27602,0,0,ff68a7dfbe76578be745d2be853eb13367fbf75dc768ea067191484500d8515d,2024-07-11T15:05:30.183000 @@ -250514,7 +250514,7 @@ CVE-2024-2875,0,0,6cdb006d1a6c5034276b51f0b43f593cf2fffd4a38086e818a1876a540999e CVE-2024-28750,0,0,d780513969d95a2a8e4659069a1cd3d6cd97b1c91cdf4b1dec2cf83a7354c7e9,2024-07-09T18:19:14.047000 CVE-2024-28751,0,0,befef9aaad239486418cde9be9e0a53c20b96e9db24dd8e70484385d86fc3d0d,2024-07-09T18:19:14.047000 CVE-2024-28752,0,0,201eab5c3984ec2eeccdd8a718f765ccc577edf4cb5cdd6dc7af0c666b0e95ca,2024-08-01T13:49:17.413000 -CVE-2024-28753,0,1,4002240eba0a3970a9e2bc0d65ac010136c812b867a4455af92d4cbdee24b2a1,2024-11-14T20:35:21.680000 +CVE-2024-28753,0,0,4002240eba0a3970a9e2bc0d65ac010136c812b867a4455af92d4cbdee24b2a1,2024-11-14T20:35:21.680000 CVE-2024-28754,0,0,9b31cb39cd5b77a5e56c0bcf42c58dcc3858bfa4f0abada8f077294e21b8f1b4,2024-11-01T19:35:21.447000 CVE-2024-28755,0,0,7f7a5eee206773c4b8bc290c39f99033ca2e1f286ed871f0f054c7ca41a01f53,2024-09-06T20:35:16.367000 CVE-2024-28756,0,0,382afa2a84e7631da7af99644d58f88393f4012cb74b7d61efdfef4f7d7e8fc8,2024-08-28T14:35:10.690000 @@ -250930,7 +250930,7 @@ CVE-2024-29208,0,0,98198b6466ca46a32ecf68f0f1b86f98f3da89bb7599062f6389607314074 CVE-2024-29209,0,0,524c07895762e5b44d3e9ef1c206b4e7d4d5b3430c7ff6d4160e0e7acbfcd9a3,2024-08-08T15:35:08.173000 CVE-2024-2921,0,0,db69ed599921b3347a9e090088ac60a033292b080a263fe6dc6a7861e5eadd49,2024-11-07T16:35:16.250000 CVE-2024-29210,0,0,35f2fb1127989a840ec44eff998dd4dd34dd991643ed4983f752d1672da1ba01,2024-07-03T01:52:19.497000 -CVE-2024-29211,0,1,8c8d8e45b5c218fe77a714d1c8b6c57d4f639d22f03f0277fa791692b77b52ed,2024-11-14T19:09:01.213000 +CVE-2024-29211,0,0,8c8d8e45b5c218fe77a714d1c8b6c57d4f639d22f03f0277fa791692b77b52ed,2024-11-14T19:09:01.213000 CVE-2024-29212,0,0,1247faf67a6d05877ef4c24ac6b7bb7d5fbf779bfef43566ef9132ba263c1abf,2024-07-03T01:52:20.207000 CVE-2024-29213,0,0,923c285048ea8e8ada1ec8fc14c3379597d106a93dc5f7c0191835b40c0543ad,2024-10-21T18:35:11.263000 CVE-2024-29215,0,0,c3b478aa1710010c8b99ef1ca4fa2246febf1b61f49cb0a36af3387869a40afd,2024-05-28T12:39:42.673000 @@ -251575,7 +251575,7 @@ CVE-2024-30199,0,0,c87ad7b2d130da7ff087acec94fffbb9d8ac3e1c8f24ab4590517eee45b03 CVE-2024-3020,0,0,a9be8733f9c5e2508f0c4f960f0c984a8f23212df5d63b8e13b98f95d9597dbc,2024-04-10T13:23:38.787000 CVE-2024-30200,0,0,c455a1dbb6f9d915db0da82c73cca8bc6fa2d78acc476d7a8456fd9d1e2ea4e1,2024-03-28T12:42:56.150000 CVE-2024-30201,0,0,b519279052e3bf480fab70215e80d453e6672590c8aefdb7acb1d4f5f3735ecd,2024-03-27T12:29:30.307000 -CVE-2024-30202,0,1,ecd5c9b4bd0ebc202276e86a3d9a7e9f6b3bf262206739b2cbd70f27623f88ba,2024-11-14T20:35:23.057000 +CVE-2024-30202,0,0,ecd5c9b4bd0ebc202276e86a3d9a7e9f6b3bf262206739b2cbd70f27623f88ba,2024-11-14T20:35:23.057000 CVE-2024-30203,0,0,8b447cfaa3c0f29bed1fa430ec69e0ff721af51bf1f0d5669fc03f342b79df4c,2024-11-07T11:35:05.040000 CVE-2024-30204,0,0,4b2af1187ee5f3703025057d51c0997c41fee3382ca411eec613f6ae404cff0c,2024-11-04T17:35:14.370000 CVE-2024-30205,0,0,59ff5e238770a16ac12a044b9f567826327ea645bd7ddc5284c92e9966a63ace,2024-05-01T17:15:32.820000 @@ -252007,7 +252007,7 @@ CVE-2024-30639,0,0,39f672cc581579724326721635f68afc28980ec46087cc7a94592c4210078 CVE-2024-3064,0,0,8a36a79ace74b39564c56ff7401e476ffc08c1a4de80ba6f8cd5a5d5cd60f7fb,2024-04-10T13:23:38.787000 CVE-2024-30645,0,0,77873f1c56920b575cbc0a26f80968d9589bdd66fb005fe46610787de441aca3,2024-08-01T13:50:25.530000 CVE-2024-3065,0,0,0bda0f080fba1f5572d33c440e40f60c6a3ce2d985dfed057962a87436804b26,2024-05-24T01:15:30.977000 -CVE-2024-30656,0,1,1fbf6cc036ef4d1011b70d44411336d2b49e8c9bc093f89b2ba8a036f8909251,2024-11-14T20:35:23.857000 +CVE-2024-30656,0,0,1fbf6cc036ef4d1011b70d44411336d2b49e8c9bc093f89b2ba8a036f8909251,2024-11-14T20:35:23.857000 CVE-2024-30657,0,0,aafd37252d8cd76cc88d27e5c06a74ee401323bfc2559b7fbd8004e3865b18d4,2024-05-27T00:15:08.743000 CVE-2024-30658,0,0,f06c1cf8cc96fbec2b40a1e1e937877c93d61d8d9e3a49d3ddc67ff1cbc9406e,2024-05-27T00:15:09.013000 CVE-2024-30659,0,0,bed02d76dc732ca7319584b72b912e2fa7d96c20f4a15450066496d1fa763c6e,2024-05-27T01:15:15.650000 @@ -252717,6 +252717,7 @@ CVE-2024-31680,0,0,c4628bff4524f4ba02ba3d3e5f2d1afd3e6b045a8d32604fb16cfbf01a187 CVE-2024-31682,0,0,6ad84277376005bde3c5be691a4699ed2a494d2e47836225d1c8ccbe4273b358,2024-10-29T14:35:17.517000 CVE-2024-31684,0,0,a58e80e535316094d398f75f99933a7946ff10472558d364c59331628a9ef154,2024-11-12T18:35:08.927000 CVE-2024-3169,0,0,b6d2ffb09103c8b8a3976e1d11af5d86787ae2ffc33eb4178c248279d95ed274,2024-08-01T13:56:22.240000 +CVE-2024-31695,1,1,689fe36b0a90399cc1d98e6d627578b21a33778bdab5ff8d35222605a12d4eb7,2024-11-14T22:15:15.953000 CVE-2024-3170,0,0,e5d3e527beb338f17b4d7e88e470a76429efa4bde538f57bcfe45fe38f4493ae,2024-08-01T13:56:23.270000 CVE-2024-31705,0,0,360c5213fb2e781c07e5b26068537bfd39f5bcae9363979b2bff285237ce8d8a,2024-08-20T17:35:05.360000 CVE-2024-3171,0,0,7ac04b89850dd4c13fd178af0a23f600897d741bf0b6409f6d9c0faa5fbe4cd3,2024-08-01T13:56:24.363000 @@ -254389,7 +254390,7 @@ CVE-2024-33997,0,0,a1b67f9141e983abbb533434dc38928810b4315794a01f73fb3845b5ec77f CVE-2024-33998,0,0,9e3de27d8bf76d6956fcf84fb478824118f2a7a5526fa450d9858736f7cac784,2024-06-03T14:46:24.250000 CVE-2024-33999,0,0,9ff412930445f4c469385132086f7d2514cfafda5bf0ca410efabaa361c1a624,2024-08-29T20:36:44.303000 CVE-2024-3400,0,0,ac7236e657f4c64879864508ce5e161ec2ccd4c7e837c165c57bf7e10fe0f424,2024-05-29T16:00:24.093000 -CVE-2024-34000,0,0,fb3f0c7c5c0722f41326f2a505dd1954bc7a0d5fa27bb17709829c52d90f5034,2024-06-03T14:46:24.250000 +CVE-2024-34000,0,1,9c8973bf50d20fe199c73acb3b12691230b30b8721d0a7e2cfac32d2e8620ee3,2024-11-14T21:35:05.657000 CVE-2024-34001,0,0,f47716837d9d4b12395545e21b0b97bd8f96773591892a37286f525df4cfafaf,2024-07-03T01:59:15.240000 CVE-2024-34002,0,0,7d5aad854779b78532969fe54f5cfd243c35b0bc72cafa02f18bbd3a15fadf2f,2024-10-31T18:35:12.750000 CVE-2024-34003,0,0,90a6a853bacd211ad5804ef76935f128bcaaaf61c4c03698fbfba711ec694089,2024-07-03T01:59:15.440000 @@ -254985,7 +254986,7 @@ CVE-2024-34714,0,0,e231a4a259714202f61a69bb06497a65111477c8e99d84b716409e7518cfc CVE-2024-34715,0,0,a82e11e04c452d1bea6b0a9824b74b6f2046192e0be7962e7e2d23b74ac2865a,2024-05-29T19:50:25.303000 CVE-2024-34716,0,0,6c3b1bfeb59833afa0878217bf084cc4cde82455598fa083dba17b1e1360762c,2024-05-14T19:17:55.627000 CVE-2024-34717,0,0,9708a1af9b10bdcf029cd505a3cb07145d8977f96260cc07b0dfdf42dc2f21cb,2024-05-14T19:17:55.627000 -CVE-2024-34719,0,1,6509dac5d4e8a7f2cdcfeb42852d7e5d9efb42f55153585bcf2d16c7c627fade,2024-11-14T19:35:05.990000 +CVE-2024-34719,0,0,6509dac5d4e8a7f2cdcfeb42852d7e5d9efb42f55153585bcf2d16c7c627fade,2024-11-14T19:35:05.990000 CVE-2024-3472,0,0,72b7d7dda7b4399aa8e0987dd9661c2b209f511d24633ce5f0fddd8a616a16dd,2024-07-03T02:06:14.580000 CVE-2024-34720,0,0,d5f9e320876749ef63f3ae3fd855102efef7812668f3ea77cca5b86835b0fa9f,2024-07-12T16:11:36.933000 CVE-2024-34721,0,0,e10eab3e44bc304347c4431c31d705a2c4a55c2499e0412aab4621d1d6ef445b,2024-11-05T21:35:07.660000 @@ -256321,11 +256322,11 @@ CVE-2024-36501,0,0,e9cab9d7dda9a217e690001b6c798a6fbb4e54d85ebb6ee3110f4200709cc CVE-2024-36502,0,0,ce6106b712ac934aa3d46433d1d90bd69a47142ad6fe94c097ce1ae7a55cb590,2024-07-16T15:19:59.157000 CVE-2024-36503,0,0,cf0c7df8eb5d0563a3adb9382b90b37caa70a1002731797c28a41bd8794b11f6,2024-07-16T15:19:45.557000 CVE-2024-36505,0,0,5f3f0cdeca57fafe761af488854e771d0523077cbcea5a41dd4a6b4cc9d56e84,2024-08-22T14:36:31.643000 -CVE-2024-36507,0,1,6b0c38dbda3f727dc169ce7e5f1546c11940f9dacdf67710b851d7b6c214bd3a,2024-11-14T20:31:45.367000 -CVE-2024-36509,0,1,764e30bb72423d5f8b5a78996260ef54d9ee171a8c47fd6a3f0c38f56a930041,2024-11-14T20:33:44.727000 +CVE-2024-36507,0,0,6b0c38dbda3f727dc169ce7e5f1546c11940f9dacdf67710b851d7b6c214bd3a,2024-11-14T20:31:45.367000 +CVE-2024-36509,0,0,764e30bb72423d5f8b5a78996260ef54d9ee171a8c47fd6a3f0c38f56a930041,2024-11-14T20:33:44.727000 CVE-2024-3651,0,0,3337eb59719c2f9e59e57f7ed588f3375e47160773d149a8aeb60c1398d8674e,2024-07-11T14:58:01.803000 CVE-2024-36511,0,0,1807360f38a62bd1fc293a7868ee622ad3fd5e209d6556e4181a75075ebcfb2f,2024-09-20T19:43:25.023000 -CVE-2024-36513,0,1,65d57afbb9c95cb16ccd4d82b60d3a42d510f6812bfb367624a249d49aac930c,2024-11-14T20:35:26.093000 +CVE-2024-36513,0,0,65d57afbb9c95cb16ccd4d82b60d3a42d510f6812bfb367624a249d49aac930c,2024-11-14T20:35:26.093000 CVE-2024-36514,0,0,ae3ea1b58c1af4d84bf3b1df047767075b97747b2aba92d2b8d841814d31aaad,2024-08-27T13:28:33.090000 CVE-2024-36515,0,0,6ffc0af4d6ea6411f00106c20aa28bb8637cbfea07924d2fe59b402d34c14e64,2024-08-27T13:28:09.360000 CVE-2024-36516,0,0,e91b35cc04e821b0b30ba2e7773979c84dc2aa68f475c208014155f8bd934996,2024-08-27T13:28:52.227000 @@ -257105,7 +257106,7 @@ CVE-2024-37571,0,0,f2268da0f70596d56829f3f9bf9d47661ad5192c587321bdcf916146c34ae CVE-2024-37573,0,0,7cf896a83bff7adb78d3c1fc14e6c4ef534e5b6ec963a5ca90d46c8aebfbcf87,2024-11-01T12:57:03.417000 CVE-2024-3758,0,0,9133e9ab6c91a5523f7a6c3075b39d739f115990ca9d090ea03db032b6c7f7e8,2024-05-07T13:39:32.710000 CVE-2024-3759,0,0,228c14dd97b4dcf6507c1901dec59f930e3b9b578ef9455bb0b7881e5199f2f8,2024-05-07T13:39:32.710000 -CVE-2024-3760,1,1,a76c6c9495269ad7ff459691b805bf829dd2e190006db9d3c1454ecf240be3c1,2024-11-14T19:15:06.327000 +CVE-2024-3760,0,0,a76c6c9495269ad7ff459691b805bf829dd2e190006db9d3c1454ecf240be3c1,2024-11-14T19:15:06.327000 CVE-2024-3761,0,0,bcb7ea1ac08a49551e80d8143adffef9f2599014e2b4d32b190639643f083116,2024-05-20T13:00:04.957000 CVE-2024-37619,0,0,09797faff2df8b72db2a2f262ebdfd130817b6ee60286e6aa7311eb834d19b77,2024-08-01T13:54:07.797000 CVE-2024-3762,0,0,40d3f55de3ecbf79b02b0c0e4b35c8d9284b268357e297bc7035406e1948919a,2024-05-17T02:40:06.647000 @@ -257774,7 +257775,7 @@ CVE-2024-38474,0,0,4f088cfc0bc3e33027842b99d0e9469f8c62a5c78773b6fa11ed87f203504 CVE-2024-38475,0,0,4434bbc9e26235e103b2ea8722d70e74e682dd306d9d4b03d295c12ec512ff31,2024-07-12T14:15:15.277000 CVE-2024-38476,0,0,4dc405e6abe8ebf298b73a343c8daaff34dea74ec39521b4e5e4a255a423f89d,2024-10-29T17:35:06.547000 CVE-2024-38477,0,0,f870fe888c8d23cfdfdc0433edf103c8cad01a9d525dd04e1a70d1ea4bc3e13e,2024-08-21T15:11:30.857000 -CVE-2024-38479,0,1,ed83952a9f70632e9d0b7a4d5c8799cb8efdbff31e26235b2ce51a2f2396b47b,2024-11-14T19:35:07.153000 +CVE-2024-38479,0,0,ed83952a9f70632e9d0b7a4d5c8799cb8efdbff31e26235b2ce51a2f2396b47b,2024-11-14T19:35:07.153000 CVE-2024-3848,0,0,3a1e7dbb50cc54ecdbcc89881c429869965f00f9d2e1eb9f088acc297fe8920f,2024-05-16T13:03:05.353000 CVE-2024-38480,0,0,6eb9cee6c02610ad5600c451b6902c31f702ef5c26caea9038a07913b62ebd8a,2024-11-12T18:35:13.150000 CVE-2024-38481,0,0,a84ef873be05988cbfb5d94abd02b4ab54b65ea0e48ede31f1ebc6095538ede7,2024-08-02T13:54:44.360000 @@ -258696,6 +258697,7 @@ CVE-2024-39701,0,0,879aa58f50a7d5b18bfb505718bd80f7c1e443b3ef3725ff1457799d3d8b8 CVE-2024-39702,0,0,26972dcfed4a9e2d13857f82734cd85677a01fa267564ba6286c42935ec6e373,2024-07-24T12:55:13.223000 CVE-2024-39704,0,0,1d59c065d69d465eb86bf6114b5299aaf44c728f69d6748df6b6bd65077d4590,2024-07-03T14:32:56.510000 CVE-2024-39705,0,0,aa75ecfe331ee5d16e104493e16afd26f62024e9296a197b99cac0edaec74e23,2024-09-15T20:35:02.817000 +CVE-2024-39707,1,1,f6b0f729958302db0f757df58e59cc76006998070795222686dfb4ba10cf2a86,2024-11-14T22:15:16.147000 CVE-2024-39708,0,0,5ba6724a88a25c721702dbcbb09c32f9771f7eb0a866958cc03dc7237b54b807,2024-10-31T14:35:16.610000 CVE-2024-39709,0,0,18c732ed201f2614b279141675539029315bb58820f31197d64cccd45f0aa46a,2024-11-13T19:35:14.073000 CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000 @@ -259060,9 +259062,10 @@ CVE-2024-40568,0,0,4e89eb42d593339b238d1e440516cb2ccd3f5095fd163b21c19673544e39a CVE-2024-4057,0,0,26b46aa52b04f4ef8890033772544e5e99ad730f84e9e0e97b479cd36cf89ace,2024-07-03T02:07:02.197000 CVE-2024-40575,0,0,267280fd6d1dce9620611aeb1f0d6276db3825fa55e9f5e7fc538f4804a7f026,2024-07-25T17:35:28.913000 CVE-2024-40576,0,0,8423823b913f3d1284aae2224b689bfefe0b7a1b018e49f904fd4948fdba6a99,2024-08-01T13:57:51.520000 +CVE-2024-40579,1,1,7f4c2b23ae20e3c6ea2a5d41c27909f2291806806a8992f0e349ad10eb6994d7,2024-11-14T22:15:16.230000 CVE-2024-4058,0,0,517dff31dd649a4fc97ec9b0700bafce6dc3cd3c4729ffb175a77bfe0097ad6e,2024-08-01T13:59:23.240000 CVE-2024-4059,0,0,c49986e07be30ca2c850f4613369c1702dff21e7018832f61c83284c95e0cc00,2024-05-03T03:16:29.430000 -CVE-2024-40592,0,1,5acfdff926c4ce1e8230567e18f89491dd35f3a5c402aaf623c0641f88ae3656,2024-11-14T20:37:06.040000 +CVE-2024-40592,0,0,5acfdff926c4ce1e8230567e18f89491dd35f3a5c402aaf623c0641f88ae3656,2024-11-14T20:37:06.040000 CVE-2024-40594,0,0,e1d4d027c9dcda2da83b02bb549097245bef0193d8569c5563a5fbe8b55ccbb0,2024-11-04T21:35:06.433000 CVE-2024-40595,0,0,c44d4f6c466d7ef5eae926dc07df3df9a34ba4de6b2deba6d973ce015e367bf0,2024-10-25T12:56:07.750000 CVE-2024-40596,0,0,eba237165708995f6d88799cc22362156aa815eb2255f3ea66a6ad9f417cfe2d,2024-07-09T16:45:08.760000 @@ -259117,7 +259120,7 @@ CVE-2024-40657,0,0,20ced210671262f43b0cc62341898b9fc7febd5f8789caf35d41deaa287b9 CVE-2024-40658,0,0,5f8a6b60ca62d2cfa0f9862e86c619e00e5db037ad87f1558ced4ae7f02d2bd8,2024-09-11T16:26:11.920000 CVE-2024-40659,0,0,fabbb4b92a57e596b06e9bd31b045ecca58663666534e05d61759f6961367421,2024-11-04T18:35:10.733000 CVE-2024-4066,0,0,5674d1317b0a03adb324e31f70d35a87031f26ca2ea2869349483359d081bdf7,2024-06-04T19:20:29.323000 -CVE-2024-40660,0,1,ae7ab748903bf86da17ab7fb8334db31f49836b36b2874e1b7e20376910cc25d,2024-11-14T19:35:07.343000 +CVE-2024-40660,0,0,ae7ab748903bf86da17ab7fb8334db31f49836b36b2874e1b7e20376910cc25d,2024-11-14T19:35:07.343000 CVE-2024-40661,0,0,ece784732e717dfd5aa9d24e114c7c911766a2da6d3d446f6065a64726338596,2024-11-14T16:35:06.610000 CVE-2024-40662,0,0,158da2f06a1d27615161cee7fe7341ef1e87f2062801f47e3e4f4b1d6a1663ec,2024-09-11T16:26:11.920000 CVE-2024-4067,0,0,cb2492818fe81f39be6108b3726f1fbc34af211b5be3405ee7a17904cdbd58f2,2024-08-28T00:15:04.130000 @@ -259855,11 +259858,11 @@ CVE-2024-41734,0,0,ee1445b5a6c50fe46a456bea41ccb696f4523dbb75f2650033b52fcf021a5 CVE-2024-41735,0,0,9b1bcbea87f6f37440d1c449d6340c711ae945b18c9cda4029f4e601f348537e,2024-09-12T13:53:32.993000 CVE-2024-41736,0,0,f12f0374fcc58eb9fac9e1d169220d47e16a0e5ad6c2e28256d8df041476b834,2024-09-12T13:51:42.727000 CVE-2024-41737,0,0,bcc2c31b9f08a899ad8c6d2953a09d2c0889e7eb08f1011b3147192ea690de38,2024-09-12T13:49:41.953000 -CVE-2024-41738,0,1,a6808727835cd2b2cc80bf122a0771de7820d21201249aa0c0345f68c41d07cd,2024-11-14T20:51:29.847000 +CVE-2024-41738,0,0,a6808727835cd2b2cc80bf122a0771de7820d21201249aa0c0345f68c41d07cd,2024-11-14T20:51:29.847000 CVE-2024-4174,0,0,e168dfb28a2573f66b3120de326c0954bda564c12e3831aed75de7f1338d3089,2024-04-25T13:18:02.660000 -CVE-2024-41741,0,1,ccd34eefc10ced5bf4d48e49b50366b947f28aa2b83fb2dfcdc45ff79ea550e2,2024-11-14T20:42:44.150000 +CVE-2024-41741,0,0,ccd34eefc10ced5bf4d48e49b50366b947f28aa2b83fb2dfcdc45ff79ea550e2,2024-11-14T20:42:44.150000 CVE-2024-41744,0,0,fc4eedd1a4bbdd823b105499b0a912c465f8e205cf09b2d4f8519632cc3e2fd2,2024-11-01T20:24:53.730000 -CVE-2024-41745,0,1,099100d567f038155daa92534283ffbc5becefb4479f9a979209e7ec8d982d6f,2024-11-14T20:35:33.390000 +CVE-2024-41745,0,0,099100d567f038155daa92534283ffbc5becefb4479f9a979209e7ec8d982d6f,2024-11-14T20:35:33.390000 CVE-2024-4175,0,0,2f40401bb337bcc37138495e1928fb4d762f69fc829f768d707a278e8a423e1a,2024-04-25T13:18:02.660000 CVE-2024-4176,0,0,2a1e283cc95c7d3d47b09f457f96512613ab4fb1878e9b333c02ce78f75d8385,2024-07-15T16:43:04.163000 CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000 @@ -260760,13 +260763,13 @@ CVE-2024-43083,0,0,9e09a78fc09963141a3fc02fd9ed1ad21971def8b416ce9fb9ce24f8d729d CVE-2024-43084,0,0,437d5cc042837f1bfc9cfa8d8d836f0c2f4c7883f5fb73f66819713dd173d647,2024-11-13T22:35:07.777000 CVE-2024-43085,0,0,c715c7e31f1af16a494792b8c4a654750dfcfcb152116fd578bca383daa762e5,2024-11-14T16:35:11.720000 CVE-2024-43086,0,0,b35a9c0f4b81e475922d197d48e538ace9956732719607be7dbe8800d97916ab,2024-11-14T16:35:12.570000 -CVE-2024-43087,0,1,df8687413166c680df9e58e2ffe928b52946447f2106313681b4f6900ac2725f,2024-11-14T19:35:08.150000 -CVE-2024-43088,0,1,1c13294f36b1f9b0be567789e36f583be558d3a79698dff40d24917c5068c2a3,2024-11-14T19:35:08.967000 +CVE-2024-43087,0,0,df8687413166c680df9e58e2ffe928b52946447f2106313681b4f6900ac2725f,2024-11-14T19:35:08.150000 +CVE-2024-43088,0,0,1c13294f36b1f9b0be567789e36f583be558d3a79698dff40d24917c5068c2a3,2024-11-14T19:35:08.967000 CVE-2024-43089,0,0,b277ca7768b3e4b4b0f60e1bf47b20ac676f3753e8cd1ebaabaa7be31aea80a8,2024-11-14T16:35:13.417000 CVE-2024-4309,0,0,5b40a8fbb2137dd0d77fe6c4c1c586190f4489f813d005ab45d5553c299b0b73,2024-04-30T13:11:16.690000 CVE-2024-43090,0,0,28e87613d5722ac4d9a0be826e296e6e3ad7500c170880234254815d7f83e6be,2024-11-13T22:35:07.990000 CVE-2024-43091,0,0,720dddedca98cc00358c0c207a42957b58527a650ba575507da86ca94d698e87,2024-11-14T15:35:08.470000 -CVE-2024-43093,0,0,c8d697c7de043e479109703ad96e3d7c26625a9c9645c9a220bc282f106d3add,2024-11-14T15:15:17.020000 +CVE-2024-43093,0,1,a5e7a7a99ded32f4ceacb99abeec61cc52c3868dd50355a02eece2e0b7c2cfec,2024-11-14T21:42:34.923000 CVE-2024-43099,0,0,1e8651c725576df83054b4b74436ff5087c13bad1e13244cb0e6a25df0f7bb09,2024-09-14T11:47:14.677000 CVE-2024-4310,0,0,08f5e8e76073c3640785934b5dbc198d89dde47497c02b1ac3fc670d20c22fd2,2024-04-30T13:11:16.690000 CVE-2024-43102,0,0,08e196b4c8739548226238903033d07bdd98395e1a6fb3461533ef08cfa70faf,2024-09-05T21:23:40.503000 @@ -261138,7 +261141,7 @@ CVE-2024-43495,0,0,d2a8d4c3f203ea859641059613f0257436e0f701c3b0d8de8a57b0ddb10ca CVE-2024-43496,0,0,1e4f277010291ea8388e3463633269924e9ec7b9c2f947668d81da4d3ef80c37,2024-09-23T17:32:54.663000 CVE-2024-43497,0,0,2537458188d3ab9aa76faa081a4fee596da658de243be9f1924628f34744e854,2024-10-17T21:15:30.827000 CVE-2024-43498,0,0,9135372ac5e3977470b2eb332390d436ca9fee66059a03ec8790ad9f4a433a6f,2024-11-13T17:01:58.603000 -CVE-2024-43499,0,1,7ebb7afefec77c5ab7a1f808c37fa1fd165da864c1ddb6b9d2371398ad1a5f62,2024-11-14T19:15:06.850000 +CVE-2024-43499,0,0,7ebb7afefec77c5ab7a1f808c37fa1fd165da864c1ddb6b9d2371398ad1a5f62,2024-11-14T19:15:06.850000 CVE-2024-4350,0,0,064be752b5def38b2ae127a671a2419b00cbe1db7bc8e8e49beca0c95658f61b,2024-08-30T18:18:37.130000 CVE-2024-43500,0,0,78bdbde8586a4aeadf73d960935866ca71ecb415ed1914c17c331c1e31d9dae2,2024-10-17T21:01:08.067000 CVE-2024-43501,0,0,3dab9521c0cc7c6361671a7526673e1c684c3d41e5a05cbd155304b95f78c3a9,2024-10-17T21:06:07.377000 @@ -261236,7 +261239,7 @@ CVE-2024-43592,0,0,66ef8868710faf1076b1b13051f2c75eebafbfe5976017df5a4f00073c2c6 CVE-2024-43593,0,0,7e17c95f595bed9729f21273d821a92cb32423e919d0faf83c37ed5dcd8b802f,2024-10-22T19:30:19.870000 CVE-2024-43595,0,0,c9530dd7915099d4a86e6d6506504fdd984e781ac89cb128030fa646bffdb2c0,2024-10-18T16:55:06.487000 CVE-2024-43596,0,0,0f30448ecbbf09d34768a5a54fbdb251259ce851c310b81f9cbc1d14d274f939,2024-10-18T16:59:08.667000 -CVE-2024-43598,0,1,a49a8ba853043290255d579663f01b51dacc414c74b45702ab0d4dc178d7ed05,2024-11-14T20:15:23.070000 +CVE-2024-43598,0,0,a49a8ba853043290255d579663f01b51dacc414c74b45702ab0d4dc178d7ed05,2024-11-14T20:15:23.070000 CVE-2024-43599,0,0,46d81ec2898b49efc1d06eab918dd819a14dff6d746dfc96a1846004d908dfe9,2024-10-17T20:03:28.687000 CVE-2024-4360,0,0,ecc9c2c2d55d835e0dd1d5a0ca496992d866a587cb1717ba0b6dc8cd29acfd1c,2024-08-12T13:41:36.517000 CVE-2024-43601,0,0,70d1af092a29e0256385b0b1eb94d28b1b04d755b5d71c8bb3ee4a255fe9335f,2024-11-08T22:15:20.270000 @@ -261272,7 +261275,7 @@ CVE-2024-43633,0,0,a669df41e6b8e280ede36b7d990c4a947611e3b4651b20636421d64a3c939 CVE-2024-43634,0,0,be46605526ccfa35f1252c530a1d59f1a4721e4cfb23c5e6b43085ce81e02003,2024-11-13T17:01:58.603000 CVE-2024-43635,0,0,fd289d1f1b223eefb059527c3a8cd1b78f42a2ae2aa2f373013ec3b9ff5bcfc2,2024-11-13T17:01:58.603000 CVE-2024-43636,0,0,ab440c7e821dc3f32c12ecf3b6fac62c7c24dc48162ef5309530325198cb4d0a,2024-11-13T17:01:58.603000 -CVE-2024-43637,0,1,737654f43dbf52f6320d615f45ceb3a2f2e1482d751022b3ef3fda23fc25c5ac,2024-11-14T20:15:23.993000 +CVE-2024-43637,0,0,737654f43dbf52f6320d615f45ceb3a2f2e1482d751022b3ef3fda23fc25c5ac,2024-11-14T20:15:23.993000 CVE-2024-43638,0,0,5d4563b9842099287f436a8e46a7e575b284f966e2c8b9bbb3f581433da01118,2024-11-13T17:01:58.603000 CVE-2024-43639,0,0,39dd6691d9e1e48649bade627c73acf7c371e16dce9774c261541277131745b3,2024-11-14T00:15:16.227000 CVE-2024-4364,0,0,9332cb50f761fbdff3ec7a6ec045f13accb15b963b30845c4aa93399b834b7a1,2024-07-24T20:23:31.487000 @@ -262346,7 +262349,7 @@ CVE-2024-45305,0,0,d8e5983b9530b80332e508eeeefa8750e30400000717cc407d2937a9af13a CVE-2024-45306,0,0,492d01bc755bef5620391aaeab10cbcbbc187e7fb0b5fdfef32f617ff36771b7,2024-10-01T15:20:29.533000 CVE-2024-45307,0,0,453e354c13ea082f71f784fb99af4cdeb162dcc05e43b9c9b2e7febafaebfb7b,2024-09-07T01:34:05.907000 CVE-2024-45308,0,0,700e0eb4024a102ed71899877978cfb0e434a318435f3d46acfc9659de5f360b,2024-09-03T12:59:02.453000 -CVE-2024-45309,0,1,f4049ebd525ebf7d9a070b0f28b330263ba82d3d3b5513f7651199ce08f029a9,2024-11-14T19:39:31.233000 +CVE-2024-45309,0,0,f4049ebd525ebf7d9a070b0f28b330263ba82d3d3b5513f7651199ce08f029a9,2024-11-14T19:39:31.233000 CVE-2024-4531,0,0,5dc1dd0922f3418ce95c33a9fc334c76453bfc98ac8636a0eebb27c9c952bb3f,2024-07-03T02:07:42.610000 CVE-2024-45310,0,0,b4f994e38147edf9427b72be6b743ed0caed3e55fb540eb2ac96b6f81ac208e0,2024-09-03T19:40:46.783000 CVE-2024-45311,0,0,31e4f90acb3914bc5f26ccdbeff62c6d2144f0789887b6397c99591eab2befc3,2024-09-25T17:03:36.817000 @@ -262925,7 +262928,7 @@ CVE-2024-46627,0,0,4cc8890cea4e8322a4c476b42c8fefe2b4b66b62a78446cc66eb2d1a37367 CVE-2024-46628,0,0,75b1cdb8791d268c28a8d1c2eb3eabb85cf8645763bd77b2b5fbf5588170833f,2024-10-04T17:18:31.663000 CVE-2024-4663,0,0,26abfae0d13c9db7079b41941554710f5ceae1c12961c27d4c50148758e145c4,2024-06-20T12:44:01.637000 CVE-2024-46632,0,0,abc659def740354695cf2f3df5ac488f8137388dc197ea59e5551153368ce0a9,2024-09-30T12:46:20.237000 -CVE-2024-46635,0,1,f734baba30d1fc1fbf7b88c7d8f0d678888adf80d108ab1f608ca9628303be55,2024-11-14T20:35:33.310000 +CVE-2024-46635,0,0,f734baba30d1fc1fbf7b88c7d8f0d678888adf80d108ab1f608ca9628303be55,2024-11-14T20:35:33.310000 CVE-2024-46639,0,0,32a1c80f017ce1b9b0a593e635fc1fe3b0612fc660594feed34360cf471ca787,2024-09-26T13:32:55.343000 CVE-2024-4664,0,0,b622a884dca6c94dd91f571bd68ec3e5e60df69c2ec441187a6010b0dbb54f4f,2024-08-01T13:59:32.680000 CVE-2024-46640,0,0,8a8901a45f157bc967024a42c670214bc1166786f3fd7086e031ee10a8d6de95,2024-09-26T13:32:55.343000 @@ -263198,7 +263201,7 @@ CVE-2024-46952,0,0,3444b82bcb136a59628b03fd05ed82e98f664dba01fba9072fb9ccd140595 CVE-2024-46953,0,0,1ac66484fd2bfafcc0c3fa8efd1c5670384cc15b372b551dc478a0e32265c98e,2024-11-14T02:01:09.580000 CVE-2024-46954,0,0,1c51b2cf98df98462cd0f63d13a6cbbce248971ad1254684ccfcb961f73b913d,2024-11-14T01:58:47.833000 CVE-2024-46955,0,0,6859a74370b7a98e23915805df3d1c3994da708d9324c0071b81c91c225b8a4b,2024-11-14T01:53:21.587000 -CVE-2024-46956,0,1,a3c6f157d772da02193157b28e147261098f90814e5cc49bec25afe198e21c86,2024-11-14T20:39:54.757000 +CVE-2024-46956,0,0,a3c6f157d772da02193157b28e147261098f90814e5cc49bec25afe198e21c86,2024-11-14T20:39:54.757000 CVE-2024-46957,0,0,1a1f161c8d8bab3db62f1fa9272e11eb4217a378f1fb9334b95d7f852bd44900,2024-09-26T16:15:08.883000 CVE-2024-46958,0,0,a066074c8ea90ca6497e29c818dbf400ff90cc8827530871d9d45fb4a3abe93e,2024-09-20T22:41:38.223000 CVE-2024-46959,0,0,49609311db8eb2484a5bda279fc39cc9dccd98f1d151343e94689d8818c061d9,2024-09-20T14:35:13.063000 @@ -263447,7 +263450,7 @@ CVE-2024-47328,0,0,983ca76f75739c6c5a714cbed6751627aac116c793e329729ee2a34061631 CVE-2024-47329,0,0,8f9cf4ad2ce9c10f9ea9bbbdd9112304e1d41b0ef8826075f80f55633e097d19,2024-10-07T17:47:48.410000 CVE-2024-4733,0,0,bab73609d3aaa55dacedcdd69b9c9d83fbc709adf98853b3adb423b13daf2498,2024-05-17T18:36:31.297000 CVE-2024-47330,0,0,8e1bb94d03c47cc1936bb0a3abc1d94c591039097eebb503639095132d634032,2024-10-02T17:26:49.470000 -CVE-2024-47331,0,1,676bf46bf803674feaabbe5776a2c5d7eff974f9c187b6ee25e37aee829df1b9,2024-11-14T19:22:49.760000 +CVE-2024-47331,0,0,676bf46bf803674feaabbe5776a2c5d7eff974f9c187b6ee25e37aee829df1b9,2024-11-14T19:22:49.760000 CVE-2024-47332,0,0,ac5ed213fd921095ee0b8be4048aa454f8ac7fdcdf6a18756d3c0921bb781874,2024-10-07T17:47:48.410000 CVE-2024-47333,0,0,512f6769e7250dfb91a8929703f1237d3beaa36f2d8957fee001943383c80c30,2024-10-07T17:47:48.410000 CVE-2024-47334,0,0,b009b1e08524049ac674c8aea8d43b565f40269928fb41da018eb521c9e21ecc,2024-10-10T12:51:56.987000 @@ -263559,12 +263562,12 @@ CVE-2024-47438,0,0,7e0b5e24785d49f8831b8f977c55089778dcfecdc1d3ed1a3ff3706e1db01 CVE-2024-47439,0,0,fd699d4af34618547dfc4fa9b3af7acc44300fb88cea698c573b3bfaf3e742d3,2024-11-13T19:11:48.890000 CVE-2024-4744,0,0,f2a62275342fb4e02e31ad60fb7b37b3a8ac2b2376213a1fba752ece8166ef2e,2024-06-12T16:44:12.157000 CVE-2024-47440,0,0,43d98456eee459100aa755cd72e412c04aa2168e096adac55805f69f958d3dd5,2024-11-13T18:52:57.013000 -CVE-2024-47441,0,1,1479ac749c9e743ace56bfafc7ab2566abf6710acac75e8f6acd2688a27c74f2,2024-11-14T19:09:41.703000 -CVE-2024-47442,0,1,3bf9fecf715a9e5e18b142731c234fd078a48b474bc36eb7d0491ffd17de8488,2024-11-14T19:09:51.347000 -CVE-2024-47443,0,1,1dcf0c600868d36fda16962d2760894b883a8628a4b98fff5983e4de2f83eec3,2024-11-14T19:10:01.277000 -CVE-2024-47444,0,1,d3fe594dc453d55be943e3202bb696525b4a84d77f2b027234360c5d0f1b27ac,2024-11-14T19:10:29.537000 -CVE-2024-47445,0,1,a9dbc6a36d1d30896e9174b86f7f3ee615b146047aaa4385a9a8b4c9c79ad152,2024-11-14T19:10:34.587000 -CVE-2024-47446,0,1,9f7569ca580ae92afb8852804ee0ea4974f50d040fd6bc83cd87bd8b77a128cf,2024-11-14T19:10:24.197000 +CVE-2024-47441,0,0,1479ac749c9e743ace56bfafc7ab2566abf6710acac75e8f6acd2688a27c74f2,2024-11-14T19:09:41.703000 +CVE-2024-47442,0,0,3bf9fecf715a9e5e18b142731c234fd078a48b474bc36eb7d0491ffd17de8488,2024-11-14T19:09:51.347000 +CVE-2024-47443,0,0,1dcf0c600868d36fda16962d2760894b883a8628a4b98fff5983e4de2f83eec3,2024-11-14T19:10:01.277000 +CVE-2024-47444,0,0,d3fe594dc453d55be943e3202bb696525b4a84d77f2b027234360c5d0f1b27ac,2024-11-14T19:10:29.537000 +CVE-2024-47445,0,0,a9dbc6a36d1d30896e9174b86f7f3ee615b146047aaa4385a9a8b4c9c79ad152,2024-11-14T19:10:34.587000 +CVE-2024-47446,0,0,9f7569ca580ae92afb8852804ee0ea4974f50d040fd6bc83cd87bd8b77a128cf,2024-11-14T19:10:24.197000 CVE-2024-47449,0,0,41f61b13e3dd2f4f5b46d75ab8d7ff84aae16e2e4e96b480eec29b17a142cd2c,2024-11-14T14:32:55.163000 CVE-2024-4745,0,0,54a19ac018881ab94cc09206a38557755449249c459a354d473ddea48bafd7eb,2024-06-12T16:23:34.197000 CVE-2024-47450,0,0,e59fcc3accbe89009d4278a792d4807261153ec8178fc8038a63474d199284a3,2024-11-14T14:26:45.873000 @@ -264339,7 +264342,13 @@ CVE-2024-48958,0,0,92a426e369946b14ff79b98b6fb42dd0c692d3b7d45d68198a4072bdaadf4 CVE-2024-4896,0,0,20cc2dc19f323150528d4fb3a23b846b2e602fa65e075afe5dc2b86cb95d9c94,2024-05-22T12:46:53.887000 CVE-2024-48963,0,0,6d60ed9d1e7a308212fb6ea5de6f1d94d8559909dd9cb5f4650d856671de0962,2024-10-30T14:54:53.937000 CVE-2024-48964,0,0,7d209543eb23e2e6809a7e4f01bdb09a7ba8fb1b32d439bae945ab7d5b6dd3de,2024-10-30T13:46:31.657000 +CVE-2024-48966,1,1,d5813f9a60c2438b6b780c4550c4e99bde0ab93c9c084953d747f351f7fd03ad,2024-11-14T22:15:17.727000 +CVE-2024-48967,1,1,d96fea70a772f8520ddbf9c2bbd840ff283b092688f2f7004e7d776cbbd803a7,2024-11-14T22:15:17.927000 CVE-2024-4897,0,0,b80483aa02f533d1f5c4695afa1f7ec5dae4ecfa8b472cf561efa5d05f8ff11d,2024-07-02T17:44:45.700000 +CVE-2024-48970,1,1,5f563678d67dcfe26333578200b13b5ea34a1ee98aae9c25cda4b4b5ae09c551,2024-11-14T22:15:18.137000 +CVE-2024-48971,1,1,ac19cbf277805a39057d67f803ce2d553d0c2a7d11070290af378d6153474166,2024-11-14T22:15:18.327000 +CVE-2024-48973,1,1,4b02cc436dd0a54227184b608b1dcbf8f2cdd92e6d392d8d40251698baedcfc2,2024-11-14T22:15:18.510000 +CVE-2024-48974,1,1,a697256b692285355762005fbf2a65d0dae9a75fe802b4209f219f91c3824571,2024-11-14T22:15:18.727000 CVE-2024-4898,0,0,a64ada88476e7dbd5dca1f8ed9406bed15a3acb87fadbe7d9a4f3102502b7a67,2024-07-23T17:50:44.033000 CVE-2024-48987,0,0,bb1285db59c3075341f96aec62f9b4ce4709041d90082c7f3534792a4d32fb84,2024-10-15T12:58:51.050000 CVE-2024-48989,0,0,58124d2b058d3a194dfa580edaf9984afd1d4350d13e9d1063b31cfbc8902f5b,2024-11-13T17:01:16.850000 @@ -264376,7 +264385,7 @@ CVE-2024-49019,0,0,e08679fc365479f57d65d68203459387c13c3c1dd4e5679713ba188e89b8c CVE-2024-4902,0,0,41bb791734595d42fd1c69ded99c61dc232bf3972633339d010380dd468a9fb6,2024-10-29T18:07:23.897000 CVE-2024-49021,0,0,aa53deff3838efd1c66c363e2988f51dc92f0fe1f44fbadc27229d2d752a53d8,2024-11-13T17:01:58.603000 CVE-2024-49023,0,0,af47ee9dc5b34537abe1e2a50e9a1a6dd7bec2ff89d9910cf199b8b7e8fc3c1a,2024-10-18T17:01:32.803000 -CVE-2024-49025,1,1,5b36b6511687656a4af0ef8b89408d3be008a49fa6cb3accb0de807c63dd75e7,2024-11-14T20:15:25.207000 +CVE-2024-49025,0,0,5b36b6511687656a4af0ef8b89408d3be008a49fa6cb3accb0de807c63dd75e7,2024-11-14T20:15:25.207000 CVE-2024-49026,0,0,389b45fb365606f0dc850137e89a99d79b49e7936c4d322daa7512c8f2a443d1,2024-11-13T17:01:58.603000 CVE-2024-49027,0,0,756a52ba86626ae0feaa38ac7b9ca7560a1f0424ed8969e0ec266d976b69f598,2024-11-13T17:01:58.603000 CVE-2024-49028,0,0,15af4a2817e602a0be5b827f4b62639c5042e250c1d16e5ecaf5290fdb0946fa,2024-11-13T17:01:58.603000 @@ -264562,7 +264571,7 @@ CVE-2024-49368,0,0,8be4e296ee1ec30084981da91255270e2fb2a840014ea77ee3103f7dcd091 CVE-2024-49369,0,0,506ab1709c519154cddee8878efb0f9f5997fc9f82755b9ac6e9d5dc78616c8a,2024-11-13T17:01:58.603000 CVE-2024-49370,0,0,a5cd1a59d8359f30b64653ed20bc47230e4ab479f61eed26e21f9e51248ce0d7,2024-11-06T22:31:30.160000 CVE-2024-49373,0,0,4aa9cfdbe744fd3ae046ca1eeb4ecc11fd5a7b167271bdbcafbe01dffbbbe75a,2024-10-30T21:16:59.213000 -CVE-2024-49376,0,0,190dbce5bcb7aada06f0c8b342eac2772846cf5d2a5dcc8eecc468a0b9c5d5e3,2024-10-28T13:58:09.230000 +CVE-2024-49376,0,1,cd559b6ff037aecb65c3d5840816f94e5487658ed4c219483ab43d3c98a1839f,2024-11-14T22:49:50.667000 CVE-2024-49377,0,0,f0a66be903c1ae0848c0330b2ecd5bcb10926f277636c57c6f6f956b317ea158,2024-11-06T18:17:17.287000 CVE-2024-49378,0,0,09a13f2bc12578e659c5acb1c73f93e5796dca0b69672708f3a85d0256e97128,2024-10-28T13:58:09.230000 CVE-2024-49379,0,0,3d849c956546825875132535f54762320e63df7b50f3a78cf46a30babea614e8,2024-11-14T16:35:15.103000 @@ -264637,9 +264646,9 @@ CVE-2024-49558,0,0,47432e1f54f695adb17b8dc00f9577022f45f8f0ba5da018a951249b00715 CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000 CVE-2024-49560,0,0,ab312f3dd70e163a5c72b63be519379ba38d0c543c55c0ea8821e33d6ab68e6b,2024-11-12T13:55:21.227000 CVE-2024-4957,0,0,e3bb8e47c8dfba146bed7647eff25fc6cc8427bb0bd54429262b4324d627abed,2024-07-03T02:08:22.473000 -CVE-2024-49579,0,1,0f0dd66a3db0fe299ae55b9b0e6c22f11c400dc3ee27d05103041b63e67e9d3e,2024-11-14T19:24:45.603000 +CVE-2024-49579,0,0,0f0dd66a3db0fe299ae55b9b0e6c22f11c400dc3ee27d05103041b63e67e9d3e,2024-11-14T19:24:45.603000 CVE-2024-4958,0,0,15591ba73d7708bbd560fadc0281274b5c7c2c12545797826fbf6e13e1222639,2024-06-03T14:46:24.250000 -CVE-2024-49580,0,1,89085af96d96dbfcdc87aa1d40157bd1a1b8615e2e8f40b207dbbe916ae159de,2024-11-14T19:25:47.433000 +CVE-2024-49580,0,0,89085af96d96dbfcdc87aa1d40157bd1a1b8615e2e8f40b207dbbe916ae159de,2024-11-14T19:25:47.433000 CVE-2024-4959,0,0,862ee7700763d202e5d5dada80050e48cca3b83d56a63673f2017bcf5adb7503,2024-07-03T02:08:22.750000 CVE-2024-49593,0,0,28b8568333d09b89b040a623f287dcf302e51d7008368ee150b7fde946577e54,2024-10-18T12:53:04.627000 CVE-2024-4960,0,0,1e2962fabc78c9680506fb58bfd339ee733c096965130a77b4df6d334c6fc642,2024-08-01T21:15:53.753000 @@ -265210,7 +265219,7 @@ CVE-2024-50261,0,0,946c442cc56e3e8af45dc6329602e8261cd21844e512a68f35505737590fc CVE-2024-50262,0,0,491da488ea3f6be70bbe09eed55bf84625143c296910fe98f090fd0f0e85c13c,2024-11-13T21:10:44.267000 CVE-2024-50263,0,0,031640c798eb6a3a8aeb817df2908ddb318a337ddb803a116f07c15a4af2eba6,2024-11-14T16:23:08.347000 CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000 -CVE-2024-50305,0,1,0ac0ed2449a977be00632b91304d1c4dd569cf943961c8a7c2303ec2dddef88b,2024-11-14T19:35:16.650000 +CVE-2024-50305,0,0,0ac0ed2449a977be00632b91304d1c4dd569cf943961c8a7c2303ec2dddef88b,2024-11-14T19:35:16.650000 CVE-2024-50306,0,0,cc5580a479aa56497866a68f93d6dda4574cf88b0c33aa007c3b6c36cae3f549,2024-11-14T18:35:03.743000 CVE-2024-50307,0,0,6d2dcfccb50c0c30fd7d9bda3b36490982da8110db31d087befc4509a1d360cd,2024-10-28T13:58:09.230000 CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000 @@ -265430,7 +265439,7 @@ CVE-2024-5062,0,0,1dce1f93ce1b9242e76ae9cf090eb76ee6afadb656622c6eb5a578a5eb7601 CVE-2024-50623,0,0,71c6fad96d3194eba7d5d7edd081f9ad30cc6decd08744ac71e97f086f12f546,2024-10-30T21:35:11.373000 CVE-2024-50624,0,0,2f6d7cbc06ddd09de063e5bd0feef072f438fbd478c20a099bcf6256ed039f90,2024-10-30T21:35:12.223000 CVE-2024-5063,0,0,3ea00cb3f53084b2393e5a818811e5957f116b348338ce87a59f64292b187a9f,2024-06-04T19:20:57.760000 -CVE-2024-50634,0,1,fc2a161c2c755e76311d472b0c0ca48eeb524c368ea8177e76956b97738f2002,2024-11-14T20:40:43.690000 +CVE-2024-50634,0,0,fc2a161c2c755e76311d472b0c0ca48eeb524c368ea8177e76956b97738f2002,2024-11-14T20:40:43.690000 CVE-2024-50636,0,0,2fc9138fa183119876b777928207f426f13352402fa782392dc2b828754f0184,2024-11-12T13:55:21.227000 CVE-2024-50637,0,0,7cb3fd4c2566fc1d1593156e77d24b90af6dfd042618185e839399543b673bed,2024-11-07T14:15:16.780000 CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000 @@ -265472,14 +265481,14 @@ CVE-2024-50833,0,0,8a96d04960a2653f66a832963d35c2f3eafedd781373d43d2535c42d531f1 CVE-2024-50834,0,0,ff4e100f60622e5d9ce338fcf7ab94d399525bdbd301fed837c9edc8d99c4f5a,2024-11-14T17:15:07.003000 CVE-2024-50835,0,0,4c49f45501187673346fd1cc366755759fd782ee43c85d8161bb20ac39b258a6,2024-11-14T17:15:07.090000 CVE-2024-50836,0,0,e4170c7bde5a8712bd1a169ba3cd2bdeba23ba63ce58eac087ccd35178aa8e33,2024-11-14T17:15:07.177000 -CVE-2024-50837,0,1,96fcb499d8472366d78a24893fbbac02e051d7a3c4b83012b851978cab4924d9,2024-11-14T19:35:17.623000 -CVE-2024-50838,0,1,d3c85db11c13d4fba199f7e6340f60a6c715055c9315a5219004d92d9ce4c5df,2024-11-14T19:35:18.427000 -CVE-2024-50839,0,1,01640e157e2a49f4f650966b70746ee61106bde203a589e9de4ac4be36608fd9,2024-11-14T19:35:19.240000 +CVE-2024-50837,0,0,96fcb499d8472366d78a24893fbbac02e051d7a3c4b83012b851978cab4924d9,2024-11-14T19:35:17.623000 +CVE-2024-50838,0,0,d3c85db11c13d4fba199f7e6340f60a6c715055c9315a5219004d92d9ce4c5df,2024-11-14T19:35:18.427000 +CVE-2024-50839,0,0,01640e157e2a49f4f650966b70746ee61106bde203a589e9de4ac4be36608fd9,2024-11-14T19:35:19.240000 CVE-2024-5084,0,0,79705ce3d53f6e7c72da00fccc935c6da44be9bf4354c31cd8528afb5e0a643e,2024-05-24T01:15:30.977000 -CVE-2024-50840,0,1,8955f492100255068b940e7935b918e5bbcb11994bf34f2daf1b5882bc9a7544,2024-11-14T19:35:20.033000 -CVE-2024-50841,0,1,ee2c60c11c28af1ad6f5941091e02458a0eeda596a52828fe6a1eeb35f455204,2024-11-14T19:35:20.837000 -CVE-2024-50842,0,1,5121c7171f1e61aaa48992446e276abddf9e8bc92a9c1fc4eb5a094a20f99e76,2024-11-14T19:35:21.650000 -CVE-2024-50843,0,1,7c516cdb53e3e589740dd68d67e686b2cd7aad02d1967da6279de76f51b446c0,2024-11-14T19:35:22.450000 +CVE-2024-50840,0,0,8955f492100255068b940e7935b918e5bbcb11994bf34f2daf1b5882bc9a7544,2024-11-14T19:35:20.033000 +CVE-2024-50841,0,0,ee2c60c11c28af1ad6f5941091e02458a0eeda596a52828fe6a1eeb35f455204,2024-11-14T19:35:20.837000 +CVE-2024-50842,0,0,5121c7171f1e61aaa48992446e276abddf9e8bc92a9c1fc4eb5a094a20f99e76,2024-11-14T19:35:21.650000 +CVE-2024-50843,0,0,7c516cdb53e3e589740dd68d67e686b2cd7aad02d1967da6279de76f51b446c0,2024-11-14T19:35:22.450000 CVE-2024-5085,0,0,6942e3068671e85a9578eddbb7240c8706dd53cd6ec5670c5d4ddd91c950a30a,2024-05-24T01:15:30.977000 CVE-2024-50852,0,0,64b96a730bbab5fdeb50ea2ef9d8c753a3ee332a2ced5e6155c4d6262476cb74,2024-11-14T14:38:04.837000 CVE-2024-50853,0,0,1baed05583acd81f33e173c1b1cff8a1aa290b815790fbe2c0ede1914c1b3840,2024-11-14T14:49:16.290000 @@ -265498,6 +265507,7 @@ CVE-2024-50955,0,0,ec1df4774ced3ee8e08b0e6dc33a1298def9632e674148ec98ebb3b55df15 CVE-2024-50956,0,0,aa07eba7d8457d8deebcae0bdda9a793e5e68b4579e4144dcb9e44a634484de5,2024-11-13T22:15:15.773000 CVE-2024-5096,0,0,5ed717834c38883681c6d180e391a0fccee5714f6ff3215bd896b6366e61be87,2024-06-04T19:20:58.687000 CVE-2024-50966,0,0,17999db3c119b65097d64bae028974d0e6d4cf5d6910c7a7a211536c5ff5b48a,2024-11-08T19:01:03.880000 +CVE-2024-50968,1,1,e9b4ecd2f141afeba881b07b4f0db960c0ae6d7b8e09b0b3c3fa4f924f151914,2024-11-14T22:15:19.900000 CVE-2024-50969,0,0,f82f81fef8a82d72e4053f9ec8030a8d4d20833c5d6be0f5bb0e03f29d0491f9,2024-11-14T14:47:53.487000 CVE-2024-5097,0,0,f8c17c92eeab06c631c7e3bccbcd56a5be798bb0ae3554a5ecf4b2a49f948336,2024-06-04T19:20:58.787000 CVE-2024-50970,0,0,2e7889cd3277e474e337527bd160fa64940d7885ad18ecb1fd92dbeebea4ffd5,2024-11-14T14:52:08.097000 @@ -265564,7 +265574,7 @@ CVE-2024-51075,0,0,65ae3c5f839d1343cfe96d616d54dd3277e3aa60c8e36fb4e4a98f4465a84 CVE-2024-51076,0,0,cd339191f7270b925031f2e79ccdef36faac89c073f1d7fece38ee50c55aeb1f,2024-11-04T13:41:48.267000 CVE-2024-5108,0,0,b8eaa0c49e3b7a0772fb8d227eefbcd229b705e71c1ea537a10c0b9ca289502f,2024-06-04T19:20:59.700000 CVE-2024-5109,0,0,ceb18a5d96497e9a6ac7740a19ad17f4e12924c64b1533f15150f5dd2571e331,2024-06-04T19:20:59.803000 -CVE-2024-51093,0,0,bbde49643f29baaae4d2637238c7a74dd7b01c78efbfc29738a397bed36ce474,2024-11-13T17:01:16.850000 +CVE-2024-51093,0,1,70b0da1395aa1fd7d223f8a1ca5a0874697a23e76df9769a11cb02923393ec6f,2024-11-14T22:15:19.993000 CVE-2024-51094,0,0,0ce73c327a1533ca853f11e375f5bcf1b18f54cea162e0846fe5dae6c98f7269,2024-11-13T23:15:04.207000 CVE-2024-5110,0,0,97ec9134be0ff29c231012cbb3632c9becbf0944f1a706861520a2aec58057e2,2024-05-20T13:00:04.957000 CVE-2024-5111,0,0,1e1510502a884c6f23b18cee848205aa75aeed3171cb87569d39e4078bf9232b,2024-06-04T19:20:59.907000 @@ -265579,6 +265589,7 @@ CVE-2024-51136,0,0,b7028b746c76b0b8db7064a5c94d8b9b8b4865b267652b712081099f88f87 CVE-2024-5114,0,0,51655375bf74d88d0b44bf3106775b49d83b04b179d3446b4a92ffe727b17b66,2024-06-04T19:21:00.217000 CVE-2024-5115,0,0,566281473e2daa2487dd251e202869dc3059aeec07f7c63daa38b65c3bae3de7,2024-06-04T19:21:00.323000 CVE-2024-51152,0,0,2fc415b0efc6d5417097e1245b382b91c976aaa5917a1040e7761d3f03c4c572,2024-11-13T20:03:06.083000 +CVE-2024-51156,1,1,fd68715628c43bd6fec84797fb8738e9d093fbe22b5f958056ed30ce651d0966,2024-11-14T22:15:20.100000 CVE-2024-51157,0,0,15c268449f10cd3f5e2b0f898333f8df5f6a7a275257a0f4491ba5cb90f1b17e,2024-11-12T13:56:54.483000 CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000 CVE-2024-5117,0,0,8f71e5dda3348556d6b06143dcd47b79229dad0468d30aa7c38f8c5c1ecb8524,2024-06-04T19:21:00.547000 @@ -265676,14 +265687,14 @@ CVE-2024-5148,0,0,bd5836562cd7c4456364427f29f33cc1c67447ccbfc1a9320a1023f854c7eb CVE-2024-51481,0,0,79865ece5695e59d21a71c5242cb6b84c6582b835d3ed06315b12ef5cbe5ff4e,2024-11-01T12:57:03.417000 CVE-2024-51482,0,0,bfd63cd113518065a1bebad51613f86054f6e228acaf54013add2bd0a434c523,2024-11-05T14:15:14.840000 CVE-2024-51483,0,0,f70c42f235544d305181618bf39f85a2958b60e254bcd1640771f1e1cba85c88,2024-11-01T20:24:53.730000 -CVE-2024-51484,0,1,5ad773dfa5945e967ed814ecd83f8950f4a4be9ded42c813ce8f58f67f3e839a,2024-11-14T20:14:44.360000 -CVE-2024-51485,0,1,048497f9e62d1928c48f09ad1aa496e653c26dc6a3d76047826a152202d1f209,2024-11-14T20:06:12.627000 -CVE-2024-51486,0,1,fbc0430671200f5bea2fd75bf3c998ad971ed972c97a19a8cafbccb43ea185a9,2024-11-14T19:55:34.890000 -CVE-2024-51487,0,1,a83a631e81d66653d31978f19924867892c25aaddc9eac90a67354f92618e935,2024-11-14T19:37:53.107000 -CVE-2024-51488,0,1,a48a7601698a74a180f128f3050edf74445080860fde1b7f806d8ef650e632d0,2024-11-14T20:12:58.443000 -CVE-2024-51489,0,1,e5ad0022488018990486a414e781379ff86a44ab1670849d0fdca11bd887fc39,2024-11-14T20:12:52.027000 +CVE-2024-51484,0,0,5ad773dfa5945e967ed814ecd83f8950f4a4be9ded42c813ce8f58f67f3e839a,2024-11-14T20:14:44.360000 +CVE-2024-51485,0,0,048497f9e62d1928c48f09ad1aa496e653c26dc6a3d76047826a152202d1f209,2024-11-14T20:06:12.627000 +CVE-2024-51486,0,0,fbc0430671200f5bea2fd75bf3c998ad971ed972c97a19a8cafbccb43ea185a9,2024-11-14T19:55:34.890000 +CVE-2024-51487,0,0,a83a631e81d66653d31978f19924867892c25aaddc9eac90a67354f92618e935,2024-11-14T19:37:53.107000 +CVE-2024-51488,0,0,a48a7601698a74a180f128f3050edf74445080860fde1b7f806d8ef650e632d0,2024-11-14T20:12:58.443000 +CVE-2024-51489,0,0,e5ad0022488018990486a414e781379ff86a44ab1670849d0fdca11bd887fc39,2024-11-14T20:12:52.027000 CVE-2024-5149,0,0,35aba13432990695b4ab26ada33d31578be519ff456b8edf807a15027d0b18f5,2024-06-06T14:15:01.960000 -CVE-2024-51490,0,1,ce278c5bd11182b0f76e1306bfd4f5475ffe3bef255b34a2e09a247de41ed216,2024-11-14T20:13:01.587000 +CVE-2024-51490,0,0,ce278c5bd11182b0f76e1306bfd4f5475ffe3bef255b34a2e09a247de41ed216,2024-11-14T20:13:01.587000 CVE-2024-51492,0,0,0a58c7013d2cd1abea36461b62b0843b3a8fe747b96ce2f6ac388e3c542b0b6c,2024-11-01T21:15:15.080000 CVE-2024-51493,0,0,905ca061a7e2249944cb0aec37c9054b75e237343bc05a733cf47492ea8f9f1d,2024-11-06T18:17:17.287000 CVE-2024-51498,0,0,a215c64a461c357224f24d4e16a3f3f3214ac081278e197bc9556945ad303f5e,2024-11-05T16:04:26.053000 @@ -265755,9 +265766,9 @@ CVE-2024-51583,0,0,010a1e766cc75cf146f9c46f237fd66f102136959cced374ac920d84a09d7 CVE-2024-51584,0,0,9c4a52f0d53ee42578cceb9af71c252fa973eb5d3948982134b3891bd8f24f09,2024-11-14T02:23:33.777000 CVE-2024-51585,0,0,f8f0159c16016c8277cf65597d8f99b43d67be3e4576e769b2c2d94060d5ff5c,2024-11-12T13:56:24.513000 CVE-2024-51586,0,0,a8972424c5984945ec92c9d745b8e4e19d8648e53cf9bf4412423a5729e18a26,2024-11-12T13:56:24.513000 -CVE-2024-51587,0,1,5012d2ea8e67b5c3d09827ef519aa6163b1c4ce17e7784b8af6d96ad392aa639,2024-11-14T20:26:14.467000 -CVE-2024-51588,0,1,70526e1ab4d1d5c15696a10cecb0303b3b1171b870de0da3e9c134310aec09dc,2024-11-14T20:26:28.047000 -CVE-2024-51589,0,1,f74ef05c06e608fec4a8cb8e6637837c5709985a6e45866d77121ef9596fd10a,2024-11-14T20:26:41.497000 +CVE-2024-51587,0,0,5012d2ea8e67b5c3d09827ef519aa6163b1c4ce17e7784b8af6d96ad392aa639,2024-11-14T20:26:14.467000 +CVE-2024-51588,0,0,70526e1ab4d1d5c15696a10cecb0303b3b1171b870de0da3e9c134310aec09dc,2024-11-14T20:26:28.047000 +CVE-2024-51589,0,0,f74ef05c06e608fec4a8cb8e6637837c5709985a6e45866d77121ef9596fd10a,2024-11-14T20:26:41.497000 CVE-2024-5159,0,0,6487690749e64572084b0b1ffb84b7950e8b682c3129ca3d21d0dbc204e9ec91,2024-10-25T19:35:15.010000 CVE-2024-51590,0,0,2b2dd3629e58a1a0a584c789ff16e47b54d755aa79cd57fc09a49fbe103244b5,2024-11-12T13:56:24.513000 CVE-2024-51591,0,0,726468de391ad91b93d7baa9a968a1009926515da7cdc024a9ffcb433fe899c7,2024-11-14T17:51:14.717000 @@ -265766,7 +265777,7 @@ CVE-2024-51593,0,0,0b8922825fb0b901603d2f67d3b43c5b8e0349818c9523e9ebd1542dcf2e0 CVE-2024-51594,0,0,6349168b6c38502c80c5202765ac4a54912ffa4126b37a3166a4be8b98199c58,2024-11-12T13:56:24.513000 CVE-2024-51595,0,0,86c632a830d98810cba6685fef0932835324b783d480bd1e19dc70d238e88d12,2024-11-12T13:56:24.513000 CVE-2024-51596,0,0,68d56f326e86c174368dc8e5c4f277c0b65894f0149206735201856a3bb51840,2024-11-12T13:56:24.513000 -CVE-2024-51597,0,1,e580da6df611238773fd113640aa155cd0ddae703c31494078adb66dd981bd48,2024-11-14T20:27:46.943000 +CVE-2024-51597,0,0,e580da6df611238773fd113640aa155cd0ddae703c31494078adb66dd981bd48,2024-11-14T20:27:46.943000 CVE-2024-51598,0,0,ab45aa537bf288c8af2bb6366c2e9a74b71582c9d0d27efbfe545b94537181da,2024-11-12T13:56:24.513000 CVE-2024-51599,0,0,5cd988e2787a53cdc2d1a464fab74b9367513165a89a10c905f4537cb27134dd,2024-11-12T13:56:24.513000 CVE-2024-5160,0,0,761bdadb9ac3f89d156978519ca326c5704c62592c7f03e703ecc7e802a865d7,2024-07-03T02:08:36.807000 @@ -265802,6 +265813,8 @@ CVE-2024-5163,0,0,1f45f157a740def8c3f1c2e097025198bc2166983108f63600058e7c57408d CVE-2024-51630,0,0,22adffaa9039d1fe9e03a4e48d178f89d1bd36af85559e36a535a227a69b456d,2024-11-12T13:56:24.513000 CVE-2024-51647,0,0,0c6d8f9a804912e43c7869d3b717f4cbcd6166cf1be9c7b6f9ef329e8fce46cc,2024-11-12T13:56:24.513000 CVE-2024-5165,0,0,2b7469c3d25cc1e03e7fcca1607bc78daf489d82c018a0fbc4f3b815c328cf85,2024-05-24T01:15:30.977000 +CVE-2024-51658,1,1,3bda80de595ed6ce4f9dabc667edf54d96a33bf2f9ee6f0f6c81a2538fec842b,2024-11-14T22:15:20.187000 +CVE-2024-51659,1,1,bf6fe4d913d8ef3c8599c1c281c6f9f1237194f182af6128aaa81ce84a9ec197,2024-11-14T22:15:20.390000 CVE-2024-5166,0,0,5c544eab21844e01fabd3874ed7776a55145987bd3a510311ad16f12f33bd2bc,2024-05-22T18:59:20.240000 CVE-2024-51661,0,0,7f81708d1fd43600536029afc897b01b4855aee3d2fe39c5692b8132139274de,2024-11-08T15:02:08.660000 CVE-2024-51662,0,0,f5359332d7a9d4e37aab99663d0e73af1a60912d65021c3415523622490d6f78,2024-11-12T13:56:24.513000 @@ -265818,13 +265831,16 @@ CVE-2024-51675,0,0,8a4bacc24cff024145f3f2bcaf3202f909b690eb8b24ec3863ccfd5d10856 CVE-2024-51676,0,0,ece0a16779fe3a19431027941663a0cdb1298b76465f9e748c1eef77d20b83f9,2024-11-12T13:56:24.513000 CVE-2024-51677,0,0,8b0f7a3853108bd14021b832cd2914a4bbd49dc774029c03bf84670c6d192320,2024-11-06T22:10:31.677000 CVE-2024-51678,0,0,ce4086679232add4ebc40be30bdc12f20f02b66e38c181d2556e9473603941fd,2024-11-06T22:10:45.103000 +CVE-2024-51679,1,1,c6cf4cbab8ac5216f729883f6b1e88f15c9a7d5f346cb1ab3dc5d99c672b9fed,2024-11-14T22:15:20.610000 CVE-2024-5168,0,0,cbe1b6c96aef7b506dd526cf00951c936dfc5233fd9563b4af0bf7fdab7a5899,2024-05-24T01:15:30.977000 CVE-2024-51680,0,0,e3d442fcfe0b4fceddb505a5eff13c52978f820716977fad69b0fdd39fa2c605,2024-11-06T22:10:59.270000 CVE-2024-51681,0,0,6987ab81beb2df0eaa9da220f2d791ed5d8df3f0e18bd37d9a9b390a4eaf5a17,2024-11-06T22:11:16.003000 CVE-2024-51682,0,0,aaba0581a3d811571ae104155388a45dd47ae531ed284c6ab0022efdb152fbe5,2024-11-06T22:12:02.353000 CVE-2024-51683,0,0,f59d50717ee7305489d521abf4c5c1ef491e4436568b0e3c6dd145e0ad77427b,2024-11-06T22:12:19.803000 +CVE-2024-51684,1,1,24e1e7c8c6901580073f63c406d394fc7ca548013bd85f72aa7e461e38516fa1,2024-11-14T21:15:22.140000 CVE-2024-51685,0,0,3ec6f589ce8427b20bd90f3e3168669c47fda17fa0f474f038e9a6e94e0e60b9,2024-11-06T19:34:31.590000 -CVE-2024-51688,1,1,f336ea0855ea6c7ae9e523ec49c986b999bafe76f23320e5c7d552ada048279f,2024-11-14T20:15:25.810000 +CVE-2024-51687,1,1,04e6a0201bc9489eec8e83409b200c54e336546fbd229f632336e7cdef1933e3,2024-11-14T21:15:22.353000 +CVE-2024-51688,0,0,f336ea0855ea6c7ae9e523ec49c986b999bafe76f23320e5c7d552ada048279f,2024-11-14T20:15:25.810000 CVE-2024-51689,0,0,ab2f405c7815c7db8e61d12d5b0c31d4e0752b7068e1e475bf3338853f840d9d,2024-11-12T13:56:24.513000 CVE-2024-5169,0,0,882a6aa1fee4c71f4df51ce353ec6b27431ae776e2b2b23b3c5ba8c59ca21797,2024-08-02T15:00:10.200000 CVE-2024-51690,0,0,7e5eae0ff5cca9f377bf464de65b2d968392e357bd55f7a073753a3ee3d229f4,2024-11-12T13:56:24.513000 @@ -266023,8 +266039,8 @@ CVE-2024-5232,0,0,8d68905f3b69b3dadb32694d2c73f30dc32ad3c794d56bacf5b1c8bfed3d3b CVE-2024-5233,0,0,d230ff373762a089849cb791769c151d4d1eb1a364270894bffa0dbac945e679,2024-06-04T19:21:02.993000 CVE-2024-5234,0,0,14a09ab7485c5dff6a0e2d37ff7f584b26da4a8cf075e00d5ab541632ac32bbb,2024-06-04T19:21:03.100000 CVE-2024-5235,0,0,98bbbe6acfd408ea35eab71055bef5859edfdf3c3c90f82fa44b5b2f0c597f28,2024-06-04T19:21:03.207000 -CVE-2024-52350,0,1,e1972ef2ed811c153b13903abf6cdb344f717306ca9175d9381f4d30088fc38a,2024-11-14T20:22:24.387000 -CVE-2024-52351,0,1,bc8a69483160ec6542284bd2a28a21525e92c209bc39a02aab3ce5329e7f65b5,2024-11-14T20:24:39.083000 +CVE-2024-52350,0,0,e1972ef2ed811c153b13903abf6cdb344f717306ca9175d9381f4d30088fc38a,2024-11-14T20:22:24.387000 +CVE-2024-52351,0,0,bc8a69483160ec6542284bd2a28a21525e92c209bc39a02aab3ce5329e7f65b5,2024-11-14T20:24:39.083000 CVE-2024-52352,0,0,d000632140f71e44e942a3dbc2ddd9260fa470cb96bef8ac5f8ba3eea1f0382e,2024-11-12T13:55:21.227000 CVE-2024-52353,0,0,8f6fdbf8162ece41a08a7cc2a2dc9e5249ac6195297b0e830ced0d3f4bc5c84a,2024-11-12T13:55:21.227000 CVE-2024-52354,0,0,bd5ed3d68271f155fc3112a493679226950394a406d6f8e4021a12bfa7a3c4fe,2024-11-12T13:55:21.227000 @@ -266033,9 +266049,9 @@ CVE-2024-52356,0,0,6f52c6a317f3e6d9b4fea003476d72ca3813f755516b2759515eed910b7d7 CVE-2024-52357,0,0,0b87f00ebcffd7ab9b093f3ccd343158c40fba6d8989757f4c8a16b72f945025,2024-11-12T13:55:21.227000 CVE-2024-52358,0,0,98865d3b54e5cf46f7348181649ffde2326b16ddca1830d7a36a631093f0fb1c,2024-11-12T13:55:21.227000 CVE-2024-5236,0,0,3a876190aab882c0110e09fef49a5c72516897cda47bddba2de12251cfa9a5e8,2024-05-24T01:15:30.977000 -CVE-2024-52369,1,1,ae9094b09e5afb967416763a162ae84e427c99fc8df047cc10454b5d4560616d,2024-11-14T19:15:09.533000 +CVE-2024-52369,0,0,ae9094b09e5afb967416763a162ae84e427c99fc8df047cc10454b5d4560616d,2024-11-14T19:15:09.533000 CVE-2024-5237,0,0,8803efe45da93d97b55082adbd1bb29281c1282514c20ec3608a648081cd56be,2024-06-04T19:21:03.317000 -CVE-2024-52370,1,1,8c9d6ca4ccd27001e922f930f3ccceb2cdfaf3ddd39977cc6e79e5f0568f9844,2024-11-14T19:15:09.760000 +CVE-2024-52370,0,0,8c9d6ca4ccd27001e922f930f3ccceb2cdfaf3ddd39977cc6e79e5f0568f9844,2024-11-14T19:15:09.760000 CVE-2024-52371,0,0,e317ec242f10297ab3e3fbb218a6c860ca6829dfd4eae7680de76f5511014375,2024-11-14T18:15:21.383000 CVE-2024-52372,0,0,23bb66a968be43561306c3e6f22460792787db17519c7be51902bbab5c73f773,2024-11-14T18:15:21.737000 CVE-2024-52373,0,0,356a21a49fe25c0e02ed4d02c15b4a7e816a29c13c357516adc354a0e2147649,2024-11-14T18:15:21.993000 @@ -269638,6 +269654,8 @@ CVE-2024-9825,0,0,43f77069eab20c6659796a5ca73cb04eb18b719fa0ad0721704c789de71379 CVE-2024-9826,0,0,c03e2e0710a5712915ae2341fa5030e5bd74d5917743f7fdf85c043b115b921d,2024-11-01T16:17:10.620000 CVE-2024-9827,0,0,c5e7676b9d011eef0934f8d1e51cd92697f77495088547784042162cb4944824,2024-11-01T16:17:07.187000 CVE-2024-9829,0,0,ea980a1e481fc86407edeb6f0040d6f4a6ff2d17edcbe8d18dd95381292ad49b,2024-10-25T16:30:44.520000 +CVE-2024-9832,1,1,250bc8a027d07cac875fe02fa67ee6cd9ae11b581359f4050abc5ada38057db9,2024-11-14T21:15:22.593000 +CVE-2024-9834,1,1,67abbf15dee09830db62f959cdd27d0286551b3552366821272b2b280ac302b9,2024-11-14T21:15:22.803000 CVE-2024-9835,0,0,ca18e7b41fab9b483950f5f59199903f1b661b24923c7a18a4c44cf7bcb08f14,2024-11-12T15:35:17.853000 CVE-2024-9836,0,0,5d120048cea246a15edceb1ecc1c13de92be1dc1c21567e1e478f7428ef25fec,2024-11-12T15:35:18.093000 CVE-2024-9837,0,0,bb8fbc31e530027dfddbaf6dae2f5d1b4333d91b7cafcea32a3d82a1ea54dea9,2024-10-15T12:57:46.880000