diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10074.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10074.json new file mode 100644 index 00000000000..99653496ef2 --- /dev/null +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10074.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-10074", + "sourceIdentifier": "scy@openharmony.io", + "published": "2024-12-03T13:15:04.490", + "lastModified": "2024-12-03T13:15:04.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "in OpenHarmony v4.1.1 and prior versions allow a local attacker cause the common permission is upgraded to root through use after free." + }, + { + "lang": "es", + "value": "en OpenHarmony v4.1.1 y versiones anteriores se permite que un atacante local haga que el permiso com\u00fan se actualice a root mediante el uso use after free." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "scy@openharmony.io", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "scy@openharmony.io", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-12.md", + "source": "scy@openharmony.io" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10224.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10224.json index 6dfd47f7584..66c06c0f6ad 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10224.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10224.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10224", "sourceIdentifier": "security@ubuntu.com", "published": "2024-11-19T18:15:19.773", - "lastModified": "2024-11-19T21:56:45.533", + "lastModified": "2024-12-03T14:15:19.270", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Qualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before version 1.36 a local attacker could possibly execute arbitrary shell commands by open()ing a \"pesky pipe\" (such as passing \"commands|\" as a filename) or by passing arbitrary strings to eval()." + }, + { + "lang": "es", + "value": "Qualys descubri\u00f3 que si se usaba una entrada no desinfectada con la librer\u00eda Modules::ScanDeps, antes de la versi\u00f3n 1.36, un atacante local podr\u00eda posiblemente ejecutar comandos de shell arbitrarios abriendo una \"molesta tuber\u00eda\" (como pasar \"commands|\" como nombre de archivo) o pasando cadenas arbitrarias a eval()." } ], "metrics": { @@ -19,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -26,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "LOW", - "baseScore": 5.3, - "baseSeverity": "MEDIUM" + "availabilityImpact": "LOW" }, "exploitabilityScore": 1.8, "impactScore": 3.4 @@ -59,6 +63,14 @@ { "url": "https://www.qualys.com/2024/11/19/needrestart/needrestart.txt", "source": "security@ubuntu.com" + }, + { + "url": "https://lists.debian.org/debian-lts-announce/2024/11/msg00015.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.openwall.com/lists/oss-security/2024/11/19/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11003.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11003.json index 7786caf4bf3..17df188bb12 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11003.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11003.json @@ -2,13 +2,17 @@ "id": "CVE-2024-11003", "sourceIdentifier": "security@ubuntu.com", "published": "2024-11-19T18:15:19.973", - "lastModified": "2024-11-19T21:56:45.533", + "lastModified": "2024-12-03T14:15:19.800", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Qualys discovered that needrestart, before version 3.8, passes unsanitized data to a library (Modules::ScanDeps) which expects safe input. This could allow a local attacker to execute arbitrary shell commands. Please see the related CVE-2024-10224 in Modules::ScanDeps." + }, + { + "lang": "es", + "value": "Qualys descubri\u00f3 que needrestart, antes de la versi\u00f3n 3.8, pasa datos no desinfectados a una librer\u00eda (Modules::ScanDeps) que espera una entrada segura. Esto podr\u00eda permitir que un atacante local ejecute comandos de shell arbitrarios. Consulte el CVE-2024-10224 relacionado en Modules::ScanDeps." } ], "metrics": { @@ -19,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -26,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -63,6 +67,10 @@ { "url": "https://www.qualys.com/2024/11/19/needrestart/needrestart.txt", "source": "security@ubuntu.com" + }, + { + "url": "https://www.openwall.com/lists/oss-security/2024/11/19/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11200.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11200.json new file mode 100644 index 00000000000..30c8d005c43 --- /dev/null +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11200.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-11200", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-03T14:15:19.923", + "lastModified": "2024-12-03T14:15:19.923", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Goodlayers Core plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018font-family\u2019 parameter in all versions up to, and including, 2.0.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://goodlayers.com/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e1baa3f0-28ec-409f-a9a5-c35545ab439a?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11819.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11819.json index 2b2d8c2e613..e0a4f73ed1b 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11819.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11819.json @@ -2,13 +2,17 @@ "id": "CVE-2024-11819", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-27T00:15:17.890", - "lastModified": "2024-11-27T00:15:17.890", - "vulnStatus": "Received", + "lastModified": "2024-12-03T15:00:58.693", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in 1000 Projects Portfolio Management System MCA 1.0. This vulnerability affects unknown code of the file /forgot_password_process.php. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en 1000 Projects Portfolio Management System MCA 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /forgot_password_process.php. La manipulaci\u00f3n del argumento username conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -107,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -118,28 +142,71 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1000projects:portfolio_management_system_mca:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "C2EA77A4-2402-463E-9E5D-A08E8B927CE2" + } + ] + } + ] } ], "references": [ { "url": "https://1000projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/wackymaker/CVE/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.286192", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.286192", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.451433", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11820.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11820.json index f1ef95ab6c8..91ecc781270 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11820.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11820.json @@ -2,13 +2,17 @@ "id": "CVE-2024-11820", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-27T01:15:04.090", - "lastModified": "2024-11-27T01:15:04.090", - "vulnStatus": "Received", + "lastModified": "2024-12-03T14:54:20.297", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability, which was classified as problematic, has been found in code-projects Crud Operation System 1.0. This issue affects some unknown processing of the file /add.php. The manipulation of the argument saddress leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en code-projects Crud Operation System 1.0. Este problema afecta a algunos procesos desconocidos del archivo /add.php. La manipulaci\u00f3n del argumento saddress provoca cross-site scripting. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -107,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -118,28 +142,71 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:code-projects:crud_operation_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D15BB350-68BE-4E74-B9CE-BC9120B6F230" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/xiaobai19198/cve/blob/main/xss.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.286193", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.286193", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.451525", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12082.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12082.json new file mode 100644 index 00000000000..e41bd22748a --- /dev/null +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12082.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-12082", + "sourceIdentifier": "scy@openharmony.io", + "published": "2024-12-03T13:15:04.843", + "lastModified": "2024-12-03T13:15:04.843", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read." + }, + { + "lang": "es", + "value": "en OpenHarmony v4.0.0 y versiones anteriores se permite que un atacante local provoque fugas de informaci\u00f3n a trav\u00e9s de lecturas fuera de los l\u00edmites." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "scy@openharmony.io", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "scy@openharmony.io", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-12.md", + "source": "scy@openharmony.io" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20768.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20768.json index f5df9d693b2..a26280d6b0f 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20768.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20768.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20768", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:09.470", - "lastModified": "2024-12-02T20:20:27.637", + "lastModified": "2024-12-03T14:25:50.643", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20799.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20799.json index d21091bed09..6114ccae49b 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20799.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20799.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20799", "sourceIdentifier": "psirt@adobe.com", "published": "2024-04-02T08:15:59.050", - "lastModified": "2024-12-02T22:07:32.537", + "lastModified": "2024-12-03T14:18:15.477", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20800.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20800.json index 6c4eb7b247a..e8e8bc2c837 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20800.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20800.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20800", "sourceIdentifier": "psirt@adobe.com", "published": "2024-04-04T09:15:07.470", - "lastModified": "2024-12-02T22:07:34.180", + "lastModified": "2024-12-03T14:16:35.813", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26028.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26028.json index 2c9ece28400..c92857a9b91 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26028.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26028.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26028", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:09.910", - "lastModified": "2024-12-02T22:06:53.717", + "lastModified": "2024-12-03T14:18:21.500", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26030.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26030.json index 9c73f48355f..706e5c4e2b8 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26030.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26030.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26030", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:10.130", - "lastModified": "2024-12-02T22:06:56.380", + "lastModified": "2024-12-03T14:25:09.180", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26031.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26031.json index e978f868526..d0fed73951b 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26031.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26031.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26031", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:10.420", - "lastModified": "2024-12-02T22:06:58.120", + "lastModified": "2024-12-03T14:10:06.587", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26032.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26032.json index 8dd4a903c65..d8dfe510cbc 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26032.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26032.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26032", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:10.647", - "lastModified": "2024-12-02T22:06:59.920", + "lastModified": "2024-12-03T14:40:37.250", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26033.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26033.json index 245d2269a0f..9664d3dbc98 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26033.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26033.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26033", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:10.867", - "lastModified": "2024-12-02T22:07:02.203", + "lastModified": "2024-12-03T14:41:32.627", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26034.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26034.json index 39af23989b7..10a4b186f45 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26034.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26034.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26034", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:11.100", - "lastModified": "2024-12-02T22:07:03.987", + "lastModified": "2024-12-03T14:40:27.617", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26035.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26035.json index 0473b93b1fc..89d5d7cc01f 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26035.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26035.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26035", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:11.360", - "lastModified": "2024-12-02T22:07:06.280", + "lastModified": "2024-12-03T14:39:57.947", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26038.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26038.json index 5edcccaed27..fced4662c2d 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26038.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26038.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26038", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:11.570", - "lastModified": "2024-12-02T22:07:08.043", + "lastModified": "2024-12-03T14:38:32.390", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26040.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26040.json index bf643181c3e..168c6a7412d 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26040.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26040.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26040", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:11.790", - "lastModified": "2024-12-02T22:07:09.847", + "lastModified": "2024-12-03T14:37:58.917", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26041.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26041.json index b88201c4387..bb13a21d53b 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26041.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26041.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26041", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:12.023", - "lastModified": "2024-12-02T22:07:12.473", + "lastModified": "2024-12-03T14:35:05.120", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26042.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26042.json index 5fe977146df..32c7fe718b6 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26042.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26042.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26042", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:12.273", - "lastModified": "2024-12-02T22:07:13.407", + "lastModified": "2024-12-03T14:34:28.220", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26043.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26043.json index aab4bc90d97..81e50c8189f 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26043.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26043.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26043", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:12.510", - "lastModified": "2024-12-02T22:07:15.597", + "lastModified": "2024-12-03T14:34:19.377", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26044.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26044.json index 4612e23df35..d84a52be1eb 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26044.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26044.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26044", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:12.767", - "lastModified": "2024-12-02T22:07:18.390", + "lastModified": "2024-12-03T14:32:50.367", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26045.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26045.json index 5ff3c4c1ceb..d45eda076d3 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26045.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26045.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26045", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:13.007", - "lastModified": "2024-12-02T22:07:20.870", + "lastModified": "2024-12-03T14:32:46.117", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26050.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26050.json index 7081998327f..31a167092e2 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26050.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26050.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26050", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:13.263", - "lastModified": "2024-12-02T22:07:22.173", + "lastModified": "2024-12-03T14:32:40.333", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -87,8 +87,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26056.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26056.json index 3b5c9a47179..c40462c275f 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26056.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26056.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26056", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:14.097", - "lastModified": "2024-12-02T22:07:24.513", + "lastModified": "2024-12-03T14:46:21.770", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26059.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26059.json index 65249e14a07..05232c3b9c0 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26059.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26059.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26059", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:14.313", - "lastModified": "2024-12-02T22:07:26.627", + "lastModified": "2024-12-03T14:46:10.120", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26061.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26061.json index 0f2f4263f33..37f8d2888f0 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26061.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26061.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26061", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:14.533", - "lastModified": "2024-12-02T22:07:28.717", + "lastModified": "2024-12-03T14:45:43.500", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26062.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26062.json index e7c116b4d42..b85d2f555dc 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26062.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26062.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26062", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:14.760", - "lastModified": "2024-12-02T22:07:32.527", + "lastModified": "2024-12-03T14:44:08.960", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26063.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26063.json index 2abe511b922..65eb958d995 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26063.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26063.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26063", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:14.973", - "lastModified": "2024-12-02T22:09:53.683", + "lastModified": "2024-12-03T14:43:38.843", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -77,8 +77,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26064.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26064.json index aebe003f0df..9890cc8f3ff 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26064.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26064.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26064", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:15.197", - "lastModified": "2024-12-02T22:09:18.633", + "lastModified": "2024-12-03T14:42:01.657", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26065.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26065.json index 4661152295e..7dbe4a7e295 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26065.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26065.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26065", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:15.440", - "lastModified": "2024-12-02T22:08:58.650", + "lastModified": "2024-12-03T14:41:45.277", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -67,8 +67,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", - "versionEndExcluding": "2024.03", - "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" } ] } diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30314.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30314.json index ae2367101c8..79a2c847f5f 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30314.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30314.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30314", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T12:15:13.280", - "lastModified": "2024-05-22T08:15:09.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T14:33:44.160", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", + "baseScore": 8.2, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,19 +32,37 @@ "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "NONE", - "baseScore": 8.2, - "baseSeverity": "HIGH" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.8, "impactScore": 5.8 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +71,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:dreamweaver:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.4", + "matchCriteriaId": "C5CFE74F-C421-442D-A374-42A1C3232B80" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/dreamweaver/apsb24-39.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/dreamweaver/apsb24-39.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34112.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34112.json index 5fb85292010..66dedeca2b2 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34112.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34112.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34112", "sourceIdentifier": "psirt@adobe.com", "published": "2024-06-13T12:15:10.870", - "lastModified": "2024-06-13T18:35:19.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T14:35:08.160", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.5, - "baseSeverity": "HIGH" + "availabilityImpact": "NONE" }, "exploitabilityScore": 3.9, "impactScore": 3.6 @@ -42,19 +42,161 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:-:*:*:*:*:*:*", + "matchCriteriaId": "7A94B406-C011-4673-8C2B-0DD94D46CC4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update1:*:*:*:*:*:*", + "matchCriteriaId": "AFD05E3A-10F9-4C75-9710-BA46B66FF6E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update10:*:*:*:*:*:*", + "matchCriteriaId": "F1FC7D1D-6DD2-48B2-980F-B001B0F24473" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update11:*:*:*:*:*:*", + "matchCriteriaId": "1FA19E1D-61C2-4640-AF06-4BCFE750BDF3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update12:*:*:*:*:*:*", + "matchCriteriaId": "3F331DEA-F3D0-4B13-AB1E-6FE39B2BB55D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update13:*:*:*:*:*:*", + "matchCriteriaId": "63D5CF84-4B0D-48AE-95D6-262AEA2FFDE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update2:*:*:*:*:*:*", + "matchCriteriaId": "D57C8681-AC68-47DF-A61E-B5C4B4A47663" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update3:*:*:*:*:*:*", + "matchCriteriaId": "75608383-B727-48D6-8FFA-D552A338A562" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update4:*:*:*:*:*:*", + "matchCriteriaId": "7773DB68-414A-4BA9-960F-52471A784379" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update5:*:*:*:*:*:*", + "matchCriteriaId": "B38B9E86-BCD5-4BCA-8FB7-EC55905184E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update6:*:*:*:*:*:*", + "matchCriteriaId": "5E7BAB80-8455-4570-A2A2-8F40469EE9CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update7:*:*:*:*:*:*", + "matchCriteriaId": "F9D645A2-E02D-4E82-A2BD-0A7DE5B8FBCC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update8:*:*:*:*:*:*", + "matchCriteriaId": "6E22D701-B038-4795-AA32-A18BC93C2B6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2021:update9:*:*:*:*:*:*", + "matchCriteriaId": "CAC4A0EC-C3FC-47D8-86CE-0E6A87A7F0B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:-:*:*:*:*:*:*", + "matchCriteriaId": "B02A37FE-5D31-4892-A3E6-156A8FE62D28" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update1:*:*:*:*:*:*", + "matchCriteriaId": "0AA3D302-CFEE-4DFD-AB92-F53C87721BFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update2:*:*:*:*:*:*", + "matchCriteriaId": "EB88D4FE-5496-4639-BAF2-9F29F24ABF29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update3:*:*:*:*:*:*", + "matchCriteriaId": "43E0ED98-2C1F-40B8-AF60-FEB1D85619C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update4:*:*:*:*:*:*", + "matchCriteriaId": "76204873-C6E0-4202-8A03-0773270F1802" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update5:*:*:*:*:*:*", + "matchCriteriaId": "C1A22BE9-0D47-4BA8-8BDB-9B12D7A0F7C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update6:*:*:*:*:*:*", + "matchCriteriaId": "E3A83642-BF14-4C37-BD94-FA76AABE8ADC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:coldfusion:2023:update7:*:*:*:*:*:*", + "matchCriteriaId": "A892E1DC-F2C8-4F53-8580-A2D1BEED5A25" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/coldfusion/apsb24-41.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/coldfusion/apsb24-41.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34123.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34123.json index c52d025787a..40c06368583 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34123.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34123.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34123", "sourceIdentifier": "psirt@adobe.com", "published": "2024-07-09T19:15:11.493", - "lastModified": "2024-07-11T13:06:13.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T14:35:59.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "NONE", @@ -30,9 +32,27 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.0, - "baseSeverity": "HIGH" + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.0, "impactScore": 5.9 @@ -42,7 +62,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +71,62 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.6.7", + "matchCriteriaId": "A1E4799F-8D36-419C-A3BD-1CD365D59FBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*", + "versionStartIncluding": "24.0", + "versionEndExcluding": "24.5", + "matchCriteriaId": "034306A8-9B02-4CE1-9F41-B33CA518FCDF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/premiere_pro/apsb24-46.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/premiere_pro/apsb24-46.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-353xx/CVE-2024-35366.json b/CVE-2024/CVE-2024-353xx/CVE-2024-35366.json index 3d30e59869c..4f94850364b 100644 --- a/CVE-2024/CVE-2024-353xx/CVE-2024-35366.json +++ b/CVE-2024/CVE-2024-353xx/CVE-2024-35366.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35366", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-29T20:15:19.863", - "lastModified": "2024-12-02T17:15:10.497", + "lastModified": "2024-12-03T14:15:20.107", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-120" + "value": "CWE-190" } ] } diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39343.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39343.json index 694fc315955..2a22d4a9ce8 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39343.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39343.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39343", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-02T20:15:06.993", - "lastModified": "2024-12-02T20:15:06.993", + "lastModified": "2024-12-03T14:15:20.397", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Samsung Mobile Processor and Wearable Processor Exynos 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, Modem 5123, and Modem 5300. The baseband software does not properly check the length specified by the MM (Mobility Management) module, which can lead to Denial of Service." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en los procesadores m\u00f3viles y port\u00e1tiles Samsung Exynos 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, m\u00f3dem 5123 y m\u00f3dem 5300. El software de banda base no verifica correctamente la longitud especificada por el m\u00f3dulo MM (gesti\u00f3n de movilidad), lo que puede provocar una denegaci\u00f3n de servicio." } ], "metrics": { @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] + } + ], "references": [ { "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42422.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42422.json new file mode 100644 index 00000000000..0432e95baf8 --- /dev/null +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42422.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-42422", + "sourceIdentifier": "security_alert@emc.com", + "published": "2024-12-03T13:15:04.987", + "lastModified": "2024-12-03T13:15:04.987", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell NetWorker, version(s) 19.10, contain(s) an Authorization Bypass Through User-Controlled Key vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure." + }, + { + "lang": "es", + "value": "Dell NetWorker, versi\u00f3n 19.10, contiene una vulnerabilidad de omisi\u00f3n de autorizaci\u00f3n mediante clave controlada por el usuario. Un atacante no autenticado con acceso remoto podr\u00eda aprovechar esta vulnerabilidad y provocar la divulgaci\u00f3n de informaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000255892/dsa-2024-478-security-update-for-dell-networker-vulnerabilities", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48990.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48990.json index 024c804997f..9fa01aeffdc 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48990.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48990.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48990", "sourceIdentifier": "security@ubuntu.com", "published": "2024-11-19T18:15:21.530", - "lastModified": "2024-11-19T21:56:45.533", + "lastModified": "2024-12-03T14:15:20.627", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable." + }, + { + "lang": "es", + "value": "Qualys descubri\u00f3 que needrestart, antes de la versi\u00f3n 3.8, permite a los atacantes locales ejecutar c\u00f3digo arbitrario como superusuario enga\u00f1ando a needrestart para que ejecute el int\u00e9rprete de Python con una variable de entorno PYTHONPATH controlada por el atacante." } ], "metrics": { @@ -19,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -26,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -59,6 +63,10 @@ { "url": "https://www.qualys.com/2024/11/19/needrestart/needrestart.txt", "source": "security@ubuntu.com" + }, + { + "url": "https://www.openwall.com/lists/oss-security/2024/11/19/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48991.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48991.json index b35e38340dd..d379fa54434 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48991.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48991.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48991", "sourceIdentifier": "security@ubuntu.com", "published": "2024-11-19T18:15:21.710", - "lastModified": "2024-11-30T13:15:05.133", + "lastModified": "2024-12-03T14:15:20.740", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -59,6 +59,10 @@ { "url": "http://www.openwall.com/lists/oss-security/2024/11/30/4", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://www.openwall.com/lists/oss-security/2024/11/19/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48992.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48992.json index 7aadcfa60b9..fd94468bee3 100644 --- a/CVE-2024/CVE-2024-489xx/CVE-2024-48992.json +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48992.json @@ -2,13 +2,17 @@ "id": "CVE-2024-48992", "sourceIdentifier": "security@ubuntu.com", "published": "2024-11-19T18:15:21.897", - "lastModified": "2024-11-19T21:56:45.533", + "lastModified": "2024-12-03T14:15:20.850", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable." + }, + { + "lang": "es", + "value": "Qualys descubri\u00f3 que needrestart, antes de la versi\u00f3n 3.8, permite a atacantes locales ejecutar c\u00f3digo arbitrario como superusuario enga\u00f1ando a needrestart para que ejecute el int\u00e9rprete de Ruby con una variable de entorno RUBYLIB controlada por el atacante." } ], "metrics": { @@ -19,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -26,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -59,6 +63,10 @@ { "url": "https://www.qualys.com/2024/11/19/needrestart/needrestart.txt", "source": "security@ubuntu.com" + }, + { + "url": "https://www.openwall.com/lists/oss-security/2024/11/19/1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49529.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49529.json new file mode 100644 index 00000000000..28521dbef2d --- /dev/null +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49529.json @@ -0,0 +1,103 @@ +{ + "id": "CVE-2024-49529", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-21T17:15:20.987", + "lastModified": "2024-12-03T14:37:05.960", + "vulnStatus": "Analyzed", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InDesign Desktop versions 19.0, 20.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 19.0, 20.0 y anteriores de InDesign Desktop se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.5.1", + "matchCriteriaId": "E9742486-3F6F-47F2-8046-5E33EA765A65" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:20.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DEF1D0A8-9DAD-403E-800C-FBFB8F9C0F41" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb24-91.html", + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52998.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52998.json index 842dbbe8432..ec263e873c9 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52998.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52998.json @@ -2,12 +2,17 @@ "id": "CVE-2024-52998", "sourceIdentifier": "psirt@adobe.com", "published": "2024-11-22T19:15:07.433", - "lastModified": "2024-11-22T19:15:07.433", - "vulnStatus": "Received", + "lastModified": "2024-12-03T14:32:51.580", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "Substance3D - Stager versions 3.0.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + }, + { + "lang": "es", + "value": "Las versiones 3.0.2 y anteriores de Substance3D - Stager se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso." } ], "metrics": { @@ -46,10 +51,48 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.0.3", + "matchCriteriaId": "972C9BF4-5DF0-43FE-9F82-D3778F522D6D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb24-60.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9978.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9978.json new file mode 100644 index 00000000000..6a2bfcbf822 --- /dev/null +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9978.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-9978", + "sourceIdentifier": "scy@openharmony.io", + "published": "2024-12-03T13:15:05.140", + "lastModified": "2024-12-03T13:15:05.140", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "in OpenHarmony v4.1.1 and prior versions allow a local attacker cause information leak through out-of-bounds Read." + }, + { + "lang": "es", + "value": "en OpenHarmony v4.1.1 y versiones anteriores, se permite que un atacante local provoque fugas de informaci\u00f3n a trav\u00e9s de lecturas fuera de los l\u00edmites." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "scy@openharmony.io", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "scy@openharmony.io", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-12.md", + "source": "scy@openharmony.io" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 3d43c73754d..99a2da213b5 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-03T13:02:19.824299+00:00 +2024-12-03T15:03:05.766364+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-03T11:15:04.867000+00:00 +2024-12-03T15:00:58.693000+00:00 ``` ### Last Data Feed Release @@ -33,21 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -271981 +271987 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `6` -- [CVE-2024-11326](CVE-2024/CVE-2024-113xx/CVE-2024-11326.json) (`2024-12-03T11:15:04.867`) +- [CVE-2024-10074](CVE-2024/CVE-2024-100xx/CVE-2024-10074.json) (`2024-12-03T13:15:04.490`) +- [CVE-2024-11200](CVE-2024/CVE-2024-112xx/CVE-2024-11200.json) (`2024-12-03T14:15:19.923`) +- [CVE-2024-12082](CVE-2024/CVE-2024-120xx/CVE-2024-12082.json) (`2024-12-03T13:15:04.843`) +- [CVE-2024-42422](CVE-2024/CVE-2024-424xx/CVE-2024-42422.json) (`2024-12-03T13:15:04.987`) +- [CVE-2024-49529](CVE-2024/CVE-2024-495xx/CVE-2024-49529.json) (`2024-11-21T17:15:20.987`) +- [CVE-2024-9978](CVE-2024/CVE-2024-99xx/CVE-2024-9978.json) (`2024-12-03T13:15:05.140`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `38` -- [CVE-2024-47476](CVE-2024/CVE-2024-474xx/CVE-2024-47476.json) (`2024-12-03T10:15:05.883`) +- [CVE-2024-26035](CVE-2024/CVE-2024-260xx/CVE-2024-26035.json) (`2024-12-03T14:39:57.947`) +- [CVE-2024-26038](CVE-2024/CVE-2024-260xx/CVE-2024-26038.json) (`2024-12-03T14:38:32.390`) +- [CVE-2024-26040](CVE-2024/CVE-2024-260xx/CVE-2024-26040.json) (`2024-12-03T14:37:58.917`) +- [CVE-2024-26041](CVE-2024/CVE-2024-260xx/CVE-2024-26041.json) (`2024-12-03T14:35:05.120`) +- [CVE-2024-26042](CVE-2024/CVE-2024-260xx/CVE-2024-26042.json) (`2024-12-03T14:34:28.220`) +- [CVE-2024-26043](CVE-2024/CVE-2024-260xx/CVE-2024-26043.json) (`2024-12-03T14:34:19.377`) +- [CVE-2024-26044](CVE-2024/CVE-2024-260xx/CVE-2024-26044.json) (`2024-12-03T14:32:50.367`) +- [CVE-2024-26045](CVE-2024/CVE-2024-260xx/CVE-2024-26045.json) (`2024-12-03T14:32:46.117`) +- [CVE-2024-26050](CVE-2024/CVE-2024-260xx/CVE-2024-26050.json) (`2024-12-03T14:32:40.333`) +- [CVE-2024-26056](CVE-2024/CVE-2024-260xx/CVE-2024-26056.json) (`2024-12-03T14:46:21.770`) +- [CVE-2024-26059](CVE-2024/CVE-2024-260xx/CVE-2024-26059.json) (`2024-12-03T14:46:10.120`) +- [CVE-2024-26061](CVE-2024/CVE-2024-260xx/CVE-2024-26061.json) (`2024-12-03T14:45:43.500`) +- [CVE-2024-26062](CVE-2024/CVE-2024-260xx/CVE-2024-26062.json) (`2024-12-03T14:44:08.960`) +- [CVE-2024-26063](CVE-2024/CVE-2024-260xx/CVE-2024-26063.json) (`2024-12-03T14:43:38.843`) +- [CVE-2024-26064](CVE-2024/CVE-2024-260xx/CVE-2024-26064.json) (`2024-12-03T14:42:01.657`) +- [CVE-2024-26065](CVE-2024/CVE-2024-260xx/CVE-2024-26065.json) (`2024-12-03T14:41:45.277`) +- [CVE-2024-30314](CVE-2024/CVE-2024-303xx/CVE-2024-30314.json) (`2024-12-03T14:33:44.160`) +- [CVE-2024-34112](CVE-2024/CVE-2024-341xx/CVE-2024-34112.json) (`2024-12-03T14:35:08.160`) +- [CVE-2024-34123](CVE-2024/CVE-2024-341xx/CVE-2024-34123.json) (`2024-12-03T14:35:59.150`) +- [CVE-2024-35366](CVE-2024/CVE-2024-353xx/CVE-2024-35366.json) (`2024-12-03T14:15:20.107`) +- [CVE-2024-39343](CVE-2024/CVE-2024-393xx/CVE-2024-39343.json) (`2024-12-03T14:15:20.397`) +- [CVE-2024-48990](CVE-2024/CVE-2024-489xx/CVE-2024-48990.json) (`2024-12-03T14:15:20.627`) +- [CVE-2024-48991](CVE-2024/CVE-2024-489xx/CVE-2024-48991.json) (`2024-12-03T14:15:20.740`) +- [CVE-2024-48992](CVE-2024/CVE-2024-489xx/CVE-2024-48992.json) (`2024-12-03T14:15:20.850`) +- [CVE-2024-52998](CVE-2024/CVE-2024-529xx/CVE-2024-52998.json) (`2024-12-03T14:32:51.580`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 7c84512cee0..a406ff8d71e 100644 --- a/_state.csv +++ b/_state.csv @@ -242727,6 +242727,7 @@ CVE-2024-10070,0,0,097b5fa8b05282436b73014713798d6fa690cb8f60b9a6a570218b5126552 CVE-2024-10071,0,0,bb09f0d1e52fd077bfb7e20220a6e7299b02ea37e71361b2da945aab892ebc57,2024-10-22T14:20:07.393000 CVE-2024-10072,0,0,bc7125b99f3b32fe14c3d31b5db253134e4813c76ba571fea45856a5a9500c69,2024-10-22T14:20:16.997000 CVE-2024-10073,0,0,9ac62420226c9fe9ed2bbe058542cdb11512629d78e7df28a3c14d1c56a17916,2024-10-29T17:18:17.690000 +CVE-2024-10074,1,1,b284744f07fe1ddfdf77652f05295a2c0f173bf1f197cb901df5e6965a15cfaa,2024-12-03T13:15:04.490000 CVE-2024-10078,0,0,2a32e11049e01066fde7387ca375ea057ecc9dffb9aee4dba521fe1d1cadf633,2024-10-22T16:28:26.113000 CVE-2024-10079,0,0,373e7888db951070e423ef6d1503b855c013868b3575c214d882cd52c4cf0816,2024-10-22T16:27:54.577000 CVE-2024-1008,0,0,a9b7d9e2e828ed74dc3f97aef993fcfdb7b13561fd219152455ff7524c8067cd,2024-05-17T02:35:09.680000 @@ -242844,7 +242845,7 @@ CVE-2024-10218,0,0,80b7300a65e46275d83f3bd59a6350bd0af804c93b7f84ec384cf6c815e43 CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4debd,2024-05-17T02:35:11.070000 CVE-2024-10220,0,0,34f293e26dd67da6d92e244e4687b4aa20b912c0b86b79157464f27fb6137073,2024-11-22T17:15:06.650000 CVE-2024-10223,0,0,237ebcbe1a44551c4c262c272427d3817a64977114a9e921cdeb1f7ff3ea65fd,2024-11-01T12:57:03.417000 -CVE-2024-10224,0,0,07b8c95ec9f809249cca3b0789e13bf66e4e14062afd318734f0da25960e79d2,2024-11-19T21:56:45.533000 +CVE-2024-10224,0,1,b4b06129afa19bd4bd2db86d543a9417ce3496d8c49771d9c2d4f2d051e46d1d,2024-12-03T14:15:19.270000 CVE-2024-10226,0,0,6d4cd561e79cc1ca7a5d9390efd20e7ca0cce098a56a2c4eb01cd0ded7623cbf,2024-10-31T16:48:41.553000 CVE-2024-10227,0,0,3dd5e64d31c98828e85e7c30a2d118d04e1c9c4e3f27cb753e16556963759a42,2024-10-29T14:34:04.427000 CVE-2024-10228,0,0,d569133a271818bbabb06a409fc5b29be55f5994c84d2df5dcb22d53edb0464d,2024-11-07T17:12:45.750000 @@ -243391,7 +243392,7 @@ CVE-2024-10999,0,0,e7ea7377e972e711b7f09c97d1f1904a51f2a45036948c3c337a6d1c65fd2 CVE-2024-1100,0,0,f004473b9cf0d9d95a81c6b2db685e986de4389d0d38ab5c3537c8bbd36c025b,2024-07-03T01:44:59.517000 CVE-2024-11000,0,0,a7e8d5385c553ca345a72fc5358bdef9d69bb9b3c3980e31af7a0cfb92d81a8f,2024-11-13T01:05:49.643000 CVE-2024-11002,0,0,b6bf6324987f4073b2c9bfe8ed3afef93af42e688e9e8a0c5fdbab27cca15ed5,2024-11-26T07:15:05.413000 -CVE-2024-11003,0,0,61bfbb93c4ae10f4af71c16c69643bf462c68ffa94733e59b6f95c78952b7f9b,2024-11-19T21:56:45.533000 +CVE-2024-11003,0,1,a783ec5f16b410f220d004ec7b834ae4a4b65091c9d3bd08888ea586385d6942,2024-12-03T14:15:19.800000 CVE-2024-11004,0,0,ae81cd254161ae2b32edcbdeb3c8b9257e0a408bd5a5695d4038ccc9e5adaac9,2024-11-13T17:01:58.603000 CVE-2024-11005,0,0,11c6f0332fc033e5f19567e3b4704591ec391ce7bb38c717fd45eebf4e8bd80e,2024-11-22T17:15:06.803000 CVE-2024-11006,0,0,94626099ce68e5d3e4adfe80a73960f4ad7b764747da2022a8d4006ce81886f0,2024-11-22T17:15:06.913000 @@ -243519,6 +243520,7 @@ CVE-2024-11195,0,0,59a97c370771f27b33e51ae1039dc49a821a1858990404541e8309b975c38 CVE-2024-11198,0,0,51d6daea956d8949d0eebe7d036d8836a4c8d5c266ea899d7a1d4229a0290103,2024-11-19T21:57:32.967000 CVE-2024-11199,0,0,1b252293dc51d6f43d3121b045d01eb3c6301ad12927e01a257a520b4287caef,2024-11-23T10:15:03.897000 CVE-2024-1120,0,0,4ae965ad3da5f8a3235e6e58dd82dd504b21e474d229ae465351f9f2ed6318d2,2024-03-01T14:04:04.827000 +CVE-2024-11200,1,1,f4d97ea48501a65608a17fa4e2270dbe4daddfc571376bcd024e4292966bd946,2024-12-03T14:15:19.923000 CVE-2024-11202,0,0,51d8d259b86d0f0a0aaf1b7832edde09bf21ffb4ef806afcd5ff2c031b036ac7,2024-11-26T08:15:03.710000 CVE-2024-11203,0,0,51c484c857cf59c3f813a2e3506116f16f445f710b53772d92de1b4f877cc338,2024-11-28T09:15:04.007000 CVE-2024-11206,0,0,4dabdbee4189d67c14faab7077a38bbebaaf9a0412b9485b8ea9f96e93b55b84,2024-11-15T13:58:08.913000 @@ -243595,7 +243597,7 @@ CVE-2024-11319,0,0,10049ab876319f9ecb08a7b21cc61880e37e90d0ecd4d79058dbd3eba0407 CVE-2024-1132,0,0,3de6e62885ac8497a4c1d8f4950ebedc171b13b33dfedd6a9eea9ae164fd993a,2024-07-03T01:45:01.507000 CVE-2024-11320,0,0,043dd45fc8afc6a3f6d5124b009a260902c28d8e6731495b55f0e622c6d087a7,2024-11-26T17:26:33.327000 CVE-2024-11325,0,0,14da4d35c2181419813fe9ac1dccdd051d8a95ab923f557a3b686e3cf070cb30,2024-12-03T10:15:05.067000 -CVE-2024-11326,1,1,3601bc2a8aa6c701a70d06e299ecc68b5e3f45dc7fc87ab827ff5000b9b49cb5,2024-12-03T11:15:04.867000 +CVE-2024-11326,0,0,3601bc2a8aa6c701a70d06e299ecc68b5e3f45dc7fc87ab827ff5000b9b49cb5,2024-12-03T11:15:04.867000 CVE-2024-1133,0,0,b8b851364368259dd533f1c71b437f741276dcf99770b03558b5d9cd5d3f095a,2024-02-29T13:49:29.390000 CVE-2024-11330,0,0,1c458fab138aae3f3b89b170e15e7403fdc2fbe304c8cf0cbc41ae122ec08539,2024-11-23T07:15:03.737000 CVE-2024-11332,0,0,21d8101c0dd73a7dc8b4a9b045dbbf7a2c40f682ad21bdcbf98ef68d6b970235,2024-11-23T05:15:06.520000 @@ -243868,9 +243870,9 @@ CVE-2024-11805,0,0,c4320a41ca0d4edd118e9ad964bb3b250fee875896f75cfe07057a59cde52 CVE-2024-1181,0,0,3ab1ccda9f702c4fc6b350844c2c0edd9e45550807a44d2d8746213d5ed7378e,2024-03-20T13:00:16.367000 CVE-2024-11817,0,0,878ee2179044a99d330d167a93477de960b6cf592f6203d72eec9805c4d5d74a,2024-11-26T23:15:04.990000 CVE-2024-11818,0,0,db7694cd2fdcae7c78aac428fa42653e88b1d41dfdd73e2502c588c9613c4f73,2024-11-27T00:15:17.727000 -CVE-2024-11819,0,0,96baade15f9044b9dcb55897d3c533bfc5ed78088c4c0af1b3f20fd7e1b0e87b,2024-11-27T00:15:17.890000 +CVE-2024-11819,0,1,4ad555b58c0b6ae087a0e197e14f318c0818cf9ebf662c2c2b44a9340719cc17,2024-12-03T15:00:58.693000 CVE-2024-1182,0,0,fa905e4a8a46b36f13d15329274923ae221fc1fe7f91daf124410752f4903054,2024-07-05T12:55:51.367000 -CVE-2024-11820,0,0,98b7e3f55278e4e540b5d30afcc2f1c61148c58882b41c21d30f2b114d45baf0,2024-11-27T01:15:04.090000 +CVE-2024-11820,0,1,851b7a45884f50f3792038cee6a0dd94b1414d7c7c3cad4aa15d26efb61c7827,2024-12-03T14:54:20.297000 CVE-2024-11828,0,0,246e1e2eab57884aa3d4d52a63d8c3c77eefda7cf137c7c25e51217c37ae62b7,2024-11-26T19:15:22.910000 CVE-2024-1183,0,0,b9ca697d85173799c910606842f064c322818be1aee71b1208c43495b066c09a,2024-04-16T13:24:07.103000 CVE-2024-1184,0,0,0bd0336a802b5a07ef17cf4c3337487d1573b3f8590cc13c2e3f9ac276b1f143,2024-05-17T02:35:16.900000 @@ -243939,6 +243941,7 @@ CVE-2024-1206,0,0,5f77d40826619ff076a6ee2348b6f5023dd16e0c591d0d5d735c076214b8b6 CVE-2024-12062,0,0,053134064f0b6efbb78d94709d74965493fd7936bfcf08f9a9a8ec7d826131fc,2024-12-03T10:15:05.493000 CVE-2024-1207,0,0,dcc484c1fca006f292c23965347128c235a983932753c8f043310e93d42eeea4,2024-02-15T02:05:42.313000 CVE-2024-1208,0,0,931317b38cffca1e6ab678e3f4e10db5d686e3bb7ffa9e092bfb0d5704f0fe50,2024-02-13T14:06:24.090000 +CVE-2024-12082,1,1,3b55c847ee02ef0d7f4b58fecd9285e5b3b7a20be8f27582ab2fdc4ac93dfac6,2024-12-03T13:15:04.843000 CVE-2024-1209,0,0,b007174870c79d931de8bd87795b421ecc64b354efa55388cf8747cc0f9b9382,2024-02-14T16:51:40.300000 CVE-2024-1210,0,0,2bd6c4d9a535fadb91354d7280da4ed73754e214ed933073c198034626ca398d,2024-02-14T17:26:54.873000 CVE-2024-1212,0,0,da6373ae7bafa80bc186105339e693a9592b96e608bda44b9b7e9a26c6194323,2024-11-19T17:24:39.480000 @@ -245270,7 +245273,7 @@ CVE-2024-20764,0,0,aaf6aea1cfc81c17e2ef82d097347523784d6c37fa8e664f1fa9ad6c605a3 CVE-2024-20765,0,0,ad91982b1363103e7d071a542448be4f43c1d446a44c46149dd1d5563e96bd7d,2024-02-29T18:06:42.010000 CVE-2024-20766,0,0,898b775b089dd9caddb4b4690630a4034df5907c7b03a6ac372c91b73b803f73,2024-04-10T19:49:51.183000 CVE-2024-20767,0,0,e44fe1f40a168c1d580708d22170c7101344fa827a777107ab7c62d60385df35,2024-03-18T12:38:25.490000 -CVE-2024-20768,0,0,0a787ae17c1c9554efbce8083ebf2f71929ddd956de1438a76dc74375b810cb1,2024-12-02T20:20:27.637000 +CVE-2024-20768,0,1,1e3e9e9553fe22dc3d69b454622eff7f4f96055b91832944849f7b2ee61961b0,2024-12-03T14:25:50.643000 CVE-2024-20769,0,0,4c236b05669b68ca5ce041ed8b26b6adfc2e0cb9e4a3ee0955957eb96f78ccb6,2024-06-14T19:30:30.037000 CVE-2024-2077,0,0,e7bd6e3d8e34c4ba57719bf938fdc690e0425d907fa9aeaa848477a4c8d06182,2024-05-17T02:38:02.460000 CVE-2024-20770,0,0,2220817887bead81dba660b5070a9bfc8174373fc0e12fc00c386ef0f159eda4,2024-04-10T19:49:51.183000 @@ -245297,9 +245300,9 @@ CVE-2024-20795,0,0,339aac1d5967def1721b9f2266bf58d280ddf20a2869a78a797eb0f1e5bbf CVE-2024-20796,0,0,00526c11ef10ac19e26f1b9fd4dbb5343656ad019ba0153210f3164b00fbb116,2024-04-11T12:47:44.137000 CVE-2024-20797,0,0,cca548d603d4ef24bc949550666e86662b0fde7c1a3163dc260ede4b6277d4bf,2024-04-11T12:47:44.137000 CVE-2024-20798,0,0,8b948926eaf9bb7762236e345460aa95eaff4b64e6ad072852daab65eab7f1c6,2024-04-11T12:47:44.137000 -CVE-2024-20799,0,0,e14bc255e39a0fbf73332b041fca58be1031162fae1815563fb8ea9b691c56fe,2024-12-02T22:07:32.537000 +CVE-2024-20799,0,1,8428cb712862354c385635b67f043354a5a529f6758e50018b2185b88daa17c7,2024-12-03T14:18:15.477000 CVE-2024-2080,0,0,739bb7bc16949ce8dc42f086707a1965c48b8c0e80b8a96770d78539ca010524,2024-03-22T12:45:36.130000 -CVE-2024-20800,0,0,63cbca2bd0041e91c4c27520108a691e41ded598aa31ad458d4ca67a8b3670d7,2024-12-02T22:07:34.180000 +CVE-2024-20800,0,1,e90a6af871b5675be42c72ef35b247ceac517172f67ea5e497ab2a65b8ef6be6,2024-12-03T14:16:35.813000 CVE-2024-20802,0,0,199d727c032aa2e620e384dca4e13a9e3425e69f11a38c8295cb8667c34719d8,2024-01-10T16:14:57.787000 CVE-2024-20803,0,0,0344cde3efeaae4afbdf650bafe8bd2112bea594bd06ade4eca20bfb4af01ace,2024-01-10T16:11:26.313000 CVE-2024-20804,0,0,047c084f6461b3ccfa7e0491c6396c940be7f851c74224e7b3908c6f90469840,2024-04-02T01:15:50.777000 @@ -249168,47 +249171,47 @@ CVE-2024-26024,0,0,3ab60f6be938f975935e53b7a80711b98fe8d56f189e7148a76008394bc4a CVE-2024-26025,0,0,3352cb4bf9ea0c839d1741e6282396ec44178b4e8d69bb56155c91bf1b50fdf8,2024-09-06T18:54:37.007000 CVE-2024-26026,0,0,9489dfd8cfaf84cc429afc6dedc0bc5efa9a938711a5b920a49c5eb5da48c8dd,2024-05-08T17:05:24.083000 CVE-2024-26027,0,0,92cac7f77f6e52e5db63c20697f9eef252fe749956e34d00b1955a621b2a7163,2024-09-06T18:52:51.097000 -CVE-2024-26028,0,0,c517cc3720c90dec606bc7d8dee3896584eb629812e374b25507b7a34818d629,2024-12-02T22:06:53.717000 +CVE-2024-26028,0,1,ede9fe4cab969be7a28fa27ed4c92b2b85d7eee04aae61937a86bd32f02b4349,2024-12-03T14:18:21.500000 CVE-2024-26029,0,0,3b6290d9a75a8e9810fd217f46cbaf1351e6c78f04f13dd99b8776f7c655bd87,2024-08-07T12:15:36.547000 CVE-2024-2603,0,0,78190220c4426015d8e369c25fb4d08ae79b05986155963bab2103b320746b59,2024-07-03T01:53:22.183000 -CVE-2024-26030,0,0,d7acb1e81dd5fa90c7c5b9b18609c55ef6866eae68acd588a8a8bc16b3ccaa0e,2024-12-02T22:06:56.380000 -CVE-2024-26031,0,0,9251a22057f236e1d3a848e565f60cf6550f57153c17685d81f7d9f0da5a0b28,2024-12-02T22:06:58.120000 -CVE-2024-26032,0,0,25ba5027b92ba7b29cd5952069e3745d08f29b71e08faea170ccb8512e51d957,2024-12-02T22:06:59.920000 -CVE-2024-26033,0,0,c78707ded2f2b609bc7eca4313e9210441b759e77c29f088718bb51d621ffcdf,2024-12-02T22:07:02.203000 -CVE-2024-26034,0,0,6716c83fd1d8d731d8fc3214db861cc7937299ee72e21da7d42be35b66918217,2024-12-02T22:07:03.987000 -CVE-2024-26035,0,0,be43584d20133ee714916450b0eaa223ef0e0c531281a3b0f6515ff2706e1c73,2024-12-02T22:07:06.280000 +CVE-2024-26030,0,1,9480f998e12c7225c9291a75c239ad904ef492a904984d0f591e44b1bf95f8b9,2024-12-03T14:25:09.180000 +CVE-2024-26031,0,1,37778b6b03f34d58e747cfcd35a3b12f95ef62c6450aea058b278695d6d8a2d7,2024-12-03T14:10:06.587000 +CVE-2024-26032,0,1,645c8078e6a26904d2d551665c39be159598a06b4a7a48d1153d69bd1f42025a,2024-12-03T14:40:37.250000 +CVE-2024-26033,0,1,e038cd7888bdfa6b33bfe5df359535de6a1e8fecc268a99a38060d9f29c2502f,2024-12-03T14:41:32.627000 +CVE-2024-26034,0,1,7b6a7735faab8554d9ba0052517c5f5f524ae1f59952c80e36700be3e0c5aef6,2024-12-03T14:40:27.617000 +CVE-2024-26035,0,1,6d2a0e3789cf1fc6e968489d15f56bea0ed58b0ddac4b2112fa1168e1ff12f68,2024-12-03T14:39:57.947000 CVE-2024-26036,0,0,1d83088cd2cd101659224a3fc5c08fa64786f76447e958e3014dda7a1b3b2762,2024-06-14T19:30:06.617000 CVE-2024-26037,0,0,93771142bffee162d36251cc4e8ed14800b95d6cabf310d68e7055bd0eea978f,2024-06-14T19:48:13.247000 -CVE-2024-26038,0,0,b9bb6c98495127ac6071b9f41984d6f796b59bc5be5e7634f158102197235d11,2024-12-02T22:07:08.043000 +CVE-2024-26038,0,1,968a447ee34eab05a2f4c9717ce5ed7be422a568ee2ecaf855ab8ca2f0d7aecf,2024-12-03T14:38:32.390000 CVE-2024-26039,0,0,1174a6c1115f79e7f0889b154dfc89e46af3bb6dd2520ac9d5c13289cf240986,2024-06-14T19:47:57.717000 CVE-2024-2604,0,0,450c7d59fe8571ecee58ed217df60ab05189f4ad43db724a13d662a6d29d50fb,2024-05-17T02:38:21.500000 -CVE-2024-26040,0,0,881490c457662cce773f8ca7cddb2e3a126b8164e3048aefa446f96a3d6a6526,2024-12-02T22:07:09.847000 -CVE-2024-26041,0,0,82bc3a27e139f2eac0699f5c997717f1714702a611d02caf92170be6080bfa06,2024-12-02T22:07:12.473000 -CVE-2024-26042,0,0,b4a00f3667ef84694a4e6abf52951c7d51f9277bef08b433c87aba15cfea5dff,2024-12-02T22:07:13.407000 -CVE-2024-26043,0,0,99ead7d68c938569d32b725222aa01cb299aa9704e98099bfec50c1573334734,2024-12-02T22:07:15.597000 -CVE-2024-26044,0,0,d48863d0a18ce3b99a996ff7e489563474f3ba710823fa01053fdd4130dff831,2024-12-02T22:07:18.390000 -CVE-2024-26045,0,0,c0e5a2bde8102da916dc75a0d099b9e904cf36335678ec6973bdd23ad8cb11f5,2024-12-02T22:07:20.870000 +CVE-2024-26040,0,1,2a0b751b728209a7c9a3b5df0fc88243a60aedc3d5c7976061e63cd1c530eb81,2024-12-03T14:37:58.917000 +CVE-2024-26041,0,1,2bd5f47ec9ed3dc4f1c1945994ca2a670f7b89c19a6dac4d15773010ee8fc2ed,2024-12-03T14:35:05.120000 +CVE-2024-26042,0,1,2ea8d4dd55cbe369521d040be468f269c837b84a9eac6286bae77d5ed2d0b904,2024-12-03T14:34:28.220000 +CVE-2024-26043,0,1,9e5ba2d761fb38599a187ece66b844e2c6f6948768589cb3a7e3e27c1f2048ba,2024-12-03T14:34:19.377000 +CVE-2024-26044,0,1,66bac57be53c755cbe995e285249cde839b00b7b1d98f8199c1aa466447b6bfc,2024-12-03T14:32:50.367000 +CVE-2024-26045,0,1,16de77a5d4b0cf723bbdcff02c0b9e5ead3b5ea66df2c839632d092fd2d31a4d,2024-12-03T14:32:46.117000 CVE-2024-26046,0,0,5c87a28b13d53ec29b89a2b33427517db21012c37c446a313fb6274d8fa5a520,2024-04-10T13:23:38.787000 CVE-2024-26047,0,0,148096905025fd63cbc95f27e9e4e0c5f23280eef70892c2f079c5329b94e086,2024-04-10T13:23:38.787000 CVE-2024-26049,0,0,a3a34d9b7dae7c572a170c4cf9ad06366559734e7c052afbd0e4cb731a5c408a,2024-08-07T13:15:59.723000 CVE-2024-2605,0,0,349e4409ed80d6811abb3d6a22d4a1c2580eb4cb5b90719226cde56ad4b7d78f,2024-08-28T15:35:21.410000 -CVE-2024-26050,0,0,a45a43204e66a747018474afbb3bf9e8cced59d2a9da4abea0d1a9ec7441e460,2024-12-02T22:07:22.173000 +CVE-2024-26050,0,1,e5e2c4f7b84f8f2f1d1ea8570d5ab87ff02bbfb4edf0f2eb8b892f6b238feba4,2024-12-03T14:32:40.333000 CVE-2024-26051,0,0,78bc48859c38750da39204fe9139ed7326b9440e064a7c71bb9438b77aa20ed2,2024-03-18T19:40:00.173000 CVE-2024-26052,0,0,b304109295db8f5f3410f8f04ff1bacf299ca38b40fc697f2ab4ec3a5eabc71f,2024-03-18T19:40:00.173000 CVE-2024-26053,0,0,08b1c01624e7d71b7ff35b901082456bbba3fa5d18db4bad7ba7d58bb2e8e67e,2024-06-14T19:46:37.923000 CVE-2024-26054,0,0,eda3484671c40e51a92b63a901454f377d91e0d9bfcdc0a5fb15602bc8f94d81,2024-06-14T19:24:41.580000 CVE-2024-26055,0,0,baa99b29bd8823923f255a8118fccf649a7d41ab4a2f879c4c914a9fe0240d12,2024-06-14T19:46:17.973000 -CVE-2024-26056,0,0,fd25988b2ffb880e93d02ea0a7d6ca550724c5a3bf8011f3370b495b2e1472a4,2024-12-02T22:07:24.513000 +CVE-2024-26056,0,1,14ff68b17aa108cff431fe42e307f1d738d1d00dbe0108481078696aa0855c29,2024-12-03T14:46:21.770000 CVE-2024-26057,0,0,e45b3f0f152eb3c78dc9320bed534a79a66b2c35d46fd8b2b0ef0017333c4b87,2024-06-14T19:46:03.817000 CVE-2024-26058,0,0,a93e87c800fd4d920581776c16d0072b04deb406d205f9f24e685781c2f5715f,2024-06-14T19:37:56.100000 -CVE-2024-26059,0,0,1e0d0341f224106eff1e5af2366626fd5d13edf1ca8e2c987ea5d5df70d49373,2024-12-02T22:07:26.627000 +CVE-2024-26059,0,1,ac98e6d0b0199134c58aa887f2df563a6de6ceece47482ec1418cea94cf6190c,2024-12-03T14:46:10.120000 CVE-2024-2606,0,0,e9eebb20c04d0205e18586a1da81a72eb028c0ab6b349ea25646cae1d987bed3,2024-10-30T15:35:09.973000 CVE-2024-26060,0,0,9cdef2d575b129761f3290b88017e8f07b5021de9d3255eeba059f838c645f83,2024-06-14T18:49:08.077000 -CVE-2024-26061,0,0,ad2ceb8808417064310c3cdf2f62f9478a68900289ec3c3d53d06a95b0f1f100,2024-12-02T22:07:28.717000 -CVE-2024-26062,0,0,de3a3c35ada4aa1c5944365be2cf00e2b621e3c48f1c3cd28c67c563a45ac527,2024-12-02T22:07:32.527000 -CVE-2024-26063,0,0,0be577b3563c3b84879e994b8e663bef83be58c13a6830fc3d5d283ea404cee7,2024-12-02T22:09:53.683000 -CVE-2024-26064,0,0,22ea7ed6008c6012e35e6e94aafec1da167cb036f2701bb13e0387b484a6c89c,2024-12-02T22:09:18.633000 -CVE-2024-26065,0,0,9e200907fbcbb393ada9d535c2f77eec4931a2dded2812365f92071cee63cdfa,2024-12-02T22:08:58.650000 +CVE-2024-26061,0,1,471407acdf51819c0bdd60ee5d73b186c8fadecaf5af71c2ca7d8c11adca573a,2024-12-03T14:45:43.500000 +CVE-2024-26062,0,1,54cf0e1b1e6d1778aaa7182ecd73a54656c80a039edadc40b460c0c801a0ad52,2024-12-03T14:44:08.960000 +CVE-2024-26063,0,1,f5a13f3984cabb12f59616fa26efdbef4591cca6826bbc28da51b1600a9b376a,2024-12-03T14:43:38.843000 +CVE-2024-26064,0,1,3098c3e3de91199d1bd6d20eb89b7ee3464bdc44d99dc9cd1e4ea880cda75894,2024-12-03T14:42:01.657000 +CVE-2024-26065,0,1,00462b106b4f303ce5343363705987a205782e4b4edc349db65b96bad65b09a1,2024-12-03T14:41:45.277000 CVE-2024-26066,0,0,c16f3c27056b3c70c3163298471f82d82d65c7e624bee5584c40df2a2851002f,2024-06-14T18:48:49.183000 CVE-2024-26067,0,0,4e837a02e31f2ba959b9ab2cadbab50fe243bb7e44fdf350987cc4ea278caf71,2024-03-18T19:40:00.173000 CVE-2024-26068,0,0,8b1bf80f59bd4ba690a55f04b468280504b7e85a202f44401a8c49c1cbdddd95,2024-06-14T18:48:22.843000 @@ -252470,7 +252473,7 @@ CVE-2024-3031,0,0,fa19e5674d76c5b46624774eba96476ad7fabe41ca511ba02fe99ace14a675 CVE-2024-30310,0,0,0318e7fa8c109fbd13dfaf43bb618e0a49e9b16e0b621e77faecb78de1db2a84,2024-12-02T21:22:11.137000 CVE-2024-30311,0,0,3840218508a24667161b6ff79a375834ddbf249257e991ddfa8b10e97ab37e31,2024-12-02T21:22:13.143000 CVE-2024-30312,0,0,d795e4958162bcd7905c2b6c90993ddfcc6293aa254bf6c539234075dec0a0ba,2024-12-02T21:22:15.280000 -CVE-2024-30314,0,0,001958112e812873f2afe024af602bc1e18aaeafca421eccd7dc6e99cd4f7d19,2024-05-22T08:15:09.777000 +CVE-2024-30314,0,1,42f4f4f53d09df828a9d772c476dba6f6fd9600ec6925401912c5ffb5da6d3e4,2024-12-03T14:33:44.160000 CVE-2024-3032,0,0,23903a6cbcf453fd38d8d4b287e955f74e9435539a64a2e4e4033c0e9a9a2ffa,2024-11-20T15:09:42.557000 CVE-2024-30321,0,0,77e82c6b15f80502cfe967b03a0cf5e1edff68cc4e25f0455ce9c65c8c4bfbce,2024-11-12T13:15:07.503000 CVE-2024-30322,0,0,f4e26e42e44429b86d19dca1655fc9b0e6d4cf366473cd59d34a3fd4371a1053,2024-04-03T17:24:18.150000 @@ -255302,7 +255305,7 @@ CVE-2024-34109,0,0,c9e7a028e318045ad0e07a30584a8cdf66484faf15b239f83d63fffcfc9c0 CVE-2024-3411,0,0,c5534494d0c0f328f6dd6a29b2c75cf0917384aed2d3044a8f39c15c542a2568,2024-07-03T21:15:03.933000 CVE-2024-34110,0,0,c15838464fcaf085b2c09e471beb2e732398e46cad7f992477efffffb5459007,2024-07-09T15:09:42.910000 CVE-2024-34111,0,0,19c043112b06522ffc5ddb9df0f8b999a9184efbe5f7c5a69c8e8324f21b6533,2024-08-07T15:15:54.520000 -CVE-2024-34112,0,0,e62a170073c335d4b2fa523b231a2040753ea6d61925540b759aae879b0a33d7,2024-06-13T18:35:19.777000 +CVE-2024-34112,0,1,8f1bc7613512ccaee7d59e04edc3235d03e9488247401e1813f71cbc5a8f5496,2024-12-03T14:35:08.160000 CVE-2024-34113,0,0,a2e9f7ac8776392f6be8ef1204f1c90f02f8da5b4c386f27bfe6c53f96f39c9b,2024-08-07T15:15:54.640000 CVE-2024-34115,0,0,cc8b9b55a33ad4e137b074effd11699dd96f8494f93e6413f33a6c251661c876,2024-07-19T18:02:32.427000 CVE-2024-34116,0,0,4851ab33470ffca4c1046ad0fdbe4ebf66556d22cc3b975d80dd125226b02f02,2024-08-07T15:15:54.863000 @@ -255313,7 +255316,7 @@ CVE-2024-3412,0,0,e50c7e3ae6f10b261f3da66fd6437a79038925b3952464be81ac0e7b8712c1 CVE-2024-34120,0,0,59b2d9c769f5e7837181f42b948f1f4d6a71599cbcd1b502e5c0f6b22b12ebe5,2024-06-14T20:02:45.567000 CVE-2024-34121,0,0,5c4bc5f93a8e677774dfec4d5defe369f17f675204e3af33dbf284e95e296370,2024-11-01T20:35:17.293000 CVE-2024-34122,0,0,1ec0410a2782988212e8d53b9aff3b950baab8772620259cd2192140e3a735de,2024-10-11T15:01:24.393000 -CVE-2024-34123,0,0,60f48b7c1a1214b049b9220d35589296122b7174f3f0274e4f9438886e7fb319,2024-07-11T13:06:13.187000 +CVE-2024-34123,0,1,cacd50e122fa9bc468f9dd6ac02f78493bb7ad635f94b1497402fe1b9f16cae1,2024-12-03T14:35:59.150000 CVE-2024-34124,0,0,1560ff2926f27a69ce258f83d62b0151a5e1ff052db9746c4e37b847f7058841,2024-08-19T18:56:27.377000 CVE-2024-34125,0,0,3248ba4e13305da4d550ff294e0777762ef3209cea1ba47228c44abb8259e093,2024-08-19T18:56:17.350000 CVE-2024-34126,0,0,9812afe65ee02221e5fd8a63677b5e9e3deeafed44b12298eb7011278c0e0e90,2024-08-19T18:55:47.043000 @@ -256206,7 +256209,7 @@ CVE-2024-35359,0,0,790098a5aa254df92059c385ad6325db39cd91d13b49630a333bac1d583fc CVE-2024-3536,0,0,67ef0d9459ffa6371d38db2913b0c14e7a0dd926c6d86f1aea2fa988c69cefc5,2024-05-17T02:39:59.897000 CVE-2024-35361,0,0,94079fbeae6f3e32a28e0bb042dbf7a904fcf03ef2f5fc193b1b6ac0fc4c26ea,2024-07-03T02:01:38.550000 CVE-2024-35362,0,0,234501ffddb96c378ce0415c69c86b74ffa92255e774ec0584c4ec784483afc1,2024-05-22T18:59:20.240000 -CVE-2024-35366,0,0,1071161e28ed5ff1a9e74f6db919922a34bff8a1aae8f1926a3de4bf5a6af995,2024-12-02T17:15:10.497000 +CVE-2024-35366,0,1,cce3847e362944647524f42f8c96161fb821767a34a431ba81a662d8d164730d,2024-12-03T14:15:20.107000 CVE-2024-35367,0,0,fc1999610d5647bdd337d9cd372630739a60d5b54ee387f6b863824ba4ed87b5,2024-12-02T17:15:10.680000 CVE-2024-35368,0,0,9627ef41704bb16e68693f5c6e18e4ed8b2de5952a37d343cc0e72735c6da4fd,2024-12-02T17:15:10.860000 CVE-2024-35369,0,0,6df28d8460fe7b04f0a2efffc7b9a631fe258a88dc12fbb0a17d1341163bedc4,2024-11-29T18:15:06.983000 @@ -259227,7 +259230,7 @@ CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453c CVE-2024-39340,0,0,fc621b442d86eea0a2e72227f2b14f23e2a67834630b902f47135788b8db4fd4,2024-09-23T15:15:13.907000 CVE-2024-39341,0,0,7c359c6b4015613fc52267fcd7e5d9646d4cfcd7e7964fd0c4b36316116d1347,2024-11-04T17:35:19.370000 CVE-2024-39342,0,0,93fef3118f07e5180653fc41b9d6410f0df44f4e0465d850d3b1f4400c7d473a,2024-09-26T13:32:55.343000 -CVE-2024-39343,0,0,5387f0e37d9edeed6f67983994a72c30c3e3ad56112bee25e823237afaf5f39e,2024-12-02T20:15:06.993000 +CVE-2024-39343,0,1,6171b95408e88154e38dce78348a253a8927c06ba1552f0b46a9bf8a028abd73,2024-12-03T14:15:20.397000 CVE-2024-39344,0,0,e818a000a36da13fc4fe8918e0aa5d488785b27901618777d7233d703b03f419,2024-08-26T16:35:10.110000 CVE-2024-39345,0,0,f773bf4aa168ca0fb54a499af45e3e951779cc47e8e783983f66e20a083935eb,2024-09-03T22:15:04.480000 CVE-2024-39347,0,0,f05ffc50868d752b16aba36bcf98397a1a823dcf709e914fdceefc955d8df28b,2024-06-28T10:27:00.920000 @@ -261312,6 +261315,7 @@ CVE-2024-42417,0,0,97db2e1cae78c6c5b15ff9e0f09e1c2fc00065af3496103746ac59f2d9475 CVE-2024-42418,0,0,1170a194d58fc93f3e0e1a535dff12de506530448528f0fff3eaea817d001f8b,2024-09-04T18:22:22.583000 CVE-2024-4242,0,0,9c58e9b9e77452c845f3c5179c3be4415982efd0430d3da14ab0345d444eccfb,2024-06-04T19:20:33.363000 CVE-2024-42420,0,0,03ebd30eeb434ca03d3eabb7d6b0396c2658f46173e6697533666fb020a1c544,2024-11-05T19:39:31.913000 +CVE-2024-42422,1,1,0b232b35fd06e22a6b730459e5a39791707f9656a48c53d8b2af810ab36d879f,2024-12-03T13:15:04.987000 CVE-2024-42423,0,0,d28867b0d8eebf1aff8bd3b42424cd5e577a7dd9340d9f0359d41e2fac4ef5ea,2024-09-20T19:42:20.417000 CVE-2024-42424,0,0,a3a79ec5b3f9e4721afc9742622d2616be4d7445c5c0aff9b4256e4bf8fbae09,2024-09-10T12:09:50.377000 CVE-2024-42425,0,0,6aa2353bd532f46d0a2e205868494bbec291e24ba1bbc1fc9f37a272eab1bd0b,2024-09-16T15:46:03.110000 @@ -264579,7 +264583,7 @@ CVE-2024-47462,0,0,be6c9453989893d3dcfbe5bdc6e676b393ed9c49111f1ece54054c135b42f CVE-2024-47463,0,0,2c716c4d7f29d4820a72727f94c0dd565fcb88d49fc25a376e2306f9f47f5669,2024-11-06T18:17:17.287000 CVE-2024-47464,0,0,236d04a0c7d407559b9f7742340111549ca9237c3d8e53730db19cfca87c0db1,2024-11-06T18:17:17.287000 CVE-2024-4747,0,0,071c88b133efa29a5bceaf4f1781edaa635d35ede69008d4aad9361c37e95f56,2024-05-14T16:11:39.510000 -CVE-2024-47476,0,1,a9ce0a839530433df414fd290d551556d66aa033c776ff154b9b4a9f858c0987,2024-12-03T10:15:05.883000 +CVE-2024-47476,0,0,a9ce0a839530433df414fd290d551556d66aa033c776ff154b9b4a9f858c0987,2024-12-03T10:15:05.883000 CVE-2024-4748,0,0,5ce71114653bf2c9cc6586a0117b72827b192c4aa4e8e27ac2b81ed4a0b190af,2024-10-10T16:15:08.630000 CVE-2024-47481,0,0,83505b26fa6eb758ddde8dc521f672e8bc2bacfc2db0ee1df66890f0ab8642bc,2024-10-31T00:01:40.487000 CVE-2024-47483,0,0,da98222f22e89d9e61f65fd3ac619771e185cbdec7a679159eab7aec6c7cc7a0,2024-10-31T00:01:05.127000 @@ -265388,9 +265392,9 @@ CVE-2024-48986,0,0,cf9484fda56052e686c7c5f0c8f108e09e57cac0d3001558017ed0e9f5d28 CVE-2024-48987,0,0,bb1285db59c3075341f96aec62f9b4ce4709041d90082c7f3534792a4d32fb84,2024-10-15T12:58:51.050000 CVE-2024-48989,0,0,9073e18090b9ae4eb5079758fa48cb03e03a3dcd9dfe9e38f4453d35dfeb5c4c,2024-11-13T17:01:16.850000 CVE-2024-4899,0,0,7d0ca1543842829897b22c32fd7c3ea389ea1c85b28761d045bc30da0b354462,2024-07-03T02:08:16.280000 -CVE-2024-48990,0,0,01ad64d993b1a34125730a579a223ab965b2b42884353072e3771c0929c4035c,2024-11-19T21:56:45.533000 -CVE-2024-48991,0,0,cad0aae4b890b506cacb3fef0d5af018cb8eebf417c48af68da7f4d95e131e01,2024-11-30T13:15:05.133000 -CVE-2024-48992,0,0,7d51388c1721a8523b9ede74fe782bca890c6f1c274f5cf7a619b3f6ce5cedd5,2024-11-19T21:56:45.533000 +CVE-2024-48990,0,1,8ae314221da60f3f28b2dc061e7fd91a0c68d57bf2594502511d6f645886ec7c,2024-12-03T14:15:20.627000 +CVE-2024-48991,0,1,d168b58f77340c27c4fe11099d0fc3db2a31f2441bc53eda948353dc7a25f936,2024-12-03T14:15:20.740000 +CVE-2024-48992,0,1,cfcbe8040e38ad95869aae5b63b2c99ac1950d785833afab83d53352be93cc53,2024-12-03T14:15:20.850000 CVE-2024-48993,0,0,196b3895a17ef7dfbcbfdd466d8bb48d5a37a44b82a7d059ceac4c05136016cf,2024-11-19T19:06:50.177000 CVE-2024-48994,0,0,f318b3abe51a65c36b34811cd6779d9025e28bb0518b94d3d7c79c7579b1e1e4,2024-11-15T15:40:38.250000 CVE-2024-48995,0,0,c8a152b4d83ebd46a319f38f36cd95f3ce9fdb5043f9229f5986839789db7ebd,2024-11-15T15:41:26.280000 @@ -265703,6 +265707,7 @@ CVE-2024-49525,0,0,28a277ab9b52157a5e4549773b7a8750a6dbb7b4cb916799fff07dd0ec631 CVE-2024-49526,0,0,69c6bf5485d49eb3a2da169497c27d72a1196f6e9a7d6c7d2c7c44787150932a,2024-11-18T18:41:33.857000 CVE-2024-49527,0,0,0d9fde76ea05a295ae3bcd4b45293562d8fc9654bdbe0c09a49c5875709be45a,2024-11-18T18:39:52.213000 CVE-2024-49528,0,0,f04aeabc999019759ae70807d4e936a36d020a33909dd4ffb4e16898d3cf045e,2024-11-18T18:34:56.667000 +CVE-2024-49529,1,1,bc912441c1467e88d09c1eebc868707893b19843941c8a4da84053631d70d7a6,2024-12-03T14:37:05.960000 CVE-2024-49536,0,0,64699087f9e557bcb15e1f1e76804f07eb5cb82ad8ee2392d1aa5d8b2e6ac029,2024-11-19T21:21:45.640000 CVE-2024-49557,0,0,d5723680a20b941e0b929edc2959b845b0ec9b5d07125e59e1942c5e8991b90e,2024-11-15T17:36:47.110000 CVE-2024-49558,0,0,3c676b75de26a8476d548ed8b3e232d51677ecb4a62749082177600c22312603,2024-11-15T17:35:54.480000 @@ -267810,7 +267815,7 @@ CVE-2024-5296,0,0,9bd527352a89f2b4ccfc677e3fc5feb9bb09c1923dac2d4ba397c3469bcfc6 CVE-2024-5297,0,0,d1218091e3a48aa0835b7de76e914f2fa4d051775431f4beee97941e4c178297,2024-05-24T01:15:30.977000 CVE-2024-5298,0,0,751024870f0005efd62d8664aa885c619c01fff4fc9d9e46acd3d648d421b0e1,2024-05-24T01:15:30.977000 CVE-2024-5299,0,0,ec4fa401441140dbf77742461a619e82e80b0b3301518890cfd68e9b147d30dc,2024-05-24T01:15:30.977000 -CVE-2024-52998,0,0,4a588e0a4ac0cc77f65a3f96d5f4c28074598669804bc16c028b0e79eee85554,2024-11-22T19:15:07.433000 +CVE-2024-52998,0,1,6290b7bcb6009685ce74422e3ebe6e84d8aa2373cdb09dbaf200385294d7d729,2024-12-03T14:32:51.580000 CVE-2024-53008,0,0,eb27408d35fd63e0b06a6d91784ac9fdfba636caf4dc616097e327306086f070,2024-11-28T03:15:16.363000 CVE-2024-5301,0,0,e6554ba8ce305faf67a147a1164dfd0369262e65017220af5d0bddff09928633,2024-09-25T15:18:18.097000 CVE-2024-5302,0,0,39889567f28c32113cd40d7a6613b67998b6932facc1ad2f99b57c33f7aef565,2024-09-25T15:22:17.627000 @@ -271963,6 +271968,7 @@ CVE-2024-9974,0,0,a9f33ba1bf43a6581b26a64054dc48f869f96fec31a53cd68d396b83198ee7 CVE-2024-9975,0,0,4525d3890144372ea39c9bdd06414839f2c1fd17df2032696deb6863140465d5,2024-10-16T13:44:46.220000 CVE-2024-9976,0,0,5980d080e9ad25dff2e581d3c904125c709818a390af58c76d59996e26d292c8,2024-10-16T13:42:24.153000 CVE-2024-9977,0,0,8fbf86e7b1f024ef2593e8608c7ccd55ca749b0af624481d1e713f71c065dc16,2024-10-16T16:38:43.170000 +CVE-2024-9978,1,1,3a2501c5446b394c69c20954ec6ea86a8c312be2c740234a6fdca0863055d2bf,2024-12-03T13:15:05.140000 CVE-2024-9979,0,0,bb7e55c386cc249a98b0827bb4feff1257591f1d244a65e7ccd05578ba319079,2024-10-16T16:38:43.170000 CVE-2024-9980,0,0,665ae4d3fad1ccd0bc296c2172cff10c0d57400041e58e918121ae8fdfb1183a,2024-10-17T18:03:34.807000 CVE-2024-9981,0,0,7aa55e716de319cd032858b815d476396828a27c5d3a7d5b6802447033166c68,2024-10-17T18:05:29.947000