Auto-Update: 2024-12-03T15:03:05.766364+00:00

This commit is contained in:
cad-safe-bot 2024-12-03 15:06:17 +00:00
parent 028d629a58
commit 60300ac409
46 changed files with 1138 additions and 184 deletions

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-10074",
"sourceIdentifier": "scy@openharmony.io",
"published": "2024-12-03T13:15:04.490",
"lastModified": "2024-12-03T13:15:04.490",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "in OpenHarmony v4.1.1 and prior versions allow a local attacker cause the common permission is upgraded to root through use after free."
},
{
"lang": "es",
"value": "en OpenHarmony v4.1.1 y versiones anteriores se permite que un atacante local haga que el permiso com\u00fan se actualice a root mediante el uso use after free."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "scy@openharmony.io",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.0,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "scy@openharmony.io",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-12.md",
"source": "scy@openharmony.io"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10224",
"sourceIdentifier": "security@ubuntu.com",
"published": "2024-11-19T18:15:19.773",
"lastModified": "2024-11-19T21:56:45.533",
"lastModified": "2024-12-03T14:15:19.270",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Qualys discovered that if unsanitized input was used with the library Modules::ScanDeps, before version 1.36 a local attacker could possibly execute arbitrary shell commands by open()ing a \"pesky pipe\" (such as passing \"commands|\" as a filename) or by passing arbitrary strings to eval()."
},
{
"lang": "es",
"value": "Qualys descubri\u00f3 que si se usaba una entrada no desinfectada con la librer\u00eda Modules::ScanDeps, antes de la versi\u00f3n 1.36, un atacante local podr\u00eda posiblemente ejecutar comandos de shell arbitrarios abriendo una \"molesta tuber\u00eda\" (como pasar \"commands|\" como nombre de archivo) o pasando cadenas arbitrarias a eval()."
}
],
"metrics": {
@ -19,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -26,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
@ -59,6 +63,14 @@
{
"url": "https://www.qualys.com/2024/11/19/needrestart/needrestart.txt",
"source": "security@ubuntu.com"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/11/msg00015.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/11/19/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11003",
"sourceIdentifier": "security@ubuntu.com",
"published": "2024-11-19T18:15:19.973",
"lastModified": "2024-11-19T21:56:45.533",
"lastModified": "2024-12-03T14:15:19.800",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Qualys discovered that needrestart, before version 3.8, passes unsanitized data to a library (Modules::ScanDeps) which expects safe input. This could allow a local attacker to execute arbitrary shell commands. Please see the related CVE-2024-10224 in Modules::ScanDeps."
},
{
"lang": "es",
"value": "Qualys descubri\u00f3 que needrestart, antes de la versi\u00f3n 3.8, pasa datos no desinfectados a una librer\u00eda (Modules::ScanDeps) que espera una entrada segura. Esto podr\u00eda permitir que un atacante local ejecute comandos de shell arbitrarios. Consulte el CVE-2024-10224 relacionado en Modules::ScanDeps."
}
],
"metrics": {
@ -19,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -26,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -63,6 +67,10 @@
{
"url": "https://www.qualys.com/2024/11/19/needrestart/needrestart.txt",
"source": "security@ubuntu.com"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/11/19/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-11200",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-03T14:15:19.923",
"lastModified": "2024-12-03T14:15:19.923",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Goodlayers Core plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018font-family\u2019 parameter in all versions up to, and including, 2.0.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://goodlayers.com/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e1baa3f0-28ec-409f-a9a5-c35545ab439a?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11819",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-27T00:15:17.890",
"lastModified": "2024-11-27T00:15:17.890",
"vulnStatus": "Received",
"lastModified": "2024-12-03T15:00:58.693",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in 1000 Projects Portfolio Management System MCA 1.0. This vulnerability affects unknown code of the file /forgot_password_process.php. The manipulation of the argument username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como cr\u00edtica en 1000 Projects Portfolio Management System MCA 1.0. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /forgot_password_process.php. La manipulaci\u00f3n del argumento username conduce a una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,28 +142,71 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:1000projects:portfolio_management_system_mca:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C2EA77A4-2402-463E-9E5D-A08E8B927CE2"
}
]
}
]
}
],
"references": [
{
"url": "https://1000projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/wackymaker/CVE/issues/2",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.286192",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.286192",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.451433",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11820",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-27T01:15:04.090",
"lastModified": "2024-11-27T01:15:04.090",
"vulnStatus": "Received",
"lastModified": "2024-12-03T14:54:20.297",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in code-projects Crud Operation System 1.0. This issue affects some unknown processing of the file /add.php. The manipulation of the argument saddress leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en code-projects Crud Operation System 1.0. Este problema afecta a algunos procesos desconocidos del archivo /add.php. La manipulaci\u00f3n del argumento saddress provoca cross-site scripting. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Tambi\u00e9n pueden verse afectados otros par\u00e1metros."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,28 +142,71 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:crud_operation_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D15BB350-68BE-4E74-B9CE-BC9120B6F230"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/xiaobai19198/cve/blob/main/xss.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.286193",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.286193",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?submit.451525",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-12082",
"sourceIdentifier": "scy@openharmony.io",
"published": "2024-12-03T13:15:04.843",
"lastModified": "2024-12-03T13:15:04.843",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "in OpenHarmony v4.0.0 and prior versions allow a local attacker cause information leak through out-of-bounds Read."
},
{
"lang": "es",
"value": "en OpenHarmony v4.0.0 y versiones anteriores se permite que un atacante local provoque fugas de informaci\u00f3n a trav\u00e9s de lecturas fuera de los l\u00edmites."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "scy@openharmony.io",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "scy@openharmony.io",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"references": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-12.md",
"source": "scy@openharmony.io"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-20768",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:09.470",
"lastModified": "2024-12-02T20:20:27.637",
"lastModified": "2024-12-03T14:25:50.643",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-20799",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-04-02T08:15:59.050",
"lastModified": "2024-12-02T22:07:32.537",
"lastModified": "2024-12-03T14:18:15.477",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-20800",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-04-04T09:15:07.470",
"lastModified": "2024-12-02T22:07:34.180",
"lastModified": "2024-12-03T14:16:35.813",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26028",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:09.910",
"lastModified": "2024-12-02T22:06:53.717",
"lastModified": "2024-12-03T14:18:21.500",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26030",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:10.130",
"lastModified": "2024-12-02T22:06:56.380",
"lastModified": "2024-12-03T14:25:09.180",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26031",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:10.420",
"lastModified": "2024-12-02T22:06:58.120",
"lastModified": "2024-12-03T14:10:06.587",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26032",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:10.647",
"lastModified": "2024-12-02T22:06:59.920",
"lastModified": "2024-12-03T14:40:37.250",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26033",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:10.867",
"lastModified": "2024-12-02T22:07:02.203",
"lastModified": "2024-12-03T14:41:32.627",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26034",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:11.100",
"lastModified": "2024-12-02T22:07:03.987",
"lastModified": "2024-12-03T14:40:27.617",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26035",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:11.360",
"lastModified": "2024-12-02T22:07:06.280",
"lastModified": "2024-12-03T14:39:57.947",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26038",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:11.570",
"lastModified": "2024-12-02T22:07:08.043",
"lastModified": "2024-12-03T14:38:32.390",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26040",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:11.790",
"lastModified": "2024-12-02T22:07:09.847",
"lastModified": "2024-12-03T14:37:58.917",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26041",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:12.023",
"lastModified": "2024-12-02T22:07:12.473",
"lastModified": "2024-12-03T14:35:05.120",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26042",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:12.273",
"lastModified": "2024-12-02T22:07:13.407",
"lastModified": "2024-12-03T14:34:28.220",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26043",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:12.510",
"lastModified": "2024-12-02T22:07:15.597",
"lastModified": "2024-12-03T14:34:19.377",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26044",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:12.767",
"lastModified": "2024-12-02T22:07:18.390",
"lastModified": "2024-12-03T14:32:50.367",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26045",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:13.007",
"lastModified": "2024-12-02T22:07:20.870",
"lastModified": "2024-12-03T14:32:46.117",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26050",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:13.263",
"lastModified": "2024-12-02T22:07:22.173",
"lastModified": "2024-12-03T14:32:40.333",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -87,8 +87,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26056",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:14.097",
"lastModified": "2024-12-02T22:07:24.513",
"lastModified": "2024-12-03T14:46:21.770",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26059",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:14.313",
"lastModified": "2024-12-02T22:07:26.627",
"lastModified": "2024-12-03T14:46:10.120",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26061",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:14.533",
"lastModified": "2024-12-02T22:07:28.717",
"lastModified": "2024-12-03T14:45:43.500",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26062",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:14.760",
"lastModified": "2024-12-02T22:07:32.527",
"lastModified": "2024-12-03T14:44:08.960",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26063",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:14.973",
"lastModified": "2024-12-02T22:09:53.683",
"lastModified": "2024-12-03T14:43:38.843",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -77,8 +77,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26064",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:15.197",
"lastModified": "2024-12-02T22:09:18.633",
"lastModified": "2024-12-03T14:42:01.657",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26065",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:15.440",
"lastModified": "2024-12-02T22:08:58.650",
"lastModified": "2024-12-03T14:41:45.277",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -67,8 +67,8 @@
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.03",
"matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456"
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30314",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-05-16T12:15:13.280",
"lastModified": "2024-05-22T08:15:09.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T14:33:44.160",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,19 +32,37 @@
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.2,
"baseSeverity": "HIGH"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 5.8
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +71,55 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://helpx.adobe.com/security/products/dreamweaver/apsb24-39.html",
"source": "psirt@adobe.com"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:dreamweaver:*:*:*:*:*:*:*:*",
"versionEndExcluding": "21.4",
"matchCriteriaId": "C5CFE74F-C421-442D-A374-42A1C3232B80"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/dreamweaver/apsb24-39.html",
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/dreamweaver/apsb24-39.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34112",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-06-13T12:15:10.870",
"lastModified": "2024-06-13T18:35:19.777",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T14:35:08.160",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
@ -42,19 +42,161 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:-:*:*:*:*:*:*",
"matchCriteriaId": "7A94B406-C011-4673-8C2B-0DD94D46CC4C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update1:*:*:*:*:*:*",
"matchCriteriaId": "AFD05E3A-10F9-4C75-9710-BA46B66FF6E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update10:*:*:*:*:*:*",
"matchCriteriaId": "F1FC7D1D-6DD2-48B2-980F-B001B0F24473"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update11:*:*:*:*:*:*",
"matchCriteriaId": "1FA19E1D-61C2-4640-AF06-4BCFE750BDF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update12:*:*:*:*:*:*",
"matchCriteriaId": "3F331DEA-F3D0-4B13-AB1E-6FE39B2BB55D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update13:*:*:*:*:*:*",
"matchCriteriaId": "63D5CF84-4B0D-48AE-95D6-262AEA2FFDE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update2:*:*:*:*:*:*",
"matchCriteriaId": "D57C8681-AC68-47DF-A61E-B5C4B4A47663"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update3:*:*:*:*:*:*",
"matchCriteriaId": "75608383-B727-48D6-8FFA-D552A338A562"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update4:*:*:*:*:*:*",
"matchCriteriaId": "7773DB68-414A-4BA9-960F-52471A784379"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update5:*:*:*:*:*:*",
"matchCriteriaId": "B38B9E86-BCD5-4BCA-8FB7-EC55905184E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update6:*:*:*:*:*:*",
"matchCriteriaId": "5E7BAB80-8455-4570-A2A2-8F40469EE9CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update7:*:*:*:*:*:*",
"matchCriteriaId": "F9D645A2-E02D-4E82-A2BD-0A7DE5B8FBCC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update8:*:*:*:*:*:*",
"matchCriteriaId": "6E22D701-B038-4795-AA32-A18BC93C2B6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2021:update9:*:*:*:*:*:*",
"matchCriteriaId": "CAC4A0EC-C3FC-47D8-86CE-0E6A87A7F0B0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:-:*:*:*:*:*:*",
"matchCriteriaId": "B02A37FE-5D31-4892-A3E6-156A8FE62D28"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update1:*:*:*:*:*:*",
"matchCriteriaId": "0AA3D302-CFEE-4DFD-AB92-F53C87721BFF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update2:*:*:*:*:*:*",
"matchCriteriaId": "EB88D4FE-5496-4639-BAF2-9F29F24ABF29"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update3:*:*:*:*:*:*",
"matchCriteriaId": "43E0ED98-2C1F-40B8-AF60-FEB1D85619C0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update4:*:*:*:*:*:*",
"matchCriteriaId": "76204873-C6E0-4202-8A03-0773270F1802"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update5:*:*:*:*:*:*",
"matchCriteriaId": "C1A22BE9-0D47-4BA8-8BDB-9B12D7A0F7C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update6:*:*:*:*:*:*",
"matchCriteriaId": "E3A83642-BF14-4C37-BD94-FA76AABE8ADC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:coldfusion:2023:update7:*:*:*:*:*:*",
"matchCriteriaId": "A892E1DC-F2C8-4F53-8580-A2D1BEED5A25"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb24-41.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb24-41.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-34123",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-07-09T19:15:11.493",
"lastModified": "2024-07-11T13:06:13.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T14:35:59.150",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
@ -30,9 +32,27 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.0,
"baseSeverity": "HIGH"
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
@ -42,7 +62,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +71,62 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://helpx.adobe.com/security/products/premiere_pro/apsb24-46.html",
"source": "psirt@adobe.com"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
"versionEndExcluding": "23.6.7",
"matchCriteriaId": "A1E4799F-8D36-419C-A3BD-1CD365D59FBF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:premiere_pro:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0",
"versionEndExcluding": "24.5",
"matchCriteriaId": "034306A8-9B02-4CE1-9F41-B33CA518FCDF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/premiere_pro/apsb24-46.html",
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/premiere_pro/apsb24-46.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35366",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-29T20:15:19.863",
"lastModified": "2024-12-02T17:15:10.497",
"lastModified": "2024-12-03T14:15:20.107",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-120"
"value": "CWE-190"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-39343",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-02T20:15:06.993",
"lastModified": "2024-12-02T20:15:06.993",
"lastModified": "2024-12-03T14:15:20.397",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Samsung Mobile Processor and Wearable Processor Exynos 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, Modem 5123, and Modem 5300. The baseband software does not properly check the length specified by the MM (Mobility Management) module, which can lead to Denial of Service."
},
{
"lang": "es",
"value": " Se descubri\u00f3 un problema en los procesadores m\u00f3viles y port\u00e1tiles Samsung Exynos 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, m\u00f3dem 5123 y m\u00f3dem 5300. El software de banda base no verifica correctamente la longitud especificada por el m\u00f3dulo MM (gesti\u00f3n de movilidad), lo que puede provocar una denegaci\u00f3n de servicio."
}
],
"metrics": {
@ -35,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1284"
}
]
}
],
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-42422",
"sourceIdentifier": "security_alert@emc.com",
"published": "2024-12-03T13:15:04.987",
"lastModified": "2024-12-03T13:15:04.987",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dell NetWorker, version(s) 19.10, contain(s) an Authorization Bypass Through User-Controlled Key vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure."
},
{
"lang": "es",
"value": "Dell NetWorker, versi\u00f3n 19.10, contiene una vulnerabilidad de omisi\u00f3n de autorizaci\u00f3n mediante clave controlada por el usuario. Un atacante no autenticado con acceso remoto podr\u00eda aprovechar esta vulnerabilidad y provocar la divulgaci\u00f3n de informaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security_alert@emc.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "security_alert@emc.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"references": [
{
"url": "https://www.dell.com/support/kbdoc/en-us/000255892/dsa-2024-478-security-update-for-dell-networker-vulnerabilities",
"source": "security_alert@emc.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-48990",
"sourceIdentifier": "security@ubuntu.com",
"published": "2024-11-19T18:15:21.530",
"lastModified": "2024-11-19T21:56:45.533",
"lastModified": "2024-12-03T14:15:20.627",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Python interpreter with an attacker-controlled PYTHONPATH environment variable."
},
{
"lang": "es",
"value": "Qualys descubri\u00f3 que needrestart, antes de la versi\u00f3n 3.8, permite a los atacantes locales ejecutar c\u00f3digo arbitrario como superusuario enga\u00f1ando a needrestart para que ejecute el int\u00e9rprete de Python con una variable de entorno PYTHONPATH controlada por el atacante."
}
],
"metrics": {
@ -19,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -26,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -59,6 +63,10 @@
{
"url": "https://www.qualys.com/2024/11/19/needrestart/needrestart.txt",
"source": "security@ubuntu.com"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/11/19/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48991",
"sourceIdentifier": "security@ubuntu.com",
"published": "2024-11-19T18:15:21.710",
"lastModified": "2024-11-30T13:15:05.133",
"lastModified": "2024-12-03T14:15:20.740",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -59,6 +59,10 @@
{
"url": "http://www.openwall.com/lists/oss-security/2024/11/30/4",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/11/19/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-48992",
"sourceIdentifier": "security@ubuntu.com",
"published": "2024-11-19T18:15:21.897",
"lastModified": "2024-11-19T21:56:45.533",
"lastModified": "2024-12-03T14:15:20.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Qualys discovered that needrestart, before version 3.8, allows local attackers to execute arbitrary code as root by tricking needrestart into running the Ruby interpreter with an attacker-controlled RUBYLIB environment variable."
},
{
"lang": "es",
"value": "Qualys descubri\u00f3 que needrestart, antes de la versi\u00f3n 3.8, permite a atacantes locales ejecutar c\u00f3digo arbitrario como superusuario enga\u00f1ando a needrestart para que ejecute el int\u00e9rprete de Ruby con una variable de entorno RUBYLIB controlada por el atacante."
}
],
"metrics": {
@ -19,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -26,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -59,6 +63,10 @@
{
"url": "https://www.qualys.com/2024/11/19/needrestart/needrestart.txt",
"source": "security@ubuntu.com"
},
{
"url": "https://www.openwall.com/lists/oss-security/2024/11/19/1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,103 @@
{
"id": "CVE-2024-49529",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-11-21T17:15:20.987",
"lastModified": "2024-12-03T14:37:05.960",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InDesign Desktop versions 19.0, 20.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
},
{
"lang": "es",
"value": "Las versiones 19.0, 20.0 y anteriores de InDesign Desktop se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
"versionEndExcluding": "19.5.1",
"matchCriteriaId": "E9742486-3F6F-47F2-8046-5E33EA765A65"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:indesign:20.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEF1D0A8-9DAD-403E-800C-FBFB8F9C0F41"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/indesign/apsb24-91.html",
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,12 +2,17 @@
"id": "CVE-2024-52998",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-11-22T19:15:07.433",
"lastModified": "2024-11-22T19:15:07.433",
"vulnStatus": "Received",
"lastModified": "2024-12-03T14:32:51.580",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Substance3D - Stager versions 3.0.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
},
{
"lang": "es",
"value": "Las versiones 3.0.2 y anteriores de Substance3D - Stager se ven afectadas por una vulnerabilidad de lectura fuera de los l\u00edmites que podr\u00eda provocar la divulgaci\u00f3n de memoria confidencial. Un atacante podr\u00eda aprovechar esta vulnerabilidad para eludir mitigaciones como ASLR. La explotaci\u00f3n de este problema requiere la interacci\u00f3n del usuario, ya que la v\u00edctima debe abrir un archivo malicioso."
}
],
"metrics": {
@ -46,10 +51,48 @@
]
}
],
"references": [
"configurations": [
{
"url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb24-60.html",
"source": "psirt@adobe.com"
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.0.3",
"matchCriteriaId": "972C9BF4-5DF0-43FE-9F82-D3778F522D6D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb24-60.html",
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-9978",
"sourceIdentifier": "scy@openharmony.io",
"published": "2024-12-03T13:15:05.140",
"lastModified": "2024-12-03T13:15:05.140",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "in OpenHarmony v4.1.1 and prior versions allow a local attacker cause information leak through out-of-bounds Read."
},
{
"lang": "es",
"value": "en OpenHarmony v4.1.1 y versiones anteriores, se permite que un atacante local provoque fugas de informaci\u00f3n a trav\u00e9s de lecturas fuera de los l\u00edmites."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "scy@openharmony.io",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "scy@openharmony.io",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-12.md",
"source": "scy@openharmony.io"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-03T13:02:19.824299+00:00
2024-12-03T15:03:05.766364+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-03T11:15:04.867000+00:00
2024-12-03T15:00:58.693000+00:00
```
### Last Data Feed Release
@ -33,21 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
271981
271987
```
### CVEs added in the last Commit
Recently added CVEs: `1`
Recently added CVEs: `6`
- [CVE-2024-11326](CVE-2024/CVE-2024-113xx/CVE-2024-11326.json) (`2024-12-03T11:15:04.867`)
- [CVE-2024-10074](CVE-2024/CVE-2024-100xx/CVE-2024-10074.json) (`2024-12-03T13:15:04.490`)
- [CVE-2024-11200](CVE-2024/CVE-2024-112xx/CVE-2024-11200.json) (`2024-12-03T14:15:19.923`)
- [CVE-2024-12082](CVE-2024/CVE-2024-120xx/CVE-2024-12082.json) (`2024-12-03T13:15:04.843`)
- [CVE-2024-42422](CVE-2024/CVE-2024-424xx/CVE-2024-42422.json) (`2024-12-03T13:15:04.987`)
- [CVE-2024-49529](CVE-2024/CVE-2024-495xx/CVE-2024-49529.json) (`2024-11-21T17:15:20.987`)
- [CVE-2024-9978](CVE-2024/CVE-2024-99xx/CVE-2024-9978.json) (`2024-12-03T13:15:05.140`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `38`
- [CVE-2024-47476](CVE-2024/CVE-2024-474xx/CVE-2024-47476.json) (`2024-12-03T10:15:05.883`)
- [CVE-2024-26035](CVE-2024/CVE-2024-260xx/CVE-2024-26035.json) (`2024-12-03T14:39:57.947`)
- [CVE-2024-26038](CVE-2024/CVE-2024-260xx/CVE-2024-26038.json) (`2024-12-03T14:38:32.390`)
- [CVE-2024-26040](CVE-2024/CVE-2024-260xx/CVE-2024-26040.json) (`2024-12-03T14:37:58.917`)
- [CVE-2024-26041](CVE-2024/CVE-2024-260xx/CVE-2024-26041.json) (`2024-12-03T14:35:05.120`)
- [CVE-2024-26042](CVE-2024/CVE-2024-260xx/CVE-2024-26042.json) (`2024-12-03T14:34:28.220`)
- [CVE-2024-26043](CVE-2024/CVE-2024-260xx/CVE-2024-26043.json) (`2024-12-03T14:34:19.377`)
- [CVE-2024-26044](CVE-2024/CVE-2024-260xx/CVE-2024-26044.json) (`2024-12-03T14:32:50.367`)
- [CVE-2024-26045](CVE-2024/CVE-2024-260xx/CVE-2024-26045.json) (`2024-12-03T14:32:46.117`)
- [CVE-2024-26050](CVE-2024/CVE-2024-260xx/CVE-2024-26050.json) (`2024-12-03T14:32:40.333`)
- [CVE-2024-26056](CVE-2024/CVE-2024-260xx/CVE-2024-26056.json) (`2024-12-03T14:46:21.770`)
- [CVE-2024-26059](CVE-2024/CVE-2024-260xx/CVE-2024-26059.json) (`2024-12-03T14:46:10.120`)
- [CVE-2024-26061](CVE-2024/CVE-2024-260xx/CVE-2024-26061.json) (`2024-12-03T14:45:43.500`)
- [CVE-2024-26062](CVE-2024/CVE-2024-260xx/CVE-2024-26062.json) (`2024-12-03T14:44:08.960`)
- [CVE-2024-26063](CVE-2024/CVE-2024-260xx/CVE-2024-26063.json) (`2024-12-03T14:43:38.843`)
- [CVE-2024-26064](CVE-2024/CVE-2024-260xx/CVE-2024-26064.json) (`2024-12-03T14:42:01.657`)
- [CVE-2024-26065](CVE-2024/CVE-2024-260xx/CVE-2024-26065.json) (`2024-12-03T14:41:45.277`)
- [CVE-2024-30314](CVE-2024/CVE-2024-303xx/CVE-2024-30314.json) (`2024-12-03T14:33:44.160`)
- [CVE-2024-34112](CVE-2024/CVE-2024-341xx/CVE-2024-34112.json) (`2024-12-03T14:35:08.160`)
- [CVE-2024-34123](CVE-2024/CVE-2024-341xx/CVE-2024-34123.json) (`2024-12-03T14:35:59.150`)
- [CVE-2024-35366](CVE-2024/CVE-2024-353xx/CVE-2024-35366.json) (`2024-12-03T14:15:20.107`)
- [CVE-2024-39343](CVE-2024/CVE-2024-393xx/CVE-2024-39343.json) (`2024-12-03T14:15:20.397`)
- [CVE-2024-48990](CVE-2024/CVE-2024-489xx/CVE-2024-48990.json) (`2024-12-03T14:15:20.627`)
- [CVE-2024-48991](CVE-2024/CVE-2024-489xx/CVE-2024-48991.json) (`2024-12-03T14:15:20.740`)
- [CVE-2024-48992](CVE-2024/CVE-2024-489xx/CVE-2024-48992.json) (`2024-12-03T14:15:20.850`)
- [CVE-2024-52998](CVE-2024/CVE-2024-529xx/CVE-2024-52998.json) (`2024-12-03T14:32:51.580`)
## Download and Usage

View File

@ -242727,6 +242727,7 @@ CVE-2024-10070,0,0,097b5fa8b05282436b73014713798d6fa690cb8f60b9a6a570218b5126552
CVE-2024-10071,0,0,bb09f0d1e52fd077bfb7e20220a6e7299b02ea37e71361b2da945aab892ebc57,2024-10-22T14:20:07.393000
CVE-2024-10072,0,0,bc7125b99f3b32fe14c3d31b5db253134e4813c76ba571fea45856a5a9500c69,2024-10-22T14:20:16.997000
CVE-2024-10073,0,0,9ac62420226c9fe9ed2bbe058542cdb11512629d78e7df28a3c14d1c56a17916,2024-10-29T17:18:17.690000
CVE-2024-10074,1,1,b284744f07fe1ddfdf77652f05295a2c0f173bf1f197cb901df5e6965a15cfaa,2024-12-03T13:15:04.490000
CVE-2024-10078,0,0,2a32e11049e01066fde7387ca375ea057ecc9dffb9aee4dba521fe1d1cadf633,2024-10-22T16:28:26.113000
CVE-2024-10079,0,0,373e7888db951070e423ef6d1503b855c013868b3575c214d882cd52c4cf0816,2024-10-22T16:27:54.577000
CVE-2024-1008,0,0,a9b7d9e2e828ed74dc3f97aef993fcfdb7b13561fd219152455ff7524c8067cd,2024-05-17T02:35:09.680000
@ -242844,7 +242845,7 @@ CVE-2024-10218,0,0,80b7300a65e46275d83f3bd59a6350bd0af804c93b7f84ec384cf6c815e43
CVE-2024-1022,0,0,f42eaa1b302319f7e3148377e0522c31bf6c16d407215c446c1d3f1b55b4debd,2024-05-17T02:35:11.070000
CVE-2024-10220,0,0,34f293e26dd67da6d92e244e4687b4aa20b912c0b86b79157464f27fb6137073,2024-11-22T17:15:06.650000
CVE-2024-10223,0,0,237ebcbe1a44551c4c262c272427d3817a64977114a9e921cdeb1f7ff3ea65fd,2024-11-01T12:57:03.417000
CVE-2024-10224,0,0,07b8c95ec9f809249cca3b0789e13bf66e4e14062afd318734f0da25960e79d2,2024-11-19T21:56:45.533000
CVE-2024-10224,0,1,b4b06129afa19bd4bd2db86d543a9417ce3496d8c49771d9c2d4f2d051e46d1d,2024-12-03T14:15:19.270000
CVE-2024-10226,0,0,6d4cd561e79cc1ca7a5d9390efd20e7ca0cce098a56a2c4eb01cd0ded7623cbf,2024-10-31T16:48:41.553000
CVE-2024-10227,0,0,3dd5e64d31c98828e85e7c30a2d118d04e1c9c4e3f27cb753e16556963759a42,2024-10-29T14:34:04.427000
CVE-2024-10228,0,0,d569133a271818bbabb06a409fc5b29be55f5994c84d2df5dcb22d53edb0464d,2024-11-07T17:12:45.750000
@ -243391,7 +243392,7 @@ CVE-2024-10999,0,0,e7ea7377e972e711b7f09c97d1f1904a51f2a45036948c3c337a6d1c65fd2
CVE-2024-1100,0,0,f004473b9cf0d9d95a81c6b2db685e986de4389d0d38ab5c3537c8bbd36c025b,2024-07-03T01:44:59.517000
CVE-2024-11000,0,0,a7e8d5385c553ca345a72fc5358bdef9d69bb9b3c3980e31af7a0cfb92d81a8f,2024-11-13T01:05:49.643000
CVE-2024-11002,0,0,b6bf6324987f4073b2c9bfe8ed3afef93af42e688e9e8a0c5fdbab27cca15ed5,2024-11-26T07:15:05.413000
CVE-2024-11003,0,0,61bfbb93c4ae10f4af71c16c69643bf462c68ffa94733e59b6f95c78952b7f9b,2024-11-19T21:56:45.533000
CVE-2024-11003,0,1,a783ec5f16b410f220d004ec7b834ae4a4b65091c9d3bd08888ea586385d6942,2024-12-03T14:15:19.800000
CVE-2024-11004,0,0,ae81cd254161ae2b32edcbdeb3c8b9257e0a408bd5a5695d4038ccc9e5adaac9,2024-11-13T17:01:58.603000
CVE-2024-11005,0,0,11c6f0332fc033e5f19567e3b4704591ec391ce7bb38c717fd45eebf4e8bd80e,2024-11-22T17:15:06.803000
CVE-2024-11006,0,0,94626099ce68e5d3e4adfe80a73960f4ad7b764747da2022a8d4006ce81886f0,2024-11-22T17:15:06.913000
@ -243519,6 +243520,7 @@ CVE-2024-11195,0,0,59a97c370771f27b33e51ae1039dc49a821a1858990404541e8309b975c38
CVE-2024-11198,0,0,51d6daea956d8949d0eebe7d036d8836a4c8d5c266ea899d7a1d4229a0290103,2024-11-19T21:57:32.967000
CVE-2024-11199,0,0,1b252293dc51d6f43d3121b045d01eb3c6301ad12927e01a257a520b4287caef,2024-11-23T10:15:03.897000
CVE-2024-1120,0,0,4ae965ad3da5f8a3235e6e58dd82dd504b21e474d229ae465351f9f2ed6318d2,2024-03-01T14:04:04.827000
CVE-2024-11200,1,1,f4d97ea48501a65608a17fa4e2270dbe4daddfc571376bcd024e4292966bd946,2024-12-03T14:15:19.923000
CVE-2024-11202,0,0,51d8d259b86d0f0a0aaf1b7832edde09bf21ffb4ef806afcd5ff2c031b036ac7,2024-11-26T08:15:03.710000
CVE-2024-11203,0,0,51c484c857cf59c3f813a2e3506116f16f445f710b53772d92de1b4f877cc338,2024-11-28T09:15:04.007000
CVE-2024-11206,0,0,4dabdbee4189d67c14faab7077a38bbebaaf9a0412b9485b8ea9f96e93b55b84,2024-11-15T13:58:08.913000
@ -243595,7 +243597,7 @@ CVE-2024-11319,0,0,10049ab876319f9ecb08a7b21cc61880e37e90d0ecd4d79058dbd3eba0407
CVE-2024-1132,0,0,3de6e62885ac8497a4c1d8f4950ebedc171b13b33dfedd6a9eea9ae164fd993a,2024-07-03T01:45:01.507000
CVE-2024-11320,0,0,043dd45fc8afc6a3f6d5124b009a260902c28d8e6731495b55f0e622c6d087a7,2024-11-26T17:26:33.327000
CVE-2024-11325,0,0,14da4d35c2181419813fe9ac1dccdd051d8a95ab923f557a3b686e3cf070cb30,2024-12-03T10:15:05.067000
CVE-2024-11326,1,1,3601bc2a8aa6c701a70d06e299ecc68b5e3f45dc7fc87ab827ff5000b9b49cb5,2024-12-03T11:15:04.867000
CVE-2024-11326,0,0,3601bc2a8aa6c701a70d06e299ecc68b5e3f45dc7fc87ab827ff5000b9b49cb5,2024-12-03T11:15:04.867000
CVE-2024-1133,0,0,b8b851364368259dd533f1c71b437f741276dcf99770b03558b5d9cd5d3f095a,2024-02-29T13:49:29.390000
CVE-2024-11330,0,0,1c458fab138aae3f3b89b170e15e7403fdc2fbe304c8cf0cbc41ae122ec08539,2024-11-23T07:15:03.737000
CVE-2024-11332,0,0,21d8101c0dd73a7dc8b4a9b045dbbf7a2c40f682ad21bdcbf98ef68d6b970235,2024-11-23T05:15:06.520000
@ -243868,9 +243870,9 @@ CVE-2024-11805,0,0,c4320a41ca0d4edd118e9ad964bb3b250fee875896f75cfe07057a59cde52
CVE-2024-1181,0,0,3ab1ccda9f702c4fc6b350844c2c0edd9e45550807a44d2d8746213d5ed7378e,2024-03-20T13:00:16.367000
CVE-2024-11817,0,0,878ee2179044a99d330d167a93477de960b6cf592f6203d72eec9805c4d5d74a,2024-11-26T23:15:04.990000
CVE-2024-11818,0,0,db7694cd2fdcae7c78aac428fa42653e88b1d41dfdd73e2502c588c9613c4f73,2024-11-27T00:15:17.727000
CVE-2024-11819,0,0,96baade15f9044b9dcb55897d3c533bfc5ed78088c4c0af1b3f20fd7e1b0e87b,2024-11-27T00:15:17.890000
CVE-2024-11819,0,1,4ad555b58c0b6ae087a0e197e14f318c0818cf9ebf662c2c2b44a9340719cc17,2024-12-03T15:00:58.693000
CVE-2024-1182,0,0,fa905e4a8a46b36f13d15329274923ae221fc1fe7f91daf124410752f4903054,2024-07-05T12:55:51.367000
CVE-2024-11820,0,0,98b7e3f55278e4e540b5d30afcc2f1c61148c58882b41c21d30f2b114d45baf0,2024-11-27T01:15:04.090000
CVE-2024-11820,0,1,851b7a45884f50f3792038cee6a0dd94b1414d7c7c3cad4aa15d26efb61c7827,2024-12-03T14:54:20.297000
CVE-2024-11828,0,0,246e1e2eab57884aa3d4d52a63d8c3c77eefda7cf137c7c25e51217c37ae62b7,2024-11-26T19:15:22.910000
CVE-2024-1183,0,0,b9ca697d85173799c910606842f064c322818be1aee71b1208c43495b066c09a,2024-04-16T13:24:07.103000
CVE-2024-1184,0,0,0bd0336a802b5a07ef17cf4c3337487d1573b3f8590cc13c2e3f9ac276b1f143,2024-05-17T02:35:16.900000
@ -243939,6 +243941,7 @@ CVE-2024-1206,0,0,5f77d40826619ff076a6ee2348b6f5023dd16e0c591d0d5d735c076214b8b6
CVE-2024-12062,0,0,053134064f0b6efbb78d94709d74965493fd7936bfcf08f9a9a8ec7d826131fc,2024-12-03T10:15:05.493000
CVE-2024-1207,0,0,dcc484c1fca006f292c23965347128c235a983932753c8f043310e93d42eeea4,2024-02-15T02:05:42.313000
CVE-2024-1208,0,0,931317b38cffca1e6ab678e3f4e10db5d686e3bb7ffa9e092bfb0d5704f0fe50,2024-02-13T14:06:24.090000
CVE-2024-12082,1,1,3b55c847ee02ef0d7f4b58fecd9285e5b3b7a20be8f27582ab2fdc4ac93dfac6,2024-12-03T13:15:04.843000
CVE-2024-1209,0,0,b007174870c79d931de8bd87795b421ecc64b354efa55388cf8747cc0f9b9382,2024-02-14T16:51:40.300000
CVE-2024-1210,0,0,2bd6c4d9a535fadb91354d7280da4ed73754e214ed933073c198034626ca398d,2024-02-14T17:26:54.873000
CVE-2024-1212,0,0,da6373ae7bafa80bc186105339e693a9592b96e608bda44b9b7e9a26c6194323,2024-11-19T17:24:39.480000
@ -245270,7 +245273,7 @@ CVE-2024-20764,0,0,aaf6aea1cfc81c17e2ef82d097347523784d6c37fa8e664f1fa9ad6c605a3
CVE-2024-20765,0,0,ad91982b1363103e7d071a542448be4f43c1d446a44c46149dd1d5563e96bd7d,2024-02-29T18:06:42.010000
CVE-2024-20766,0,0,898b775b089dd9caddb4b4690630a4034df5907c7b03a6ac372c91b73b803f73,2024-04-10T19:49:51.183000
CVE-2024-20767,0,0,e44fe1f40a168c1d580708d22170c7101344fa827a777107ab7c62d60385df35,2024-03-18T12:38:25.490000
CVE-2024-20768,0,0,0a787ae17c1c9554efbce8083ebf2f71929ddd956de1438a76dc74375b810cb1,2024-12-02T20:20:27.637000
CVE-2024-20768,0,1,1e3e9e9553fe22dc3d69b454622eff7f4f96055b91832944849f7b2ee61961b0,2024-12-03T14:25:50.643000
CVE-2024-20769,0,0,4c236b05669b68ca5ce041ed8b26b6adfc2e0cb9e4a3ee0955957eb96f78ccb6,2024-06-14T19:30:30.037000
CVE-2024-2077,0,0,e7bd6e3d8e34c4ba57719bf938fdc690e0425d907fa9aeaa848477a4c8d06182,2024-05-17T02:38:02.460000
CVE-2024-20770,0,0,2220817887bead81dba660b5070a9bfc8174373fc0e12fc00c386ef0f159eda4,2024-04-10T19:49:51.183000
@ -245297,9 +245300,9 @@ CVE-2024-20795,0,0,339aac1d5967def1721b9f2266bf58d280ddf20a2869a78a797eb0f1e5bbf
CVE-2024-20796,0,0,00526c11ef10ac19e26f1b9fd4dbb5343656ad019ba0153210f3164b00fbb116,2024-04-11T12:47:44.137000
CVE-2024-20797,0,0,cca548d603d4ef24bc949550666e86662b0fde7c1a3163dc260ede4b6277d4bf,2024-04-11T12:47:44.137000
CVE-2024-20798,0,0,8b948926eaf9bb7762236e345460aa95eaff4b64e6ad072852daab65eab7f1c6,2024-04-11T12:47:44.137000
CVE-2024-20799,0,0,e14bc255e39a0fbf73332b041fca58be1031162fae1815563fb8ea9b691c56fe,2024-12-02T22:07:32.537000
CVE-2024-20799,0,1,8428cb712862354c385635b67f043354a5a529f6758e50018b2185b88daa17c7,2024-12-03T14:18:15.477000
CVE-2024-2080,0,0,739bb7bc16949ce8dc42f086707a1965c48b8c0e80b8a96770d78539ca010524,2024-03-22T12:45:36.130000
CVE-2024-20800,0,0,63cbca2bd0041e91c4c27520108a691e41ded598aa31ad458d4ca67a8b3670d7,2024-12-02T22:07:34.180000
CVE-2024-20800,0,1,e90a6af871b5675be42c72ef35b247ceac517172f67ea5e497ab2a65b8ef6be6,2024-12-03T14:16:35.813000
CVE-2024-20802,0,0,199d727c032aa2e620e384dca4e13a9e3425e69f11a38c8295cb8667c34719d8,2024-01-10T16:14:57.787000
CVE-2024-20803,0,0,0344cde3efeaae4afbdf650bafe8bd2112bea594bd06ade4eca20bfb4af01ace,2024-01-10T16:11:26.313000
CVE-2024-20804,0,0,047c084f6461b3ccfa7e0491c6396c940be7f851c74224e7b3908c6f90469840,2024-04-02T01:15:50.777000
@ -249168,47 +249171,47 @@ CVE-2024-26024,0,0,3ab60f6be938f975935e53b7a80711b98fe8d56f189e7148a76008394bc4a
CVE-2024-26025,0,0,3352cb4bf9ea0c839d1741e6282396ec44178b4e8d69bb56155c91bf1b50fdf8,2024-09-06T18:54:37.007000
CVE-2024-26026,0,0,9489dfd8cfaf84cc429afc6dedc0bc5efa9a938711a5b920a49c5eb5da48c8dd,2024-05-08T17:05:24.083000
CVE-2024-26027,0,0,92cac7f77f6e52e5db63c20697f9eef252fe749956e34d00b1955a621b2a7163,2024-09-06T18:52:51.097000
CVE-2024-26028,0,0,c517cc3720c90dec606bc7d8dee3896584eb629812e374b25507b7a34818d629,2024-12-02T22:06:53.717000
CVE-2024-26028,0,1,ede9fe4cab969be7a28fa27ed4c92b2b85d7eee04aae61937a86bd32f02b4349,2024-12-03T14:18:21.500000
CVE-2024-26029,0,0,3b6290d9a75a8e9810fd217f46cbaf1351e6c78f04f13dd99b8776f7c655bd87,2024-08-07T12:15:36.547000
CVE-2024-2603,0,0,78190220c4426015d8e369c25fb4d08ae79b05986155963bab2103b320746b59,2024-07-03T01:53:22.183000
CVE-2024-26030,0,0,d7acb1e81dd5fa90c7c5b9b18609c55ef6866eae68acd588a8a8bc16b3ccaa0e,2024-12-02T22:06:56.380000
CVE-2024-26031,0,0,9251a22057f236e1d3a848e565f60cf6550f57153c17685d81f7d9f0da5a0b28,2024-12-02T22:06:58.120000
CVE-2024-26032,0,0,25ba5027b92ba7b29cd5952069e3745d08f29b71e08faea170ccb8512e51d957,2024-12-02T22:06:59.920000
CVE-2024-26033,0,0,c78707ded2f2b609bc7eca4313e9210441b759e77c29f088718bb51d621ffcdf,2024-12-02T22:07:02.203000
CVE-2024-26034,0,0,6716c83fd1d8d731d8fc3214db861cc7937299ee72e21da7d42be35b66918217,2024-12-02T22:07:03.987000
CVE-2024-26035,0,0,be43584d20133ee714916450b0eaa223ef0e0c531281a3b0f6515ff2706e1c73,2024-12-02T22:07:06.280000
CVE-2024-26030,0,1,9480f998e12c7225c9291a75c239ad904ef492a904984d0f591e44b1bf95f8b9,2024-12-03T14:25:09.180000
CVE-2024-26031,0,1,37778b6b03f34d58e747cfcd35a3b12f95ef62c6450aea058b278695d6d8a2d7,2024-12-03T14:10:06.587000
CVE-2024-26032,0,1,645c8078e6a26904d2d551665c39be159598a06b4a7a48d1153d69bd1f42025a,2024-12-03T14:40:37.250000
CVE-2024-26033,0,1,e038cd7888bdfa6b33bfe5df359535de6a1e8fecc268a99a38060d9f29c2502f,2024-12-03T14:41:32.627000
CVE-2024-26034,0,1,7b6a7735faab8554d9ba0052517c5f5f524ae1f59952c80e36700be3e0c5aef6,2024-12-03T14:40:27.617000
CVE-2024-26035,0,1,6d2a0e3789cf1fc6e968489d15f56bea0ed58b0ddac4b2112fa1168e1ff12f68,2024-12-03T14:39:57.947000
CVE-2024-26036,0,0,1d83088cd2cd101659224a3fc5c08fa64786f76447e958e3014dda7a1b3b2762,2024-06-14T19:30:06.617000
CVE-2024-26037,0,0,93771142bffee162d36251cc4e8ed14800b95d6cabf310d68e7055bd0eea978f,2024-06-14T19:48:13.247000
CVE-2024-26038,0,0,b9bb6c98495127ac6071b9f41984d6f796b59bc5be5e7634f158102197235d11,2024-12-02T22:07:08.043000
CVE-2024-26038,0,1,968a447ee34eab05a2f4c9717ce5ed7be422a568ee2ecaf855ab8ca2f0d7aecf,2024-12-03T14:38:32.390000
CVE-2024-26039,0,0,1174a6c1115f79e7f0889b154dfc89e46af3bb6dd2520ac9d5c13289cf240986,2024-06-14T19:47:57.717000
CVE-2024-2604,0,0,450c7d59fe8571ecee58ed217df60ab05189f4ad43db724a13d662a6d29d50fb,2024-05-17T02:38:21.500000
CVE-2024-26040,0,0,881490c457662cce773f8ca7cddb2e3a126b8164e3048aefa446f96a3d6a6526,2024-12-02T22:07:09.847000
CVE-2024-26041,0,0,82bc3a27e139f2eac0699f5c997717f1714702a611d02caf92170be6080bfa06,2024-12-02T22:07:12.473000
CVE-2024-26042,0,0,b4a00f3667ef84694a4e6abf52951c7d51f9277bef08b433c87aba15cfea5dff,2024-12-02T22:07:13.407000
CVE-2024-26043,0,0,99ead7d68c938569d32b725222aa01cb299aa9704e98099bfec50c1573334734,2024-12-02T22:07:15.597000
CVE-2024-26044,0,0,d48863d0a18ce3b99a996ff7e489563474f3ba710823fa01053fdd4130dff831,2024-12-02T22:07:18.390000
CVE-2024-26045,0,0,c0e5a2bde8102da916dc75a0d099b9e904cf36335678ec6973bdd23ad8cb11f5,2024-12-02T22:07:20.870000
CVE-2024-26040,0,1,2a0b751b728209a7c9a3b5df0fc88243a60aedc3d5c7976061e63cd1c530eb81,2024-12-03T14:37:58.917000
CVE-2024-26041,0,1,2bd5f47ec9ed3dc4f1c1945994ca2a670f7b89c19a6dac4d15773010ee8fc2ed,2024-12-03T14:35:05.120000
CVE-2024-26042,0,1,2ea8d4dd55cbe369521d040be468f269c837b84a9eac6286bae77d5ed2d0b904,2024-12-03T14:34:28.220000
CVE-2024-26043,0,1,9e5ba2d761fb38599a187ece66b844e2c6f6948768589cb3a7e3e27c1f2048ba,2024-12-03T14:34:19.377000
CVE-2024-26044,0,1,66bac57be53c755cbe995e285249cde839b00b7b1d98f8199c1aa466447b6bfc,2024-12-03T14:32:50.367000
CVE-2024-26045,0,1,16de77a5d4b0cf723bbdcff02c0b9e5ead3b5ea66df2c839632d092fd2d31a4d,2024-12-03T14:32:46.117000
CVE-2024-26046,0,0,5c87a28b13d53ec29b89a2b33427517db21012c37c446a313fb6274d8fa5a520,2024-04-10T13:23:38.787000
CVE-2024-26047,0,0,148096905025fd63cbc95f27e9e4e0c5f23280eef70892c2f079c5329b94e086,2024-04-10T13:23:38.787000
CVE-2024-26049,0,0,a3a34d9b7dae7c572a170c4cf9ad06366559734e7c052afbd0e4cb731a5c408a,2024-08-07T13:15:59.723000
CVE-2024-2605,0,0,349e4409ed80d6811abb3d6a22d4a1c2580eb4cb5b90719226cde56ad4b7d78f,2024-08-28T15:35:21.410000
CVE-2024-26050,0,0,a45a43204e66a747018474afbb3bf9e8cced59d2a9da4abea0d1a9ec7441e460,2024-12-02T22:07:22.173000
CVE-2024-26050,0,1,e5e2c4f7b84f8f2f1d1ea8570d5ab87ff02bbfb4edf0f2eb8b892f6b238feba4,2024-12-03T14:32:40.333000
CVE-2024-26051,0,0,78bc48859c38750da39204fe9139ed7326b9440e064a7c71bb9438b77aa20ed2,2024-03-18T19:40:00.173000
CVE-2024-26052,0,0,b304109295db8f5f3410f8f04ff1bacf299ca38b40fc697f2ab4ec3a5eabc71f,2024-03-18T19:40:00.173000
CVE-2024-26053,0,0,08b1c01624e7d71b7ff35b901082456bbba3fa5d18db4bad7ba7d58bb2e8e67e,2024-06-14T19:46:37.923000
CVE-2024-26054,0,0,eda3484671c40e51a92b63a901454f377d91e0d9bfcdc0a5fb15602bc8f94d81,2024-06-14T19:24:41.580000
CVE-2024-26055,0,0,baa99b29bd8823923f255a8118fccf649a7d41ab4a2f879c4c914a9fe0240d12,2024-06-14T19:46:17.973000
CVE-2024-26056,0,0,fd25988b2ffb880e93d02ea0a7d6ca550724c5a3bf8011f3370b495b2e1472a4,2024-12-02T22:07:24.513000
CVE-2024-26056,0,1,14ff68b17aa108cff431fe42e307f1d738d1d00dbe0108481078696aa0855c29,2024-12-03T14:46:21.770000
CVE-2024-26057,0,0,e45b3f0f152eb3c78dc9320bed534a79a66b2c35d46fd8b2b0ef0017333c4b87,2024-06-14T19:46:03.817000
CVE-2024-26058,0,0,a93e87c800fd4d920581776c16d0072b04deb406d205f9f24e685781c2f5715f,2024-06-14T19:37:56.100000
CVE-2024-26059,0,0,1e0d0341f224106eff1e5af2366626fd5d13edf1ca8e2c987ea5d5df70d49373,2024-12-02T22:07:26.627000
CVE-2024-26059,0,1,ac98e6d0b0199134c58aa887f2df563a6de6ceece47482ec1418cea94cf6190c,2024-12-03T14:46:10.120000
CVE-2024-2606,0,0,e9eebb20c04d0205e18586a1da81a72eb028c0ab6b349ea25646cae1d987bed3,2024-10-30T15:35:09.973000
CVE-2024-26060,0,0,9cdef2d575b129761f3290b88017e8f07b5021de9d3255eeba059f838c645f83,2024-06-14T18:49:08.077000
CVE-2024-26061,0,0,ad2ceb8808417064310c3cdf2f62f9478a68900289ec3c3d53d06a95b0f1f100,2024-12-02T22:07:28.717000
CVE-2024-26062,0,0,de3a3c35ada4aa1c5944365be2cf00e2b621e3c48f1c3cd28c67c563a45ac527,2024-12-02T22:07:32.527000
CVE-2024-26063,0,0,0be577b3563c3b84879e994b8e663bef83be58c13a6830fc3d5d283ea404cee7,2024-12-02T22:09:53.683000
CVE-2024-26064,0,0,22ea7ed6008c6012e35e6e94aafec1da167cb036f2701bb13e0387b484a6c89c,2024-12-02T22:09:18.633000
CVE-2024-26065,0,0,9e200907fbcbb393ada9d535c2f77eec4931a2dded2812365f92071cee63cdfa,2024-12-02T22:08:58.650000
CVE-2024-26061,0,1,471407acdf51819c0bdd60ee5d73b186c8fadecaf5af71c2ca7d8c11adca573a,2024-12-03T14:45:43.500000
CVE-2024-26062,0,1,54cf0e1b1e6d1778aaa7182ecd73a54656c80a039edadc40b460c0c801a0ad52,2024-12-03T14:44:08.960000
CVE-2024-26063,0,1,f5a13f3984cabb12f59616fa26efdbef4591cca6826bbc28da51b1600a9b376a,2024-12-03T14:43:38.843000
CVE-2024-26064,0,1,3098c3e3de91199d1bd6d20eb89b7ee3464bdc44d99dc9cd1e4ea880cda75894,2024-12-03T14:42:01.657000
CVE-2024-26065,0,1,00462b106b4f303ce5343363705987a205782e4b4edc349db65b96bad65b09a1,2024-12-03T14:41:45.277000
CVE-2024-26066,0,0,c16f3c27056b3c70c3163298471f82d82d65c7e624bee5584c40df2a2851002f,2024-06-14T18:48:49.183000
CVE-2024-26067,0,0,4e837a02e31f2ba959b9ab2cadbab50fe243bb7e44fdf350987cc4ea278caf71,2024-03-18T19:40:00.173000
CVE-2024-26068,0,0,8b1bf80f59bd4ba690a55f04b468280504b7e85a202f44401a8c49c1cbdddd95,2024-06-14T18:48:22.843000
@ -252470,7 +252473,7 @@ CVE-2024-3031,0,0,fa19e5674d76c5b46624774eba96476ad7fabe41ca511ba02fe99ace14a675
CVE-2024-30310,0,0,0318e7fa8c109fbd13dfaf43bb618e0a49e9b16e0b621e77faecb78de1db2a84,2024-12-02T21:22:11.137000
CVE-2024-30311,0,0,3840218508a24667161b6ff79a375834ddbf249257e991ddfa8b10e97ab37e31,2024-12-02T21:22:13.143000
CVE-2024-30312,0,0,d795e4958162bcd7905c2b6c90993ddfcc6293aa254bf6c539234075dec0a0ba,2024-12-02T21:22:15.280000
CVE-2024-30314,0,0,001958112e812873f2afe024af602bc1e18aaeafca421eccd7dc6e99cd4f7d19,2024-05-22T08:15:09.777000
CVE-2024-30314,0,1,42f4f4f53d09df828a9d772c476dba6f6fd9600ec6925401912c5ffb5da6d3e4,2024-12-03T14:33:44.160000
CVE-2024-3032,0,0,23903a6cbcf453fd38d8d4b287e955f74e9435539a64a2e4e4033c0e9a9a2ffa,2024-11-20T15:09:42.557000
CVE-2024-30321,0,0,77e82c6b15f80502cfe967b03a0cf5e1edff68cc4e25f0455ce9c65c8c4bfbce,2024-11-12T13:15:07.503000
CVE-2024-30322,0,0,f4e26e42e44429b86d19dca1655fc9b0e6d4cf366473cd59d34a3fd4371a1053,2024-04-03T17:24:18.150000
@ -255302,7 +255305,7 @@ CVE-2024-34109,0,0,c9e7a028e318045ad0e07a30584a8cdf66484faf15b239f83d63fffcfc9c0
CVE-2024-3411,0,0,c5534494d0c0f328f6dd6a29b2c75cf0917384aed2d3044a8f39c15c542a2568,2024-07-03T21:15:03.933000
CVE-2024-34110,0,0,c15838464fcaf085b2c09e471beb2e732398e46cad7f992477efffffb5459007,2024-07-09T15:09:42.910000
CVE-2024-34111,0,0,19c043112b06522ffc5ddb9df0f8b999a9184efbe5f7c5a69c8e8324f21b6533,2024-08-07T15:15:54.520000
CVE-2024-34112,0,0,e62a170073c335d4b2fa523b231a2040753ea6d61925540b759aae879b0a33d7,2024-06-13T18:35:19.777000
CVE-2024-34112,0,1,8f1bc7613512ccaee7d59e04edc3235d03e9488247401e1813f71cbc5a8f5496,2024-12-03T14:35:08.160000
CVE-2024-34113,0,0,a2e9f7ac8776392f6be8ef1204f1c90f02f8da5b4c386f27bfe6c53f96f39c9b,2024-08-07T15:15:54.640000
CVE-2024-34115,0,0,cc8b9b55a33ad4e137b074effd11699dd96f8494f93e6413f33a6c251661c876,2024-07-19T18:02:32.427000
CVE-2024-34116,0,0,4851ab33470ffca4c1046ad0fdbe4ebf66556d22cc3b975d80dd125226b02f02,2024-08-07T15:15:54.863000
@ -255313,7 +255316,7 @@ CVE-2024-3412,0,0,e50c7e3ae6f10b261f3da66fd6437a79038925b3952464be81ac0e7b8712c1
CVE-2024-34120,0,0,59b2d9c769f5e7837181f42b948f1f4d6a71599cbcd1b502e5c0f6b22b12ebe5,2024-06-14T20:02:45.567000
CVE-2024-34121,0,0,5c4bc5f93a8e677774dfec4d5defe369f17f675204e3af33dbf284e95e296370,2024-11-01T20:35:17.293000
CVE-2024-34122,0,0,1ec0410a2782988212e8d53b9aff3b950baab8772620259cd2192140e3a735de,2024-10-11T15:01:24.393000
CVE-2024-34123,0,0,60f48b7c1a1214b049b9220d35589296122b7174f3f0274e4f9438886e7fb319,2024-07-11T13:06:13.187000
CVE-2024-34123,0,1,cacd50e122fa9bc468f9dd6ac02f78493bb7ad635f94b1497402fe1b9f16cae1,2024-12-03T14:35:59.150000
CVE-2024-34124,0,0,1560ff2926f27a69ce258f83d62b0151a5e1ff052db9746c4e37b847f7058841,2024-08-19T18:56:27.377000
CVE-2024-34125,0,0,3248ba4e13305da4d550ff294e0777762ef3209cea1ba47228c44abb8259e093,2024-08-19T18:56:17.350000
CVE-2024-34126,0,0,9812afe65ee02221e5fd8a63677b5e9e3deeafed44b12298eb7011278c0e0e90,2024-08-19T18:55:47.043000
@ -256206,7 +256209,7 @@ CVE-2024-35359,0,0,790098a5aa254df92059c385ad6325db39cd91d13b49630a333bac1d583fc
CVE-2024-3536,0,0,67ef0d9459ffa6371d38db2913b0c14e7a0dd926c6d86f1aea2fa988c69cefc5,2024-05-17T02:39:59.897000
CVE-2024-35361,0,0,94079fbeae6f3e32a28e0bb042dbf7a904fcf03ef2f5fc193b1b6ac0fc4c26ea,2024-07-03T02:01:38.550000
CVE-2024-35362,0,0,234501ffddb96c378ce0415c69c86b74ffa92255e774ec0584c4ec784483afc1,2024-05-22T18:59:20.240000
CVE-2024-35366,0,0,1071161e28ed5ff1a9e74f6db919922a34bff8a1aae8f1926a3de4bf5a6af995,2024-12-02T17:15:10.497000
CVE-2024-35366,0,1,cce3847e362944647524f42f8c96161fb821767a34a431ba81a662d8d164730d,2024-12-03T14:15:20.107000
CVE-2024-35367,0,0,fc1999610d5647bdd337d9cd372630739a60d5b54ee387f6b863824ba4ed87b5,2024-12-02T17:15:10.680000
CVE-2024-35368,0,0,9627ef41704bb16e68693f5c6e18e4ed8b2de5952a37d343cc0e72735c6da4fd,2024-12-02T17:15:10.860000
CVE-2024-35369,0,0,6df28d8460fe7b04f0a2efffc7b9a631fe258a88dc12fbb0a17d1341163bedc4,2024-11-29T18:15:06.983000
@ -259227,7 +259230,7 @@ CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453c
CVE-2024-39340,0,0,fc621b442d86eea0a2e72227f2b14f23e2a67834630b902f47135788b8db4fd4,2024-09-23T15:15:13.907000
CVE-2024-39341,0,0,7c359c6b4015613fc52267fcd7e5d9646d4cfcd7e7964fd0c4b36316116d1347,2024-11-04T17:35:19.370000
CVE-2024-39342,0,0,93fef3118f07e5180653fc41b9d6410f0df44f4e0465d850d3b1f4400c7d473a,2024-09-26T13:32:55.343000
CVE-2024-39343,0,0,5387f0e37d9edeed6f67983994a72c30c3e3ad56112bee25e823237afaf5f39e,2024-12-02T20:15:06.993000
CVE-2024-39343,0,1,6171b95408e88154e38dce78348a253a8927c06ba1552f0b46a9bf8a028abd73,2024-12-03T14:15:20.397000
CVE-2024-39344,0,0,e818a000a36da13fc4fe8918e0aa5d488785b27901618777d7233d703b03f419,2024-08-26T16:35:10.110000
CVE-2024-39345,0,0,f773bf4aa168ca0fb54a499af45e3e951779cc47e8e783983f66e20a083935eb,2024-09-03T22:15:04.480000
CVE-2024-39347,0,0,f05ffc50868d752b16aba36bcf98397a1a823dcf709e914fdceefc955d8df28b,2024-06-28T10:27:00.920000
@ -261312,6 +261315,7 @@ CVE-2024-42417,0,0,97db2e1cae78c6c5b15ff9e0f09e1c2fc00065af3496103746ac59f2d9475
CVE-2024-42418,0,0,1170a194d58fc93f3e0e1a535dff12de506530448528f0fff3eaea817d001f8b,2024-09-04T18:22:22.583000
CVE-2024-4242,0,0,9c58e9b9e77452c845f3c5179c3be4415982efd0430d3da14ab0345d444eccfb,2024-06-04T19:20:33.363000
CVE-2024-42420,0,0,03ebd30eeb434ca03d3eabb7d6b0396c2658f46173e6697533666fb020a1c544,2024-11-05T19:39:31.913000
CVE-2024-42422,1,1,0b232b35fd06e22a6b730459e5a39791707f9656a48c53d8b2af810ab36d879f,2024-12-03T13:15:04.987000
CVE-2024-42423,0,0,d28867b0d8eebf1aff8bd3b42424cd5e577a7dd9340d9f0359d41e2fac4ef5ea,2024-09-20T19:42:20.417000
CVE-2024-42424,0,0,a3a79ec5b3f9e4721afc9742622d2616be4d7445c5c0aff9b4256e4bf8fbae09,2024-09-10T12:09:50.377000
CVE-2024-42425,0,0,6aa2353bd532f46d0a2e205868494bbec291e24ba1bbc1fc9f37a272eab1bd0b,2024-09-16T15:46:03.110000
@ -264579,7 +264583,7 @@ CVE-2024-47462,0,0,be6c9453989893d3dcfbe5bdc6e676b393ed9c49111f1ece54054c135b42f
CVE-2024-47463,0,0,2c716c4d7f29d4820a72727f94c0dd565fcb88d49fc25a376e2306f9f47f5669,2024-11-06T18:17:17.287000
CVE-2024-47464,0,0,236d04a0c7d407559b9f7742340111549ca9237c3d8e53730db19cfca87c0db1,2024-11-06T18:17:17.287000
CVE-2024-4747,0,0,071c88b133efa29a5bceaf4f1781edaa635d35ede69008d4aad9361c37e95f56,2024-05-14T16:11:39.510000
CVE-2024-47476,0,1,a9ce0a839530433df414fd290d551556d66aa033c776ff154b9b4a9f858c0987,2024-12-03T10:15:05.883000
CVE-2024-47476,0,0,a9ce0a839530433df414fd290d551556d66aa033c776ff154b9b4a9f858c0987,2024-12-03T10:15:05.883000
CVE-2024-4748,0,0,5ce71114653bf2c9cc6586a0117b72827b192c4aa4e8e27ac2b81ed4a0b190af,2024-10-10T16:15:08.630000
CVE-2024-47481,0,0,83505b26fa6eb758ddde8dc521f672e8bc2bacfc2db0ee1df66890f0ab8642bc,2024-10-31T00:01:40.487000
CVE-2024-47483,0,0,da98222f22e89d9e61f65fd3ac619771e185cbdec7a679159eab7aec6c7cc7a0,2024-10-31T00:01:05.127000
@ -265388,9 +265392,9 @@ CVE-2024-48986,0,0,cf9484fda56052e686c7c5f0c8f108e09e57cac0d3001558017ed0e9f5d28
CVE-2024-48987,0,0,bb1285db59c3075341f96aec62f9b4ce4709041d90082c7f3534792a4d32fb84,2024-10-15T12:58:51.050000
CVE-2024-48989,0,0,9073e18090b9ae4eb5079758fa48cb03e03a3dcd9dfe9e38f4453d35dfeb5c4c,2024-11-13T17:01:16.850000
CVE-2024-4899,0,0,7d0ca1543842829897b22c32fd7c3ea389ea1c85b28761d045bc30da0b354462,2024-07-03T02:08:16.280000
CVE-2024-48990,0,0,01ad64d993b1a34125730a579a223ab965b2b42884353072e3771c0929c4035c,2024-11-19T21:56:45.533000
CVE-2024-48991,0,0,cad0aae4b890b506cacb3fef0d5af018cb8eebf417c48af68da7f4d95e131e01,2024-11-30T13:15:05.133000
CVE-2024-48992,0,0,7d51388c1721a8523b9ede74fe782bca890c6f1c274f5cf7a619b3f6ce5cedd5,2024-11-19T21:56:45.533000
CVE-2024-48990,0,1,8ae314221da60f3f28b2dc061e7fd91a0c68d57bf2594502511d6f645886ec7c,2024-12-03T14:15:20.627000
CVE-2024-48991,0,1,d168b58f77340c27c4fe11099d0fc3db2a31f2441bc53eda948353dc7a25f936,2024-12-03T14:15:20.740000
CVE-2024-48992,0,1,cfcbe8040e38ad95869aae5b63b2c99ac1950d785833afab83d53352be93cc53,2024-12-03T14:15:20.850000
CVE-2024-48993,0,0,196b3895a17ef7dfbcbfdd466d8bb48d5a37a44b82a7d059ceac4c05136016cf,2024-11-19T19:06:50.177000
CVE-2024-48994,0,0,f318b3abe51a65c36b34811cd6779d9025e28bb0518b94d3d7c79c7579b1e1e4,2024-11-15T15:40:38.250000
CVE-2024-48995,0,0,c8a152b4d83ebd46a319f38f36cd95f3ce9fdb5043f9229f5986839789db7ebd,2024-11-15T15:41:26.280000
@ -265703,6 +265707,7 @@ CVE-2024-49525,0,0,28a277ab9b52157a5e4549773b7a8750a6dbb7b4cb916799fff07dd0ec631
CVE-2024-49526,0,0,69c6bf5485d49eb3a2da169497c27d72a1196f6e9a7d6c7d2c7c44787150932a,2024-11-18T18:41:33.857000
CVE-2024-49527,0,0,0d9fde76ea05a295ae3bcd4b45293562d8fc9654bdbe0c09a49c5875709be45a,2024-11-18T18:39:52.213000
CVE-2024-49528,0,0,f04aeabc999019759ae70807d4e936a36d020a33909dd4ffb4e16898d3cf045e,2024-11-18T18:34:56.667000
CVE-2024-49529,1,1,bc912441c1467e88d09c1eebc868707893b19843941c8a4da84053631d70d7a6,2024-12-03T14:37:05.960000
CVE-2024-49536,0,0,64699087f9e557bcb15e1f1e76804f07eb5cb82ad8ee2392d1aa5d8b2e6ac029,2024-11-19T21:21:45.640000
CVE-2024-49557,0,0,d5723680a20b941e0b929edc2959b845b0ec9b5d07125e59e1942c5e8991b90e,2024-11-15T17:36:47.110000
CVE-2024-49558,0,0,3c676b75de26a8476d548ed8b3e232d51677ecb4a62749082177600c22312603,2024-11-15T17:35:54.480000
@ -267810,7 +267815,7 @@ CVE-2024-5296,0,0,9bd527352a89f2b4ccfc677e3fc5feb9bb09c1923dac2d4ba397c3469bcfc6
CVE-2024-5297,0,0,d1218091e3a48aa0835b7de76e914f2fa4d051775431f4beee97941e4c178297,2024-05-24T01:15:30.977000
CVE-2024-5298,0,0,751024870f0005efd62d8664aa885c619c01fff4fc9d9e46acd3d648d421b0e1,2024-05-24T01:15:30.977000
CVE-2024-5299,0,0,ec4fa401441140dbf77742461a619e82e80b0b3301518890cfd68e9b147d30dc,2024-05-24T01:15:30.977000
CVE-2024-52998,0,0,4a588e0a4ac0cc77f65a3f96d5f4c28074598669804bc16c028b0e79eee85554,2024-11-22T19:15:07.433000
CVE-2024-52998,0,1,6290b7bcb6009685ce74422e3ebe6e84d8aa2373cdb09dbaf200385294d7d729,2024-12-03T14:32:51.580000
CVE-2024-53008,0,0,eb27408d35fd63e0b06a6d91784ac9fdfba636caf4dc616097e327306086f070,2024-11-28T03:15:16.363000
CVE-2024-5301,0,0,e6554ba8ce305faf67a147a1164dfd0369262e65017220af5d0bddff09928633,2024-09-25T15:18:18.097000
CVE-2024-5302,0,0,39889567f28c32113cd40d7a6613b67998b6932facc1ad2f99b57c33f7aef565,2024-09-25T15:22:17.627000
@ -271963,6 +271968,7 @@ CVE-2024-9974,0,0,a9f33ba1bf43a6581b26a64054dc48f869f96fec31a53cd68d396b83198ee7
CVE-2024-9975,0,0,4525d3890144372ea39c9bdd06414839f2c1fd17df2032696deb6863140465d5,2024-10-16T13:44:46.220000
CVE-2024-9976,0,0,5980d080e9ad25dff2e581d3c904125c709818a390af58c76d59996e26d292c8,2024-10-16T13:42:24.153000
CVE-2024-9977,0,0,8fbf86e7b1f024ef2593e8608c7ccd55ca749b0af624481d1e713f71c065dc16,2024-10-16T16:38:43.170000
CVE-2024-9978,1,1,3a2501c5446b394c69c20954ec6ea86a8c312be2c740234a6fdca0863055d2bf,2024-12-03T13:15:05.140000
CVE-2024-9979,0,0,bb7e55c386cc249a98b0827bb4feff1257591f1d244a65e7ccd05578ba319079,2024-10-16T16:38:43.170000
CVE-2024-9980,0,0,665ae4d3fad1ccd0bc296c2172cff10c0d57400041e58e918121ae8fdfb1183a,2024-10-17T18:03:34.807000
CVE-2024-9981,0,0,7aa55e716de319cd032858b815d476396828a27c5d3a7d5b6802447033166c68,2024-10-17T18:05:29.947000

Can't render this file because it is too large.