From 6260462b8f69372066197c42bff2ce67dccf5590 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 18 Dec 2024 17:03:46 +0000 Subject: [PATCH] Auto-Update: 2024-12-18T17:00:21.670180+00:00 --- CVE-2017/CVE-2017-133xx/CVE-2017-13311.json | 76 +++++++- CVE-2018/CVE-2018-94xx/CVE-2018-9471.json | 82 +++++++- CVE-2018/CVE-2018-94xx/CVE-2018-9472.json | 77 +++++++- CVE-2018/CVE-2018-94xx/CVE-2018-9474.json | 82 +++++++- CVE-2018/CVE-2018-94xx/CVE-2018-9475.json | 82 +++++++- CVE-2023/CVE-2023-33xx/CVE-2023-3309.json | 11 +- CVE-2023/CVE-2023-349xx/CVE-2023-34990.json | 32 +++- CVE-2023/CVE-2023-443xx/CVE-2023-44379.json | 82 +++++++- CVE-2023/CVE-2023-509xx/CVE-2023-50956.json | 56 ++++++ CVE-2023/CVE-2023-514xx/CVE-2023-51450.json | 82 +++++++- CVE-2024/CVE-2024-108xx/CVE-2024-10892.json | 27 ++- CVE-2024/CVE-2024-123xx/CVE-2024-12371.json | 66 +++++++ CVE-2024/CVE-2024-123xx/CVE-2024-12372.json | 66 +++++++ CVE-2024/CVE-2024-123xx/CVE-2024-12373.json | 66 +++++++ CVE-2024/CVE-2024-126xx/CVE-2024-12658.json | 14 +- CVE-2024/CVE-2024-126xx/CVE-2024-12659.json | 14 +- CVE-2024/CVE-2024-126xx/CVE-2024-12660.json | 14 +- CVE-2024/CVE-2024-16xx/CVE-2024-1610.json | 34 +++- CVE-2024/CVE-2024-215xx/CVE-2024-21548.json | 12 +- CVE-2024/CVE-2024-217xx/CVE-2024-21786.json | 45 ++++- CVE-2024/CVE-2024-296xx/CVE-2024-29646.json | 39 +++- CVE-2024/CVE-2024-316xx/CVE-2024-31668.json | 39 +++- CVE-2024/CVE-2024-397xx/CVE-2024-39755.json | 4 +- CVE-2024/CVE-2024-411xx/CVE-2024-41163.json | 8 +- CVE-2024/CVE-2024-419xx/CVE-2024-41922.json | 8 +- CVE-2024/CVE-2024-430xx/CVE-2024-43084.json | 85 ++++++++- CVE-2024/CVE-2024-430xx/CVE-2024-43085.json | 83 +++++++- CVE-2024/CVE-2024-430xx/CVE-2024-43086.json | 83 +++++++- CVE-2024/CVE-2024-430xx/CVE-2024-43087.json | 83 +++++++- CVE-2024/CVE-2024-471xx/CVE-2024-47119.json | 56 ++++++ CVE-2024/CVE-2024-478xx/CVE-2024-47810.json | 56 ++++++ CVE-2024/CVE-2024-488xx/CVE-2024-48889.json | 32 +++- CVE-2024/CVE-2024-493xx/CVE-2024-49377.json | 47 ++++- CVE-2024/CVE-2024-495xx/CVE-2024-49535.json | 93 ++++++++- CVE-2024/CVE-2024-495xx/CVE-2024-49537.json | 63 ++++++- CVE-2024/CVE-2024-495xx/CVE-2024-49538.json | 49 ++++- CVE-2024/CVE-2024-495xx/CVE-2024-49541.json | 49 ++++- CVE-2024/CVE-2024-495xx/CVE-2024-49576.json | 56 ++++++ CVE-2024/CVE-2024-49xx/CVE-2024-4995.json | 34 +++- CVE-2024/CVE-2024-49xx/CVE-2024-4996.json | 34 +++- CVE-2024/CVE-2024-505xx/CVE-2024-50570.json | 32 +++- CVE-2024/CVE-2024-511xx/CVE-2024-51175.json | 39 +++- CVE-2024/CVE-2024-514xx/CVE-2024-51493.json | 59 +++++- CVE-2024/CVE-2024-516xx/CVE-2024-51646.json | 32 +++- CVE-2024/CVE-2024-523xx/CVE-2024-52361.json | 56 ++++++ CVE-2024/CVE-2024-529xx/CVE-2024-52997.json | 43 ++++- CVE-2024/CVE-2024-539xx/CVE-2024-53951.json | 51 ++++- CVE-2024/CVE-2024-539xx/CVE-2024-53952.json | 51 ++++- CVE-2024/CVE-2024-546xx/CVE-2024-54662.json | 43 ++++- CVE-2024/CVE-2024-550xx/CVE-2024-55058.json | 39 +++- CVE-2024/CVE-2024-550xx/CVE-2024-55059.json | 39 +++- CVE-2024/CVE-2024-555xx/CVE-2024-55513.json | 39 +++- CVE-2024/CVE-2024-555xx/CVE-2024-55514.json | 39 +++- CVE-2024/CVE-2024-555xx/CVE-2024-55515.json | 39 +++- CVE-2024/CVE-2024-555xx/CVE-2024-55516.json | 39 +++- CVE-2024/CVE-2024-561xx/CVE-2024-56142.json | 26 ++- CVE-2024/CVE-2024-561xx/CVE-2024-56173.json | 39 +++- CVE-2024/CVE-2024-561xx/CVE-2024-56175.json | 39 +++- README.md | 72 +++---- _state.csv | 198 ++++++++++---------- 60 files changed, 2768 insertions(+), 267 deletions(-) create mode 100644 CVE-2023/CVE-2023-509xx/CVE-2023-50956.json create mode 100644 CVE-2024/CVE-2024-123xx/CVE-2024-12371.json create mode 100644 CVE-2024/CVE-2024-123xx/CVE-2024-12372.json create mode 100644 CVE-2024/CVE-2024-123xx/CVE-2024-12373.json create mode 100644 CVE-2024/CVE-2024-471xx/CVE-2024-47119.json create mode 100644 CVE-2024/CVE-2024-478xx/CVE-2024-47810.json create mode 100644 CVE-2024/CVE-2024-495xx/CVE-2024-49576.json create mode 100644 CVE-2024/CVE-2024-523xx/CVE-2024-52361.json diff --git a/CVE-2017/CVE-2017-133xx/CVE-2017-13311.json b/CVE-2017/CVE-2017-133xx/CVE-2017-13311.json index fc03eaf5eb0..72455eb81fa 100644 --- a/CVE-2017/CVE-2017-133xx/CVE-2017-13311.json +++ b/CVE-2017/CVE-2017-133xx/CVE-2017-13311.json @@ -2,8 +2,8 @@ "id": "CVE-2017-13311", "sourceIdentifier": "security@android.com", "published": "2024-11-15T22:15:14.240", - "lastModified": "2024-11-19T17:35:01.903", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-18T15:00:52.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,50 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "09E6085C-A61E-4A89-BF80-EDD9A7DF1E47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D835D592-2423-44C6-804A-3AD010112E7C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "568E2561-A068-46A2-B331-BBA91FC96F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B578E383-0D77-4AC7-9C81-3F0B8C18E033" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2018-05-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9471.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9471.json index 3d537369fd1..7f38e3a7eb8 100644 --- a/CVE-2018/CVE-2018-94xx/CVE-2018-9471.json +++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9471.json @@ -2,8 +2,8 @@ "id": "CVE-2018-9471", "sourceIdentifier": "security@android.com", "published": "2024-11-20T18:15:19.500", - "lastModified": "2024-11-21T13:57:24.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-18T16:50:18.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "09E6085C-A61E-4A89-BF80-EDD9A7DF1E47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D835D592-2423-44C6-804A-3AD010112E7C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "568E2561-A068-46A2-B331-BBA91FC96F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B578E383-0D77-4AC7-9C81-3F0B8C18E033" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8DFAAD08-36DA-4C95-8200-C29FE5B6B854" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2018-09-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9472.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9472.json index e5543b94fe8..1c1e4e9ba53 100644 --- a/CVE-2018/CVE-2018-94xx/CVE-2018-9472.json +++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9472.json @@ -2,8 +2,8 @@ "id": "CVE-2018-9472", "sourceIdentifier": "security@android.com", "published": "2024-11-20T18:15:19.550", - "lastModified": "2024-11-21T13:57:24.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-18T15:26:01.343", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "09E6085C-A61E-4A89-BF80-EDD9A7DF1E47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D835D592-2423-44C6-804A-3AD010112E7C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "568E2561-A068-46A2-B331-BBA91FC96F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B578E383-0D77-4AC7-9C81-3F0B8C18E033" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2018-09-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9474.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9474.json index 84dfcd5ba21..6b826abe79b 100644 --- a/CVE-2018/CVE-2018-94xx/CVE-2018-9474.json +++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9474.json @@ -2,8 +2,8 @@ "id": "CVE-2018-9474", "sourceIdentifier": "security@android.com", "published": "2024-11-20T18:15:19.610", - "lastModified": "2024-11-21T13:57:24.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-18T15:20:06.503", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "09E6085C-A61E-4A89-BF80-EDD9A7DF1E47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D835D592-2423-44C6-804A-3AD010112E7C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "568E2561-A068-46A2-B331-BBA91FC96F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B578E383-0D77-4AC7-9C81-3F0B8C18E033" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8DFAAD08-36DA-4C95-8200-C29FE5B6B854" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2018-09-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9475.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9475.json index 32328414ca0..796742cc1d2 100644 --- a/CVE-2018/CVE-2018-94xx/CVE-2018-9475.json +++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9475.json @@ -2,8 +2,8 @@ "id": "CVE-2018-9475", "sourceIdentifier": "security@android.com", "published": "2024-11-20T18:15:19.670", - "lastModified": "2024-11-21T13:57:24.187", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-18T15:13:24.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,56 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "09E6085C-A61E-4A89-BF80-EDD9A7DF1E47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*", + "matchCriteriaId": "D835D592-2423-44C6-804A-3AD010112E7C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "568E2561-A068-46A2-B331-BBA91FC96F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B578E383-0D77-4AC7-9C81-3F0B8C18E033" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8DFAAD08-36DA-4C95-8200-C29FE5B6B854" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2018-09-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-33xx/CVE-2023-3309.json b/CVE-2023/CVE-2023-33xx/CVE-2023-3309.json index d93097d4a14..2e875dbb826 100644 --- a/CVE-2023/CVE-2023-33xx/CVE-2023-3309.json +++ b/CVE-2023/CVE-2023-33xx/CVE-2023-3309.json @@ -2,7 +2,7 @@ "id": "CVE-2023-3309", "sourceIdentifier": "cna@vuldb.com", "published": "2023-06-18T12:15:09.267", - "lastModified": "2024-11-21T08:16:58.873", + "lastModified": "2024-12-18T16:15:10.390", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -83,7 +83,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -151,6 +151,13 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://kr1shna4garwal.github.io/posts/cve-poc-2023/#cve-2023-3309", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-349xx/CVE-2023-34990.json b/CVE-2023/CVE-2023-349xx/CVE-2023-34990.json index 813228f2d9f..43bc24c72f3 100644 --- a/CVE-2023/CVE-2023-349xx/CVE-2023-34990.json +++ b/CVE-2023/CVE-2023-349xx/CVE-2023-34990.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34990", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-12-18T13:15:05.547", - "lastModified": "2024-12-18T13:15:05.547", + "lastModified": "2024-12-18T15:15:06.137", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-23" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "references": [ diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44379.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44379.json index 84e427843f6..c027376034b 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44379.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44379.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44379", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-22T15:15:08.060", - "lastModified": "2024-11-21T08:25:46.857", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-18T16:54:13.977", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,32 +69,78 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.9", + "matchCriteriaId": "26BF6684-E207-4771-9223-1B473F279058" + } + ] + } + ] } ], "references": [ { "url": "https://basercms.net/security/JVN_73283159", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/baserproject/basercms/commit/18549396e5a9b8294306a54a876af164b0b57da4", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/baserproject/basercms/security/advisories/GHSA-66c2-p8rh-qx87", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://basercms.net/security/JVN_73283159", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/baserproject/basercms/commit/18549396e5a9b8294306a54a876af164b0b57da4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/baserproject/basercms/security/advisories/GHSA-66c2-p8rh-qx87", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50956.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50956.json new file mode 100644 index 00000000000..c2e9fd1cf8f --- /dev/null +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50956.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2023-50956", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-18T16:15:10.597", + "lastModified": "2024-12-18T16:15:10.597", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Storage Defender - Resiliency Service 2.0.0 through 2.0.9 \n\ncould allow a privileged user to obtain highly sensitive user credentials from secret keys that are stored in clear text." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-256" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7178587", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-514xx/CVE-2023-51450.json b/CVE-2023/CVE-2023-514xx/CVE-2023-51450.json index babb8653e63..41798e1129e 100644 --- a/CVE-2023/CVE-2023-514xx/CVE-2023-51450.json +++ b/CVE-2023/CVE-2023-514xx/CVE-2023-51450.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51450", "sourceIdentifier": "security-advisories@github.com", "published": "2024-02-22T15:15:08.290", - "lastModified": "2024-11-21T08:38:08.650", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-18T16:55:17.013", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 } ] }, @@ -49,32 +69,78 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.9", + "matchCriteriaId": "26BF6684-E207-4771-9223-1B473F279058" + } + ] + } + ] } ], "references": [ { "url": "https://basercms.net/security/JVN_09767360", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/baserproject/basercms/commit/18f426d63e752b4d22c40e9ea8d1f6e692ef601c", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/baserproject/basercms/security/advisories/GHSA-77fc-4cv5-hmfr", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://basercms.net/security/JVN_09767360", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://github.com/baserproject/basercms/commit/18f426d63e752b4d22c40e9ea8d1f6e692ef601c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/baserproject/basercms/security/advisories/GHSA-77fc-4cv5-hmfr", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10892.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10892.json index c15755c0951..a332cd9713c 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10892.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10892.json @@ -2,7 +2,7 @@ "id": "CVE-2024-10892", "sourceIdentifier": "contact@wpscan.com", "published": "2024-12-18T06:15:21.567", - "lastModified": "2024-12-18T06:15:21.567", + "lastModified": "2024-12-18T15:15:08.067", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Cost Calculator Builder WordPress plugin before 3.2.43 does not have CSRF checks in some AJAX actions, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/ff1f5b84-a8cf-4574-a713-53d35739c6cb/", diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12371.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12371.json new file mode 100644 index 00000000000..473f5bfb5e6 --- /dev/null +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12371.json @@ -0,0 +1,66 @@ +{ + "id": "CVE-2024-12371", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2024-12-18T16:15:10.907", + "lastModified": "2024-12-18T16:15:10.907", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A device takeover vulnerability exists in the Rockwell Automation Power Monitor 1000. This vulnerability allows configuration of a new Policyholder user without any authentication via API. Policyholder user is the most privileged user that can perform edit operations, creating admin users and performing factory reset." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1714.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12372.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12372.json new file mode 100644 index 00000000000..4190215ab79 --- /dev/null +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12372.json @@ -0,0 +1,66 @@ +{ + "id": "CVE-2024-12372", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2024-12-18T16:15:11.050", + "lastModified": "2024-12-18T16:15:11.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A denial-of-service and possible remote code execution vulnerability exists in the Rockwell Automation Power Monitor 1000. The vulnerability results in corruption of the heap memory which may compromise the integrity of the system, potentially allowing for remote code execution or a denial-of-service attack." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1714.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12373.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12373.json new file mode 100644 index 00000000000..e1e099a060d --- /dev/null +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12373.json @@ -0,0 +1,66 @@ +{ + "id": "CVE-2024-12373", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2024-12-18T16:15:11.163", + "lastModified": "2024-12-18T16:15:11.163", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A denial-of-service vulnerability exists in the Rockwell Automation Power Monitor 1000. The vulnerability results in a buffer-overflow, potentially causing denial-of-service." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1714.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12658.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12658.json index ed3ac57ae69..0d1399e7986 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12658.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12658.json @@ -2,13 +2,17 @@ "id": "CVE-2024-12658", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-16T18:15:10.120", - "lastModified": "2024-12-16T18:15:10.120", - "vulnStatus": "Received", + "lastModified": "2024-12-18T16:15:11.297", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in IObit Advanced SystemCare Utimate up to 17.0.0 and classified as problematic. This issue affects the function 0x8001E01C in the library AscRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en IObit Advanced SystemCare Ultimate hasta la versi\u00f3n 17.0.0 y se ha clasificado como problem\u00e1tica. Este problema afecta a la funci\u00f3n 0x8001E01C en la librer\u00eda AscRegistryFilter.sys del componente IOCTL Handler. La manipulaci\u00f3n provoca la desreferenciaci\u00f3n de puntero nulo. Se requiere acceso local para abordar este ataque. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.456036", "source": "cna@vuldb.com" + }, + { + "url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E01C-NPD-DOS-15160437bb1e800eb1cadd53b224d088", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12659.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12659.json index ecf04119883..8b9184c0ca8 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12659.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12659.json @@ -2,13 +2,17 @@ "id": "CVE-2024-12659", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-16T18:15:10.320", - "lastModified": "2024-12-16T18:15:10.320", - "vulnStatus": "Received", + "lastModified": "2024-12-18T16:15:11.500", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in IObit Advanced SystemCare Utimate up to 17.0.0. It has been classified as problematic. Affected is the function 0x8001E004 in the library AscRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en IObit Advanced SystemCare Ultimate hasta la versi\u00f3n 17.0.0. Se ha clasificado como problem\u00e1tica. La funci\u00f3n afectada es 0x8001E004 en la librer\u00eda AscRegistryFilter.sys del componente IOCTL Handler. La manipulaci\u00f3n provoca la desreferenciaci\u00f3n de puntero nulo. Es necesario realizar un ataque local. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.456038", "source": "cna@vuldb.com" + }, + { + "url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E004-NPD-DOS-15160437bb1e804cbe8fd4d826f8564f", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12660.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12660.json index 645fdc9697f..585103779e5 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12660.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12660.json @@ -2,13 +2,17 @@ "id": "CVE-2024-12660", "sourceIdentifier": "cna@vuldb.com", "published": "2024-12-16T18:15:10.533", - "lastModified": "2024-12-16T18:15:10.533", - "vulnStatus": "Received", + "lastModified": "2024-12-18T16:15:11.700", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in IObit Advanced SystemCare Utimate up to 17.0.0. It has been declared as problematic. Affected by this vulnerability is the function 0x8001E018 in the library AscRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad en IObit Advanced SystemCare Ultimate hasta la versi\u00f3n 17.0.0. Se ha declarado como problem\u00e1tica. La vulnerabilidad afecta a la funci\u00f3n 0x8001E018 en la librer\u00eda AscRegistryFilter.sys del componente IOCTL Handler. La manipulaci\u00f3n provoca la desreferenciaci\u00f3n de puntero nulo. Es posible lanzar el ataque en el host local. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.456337", "source": "cna@vuldb.com" + }, + { + "url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E018-NPD-DOS-15260437bb1e80c5ab28da895ed46227", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1610.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1610.json index eede5dd84d9..c264756d1e3 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1610.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1610.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1610", "sourceIdentifier": "security@oppo.com", "published": "2024-12-18T07:15:07.207", - "lastModified": "2024-12-18T07:15:07.207", + "lastModified": "2024-12-18T16:15:12.060", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -55,6 +55,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -67,6 +89,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1284" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21548.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21548.json index ca3afb8188d..adcce067ea1 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21548.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21548.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21548", "sourceIdentifier": "report@snyk.io", "published": "2024-12-18T06:15:23.360", - "lastModified": "2024-12-18T06:15:23.360", + "lastModified": "2024-12-18T15:15:09.947", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -89,6 +89,16 @@ "value": "CWE-1321" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1321" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21786.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21786.json index 182fe71aaec..13e8caa8c65 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21786.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21786.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21786", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-11-21T15:15:26.580", - "lastModified": "2024-11-21T16:15:22.200", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-18T15:06:28.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,51 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mc-technologies:mc_lr_router_firmware:2.10.5:*:*:*:*:*:*:*", + "matchCriteriaId": "95D3D1A7-DA67-4319-B836-010FCBE4B63C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mc-technologies:mc_lr_router:-:*:*:*:*:*:*:*", + "matchCriteriaId": "330D7083-CDC2-4532-8F13-109C8272F5BF" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1954", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1954", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-296xx/CVE-2024-29646.json b/CVE-2024/CVE-2024-296xx/CVE-2024-29646.json index 39dd79257ce..c5bd70e2689 100644 --- a/CVE-2024/CVE-2024-296xx/CVE-2024-29646.json +++ b/CVE-2024/CVE-2024-296xx/CVE-2024-29646.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29646", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-17T22:15:06.550", - "lastModified": "2024-12-17T22:15:06.550", + "lastModified": "2024-12-18T16:15:12.513", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Buffer Overflow vulnerability in radarorg radare2 v.5.8.8 allows an attacker to execute arbitrary code via the name, type, or group fields." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Crispy-fried-chicken/0be4a204e7226fa2cea761c09f027690", diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31668.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31668.json index d7cfc321f6a..478ff1b80bd 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31668.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31668.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31668", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-17T22:15:06.677", - "lastModified": "2024-12-17T22:15:06.677", + "lastModified": "2024-12-18T16:15:12.693", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "rizin before v0.6.3 is vulnerable to Improper Neutralization of Special Elements via meta_set function in librz/analysis/meta." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Crispy-fried-chicken/cb0b3a653a43a2fe2361641eddd8330d", diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39755.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39755.json index 761df0b3102..196151ae96a 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39755.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39755.json @@ -2,13 +2,13 @@ "id": "CVE-2024-39755", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-03T16:15:05.230", - "lastModified": "2024-11-21T09:28:20.680", + "lastModified": "2024-12-18T15:15:10.370", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A privilege escalation vulnerability exists in the Veertu Anka Build 1.42.0. The vulnerability occurs during Anka node agent update. A low privilege user can trigger the update action which can result in unexpected elevation of privilege." + "value": "A privilege escalation vulnerability exists in the node update functionality of Veertu Anka Build 1.42.0. A specially crafted PKG file can lead to execute priviledged operation. An attacker can make an unauthenticated HTTP request to trigger this vulnerability." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-411xx/CVE-2024-41163.json b/CVE-2024/CVE-2024-411xx/CVE-2024-41163.json index a3e33466728..83e253186c3 100644 --- a/CVE-2024/CVE-2024-411xx/CVE-2024-41163.json +++ b/CVE-2024/CVE-2024-411xx/CVE-2024-41163.json @@ -2,13 +2,13 @@ "id": "CVE-2024-41163", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-03T16:15:05.427", - "lastModified": "2024-11-21T09:32:19.947", + "lastModified": "2024-12-18T15:15:10.730", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A directory traversal vulnerability exists in the archive download functionality of Veertu Anka Build 1.42.0. A specially crafted HTTP request can lead to a disclosure of arbitrary files. An attacker can make an unauthenticated HTTP request to exploit this vulnerability." + "value": "A directory traversal vulnerability exists in the archive functionality of Veertu Anka Build 1.42.0. A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can make an unauthenticated HTTP request to trigger this vulnerability." }, { "lang": "es", @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41922.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41922.json index a0cf9fde7b2..3edd0d9bb9e 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41922.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41922.json @@ -2,13 +2,13 @@ "id": "CVE-2024-41922", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-10-03T16:15:05.640", - "lastModified": "2024-11-21T09:33:17.197", + "lastModified": "2024-12-18T15:15:11.163", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A directory traversal vulnerability exists in the log files download functionality of Veertu Anka Build 1.42.0. A specially crafted HTTP request can result in a disclosure of arbitrary files. An attacker can make an unauthenticated HTTP request to trigger this vulnerability." + "value": "A directory traversal vulnerability exists in the log files download functionality of Veertu Anka Build 1.42.0. A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can make an unauthenticated HTTP request to trigger this vulnerability." }, { "lang": "es", @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43084.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43084.json index eb8ae65154c..5cd16b37919 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43084.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43084.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43084", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:21.100", - "lastModified": "2024-11-15T14:00:09.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-18T16:55:58.837", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,14 +59,71 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/50eec20b570cd4cbbe8c5971af4c9dda3ddcb858", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-11-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43085.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43085.json index 2b16bf7b8d8..653e0bd7062 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43085.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43085.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43085", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:21.173", - "lastModified": "2024-11-15T14:00:09.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-18T16:57:04.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/2457d4e459ee6ffd099b9ff7cce9c83119c3ce66", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-11-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43086.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43086.json index c8b996f5e69..ec944f2e26f 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43086.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43086.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43086", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:21.240", - "lastModified": "2024-11-15T14:00:09.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-18T16:58:17.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/55a3d36701bb874358f685d3ac3381eda10fcff0", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-11-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-430xx/CVE-2024-43087.json b/CVE-2024/CVE-2024-430xx/CVE-2024-43087.json index 532ee2bb183..3e5c33a9883 100644 --- a/CVE-2024/CVE-2024-430xx/CVE-2024-43087.json +++ b/CVE-2024/CVE-2024-430xx/CVE-2024-43087.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43087", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:21.307", - "lastModified": "2024-11-15T14:00:09.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-18T16:59:38.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*", + "matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*", + "matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E" + } + ] + } + ] + } + ], "references": [ { "url": "https://android.googlesource.com/platform/packages/apps/Settings/+/6253b87704bb097ad9963941bdddf3b86906a73e", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Mailing List", + "Patch" + ] }, { "url": "https://source.android.com/security/bulletin/2024-11-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47119.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47119.json new file mode 100644 index 00000000000..7eba25de1de --- /dev/null +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47119.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47119", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-18T16:15:13.110", + "lastModified": "2024-12-18T16:15:13.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Storage Defender - Resiliency Service 2.0.0 through 2.0.9 does not properly validate a certificate which could allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7178587", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47810.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47810.json new file mode 100644 index 00000000000..d5a2bf0b0d4 --- /dev/null +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47810.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47810", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-12-18T16:15:13.327", + "lastModified": "2024-12-18T16:15:13.327", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A use-after-free vulnerability exists in the way Foxit Reader 2024.3.0.26795 handles a 3D page object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2094", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48889.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48889.json index 1188e75c892..0949d1cfbbc 100644 --- a/CVE-2024/CVE-2024-488xx/CVE-2024-48889.json +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48889.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48889", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-12-18T13:15:06.463", - "lastModified": "2024-12-18T13:15:06.463", + "lastModified": "2024-12-18T15:15:11.713", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49377.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49377.json index cc06f353999..9e4376c7d0d 100644 --- a/CVE-2024/CVE-2024-493xx/CVE-2024-49377.json +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49377.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49377", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-05T19:15:05.737", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-18T16:31:26.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -55,10 +75,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:octoprint:octoprint:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.10.3", + "matchCriteriaId": "97EAFBBD-8434-4B24-9D1B-D4556C5D7996" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-xvxq-g8hw-fx4g", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49535.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49535.json index 308f713a876..561d3be278c 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49535.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49535.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49535", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T20:15:18.923", - "lastModified": "2024-12-10T20:15:18.923", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-18T15:07:06.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,75 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30748", + "matchCriteriaId": "8629BF4A-1E7E-4EBB-8175-DABB9241A689" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "24.0.0", + "versionEndExcluding": "24.001.30225", + "matchCriteriaId": "62086AC3-1580-4DC5-93E2-04C7A6F06C45" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionEndExcluding": "24.005.20320", + "matchCriteriaId": "8064F314-801F-4BEC-9EE2-120733E8B206" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30748", + "matchCriteriaId": "89E5AB91-6C0C-47AD-97F1-D5FC4AAEB5DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionEndExcluding": "24.005.20320", + "matchCriteriaId": "BBF2907B-0265-4E40-BB1B-772CCF3E67FA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-92.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49537.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49537.json index b597623d0d4..f06f045ad5d 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49537.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49537.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49537", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T21:15:16.500", - "lastModified": "2024-12-10T21:15:16.500", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-18T15:21:52.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,74 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*", + "versionEndExcluding": "24.6.3", + "matchCriteriaId": "555FF212-0DAE-4781-A17C-44948CAB3E12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*", + "versionStartIncluding": "25.0", + "versionEndExcluding": "25.1", + "matchCriteriaId": "61E0C4A8-15C9-4440-9608-6D6AA7E19AFA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/after_effects/apsb24-95.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49538.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49538.json index 6a94c200145..470098500e0 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49538.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49538.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49538", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T21:15:16.650", - "lastModified": "2024-12-10T21:15:16.650", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-18T15:17:43.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,53 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionEndExcluding": "28.7.3", + "matchCriteriaId": "2B05C45B-2BD0-4B06-86E9-D36E65347264" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:29.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FBB72364-8128-4406-BF25-715787B150E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/illustrator/apsb24-94.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49541.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49541.json index 976bd6c6b91..2923058d6ba 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49541.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49541.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49541", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T21:15:16.793", - "lastModified": "2024-12-10T21:15:16.793", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-18T15:17:34.523", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,53 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*", + "versionEndExcluding": "28.7.3", + "matchCriteriaId": "2B05C45B-2BD0-4B06-86E9-D36E65347264" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:illustrator:29.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FBB72364-8128-4406-BF25-715787B150E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/illustrator/apsb24-94.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49576.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49576.json new file mode 100644 index 00000000000..0fd6f91d28e --- /dev/null +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49576.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49576", + "sourceIdentifier": "talos-cna@cisco.com", + "published": "2024-12-18T16:15:13.477", + "lastModified": "2024-12-18T16:15:13.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A use-after-free vulnerability exists in the way Foxit Reader 2024.3.0.26795 handles a checkbox CBF_Widget object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "talos-cna@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2093", + "source": "talos-cna@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4995.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4995.json index 7a733e9f4f7..a3efbd26001 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4995.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4995.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4995", "sourceIdentifier": "cvd@cert.pl", "published": "2024-12-18T12:15:09.940", - "lastModified": "2024-12-18T13:15:06.603", + "lastModified": "2024-12-18T16:15:13.623", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -55,6 +55,28 @@ "providerUrgency": "AMBER" } } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -67,6 +89,16 @@ "value": "CWE-311" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4996.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4996.json index 0d047698f00..3bc1b168c7c 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4996.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4996.json @@ -2,7 +2,7 @@ "id": "CVE-2024-4996", "sourceIdentifier": "cvd@cert.pl", "published": "2024-12-18T12:15:10.120", - "lastModified": "2024-12-18T12:15:10.120", + "lastModified": "2024-12-18T15:15:12.210", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -55,6 +55,28 @@ "providerUrgency": "RED" } } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -67,6 +89,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-505xx/CVE-2024-50570.json b/CVE-2024/CVE-2024-505xx/CVE-2024-50570.json index e97d20eafae..feba959f7a7 100644 --- a/CVE-2024/CVE-2024-505xx/CVE-2024-50570.json +++ b/CVE-2024/CVE-2024-505xx/CVE-2024-50570.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50570", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-12-18T13:15:06.723", - "lastModified": "2024-12-18T13:15:06.723", + "lastModified": "2024-12-18T15:15:12.660", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.6, "impactScore": 4.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N", + "baseScore": 5.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.6, + "impactScore": 4.0 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-312" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51175.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51175.json index 652bd81af81..840973f4dc5 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51175.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51175.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51175", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-17T22:15:06.967", - "lastModified": "2024-12-17T22:15:06.967", + "lastModified": "2024-12-18T16:15:13.807", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue in H3C switch h3c-S1526 allows a remote attacker to obtain sensitive information via the S1526.cfg component." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], "references": [ { "url": "https://github.com/a1drewlong/h3c-S1526/blob/main/Vulnerability%20Cases.md", diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51493.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51493.json index a28d1a1c913..488794d8dd2 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51493.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51493.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51493", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-05T19:15:07.730", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-18T16:34:37.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,76 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-620" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:octoprint:octoprint:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.10.3", + "matchCriteriaId": "97EAFBBD-8434-4B24-9D1B-D4556C5D7996" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-cc6x-8cc7-9953", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-516xx/CVE-2024-51646.json b/CVE-2024/CVE-2024-516xx/CVE-2024-51646.json index 0c084c9035b..2c8c9271c03 100644 --- a/CVE-2024/CVE-2024-516xx/CVE-2024-51646.json +++ b/CVE-2024/CVE-2024-516xx/CVE-2024-51646.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51646", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-18T12:15:10.270", - "lastModified": "2024-12-18T12:15:10.270", + "lastModified": "2024-12-18T15:15:13.100", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52361.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52361.json new file mode 100644 index 00000000000..360754dcf4f --- /dev/null +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52361.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52361", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2024-12-18T16:15:13.967", + "lastModified": "2024-12-18T16:15:13.967", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Storage Defender - Resiliency Service 2.0.0 through 2.0.9 \n\n\n\n\u00a0stores user credentials in plain text which can be read by an authenticated user with access to the pod." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-256" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7178587", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-529xx/CVE-2024-52997.json b/CVE-2024/CVE-2024-529xx/CVE-2024-52997.json index 817ebe3e87e..ea822a7257e 100644 --- a/CVE-2024/CVE-2024-529xx/CVE-2024-52997.json +++ b/CVE-2024/CVE-2024-529xx/CVE-2024-52997.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52997", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T21:15:19.740", - "lastModified": "2024-12-10T21:15:19.740", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-18T15:14:35.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,47 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:photoshop:26.0:*:*:*:*:*:*:*", + "matchCriteriaId": "027706E0-0E1A-4434-806E-9FE09004E1B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/photoshop/apsb24-101.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53951.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53951.json index 9ded73b3a72..2a1b6c2d0a1 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53951.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53951.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53951", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T21:15:20.167", - "lastModified": "2024-12-10T21:15:20.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-18T15:08:14.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndIncluding": "18.5.4", + "matchCriteriaId": "BC3215E2-E1F4-4418-B110-E4582684AF10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "19.0", + "versionEndIncluding": "19.5", + "matchCriteriaId": "03042FD5-FA73-4548-8D00-1A7EF3EEC650" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb24-97.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53952.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53952.json index 1ea5b9880b3..1d733b42883 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53952.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53952.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53952", "sourceIdentifier": "psirt@adobe.com", "published": "2024-12-10T21:15:20.307", - "lastModified": "2024-12-10T21:15:20.307", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-18T15:07:51.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,10 +51,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndIncluding": "18.5.4", + "matchCriteriaId": "BC3215E2-E1F4-4418-B110-E4582684AF10" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "19.0", + "versionEndIncluding": "19.5", + "matchCriteriaId": "03042FD5-FA73-4548-8D00-1A7EF3EEC650" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb24-97.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-546xx/CVE-2024-54662.json b/CVE-2024/CVE-2024-546xx/CVE-2024-54662.json index 43872b14be7..ec569dd8656 100644 --- a/CVE-2024/CVE-2024-546xx/CVE-2024-54662.json +++ b/CVE-2024/CVE-2024-546xx/CVE-2024-54662.json @@ -2,16 +2,55 @@ "id": "CVE-2024-54662", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-17T18:15:24.963", - "lastModified": "2024-12-17T18:15:24.963", + "lastModified": "2024-12-18T16:15:14.220", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Dante 1.4.0 through 1.4.3 (fixed in 1.4.4) has incorrect access control for some sockd.conf configurations involving socksmethod." + }, + { + "lang": "es", + "value": "Dante 1.4.0 a 1.4.3 (corregido en 1.4.4) tiene un control de acceso incorrecto para algunas configuraciones de sockd.conf que involucran el m\u00e9todo Socks." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.inet.no/dante/", diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55058.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55058.json index d34397dd90b..929d710c4a1 100644 --- a/CVE-2024/CVE-2024-550xx/CVE-2024-55058.json +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55058.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55058", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-17T21:15:08.510", - "lastModified": "2024-12-17T21:15:08.510", + "lastModified": "2024-12-18T16:15:14.400", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An insecure direct object reference (IDOR) vulnerability was discovered in PHPGurukul Online Birth Certificate System v1.0. This vulnerability resides in the viewid parameter of /user/view-application-detail.php. Authenticated users can exploit this flaw by manipulating the viewid parameter in the URL to access sensitive birth certificate details of other users without proper authorization checks." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-706" + } + ] + } + ], "references": [ { "url": "https://github.com/SCR-athif/CVE/tree/main/CVE-2024-55058", diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55059.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55059.json index cd1c11952aa..44a44f425b3 100644 --- a/CVE-2024/CVE-2024-550xx/CVE-2024-55059.json +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55059.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55059", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-17T21:15:08.643", - "lastModified": "2024-12-17T21:15:08.643", + "lastModified": "2024-12-18T16:15:14.560", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A stored HTML Injection vulnerability was identified in PHPGurukul Online Birth Certificate System v1.0 in /user/certificate-form.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/SCR-athif/CVE/tree/main/CVE-2024-55059", diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55513.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55513.json index 9d64c677da6..84509ec7e87 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55513.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55513.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55513", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-17T20:15:22.623", - "lastModified": "2024-12-17T20:15:22.623", + "lastModified": "2024-12-18T16:15:14.720", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 3.90. The component affected by this issue is /upload_netaction.php on the web interface. By crafting a suitable form name, arbitrary files can be uploaded, potentially leading to unauthorized access to server permissions." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/wscg928/cbe88078751abad2ada2334eb12a5060", diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55514.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55514.json index 7ccafa7c7a2..27372f168db 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55514.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55514.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55514", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-17T20:15:22.757", - "lastModified": "2024-12-17T20:15:22.757", + "lastModified": "2024-12-18T16:15:14.900", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 3.90. The component affected by this issue is /upload_sfmig.php on the web interface. By crafting a suitable form name, arbitrary files can be uploaded, potentially leading to unauthorized access to server permissions." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/wscg928/cbe88078751abad2ada2334eb12a5060", diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55515.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55515.json index 6ea48f8823e..ccdd524bb10 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55515.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55515.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55515", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-17T20:15:22.887", - "lastModified": "2024-12-17T20:15:22.887", + "lastModified": "2024-12-18T16:15:15.090", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 3.90. The component affected by this issue is /upload_ipslib.php on the web interface. By crafting a suitable form name, arbitrary files can be uploaded." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/wscg928/cbe88078751abad2ada2334eb12a5060", diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55516.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55516.json index 5f083949f90..a2696d5d0f7 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55516.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55516.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55516", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-17T20:15:23.020", - "lastModified": "2024-12-17T20:15:23.020", + "lastModified": "2024-12-18T16:15:15.263", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 v3.90. The component affected by this issue is /upload_sysconfig.php on the web interface. By crafting a suitable form name, arbitrary files can be uploaded, potentially leading to unauthorized access to server permissions." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/wscg928/cbe88078751abad2ada2334eb12a5060", diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56142.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56142.json index 47ad94ed5c9..30e693e6ba9 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56142.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56142.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56142", "sourceIdentifier": "security-advisories@github.com", "published": "2024-12-17T22:15:07.547", - "lastModified": "2024-12-17T22:15:07.547", + "lastModified": "2024-12-18T16:15:15.433", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -55,12 +55,34 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } ] }, "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56173.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56173.json index 6d1c0ba1e18..4a0bc4d9f17 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56173.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56173.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56173", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-18T06:15:23.780", - "lastModified": "2024-12-18T06:15:23.780", + "lastModified": "2024-12-18T16:15:15.600", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In Optimizely Configured Commerce before 5.2.2408, malicious payloads can be stored and subsequently executed in users' browsers under specific conditions: XSS from JavaScript in an SVG document." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://support.optimizely.com/hc/en-us/articles/32344323720973-Configured-Commerce-Security-Advisory-COM-2024-01", diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56175.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56175.json index b70da716dbf..6e7e4f42496 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56175.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56175.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56175", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-18T06:15:24.087", - "lastModified": "2024-12-18T06:15:24.087", + "lastModified": "2024-12-18T15:15:13.723", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In Optimizely Configured Commerce before 5.2.2408, malicious payloads can be stored and subsequently executed in users' browsers under specific conditions: XSS from client-side template injection in list item names." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://support.optimizely.com/hc/en-us/articles/32344323720973-Configured-Commerce-Security-Advisory-COM-2024-01", diff --git a/README.md b/README.md index cab11b9a2c7..36ed53ec459 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-18T15:00:47.748228+00:00 +2024-12-18T17:00:21.670180+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-18T14:49:59.103000+00:00 +2024-12-18T16:59:38.850000+00:00 ``` ### Last Data Feed Release @@ -33,48 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -274240 +274248 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `8` -- [CVE-2023-34990](CVE-2023/CVE-2023-349xx/CVE-2023-34990.json) (`2024-12-18T13:15:05.547`) -- [CVE-2024-48889](CVE-2024/CVE-2024-488xx/CVE-2024-48889.json) (`2024-12-18T13:15:06.463`) -- [CVE-2024-50570](CVE-2024/CVE-2024-505xx/CVE-2024-50570.json) (`2024-12-18T13:15:06.723`) -- [CVE-2024-56128](CVE-2024/CVE-2024-561xx/CVE-2024-56128.json) (`2024-12-18T14:15:23.277`) +- [CVE-2023-50956](CVE-2023/CVE-2023-509xx/CVE-2023-50956.json) (`2024-12-18T16:15:10.597`) +- [CVE-2024-12371](CVE-2024/CVE-2024-123xx/CVE-2024-12371.json) (`2024-12-18T16:15:10.907`) +- [CVE-2024-12372](CVE-2024/CVE-2024-123xx/CVE-2024-12372.json) (`2024-12-18T16:15:11.050`) +- [CVE-2024-12373](CVE-2024/CVE-2024-123xx/CVE-2024-12373.json) (`2024-12-18T16:15:11.163`) +- [CVE-2024-47119](CVE-2024/CVE-2024-471xx/CVE-2024-47119.json) (`2024-12-18T16:15:13.110`) +- [CVE-2024-47810](CVE-2024/CVE-2024-478xx/CVE-2024-47810.json) (`2024-12-18T16:15:13.327`) +- [CVE-2024-49576](CVE-2024/CVE-2024-495xx/CVE-2024-49576.json) (`2024-12-18T16:15:13.477`) +- [CVE-2024-52361](CVE-2024/CVE-2024-523xx/CVE-2024-52361.json) (`2024-12-18T16:15:13.967`) ### CVEs modified in the last Commit -Recently modified CVEs: `45` +Recently modified CVEs: `50` -- [CVE-2024-52826](CVE-2024/CVE-2024-528xx/CVE-2024-52826.json) (`2024-12-18T14:36:23.140`) -- [CVE-2024-52833](CVE-2024/CVE-2024-528xx/CVE-2024-52833.json) (`2024-12-18T14:37:46.917`) -- [CVE-2024-52837](CVE-2024/CVE-2024-528xx/CVE-2024-52837.json) (`2024-12-18T14:34:46.873`) -- [CVE-2024-52838](CVE-2024/CVE-2024-528xx/CVE-2024-52838.json) (`2024-12-18T14:34:59.720`) -- [CVE-2024-52839](CVE-2024/CVE-2024-528xx/CVE-2024-52839.json) (`2024-12-18T14:35:11.923`) -- [CVE-2024-52840](CVE-2024/CVE-2024-528xx/CVE-2024-52840.json) (`2024-12-18T14:35:19.387`) -- [CVE-2024-52844](CVE-2024/CVE-2024-528xx/CVE-2024-52844.json) (`2024-12-18T14:35:26.830`) -- [CVE-2024-52994](CVE-2024/CVE-2024-529xx/CVE-2024-52994.json) (`2024-12-18T14:38:48.680`) -- [CVE-2024-52995](CVE-2024/CVE-2024-529xx/CVE-2024-52995.json) (`2024-12-18T14:38:36.227`) -- [CVE-2024-52996](CVE-2024/CVE-2024-529xx/CVE-2024-52996.json) (`2024-12-18T14:38:24.727`) -- [CVE-2024-54037](CVE-2024/CVE-2024-540xx/CVE-2024-54037.json) (`2024-12-18T14:40:29.303`) -- [CVE-2024-54039](CVE-2024/CVE-2024-540xx/CVE-2024-54039.json) (`2024-12-18T14:40:37.587`) -- [CVE-2024-54040](CVE-2024/CVE-2024-540xx/CVE-2024-54040.json) (`2024-12-18T14:40:44.710`) -- [CVE-2024-54041](CVE-2024/CVE-2024-540xx/CVE-2024-54041.json) (`2024-12-18T14:40:52.247`) -- [CVE-2024-54042](CVE-2024/CVE-2024-540xx/CVE-2024-54042.json) (`2024-12-18T14:41:18.750`) -- [CVE-2024-54043](CVE-2024/CVE-2024-540xx/CVE-2024-54043.json) (`2024-12-18T14:41:29.400`) -- [CVE-2024-54044](CVE-2024/CVE-2024-540xx/CVE-2024-54044.json) (`2024-12-18T14:41:48.010`) -- [CVE-2024-54045](CVE-2024/CVE-2024-540xx/CVE-2024-54045.json) (`2024-12-18T14:41:55.727`) -- [CVE-2024-54046](CVE-2024/CVE-2024-540xx/CVE-2024-54046.json) (`2024-12-18T14:42:06.897`) -- [CVE-2024-54047](CVE-2024/CVE-2024-540xx/CVE-2024-54047.json) (`2024-12-18T14:42:14.767`) -- [CVE-2024-54048](CVE-2024/CVE-2024-540xx/CVE-2024-54048.json) (`2024-12-18T14:42:22.940`) -- [CVE-2024-54049](CVE-2024/CVE-2024-540xx/CVE-2024-54049.json) (`2024-12-18T14:42:33.907`) -- [CVE-2024-54502](CVE-2024/CVE-2024-545xx/CVE-2024-54502.json) (`2024-12-18T14:13:13.297`) -- [CVE-2024-54514](CVE-2024/CVE-2024-545xx/CVE-2024-54514.json) (`2024-12-18T14:05:50.673`) -- [CVE-2024-54524](CVE-2024/CVE-2024-545xx/CVE-2024-54524.json) (`2024-12-18T13:59:47.450`) +- [CVE-2024-48889](CVE-2024/CVE-2024-488xx/CVE-2024-48889.json) (`2024-12-18T15:15:11.713`) +- [CVE-2024-49377](CVE-2024/CVE-2024-493xx/CVE-2024-49377.json) (`2024-12-18T16:31:26.757`) +- [CVE-2024-49535](CVE-2024/CVE-2024-495xx/CVE-2024-49535.json) (`2024-12-18T15:07:06.950`) +- [CVE-2024-49537](CVE-2024/CVE-2024-495xx/CVE-2024-49537.json) (`2024-12-18T15:21:52.587`) +- [CVE-2024-49538](CVE-2024/CVE-2024-495xx/CVE-2024-49538.json) (`2024-12-18T15:17:43.620`) +- [CVE-2024-49541](CVE-2024/CVE-2024-495xx/CVE-2024-49541.json) (`2024-12-18T15:17:34.523`) +- [CVE-2024-4995](CVE-2024/CVE-2024-49xx/CVE-2024-4995.json) (`2024-12-18T16:15:13.623`) +- [CVE-2024-4996](CVE-2024/CVE-2024-49xx/CVE-2024-4996.json) (`2024-12-18T15:15:12.210`) +- [CVE-2024-50570](CVE-2024/CVE-2024-505xx/CVE-2024-50570.json) (`2024-12-18T15:15:12.660`) +- [CVE-2024-51175](CVE-2024/CVE-2024-511xx/CVE-2024-51175.json) (`2024-12-18T16:15:13.807`) +- [CVE-2024-51493](CVE-2024/CVE-2024-514xx/CVE-2024-51493.json) (`2024-12-18T16:34:37.497`) +- [CVE-2024-51646](CVE-2024/CVE-2024-516xx/CVE-2024-51646.json) (`2024-12-18T15:15:13.100`) +- [CVE-2024-52997](CVE-2024/CVE-2024-529xx/CVE-2024-52997.json) (`2024-12-18T15:14:35.513`) +- [CVE-2024-53951](CVE-2024/CVE-2024-539xx/CVE-2024-53951.json) (`2024-12-18T15:08:14.407`) +- [CVE-2024-53952](CVE-2024/CVE-2024-539xx/CVE-2024-53952.json) (`2024-12-18T15:07:51.167`) +- [CVE-2024-54662](CVE-2024/CVE-2024-546xx/CVE-2024-54662.json) (`2024-12-18T16:15:14.220`) +- [CVE-2024-55058](CVE-2024/CVE-2024-550xx/CVE-2024-55058.json) (`2024-12-18T16:15:14.400`) +- [CVE-2024-55059](CVE-2024/CVE-2024-550xx/CVE-2024-55059.json) (`2024-12-18T16:15:14.560`) +- [CVE-2024-55513](CVE-2024/CVE-2024-555xx/CVE-2024-55513.json) (`2024-12-18T16:15:14.720`) +- [CVE-2024-55514](CVE-2024/CVE-2024-555xx/CVE-2024-55514.json) (`2024-12-18T16:15:14.900`) +- [CVE-2024-55515](CVE-2024/CVE-2024-555xx/CVE-2024-55515.json) (`2024-12-18T16:15:15.090`) +- [CVE-2024-55516](CVE-2024/CVE-2024-555xx/CVE-2024-55516.json) (`2024-12-18T16:15:15.263`) +- [CVE-2024-56142](CVE-2024/CVE-2024-561xx/CVE-2024-56142.json) (`2024-12-18T16:15:15.433`) +- [CVE-2024-56173](CVE-2024/CVE-2024-561xx/CVE-2024-56173.json) (`2024-12-18T16:15:15.600`) +- [CVE-2024-56175](CVE-2024/CVE-2024-561xx/CVE-2024-56175.json) (`2024-12-18T15:15:13.723`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 9d006ff7fe8..d10c256e738 100644 --- a/_state.csv +++ b/_state.csv @@ -97063,11 +97063,11 @@ CVE-2017-13308,0,0,7610ba9ecaa69314eaf1d14cdbb7d1ae9fa32e8cd274528a893bb9df325a7 CVE-2017-13309,0,0,3d8e7c6309c5c1cafb1c6dfedda758dfd05930dec41aa79ea05cff52c21999c9,2024-12-17T20:31:02.880000 CVE-2017-1331,0,0,792619ac2a7d190b79ad04ab26e4fcee4a33db57f943c84c9bb254e3cdb1243d,2024-11-21T03:21:43.777000 CVE-2017-13310,0,0,16fbc2a02fd9a331fd87bcb47c76c7495b76a04bb51e6d9523fb3a1c1a2317f1,2024-12-17T20:29:35.577000 -CVE-2017-13311,0,0,d76817caceb61441ada35ebc2969b4501415429984925844913929a7610c7e2e,2024-11-19T17:35:01.903000 -CVE-2017-13312,0,1,c44d98863e62fba9ae5e37c4d8aeb3f73f1c47967d04ebc8d0cbb03e2afa31fc,2024-12-18T14:49:59.103000 -CVE-2017-13313,0,1,0d6ac6befe081fba487675eab4252804ea375d01dfaa562bad14e41aa9aacf4b,2024-12-18T14:44:13.577000 -CVE-2017-13314,0,1,33c48e6d8e6524fa065f82448defa764b8b3b9330b06ac294ae8e04b2d271ecd,2024-12-18T14:36:21.610000 -CVE-2017-13315,0,1,a6c9ce499de7cc31ed3e6113da58d1ddbfa19fcf87a648f22bfa38731642b2e7,2024-12-18T14:23:37.877000 +CVE-2017-13311,0,1,a8dd4a86ae8b46321cf53ffe4168d1a61d46181e20c20a65d47f97705ebeadd8,2024-12-18T15:00:52.703000 +CVE-2017-13312,0,0,c44d98863e62fba9ae5e37c4d8aeb3f73f1c47967d04ebc8d0cbb03e2afa31fc,2024-12-18T14:49:59.103000 +CVE-2017-13313,0,0,0d6ac6befe081fba487675eab4252804ea375d01dfaa562bad14e41aa9aacf4b,2024-12-18T14:44:13.577000 +CVE-2017-13314,0,0,33c48e6d8e6524fa065f82448defa764b8b3b9330b06ac294ae8e04b2d271ecd,2024-12-18T14:36:21.610000 +CVE-2017-13315,0,0,a6c9ce499de7cc31ed3e6113da58d1ddbfa19fcf87a648f22bfa38731642b2e7,2024-12-18T14:23:37.877000 CVE-2017-13316,0,0,c4c5129b9dbb6560afe63cb0142b790bbb3b4646bf79ff3cb413c25a7131034f,2024-11-29T22:15:04.140000 CVE-2017-13319,0,0,f23393a69de133f7a90b48ab44b5288d95b1d1856c774cba21f21a354eb95583,2024-11-29T22:15:04.860000 CVE-2017-1332,0,0,0269de81100b11e03b79ed33c30dc865a85b59fb90a2c2fe1abeaca397fa8d4e,2024-11-21T03:21:43.893000 @@ -126928,7 +126928,7 @@ CVE-2018-9361,0,0,74621d1d1c0510b4e41d32863195fc57c81ef6080eb8141968c4cdb0aea60b CVE-2018-9362,0,0,fcfd49a31efa129f3b71bfc1dba6f226ae9fe7959a199b87b995b6adc6501ba4,2024-11-21T04:15:24.360000 CVE-2018-9363,0,0,c591779bd7ee777b9730788b66e5bd10702e64ee214a51b2037d79b697d2291d,2024-11-21T04:15:24.487000 CVE-2018-9364,0,0,1500c9fea6f902f1b88a2060def80bcde55a9c796709027ddafeada29b2995d7,2024-11-22T21:22:14.020000 -CVE-2018-9365,0,1,fe01ff6d2b65cc8939ce3fc90c381ed2b7091b2e793a4e02ab8101b5fd9cad57,2024-12-18T14:20:32.350000 +CVE-2018-9365,0,0,fe01ff6d2b65cc8939ce3fc90c381ed2b7091b2e793a4e02ab8101b5fd9cad57,2024-12-18T14:20:32.350000 CVE-2018-9366,0,0,5df4bba79daab1336433d7fefcadd485ac6fc89b95be03103da77984ced3d29f,2024-11-22T21:23:11.303000 CVE-2018-9367,0,0,b66f0930613c3a3e261417c8a6dd1169f72966ee9d3d7e042ddb2e629ace349d,2024-11-22T21:23:04.237000 CVE-2018-9368,0,0,b5eff1a3bc2b3f1128cb225395f214d3bfa469157068c63b732fb9e4412d9b70,2024-11-22T21:23:32.820000 @@ -127012,14 +127012,14 @@ CVE-2018-9463,0,0,d4d844c05cd708ecfc7b2b2fe54aedf1979065835dec8bb48f0ba4759b3ac6 CVE-2018-9465,0,0,cb2efd2b80efc3b600077998298a31fa09fe425af40f55a1a9b3acceb259a706,2024-11-21T04:15:31.130000 CVE-2018-9466,0,0,a6ce5776a6a0bc572eb2fe9b93668c302dbc661dc68279f63c0e20dc3a242886,2024-11-22T21:29:09.617000 CVE-2018-9467,0,0,fc2dc1d34992c43bebd9ec5fb99a903623aaf110c20cb7b73e1288eb66ff9671,2024-11-22T21:27:26.783000 -CVE-2018-9468,0,1,712fcfcf449bd84eb4db83ccc59d4797e74a383a411cd983e63ec05459635d94,2024-12-18T14:18:23.677000 +CVE-2018-9468,0,0,712fcfcf449bd84eb4db83ccc59d4797e74a383a411cd983e63ec05459635d94,2024-12-18T14:18:23.677000 CVE-2018-9469,0,0,200fafd517230d7c60e99d0545023427b2ed0fea5f80b63e01f3970800eec88f,2024-11-21T13:57:24.187000 CVE-2018-9470,0,0,6c434e88b3a4ab49aa790c553fea10cad2868865a792336987538d708f28e046,2024-11-21T13:57:24.187000 -CVE-2018-9471,0,0,123e430dbaf8168f87abec50778f935958df85047ec1c6bb448ec65261ec9ed8,2024-11-21T13:57:24.187000 -CVE-2018-9472,0,0,eed94bd319b9613140a13b2f2c545c9de5ecf05eed9501ce95aca00cb78f13df,2024-11-21T13:57:24.187000 +CVE-2018-9471,0,1,58064ffefc71d91dd1c37f05535ac5f61d9c2d1f7b20bd0f4776669e00e8ed47,2024-12-18T16:50:18.380000 +CVE-2018-9472,0,1,8fa2ff5e370d7f22a6692af5877003bf3e80caee63a0c0ea62f5a6c823e16805,2024-12-18T15:26:01.343000 CVE-2018-9473,0,0,2ad5e07ef12f07045a795dac967f30819ead20b4cb14d91da3f784ba629a179a,2024-11-21T04:15:32.357000 -CVE-2018-9474,0,0,8419f976a82e6490664776241ecc68194b89d3bf6ba6b42cd8ff54eae989e1ff,2024-11-21T13:57:24.187000 -CVE-2018-9475,0,0,7d3077e2fc82316134251d66a67a4d2f67955c1239c6e2c663b02f9f092f1e26,2024-11-21T13:57:24.187000 +CVE-2018-9474,0,1,0e27e1c93952ccd0fce94d1e81d6f87ef8f699520ee2f886c949161ab899d411,2024-12-18T15:20:06.503000 +CVE-2018-9475,0,1,1f148c367ebd80eec74028371077942d0c42e7dee34eb65e8722a3bf9f1ce703,2024-12-18T15:13:24.400000 CVE-2018-9476,0,0,9cb0d1aec6b5854c76e9aa46ea59ed0359f9b46a9a7aae437e59dcf464ed3844,2024-11-21T04:15:32.873000 CVE-2018-9477,0,0,4110912dc6f30301c8bf274fccb8d87b1cc751409e992058aeb2dcd5ad183d92,2024-11-21T13:57:24.187000 CVE-2018-9478,0,0,6cde0cdc8fbb45ed18b299d92238fc286322490b097076205a4672100301ee5a,2024-11-21T13:57:24.187000 @@ -150481,8 +150481,8 @@ CVE-2020-15590,0,0,eaf7a20fa2d3dddbd13df2e08c60d4b64ff4985ad0dd351c57b7582ba6c76 CVE-2020-15591,0,0,43651c8e5035fbc2d3eebf92de36f41aa2d911daf333a28326f34990382b0fdc,2024-11-21T05:05:48.873000 CVE-2020-15592,0,0,2a68b72b03ab5c287ffa8a8d432b309cd7d51ebd271d4373fb0a2667761bf65a,2024-11-21T05:05:49.023000 CVE-2020-15593,0,0,88a72e7a531309804d00a966e83ae9396478dea8c4c97c55a4c30fffec4e3804,2024-11-21T05:05:49.167000 -CVE-2020-15594,0,1,41d8ff70da4383a62caa7c2929f3b208777d1aebaebe193534610f95ca724f54,2024-12-18T14:34:36.427000 -CVE-2020-15595,0,1,84c8d2820e6ad402905ccddf7b1cd1319f0332c32cbf1dbf934bec1abc27b54c,2024-12-18T14:34:36.427000 +CVE-2020-15594,0,0,41d8ff70da4383a62caa7c2929f3b208777d1aebaebe193534610f95ca724f54,2024-12-18T14:34:36.427000 +CVE-2020-15595,0,0,84c8d2820e6ad402905ccddf7b1cd1319f0332c32cbf1dbf934bec1abc27b54c,2024-12-18T14:34:36.427000 CVE-2020-15596,0,0,5d9ab39ec3b111e8938db8208890e181a90bde06b1b2a36366757c162e681123,2024-11-21T05:05:49.603000 CVE-2020-15597,0,0,d5b4e5f41d3f76ac8685edcd9a62e7527d62e39b918aad59a53ee5a5f346da35,2024-11-21T05:05:49.757000 CVE-2020-15598,0,0,29c4cf6a206458a549a864bb573a7abc87e995b8609723825d1a72deba575b91,2024-11-21T05:05:49.910000 @@ -216016,7 +216016,7 @@ CVE-2023-21266,0,0,41056af2ff44c658c3d7400d35b437dca755e0d267939a09aed4042fcf6b8 CVE-2023-21267,0,0,6638b0087b6d8932602002a7e8d08da2fed80a4581d01b616763baebe7bf0683,2024-11-21T07:42:31.333000 CVE-2023-21268,0,0,966b6eaa52dc2224769524db7defdbe0f2eaa7a2a6172417194471cfbd373807,2024-11-21T07:42:31.460000 CVE-2023-21269,0,0,c88325238d3e3688bd26fb079dfc796c8c700d8d0bb88fb8fe9ce0403d8347f1,2024-11-21T07:42:31.587000 -CVE-2023-21270,0,1,8e3ac5718df0e59647bf13e55913b5346e5936aba8dd705030bc10ffe3b18e7e,2024-12-18T14:22:02.343000 +CVE-2023-21270,0,0,8e3ac5718df0e59647bf13e55913b5346e5936aba8dd705030bc10ffe3b18e7e,2024-12-18T14:22:02.343000 CVE-2023-21271,0,0,d6ce25bfda5fb8eace72cb13696e026026d00885917c7b921b8b8c2965f4dcda,2024-11-21T07:42:31.947000 CVE-2023-21272,0,0,2551733aca613408fb500b7a9902a0645171dc393606369404c055bc779accae,2024-11-21T07:42:32.073000 CVE-2023-21273,0,0,95c7324d81a31e5e26c923038780c886381676790dbb37eb313bb58ffd854b53,2024-11-21T07:42:32.217000 @@ -225666,7 +225666,7 @@ CVE-2023-33086,0,0,f53f20cc132c88c4cd8291ee96f7336f4be2d061efc8c2aaa582933ee06f0 CVE-2023-33087,0,0,f8493077219394e12e3af04e2e125065f5dcbfaa0574cbe023d9fb2cac598856,2024-11-21T08:04:46.507000 CVE-2023-33088,0,0,e1160bfb1e1e936ac0215cc3bfdcb4994be99dca79d4fd17b220fe15b748241d,2024-11-21T08:04:46.773000 CVE-2023-33089,0,0,ca94d4abaea68ca13a805689fb3e29b882357d7b1647b6389eb448dc56434905,2024-11-21T08:04:47.340000 -CVE-2023-3309,0,0,4f3cd78ff2b7a69feab684a1a21e99ab0eb6324fd62b8cc91a78b03a566b4910,2024-11-21T08:16:58.873000 +CVE-2023-3309,0,1,dc1b527e2c2b49a13ee21828b76155a17529f34f0f322065757100e3dd2c8362,2024-12-18T16:15:10.390000 CVE-2023-33090,0,0,212563f9f83c1ae3ec296c0aebd97ba98d917a9e2cdcfa7452ffaa45554f0371,2024-11-21T08:04:47.733000 CVE-2023-33092,0,0,c9ab9cad61633f2fd68e1dc9c0a2e4e2e703bbdd2248acaac7659a80de3bf105,2024-11-21T08:04:47.867000 CVE-2023-33094,0,0,09423103034990f4a4f996fd2d1004e0117123e7ec543387e6bb63ed73701ec1,2024-11-21T08:04:48.100000 @@ -227041,7 +227041,7 @@ CVE-2023-34987,0,0,239bfa56c2b3c2a64ffb9989e3a04ce7690423bc2723612a3fec5d17d1ef0 CVE-2023-34988,0,0,c281aba51286e8262e1bd5a87d0371ac1701ceb8bc379cec0e6a7add4865aee2,2024-11-21T08:07:47.030000 CVE-2023-34989,0,0,9c93395b1d7506c69552441fe317a37c9c65f626459b205c15815f9a4c5bb10a,2024-11-21T08:07:47.157000 CVE-2023-3499,0,0,d53e968d6b98b3b8f4eba87e9d3bb6bd7e12149baa210aafdf7bf82922fb6251,2024-11-21T08:17:23.880000 -CVE-2023-34990,1,1,4425c34c09295b4b7565c66affc7dc667e0e726b367f6f914e5d7ec5b7952e05,2024-12-18T13:15:05.547000 +CVE-2023-34990,0,1,6060883de2c0d95e5f0d3852d53ac20dfde1cf3f1087c2c1c70bc1f1bb4981f3,2024-12-18T15:15:06.137000 CVE-2023-34991,0,0,edca71b869336e025d2f35da854260f4cdb9820b0b9bfc84c32d69158d1c8c0d,2024-11-21T08:07:47.280000 CVE-2023-34992,0,0,a0b956affc14ae52e19caf75bfd96c683d594334cda2c7ce7bc9d403ae1b0e84,2024-11-21T08:07:47.417000 CVE-2023-34993,0,0,f25d5feb0a738fb2f1edb4bcb70c6024043b6f1869f6fd7fa178a04679a49c7b,2024-11-21T08:07:47.547000 @@ -234196,7 +234196,7 @@ CVE-2023-44375,0,0,48b5cc51553000a2cfa67cea7f8a951d3659b6e093f2df35e76499db8afb9 CVE-2023-44376,0,0,03f27121c4f8ffca1841f5abcc6f000d7525e270077c8b212bbafd4e41d1bb9e,2024-01-02T19:15:10.550000 CVE-2023-44377,0,0,960eac8de781cbaac5ac605f1641529954ab7d1adeca62e37948b52710054780,2024-01-02T19:15:10.630000 CVE-2023-44378,0,0,fa93276927338f55d243fff0c5bba3965490daa8aeb974655c9e7ac025ae9278,2024-11-21T08:25:46.720000 -CVE-2023-44379,0,0,dbe966527134b83422efc1ff0967828a55963b3eb4ea9673ce77849f236eb2ce,2024-11-21T08:25:46.857000 +CVE-2023-44379,0,1,3e8dfd56646da37581361063189afb0ab1061b92bcf972741e485d146c639ac9,2024-12-18T16:54:13.977000 CVE-2023-4438,0,0,169dbdca334428881e66c107f3a1102e4db5e3efeafb561096cff90dae02b9d8,2024-11-21T08:35:09.177000 CVE-2023-44381,0,0,66cbbb7eba31d2f8050b53ba4bb0fb526f6a3bf73bb66cc1c1dabc5cd8b3ceea,2024-11-21T08:25:46.980000 CVE-2023-44382,0,0,276b1fb9c5734a0c4fe523f013c8797fb66698f2e159546a387afe6f53012c68,2024-11-21T08:25:47.100000 @@ -238721,6 +238721,7 @@ CVE-2023-50952,0,0,d7a165fbc90fbf4a779f1c6c3931beac69b4af33a7ddbb567cba6acab9aeb CVE-2023-50953,0,0,aba8c9a4c56cd61b55bfc0faace3bf32c62a90f0cd04ee8486b0d330c54e8255,2024-11-21T08:37:36.080000 CVE-2023-50954,0,0,c3b8be7e25038836ab69cbf4b1f3b77767e2a9696c84bca593b09883dc574fa9,2024-11-21T08:37:36.227000 CVE-2023-50955,0,0,054721455db1bb4a434bc0eeb3cc615632509d43de754db980f2fe970f47c525,2024-12-10T19:26:58.140000 +CVE-2023-50956,1,1,c78610f51bc4bd61479a135c10045746e118a16c97294b961ed54c0ac338145c,2024-12-18T16:15:10.597000 CVE-2023-50957,0,0,ab69caad2028c44273e1d8a1b6e510f9cab85ce3e69786cd2afdcb47074d77d4,2024-11-21T08:37:36.500000 CVE-2023-50959,0,0,a65991072a7be5e9bfc6dd105f3e29b24f202d07a14ac774359e6246211d7ee4,2024-11-21T08:37:36.643000 CVE-2023-5096,0,0,b339725eb66ec0962e11912446b66cd850e228ed170101209b480782ef995e44,2024-11-21T08:41:03.100000 @@ -238991,7 +238992,7 @@ CVE-2023-51447,0,0,9acaab43b0f56c6139287a3ad0df3bd2d0fcd672e34eb2b39ccb5e25bd56d CVE-2023-51448,0,0,48846af0783ecf050481b988a41b2e58b9c8ad80e2e9dde9d300064396bcb7f5,2024-11-21T08:38:08.387000 CVE-2023-51449,0,0,4cf349ceea2f1c423c4cf23f27571e002121659b0a97a8b63d12c9a4d5f368c4,2024-11-21T08:38:08.513000 CVE-2023-5145,0,0,ed136c77a3cb85689d85277aba9853012ad53753c0f759e065c484d72945da3d,2024-11-21T08:41:09.277000 -CVE-2023-51450,0,0,f83664303b23e35fb869f09634f7a654c1357f6722ed5c7ccc47f9f19d12a3c8,2024-11-21T08:38:08.650000 +CVE-2023-51450,0,1,c7109e1f6d3d02ee374be68caa72199f1dd26b4bfd2adad210a928abfa8454c3,2024-12-18T16:55:17.013000 CVE-2023-51451,0,0,e4d82488092a2e9c30dda6ea7377651dc05e0b0174a27d67d42211a97965bb27,2024-11-21T08:38:08.780000 CVE-2023-51452,0,0,d1ef96595e79a67721ff43f4dbf5ac162add4b56164453b8a603ed5226e4c684,2024-11-21T08:38:08.917000 CVE-2023-51453,0,0,9e75a735c0262e0b82eb07e0d63ccac2012621274d423a502d96d5582f99c3bc,2024-11-21T08:38:09.063000 @@ -243742,7 +243743,7 @@ CVE-2024-10887,0,0,fb1e1a2823528196fcc2145f8cf57602578b0b49c0e0002d9570cfb1dfea2 CVE-2024-1089,0,0,a8b705082ee081738688e4145db882248091be94e1ae46f0bab923d247b2abd0,2024-11-21T08:49:46.367000 CVE-2024-10890,0,0,291737e09e39acbad6d8cc1c52c0ae5cd2168a1e41e273e4ff02b1422afae399,2024-11-21T13:57:24.187000 CVE-2024-10891,0,0,6756c0c33d7417e4f522126d4552796d2cb16a6b1d07395aaddee44058a352b0,2024-11-21T13:57:24.187000 -CVE-2024-10892,0,0,d40c90e1f2fecae4b6dc95de100feb12dbf7125c92e9191a30cd0bad82588723,2024-12-18T06:15:21.567000 +CVE-2024-10892,0,1,fab4b4690341821092f71ef80ed283e2bd6ce36ef28b90adf9066d644f21bdd7,2024-12-18T15:15:08.067000 CVE-2024-10893,0,0,cec45a8d99b10dd83c0bf750188d64f22ea32a205bdb03916ff953823f5e203f,2024-12-03T15:15:09.780000 CVE-2024-10895,0,0,04c98611744adf39f95b71a878352eb8b113feb4aa126ef2824080fbccdc579f,2024-11-27T07:15:08.347000 CVE-2024-10896,0,0,e962891bb7ff0bd290fd7c88332bde91f2f69d0bdc8b8df6012dc8f056efaa3b,2024-11-29T16:15:08.880000 @@ -244770,6 +244771,9 @@ CVE-2024-12362,0,0,96e15c2faa2bd6e0d657897006f5afbf531e277c4e36a7600a72ca925ed55 CVE-2024-12363,0,0,8bf95d170f6881f24ef42d227f38a0cf0a0a8682e2906a9aa2aaa1e3f316a356,2024-12-11T10:15:07.260000 CVE-2024-12369,0,0,5b7cc273eb06dd7ee2a2ae3818321c32759b57238bbfe6b2aea54c3bd6ee2b32,2024-12-09T21:15:08.203000 CVE-2024-1237,0,0,7608b762d209f55f10a23dbde634d086adad1d6240344714ec7de5c458d836b6,2024-11-21T08:50:07.910000 +CVE-2024-12371,1,1,fd78f40d62c8ae669183369c84481ca778951463908443ea9cdf004bc77bd39a,2024-12-18T16:15:10.907000 +CVE-2024-12372,1,1,6dd757f76fe34aa65fefc0e05ca53d143d2676e900f8bdb1c64dd5775b85c4e2,2024-12-18T16:15:11.050000 +CVE-2024-12373,1,1,202ac51835bd3d6d19b049a407a67ec898879e144610a29d35558445c18f0734,2024-12-18T16:15:11.163000 CVE-2024-1238,0,0,61e2d99ce6e3dfa86afb8331abcc236f68b5fa34f245659f4f6216db5239b32e,2024-11-21T08:50:08.053000 CVE-2024-12381,0,0,68b33f6b694aa45ef73ff06945e737e58ccb7b1c7ea2cfeb4d826136c48b3d1f,2024-12-13T19:25:33.143000 CVE-2024-12382,0,0,f70294886a1865641a484753f3298929660ab1bd7002caff75777615f01f2e87,2024-12-13T19:24:25.137000 @@ -244870,15 +244874,15 @@ CVE-2024-12644,0,0,4fe46a77976cb26c8db1a8817f8d60588d7d627c677def113b1f0c3da34da CVE-2024-12645,0,0,e2bf7e02fc7f9b197fb94f8f3f7739958eb1e7eb714f268785ecfdf27c30d30a,2024-12-16T07:15:06.560000 CVE-2024-12646,0,0,edf55cca2f63c5514783a7adeb1b585499807b56f798173f78bff573d5a90371,2024-12-16T07:15:06.737000 CVE-2024-1265,0,0,b39c324e3936d2b2eba136bb9fb37e8f905e9dd3fbb95d7d724d951e7512509f,2024-11-21T08:50:11.610000 -CVE-2024-12653,0,1,0bdff4965d01bd6aa73fcbedd02b053581ebdedd8d7404b8f9233029d8912bb7,2024-12-18T13:53:28.700000 -CVE-2024-12654,0,1,dd847f86178d706ec068f649f759ab2d8fa9222fd8627ac6c45d7d35cd5983cc,2024-12-18T13:42:22.853000 +CVE-2024-12653,0,0,0bdff4965d01bd6aa73fcbedd02b053581ebdedd8d7404b8f9233029d8912bb7,2024-12-18T13:53:28.700000 +CVE-2024-12654,0,0,dd847f86178d706ec068f649f759ab2d8fa9222fd8627ac6c45d7d35cd5983cc,2024-12-18T13:42:22.853000 CVE-2024-12655,0,0,7ceaaca6f02716eece2d7e73d7d09c21cdb7429363dd024bbff0d12b620fab5c,2024-12-16T17:15:09.147000 CVE-2024-12656,0,0,d7ca036e72b675c7410eee2a09d0c8b1a09bf6f11bc270d361aec72d2859b2e9,2024-12-16T17:15:09.340000 CVE-2024-12657,0,0,d62bb2296e60c72ad405696503588543100255cd21c67ed32539ab7099fc2c10,2024-12-16T17:15:09.520000 -CVE-2024-12658,0,0,7138d2d849a9c48736414141f6e0f5483806b353b70b5f0986a2bb641f83c92f,2024-12-16T18:15:10.120000 -CVE-2024-12659,0,0,57b490eadd8ce7187dbe6a8f2a837f89476ea13c3f86aa8843b1da895a3678e6,2024-12-16T18:15:10.320000 +CVE-2024-12658,0,1,d1603c6f162f68deb5fb3680f23894c8cd48abd18931637daa20165cc25f0652,2024-12-18T16:15:11.297000 +CVE-2024-12659,0,1,0f1a25a790c3a06fdcd98e8fc222bbba905ef6e5e8eab8586918a744a057e2b5,2024-12-18T16:15:11.500000 CVE-2024-1266,0,0,2a4a1a9a97982898c100d9d9cb94e7da9ed50410ea3a8e686081520943168bc9,2024-11-21T08:50:11.767000 -CVE-2024-12660,0,0,bb60da334f54db48dcd94342bf183fd2a72d6a12db86075b10598ae509d99f19,2024-12-16T18:15:10.533000 +CVE-2024-12660,0,1,9ebd9119d6a731311780c33f36a0848bab9bd76dae1d26fe89c7648d30991b8c,2024-12-18T16:15:11.700000 CVE-2024-12661,0,0,b0a5ca69a8f43b38c9f7b899d0ebfd6b57a397e750bb735f317aa453d69aa5f4,2024-12-16T20:15:08.840000 CVE-2024-12662,0,0,b07855f7b8c9ee6bdfd1cdccd03234059b510edc4b4a3a8c0a44fc18dfc722aa,2024-12-16T19:15:07.027000 CVE-2024-12663,0,0,cb1a586129069ffa13466f4c6b4784e75a597b36a82749fcb1b049602849dc70,2024-12-16T20:15:08.963000 @@ -245216,7 +245220,7 @@ CVE-2024-1604,0,0,7ac9103a08c9e9dd04004b4e7466052243f63c72b367568e72784f5a0bc120 CVE-2024-1605,0,0,9d25139cf22609654ef8a455d8d21cdf06e67cf1e19359d09ce5b9576dd7793f,2024-11-21T08:50:55.790000 CVE-2024-1606,0,0,98f100f836fcdef4d873587f10566a7e89908cb420114440541bb054f23516db,2024-11-21T08:50:55.920000 CVE-2024-1608,0,0,0a57ef7d0ee1c774c7263d04a6788a7f66bae8cf3338ec576b87a084004d2400,2024-11-21T08:50:56.057000 -CVE-2024-1610,0,0,fde919cd17a70d591a0e9fb78822c0d81301cf73bece4329e153b2e758cd4628,2024-12-18T07:15:07.207000 +CVE-2024-1610,0,1,dcd3f4f5c3475591d3653517e7aa2a8c5134d3b403a013d0818059330725ac6a,2024-12-18T16:15:12.060000 CVE-2024-1618,0,0,f900010f21bb70b6581fb91ea7ff15d09cd9f4b411eb32fa913b01f49c3af689,2024-11-21T08:50:56.193000 CVE-2024-1619,0,0,27a596ddc3250c410382bc7e145fedcd4a2e3395b97151f21ca063be3207db40,2024-11-21T08:50:56.330000 CVE-2024-1621,0,0,212b3fca00d5946f120096ca5a7a0afc1b2cac9a26b845aa6388948724d52915,2024-09-17T14:12:41.620000 @@ -246974,7 +246978,7 @@ CVE-2024-21544,0,0,b52a261160b7bd90c6a69309c9d714496ee1314561724f9272d6d2fde718e CVE-2024-21545,0,0,12417d057214273e4a76243ffeaf97d513746844d668a1420616fa022f5af746,2024-09-26T13:32:02.803000 CVE-2024-21546,0,0,374b959b014e67074043123d4e408037a721391ba09f30f003dba89985567839,2024-12-18T06:15:22.850000 CVE-2024-21547,0,0,9490da4e046bfe0261ead89061dc5ab090fcc33b7491f225d76294d9a91f7dfa,2024-12-18T06:15:23.187000 -CVE-2024-21548,0,0,381335a01313c6891ff8e7885f57f76016b23456e0f299e795e751d21188135e,2024-12-18T06:15:23.360000 +CVE-2024-21548,0,1,1234240944f7ab37f9588d239ecac84e4a1f43ed5a4b8fa4e08658630e5fe2ba,2024-12-18T15:15:09.947000 CVE-2024-2155,0,0,1def2d989b10107bcc4deca9404884628c1ba17bdc1993a4df13bb309b4ac8eb,2024-11-21T09:09:09.070000 CVE-2024-21550,0,0,6b574e14ae55a92be9fd93a1bb9ebb56cb79876aa6e47f41fbbb48bbd5163e82,2024-08-13T17:33:13.537000 CVE-2024-21552,0,0,3511199af539fa92e1c2d7637f006a31f2e0de3850c5a9391f1377c23517a9d0,2024-11-21T08:54:39.323000 @@ -247156,7 +247160,7 @@ CVE-2024-21782,0,0,6c531c415b293b846940d9e1a482ffa12bf25baae4ff90ca3d8bed86a3300 CVE-2024-21783,0,0,9cba49c73f8dcc0af2561160a017ccd14b4646aa0c3f61abaa34a051f2714ac3,2024-11-15T14:00:09.720000 CVE-2024-21784,0,0,271e66d21546e397c2fae271ef065731034c6a3dc48722d555b9bd3eaefcc535,2024-08-14T17:49:14.177000 CVE-2024-21785,0,0,9a6462e1a4ec679c404234f546462fc2ccedea4788076efb9e4346caa9449e05,2024-11-21T08:55:00.023000 -CVE-2024-21786,0,0,3b7692c292cfe04f566e45997f686e7ebd9a0d37b8f88eed63f3df5837053294,2024-11-21T16:15:22.200000 +CVE-2024-21786,0,1,1c8979bc86a7e3ed407bcaafd8b21ea0a529ad50c98bba45d8284b04eb31515f,2024-12-18T15:06:28.230000 CVE-2024-21787,0,0,02b845fa11d30ef4d6b5248b543c263f9946579e27a5baee61af2daa73424f03,2024-08-14T17:49:14.177000 CVE-2024-21788,0,0,f9a4599f6e3684f11960e4f6592dc9aa65a582c5ca6406a9d40efd4597155390,2024-11-21T08:55:00.303000 CVE-2024-21789,0,0,c34cd9f442e6303402470c0476d59eb25b078e9a77c0361ee2b35106ce4e225f,2024-12-12T19:11:30.663000 @@ -252794,7 +252798,7 @@ CVE-2024-2964,0,0,c6f606448570a617b869ab59eb1eef60539206172254b57930d414027bfbe0 CVE-2024-29640,0,0,65d6530699a7099d302e2fbf8d4b7ca80d9e1a53023aa40de7aef2cea04c7ef6,2024-11-21T09:08:07.760000 CVE-2024-29644,0,0,7b36dddaf548433646a6424210ed0ad6f03f12fd40f0d6d35dd73bdea49e2298,2024-11-21T09:08:07.980000 CVE-2024-29645,0,0,a6a74f9039264972a9c805d4ae9d2f097ab4e597f535a3fa7bafb1d74a950cb9,2024-12-02T18:15:09.453000 -CVE-2024-29646,0,0,9c5a78d1ab06abde2bdc222ece20b962f09a0c215407877a474c2c98462d7277,2024-12-17T22:15:06.550000 +CVE-2024-29646,0,1,c6e6796b91361e5564fd0ed5e466894336e400dae12021c9b74768d5448f92f1,2024-12-18T16:15:12.513000 CVE-2024-2965,0,0,0e37bbfa530a61c2d82fef1ca2e0856588e0f7ecf3b5b3a3905f885de3031030,2024-11-21T09:10:56.847000 CVE-2024-29650,0,0,32d15580191c7e4ba16d03aee0bb830b6bb78e29fa21f75133466fdca3213232,2024-11-21T09:08:08.197000 CVE-2024-29651,0,0,31d91be0f564d07d6c8f19a393b333b330f5d72e83fb5a5cda786276b03b3635,2024-11-21T09:08:08.420000 @@ -254435,7 +254439,7 @@ CVE-2024-31651,0,0,7a05bf060550658aeafb598f6d26f061393d2c8a3005e7e0ac280f9d616f3 CVE-2024-31652,0,0,af62d2ee0de062f978c0bade4d4d954f663c94f8c5efa1dc0544f972ca6821cd,2024-11-21T09:13:48.143000 CVE-2024-3166,0,0,7c4799e6f2d4de4c6793757b3de0601ca1d1298c8c6272ffb0dc9b3a0678bb7b,2024-11-21T09:29:03.133000 CVE-2024-31666,0,0,da138b5625d57499c0f1ce31be7d877b9441e536258adf0c26130a1de3460311,2024-11-21T09:13:48.347000 -CVE-2024-31668,0,0,eb43a7c05ffbe3a83f99c21fe6a223fe161a5d02c96a4b394e754d99aa25ecbe,2024-12-17T22:15:06.677000 +CVE-2024-31668,0,1,fe137e5887ffc8d5d0ae41a7c6527f0694d1355ef6ce22057122340d655a0735,2024-12-18T16:15:12.693000 CVE-2024-31669,0,0,e67157c072d6472b13e8463ea23f9b22948945715ffb2a3485fbc46118d6e7b5,2024-12-03T16:15:21.540000 CVE-2024-3167,0,0,b0bdf42e92bad376276c8af48f28639bc7025690df7bfcbc255509f46b757355,2024-11-21T09:29:03.290000 CVE-2024-31670,0,0,485c6b39a9c06c65b704780df5587d61e2c68aff13a9abfb705a544147e51149,2024-12-13T18:15:20.167000 @@ -260606,7 +260610,7 @@ CVE-2024-39746,0,0,f1afc11bc11a44838803dfd62593cc3e7a4249af2cc2a806a84825178dbd4 CVE-2024-39747,0,0,2364c8f9f85ad03df91981b97454f0719e0ee4edb3b0df3002b45e0ad1d1a3e7,2024-09-16T17:13:47.497000 CVE-2024-39751,0,0,b0c0aaf4fb5c9d1835036b5573daa4920c821bcc0ab31bb499aba831cb233595,2024-08-29T16:56:32.053000 CVE-2024-39753,0,0,9cf0ba8c0db0b89a70f7293ebcb08ff8ef168b9c804117157b5fc41c2f9b0584,2024-10-23T15:12:34.673000 -CVE-2024-39755,0,0,3596a79d9bafe3d00191cf168abd9a2d1cc12a641fc02c09b86bdb5808584b83,2024-11-21T09:28:20.680000 +CVE-2024-39755,0,1,c89983064fbb3672e96d95936bac6d3850b3b1cd085c9bdec08e8d8a80f60503,2024-12-18T15:15:10.370000 CVE-2024-39766,0,0,844aefab41c4190ffa859ec2a49097c570e2e9373903e050261066d0ad10a0ff,2024-11-15T14:00:09.720000 CVE-2024-39767,0,0,9e1d98afeb59e9ce0a888e3ac87dc97f327ada5cf6782d1b11dbdfa8cede82ae,2024-11-21T09:28:20.950000 CVE-2024-3977,0,0,78ac860cc8a8d0c7c2aed6775586d6934117777782645dfe7099108b8d9721f9,2024-11-21T09:30:48.667000 @@ -261438,7 +261442,7 @@ CVE-2024-4116,0,0,fb13e9eda5d5b0f87b4a1a6faf2d47dd767a1cd80c123d34508608e977fd6f CVE-2024-41160,0,0,59352b379d517c3d21973bcf1f1dabfc101e56caaa086108874e9f5a5016dec8,2024-09-09T12:21:53.383000 CVE-2024-41161,0,0,c44c40c9181bdc0411297b718d634c69b4cc443072a4bbfc4be96011581fd659,2024-08-20T17:09:50.647000 CVE-2024-41162,0,0,977378981001bb41eb21ff3c8de57a2d971d0d349d42fb50bc854dc76c138759,2024-09-04T17:03:53.010000 -CVE-2024-41163,0,0,357340e8cc5608358163c5755264225216a3bcb09de10c9f908a3d5ab3f29b43,2024-11-21T09:32:19.947000 +CVE-2024-41163,0,1,acd3d59e23a7c7b4b0c3e74d19b58377cdb81402be9adbd0a5cfe7a91ece1831,2024-12-18T15:15:10.730000 CVE-2024-41164,0,0,4c4d4ed9c8462fe5c1beb69a1e440cbfd7fca4e0230442b39f4f5b80ba178ccd,2024-08-19T18:39:06.157000 CVE-2024-41167,0,0,99a054e656d3c12a5ab4c6034e2dfe4d200da81fdf05058d692b86b939cfb420,2024-11-19T19:45:02.660000 CVE-2024-4117,0,0,6cc086281cfe564ad1a8b73d3f7bd2e9fa0d2a40b390da51a0a4f6965f4fec1f,2024-11-21T09:42:13.230000 @@ -261882,7 +261886,7 @@ CVE-2024-41915,0,0,74f4b30a3490769bd45dc3bb1c6e58da7fcab263c0eccbe09541d45260e0a CVE-2024-41916,0,0,e26bbdb30f3e12989e8ba751536faaac62be571602a0259fbe27bdf53bba951f,2024-11-21T09:33:16.797000 CVE-2024-41918,0,0,0025c02645b62e9a013f9a632cdf884d305e491a1529fcde2896b5f25d46b1f6,2024-08-30T16:05:23.737000 CVE-2024-4192,0,0,6f45d7ab3fa2e128e5ba0090b09e0efb99d62d4fa36ffa8103dd1a0f77ba887b,2024-11-21T09:42:21.737000 -CVE-2024-41922,0,0,254b44cd11601ad409fb61ca1fe77ec71ef464f71c521f1c6d417253a957e737,2024-11-21T09:33:17.197000 +CVE-2024-41922,0,1,c474233251e2cda687143852afe84ade383db4530aec836e5b393340d583500a,2024-12-18T15:15:11.163000 CVE-2024-41924,0,0,7f0f2dba0da77920bc169ff261d197e150c61a323fb8b37c94de1765d8092267,2024-11-21T09:33:17.350000 CVE-2024-41925,0,0,f0afe0eee06b0829945c8f8e62a978d9cd0bb35f1eeab69e0173fdfc98892541,2024-10-04T13:50:43.727000 CVE-2024-41926,0,0,bf6164bec763886028fa43df40afb1056b64cffb366d4c2dd3441f5245ffe1ae,2024-09-04T16:55:35.570000 @@ -262714,10 +262718,10 @@ CVE-2024-43080,0,0,cbdb75ee710ea05bfcc86299182b203ee944c795380cbed1c1ab4a87225ab CVE-2024-43081,0,0,8bed9f6165013dc4c983bb0dd11cd660d0d155d067474bbffbb46b60a90bbdd1,2024-12-17T18:56:04.590000 CVE-2024-43082,0,0,41f8f96f79027c1e757dbe13aba545203ff85b38f1c8fefdaca5693502b27722,2024-12-17T20:03:15.273000 CVE-2024-43083,0,0,c5d837ced63418711f27b1666c35432f60f03fbd8001163f5897844a88ceb2b5,2024-12-17T20:03:05.777000 -CVE-2024-43084,0,0,0fd33146e7d0cce08453cc1716b066da0205fa0c58091306a6ca8702671a071a,2024-11-15T14:00:09.720000 -CVE-2024-43085,0,0,4f42ac772944e0ea8c2e982c885d48fcdfceb227de595258ecd5f07e9d6b8153,2024-11-15T14:00:09.720000 -CVE-2024-43086,0,0,80b431a0904ad8c4f957422f03484c2e69e8f70f42c003572ef3e522999b51b0,2024-11-15T14:00:09.720000 -CVE-2024-43087,0,0,bb2ca79e4948799c1e132402b4287cb27629451af5f367413ee982916a302255,2024-11-15T14:00:09.720000 +CVE-2024-43084,0,1,2a1af7b64ba220b2b8407a3b7fef8625a8d34948d00740d2a2893b7c5936ca6e,2024-12-18T16:55:58.837000 +CVE-2024-43085,0,1,4c65a98e7dcdfc4d65f453f09902a753bd756e294ada7a99374f1e513d421e75,2024-12-18T16:57:04.630000 +CVE-2024-43086,0,1,c8147bf14612dec02ed82041c00d93e856a7554ee905a8272e58140ef0dc00cc,2024-12-18T16:58:17.253000 +CVE-2024-43087,0,1,b1362eda6c1fbd36406b839c01a221462f14dea6935c5b9ebf185c81099de446,2024-12-18T16:59:38.850000 CVE-2024-43088,0,0,0e3383c6deaa91fa11ae5512a771ce5ccade967587ac39fc390fa94d3c57e73d,2024-12-17T21:16:19.387000 CVE-2024-43089,0,0,1613cdc3eff3fb2309a16178ea47d6da8ef85ad59e68ba23756fcbb9497fd073,2024-12-17T21:04:38.220000 CVE-2024-4309,0,0,cf6d99d40224d9ea0048df61a24b0034afd2baf32b8f2402feb311af37805c15,2024-11-21T09:42:35.797000 @@ -265446,6 +265450,7 @@ CVE-2024-47107,0,0,cbccf574787d61b4f6ca0e02b243f9353763dfcf6f42da1d1ab7d0498a1d1 CVE-2024-4711,0,0,e4ef71037ebae75f1c7783581ae71eaf15c6142551362f95bff0adb8f63f9b15,2024-11-21T09:43:25.710000 CVE-2024-47115,0,0,64bb47e915974f1dfec3d4bee74763bed48bbf036cf9597873496ec80cb951dc,2024-12-07T13:19:14.783000 CVE-2024-47117,0,0,a26952e58650ef25d9f11a5aae4455c43930c6e2575395901d2106687495648d,2024-12-10T14:30:44.400000 +CVE-2024-47119,1,1,994ba7bddd62d58b5d495b6c62e7b2cee67e96e7d1ae2bfca77b7b79e47b393d,2024-12-18T16:15:13.110000 CVE-2024-4712,0,0,1fed59bb7e8ad0e60ff127714cca3b30ddf28383821e6801d32e14d7ddccef6e,2024-11-21T09:43:25.850000 CVE-2024-47121,0,0,346648e20973f21c82fabd4a08a632a55356bf3264a158afc57ac406e96c43c4,2024-11-01T20:39:20.677000 CVE-2024-47122,0,0,7ba55296c1246880ecd41488ae0cfca0580aa596752d1a2853d946be717d540c,2024-10-17T18:15:05.480000 @@ -266042,6 +266047,7 @@ CVE-2024-47806,0,0,a9d6e69f147db55a9010517fe181b09bdf0c723cafc8fe156a8def4f62dbf CVE-2024-47807,0,0,78bd319435174254d649de27630a1f69840809df78c607ab539f6fa82f612f73,2024-10-04T13:50:43.727000 CVE-2024-47808,0,0,3924b9cefe20472af8979aed441ac27dc70244fae40103f8f689b3bed484611f,2024-11-13T23:14:07.650000 CVE-2024-4781,0,0,dca04dc1498213ba1a1a197fab3ce11b94dddd311dde0315913f82a2ac38840b,2024-08-19T13:00:23.117000 +CVE-2024-47810,1,1,38c451958f2c00026c9be0e91cb9a06739ce828be35351d15cd1fd9afab98c55,2024-12-18T16:15:13.327000 CVE-2024-47812,0,0,897aae376a8f43996b3658ca9867b5f6dd4a27027999c91348ce8bcd7002ac09,2024-10-10T12:51:56.987000 CVE-2024-47813,0,0,434303803631cf6bc09b5e35a4b961a326a0a5a5bc7ada44abfa68057841e7ca,2024-10-10T12:51:56.987000 CVE-2024-47814,0,0,486b6a0be2195adb4e752d5b37b1fc387b5904407f29e18a562f1b6e670e5446,2024-10-10T12:57:21.987000 @@ -266534,7 +266540,7 @@ CVE-2024-48872,0,0,e0488ddfbbc97cfa53cf7ce570cabf334ccaf2abe7ec833ab649dfba44be6 CVE-2024-48874,0,0,d4dab0701d320c08fdb5c4d13166c7fa76f47b4f8118adcdce9e1ede30e7393e,2024-12-10T19:44:16.093000 CVE-2024-48878,0,0,61df8c716ea1a9423d8f98d007fe741d86381fb579c3442ef6d827deee3b213c,2024-11-05T19:44:58.650000 CVE-2024-4888,0,0,133d57bae18b01966145fd4e4ce13e18e7959193dbb6b4323cb9d35593035efb,2024-11-21T09:43:47.830000 -CVE-2024-48889,1,1,b99a18a39ebe41baa99e9049c80af5c10744c585f33eb90839266c39885a6833,2024-12-18T13:15:06.463000 +CVE-2024-48889,0,1,b2e68600a95474dd0fd31c01e922367ed4173d86fc21f7e0e3e280e46c787265,2024-12-18T15:15:11.713000 CVE-2024-4889,0,0,54e41cd985dde0162870a1a62b42a9fd40bf90446677bc64ce2d3dd7fe90e1b1,2024-11-21T09:43:47.970000 CVE-2024-48895,0,0,2619cbfc056db229022c601c361879a86e8ef7297a78db8864167658fcd89d44,2024-11-21T13:57:24.187000 CVE-2024-48896,0,0,68f9b7eee2d42fd99555582d831f186b3535e450fad14d101fd4d18eb273b831,2024-11-20T14:47:12.777000 @@ -266916,7 +266922,7 @@ CVE-2024-49369,0,0,6258381369a95e122d8b4a8265dd8c9c82340e2a2cd4214543fa7ad31240c CVE-2024-49370,0,0,28c85860a398a8fd36a32b63f1b5ae8e656dc29d7b1deb02b7ba40b41e39cf1d,2024-11-06T22:31:30.160000 CVE-2024-49373,0,0,58bd472ef3b11ac378ffcf19869120f73b7eacc01228a257ec82cd2e1dc17e38,2024-10-30T21:16:59.213000 CVE-2024-49376,0,0,9641505bfe1891b9fa319aee5e820e5aea0ddba4eb94eafec66369ac3322668f,2024-11-14T22:49:50.667000 -CVE-2024-49377,0,0,2747544c3165f608ffe7362af2f34a41155d8208418b404e73cd0adec79032ba,2024-11-06T18:17:17.287000 +CVE-2024-49377,0,1,25dd022c5ddd384b788ac4f08857804dbca09312efb00b6da5ce96ab5045b24d,2024-12-18T16:31:26.757000 CVE-2024-49378,0,0,98d825a66aae22af1d83c0197886845e9ecdfd29786ee869ccbb1a9dad42c70c,2024-10-28T13:58:09.230000 CVE-2024-49379,0,0,ea83f88f5d6c7a91cd7b23f7b0d399c76f49d47ade2d0a28d49fe2e11239529b,2024-11-21T17:15:20.587000 CVE-2024-49380,0,0,1c829ef1a8665bcb0604afa76f31075ea3c3600d816f9c8f70d0d57517ae83c6,2024-10-28T13:58:09.230000 @@ -267006,11 +267012,11 @@ CVE-2024-49531,0,0,eb72d103c6cd4835b07fe8c9652059e25a040d154610cae27da6b54104272 CVE-2024-49532,0,0,92fc9b812b4b70870fe4de72ea6d3c7eb0afd0629723968400bc0800c2ee9220,2024-12-11T12:15:20.753000 CVE-2024-49533,0,0,9f80fc35b9b3cda710d35a7bb3a94b7ed2be7bff05c8ffe16cf83b4a720a0ca7,2024-12-11T12:48:18.580000 CVE-2024-49534,0,0,74fa2da2d7b9ee3c26509fa642bd9dd550d7b3b25f87840ccbc5696b69d4a778,2024-12-11T12:48:19.230000 -CVE-2024-49535,0,0,9aa218795488b1f36fe7631627cbe51e862d69285b1d33800b2e84a9615a8340,2024-12-10T20:15:18.923000 +CVE-2024-49535,0,1,a8999da97e4285896456271d4cdceca951f9c859250023ebce227da98e8f2f28,2024-12-18T15:07:06.950000 CVE-2024-49536,0,0,3226abc075af5af9440f5cdc9a3a66360f030ce3d405055960c0bca748fe4e92,2024-11-19T21:21:45.640000 -CVE-2024-49537,0,0,8970863ab032ca518f0c2e58fa75ab31a21ed87f68e65d71814b0d6627498e3f,2024-12-10T21:15:16.500000 -CVE-2024-49538,0,0,feec2cf472b4f88bc4d41c773ee73be5cd3f24a2df7d45e29fb6f654b910070f,2024-12-10T21:15:16.650000 -CVE-2024-49541,0,0,91f72e326a34159bee9600bb0cf0d0bf82612ce7cf0662fcdeccc06449d257da,2024-12-10T21:15:16.793000 +CVE-2024-49537,0,1,ba882a99cef27c89f9b2e8ef04d1eabb52008f24920d39f5c7da20d6b3c16d7b,2024-12-18T15:21:52.587000 +CVE-2024-49538,0,1,3efeb7dc63ffb7e319a4e954aebfe791b3219c328f7308ff66639e511536c65d,2024-12-18T15:17:43.620000 +CVE-2024-49541,0,1,8cb92ef5ac02101c8bfec3741ecff82e1c57862d3057b0e6d10bda1324aa00b2,2024-12-18T15:17:34.523000 CVE-2024-49543,0,0,c9b4f033e0b4993a51461ed9c13dab1caf5a1c072536f8707e443414bfe00bc2,2024-12-10T21:15:16.937000 CVE-2024-49544,0,0,6375c990f2953774194a08b6d4ffd9b501927535475726731d3d95d8c163c092,2024-12-10T21:15:17.073000 CVE-2024-49545,0,0,0363fa582bb56e1fa0b238d904aa7ec665f5600b3b7c3c3b4c5b9a39f5f7dc4f,2024-12-10T21:15:17.220000 @@ -267019,16 +267025,17 @@ CVE-2024-49547,0,0,31d064572e588da367222cf3c44bb5ee27c3fa51bcc463f67454b0c37f45d CVE-2024-49548,0,0,bb1a8bdd70dce7f53d2e671417cf49d2f2712f7c017af0c5a7569f94c4c28a16,2024-12-10T21:15:17.617000 CVE-2024-49549,0,0,9deb18d5ee12538d6eb1657f82a2cdf52686d4b974f294fe2ff86160f99fbacd,2024-12-10T21:15:17.753000 CVE-2024-49550,0,0,27e56b904436c74833992eef941b9e27e78e6d34b2add18e9d4136f40cc8e03c,2024-12-10T21:15:17.903000 -CVE-2024-49551,0,1,611d0bb85efb705c2141b0e3ba3a4b055fd8590ff0cdb0b5ca59704d936432a7,2024-12-18T14:45:20.283000 -CVE-2024-49552,0,1,1dd42e31d4b7a11f1169e7d95fa23421a35a65b3445da360d90510d9f668bd4a,2024-12-18T14:45:10.450000 -CVE-2024-49553,0,1,eb55870165fda3571b7ba6c0913cad8b831c7cff4c74e1be9ab313aaf34a7571,2024-12-18T14:44:55.723000 -CVE-2024-49554,0,1,9fed37ff04eac9a74771214a2591c8062f71b41f5a61981624c0ed7a40fac3e2,2024-12-18T14:44:39.800000 +CVE-2024-49551,0,0,611d0bb85efb705c2141b0e3ba3a4b055fd8590ff0cdb0b5ca59704d936432a7,2024-12-18T14:45:20.283000 +CVE-2024-49552,0,0,1dd42e31d4b7a11f1169e7d95fa23421a35a65b3445da360d90510d9f668bd4a,2024-12-18T14:45:10.450000 +CVE-2024-49553,0,0,eb55870165fda3571b7ba6c0913cad8b831c7cff4c74e1be9ab313aaf34a7571,2024-12-18T14:44:55.723000 +CVE-2024-49554,0,0,9fed37ff04eac9a74771214a2591c8062f71b41f5a61981624c0ed7a40fac3e2,2024-12-18T14:44:39.800000 CVE-2024-49557,0,0,6601a96c4bc210f01d32593bfa488dfcd4eaf5855ed8b64d0dab8c422cb09b1a,2024-11-15T17:36:47.110000 CVE-2024-49558,0,0,d6190c4fa083ad35fb776a8089e14895ccaced89c942fbc8e925117ea666e076,2024-11-15T17:35:54.480000 CVE-2024-4956,0,0,b59f0fa653d583ff50139b3494916619d3242eed1a7ae59aab01da9b6e8c6c91,2024-11-21T09:43:56.520000 CVE-2024-49560,0,0,3f26500c4dded44eae4dc46589e64362e416f55913f19fef12f4ea5a50ab24a4,2024-11-15T17:35:25.407000 CVE-2024-4957,0,0,faf1bb90e1dc631958a9f6c5494539e38e22b9c3203a1f9393f289eefc9d7e39,2024-11-21T09:43:56.650000 CVE-2024-49574,0,0,285edf65c7736387bb1f5e69a3d9da68a65cb104e57ac1234838e33c6baad7dd,2024-11-20T16:32:37.770000 +CVE-2024-49576,1,1,9d57afcdb9172895acadef07fcfbd355456b53b471c99d19b25b924d0c951281,2024-12-18T16:15:13.477000 CVE-2024-49579,0,0,9abb18443d506ce310fd7f4e6167b121033f3a0e20d401bce4799bb038c96994,2024-11-14T19:24:45.603000 CVE-2024-4958,0,0,8a8c67bc903e1a46ad33f1a53da00f2ab4fc5b43d3db7efb6913c74195b26737,2024-11-21T09:43:56.820000 CVE-2024-49580,0,0,3616bf5be4f69eda17b61f84b4b764987072fb4d926e0d601ddb18e72d10c716,2024-12-06T14:15:20.670000 @@ -267296,7 +267303,7 @@ CVE-2024-49946,0,0,4282502abb14004f3ad3b6990ba1eea19c5a1f24f9e8009830652e8dcd140 CVE-2024-49947,0,0,45246e2f634d00c4f196249e0c002c9ac4a3e83049907010f1a2ea778482c097,2024-11-12T21:25:21.870000 CVE-2024-49948,0,0,3c07375ebdcbc88e821363a12991edcd9ef0a0e6f3e0ea074854719cb756d20d,2024-11-12T21:19:24.440000 CVE-2024-49949,0,0,862d00735d151a14c8eadd98da18017da1bd5bd1db3933cfea0083036e3d13f8,2024-11-12T21:03:59.377000 -CVE-2024-4995,0,1,986418d30d21cfb98312b300bb79eecd8b7d17f957cd4c96230861aa29869492,2024-12-18T13:15:06.603000 +CVE-2024-4995,0,1,f68e763650eeece035639a09ceaca84e91bf5906632316def97713e472692c36,2024-12-18T16:15:13.623000 CVE-2024-49950,0,0,a3b2e262aca9e244ab2da6b1f6a174049eadab2e9a1c66c343347b7a6457968f,2024-12-14T21:15:31.613000 CVE-2024-49951,0,0,1bcd56af774503e3361ae7748b61405667859f87d6c481b76256bab77dfaa560,2024-12-14T21:15:32.053000 CVE-2024-49952,0,0,4211d2a9f88cb08f96387a31b9ab3d61b023ec569e7605a0a8bc222d3124b341,2024-11-13T00:46:03.893000 @@ -267307,7 +267314,7 @@ CVE-2024-49956,0,0,ad41e742c241feac4d7d72745b86d5b76fa77783fcd0fc01df15ad2e54cc7 CVE-2024-49957,0,0,9fe20b814f873df80408128cebb309ff4cb21aaafe57f30b76e489a1f3b92b1a,2024-11-08T16:15:33.963000 CVE-2024-49958,0,0,5a97ea90ba1b12a92ad466299cd8b86dadc4bd73e96d0f2c30a9c22bc81604fc,2024-11-08T16:15:34.497000 CVE-2024-49959,0,0,6fe07b5cdf4fe31cd38dce519a93cee53aeca01693535ae376b18ac0b1feb771,2024-11-08T16:15:34.923000 -CVE-2024-4996,0,0,46cadb52903517fe87cbb6981ddc580cd04057e637a71401fff7fce04e8a9988,2024-12-18T12:15:10.120000 +CVE-2024-4996,0,1,fe9c51703241a5e08e80f910c01b4cf4e9259ab2df8ff747b49df30230200b57,2024-12-18T15:15:12.210000 CVE-2024-49960,0,0,acab1eb31f27cdc9f4ae9bec65ad798d53c3a894c6765df6ead00c7435d0c074,2024-11-17T15:15:18.527000 CVE-2024-49961,0,0,dde3df5f8bdf7f3dca86d86905800e80b0cf9f5a049803c6b644a59c20edafeb,2024-11-07T19:22:15.323000 CVE-2024-49962,0,0,9e23d9ec87abc1ddc1631ece5ff7f04c4c36be12aa82158171cb5a65d60f4061,2024-11-08T16:15:35.413000 @@ -267942,7 +267949,7 @@ CVE-2024-5056,0,0,8fffdd4127619c786aa0989407007469ff9a6aa73bf668207b4ad19c19de15 CVE-2024-50560,0,0,849cbb22dc43c9735ca18b0189950c1e8b5ecac4d47888f5bcbc5715b936ca6b,2024-11-13T19:57:26.073000 CVE-2024-50561,0,0,6a51b1f26d5cf18987d57ec188dc14932c4d4312c95a1bfb0fba3e588b50e618,2024-11-13T19:57:56.313000 CVE-2024-5057,0,0,4e84b19a66dd237677e71f8f6b2954676ecae2fca742ad51c75df8e74bfe774e,2024-09-20T19:31:39.437000 -CVE-2024-50570,1,1,f9157bc75575272446e4073921d61d6ebbbed4953349b34b8c3f0c79945a24c4,2024-12-18T13:15:06.723000 +CVE-2024-50570,0,1,656c45b6a78bd12c8be76f16ba1ffd796360a02af9369e6704fbe99b4c8d1f89,2024-12-18T15:15:12.660000 CVE-2024-50572,0,0,87b1aa24f79c401027b600910fcd433cb81a62e025ef81c863f015edbd3acb6f,2024-11-13T19:59:16.777000 CVE-2024-50573,0,0,5e3f4c1fdb2489361c9b59a48c617ae9eab2b22b74a42b1c1ca13ebdc04a62f4,2024-10-29T17:12:14.760000 CVE-2024-50574,0,0,19a8794809392a79fd68e4eae98e9cf9304f94ab7b7bbefdac60fad919a3e7be,2024-10-29T17:16:11.277000 @@ -268188,7 +268195,7 @@ CVE-2024-51163,0,0,909afcfaa554939e2c78d7e7af80c5c6961aa7c27e1f5cf118fbed2c52564 CVE-2024-51164,0,0,d940764ceb362d708d88f9f5a08c2c1f5532b8b37b034d71dff6267e64a0a937,2024-12-09T17:15:09.107000 CVE-2024-51165,0,0,fb13fc4e35d92e7921bbef9ce68653c7bfa08c0c1cb970241bfa8c45e1d3cd41,2024-12-11T15:15:15.067000 CVE-2024-5117,0,0,5e271946d97109af9825c50a9b323ef04401bb4942989f9cb9a1e16ac2b2951d,2024-11-21T09:47:00.397000 -CVE-2024-51175,0,0,8b124ed125e4290ebc7e2820a7508eb560e9667a033dcad77d17b3f76c38d839,2024-12-17T22:15:06.967000 +CVE-2024-51175,0,1,dce24c1eaf11861a84455f13a86f07726c40e17157f133b2e3dae094c593cd8d,2024-12-18T16:15:13.807000 CVE-2024-51179,0,0,857fcabc550df085f68e65184c598436a379cf4f02ab73f3edfe252d5c778dbf,2024-11-13T20:35:10.303000 CVE-2024-5118,0,0,d1846e4a7219ebf75ef8c1b0d7fa03dde76ecbba746e36b5705002065c1088bf,2024-11-21T09:47:00.520000 CVE-2024-51180,0,0,d73a4bc4d13930db91fa8b4827a1f38d71bad2587cedb5ac7ed1fc13326493e8,2024-11-04T13:37:15.737000 @@ -268306,7 +268313,7 @@ CVE-2024-51489,0,0,fee4ce2f3b921e5364e523268cdb4b484a8c65d64be4c59f477d40e226367 CVE-2024-5149,0,0,afb83ca572eb753fdcb6786ae747885cb6d3501e72a1f00595e91c4c4528be83,2024-11-21T09:47:04.267000 CVE-2024-51490,0,0,afa618adfe44ac20c77d2ef3b8a8503a964784c38cf29e6f924fdca9d564accf,2024-11-14T20:13:01.587000 CVE-2024-51492,0,0,033f3b3764a927ebfe5932515c3e806cbe0b3ee319f77a5ff6b6235b21773605,2024-11-01T21:15:15.080000 -CVE-2024-51493,0,0,581d61acf6b2a6411c0b099fc844a7c750b289c8e1f9b58c4a3e6f901f08c9d7,2024-11-06T18:17:17.287000 +CVE-2024-51493,0,1,eb28e87be49323e583a476d82d4acd2cdc1dda50d07ada4162428002028ecc66,2024-12-18T16:34:37.497000 CVE-2024-51494,0,0,e7db54adc858b5ec905948b1ff770c8ac2a5ba1e309a5e79cdf3f488969e4e20,2024-11-20T14:40:56.067000 CVE-2024-51495,0,0,0b82f050cc5432a34e733e3193b547474d84296d541583e9f04afbddacff8214,2024-11-20T14:41:07.960000 CVE-2024-51496,0,0,c7953a751a828994c420ea0a9571e994d55971e9bb348b8095d7f01580aecd3c,2024-11-21T23:33:42.223000 @@ -268457,7 +268464,7 @@ CVE-2024-51642,0,0,5152e85707089a7f3186d35c0774851bc910b269c16bcf282f6f8c964d97d CVE-2024-51643,0,0,6cd95bcb0b7533023b50646b0fac301aca8db2d6cdd664093da0890b1d9cb32a,2024-11-19T21:57:32.967000 CVE-2024-51644,0,0,34e478edea57d0615ca8c922c7e7d4b0973519169e85ccc175b6a394b6401123,2024-11-19T21:57:32.967000 CVE-2024-51645,0,0,06028be70e3cbb5560cab4fc4dcc9fdb4e95ab08be7c034a585406faa5e25e73,2024-11-19T21:57:32.967000 -CVE-2024-51646,0,0,b391865e870d9134387057bc06f0e5d67ed66c2d1ef2083a2b758d08cb39d757,2024-12-18T12:15:10.270000 +CVE-2024-51646,0,1,1519fb94dc9c18fc26717442707cf90689c24b551873d4ec42db9e4a2a935e94,2024-12-18T15:15:13.100000 CVE-2024-51647,0,0,0324321535da7d43ca4deac4fdb3c1e7d74c19d7383440bb5b1349d55f97e233,2024-11-12T13:56:24.513000 CVE-2024-51648,0,0,dbb0968afe4034eda92af49d97342dc91c1ea36f66d8dfaf80e8afd706de0c57,2024-11-19T21:57:32.967000 CVE-2024-51649,0,0,c81969392142cf30b442ca2488ba5a508853d5d91fdf922f672d341833d4b7a4,2024-11-19T21:57:32.967000 @@ -268917,6 +268924,7 @@ CVE-2024-52358,0,0,eff777e3be5ddb169c3548cec44602bbe2f0db010fa6395da9f6055a387be CVE-2024-52359,0,0,509efcb95ef880ccde43fccb440c416e0525cc864ec20eeb05761e61ccf2af92,2024-11-19T21:56:45.533000 CVE-2024-5236,0,0,2567479af261d5b21b924e08416f98f775dfb54600e5bcd680efa9c7d4ca6153,2024-11-21T09:47:14.757000 CVE-2024-52360,0,0,bdf752aab28a84a7b3de79826a68d96a66c86dd4dcfd4d6f09f0c3b534e4dfec,2024-11-19T21:56:45.533000 +CVE-2024-52361,1,1,f4c649a700356a9f12fca9f45826e9542bf30f938709e94af9bb05088c18f829,2024-12-18T16:15:13.967000 CVE-2024-52369,0,0,e081cda06af085b69b5cce5744190264c91cd87aef2aa4d459e7fe8f2ad5e6bb,2024-11-15T13:58:08.913000 CVE-2024-5237,0,0,850239c5226c0c64e0e8de715a204a907770a544458b3a79e6f4fcfb6446a2ec,2024-11-21T09:47:14.890000 CVE-2024-52370,0,0,d2931a84b2cf7b14e018c99dc708ce275e6f773b3432c9c5f476dcff0fb41c95,2024-11-15T13:58:08.913000 @@ -269220,11 +269228,11 @@ CVE-2024-52816,0,0,65718f19cb2a012b57ef8da79137eacc99e273905d4b5a57cf388720343e4 CVE-2024-52817,0,0,efe63aa74be98b62fb8efa77a61c6f381ccaef4b4fb5791a86cabb88197bdeaa,2024-12-17T16:15:10.480000 CVE-2024-52818,0,0,dcc413435dcf9a0af7b50af7ae991dda0838f2f16eef7b8a7c245b50433a355c,2024-12-17T16:15:02.203000 CVE-2024-5282,0,0,4f51eeaed389eb920a9aeb3a8c1e7ea5a9931768c3b7eb6744dae1b0adac061c,2024-11-21T09:47:20.920000 -CVE-2024-52822,0,1,b22cafd5257f10f5073e0f374a0d447cde3ff37287c43d6b35cf7538951510ff,2024-12-18T14:35:48.033000 -CVE-2024-52823,0,1,60a92de261074317b7fbcbb26089c290cd6b225912af8fc2c46673befce41c22,2024-12-18T14:35:57.397000 -CVE-2024-52824,0,1,4ad454480717c6a1ddf7ff65bef603b57f7b3fef6a73a54b0be27fbf86e37543,2024-12-18T14:36:05.817000 -CVE-2024-52825,0,1,22b446091da7d8a51fc25dc5cd2d4a06d6f87b184dbd7d292030afe026e9d25a,2024-12-18T14:36:15.417000 -CVE-2024-52826,0,1,1cb02c2e1532d9fe3dd2cd2d373f5125d0525c3df87b513eb69078e738134aaa,2024-12-18T14:36:23.140000 +CVE-2024-52822,0,0,b22cafd5257f10f5073e0f374a0d447cde3ff37287c43d6b35cf7538951510ff,2024-12-18T14:35:48.033000 +CVE-2024-52823,0,0,60a92de261074317b7fbcbb26089c290cd6b225912af8fc2c46673befce41c22,2024-12-18T14:35:57.397000 +CVE-2024-52824,0,0,4ad454480717c6a1ddf7ff65bef603b57f7b3fef6a73a54b0be27fbf86e37543,2024-12-18T14:36:05.817000 +CVE-2024-52825,0,0,22b446091da7d8a51fc25dc5cd2d4a06d6f87b184dbd7d292030afe026e9d25a,2024-12-18T14:36:15.417000 +CVE-2024-52826,0,0,1cb02c2e1532d9fe3dd2cd2d373f5125d0525c3df87b513eb69078e738134aaa,2024-12-18T14:36:23.140000 CVE-2024-52827,0,0,4cff649de3d95b42209b4473a6f0f81906bc0ec9497ad33594b5e031c6c755ec,2024-12-13T16:30:28.017000 CVE-2024-52828,0,0,b91fe6328a18fb3b30a5eabdd9d8505c62acd230a6c59a5f57df74efc21022fc,2024-12-13T16:31:44.753000 CVE-2024-52829,0,0,c106e3d1fce91af490fece8750d8c3941c825efb7a57e842b25787e876aa82f3,2024-12-13T17:12:13.453000 @@ -269232,19 +269240,19 @@ CVE-2024-5283,0,0,2e4c0e59b537a1fa6ef21044d27ad6c5c503d962bc23f2bfaaea7d6483dfc4 CVE-2024-52830,0,0,520275838c0dd5c92182498e39edb487b6f8eb3d04d45f85e0b9a800aba0348d,2024-12-13T17:18:43.007000 CVE-2024-52831,0,0,febc6ce542b9dea4fc3ebc985b026e7cd9b8167d00a2e198d286f4415587ad5f,2024-12-13T17:20:24.467000 CVE-2024-52832,0,0,7cffb2271f69c746cdef4738f588d99cba2378e891601a03a56800f8f1a2044d,2024-12-13T17:20:37.987000 -CVE-2024-52833,0,1,751a005b876b2ea1c588dd46853cf3b76001db256f88e1e9dc37654077d36db6,2024-12-18T14:37:46.917000 +CVE-2024-52833,0,0,751a005b876b2ea1c588dd46853cf3b76001db256f88e1e9dc37654077d36db6,2024-12-18T14:37:46.917000 CVE-2024-52834,0,0,347eaba9bc4ad85ef5dbc05cebef0fcb760c58a6d09f0b408ba67fa855d111fa,2024-12-13T17:20:47.050000 CVE-2024-52835,0,0,557a364e982453bccf292c228d0a61611ef88a1259bb5b4c993a22d496fa48bf,2024-12-13T16:13:32.757000 CVE-2024-52836,0,0,bb631b92ccd3891aad956d691a76e9dd7443cb1739d057b2be16684bc359f123,2024-12-13T16:14:29.700000 -CVE-2024-52837,0,1,349efd4e08effcd00056f33be7a4b2cdd210775020cf785043d6f37aea6e53ed,2024-12-18T14:34:46.873000 -CVE-2024-52838,0,1,b60793e4d0224f64023e50b7bc13fab6acdbf2c4e838748a9aacd4fdcdab8a35,2024-12-18T14:34:59.720000 -CVE-2024-52839,0,1,37c691f868df4d2aff4458ac7178866f15a38d17e9534e07c494713eb51f3572,2024-12-18T14:35:11.923000 +CVE-2024-52837,0,0,349efd4e08effcd00056f33be7a4b2cdd210775020cf785043d6f37aea6e53ed,2024-12-18T14:34:46.873000 +CVE-2024-52838,0,0,b60793e4d0224f64023e50b7bc13fab6acdbf2c4e838748a9aacd4fdcdab8a35,2024-12-18T14:34:59.720000 +CVE-2024-52839,0,0,37c691f868df4d2aff4458ac7178866f15a38d17e9534e07c494713eb51f3572,2024-12-18T14:35:11.923000 CVE-2024-5284,0,0,f27d035f8fcaa3c5dd2f39806299edcb6edf39605d373e0e7746729a950daa3c,2024-11-21T09:47:21.243000 -CVE-2024-52840,0,1,8aed5dc01ff182fb548191a463492c217b9fbc9225631748b5d9054898c2eb7a,2024-12-18T14:35:19.387000 +CVE-2024-52840,0,0,8aed5dc01ff182fb548191a463492c217b9fbc9225631748b5d9054898c2eb7a,2024-12-18T14:35:19.387000 CVE-2024-52841,0,0,c8467e34a184eae8ce4b1586866b104207c3fcaa8a38c3dea3df3bb5325a76b9,2024-12-13T16:14:51.557000 CVE-2024-52842,0,0,edbd163abecabb58f05c4fd89ad1573cbbe839ed3c8ab35519a641c99210c33d,2024-12-13T18:24:06.850000 CVE-2024-52843,0,0,5fd72c40f0ae5ad98a380113e9bb4e1565078e456e19e0a3b876eaaefbc71b33,2024-12-13T17:54:11.087000 -CVE-2024-52844,0,1,e95f6733cfd59033d5259410d695702408c383031f175584990ed0b352a90a0b,2024-12-18T14:35:26.830000 +CVE-2024-52844,0,0,e95f6733cfd59033d5259410d695702408c383031f175584990ed0b352a90a0b,2024-12-18T14:35:26.830000 CVE-2024-52845,0,0,5afdf9f50a91c1c6cc8c83e6aba2293e2effe3a02c7213a80cd349be6bfa509e,2024-12-13T17:51:52.947000 CVE-2024-52846,0,0,53ae29cfadfd5847e49bef6406b8098a1a394806f811a3481e607809b9d15215,2024-12-13T17:48:57.057000 CVE-2024-52847,0,0,9e4c91e8efedf4ca2af8b61d77e21f4db510b33eb05aa1fad0ff557e1469568d,2024-12-13T17:46:39.203000 @@ -269321,10 +269329,10 @@ CVE-2024-52990,0,0,1a8258608b63e768b81712a1a814b5b5bd50621818ba954ed68179d4a00a0 CVE-2024-52991,0,0,31b863d2e03e48d18e25f425a4f20cecd39fb1c77024ce95c801312d4f3b7752,2024-12-13T17:27:06.727000 CVE-2024-52992,0,0,4d53291470ab136f27a66ea7467884b716a4a5aea28b831ea4c4a4f7882e290c,2024-12-13T17:26:54.557000 CVE-2024-52993,0,0,db5998c6ae30c948d19b78a1af997a52a94f5ef929b12f2d7b8b14bad2b95a24,2024-12-13T17:26:44.473000 -CVE-2024-52994,0,1,c998bea66b845df8b2b6b90703ba2003e446cba57ceb9d0593eba768fd0209a8,2024-12-18T14:38:48.680000 -CVE-2024-52995,0,1,6a31c320fdfe444795b4f4a7b3ace65e7a30cbacaffe2dd49cd9a4f319f6f559,2024-12-18T14:38:36.227000 -CVE-2024-52996,0,1,352b91e59b5b6883ee5377d034459d1c8e41fed8425d131ce1df9a0a25e0e58e,2024-12-18T14:38:24.727000 -CVE-2024-52997,0,0,4bab8dd1c249700329744c631b9c50fcd74d421720a6dd9cecd7f81f37dea809,2024-12-10T21:15:19.740000 +CVE-2024-52994,0,0,c998bea66b845df8b2b6b90703ba2003e446cba57ceb9d0593eba768fd0209a8,2024-12-18T14:38:48.680000 +CVE-2024-52995,0,0,6a31c320fdfe444795b4f4a7b3ace65e7a30cbacaffe2dd49cd9a4f319f6f559,2024-12-18T14:38:36.227000 +CVE-2024-52996,0,0,352b91e59b5b6883ee5377d034459d1c8e41fed8425d131ce1df9a0a25e0e58e,2024-12-18T14:38:24.727000 +CVE-2024-52997,0,1,697d46fe395eee9e632e6124f6d3fe636de19be7b4a8659655832bde87ad8ebc,2024-12-18T15:14:35.513000 CVE-2024-52998,0,0,6290b7bcb6009685ce74422e3ebe6e84d8aa2373cdb09dbaf200385294d7d729,2024-12-03T14:32:51.580000 CVE-2024-52999,0,0,33d693dd8ea7b996acf75cfb9082fde4a08b008c5d482a4ef8516eb8f33def3e,2024-12-12T18:52:43.880000 CVE-2024-53000,0,0,630659d15fdc5bad4e6f03fdea846c346398b9852520417b1b8921c8c6a6d970,2024-12-12T18:49:40.543000 @@ -269785,8 +269793,8 @@ CVE-2024-53947,0,0,b42db7838a4330c67a4fe62e48645e7bfb198c9a3c642c30c8c0bf4ba786d CVE-2024-53948,0,0,589d596ec1037b170a013fb9a9684519d93fddab1a0d95435f11b953389a4b4e,2024-12-09T18:15:23.893000 CVE-2024-53949,0,0,80c64f01ed1e717784a7e12e62d1542fa35c57ae831dd3df9e1a9467dad60834,2024-12-09T18:15:24.013000 CVE-2024-5395,0,0,aa518ac6cc2e8e3e116d2e709097641ebff6dab87bd1ab80d2e397c0f6317f19,2024-11-21T09:47:34.290000 -CVE-2024-53951,0,0,460ff34eb07cb16bc696304d7cc5390e00423280a9e9278aef0f9642dbc82d53,2024-12-10T21:15:20.167000 -CVE-2024-53952,0,0,477fcdf2f824403cf035b81cb14addf0a6e3be35948c5962c9d2ab3ea7d057cd,2024-12-10T21:15:20.307000 +CVE-2024-53951,0,1,bed406754e2e414b104efd3eb1c72bdfbbfd0447862bc041d6f24ed2188caeb2,2024-12-18T15:08:14.407000 +CVE-2024-53952,0,1,e709da7c68f85daad426a8b159797750fb6868aacc174441eebd3216c961f6c5,2024-12-18T15:07:51.167000 CVE-2024-53953,0,0,e8e224e197b12492e1ebf9fd6d8d460660d01143e19ca6d1c5663ca5b7e6d09b,2024-12-10T21:15:20.437000 CVE-2024-53954,0,0,0db97b622b3553347d9d9e56143b3479938cbd9d92f9460359ff19e88af9903c,2024-12-10T21:15:20.560000 CVE-2024-53955,0,0,8aa46e10bc17559dbedd3ecdffab1753d45263b50071af9071472921d4bbee43,2024-12-13T18:29:02.127000 @@ -269829,20 +269837,20 @@ CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159 CVE-2024-54032,0,0,09cba91a1df36e472a78f8f144bb0e8b61b676d406db1792f2031c6b3f2fb2b6,2024-12-10T21:15:20.690000 CVE-2024-54034,0,0,966edd017a57a1808f5de74caa3cb2bc440d3f55cf34a20417d369b2c7aa38e8,2024-12-10T21:15:20.817000 CVE-2024-54036,0,0,3018605477ed7dbca479c548307fd9bd3dfad4d0112e1f577cf4e868d3c9a01b,2024-12-10T21:15:20.947000 -CVE-2024-54037,0,1,f556890ba3fe80df125187ebcadddc7ae2b89a3c8454bb4084a0b553458107af,2024-12-18T14:40:29.303000 +CVE-2024-54037,0,0,f556890ba3fe80df125187ebcadddc7ae2b89a3c8454bb4084a0b553458107af,2024-12-18T14:40:29.303000 CVE-2024-54038,0,0,92ce715c583f62225c8c85cc0d83f79cb82abf9ebe1a12a974431832bf726201,2024-12-10T21:15:21.210000 -CVE-2024-54039,0,1,71aebf25c5147d9790628c00b402ce1cee82b243f9de77d9f70b222872f7f46c,2024-12-18T14:40:37.587000 +CVE-2024-54039,0,0,71aebf25c5147d9790628c00b402ce1cee82b243f9de77d9f70b222872f7f46c,2024-12-18T14:40:37.587000 CVE-2024-5404,0,0,3740c7be3046d2190332188e66ec21e8b1d4282df75b875095c31d64e80fbe92,2024-11-21T09:47:35.213000 -CVE-2024-54040,0,1,13233b484ebb0fc9bf3b9db7209ca33808cdf1c4b9bbbc04e46251909657b46e,2024-12-18T14:40:44.710000 -CVE-2024-54041,0,1,d9bcc030129bf6dec82b04a143991ef06874386036703482c0d5681793cd304a,2024-12-18T14:40:52.247000 -CVE-2024-54042,0,1,d205e714ae3b471ec5751c4d7d1256e8dde35c581fdb843feba182830d6e5b5b,2024-12-18T14:41:18.750000 -CVE-2024-54043,0,1,a09d048cd5fad08e1c76aae1659cafdd14c558b6d3443af54df5e3f9eb9a7869,2024-12-18T14:41:29.400000 -CVE-2024-54044,0,1,00a7a44023c704d5d2eeeaa4254894fe51a133f16d96695f5d6e03479217de9e,2024-12-18T14:41:48.010000 -CVE-2024-54045,0,1,16afccc174d0d1eb47914c68c8c94946afb636a9e0351682dbd249dbd8289141,2024-12-18T14:41:55.727000 -CVE-2024-54046,0,1,886025f67a00b517cf304eea4a10a7bff2cdeb7eb08408123ad3b2b3ebc95f79,2024-12-18T14:42:06.897000 -CVE-2024-54047,0,1,e9a3750e3cf6d428500a5ecf267ff6e8fa190a5d46e36bbbc36c6a5f87e787ea,2024-12-18T14:42:14.767000 -CVE-2024-54048,0,1,1732d4671bbeea0157b6640f3723e4501447d2b687ba3a9a6cb84ef94950a1a8,2024-12-18T14:42:22.940000 -CVE-2024-54049,0,1,b25add6c7f4972fe04c3adfdc0b2278f3dba4fd570c385f036735c8663a66627,2024-12-18T14:42:33.907000 +CVE-2024-54040,0,0,13233b484ebb0fc9bf3b9db7209ca33808cdf1c4b9bbbc04e46251909657b46e,2024-12-18T14:40:44.710000 +CVE-2024-54041,0,0,d9bcc030129bf6dec82b04a143991ef06874386036703482c0d5681793cd304a,2024-12-18T14:40:52.247000 +CVE-2024-54042,0,0,d205e714ae3b471ec5751c4d7d1256e8dde35c581fdb843feba182830d6e5b5b,2024-12-18T14:41:18.750000 +CVE-2024-54043,0,0,a09d048cd5fad08e1c76aae1659cafdd14c558b6d3443af54df5e3f9eb9a7869,2024-12-18T14:41:29.400000 +CVE-2024-54044,0,0,00a7a44023c704d5d2eeeaa4254894fe51a133f16d96695f5d6e03479217de9e,2024-12-18T14:41:48.010000 +CVE-2024-54045,0,0,16afccc174d0d1eb47914c68c8c94946afb636a9e0351682dbd249dbd8289141,2024-12-18T14:41:55.727000 +CVE-2024-54046,0,0,886025f67a00b517cf304eea4a10a7bff2cdeb7eb08408123ad3b2b3ebc95f79,2024-12-18T14:42:06.897000 +CVE-2024-54047,0,0,e9a3750e3cf6d428500a5ecf267ff6e8fa190a5d46e36bbbc36c6a5f87e787ea,2024-12-18T14:42:14.767000 +CVE-2024-54048,0,0,1732d4671bbeea0157b6640f3723e4501447d2b687ba3a9a6cb84ef94950a1a8,2024-12-18T14:42:22.940000 +CVE-2024-54049,0,0,b25add6c7f4972fe04c3adfdc0b2278f3dba4fd570c385f036735c8663a66627,2024-12-18T14:42:33.907000 CVE-2024-5405,0,0,8df36cd9ebb4aacfaea97c0ae9188e72e9768324f03849be72121f482af48749,2024-11-21T09:47:35.333000 CVE-2024-54050,0,0,ee890076fea5f3ad9c6bc161fd143e9721aca9308eee09b7d2528e630a5ae13a,2024-12-10T21:15:22.767000 CVE-2024-54051,0,0,0b1f5c4d6a6660f6eca551d294b306144268ea170824a2e433c9ff96bee1678e,2024-12-10T21:15:22.927000 @@ -270203,7 +270211,7 @@ CVE-2024-54498,0,0,fc98c473c1335953bb96a6e6cd9754f341ebec98c3d5942a318f55432f437 CVE-2024-5450,0,0,24d03210219d9f2f3eeb200aadfbbd2297fa2c6b8d7ee9efe09cbafc9256a693,2024-11-21T09:47:42.517000 CVE-2024-54500,0,0,657f282c345a307f53f35dde04bf557f78e33359ddf485d7b8b3507dfe14769f,2024-12-13T18:34:26.490000 CVE-2024-54501,0,0,53a4207c1a9b8c09d2aa36aac95634b59bf35106c5d727899990d0735b43a2db,2024-12-12T17:15:10.837000 -CVE-2024-54502,0,1,0d530603cb62daf612c8e9f528cce0e30598037590c6f193eadb47d9a4b82777,2024-12-18T14:13:13.297000 +CVE-2024-54502,0,0,0d530603cb62daf612c8e9f528cce0e30598037590c6f193eadb47d9a4b82777,2024-12-18T14:13:13.297000 CVE-2024-54503,0,0,e82e1cc53ce4edc412c3815492fda2911d5e300ada63831244d44df64c1dffb7,2024-12-13T19:15:09.727000 CVE-2024-54504,0,0,bb03ec612268af63063ae51e589216e30653413b6baaf8d7e8860c5e5b629ab1,2024-12-16T18:15:11.317000 CVE-2024-54505,0,0,a90c7f848a0c4214637edeae9c3a0316f06e116644b32639b5ba817d96b2ce78,2024-12-13T18:43:13.217000 @@ -270212,10 +270220,10 @@ CVE-2024-54508,0,0,d56b4a8254b12af7295bad2aeed77ff208b735dc12ecbae90c5116eeac15d CVE-2024-5451,0,0,20c45f860616b7f2fb649e3fe37f7d2b12e76160bf7131f2da5e11d5d4dbf253,2024-11-21T09:47:42.677000 CVE-2024-54510,0,0,41760ed29ca005a3bcf19679bc5f9d3112d6162f99c7272e8e6073225291c2cc,2024-12-13T18:07:49.633000 CVE-2024-54513,0,0,59e90aab7af338ce166e9f6872df66dd31c7c6fbffec6972f97a29bde7559e69,2024-12-13T18:09:28.273000 -CVE-2024-54514,0,1,6d1b7501f54b581c9fad4ccbc7c7ec7f90e2e83a8a1d8bac1a1733a97e309873,2024-12-18T14:05:50.673000 +CVE-2024-54514,0,0,6d1b7501f54b581c9fad4ccbc7c7ec7f90e2e83a8a1d8bac1a1733a97e309873,2024-12-18T14:05:50.673000 CVE-2024-54515,0,0,c445bd848e4bc13ffd78ff33c0ea49b95c8a73b35bda3dc25adccc76a7fc0eac,2024-12-13T18:15:31.650000 CVE-2024-5452,0,0,b01b2e3bd56dc4d1c97364b861c6906ac1d43b69b37e06474f7fb830a26b907e,2024-11-21T09:47:42.793000 -CVE-2024-54524,0,1,f1841b79a984dc339395e420615a7246f02aaa993793861427c269ef59ff9324,2024-12-18T13:59:47.450000 +CVE-2024-54524,0,0,f1841b79a984dc339395e420615a7246f02aaa993793861427c269ef59ff9324,2024-12-18T13:59:47.450000 CVE-2024-54526,0,0,aefe7086f2d764fc872d00eaa2f2173838af254c5b93971d556108953f443875,2024-12-16T22:15:07.320000 CVE-2024-54527,0,0,0bdb505436860de3001c9f8bc7d8b06aed949a47878b0053a48f86090c332969,2024-12-16T19:15:09.313000 CVE-2024-54528,0,0,907ebed6815f9bd0b298566a5f1bfb05901aa5e62ed532357217cb276556f398,2024-12-16T19:15:09.480000 @@ -270234,7 +270242,7 @@ CVE-2024-5464,0,0,255f781a5f94f0faf95d7c73d6b2015838426915e8e0274a4b6257e37377ce CVE-2024-5465,0,0,d854caa252ac359088449fa3628f1e50a198f1dced6d951af90835f292847339,2024-11-21T09:47:44.140000 CVE-2024-5466,0,0,aeb87495bff32a890c0c9e42c15ed7e8404f17a4b772443295fb3ce14954ee66,2024-08-27T13:32:50.803000 CVE-2024-54661,0,0,ea173308d01492e6ad07a3ec27afc15cbcb8638753fa723cdd20d4babce89e4a,2024-12-04T15:15:17.580000 -CVE-2024-54662,0,0,4b3cc401c16de805039d486416505e182a5182a77c3b733db40dc7eb3914b4c1,2024-12-17T18:15:24.963000 +CVE-2024-54662,0,1,7255232e2c08d9e5650dac13dce7847b8e812ec4972f21b97c03985763e3c9d0,2024-12-18T16:15:14.220000 CVE-2024-54664,0,0,d20f70ea69f653338f16a7f1cc2d57f70600da4ca2ed7cb633c4eef98563304e,2024-12-04T15:15:18.093000 CVE-2024-5467,0,0,2029498ebdad4a454f5caa2d83ff2ed9d9f9d3c1e65d4417cbe9e14c059a84f9,2024-08-27T14:35:48.977000 CVE-2024-54674,0,0,545e92efc26fab029b2ecd902e6764f6f53f740b5b32d49c4c8440f2592a5a00,2024-12-05T19:15:08.947000 @@ -270309,8 +270317,8 @@ CVE-2024-5504,0,0,7dafb0f0cd419f596fa945f00f7adb9bf7572316e58a9dc5a4cc280c9eb8f4 CVE-2024-5505,0,0,ef8367efb8e62f4d28c1b33787b307fdb06367b98441e7dd6605a6aed68ed8eb,2024-11-21T09:47:50.067000 CVE-2024-55056,0,0,8ecefeb2ba5c634e5ee3b18d572e93584ac9379c29bff9ede0039b41306daa34,2024-12-17T22:15:07.217000 CVE-2024-55057,0,0,d4a11f470aa132dff4f94bbe7e0062e8d77100b715a593d57c3536d628bebaae,2024-12-17T22:15:07.383000 -CVE-2024-55058,0,0,2f2aba3dd037bf0055bb3c5645f774a7d5dfd96bbfd6a1af81c9c76ac305fc20,2024-12-17T21:15:08.510000 -CVE-2024-55059,0,0,4f3c9e3d452edfc50b4e6283779209dc0f0ecb0fc651927063629cf50579f029,2024-12-17T21:15:08.643000 +CVE-2024-55058,0,1,ee67ebced114eca3cea2119b29a662b36d3ee61adc9f37c78a8e5a0ab7a3bae1,2024-12-18T16:15:14.400000 +CVE-2024-55059,0,1,fe565951d935da233adc7e847414e185526505b80445d8ef8d941eb8351af124,2024-12-18T16:15:14.560000 CVE-2024-5506,0,0,3a939cb8d1b19c0888bb3cd98071317aca0cf323e5a9cf329a9932ae18f6a99c,2024-11-21T09:47:50.193000 CVE-2024-5507,0,0,cabca8bddf4a6d02e76f27981f16e33bb9535f789d53e187a16cce78138edc2d,2024-11-21T09:47:50.337000 CVE-2024-5508,0,0,115a25c08f43d4b8fec19f2a1d9db4d23c6ce2518b2cd0371fc64ad26ff5bfe0,2024-11-21T09:47:50.463000 @@ -270363,10 +270371,10 @@ CVE-2024-55496,0,0,4a3321851c89fc343921299c0a2d1c4d4d998fd1f65ffe9f84e4d2aab27cd CVE-2024-5550,0,0,4077662850b9d5945d5c85ce45904d9c2783b7c7a72633a9665404cf6f9e870c,2024-11-21T09:47:54.640000 CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000 CVE-2024-5551,0,0,7ca1b2f3592d8c197217d4f6bb2a217c73a396396bc14275921b16391f97198d,2024-11-21T09:47:54.770000 -CVE-2024-55513,0,0,e8128c3faa8b6ee7423298d6c77a76ae101656d5ee5c208243eea883336b0f8d,2024-12-17T20:15:22.623000 -CVE-2024-55514,0,0,7b02b5314417a76c51ec5f5eb3c69969a975409bf63e022c30673390e3ed54d1,2024-12-17T20:15:22.757000 -CVE-2024-55515,0,0,9ee346cc1904d2fb7ec93168467b98c46736168ade3d83bcf8597a0cb408dbfd,2024-12-17T20:15:22.887000 -CVE-2024-55516,0,0,91019395bf4cb5934a66414c0e914d28149ba8e5b1efd3b0cf8a369968f260ca,2024-12-17T20:15:23.020000 +CVE-2024-55513,0,1,2c70feb0b3a4b5910e279bea5f5b31284be91bf824e57138502d2e4a1a6f68ec,2024-12-18T16:15:14.720000 +CVE-2024-55514,0,1,aa89c1ff2eec24c5fad92134c8d185f78ce2cace8089f0502184ccc069428486,2024-12-18T16:15:14.900000 +CVE-2024-55515,0,1,ffebcafb628a4b9f4cc11e88d5f21d43275dad2022ff58445db975f17323a106,2024-12-18T16:15:15.090000 +CVE-2024-55516,0,1,fd2a950d39683478da1d779965aef343ae97bc2efe5cdfcf82ab5dddcb1f1bc1,2024-12-18T16:15:15.263000 CVE-2024-5552,0,0,779c8b119b5a7bc042c6e25c9be4959c8015ea49092434c017d15512182ef4be,2024-11-21T09:47:54.927000 CVE-2024-5553,0,0,c6aeec952a2778be27c1792a1d1c97b8ff8c01ca6ed08226c6b506a6f771b767,2024-11-21T09:47:55.040000 CVE-2024-5554,0,0,3fb8d13bac6e351fa1470fa96b8178263946ef86d2aae872feb00193d95f3ac4,2024-11-21T09:47:55.160000 @@ -270527,18 +270535,18 @@ CVE-2024-5609,0,0,4c03a855f07c8ea18d8e7a70e1e2d3467f32254daea5abf62f130fb919fa93 CVE-2024-5611,0,0,52c51c7a288f3c0ab122ffc809ef2624c3045fff37cac024f8608d70739aac41,2024-11-21T09:48:00.920000 CVE-2024-56112,0,0,c0764d57c8621e012754919d62c22e086c1612ad1fec50477bfc7128c3e19f91,2024-12-16T16:15:10.313000 CVE-2024-5612,0,0,fa9f2c267dc0651754a7af098fdc2eb62147cefb9c269a544f85a4928011ea0a,2024-11-21T09:48:01.037000 -CVE-2024-56128,1,1,1d3914c35096298dd539210dd18a0cbe7523f2850a4adc631b73c19bf299d23e,2024-12-18T14:15:23.277000 +CVE-2024-56128,0,0,1d3914c35096298dd539210dd18a0cbe7523f2850a4adc631b73c19bf299d23e,2024-12-18T14:15:23.277000 CVE-2024-5613,0,0,7adefd0ffa78c5730a0bdb9525773949feed9eb79c6b9e6014b5dbc5d6f802b4,2024-11-21T09:48:01.160000 CVE-2024-56139,0,0,51f3702c94f0ffd91c7bd6b4a37a8fbb30240d1963c2f10d645e10159f128016,2024-12-17T19:15:07.010000 CVE-2024-5614,0,0,dbfe1b67548311692c56bb8d68c3048c964ba6dbbed397928536eff3aafacba1,2024-11-21T09:48:01.283000 -CVE-2024-56142,0,0,0eaecd6abe2a038bf7ddb173102d5629c82133d68dd20dd37bd3eaa8672bba93,2024-12-17T22:15:07.547000 +CVE-2024-56142,0,1,46ee75dbf053d17753747d6ac8d88a6799cb24a1d693104ad554a951c48b711e,2024-12-18T16:15:15.433000 CVE-2024-5615,0,0,37856ff1a2df0ee42bdd2faed17aef170393a5807410ba1a41f1c8e8ad65ffc3,2024-11-21T09:48:01.413000 CVE-2024-5616,0,0,423edee4a921052dcb3d8ded851b7450a0c7bfa0bf926ae022e11e86747b1818,2024-11-21T09:48:01.540000 CVE-2024-56169,0,0,2f44b9b9fae0fb43dd077aa410d4ee16cde281ba4890fbc569e3bb73e5dfcd66,2024-12-18T05:15:08.853000 CVE-2024-56170,0,0,9b8befbbd3944be307d2b653c076f5fc24431389b70428ecce1285ef4c9e5881,2024-12-18T05:15:09.093000 -CVE-2024-56173,0,0,360085e2959874efab59cf9542a8da80ade5bbcf1057d27c6ac53840c4f6e7ab,2024-12-18T06:15:23.780000 +CVE-2024-56173,0,1,d27f85fb5ccf394a473d62aede079c2e88f65539a2799db763caec8defdf8851,2024-12-18T16:15:15.600000 CVE-2024-56174,0,0,c32908e95d32eb409ca07bb0e796c53283e7916d5b172fc8efa0f2fe8d44cad2,2024-12-18T06:15:23.930000 -CVE-2024-56175,0,0,0ceacba67e2ee6862224e5810d0bba40b345e27a458f1ada5a83a8c2215f4d9c,2024-12-18T06:15:24.087000 +CVE-2024-56175,0,1,408a6ec00d952056b6a9408423aefbe025d6548c36b5e25ebb7a7240d38d3e1e,2024-12-18T15:15:13.723000 CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000 CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000 CVE-2024-5620,0,0,240638ef58a29a459ed1037710fcf1b7e875e31a78e263978233bb4c4a8442da,2024-11-21T09:48:01.930000