Auto-Update: 2024-12-18T17:00:21.670180+00:00

This commit is contained in:
cad-safe-bot 2024-12-18 17:03:46 +00:00
parent 6fc7da1490
commit 6260462b8f
60 changed files with 2768 additions and 267 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-13311",
"sourceIdentifier": "security@android.com",
"published": "2024-11-15T22:15:14.240",
"lastModified": "2024-11-19T17:35:01.903",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T15:00:52.703",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,50 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "09E6085C-A61E-4A89-BF80-EDD9A7DF1E47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D835D592-2423-44C6-804A-3AD010112E7C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "568E2561-A068-46A2-B331-BBA91FC96F0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B578E383-0D77-4AC7-9C81-3F0B8C18E033"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-05-01",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-9471",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.500",
"lastModified": "2024-11-21T13:57:24.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T16:50:18.380",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,56 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "09E6085C-A61E-4A89-BF80-EDD9A7DF1E47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D835D592-2423-44C6-804A-3AD010112E7C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "568E2561-A068-46A2-B331-BBA91FC96F0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B578E383-0D77-4AC7-9C81-3F0B8C18E033"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8DFAAD08-36DA-4C95-8200-C29FE5B6B854"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-9472",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.550",
"lastModified": "2024-11-21T13:57:24.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T15:26:01.343",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,51 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "09E6085C-A61E-4A89-BF80-EDD9A7DF1E47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D835D592-2423-44C6-804A-3AD010112E7C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "568E2561-A068-46A2-B331-BBA91FC96F0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B578E383-0D77-4AC7-9C81-3F0B8C18E033"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-9474",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.610",
"lastModified": "2024-11-21T13:57:24.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T15:20:06.503",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,56 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "09E6085C-A61E-4A89-BF80-EDD9A7DF1E47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D835D592-2423-44C6-804A-3AD010112E7C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "568E2561-A068-46A2-B331-BBA91FC96F0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B578E383-0D77-4AC7-9C81-3F0B8C18E033"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8DFAAD08-36DA-4C95-8200-C29FE5B6B854"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-9475",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.670",
"lastModified": "2024-11-21T13:57:24.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T15:13:24.400",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,56 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "09E6085C-A61E-4A89-BF80-EDD9A7DF1E47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D835D592-2423-44C6-804A-3AD010112E7C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "568E2561-A068-46A2-B331-BBA91FC96F0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B578E383-0D77-4AC7-9C81-3F0B8C18E033"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8DFAAD08-36DA-4C95-8200-C29FE5B6B854"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3309",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-06-18T12:15:09.267",
"lastModified": "2024-11-21T08:16:58.873",
"lastModified": "2024-12-18T16:15:10.390",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -83,7 +83,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -151,6 +151,13 @@
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://kr1shna4garwal.github.io/posts/cve-poc-2023/#cve-2023-3309",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34990",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-12-18T13:15:05.547",
"lastModified": "2024-12-18T13:15:05.547",
"lastModified": "2024-12-18T15:15:06.137",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-23"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-44379",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-22T15:15:08.060",
"lastModified": "2024-11-21T08:25:46.857",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T16:54:13.977",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -49,32 +69,78 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.0.9",
"matchCriteriaId": "26BF6684-E207-4771-9223-1B473F279058"
}
]
}
]
}
],
"references": [
{
"url": "https://basercms.net/security/JVN_73283159",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/baserproject/basercms/commit/18549396e5a9b8294306a54a876af164b0b57da4",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/baserproject/basercms/security/advisories/GHSA-66c2-p8rh-qx87",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://basercms.net/security/JVN_73283159",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://github.com/baserproject/basercms/commit/18549396e5a9b8294306a54a876af164b0b57da4",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/baserproject/basercms/security/advisories/GHSA-66c2-p8rh-qx87",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2023-50956",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-12-18T16:15:10.597",
"lastModified": "2024-12-18T16:15:10.597",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Storage Defender - Resiliency Service 2.0.0 through 2.0.9 \n\ncould allow a privileged user to obtain highly sensitive user credentials from secret keys that are stored in clear text."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-256"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7178587",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-51450",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-22T15:15:08.290",
"lastModified": "2024-11-21T08:38:08.650",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T16:55:17.013",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
@ -49,32 +69,78 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:basercms:basercms:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.0.9",
"matchCriteriaId": "26BF6684-E207-4771-9223-1B473F279058"
}
]
}
]
}
],
"references": [
{
"url": "https://basercms.net/security/JVN_09767360",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/baserproject/basercms/commit/18f426d63e752b4d22c40e9ea8d1f6e692ef601c",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/baserproject/basercms/security/advisories/GHSA-77fc-4cv5-hmfr",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://basercms.net/security/JVN_09767360",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/baserproject/basercms/commit/18f426d63e752b4d22c40e9ea8d1f6e692ef601c",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://github.com/baserproject/basercms/security/advisories/GHSA-77fc-4cv5-hmfr",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-10892",
"sourceIdentifier": "contact@wpscan.com",
"published": "2024-12-18T06:15:21.567",
"lastModified": "2024-12-18T06:15:21.567",
"lastModified": "2024-12-18T15:15:08.067",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "The Cost Calculator Builder WordPress plugin before 3.2.43 does not have CSRF checks in some AJAX actions, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/ff1f5b84-a8cf-4574-a713-53d35739c6cb/",

View File

@ -0,0 +1,66 @@
{
"id": "CVE-2024-12371",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-12-18T16:15:10.907",
"lastModified": "2024-12-18T16:15:10.907",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A device takeover vulnerability exists in the Rockwell Automation Power Monitor 1000. This vulnerability allows configuration of a new Policyholder user without any authentication via API. Policyholder user is the most privileged user that can perform edit operations, creating admin users and performing factory reset."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"references": [
{
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1714.html",
"source": "PSIRT@rockwellautomation.com"
}
]
}

View File

@ -0,0 +1,66 @@
{
"id": "CVE-2024-12372",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-12-18T16:15:11.050",
"lastModified": "2024-12-18T16:15:11.050",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A denial-of-service and possible remote code execution vulnerability exists in the Rockwell Automation Power Monitor 1000. The vulnerability results in corruption of the heap memory which may compromise the integrity of the system, potentially allowing for remote code execution or a denial-of-service attack."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"references": [
{
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1714.html",
"source": "PSIRT@rockwellautomation.com"
}
]
}

View File

@ -0,0 +1,66 @@
{
"id": "CVE-2024-12373",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-12-18T16:15:11.163",
"lastModified": "2024-12-18T16:15:11.163",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A denial-of-service vulnerability exists in the Rockwell Automation Power Monitor 1000. The vulnerability results in a buffer-overflow, potentially causing denial-of-service."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "PSIRT@rockwellautomation.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"references": [
{
"url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1714.html",
"source": "PSIRT@rockwellautomation.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12658",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-16T18:15:10.120",
"lastModified": "2024-12-16T18:15:10.120",
"vulnStatus": "Received",
"lastModified": "2024-12-18T16:15:11.297",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in IObit Advanced SystemCare Utimate up to 17.0.0 and classified as problematic. This issue affects the function 0x8001E01C in the library AscRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en IObit Advanced SystemCare Ultimate hasta la versi\u00f3n 17.0.0 y se ha clasificado como problem\u00e1tica. Este problema afecta a la funci\u00f3n 0x8001E01C en la librer\u00eda AscRegistryFilter.sys del componente IOCTL Handler. La manipulaci\u00f3n provoca la desreferenciaci\u00f3n de puntero nulo. Se requiere acceso local para abordar este ataque. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.456036",
"source": "cna@vuldb.com"
},
{
"url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E01C-NPD-DOS-15160437bb1e800eb1cadd53b224d088",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12659",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-16T18:15:10.320",
"lastModified": "2024-12-16T18:15:10.320",
"vulnStatus": "Received",
"lastModified": "2024-12-18T16:15:11.500",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in IObit Advanced SystemCare Utimate up to 17.0.0. It has been classified as problematic. Affected is the function 0x8001E004 in the library AscRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en IObit Advanced SystemCare Ultimate hasta la versi\u00f3n 17.0.0. Se ha clasificado como problem\u00e1tica. La funci\u00f3n afectada es 0x8001E004 en la librer\u00eda AscRegistryFilter.sys del componente IOCTL Handler. La manipulaci\u00f3n provoca la desreferenciaci\u00f3n de puntero nulo. Es necesario realizar un ataque local. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.456038",
"source": "cna@vuldb.com"
},
{
"url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E004-NPD-DOS-15160437bb1e804cbe8fd4d826f8564f",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12660",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-16T18:15:10.533",
"lastModified": "2024-12-16T18:15:10.533",
"vulnStatus": "Received",
"lastModified": "2024-12-18T16:15:11.700",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in IObit Advanced SystemCare Utimate up to 17.0.0. It has been declared as problematic. Affected by this vulnerability is the function 0x8001E018 in the library AscRegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad en IObit Advanced SystemCare Ultimate hasta la versi\u00f3n 17.0.0. Se ha declarado como problem\u00e1tica. La vulnerabilidad afecta a la funci\u00f3n 0x8001E018 en la librer\u00eda AscRegistryFilter.sys del componente IOCTL Handler. La manipulaci\u00f3n provoca la desreferenciaci\u00f3n de puntero nulo. Es posible lanzar el ataque en el host local. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.456337",
"source": "cna@vuldb.com"
},
{
"url": "https://shareforall.notion.site/IOBit-Advanced-SystemCare-Utimate-AscRegistryFilter-0x8001E018-NPD-DOS-15260437bb1e80c5ab28da895ed46227",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-1610",
"sourceIdentifier": "security@oppo.com",
"published": "2024-12-18T07:15:07.207",
"lastModified": "2024-12-18T07:15:07.207",
"lastModified": "2024-12-18T16:15:12.060",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -55,6 +55,28 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
@ -67,6 +89,16 @@
"value": "CWE-287"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1284"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21548",
"sourceIdentifier": "report@snyk.io",
"published": "2024-12-18T06:15:23.360",
"lastModified": "2024-12-18T06:15:23.360",
"lastModified": "2024-12-18T15:15:09.947",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -89,6 +89,16 @@
"value": "CWE-1321"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1321"
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21786",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-11-21T15:15:26.580",
"lastModified": "2024-11-21T16:15:22.200",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-18T15:06:28.230",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,51 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:mc-technologies:mc_lr_router_firmware:2.10.5:*:*:*:*:*:*:*",
"matchCriteriaId": "95D3D1A7-DA67-4319-B836-010FCBE4B63C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mc-technologies:mc_lr_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "330D7083-CDC2-4532-8F13-109C8272F5BF"
}
]
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1954",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1954",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-29646",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-17T22:15:06.550",
"lastModified": "2024-12-17T22:15:06.550",
"lastModified": "2024-12-18T16:15:12.513",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Buffer Overflow vulnerability in radarorg radare2 v.5.8.8 allows an attacker to execute arbitrary code via the name, type, or group fields."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Crispy-fried-chicken/0be4a204e7226fa2cea761c09f027690",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-31668",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-17T22:15:06.677",
"lastModified": "2024-12-17T22:15:06.677",
"lastModified": "2024-12-18T16:15:12.693",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "rizin before v0.6.3 is vulnerable to Improper Neutralization of Special Elements via meta_set function in librz/analysis/meta."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Crispy-fried-chicken/cb0b3a653a43a2fe2361641eddd8330d",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-39755",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-10-03T16:15:05.230",
"lastModified": "2024-11-21T09:28:20.680",
"lastModified": "2024-12-18T15:15:10.370",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A privilege escalation vulnerability exists in the Veertu Anka Build 1.42.0. The vulnerability occurs during Anka node agent update. A low privilege user can trigger the update action which can result in unexpected elevation of privilege."
"value": "A privilege escalation vulnerability exists in the node update functionality of Veertu Anka Build 1.42.0. A specially crafted PKG file can lead to execute priviledged operation. An attacker can make an unauthenticated HTTP request to trigger this vulnerability."
},
{
"lang": "es",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-41163",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-10-03T16:15:05.427",
"lastModified": "2024-11-21T09:32:19.947",
"lastModified": "2024-12-18T15:15:10.730",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A directory traversal vulnerability exists in the archive download functionality of Veertu Anka Build 1.42.0. A specially crafted HTTP request can lead to a disclosure of arbitrary files. An attacker can make an unauthenticated HTTP request to exploit this vulnerability."
"value": "A directory traversal vulnerability exists in the archive functionality of Veertu Anka Build 1.42.0. A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can make an unauthenticated HTTP request to trigger this vulnerability."
},
{
"lang": "es",
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-41922",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-10-03T16:15:05.640",
"lastModified": "2024-11-21T09:33:17.197",
"lastModified": "2024-12-18T15:15:11.163",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A directory traversal vulnerability exists in the log files download functionality of Veertu Anka Build 1.42.0. A specially crafted HTTP request can result in a disclosure of arbitrary files. An attacker can make an unauthenticated HTTP request to trigger this vulnerability."
"value": "A directory traversal vulnerability exists in the log files download functionality of Veertu Anka Build 1.42.0. A specially crafted HTTP request can lead to a disclosure of sensitive information. An attacker can make an unauthenticated HTTP request to trigger this vulnerability."
},
{
"lang": "es",
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43084",
"sourceIdentifier": "security@android.com",
"published": "2024-11-13T18:15:21.100",
"lastModified": "2024-11-15T14:00:09.720",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T16:55:58.837",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -39,14 +59,71 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E"
}
]
}
]
}
],
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/50eec20b570cd4cbbe8c5971af4c9dda3ddcb858",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2024-11-01",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43085",
"sourceIdentifier": "security@android.com",
"published": "2024-11-13T18:15:21.173",
"lastModified": "2024-11-15T14:00:09.720",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T16:57:04.630",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E"
}
]
}
]
}
],
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/2457d4e459ee6ffd099b9ff7cce9c83119c3ce66",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2024-11-01",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43086",
"sourceIdentifier": "security@android.com",
"published": "2024-11-13T18:15:21.240",
"lastModified": "2024-11-15T14:00:09.720",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T16:58:17.253",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E"
}
]
}
]
}
],
"references": [
{
"url": "https://android.googlesource.com/platform/frameworks/base/+/55a3d36701bb874358f685d3ac3381eda10fcff0",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2024-11-01",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-43087",
"sourceIdentifier": "security@android.com",
"published": "2024-11-13T18:15:21.307",
"lastModified": "2024-11-15T14:00:09.720",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T16:59:38.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8538774C-906D-4B03-A3E7-FA7A55E0DA9E"
}
]
}
]
}
],
"references": [
{
"url": "https://android.googlesource.com/platform/packages/apps/Settings/+/6253b87704bb097ad9963941bdddf3b86906a73e",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Mailing List",
"Patch"
]
},
{
"url": "https://source.android.com/security/bulletin/2024-11-01",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-47119",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-12-18T16:15:13.110",
"lastModified": "2024-12-18T16:15:13.110",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Storage Defender - Resiliency Service 2.0.0 through 2.0.9 does not properly validate a certificate which could allow an attacker to spoof a trusted entity by interfering in the communication path between the host and client."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7178587",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-47810",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-12-18T16:15:13.327",
"lastModified": "2024-12-18T16:15:13.327",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A use-after-free vulnerability exists in the way Foxit Reader 2024.3.0.26795 handles a 3D page object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2094",
"source": "talos-cna@cisco.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48889",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-12-18T13:15:06.463",
"lastModified": "2024-12-18T13:15:06.463",
"lastModified": "2024-12-18T15:15:11.713",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49377",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-05T19:15:05.737",
"lastModified": "2024-11-06T18:17:17.287",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T16:31:26.757",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -55,10 +75,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:octoprint:octoprint:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.10.3",
"matchCriteriaId": "97EAFBBD-8434-4B24-9D1B-D4556C5D7996"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-xvxq-g8hw-fx4g",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49535",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T20:15:18.923",
"lastModified": "2024-12-10T20:15:18.923",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T15:07:06.950",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 4.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -51,10 +71,75 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"versionStartIncluding": "20.001.30002",
"versionEndExcluding": "20.005.30748",
"matchCriteriaId": "8629BF4A-1E7E-4EBB-8175-DABB9241A689"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*",
"versionStartIncluding": "24.0.0",
"versionEndExcluding": "24.001.30225",
"matchCriteriaId": "62086AC3-1580-4DC5-93E2-04C7A6F06C45"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"versionEndExcluding": "24.005.20320",
"matchCriteriaId": "8064F314-801F-4BEC-9EE2-120733E8B206"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*",
"versionStartIncluding": "20.001.30002",
"versionEndExcluding": "20.005.30748",
"matchCriteriaId": "89E5AB91-6C0C-47AD-97F1-D5FC4AAEB5DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"versionEndExcluding": "24.005.20320",
"matchCriteriaId": "BBF2907B-0265-4E40-BB1B-772CCF3E67FA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/acrobat/apsb24-92.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49537",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:16.500",
"lastModified": "2024-12-10T21:15:16.500",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T15:21:52.587",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,74 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*",
"versionEndExcluding": "24.6.3",
"matchCriteriaId": "555FF212-0DAE-4781-A17C-44948CAB3E12"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:after_effects:*:*:*:*:*:*:*:*",
"versionStartIncluding": "25.0",
"versionEndExcluding": "25.1",
"matchCriteriaId": "61E0C4A8-15C9-4440-9608-6D6AA7E19AFA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/after_effects/apsb24-95.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49538",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:16.650",
"lastModified": "2024-12-10T21:15:16.650",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T15:17:43.620",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,53 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
"versionEndExcluding": "28.7.3",
"matchCriteriaId": "2B05C45B-2BD0-4B06-86E9-D36E65347264"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:illustrator:29.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FBB72364-8128-4406-BF25-715787B150E1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb24-94.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49541",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:16.793",
"lastModified": "2024-12-10T21:15:16.793",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T15:17:34.523",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,53 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
"versionEndExcluding": "28.7.3",
"matchCriteriaId": "2B05C45B-2BD0-4B06-86E9-D36E65347264"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:illustrator:29.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FBB72364-8128-4406-BF25-715787B150E1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb24-94.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-49576",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-12-18T16:15:13.477",
"lastModified": "2024-12-18T16:15:13.477",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A use-after-free vulnerability exists in the way Foxit Reader 2024.3.0.26795 handles a checkbox CBF_Widget object. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "talos-cna@cisco.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2093",
"source": "talos-cna@cisco.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-4995",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-12-18T12:15:09.940",
"lastModified": "2024-12-18T13:15:06.603",
"lastModified": "2024-12-18T16:15:13.623",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -55,6 +55,28 @@
"providerUrgency": "AMBER"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
@ -67,6 +89,16 @@
"value": "CWE-311"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-4996",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-12-18T12:15:10.120",
"lastModified": "2024-12-18T12:15:10.120",
"lastModified": "2024-12-18T15:15:12.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -55,6 +55,28 @@
"providerUrgency": "RED"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
@ -67,6 +89,16 @@
"value": "CWE-798"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-50570",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-12-18T13:15:06.723",
"lastModified": "2024-12-18T13:15:06.723",
"lastModified": "2024-12-18T15:15:12.660",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 0.6,
"impactScore": 4.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.6,
"impactScore": 4.0
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-312"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
}
],
"references": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51175",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-17T22:15:06.967",
"lastModified": "2024-12-17T22:15:06.967",
"lastModified": "2024-12-18T16:15:13.807",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An issue in H3C switch h3c-S1526 allows a remote attacker to obtain sensitive information via the S1526.cfg component."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
}
],
"references": [
{
"url": "https://github.com/a1drewlong/h3c-S1526/blob/main/Vulnerability%20Cases.md",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-51493",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-05T19:15:07.730",
"lastModified": "2024-11-06T18:17:17.287",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T16:34:37.497",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,76 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-620"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:octoprint:octoprint:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.10.3",
"matchCriteriaId": "97EAFBBD-8434-4B24-9D1B-D4556C5D7996"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-cc6x-8cc7-9953",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51646",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-12-18T12:15:10.270",
"lastModified": "2024-12-18T12:15:10.270",
"lastModified": "2024-12-18T15:15:13.100",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-52361",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-12-18T16:15:13.967",
"lastModified": "2024-12-18T16:15:13.967",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM Storage Defender - Resiliency Service 2.0.0 through 2.0.9 \n\n\n\n\u00a0stores user credentials in plain text which can be read by an authenticated user with access to the pod."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-256"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7178587",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52997",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:19.740",
"lastModified": "2024-12-10T21:15:19.740",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T15:14:35.513",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,47 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:photoshop:26.0:*:*:*:*:*:*:*",
"matchCriteriaId": "027706E0-0E1A-4434-806E-9FE09004E1B3"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/photoshop/apsb24-101.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-53951",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:20.167",
"lastModified": "2024-12-10T21:15:20.167",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T15:08:14.407",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,55 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
"versionEndIncluding": "18.5.4",
"matchCriteriaId": "BC3215E2-E1F4-4418-B110-E4582684AF10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
"versionStartIncluding": "19.0",
"versionEndIncluding": "19.5",
"matchCriteriaId": "03042FD5-FA73-4548-8D00-1A7EF3EEC650"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/indesign/apsb24-97.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-53952",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:20.307",
"lastModified": "2024-12-10T21:15:20.307",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T15:07:51.167",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,55 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
"versionEndIncluding": "18.5.4",
"matchCriteriaId": "BC3215E2-E1F4-4418-B110-E4582684AF10"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
"versionStartIncluding": "19.0",
"versionEndIncluding": "19.5",
"matchCriteriaId": "03042FD5-FA73-4548-8D00-1A7EF3EEC650"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/indesign/apsb24-97.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-54662",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-17T18:15:24.963",
"lastModified": "2024-12-17T18:15:24.963",
"lastModified": "2024-12-18T16:15:14.220",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Dante 1.4.0 through 1.4.3 (fixed in 1.4.4) has incorrect access control for some sockd.conf configurations involving socksmethod."
},
{
"lang": "es",
"value": "Dante 1.4.0 a 1.4.3 (corregido en 1.4.4) tiene un control de acceso incorrecto para algunas configuraciones de sockd.conf que involucran el m\u00e9todo Socks."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://www.inet.no/dante/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-55058",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-17T21:15:08.510",
"lastModified": "2024-12-17T21:15:08.510",
"lastModified": "2024-12-18T16:15:14.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An insecure direct object reference (IDOR) vulnerability was discovered in PHPGurukul Online Birth Certificate System v1.0. This vulnerability resides in the viewid parameter of /user/view-application-detail.php. Authenticated users can exploit this flaw by manipulating the viewid parameter in the URL to access sensitive birth certificate details of other users without proper authorization checks."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-706"
}
]
}
],
"references": [
{
"url": "https://github.com/SCR-athif/CVE/tree/main/CVE-2024-55058",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-55059",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-17T21:15:08.643",
"lastModified": "2024-12-17T21:15:08.643",
"lastModified": "2024-12-18T16:15:14.560",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A stored HTML Injection vulnerability was identified in PHPGurukul Online Birth Certificate System v1.0 in /user/certificate-form.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/SCR-athif/CVE/tree/main/CVE-2024-55059",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-55513",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-17T20:15:22.623",
"lastModified": "2024-12-17T20:15:22.623",
"lastModified": "2024-12-18T16:15:14.720",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 3.90. The component affected by this issue is /upload_netaction.php on the web interface. By crafting a suitable form name, arbitrary files can be uploaded, potentially leading to unauthorized access to server permissions."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/wscg928/cbe88078751abad2ada2334eb12a5060",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-55514",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-17T20:15:22.757",
"lastModified": "2024-12-17T20:15:22.757",
"lastModified": "2024-12-18T16:15:14.900",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 3.90. The component affected by this issue is /upload_sfmig.php on the web interface. By crafting a suitable form name, arbitrary files can be uploaded, potentially leading to unauthorized access to server permissions."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/wscg928/cbe88078751abad2ada2334eb12a5060",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-55515",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-17T20:15:22.887",
"lastModified": "2024-12-17T20:15:22.887",
"lastModified": "2024-12-18T16:15:15.090",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 3.90. The component affected by this issue is /upload_ipslib.php on the web interface. By crafting a suitable form name, arbitrary files can be uploaded."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/wscg928/cbe88078751abad2ada2334eb12a5060",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-55516",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-17T20:15:23.020",
"lastModified": "2024-12-17T20:15:23.020",
"lastModified": "2024-12-18T16:15:15.263",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A vulnerability was found in Raisecom MSG1200, MSG2100E, MSG2200, and MSG2300 v3.90. The component affected by this issue is /upload_sysconfig.php on the web interface. By crafting a suitable form name, arbitrary files can be uploaded, potentially leading to unauthorized access to server permissions."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/wscg928/cbe88078751abad2ada2334eb12a5060",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-56142",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-17T22:15:07.547",
"lastModified": "2024-12-17T22:15:07.547",
"lastModified": "2024-12-18T16:15:15.433",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -55,12 +55,34 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-56173",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-18T06:15:23.780",
"lastModified": "2024-12-18T06:15:23.780",
"lastModified": "2024-12-18T16:15:15.600",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In Optimizely Configured Commerce before 5.2.2408, malicious payloads can be stored and subsequently executed in users' browsers under specific conditions: XSS from JavaScript in an SVG document."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://support.optimizely.com/hc/en-us/articles/32344323720973-Configured-Commerce-Security-Advisory-COM-2024-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-56175",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-18T06:15:24.087",
"lastModified": "2024-12-18T06:15:24.087",
"lastModified": "2024-12-18T15:15:13.723",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In Optimizely Configured Commerce before 5.2.2408, malicious payloads can be stored and subsequently executed in users' browsers under specific conditions: XSS from client-side template injection in list item names."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://support.optimizely.com/hc/en-us/articles/32344323720973-Configured-Commerce-Security-Advisory-COM-2024-01",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-18T15:00:47.748228+00:00
2024-12-18T17:00:21.670180+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-18T14:49:59.103000+00:00
2024-12-18T16:59:38.850000+00:00
```
### Last Data Feed Release
@ -33,48 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
274240
274248
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `8`
- [CVE-2023-34990](CVE-2023/CVE-2023-349xx/CVE-2023-34990.json) (`2024-12-18T13:15:05.547`)
- [CVE-2024-48889](CVE-2024/CVE-2024-488xx/CVE-2024-48889.json) (`2024-12-18T13:15:06.463`)
- [CVE-2024-50570](CVE-2024/CVE-2024-505xx/CVE-2024-50570.json) (`2024-12-18T13:15:06.723`)
- [CVE-2024-56128](CVE-2024/CVE-2024-561xx/CVE-2024-56128.json) (`2024-12-18T14:15:23.277`)
- [CVE-2023-50956](CVE-2023/CVE-2023-509xx/CVE-2023-50956.json) (`2024-12-18T16:15:10.597`)
- [CVE-2024-12371](CVE-2024/CVE-2024-123xx/CVE-2024-12371.json) (`2024-12-18T16:15:10.907`)
- [CVE-2024-12372](CVE-2024/CVE-2024-123xx/CVE-2024-12372.json) (`2024-12-18T16:15:11.050`)
- [CVE-2024-12373](CVE-2024/CVE-2024-123xx/CVE-2024-12373.json) (`2024-12-18T16:15:11.163`)
- [CVE-2024-47119](CVE-2024/CVE-2024-471xx/CVE-2024-47119.json) (`2024-12-18T16:15:13.110`)
- [CVE-2024-47810](CVE-2024/CVE-2024-478xx/CVE-2024-47810.json) (`2024-12-18T16:15:13.327`)
- [CVE-2024-49576](CVE-2024/CVE-2024-495xx/CVE-2024-49576.json) (`2024-12-18T16:15:13.477`)
- [CVE-2024-52361](CVE-2024/CVE-2024-523xx/CVE-2024-52361.json) (`2024-12-18T16:15:13.967`)
### CVEs modified in the last Commit
Recently modified CVEs: `45`
Recently modified CVEs: `50`
- [CVE-2024-52826](CVE-2024/CVE-2024-528xx/CVE-2024-52826.json) (`2024-12-18T14:36:23.140`)
- [CVE-2024-52833](CVE-2024/CVE-2024-528xx/CVE-2024-52833.json) (`2024-12-18T14:37:46.917`)
- [CVE-2024-52837](CVE-2024/CVE-2024-528xx/CVE-2024-52837.json) (`2024-12-18T14:34:46.873`)
- [CVE-2024-52838](CVE-2024/CVE-2024-528xx/CVE-2024-52838.json) (`2024-12-18T14:34:59.720`)
- [CVE-2024-52839](CVE-2024/CVE-2024-528xx/CVE-2024-52839.json) (`2024-12-18T14:35:11.923`)
- [CVE-2024-52840](CVE-2024/CVE-2024-528xx/CVE-2024-52840.json) (`2024-12-18T14:35:19.387`)
- [CVE-2024-52844](CVE-2024/CVE-2024-528xx/CVE-2024-52844.json) (`2024-12-18T14:35:26.830`)
- [CVE-2024-52994](CVE-2024/CVE-2024-529xx/CVE-2024-52994.json) (`2024-12-18T14:38:48.680`)
- [CVE-2024-52995](CVE-2024/CVE-2024-529xx/CVE-2024-52995.json) (`2024-12-18T14:38:36.227`)
- [CVE-2024-52996](CVE-2024/CVE-2024-529xx/CVE-2024-52996.json) (`2024-12-18T14:38:24.727`)
- [CVE-2024-54037](CVE-2024/CVE-2024-540xx/CVE-2024-54037.json) (`2024-12-18T14:40:29.303`)
- [CVE-2024-54039](CVE-2024/CVE-2024-540xx/CVE-2024-54039.json) (`2024-12-18T14:40:37.587`)
- [CVE-2024-54040](CVE-2024/CVE-2024-540xx/CVE-2024-54040.json) (`2024-12-18T14:40:44.710`)
- [CVE-2024-54041](CVE-2024/CVE-2024-540xx/CVE-2024-54041.json) (`2024-12-18T14:40:52.247`)
- [CVE-2024-54042](CVE-2024/CVE-2024-540xx/CVE-2024-54042.json) (`2024-12-18T14:41:18.750`)
- [CVE-2024-54043](CVE-2024/CVE-2024-540xx/CVE-2024-54043.json) (`2024-12-18T14:41:29.400`)
- [CVE-2024-54044](CVE-2024/CVE-2024-540xx/CVE-2024-54044.json) (`2024-12-18T14:41:48.010`)
- [CVE-2024-54045](CVE-2024/CVE-2024-540xx/CVE-2024-54045.json) (`2024-12-18T14:41:55.727`)
- [CVE-2024-54046](CVE-2024/CVE-2024-540xx/CVE-2024-54046.json) (`2024-12-18T14:42:06.897`)
- [CVE-2024-54047](CVE-2024/CVE-2024-540xx/CVE-2024-54047.json) (`2024-12-18T14:42:14.767`)
- [CVE-2024-54048](CVE-2024/CVE-2024-540xx/CVE-2024-54048.json) (`2024-12-18T14:42:22.940`)
- [CVE-2024-54049](CVE-2024/CVE-2024-540xx/CVE-2024-54049.json) (`2024-12-18T14:42:33.907`)
- [CVE-2024-54502](CVE-2024/CVE-2024-545xx/CVE-2024-54502.json) (`2024-12-18T14:13:13.297`)
- [CVE-2024-54514](CVE-2024/CVE-2024-545xx/CVE-2024-54514.json) (`2024-12-18T14:05:50.673`)
- [CVE-2024-54524](CVE-2024/CVE-2024-545xx/CVE-2024-54524.json) (`2024-12-18T13:59:47.450`)
- [CVE-2024-48889](CVE-2024/CVE-2024-488xx/CVE-2024-48889.json) (`2024-12-18T15:15:11.713`)
- [CVE-2024-49377](CVE-2024/CVE-2024-493xx/CVE-2024-49377.json) (`2024-12-18T16:31:26.757`)
- [CVE-2024-49535](CVE-2024/CVE-2024-495xx/CVE-2024-49535.json) (`2024-12-18T15:07:06.950`)
- [CVE-2024-49537](CVE-2024/CVE-2024-495xx/CVE-2024-49537.json) (`2024-12-18T15:21:52.587`)
- [CVE-2024-49538](CVE-2024/CVE-2024-495xx/CVE-2024-49538.json) (`2024-12-18T15:17:43.620`)
- [CVE-2024-49541](CVE-2024/CVE-2024-495xx/CVE-2024-49541.json) (`2024-12-18T15:17:34.523`)
- [CVE-2024-4995](CVE-2024/CVE-2024-49xx/CVE-2024-4995.json) (`2024-12-18T16:15:13.623`)
- [CVE-2024-4996](CVE-2024/CVE-2024-49xx/CVE-2024-4996.json) (`2024-12-18T15:15:12.210`)
- [CVE-2024-50570](CVE-2024/CVE-2024-505xx/CVE-2024-50570.json) (`2024-12-18T15:15:12.660`)
- [CVE-2024-51175](CVE-2024/CVE-2024-511xx/CVE-2024-51175.json) (`2024-12-18T16:15:13.807`)
- [CVE-2024-51493](CVE-2024/CVE-2024-514xx/CVE-2024-51493.json) (`2024-12-18T16:34:37.497`)
- [CVE-2024-51646](CVE-2024/CVE-2024-516xx/CVE-2024-51646.json) (`2024-12-18T15:15:13.100`)
- [CVE-2024-52997](CVE-2024/CVE-2024-529xx/CVE-2024-52997.json) (`2024-12-18T15:14:35.513`)
- [CVE-2024-53951](CVE-2024/CVE-2024-539xx/CVE-2024-53951.json) (`2024-12-18T15:08:14.407`)
- [CVE-2024-53952](CVE-2024/CVE-2024-539xx/CVE-2024-53952.json) (`2024-12-18T15:07:51.167`)
- [CVE-2024-54662](CVE-2024/CVE-2024-546xx/CVE-2024-54662.json) (`2024-12-18T16:15:14.220`)
- [CVE-2024-55058](CVE-2024/CVE-2024-550xx/CVE-2024-55058.json) (`2024-12-18T16:15:14.400`)
- [CVE-2024-55059](CVE-2024/CVE-2024-550xx/CVE-2024-55059.json) (`2024-12-18T16:15:14.560`)
- [CVE-2024-55513](CVE-2024/CVE-2024-555xx/CVE-2024-55513.json) (`2024-12-18T16:15:14.720`)
- [CVE-2024-55514](CVE-2024/CVE-2024-555xx/CVE-2024-55514.json) (`2024-12-18T16:15:14.900`)
- [CVE-2024-55515](CVE-2024/CVE-2024-555xx/CVE-2024-55515.json) (`2024-12-18T16:15:15.090`)
- [CVE-2024-55516](CVE-2024/CVE-2024-555xx/CVE-2024-55516.json) (`2024-12-18T16:15:15.263`)
- [CVE-2024-56142](CVE-2024/CVE-2024-561xx/CVE-2024-56142.json) (`2024-12-18T16:15:15.433`)
- [CVE-2024-56173](CVE-2024/CVE-2024-561xx/CVE-2024-56173.json) (`2024-12-18T16:15:15.600`)
- [CVE-2024-56175](CVE-2024/CVE-2024-561xx/CVE-2024-56175.json) (`2024-12-18T15:15:13.723`)
## Download and Usage

View File

@ -97063,11 +97063,11 @@ CVE-2017-13308,0,0,7610ba9ecaa69314eaf1d14cdbb7d1ae9fa32e8cd274528a893bb9df325a7
CVE-2017-13309,0,0,3d8e7c6309c5c1cafb1c6dfedda758dfd05930dec41aa79ea05cff52c21999c9,2024-12-17T20:31:02.880000
CVE-2017-1331,0,0,792619ac2a7d190b79ad04ab26e4fcee4a33db57f943c84c9bb254e3cdb1243d,2024-11-21T03:21:43.777000
CVE-2017-13310,0,0,16fbc2a02fd9a331fd87bcb47c76c7495b76a04bb51e6d9523fb3a1c1a2317f1,2024-12-17T20:29:35.577000
CVE-2017-13311,0,0,d76817caceb61441ada35ebc2969b4501415429984925844913929a7610c7e2e,2024-11-19T17:35:01.903000
CVE-2017-13312,0,1,c44d98863e62fba9ae5e37c4d8aeb3f73f1c47967d04ebc8d0cbb03e2afa31fc,2024-12-18T14:49:59.103000
CVE-2017-13313,0,1,0d6ac6befe081fba487675eab4252804ea375d01dfaa562bad14e41aa9aacf4b,2024-12-18T14:44:13.577000
CVE-2017-13314,0,1,33c48e6d8e6524fa065f82448defa764b8b3b9330b06ac294ae8e04b2d271ecd,2024-12-18T14:36:21.610000
CVE-2017-13315,0,1,a6c9ce499de7cc31ed3e6113da58d1ddbfa19fcf87a648f22bfa38731642b2e7,2024-12-18T14:23:37.877000
CVE-2017-13311,0,1,a8dd4a86ae8b46321cf53ffe4168d1a61d46181e20c20a65d47f97705ebeadd8,2024-12-18T15:00:52.703000
CVE-2017-13312,0,0,c44d98863e62fba9ae5e37c4d8aeb3f73f1c47967d04ebc8d0cbb03e2afa31fc,2024-12-18T14:49:59.103000
CVE-2017-13313,0,0,0d6ac6befe081fba487675eab4252804ea375d01dfaa562bad14e41aa9aacf4b,2024-12-18T14:44:13.577000
CVE-2017-13314,0,0,33c48e6d8e6524fa065f82448defa764b8b3b9330b06ac294ae8e04b2d271ecd,2024-12-18T14:36:21.610000
CVE-2017-13315,0,0,a6c9ce499de7cc31ed3e6113da58d1ddbfa19fcf87a648f22bfa38731642b2e7,2024-12-18T14:23:37.877000
CVE-2017-13316,0,0,c4c5129b9dbb6560afe63cb0142b790bbb3b4646bf79ff3cb413c25a7131034f,2024-11-29T22:15:04.140000
CVE-2017-13319,0,0,f23393a69de133f7a90b48ab44b5288d95b1d1856c774cba21f21a354eb95583,2024-11-29T22:15:04.860000
CVE-2017-1332,0,0,0269de81100b11e03b79ed33c30dc865a85b59fb90a2c2fe1abeaca397fa8d4e,2024-11-21T03:21:43.893000
@ -126928,7 +126928,7 @@ CVE-2018-9361,0,0,74621d1d1c0510b4e41d32863195fc57c81ef6080eb8141968c4cdb0aea60b
CVE-2018-9362,0,0,fcfd49a31efa129f3b71bfc1dba6f226ae9fe7959a199b87b995b6adc6501ba4,2024-11-21T04:15:24.360000
CVE-2018-9363,0,0,c591779bd7ee777b9730788b66e5bd10702e64ee214a51b2037d79b697d2291d,2024-11-21T04:15:24.487000
CVE-2018-9364,0,0,1500c9fea6f902f1b88a2060def80bcde55a9c796709027ddafeada29b2995d7,2024-11-22T21:22:14.020000
CVE-2018-9365,0,1,fe01ff6d2b65cc8939ce3fc90c381ed2b7091b2e793a4e02ab8101b5fd9cad57,2024-12-18T14:20:32.350000
CVE-2018-9365,0,0,fe01ff6d2b65cc8939ce3fc90c381ed2b7091b2e793a4e02ab8101b5fd9cad57,2024-12-18T14:20:32.350000
CVE-2018-9366,0,0,5df4bba79daab1336433d7fefcadd485ac6fc89b95be03103da77984ced3d29f,2024-11-22T21:23:11.303000
CVE-2018-9367,0,0,b66f0930613c3a3e261417c8a6dd1169f72966ee9d3d7e042ddb2e629ace349d,2024-11-22T21:23:04.237000
CVE-2018-9368,0,0,b5eff1a3bc2b3f1128cb225395f214d3bfa469157068c63b732fb9e4412d9b70,2024-11-22T21:23:32.820000
@ -127012,14 +127012,14 @@ CVE-2018-9463,0,0,d4d844c05cd708ecfc7b2b2fe54aedf1979065835dec8bb48f0ba4759b3ac6
CVE-2018-9465,0,0,cb2efd2b80efc3b600077998298a31fa09fe425af40f55a1a9b3acceb259a706,2024-11-21T04:15:31.130000
CVE-2018-9466,0,0,a6ce5776a6a0bc572eb2fe9b93668c302dbc661dc68279f63c0e20dc3a242886,2024-11-22T21:29:09.617000
CVE-2018-9467,0,0,fc2dc1d34992c43bebd9ec5fb99a903623aaf110c20cb7b73e1288eb66ff9671,2024-11-22T21:27:26.783000
CVE-2018-9468,0,1,712fcfcf449bd84eb4db83ccc59d4797e74a383a411cd983e63ec05459635d94,2024-12-18T14:18:23.677000
CVE-2018-9468,0,0,712fcfcf449bd84eb4db83ccc59d4797e74a383a411cd983e63ec05459635d94,2024-12-18T14:18:23.677000
CVE-2018-9469,0,0,200fafd517230d7c60e99d0545023427b2ed0fea5f80b63e01f3970800eec88f,2024-11-21T13:57:24.187000
CVE-2018-9470,0,0,6c434e88b3a4ab49aa790c553fea10cad2868865a792336987538d708f28e046,2024-11-21T13:57:24.187000
CVE-2018-9471,0,0,123e430dbaf8168f87abec50778f935958df85047ec1c6bb448ec65261ec9ed8,2024-11-21T13:57:24.187000
CVE-2018-9472,0,0,eed94bd319b9613140a13b2f2c545c9de5ecf05eed9501ce95aca00cb78f13df,2024-11-21T13:57:24.187000
CVE-2018-9471,0,1,58064ffefc71d91dd1c37f05535ac5f61d9c2d1f7b20bd0f4776669e00e8ed47,2024-12-18T16:50:18.380000
CVE-2018-9472,0,1,8fa2ff5e370d7f22a6692af5877003bf3e80caee63a0c0ea62f5a6c823e16805,2024-12-18T15:26:01.343000
CVE-2018-9473,0,0,2ad5e07ef12f07045a795dac967f30819ead20b4cb14d91da3f784ba629a179a,2024-11-21T04:15:32.357000
CVE-2018-9474,0,0,8419f976a82e6490664776241ecc68194b89d3bf6ba6b42cd8ff54eae989e1ff,2024-11-21T13:57:24.187000
CVE-2018-9475,0,0,7d3077e2fc82316134251d66a67a4d2f67955c1239c6e2c663b02f9f092f1e26,2024-11-21T13:57:24.187000
CVE-2018-9474,0,1,0e27e1c93952ccd0fce94d1e81d6f87ef8f699520ee2f886c949161ab899d411,2024-12-18T15:20:06.503000
CVE-2018-9475,0,1,1f148c367ebd80eec74028371077942d0c42e7dee34eb65e8722a3bf9f1ce703,2024-12-18T15:13:24.400000
CVE-2018-9476,0,0,9cb0d1aec6b5854c76e9aa46ea59ed0359f9b46a9a7aae437e59dcf464ed3844,2024-11-21T04:15:32.873000
CVE-2018-9477,0,0,4110912dc6f30301c8bf274fccb8d87b1cc751409e992058aeb2dcd5ad183d92,2024-11-21T13:57:24.187000
CVE-2018-9478,0,0,6cde0cdc8fbb45ed18b299d92238fc286322490b097076205a4672100301ee5a,2024-11-21T13:57:24.187000
@ -150481,8 +150481,8 @@ CVE-2020-15590,0,0,eaf7a20fa2d3dddbd13df2e08c60d4b64ff4985ad0dd351c57b7582ba6c76
CVE-2020-15591,0,0,43651c8e5035fbc2d3eebf92de36f41aa2d911daf333a28326f34990382b0fdc,2024-11-21T05:05:48.873000
CVE-2020-15592,0,0,2a68b72b03ab5c287ffa8a8d432b309cd7d51ebd271d4373fb0a2667761bf65a,2024-11-21T05:05:49.023000
CVE-2020-15593,0,0,88a72e7a531309804d00a966e83ae9396478dea8c4c97c55a4c30fffec4e3804,2024-11-21T05:05:49.167000
CVE-2020-15594,0,1,41d8ff70da4383a62caa7c2929f3b208777d1aebaebe193534610f95ca724f54,2024-12-18T14:34:36.427000
CVE-2020-15595,0,1,84c8d2820e6ad402905ccddf7b1cd1319f0332c32cbf1dbf934bec1abc27b54c,2024-12-18T14:34:36.427000
CVE-2020-15594,0,0,41d8ff70da4383a62caa7c2929f3b208777d1aebaebe193534610f95ca724f54,2024-12-18T14:34:36.427000
CVE-2020-15595,0,0,84c8d2820e6ad402905ccddf7b1cd1319f0332c32cbf1dbf934bec1abc27b54c,2024-12-18T14:34:36.427000
CVE-2020-15596,0,0,5d9ab39ec3b111e8938db8208890e181a90bde06b1b2a36366757c162e681123,2024-11-21T05:05:49.603000
CVE-2020-15597,0,0,d5b4e5f41d3f76ac8685edcd9a62e7527d62e39b918aad59a53ee5a5f346da35,2024-11-21T05:05:49.757000
CVE-2020-15598,0,0,29c4cf6a206458a549a864bb573a7abc87e995b8609723825d1a72deba575b91,2024-11-21T05:05:49.910000
@ -216016,7 +216016,7 @@ CVE-2023-21266,0,0,41056af2ff44c658c3d7400d35b437dca755e0d267939a09aed4042fcf6b8
CVE-2023-21267,0,0,6638b0087b6d8932602002a7e8d08da2fed80a4581d01b616763baebe7bf0683,2024-11-21T07:42:31.333000
CVE-2023-21268,0,0,966b6eaa52dc2224769524db7defdbe0f2eaa7a2a6172417194471cfbd373807,2024-11-21T07:42:31.460000
CVE-2023-21269,0,0,c88325238d3e3688bd26fb079dfc796c8c700d8d0bb88fb8fe9ce0403d8347f1,2024-11-21T07:42:31.587000
CVE-2023-21270,0,1,8e3ac5718df0e59647bf13e55913b5346e5936aba8dd705030bc10ffe3b18e7e,2024-12-18T14:22:02.343000
CVE-2023-21270,0,0,8e3ac5718df0e59647bf13e55913b5346e5936aba8dd705030bc10ffe3b18e7e,2024-12-18T14:22:02.343000
CVE-2023-21271,0,0,d6ce25bfda5fb8eace72cb13696e026026d00885917c7b921b8b8c2965f4dcda,2024-11-21T07:42:31.947000
CVE-2023-21272,0,0,2551733aca613408fb500b7a9902a0645171dc393606369404c055bc779accae,2024-11-21T07:42:32.073000
CVE-2023-21273,0,0,95c7324d81a31e5e26c923038780c886381676790dbb37eb313bb58ffd854b53,2024-11-21T07:42:32.217000
@ -225666,7 +225666,7 @@ CVE-2023-33086,0,0,f53f20cc132c88c4cd8291ee96f7336f4be2d061efc8c2aaa582933ee06f0
CVE-2023-33087,0,0,f8493077219394e12e3af04e2e125065f5dcbfaa0574cbe023d9fb2cac598856,2024-11-21T08:04:46.507000
CVE-2023-33088,0,0,e1160bfb1e1e936ac0215cc3bfdcb4994be99dca79d4fd17b220fe15b748241d,2024-11-21T08:04:46.773000
CVE-2023-33089,0,0,ca94d4abaea68ca13a805689fb3e29b882357d7b1647b6389eb448dc56434905,2024-11-21T08:04:47.340000
CVE-2023-3309,0,0,4f3cd78ff2b7a69feab684a1a21e99ab0eb6324fd62b8cc91a78b03a566b4910,2024-11-21T08:16:58.873000
CVE-2023-3309,0,1,dc1b527e2c2b49a13ee21828b76155a17529f34f0f322065757100e3dd2c8362,2024-12-18T16:15:10.390000
CVE-2023-33090,0,0,212563f9f83c1ae3ec296c0aebd97ba98d917a9e2cdcfa7452ffaa45554f0371,2024-11-21T08:04:47.733000
CVE-2023-33092,0,0,c9ab9cad61633f2fd68e1dc9c0a2e4e2e703bbdd2248acaac7659a80de3bf105,2024-11-21T08:04:47.867000
CVE-2023-33094,0,0,09423103034990f4a4f996fd2d1004e0117123e7ec543387e6bb63ed73701ec1,2024-11-21T08:04:48.100000
@ -227041,7 +227041,7 @@ CVE-2023-34987,0,0,239bfa56c2b3c2a64ffb9989e3a04ce7690423bc2723612a3fec5d17d1ef0
CVE-2023-34988,0,0,c281aba51286e8262e1bd5a87d0371ac1701ceb8bc379cec0e6a7add4865aee2,2024-11-21T08:07:47.030000
CVE-2023-34989,0,0,9c93395b1d7506c69552441fe317a37c9c65f626459b205c15815f9a4c5bb10a,2024-11-21T08:07:47.157000
CVE-2023-3499,0,0,d53e968d6b98b3b8f4eba87e9d3bb6bd7e12149baa210aafdf7bf82922fb6251,2024-11-21T08:17:23.880000
CVE-2023-34990,1,1,4425c34c09295b4b7565c66affc7dc667e0e726b367f6f914e5d7ec5b7952e05,2024-12-18T13:15:05.547000
CVE-2023-34990,0,1,6060883de2c0d95e5f0d3852d53ac20dfde1cf3f1087c2c1c70bc1f1bb4981f3,2024-12-18T15:15:06.137000
CVE-2023-34991,0,0,edca71b869336e025d2f35da854260f4cdb9820b0b9bfc84c32d69158d1c8c0d,2024-11-21T08:07:47.280000
CVE-2023-34992,0,0,a0b956affc14ae52e19caf75bfd96c683d594334cda2c7ce7bc9d403ae1b0e84,2024-11-21T08:07:47.417000
CVE-2023-34993,0,0,f25d5feb0a738fb2f1edb4bcb70c6024043b6f1869f6fd7fa178a04679a49c7b,2024-11-21T08:07:47.547000
@ -234196,7 +234196,7 @@ CVE-2023-44375,0,0,48b5cc51553000a2cfa67cea7f8a951d3659b6e093f2df35e76499db8afb9
CVE-2023-44376,0,0,03f27121c4f8ffca1841f5abcc6f000d7525e270077c8b212bbafd4e41d1bb9e,2024-01-02T19:15:10.550000
CVE-2023-44377,0,0,960eac8de781cbaac5ac605f1641529954ab7d1adeca62e37948b52710054780,2024-01-02T19:15:10.630000
CVE-2023-44378,0,0,fa93276927338f55d243fff0c5bba3965490daa8aeb974655c9e7ac025ae9278,2024-11-21T08:25:46.720000
CVE-2023-44379,0,0,dbe966527134b83422efc1ff0967828a55963b3eb4ea9673ce77849f236eb2ce,2024-11-21T08:25:46.857000
CVE-2023-44379,0,1,3e8dfd56646da37581361063189afb0ab1061b92bcf972741e485d146c639ac9,2024-12-18T16:54:13.977000
CVE-2023-4438,0,0,169dbdca334428881e66c107f3a1102e4db5e3efeafb561096cff90dae02b9d8,2024-11-21T08:35:09.177000
CVE-2023-44381,0,0,66cbbb7eba31d2f8050b53ba4bb0fb526f6a3bf73bb66cc1c1dabc5cd8b3ceea,2024-11-21T08:25:46.980000
CVE-2023-44382,0,0,276b1fb9c5734a0c4fe523f013c8797fb66698f2e159546a387afe6f53012c68,2024-11-21T08:25:47.100000
@ -238721,6 +238721,7 @@ CVE-2023-50952,0,0,d7a165fbc90fbf4a779f1c6c3931beac69b4af33a7ddbb567cba6acab9aeb
CVE-2023-50953,0,0,aba8c9a4c56cd61b55bfc0faace3bf32c62a90f0cd04ee8486b0d330c54e8255,2024-11-21T08:37:36.080000
CVE-2023-50954,0,0,c3b8be7e25038836ab69cbf4b1f3b77767e2a9696c84bca593b09883dc574fa9,2024-11-21T08:37:36.227000
CVE-2023-50955,0,0,054721455db1bb4a434bc0eeb3cc615632509d43de754db980f2fe970f47c525,2024-12-10T19:26:58.140000
CVE-2023-50956,1,1,c78610f51bc4bd61479a135c10045746e118a16c97294b961ed54c0ac338145c,2024-12-18T16:15:10.597000
CVE-2023-50957,0,0,ab69caad2028c44273e1d8a1b6e510f9cab85ce3e69786cd2afdcb47074d77d4,2024-11-21T08:37:36.500000
CVE-2023-50959,0,0,a65991072a7be5e9bfc6dd105f3e29b24f202d07a14ac774359e6246211d7ee4,2024-11-21T08:37:36.643000
CVE-2023-5096,0,0,b339725eb66ec0962e11912446b66cd850e228ed170101209b480782ef995e44,2024-11-21T08:41:03.100000
@ -238991,7 +238992,7 @@ CVE-2023-51447,0,0,9acaab43b0f56c6139287a3ad0df3bd2d0fcd672e34eb2b39ccb5e25bd56d
CVE-2023-51448,0,0,48846af0783ecf050481b988a41b2e58b9c8ad80e2e9dde9d300064396bcb7f5,2024-11-21T08:38:08.387000
CVE-2023-51449,0,0,4cf349ceea2f1c423c4cf23f27571e002121659b0a97a8b63d12c9a4d5f368c4,2024-11-21T08:38:08.513000
CVE-2023-5145,0,0,ed136c77a3cb85689d85277aba9853012ad53753c0f759e065c484d72945da3d,2024-11-21T08:41:09.277000
CVE-2023-51450,0,0,f83664303b23e35fb869f09634f7a654c1357f6722ed5c7ccc47f9f19d12a3c8,2024-11-21T08:38:08.650000
CVE-2023-51450,0,1,c7109e1f6d3d02ee374be68caa72199f1dd26b4bfd2adad210a928abfa8454c3,2024-12-18T16:55:17.013000
CVE-2023-51451,0,0,e4d82488092a2e9c30dda6ea7377651dc05e0b0174a27d67d42211a97965bb27,2024-11-21T08:38:08.780000
CVE-2023-51452,0,0,d1ef96595e79a67721ff43f4dbf5ac162add4b56164453b8a603ed5226e4c684,2024-11-21T08:38:08.917000
CVE-2023-51453,0,0,9e75a735c0262e0b82eb07e0d63ccac2012621274d423a502d96d5582f99c3bc,2024-11-21T08:38:09.063000
@ -243742,7 +243743,7 @@ CVE-2024-10887,0,0,fb1e1a2823528196fcc2145f8cf57602578b0b49c0e0002d9570cfb1dfea2
CVE-2024-1089,0,0,a8b705082ee081738688e4145db882248091be94e1ae46f0bab923d247b2abd0,2024-11-21T08:49:46.367000
CVE-2024-10890,0,0,291737e09e39acbad6d8cc1c52c0ae5cd2168a1e41e273e4ff02b1422afae399,2024-11-21T13:57:24.187000
CVE-2024-10891,0,0,6756c0c33d7417e4f522126d4552796d2cb16a6b1d07395aaddee44058a352b0,2024-11-21T13:57:24.187000
CVE-2024-10892,0,0,d40c90e1f2fecae4b6dc95de100feb12dbf7125c92e9191a30cd0bad82588723,2024-12-18T06:15:21.567000
CVE-2024-10892,0,1,fab4b4690341821092f71ef80ed283e2bd6ce36ef28b90adf9066d644f21bdd7,2024-12-18T15:15:08.067000
CVE-2024-10893,0,0,cec45a8d99b10dd83c0bf750188d64f22ea32a205bdb03916ff953823f5e203f,2024-12-03T15:15:09.780000
CVE-2024-10895,0,0,04c98611744adf39f95b71a878352eb8b113feb4aa126ef2824080fbccdc579f,2024-11-27T07:15:08.347000
CVE-2024-10896,0,0,e962891bb7ff0bd290fd7c88332bde91f2f69d0bdc8b8df6012dc8f056efaa3b,2024-11-29T16:15:08.880000
@ -244770,6 +244771,9 @@ CVE-2024-12362,0,0,96e15c2faa2bd6e0d657897006f5afbf531e277c4e36a7600a72ca925ed55
CVE-2024-12363,0,0,8bf95d170f6881f24ef42d227f38a0cf0a0a8682e2906a9aa2aaa1e3f316a356,2024-12-11T10:15:07.260000
CVE-2024-12369,0,0,5b7cc273eb06dd7ee2a2ae3818321c32759b57238bbfe6b2aea54c3bd6ee2b32,2024-12-09T21:15:08.203000
CVE-2024-1237,0,0,7608b762d209f55f10a23dbde634d086adad1d6240344714ec7de5c458d836b6,2024-11-21T08:50:07.910000
CVE-2024-12371,1,1,fd78f40d62c8ae669183369c84481ca778951463908443ea9cdf004bc77bd39a,2024-12-18T16:15:10.907000
CVE-2024-12372,1,1,6dd757f76fe34aa65fefc0e05ca53d143d2676e900f8bdb1c64dd5775b85c4e2,2024-12-18T16:15:11.050000
CVE-2024-12373,1,1,202ac51835bd3d6d19b049a407a67ec898879e144610a29d35558445c18f0734,2024-12-18T16:15:11.163000
CVE-2024-1238,0,0,61e2d99ce6e3dfa86afb8331abcc236f68b5fa34f245659f4f6216db5239b32e,2024-11-21T08:50:08.053000
CVE-2024-12381,0,0,68b33f6b694aa45ef73ff06945e737e58ccb7b1c7ea2cfeb4d826136c48b3d1f,2024-12-13T19:25:33.143000
CVE-2024-12382,0,0,f70294886a1865641a484753f3298929660ab1bd7002caff75777615f01f2e87,2024-12-13T19:24:25.137000
@ -244870,15 +244874,15 @@ CVE-2024-12644,0,0,4fe46a77976cb26c8db1a8817f8d60588d7d627c677def113b1f0c3da34da
CVE-2024-12645,0,0,e2bf7e02fc7f9b197fb94f8f3f7739958eb1e7eb714f268785ecfdf27c30d30a,2024-12-16T07:15:06.560000
CVE-2024-12646,0,0,edf55cca2f63c5514783a7adeb1b585499807b56f798173f78bff573d5a90371,2024-12-16T07:15:06.737000
CVE-2024-1265,0,0,b39c324e3936d2b2eba136bb9fb37e8f905e9dd3fbb95d7d724d951e7512509f,2024-11-21T08:50:11.610000
CVE-2024-12653,0,1,0bdff4965d01bd6aa73fcbedd02b053581ebdedd8d7404b8f9233029d8912bb7,2024-12-18T13:53:28.700000
CVE-2024-12654,0,1,dd847f86178d706ec068f649f759ab2d8fa9222fd8627ac6c45d7d35cd5983cc,2024-12-18T13:42:22.853000
CVE-2024-12653,0,0,0bdff4965d01bd6aa73fcbedd02b053581ebdedd8d7404b8f9233029d8912bb7,2024-12-18T13:53:28.700000
CVE-2024-12654,0,0,dd847f86178d706ec068f649f759ab2d8fa9222fd8627ac6c45d7d35cd5983cc,2024-12-18T13:42:22.853000
CVE-2024-12655,0,0,7ceaaca6f02716eece2d7e73d7d09c21cdb7429363dd024bbff0d12b620fab5c,2024-12-16T17:15:09.147000
CVE-2024-12656,0,0,d7ca036e72b675c7410eee2a09d0c8b1a09bf6f11bc270d361aec72d2859b2e9,2024-12-16T17:15:09.340000
CVE-2024-12657,0,0,d62bb2296e60c72ad405696503588543100255cd21c67ed32539ab7099fc2c10,2024-12-16T17:15:09.520000
CVE-2024-12658,0,0,7138d2d849a9c48736414141f6e0f5483806b353b70b5f0986a2bb641f83c92f,2024-12-16T18:15:10.120000
CVE-2024-12659,0,0,57b490eadd8ce7187dbe6a8f2a837f89476ea13c3f86aa8843b1da895a3678e6,2024-12-16T18:15:10.320000
CVE-2024-12658,0,1,d1603c6f162f68deb5fb3680f23894c8cd48abd18931637daa20165cc25f0652,2024-12-18T16:15:11.297000
CVE-2024-12659,0,1,0f1a25a790c3a06fdcd98e8fc222bbba905ef6e5e8eab8586918a744a057e2b5,2024-12-18T16:15:11.500000
CVE-2024-1266,0,0,2a4a1a9a97982898c100d9d9cb94e7da9ed50410ea3a8e686081520943168bc9,2024-11-21T08:50:11.767000
CVE-2024-12660,0,0,bb60da334f54db48dcd94342bf183fd2a72d6a12db86075b10598ae509d99f19,2024-12-16T18:15:10.533000
CVE-2024-12660,0,1,9ebd9119d6a731311780c33f36a0848bab9bd76dae1d26fe89c7648d30991b8c,2024-12-18T16:15:11.700000
CVE-2024-12661,0,0,b0a5ca69a8f43b38c9f7b899d0ebfd6b57a397e750bb735f317aa453d69aa5f4,2024-12-16T20:15:08.840000
CVE-2024-12662,0,0,b07855f7b8c9ee6bdfd1cdccd03234059b510edc4b4a3a8c0a44fc18dfc722aa,2024-12-16T19:15:07.027000
CVE-2024-12663,0,0,cb1a586129069ffa13466f4c6b4784e75a597b36a82749fcb1b049602849dc70,2024-12-16T20:15:08.963000
@ -245216,7 +245220,7 @@ CVE-2024-1604,0,0,7ac9103a08c9e9dd04004b4e7466052243f63c72b367568e72784f5a0bc120
CVE-2024-1605,0,0,9d25139cf22609654ef8a455d8d21cdf06e67cf1e19359d09ce5b9576dd7793f,2024-11-21T08:50:55.790000
CVE-2024-1606,0,0,98f100f836fcdef4d873587f10566a7e89908cb420114440541bb054f23516db,2024-11-21T08:50:55.920000
CVE-2024-1608,0,0,0a57ef7d0ee1c774c7263d04a6788a7f66bae8cf3338ec576b87a084004d2400,2024-11-21T08:50:56.057000
CVE-2024-1610,0,0,fde919cd17a70d591a0e9fb78822c0d81301cf73bece4329e153b2e758cd4628,2024-12-18T07:15:07.207000
CVE-2024-1610,0,1,dcd3f4f5c3475591d3653517e7aa2a8c5134d3b403a013d0818059330725ac6a,2024-12-18T16:15:12.060000
CVE-2024-1618,0,0,f900010f21bb70b6581fb91ea7ff15d09cd9f4b411eb32fa913b01f49c3af689,2024-11-21T08:50:56.193000
CVE-2024-1619,0,0,27a596ddc3250c410382bc7e145fedcd4a2e3395b97151f21ca063be3207db40,2024-11-21T08:50:56.330000
CVE-2024-1621,0,0,212b3fca00d5946f120096ca5a7a0afc1b2cac9a26b845aa6388948724d52915,2024-09-17T14:12:41.620000
@ -246974,7 +246978,7 @@ CVE-2024-21544,0,0,b52a261160b7bd90c6a69309c9d714496ee1314561724f9272d6d2fde718e
CVE-2024-21545,0,0,12417d057214273e4a76243ffeaf97d513746844d668a1420616fa022f5af746,2024-09-26T13:32:02.803000
CVE-2024-21546,0,0,374b959b014e67074043123d4e408037a721391ba09f30f003dba89985567839,2024-12-18T06:15:22.850000
CVE-2024-21547,0,0,9490da4e046bfe0261ead89061dc5ab090fcc33b7491f225d76294d9a91f7dfa,2024-12-18T06:15:23.187000
CVE-2024-21548,0,0,381335a01313c6891ff8e7885f57f76016b23456e0f299e795e751d21188135e,2024-12-18T06:15:23.360000
CVE-2024-21548,0,1,1234240944f7ab37f9588d239ecac84e4a1f43ed5a4b8fa4e08658630e5fe2ba,2024-12-18T15:15:09.947000
CVE-2024-2155,0,0,1def2d989b10107bcc4deca9404884628c1ba17bdc1993a4df13bb309b4ac8eb,2024-11-21T09:09:09.070000
CVE-2024-21550,0,0,6b574e14ae55a92be9fd93a1bb9ebb56cb79876aa6e47f41fbbb48bbd5163e82,2024-08-13T17:33:13.537000
CVE-2024-21552,0,0,3511199af539fa92e1c2d7637f006a31f2e0de3850c5a9391f1377c23517a9d0,2024-11-21T08:54:39.323000
@ -247156,7 +247160,7 @@ CVE-2024-21782,0,0,6c531c415b293b846940d9e1a482ffa12bf25baae4ff90ca3d8bed86a3300
CVE-2024-21783,0,0,9cba49c73f8dcc0af2561160a017ccd14b4646aa0c3f61abaa34a051f2714ac3,2024-11-15T14:00:09.720000
CVE-2024-21784,0,0,271e66d21546e397c2fae271ef065731034c6a3dc48722d555b9bd3eaefcc535,2024-08-14T17:49:14.177000
CVE-2024-21785,0,0,9a6462e1a4ec679c404234f546462fc2ccedea4788076efb9e4346caa9449e05,2024-11-21T08:55:00.023000
CVE-2024-21786,0,0,3b7692c292cfe04f566e45997f686e7ebd9a0d37b8f88eed63f3df5837053294,2024-11-21T16:15:22.200000
CVE-2024-21786,0,1,1c8979bc86a7e3ed407bcaafd8b21ea0a529ad50c98bba45d8284b04eb31515f,2024-12-18T15:06:28.230000
CVE-2024-21787,0,0,02b845fa11d30ef4d6b5248b543c263f9946579e27a5baee61af2daa73424f03,2024-08-14T17:49:14.177000
CVE-2024-21788,0,0,f9a4599f6e3684f11960e4f6592dc9aa65a582c5ca6406a9d40efd4597155390,2024-11-21T08:55:00.303000
CVE-2024-21789,0,0,c34cd9f442e6303402470c0476d59eb25b078e9a77c0361ee2b35106ce4e225f,2024-12-12T19:11:30.663000
@ -252794,7 +252798,7 @@ CVE-2024-2964,0,0,c6f606448570a617b869ab59eb1eef60539206172254b57930d414027bfbe0
CVE-2024-29640,0,0,65d6530699a7099d302e2fbf8d4b7ca80d9e1a53023aa40de7aef2cea04c7ef6,2024-11-21T09:08:07.760000
CVE-2024-29644,0,0,7b36dddaf548433646a6424210ed0ad6f03f12fd40f0d6d35dd73bdea49e2298,2024-11-21T09:08:07.980000
CVE-2024-29645,0,0,a6a74f9039264972a9c805d4ae9d2f097ab4e597f535a3fa7bafb1d74a950cb9,2024-12-02T18:15:09.453000
CVE-2024-29646,0,0,9c5a78d1ab06abde2bdc222ece20b962f09a0c215407877a474c2c98462d7277,2024-12-17T22:15:06.550000
CVE-2024-29646,0,1,c6e6796b91361e5564fd0ed5e466894336e400dae12021c9b74768d5448f92f1,2024-12-18T16:15:12.513000
CVE-2024-2965,0,0,0e37bbfa530a61c2d82fef1ca2e0856588e0f7ecf3b5b3a3905f885de3031030,2024-11-21T09:10:56.847000
CVE-2024-29650,0,0,32d15580191c7e4ba16d03aee0bb830b6bb78e29fa21f75133466fdca3213232,2024-11-21T09:08:08.197000
CVE-2024-29651,0,0,31d91be0f564d07d6c8f19a393b333b330f5d72e83fb5a5cda786276b03b3635,2024-11-21T09:08:08.420000
@ -254435,7 +254439,7 @@ CVE-2024-31651,0,0,7a05bf060550658aeafb598f6d26f061393d2c8a3005e7e0ac280f9d616f3
CVE-2024-31652,0,0,af62d2ee0de062f978c0bade4d4d954f663c94f8c5efa1dc0544f972ca6821cd,2024-11-21T09:13:48.143000
CVE-2024-3166,0,0,7c4799e6f2d4de4c6793757b3de0601ca1d1298c8c6272ffb0dc9b3a0678bb7b,2024-11-21T09:29:03.133000
CVE-2024-31666,0,0,da138b5625d57499c0f1ce31be7d877b9441e536258adf0c26130a1de3460311,2024-11-21T09:13:48.347000
CVE-2024-31668,0,0,eb43a7c05ffbe3a83f99c21fe6a223fe161a5d02c96a4b394e754d99aa25ecbe,2024-12-17T22:15:06.677000
CVE-2024-31668,0,1,fe137e5887ffc8d5d0ae41a7c6527f0694d1355ef6ce22057122340d655a0735,2024-12-18T16:15:12.693000
CVE-2024-31669,0,0,e67157c072d6472b13e8463ea23f9b22948945715ffb2a3485fbc46118d6e7b5,2024-12-03T16:15:21.540000
CVE-2024-3167,0,0,b0bdf42e92bad376276c8af48f28639bc7025690df7bfcbc255509f46b757355,2024-11-21T09:29:03.290000
CVE-2024-31670,0,0,485c6b39a9c06c65b704780df5587d61e2c68aff13a9abfb705a544147e51149,2024-12-13T18:15:20.167000
@ -260606,7 +260610,7 @@ CVE-2024-39746,0,0,f1afc11bc11a44838803dfd62593cc3e7a4249af2cc2a806a84825178dbd4
CVE-2024-39747,0,0,2364c8f9f85ad03df91981b97454f0719e0ee4edb3b0df3002b45e0ad1d1a3e7,2024-09-16T17:13:47.497000
CVE-2024-39751,0,0,b0c0aaf4fb5c9d1835036b5573daa4920c821bcc0ab31bb499aba831cb233595,2024-08-29T16:56:32.053000
CVE-2024-39753,0,0,9cf0ba8c0db0b89a70f7293ebcb08ff8ef168b9c804117157b5fc41c2f9b0584,2024-10-23T15:12:34.673000
CVE-2024-39755,0,0,3596a79d9bafe3d00191cf168abd9a2d1cc12a641fc02c09b86bdb5808584b83,2024-11-21T09:28:20.680000
CVE-2024-39755,0,1,c89983064fbb3672e96d95936bac6d3850b3b1cd085c9bdec08e8d8a80f60503,2024-12-18T15:15:10.370000
CVE-2024-39766,0,0,844aefab41c4190ffa859ec2a49097c570e2e9373903e050261066d0ad10a0ff,2024-11-15T14:00:09.720000
CVE-2024-39767,0,0,9e1d98afeb59e9ce0a888e3ac87dc97f327ada5cf6782d1b11dbdfa8cede82ae,2024-11-21T09:28:20.950000
CVE-2024-3977,0,0,78ac860cc8a8d0c7c2aed6775586d6934117777782645dfe7099108b8d9721f9,2024-11-21T09:30:48.667000
@ -261438,7 +261442,7 @@ CVE-2024-4116,0,0,fb13e9eda5d5b0f87b4a1a6faf2d47dd767a1cd80c123d34508608e977fd6f
CVE-2024-41160,0,0,59352b379d517c3d21973bcf1f1dabfc101e56caaa086108874e9f5a5016dec8,2024-09-09T12:21:53.383000
CVE-2024-41161,0,0,c44c40c9181bdc0411297b718d634c69b4cc443072a4bbfc4be96011581fd659,2024-08-20T17:09:50.647000
CVE-2024-41162,0,0,977378981001bb41eb21ff3c8de57a2d971d0d349d42fb50bc854dc76c138759,2024-09-04T17:03:53.010000
CVE-2024-41163,0,0,357340e8cc5608358163c5755264225216a3bcb09de10c9f908a3d5ab3f29b43,2024-11-21T09:32:19.947000
CVE-2024-41163,0,1,acd3d59e23a7c7b4b0c3e74d19b58377cdb81402be9adbd0a5cfe7a91ece1831,2024-12-18T15:15:10.730000
CVE-2024-41164,0,0,4c4d4ed9c8462fe5c1beb69a1e440cbfd7fca4e0230442b39f4f5b80ba178ccd,2024-08-19T18:39:06.157000
CVE-2024-41167,0,0,99a054e656d3c12a5ab4c6034e2dfe4d200da81fdf05058d692b86b939cfb420,2024-11-19T19:45:02.660000
CVE-2024-4117,0,0,6cc086281cfe564ad1a8b73d3f7bd2e9fa0d2a40b390da51a0a4f6965f4fec1f,2024-11-21T09:42:13.230000
@ -261882,7 +261886,7 @@ CVE-2024-41915,0,0,74f4b30a3490769bd45dc3bb1c6e58da7fcab263c0eccbe09541d45260e0a
CVE-2024-41916,0,0,e26bbdb30f3e12989e8ba751536faaac62be571602a0259fbe27bdf53bba951f,2024-11-21T09:33:16.797000
CVE-2024-41918,0,0,0025c02645b62e9a013f9a632cdf884d305e491a1529fcde2896b5f25d46b1f6,2024-08-30T16:05:23.737000
CVE-2024-4192,0,0,6f45d7ab3fa2e128e5ba0090b09e0efb99d62d4fa36ffa8103dd1a0f77ba887b,2024-11-21T09:42:21.737000
CVE-2024-41922,0,0,254b44cd11601ad409fb61ca1fe77ec71ef464f71c521f1c6d417253a957e737,2024-11-21T09:33:17.197000
CVE-2024-41922,0,1,c474233251e2cda687143852afe84ade383db4530aec836e5b393340d583500a,2024-12-18T15:15:11.163000
CVE-2024-41924,0,0,7f0f2dba0da77920bc169ff261d197e150c61a323fb8b37c94de1765d8092267,2024-11-21T09:33:17.350000
CVE-2024-41925,0,0,f0afe0eee06b0829945c8f8e62a978d9cd0bb35f1eeab69e0173fdfc98892541,2024-10-04T13:50:43.727000
CVE-2024-41926,0,0,bf6164bec763886028fa43df40afb1056b64cffb366d4c2dd3441f5245ffe1ae,2024-09-04T16:55:35.570000
@ -262714,10 +262718,10 @@ CVE-2024-43080,0,0,cbdb75ee710ea05bfcc86299182b203ee944c795380cbed1c1ab4a87225ab
CVE-2024-43081,0,0,8bed9f6165013dc4c983bb0dd11cd660d0d155d067474bbffbb46b60a90bbdd1,2024-12-17T18:56:04.590000
CVE-2024-43082,0,0,41f8f96f79027c1e757dbe13aba545203ff85b38f1c8fefdaca5693502b27722,2024-12-17T20:03:15.273000
CVE-2024-43083,0,0,c5d837ced63418711f27b1666c35432f60f03fbd8001163f5897844a88ceb2b5,2024-12-17T20:03:05.777000
CVE-2024-43084,0,0,0fd33146e7d0cce08453cc1716b066da0205fa0c58091306a6ca8702671a071a,2024-11-15T14:00:09.720000
CVE-2024-43085,0,0,4f42ac772944e0ea8c2e982c885d48fcdfceb227de595258ecd5f07e9d6b8153,2024-11-15T14:00:09.720000
CVE-2024-43086,0,0,80b431a0904ad8c4f957422f03484c2e69e8f70f42c003572ef3e522999b51b0,2024-11-15T14:00:09.720000
CVE-2024-43087,0,0,bb2ca79e4948799c1e132402b4287cb27629451af5f367413ee982916a302255,2024-11-15T14:00:09.720000
CVE-2024-43084,0,1,2a1af7b64ba220b2b8407a3b7fef8625a8d34948d00740d2a2893b7c5936ca6e,2024-12-18T16:55:58.837000
CVE-2024-43085,0,1,4c65a98e7dcdfc4d65f453f09902a753bd756e294ada7a99374f1e513d421e75,2024-12-18T16:57:04.630000
CVE-2024-43086,0,1,c8147bf14612dec02ed82041c00d93e856a7554ee905a8272e58140ef0dc00cc,2024-12-18T16:58:17.253000
CVE-2024-43087,0,1,b1362eda6c1fbd36406b839c01a221462f14dea6935c5b9ebf185c81099de446,2024-12-18T16:59:38.850000
CVE-2024-43088,0,0,0e3383c6deaa91fa11ae5512a771ce5ccade967587ac39fc390fa94d3c57e73d,2024-12-17T21:16:19.387000
CVE-2024-43089,0,0,1613cdc3eff3fb2309a16178ea47d6da8ef85ad59e68ba23756fcbb9497fd073,2024-12-17T21:04:38.220000
CVE-2024-4309,0,0,cf6d99d40224d9ea0048df61a24b0034afd2baf32b8f2402feb311af37805c15,2024-11-21T09:42:35.797000
@ -265446,6 +265450,7 @@ CVE-2024-47107,0,0,cbccf574787d61b4f6ca0e02b243f9353763dfcf6f42da1d1ab7d0498a1d1
CVE-2024-4711,0,0,e4ef71037ebae75f1c7783581ae71eaf15c6142551362f95bff0adb8f63f9b15,2024-11-21T09:43:25.710000
CVE-2024-47115,0,0,64bb47e915974f1dfec3d4bee74763bed48bbf036cf9597873496ec80cb951dc,2024-12-07T13:19:14.783000
CVE-2024-47117,0,0,a26952e58650ef25d9f11a5aae4455c43930c6e2575395901d2106687495648d,2024-12-10T14:30:44.400000
CVE-2024-47119,1,1,994ba7bddd62d58b5d495b6c62e7b2cee67e96e7d1ae2bfca77b7b79e47b393d,2024-12-18T16:15:13.110000
CVE-2024-4712,0,0,1fed59bb7e8ad0e60ff127714cca3b30ddf28383821e6801d32e14d7ddccef6e,2024-11-21T09:43:25.850000
CVE-2024-47121,0,0,346648e20973f21c82fabd4a08a632a55356bf3264a158afc57ac406e96c43c4,2024-11-01T20:39:20.677000
CVE-2024-47122,0,0,7ba55296c1246880ecd41488ae0cfca0580aa596752d1a2853d946be717d540c,2024-10-17T18:15:05.480000
@ -266042,6 +266047,7 @@ CVE-2024-47806,0,0,a9d6e69f147db55a9010517fe181b09bdf0c723cafc8fe156a8def4f62dbf
CVE-2024-47807,0,0,78bd319435174254d649de27630a1f69840809df78c607ab539f6fa82f612f73,2024-10-04T13:50:43.727000
CVE-2024-47808,0,0,3924b9cefe20472af8979aed441ac27dc70244fae40103f8f689b3bed484611f,2024-11-13T23:14:07.650000
CVE-2024-4781,0,0,dca04dc1498213ba1a1a197fab3ce11b94dddd311dde0315913f82a2ac38840b,2024-08-19T13:00:23.117000
CVE-2024-47810,1,1,38c451958f2c00026c9be0e91cb9a06739ce828be35351d15cd1fd9afab98c55,2024-12-18T16:15:13.327000
CVE-2024-47812,0,0,897aae376a8f43996b3658ca9867b5f6dd4a27027999c91348ce8bcd7002ac09,2024-10-10T12:51:56.987000
CVE-2024-47813,0,0,434303803631cf6bc09b5e35a4b961a326a0a5a5bc7ada44abfa68057841e7ca,2024-10-10T12:51:56.987000
CVE-2024-47814,0,0,486b6a0be2195adb4e752d5b37b1fc387b5904407f29e18a562f1b6e670e5446,2024-10-10T12:57:21.987000
@ -266534,7 +266540,7 @@ CVE-2024-48872,0,0,e0488ddfbbc97cfa53cf7ce570cabf334ccaf2abe7ec833ab649dfba44be6
CVE-2024-48874,0,0,d4dab0701d320c08fdb5c4d13166c7fa76f47b4f8118adcdce9e1ede30e7393e,2024-12-10T19:44:16.093000
CVE-2024-48878,0,0,61df8c716ea1a9423d8f98d007fe741d86381fb579c3442ef6d827deee3b213c,2024-11-05T19:44:58.650000
CVE-2024-4888,0,0,133d57bae18b01966145fd4e4ce13e18e7959193dbb6b4323cb9d35593035efb,2024-11-21T09:43:47.830000
CVE-2024-48889,1,1,b99a18a39ebe41baa99e9049c80af5c10744c585f33eb90839266c39885a6833,2024-12-18T13:15:06.463000
CVE-2024-48889,0,1,b2e68600a95474dd0fd31c01e922367ed4173d86fc21f7e0e3e280e46c787265,2024-12-18T15:15:11.713000
CVE-2024-4889,0,0,54e41cd985dde0162870a1a62b42a9fd40bf90446677bc64ce2d3dd7fe90e1b1,2024-11-21T09:43:47.970000
CVE-2024-48895,0,0,2619cbfc056db229022c601c361879a86e8ef7297a78db8864167658fcd89d44,2024-11-21T13:57:24.187000
CVE-2024-48896,0,0,68f9b7eee2d42fd99555582d831f186b3535e450fad14d101fd4d18eb273b831,2024-11-20T14:47:12.777000
@ -266916,7 +266922,7 @@ CVE-2024-49369,0,0,6258381369a95e122d8b4a8265dd8c9c82340e2a2cd4214543fa7ad31240c
CVE-2024-49370,0,0,28c85860a398a8fd36a32b63f1b5ae8e656dc29d7b1deb02b7ba40b41e39cf1d,2024-11-06T22:31:30.160000
CVE-2024-49373,0,0,58bd472ef3b11ac378ffcf19869120f73b7eacc01228a257ec82cd2e1dc17e38,2024-10-30T21:16:59.213000
CVE-2024-49376,0,0,9641505bfe1891b9fa319aee5e820e5aea0ddba4eb94eafec66369ac3322668f,2024-11-14T22:49:50.667000
CVE-2024-49377,0,0,2747544c3165f608ffe7362af2f34a41155d8208418b404e73cd0adec79032ba,2024-11-06T18:17:17.287000
CVE-2024-49377,0,1,25dd022c5ddd384b788ac4f08857804dbca09312efb00b6da5ce96ab5045b24d,2024-12-18T16:31:26.757000
CVE-2024-49378,0,0,98d825a66aae22af1d83c0197886845e9ecdfd29786ee869ccbb1a9dad42c70c,2024-10-28T13:58:09.230000
CVE-2024-49379,0,0,ea83f88f5d6c7a91cd7b23f7b0d399c76f49d47ade2d0a28d49fe2e11239529b,2024-11-21T17:15:20.587000
CVE-2024-49380,0,0,1c829ef1a8665bcb0604afa76f31075ea3c3600d816f9c8f70d0d57517ae83c6,2024-10-28T13:58:09.230000
@ -267006,11 +267012,11 @@ CVE-2024-49531,0,0,eb72d103c6cd4835b07fe8c9652059e25a040d154610cae27da6b54104272
CVE-2024-49532,0,0,92fc9b812b4b70870fe4de72ea6d3c7eb0afd0629723968400bc0800c2ee9220,2024-12-11T12:15:20.753000
CVE-2024-49533,0,0,9f80fc35b9b3cda710d35a7bb3a94b7ed2be7bff05c8ffe16cf83b4a720a0ca7,2024-12-11T12:48:18.580000
CVE-2024-49534,0,0,74fa2da2d7b9ee3c26509fa642bd9dd550d7b3b25f87840ccbc5696b69d4a778,2024-12-11T12:48:19.230000
CVE-2024-49535,0,0,9aa218795488b1f36fe7631627cbe51e862d69285b1d33800b2e84a9615a8340,2024-12-10T20:15:18.923000
CVE-2024-49535,0,1,a8999da97e4285896456271d4cdceca951f9c859250023ebce227da98e8f2f28,2024-12-18T15:07:06.950000
CVE-2024-49536,0,0,3226abc075af5af9440f5cdc9a3a66360f030ce3d405055960c0bca748fe4e92,2024-11-19T21:21:45.640000
CVE-2024-49537,0,0,8970863ab032ca518f0c2e58fa75ab31a21ed87f68e65d71814b0d6627498e3f,2024-12-10T21:15:16.500000
CVE-2024-49538,0,0,feec2cf472b4f88bc4d41c773ee73be5cd3f24a2df7d45e29fb6f654b910070f,2024-12-10T21:15:16.650000
CVE-2024-49541,0,0,91f72e326a34159bee9600bb0cf0d0bf82612ce7cf0662fcdeccc06449d257da,2024-12-10T21:15:16.793000
CVE-2024-49537,0,1,ba882a99cef27c89f9b2e8ef04d1eabb52008f24920d39f5c7da20d6b3c16d7b,2024-12-18T15:21:52.587000
CVE-2024-49538,0,1,3efeb7dc63ffb7e319a4e954aebfe791b3219c328f7308ff66639e511536c65d,2024-12-18T15:17:43.620000
CVE-2024-49541,0,1,8cb92ef5ac02101c8bfec3741ecff82e1c57862d3057b0e6d10bda1324aa00b2,2024-12-18T15:17:34.523000
CVE-2024-49543,0,0,c9b4f033e0b4993a51461ed9c13dab1caf5a1c072536f8707e443414bfe00bc2,2024-12-10T21:15:16.937000
CVE-2024-49544,0,0,6375c990f2953774194a08b6d4ffd9b501927535475726731d3d95d8c163c092,2024-12-10T21:15:17.073000
CVE-2024-49545,0,0,0363fa582bb56e1fa0b238d904aa7ec665f5600b3b7c3c3b4c5b9a39f5f7dc4f,2024-12-10T21:15:17.220000
@ -267019,16 +267025,17 @@ CVE-2024-49547,0,0,31d064572e588da367222cf3c44bb5ee27c3fa51bcc463f67454b0c37f45d
CVE-2024-49548,0,0,bb1a8bdd70dce7f53d2e671417cf49d2f2712f7c017af0c5a7569f94c4c28a16,2024-12-10T21:15:17.617000
CVE-2024-49549,0,0,9deb18d5ee12538d6eb1657f82a2cdf52686d4b974f294fe2ff86160f99fbacd,2024-12-10T21:15:17.753000
CVE-2024-49550,0,0,27e56b904436c74833992eef941b9e27e78e6d34b2add18e9d4136f40cc8e03c,2024-12-10T21:15:17.903000
CVE-2024-49551,0,1,611d0bb85efb705c2141b0e3ba3a4b055fd8590ff0cdb0b5ca59704d936432a7,2024-12-18T14:45:20.283000
CVE-2024-49552,0,1,1dd42e31d4b7a11f1169e7d95fa23421a35a65b3445da360d90510d9f668bd4a,2024-12-18T14:45:10.450000
CVE-2024-49553,0,1,eb55870165fda3571b7ba6c0913cad8b831c7cff4c74e1be9ab313aaf34a7571,2024-12-18T14:44:55.723000
CVE-2024-49554,0,1,9fed37ff04eac9a74771214a2591c8062f71b41f5a61981624c0ed7a40fac3e2,2024-12-18T14:44:39.800000
CVE-2024-49551,0,0,611d0bb85efb705c2141b0e3ba3a4b055fd8590ff0cdb0b5ca59704d936432a7,2024-12-18T14:45:20.283000
CVE-2024-49552,0,0,1dd42e31d4b7a11f1169e7d95fa23421a35a65b3445da360d90510d9f668bd4a,2024-12-18T14:45:10.450000
CVE-2024-49553,0,0,eb55870165fda3571b7ba6c0913cad8b831c7cff4c74e1be9ab313aaf34a7571,2024-12-18T14:44:55.723000
CVE-2024-49554,0,0,9fed37ff04eac9a74771214a2591c8062f71b41f5a61981624c0ed7a40fac3e2,2024-12-18T14:44:39.800000
CVE-2024-49557,0,0,6601a96c4bc210f01d32593bfa488dfcd4eaf5855ed8b64d0dab8c422cb09b1a,2024-11-15T17:36:47.110000
CVE-2024-49558,0,0,d6190c4fa083ad35fb776a8089e14895ccaced89c942fbc8e925117ea666e076,2024-11-15T17:35:54.480000
CVE-2024-4956,0,0,b59f0fa653d583ff50139b3494916619d3242eed1a7ae59aab01da9b6e8c6c91,2024-11-21T09:43:56.520000
CVE-2024-49560,0,0,3f26500c4dded44eae4dc46589e64362e416f55913f19fef12f4ea5a50ab24a4,2024-11-15T17:35:25.407000
CVE-2024-4957,0,0,faf1bb90e1dc631958a9f6c5494539e38e22b9c3203a1f9393f289eefc9d7e39,2024-11-21T09:43:56.650000
CVE-2024-49574,0,0,285edf65c7736387bb1f5e69a3d9da68a65cb104e57ac1234838e33c6baad7dd,2024-11-20T16:32:37.770000
CVE-2024-49576,1,1,9d57afcdb9172895acadef07fcfbd355456b53b471c99d19b25b924d0c951281,2024-12-18T16:15:13.477000
CVE-2024-49579,0,0,9abb18443d506ce310fd7f4e6167b121033f3a0e20d401bce4799bb038c96994,2024-11-14T19:24:45.603000
CVE-2024-4958,0,0,8a8c67bc903e1a46ad33f1a53da00f2ab4fc5b43d3db7efb6913c74195b26737,2024-11-21T09:43:56.820000
CVE-2024-49580,0,0,3616bf5be4f69eda17b61f84b4b764987072fb4d926e0d601ddb18e72d10c716,2024-12-06T14:15:20.670000
@ -267296,7 +267303,7 @@ CVE-2024-49946,0,0,4282502abb14004f3ad3b6990ba1eea19c5a1f24f9e8009830652e8dcd140
CVE-2024-49947,0,0,45246e2f634d00c4f196249e0c002c9ac4a3e83049907010f1a2ea778482c097,2024-11-12T21:25:21.870000
CVE-2024-49948,0,0,3c07375ebdcbc88e821363a12991edcd9ef0a0e6f3e0ea074854719cb756d20d,2024-11-12T21:19:24.440000
CVE-2024-49949,0,0,862d00735d151a14c8eadd98da18017da1bd5bd1db3933cfea0083036e3d13f8,2024-11-12T21:03:59.377000
CVE-2024-4995,0,1,986418d30d21cfb98312b300bb79eecd8b7d17f957cd4c96230861aa29869492,2024-12-18T13:15:06.603000
CVE-2024-4995,0,1,f68e763650eeece035639a09ceaca84e91bf5906632316def97713e472692c36,2024-12-18T16:15:13.623000
CVE-2024-49950,0,0,a3b2e262aca9e244ab2da6b1f6a174049eadab2e9a1c66c343347b7a6457968f,2024-12-14T21:15:31.613000
CVE-2024-49951,0,0,1bcd56af774503e3361ae7748b61405667859f87d6c481b76256bab77dfaa560,2024-12-14T21:15:32.053000
CVE-2024-49952,0,0,4211d2a9f88cb08f96387a31b9ab3d61b023ec569e7605a0a8bc222d3124b341,2024-11-13T00:46:03.893000
@ -267307,7 +267314,7 @@ CVE-2024-49956,0,0,ad41e742c241feac4d7d72745b86d5b76fa77783fcd0fc01df15ad2e54cc7
CVE-2024-49957,0,0,9fe20b814f873df80408128cebb309ff4cb21aaafe57f30b76e489a1f3b92b1a,2024-11-08T16:15:33.963000
CVE-2024-49958,0,0,5a97ea90ba1b12a92ad466299cd8b86dadc4bd73e96d0f2c30a9c22bc81604fc,2024-11-08T16:15:34.497000
CVE-2024-49959,0,0,6fe07b5cdf4fe31cd38dce519a93cee53aeca01693535ae376b18ac0b1feb771,2024-11-08T16:15:34.923000
CVE-2024-4996,0,0,46cadb52903517fe87cbb6981ddc580cd04057e637a71401fff7fce04e8a9988,2024-12-18T12:15:10.120000
CVE-2024-4996,0,1,fe9c51703241a5e08e80f910c01b4cf4e9259ab2df8ff747b49df30230200b57,2024-12-18T15:15:12.210000
CVE-2024-49960,0,0,acab1eb31f27cdc9f4ae9bec65ad798d53c3a894c6765df6ead00c7435d0c074,2024-11-17T15:15:18.527000
CVE-2024-49961,0,0,dde3df5f8bdf7f3dca86d86905800e80b0cf9f5a049803c6b644a59c20edafeb,2024-11-07T19:22:15.323000
CVE-2024-49962,0,0,9e23d9ec87abc1ddc1631ece5ff7f04c4c36be12aa82158171cb5a65d60f4061,2024-11-08T16:15:35.413000
@ -267942,7 +267949,7 @@ CVE-2024-5056,0,0,8fffdd4127619c786aa0989407007469ff9a6aa73bf668207b4ad19c19de15
CVE-2024-50560,0,0,849cbb22dc43c9735ca18b0189950c1e8b5ecac4d47888f5bcbc5715b936ca6b,2024-11-13T19:57:26.073000
CVE-2024-50561,0,0,6a51b1f26d5cf18987d57ec188dc14932c4d4312c95a1bfb0fba3e588b50e618,2024-11-13T19:57:56.313000
CVE-2024-5057,0,0,4e84b19a66dd237677e71f8f6b2954676ecae2fca742ad51c75df8e74bfe774e,2024-09-20T19:31:39.437000
CVE-2024-50570,1,1,f9157bc75575272446e4073921d61d6ebbbed4953349b34b8c3f0c79945a24c4,2024-12-18T13:15:06.723000
CVE-2024-50570,0,1,656c45b6a78bd12c8be76f16ba1ffd796360a02af9369e6704fbe99b4c8d1f89,2024-12-18T15:15:12.660000
CVE-2024-50572,0,0,87b1aa24f79c401027b600910fcd433cb81a62e025ef81c863f015edbd3acb6f,2024-11-13T19:59:16.777000
CVE-2024-50573,0,0,5e3f4c1fdb2489361c9b59a48c617ae9eab2b22b74a42b1c1ca13ebdc04a62f4,2024-10-29T17:12:14.760000
CVE-2024-50574,0,0,19a8794809392a79fd68e4eae98e9cf9304f94ab7b7bbefdac60fad919a3e7be,2024-10-29T17:16:11.277000
@ -268188,7 +268195,7 @@ CVE-2024-51163,0,0,909afcfaa554939e2c78d7e7af80c5c6961aa7c27e1f5cf118fbed2c52564
CVE-2024-51164,0,0,d940764ceb362d708d88f9f5a08c2c1f5532b8b37b034d71dff6267e64a0a937,2024-12-09T17:15:09.107000
CVE-2024-51165,0,0,fb13fc4e35d92e7921bbef9ce68653c7bfa08c0c1cb970241bfa8c45e1d3cd41,2024-12-11T15:15:15.067000
CVE-2024-5117,0,0,5e271946d97109af9825c50a9b323ef04401bb4942989f9cb9a1e16ac2b2951d,2024-11-21T09:47:00.397000
CVE-2024-51175,0,0,8b124ed125e4290ebc7e2820a7508eb560e9667a033dcad77d17b3f76c38d839,2024-12-17T22:15:06.967000
CVE-2024-51175,0,1,dce24c1eaf11861a84455f13a86f07726c40e17157f133b2e3dae094c593cd8d,2024-12-18T16:15:13.807000
CVE-2024-51179,0,0,857fcabc550df085f68e65184c598436a379cf4f02ab73f3edfe252d5c778dbf,2024-11-13T20:35:10.303000
CVE-2024-5118,0,0,d1846e4a7219ebf75ef8c1b0d7fa03dde76ecbba746e36b5705002065c1088bf,2024-11-21T09:47:00.520000
CVE-2024-51180,0,0,d73a4bc4d13930db91fa8b4827a1f38d71bad2587cedb5ac7ed1fc13326493e8,2024-11-04T13:37:15.737000
@ -268306,7 +268313,7 @@ CVE-2024-51489,0,0,fee4ce2f3b921e5364e523268cdb4b484a8c65d64be4c59f477d40e226367
CVE-2024-5149,0,0,afb83ca572eb753fdcb6786ae747885cb6d3501e72a1f00595e91c4c4528be83,2024-11-21T09:47:04.267000
CVE-2024-51490,0,0,afa618adfe44ac20c77d2ef3b8a8503a964784c38cf29e6f924fdca9d564accf,2024-11-14T20:13:01.587000
CVE-2024-51492,0,0,033f3b3764a927ebfe5932515c3e806cbe0b3ee319f77a5ff6b6235b21773605,2024-11-01T21:15:15.080000
CVE-2024-51493,0,0,581d61acf6b2a6411c0b099fc844a7c750b289c8e1f9b58c4a3e6f901f08c9d7,2024-11-06T18:17:17.287000
CVE-2024-51493,0,1,eb28e87be49323e583a476d82d4acd2cdc1dda50d07ada4162428002028ecc66,2024-12-18T16:34:37.497000
CVE-2024-51494,0,0,e7db54adc858b5ec905948b1ff770c8ac2a5ba1e309a5e79cdf3f488969e4e20,2024-11-20T14:40:56.067000
CVE-2024-51495,0,0,0b82f050cc5432a34e733e3193b547474d84296d541583e9f04afbddacff8214,2024-11-20T14:41:07.960000
CVE-2024-51496,0,0,c7953a751a828994c420ea0a9571e994d55971e9bb348b8095d7f01580aecd3c,2024-11-21T23:33:42.223000
@ -268457,7 +268464,7 @@ CVE-2024-51642,0,0,5152e85707089a7f3186d35c0774851bc910b269c16bcf282f6f8c964d97d
CVE-2024-51643,0,0,6cd95bcb0b7533023b50646b0fac301aca8db2d6cdd664093da0890b1d9cb32a,2024-11-19T21:57:32.967000
CVE-2024-51644,0,0,34e478edea57d0615ca8c922c7e7d4b0973519169e85ccc175b6a394b6401123,2024-11-19T21:57:32.967000
CVE-2024-51645,0,0,06028be70e3cbb5560cab4fc4dcc9fdb4e95ab08be7c034a585406faa5e25e73,2024-11-19T21:57:32.967000
CVE-2024-51646,0,0,b391865e870d9134387057bc06f0e5d67ed66c2d1ef2083a2b758d08cb39d757,2024-12-18T12:15:10.270000
CVE-2024-51646,0,1,1519fb94dc9c18fc26717442707cf90689c24b551873d4ec42db9e4a2a935e94,2024-12-18T15:15:13.100000
CVE-2024-51647,0,0,0324321535da7d43ca4deac4fdb3c1e7d74c19d7383440bb5b1349d55f97e233,2024-11-12T13:56:24.513000
CVE-2024-51648,0,0,dbb0968afe4034eda92af49d97342dc91c1ea36f66d8dfaf80e8afd706de0c57,2024-11-19T21:57:32.967000
CVE-2024-51649,0,0,c81969392142cf30b442ca2488ba5a508853d5d91fdf922f672d341833d4b7a4,2024-11-19T21:57:32.967000
@ -268917,6 +268924,7 @@ CVE-2024-52358,0,0,eff777e3be5ddb169c3548cec44602bbe2f0db010fa6395da9f6055a387be
CVE-2024-52359,0,0,509efcb95ef880ccde43fccb440c416e0525cc864ec20eeb05761e61ccf2af92,2024-11-19T21:56:45.533000
CVE-2024-5236,0,0,2567479af261d5b21b924e08416f98f775dfb54600e5bcd680efa9c7d4ca6153,2024-11-21T09:47:14.757000
CVE-2024-52360,0,0,bdf752aab28a84a7b3de79826a68d96a66c86dd4dcfd4d6f09f0c3b534e4dfec,2024-11-19T21:56:45.533000
CVE-2024-52361,1,1,f4c649a700356a9f12fca9f45826e9542bf30f938709e94af9bb05088c18f829,2024-12-18T16:15:13.967000
CVE-2024-52369,0,0,e081cda06af085b69b5cce5744190264c91cd87aef2aa4d459e7fe8f2ad5e6bb,2024-11-15T13:58:08.913000
CVE-2024-5237,0,0,850239c5226c0c64e0e8de715a204a907770a544458b3a79e6f4fcfb6446a2ec,2024-11-21T09:47:14.890000
CVE-2024-52370,0,0,d2931a84b2cf7b14e018c99dc708ce275e6f773b3432c9c5f476dcff0fb41c95,2024-11-15T13:58:08.913000
@ -269220,11 +269228,11 @@ CVE-2024-52816,0,0,65718f19cb2a012b57ef8da79137eacc99e273905d4b5a57cf388720343e4
CVE-2024-52817,0,0,efe63aa74be98b62fb8efa77a61c6f381ccaef4b4fb5791a86cabb88197bdeaa,2024-12-17T16:15:10.480000
CVE-2024-52818,0,0,dcc413435dcf9a0af7b50af7ae991dda0838f2f16eef7b8a7c245b50433a355c,2024-12-17T16:15:02.203000
CVE-2024-5282,0,0,4f51eeaed389eb920a9aeb3a8c1e7ea5a9931768c3b7eb6744dae1b0adac061c,2024-11-21T09:47:20.920000
CVE-2024-52822,0,1,b22cafd5257f10f5073e0f374a0d447cde3ff37287c43d6b35cf7538951510ff,2024-12-18T14:35:48.033000
CVE-2024-52823,0,1,60a92de261074317b7fbcbb26089c290cd6b225912af8fc2c46673befce41c22,2024-12-18T14:35:57.397000
CVE-2024-52824,0,1,4ad454480717c6a1ddf7ff65bef603b57f7b3fef6a73a54b0be27fbf86e37543,2024-12-18T14:36:05.817000
CVE-2024-52825,0,1,22b446091da7d8a51fc25dc5cd2d4a06d6f87b184dbd7d292030afe026e9d25a,2024-12-18T14:36:15.417000
CVE-2024-52826,0,1,1cb02c2e1532d9fe3dd2cd2d373f5125d0525c3df87b513eb69078e738134aaa,2024-12-18T14:36:23.140000
CVE-2024-52822,0,0,b22cafd5257f10f5073e0f374a0d447cde3ff37287c43d6b35cf7538951510ff,2024-12-18T14:35:48.033000
CVE-2024-52823,0,0,60a92de261074317b7fbcbb26089c290cd6b225912af8fc2c46673befce41c22,2024-12-18T14:35:57.397000
CVE-2024-52824,0,0,4ad454480717c6a1ddf7ff65bef603b57f7b3fef6a73a54b0be27fbf86e37543,2024-12-18T14:36:05.817000
CVE-2024-52825,0,0,22b446091da7d8a51fc25dc5cd2d4a06d6f87b184dbd7d292030afe026e9d25a,2024-12-18T14:36:15.417000
CVE-2024-52826,0,0,1cb02c2e1532d9fe3dd2cd2d373f5125d0525c3df87b513eb69078e738134aaa,2024-12-18T14:36:23.140000
CVE-2024-52827,0,0,4cff649de3d95b42209b4473a6f0f81906bc0ec9497ad33594b5e031c6c755ec,2024-12-13T16:30:28.017000
CVE-2024-52828,0,0,b91fe6328a18fb3b30a5eabdd9d8505c62acd230a6c59a5f57df74efc21022fc,2024-12-13T16:31:44.753000
CVE-2024-52829,0,0,c106e3d1fce91af490fece8750d8c3941c825efb7a57e842b25787e876aa82f3,2024-12-13T17:12:13.453000
@ -269232,19 +269240,19 @@ CVE-2024-5283,0,0,2e4c0e59b537a1fa6ef21044d27ad6c5c503d962bc23f2bfaaea7d6483dfc4
CVE-2024-52830,0,0,520275838c0dd5c92182498e39edb487b6f8eb3d04d45f85e0b9a800aba0348d,2024-12-13T17:18:43.007000
CVE-2024-52831,0,0,febc6ce542b9dea4fc3ebc985b026e7cd9b8167d00a2e198d286f4415587ad5f,2024-12-13T17:20:24.467000
CVE-2024-52832,0,0,7cffb2271f69c746cdef4738f588d99cba2378e891601a03a56800f8f1a2044d,2024-12-13T17:20:37.987000
CVE-2024-52833,0,1,751a005b876b2ea1c588dd46853cf3b76001db256f88e1e9dc37654077d36db6,2024-12-18T14:37:46.917000
CVE-2024-52833,0,0,751a005b876b2ea1c588dd46853cf3b76001db256f88e1e9dc37654077d36db6,2024-12-18T14:37:46.917000
CVE-2024-52834,0,0,347eaba9bc4ad85ef5dbc05cebef0fcb760c58a6d09f0b408ba67fa855d111fa,2024-12-13T17:20:47.050000
CVE-2024-52835,0,0,557a364e982453bccf292c228d0a61611ef88a1259bb5b4c993a22d496fa48bf,2024-12-13T16:13:32.757000
CVE-2024-52836,0,0,bb631b92ccd3891aad956d691a76e9dd7443cb1739d057b2be16684bc359f123,2024-12-13T16:14:29.700000
CVE-2024-52837,0,1,349efd4e08effcd00056f33be7a4b2cdd210775020cf785043d6f37aea6e53ed,2024-12-18T14:34:46.873000
CVE-2024-52838,0,1,b60793e4d0224f64023e50b7bc13fab6acdbf2c4e838748a9aacd4fdcdab8a35,2024-12-18T14:34:59.720000
CVE-2024-52839,0,1,37c691f868df4d2aff4458ac7178866f15a38d17e9534e07c494713eb51f3572,2024-12-18T14:35:11.923000
CVE-2024-52837,0,0,349efd4e08effcd00056f33be7a4b2cdd210775020cf785043d6f37aea6e53ed,2024-12-18T14:34:46.873000
CVE-2024-52838,0,0,b60793e4d0224f64023e50b7bc13fab6acdbf2c4e838748a9aacd4fdcdab8a35,2024-12-18T14:34:59.720000
CVE-2024-52839,0,0,37c691f868df4d2aff4458ac7178866f15a38d17e9534e07c494713eb51f3572,2024-12-18T14:35:11.923000
CVE-2024-5284,0,0,f27d035f8fcaa3c5dd2f39806299edcb6edf39605d373e0e7746729a950daa3c,2024-11-21T09:47:21.243000
CVE-2024-52840,0,1,8aed5dc01ff182fb548191a463492c217b9fbc9225631748b5d9054898c2eb7a,2024-12-18T14:35:19.387000
CVE-2024-52840,0,0,8aed5dc01ff182fb548191a463492c217b9fbc9225631748b5d9054898c2eb7a,2024-12-18T14:35:19.387000
CVE-2024-52841,0,0,c8467e34a184eae8ce4b1586866b104207c3fcaa8a38c3dea3df3bb5325a76b9,2024-12-13T16:14:51.557000
CVE-2024-52842,0,0,edbd163abecabb58f05c4fd89ad1573cbbe839ed3c8ab35519a641c99210c33d,2024-12-13T18:24:06.850000
CVE-2024-52843,0,0,5fd72c40f0ae5ad98a380113e9bb4e1565078e456e19e0a3b876eaaefbc71b33,2024-12-13T17:54:11.087000
CVE-2024-52844,0,1,e95f6733cfd59033d5259410d695702408c383031f175584990ed0b352a90a0b,2024-12-18T14:35:26.830000
CVE-2024-52844,0,0,e95f6733cfd59033d5259410d695702408c383031f175584990ed0b352a90a0b,2024-12-18T14:35:26.830000
CVE-2024-52845,0,0,5afdf9f50a91c1c6cc8c83e6aba2293e2effe3a02c7213a80cd349be6bfa509e,2024-12-13T17:51:52.947000
CVE-2024-52846,0,0,53ae29cfadfd5847e49bef6406b8098a1a394806f811a3481e607809b9d15215,2024-12-13T17:48:57.057000
CVE-2024-52847,0,0,9e4c91e8efedf4ca2af8b61d77e21f4db510b33eb05aa1fad0ff557e1469568d,2024-12-13T17:46:39.203000
@ -269321,10 +269329,10 @@ CVE-2024-52990,0,0,1a8258608b63e768b81712a1a814b5b5bd50621818ba954ed68179d4a00a0
CVE-2024-52991,0,0,31b863d2e03e48d18e25f425a4f20cecd39fb1c77024ce95c801312d4f3b7752,2024-12-13T17:27:06.727000
CVE-2024-52992,0,0,4d53291470ab136f27a66ea7467884b716a4a5aea28b831ea4c4a4f7882e290c,2024-12-13T17:26:54.557000
CVE-2024-52993,0,0,db5998c6ae30c948d19b78a1af997a52a94f5ef929b12f2d7b8b14bad2b95a24,2024-12-13T17:26:44.473000
CVE-2024-52994,0,1,c998bea66b845df8b2b6b90703ba2003e446cba57ceb9d0593eba768fd0209a8,2024-12-18T14:38:48.680000
CVE-2024-52995,0,1,6a31c320fdfe444795b4f4a7b3ace65e7a30cbacaffe2dd49cd9a4f319f6f559,2024-12-18T14:38:36.227000
CVE-2024-52996,0,1,352b91e59b5b6883ee5377d034459d1c8e41fed8425d131ce1df9a0a25e0e58e,2024-12-18T14:38:24.727000
CVE-2024-52997,0,0,4bab8dd1c249700329744c631b9c50fcd74d421720a6dd9cecd7f81f37dea809,2024-12-10T21:15:19.740000
CVE-2024-52994,0,0,c998bea66b845df8b2b6b90703ba2003e446cba57ceb9d0593eba768fd0209a8,2024-12-18T14:38:48.680000
CVE-2024-52995,0,0,6a31c320fdfe444795b4f4a7b3ace65e7a30cbacaffe2dd49cd9a4f319f6f559,2024-12-18T14:38:36.227000
CVE-2024-52996,0,0,352b91e59b5b6883ee5377d034459d1c8e41fed8425d131ce1df9a0a25e0e58e,2024-12-18T14:38:24.727000
CVE-2024-52997,0,1,697d46fe395eee9e632e6124f6d3fe636de19be7b4a8659655832bde87ad8ebc,2024-12-18T15:14:35.513000
CVE-2024-52998,0,0,6290b7bcb6009685ce74422e3ebe6e84d8aa2373cdb09dbaf200385294d7d729,2024-12-03T14:32:51.580000
CVE-2024-52999,0,0,33d693dd8ea7b996acf75cfb9082fde4a08b008c5d482a4ef8516eb8f33def3e,2024-12-12T18:52:43.880000
CVE-2024-53000,0,0,630659d15fdc5bad4e6f03fdea846c346398b9852520417b1b8921c8c6a6d970,2024-12-12T18:49:40.543000
@ -269785,8 +269793,8 @@ CVE-2024-53947,0,0,b42db7838a4330c67a4fe62e48645e7bfb198c9a3c642c30c8c0bf4ba786d
CVE-2024-53948,0,0,589d596ec1037b170a013fb9a9684519d93fddab1a0d95435f11b953389a4b4e,2024-12-09T18:15:23.893000
CVE-2024-53949,0,0,80c64f01ed1e717784a7e12e62d1542fa35c57ae831dd3df9e1a9467dad60834,2024-12-09T18:15:24.013000
CVE-2024-5395,0,0,aa518ac6cc2e8e3e116d2e709097641ebff6dab87bd1ab80d2e397c0f6317f19,2024-11-21T09:47:34.290000
CVE-2024-53951,0,0,460ff34eb07cb16bc696304d7cc5390e00423280a9e9278aef0f9642dbc82d53,2024-12-10T21:15:20.167000
CVE-2024-53952,0,0,477fcdf2f824403cf035b81cb14addf0a6e3be35948c5962c9d2ab3ea7d057cd,2024-12-10T21:15:20.307000
CVE-2024-53951,0,1,bed406754e2e414b104efd3eb1c72bdfbbfd0447862bc041d6f24ed2188caeb2,2024-12-18T15:08:14.407000
CVE-2024-53952,0,1,e709da7c68f85daad426a8b159797750fb6868aacc174441eebd3216c961f6c5,2024-12-18T15:07:51.167000
CVE-2024-53953,0,0,e8e224e197b12492e1ebf9fd6d8d460660d01143e19ca6d1c5663ca5b7e6d09b,2024-12-10T21:15:20.437000
CVE-2024-53954,0,0,0db97b622b3553347d9d9e56143b3479938cbd9d92f9460359ff19e88af9903c,2024-12-10T21:15:20.560000
CVE-2024-53955,0,0,8aa46e10bc17559dbedd3ecdffab1753d45263b50071af9071472921d4bbee43,2024-12-13T18:29:02.127000
@ -269829,20 +269837,20 @@ CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159
CVE-2024-54032,0,0,09cba91a1df36e472a78f8f144bb0e8b61b676d406db1792f2031c6b3f2fb2b6,2024-12-10T21:15:20.690000
CVE-2024-54034,0,0,966edd017a57a1808f5de74caa3cb2bc440d3f55cf34a20417d369b2c7aa38e8,2024-12-10T21:15:20.817000
CVE-2024-54036,0,0,3018605477ed7dbca479c548307fd9bd3dfad4d0112e1f577cf4e868d3c9a01b,2024-12-10T21:15:20.947000
CVE-2024-54037,0,1,f556890ba3fe80df125187ebcadddc7ae2b89a3c8454bb4084a0b553458107af,2024-12-18T14:40:29.303000
CVE-2024-54037,0,0,f556890ba3fe80df125187ebcadddc7ae2b89a3c8454bb4084a0b553458107af,2024-12-18T14:40:29.303000
CVE-2024-54038,0,0,92ce715c583f62225c8c85cc0d83f79cb82abf9ebe1a12a974431832bf726201,2024-12-10T21:15:21.210000
CVE-2024-54039,0,1,71aebf25c5147d9790628c00b402ce1cee82b243f9de77d9f70b222872f7f46c,2024-12-18T14:40:37.587000
CVE-2024-54039,0,0,71aebf25c5147d9790628c00b402ce1cee82b243f9de77d9f70b222872f7f46c,2024-12-18T14:40:37.587000
CVE-2024-5404,0,0,3740c7be3046d2190332188e66ec21e8b1d4282df75b875095c31d64e80fbe92,2024-11-21T09:47:35.213000
CVE-2024-54040,0,1,13233b484ebb0fc9bf3b9db7209ca33808cdf1c4b9bbbc04e46251909657b46e,2024-12-18T14:40:44.710000
CVE-2024-54041,0,1,d9bcc030129bf6dec82b04a143991ef06874386036703482c0d5681793cd304a,2024-12-18T14:40:52.247000
CVE-2024-54042,0,1,d205e714ae3b471ec5751c4d7d1256e8dde35c581fdb843feba182830d6e5b5b,2024-12-18T14:41:18.750000
CVE-2024-54043,0,1,a09d048cd5fad08e1c76aae1659cafdd14c558b6d3443af54df5e3f9eb9a7869,2024-12-18T14:41:29.400000
CVE-2024-54044,0,1,00a7a44023c704d5d2eeeaa4254894fe51a133f16d96695f5d6e03479217de9e,2024-12-18T14:41:48.010000
CVE-2024-54045,0,1,16afccc174d0d1eb47914c68c8c94946afb636a9e0351682dbd249dbd8289141,2024-12-18T14:41:55.727000
CVE-2024-54046,0,1,886025f67a00b517cf304eea4a10a7bff2cdeb7eb08408123ad3b2b3ebc95f79,2024-12-18T14:42:06.897000
CVE-2024-54047,0,1,e9a3750e3cf6d428500a5ecf267ff6e8fa190a5d46e36bbbc36c6a5f87e787ea,2024-12-18T14:42:14.767000
CVE-2024-54048,0,1,1732d4671bbeea0157b6640f3723e4501447d2b687ba3a9a6cb84ef94950a1a8,2024-12-18T14:42:22.940000
CVE-2024-54049,0,1,b25add6c7f4972fe04c3adfdc0b2278f3dba4fd570c385f036735c8663a66627,2024-12-18T14:42:33.907000
CVE-2024-54040,0,0,13233b484ebb0fc9bf3b9db7209ca33808cdf1c4b9bbbc04e46251909657b46e,2024-12-18T14:40:44.710000
CVE-2024-54041,0,0,d9bcc030129bf6dec82b04a143991ef06874386036703482c0d5681793cd304a,2024-12-18T14:40:52.247000
CVE-2024-54042,0,0,d205e714ae3b471ec5751c4d7d1256e8dde35c581fdb843feba182830d6e5b5b,2024-12-18T14:41:18.750000
CVE-2024-54043,0,0,a09d048cd5fad08e1c76aae1659cafdd14c558b6d3443af54df5e3f9eb9a7869,2024-12-18T14:41:29.400000
CVE-2024-54044,0,0,00a7a44023c704d5d2eeeaa4254894fe51a133f16d96695f5d6e03479217de9e,2024-12-18T14:41:48.010000
CVE-2024-54045,0,0,16afccc174d0d1eb47914c68c8c94946afb636a9e0351682dbd249dbd8289141,2024-12-18T14:41:55.727000
CVE-2024-54046,0,0,886025f67a00b517cf304eea4a10a7bff2cdeb7eb08408123ad3b2b3ebc95f79,2024-12-18T14:42:06.897000
CVE-2024-54047,0,0,e9a3750e3cf6d428500a5ecf267ff6e8fa190a5d46e36bbbc36c6a5f87e787ea,2024-12-18T14:42:14.767000
CVE-2024-54048,0,0,1732d4671bbeea0157b6640f3723e4501447d2b687ba3a9a6cb84ef94950a1a8,2024-12-18T14:42:22.940000
CVE-2024-54049,0,0,b25add6c7f4972fe04c3adfdc0b2278f3dba4fd570c385f036735c8663a66627,2024-12-18T14:42:33.907000
CVE-2024-5405,0,0,8df36cd9ebb4aacfaea97c0ae9188e72e9768324f03849be72121f482af48749,2024-11-21T09:47:35.333000
CVE-2024-54050,0,0,ee890076fea5f3ad9c6bc161fd143e9721aca9308eee09b7d2528e630a5ae13a,2024-12-10T21:15:22.767000
CVE-2024-54051,0,0,0b1f5c4d6a6660f6eca551d294b306144268ea170824a2e433c9ff96bee1678e,2024-12-10T21:15:22.927000
@ -270203,7 +270211,7 @@ CVE-2024-54498,0,0,fc98c473c1335953bb96a6e6cd9754f341ebec98c3d5942a318f55432f437
CVE-2024-5450,0,0,24d03210219d9f2f3eeb200aadfbbd2297fa2c6b8d7ee9efe09cbafc9256a693,2024-11-21T09:47:42.517000
CVE-2024-54500,0,0,657f282c345a307f53f35dde04bf557f78e33359ddf485d7b8b3507dfe14769f,2024-12-13T18:34:26.490000
CVE-2024-54501,0,0,53a4207c1a9b8c09d2aa36aac95634b59bf35106c5d727899990d0735b43a2db,2024-12-12T17:15:10.837000
CVE-2024-54502,0,1,0d530603cb62daf612c8e9f528cce0e30598037590c6f193eadb47d9a4b82777,2024-12-18T14:13:13.297000
CVE-2024-54502,0,0,0d530603cb62daf612c8e9f528cce0e30598037590c6f193eadb47d9a4b82777,2024-12-18T14:13:13.297000
CVE-2024-54503,0,0,e82e1cc53ce4edc412c3815492fda2911d5e300ada63831244d44df64c1dffb7,2024-12-13T19:15:09.727000
CVE-2024-54504,0,0,bb03ec612268af63063ae51e589216e30653413b6baaf8d7e8860c5e5b629ab1,2024-12-16T18:15:11.317000
CVE-2024-54505,0,0,a90c7f848a0c4214637edeae9c3a0316f06e116644b32639b5ba817d96b2ce78,2024-12-13T18:43:13.217000
@ -270212,10 +270220,10 @@ CVE-2024-54508,0,0,d56b4a8254b12af7295bad2aeed77ff208b735dc12ecbae90c5116eeac15d
CVE-2024-5451,0,0,20c45f860616b7f2fb649e3fe37f7d2b12e76160bf7131f2da5e11d5d4dbf253,2024-11-21T09:47:42.677000
CVE-2024-54510,0,0,41760ed29ca005a3bcf19679bc5f9d3112d6162f99c7272e8e6073225291c2cc,2024-12-13T18:07:49.633000
CVE-2024-54513,0,0,59e90aab7af338ce166e9f6872df66dd31c7c6fbffec6972f97a29bde7559e69,2024-12-13T18:09:28.273000
CVE-2024-54514,0,1,6d1b7501f54b581c9fad4ccbc7c7ec7f90e2e83a8a1d8bac1a1733a97e309873,2024-12-18T14:05:50.673000
CVE-2024-54514,0,0,6d1b7501f54b581c9fad4ccbc7c7ec7f90e2e83a8a1d8bac1a1733a97e309873,2024-12-18T14:05:50.673000
CVE-2024-54515,0,0,c445bd848e4bc13ffd78ff33c0ea49b95c8a73b35bda3dc25adccc76a7fc0eac,2024-12-13T18:15:31.650000
CVE-2024-5452,0,0,b01b2e3bd56dc4d1c97364b861c6906ac1d43b69b37e06474f7fb830a26b907e,2024-11-21T09:47:42.793000
CVE-2024-54524,0,1,f1841b79a984dc339395e420615a7246f02aaa993793861427c269ef59ff9324,2024-12-18T13:59:47.450000
CVE-2024-54524,0,0,f1841b79a984dc339395e420615a7246f02aaa993793861427c269ef59ff9324,2024-12-18T13:59:47.450000
CVE-2024-54526,0,0,aefe7086f2d764fc872d00eaa2f2173838af254c5b93971d556108953f443875,2024-12-16T22:15:07.320000
CVE-2024-54527,0,0,0bdb505436860de3001c9f8bc7d8b06aed949a47878b0053a48f86090c332969,2024-12-16T19:15:09.313000
CVE-2024-54528,0,0,907ebed6815f9bd0b298566a5f1bfb05901aa5e62ed532357217cb276556f398,2024-12-16T19:15:09.480000
@ -270234,7 +270242,7 @@ CVE-2024-5464,0,0,255f781a5f94f0faf95d7c73d6b2015838426915e8e0274a4b6257e37377ce
CVE-2024-5465,0,0,d854caa252ac359088449fa3628f1e50a198f1dced6d951af90835f292847339,2024-11-21T09:47:44.140000
CVE-2024-5466,0,0,aeb87495bff32a890c0c9e42c15ed7e8404f17a4b772443295fb3ce14954ee66,2024-08-27T13:32:50.803000
CVE-2024-54661,0,0,ea173308d01492e6ad07a3ec27afc15cbcb8638753fa723cdd20d4babce89e4a,2024-12-04T15:15:17.580000
CVE-2024-54662,0,0,4b3cc401c16de805039d486416505e182a5182a77c3b733db40dc7eb3914b4c1,2024-12-17T18:15:24.963000
CVE-2024-54662,0,1,7255232e2c08d9e5650dac13dce7847b8e812ec4972f21b97c03985763e3c9d0,2024-12-18T16:15:14.220000
CVE-2024-54664,0,0,d20f70ea69f653338f16a7f1cc2d57f70600da4ca2ed7cb633c4eef98563304e,2024-12-04T15:15:18.093000
CVE-2024-5467,0,0,2029498ebdad4a454f5caa2d83ff2ed9d9f9d3c1e65d4417cbe9e14c059a84f9,2024-08-27T14:35:48.977000
CVE-2024-54674,0,0,545e92efc26fab029b2ecd902e6764f6f53f740b5b32d49c4c8440f2592a5a00,2024-12-05T19:15:08.947000
@ -270309,8 +270317,8 @@ CVE-2024-5504,0,0,7dafb0f0cd419f596fa945f00f7adb9bf7572316e58a9dc5a4cc280c9eb8f4
CVE-2024-5505,0,0,ef8367efb8e62f4d28c1b33787b307fdb06367b98441e7dd6605a6aed68ed8eb,2024-11-21T09:47:50.067000
CVE-2024-55056,0,0,8ecefeb2ba5c634e5ee3b18d572e93584ac9379c29bff9ede0039b41306daa34,2024-12-17T22:15:07.217000
CVE-2024-55057,0,0,d4a11f470aa132dff4f94bbe7e0062e8d77100b715a593d57c3536d628bebaae,2024-12-17T22:15:07.383000
CVE-2024-55058,0,0,2f2aba3dd037bf0055bb3c5645f774a7d5dfd96bbfd6a1af81c9c76ac305fc20,2024-12-17T21:15:08.510000
CVE-2024-55059,0,0,4f3c9e3d452edfc50b4e6283779209dc0f0ecb0fc651927063629cf50579f029,2024-12-17T21:15:08.643000
CVE-2024-55058,0,1,ee67ebced114eca3cea2119b29a662b36d3ee61adc9f37c78a8e5a0ab7a3bae1,2024-12-18T16:15:14.400000
CVE-2024-55059,0,1,fe565951d935da233adc7e847414e185526505b80445d8ef8d941eb8351af124,2024-12-18T16:15:14.560000
CVE-2024-5506,0,0,3a939cb8d1b19c0888bb3cd98071317aca0cf323e5a9cf329a9932ae18f6a99c,2024-11-21T09:47:50.193000
CVE-2024-5507,0,0,cabca8bddf4a6d02e76f27981f16e33bb9535f789d53e187a16cce78138edc2d,2024-11-21T09:47:50.337000
CVE-2024-5508,0,0,115a25c08f43d4b8fec19f2a1d9db4d23c6ce2518b2cd0371fc64ad26ff5bfe0,2024-11-21T09:47:50.463000
@ -270363,10 +270371,10 @@ CVE-2024-55496,0,0,4a3321851c89fc343921299c0a2d1c4d4d998fd1f65ffe9f84e4d2aab27cd
CVE-2024-5550,0,0,4077662850b9d5945d5c85ce45904d9c2783b7c7a72633a9665404cf6f9e870c,2024-11-21T09:47:54.640000
CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000
CVE-2024-5551,0,0,7ca1b2f3592d8c197217d4f6bb2a217c73a396396bc14275921b16391f97198d,2024-11-21T09:47:54.770000
CVE-2024-55513,0,0,e8128c3faa8b6ee7423298d6c77a76ae101656d5ee5c208243eea883336b0f8d,2024-12-17T20:15:22.623000
CVE-2024-55514,0,0,7b02b5314417a76c51ec5f5eb3c69969a975409bf63e022c30673390e3ed54d1,2024-12-17T20:15:22.757000
CVE-2024-55515,0,0,9ee346cc1904d2fb7ec93168467b98c46736168ade3d83bcf8597a0cb408dbfd,2024-12-17T20:15:22.887000
CVE-2024-55516,0,0,91019395bf4cb5934a66414c0e914d28149ba8e5b1efd3b0cf8a369968f260ca,2024-12-17T20:15:23.020000
CVE-2024-55513,0,1,2c70feb0b3a4b5910e279bea5f5b31284be91bf824e57138502d2e4a1a6f68ec,2024-12-18T16:15:14.720000
CVE-2024-55514,0,1,aa89c1ff2eec24c5fad92134c8d185f78ce2cace8089f0502184ccc069428486,2024-12-18T16:15:14.900000
CVE-2024-55515,0,1,ffebcafb628a4b9f4cc11e88d5f21d43275dad2022ff58445db975f17323a106,2024-12-18T16:15:15.090000
CVE-2024-55516,0,1,fd2a950d39683478da1d779965aef343ae97bc2efe5cdfcf82ab5dddcb1f1bc1,2024-12-18T16:15:15.263000
CVE-2024-5552,0,0,779c8b119b5a7bc042c6e25c9be4959c8015ea49092434c017d15512182ef4be,2024-11-21T09:47:54.927000
CVE-2024-5553,0,0,c6aeec952a2778be27c1792a1d1c97b8ff8c01ca6ed08226c6b506a6f771b767,2024-11-21T09:47:55.040000
CVE-2024-5554,0,0,3fb8d13bac6e351fa1470fa96b8178263946ef86d2aae872feb00193d95f3ac4,2024-11-21T09:47:55.160000
@ -270527,18 +270535,18 @@ CVE-2024-5609,0,0,4c03a855f07c8ea18d8e7a70e1e2d3467f32254daea5abf62f130fb919fa93
CVE-2024-5611,0,0,52c51c7a288f3c0ab122ffc809ef2624c3045fff37cac024f8608d70739aac41,2024-11-21T09:48:00.920000
CVE-2024-56112,0,0,c0764d57c8621e012754919d62c22e086c1612ad1fec50477bfc7128c3e19f91,2024-12-16T16:15:10.313000
CVE-2024-5612,0,0,fa9f2c267dc0651754a7af098fdc2eb62147cefb9c269a544f85a4928011ea0a,2024-11-21T09:48:01.037000
CVE-2024-56128,1,1,1d3914c35096298dd539210dd18a0cbe7523f2850a4adc631b73c19bf299d23e,2024-12-18T14:15:23.277000
CVE-2024-56128,0,0,1d3914c35096298dd539210dd18a0cbe7523f2850a4adc631b73c19bf299d23e,2024-12-18T14:15:23.277000
CVE-2024-5613,0,0,7adefd0ffa78c5730a0bdb9525773949feed9eb79c6b9e6014b5dbc5d6f802b4,2024-11-21T09:48:01.160000
CVE-2024-56139,0,0,51f3702c94f0ffd91c7bd6b4a37a8fbb30240d1963c2f10d645e10159f128016,2024-12-17T19:15:07.010000
CVE-2024-5614,0,0,dbfe1b67548311692c56bb8d68c3048c964ba6dbbed397928536eff3aafacba1,2024-11-21T09:48:01.283000
CVE-2024-56142,0,0,0eaecd6abe2a038bf7ddb173102d5629c82133d68dd20dd37bd3eaa8672bba93,2024-12-17T22:15:07.547000
CVE-2024-56142,0,1,46ee75dbf053d17753747d6ac8d88a6799cb24a1d693104ad554a951c48b711e,2024-12-18T16:15:15.433000
CVE-2024-5615,0,0,37856ff1a2df0ee42bdd2faed17aef170393a5807410ba1a41f1c8e8ad65ffc3,2024-11-21T09:48:01.413000
CVE-2024-5616,0,0,423edee4a921052dcb3d8ded851b7450a0c7bfa0bf926ae022e11e86747b1818,2024-11-21T09:48:01.540000
CVE-2024-56169,0,0,2f44b9b9fae0fb43dd077aa410d4ee16cde281ba4890fbc569e3bb73e5dfcd66,2024-12-18T05:15:08.853000
CVE-2024-56170,0,0,9b8befbbd3944be307d2b653c076f5fc24431389b70428ecce1285ef4c9e5881,2024-12-18T05:15:09.093000
CVE-2024-56173,0,0,360085e2959874efab59cf9542a8da80ade5bbcf1057d27c6ac53840c4f6e7ab,2024-12-18T06:15:23.780000
CVE-2024-56173,0,1,d27f85fb5ccf394a473d62aede079c2e88f65539a2799db763caec8defdf8851,2024-12-18T16:15:15.600000
CVE-2024-56174,0,0,c32908e95d32eb409ca07bb0e796c53283e7916d5b172fc8efa0f2fe8d44cad2,2024-12-18T06:15:23.930000
CVE-2024-56175,0,0,0ceacba67e2ee6862224e5810d0bba40b345e27a458f1ada5a83a8c2215f4d9c,2024-12-18T06:15:24.087000
CVE-2024-56175,0,1,408a6ec00d952056b6a9408423aefbe025d6548c36b5e25ebb7a7240d38d3e1e,2024-12-18T15:15:13.723000
CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000
CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000
CVE-2024-5620,0,0,240638ef58a29a459ed1037710fcf1b7e875e31a78e263978233bb4c4a8442da,2024-11-21T09:48:01.930000

Can't render this file because it is too large.