Auto-Update: 2024-12-03T23:00:27.651512+00:00

This commit is contained in:
cad-safe-bot 2024-12-03 23:03:39 +00:00
parent 8dbbdf8397
commit 64d5f5758b
87 changed files with 4311 additions and 540 deletions

View File

@ -2,16 +2,55 @@
"id": "CVE-2018-9376",
"sourceIdentifier": "security@android.com",
"published": "2024-12-02T21:15:09.107",
"lastModified": "2024-12-02T21:15:09.107",
"lastModified": "2024-12-03T19:15:05.937",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In rpc_msg_handler and related handlers of\u00a0drivers/misc/mediatek/eccci/port_rpc.c, there is a possible out of bounds\u00a0write due to an incorrect bounds check. This could lead to local escalation\u00a0of privilege with System execution privileges needed. User interaction is\u00a0not needed for exploitation."
},
{
"lang": "es",
"value": " En rpc_msg_handler y los controladores relacionados de drivers/misc/mediatek/eccci/port_rpc.c, existe una posible escritura fuera de los l\u00edmites debido a una comprobaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los privilegios de ejecuci\u00f3n del sistema. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-07-01",

View File

@ -2,16 +2,55 @@
"id": "CVE-2018-9413",
"sourceIdentifier": "security@android.com",
"published": "2024-12-02T21:15:09.653",
"lastModified": "2024-12-02T21:15:09.653",
"lastModified": "2024-12-03T19:15:06.147",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In handle_notification_response of btif_rc.cc, there is a possible out of\u00a0bounds write due to a missing bounds check. This could lead to remote code\u00a0execution with no additional execution privileges needed. User interaction\u00a0is needed for exploitation."
},
{
"lang": "es",
"value": " En handle_notification_response de btif_rc.cc, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-07-01",

View File

@ -2,8 +2,9 @@
"id": "CVE-2020-11063",
"sourceIdentifier": "security-advisories@github.com",
"published": "2020-05-13T23:15:11.047",
"lastModified": "2024-11-21T04:56:42.557",
"lastModified": "2024-12-03T20:15:13.003",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -129,11 +130,12 @@
],
"references": [
{
"url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-347x-877p-hcwx",
"source": "security-advisories@github.com",
"tags": [
"Third Party Advisory"
]
"url": "https://github.com/TYPO3/typo3/commit/14929b98ecda0ce67329b0f25ca7c01ee85df574",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/TYPO3/typo3/security/advisories/GHSA-347x-877p-hcwx",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-347x-877p-hcwx",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-2005",
"sourceIdentifier": "vulnreport@tenable.com",
"published": "2023-06-26T18:15:09.580",
"lastModified": "2023-07-05T17:16:12.110",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-03T19:15:06.390",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -13,32 +13,14 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "vulnreport@tenable.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
@ -46,12 +28,30 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.3,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -65,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"configurations": [
@ -101,6 +111,13 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.tenable.com/security/tns-2023-21",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-29459",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-26T16:15:09.587",
"lastModified": "2023-07-06T15:47:21.350",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-03T20:15:14.167",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
@ -45,6 +45,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
@ -80,6 +90,21 @@
"tags": [
"Product"
]
},
{
"url": "http://packetstormsecurity.com/files/172701/FC-Red-Bull-Salzburg-App-5.1.9-R-Improper-Authorization.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://play.google.com/store/apps/details?id=laola.redbull",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36252",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-26T19:15:09.773",
"lastModified": "2023-07-06T16:07:39.287",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-03T19:15:07.270",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"configurations": [
@ -110,6 +120,13 @@
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.zeroscience.mk/en/vulnerabilities/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40093",
"sourceIdentifier": "security@android.com",
"published": "2024-02-16T02:15:49.963",
"lastModified": "2024-11-26T16:33:08.700",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-03T19:15:07.740",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42939",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-02-21T07:15:50.767",
"lastModified": "2024-02-22T19:07:27.197",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T20:42:07.280",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,11 +15,80 @@
"value": "Se solucion\u00f3 un problema de l\u00f3gica con controles mejorados. Este problema se solucion\u00f3 en iOS 17.1 y iPadOS 17.1. La actividad de navegaci\u00f3n privada de un usuario puede guardarse inesperadamente en el Informe de privacidad de la aplicaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.1",
"matchCriteriaId": "0B5787E4-1911-4926-9D81-492EFB438954"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.1",
"matchCriteriaId": "434A55CA-5660-4F40-B4A2-5ABAF4CA7263"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213982",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213982",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42942",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-02-21T07:15:50.963",
"lastModified": "2024-08-27T16:35:01.703",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T20:40:10.397",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,12 +17,34 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,39 +52,167 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7.2",
"matchCriteriaId": "A8F544A7-7CEB-4A84-992F-58710B229579"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:17.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D7F45FD5-BD2C-41B5-ADCA-D7F99A0FD4A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "16.7.2",
"matchCriteriaId": "5EB9EAAE-441A-4844-BCB2-1716FD9ACE85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:17.0:*:*:*:*:*:*:*",
"matchCriteriaId": "502CD624-FA22-4C7B-9CA3-53CA938BE1AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.6.1",
"matchCriteriaId": "85B6F336-AA76-4706-AD68-BCDFFB48358B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE27DF1-3AF9-4BE4-8541-565FE5BC16A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndIncluding": "17.1",
"matchCriteriaId": "9B56E023-1C50-4D41-BAF1-21E22132A9A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.1",
"matchCriteriaId": "F88E7355-ECFB-4EB0-9579-0C954C25355F"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213981",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213982",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213984",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213985",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213987",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213988",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213981",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213982",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213984",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213985",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213987",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213988",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42945",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-02-21T07:15:51.140",
"lastModified": "2024-08-22T14:35:01.547",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T20:37:44.587",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,12 +17,34 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +52,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE27DF1-3AF9-4BE4-8541-565FE5BC16A2"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213984",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213984",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42946",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-02-21T07:15:51.307",
"lastModified": "2024-11-07T15:35:06.643",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T20:29:31.657",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,12 +17,34 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,31 +52,122 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.1",
"matchCriteriaId": "0B5787E4-1911-4926-9D81-492EFB438954"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.1",
"matchCriteriaId": "434A55CA-5660-4F40-B4A2-5ABAF4CA7263"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE27DF1-3AF9-4BE4-8541-565FE5BC16A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.1",
"matchCriteriaId": "6B71C095-CFB3-42E1-8582-0AD365DA7855"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.1",
"matchCriteriaId": "F88E7355-ECFB-4EB0-9579-0C954C25355F"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213982",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213984",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213987",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213988",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213982",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213984",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213987",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213988",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42951",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-02-21T07:15:51.363",
"lastModified": "2024-11-08T17:35:11.143",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T20:26:23.957",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -18,11 +18,13 @@
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,19 +32,83 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.1",
"matchCriteriaId": "0B5787E4-1911-4926-9D81-492EFB438954"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.1",
"matchCriteriaId": "434A55CA-5660-4F40-B4A2-5ABAF4CA7263"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/HT213982",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/HT213982",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-49559",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-12T20:15:10.773",
"lastModified": "2024-06-13T18:36:09.010",
"lastModified": "2024-12-03T20:15:14.317",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,11 +15,50 @@
"value": "Un problema en vektah gqlparser open-source-library v.2.5.10 permite a un atacante remoto provocar una denegaci\u00f3n de servicio a trav\u00e9s de un script manipulado para la funci\u00f3n parserDirectives."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 3.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/uvzz/d3ed9d4532be16ec1040a2cf3dfec8d1",
"source": "cve@mitre.org"
},
{
"url": "https://gist.github.com/uvzz/d3ed9d4532be16ec1040a2cf3dfec8d1",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-50951",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-17T16:15:46.443",
"lastModified": "2024-02-20T19:50:53.960",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T20:28:43.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,19 +32,37 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,14 +71,60 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:cloud_pak_for_security:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.10.0.0",
"versionEndIncluding": "1.10.11.0",
"matchCriteriaId": "8FA89838-3E05-4778-9323-DE51CC10FD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:qradar_suite:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.10.12.0",
"versionEndExcluding": "1.10.18.0",
"matchCriteriaId": "D0EF0709-2F84-47AA-9F3A-4F2D427ABD9B"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275747",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7118604",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275747",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"VDB Entry"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7118604",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52727",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T00:15:07.453",
"lastModified": "2024-04-30T13:11:16.690",
"lastModified": "2024-12-03T19:15:07.950",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,11 +15,54 @@
"value": "Open Networking Foundation SD-RAN ONOS onos-lib-go 0.10.25 permite una condici\u00f3n de \u00edndice fuera de rango en parseAlignBits."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://github.com/onosproject/onos-lib-go/issues/245",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/onosproject/onos-lib-go/issues/245",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-11168",
"sourceIdentifier": "cna@python.org",
"published": "2024-11-12T22:15:14.920",
"lastModified": "2024-11-13T17:01:16.850",
"lastModified": "2024-12-03T21:15:05.470",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -23,6 +23,8 @@
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
@ -54,9 +56,7 @@
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
"providerUrgency": "NOT_DEFINED"
}
}
]
@ -78,10 +78,18 @@
"url": "https://github.com/python/cpython/commit/29f348e232e82938ba2165843c448c2b291504c5",
"source": "cna@python.org"
},
{
"url": "https://github.com/python/cpython/commit/634ded45545ce8cbd6fd5d49785613dd7fa9b89e",
"source": "cna@python.org"
},
{
"url": "https://github.com/python/cpython/commit/b2171a2fd41416cf68afd67460578631d755a550",
"source": "cna@python.org"
},
{
"url": "https://github.com/python/cpython/commit/ddca2953191c67a12b1f19d6bca41016c6ae7132",
"source": "cna@python.org"
},
{
"url": "https://github.com/python/cpython/issues/103848",
"source": "cna@python.org"

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11967",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-28T18:15:07.780",
"lastModified": "2024-11-28T18:15:07.780",
"vulnStatus": "Received",
"lastModified": "2024-12-03T20:20:04.177",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in PHPGurukul Complaint Management system 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/reset-password.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en PHPGurukul Complaint Management system 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /admin/reset-password.php. La manipulaci\u00f3n del argumento email provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,28 +142,71 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*",
"matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Aurora0x1/CVE/issues/4",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.286350",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.286350",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?submit.452477",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11968",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-28T18:15:07.980",
"lastModified": "2024-11-28T18:15:07.980",
"vulnStatus": "Received",
"lastModified": "2024-12-03T20:12:14.177",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Farmacia up to 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file pagamento.php. The manipulation of the argument notaFiscal leads to sql injection. The attack can be launched remotely."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en code-projects Farmacia hasta la versi\u00f3n 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo pagamento.php. La manipulaci\u00f3n del argumento notaFiscal conduce a una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,28 +142,71 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anisha:farmacia:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B8C68FD0-0D27-4525-8289-0526E4F5B6E6"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/xiaobai19198/cve/blob/main/sql-cve.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.286351",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.286351",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.452877",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-11971",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-28T22:15:15.090",
"lastModified": "2024-11-28T22:15:15.090",
"vulnStatus": "Received",
"lastModified": "2024-12-03T20:04:46.493",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in Guizhou Xiaoma Technology jpress 5.1.2. Affected by this vulnerability is an unknown functionality of the file /commons/attachment/upload of the component Avatar Handler. The manipulation of the argument files leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en Guizhou Xiaoma Technology jpress 5.1.2. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /commons/attachment/upload del componente Avatar Handler. La manipulaci\u00f3n de los archivos de argumentos provoca Cross-Site Scripting. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,24 +142,64 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jpress:jpress:5.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1D7771EC-8856-4D0E-8D12-D6BA66B75295"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/dycccccccc/jpress/blob/main/JPRESS%20file%20upload%20leads%20to%20code%20execution.docx",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.286381",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.286381",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.453637",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,70 @@
{
"id": "CVE-2024-12053",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-12-03T19:15:08.413",
"lastModified": "2024-12-03T20:15:14.513",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Type Confusion in V8 in Google Chrome prior to 131.0.6778.108 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-843"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/12/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/379009132",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-20768",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:09.470",
"lastModified": "2024-12-03T14:25:50.643",
"lastModified": "2024-12-03T21:46:08.623",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -80,7 +80,6 @@
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html",
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
@ -88,7 +87,6 @@
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20778",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-04-10T09:15:07.037",
"lastModified": "2024-04-10T13:23:38.787",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T22:21:38.357",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,9 +32,7 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.20.0",
"matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20779",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-04-10T09:15:07.343",
"lastModified": "2024-04-10T13:23:38.787",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T22:21:48.793",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,9 +32,7 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.20.0",
"matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20780",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-04-10T09:15:07.630",
"lastModified": "2024-04-10T13:23:38.787",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T22:22:05.807",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,9 +32,7 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.20.0",
"matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-21032",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:19.037",
"lastModified": "2024-11-27T16:31:02.343",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-03T19:15:08.570",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -49,6 +49,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21065",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-04-16T22:15:24.780",
"lastModified": "2024-04-17T12:48:31.863",
"lastModified": "2024-12-03T19:15:08.777",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,19 +32,33 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpuapr2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21174",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2024-07-16T23:15:21.157",
"lastModified": "2024-07-17T13:34:20.520",
"lastModified": "2024-12-03T20:15:14.673",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "secalert_us@oracle.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 3.1,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
@ -30,19 +32,33 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 3.1,
"baseSeverity": "LOW"
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "secalert_us@oracle.com"
},
{
"url": "https://www.oracle.com/security-alerts/cpujul2024.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-22337",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-17T16:15:47.370",
"lastModified": "2024-02-20T19:50:53.960",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T20:37:33.563",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
@ -30,19 +32,37 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.4,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,14 +71,60 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:cloud_pak_for_security:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.10.0.0",
"versionEndIncluding": "1.10.11.0",
"matchCriteriaId": "8FA89838-3E05-4778-9323-DE51CC10FD18"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:qradar_suite:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.10.12.0",
"versionEndExcluding": "1.10.18.0",
"matchCriteriaId": "D0EF0709-2F84-47AA-9F3A-4F2D427ABD9B"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279977",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"VDB Entry"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7118642",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279977",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"VDB Entry"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7118642",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26046",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-04-10T09:15:08.070",
"lastModified": "2024-04-10T13:23:38.787",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T22:22:16.273",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,9 +32,7 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
@ -51,10 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.20.0",
"matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26047",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-04-10T09:15:08.353",
"lastModified": "2024-04-10T13:23:38.787",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T22:22:25.890",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,9 +32,7 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.20.0",
"matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26076",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-04-10T09:15:08.640",
"lastModified": "2024-04-10T13:23:38.787",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T22:22:34.717",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,9 +32,7 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.20.0",
"matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26079",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-04-10T09:15:08.950",
"lastModified": "2024-04-10T13:23:38.787",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T22:22:43.923",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,9 +32,7 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.20.0",
"matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26084",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-04-10T09:15:09.227",
"lastModified": "2024-04-10T13:23:38.787",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T22:22:54.187",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,9 +32,7 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.20.0",
"matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26087",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-04-10T09:15:09.510",
"lastModified": "2024-04-10T13:23:38.787",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T22:23:31.950",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,9 +32,7 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.20.0",
"matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26097",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-04-10T09:15:09.820",
"lastModified": "2024-04-10T13:23:38.787",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T22:23:43.117",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,9 +32,7 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.20.0",
"matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26098",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-04-10T09:15:10.127",
"lastModified": "2024-04-10T13:23:38.787",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T22:23:53.200",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,9 +32,7 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,46 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.20.0",
"matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26119",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:19.000",
"lastModified": "2024-03-18T19:40:00.173",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T22:16:51.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,12 +32,30 @@
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,12 +69,56 @@
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.20.0",
"matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26120",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:19.290",
"lastModified": "2024-03-18T19:40:00.173",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T22:21:01.987",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,9 +32,7 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.20.0",
"matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26124",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:19.503",
"lastModified": "2024-03-18T19:40:00.173",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T22:21:14.077",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,9 +32,7 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.20.0",
"matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26125",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-03-18T18:15:19.737",
"lastModified": "2024-03-18T19:40:00.173",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T22:21:24.047",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -30,9 +32,7 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
@ -42,7 +42,7 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -51,10 +51,44 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.20.0",
"matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.3.0",
"matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27323",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-04-01T22:15:15.950",
"lastModified": "2024-12-03T16:50:34.657",
"lastModified": "2024-12-03T22:03:36.550",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -92,9 +92,13 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.1.2.382",
"matchCriteriaId": "5CD96316-2D89-435B-939D-2BCD5DE42D84"
"criteria": "cpe:2.3:a:pdf-xchange:pdf-tools:10.1.1.381:*:*:*:*:*:*:*",
"matchCriteriaId": "097CBCF4-A99C-4A83-937C-BE2F0A8E595F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:10.1.1.381:*:*:*:*:*:*:*",
"matchCriteriaId": "80367953-FC8D-4768-9BAC-4350A7E565C3"
}
]
}
@ -106,14 +110,16 @@
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-198/",
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-198/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
"Third Party Advisory",
"VDB Entry"
]
}
]

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-30896",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-21T11:15:34.007",
"lastModified": "2024-11-27T17:15:10.650",
"lastModified": "2024-12-03T21:15:06.437",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InfluxDB through 2.7.10 allows allAccess administrators to retrieve all raw tokens via an \"influx auth ls\" command. NOTE: the supplier indicates that this is intentional but is a \"poor design choice\" that will be changed in a future release."
"value": "InfluxDB OSS 2.x through 2.7.11 stores the administrative operator token under the default organization which allows authorized users with read access to the authorization resource of the default organization to retrieve the operator token. InfluxDB OSS 1.x, Enterprise, Cloud, Cloud Dedicated and Clustered are not affected. NOTE: The researcher states that InfluxDB allows allAccess administrators to retrieve all raw tokens via an \"influx auth ls\" command. The supplier indicates that the organizations feature is operating as intended and that users may choose to add users to non-default organizations. A future release of InfluxDB 2.x will remove the ability to retrieve tokens from the API."
},
{
"lang": "es",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-33409",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-06T18:15:08.230",
"lastModified": "2024-05-28T18:15:09.347",
"lastModified": "2024-12-03T20:15:15.107",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Vulnerabilidad de inyecci\u00f3n SQL en index.php en campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro de nombre."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%201.pdf",
@ -24,6 +59,14 @@
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%208.pdf",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%201.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%208.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,13 +2,20 @@
"id": "CVE-2024-36610",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-29T20:15:20.237",
"lastModified": "2024-12-02T17:15:11.230",
"lastModified": "2024-12-03T21:15:06.600",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A deserialization vulnerability exists in the Stub class of the VarDumper module in Symfony v7.0.3. The vulnerability stems from deficiencies in the original implementation when handling properties with null or uninitialized values. An attacker could construct specific serialized data and use this vulnerability to execute unauthorized code."
"value": "A deserialization vulnerability exists in the Stub class of the VarDumper module in Symfony v7.0.3. The vulnerability stems from deficiencies in the original implementation when handling properties with null or uninitialized values. An attacker could construct specific serialized data and use this vulnerability to execute unauthorized code. NOTE: the Supplier has concluded that this is a false report."
},
{
"lang": "es",
@ -56,6 +63,10 @@
"url": "https://gist.github.com/1047524396/24e93f2905850235e42ad7db6e878bd5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/github/advisory-database/pull/5046",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/symfony/symfony/blob/v7.0.3/src/Symfony/Component/VarDumper/Cloner/Stub.php#L53",
"source": "cve@mitre.org"
@ -63,6 +74,10 @@
{
"url": "https://github.com/symfony/symfony/commit/3ffd495bb3cc4d2e24e35b2d83c5b909cab7e259",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/symfony/symfony/issues/59077#issuecomment-2513935018",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,20 @@
"id": "CVE-2024-36611",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-29T19:15:06.780",
"lastModified": "2024-12-03T16:15:22.057",
"lastModified": "2024-12-03T21:15:06.783",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In Symfony v7.07, a security vulnerability was identified in the FormLoginAuthenticator component, where it failed to adequately handle cases where the username or password field of a login request is empty. This flaw could lead to various security risks, including improper authentication logic handling or denial of service."
"value": "In Symfony v7.07, a security vulnerability was identified in the FormLoginAuthenticator component, where it failed to adequately handle cases where the username or password field of a login request is empty. This flaw could lead to various security risks, including improper authentication logic handling or denial of service. NOTE: the Supplier has concluded that this is a false report."
},
{
"lang": "es",
@ -56,6 +63,10 @@
"url": "https://gist.github.com/1047524396/3581425e0911b716cf8ce4fa30e41e6c",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/github/advisory-database/pull/5046",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/symfony/symfony/blob/v7.0.7/src/Symfony/Component/Security/Http/Authenticator/FormLoginAuthenticator.php#L132",
"source": "cve@mitre.org"
@ -63,6 +74,10 @@
{
"url": "https://github.com/symfony/symfony/commit/a804ca15fcad279d7727b91d12a667fd5b925995",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/symfony/symfony/issues/59077#issuecomment-2513935018",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38496",
"sourceIdentifier": "secure@symantec.com",
"published": "2024-07-15T15:15:10.680",
"lastModified": "2024-07-16T13:43:58.773",
"lastModified": "2024-12-03T19:15:09.550",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -23,6 +23,8 @@
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
@ -54,17 +56,31 @@
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.1,
"baseSeverity": "MEDIUM"
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24678",
"source": "secure@symantec.com"
},
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24678",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-40391",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-03T22:15:04.740",
"lastModified": "2024-12-03T22:15:04.740",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-45757",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-03T21:15:06.953",
"lastModified": "2024-12-03T21:15:06.953",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Centreon centreon-bam 24.04, 23.10, 23.04, and 22.10. SQL injection can occur in the user-settings form. Exploitation is only accessible to authenticated users with high-privileged access."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/centreon/centreon/releases",
"source": "cve@mitre.org"
},
{
"url": "https://thewatch.centreon.com/latest-security-bulletins-64/cve-2024-45757-centreon-bam-high-severity-4123?tid=4123",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-46625",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-03T22:15:04.860",
"lastModified": "2024-12-03T22:15:04.860",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authenticated arbitrary file upload vulnerability in the /documentCache/upload endpoint of InfoDom Performa 365 v4.0.1 allows attackers to execute arbitrary code via uploading a crafted SVG file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/EchoSl0w/Research/blob/main/2024/CVE-2024-46625.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-46905",
"sourceIdentifier": "security@progress.com",
"published": "2024-12-02T15:15:11.443",
"lastModified": "2024-12-02T15:15:11.443",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T20:00:17.570",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In WhatsUp Gold versions released before 2024.0.1, a SQL Injection vulnerability allows an authenticated lower-privileged user (at least Network Manager permissions required) to achieve privilege escalation to the admin account."
},
{
"lang": "es",
"value": "En las versiones de WhatsUp Gold publicadas antes de 2024.0.1, una vulnerabilidad de inyecci\u00f3n SQL permite que un usuario autenticado con privilegios bajos (al menos permisos de administrador de red requeridos) logre una escalada de privilegios a la cuenta de administrador."
}
],
"metrics": {
@ -32,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -47,18 +71,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*",
"versionEndExcluding": "24.0.1",
"matchCriteriaId": "07BDB617-53DC-4C9B-BE7B-79A393F1A9C2"
}
]
}
]
}
],
"references": [
{
"url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-September-2024",
"source": "security@progress.com"
"source": "security@progress.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://docs.progress.com/bundle/whatsupgold-release-notes-24-0/page/WhatsUp-Gold-2024.0-Release-Notes.html",
"source": "security@progress.com"
"source": "security@progress.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.progress.com/network-monitoring",
"source": "security@progress.com"
"source": "security@progress.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-47094",
"sourceIdentifier": "security@checkmk.com",
"published": "2024-11-29T10:15:10.657",
"lastModified": "2024-11-29T10:15:10.657",
"vulnStatus": "Received",
"lastModified": "2024-12-03T20:01:52.610",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p22, <2.2.0p37, <2.1.0p50 (EOL) causes remote site secrets to be written to web log files accessible to local site users."
},
{
"lang": "es",
"value": "La inserci\u00f3n de informaci\u00f3n confidencial en un archivo de registro en las versiones de Checkmk de Checkmk GmbH &lt;2.3.0p22, &lt;2.2.0p37, &lt;2.1.0p50 (EOL) hace que los secretos del sitio remoto se escriban en archivos de registro web accesibles para los usuarios del sitio local."
}
],
"metrics": {
@ -55,6 +59,28 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
@ -67,12 +93,412 @@
"value": "CWE-532"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0A6AED3C-E447-429C-A028-B100CD51AB7C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*",
"matchCriteriaId": "C66704F1-0B5E-4B43-8748-987022F378F8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "B068974F-6F67-4CBB-B567-FCED86E28F22"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "EA70F36A-EEF6-48DC-B15E-055D0DE8A052"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "B2017F38-38DB-4E96-B34F-160BC731CBBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "0949F399-371B-409C-AF9F-32690D881440"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*",
"matchCriteriaId": "42E1E31A-B5CC-45F2-A2E5-3EEF735499BA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*",
"matchCriteriaId": "4B364FCA-500C-458E-B997-82CD0B1D24F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*",
"matchCriteriaId": "0B32E657-917B-482B-B6A4-3D3746992A4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*",
"matchCriteriaId": "2119C732-E024-4DA6-8E47-9E08E5E12602"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*",
"matchCriteriaId": "4F0B99A8-A124-43BD-B8AA-EECC9112346F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "3FB7221E-BE9F-4529-8E07-8AD547FA3208"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "30A074AD-9499-46E3-AB67-D6CEE3AA01C3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "A8BD0240-A22B-4273-BD47-C35A8C12E127"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "DAA5680F-1DD0-48AA-BB7F-15B27365F0FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "BC2F31CA-D4EB-44E6-9A09-5255D33F4A88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "CD80BD69-20C6-4E17-B165-98689179A5A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*",
"matchCriteriaId": "B044D43B-0233-4A0D-A356-B9F9324E2777"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*",
"matchCriteriaId": "7DE79896-EBE5-42F2-A126-2A871BBA1071"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*",
"matchCriteriaId": "51A44E69-EEA1-4B01-B7B3-5BF7B39819E3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*",
"matchCriteriaId": "BCB65AEB-CF52-410B-92B1-2DCFB914FFA4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*",
"matchCriteriaId": "B7E17FA6-9011-489C-9FA9-368CA2D86FAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "7BCEB6FF-668F-4313-9264-0BF021AFC45F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*",
"matchCriteriaId": "F8B27218-A4FF-47BE-B578-6DB704478921"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*",
"matchCriteriaId": "8735357F-16A7-4408-9DDD-1C6796BADBE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*",
"matchCriteriaId": "4505098C-0A2B-481E-A3DF-D6DF8EFA4DE7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*",
"matchCriteriaId": "C12AFCCF-014E-4EEB-8F04-F1ACE182BA98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*",
"matchCriteriaId": "66B85557-D5EC-4AF4-B97A-D2B80A58B3B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*",
"matchCriteriaId": "233ECD21-FA72-43AF-8E4C-DAC27CC18F3C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*",
"matchCriteriaId": "8B4DB8EE-C10A-4097-8E66-2932BAEB732E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*",
"matchCriteriaId": "8653402A-C5AA-4CB1-8742-A12CCBE59373"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*",
"matchCriteriaId": "77047A82-E6D5-4E84-9BEC-ACD2FDA91FAE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:*",
"matchCriteriaId": "2E44AE62-1746-410F-A28E-F8292E1F8D68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "E2342E2D-58B0-43E7-8C01-DF4678520F39"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:*",
"matchCriteriaId": "B6C1AC39-5AE0-4FC8-93FF-966400B074F0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p31:*:*:*:*:*:*",
"matchCriteriaId": "68455233-52CD-44B8-8B02-D94BA84DA6A8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p32:*:*:*:*:*:*",
"matchCriteriaId": "1C95A313-7665-4877-B421-0D20E3D3D54D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p33:*:*:*:*:*:*",
"matchCriteriaId": "0AEF278D-D782-4A2B-B1B8-19A21D151AA2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p34:*:*:*:*:*:*",
"matchCriteriaId": "B027FE8B-1802-4449-A0CB-6D15F9634559"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p35:*:*:*:*:*:*",
"matchCriteriaId": "9B2BC55F-17AE-4BC4-824D-06BE9B15516C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p36:*:*:*:*:*:*",
"matchCriteriaId": "1393F094-2D75-44CC-8783-4FDC7450D38E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "1871B646-CA69-477F-B113-B901AC7B3934"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "EEC65A72-CAE1-4E28-83EF-7ECAFE921BB6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "D8FDECBC-8213-495F-A932-C4310F7C1F87"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "CB49BC95-6AA8-4F53-A3D6-E199BF756AAF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "050B6617-8FD4-47A6-BE4A-A52503A65812"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "4CA0FEC5-7036-47AF-A341-873B6C324B58"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*",
"matchCriteriaId": "83202950-840A-4CB7-AD96-CE62E84FABD8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "1A020A77-7D84-4557-9B0B-D74A89BC1538"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "D9770554-978B-4552-9E0E-CD6B6675243C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "1883D2F4-CB96-4DDE-87E8-D1990A3FA092"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "99AD6F39-AF67-4CB9-BED2-00CA75B9F5DB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b5:*:*:*:*:*:*",
"matchCriteriaId": "F08FE580-67D4-419C-AE4A-3B9EBC6A2838"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b6:*:*:*:*:*:*",
"matchCriteriaId": "9DD5C67F-CD3E-400E-802D-8B52408A259F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "310A2FA2-633A-48FB-A5C2-9A9A922E72E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "3C0F1DC8-D9DF-4A7A-80DC-618FAB091375"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "9B0A1E3E-1B5A-4346-95BC-DE6FF6EE14CA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "EB52B2A7-BDC1-4A4F-ABAF-69C1BA8E83C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "9F89225F-6969-4D89-B889-9CB09972825B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "2A1B23EA-4571-4E4E-80BC-FD76FFD83FFB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:*",
"matchCriteriaId": "625A6998-5DAE-4538-9760-20523CCE501F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:*",
"matchCriteriaId": "6EFD4461-2C37-418F-90AD-3A956B2D91C7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:*",
"matchCriteriaId": "88523633-844C-41FE-ADF1-74D6AA2BCE6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:*",
"matchCriteriaId": "5DA03E01-06D1-4E18-9C7B-CB6E49E5954B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:*",
"matchCriteriaId": "91F171B6-7F9A-4B9B-B53D-277FE74124F9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "7D1993E3-C4F9-4D78-BD02-A0B22D93BF1F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:*",
"matchCriteriaId": "34FF7D09-2129-4266-BF71-5424DC9E18B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:*",
"matchCriteriaId": "246F0BA5-F927-4204-97F3-51870072599F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "B28A0C9D-072A-413C-8587-CD57CB918190"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "DF22D0A7-82B1-4598-B8C5-BDFE523D07F2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "20035AFB-75B4-4164-9833-A2FCAE24B577"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "8BCBACEB-7130-455D-B4BE-243053C116DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "156384E2-E04B-4153-A91F-3F307C9FEAE8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "EEC0ED95-F43B-46D7-9AA0-A0FB1C32EF1D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "91C194C1-5292-4E2A-BB71-9C5CD3CE6194"
}
]
}
]
}
],
"references": [
{
"url": "https://checkmk.com/werk/17342",
"source": "security@checkmk.com"
"source": "security@checkmk.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-48080",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-03T19:15:09.947",
"lastModified": "2024-12-03T19:15:09.947",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in aedes v0.51.2 allows attackers to cause a Denial of Service(DoS) via a crafted request."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/pengwGit/cd3c1701a9e05b424fa6c60d86845de4",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-50948",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-03T19:15:10.580",
"lastModified": "2024-12-03T19:15:10.580",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in mochiMQTT v2.6.3 allows attackers to cause a Denial of Service (DoS) via a crafted request."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/pengwGit/39760ed5ae03171622ca8215dc0d8c60",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/mochi-mqtt/server",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-51114",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-03T20:15:15.360",
"lastModified": "2024-12-03T20:15:15.360",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Beijing Digital China Yunke Information Technology Co.Ltd v.7.2.6.120 allows a remote attacker to execute arbitrary code via the code/function/dpi/web_auth/customizable.php file"
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ZackSecurity/VulnerReport/blob/cve/DCN/2.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-51363",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-03T22:15:05.013",
"lastModified": "2024-12-03T22:15:05.013",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insecure deserialization in Hodoku v2.3.0 to v2.3.2 allows attackers to execute arbitrary code."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Gelcon/PoC-of-Hodoku-V2.3.0-RCE",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51378",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-29T23:15:04.083",
"lastModified": "2024-11-01T12:57:03.417",
"lastModified": "2024-12-03T19:15:10.807",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 10.0,
"baseSeverity": "CRITICAL"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 6.0
@ -46,7 +46,7 @@
"description": [
{
"lang": "en",
"value": "CWE-276"
"value": "CWE-77"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-51771",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2024-12-03T20:15:15.477",
"lastModified": "2024-12-03T22:15:05.180",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the HPE Aruba Networking ClearPass Policy Manager web-based management interface could allow an authenticated remote threat actor to conduct a remote code execution attack. Successful exploitation could enable the attacker to run arbitrary commands on the underlying operating system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04761en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-51772",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2024-12-03T21:15:07.140",
"lastModified": "2024-12-03T22:15:05.310",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authenticated RCE vulnerability in the ClearPass Policy Manager web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04761en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-51773",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2024-12-03T21:15:07.280",
"lastModified": "2024-12-03T22:15:05.440",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the HPE Aruba Networking ClearPass Policy Manager web-based management interface could allow an authenticated remote Attacker to conduct a stored cross-site scripting (XSS) attack. Successful exploitation could enable a threat actor to perform any actions the user is authorized to do, including accessing the user's data and altering information within the user's permissions. This could lead to data modification, deletion, or theft, including unauthorized access to files, file deletion, or the theft of session cookies, which an attacker could use to hijack a user's session."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04761en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-52544",
"sourceIdentifier": "cve@rapid7.com",
"published": "2024-12-03T18:15:15.327",
"lastModified": "2024-12-03T18:15:15.327",
"lastModified": "2024-12-03T21:15:07.390",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -51,6 +51,10 @@
{
"url": "https://github.com/sfewer-r7/LorexExploit",
"source": "cve@rapid7.com"
},
{
"url": "https://www.rapid7.com/blog/post/2024/12/03/lorex-2k-indoor-wi-fi-security-camera-multiple-vulnerabilities-fixed/",
"source": "cve@rapid7.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-52545",
"sourceIdentifier": "cve@rapid7.com",
"published": "2024-12-03T18:15:15.543",
"lastModified": "2024-12-03T18:15:15.543",
"lastModified": "2024-12-03T21:15:07.490",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -51,6 +51,10 @@
{
"url": "https://github.com/sfewer-r7/LorexExploit",
"source": "cve@rapid7.com"
},
{
"url": "https://www.rapid7.com/blog/post/2024/12/03/lorex-2k-indoor-wi-fi-security-camera-multiple-vulnerabilities-fixed/",
"source": "cve@rapid7.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-52546",
"sourceIdentifier": "cve@rapid7.com",
"published": "2024-12-03T18:15:15.710",
"lastModified": "2024-12-03T18:15:15.710",
"lastModified": "2024-12-03T21:15:07.593",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -51,6 +51,10 @@
{
"url": "https://github.com/sfewer-r7/LorexExploit",
"source": "cve@rapid7.com"
},
{
"url": "https://www.rapid7.com/blog/post/2024/12/03/lorex-2k-indoor-wi-fi-security-camera-multiple-vulnerabilities-fixed/",
"source": "cve@rapid7.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-52547",
"sourceIdentifier": "cve@rapid7.com",
"published": "2024-12-03T18:15:15.860",
"lastModified": "2024-12-03T18:15:15.860",
"lastModified": "2024-12-03T21:15:07.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -51,6 +51,10 @@
{
"url": "https://github.com/sfewer-r7/LorexExploit",
"source": "cve@rapid7.com"
},
{
"url": "https://www.rapid7.com/blog/post/2024/12/03/lorex-2k-indoor-wi-fi-security-camera-multiple-vulnerabilities-fixed/",
"source": "cve@rapid7.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-52548",
"sourceIdentifier": "cve@rapid7.com",
"published": "2024-12-03T18:15:16.023",
"lastModified": "2024-12-03T18:15:16.023",
"lastModified": "2024-12-03T22:15:05.567",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -51,6 +51,10 @@
{
"url": "https://github.com/sfewer-r7/LorexExploit",
"source": "cve@rapid7.com"
},
{
"url": "https://www.rapid7.com/blog/post/2024/12/03/lorex-2k-indoor-wi-fi-security-camera-multiple-vulnerabilities-fixed/",
"source": "cve@rapid7.com"
}
]
}

View File

@ -2,44 +2,183 @@
"id": "CVE-2024-53059",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-11-19T18:15:25.833",
"lastModified": "2024-11-19T21:56:45.533",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-03T20:57:20.747",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()\n\n1. The size of the response packet is not validated.\n2. The response buffer is not freed.\n\nResolve these issues by switching to iwl_mvm_send_cmd_status(),\nwhich handles both size validation and frees the buffer."
},
{
"lang": "es",
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: mvm: Se ha corregido el manejo de respuestas en iwl_mvm_send_recovery_cmd() 1. No se valida el tama\u00f1o del paquete de respuesta. 2. No se libera el b\u00fafer de respuesta. Resuelva estos problemas cambiando a iwl_mvm_send_cmd_status(), que maneja tanto la validaci\u00f3n del tama\u00f1o como la liberaci\u00f3n del b\u00fafer."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.1",
"versionEndExcluding": "5.4.285",
"matchCriteriaId": "1182B577-D9D7-4DC8-AAA4-C3BCAC9E115C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.229",
"matchCriteriaId": "1A03CABE-9B43-4E7F-951F-10DEEADAA426"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.171",
"matchCriteriaId": "2BE18665-48ED-417A-90AA-41F3AC0B4E9A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.116",
"matchCriteriaId": "43EFDC15-E4D4-4F1E-B70D-62F0854BFDF3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.60",
"matchCriteriaId": "75088E5E-2400-4D20-915F-7A65C55D9CCD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.11.7",
"matchCriteriaId": "E96F53A4-5E87-4A70-BD9A-BC327828D57F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
"matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://git.kernel.org/stable/c/07a6e3b78a65f4b2796a8d0d4adb1a15a81edead",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3eb986c64c6bfb721950f9666a3b723cf65d043f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3f45d590ccbae6dfd6faef54efe74c30bd85d3da",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/45a628911d3c68e024eed337054a0452b064f450",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/64d63557ded6ff3ce72b18ab87a6c4b1b652161c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9480c3045f302f43f9910d2d556d6cf5a62c1822",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9c98ee7ea463a838235e7a0e35851b38476364f2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-53060",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-11-19T18:15:25.917",
"lastModified": "2024-12-02T08:15:08.027",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-03T20:49:04.903",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,39 +15,188 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: evitar la desreferenciaci\u00f3n de punteros NULL si no se admite ATIF acpi_evaluate_object() puede devolver AE_NOT_FOUND (error), lo que provocar\u00eda la desreferenciaci\u00f3n de buffer.pointer (obj) mientras sea NULL. Aunque este caso puede ser poco realista para el c\u00f3digo actual, sigue siendo mejor protegerse contra posibles errores. Tambi\u00e9n se debe abandonar cuando el estado sea AE_NOT_FOUND. Esto soluciona 1 problema de FORWARD_NULL informado por Coverity Report: CID 1600951: Desreferencias de punteros nulos (FORWARD_NULL) (seleccionado de el commit 91c9e221fe2553edf2db71627d8453f083de87a1)"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.19.324",
"matchCriteriaId": "0EBF3108-DBF4-4E6D-B699-384F2299858B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.286",
"matchCriteriaId": "9952C897-8A61-4D4B-9D6D-7D063E9EA15E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.230",
"matchCriteriaId": "BF5B32D0-72C9-41C3-A0BB-D4946153C134"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.172",
"matchCriteriaId": "88812664-4296-42AC-AE0F-ED71086C1BB1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.117",
"matchCriteriaId": "0DD7F755-2F6B-4707-8973-78496AD5AA8E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.61",
"matchCriteriaId": "630ED7EB-C97E-4435-B884-1E309E40D6F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.11.8",
"matchCriteriaId": "0BD000F7-3DAD-4DD3-8906-98EA1EC67E95"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*",
"matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*",
"matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*",
"matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*",
"matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1a9f55ed5b512f510ccd21ad527d532e60550e80",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/27fc29b5376998c126c85cf9b15d9dfc2afc9cbe",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2ac7f253deada4d449559b65a1c1cd0a6f6f19b7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8d7a28eca7553d35d4ce192fa1f390f2357df41b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a613a392417532ca5aaf3deac6e3277aa7aaef2b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a6dd15981c03f2cdc9a351a278f09b5479d53d2e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b9d9881237afeb52eddd70077b7174bf17e2fa30",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ce8a00a00e36f61f5a1e47734332420b68784c43",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53375",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-02T22:15:10.507",
"lastModified": "2024-12-02T22:15:10.507",
"lastModified": "2024-12-03T20:15:15.820",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Authenticated remote code execution (RCE) vulnerabilities affect TP-Link Archer, Deco, and Tapo series routers. A vulnerability exists in the \"tmp_get_sites\" function of the HomeShield functionality provided by TP-Link. This vulnerability is still exploitable without the installation or activation of the HomeShield functionality."
},
{
"lang": "es",
"value": " Las vulnerabilidades de ejecuci\u00f3n remota de c\u00f3digo (RCE) autenticada afectan a los enrutadores de las series Archer, Deco y Tapo de TP-Link. Existe una vulnerabilidad en la funci\u00f3n \"tmp_get_sites\" de la funcionalidad HomeShield proporcionada por TP-Link. Esta vulnerabilidad a\u00fan se puede explotar sin la instalaci\u00f3n o activaci\u00f3n de la funcionalidad HomeShield."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ThottySploity/CVE-2024-53375",

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-53502",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-03T22:15:05.683",
"lastModified": "2024-12-03T22:15:05.683",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Seecms v4.8 was discovered to contain a SQL injection vulnerability in the SEMCMS_SeoAndTag.php page."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Megrez0423/sescms4.8/tree/main",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-53564",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-02T18:15:11.353",
"lastModified": "2024-12-03T15:15:11.373",
"lastModified": "2024-12-03T21:15:07.807",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authenticated arbitrary file upload vulnerability in the component /module_admin/upload.php of freepbx v17.0.19.17 allows attackers to execute arbitrary code via uploading a crafted file."
"value": "A serious vulnerability was discovered in FreePBX 17.0.19.17. FreePBX does not verify the type of uploaded files and does not restrict user access paths, allowing attackers to remotely control the FreePBX server by uploading malicious files with malicious content and accessing the default directory where the files are uploaded. This will result in particularly serious consequences."
},
{
"lang": "es",
@ -55,6 +55,10 @@
{
"url": "https://gist.github.com/hyp164D1/490732de230edf97423f6d95b0d2f903",
"source": "cve@mitre.org"
},
{
"url": "https://gist.github.com/hyp164D1/d419bdf3e7e352088a21631d0f452a8c",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-53672",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2024-12-03T21:15:07.990",
"lastModified": "2024-12-03T21:15:07.990",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the ClearPass Policy Manager web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. Successful exploit could allow an attacker to execute arbitrary commands as a lower privileged user on the underlying operating system."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04761en_us&docLocale=en_US",
"source": "security-alert@hpe.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-53921",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-03T19:15:11.957",
"lastModified": "2024-12-03T20:15:16.153",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in the installer in Samsung Magician 8.1.0 on Windows. An attacker can create arbitrary folders in the system permission directory via a symbolic link during the installation process."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 2.8,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.3,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
},
{
"lang": "en",
"value": "CWE-1236"
}
]
}
],
"references": [
{
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53937",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-02T23:15:05.673",
"lastModified": "2024-12-02T23:15:05.673",
"lastModified": "2024-12-03T19:15:12.127",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0) devices. The TELNET service is enabled by default with admin/admin as default credentials and is exposed over the LAN. The allows attackers to execute arbitrary commands with root-level permissions. Device setup does not require this password to be changed during setup in order to utilize the device. (However, the TELNET password is dictated by the current GUI password.)"
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en los dispositivos Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0). El servicio TELNET est\u00e1 habilitado de forma predeterminada con admin/admin como credenciales predeterminadas y est\u00e1 expuesto a trav\u00e9s de la LAN. Esto permite a los atacantes ejecutar comandos arbitrarios con permisos de nivel root. La configuraci\u00f3n del dispositivo no requiere que se cambie esta contrase\u00f1a durante la configuraci\u00f3n para poder utilizar el dispositivo. (Sin embargo, la contrase\u00f1a de TELNET est\u00e1 determinada por la contrase\u00f1a de la GUI actual)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/actuator/cve/blob/main/Victure/CVE-2024-53937.txt",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53938",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-02T22:15:10.633",
"lastModified": "2024-12-02T22:15:10.633",
"lastModified": "2024-12-03T19:15:12.330",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0) devices. The TELNET service is enabled by default and exposed over the LAN. The root account is accessible without a password, allowing attackers to achieve full control over the router remotely without any authentication."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en los dispositivos Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0). El servicio TELNET est\u00e1 habilitado de forma predeterminada y expuesto a trav\u00e9s de la LAN. Se puede acceder a la cuenta root sin una contrase\u00f1a, lo que permite a los atacantes lograr un control total sobre el enrutador de forma remota sin ninguna autenticaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/actuator/cve/blob/main/Victure/CVE-2024-53938.txt",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53939",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-02T22:15:10.757",
"lastModified": "2024-12-02T22:15:10.757",
"lastModified": "2024-12-03T19:15:12.690",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0) devices. The /cgi-bin/luci/admin/opsw/Dual_freq_un_apple endpoint is vulnerable to command injection through the 2.4 GHz and 5 GHz name parameters, allowing an attacker to execute arbitrary commands on the device (with root-level permissions) via crafted input."
},
{
"lang": "es",
"value": " Se descubri\u00f3 un problema en los dispositivos Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0). El endpoint /cgi-bin/luci/admin/opsw/Dual_freq_un_apple es vulnerable a la inyecci\u00f3n de comandos a trav\u00e9s de los par\u00e1metros de nombre de 2,4 GHz y 5 GHz, lo que permite que un atacante ejecute comandos arbitrarios en el dispositivo (con permisos de nivel root) a trav\u00e9s de una entrada manipulada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/actuator/cve/blob/main/Victure/CVE-2024-53939.txt",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53940",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-02T22:15:10.880",
"lastModified": "2024-12-02T22:15:10.880",
"lastModified": "2024-12-03T19:15:12.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0) devices. Certain /cgi-bin/luci/admin endpoints are vulnerable to command injection. Attackers can exploit this by sending crafted payloads through parameters intended for the ping utility, enabling arbitrary command execution with root-level permissions on the device."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en los dispositivos Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0). Algunos puntos finales /cgi-bin/luci/admin son vulnerables a la inyecci\u00f3n de comandos. Los atacantes pueden aprovechar esto enviando payloads manipulados a trav\u00e9s de par\u00e1metros destinados a la utilidad ping, lo que permite la ejecuci\u00f3n arbitraria de comandos con permisos de nivel root en el dispositivo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/actuator/cve/blob/main/Victure/CVE-2024-53940.txt",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53941",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-02T22:15:10.993",
"lastModified": "2024-12-02T22:15:10.993",
"lastModified": "2024-12-03T19:15:13.113",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0) devices. A remote attacker (in proximity to a Wi-Fi network) can derive the default Wi-Fi PSK value via the last 4 octets of the BSSID."
},
{
"lang": "es",
"value": " Se descubri\u00f3 un problema en los dispositivos Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0). Un atacante remoto (en proximidad a una red Wi-Fi) puede obtener el valor PSK de Wi-Fi predeterminado a trav\u00e9s de los \u00faltimos 4 octetos del BSSID."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/actuator/cve/blob/main/Victure/CVE-2024-53941.txt",

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2024-54131",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-03T21:15:08.127",
"lastModified": "2024-12-03T21:15:08.127",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Kolide Agent (aka: Launcher) is the lightweight agent designed to work with Kolide's service. An implementation bug in the Kolide Agent (known as `launcher`) allows for local privilege escalation to the SYSTEM user on Windows 10 and 11. The bug was introduced in version 1.5.3 when launcher started storing upgraded binaries in the ProgramData directory. This move to the new directory meant the launcher root directory inherited default permissions that are not as strict as the previous location. These incorrect default permissions in conjunction with an omitted SystemDrive environmental variable (when launcher starts osqueryd), allows a malicious actor with access to the local Windows device to successfully place an arbitrary DLL into the osqueryd process's search path. Under some circumstances, this DLL will be executed when osqueryd performs a WMI query. This combination of events could then allow the attacker to escalate their privileges to SYSTEM. Impacted versions include versions >= 1.5.3 and the fix has been released in 1.12.3."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
},
{
"lang": "en",
"value": "CWE-456"
}
]
}
],
"references": [
{
"url": "https://github.com/kolide/launcher/pull/1510",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/kolide/launcher/security/advisories/GHSA-66q9-2rvx-qfj5",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,15 +2,42 @@
"id": "CVE-2024-7391",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T22:15:17.893",
"lastModified": "2024-11-22T22:15:17.893",
"vulnStatus": "Received",
"lastModified": "2024-12-03T21:44:10.397",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ChargePoint Home Flex Bluetooth Low Energy Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of ChargePoint Home Flex charging devices. User interaction is required to exploit this vulnerability.\n\nThe specific flaw exists within the Wi-Fi setup logic. By connecting to the device over Bluetooth Low Energy during the setup process, an attacker can obtain Wi-Fi credentials. An attacker can leverage this vulnerability to disclose credentials and gain access to the device owner's Wi-Fi network. Was ZDI-CAN-21454."
},
{
"lang": "es",
"value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de Bluetooth Low Energy en ChargePoint Home Flex. Esta vulnerabilidad permite a los atacantes adyacentes a la red divulgar informaci\u00f3n confidencial sobre las instalaciones afectadas de los dispositivos de carga ChargePoint Home Flex. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro de la l\u00f3gica de configuraci\u00f3n de Wi-Fi. Al conectarse al dispositivo a trav\u00e9s de Bluetooth Low Energy durante el proceso de configuraci\u00f3n, un atacante puede obtener credenciales de Wi-Fi. Un atacante puede aprovechar esta vulnerabilidad para divulgar credenciales y obtener acceso a la red Wi-Fi del propietario del dispositivo. Era ZDI-CAN-21454."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -37,19 +64,61 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:chargepoint:home_flex_firmware:5.5.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "634EF904-F103-4F4B-8A50-64E4D67B3FD0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:chargepoint:home_flex:-:*:*:*:*:*:*:*",
"matchCriteriaId": "868D932A-A1D8-46A5-9167-7BC45E5F014B"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1046/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,15 +2,42 @@
"id": "CVE-2024-7392",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T22:15:18.013",
"lastModified": "2024-11-22T22:15:18.013",
"vulnStatus": "Received",
"lastModified": "2024-12-03T22:17:52.127",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ChargePoint Home Flex Bluetooth Low Energy Denial-of-Service Vulnerability. This vulnerability allows network-adjacent attackers to create a denial-of-service condition on affected installations of ChargePoint Home Flex charging devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the connection handling of the Bluetooth Low Energy interface. The issue results from limiting the number of active connections to the product. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-21455."
},
{
"lang": "es",
"value": "Vulnerabilidad de denegaci\u00f3n de servicio de Bluetooth Low Energy en ChargePoint Home Flex. Esta vulnerabilidad permite a los atacantes adyacentes a la red crear una condici\u00f3n de denegaci\u00f3n de servicio en las instalaciones afectadas de los dispositivos de carga ChargePoint Home Flex. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica existe en el manejo de la conexi\u00f3n de la interfaz Bluetooth Low Energy. El problema es el resultado de limitar la cantidad de conexiones activas al producto. Un atacante puede aprovechar esta vulnerabilidad para crear una condici\u00f3n de denegaci\u00f3n de servicio en el sistema. Era ZDI-CAN-21455."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -37,19 +64,61 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-410"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:chargepoint:home_flex_firmware:5.5.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "634EF904-F103-4F4B-8A50-64E4D67B3FD0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:chargepoint:home_flex:-:*:*:*:*:*:*:*",
"matchCriteriaId": "868D932A-A1D8-46A5-9167-7BC45E5F014B"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1047/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7409",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-08-05T14:15:35.813",
"lastModified": "2024-11-12T17:15:10.833",
"lastModified": "2024-12-03T20:15:16.387",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
@ -52,6 +52,10 @@
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:10518",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:6811",
"source": "secalert@redhat.com"
@ -68,10 +72,22 @@
"url": "https://access.redhat.com/errata/RHSA-2024:7408",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:8991",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:9136",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:9620",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:9912",
"source": "secalert@redhat.com"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-7409",
"source": "secalert@redhat.com"

View File

@ -2,15 +2,42 @@
"id": "CVE-2024-7509",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T22:15:18.250",
"lastModified": "2024-11-22T22:15:18.250",
"vulnStatus": "Received",
"lastModified": "2024-12-03T21:54:37.137",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Trimble SketchUp SKP File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of SKP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-19576."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por desbordamiento del b\u00fafer basado en pila en el an\u00e1lisis de archivos SKP de Trimble SketchUp. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Trimble SketchUp. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos SKP. El problema es el resultado de la falta de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos en un b\u00fafer basado en pila. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-19576."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -37,19 +64,49 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trimble:sketchup:22.0.354.0:*:*:*:-:*:*:*",
"matchCriteriaId": "FC326904-121E-497E-9CEA-637D86F1CDB9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1055/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,15 +2,42 @@
"id": "CVE-2024-7510",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T22:15:18.363",
"lastModified": "2024-11-22T22:15:18.363",
"vulnStatus": "Received",
"lastModified": "2024-12-03T21:36:54.357",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Trimble SketchUp SKP File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of SKP files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-19631."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el an\u00e1lisis de archivos SKP de Trimble SketchUp. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Trimble SketchUp. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos SKP. El problema es el resultado de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones en el objeto. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-19631."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -37,7 +64,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,10 +73,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trimble:sketchup:22.0.354.0:*:*:*:-:*:*:*",
"matchCriteriaId": "FC326904-121E-497E-9CEA-637D86F1CDB9"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1056/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,15 +2,42 @@
"id": "CVE-2024-7511",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T22:15:18.480",
"lastModified": "2024-11-22T22:15:18.480",
"vulnStatus": "Received",
"lastModified": "2024-12-03T21:31:50.467",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Trimble SketchUp Pro SKP File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Trimble SketchUp Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PSD files embedded in SKP files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-23000."
},
{
"lang": "es",
"value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de lectura fuera de los l\u00edmites en el an\u00e1lisis de archivos SKP de Trimble SketchUp Pro. Esta vulnerabilidad permite a atacantes remotos divulgar informaci\u00f3n confidencial sobre las instalaciones afectadas de Trimble SketchUp Pro. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos PSD incrustados en archivos SKP. El problema es el resultado de la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede dar como resultado una lectura m\u00e1s all\u00e1 del final de un b\u00fafer asignado. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual. Era ZDI-CAN-23000."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -46,10 +73,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:trimble:sketchup:23.1.340:*:*:*:pro:*:*:*",
"matchCriteriaId": "C7B0F715-120A-450D-B7DC-5DB375A986E2"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1057/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7998",
"sourceIdentifier": "security@octopus.com",
"published": "2024-08-21T06:15:13.830",
"lastModified": "2024-08-21T12:30:33.697",
"lastModified": "2024-12-03T19:15:13.330",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N",
"baseScore": 2.6,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
@ -30,15 +32,25 @@
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.6,
"baseSeverity": "LOW"
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.0,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"references": [
{
"url": "https://advisories.octopus.com/post/2024/sa2024-07/",

View File

@ -2,15 +2,42 @@
"id": "CVE-2024-8838",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-22T21:15:22.317",
"lastModified": "2024-11-22T21:15:22.317",
"vulnStatus": "Received",
"lastModified": "2024-12-03T22:06:42.107",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor XPS File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of XPS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24409."
},
{
"lang": "es",
"value": "Vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remoto en el an\u00e1lisis de archivos XPS fuera de los l\u00edmites en PDF-XChange Editor. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de PDF-XChange Editor. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos XPS. El problema es el resultado de la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una lectura m\u00e1s all\u00e1 del final de un b\u00fafer asignado. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-24409."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
],
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
@ -37,7 +64,7 @@
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -46,10 +73,36 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pdf-xchange:pdf-tools:10.3.0.386:*:*:*:*:*:*:*",
"matchCriteriaId": "C93EFAC4-4B02-41B1-A788-0A7FC98CD499"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:10.3.0.386:*:*:*:*:*:*:*",
"matchCriteriaId": "207FF12C-548C-425F-9474-61148DBE69C2"
}
]
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1261/",
"source": "zdi-disclosures@trendmicro.com"
"source": "zdi-disclosures@trendmicro.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-03T19:00:25.275105+00:00
2024-12-03T23:00:27.651512+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-03T18:46:38.467000+00:00
2024-12-03T22:23:53.200000+00:00
```
### Last Data Feed Release
@ -33,67 +33,59 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
272016
272031
```
### CVEs added in the last Commit
Recently added CVEs: `23`
Recently added CVEs: `15`
- [CVE-2021-29892](CVE-2021/CVE-2021-298xx/CVE-2021-29892.json) (`2024-12-03T17:15:05.760`)
- [CVE-2023-7255](CVE-2023/CVE-2023-72xx/CVE-2023-7255.json) (`2024-12-03T18:15:12.743`)
- [CVE-2024-25019](CVE-2024/CVE-2024-250xx/CVE-2024-25019.json) (`2024-12-03T17:15:09.560`)
- [CVE-2024-25020](CVE-2024/CVE-2024-250xx/CVE-2024-25020.json) (`2024-12-03T18:15:12.997`)
- [CVE-2024-25035](CVE-2024/CVE-2024-250xx/CVE-2024-25035.json) (`2024-12-03T17:15:09.753`)
- [CVE-2024-25036](CVE-2024/CVE-2024-250xx/CVE-2024-25036.json) (`2024-12-03T17:15:09.923`)
- [CVE-2024-29404](CVE-2024/CVE-2024-294xx/CVE-2024-29404.json) (`2024-12-03T17:15:10.087`)
- [CVE-2024-37302](CVE-2024/CVE-2024-373xx/CVE-2024-37302.json) (`2024-12-03T17:15:10.733`)
- [CVE-2024-37303](CVE-2024/CVE-2024-373xx/CVE-2024-37303.json) (`2024-12-03T17:15:10.890`)
- [CVE-2024-40691](CVE-2024/CVE-2024-406xx/CVE-2024-40691.json) (`2024-12-03T17:15:11.037`)
- [CVE-2024-41775](CVE-2024/CVE-2024-417xx/CVE-2024-41775.json) (`2024-12-03T18:15:13.920`)
- [CVE-2024-41776](CVE-2024/CVE-2024-417xx/CVE-2024-41776.json) (`2024-12-03T18:15:14.107`)
- [CVE-2024-41777](CVE-2024/CVE-2024-417xx/CVE-2024-41777.json) (`2024-12-03T18:15:14.293`)
- [CVE-2024-45676](CVE-2024/CVE-2024-456xx/CVE-2024-45676.json) (`2024-12-03T18:15:14.480`)
- [CVE-2024-52544](CVE-2024/CVE-2024-525xx/CVE-2024-52544.json) (`2024-12-03T18:15:15.327`)
- [CVE-2024-52545](CVE-2024/CVE-2024-525xx/CVE-2024-52545.json) (`2024-12-03T18:15:15.543`)
- [CVE-2024-52546](CVE-2024/CVE-2024-525xx/CVE-2024-52546.json) (`2024-12-03T18:15:15.710`)
- [CVE-2024-52547](CVE-2024/CVE-2024-525xx/CVE-2024-52547.json) (`2024-12-03T18:15:15.860`)
- [CVE-2024-52548](CVE-2024/CVE-2024-525xx/CVE-2024-52548.json) (`2024-12-03T18:15:16.023`)
- [CVE-2024-52805](CVE-2024/CVE-2024-528xx/CVE-2024-52805.json) (`2024-12-03T17:15:12.120`)
- [CVE-2024-52815](CVE-2024/CVE-2024-528xx/CVE-2024-52815.json) (`2024-12-03T17:15:12.267`)
- [CVE-2024-53863](CVE-2024/CVE-2024-538xx/CVE-2024-53863.json) (`2024-12-03T17:15:12.633`)
- [CVE-2024-53867](CVE-2024/CVE-2024-538xx/CVE-2024-53867.json) (`2024-12-03T17:15:12.787`)
- [CVE-2024-12053](CVE-2024/CVE-2024-120xx/CVE-2024-12053.json) (`2024-12-03T19:15:08.413`)
- [CVE-2024-40391](CVE-2024/CVE-2024-403xx/CVE-2024-40391.json) (`2024-12-03T22:15:04.740`)
- [CVE-2024-45757](CVE-2024/CVE-2024-457xx/CVE-2024-45757.json) (`2024-12-03T21:15:06.953`)
- [CVE-2024-46625](CVE-2024/CVE-2024-466xx/CVE-2024-46625.json) (`2024-12-03T22:15:04.860`)
- [CVE-2024-48080](CVE-2024/CVE-2024-480xx/CVE-2024-48080.json) (`2024-12-03T19:15:09.947`)
- [CVE-2024-50948](CVE-2024/CVE-2024-509xx/CVE-2024-50948.json) (`2024-12-03T19:15:10.580`)
- [CVE-2024-51114](CVE-2024/CVE-2024-511xx/CVE-2024-51114.json) (`2024-12-03T20:15:15.360`)
- [CVE-2024-51363](CVE-2024/CVE-2024-513xx/CVE-2024-51363.json) (`2024-12-03T22:15:05.013`)
- [CVE-2024-51771](CVE-2024/CVE-2024-517xx/CVE-2024-51771.json) (`2024-12-03T20:15:15.477`)
- [CVE-2024-51772](CVE-2024/CVE-2024-517xx/CVE-2024-51772.json) (`2024-12-03T21:15:07.140`)
- [CVE-2024-51773](CVE-2024/CVE-2024-517xx/CVE-2024-51773.json) (`2024-12-03T21:15:07.280`)
- [CVE-2024-53502](CVE-2024/CVE-2024-535xx/CVE-2024-53502.json) (`2024-12-03T22:15:05.683`)
- [CVE-2024-53672](CVE-2024/CVE-2024-536xx/CVE-2024-53672.json) (`2024-12-03T21:15:07.990`)
- [CVE-2024-53921](CVE-2024/CVE-2024-539xx/CVE-2024-53921.json) (`2024-12-03T19:15:11.957`)
- [CVE-2024-54131](CVE-2024/CVE-2024-541xx/CVE-2024-54131.json) (`2024-12-03T21:15:08.127`)
### CVEs modified in the last Commit
Recently modified CVEs: `32`
Recently modified CVEs: `70`
- [CVE-2023-42859](CVE-2023/CVE-2023-428xx/CVE-2023-42859.json) (`2024-12-03T17:27:41.293`)
- [CVE-2023-42860](CVE-2023/CVE-2023-428xx/CVE-2023-42860.json) (`2024-12-03T17:24:43.420`)
- [CVE-2023-42878](CVE-2023/CVE-2023-428xx/CVE-2023-42878.json) (`2024-12-03T17:17:41.227`)
- [CVE-2023-52345](CVE-2023/CVE-2023-523xx/CVE-2023-52345.json) (`2024-12-03T17:15:08.390`)
- [CVE-2024-20995](CVE-2024/CVE-2024-209xx/CVE-2024-20995.json) (`2024-12-03T17:15:08.597`)
- [CVE-2024-21044](CVE-2024/CVE-2024-210xx/CVE-2024-21044.json) (`2024-12-03T17:15:08.787`)
- [CVE-2024-21052](CVE-2024/CVE-2024-210xx/CVE-2024-21052.json) (`2024-12-03T17:15:08.950`)
- [CVE-2024-21063](CVE-2024/CVE-2024-210xx/CVE-2024-21063.json) (`2024-12-03T17:15:09.103`)
- [CVE-2024-22727](CVE-2024/CVE-2024-227xx/CVE-2024-22727.json) (`2024-12-03T17:15:09.237`)
- [CVE-2024-24426](CVE-2024/CVE-2024-244xx/CVE-2024-24426.json) (`2024-12-03T17:15:09.400`)
- [CVE-2024-28829](CVE-2024/CVE-2024-288xx/CVE-2024-28829.json) (`2024-12-03T17:55:48.257`)
- [CVE-2024-30205](CVE-2024/CVE-2024-302xx/CVE-2024-30205.json) (`2024-12-03T17:15:10.187`)
- [CVE-2024-31695](CVE-2024/CVE-2024-316xx/CVE-2024-31695.json) (`2024-12-03T17:15:10.377`)
- [CVE-2024-34931](CVE-2024/CVE-2024-349xx/CVE-2024-34931.json) (`2024-12-03T17:15:10.530`)
- [CVE-2024-37392](CVE-2024/CVE-2024-373xx/CVE-2024-37392.json) (`2024-12-03T18:15:13.410`)
- [CVE-2024-38036](CVE-2024/CVE-2024-380xx/CVE-2024-38036.json) (`2024-12-03T18:15:13.710`)
- [CVE-2024-38859](CVE-2024/CVE-2024-388xx/CVE-2024-38859.json) (`2024-12-03T17:47:02.467`)
- [CVE-2024-50647](CVE-2024/CVE-2024-506xx/CVE-2024-50647.json) (`2024-12-03T17:15:11.193`)
- [CVE-2024-50648](CVE-2024/CVE-2024-506xx/CVE-2024-50648.json) (`2024-12-03T17:15:11.357`)
- [CVE-2024-50649](CVE-2024/CVE-2024-506xx/CVE-2024-50649.json) (`2024-12-03T17:15:11.520`)
- [CVE-2024-50650](CVE-2024/CVE-2024-506xx/CVE-2024-50650.json) (`2024-12-03T17:15:11.683`)
- [CVE-2024-50724](CVE-2024/CVE-2024-507xx/CVE-2024-50724.json) (`2024-12-03T17:15:11.820`)
- [CVE-2024-51164](CVE-2024/CVE-2024-511xx/CVE-2024-51164.json) (`2024-12-03T17:15:11.970`)
- [CVE-2024-8775](CVE-2024/CVE-2024-87xx/CVE-2024-8775.json) (`2024-12-03T17:15:14.090`)
- [CVE-2024-9902](CVE-2024/CVE-2024-99xx/CVE-2024-9902.json) (`2024-12-03T17:15:14.390`)
- [CVE-2024-46905](CVE-2024/CVE-2024-469xx/CVE-2024-46905.json) (`2024-12-03T20:00:17.570`)
- [CVE-2024-47094](CVE-2024/CVE-2024-470xx/CVE-2024-47094.json) (`2024-12-03T20:01:52.610`)
- [CVE-2024-51378](CVE-2024/CVE-2024-513xx/CVE-2024-51378.json) (`2024-12-03T19:15:10.807`)
- [CVE-2024-52544](CVE-2024/CVE-2024-525xx/CVE-2024-52544.json) (`2024-12-03T21:15:07.390`)
- [CVE-2024-52545](CVE-2024/CVE-2024-525xx/CVE-2024-52545.json) (`2024-12-03T21:15:07.490`)
- [CVE-2024-52546](CVE-2024/CVE-2024-525xx/CVE-2024-52546.json) (`2024-12-03T21:15:07.593`)
- [CVE-2024-52547](CVE-2024/CVE-2024-525xx/CVE-2024-52547.json) (`2024-12-03T21:15:07.707`)
- [CVE-2024-52548](CVE-2024/CVE-2024-525xx/CVE-2024-52548.json) (`2024-12-03T22:15:05.567`)
- [CVE-2024-53059](CVE-2024/CVE-2024-530xx/CVE-2024-53059.json) (`2024-12-03T20:57:20.747`)
- [CVE-2024-53060](CVE-2024/CVE-2024-530xx/CVE-2024-53060.json) (`2024-12-03T20:49:04.903`)
- [CVE-2024-53375](CVE-2024/CVE-2024-533xx/CVE-2024-53375.json) (`2024-12-03T20:15:15.820`)
- [CVE-2024-53564](CVE-2024/CVE-2024-535xx/CVE-2024-53564.json) (`2024-12-03T21:15:07.807`)
- [CVE-2024-53937](CVE-2024/CVE-2024-539xx/CVE-2024-53937.json) (`2024-12-03T19:15:12.127`)
- [CVE-2024-53938](CVE-2024/CVE-2024-539xx/CVE-2024-53938.json) (`2024-12-03T19:15:12.330`)
- [CVE-2024-53939](CVE-2024/CVE-2024-539xx/CVE-2024-53939.json) (`2024-12-03T19:15:12.690`)
- [CVE-2024-53940](CVE-2024/CVE-2024-539xx/CVE-2024-53940.json) (`2024-12-03T19:15:12.910`)
- [CVE-2024-53941](CVE-2024/CVE-2024-539xx/CVE-2024-53941.json) (`2024-12-03T19:15:13.113`)
- [CVE-2024-7391](CVE-2024/CVE-2024-73xx/CVE-2024-7391.json) (`2024-12-03T21:44:10.397`)
- [CVE-2024-7392](CVE-2024/CVE-2024-73xx/CVE-2024-7392.json) (`2024-12-03T22:17:52.127`)
- [CVE-2024-7409](CVE-2024/CVE-2024-74xx/CVE-2024-7409.json) (`2024-12-03T20:15:16.387`)
- [CVE-2024-7509](CVE-2024/CVE-2024-75xx/CVE-2024-7509.json) (`2024-12-03T21:54:37.137`)
- [CVE-2024-7510](CVE-2024/CVE-2024-75xx/CVE-2024-7510.json) (`2024-12-03T21:36:54.357`)
- [CVE-2024-7511](CVE-2024/CVE-2024-75xx/CVE-2024-7511.json) (`2024-12-03T21:31:50.467`)
- [CVE-2024-7998](CVE-2024/CVE-2024-79xx/CVE-2024-7998.json) (`2024-12-03T19:15:13.330`)
- [CVE-2024-8838](CVE-2024/CVE-2024-88xx/CVE-2024-8838.json) (`2024-12-03T22:06:42.107`)
## Download and Usage

View File

@ -126936,7 +126936,7 @@ CVE-2018-9370,0,0,ae53e355aa0524bf60f4d348ee71944e38f6c6c59f44b44474743ec3d5eda5
CVE-2018-9371,0,0,dce1635a39fc875c3a6010e78992681138a4af74d8f57da615da4dd9d5becbf0,2024-11-22T21:25:48.853000
CVE-2018-9372,0,0,5241fff5e37359ca4d40d4d0ef51eddfb8e42f03921d8e136fe460686e5ef5c0,2024-11-19T21:56:45.533000
CVE-2018-9374,0,0,b5c9257b4379d5ec059f557b277f9ab8f86bedde18eae66967ba271cf76e5f31,2024-11-29T22:15:06.327000
CVE-2018-9376,0,0,ca8cc45f967ea36522e5828a1c658a55ab0d2776b3d6bb7cde3ad78582f34eb1,2024-12-02T21:15:09.107000
CVE-2018-9376,0,1,43d6dd0e28def70edf6a54cdbf3de982ecd563705b3a57463c6811a2ad8b33db,2024-12-03T19:15:05.937000
CVE-2018-9377,0,0,e4a0a8bd1ac9734ae148f92ac66c4e7d1d997837e82ad8c47cc9f88531e107dc,2024-11-29T22:15:06.483000
CVE-2018-9380,0,0,e6fbe63ca9b9f94eed7d3113363726fcbc9fd32f362f8de02b396f07c6dcdef2,2024-12-02T22:15:08.237000
CVE-2018-9381,0,0,6d23302b8a97082a76241d451afb14bf577899eb10a0c0816bc7882dabaf95b5,2024-12-02T22:15:08.493000
@ -126945,8 +126945,8 @@ CVE-2018-9409,0,0,ebcda6f7e24e6f698fa6ccd47d9f60bf8bc1c7442cbc31f290fa0b923152d8
CVE-2018-9410,0,0,67eeebcbba32822e3887bccb33fae18efb160aec58d1cb7ea07ebe4be1e04e64,2024-11-22T22:28:51.533000
CVE-2018-9411,0,0,e176a59ad08b39fe1e6853540b0f5379b5df64366124dc7ef673195cfcdd7002,2024-11-22T22:30:25.617000
CVE-2018-9412,0,0,8f50260d1e8b65957e2cb05a966f6136a2dee829d699d386c0ca2a63e589e17c,2024-11-23T00:56:14.623000
CVE-2018-9413,0,0,c96c3efa9a30492ac98f18f0022a88627e5c62aad3ceec520d5c6c6e2465f89e,2024-12-02T21:15:09.653000
CVE-2018-9414,0,1,1502707cba8022d2a56ca7e99daf57548667b3f30de1f8fb22b96c6af7e6c423,2024-12-03T18:15:11.267000
CVE-2018-9413,0,1,c6f4ac4e24b60889b670534f191861c4c8edbffd728fe1cd291cd8a7e281fa1d,2024-12-03T19:15:06.147000
CVE-2018-9414,0,0,1502707cba8022d2a56ca7e99daf57548667b3f30de1f8fb22b96c6af7e6c423,2024-12-03T18:15:11.267000
CVE-2018-9415,0,0,ed7c0b7190441eec3d5a1d3e25bd99949f1ee50503dc12cac8466031b55d4227,2018-12-12T21:36:26.237000
CVE-2018-9417,0,0,d14f6cd2cf635e766e90a973936df96c48a6f5ddbb0b86d066715267e8c688d6,2024-11-22T22:08:46.630000
CVE-2018-9418,0,0,e851384c008e3a0dde6b54cd54b3ee4e68c29533e11960a94ecde9efdfeb4b80,2024-12-03T16:15:18.587000
@ -146193,7 +146193,7 @@ CVE-2020-1106,0,0,c069ae616a0efbded861e845c7e66c9fe99af862c5e5916872a71ea06e9b80
CVE-2020-11060,0,0,ad63f874ff1162cb8c35ca1af2320dc15d68de65a0926edf604a2c799c687aa0,2024-11-21T04:56:42.190000
CVE-2020-11061,0,0,0039dbda81c6a936e57d6c83e20103c1c1240d1576284250a884a3736b756243,2024-11-21T04:56:42.313000
CVE-2020-11062,0,0,51c6aa3d164aff5a89b971c366cda93af16aeb3b002411ec97e61d12b8e82e30,2024-11-21T04:56:42.440000
CVE-2020-11063,0,0,291fb51b47c425bec5a6e80d190bd670f165e07bc61aba57600a3512f954f083,2024-11-21T04:56:42.557000
CVE-2020-11063,0,1,843af822dfee9c4c934a9b742debfecf7b82c9cdd3a1da5dea19d03d94663568,2024-12-03T20:15:13.003000
CVE-2020-11064,0,0,71c051ced833c30a3a1a8efac394ffda3ba4c75457d71c1b53aae887452f94f7,2024-11-21T04:56:42.673000
CVE-2020-11065,0,0,c88b156f0b7196a504ce0aa37d61de9555d69fe706fe38e09f6514211d6fccf9,2024-11-21T04:56:42.787000
CVE-2020-11066,0,0,3dd61e9b96caea11f4797aa0c61d35d202ba6fa5d3cfcca42ffd02f7f4fbeed0,2024-11-21T04:56:42.903000
@ -174357,7 +174357,7 @@ CVE-2021-29880,0,0,69bfd213ac99c9f317e412cd5b1bc2e634cda2cc6eee5ed72e94a00793187
CVE-2021-29883,0,0,3ab50cc1fe1f7bad26d22921bf3dab11c24a06808b4f77ba4b912277dc8be5f1,2022-07-12T17:42:04.277000
CVE-2021-29888,0,0,1f80d3b985dc28be5fdec5211f7b487be5eee1d5f8e7bc38bc8ccbab35964ee5,2021-11-03T16:16:07.383000
CVE-2021-29891,0,0,fa30c10bce4a74aaf93785d724e72a41a0181a0c0bdeffe46d8b46a15c82337d,2022-08-25T16:04:47.897000
CVE-2021-29892,1,1,2a788ff8d94f0260991535b6718b55b3f5e8bd5d066449be3210ad97c3e9a3fa,2024-12-03T17:15:05.760000
CVE-2021-29892,0,0,2a788ff8d94f0260991535b6718b55b3f5e8bd5d066449be3210ad97c3e9a3fa,2024-12-03T17:15:05.760000
CVE-2021-29894,0,0,cfc28faf33197707204b466c20194044e417df1fc619abda3664ad2944ff52df,2021-10-04T17:14:35.150000
CVE-2021-29899,0,0,81d9b5a8576f3b5fb2617342d2e97387f6d63d198698041961a6a74b03dcb8a5,2022-03-24T14:16:35.617000
CVE-2021-29903,0,0,a03223953564f2473b4b3f6b95893a3020ab7abdbf104166aa48e9facd558572,2021-10-14T17:58:13.797000
@ -214943,7 +214943,7 @@ CVE-2023-20046,0,0,a28c9dd46c7f8382f7f0d6f52cf27d3e22c751e22b599ebd86059c8012869
CVE-2023-20047,0,0,a576a38bacf817382687ae32b765b6f4114663858b856d42d111196bdfff4269,2024-01-25T17:15:27.527000
CVE-2023-20048,0,0,241c964ebb06e703be2f42894a8f1a8f15c630ce5f500d29b977229045c2413a,2024-11-26T16:09:02.407000
CVE-2023-20049,0,0,1abffa4b450cc4a8b2f64f9647eef61efe0594d963bbc56a204aa6fe5607818e,2023-11-07T04:05:51.407000
CVE-2023-2005,0,0,7a3ec8787f0cc3167d044c957356d641e165f39b91a5ef78eeb5dc3cf92c566e,2023-07-05T17:16:12.110000
CVE-2023-2005,0,1,cb3e38dadaa7788fcae6290a7560e65f637afe1ff6b85d9bff4432d298cf2f50,2024-12-03T19:15:06.390000
CVE-2023-20050,0,0,27536266aaf6107594818b4cd149e06321e1969d28311cf555c4715227344218,2023-11-07T04:05:51.780000
CVE-2023-20051,0,0,953e9b156bf220fdf240bd9280b1849a48d9f34cd88f9026db226be2b3a73c42,2023-11-07T04:05:52.150000
CVE-2023-20052,0,0,fe4c2c2ab156d2f317396eb2500adfc1736e39b233f8d390dacb26c34a896625,2024-01-25T17:15:27.740000
@ -222806,7 +222806,7 @@ CVE-2023-29455,0,0,325721e5417bd04ba7ffa08e9e885ab7f377ee98479242165809b7fcea275
CVE-2023-29456,0,0,73f2679f18e611f61958fd92d8d996809f63b9f0032fceed78c0b47886058942,2023-08-22T19:16:35.827000
CVE-2023-29457,0,0,051cbfd687c7106fadb51e68a8acfc9955079c6f8ff7e701e981946297d701e2,2023-08-22T19:16:35.957000
CVE-2023-29458,0,0,1d2d4ff76a517977527853af73b75986b05c8601efc524ed56549254a334ae79,2023-07-25T15:05:05.530000
CVE-2023-29459,0,0,a382aa60abba9bd8692ccb1a67d004abc82bee73e632cde35cec3d3dc7b7dff0,2023-07-06T15:47:21.350000
CVE-2023-29459,0,1,c3c84c578a50a80ad57452c533eadefc3c467bf53829a4b5e05369bfd6a27d10,2024-12-03T20:15:14.167000
CVE-2023-2946,0,0,278c71a5f845556ac284538ef5b9dff915b2218dcdce132a76af638a99747736,2023-06-01T03:46:57.990000
CVE-2023-29460,0,0,2c5455962c5635f59a86c50c24e746ae87f7eed2f44c565fbf7c9bfeb97cc5c6,2023-05-16T18:30:41.293000
CVE-2023-29461,0,0,040694f77a9ce20dc408e6c7ae75a7f2aec9cb2f7c75ac62be8f89097ea2a5bf,2023-05-16T18:30:02.453000
@ -224112,7 +224112,7 @@ CVE-2023-31301,0,0,8b4aa9e0020370e9364f1514c1548d00f13f3a6f7e88a244d5ac3dcc05554
CVE-2023-31302,0,0,7db878fe5302d808bd5001becdb205fd1302d85ff5b5989c39244fbd498603b5,2024-01-08T13:04:07.097000
CVE-2023-31304,0,0,d35cbd3c1a51f731cb3021ec4d7f26ebe776aa5c814e8a89e6392f12283085fa,2024-11-04T17:35:02.577000
CVE-2023-31305,0,0,af1a24ed09ae428da28818e3b6639df4c603d6ee1ac78ab0a5cce894745493cd,2024-11-06T16:35:06.613000
CVE-2023-31307,0,1,bd36d7a04bc83cef99bb89abed7c063b2ce8d88d8531a61df7b75a4c3106f86b,2024-12-03T17:15:07.017000
CVE-2023-31307,0,0,bd36d7a04bc83cef99bb89abed7c063b2ce8d88d8531a61df7b75a4c3106f86b,2024-12-03T17:15:07.017000
CVE-2023-3131,0,0,92b0e6ff89d88f5d5d16464713458f8b0d9ad7ab63634417462d4acc9effd23f,2023-11-07T04:17:57.837000
CVE-2023-31310,0,0,f17e30a0294060da2ce7aa247bba7d7e4f3746a8423691dd74baefa96f0eead0,2024-10-31T15:35:04.980000
CVE-2023-31315,0,0,44428fbe3e922a7707ac2901dc10ee48452105458214ad8f550b81ed93b19a27,2024-08-27T15:35:00.983000
@ -224124,13 +224124,13 @@ CVE-2023-3134,0,0,56071acdc7623a3f1e8c35f56a75d80cedbc311efc23e7ac51d208245195f5
CVE-2023-31341,0,0,dd24cf83580387b35de43a1761935afa05605b69789156e33c8226af92558012,2024-08-14T02:07:05.410000
CVE-2023-31346,0,0,baf70a7fbcbac8ee2109bb0ede410a1f9d8a0f3d16eca151ea162e0c8735e373,2024-10-24T15:22:58.270000
CVE-2023-31347,0,0,5703df889e7697d9a941bc897ce8eaa50a95592c03760c9ac7c4b13dd799542a,2024-10-22T13:30:27.637000
CVE-2023-31348,0,1,1a3486380e50f76a445d391370e4805d98ed6ff38802308c1313b3e7b10cbf98,2024-12-03T18:46:38.467000
CVE-2023-31349,0,1,bba5c58401546853f0e31eb0c8f3a091ae43f3f0fcdd313b2330d0e9a09e883b,2024-12-03T18:37:37.340000
CVE-2023-31348,0,0,1a3486380e50f76a445d391370e4805d98ed6ff38802308c1313b3e7b10cbf98,2024-12-03T18:46:38.467000
CVE-2023-31349,0,0,bba5c58401546853f0e31eb0c8f3a091ae43f3f0fcdd313b2330d0e9a09e883b,2024-12-03T18:37:37.340000
CVE-2023-3135,0,0,6bf4d178b889b1c4b1b5225d3bec9008408415fe638f98a0c794b0c27b2df020,2023-11-07T04:17:58.450000
CVE-2023-31355,0,0,69aec8bfd9cbbdf6fccaa5a3f23ea5d697dcae13123e85a3c8dc9b60288b0210,2024-11-26T19:10:21.797000
CVE-2023-31356,0,0,bea061db9cade12e882f1ffccc4c3b6bf3ed6261d08ca2362e9f4fdc16dd90c9,2024-10-30T19:35:03.503000
CVE-2023-3136,0,0,89749c73105b8a3b2f93105e2704853e3e122996e34e8067a103f24e2d5a7180,2023-11-07T04:17:58.613000
CVE-2023-31366,0,1,3024397a0d4aae2ef43f623686a8e01fdf5340c2590abe5ed9b21fc83aaebfed,2024-12-03T18:30:25.240000
CVE-2023-31366,0,0,3024397a0d4aae2ef43f623686a8e01fdf5340c2590abe5ed9b21fc83aaebfed,2024-12-03T18:30:25.240000
CVE-2023-3138,0,0,8f5ffff3673e8f74abc6225a3f21e8fa48e79b4bc3826a6eddcc46862b33415a,2023-12-08T19:15:07.580000
CVE-2023-3139,0,0,63da4e4c506673ff4b4b94c15b4d0285dc0dfef1076f2791ebbb5626e7d3bb6f,2023-11-07T04:17:58.783000
CVE-2023-3140,0,0,83445c1e28eed50d0564a2961426f98d0d9629256d1766c5b66f60dd49997477,2023-06-16T18:06:57.083000
@ -227688,7 +227688,7 @@ CVE-2023-3624,0,0,2359737609e52e7bb8e66c413ea0b9e9b9a124a75d3e344a359ee48efb51b3
CVE-2023-36243,0,0,a76a3e1407c07832ff18ee29c9b1d24ef6483e6e74fd3fc432edff25c45d59f9,2023-06-29T21:02:42.490000
CVE-2023-3625,0,0,647b04f44d9e93fb8acf04cf29ad72643e8ebfcd9cbb941582dcf7f875016807,2024-05-17T02:27:39.443000
CVE-2023-36250,0,0,8505f8f1a034c00d68b3357143683b1d101618afdeca672857baa51073475a53,2024-09-25T20:35:19.840000
CVE-2023-36252,0,0,137e8a97413fa12d1605bb05b6940edd58b1235ac59afedf9c04c50e482e9521,2023-07-06T16:07:39.287000
CVE-2023-36252,0,1,eb58e4b8c573316423323d10de47a1b31bb54b4ca2eb3f9511866a1093ae9b95,2024-12-03T19:15:07.270000
CVE-2023-36255,0,0,251e30825623919ebb8b8d717a85233bfec3860670a31ef6494b25e5d2734735,2023-09-18T20:15:09.513000
CVE-2023-36256,0,0,661307eeae985eaad5d2aeb0699d3ade98b15ccc00362c6b7ac3fcee9219222e,2023-07-13T18:39:58.747000
CVE-2023-36258,0,0,f5be4cdb06189fdc97ef95912d49585470375bddc48c99c0c8c398c2c59f3bdc,2024-11-22T17:15:05.750000
@ -230749,7 +230749,7 @@ CVE-2023-4009,0,0,31ef66ee2384a7e29167fffef0895f5cf8b8d86e23a20e6529f062cf0f920d
CVE-2023-40090,0,0,a6fe6a0a57ddfba25e54ae988a1513fccee10f861d719877296294b81374b673,2024-02-02T03:15:34.857000
CVE-2023-40091,0,0,e969e26e3008568904700ece81f790d9b78f3e15528cfc0e613c11527ad04fb8,2024-02-02T03:15:39.110000
CVE-2023-40092,0,0,42fa054bcd3777a6683318bd199740cd15c1b75e8585988805b640a739ab62cb,2024-02-02T03:15:44.960000
CVE-2023-40093,0,0,84ef8730bc18041bdca6b89d2473bd173bbb8aca45e400d0a74b31814e283a14,2024-11-26T16:33:08.700000
CVE-2023-40093,0,1,5999a0651b596859c4ca1959f10a7a59769f1c334563136eb10081d03d1d6253,2024-12-03T19:15:07.740000
CVE-2023-40094,0,0,d16973dfe0c474b7656d9ca50be297fb97a6bd0c5038405f353abcee2bbef805,2024-02-02T03:10:05.053000
CVE-2023-40095,0,0,cf3c105ea4f2aa052c27ac17595f726b4a8a201de665acb70c91f74ade676d1a,2024-02-02T03:09:57.887000
CVE-2023-40096,0,0,80c28bf71c8b791e73e10c9865fe8d8ebce552d17765524b6f7ba8d0a8a23dc5,2024-02-02T03:14:44.280000
@ -232884,12 +232884,12 @@ CVE-2023-42850,0,0,5931fe57c3cb62fdf93e9d6d5bba7fbf9095bc3582c436c90d2fc77b3d0c3
CVE-2023-42852,0,0,51d77abb6759e9386f3b21858804f456fc03ea58878e60b6b3f15e2a16417e72,2024-02-16T15:24:56.403000
CVE-2023-42853,0,0,11982b71ebb82c39e5a22e76bdacfb10bcbdae2a4ea889624b1a4d786842c3e5,2024-03-13T21:15:53.957000
CVE-2023-42854,0,0,f4708dff484f0bcd55c5eebd0727c6d52308a3a96b5b683962e21f1a51d10b6b,2023-11-02T17:59:51.330000
CVE-2023-42855,0,1,d73b683210c471439f24418097a00ff275f56fb1ccaca4b4a1db0b2a4b8449aa,2024-12-03T17:32:38.343000
CVE-2023-42855,0,0,d73b683210c471439f24418097a00ff275f56fb1ccaca4b4a1db0b2a4b8449aa,2024-12-03T17:32:38.343000
CVE-2023-42856,0,0,3785bc6082e7fa65742eabd642d5d65c5d33879ffd7643e13cc058ba75458a60,2023-11-02T18:00:05.630000
CVE-2023-42857,0,0,9ea98d96cc65b90009b648670c5da30d2e3d83b1ae536f9a719789ff9eb40128,2023-11-02T18:00:33.847000
CVE-2023-42858,0,1,b9607fd2e91253bfa70d0cbe127add6cb388b786bf9502e7a4f533f578678b5e,2024-12-03T17:30:04.683000
CVE-2023-42859,0,1,80a8a2bf5783b9593620673ca1588995af64e7c57b56ee53234d4c605dd1f23a,2024-12-03T17:27:41.293000
CVE-2023-42860,0,1,deb5203476f8e10dae004b1a553ababb9a26bdca00f61493796b1a710a2a4d1e,2024-12-03T17:24:43.420000
CVE-2023-42858,0,0,b9607fd2e91253bfa70d0cbe127add6cb388b786bf9502e7a4f533f578678b5e,2024-12-03T17:30:04.683000
CVE-2023-42859,0,0,80a8a2bf5783b9593620673ca1588995af64e7c57b56ee53234d4c605dd1f23a,2024-12-03T17:27:41.293000
CVE-2023-42860,0,0,deb5203476f8e10dae004b1a553ababb9a26bdca00f61493796b1a710a2a4d1e,2024-12-03T17:24:43.420000
CVE-2023-42861,0,0,d8d65111e4802e544404dd9d1d2d3c6540cc7742d5e3fa7afcb7a11f5c1a79ab,2024-06-10T17:16:13.247000
CVE-2023-42862,0,0,a36257707b4fb74a8615ecf862e41d30af8f3c8f9308b2858c6cc934e94b61f7,2024-01-17T20:51:42.080000
CVE-2023-42865,0,0,bf2a0a432fe9999b756c62ffd215341250f2d8dc167f4293b6e906b46c209a63,2024-01-17T20:51:12.820000
@ -232902,7 +232902,7 @@ CVE-2023-42873,0,0,f1055070f5d2c8964679f9d4c375bc90c864cdc2b3efb5cf9fe0466754f26
CVE-2023-42874,0,0,964baee28b6c72a15098069b9e881e1b193059d80a9fe10f47c0787dba9650a1,2023-12-13T23:29:19.097000
CVE-2023-42876,0,0,974317a11812600494105057904f88983c49db0f187d890a9f6b1ea5995af4ff,2024-01-12T14:42:40.430000
CVE-2023-42877,0,0,6cad27eae60657c9f948e06003fc8819bbc3ef2215aadba8c1d4e84902953011,2024-08-01T13:44:48.073000
CVE-2023-42878,0,1,5d257e70cffd5eb040ee0fb607130b1e7299ba45d71793ad390ba88b3cfe997d,2024-12-03T17:17:41.227000
CVE-2023-42878,0,0,5d257e70cffd5eb040ee0fb607130b1e7299ba45d71793ad390ba88b3cfe997d,2024-12-03T17:17:41.227000
CVE-2023-42881,0,0,70098e759836313249a706e0cb3a6283e2dcaf1ae77d9c5e80b4ac943c30b13e,2024-01-26T20:50:42.450000
CVE-2023-42882,0,0,d25d8200d86ee6aec5cd25ed7c72a0a44dcf7931e005d38d26518af2e78b4882,2024-02-02T03:10:11.640000
CVE-2023-42883,0,0,034dd058692240ba2f6c465611c8e36bfdac6f60d9f46a4108296185e978baa7,2024-06-12T10:15:26.310000
@ -232963,20 +232963,20 @@ CVE-2023-42935,0,0,59f1893c4921fd426d37a2853de577c0f93471971948ece90123be426c829
CVE-2023-42936,0,0,c18fe081f1c567d172866792cd7e269db74a129e365dc1e3a0f755df59e92d66,2024-08-27T19:35:06.893000
CVE-2023-42937,0,0,2548bd23d42243683fdde68d9d74c6694ce8fbfe2bf0789c6beda4910f3fe439,2024-01-29T18:33:19.387000
CVE-2023-42938,0,0,d25e9dc245eebb79595e4f006d6b9857b227133a3f844fb3d6037315be9ae599,2024-08-26T15:35:02.077000
CVE-2023-42939,0,0,0ce71ea134fae56f84234486eae9cf0279fa4b51651ae0082aafa52d86a864ad,2024-02-22T19:07:27.197000
CVE-2023-42939,0,1,e616f5469a9d7bb93c6568524cd0da091acc5847091d9c388ddeadcb2cb5d967,2024-12-03T20:42:07.280000
CVE-2023-4294,0,0,38ff20ab6e7f39daf98662734eba5d7abaeaa55eac46be3d5953e77ce63f803c,2023-11-07T04:22:25.913000
CVE-2023-42940,0,0,d1747dccf9be170d7d2459f45012020f08d4eb5ce17698d439f59de70dd43655,2024-01-04T14:56:32.530000
CVE-2023-42941,0,0,07ef4c50d699b2c4d697e69c7eba84c968b3abecdc0454485729209830f2d05b,2024-01-16T23:54:14.273000
CVE-2023-42942,0,0,5f3d335907b121452b79893baeef6c48d60a98bb67df4e841c089c4a7d2bce1f,2024-08-27T16:35:01.703000
CVE-2023-42942,0,1,3274b98a531cd08d74304340509fb78bde32a21b5cbacb575666b356fbaa6330,2024-12-03T20:40:10.397000
CVE-2023-42943,0,0,8790183efd35acc800e913b3464e91f8a65e51f27e9353b2a98f8ccb4e333257,2024-08-12T15:44:12.630000
CVE-2023-42945,0,0,ded1b5c2e0337280b23c4c9aa988849a090fc35ab214c2519d212d959fafba41,2024-08-22T14:35:01.547000
CVE-2023-42946,0,0,c16d53e4640dbc64c39b6f25df218a8a3b9a148c4165025754da6efc5c7966d5,2024-11-07T15:35:06.643000
CVE-2023-42945,0,1,200d2323886607812ee6e5544cc7dd3d7a9d9cd1bbcf9fd4feec9eae73a4bb8a,2024-12-03T20:37:44.587000
CVE-2023-42946,0,1,2f891640e91a360138828eb608ca23096bc37ddebdc3147d949a745dda2c8d29,2024-12-03T20:29:31.657000
CVE-2023-42947,0,0,463a7c288ca72ceb5a42872b2d94a5ff7e5b5024cc13eee6b8c843ca1541a18d,2024-04-08T22:47:21.010000
CVE-2023-42948,0,0,e60e6a270a4159f47177637c1f0213b5b06987cbaccbf7c2b067805f6ba007e7,2024-08-12T15:43:25.587000
CVE-2023-42949,0,0,4ba4d25f4f34dd7299f1ae8679a2668afa3ca4ced4c250397b32835ae7ad7953,2024-08-12T15:41:16.120000
CVE-2023-4295,0,0,ec334b74dcc01539baa3eed8300f24e0d43c22b250be6de255e7d71ca4f97cb4,2023-12-28T17:14:36.030000
CVE-2023-42950,0,0,f1d5850b892570a96c5f59ef6bdf8fbbd22dba2618afa507113cc84e9d5cfb6a,2024-08-09T16:35:02.990000
CVE-2023-42951,0,0,c2b592fed93cc7243fa114a25d8214ba89f9d461bc5878ad805c49747c286a09,2024-11-08T17:35:11.143000
CVE-2023-42951,0,1,121a5c0c1d17502bed7317173a1705a78522289256ce9a61da10683dfe7402d1,2024-12-03T20:26:23.957000
CVE-2023-42952,0,0,ac8164a1e95a71f3635337c8d1e1e316d92bbb5ce2c711d62963ba080fa32811,2024-02-22T19:07:27.197000
CVE-2023-42953,0,0,c3b7092a84e4c9cf27e3a04a908a1a891d4da828332a56e4b0bb35d9d921787e,2024-11-07T16:35:10.020000
CVE-2023-42954,0,0,f45971a666787f6e4609a5b8ff1e50e22211581a6c5afdc32f83d4251ddb5301,2024-08-27T20:35:05.607000
@ -237519,7 +237519,7 @@ CVE-2023-49555,0,0,72d812e66246bcb91c6bc002ee3e0548aca407affd9f421b1d887900feb43
CVE-2023-49556,0,0,e966a694d12f1b446adec965c98a4bbdb838e62158c656f71ca2df3c91bb7f74,2024-01-09T16:59:09.227000
CVE-2023-49557,0,0,ab68f52439ca05cc867009cb9a90004fd7e0b396245ba38404fad7ee34dff116,2024-01-09T16:52:22.033000
CVE-2023-49558,0,0,0292793c2dbd787c41d2db53bda3a2a5f7afe4fb78f6bd238bd58976374722a4,2024-01-09T16:49:04.153000
CVE-2023-49559,0,0,dcd39cb8510f02bef2dc47c7edbffbdde40d7a526a78797dba29c8b12dd3d987,2024-06-13T18:36:09.010000
CVE-2023-49559,0,1,c02603e188bc3a0923b448b626bdc5315d4d54d2e42179dbe4f4a8ce296ed722,2024-12-03T20:15:14.317000
CVE-2023-4956,0,0,48c602c337af88c084951e3a2c1195ec950bd27715d3d7ebaae450cd36e9d61e,2023-12-13T08:15:51.330000
CVE-2023-49563,0,0,ff22013e5f4db324eaab0d188c730f9fdc3fd3f56c58b042f2dd5573911172a8,2023-12-14T18:30:37.733000
CVE-2023-49566,0,0,5d41a2822babeb9ec619211692e91f45235cebac1ffc90794234a82a955c5d4a,2024-07-16T18:06:05.347000
@ -238394,7 +238394,7 @@ CVE-2023-50947,0,0,30db9a61d0011f2ecf85fca8fcf7ec32cb3c8d3758342a75df3436e5b526f
CVE-2023-50948,0,0,bdb8dfe61e6bb5c0ead710e7634822087e4ba9d4a8aa3d0b38f1d70ff1d5b025,2024-01-11T17:00:50.077000
CVE-2023-50949,0,0,b5f44f6e20174821ef9521b996e8772c222b0c86e038fa496a122146fa429903,2024-04-12T12:44:04.930000
CVE-2023-50950,0,0,44d9f6fce0df4c0cb249dd6910d6c5f827d41fa95ee4793fa82fc6cd0bdbd2d4,2024-01-24T19:42:29.450000
CVE-2023-50951,0,0,f6602a94bee5ac370ebd327ee71099d1d7184ed6e0d0e6b8d7894abc3d65ab08,2024-02-20T19:50:53.960000
CVE-2023-50951,0,1,a54c39bbb984c66865707c18f40ef4caa534f821d04266c5357c454be96bbb3d,2024-12-03T20:28:43.647000
CVE-2023-50952,0,0,a42bfb9eb2ec7c3f0ba7edf0dc6ed3e721be6a8d276393fcea326ad1cdea6eda,2024-07-31T19:34:52.883000
CVE-2023-50953,0,0,52036d7752aac445cbb090aea392f5f16e3dcdb55ed4b88e406bc96e30a1871f,2024-07-31T19:13:21.947000
CVE-2023-50954,0,0,baece4f5dc11741de457ffc101bd64213e3d518cabc43705ad07eb4c82b73f9e,2024-08-21T14:02:11.833000
@ -239364,7 +239364,7 @@ CVE-2023-52341,0,0,752ec91f49f7d27aa4aefb97c1028c0e3ba02b8dbe8f5ef4e4a5be61da661
CVE-2023-52342,0,0,d9217e8a43616eb93ae5900a69930974b98e947284e3031e63af0d98b4863568,2024-08-26T14:35:02.157000
CVE-2023-52343,0,0,72f06a8afa822a3024d5a446620d24cff01d97ee834295104d1b734aa9f75e3e,2024-11-04T17:35:08.043000
CVE-2023-52344,0,0,2746ce7294f9dd645e743c241e219d96848cd26c1bbf2a1d45c502d1d5d069c5,2024-11-08T22:35:05.047000
CVE-2023-52345,0,1,a60bc116f4901082dea5e8bcacc413c82b3427a572478b12fbcd48cf42f44a18,2024-12-03T17:15:08.390000
CVE-2023-52345,0,0,a60bc116f4901082dea5e8bcacc413c82b3427a572478b12fbcd48cf42f44a18,2024-12-03T17:15:08.390000
CVE-2023-52346,0,0,abf5870e70e4c81d560fa222012a9514676bbea91379a04e47b0bfe7513e6621,2024-11-04T18:35:03.567000
CVE-2023-52347,0,0,0de571f6617802f0c8b8163db0698d0cafc861c67facc0349aa475f789167481,2024-11-01T15:35:05.800000
CVE-2023-52348,0,0,a78f5b9171ee88d03834f0039162b0633f8a198afe00aea2be4a4f4c2fbe83ff,2024-11-19T22:35:02.473000
@ -239751,7 +239751,7 @@ CVE-2023-52723,0,0,2fe194d004e97af726d85431e007c3326f52eff7c20e279a9c12c4d1b3f28
CVE-2023-52724,0,0,95120cda4ac6bd6031f2e2daebb9e5bbb1d44f3ad800bed01c5a520101567ca4,2024-04-30T13:11:16.690000
CVE-2023-52725,0,0,6c8006c6d070845e944a8779fc3ce3ac7e3893f3aa940aa4f5f18ea13a44ba8c,2024-07-03T01:43:50.417000
CVE-2023-52726,0,0,461e65a6795b13b587912cbbcf2691811a9fedc1284b87ef3001955692c77f7d,2024-07-03T01:43:51.233000
CVE-2023-52727,0,0,6e3f9aa52d20e07183a574bf38e951e6604d10504a6e62357a35f6fcf7902554,2024-04-30T13:11:16.690000
CVE-2023-52727,0,1,a99f786c16c90dfbbafabd50802fabf0de8a61b92c16ea1eb9d66eb802587002,2024-12-03T19:15:07.950000
CVE-2023-52728,0,0,a17f4a262cb474a8f70d7fbfb223259404df4ad19a24c3998d51961fd9af38d7,2024-11-19T23:35:00.713000
CVE-2023-52729,0,0,da51c6481fa4113baece0670394823278ef1d5e497f2483e288777e6e700a4a5,2024-08-05T18:35:03.380000
CVE-2023-5273,0,0,8971c3afc6d4f23e6938d06c8be51237957f11eabc2d94de850619c69fc9fc53,2024-05-17T02:32:57.223000
@ -241742,7 +241742,7 @@ CVE-2023-7250,0,0,d2697716e6fb6d3106b6b6ee93de27e1a2aa1cee868a8468ee5a044250f131
CVE-2023-7251,0,0,dd7a7df27ce68aab327ba0baa92251358ec7e4d2777ca1ea9021ce7d40f54021,2024-03-26T12:55:05.010000
CVE-2023-7252,0,0,8ef70acf856173de65ceb7ed47edeac099389585dbd7416236a9f38d3052e70c,2024-11-22T15:15:04.990000
CVE-2023-7253,0,0,4436e6df0abbc2be66c875c1a3b7421386cfdc4e7cfd00a94031f9b2a2d0783b,2024-07-03T01:44:30.193000
CVE-2023-7255,1,1,ba841318b17f99e3bcf2d19d42ab9b2ed81cdd4957ab41c4052c7c67ad67adff,2024-12-03T18:15:12.743000
CVE-2023-7255,0,0,ba841318b17f99e3bcf2d19d42ab9b2ed81cdd4957ab41c4052c7c67ad67adff,2024-12-03T18:15:12.743000
CVE-2023-7256,0,0,4d31b5d621cc269e867da095170b22428e07c2ba7854722005d4b162e4ce2ea1,2024-09-19T17:53:15.207000
CVE-2023-7258,0,0,743a17302c5d0deefce3c9c18515bc1a780c1d3e967dd943e69bc9c091c417e4,2024-05-15T18:35:11.453000
CVE-2023-7259,0,0,4927c73cd38943cc915f51b0766c09a76100affe33b1049612344f19331c1f96,2024-08-02T09:15:55.730000
@ -243505,7 +243505,7 @@ CVE-2024-11159,0,0,40c853846b1f5260f445d8196c4d1f6aec01e81777411e7a4839d765e27bf
CVE-2024-1116,0,0,4196b5c71a0d802f4c1e9b3a43ac71c958f929e96b26e1ebb01241c6bd176fa3,2024-05-17T02:35:14.983000
CVE-2024-11160,0,0,c2a00c83ebfc94083c99410ffbf76862f5cddeb9d6f2530e0ed9a430c75b3087,2024-11-27T18:15:08.620000
CVE-2024-11165,0,0,95fe2b7c203ba5cc9c6e4fb2522e665475ea40e75b68e18a56b9dddf3a00ff2f,2024-11-14T16:35:05.493000
CVE-2024-11168,0,0,5e610ba56b770f0c45b8e5f1da8a18409af80ecc6fd32d397017d56ba5ace8ac,2024-11-13T17:01:16.850000
CVE-2024-11168,0,1,df73a38cf98fe872a11a7ae5d2776746809ac77d7eb7c9299d0fbd3c2e9cf30e,2024-12-03T21:15:05.470000
CVE-2024-1117,0,0,0eff4d8f06fdd3645727772834638be79e19128758cbe94b2a8e7a297167b8d0,2024-05-17T02:35:15.090000
CVE-2024-11175,0,0,a70e7384355b41e57dbae42f60548787ddcd5e64369094201d6e3104c030e304,2024-11-15T22:50:48.817000
CVE-2024-11176,0,0,43e0b836ac427f00f128c5bd48d6743fd191b6efbf5ad7ecd847f5f279d2ce59,2024-11-20T09:15:04.447000
@ -243909,12 +243909,12 @@ CVE-2024-11963,0,0,1b768f13ae7432af87819b66e9c88a81e009e2b704744a659aae219fb06ce
CVE-2024-11964,0,0,f94c574717c50c0184dd47517b1de305bfceb467090489bd5e62aaac299102a8,2024-11-28T17:15:18.500000
CVE-2024-11965,0,0,31af601734e720f7b4898a226ec470eb7b7893d1e57135a43f25ca10822bcc63,2024-11-28T17:15:19.383000
CVE-2024-11966,0,0,5e055161cfb759b43cc69778fc343f8b37e119ddc14d9d9b1e0ff4c55e38b235,2024-11-28T18:15:07.547000
CVE-2024-11967,0,0,12f18dfc45eb819820254e66461b73c23a82321abe05a31382bf89c4ef0ee0ba,2024-11-28T18:15:07.780000
CVE-2024-11968,0,0,da1eb41fd3caaae1d6edfd3659687335ef8ca5c9c6a02406ba4c7be157fe3497,2024-11-28T18:15:07.980000
CVE-2024-11967,0,1,179e3dd97123c4b8b3faa14a32f95da586545a8fae36dd420cfa9023f4b058ee,2024-12-03T20:20:04.177000
CVE-2024-11968,0,1,4c8e45962195e3bc30ba3ade6a5593c14f2e51bb9212137724bade4969c57980,2024-12-03T20:12:14.177000
CVE-2024-11969,0,0,328ae06406886fb66d7ac1b2c34b1818381f0d888a340c497ddc215ced06af80,2024-11-28T16:15:07.190000
CVE-2024-1197,0,0,eee502956c194e641ee01f282e886cb95c42c3ca82a247ebe6baa4a7059b14c0,2024-05-17T02:35:18.363000
CVE-2024-11970,0,0,1a849bf68450bf6823e4c6c28effecbfa7f1d9d228ab32bedb6122aff4f177bb,2024-12-02T14:48:39.960000
CVE-2024-11971,0,0,38215aae1affbb1fe3b0b911c5ff0552bf6ce1619ab76a58fad7d4415b59c88a,2024-11-28T22:15:15.090000
CVE-2024-11971,0,1,3a422b96c75e64944718f4261ea83fbe383ac9a8c822f0cea915713588b2fd46,2024-12-03T20:04:46.493000
CVE-2024-11978,0,0,82a503c1ccc829c5aa4edddd9a1368db8d8d07e5bd911457d7693a4c582d1965,2024-11-29T03:15:14.700000
CVE-2024-11979,0,0,a7d9158b13addb102e25d626e75f83d1385a44201d3dac6e49beea06afd7775f,2024-11-29T03:15:15.653000
CVE-2024-1198,0,0,06e092565c8e3af84c6ebb124845a11ab67d22d2e78b0a86a63d538f0638ff52,2024-05-17T02:35:18.467000
@ -243940,6 +243940,7 @@ CVE-2024-1202,0,0,6132da5e9762048f130f38f4ec670738f94221153725a0b95c9666bf5c59cb
CVE-2024-1203,0,0,b776394b4b874eaeeae3e5b604198862b49ad905e4e26e755c608f17ba381dab,2024-03-13T18:16:18.563000
CVE-2024-1204,0,0,227dcadf8be17e7ba46954487209fff721db299a9b29c34d65c82dfa9a2b5cb2,2024-07-03T01:45:05.337000
CVE-2024-1205,0,0,0a0d23d8cab3c22e48da3af802fa5d4730efda2f1ae3f246ab487b1969fd7c36,2024-03-20T13:00:16.367000
CVE-2024-12053,1,1,2b398607da9e0d35894a5dae028909ee96e509eaf1448f83891a86a3497d90af,2024-12-03T20:15:14.513000
CVE-2024-1206,0,0,5f77d40826619ff076a6ee2348b6f5023dd16e0c591d0d5d735c076214b8b61d,2024-02-29T13:49:29.390000
CVE-2024-12062,0,0,053134064f0b6efbb78d94709d74965493fd7936bfcf08f9a9a8ec7d826131fc,2024-12-03T10:15:05.493000
CVE-2024-1207,0,0,dcc484c1fca006f292c23965347128c235a983932753c8f043310e93d42eeea4,2024-02-15T02:05:42.313000
@ -245277,16 +245278,16 @@ CVE-2024-20764,0,0,aaf6aea1cfc81c17e2ef82d097347523784d6c37fa8e664f1fa9ad6c605a3
CVE-2024-20765,0,0,ad91982b1363103e7d071a542448be4f43c1d446a44c46149dd1d5563e96bd7d,2024-02-29T18:06:42.010000
CVE-2024-20766,0,0,898b775b089dd9caddb4b4690630a4034df5907c7b03a6ac372c91b73b803f73,2024-04-10T19:49:51.183000
CVE-2024-20767,0,0,e44fe1f40a168c1d580708d22170c7101344fa827a777107ab7c62d60385df35,2024-03-18T12:38:25.490000
CVE-2024-20768,0,0,1e3e9e9553fe22dc3d69b454622eff7f4f96055b91832944849f7b2ee61961b0,2024-12-03T14:25:50.643000
CVE-2024-20768,0,1,fca9dcc18fdb5e923a7d5ffae471944f30c53e8970448c3d9b0c0d1182566ccc,2024-12-03T21:46:08.623000
CVE-2024-20769,0,0,4c236b05669b68ca5ce041ed8b26b6adfc2e0cb9e4a3ee0955957eb96f78ccb6,2024-06-14T19:30:30.037000
CVE-2024-2077,0,0,e7bd6e3d8e34c4ba57719bf938fdc690e0425d907fa9aeaa848477a4c8d06182,2024-05-17T02:38:02.460000
CVE-2024-20770,0,0,2220817887bead81dba660b5070a9bfc8174373fc0e12fc00c386ef0f159eda4,2024-04-10T19:49:51.183000
CVE-2024-20771,0,0,8a01399cb8521b5aca859010ad7618c854f0ca880963c5cf7f625b81f5f7e387,2024-04-11T12:47:44.137000
CVE-2024-20772,0,0,0595740a6eaf79276b6566faf58cddbacedcbdb42883617ae6f1fbf05ec92018,2024-04-10T19:49:51.183000
CVE-2024-20778,0,0,d8b0a955fe95d7528cc9225c2ba8c99c06ab0fae004443be64cd533fa34dc48a,2024-04-10T13:23:38.787000
CVE-2024-20779,0,0,c0142fa66e837583428e7b8ef2ba80afae24c58e25a1149ad2bc658acf7f0872,2024-04-10T13:23:38.787000
CVE-2024-20778,0,1,ff0325b925cb52cb989cf8c7c41190d57642e73ce4423016f8a454a3042e872d,2024-12-03T22:21:38.357000
CVE-2024-20779,0,1,13c70af693a01da502cbe2a0eab32d0d39e9953765af33985baf7dd03d5d7482,2024-12-03T22:21:48.793000
CVE-2024-2078,0,0,95d50b0faa2bb79eb927804f750375a6eb355124e82816799090199109d7ea11,2024-03-01T14:04:04.827000
CVE-2024-20780,0,0,63d2009124b332e78b1d536f1b7fe39d5959ba91df376872c85edf10add70c5f,2024-04-10T13:23:38.787000
CVE-2024-20780,0,1,da9c3255aa1191e665338d2a9d79091a0bc865300aefaac1776dcfbe3906dce3,2024-12-03T22:22:05.807000
CVE-2024-20781,0,0,3ccc8172d5caf5f12275c7e0786ecc3a5145ee77013caf3fe6a53bcd77e15421,2024-08-02T20:13:42.440000
CVE-2024-20782,0,0,591198da9de59648b78059d67fcba2ae1e63c8a4ae642e9b553df4f8e697eefb,2024-08-02T20:16:00.143000
CVE-2024-20783,0,0,ef4c6477d397b423923703c7f26adf752529466272be0c0857be9467ab24edc8,2024-08-02T20:17:12.873000
@ -245513,7 +245514,7 @@ CVE-2024-20991,0,0,94f0f80e95be2725620dad0c6e5443bdd60acc699a66c91ac7c7279a95dd6
CVE-2024-20992,0,0,ba9800046b8543eaf32ebe0bf6ac96b488e69f6b7913a7d831a97ae919200443,2024-11-27T16:36:46.510000
CVE-2024-20993,0,0,73f1669c85e855fd76979fe84f382e192647648d4f8a2bb0d0085df2877b0bcc,2024-11-27T16:36:44.187000
CVE-2024-20994,0,0,5f7ea9f92d561392870426b5d74a9dfb47bcd28f9445b3d46750647497195eed,2024-11-27T16:36:42.223000
CVE-2024-20995,0,1,1f9174ba030143632481498c826781249624a95457bca2e98610d80b4844c6dc,2024-12-03T17:15:08.597000
CVE-2024-20995,0,0,1f9174ba030143632481498c826781249624a95457bca2e98610d80b4844c6dc,2024-12-03T17:15:08.597000
CVE-2024-20996,0,0,fcd2292738608c647a4c519832797e84b76f4989a7b5a3e0a96bd0b4bdb3583b,2024-10-17T17:09:42.857000
CVE-2024-20997,0,0,6fcb219b09789009a115af413ffc8003378371105f5ae76f21264248e97d7ed9,2024-11-27T16:36:39.907000
CVE-2024-20998,0,0,45f0642541da0d531c6249ccae4fbcc371dd659326bb9c94a1fffbd680edd27d,2024-07-03T01:46:21.563000
@ -245553,7 +245554,7 @@ CVE-2024-21029,0,0,beed54640564c6e877b911608d3aaede78a6c68fba401ae9c1d7333ce2ffd
CVE-2024-2103,0,0,56728262bbb9eac431f64527baa684f066aa452f31fabe1cfef087df0e0cc830,2024-04-04T16:33:06.610000
CVE-2024-21030,0,0,8784ba0a3755df5b21c90fc1a3d06189077ff55e4dd10202c7d6a2ef21eadb3a,2024-07-03T01:46:23.853000
CVE-2024-21031,0,0,47da12e0a06b82feddde80c8f657eef9ceaa2d7cc969db6255ee7d3fcecb3433,2024-04-19T17:31:50.307000
CVE-2024-21032,0,0,224558dfd07c20308a2bd3552df334b44095a07933d7e9c8bab2ef75b9656e34,2024-11-27T16:31:02.343000
CVE-2024-21032,0,1,2a06eeb4063fbea3927653977fef89bb076a869017643b8a3a2540926b05688c,2024-12-03T19:15:08.570000
CVE-2024-21033,0,0,7bc19cb64c3ae24134dd79d7bbfe9e0ed0d38b98c77be70dc6f288f7e389d27e,2024-11-27T16:30:57.530000
CVE-2024-21034,0,0,b808ea180848747041b7aaaca886e2cee0af839a6638ebb2b8a0217712acb5a2,2024-11-27T16:30:46.090000
CVE-2024-21035,0,0,cfe330df5a88be696e5b022b2535ceaaa50fa26e99e7cc5299822d6e604c17b0,2024-11-27T16:30:11.690000
@ -245565,7 +245566,7 @@ CVE-2024-21040,0,0,9207f1539b8715e9de73bf8605d282f9258ecbde4b6b5af37d49fb9b9b73b
CVE-2024-21041,0,0,53175e4f9f6fe9a06cdb65415f15e9860a5cc1810804215df4199c035c4956b1,2024-10-31T16:35:04.810000
CVE-2024-21042,0,0,2413adf0e19ccd06809883f767218c53f86aa92469ced2e7e97fa65ebb6fc34b,2024-11-27T16:29:25.637000
CVE-2024-21043,0,0,34b86fb6bc70d1cb3f2e8b52f242178af3e3c87a06302294640b6969cd919425,2024-11-06T19:35:09.460000
CVE-2024-21044,0,1,3f45eec1e46b6a448e745da4861f2365c447de08b700b7dafe3a57ef6b615700,2024-12-03T17:15:08.787000
CVE-2024-21044,0,0,3f45eec1e46b6a448e745da4861f2365c447de08b700b7dafe3a57ef6b615700,2024-12-03T17:15:08.787000
CVE-2024-21045,0,0,918bd035aa1d6211c105c0b035415fa2c831f7eef3679326aa8e323c6a0fd5ac,2024-11-27T16:29:07.300000
CVE-2024-21046,0,0,6cd7417a9fe1dad42e5e390bd73f6c59f847ce1b22a979e6a850a74e46589580,2024-11-05T16:35:11.803000
CVE-2024-21047,0,0,2bc5d014697923ab8f9837dde11c202b28c9635338e1429d1d2707b2d34f9717,2024-04-26T09:15:10.500000
@ -245573,7 +245574,7 @@ CVE-2024-21048,0,0,0740c7f75430ed630e47ca8538d7654b46da3ebd0ee4b5951500b7c74c4ef
CVE-2024-21049,0,0,9616fde59f011de26fa6ba50e58cd40851be8c65128168cf773f9d94db5d91a8,2024-04-26T09:15:10.567000
CVE-2024-21050,0,0,d94cb733af7c54a4d84e619579d9bde9e102985653759b366a435d84928a9534,2024-04-26T09:15:10.637000
CVE-2024-21051,0,0,5b5b38f20f94692fbee206c4d08ceb1d0f4cd57a972ab2287f632f08a22a09ba,2024-04-26T09:15:10.703000
CVE-2024-21052,0,1,e3949841d9fa67edbdcab968c6ac42d301424c98f18703ad9fe9bea56c30002d,2024-12-03T17:15:08.950000
CVE-2024-21052,0,0,e3949841d9fa67edbdcab968c6ac42d301424c98f18703ad9fe9bea56c30002d,2024-12-03T17:15:08.950000
CVE-2024-21053,0,0,7fef0dc012419ed4a2e2c8a891096cd3e5ba1da6901d2a12026f2e7f8894c29a,2024-07-03T01:46:26.233000
CVE-2024-21054,0,0,835b9f20e0e5a67456e3f5d7374f40411fa327258971531851fde9f6c745e99a,2024-07-03T01:46:26.957000
CVE-2024-21055,0,0,7b97a238a9f2f8011d73871f0eaf7f4e90106b5fbf1015a4a4e573715a21c1d0,2024-04-26T09:15:10.953000
@ -245585,9 +245586,9 @@ CVE-2024-2106,0,0,213f924b1030e277957ab3251c0a5e0aaf21bb221bf06ebf6920975bdeafa5
CVE-2024-21060,0,0,5dad82251c69460b0dcc342dbc8fe5f30ffd6435784fefca48a78f953ddd6047,2024-10-31T16:35:05.517000
CVE-2024-21061,0,0,acce4a5f468dca01931c32e50c6611a1e683c3d9c025ec493bafb29e16c7fe5f,2024-04-26T09:15:11.143000
CVE-2024-21062,0,0,f52b903674b0da400a3e3849ca455d776135add7df0354d62dc29d89b7440bac,2024-04-26T09:15:11.213000
CVE-2024-21063,0,1,e23f0197e67d00ef65622e3d434aaacac50777a28da39c1b420993e471f6a1a1,2024-12-03T17:15:09.103000
CVE-2024-21063,0,0,e23f0197e67d00ef65622e3d434aaacac50777a28da39c1b420993e471f6a1a1,2024-12-03T17:15:09.103000
CVE-2024-21064,0,0,5b2971adc59d71b4aaa5c906c9a4f9e6fc91222b1a769debcd275580759920af,2024-07-03T01:46:28.883000
CVE-2024-21065,0,0,1c4717813b1a034170a9d85c7f01f49a9a6817cd44eb3976adb8d53a84de595b,2024-04-17T12:48:31.863000
CVE-2024-21065,0,1,531e06a2890a673e9797a31981c044156cb67f03dd1975a6ce161799ca849b63,2024-12-03T19:15:08.777000
CVE-2024-21066,0,0,7da8187d584810bae1a6bae2212c93de6863858adc6479117a4e458e0f55fedc,2024-11-01T15:35:08.567000
CVE-2024-21067,0,0,3c1db72abc041e4cd640c75884818bbbf8c687caa8093bb33878c33da44b6b4d,2024-08-15T15:35:02.413000
CVE-2024-21068,0,0,5397ed6276bc380474002ef2f826d2dbb33ae28ef93eb95352209ca8f93abe8f,2024-04-26T09:15:11.273000
@ -245704,7 +245705,7 @@ CVE-2024-21170,0,0,af70aab138e0b6f00f1af224e9aedbd73a234a8cfd2b7ba1d7eec319bf92e
CVE-2024-21171,0,0,2fd05d07a23e14dbd131721fe68544117ce9a854c5a28a6e860a4826c9defab4,2024-09-12T20:42:17.600000
CVE-2024-21172,0,0,34605c01b861f523beae8f34a8a5378aeef5fdbde4809ce2491bb573bf414892,2024-10-21T12:59:49.070000
CVE-2024-21173,0,0,0a12cbbd305217530b1df35b14cfdef98657ded6769d894b09583b79eff2a588,2024-10-17T16:39:26.610000
CVE-2024-21174,0,0,ba6844261aa04c1ce6ded1964dc44516b30559a14a2b47a862fad5fb6e961d86,2024-07-17T13:34:20.520000
CVE-2024-21174,0,1,3aedc4aa4a685a673eda6d373d2980d41a58f103654e9e3fbf1a83af6fe80b33,2024-12-03T20:15:14.673000
CVE-2024-21175,0,0,cb2af54db467d6cb3910a785f432573ba67f0e2903d99aac799349b33385087b,2024-07-19T13:35:41.107000
CVE-2024-21176,0,0,b022e0a78bfd810ce5799e801c017257ad85014c0240c82465310ca387f77de2,2024-07-19T13:35:56.727000
CVE-2024-21177,0,0,dd286b1fc1e65591b4712392d48877586e2af8d98747ab5b6ceffcb0635a5b54,2024-07-19T13:36:47.267000
@ -246722,7 +246723,7 @@ CVE-2024-22333,0,0,2aea130a34348f78dfbf003fc187c19aae24d1eb68c0b3938ae198b41308d
CVE-2024-22334,0,0,1951698d7ab1d55a1824ae76507a3577dbbe6facddaaf9272bcefe471309fc13,2024-04-15T13:15:51.577000
CVE-2024-22335,0,0,a452659277dfc0c00bbebf3f7fdbdbc10eb5e3a4586e5ce33a7b718b3f3008c7,2024-02-20T19:50:53.960000
CVE-2024-22336,0,0,34ed66b8b7f583d44759ce52a251db14fa1a95596195a1c1fd9558e86e073ccc,2024-02-20T19:50:53.960000
CVE-2024-22337,0,0,76ce26f7a52ed749358f865f3c6811f01f9a0e719e913e60a1e3dce5a9698e51,2024-02-20T19:50:53.960000
CVE-2024-22337,0,1,1de618a6f28c5fec8fafb6e061eacd56c2db85c65e6102701c7028659734cb3b,2024-12-03T20:37:33.563000
CVE-2024-22338,0,0,e8c119fcc7813a5f8ad34d4aef250cb976af5de302a14bd8a4dc81c7298c7a15,2024-05-31T13:01:46.727000
CVE-2024-22339,0,0,ff71ed4a9397c8cae779b6390f5a620529a660975b4982f9683fc670797ea640,2024-04-15T13:15:31.997000
CVE-2024-2234,0,0,27f5f37b33daca2ec1fe8c2ff22db2eb02885beed0da54584837757cda834bae,2024-07-08T14:18:12.157000
@ -246947,7 +246948,7 @@ CVE-2024-22722,0,0,2ec00a5c8e46809886d975f9e62c1646ed03ce66e913f1360753f43119db0
CVE-2024-22723,0,0,5e0104614f79979231b68cb0938b4f8c78660f8d758e8dd4467e139288dfbdc1,2024-08-01T13:47:01.343000
CVE-2024-22724,0,0,933dc01fb2520f6f9ab9fa4754177aa8d3c42e94e77de3e74dc91468db49f71f,2024-08-06T15:35:08.610000
CVE-2024-22725,0,0,5fa379724d5fca6a5a451858a4ba6ac34ebc02b0c57c2f76559d231c12c113c5,2024-01-30T20:42:46.143000
CVE-2024-22727,0,1,bc17139817b54dbe557343f06cbe3841eb840d2294a7055da210550585fddca2,2024-12-03T17:15:09.237000
CVE-2024-22727,0,0,bc17139817b54dbe557343f06cbe3841eb840d2294a7055da210550585fddca2,2024-12-03T17:15:09.237000
CVE-2024-22729,0,0,768bb63a8e628d1d5ad8c32ce479e7ef65e430464c818e272a86590502c0053a,2024-02-01T15:15:34.173000
CVE-2024-2273,0,0,0a70a78279025f010830c200ec41c70db1b0b3c6a90f640b7fd5d17983a65e86,2024-05-02T18:00:37.360000
CVE-2024-22733,0,0,e9298877351c5016bba78c319c5e21268788f845a90e3f71cf40d2a02eaa557d,2024-11-05T21:35:05.440000
@ -248058,7 +248059,7 @@ CVE-2024-24409,0,0,dd8ff08f29b98b9528fdb2ee83855d6758a702d939ff7172a903f50f60717
CVE-2024-2441,0,0,748a7ac4d6ed599dc743b338d434f4fac66b4e81d9dc4afe98a976de37bf668f,2024-05-14T16:13:02.773000
CVE-2024-2442,0,0,da6587851d777a7caecc3fd36ba9b67242261a5b34dedee058c0f959b1280fc4,2024-03-20T13:00:16.367000
CVE-2024-24425,0,0,d53ddd215aa141fbc2d2ed66224530fe50b469290961d3787f25d193fdaa18f0,2024-11-19T17:35:09.450000
CVE-2024-24426,0,1,1ba202c66d22ec01d9165c4229044ba2d8de45fa575e097063ba053bd7d0b3a7,2024-12-03T17:15:09.400000
CVE-2024-24426,0,0,1ba202c66d22ec01d9165c4229044ba2d8de45fa575e097063ba053bd7d0b3a7,2024-12-03T17:15:09.400000
CVE-2024-2443,0,0,a8bbe87eac8a41399b1d0d3a72e714355872c34062df72f2bddd7214646f509e,2024-03-21T12:58:51.093000
CVE-2024-24431,0,0,df56f81b7c3a1e35add47673987ba3302b83c2d47d8419bd59e79e036d2e2abd,2024-12-03T16:15:21.187000
CVE-2024-2444,0,0,4077967648b87af230c120a80abe8a1c3709647ab561500ac246716e12815b1b,2024-08-08T21:35:09.480000
@ -248480,9 +248481,9 @@ CVE-2024-25009,0,0,7a49371ecff66a731dba9be39b6c36a2872e7617aa621569c85562cb428fb
CVE-2024-2501,0,0,6ce26352b8e14756a33573972eeb4c8a06096eee07ab0fb0ebb1c9238a943b1a,2024-04-10T13:23:38.787000
CVE-2024-25015,0,0,4c1212c8f769823bd4e7049fb129f848dc20c143fc1cc72b02abca5f7451e069,2024-05-01T19:50:25.633000
CVE-2024-25016,0,0,0e9311458b59df4142779e7a8b1d9bd170deea1a4bb4a555b03bbf822c263b92,2024-03-04T13:58:23.447000
CVE-2024-25019,1,1,ccd03615e77816bdafa146d2befae76372fb27170bd97657f13091bc7ad8349b,2024-12-03T17:15:09.560000
CVE-2024-25019,0,0,ccd03615e77816bdafa146d2befae76372fb27170bd97657f13091bc7ad8349b,2024-12-03T17:15:09.560000
CVE-2024-2502,0,0,5db5ed3649b395e84b1ef1ea57e3373879dc28bf7136036f8d40e08ab963dda1,2024-08-30T13:00:05.390000
CVE-2024-25020,1,1,cf24905f4ad158f41a91eb05683b9c255c1d72ad13dcabc6630a58b681b00e7e,2024-12-03T18:15:12.997000
CVE-2024-25020,0,0,cf24905f4ad158f41a91eb05683b9c255c1d72ad13dcabc6630a58b681b00e7e,2024-12-03T18:15:12.997000
CVE-2024-25021,0,0,8332f86306f4ceab760e5f5e3a003f3f5c62fd1b6b574c6e3af70a41de71cd64,2024-02-22T19:07:27.197000
CVE-2024-25023,0,0,fc27f892e9b9f8b0dcc06c73130838c8d932f593668ebe29c73cf641f9d3b8b1,2024-09-21T10:15:04.760000
CVE-2024-25024,0,0,292b2d39946afd1b9ad5ee06a8815eeb2737c523e74309496dbedf42f7d2468d,2024-09-21T10:15:05
@ -248492,8 +248493,8 @@ CVE-2024-25029,0,0,73ebd4fbdc79e08bf51bbd35bffc00987416d5257a1f182e37909ac199636
CVE-2024-2503,0,0,69feba8a1ecaa5b47df24cb8640784600105629ed62bcf04c628e0d80623e12e,2024-05-02T18:00:37.360000
CVE-2024-25030,0,0,2fcbb968633b471481b1659cf8f35332f6e433fc3f482d6491bf1056a0790e63,2024-06-10T18:15:27.247000
CVE-2024-25031,0,0,b457525752363b6c80f39091c8baffde9aeb611ca774bb95f18751b6242d3323,2024-08-01T18:17:26.177000
CVE-2024-25035,1,1,208b5ea027dc4e15dc12c3f8dab42b7181ac958e7fdb4cc060ee878d55f9c2cb,2024-12-03T17:15:09.753000
CVE-2024-25036,1,1,353076a13c2a382d383576df3337ff5c9ed04f3d3a33d67e1f273ffb0fbd66fd,2024-12-03T17:15:09.923000
CVE-2024-25035,0,0,208b5ea027dc4e15dc12c3f8dab42b7181ac958e7fdb4cc060ee878d55f9c2cb,2024-12-03T17:15:09.753000
CVE-2024-25036,0,0,353076a13c2a382d383576df3337ff5c9ed04f3d3a33d67e1f273ffb0fbd66fd,2024-12-03T17:15:09.923000
CVE-2024-2504,0,0,bc1b0b8c3c44aa4ad945cfa7dc04f53a01ffea10c9d5aa9c1cc0cc69512decb1,2024-04-10T13:23:38.787000
CVE-2024-25041,0,0,b2ec9f09accd97793f15836559934b612a38386c531a9d4c48a381afddf5bf6c,2024-08-01T18:19:55.627000
CVE-2024-25046,0,0,eae354cb69572eceb000e17cf2bf7402f41e90996afef91ee4f08eb46291d6fe,2024-06-10T18:15:27.350000
@ -249199,8 +249200,8 @@ CVE-2024-26042,0,0,2ea8d4dd55cbe369521d040be468f269c837b84a9eac6286bae77d5ed2d0b
CVE-2024-26043,0,0,9e5ba2d761fb38599a187ece66b844e2c6f6948768589cb3a7e3e27c1f2048ba,2024-12-03T14:34:19.377000
CVE-2024-26044,0,0,66bac57be53c755cbe995e285249cde839b00b7b1d98f8199c1aa466447b6bfc,2024-12-03T14:32:50.367000
CVE-2024-26045,0,0,16de77a5d4b0cf723bbdcff02c0b9e5ead3b5ea66df2c839632d092fd2d31a4d,2024-12-03T14:32:46.117000
CVE-2024-26046,0,0,5c87a28b13d53ec29b89a2b33427517db21012c37c446a313fb6274d8fa5a520,2024-04-10T13:23:38.787000
CVE-2024-26047,0,0,148096905025fd63cbc95f27e9e4e0c5f23280eef70892c2f079c5329b94e086,2024-04-10T13:23:38.787000
CVE-2024-26046,0,1,0c457d57bf34514107ad4779d9492ae9dcfaf8608bbf002a0eb2a27875e5dbf3,2024-12-03T22:22:16.273000
CVE-2024-26047,0,1,2089ca080b8d7f7da347608fa836709dba71527ddf473ac9f04b08d05776f800,2024-12-03T22:22:25.890000
CVE-2024-26049,0,0,a3a34d9b7dae7c572a170c4cf9ad06366559734e7c052afbd0e4cb731a5c408a,2024-08-07T13:15:59.723000
CVE-2024-2605,0,0,349e4409ed80d6811abb3d6a22d4a1c2580eb4cb5b90719226cde56ad4b7d78f,2024-08-28T15:35:21.410000
CVE-2024-26050,0,0,e5e2c4f7b84f8f2f1d1ea8570d5ab87ff02bbfb4edf0f2eb8b892f6b238feba4,2024-12-03T14:32:40.333000
@ -249231,19 +249232,19 @@ CVE-2024-26072,0,0,795aa52dd62646e83ed807713ec96c12320151f66f145549208b2eae946ac
CVE-2024-26073,0,0,ea8b0395170bba4c212a67abb89e06fac33b2f03fd0bce7a8e02833ca1d25823,2024-12-03T16:26:34.260000
CVE-2024-26074,0,0,343c9b4e475dacc17a86a9d8e947e779cc9c9f7a1f2d9d30ddfd0d0411a8d1d6,2024-06-14T19:24:23.860000
CVE-2024-26075,0,0,901da86ca412d659e8a18006b04f83d9794756660ad061f7d2773a1db6038c69,2024-06-14T19:20:39.827000
CVE-2024-26076,0,0,e3d4735c38e5c3c9eb10fc500b9c2e29c498e85efcaf17e85354d76841836419,2024-04-10T13:23:38.787000
CVE-2024-26076,0,1,190cc6cdd9384b96b496e8a902932592c29e678b94eb62d18b3a55e3a36ad71e,2024-12-03T22:22:34.717000
CVE-2024-26077,0,0,11d79deeaf314f3815fc296aaf122c971232c2b7cee0a2ccfd4d162d209c3c46,2024-06-14T19:35:14.353000
CVE-2024-26078,0,0,15c623e5c49ad76f544f4e36e05701d53300618f3be12cff6120b35ce02daf08,2024-06-14T19:35:02.233000
CVE-2024-26079,0,0,7def00d245ca33c0ed073b8deb05bb08843edfe5563d53cff951ac5e526b90ee,2024-04-10T13:23:38.787000
CVE-2024-26079,0,1,1b063ad849193a7a551a28d4ba21923ffd1a62cfc982574c9bf02cdd56365688,2024-12-03T22:22:43.923000
CVE-2024-2608,0,0,034c3f0d69de46d9ba7a73a0532d7d80b727b4c71250c7f2c3749a641f69ef8b,2024-07-03T01:53:22.600000
CVE-2024-26080,0,0,7604d52bd30e88605dff84d8eeb0e9952afe9b0f5abb04468110dd0739ff6514,2024-12-03T16:26:46.317000
CVE-2024-26081,0,0,1d29efd0c7c46f3f7680eb50611ca91569a2766002cfcbb2b36fea018596932d,2024-06-14T19:34:47.583000
CVE-2024-26082,0,0,603b5ee896e39670eda6156999639510b8626e2d981c7d45c9753ffcdefa3124,2024-06-14T19:34:37.370000
CVE-2024-26083,0,0,33df432e039989f8563bd2b33e594330302cc12f6f0d6608747f36d5fb9ed83e,2024-06-14T19:34:23.237000
CVE-2024-26084,0,0,e94535d0fd312a9be7042fbb14b84a6d7bb2ccb531c92c7a19d0d23e47735c24,2024-04-10T13:23:38.787000
CVE-2024-26084,0,1,aae0f2cd3263289226cd7325e6d24bcef199a3ecdbd8ee2f6789513d437e617f,2024-12-03T22:22:54.187000
CVE-2024-26085,0,0,0c838fc652f7bf2f364bd685ad543b490f3fba112e65035ae9409ef1c463528f,2024-06-14T19:34:04.773000
CVE-2024-26086,0,0,ae34cc70c1fb5245418ea1021c46e145477ed2510ed19be388b0597933b584d6,2024-06-17T20:31:51.467000
CVE-2024-26087,0,0,886690623538c9b67d73b3140abb23679c4e72a1155e44ccb96173e256c726c6,2024-04-10T13:23:38.787000
CVE-2024-26087,0,1,5e0cdaaf19519b5625076cadce0769bea3bf4132eff86668ab1b5a0d9dc1c02d,2024-12-03T22:23:31.950000
CVE-2024-26088,0,0,aed72cfe3c05269ae6fa7444f7478df5bb7d6d6fd37a95c7c481f7f0efb015d9,2024-06-14T20:10:01.653000
CVE-2024-26089,0,0,87f38a9968c3e4028ac78d2f547942af5af438b7e5b9b22788cce73b35aca8df,2024-06-17T20:32:03.657000
CVE-2024-2609,0,0,b6301650fec4122c3c02b6e335400036f83dab48aa35b0d865ffd587777c27c3,2024-08-28T15:35:21.617000
@ -249254,8 +249255,8 @@ CVE-2024-26093,0,0,c78f8313d7f9ae22e0b6d6b4b7b4f7ac5cc5c06dc88b21c00914a84215154
CVE-2024-26094,0,0,9d2ed7254ec4f2ba31272bea4c933824296834da359032a69be2b9666b077acd,2024-12-03T16:26:56.900000
CVE-2024-26095,0,0,9f6c7bddb38cd6b8f363ea5c70ef041eaf1840874199b0d4f54fdf8f0f85f9ed,2024-06-14T19:55:53.020000
CVE-2024-26096,0,0,a856d1c0d122ca77743cb2f984b701c53176cb71fb426f8e10c7bfcc9817e80e,2024-12-03T16:27:10.247000
CVE-2024-26097,0,0,cf64c962cadb0fc8f1556505bc07c2350b9f9285ec03ff659cd6a815a0eb0c88,2024-04-10T13:23:38.787000
CVE-2024-26098,0,0,dbbd02b23dacb0109748d3b2fc272a4103fcd271020bb791bb34007edc8f300f,2024-04-10T13:23:38.787000
CVE-2024-26097,0,1,e44c5fd875e79800986ab942065ab88a7bac27025422193c75d8420d1aed8e62,2024-12-03T22:23:43.117000
CVE-2024-26098,0,1,97f417e41d2fe409a4ee69b87b884f59dbeaa5d4f5d0cc0c7ea3085b5464944b,2024-12-03T22:23:53.200000
CVE-2024-2610,0,0,b027d224535ed46303e9cb28e3c541ff296bc0a756671ac358daf18839ba9117,2024-11-06T16:35:15.013000
CVE-2024-26101,0,0,43f2d3fbbb4c4b8f51f15938710fd6d3cc2a2f7ffcb5f068956881a183094b6a,2024-12-03T16:27:19.990000
CVE-2024-26102,0,0,26f73657f4749efd9627e01297796c03b1ed9f54e34743c90b72da281a5393e8,2024-12-03T16:27:31.687000
@ -249273,14 +249274,14 @@ CVE-2024-26115,0,0,d74160aa381f4e1a51a3ec1cd1d03c99e220f3553ea9e0140484bf904ce91
CVE-2024-26116,0,0,abf59a73286b1cf58bc13403a83e9678e0351f50add52bd78b5eb74a78e51a0f,2024-06-14T19:51:03.750000
CVE-2024-26117,0,0,6c431170e13775aecc2297d81c07dfcb615de89aac569ded89309592114bcd11,2024-06-17T20:31:38.117000
CVE-2024-26118,0,0,51eecbb3f408b7b654b7ea484ab79a4be1e6d997e00ed8c27833ae8c7b8b7702,2024-12-03T16:28:58.907000
CVE-2024-26119,0,0,c503d1dbd496f47cfcc05acb78d53a5a1697c7292b96b179a782ba7662c08032,2024-03-18T19:40:00.173000
CVE-2024-26119,0,1,4b9672c4383944698be27ef3681196f885f486afd6d233cd555b9a74ce6885d9,2024-12-03T22:16:51.783000
CVE-2024-2612,0,0,4262bfdf186b50c97c0850391a589444d79ea8f33a25322b9905ef9642e35485,2024-08-12T18:35:36.893000
CVE-2024-26120,0,0,36e5d4f10867ad6f473ee2c131d347d7586e4f8a8ed54d61685777cb84ad6820,2024-03-18T19:40:00.173000
CVE-2024-26120,0,1,43dfe6d4a5bd0c25647885b13659676989d5db62934997c87a611f3edfaa57c6,2024-12-03T22:21:01.987000
CVE-2024-26121,0,0,957890214873564856e47183e155f244aa5acc330278ac5f2dbf5d754578caae,2024-06-14T19:56:28.683000
CVE-2024-26122,0,0,57c13883cf54d7ea5563c7f228cb6b0f720cd74558f1835e1bedf6fd46f326a6,2024-04-10T13:23:38.787000
CVE-2024-26123,0,0,d69a78525ed0b2177c48aba91e4b340a6ed0524f9340b64f380733a723672e11,2024-06-14T19:56:46.423000
CVE-2024-26124,0,0,97133149298ed522b1c3fbdf003183730b397d0b9300590c141c074e9505b3dd,2024-03-18T19:40:00.173000
CVE-2024-26125,0,0,cf1ba28c002bfb0806c2389a06b3a2626e65b5573e7bdd24b50820830a0583ef,2024-03-18T19:40:00.173000
CVE-2024-26124,0,1,05e1b75e023e7f39562e91ba3e10093a02347fcc6413576387c93ee80972eeba,2024-12-03T22:21:14.077000
CVE-2024-26125,0,1,f503cd783f2856196c3c43976be189791e5f167ba0b137ff2d255fa237ac86c1,2024-12-03T22:21:24.047000
CVE-2024-26126,0,0,a44a18a073a69f02ec04f44ffe9515cb0b92fa4e54cde7105c43ba6eea3d84f5,2024-06-20T16:02:57.067000
CVE-2024-26127,0,0,b9d71bd8d7c8687e779fc62c8d4da2b199e98630426fa73ac5fa303dfac123a8,2024-06-20T16:02:47.140000
CVE-2024-26128,0,0,f2a57020e98d0ee07df0edd9be7b798ac36d036800a85dad6f19c3e9d7a8b74a,2024-02-23T02:42:54.547000
@ -250344,7 +250345,7 @@ CVE-2024-2732,0,0,59c41b28a53d51de59243e9e076d0b70e0706e7684df1ed7a61104bd5a3689
CVE-2024-27320,0,0,322204c7c44b6b07c7c5ce2517955a5763bb970c7a635001dc6670202a7c4e27,2024-09-23T13:56:48.353000
CVE-2024-27321,0,0,21ec13da4bc7743b26ab8f16ae210d29125d1180d3f4bbbecb3541886b29f580,2024-09-20T17:06:58.440000
CVE-2024-27322,0,0,b770b9d962cb08865ef72f437565bd0d77dc69db533af805410b12f466305679,2024-06-10T18:15:28.103000
CVE-2024-27323,0,0,38592ea93906fb228845a81866b0a5686932b7d61e75313c319e38db86407877,2024-12-03T16:50:34.657000
CVE-2024-27323,0,1,6c305023feaf03ade31091623ffcdfebff35c3b0cdd2648e0815655a328ef63b,2024-12-03T22:03:36.550000
CVE-2024-27324,0,0,bd68fc610631d765b504e2eb0f9c966837d653f843cbd0dbbbd7151aba723966,2024-04-02T12:50:42.233000
CVE-2024-27325,0,0,91c89b4ca089464e099a6844730ad761f5ea57833c3f8473c9d662fd4df4035a,2024-04-02T12:50:42.233000
CVE-2024-27326,0,0,17ed7eadcf7ccf0f8f633fa32c1b3dd8ae0821c2df09af51de2b083a97bfbfd7,2024-04-02T12:50:42.233000
@ -251345,7 +251346,7 @@ CVE-2024-28825,0,0,2060c8862968982d4a6159b0b62313dec95ecc020293b85f137ce41396383
CVE-2024-28826,0,0,ccabc68ae1502fb496d2010a22f66c953a12ff1a849372d7235937980a01c570,2024-05-29T13:02:09.280000
CVE-2024-28827,0,0,30d6d403e5c79dbab459dc4233554203969c32826737ea25dceb545e947896f1,2024-07-11T13:05:54.930000
CVE-2024-28828,0,0,f569edfaae2cfaafb15d4f5e29614839e3689bfe76be347c8b67efdf6d0be50b,2024-08-07T17:57:38.413000
CVE-2024-28829,0,1,7a55640720947d8ce349cb378455ecd484e6615d62727837b8c36597f79843f6,2024-12-03T17:55:48.257000
CVE-2024-28829,0,0,7a55640720947d8ce349cb378455ecd484e6615d62727837b8c36597f79843f6,2024-12-03T17:55:48.257000
CVE-2024-2883,0,0,4414164b8fa79ba498c6ddbb6ab7a825d3f0a39397b4604f63f00efe5e5aaa16,2024-07-03T01:53:37.420000
CVE-2024-28830,0,0,49bb68528483eea32fe70c10feda0199ddfef50b4330a9b74a5779b200dbf298,2024-06-26T12:44:29.693000
CVE-2024-28831,0,0,8b0cc22b019b2f22717d4926d7f18f8c0f1245da30fda97cee3d4dd670ef131d,2024-06-25T12:24:17.873000
@ -251795,7 +251796,7 @@ CVE-2024-2940,0,0,ff445ca7ce0af843f5f704c8c90659aeb6511c9f210bd6d3afa6e1f01b0df3
CVE-2024-29400,0,0,8f34751d18d63c75601eb947e8c0e3714d1d567d723f8c0dc5c4c493f22e06b6,2024-07-03T01:52:26.027000
CVE-2024-29401,0,0,14e4834e03b78a3df05cd8e04bcdf90a5bfad72c514740bf2fbb87c81dad0d19,2024-08-05T19:35:11.287000
CVE-2024-29402,0,0,7a60de01cd1e1ba7089d18beb6c6236bedaa49309f0015c7a9cb500a08c82ce3,2024-11-07T16:35:15.387000
CVE-2024-29404,1,1,cb9da2d67dd4fa648ee43710d0ed869338276429f02da7377b7a3d981388cc36,2024-12-03T17:15:10.087000
CVE-2024-29404,0,0,cb9da2d67dd4fa648ee43710d0ed869338276429f02da7377b7a3d981388cc36,2024-12-03T17:15:10.087000
CVE-2024-2941,0,0,1d46f1daca1d9b41abf5b871e57cb1a154c8989de86923637267a01c87a2e537,2024-06-26T19:15:13.107000
CVE-2024-29413,0,0,e53aa5e14ae181dd984ec17641b62210a6aaf3e99011fe016e5561f245d20a2f,2024-08-27T20:35:28.013000
CVE-2024-29415,0,0,81703b9c0269e1b460b05361ef90d054c3389b8bf64cccb5dfc5c790069eada7,2024-08-16T14:35:01.260000
@ -252366,7 +252367,7 @@ CVE-2024-30201,0,0,b519279052e3bf480fab70215e80d453e6672590c8aefdb7acb1d4f5f3735
CVE-2024-30202,0,0,ecd5c9b4bd0ebc202276e86a3d9a7e9f6b3bf262206739b2cbd70f27623f88ba,2024-11-14T20:35:23.057000
CVE-2024-30203,0,0,8b447cfaa3c0f29bed1fa430ec69e0ff721af51bf1f0d5669fc03f342b79df4c,2024-11-07T11:35:05.040000
CVE-2024-30204,0,0,4b2af1187ee5f3703025057d51c0997c41fee3382ca411eec613f6ae404cff0c,2024-11-04T17:35:14.370000
CVE-2024-30205,0,1,67fef15cf456a2a8a49b7296d8a6faf968ebb587417f5262a0de46685c1fbb16,2024-12-03T17:15:10.187000
CVE-2024-30205,0,0,67fef15cf456a2a8a49b7296d8a6faf968ebb587417f5262a0de46685c1fbb16,2024-12-03T17:15:10.187000
CVE-2024-30206,0,0,a7d0521ef088000b8f51cc15715463c9e26ba3441057ea1a5875859d791a61b9,2024-06-11T12:15:14.390000
CVE-2024-30207,0,0,93b801e8c0cb837d34644b282b92dd26d7a86790e6531becad283497647bbd2d,2024-06-11T12:15:14.520000
CVE-2024-30208,0,0,57146b9ec8ab54f1968d14f0d8832031fcfdc08d067fc5f7c7e4b7497c1c092e,2024-06-11T12:15:14.623000
@ -252921,7 +252922,7 @@ CVE-2024-30889,0,0,4055363c9710582a93e9c4afde24f53fb76bf450d1c6c8e60ffc2b185aa7e
CVE-2024-3089,0,0,f50243477e19a0c473b8d22e5ff97c5e0852740c2af46b357e2e30b0b527a41c,2024-06-10T19:15:54.210000
CVE-2024-30890,0,0,0f772534d2f25b8992cdb2b7f1614a9b1113da3447c153b6e6f711939289b199,2024-11-04T15:35:31.227000
CVE-2024-30891,0,0,396e17014fd3175e72a9c0a6ece22b5363c9ba81b8e8ea154f79fa53fb440cca,2024-08-19T20:35:15.447000
CVE-2024-30896,0,0,1c2a8f6103b169f4b2e6374c12c4e276b072d21b33e30de613363d5fad056629,2024-11-27T17:15:10.650000
CVE-2024-30896,0,1,0330d890e180a2ac4abf50a1066f9a03357f57b7d30c34d26b5fa3e5eb33ba6b,2024-12-03T21:15:06.437000
CVE-2024-3090,0,0,ca58ae48ece7b5420c70058bc4ef34d34b72713bd9fb9580ab51af080cd6b613,2024-05-17T02:39:43.047000
CVE-2024-3091,0,0,ac47144b8dcc6e68da1982025c8274e4d7559a0b603bbff8eb392c09297cdc97,2024-05-17T02:39:43.130000
CVE-2024-30915,0,0,4a451061f2277273de3f1e30d4e5402fc40c4a77bd4f2be73b5ddc38a083afc5,2024-07-03T01:54:16.067000
@ -253512,7 +253513,7 @@ CVE-2024-31680,0,0,c4628bff4524f4ba02ba3d3e5f2d1afd3e6b045a8d32604fb16cfbf01a187
CVE-2024-31682,0,0,6ad84277376005bde3c5be691a4699ed2a494d2e47836225d1c8ccbe4273b358,2024-10-29T14:35:17.517000
CVE-2024-31684,0,0,a58e80e535316094d398f75f99933a7946ff10472558d364c59331628a9ef154,2024-11-12T18:35:08.927000
CVE-2024-3169,0,0,b6d2ffb09103c8b8a3976e1d11af5d86787ae2ffc33eb4178c248279d95ed274,2024-08-01T13:56:22.240000
CVE-2024-31695,0,1,8fd4a26ea3223cef6079194978b50afaef81942a9f8f26a61510d854c06985ba,2024-12-03T17:15:10.377000
CVE-2024-31695,0,0,8fd4a26ea3223cef6079194978b50afaef81942a9f8f26a61510d854c06985ba,2024-12-03T17:15:10.377000
CVE-2024-3170,0,0,e5d3e527beb338f17b4d7e88e470a76429efa4bde538f57bcfe45fe38f4493ae,2024-08-01T13:56:23.270000
CVE-2024-31705,0,0,360c5213fb2e781c07e5b26068537bfd39f5bcae9363979b2bff285237ce8d8a,2024-08-20T17:35:05.360000
CVE-2024-3171,0,0,7ac04b89850dd4c13fd178af0a23f600897d741bf0b6409f6d9c0faa5fbe4cd3,2024-08-01T13:56:24.363000
@ -254755,7 +254756,7 @@ CVE-2024-33405,0,0,7b64b483e46a97392e43f4b015cd27cd282d4799d58fb8648b12f3802fedd
CVE-2024-33406,0,0,8c679048379d6dc3620065008eeb4a0fa8183be266d695e89da0c2d5e3fa0724,2024-07-03T01:58:05.953000
CVE-2024-33407,0,0,ed4a824fbf1e19bcadf3992da26933b694f424ff133570bc43d44a0c7b3a43a9,2024-07-03T01:58:06.720000
CVE-2024-33408,0,0,9ceb89cbe63e2bffb68e241c8e84ce5036184c141f949951d455a3c14bded742,2024-08-01T20:35:56.170000
CVE-2024-33409,0,0,ffe65aaae5e65bc04175d7ab0fc0b6179a9584a709e9ce972831a579aeaf6f2b,2024-05-28T18:15:09.347000
CVE-2024-33409,0,1,b05df9e2df3c8beccf4df2b5835962321b4d05b5065811a8df05123def68b89e,2024-12-03T20:15:15.107000
CVE-2024-3341,0,0,9b62fc414d0ed9f7dfa79ade6554806c079faf0ad5addf92df0d4598c1259e85,2024-05-02T18:00:37.360000
CVE-2024-33410,0,0,c078c0658ea8ad68f15ffc8e894b976091875813ae0f7dd53ee1a6c6de68b839,2024-07-03T01:58:07.577000
CVE-2024-33411,0,0,d4b6b59aad1a2b98ba2b07a3f292ce85f1ef1e986776fdf66ecd25dfa92d252b,2024-07-03T01:58:08.337000
@ -255947,7 +255948,7 @@ CVE-2024-34928,0,0,06617cab0c322a427612e8f6d6917cd063878ec94ca850683c68470a1a2c8
CVE-2024-34929,0,0,80902861c56fffe184d43b652e5b65da73fb217bc0c681573f8c1d15948cf18e,2024-08-01T13:52:26.657000
CVE-2024-3493,0,0,066f7bdb112b4eb90ab428a4a7b97610f00d49e6eb62b740b5f6b8c5b5b2b054,2024-04-16T13:24:07.103000
CVE-2024-34930,0,0,9fb3b8964b5cccf698fe1af2c09b9ebbf2bbb61e30f2dd6c2b71de12b8d3c46b,2024-07-03T02:00:57.490000
CVE-2024-34931,0,1,7b040e33b160496ad0105f0fa8d11d6c808bf5866885798865a15f0f6269baff,2024-12-03T17:15:10.530000
CVE-2024-34931,0,0,7b040e33b160496ad0105f0fa8d11d6c808bf5866885798865a15f0f6269baff,2024-12-03T17:15:10.530000
CVE-2024-34932,0,0,b3ae27f61253f7767fbdf3438e64ca1eae22c4d23e1e356e0c8ba8ab5232e6bc,2024-11-20T16:35:19.057000
CVE-2024-34933,0,0,c3dbf950f435984b9b33f4f97b61de10305ed6619e3cc02c8a837894fcd24d4d,2024-07-03T02:00:58.450000
CVE-2024-34934,0,0,c952d1ae16fc59b4ad6a305c684ff2ae339875de2313f11687526116a6f6a313,2024-08-20T15:35:13.137000
@ -257221,8 +257222,8 @@ CVE-2024-3660,0,0,c3c1c3312c8a9566bf9feedf7d8876d18d19f4aa50138300852d5ac195117e
CVE-2024-36600,0,0,e7eab002c297c7d5ce5dd570ac3b60c68bd283d5ad8a781f4e7d7381b748121c,2024-07-03T02:03:24.687000
CVE-2024-36604,0,0,ceabd4d65e8e525e1dbe1c2ad39c0fe240ecb352a8c95aa43d6d84024ca2af4a,2024-08-15T19:35:12.673000
CVE-2024-3661,0,0,c42cca3fa75d9e1e2e62908451948484a5d5cca5f29f392158a6d0b59eb829bd,2024-07-01T15:15:17.187000
CVE-2024-36610,0,0,978b382e6d2d7458ef4ee665877d5fa279890848d387de447325b7fb46ba2824,2024-12-02T17:15:11.230000
CVE-2024-36611,0,0,4c2b02528fdd4d9d491867b6131bd05320914a0ba163026a539685333ebc096b,2024-12-03T16:15:22.057000
CVE-2024-36610,0,1,0927c00cb75f9358070097d5ca895695a905274604112058caa92d1332131322,2024-12-03T21:15:06.600000
CVE-2024-36611,0,1,8ae1129d2c6d7f04820dc25a51b35eeb79c0ea9714d3891bb92ee90d865f9805,2024-12-03T21:15:06.783000
CVE-2024-36612,0,0,2e5bae787232529157776124a9b65f7f3416dd8775c93aff3efc637bb8af407f,2024-12-02T17:15:11.420000
CVE-2024-36615,0,0,c3893c90b5581100f420f26ee0ccf784458a2107b295d3c77defc3849a0f0672,2024-12-03T16:15:22.197000
CVE-2024-36616,0,0,296a4798d6d750743bea7f8c9bd5c284519a9999e91edf6d3d9b49bc20d67d94,2024-12-02T18:15:09.857000
@ -257730,8 +257731,8 @@ CVE-2024-37299,0,0,205f0b40a758fdc1dced6d887b5ea436463fde8aa45c00a6907effc08c197
CVE-2024-3730,0,0,f3a19794b78dc38a637f07c4e7db0ac4195dbeda34c530b5cbd488b9ecb411f6,2024-04-25T13:18:02.660000
CVE-2024-37300,0,0,5590a189f2c80a2c0e69ad3b8771a19032b2ef2b4a268875ff14b77477677613,2024-06-13T18:36:09.010000
CVE-2024-37301,0,0,edc8a23be80a0adc425b4edf50a7dcbe1479a99dce59b837847fb08393ce0038,2024-06-13T18:36:09.013000
CVE-2024-37302,1,1,7540ee377e8f914590c5ebfecfc94146b2a3f69fa425b1e7984809f9edde3caa,2024-12-03T17:15:10.733000
CVE-2024-37303,1,1,90c24aadbd635ecc97ef584d134867e31666a91d2272348e915419f7b622df98,2024-12-03T17:15:10.890000
CVE-2024-37302,0,0,7540ee377e8f914590c5ebfecfc94146b2a3f69fa425b1e7984809f9edde3caa,2024-12-03T17:15:10.733000
CVE-2024-37303,0,0,90c24aadbd635ecc97ef584d134867e31666a91d2272348e915419f7b622df98,2024-12-03T17:15:10.890000
CVE-2024-37304,0,0,51ff2c81cd80d88058aa6d3b84ff7bd3ddd43c76d3fb15284419f7add985f2a7,2024-06-13T18:36:09.010000
CVE-2024-37305,0,0,a35a18378d9858479faa1c229d8034f7e9f595e8a830d5cd9cde2fec42c2e7b6,2024-06-20T12:44:22.977000
CVE-2024-37306,0,0,793d4fb76d193c9cde6559e6d4f42e65455e8eb4e61b0bc936eaa6f9b8fbb6c0,2024-06-13T18:35:19.777000
@ -257813,7 +257814,7 @@ CVE-2024-37388,0,0,5e976aadc48a067bfe8b054b3afb65dfc2829bfe1215753abaf5d600b1243
CVE-2024-37389,0,0,27f7927000cd6a2429ab617761c45ffb27c2f3c3199f49f01b1eda02927e348e,2024-07-11T14:48:32.300000
CVE-2024-3739,0,0,ba8b07349fdcbf4927f1d53be7924c0ba58d0f09900d65fe34757229d7b34b0f,2024-05-17T02:40:06.067000
CVE-2024-37391,0,0,e99f92be626b4b841a6b299b2728912f45fefbd409010bfee05135471d62af01,2024-07-31T18:33:47.383000
CVE-2024-37392,0,1,c57b6d8b0609fcac8ed55e1412ac991415047b97cf80e90c77ce6d1c31b26603,2024-12-03T18:15:13.410000
CVE-2024-37392,0,0,c57b6d8b0609fcac8ed55e1412ac991415047b97cf80e90c77ce6d1c31b26603,2024-12-03T18:15:13.410000
CVE-2024-37393,0,0,b93d796f3c4283b87dfd22c20f36a8116f582a381c44650f39c5ea43e6b806f2,2024-07-03T02:04:18.707000
CVE-2024-37397,0,0,7fbcc51c6b175128d4a712387aaad70ff152c7c1c439f81c942699a1e4599add,2024-09-13T16:35:09.630000
CVE-2024-37398,0,0,d014b7eb9a15e5e3eb9081a631750734a91337406ca89540557d8e0fe4675904,2024-11-18T15:23:23.543000
@ -258241,7 +258242,7 @@ CVE-2024-38031,0,0,39791687a86cb00a8c8a9bf6c29b8b333e2d9192614552a4ee24252586df5
CVE-2024-38032,0,0,41be2218ab416d77ec81c0853b207c29f9c64191f96c18dcd3b6e6f7560f90e5,2024-07-11T16:31:16.480000
CVE-2024-38033,0,0,1e81123daf9f99850b1ab7ee785cd263ed2b0b018942e514470897032a30503e,2024-07-11T16:27:21.303000
CVE-2024-38034,0,0,e720c7cb8e085ac1619fbec51b8ca1a9266a96c4740c9831ab3943b092aa8264,2024-07-11T16:26:19.257000
CVE-2024-38036,0,1,ac23c2be19b6c7cd7d2a88bd4672191171c9b11da0e8a168cb5259a112a9c463,2024-12-03T18:15:13.710000
CVE-2024-38036,0,0,ac23c2be19b6c7cd7d2a88bd4672191171c9b11da0e8a168cb5259a112a9c463,2024-12-03T18:15:13.710000
CVE-2024-38037,0,0,6ee6641359a9997141535dc4bf184fc6adae3314eb2141cf63c27cb33bd18eb6,2024-10-15T14:34:22.820000
CVE-2024-38038,0,0,4aa049265d32d6590c37031d06b9ca2e8eb5e0e6a4aadbb4eb6ba3d0d1ecc8b1,2024-10-15T14:33:46.730000
CVE-2024-38039,0,0,e15a0723c4839431a45e7e12b3249cdf72b61c98dd323f1ba61d1cba1e519674,2024-10-15T14:34:00.893000
@ -258662,7 +258663,7 @@ CVE-2024-38492,0,0,c16677aadc081311e0e1e91d0375fcc95bd79bb96f874c00db030ff80ceea
CVE-2024-38493,0,0,cb3521491e17be78f8f991710ce8fad1d8ce8a5b12243c726011b0461d220d77,2024-10-28T00:35:03.650000
CVE-2024-38494,0,0,414fbd6d2851a15a9d78e377321cacdd692320d773acbcbc218c1cbcdf7a31d9,2024-08-01T13:54:53.837000
CVE-2024-38495,0,0,fea4dcb4fc2311116e216f5501bdcce029e8616b236558b22d9cb3670ca9e419,2024-07-16T13:43:58.773000
CVE-2024-38496,0,0,6e423c176a887ed5895ae7351498e6b63c7505283576ed5f43b90da3d939aeaf,2024-07-16T13:43:58.773000
CVE-2024-38496,0,1,01a1900349f3d0adbd135ec854533895da77cbe9c60e719fe6990ff9f4db5d3a,2024-12-03T19:15:09.550000
CVE-2024-3850,0,0,2382357c8e4d6adda4f3540070cc5ea125c45aed93070563af82a0d626955695,2024-06-12T18:12:56.413000
CVE-2024-38501,0,0,107ba9da0def272edbee92f63403371ae902a6026765264509f3ddd58bca6605,2024-08-22T13:34:42.653000
CVE-2024-38502,0,0,b5bdc3f7b1bc56d47ac5d1146c261af04f17a5df43c92f8f1ba3633b24999ec3,2024-08-22T13:35:47.970000
@ -258998,7 +258999,7 @@ CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d
CVE-2024-38856,0,0,cf2c30abb1c3c3e6b03acfa253b7bd98efa464ab76b49fddc2034ce3ce8a3be1,2024-08-28T16:15:58.043000
CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000
CVE-2024-38858,0,0,c2e046d5d75320cc690e509cc93285ebeb3c1c26a8f79c6f003385d5db961fad,2024-09-04T14:39:10.203000
CVE-2024-38859,0,1,d5cd9910194e7ede45677f9f5ea018635b199c144fa350166115cef667345577,2024-12-03T17:47:02.467000
CVE-2024-38859,0,0,d5cd9910194e7ede45677f9f5ea018635b199c144fa350166115cef667345577,2024-12-03T17:47:02.467000
CVE-2024-3886,0,0,637917caac7fdeed5913d854d310583d9de4da2bf7f910a461c6efc8f1bacf15,2024-09-03T18:48:14.927000
CVE-2024-38860,0,0,266a5ea7baf50ab92e42d7685db3a6cf2803dcca1365001a34024abb32b3b89e,2024-09-20T12:30:51.220000
CVE-2024-38861,0,0,c849569e1ce9ba1b5e191f651dac8e0341ee6fab90d6f85280ffa2b71faa4392,2024-09-30T12:46:20.237000
@ -259846,6 +259847,7 @@ CVE-2024-4036,0,0,faef85b8ea4d3772643857800ca53857ac0bd4e8c893e27c61e628dc785263
CVE-2024-4037,0,0,835f7b633520c38dc69c5473ca883b788d7739f8c5278809ab72b10ff3489faf,2024-05-24T13:03:05.093000
CVE-2024-4038,0,0,9199a5f679fdf6d4f05942a1d329990ffc0905f3bf6de7561a7af327688cdab4,2024-05-14T16:11:39.510000
CVE-2024-4039,0,0,b18b8aac4336f296c5655f645710463e48a4544089b8c4c20638e847b5c74634,2024-05-14T16:11:39.510000
CVE-2024-40391,1,1,cbd9b0d424ed91ca3ee4ca4e36de30c2faa4e7dbce8c14db1ebc2cfb4a2106b3,2024-12-03T22:15:04.740000
CVE-2024-40392,0,0,4fca88dff401a8138459da84bc3f01447997dddad0d6609e6db41057956be98a,2024-08-01T13:57:14.083000
CVE-2024-40393,0,0,9b92da21177fe8aa44a5e39548076593e5725a02c42ea3793eafd13d4eb2e51a,2024-08-21T18:13:42.670000
CVE-2024-40394,0,0,6a6373d6840a53222337e137dc03e4cb2a60579893b62069f0f6025fffca56b3,2024-08-01T13:57:15.033000
@ -260022,7 +260024,7 @@ CVE-2024-40681,0,0,fac9532bdd8d5b6d1b1f49e08b67a17d3abcf6f9f6c80d971ff62d66179ab
CVE-2024-40689,0,0,d72047a797aad87fd24dc95664d6dde0e77455bde7da3b63cb978ce1844a86ec,2024-10-19T00:30:36.680000
CVE-2024-4069,0,0,fc5a2986d6746eec6d2dc8871a19fd31bd3dae122b27ac5ac325372fce08edbe,2024-06-04T19:20:29.457000
CVE-2024-40690,0,0,90531c3f5bf2655a59eec8750bd49d0d616cedd303a52fde5af4cabda07abfea,2024-09-10T16:16:41.940000
CVE-2024-40691,1,1,2e5ac0199faaeb30178fb9a2acdbf74096220c2a50c2d4d61fc7469fdb74dac8,2024-12-03T17:15:11.037000
CVE-2024-40691,0,0,2e5ac0199faaeb30178fb9a2acdbf74096220c2a50c2d4d61fc7469fdb74dac8,2024-12-03T17:15:11.037000
CVE-2024-40697,0,0,f856503bb71a9cc35c4f2b21ad4463650d9c9dc59f1e2e3c8f1061ecb691990a,2024-08-22T13:27:20.743000
CVE-2024-4070,0,0,f50441c69b27e00682c793729b411e41b0ab8839510e28fbeccbd72a35bcaeb5,2024-06-04T19:20:29.567000
CVE-2024-40703,0,0,c7bdea52d2b22e205d62154ebbe00df525e8e01e7a4b70c25a797f803fb17c50,2024-09-27T16:49:46.177000
@ -260769,9 +260771,9 @@ CVE-2024-41761,0,0,338c8968760535358ae69eee380114a3e788f32922b0b500d7124a0d4fa3b
CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000
CVE-2024-41773,0,0,73b68ae1e3819b7d1bac9bdaf38a7a90512524d32ae7dfbb950bef5b99d479bb,2024-08-26T18:33:07.997000
CVE-2024-41774,0,0,efcbfdf7ce18fcd97c6ecc860adabe2a80f23f77068d5d032fbe380664ccfbc3,2024-08-24T11:15:05.670000
CVE-2024-41775,1,1,07472990890f284d5d7d4d78df377c400ae7aa9ea4917f4088f45395000c109f,2024-12-03T18:15:13.920000
CVE-2024-41776,1,1,3937221d1e0a64623563f6b85d8691bc0c1223344b4ac4f8b6097668bc311cf1,2024-12-03T18:15:14.107000
CVE-2024-41777,1,1,306ab070d2fe50667d0329bff4f8f62654728064d71a9eb0d792571480a9dd59,2024-12-03T18:15:14.293000
CVE-2024-41775,0,0,07472990890f284d5d7d4d78df377c400ae7aa9ea4917f4088f45395000c109f,2024-12-03T18:15:13.920000
CVE-2024-41776,0,0,3937221d1e0a64623563f6b85d8691bc0c1223344b4ac4f8b6097668bc311cf1,2024-12-03T18:15:14.107000
CVE-2024-41777,0,0,306ab070d2fe50667d0329bff4f8f62654728064d71a9eb0d792571480a9dd59,2024-12-03T18:15:14.293000
CVE-2024-41779,0,0,17ec4f61cef6012531e67f2400115e9e222c01b8977f86a87aaadf93ef6e750f,2024-11-22T12:15:18.987000
CVE-2024-41781,0,0,ac78128c66afd97b943956e29afef1e45303dcc74aa8cf3bf627900637de3972,2024-11-22T12:15:19.193000
CVE-2024-41784,0,0,8c6624e71cb1eed477e47e819c637ab44c35481822d3a957ec1d5eebd3832ab4,2024-11-20T14:35:10.117000
@ -263512,7 +263514,7 @@ CVE-2024-45656,0,0,78d9804910af28b8c176663f88322290c5c713635ecedd69d9bf4321a17d8
CVE-2024-4566,0,0,c4354a4e62a03c97286174a61ad4d2f3843d01589ace1532dbd5a5f84743d16c,2024-05-21T12:37:59.687000
CVE-2024-4567,0,0,55b6508070b71672e22c57660afab28e7ebc1a40a37655965c41825cdc3bc17a,2024-05-14T16:11:39.510000
CVE-2024-45670,0,0,f344d38326cc1ee5115d87c2c3180ef72598459ab3198d147c85e5db126cc391,2024-11-16T00:24:57.203000
CVE-2024-45676,1,1,ba22aedad1da063b2c55d949125827576f26bc6c6e068deba87367ee2d01f60a,2024-12-03T18:15:14.480000
CVE-2024-45676,0,0,ba22aedad1da063b2c55d949125827576f26bc6c6e068deba87367ee2d01f60a,2024-12-03T18:15:14.480000
CVE-2024-45678,0,0,a1fda46a16546e5971e32d47cf6c55c6e5adf9e7e7bc6498d2c3cdc35ca99a2c,2024-09-12T20:07:09.640000
CVE-2024-45679,0,0,b98f85803530a208de6f955471a00fda8462357bfd07c53d204959dc086af47d,2024-09-20T12:30:51.220000
CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec4236,2024-05-07T13:39:32.710000
@ -263561,6 +263563,7 @@ CVE-2024-45752,0,0,c56d2e99daff13fa264a8e02ee453ba88231a536487b9dd847b13fefb0df4
CVE-2024-45754,0,0,27881b9f8c3e60f9d5e35efd217ea03a3a53beb79b5679c0a5048b58d7f60f46,2024-10-15T16:35:07.827000
CVE-2024-45755,0,0,3380a03454f7c2bac1206898ca4fa4184680be886daa8fa0e017d976f6eee31b,2024-11-26T16:15:15.597000
CVE-2024-45756,0,0,c88c00192e21176f6155758efe042517d130d9b657618b8f3b05bd3fe303bdeb,2024-11-25T19:15:10.673000
CVE-2024-45757,1,1,abaebb2ab2610933dd59b786c90bea3af3f91827dc78a78c6a95522fdc00e5ce,2024-12-03T21:15:06.953000
CVE-2024-45758,0,0,e058696ef4ee1e11dde5d7f4a1626a6964f9190aeabab6642796a352a4a3c2cd,2024-09-06T18:35:13.043000
CVE-2024-45759,0,0,38da8e2a6eeb3db9dc524fe42bbfcaf056530b0773e38bc08f83c4079be512a1,2024-11-26T02:10:03.923000
CVE-2024-4576,0,0,d47b5037987d3332638a14c0dba5a2bae073fe818289e35d14fa9c3b2b647939,2024-10-27T22:35:08.450000
@ -263919,6 +263922,7 @@ CVE-2024-46610,0,0,dfd11b66ad880194d4e8759fea756317b6075d327e3519259cd11f18ae0f4
CVE-2024-46612,0,0,a589f709811c7445ac7df28a3a7782b0e1ab03ae28a72339e484d8d02cc7d048,2024-09-26T13:32:02.803000
CVE-2024-46613,0,0,5ea77bcf17f248af3d069df5b88a849aa784044eebc39e95db23c0b984f956be,2024-11-19T21:35:06.937000
CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000
CVE-2024-46625,1,1,e036c2fb3ae85ba95e30ff971b52c755b42dd725f69d5dd7e4b6f064ac659acd,2024-12-03T22:15:04.860000
CVE-2024-46626,0,0,b2dbe1e3c2ee97096cbfddcd538250ce5664f2528c19dd2dc51892ffc471844d,2024-10-04T13:50:43.727000
CVE-2024-46627,0,0,4cc8890cea4e8322a4c476b42c8fefe2b4b66b62a78446cc66eb2d1a373670f4,2024-09-30T12:46:20.237000
CVE-2024-46628,0,0,75b1cdb8791d268c28a8d1c2eb3eabb85cf8645763bd77b2b5fbf5588170833f,2024-10-04T17:18:31.663000
@ -264176,7 +264180,7 @@ CVE-2024-46898,0,0,1121a0227e884e663de945d1f5ee0881d2211aaf4fceffe823ea2d2dc74e4
CVE-2024-4690,0,0,8a659fbde289577b9d47a4e0b198b3a10d973db6b9b3690d157fcfdd9eceabd6,2024-10-21T15:51:10.467000
CVE-2024-46902,0,0,27aaa174bb37d07c97f320c2cd9d7af55f96c8335147ef8fc1c8a8b59f67e5a3,2024-10-25T14:50:23.897000
CVE-2024-46903,0,0,c5646f2eca42dcdf58f6c7cfced2b89da0d0fd3b53651fe38e295ee3b07935b5,2024-11-01T19:35:27.957000
CVE-2024-46905,0,0,61d026d9619c108dab285c18a0cf72d8d80132a58f70faff94aa5509533b9382,2024-12-02T15:15:11.443000
CVE-2024-46905,0,1,c91d8022b40d8ed89db934fe241e50799d39fb19b15c2092d3067ee42632b758,2024-12-03T20:00:17.570000
CVE-2024-46906,0,0,b7342c4add30d58f1a7fc06f53ca3ea14de5f93eb25a93d613be8e7c5aac1102,2024-12-02T15:15:11.633000
CVE-2024-46907,0,0,99a5d98e415fb461a7a64ecd1233b781d36234e513fb2259d5e67154c9356651,2024-12-02T15:15:11.793000
CVE-2024-46908,0,0,d9df5230b86009d0e5d988ab260acc4e7ab8189ce25aa89bbb900b7c4573af2b,2024-12-02T15:15:11.967000
@ -264319,7 +264323,7 @@ CVE-2024-47087,0,0,00c0418dcbaa10bdb3121773be01ff0430232cec071716dead5062981f005
CVE-2024-47088,0,0,5bc4be26850bfb4e3e396fe3f1262b2500b1973a359f7076f289ec4b80ad5479,2024-09-26T19:12:58.083000
CVE-2024-47089,0,0,1aa118929a8fbaed8fa0c3349daa09104fd9f185af346e27a442cf4679169f72,2024-09-26T19:09:44.377000
CVE-2024-4709,0,0,291d83b7a71e23f3ddf2ffe4b4f9de6c9c89e71bab3de54c457add53e92c99e9,2024-05-20T13:00:34.807000
CVE-2024-47094,0,0,86767b2e424b6daf37b9304d27e68d1059d395794405d13173a2cfa9cbab28d2,2024-11-29T10:15:10.657000
CVE-2024-47094,0,1,d24e1f292f7d19d40d32d967d3e72cc931ea886edc80358cb771de69f5f1ca5a,2024-12-03T20:01:52.610000
CVE-2024-47095,0,0,4c36448c484bc2fa6b9b6e1761e7a42a208bcb78aee06cf2f905f47ea2223412,2024-10-10T12:56:30.817000
CVE-2024-4710,0,0,bc3d641a4dcd652350f442cdc80714adde1798c9afb82fb5cdb92bbe3aa27b20,2024-05-21T12:37:59.687000
CVE-2024-4711,0,0,d363465dc42b9acab3c0c0b87ab6c465a5fbabc481e6b69ff97f983a499169d2,2024-07-18T16:32:23.447000
@ -265041,6 +265045,7 @@ CVE-2024-48073,0,0,f808f327cec1eb1c4e50210dd8e768204bbea0c1ec8029cba6324c290353d
CVE-2024-48074,0,0,ad38eed7680db70af45f593399c08c1cb64e93854bc7fa5dd06ea3c6cdff4594,2024-11-08T22:15:20.877000
CVE-2024-48075,0,0,ea51a6e8989069c7238e086ff0e4ee9c35a5a15497aadcf5d7175bb6cb053e9b,2024-11-18T19:35:03.967000
CVE-2024-4808,0,0,9e98599f6886b9041c106d3216212c5c382436edfce35f9a1807d5234e020eab,2024-05-17T02:40:38.870000
CVE-2024-48080,1,1,022593486978c4a92cc6d5e336a9aacc42caea737307856f209006bb44dc2e6f,2024-12-03T19:15:09.947000
CVE-2024-4809,0,0,27fb5be7556d421437500c3c993a8fe2f6b8b07eb589d66da5852c85ddbdadf0,2024-06-04T19:20:50.867000
CVE-2024-48093,0,0,fc3d238317c807ba6077042bfa1b95e52c8e2ef3cfad3047af5ab5b8b4b30b86,2024-11-01T12:57:03.417000
CVE-2024-4810,0,0,67f5293ce6e2b07ebd74483d90aa4bd648288e3b70a7100b0946bf9b81e90029,2024-05-29T08:15:33.960000
@ -266658,11 +266663,11 @@ CVE-2024-50634,0,0,fc2a161c2c755e76311d472b0c0ca48eeb524c368ea8177e76956b97738f2
CVE-2024-50636,0,0,9259433c31993ebe40938d91787166813f575cf05ee55bee0909d57bb7de1829,2024-11-19T19:35:14.833000
CVE-2024-50637,0,0,7cb3fd4c2566fc1d1593156e77d24b90af6dfd042618185e839399543b673bed,2024-11-07T14:15:16.780000
CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000
CVE-2024-50647,0,1,a8132e40e6415680c63502dcfb71c83170a27c8ae17ae2d8709790d4ecaf5c60,2024-12-03T17:15:11.193000
CVE-2024-50648,0,1,cd768dd502a6a41a750f72e8678d74f0fdb7ca88354fa77c670060f1a5a3d16d,2024-12-03T17:15:11.357000
CVE-2024-50649,0,1,75af684ee5c50b16f619d7bbac2db41b70d6b9041e53190a772eac935e0bd425,2024-12-03T17:15:11.520000
CVE-2024-50647,0,0,a8132e40e6415680c63502dcfb71c83170a27c8ae17ae2d8709790d4ecaf5c60,2024-12-03T17:15:11.193000
CVE-2024-50648,0,0,cd768dd502a6a41a750f72e8678d74f0fdb7ca88354fa77c670060f1a5a3d16d,2024-12-03T17:15:11.357000
CVE-2024-50649,0,0,75af684ee5c50b16f619d7bbac2db41b70d6b9041e53190a772eac935e0bd425,2024-12-03T17:15:11.520000
CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000
CVE-2024-50650,0,1,51e56b1d34ec223623aa5ce32045a557a25d3bd1c5a91fb1d138ae1327c6b06e,2024-12-03T17:15:11.683000
CVE-2024-50650,0,0,51e56b1d34ec223623aa5ce32045a557a25d3bd1c5a91fb1d138ae1327c6b06e,2024-12-03T17:15:11.683000
CVE-2024-50651,0,0,011c4281624dacbc96bb39ed41c7067acfaaf24f648047c3bd252399725a9be8,2024-11-27T21:15:07.573000
CVE-2024-50652,0,0,c46d900b0ec3c3d3dc69c000a8af48eff0cdc2a83f00bffa34618c3851a639e9,2024-11-18T17:11:56.587000
CVE-2024-50653,0,0,351b2ae0bb07d369ff4e76cbcc39f43676534cf729c0eb11791224a2ac34f76b,2024-11-20T15:36:20.257000
@ -266677,7 +266682,7 @@ CVE-2024-50672,0,0,85b0d6db9be373a6fa69359f08bb412793e42f226dea70f6b5078fe3734ab
CVE-2024-5069,0,0,9472ccb93cc67e368452ccbd7690fcdac2e9c6bf3a0a4c1febdda7b23dc05b96,2024-06-04T19:20:58.080000
CVE-2024-5071,0,0,1e84a840bf7fe6d05a333c61daff03721e2399762594abd260e8b415b74d49eb,2024-10-28T21:35:22.430000
CVE-2024-5072,0,0,85aed93503872c17702aba727bb062c3ccc667233546a70047ce6a70e5d2f498,2024-11-19T22:35:11.960000
CVE-2024-50724,0,1,6e4d1b405e7d4d8af96a4ce9056390bb6e194678013e22ab1b6431ba706461bd,2024-12-03T17:15:11.820000
CVE-2024-50724,0,0,6e4d1b405e7d4d8af96a4ce9056390bb6e194678013e22ab1b6431ba706461bd,2024-12-03T17:15:11.820000
CVE-2024-5073,0,0,84e84c9e85d38ba2ba8fcac94cd632adf73ebd62caf103a5afc104149a6ce671,2024-05-30T13:15:41.297000
CVE-2024-5074,0,0,323ff3e4be9a1a01795a645c087210e0124e3c1100808fef1bff4cc986dff48b,2024-08-01T13:59:39.780000
CVE-2024-5075,0,0,3a68f5400be3fd65933ca2b54d2fe1b2cd42ebfc5586417b08ab71b3ebef46c2,2024-08-01T13:59:39.960000
@ -266737,6 +266742,7 @@ CVE-2024-5092,0,0,00bc3fe74171cc3f61d986dd5d1b43711757ac5d30e24bab5f84b663495133
CVE-2024-5093,0,0,13d2e709dd3e7be8048d02a6012bbed004823bd119b45510128e77bb922bb163,2024-06-04T19:20:58.343000
CVE-2024-5094,0,0,a6da916325cb7c5c0cbf108ef5f048d7004d52e417cf8850e363484a9b36d59d,2024-06-04T19:20:58.470000
CVE-2024-50942,0,0,204950dd3d65127a6e64f67cbe6c2f94576ed783d99742deba5414ec8440fade,2024-11-26T21:15:07.470000
CVE-2024-50948,1,1,9bf83261dbf826c53c1f276a04e06af617475a17b2328241309f3983b9190769,2024-12-03T19:15:10.580000
CVE-2024-5095,0,0,1588c0abfc34bbd50f97e7721e8e7ba42bb279c7cb42725ee04b715e36b1b7b7,2024-06-04T19:20:58.577000
CVE-2024-50955,0,0,8157390cc8753ab3c3dc03f615378f98ac2c1983a215bd6243bc7dc27b80318c,2024-11-15T13:58:08.913000
CVE-2024-50956,0,0,12124e11e67fab80bf49da8101d4c3d956d958942d16765a9a0238618204ee2c,2024-11-25T20:15:09.383000
@ -266823,6 +266829,7 @@ CVE-2024-51093,0,0,0a822b4a1682e56f2eda76ec69439d08f6dec6cb34fd3d39887c26822f96e
CVE-2024-51094,0,0,6e1bb443fcc9dcc5d5db36766451d0d2ba593ec78aa445a2bc9aaa283a01b5d7,2024-11-19T17:35:14.493000
CVE-2024-5110,0,0,97ec9134be0ff29c231012cbb3632c9becbf0944f1a706861520a2aec58057e2,2024-05-20T13:00:04.957000
CVE-2024-5111,0,0,1e1510502a884c6f23b18cee848205aa75aeed3171cb87569d39e4078bf9232b,2024-06-04T19:20:59.907000
CVE-2024-51114,1,1,ad61961ba7b7da73674bcdd21affb7c799d69973bcec89fc9b90bbc5a98641f7,2024-12-03T20:15:15.360000
CVE-2024-51115,0,0,141fdcdabaf7c1ec8339c92338cf4045ebea4dbb9cb424f39276d597a3da7892,2024-11-06T18:17:17.287000
CVE-2024-51116,0,0,628a52b9257b50cdd3ccc07e8442fee438bd4b142b1a9d47d166ffcd98ae2965,2024-11-06T18:17:17.287000
CVE-2024-5112,0,0,689c76c95598a2f86ee6cadbc1c25854cf35ada5e2d2725de4638c44d7f73797,2024-06-04T19:21:00.007000
@ -266842,7 +266849,7 @@ CVE-2024-51157,0,0,113cde3c71891d82bf55f2d0b4674fdfc6000fe1838706cb74a6d985959d7
CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000
CVE-2024-51162,0,0,659179ac55d508d31c34cd8742c699a4dc94023e77b3f77dfac64c460e25f9e9,2024-11-22T17:15:09.353000
CVE-2024-51163,0,0,909afcfaa554939e2c78d7e7af80c5c6961aa7c27e1f5cf118fbed2c52564f74,2024-11-27T18:15:17.760000
CVE-2024-51164,0,1,0c621a3e87a6b805f06b17b773059d9ce7e6f4ff79284caa4397b3c188a41c46,2024-12-03T17:15:11.970000
CVE-2024-51164,0,0,0c621a3e87a6b805f06b17b773059d9ce7e6f4ff79284caa4397b3c188a41c46,2024-12-03T17:15:11.970000
CVE-2024-5117,0,0,8f71e5dda3348556d6b06143dcd47b79229dad0468d30aa7c38f8c5c1ecb8524,2024-06-04T19:21:00.547000
CVE-2024-51179,0,0,1ac36b7f8ecbb6442c3e82b8bfc190a784ef1fdb6227f3a1da3d4126f204bf98,2024-11-13T20:35:10.303000
CVE-2024-5118,0,0,ede24973ef1505b96fcd3c614d177bf90baaafde820cda4461fa6280b3c2b455,2024-05-20T13:00:04.957000
@ -266907,11 +266914,12 @@ CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c
CVE-2024-51358,0,0,15a6b357b2a15ba2efd09a7258436a688d09605b686100927239b26110c73a5e,2024-11-07T20:35:14.957000
CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000
CVE-2024-51362,0,0,a6e1a40cf5e527208990e8a764ceb58cfefd7f1b5e4a2c9e1905064ef69946f2,2024-11-06T20:35:35.750000
CVE-2024-51363,1,1,1a718dc87e73de14ce88ee568b473ff8c6c86948d120e61d443ba463ad9363f5,2024-12-03T22:15:05.013000
CVE-2024-51364,0,0,14b2dee82d01d7389bab3881eda1c802d61b28380989b485af4049ffc6cb6a67,2024-11-27T21:15:07.797000
CVE-2024-51367,0,0,321834f3c68e231d48212ed0455e22a6133cdcee14f287745838cf2ad31fdf76,2024-11-27T17:15:13.207000
CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000
CVE-2024-51377,0,0,cf00c0a6e7d0ac48895095961c732d7f23ec2a7e49679df67603156d82aefffb,2024-11-14T23:23:52.997000
CVE-2024-51378,0,0,25041eea06e8de15fb868a226604237e266234c162cafb1c59832cc50427a9bb,2024-11-01T12:57:03.417000
CVE-2024-51378,0,1,2fc4fb18f85014556482fb0a3b592153adf2fc1c323319341ddbcbf96ed2ad74,2024-12-03T19:15:10.807000
CVE-2024-51379,0,0,2ac9e22a4ada4c046a62bb7cfce4898a690b6639726f7e96ec64275e3571bb6f,2024-11-06T18:17:17.287000
CVE-2024-5138,0,0,47c03094386326d2315f3415dc7d3ef94b00cbe65c94e42ace003fc1a8714791,2024-09-06T20:35:18.950000
CVE-2024-51380,0,0,f14cbfd3bfbc558498abdac43f5bd2dd3434adc287319fdcc829b18876bf6370,2024-11-06T18:17:17.287000
@ -267203,6 +267211,9 @@ CVE-2024-51764,0,0,a8a73eac784e4da58b2f9eaba960b7acf037c234db182f16ecf517da51faa
CVE-2024-51765,0,0,eee0e3d0a6a166a804fde51a14de5a755c3faab7d2dd1fef179f6d93df02c33c,2024-11-19T17:35:16.103000
CVE-2024-51766,0,0,4904195ccf003ff2a4e40cb35a984f0e7233e777165800dbb1a6cf0ca066526a,2024-11-22T12:15:19.697000
CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000
CVE-2024-51771,1,1,58e1c7dcb7a2aae9c7fd769b065dcc02ca8929b9609551afc7cd409a6a5943b4,2024-12-03T22:15:05.180000
CVE-2024-51772,1,1,703d7a4b9e079b29ab9bb8b36260fec09b94a25fa57e36c16470ed6abcb9b8b8,2024-12-03T22:15:05.310000
CVE-2024-51773,1,1,5e2d8caf1f5b3db622fc4649cadf1fa4a1980c269aa4c2a5f708af400a759a95,2024-12-03T22:15:05.440000
CVE-2024-51774,0,0,669a599ada079f107ff827e67143f083d374e9861d23daa36ef167763e62d529,2024-11-06T17:35:41.767000
CVE-2024-51776,0,0,5ca2c4eb522419754c0be1183c799032dcc5ffdbcb2b4aea116b020281ac6eec,2024-11-12T13:56:24.513000
CVE-2024-51778,0,0,cc75b3182d817e23b6259e8bea41efa67ff795e094696a3ef400f4547e1ce14a,2024-11-12T13:56:24.513000
@ -267686,11 +267697,11 @@ CVE-2024-52531,0,0,4a9a627b31c610f608576c39893b61b41c0efeb9f9d97b523937261d20004
CVE-2024-52532,0,0,82ab4898c82b79d45f58347a35d13014aa77e1fd942e3edcc771ee91b2c6c3ad,2024-11-12T19:35:16.970000
CVE-2024-52533,0,0,586390a868afdd1378ad560eae2002ee4f7e9b9edb1cd1a36b6cd6c49ba102a3,2024-11-23T21:15:15.090000
CVE-2024-5254,0,0,78882d871be0a19bc95888168cf12372f503de77ac359f287536c8f062c38532,2024-07-19T15:32:05.560000
CVE-2024-52544,1,1,5a53565160e1063004f0c127eaf6ac40d72cf320f922da3bf32efa9d52ac2252,2024-12-03T18:15:15.327000
CVE-2024-52545,1,1,256b559498f8d83c8aee5a385d829f73d16105296a9f31506feb36d04fbb3f13,2024-12-03T18:15:15.543000
CVE-2024-52546,1,1,9dac37e30df5646bd612d864767ab0de309bc6d3f480e59fe22e9eb483142676,2024-12-03T18:15:15.710000
CVE-2024-52547,1,1,65d15fe4046ff20946693d0c0c0f998b9be4860bbb57d9efc8d6356c8e05fae4,2024-12-03T18:15:15.860000
CVE-2024-52548,1,1,12379df36a9342eca7a92528323b279eb4a40deddd1fc96bfe4d53c029091310,2024-12-03T18:15:16.023000
CVE-2024-52544,0,1,dc4f2bf9ed92fd5a9a3d26c46def7b10fe91ddfaad84031aa1a9b721cb5f1e3d,2024-12-03T21:15:07.390000
CVE-2024-52545,0,1,f159917a3165decd746abc05c415f20d4b4f8722e3e1ee2a30ac7f07512f801f,2024-12-03T21:15:07.490000
CVE-2024-52546,0,1,eb4fe17e63cd8128bfe1d6a03e7bfdd2bc4a90d6f57e4e2cbe0ecf3f12b100fd,2024-12-03T21:15:07.593000
CVE-2024-52547,0,1,59230f31accd91e7d256860548577b7831c2ac44853a7e02b39415ec4fd031e1,2024-12-03T21:15:07.707000
CVE-2024-52548,0,1,9c43e843c5d5758bbbe4f1b613e10e939c7bfbd1edf0746acf49aab3914b4da1,2024-12-03T22:15:05.567000
CVE-2024-52549,0,0,fd75f7ddf331713d4d68d280968ebe1a7937bdcd0767d23dbc768a0c6cf66c13,2024-11-15T14:00:09.720000
CVE-2024-5255,0,0,a9d47c22e8985fc8d8b40f4bef3272595484bdbc8485e44830cb58ee997ab90f,2024-07-19T15:32:18.850000
CVE-2024-52550,0,0,d8f06959647c1a8a773b0bb8df4d1605e4b27f79e88378297551535794b69575,2024-11-26T15:15:34.650000
@ -267784,14 +267795,14 @@ CVE-2024-52800,0,0,33614182cc9b4d3349a9904c03846eec72212dbb8490ca45f9ad64e956176
CVE-2024-52801,0,0,d525f21f1148c8de036d0ddf88b67ee0013549964accf061ff9bd87a44f68775,2024-11-29T19:15:08.890000
CVE-2024-52802,0,0,ff357ae423b4185f6e8528f29c93636cc2249c9e015517449516a4f8158b5ed5,2024-11-22T16:15:34.283000
CVE-2024-52804,0,0,8f245cf45089b95fdaaac467eb0e4e1eb7afae864da129b7e5bc629b398d8ade,2024-11-22T16:15:34.417000
CVE-2024-52805,1,1,2c180cb2569a25ba3c710e2429c5941010e859787110cb1a06546b4e6370c033,2024-12-03T17:15:12.120000
CVE-2024-52805,0,0,2c180cb2569a25ba3c710e2429c5941010e859787110cb1a06546b4e6370c033,2024-12-03T17:15:12.120000
CVE-2024-52806,0,0,1e66f4db39d971971749d7820312b694e65f24529172d67dfa753beb583671a4,2024-12-02T17:15:12.580000
CVE-2024-52809,0,0,989c6fa478d553e2d01696ef3757f80543cb54fc9b37563f1acf5b5911de0279,2024-11-29T19:15:09.030000
CVE-2024-5281,0,0,d8e0f0c592f3cfcf36fc66f961b905d6afba3d53af3789e65e13042755c0a3cb,2024-08-01T13:59:43.367000
CVE-2024-52810,0,0,72dcf4c0c2683dd3fe0322cd1ee30a3ed4e5f334c6c81826d75b9f5c61e14c8f,2024-11-29T19:15:09.163000
CVE-2024-52811,0,0,d732a17bde6f16ede8be31f96ee410aad0e3e114ed23b65cb7e34c8157552b5c,2024-11-25T19:15:11.567000
CVE-2024-52814,0,0,05155b182462de438f0b1b6215658fb7f90ef7f2af8e5a0e3c447f1976037015,2024-11-22T16:15:34.553000
CVE-2024-52815,1,1,f9e6346133e60160d82630df539be5043ab29ccdc85090b3f37dd4cb982def52,2024-12-03T17:15:12.267000
CVE-2024-52815,0,0,f9e6346133e60160d82630df539be5043ab29ccdc85090b3f37dd4cb982def52,2024-12-03T17:15:12.267000
CVE-2024-5282,0,0,d02e51c4b0ee276cbc37162ff12b0d5f63d5cb6622dea90c00e2302f02b5f264,2024-08-01T13:59:43.553000
CVE-2024-5283,0,0,b38d3b6d84c245f47c02c6b1221c64126cc1590c1b6b303a3d39721ab1dfca67,2024-08-01T13:59:43.747000
CVE-2024-5284,0,0,a632d154686ad4201398091156d5b5851cc181b1b36b426c7e50520edad6a7e5,2024-08-01T13:59:43.927000
@ -267862,9 +267873,9 @@ CVE-2024-53055,0,0,64d47de78956af83c8954c5c916fde48522bbfc7b3bfd5262643a9953893d
CVE-2024-53056,0,0,e719d74b600631d7a9085c4602d6da5effc3426015a00b0c180b7f70be1e1cf9,2024-11-22T17:55:51.830000
CVE-2024-53057,0,0,2eeaab0609dacbf8f1bc946fe6618acbd41734def9c62090a729afb87a369511,2024-11-22T17:55:23.840000
CVE-2024-53058,0,0,326cfcf8beba7a28c1e8681d3c8f4dd3f2f54ab8671845fef16e904edd28f7d8,2024-11-22T17:53:32.500000
CVE-2024-53059,0,0,ef43062eebbc97b7be798e9dac3adb53f105cb91d128df8fa7480291f8fa3731,2024-11-19T21:56:45.533000
CVE-2024-53059,0,1,8de9209182f62b1c8cde1232ceb4dd684e6406c51ee4bf910cb88c16872e7f77,2024-12-03T20:57:20.747000
CVE-2024-5306,0,0,d647292a2595d4b4621658b069669f43be59c7629ba28057e1c1f9a15fcc4dc0,2024-08-23T15:01:42.337000
CVE-2024-53060,0,0,9edce4ea64c8ed0c6f895af1f7aab9177b8d8496130e5db39451a322e84bc351,2024-12-02T08:15:08.027000
CVE-2024-53060,0,1,74149c196c1f12bc509412b9719ff439b70d14439885b53f5abe3e06b85b5596,2024-12-03T20:49:04.903000
CVE-2024-53061,0,0,6d963c9bfc1997e983bc399b63ec90861ae1669db79161a0b8424ee0f8527697,2024-11-22T17:51:45.817000
CVE-2024-53062,0,0,e32700c33557358d5784d1ebd21f16a8e87aef87b2e2617962aff7be3c5d737b,2024-11-22T17:47:43.337000
CVE-2024-53063,0,0,d21047234dabc0b4048c3b7c4fc2410307e450c87dc8013e953beb70e76e78cf,2024-11-25T21:08:23.697000
@ -267964,7 +267975,7 @@ CVE-2024-5336,0,0,2f884d9a8acdce925dfd5f3bbb7e4d857b44070abc5058c1ed58328cd41865
CVE-2024-53364,0,0,708f3ece40bf0bf488cd6ba77ae8795762f91e489b51a867d515c5116d6de69d,2024-12-02T20:15:07.487000
CVE-2024-53365,0,0,f94a22f04b10f25f8afa0eb1104a56f755f11fa91566b703eeea9947dc95908c,2024-11-26T20:15:33.650000
CVE-2024-5337,0,0,2b5f97595978a274de9cc82ffbb4e0a657c957408faf59676ddd95606d164a93,2024-06-04T19:21:05.063000
CVE-2024-53375,0,0,b686c16d5a9d9c6ff7ab59ef7e382bb1fb40c729bbe54dddf6d66315c37d5e8b,2024-12-02T22:15:10.507000
CVE-2024-53375,0,1,1b39905c92293c6ad986ecba417e6ce2d1fe3622164937a40688772f31f7a77b,2024-12-03T20:15:15.820000
CVE-2024-5338,0,0,a30664650e5151e5bf507d4d1b27e8e105537061b8462474ea4f7add61cf4b05,2024-06-04T19:21:05.170000
CVE-2024-5339,0,0,f1bbd379636cfad5e34ec0ced69571115fae96e9b2078934f8d5d54e609ed8df,2024-06-04T19:21:05.273000
CVE-2024-5340,0,0,546c56f2649b42bddc6aa9959f384e4ae23101ba059a7107ea7eadf7da74c09f,2024-06-04T19:21:05.373000
@ -267985,6 +267996,7 @@ CVE-2024-5348,0,0,bc3d8d1f3668d1fc879553d2a82a62e6b9980757b64bfd9f1d5fdacf853f73
CVE-2024-53484,0,0,c9442618db175b392539d76a1a9674a888dcbfcc13582e8461a2dd3982136eb4,2024-12-03T16:15:23.980000
CVE-2024-5349,0,0,095035450c60a13c08898917421d5656b2399179b1253e40806dcf47c3a4d9f7,2024-07-03T15:44:23.807000
CVE-2024-5350,0,0,8440f1aab6c7debe55a047353772f60d1de30f1b1b7f7fc13c3946381d3b4f12,2024-05-28T12:39:42.673000
CVE-2024-53502,1,1,ebb24c880a01f111412445fba5c7dab38de38afac7e158b369022d22a1846bbf,2024-12-03T22:15:05.683000
CVE-2024-53504,0,0,0cf1059548643389b1e33bad68f218b18235298c923b702dcc5a0c676fd86048,2024-12-02T17:15:13.047000
CVE-2024-53505,0,0,429565da56ff3abdf2d5572d186f8d39966f1f694a5c9ddaefd7405363575dd7,2024-12-02T17:15:13.257000
CVE-2024-53506,0,0,9dfa3208f902ab3513f3502d8928ce98e8eedec2f27ad06842644780d149d8db,2024-12-02T17:15:13.497000
@ -267998,7 +268010,7 @@ CVE-2024-53554,0,0,438643a55aaa35b78f1b23aac2881a01cc4a8024d9a2bdae2137a7b9fa7a8
CVE-2024-53555,0,0,174e17d1628af05aaf3f22807e86abd0dc7a03bf1129ef93abe75153c9a01a07,2024-11-26T21:15:08.560000
CVE-2024-53556,0,0,6925ef5b3d50b82f5e08a24f19e7ff4e448493177d9879ad27f5ac4d6f2f0b97,2024-11-27T17:15:14.917000
CVE-2024-5356,0,0,85f64e8ba0cebff8187202ea327ca3c906742c5e7d2301ba82b2780a509234eb,2024-06-04T19:21:05.977000
CVE-2024-53564,0,0,7d70e5f55e37762a76b108e6a64b73672727dd5c5512814b5c83672ff9b30cce,2024-12-03T15:15:11.373000
CVE-2024-53564,0,1,ee44fd6febf6e3201f87a735b43a7379c65a5b9126e3a8a7c6cc777fa4406be3,2024-12-03T21:15:07.807000
CVE-2024-53566,0,0,dbff5ecbfdcc9c433f6a2fc9ea0927173d5445ca6c33bb6be0347daffda46700,2024-12-02T18:15:11.500000
CVE-2024-5357,0,0,3e42587e7af2230be214dc062d75c1c832a73aeee43ae2fc11277198b34ad5c7,2024-06-07T20:15:12.387000
CVE-2024-5358,0,0,fdd72871ebf6d62b075a63baf142931fcf44d230f54a18747bfadc4ddcff1dbe,2024-06-04T19:21:06.077000
@ -268021,6 +268033,7 @@ CVE-2024-5364,0,0,96afe929167b2de1681dda607a064227a5b629af3adb1987caaf0917b62b92
CVE-2024-5365,0,0,4b68a39efcc7d1fdd266d085800e02f841a36aae12ede01463956a125c285501,2024-06-04T19:21:06.587000
CVE-2024-5366,0,0,ebdb50e85f32d3970264d5045d82ce95c8965c12926ca2c779990bb15b24ffc0,2024-06-04T19:21:06.690000
CVE-2024-5367,0,0,e1fb712fa137b32c2cb97597a93996bde7ebc629cee38f14d6c04ed9e1154407,2024-06-04T19:21:06.783000
CVE-2024-53672,1,1,6d3fdada6b3ab91d641b2928f61fe9c334e2d4e70404775528bd633b7420d1ae,2024-12-03T21:15:07.990000
CVE-2024-53673,0,0,661b6e58e03fb62c2aa1ecc993b2257004bc984a0c70a3930af9e7eaf463bd3b,2024-11-27T16:15:14.783000
CVE-2024-53674,0,0,8a5c79f209c5cbb54f78c6e00b940dec235442e0d5729a2a400739bbcabd981c,2024-11-26T22:15:18.713000
CVE-2024-53675,0,0,01989df42cc3673d2d670cddd166ccee1a501522f5e01720638d33a9f30efa8c,2024-11-26T22:15:18.990000
@ -268137,10 +268150,10 @@ CVE-2024-53859,0,0,4facd2b494aef0ff73beaf08d6d1ca6f6f9ab5c48842cb7bed7f8b39e94a4
CVE-2024-53860,0,0,f686ec46a02a9bc4a804217b41a7af4658fb7390d2c722028f65e08a7a2b5414,2024-11-27T22:15:05.833000
CVE-2024-53861,0,0,c906a7c9ad7960370bb443153ada29d340a316d0e26a761ec82eb161aaf6e2d4,2024-12-02T19:15:12.150000
CVE-2024-53862,0,0,eb71730385f5a115df10825836b94c0319055c91f99db9bfd92d5c3006795a35,2024-12-02T16:15:14.277000
CVE-2024-53863,1,1,5a92bc2de00c8e9b6f5e801f02c7d9dfc0d6ec9d1318faae277b529e90d877bc,2024-12-03T17:15:12.633000
CVE-2024-53863,0,0,5a92bc2de00c8e9b6f5e801f02c7d9dfc0d6ec9d1318faae277b529e90d877bc,2024-12-03T17:15:12.633000
CVE-2024-53864,0,0,5333aa1d756baa8b2b2af9d321f1e4bf84fee7810b77a54afa507c359fe16403,2024-11-29T19:15:09.577000
CVE-2024-53865,0,0,4a38354939a410a34cc87939fb2218794cb79b60b95dc7b6ebed34b8c98c2e76,2024-11-29T19:15:09.710000
CVE-2024-53867,1,1,c12e14351b69d77e6eb8154ca10a6dc95900030fcd5c52428ccf6df2971ed00a,2024-12-03T17:15:12.787000
CVE-2024-53867,0,0,c12e14351b69d77e6eb8154ca10a6dc95900030fcd5c52428ccf6df2971ed00a,2024-12-03T17:15:12.787000
CVE-2024-5387,0,0,d7455745fd4e2043656d894120ace9fd562ab2b459405f5c80fb87774616ea6e,2024-06-03T19:15:09.500000
CVE-2024-5388,0,0,88068f2d18329bc2e1ad4660154ccfa55826fed94a4e1660b5757c6715c273a8,2024-06-03T19:15:09.557000
CVE-2024-5389,0,0,f6aaaf23dff2a1d7f90a7950cdbb76e8322ef8c0ff1bf8f6173fe4634d169b69,2024-07-09T19:15:13.853000
@ -268159,14 +268172,15 @@ CVE-2024-53915,0,0,4605c52b83221ae0e3cdd10a9aad63d660542ba26783410343eed38f4ba2e
CVE-2024-53916,0,0,8b397b00703240f42bfc4c720e49d6f6e4984c2220fee564d2c3c72e3311b723,2024-11-27T17:15:15.127000
CVE-2024-5392,0,0,b24872fec717fdd1d01c0a9d16cd8dae85d0db85954b236e74ba95a5e5c8352c,2024-06-04T19:21:08.117000
CVE-2024-53920,0,0,a291ce56b664f688b2d6f36f512bf0b737cf558f95f0af0d70bd1b3310ba1ecf,2024-12-02T17:15:13.913000
CVE-2024-53921,1,1,eb41a4432b5a9d706840e3bfc01bd30d99edb3ace8a9178bddbd38b299a4035c,2024-12-03T20:15:16.153000
CVE-2024-5393,0,0,295d4f9eb57788d71849a73c0b5d6c4f89e92a1e7613c6c16abcfeb4329f6a42,2024-06-04T19:21:08.420000
CVE-2024-53930,0,0,1076c24462100197e38bce4bb3bb1d95bc12e583ba6e6f216b5c96e80fcd4c47,2024-11-26T16:15:21.150000
CVE-2024-53937,0,0,b25de77736c9e3f417d080678e39d183775a1e387806a300f481aa2e7cce50d5,2024-12-02T23:15:05.673000
CVE-2024-53938,0,0,00aded0375d391a087a15db921a447eed8670e453691bf728d3fae98e66e6100,2024-12-02T22:15:10.633000
CVE-2024-53939,0,0,e7320e3797895c63e43c4a9ec5307dd5f614a377bc9de5971ce6aab8c2f2f12b,2024-12-02T22:15:10.757000
CVE-2024-53937,0,1,9b6d0ba9a6c42a47f6db6dc07703892d094b7f3d0184e6594f2581894b7b74a0,2024-12-03T19:15:12.127000
CVE-2024-53938,0,1,2e87f1385ed288ab2007c1cdc990e54338f984544f86b42f7b77d94beb038a85,2024-12-03T19:15:12.330000
CVE-2024-53939,0,1,cc459dfd78d0452776a678ac706ddf20df081009e5bb1cb330ba1e33e93a1425,2024-12-03T19:15:12.690000
CVE-2024-5394,0,0,aaadf9a58796777f85dc2107a816ebb5c0ae4c9d890d2d8c3ab15382290e4f66,2024-06-04T19:21:08.527000
CVE-2024-53940,0,0,0e2171e6261f48306c1a6c46d350addc4f2e85b214a329e78036a56b49e2ec36,2024-12-02T22:15:10.880000
CVE-2024-53941,0,0,bb701754b0f29aec99d35aefc4ba9fa9c71af7b26206bbe6f629d295ba6eef01,2024-12-02T22:15:10.993000
CVE-2024-53940,0,1,2b68513655f7a2f90e0a92f4f20eae855e81730f6c275fc3425f3ffdeb76ac78,2024-12-03T19:15:12.910000
CVE-2024-53941,0,1,86dc87751055127056ed8da2009cc16b64fb18deaa783d9292dd348e5ff26343,2024-12-03T19:15:13.113000
CVE-2024-5395,0,0,e532c0fafbcef9b666c7ef0302f25a35b4dc4d0c2a33d2079af161ebd3ce2b3c,2024-05-28T12:39:28.377000
CVE-2024-5396,0,0,d0f735b85e524715ed1861b804d3fb37a4720102a88b42bc6f1eec50bfcc099d,2024-06-04T19:21:08.627000
CVE-2024-5397,0,0,79c82f6af34f5d76edc0fe512c9b3e616bf4c7ca15c122380ba9806c73a591a6,2024-06-04T19:21:08.733000
@ -268205,6 +268219,7 @@ CVE-2024-5412,0,0,5e7f5482cbb5bbe521f2cd5ff48f80c18806840859b33baffa51a21bf41b87
CVE-2024-54123,0,0,adb9d810678343393bca99901a3c1b47719ef78df3ca8f4e2f7e11c7b4e0333a,2024-11-29T19:15:10.287000
CVE-2024-54124,0,0,d93261f0be0c719ea94f116c38fdd88edcab344178e1fea1cd1f60fbeb46997e,2024-11-29T19:15:10.443000
CVE-2024-5413,0,0,b448c8c4fee794a9903e33e6c17f07ddeb3dd7c0bc677024b75809ef047d2c8a,2024-05-28T14:59:09.827000
CVE-2024-54131,1,1,4b4918afa2a4261da20afce1984c24b92c3cd8c05c3ee6659db317d6cf1d35a8,2024-12-03T21:15:08.127000
CVE-2024-5414,0,0,08acc305e6c9bea4a9589fa3dba157ea62649fb0f8c0ee74aad6ddc09386f1c2,2024-05-28T14:59:09.827000
CVE-2024-5415,0,0,d8ba178a70f3cfb2a3911a07d12ef045cc2ca261b5b8d85db5edc9c9636eef1e,2024-05-28T14:59:09.827000
CVE-2024-54159,0,0,a6966b82b06dc6cc6ffe535670f7fe423d90e23d66a5791ea4c4b55b9827bb58,2024-12-03T15:15:12.097000
@ -269953,8 +269968,8 @@ CVE-2024-7387,0,0,88a2f5f296b30b6e91a6f72138ece306740eb87629edb428b81d1f03949ce0
CVE-2024-7388,0,0,f17b6292d40b8d2d9d22865fdbf912ed4604c49db111ea9e78f67fdbb858de85,2024-08-13T12:58:25.437000
CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000
CVE-2024-7390,0,0,c78997aaf26baecb9ee1facf6fff2e2cee58e21d2495850b79570450be19582c,2024-09-27T17:45:05.590000
CVE-2024-7391,0,0,17c80b56dbdf028398db9acf6bdd5aa6d598f8259099e27176babae80ff761fd,2024-11-22T22:15:17.893000
CVE-2024-7392,0,0,b6c631f7c2325c1c6ea668d8558d5947ec1715b6355b9d17bfc7ffc75d678178,2024-11-22T22:15:18.013000
CVE-2024-7391,0,1,2752de4ae00b5b2870d0f6d32309617f0c9e8b04345fde12d660bbbcdd1fe039,2024-12-03T21:44:10.397000
CVE-2024-7392,0,1,df337276c1b7ad5043680e2710dff50a1d97b86398705520a864550842c7662d,2024-12-03T22:17:52.127000
CVE-2024-7394,0,0,311dd8d09f289dca72e294063b3121b4c7fd832b8fb4e9134c8457f94c79d21d,2024-08-29T13:41:24.487000
CVE-2024-7395,0,0,6b93b6db07480e26c0ae715f45aa50cef676fc9c19ea641f155805eb4429ff3f,2024-08-06T16:31:05.780000
CVE-2024-7396,0,0,4ebde91c8a3429e260812e0a142900e161f2137833db297002231fa5cfafb30a,2024-08-06T16:31:05.780000
@ -269965,7 +269980,7 @@ CVE-2024-7400,0,0,880bea0e2ff4ceadacbe376968f4ebe20bb468fa58e2ed97aa47316bc459f4
CVE-2024-7401,0,0,43ffed7b6ca165f2a0da7944b4e4cef6faa3da0b6dbd419986732fe262f21587,2024-09-05T18:34:17.433000
CVE-2024-7404,0,0,3de89ee628b5ee024a57e174f6f544c149981b7447dbe414eb2dc5874d61c7d0,2024-11-15T13:58:08.913000
CVE-2024-7408,0,0,a5191010d29cd8fd3daea07e74870b9bf130ede8610ab518fb24ce3a11a386f4,2024-08-13T16:06:08.213000
CVE-2024-7409,0,0,a0a6addbe3c2f0cc1db031d3b6ccbc76b45c7e3857a91ea8908f269e71f57171,2024-11-12T17:15:10.833000
CVE-2024-7409,0,1,72e398033bc704bfe4ec65b5a205019f271c5fe2539ce50b4e685753ef8da0b9,2024-12-03T20:15:16.387000
CVE-2024-7410,0,0,d4e8b81d7bab3d90baf0746a6fdf1d2e1dd63b1bd2599e20b73bae4467a0729b,2024-08-12T13:41:36.517000
CVE-2024-7411,0,0,233fe970a370850f5b652951fe7b5f603c4b4a66cd3c44f0b67dc9d466e3271d,2024-08-15T13:01:10.150000
CVE-2024-7412,0,0,b7efc7f691385d07c16b9c98953749b4113f5c7d6e2cc5e240ac710642b7a973,2024-08-12T13:41:36.517000
@ -270052,9 +270067,9 @@ CVE-2024-7505,0,0,9283ee6a6ab413a456fc93717c58da4016a84d79a8d91dde6b3b9d1434d937
CVE-2024-7506,0,0,8ce5e793bea3ef05c090588e0452278f00c3b03b884fc5816b50a2fc0825edd5,2024-09-11T20:02:56.717000
CVE-2024-7507,0,0,6bc1191146772bbaa999b0d6a827100d208121d95729ccca9fad3126c9340161,2024-08-15T13:01:10.150000
CVE-2024-7508,0,0,cc9fd3f81326cb4f7dedbdb36b639e76435caf6502aaca3805406cf4d1de2059,2024-11-22T22:15:18.133000
CVE-2024-7509,0,0,82555da7b356b441a65f473baf9431612f00d5116cab1b205728632c7c8c2e53,2024-11-22T22:15:18.250000
CVE-2024-7510,0,0,049a4ac77cf527a2fc2930314ddda2e05c3fb11b3ee4c4cd537e99048914691f,2024-11-22T22:15:18.363000
CVE-2024-7511,0,0,c80855976a2d2fd6686779fcd72edfac86fcf86bf35f069aa07f5c24c59707df,2024-11-22T22:15:18.480000
CVE-2024-7509,0,1,1d20a01ba25ba429690bc4a3d75ed6316644cb9406cd3eb90a5bb7d5e7873d40,2024-12-03T21:54:37.137000
CVE-2024-7510,0,1,8ce7d88d08e2f025c7ca01af440c38c78a7df99170ef1532db9ae3f724a61b2f,2024-12-03T21:36:54.357000
CVE-2024-7511,0,1,9bf089a5dbb9957d15202d89b865f1149744d0ed4ad1c450b9f46cf07d7d9683,2024-12-03T21:31:50.467000
CVE-2024-7512,0,0,64969c8356c27f20386cdfa0c38d50ded85817d5026c9d96e7d342b04fbd9f28,2024-08-30T18:19:01.187000
CVE-2024-7513,0,0,9e0dea33b007eccb273e626ffa6cce86e938d130dbfcfa937121ca05aa4099ce,2024-08-15T13:01:10.150000
CVE-2024-7514,0,0,655c87ffa4ff4008320c4821d9c63bb232bfab91cd0bfa739db07a9e11bd1757,2024-10-15T12:58:51.050000
@ -270473,7 +270488,7 @@ CVE-2024-7992,0,0,3b26e0e196b81cc5be7af125c16773e816453e267f4f880c3177869fe0f389
CVE-2024-7993,0,0,f5d8ce4e740e416affd8e0aa81b49c04864f17ee770befacf4a96c4d9988583c,2024-10-21T18:27:01.950000
CVE-2024-7994,0,0,5869f45b11df8c023b86ee171f284a639849bded2dfdba799d5d6a2b878c2a64,2024-10-21T18:35:55.397000
CVE-2024-7995,0,0,9b722cec7fe5ddfbfa2ed97d7d4fe0f5947f1a72064ec24ff3d88276777efbc5,2024-11-06T18:17:17.287000
CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a2167,2024-08-21T12:30:33.697000
CVE-2024-7998,0,1,5a96b2d058d8fa22c17d15139fb41166f629052179fc1be6b8add20fbdc8bcac,2024-12-03T19:15:13.330000
CVE-2024-8001,0,0,806349a97813103cc3e8eb86d0f86a64cc01077a115d397b4a475acb9a23d258,2024-11-19T15:41:25.973000
CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000
CVE-2024-8004,0,0,6053860c0b4fdc62f3a7122a051813b35afd677f12aaae8780fae160750aa789,2024-09-04T14:56:46.947000
@ -271074,7 +271089,7 @@ CVE-2024-8768,0,0,a982019cb3e87700eba7d9922c696779881e32d71a95f1662a9030bc9b15c0
CVE-2024-8770,0,0,092503c78b1ec747d9cd01983ee6d65a49e2eef82871ebe4802ea35253afc2e7,2024-09-27T13:49:29.690000
CVE-2024-8771,0,0,8440e358d9ef6f31cf81e66a5a83b441147afe75ee9c3ad99e3f4526f8f30874,2024-09-30T12:46:20.237000
CVE-2024-8772,0,0,69fe2194f6f1a272b95a9dfa955e0defecb0d89f2fa80479731934d1afc5a40a,2024-11-26T08:15:08.033000
CVE-2024-8775,0,1,7e08fdaca60bc5d319df0cb13012d16188e623f635de9956a7703298c9a96510,2024-12-03T17:15:14.090000
CVE-2024-8775,0,0,7e08fdaca60bc5d319df0cb13012d16188e623f635de9956a7703298c9a96510,2024-12-03T17:15:14.090000
CVE-2024-8776,0,0,5f24148b1f2c0e63f94c4b7c4eb112791a653befffb86dbacf9b6c99ebdd5088,2024-09-20T16:38:51.910000
CVE-2024-8777,0,0,abf6497bbb9ed542a83ea295cf446b5b0a64e2a3685378272b7c6e8d7a6d8418,2024-09-20T14:22:19.840000
CVE-2024-8778,0,0,04f76622204759cf035b6cf776488dd4e0117dc8a28cbc6a6f40333ff951b555,2024-09-20T14:23:37.697000
@ -271135,7 +271150,7 @@ CVE-2024-8834,0,0,ccf3b1cbd9b873f9e8f2c6c9b25ea0d55c495129845f242b63c5f3111f065f
CVE-2024-8835,0,0,ac7088e58560f5b8a53a89d7053ca91953fa04c930410cf78b9450022c4f09c2,2024-11-29T20:17:52.063000
CVE-2024-8836,0,0,79e7b0ebef3f34831f5721ae680df12c7c8fda724633587fb2447905129a1385,2024-11-29T20:17:29.823000
CVE-2024-8837,0,0,89e656db04439e6a29296845420167328da47c051242908b0604e6fd8193f958,2024-11-29T20:10:41.130000
CVE-2024-8838,0,0,e676463d3f7f0a87971635160e5f6d89ae25b12ed9d7c1e6f9c006cc6f501b53,2024-11-22T21:15:22.317000
CVE-2024-8838,0,1,10d39ca9b78f79c235ce4c6d2c97387f035b10246bb5c06ccf2c04f01720827b,2024-12-03T22:06:42.107000
CVE-2024-8839,0,0,2acbb4e8a6b1624d1785c0132d951382284f4d937031ff128ac25b7244df8702,2024-11-22T21:15:22.427000
CVE-2024-8840,0,0,bd5b89e0d8e6d7cd1adbf7994707d06af9e474015537950245cf092af468c08b,2024-11-22T21:15:22.537000
CVE-2024-8841,0,0,7ed3cd0a4558fa930ad6b076c4b91d74353ec9aac5958cf8e03944b719c15dbd,2024-11-22T21:15:22.657000
@ -271927,7 +271942,7 @@ CVE-2024-9896,0,0,1349378c85078664635cddd4e92f21938b789e5f2486c02fbf3dda2655343b
CVE-2024-9897,0,0,c000f038202bbdf161648c8f1d74fa0a88aad69aa13c730474d96a3fd2473014,2024-11-01T15:27:56.797000
CVE-2024-9898,0,0,34647a8f54872789fb9d153b7e32e611f940664cb6907ab09e4df7e32cdaa8ba,2024-10-18T12:52:33.507000
CVE-2024-9899,0,0,6c76ba1fcc7597d7958a7e74c7de009221352c8fe34414d847a1d4d85ee09e27,2024-10-23T21:15:15.050000
CVE-2024-9902,0,1,d3514a8252b29f452d3c2fe4a2caa5732203637cca78cbe2e8452f1b90440a5a,2024-12-03T17:15:14.390000
CVE-2024-9902,0,0,d3514a8252b29f452d3c2fe4a2caa5732203637cca78cbe2e8452f1b90440a5a,2024-12-03T17:15:14.390000
CVE-2024-9903,0,0,244e0ad624c75743e190bc7da6a1b45fe195aaf738d59f8decfde97c8722448f,2024-10-15T12:57:46.880000
CVE-2024-9904,0,0,b8f5bdf1fde920247f061f9c3939c42469f53e3148abd589ac11ba36d4728079,2024-10-15T12:57:46.880000
CVE-2024-9905,0,0,09e20420cf063b331c2f2444287faaf461bdb42e483d150bc77bc6c327c543d3,2024-10-16T22:12:18.153000

Can't render this file because it is too large.