diff --git a/CVE-2018/CVE-2018-93xx/CVE-2018-9376.json b/CVE-2018/CVE-2018-93xx/CVE-2018-9376.json index 32b47d5877d..517fb441512 100644 --- a/CVE-2018/CVE-2018-93xx/CVE-2018-9376.json +++ b/CVE-2018/CVE-2018-93xx/CVE-2018-9376.json @@ -2,16 +2,55 @@ "id": "CVE-2018-9376", "sourceIdentifier": "security@android.com", "published": "2024-12-02T21:15:09.107", - "lastModified": "2024-12-02T21:15:09.107", + "lastModified": "2024-12-03T19:15:05.937", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In rpc_msg_handler and related handlers of\u00a0drivers/misc/mediatek/eccci/port_rpc.c, there is a possible out of bounds\u00a0write due to an incorrect bounds check. This could lead to local escalation\u00a0of privilege with System execution privileges needed. User interaction is\u00a0not needed for exploitation." + }, + { + "lang": "es", + "value": " En rpc_msg_handler y los controladores relacionados de drivers/misc/mediatek/eccci/port_rpc.c, existe una posible escritura fuera de los l\u00edmites debido a una comprobaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los privilegios de ejecuci\u00f3n del sistema. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://source.android.com/docs/security/bulletin/pixel/2018-07-01", diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9413.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9413.json index 817f0fb03fb..58d69fb6213 100644 --- a/CVE-2018/CVE-2018-94xx/CVE-2018-9413.json +++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9413.json @@ -2,16 +2,55 @@ "id": "CVE-2018-9413", "sourceIdentifier": "security@android.com", "published": "2024-12-02T21:15:09.653", - "lastModified": "2024-12-02T21:15:09.653", + "lastModified": "2024-12-03T19:15:06.147", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In handle_notification_response of btif_rc.cc, there is a possible out of\u00a0bounds write due to a missing bounds check. This could lead to remote code\u00a0execution with no additional execution privileges needed. User interaction\u00a0is needed for exploitation." + }, + { + "lang": "es", + "value": " En handle_notification_response de btif_rc.cc, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://source.android.com/docs/security/bulletin/pixel/2018-07-01", diff --git a/CVE-2020/CVE-2020-110xx/CVE-2020-11063.json b/CVE-2020/CVE-2020-110xx/CVE-2020-11063.json index d4035dfd7f5..4ffb196e245 100644 --- a/CVE-2020/CVE-2020-110xx/CVE-2020-11063.json +++ b/CVE-2020/CVE-2020-110xx/CVE-2020-11063.json @@ -2,8 +2,9 @@ "id": "CVE-2020-11063", "sourceIdentifier": "security-advisories@github.com", "published": "2020-05-13T23:15:11.047", - "lastModified": "2024-11-21T04:56:42.557", + "lastModified": "2024-12-03T20:15:13.003", "vulnStatus": "Modified", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -129,11 +130,12 @@ ], "references": [ { - "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-347x-877p-hcwx", - "source": "security-advisories@github.com", - "tags": [ - "Third Party Advisory" - ] + "url": "https://github.com/TYPO3/typo3/commit/14929b98ecda0ce67329b0f25ca7c01ee85df574", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/TYPO3/typo3/security/advisories/GHSA-347x-877p-hcwx", + "source": "security-advisories@github.com" }, { "url": "https://github.com/TYPO3/TYPO3.CMS/security/advisories/GHSA-347x-877p-hcwx", diff --git a/CVE-2023/CVE-2023-20xx/CVE-2023-2005.json b/CVE-2023/CVE-2023-20xx/CVE-2023-2005.json index ac88d44ae01..2559d1d03c0 100644 --- a/CVE-2023/CVE-2023-20xx/CVE-2023-2005.json +++ b/CVE-2023/CVE-2023-20xx/CVE-2023-2005.json @@ -2,8 +2,8 @@ "id": "CVE-2023-2005", "sourceIdentifier": "vulnreport@tenable.com", "published": "2023-06-26T18:15:09.580", - "lastModified": "2023-07-05T17:16:12.110", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-03T19:15:06.390", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -13,32 +13,14 @@ ], "metrics": { "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH" - }, - "exploitabilityScore": 2.8, - "impactScore": 5.9 - }, { "source": "vulnreport@tenable.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "HIGH", @@ -46,12 +28,30 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 6.3, - "baseSeverity": "MEDIUM" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 0.3, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -65,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "configurations": [ @@ -101,6 +111,13 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.tenable.com/security/tns-2023-21", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29459.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29459.json index ac5f9c17416..079aa921083 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29459.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29459.json @@ -2,8 +2,8 @@ "id": "CVE-2023-29459", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-26T16:15:09.587", - "lastModified": "2023-07-06T15:47:21.350", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-03T20:15:14.167", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,6 +19,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -26,9 +28,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 6.1, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 2.7 @@ -45,6 +45,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ @@ -80,6 +90,21 @@ "tags": [ "Product" ] + }, + { + "url": "http://packetstormsecurity.com/files/172701/FC-Red-Bull-Salzburg-App-5.1.9-R-Improper-Authorization.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] + }, + { + "url": "https://play.google.com/store/apps/details?id=laola.redbull", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-362xx/CVE-2023-36252.json b/CVE-2023/CVE-2023-362xx/CVE-2023-36252.json index 0d1e620d0f6..37af3a9822b 100644 --- a/CVE-2023/CVE-2023-362xx/CVE-2023-36252.json +++ b/CVE-2023/CVE-2023-362xx/CVE-2023-36252.json @@ -2,8 +2,8 @@ "id": "CVE-2023-36252", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-26T19:15:09.773", - "lastModified": "2023-07-06T16:07:39.287", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-03T19:15:07.270", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,6 +19,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -26,9 +28,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] } ], "configurations": [ @@ -110,6 +120,13 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://www.zeroscience.mk/en/vulnerabilities/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-400xx/CVE-2023-40093.json b/CVE-2023/CVE-2023-400xx/CVE-2023-40093.json index ed86f033ee9..d3a730220b8 100644 --- a/CVE-2023/CVE-2023-400xx/CVE-2023-40093.json +++ b/CVE-2023/CVE-2023-400xx/CVE-2023-40093.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40093", "sourceIdentifier": "security@android.com", "published": "2024-02-16T02:15:49.963", - "lastModified": "2024-11-26T16:33:08.700", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-03T19:15:07.740", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42939.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42939.json index 541dea57ea4..47534cc61a5 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42939.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42939.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42939", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:50.767", - "lastModified": "2024-02-22T19:07:27.197", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T20:42:07.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,80 @@ "value": "Se solucion\u00f3 un problema de l\u00f3gica con controles mejorados. Este problema se solucion\u00f3 en iOS 17.1 y iPadOS 17.1. La actividad de navegaci\u00f3n privada de un usuario puede guardarse inesperadamente en el Informe de privacidad de la aplicaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.1", + "matchCriteriaId": "0B5787E4-1911-4926-9D81-492EFB438954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.1", + "matchCriteriaId": "434A55CA-5660-4F40-B4A2-5ABAF4CA7263" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT213982", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42942.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42942.json index 500591579f6..5aac1120644 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42942.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42942.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42942", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:50.963", - "lastModified": "2024-08-27T16:35:01.703", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T20:40:10.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,12 +17,34 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,39 +52,167 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.2", + "matchCriteriaId": "A8F544A7-7CEB-4A84-992F-58710B229579" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipad_os:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "D7F45FD5-BD2C-41B5-ADCA-D7F99A0FD4A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.2", + "matchCriteriaId": "5EB9EAAE-441A-4844-BCB2-1716FD9ACE85" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:17.0:*:*:*:*:*:*:*", + "matchCriteriaId": "502CD624-FA22-4C7B-9CA3-53CA938BE1AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.1", + "matchCriteriaId": "85B6F336-AA76-4706-AD68-BCDFFB48358B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9FE27DF1-3AF9-4BE4-8541-565FE5BC16A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndIncluding": "17.1", + "matchCriteriaId": "9B56E023-1C50-4D41-BAF1-21E22132A9A0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.1", + "matchCriteriaId": "F88E7355-ECFB-4EB0-9579-0C954C25355F" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT213981", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213982", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213984", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213985", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213987", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213988", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213981", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213984", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213985", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213987", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213988", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42945.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42945.json index ce206f19e3c..6a74a4ffe72 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42945.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42945.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42945", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:51.140", - "lastModified": "2024-08-22T14:35:01.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T20:37:44.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,12 +17,34 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +52,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "NONE", - "baseScore": 9.1, - "baseSeverity": "CRITICAL" + "availabilityImpact": "NONE" }, "exploitabilityScore": 3.9, "impactScore": 5.2 @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9FE27DF1-3AF9-4BE4-8541-565FE5BC16A2" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT213984", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213984", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42946.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42946.json index ba80fe1bf02..11963c26a0e 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42946.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42946.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42946", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:51.307", - "lastModified": "2024-11-07T15:35:06.643", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T20:29:31.657", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,12 +17,34 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,31 +52,122 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 7.5, - "baseSeverity": "HIGH" + "availabilityImpact": "NONE" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.1", + "matchCriteriaId": "0B5787E4-1911-4926-9D81-492EFB438954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.1", + "matchCriteriaId": "434A55CA-5660-4F40-B4A2-5ABAF4CA7263" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "9FE27DF1-3AF9-4BE4-8541-565FE5BC16A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.1", + "matchCriteriaId": "6B71C095-CFB3-42E1-8582-0AD365DA7855" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.1", + "matchCriteriaId": "F88E7355-ECFB-4EB0-9579-0C954C25355F" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT213982", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213984", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213987", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/HT213988", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213984", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213987", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213988", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42951.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42951.json index da9089c9ecc..200b1d04680 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42951.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42951.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42951", "sourceIdentifier": "product-security@apple.com", "published": "2024-02-21T07:15:51.363", - "lastModified": "2024-11-08T17:35:11.143", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T20:26:23.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,11 +18,13 @@ "metrics": { "cvssMetricV31": [ { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "source": "nvd@nist.gov", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,19 +32,83 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "LOW", - "availabilityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", "baseScore": 4.3, - "baseSeverity": "MEDIUM" + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.1", + "matchCriteriaId": "0B5787E4-1911-4926-9D81-492EFB438954" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.1", + "matchCriteriaId": "434A55CA-5660-4F40-B4A2-5ABAF4CA7263" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/HT213982", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://support.apple.com/en-us/HT213982", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-495xx/CVE-2023-49559.json b/CVE-2023/CVE-2023-495xx/CVE-2023-49559.json index 7ac7b5f0386..3c3ec9337ec 100644 --- a/CVE-2023/CVE-2023-495xx/CVE-2023-49559.json +++ b/CVE-2023/CVE-2023-495xx/CVE-2023-49559.json @@ -2,7 +2,7 @@ "id": "CVE-2023-49559", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-12T20:15:10.773", - "lastModified": "2024-06-13T18:36:09.010", + "lastModified": "2024-12-03T20:15:14.317", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,11 +15,50 @@ "value": "Un problema en vektah gqlparser open-source-library v.2.5.10 permite a un atacante remoto provocar una denegaci\u00f3n de servicio a trav\u00e9s de un script manipulado para la funci\u00f3n parserDirectives." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/uvzz/d3ed9d4532be16ec1040a2cf3dfec8d1", "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/uvzz/d3ed9d4532be16ec1040a2cf3dfec8d1", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-509xx/CVE-2023-50951.json b/CVE-2023/CVE-2023-509xx/CVE-2023-50951.json index b8804cbaf57..35c0d66834f 100644 --- a/CVE-2023/CVE-2023-509xx/CVE-2023-50951.json +++ b/CVE-2023/CVE-2023-509xx/CVE-2023-50951.json @@ -2,8 +2,8 @@ "id": "CVE-2023-50951", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-17T16:15:46.443", - "lastModified": "2024-02-20T19:50:53.960", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T20:28:43.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -23,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.0, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,19 +32,37 @@ "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 4.0, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.5, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +71,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_security:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.10.0.0", + "versionEndIncluding": "1.10.11.0", + "matchCriteriaId": "8FA89838-3E05-4778-9323-DE51CC10FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.10.12.0", + "versionEndExcluding": "1.10.18.0", + "matchCriteriaId": "D0EF0709-2F84-47AA-9F3A-4F2D427ABD9B" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275747", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7118604", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/275747", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] + }, + { + "url": "https://www.ibm.com/support/pages/node/7118604", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-527xx/CVE-2023-52727.json b/CVE-2023/CVE-2023-527xx/CVE-2023-52727.json index cf7cb07ebbe..e251a060d9d 100644 --- a/CVE-2023/CVE-2023-527xx/CVE-2023-52727.json +++ b/CVE-2023/CVE-2023-527xx/CVE-2023-52727.json @@ -2,7 +2,7 @@ "id": "CVE-2023-52727", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T00:15:07.453", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-12-03T19:15:07.950", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,11 +15,54 @@ "value": "Open Networking Foundation SD-RAN ONOS onos-lib-go 0.10.25 permite una condici\u00f3n de \u00edndice fuera de rango en parseAlignBits." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + }, + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://github.com/onosproject/onos-lib-go/issues/245", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/onosproject/onos-lib-go/issues/245", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11168.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11168.json index 100745f088f..b9b17ef2fb9 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11168.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11168.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11168", "sourceIdentifier": "cna@python.org", "published": "2024-11-12T22:15:14.920", - "lastModified": "2024-11-13T17:01:16.850", + "lastModified": "2024-12-03T21:15:05.470", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -23,6 +23,8 @@ "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", @@ -54,9 +56,7 @@ "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", - "providerUrgency": "NOT_DEFINED", - "baseScore": 6.3, - "baseSeverity": "MEDIUM" + "providerUrgency": "NOT_DEFINED" } } ] @@ -78,10 +78,18 @@ "url": "https://github.com/python/cpython/commit/29f348e232e82938ba2165843c448c2b291504c5", "source": "cna@python.org" }, + { + "url": "https://github.com/python/cpython/commit/634ded45545ce8cbd6fd5d49785613dd7fa9b89e", + "source": "cna@python.org" + }, { "url": "https://github.com/python/cpython/commit/b2171a2fd41416cf68afd67460578631d755a550", "source": "cna@python.org" }, + { + "url": "https://github.com/python/cpython/commit/ddca2953191c67a12b1f19d6bca41016c6ae7132", + "source": "cna@python.org" + }, { "url": "https://github.com/python/cpython/issues/103848", "source": "cna@python.org" diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11967.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11967.json index a94cffa0848..a41ebe0de47 100644 --- a/CVE-2024/CVE-2024-119xx/CVE-2024-11967.json +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11967.json @@ -2,13 +2,17 @@ "id": "CVE-2024-11967", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-28T18:15:07.780", - "lastModified": "2024-11-28T18:15:07.780", - "vulnStatus": "Received", + "lastModified": "2024-12-03T20:20:04.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in PHPGurukul Complaint Management system 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/reset-password.php. The manipulation of the argument email leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en PHPGurukul Complaint Management system 1.0. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /admin/reset-password.php. La manipulaci\u00f3n del argumento email provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -107,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -118,28 +142,71 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phpgurukul:complaint_management_system:1.0:*:*:*:-:*:*:*", + "matchCriteriaId": "CAB40780-3F18-4A8D-9033-32EF5A7327D5" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Aurora0x1/CVE/issues/4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://phpgurukul.com/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://vuldb.com/?ctiid.286350", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.286350", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?submit.452477", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11968.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11968.json index 47d1457113c..c397c0188ea 100644 --- a/CVE-2024/CVE-2024-119xx/CVE-2024-11968.json +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11968.json @@ -2,13 +2,17 @@ "id": "CVE-2024-11968", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-28T18:15:07.980", - "lastModified": "2024-11-28T18:15:07.980", - "vulnStatus": "Received", + "lastModified": "2024-12-03T20:12:14.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Farmacia up to 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file pagamento.php. The manipulation of the argument notaFiscal leads to sql injection. The attack can be launched remotely." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Farmacia hasta la versi\u00f3n 1.0. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo pagamento.php. La manipulaci\u00f3n del argumento notaFiscal conduce a una inyecci\u00f3n SQL. El ataque puede ejecutarse de forma remota." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -107,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -118,28 +142,71 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:anisha:farmacia:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B8C68FD0-0D27-4525-8289-0526E4F5B6E6" + } + ] + } + ] } ], "references": [ { "url": "https://code-projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/xiaobai19198/cve/blob/main/sql-cve.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.286351", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.286351", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.452877", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11971.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11971.json index 5e41063a7e2..39ddf963286 100644 --- a/CVE-2024/CVE-2024-119xx/CVE-2024-11971.json +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11971.json @@ -2,13 +2,17 @@ "id": "CVE-2024-11971", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-28T22:15:15.090", - "lastModified": "2024-11-28T22:15:15.090", - "vulnStatus": "Received", + "lastModified": "2024-12-03T20:04:46.493", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in Guizhou Xiaoma Technology jpress 5.1.2. Affected by this vulnerability is an unknown functionality of the file /commons/attachment/upload of the component Avatar Handler. The manipulation of the argument files leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en Guizhou Xiaoma Technology jpress 5.1.2. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /commons/attachment/upload del componente Avatar Handler. La manipulaci\u00f3n de los archivos de argumentos provoca Cross-Site Scripting. El ataque se puede ejecutar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -107,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -118,24 +142,64 @@ "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jpress:jpress:5.1.2:*:*:*:*:*:*:*", + "matchCriteriaId": "1D7771EC-8856-4D0E-8D12-D6BA66B75295" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/dycccccccc/jpress/blob/main/JPRESS%20file%20upload%20leads%20to%20code%20execution.docx", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.286381", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.286381", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.453637", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12053.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12053.json new file mode 100644 index 00000000000..42846f4b97e --- /dev/null +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12053.json @@ -0,0 +1,70 @@ +{ + "id": "CVE-2024-12053", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-12-03T19:15:08.413", + "lastModified": "2024-12-03T20:15:14.513", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Type Confusion in V8 in Google Chrome prior to 131.0.6778.108 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "chrome-cve-admin@google.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/12/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/379009132", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20768.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20768.json index a26280d6b0f..ee468709235 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20768.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20768.json @@ -2,7 +2,7 @@ "id": "CVE-2024-20768", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:09.470", - "lastModified": "2024-12-03T14:25:50.643", + "lastModified": "2024-12-03T21:46:08.623", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -80,7 +80,6 @@ "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", "source": "psirt@adobe.com", "tags": [ - "Patch", "Vendor Advisory" ] }, @@ -88,7 +87,6 @@ "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Patch", "Vendor Advisory" ] } diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20778.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20778.json index 43b3d2c823b..78634400d29 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20778.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20778.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20778", "sourceIdentifier": "psirt@adobe.com", "published": "2024-04-10T09:15:07.037", - "lastModified": "2024-04-10T13:23:38.787", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T22:21:38.357", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20779.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20779.json index 1798aef2ac1..cf3a6da97ad 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20779.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20779.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20779", "sourceIdentifier": "psirt@adobe.com", "published": "2024-04-10T09:15:07.343", - "lastModified": "2024-04-10T13:23:38.787", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T22:21:48.793", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20780.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20780.json index d446ea97672..91da1ddab2e 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20780.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20780.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20780", "sourceIdentifier": "psirt@adobe.com", "published": "2024-04-10T09:15:07.630", - "lastModified": "2024-04-10T13:23:38.787", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T22:22:05.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21032.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21032.json index 68b28d2db05..f65a6eb4902 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21032.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21032.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21032", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:19.037", - "lastModified": "2024-11-27T16:31:02.343", - "vulnStatus": "Analyzed", + "lastModified": "2024-12-03T19:15:08.570", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -49,6 +49,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-210xx/CVE-2024-21065.json b/CVE-2024/CVE-2024-210xx/CVE-2024-21065.json index 538826ca2a6..9e8d4b4b8a5 100644 --- a/CVE-2024/CVE-2024-210xx/CVE-2024-21065.json +++ b/CVE-2024/CVE-2024-210xx/CVE-2024-21065.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21065", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-04-16T22:15:24.780", - "lastModified": "2024-04-17T12:48:31.863", + "lastModified": "2024-12-03T19:15:08.777", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,19 +32,33 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 6.1, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", "source": "secalert_us@oracle.com" + }, + { + "url": "https://www.oracle.com/security-alerts/cpuapr2024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-211xx/CVE-2024-21174.json b/CVE-2024/CVE-2024-211xx/CVE-2024-21174.json index 9e71f51fb2d..79a40dda361 100644 --- a/CVE-2024/CVE-2024-211xx/CVE-2024-21174.json +++ b/CVE-2024/CVE-2024-211xx/CVE-2024-21174.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21174", "sourceIdentifier": "secalert_us@oracle.com", "published": "2024-07-16T23:15:21.157", - "lastModified": "2024-07-17T13:34:20.520", + "lastModified": "2024-12-03T20:15:14.673", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 3.1, + "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "LOW", @@ -30,19 +32,33 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "LOW", - "baseScore": 3.1, - "baseSeverity": "LOW" + "availabilityImpact": "LOW" }, "exploitabilityScore": 1.6, "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujul2024.html", "source": "secalert_us@oracle.com" + }, + { + "url": "https://www.oracle.com/security-alerts/cpujul2024.html", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-223xx/CVE-2024-22337.json b/CVE-2024/CVE-2024-223xx/CVE-2024-22337.json index a558f17899c..89124c83400 100644 --- a/CVE-2024/CVE-2024-223xx/CVE-2024-22337.json +++ b/CVE-2024/CVE-2024-223xx/CVE-2024-22337.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22337", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-02-17T16:15:47.370", - "lastModified": "2024-02-20T19:50:53.960", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T20:37:33.563", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -23,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "HIGH", "privilegesRequired": "NONE", @@ -30,19 +32,37 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.1, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.4, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "psirt@us.ibm.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +71,60 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:cloud_pak_for_security:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.10.0.0", + "versionEndIncluding": "1.10.11.0", + "matchCriteriaId": "8FA89838-3E05-4778-9323-DE51CC10FD18" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:qradar_suite:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.10.12.0", + "versionEndExcluding": "1.10.18.0", + "matchCriteriaId": "D0EF0709-2F84-47AA-9F3A-4F2D427ABD9B" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279977", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://www.ibm.com/support/pages/node/7118642", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/279977", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry" + ] + }, + { + "url": "https://www.ibm.com/support/pages/node/7118642", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26046.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26046.json index fae9debb472..753637bdc66 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26046.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26046.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26046", "sourceIdentifier": "psirt@adobe.com", "published": "2024-04-10T09:15:08.070", - "lastModified": "2024-04-10T13:23:38.787", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T22:22:16.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -51,10 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26047.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26047.json index f0ca8e6ea9b..397781c0b14 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26047.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26047.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26047", "sourceIdentifier": "psirt@adobe.com", "published": "2024-04-10T09:15:08.353", - "lastModified": "2024-04-10T13:23:38.787", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T22:22:25.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26076.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26076.json index 0fbb2d4f5ab..4119bde913f 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26076.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26076.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26076", "sourceIdentifier": "psirt@adobe.com", "published": "2024-04-10T09:15:08.640", - "lastModified": "2024-04-10T13:23:38.787", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T22:22:34.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -23,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26079.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26079.json index 561ebe80307..6a00bd262f5 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26079.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26079.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26079", "sourceIdentifier": "psirt@adobe.com", "published": "2024-04-10T09:15:08.950", - "lastModified": "2024-04-10T13:23:38.787", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T22:22:43.923", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26084.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26084.json index 41616dce447..1629882034a 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26084.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26084.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26084", "sourceIdentifier": "psirt@adobe.com", "published": "2024-04-10T09:15:09.227", - "lastModified": "2024-04-10T13:23:38.787", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T22:22:54.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26087.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26087.json index abde0663e4e..145630992dd 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26087.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26087.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26087", "sourceIdentifier": "psirt@adobe.com", "published": "2024-04-10T09:15:09.510", - "lastModified": "2024-04-10T13:23:38.787", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T22:23:31.950", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26097.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26097.json index 6aab7a8da89..15c44855537 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26097.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26097.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26097", "sourceIdentifier": "psirt@adobe.com", "published": "2024-04-10T09:15:09.820", - "lastModified": "2024-04-10T13:23:38.787", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T22:23:43.117", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26098.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26098.json index 345320b3448..87a46e56ca6 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26098.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26098.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26098", "sourceIdentifier": "psirt@adobe.com", "published": "2024-04-10T09:15:10.127", - "lastModified": "2024-04-10T13:23:38.787", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T22:23:53.200", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-21.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26119.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26119.json index ea2fb475b75..b597c2298e2 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26119.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26119.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26119", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:19.000", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T22:16:51.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,12 +32,30 @@ "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.3, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,12 +69,56 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26120.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26120.json index 4f0184cd5b1..31214444347 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26120.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26120.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26120", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:19.290", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T22:21:01.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26124.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26124.json index e358aaf2ca2..71f9080ad12 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26124.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26124.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26124", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:19.503", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T22:21:14.077", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-261xx/CVE-2024-26125.json b/CVE-2024/CVE-2024-261xx/CVE-2024-26125.json index f333e231427..48c005c3032 100644 --- a/CVE-2024/CVE-2024-261xx/CVE-2024-26125.json +++ b/CVE-2024/CVE-2024-261xx/CVE-2024-26125.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26125", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:19.737", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T22:21:24.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.3.0", + "matchCriteriaId": "60D24EC5-C471-4F67-BBD9-1F6ED38191F9" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-273xx/CVE-2024-27323.json b/CVE-2024/CVE-2024-273xx/CVE-2024-27323.json index 624d7b5a74d..1c8b0576ac5 100644 --- a/CVE-2024/CVE-2024-273xx/CVE-2024-27323.json +++ b/CVE-2024/CVE-2024-273xx/CVE-2024-27323.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27323", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-04-01T22:15:15.950", - "lastModified": "2024-12-03T16:50:34.657", + "lastModified": "2024-12-03T22:03:36.550", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -92,9 +92,13 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*", - "versionEndExcluding": "10.1.2.382", - "matchCriteriaId": "5CD96316-2D89-435B-939D-2BCD5DE42D84" + "criteria": "cpe:2.3:a:pdf-xchange:pdf-tools:10.1.1.381:*:*:*:*:*:*:*", + "matchCriteriaId": "097CBCF4-A99C-4A83-937C-BE2F0A8E595F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:10.1.1.381:*:*:*:*:*:*:*", + "matchCriteriaId": "80367953-FC8D-4768-9BAC-4350A7E565C3" } ] } @@ -106,14 +110,16 @@ "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-198/", "source": "zdi-disclosures@trendmicro.com", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-198/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Third Party Advisory" + "Third Party Advisory", + "VDB Entry" ] } ] diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30896.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30896.json index b2b2574ff0f..212bd2af7dc 100644 --- a/CVE-2024/CVE-2024-308xx/CVE-2024-30896.json +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30896.json @@ -2,13 +2,13 @@ "id": "CVE-2024-30896", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-21T11:15:34.007", - "lastModified": "2024-11-27T17:15:10.650", + "lastModified": "2024-12-03T21:15:06.437", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "InfluxDB through 2.7.10 allows allAccess administrators to retrieve all raw tokens via an \"influx auth ls\" command. NOTE: the supplier indicates that this is intentional but is a \"poor design choice\" that will be changed in a future release." + "value": "InfluxDB OSS 2.x through 2.7.11 stores the administrative operator token under the default organization which allows authorized users with read access to the authorization resource of the default organization to retrieve the operator token. InfluxDB OSS 1.x, Enterprise, Cloud, Cloud Dedicated and Clustered are not affected. NOTE: The researcher states that InfluxDB allows allAccess administrators to retrieve all raw tokens via an \"influx auth ls\" command. The supplier indicates that the organizations feature is operating as intended and that users may choose to add users to non-default organizations. A future release of InfluxDB 2.x will remove the ability to retrieve tokens from the API." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33409.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33409.json index 7b0852587a3..5171f8a1184 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33409.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33409.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33409", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-06T18:15:08.230", - "lastModified": "2024-05-28T18:15:09.347", + "lastModified": "2024-12-03T20:15:15.107", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de inyecci\u00f3n SQL en index.php en campcodes Complete Web-Based School Management System 1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro de nombre." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%201.pdf", @@ -24,6 +59,14 @@ { "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%208.pdf", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%201.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Web-Based%20School%20Management%20System/Complete%20Web-Based%20School%20Management%20System%20-%20vuln%208.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36610.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36610.json index 09dfe1c0041..163b48841b9 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36610.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36610.json @@ -2,13 +2,20 @@ "id": "CVE-2024-36610", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-29T20:15:20.237", - "lastModified": "2024-12-02T17:15:11.230", + "lastModified": "2024-12-03T21:15:06.600", "vulnStatus": "Awaiting Analysis", - "cveTags": [], + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", - "value": "A deserialization vulnerability exists in the Stub class of the VarDumper module in Symfony v7.0.3. The vulnerability stems from deficiencies in the original implementation when handling properties with null or uninitialized values. An attacker could construct specific serialized data and use this vulnerability to execute unauthorized code." + "value": "A deserialization vulnerability exists in the Stub class of the VarDumper module in Symfony v7.0.3. The vulnerability stems from deficiencies in the original implementation when handling properties with null or uninitialized values. An attacker could construct specific serialized data and use this vulnerability to execute unauthorized code. NOTE: the Supplier has concluded that this is a false report." }, { "lang": "es", @@ -56,6 +63,10 @@ "url": "https://gist.github.com/1047524396/24e93f2905850235e42ad7db6e878bd5", "source": "cve@mitre.org" }, + { + "url": "https://github.com/github/advisory-database/pull/5046", + "source": "cve@mitre.org" + }, { "url": "https://github.com/symfony/symfony/blob/v7.0.3/src/Symfony/Component/VarDumper/Cloner/Stub.php#L53", "source": "cve@mitre.org" @@ -63,6 +74,10 @@ { "url": "https://github.com/symfony/symfony/commit/3ffd495bb3cc4d2e24e35b2d83c5b909cab7e259", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/symfony/symfony/issues/59077#issuecomment-2513935018", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-366xx/CVE-2024-36611.json b/CVE-2024/CVE-2024-366xx/CVE-2024-36611.json index 0ed8d7a2e43..f7814cf8594 100644 --- a/CVE-2024/CVE-2024-366xx/CVE-2024-36611.json +++ b/CVE-2024/CVE-2024-366xx/CVE-2024-36611.json @@ -2,13 +2,20 @@ "id": "CVE-2024-36611", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-29T19:15:06.780", - "lastModified": "2024-12-03T16:15:22.057", + "lastModified": "2024-12-03T21:15:06.783", "vulnStatus": "Awaiting Analysis", - "cveTags": [], + "cveTags": [ + { + "sourceIdentifier": "cve@mitre.org", + "tags": [ + "disputed" + ] + } + ], "descriptions": [ { "lang": "en", - "value": "In Symfony v7.07, a security vulnerability was identified in the FormLoginAuthenticator component, where it failed to adequately handle cases where the username or password field of a login request is empty. This flaw could lead to various security risks, including improper authentication logic handling or denial of service." + "value": "In Symfony v7.07, a security vulnerability was identified in the FormLoginAuthenticator component, where it failed to adequately handle cases where the username or password field of a login request is empty. This flaw could lead to various security risks, including improper authentication logic handling or denial of service. NOTE: the Supplier has concluded that this is a false report." }, { "lang": "es", @@ -56,6 +63,10 @@ "url": "https://gist.github.com/1047524396/3581425e0911b716cf8ce4fa30e41e6c", "source": "cve@mitre.org" }, + { + "url": "https://github.com/github/advisory-database/pull/5046", + "source": "cve@mitre.org" + }, { "url": "https://github.com/symfony/symfony/blob/v7.0.7/src/Symfony/Component/Security/Http/Authenticator/FormLoginAuthenticator.php#L132", "source": "cve@mitre.org" @@ -63,6 +74,10 @@ { "url": "https://github.com/symfony/symfony/commit/a804ca15fcad279d7727b91d12a667fd5b925995", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/symfony/symfony/issues/59077#issuecomment-2513935018", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38496.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38496.json index 69062509814..9c830ebf6a1 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38496.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38496.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38496", "sourceIdentifier": "secure@symantec.com", "published": "2024-07-15T15:15:10.680", - "lastModified": "2024-07-16T13:43:58.773", + "lastModified": "2024-12-03T19:15:09.550", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -23,6 +23,8 @@ "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", "attackVector": "ADJACENT", "attackComplexity": "LOW", "attackRequirements": "NONE", @@ -54,17 +56,31 @@ "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", - "providerUrgency": "NOT_DEFINED", - "baseScore": 5.1, - "baseSeverity": "MEDIUM" + "providerUrgency": "NOT_DEFINED" } } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24678", "source": "secure@symantec.com" + }, + { + "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24678", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-403xx/CVE-2024-40391.json b/CVE-2024/CVE-2024-403xx/CVE-2024-40391.json new file mode 100644 index 00000000000..f13238aa5cc --- /dev/null +++ b/CVE-2024/CVE-2024-403xx/CVE-2024-40391.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2024-40391", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-03T22:15:04.740", + "lastModified": "2024-12-03T22:15:04.740", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45757.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45757.json new file mode 100644 index 00000000000..b015b175b87 --- /dev/null +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45757.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-45757", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-03T21:15:06.953", + "lastModified": "2024-12-03T21:15:06.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Centreon centreon-bam 24.04, 23.10, 23.04, and 22.10. SQL injection can occur in the user-settings form. Exploitation is only accessible to authenticated users with high-privileged access." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/centreon/centreon/releases", + "source": "cve@mitre.org" + }, + { + "url": "https://thewatch.centreon.com/latest-security-bulletins-64/cve-2024-45757-centreon-bam-high-severity-4123?tid=4123", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46625.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46625.json new file mode 100644 index 00000000000..2ccdf1ccb5c --- /dev/null +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46625.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-46625", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-03T22:15:04.860", + "lastModified": "2024-12-03T22:15:04.860", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authenticated arbitrary file upload vulnerability in the /documentCache/upload endpoint of InfoDom Performa 365 v4.0.1 allows attackers to execute arbitrary code via uploading a crafted SVG file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/EchoSl0w/Research/blob/main/2024/CVE-2024-46625.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46905.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46905.json index a5b45ef410d..426bf86f194 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46905.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46905.json @@ -2,13 +2,17 @@ "id": "CVE-2024-46905", "sourceIdentifier": "security@progress.com", "published": "2024-12-02T15:15:11.443", - "lastModified": "2024-12-02T15:15:11.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T20:00:17.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In WhatsUp Gold versions released before 2024.0.1, a SQL Injection vulnerability allows an authenticated lower-privileged user (at least Network Manager permissions required) to achieve privilege escalation to the admin account." + }, + { + "lang": "es", + "value": "En las versiones de WhatsUp Gold publicadas antes de 2024.0.1, una vulnerabilidad de inyecci\u00f3n SQL permite que un usuario autenticado con privilegios bajos (al menos permisos de administrador de red requeridos) logre una escalada de privilegios a la cuenta de administrador." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -47,18 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:progress:whatsup_gold:*:*:*:*:*:*:*:*", + "versionEndExcluding": "24.0.1", + "matchCriteriaId": "07BDB617-53DC-4C9B-BE7B-79A393F1A9C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://community.progress.com/s/article/WhatsUp-Gold-Security-Bulletin-September-2024", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://docs.progress.com/bundle/whatsupgold-release-notes-24-0/page/WhatsUp-Gold-2024.0-Release-Notes.html", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.progress.com/network-monitoring", - "source": "security@progress.com" + "source": "security@progress.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47094.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47094.json index 65286c75ff2..4612505106e 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47094.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47094.json @@ -2,13 +2,17 @@ "id": "CVE-2024-47094", "sourceIdentifier": "security@checkmk.com", "published": "2024-11-29T10:15:10.657", - "lastModified": "2024-11-29T10:15:10.657", - "vulnStatus": "Received", + "lastModified": "2024-12-03T20:01:52.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p22, <2.2.0p37, <2.1.0p50 (EOL) causes remote site secrets to be written to web log files accessible to local site users." + }, + { + "lang": "es", + "value": "La inserci\u00f3n de informaci\u00f3n confidencial en un archivo de registro en las versiones de Checkmk de Checkmk GmbH <2.3.0p22, <2.2.0p37, <2.1.0p50 (EOL) hace que los secretos del sitio remoto se escriban en archivos de registro web accesibles para los usuarios del sitio local." } ], "metrics": { @@ -55,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -67,12 +93,412 @@ "value": "CWE-532" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "0A6AED3C-E447-429C-A028-B100CD51AB7C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*", + "matchCriteriaId": "C66704F1-0B5E-4B43-8748-987022F378F8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*", + "matchCriteriaId": "B068974F-6F67-4CBB-B567-FCED86E28F22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*", + "matchCriteriaId": "EA70F36A-EEF6-48DC-B15E-055D0DE8A052" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*", + "matchCriteriaId": "B2017F38-38DB-4E96-B34F-160BC731CBBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*", + "matchCriteriaId": "0949F399-371B-409C-AF9F-32690D881440" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*", + "matchCriteriaId": "42E1E31A-B5CC-45F2-A2E5-3EEF735499BA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*", + "matchCriteriaId": "4B364FCA-500C-458E-B997-82CD0B1D24F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*", + "matchCriteriaId": "0B32E657-917B-482B-B6A4-3D3746992A4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*", + "matchCriteriaId": "2119C732-E024-4DA6-8E47-9E08E5E12602" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*", + "matchCriteriaId": "4F0B99A8-A124-43BD-B8AA-EECC9112346F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "3FB7221E-BE9F-4529-8E07-8AD547FA3208" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*", + "matchCriteriaId": "30A074AD-9499-46E3-AB67-D6CEE3AA01C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*", + "matchCriteriaId": "A8BD0240-A22B-4273-BD47-C35A8C12E127" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*", + "matchCriteriaId": "DAA5680F-1DD0-48AA-BB7F-15B27365F0FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*", + "matchCriteriaId": "BC2F31CA-D4EB-44E6-9A09-5255D33F4A88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*", + "matchCriteriaId": "CD80BD69-20C6-4E17-B165-98689179A5A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*", + "matchCriteriaId": "B044D43B-0233-4A0D-A356-B9F9324E2777" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*", + "matchCriteriaId": "7DE79896-EBE5-42F2-A126-2A871BBA1071" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*", + "matchCriteriaId": "51A44E69-EEA1-4B01-B7B3-5BF7B39819E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p18:*:*:*:*:*:*", + "matchCriteriaId": "BCB65AEB-CF52-410B-92B1-2DCFB914FFA4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p19:*:*:*:*:*:*", + "matchCriteriaId": "B7E17FA6-9011-489C-9FA9-368CA2D86FAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "7BCEB6FF-668F-4313-9264-0BF021AFC45F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p20:*:*:*:*:*:*", + "matchCriteriaId": "F8B27218-A4FF-47BE-B578-6DB704478921" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p21:*:*:*:*:*:*", + "matchCriteriaId": "8735357F-16A7-4408-9DDD-1C6796BADBE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p22:*:*:*:*:*:*", + "matchCriteriaId": "4505098C-0A2B-481E-A3DF-D6DF8EFA4DE7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p23:*:*:*:*:*:*", + "matchCriteriaId": "C12AFCCF-014E-4EEB-8F04-F1ACE182BA98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p24:*:*:*:*:*:*", + "matchCriteriaId": "66B85557-D5EC-4AF4-B97A-D2B80A58B3B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p25:*:*:*:*:*:*", + "matchCriteriaId": "233ECD21-FA72-43AF-8E4C-DAC27CC18F3C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p26:*:*:*:*:*:*", + "matchCriteriaId": "8B4DB8EE-C10A-4097-8E66-2932BAEB732E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p27:*:*:*:*:*:*", + "matchCriteriaId": "8653402A-C5AA-4CB1-8742-A12CCBE59373" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p28:*:*:*:*:*:*", + "matchCriteriaId": "77047A82-E6D5-4E84-9BEC-ACD2FDA91FAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p29:*:*:*:*:*:*", + "matchCriteriaId": "2E44AE62-1746-410F-A28E-F8292E1F8D68" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "E2342E2D-58B0-43E7-8C01-DF4678520F39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p30:*:*:*:*:*:*", + "matchCriteriaId": "B6C1AC39-5AE0-4FC8-93FF-966400B074F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p31:*:*:*:*:*:*", + "matchCriteriaId": "68455233-52CD-44B8-8B02-D94BA84DA6A8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p32:*:*:*:*:*:*", + "matchCriteriaId": "1C95A313-7665-4877-B421-0D20E3D3D54D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p33:*:*:*:*:*:*", + "matchCriteriaId": "0AEF278D-D782-4A2B-B1B8-19A21D151AA2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p34:*:*:*:*:*:*", + "matchCriteriaId": "B027FE8B-1802-4449-A0CB-6D15F9634559" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p35:*:*:*:*:*:*", + "matchCriteriaId": "9B2BC55F-17AE-4BC4-824D-06BE9B15516C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p36:*:*:*:*:*:*", + "matchCriteriaId": "1393F094-2D75-44CC-8783-4FDC7450D38E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "1871B646-CA69-477F-B113-B901AC7B3934" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "EEC65A72-CAE1-4E28-83EF-7ECAFE921BB6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p6:*:*:*:*:*:*", + "matchCriteriaId": "D8FDECBC-8213-495F-A932-C4310F7C1F87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p7:*:*:*:*:*:*", + "matchCriteriaId": "CB49BC95-6AA8-4F53-A3D6-E199BF756AAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p8:*:*:*:*:*:*", + "matchCriteriaId": "050B6617-8FD4-47A6-BE4A-A52503A65812" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p9:*:*:*:*:*:*", + "matchCriteriaId": "4CA0FEC5-7036-47AF-A341-873B6C324B58" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:-:*:*:*:*:*:*", + "matchCriteriaId": "83202950-840A-4CB7-AD96-CE62E84FABD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b1:*:*:*:*:*:*", + "matchCriteriaId": "1A020A77-7D84-4557-9B0B-D74A89BC1538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b2:*:*:*:*:*:*", + "matchCriteriaId": "D9770554-978B-4552-9E0E-CD6B6675243C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b3:*:*:*:*:*:*", + "matchCriteriaId": "1883D2F4-CB96-4DDE-87E8-D1990A3FA092" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b4:*:*:*:*:*:*", + "matchCriteriaId": "99AD6F39-AF67-4CB9-BED2-00CA75B9F5DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b5:*:*:*:*:*:*", + "matchCriteriaId": "F08FE580-67D4-419C-AE4A-3B9EBC6A2838" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:b6:*:*:*:*:*:*", + "matchCriteriaId": "9DD5C67F-CD3E-400E-802D-8B52408A259F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p1:*:*:*:*:*:*", + "matchCriteriaId": "310A2FA2-633A-48FB-A5C2-9A9A922E72E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p10:*:*:*:*:*:*", + "matchCriteriaId": "3C0F1DC8-D9DF-4A7A-80DC-618FAB091375" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p11:*:*:*:*:*:*", + "matchCriteriaId": "9B0A1E3E-1B5A-4346-95BC-DE6FF6EE14CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p12:*:*:*:*:*:*", + "matchCriteriaId": "EB52B2A7-BDC1-4A4F-ABAF-69C1BA8E83C2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p13:*:*:*:*:*:*", + "matchCriteriaId": "9F89225F-6969-4D89-B889-9CB09972825B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p14:*:*:*:*:*:*", + "matchCriteriaId": "2A1B23EA-4571-4E4E-80BC-FD76FFD83FFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p15:*:*:*:*:*:*", + "matchCriteriaId": "625A6998-5DAE-4538-9760-20523CCE501F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p16:*:*:*:*:*:*", + "matchCriteriaId": "6EFD4461-2C37-418F-90AD-3A956B2D91C7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p17:*:*:*:*:*:*", + "matchCriteriaId": "88523633-844C-41FE-ADF1-74D6AA2BCE6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p18:*:*:*:*:*:*", + "matchCriteriaId": "5DA03E01-06D1-4E18-9C7B-CB6E49E5954B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p19:*:*:*:*:*:*", + "matchCriteriaId": "91F171B6-7F9A-4B9B-B53D-277FE74124F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p2:*:*:*:*:*:*", + "matchCriteriaId": "7D1993E3-C4F9-4D78-BD02-A0B22D93BF1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p20:*:*:*:*:*:*", + "matchCriteriaId": "34FF7D09-2129-4266-BF71-5424DC9E18B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p21:*:*:*:*:*:*", + "matchCriteriaId": "246F0BA5-F927-4204-97F3-51870072599F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p3:*:*:*:*:*:*", + "matchCriteriaId": "B28A0C9D-072A-413C-8587-CD57CB918190" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p4:*:*:*:*:*:*", + "matchCriteriaId": "DF22D0A7-82B1-4598-B8C5-BDFE523D07F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p5:*:*:*:*:*:*", + "matchCriteriaId": "20035AFB-75B4-4164-9833-A2FCAE24B577" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p6:*:*:*:*:*:*", + "matchCriteriaId": "8BCBACEB-7130-455D-B4BE-243053C116DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p7:*:*:*:*:*:*", + "matchCriteriaId": "156384E2-E04B-4153-A91F-3F307C9FEAE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p8:*:*:*:*:*:*", + "matchCriteriaId": "EEC0ED95-F43B-46D7-9AA0-A0FB1C32EF1D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:checkmk:checkmk:2.3.0:p9:*:*:*:*:*:*", + "matchCriteriaId": "91C194C1-5292-4E2A-BB71-9C5CD3CE6194" + } + ] + } + ] } ], "references": [ { "url": "https://checkmk.com/werk/17342", - "source": "security@checkmk.com" + "source": "security@checkmk.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-480xx/CVE-2024-48080.json b/CVE-2024/CVE-2024-480xx/CVE-2024-48080.json new file mode 100644 index 00000000000..4aa91d61e1c --- /dev/null +++ b/CVE-2024/CVE-2024-480xx/CVE-2024-48080.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48080", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-03T19:15:09.947", + "lastModified": "2024-12-03T19:15:09.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in aedes v0.51.2 allows attackers to cause a Denial of Service(DoS) via a crafted request." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://gist.github.com/pengwGit/cd3c1701a9e05b424fa6c60d86845de4", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50948.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50948.json new file mode 100644 index 00000000000..48729fe188c --- /dev/null +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50948.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-50948", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-03T19:15:10.580", + "lastModified": "2024-12-03T19:15:10.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in mochiMQTT v2.6.3 allows attackers to cause a Denial of Service (DoS) via a crafted request." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/pengwGit/39760ed5ae03171622ca8215dc0d8c60", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/mochi-mqtt/server", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51114.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51114.json new file mode 100644 index 00000000000..06447edb1dc --- /dev/null +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51114.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-51114", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-03T20:15:15.360", + "lastModified": "2024-12-03T20:15:15.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in Beijing Digital China Yunke Information Technology Co.Ltd v.7.2.6.120 allows a remote attacker to execute arbitrary code via the code/function/dpi/web_auth/customizable.php file" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ZackSecurity/VulnerReport/blob/cve/DCN/2.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-513xx/CVE-2024-51363.json b/CVE-2024/CVE-2024-513xx/CVE-2024-51363.json new file mode 100644 index 00000000000..5ce0a37e028 --- /dev/null +++ b/CVE-2024/CVE-2024-513xx/CVE-2024-51363.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-51363", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-03T22:15:05.013", + "lastModified": "2024-12-03T22:15:05.013", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insecure deserialization in Hodoku v2.3.0 to v2.3.2 allows attackers to execute arbitrary code." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Gelcon/PoC-of-Hodoku-V2.3.0-RCE", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-513xx/CVE-2024-51378.json b/CVE-2024/CVE-2024-513xx/CVE-2024-51378.json index 6832dbd5753..c946f0c5dc5 100644 --- a/CVE-2024/CVE-2024-513xx/CVE-2024-51378.json +++ b/CVE-2024/CVE-2024-513xx/CVE-2024-51378.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51378", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T23:15:04.083", - "lastModified": "2024-11-01T12:57:03.417", + "lastModified": "2024-12-03T19:15:10.807", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -23,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 10.0, - "baseSeverity": "CRITICAL" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 6.0 @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-276" + "value": "CWE-77" } ] } diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51771.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51771.json new file mode 100644 index 00000000000..d2d07662c6c --- /dev/null +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51771.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51771", + "sourceIdentifier": "security-alert@hpe.com", + "published": "2024-12-03T20:15:15.477", + "lastModified": "2024-12-03T22:15:05.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the HPE Aruba Networking ClearPass Policy Manager web-based management interface could allow an authenticated remote threat actor to conduct a remote code execution attack. Successful exploitation could enable the attacker to run arbitrary commands on the underlying operating system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04761en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51772.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51772.json new file mode 100644 index 00000000000..ed0339f2dc1 --- /dev/null +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51772.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51772", + "sourceIdentifier": "security-alert@hpe.com", + "published": "2024-12-03T21:15:07.140", + "lastModified": "2024-12-03T22:15:05.310", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authenticated RCE vulnerability in the ClearPass Policy Manager web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04761en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51773.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51773.json new file mode 100644 index 00000000000..a58a4b44d64 --- /dev/null +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51773.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-51773", + "sourceIdentifier": "security-alert@hpe.com", + "published": "2024-12-03T21:15:07.280", + "lastModified": "2024-12-03T22:15:05.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the HPE Aruba Networking ClearPass Policy Manager web-based management interface could allow an authenticated remote Attacker to conduct a stored cross-site scripting (XSS) attack. Successful exploitation could enable a threat actor to perform any actions the user is authorized to do, including accessing the user's data and altering information within the user's permissions. This could lead to data modification, deletion, or theft, including unauthorized access to files, file deletion, or the theft of session cookies, which an attacker could use to hijack a user's session." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04761en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52544.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52544.json index 517c3f812d3..41e16009e1a 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52544.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52544.json @@ -2,7 +2,7 @@ "id": "CVE-2024-52544", "sourceIdentifier": "cve@rapid7.com", "published": "2024-12-03T18:15:15.327", - "lastModified": "2024-12-03T18:15:15.327", + "lastModified": "2024-12-03T21:15:07.390", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -51,6 +51,10 @@ { "url": "https://github.com/sfewer-r7/LorexExploit", "source": "cve@rapid7.com" + }, + { + "url": "https://www.rapid7.com/blog/post/2024/12/03/lorex-2k-indoor-wi-fi-security-camera-multiple-vulnerabilities-fixed/", + "source": "cve@rapid7.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52545.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52545.json index 463140d953b..32b976f70ad 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52545.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52545.json @@ -2,7 +2,7 @@ "id": "CVE-2024-52545", "sourceIdentifier": "cve@rapid7.com", "published": "2024-12-03T18:15:15.543", - "lastModified": "2024-12-03T18:15:15.543", + "lastModified": "2024-12-03T21:15:07.490", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -51,6 +51,10 @@ { "url": "https://github.com/sfewer-r7/LorexExploit", "source": "cve@rapid7.com" + }, + { + "url": "https://www.rapid7.com/blog/post/2024/12/03/lorex-2k-indoor-wi-fi-security-camera-multiple-vulnerabilities-fixed/", + "source": "cve@rapid7.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52546.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52546.json index 8d55cdf3498..fa516477d20 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52546.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52546.json @@ -2,7 +2,7 @@ "id": "CVE-2024-52546", "sourceIdentifier": "cve@rapid7.com", "published": "2024-12-03T18:15:15.710", - "lastModified": "2024-12-03T18:15:15.710", + "lastModified": "2024-12-03T21:15:07.593", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -51,6 +51,10 @@ { "url": "https://github.com/sfewer-r7/LorexExploit", "source": "cve@rapid7.com" + }, + { + "url": "https://www.rapid7.com/blog/post/2024/12/03/lorex-2k-indoor-wi-fi-security-camera-multiple-vulnerabilities-fixed/", + "source": "cve@rapid7.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52547.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52547.json index 4b868280cd1..a5285ad0bf7 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52547.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52547.json @@ -2,7 +2,7 @@ "id": "CVE-2024-52547", "sourceIdentifier": "cve@rapid7.com", "published": "2024-12-03T18:15:15.860", - "lastModified": "2024-12-03T18:15:15.860", + "lastModified": "2024-12-03T21:15:07.707", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -51,6 +51,10 @@ { "url": "https://github.com/sfewer-r7/LorexExploit", "source": "cve@rapid7.com" + }, + { + "url": "https://www.rapid7.com/blog/post/2024/12/03/lorex-2k-indoor-wi-fi-security-camera-multiple-vulnerabilities-fixed/", + "source": "cve@rapid7.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52548.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52548.json index 8171c56100f..92f81f581aa 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52548.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52548.json @@ -2,7 +2,7 @@ "id": "CVE-2024-52548", "sourceIdentifier": "cve@rapid7.com", "published": "2024-12-03T18:15:16.023", - "lastModified": "2024-12-03T18:15:16.023", + "lastModified": "2024-12-03T22:15:05.567", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -51,6 +51,10 @@ { "url": "https://github.com/sfewer-r7/LorexExploit", "source": "cve@rapid7.com" + }, + { + "url": "https://www.rapid7.com/blog/post/2024/12/03/lorex-2k-indoor-wi-fi-security-camera-multiple-vulnerabilities-fixed/", + "source": "cve@rapid7.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53059.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53059.json index 862d8a41b62..99433aef21a 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53059.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53059.json @@ -2,44 +2,183 @@ "id": "CVE-2024-53059", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-19T18:15:25.833", - "lastModified": "2024-11-19T21:56:45.533", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-03T20:57:20.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: mvm: Fix response handling in iwl_mvm_send_recovery_cmd()\n\n1. The size of the response packet is not validated.\n2. The response buffer is not freed.\n\nResolve these issues by switching to iwl_mvm_send_cmd_status(),\nwhich handles both size validation and frees the buffer." + }, + { + "lang": "es", + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: mvm: Se ha corregido el manejo de respuestas en iwl_mvm_send_recovery_cmd() 1. No se valida el tama\u00f1o del paquete de respuesta. 2. No se libera el b\u00fafer de respuesta. Resuelva estos problemas cambiando a iwl_mvm_send_cmd_status(), que maneja tanto la validaci\u00f3n del tama\u00f1o como la liberaci\u00f3n del b\u00fafer." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1", + "versionEndExcluding": "5.4.285", + "matchCriteriaId": "1182B577-D9D7-4DC8-AAA4-C3BCAC9E115C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.229", + "matchCriteriaId": "1A03CABE-9B43-4E7F-951F-10DEEADAA426" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.171", + "matchCriteriaId": "2BE18665-48ED-417A-90AA-41F3AC0B4E9A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.116", + "matchCriteriaId": "43EFDC15-E4D4-4F1E-B70D-62F0854BFDF3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.60", + "matchCriteriaId": "75088E5E-2400-4D20-915F-7A65C55D9CCD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.7", + "matchCriteriaId": "E96F53A4-5E87-4A70-BD9A-BC327828D57F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", + "matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*", + "matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/07a6e3b78a65f4b2796a8d0d4adb1a15a81edead", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3eb986c64c6bfb721950f9666a3b723cf65d043f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3f45d590ccbae6dfd6faef54efe74c30bd85d3da", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/45a628911d3c68e024eed337054a0452b064f450", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/64d63557ded6ff3ce72b18ab87a6c4b1b652161c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9480c3045f302f43f9910d2d556d6cf5a62c1822", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9c98ee7ea463a838235e7a0e35851b38476364f2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53060.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53060.json index ba0933a4ff7..6818bf15e18 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53060.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53060.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53060", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-19T18:15:25.917", - "lastModified": "2024-12-02T08:15:08.027", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-12-03T20:49:04.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,188 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu: evitar la desreferenciaci\u00f3n de punteros NULL si no se admite ATIF acpi_evaluate_object() puede devolver AE_NOT_FOUND (error), lo que provocar\u00eda la desreferenciaci\u00f3n de buffer.pointer (obj) mientras sea NULL. Aunque este caso puede ser poco realista para el c\u00f3digo actual, sigue siendo mejor protegerse contra posibles errores. Tambi\u00e9n se debe abandonar cuando el estado sea AE_NOT_FOUND. Esto soluciona 1 problema de FORWARD_NULL informado por Coverity Report: CID 1600951: Desreferencias de punteros nulos (FORWARD_NULL) (seleccionado de el commit 91c9e221fe2553edf2db71627d8453f083de87a1)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.19.324", + "matchCriteriaId": "0EBF3108-DBF4-4E6D-B699-384F2299858B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.286", + "matchCriteriaId": "9952C897-8A61-4D4B-9D6D-7D063E9EA15E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.230", + "matchCriteriaId": "BF5B32D0-72C9-41C3-A0BB-D4946153C134" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.172", + "matchCriteriaId": "88812664-4296-42AC-AE0F-ED71086C1BB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.117", + "matchCriteriaId": "0DD7F755-2F6B-4707-8973-78496AD5AA8E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.61", + "matchCriteriaId": "630ED7EB-C97E-4435-B884-1E309E40D6F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.8", + "matchCriteriaId": "0BD000F7-3DAD-4DD3-8906-98EA1EC67E95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", + "matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc5:*:*:*:*:*:*", + "matchCriteriaId": "24DBE6C7-2AAE-4818-AED2-E131F153D2FA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc6:*:*:*:*:*:*", + "matchCriteriaId": "24B88717-53F5-42AA-9B72-14C707639E3F" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1a9f55ed5b512f510ccd21ad527d532e60550e80", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/27fc29b5376998c126c85cf9b15d9dfc2afc9cbe", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/2ac7f253deada4d449559b65a1c1cd0a6f6f19b7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8d7a28eca7553d35d4ce192fa1f390f2357df41b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a613a392417532ca5aaf3deac6e3277aa7aaef2b", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/a6dd15981c03f2cdc9a351a278f09b5479d53d2e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/b9d9881237afeb52eddd70077b7174bf17e2fa30", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ce8a00a00e36f61f5a1e47734332420b68784c43", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53375.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53375.json index 7122d79b7dd..2dfe269e0f5 100644 --- a/CVE-2024/CVE-2024-533xx/CVE-2024-53375.json +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53375.json @@ -2,16 +2,55 @@ "id": "CVE-2024-53375", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-02T22:15:10.507", - "lastModified": "2024-12-02T22:15:10.507", + "lastModified": "2024-12-03T20:15:15.820", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Authenticated remote code execution (RCE) vulnerabilities affect TP-Link Archer, Deco, and Tapo series routers. A vulnerability exists in the \"tmp_get_sites\" function of the HomeShield functionality provided by TP-Link. This vulnerability is still exploitable without the installation or activation of the HomeShield functionality." + }, + { + "lang": "es", + "value": " Las vulnerabilidades de ejecuci\u00f3n remota de c\u00f3digo (RCE) autenticada afectan a los enrutadores de las series Archer, Deco y Tapo de TP-Link. Existe una vulnerabilidad en la funci\u00f3n \"tmp_get_sites\" de la funcionalidad HomeShield proporcionada por TP-Link. Esta vulnerabilidad a\u00fan se puede explotar sin la instalaci\u00f3n o activaci\u00f3n de la funcionalidad HomeShield." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ThottySploity/CVE-2024-53375", diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53502.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53502.json new file mode 100644 index 00000000000..61e31ff62bc --- /dev/null +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53502.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-53502", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-03T22:15:05.683", + "lastModified": "2024-12-03T22:15:05.683", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Seecms v4.8 was discovered to contain a SQL injection vulnerability in the SEMCMS_SeoAndTag.php page." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Megrez0423/sescms4.8/tree/main", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53564.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53564.json index 3cab1d90c80..c45c72287fe 100644 --- a/CVE-2024/CVE-2024-535xx/CVE-2024-53564.json +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53564.json @@ -2,13 +2,13 @@ "id": "CVE-2024-53564", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-02T18:15:11.353", - "lastModified": "2024-12-03T15:15:11.373", + "lastModified": "2024-12-03T21:15:07.807", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An authenticated arbitrary file upload vulnerability in the component /module_admin/upload.php of freepbx v17.0.19.17 allows attackers to execute arbitrary code via uploading a crafted file." + "value": "A serious vulnerability was discovered in FreePBX 17.0.19.17. FreePBX does not verify the type of uploaded files and does not restrict user access paths, allowing attackers to remotely control the FreePBX server by uploading malicious files with malicious content and accessing the default directory where the files are uploaded. This will result in particularly serious consequences." }, { "lang": "es", @@ -55,6 +55,10 @@ { "url": "https://gist.github.com/hyp164D1/490732de230edf97423f6d95b0d2f903", "source": "cve@mitre.org" + }, + { + "url": "https://gist.github.com/hyp164D1/d419bdf3e7e352088a21631d0f452a8c", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53672.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53672.json new file mode 100644 index 00000000000..f5732897874 --- /dev/null +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53672.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-53672", + "sourceIdentifier": "security-alert@hpe.com", + "published": "2024-12-03T21:15:07.990", + "lastModified": "2024-12-03T21:15:07.990", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the ClearPass Policy Manager web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. Successful exploit could allow an attacker to execute arbitrary commands as a lower privileged user on the underlying operating system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-alert@hpe.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ] + }, + "references": [ + { + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04761en_us&docLocale=en_US", + "source": "security-alert@hpe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53921.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53921.json new file mode 100644 index 00000000000..448279ffba1 --- /dev/null +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53921.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-53921", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-03T19:15:11.957", + "lastModified": "2024-12-03T20:15:16.153", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in the installer in Samsung Magician 8.1.0 on Windows. An attacker can create arbitrary folders in the system permission directory via a symbolic link during the installation process." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 2.8, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + }, + { + "lang": "en", + "value": "CWE-1236" + } + ] + } + ], + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53937.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53937.json index 89f361da830..21b19646858 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53937.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53937.json @@ -2,16 +2,55 @@ "id": "CVE-2024-53937", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-02T23:15:05.673", - "lastModified": "2024-12-02T23:15:05.673", + "lastModified": "2024-12-03T19:15:12.127", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered on Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0) devices. The TELNET service is enabled by default with admin/admin as default credentials and is exposed over the LAN. The allows attackers to execute arbitrary commands with root-level permissions. Device setup does not require this password to be changed during setup in order to utilize the device. (However, the TELNET password is dictated by the current GUI password.)" + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en los dispositivos Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0). El servicio TELNET est\u00e1 habilitado de forma predeterminada con admin/admin como credenciales predeterminadas y est\u00e1 expuesto a trav\u00e9s de la LAN. Esto permite a los atacantes ejecutar comandos arbitrarios con permisos de nivel root. La configuraci\u00f3n del dispositivo no requiere que se cambie esta contrase\u00f1a durante la configuraci\u00f3n para poder utilizar el dispositivo. (Sin embargo, la contrase\u00f1a de TELNET est\u00e1 determinada por la contrase\u00f1a de la GUI actual)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/actuator/cve/blob/main/Victure/CVE-2024-53937.txt", diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53938.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53938.json index 10ef8baf089..a00fd1c8488 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53938.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53938.json @@ -2,16 +2,55 @@ "id": "CVE-2024-53938", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-02T22:15:10.633", - "lastModified": "2024-12-02T22:15:10.633", + "lastModified": "2024-12-03T19:15:12.330", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0) devices. The TELNET service is enabled by default and exposed over the LAN. The root account is accessible without a password, allowing attackers to achieve full control over the router remotely without any authentication." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en los dispositivos Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0). El servicio TELNET est\u00e1 habilitado de forma predeterminada y expuesto a trav\u00e9s de la LAN. Se puede acceder a la cuenta root sin una contrase\u00f1a, lo que permite a los atacantes lograr un control total sobre el enrutador de forma remota sin ninguna autenticaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/actuator/cve/blob/main/Victure/CVE-2024-53938.txt", diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53939.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53939.json index 932570e1bf0..ac96a8f9d5f 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53939.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53939.json @@ -2,16 +2,55 @@ "id": "CVE-2024-53939", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-02T22:15:10.757", - "lastModified": "2024-12-02T22:15:10.757", + "lastModified": "2024-12-03T19:15:12.690", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0) devices. The /cgi-bin/luci/admin/opsw/Dual_freq_un_apple endpoint is vulnerable to command injection through the 2.4 GHz and 5 GHz name parameters, allowing an attacker to execute arbitrary commands on the device (with root-level permissions) via crafted input." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en los dispositivos Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0). El endpoint /cgi-bin/luci/admin/opsw/Dual_freq_un_apple es vulnerable a la inyecci\u00f3n de comandos a trav\u00e9s de los par\u00e1metros de nombre de 2,4 GHz y 5 GHz, lo que permite que un atacante ejecute comandos arbitrarios en el dispositivo (con permisos de nivel root) a trav\u00e9s de una entrada manipulada." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/actuator/cve/blob/main/Victure/CVE-2024-53939.txt", diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53940.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53940.json index 9dbb5ae46c3..4b490686a2c 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53940.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53940.json @@ -2,16 +2,55 @@ "id": "CVE-2024-53940", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-02T22:15:10.880", - "lastModified": "2024-12-02T22:15:10.880", + "lastModified": "2024-12-03T19:15:12.910", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0) devices. Certain /cgi-bin/luci/admin endpoints are vulnerable to command injection. Attackers can exploit this by sending crafted payloads through parameters intended for the ping utility, enabling arbitrary command execution with root-level permissions on the device." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en los dispositivos Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0). Algunos puntos finales /cgi-bin/luci/admin son vulnerables a la inyecci\u00f3n de comandos. Los atacantes pueden aprovechar esto enviando payloads manipulados a trav\u00e9s de par\u00e1metros destinados a la utilidad ping, lo que permite la ejecuci\u00f3n arbitraria de comandos con permisos de nivel root en el dispositivo." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/actuator/cve/blob/main/Victure/CVE-2024-53940.txt", diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53941.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53941.json index 0aaf3bea81b..a1b52781f53 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53941.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53941.json @@ -2,16 +2,55 @@ "id": "CVE-2024-53941", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-02T22:15:10.993", - "lastModified": "2024-12-02T22:15:10.993", + "lastModified": "2024-12-03T19:15:13.113", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0) devices. A remote attacker (in proximity to a Wi-Fi network) can derive the default Wi-Fi PSK value via the last 4 octets of the BSSID." + }, + { + "lang": "es", + "value": " Se descubri\u00f3 un problema en los dispositivos Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0). Un atacante remoto (en proximidad a una red Wi-Fi) puede obtener el valor PSK de Wi-Fi predeterminado a trav\u00e9s de los \u00faltimos 4 octetos del BSSID." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/actuator/cve/blob/main/Victure/CVE-2024-53941.txt", diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54131.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54131.json new file mode 100644 index 00000000000..af584f09f09 --- /dev/null +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54131.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-54131", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-03T21:15:08.127", + "lastModified": "2024-12-03T21:15:08.127", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Kolide Agent (aka: Launcher) is the lightweight agent designed to work with Kolide's service. An implementation bug in the Kolide Agent (known as `launcher`) allows for local privilege escalation to the SYSTEM user on Windows 10 and 11. The bug was introduced in version 1.5.3 when launcher started storing upgraded binaries in the ProgramData directory. This move to the new directory meant the launcher root directory inherited default permissions that are not as strict as the previous location. These incorrect default permissions in conjunction with an omitted SystemDrive environmental variable (when launcher starts osqueryd), allows a malicious actor with access to the local Windows device to successfully place an arbitrary DLL into the osqueryd process's search path. Under some circumstances, this DLL will be executed when osqueryd performs a WMI query. This combination of events could then allow the attacker to escalate their privileges to SYSTEM. Impacted versions include versions >= 1.5.3 and the fix has been released in 1.12.3." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + }, + { + "lang": "en", + "value": "CWE-456" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/kolide/launcher/pull/1510", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/kolide/launcher/security/advisories/GHSA-66q9-2rvx-qfj5", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7391.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7391.json index 7d1d033d835..1fef0fe469e 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7391.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7391.json @@ -2,15 +2,42 @@ "id": "CVE-2024-7391", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T22:15:17.893", - "lastModified": "2024-11-22T22:15:17.893", - "vulnStatus": "Received", + "lastModified": "2024-12-03T21:44:10.397", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "ChargePoint Home Flex Bluetooth Low Energy Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of ChargePoint Home Flex charging devices. User interaction is required to exploit this vulnerability.\n\nThe specific flaw exists within the Wi-Fi setup logic. By connecting to the device over Bluetooth Low Energy during the setup process, an attacker can obtain Wi-Fi credentials. An attacker can leverage this vulnerability to disclose credentials and gain access to the device owner's Wi-Fi network. Was ZDI-CAN-21454." + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de Bluetooth Low Energy en ChargePoint Home Flex. Esta vulnerabilidad permite a los atacantes adyacentes a la red divulgar informaci\u00f3n confidencial sobre las instalaciones afectadas de los dispositivos de carga ChargePoint Home Flex. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad. La falla espec\u00edfica existe dentro de la l\u00f3gica de configuraci\u00f3n de Wi-Fi. Al conectarse al dispositivo a trav\u00e9s de Bluetooth Low Energy durante el proceso de configuraci\u00f3n, un atacante puede obtener credenciales de Wi-Fi. Un atacante puede aprovechar esta vulnerabilidad para divulgar credenciales y obtener acceso a la red Wi-Fi del propietario del dispositivo. Era ZDI-CAN-21454." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -37,19 +64,61 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:chargepoint:home_flex_firmware:5.5.3.13:*:*:*:*:*:*:*", + "matchCriteriaId": "634EF904-F103-4F4B-8A50-64E4D67B3FD0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:chargepoint:home_flex:-:*:*:*:*:*:*:*", + "matchCriteriaId": "868D932A-A1D8-46A5-9167-7BC45E5F014B" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1046/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-73xx/CVE-2024-7392.json b/CVE-2024/CVE-2024-73xx/CVE-2024-7392.json index b239c353407..c8e347fb379 100644 --- a/CVE-2024/CVE-2024-73xx/CVE-2024-7392.json +++ b/CVE-2024/CVE-2024-73xx/CVE-2024-7392.json @@ -2,15 +2,42 @@ "id": "CVE-2024-7392", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T22:15:18.013", - "lastModified": "2024-11-22T22:15:18.013", - "vulnStatus": "Received", + "lastModified": "2024-12-03T22:17:52.127", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "ChargePoint Home Flex Bluetooth Low Energy Denial-of-Service Vulnerability. This vulnerability allows network-adjacent attackers to create a denial-of-service condition on affected installations of ChargePoint Home Flex charging devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the connection handling of the Bluetooth Low Energy interface. The issue results from limiting the number of active connections to the product. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-21455." + }, + { + "lang": "es", + "value": "Vulnerabilidad de denegaci\u00f3n de servicio de Bluetooth Low Energy en ChargePoint Home Flex. Esta vulnerabilidad permite a los atacantes adyacentes a la red crear una condici\u00f3n de denegaci\u00f3n de servicio en las instalaciones afectadas de los dispositivos de carga ChargePoint Home Flex. No se requiere autenticaci\u00f3n para explotar esta vulnerabilidad. La falla espec\u00edfica existe en el manejo de la conexi\u00f3n de la interfaz Bluetooth Low Energy. El problema es el resultado de limitar la cantidad de conexiones activas al producto. Un atacante puede aprovechar esta vulnerabilidad para crear una condici\u00f3n de denegaci\u00f3n de servicio en el sistema. Era ZDI-CAN-21455." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -37,19 +64,61 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-410" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:chargepoint:home_flex_firmware:5.5.3.13:*:*:*:*:*:*:*", + "matchCriteriaId": "634EF904-F103-4F4B-8A50-64E4D67B3FD0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:chargepoint:home_flex:-:*:*:*:*:*:*:*", + "matchCriteriaId": "868D932A-A1D8-46A5-9167-7BC45E5F014B" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1047/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7409.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7409.json index 04b91d68b7a..7191e07aabd 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7409.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7409.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7409", "sourceIdentifier": "secalert@redhat.com", "published": "2024-08-05T14:15:35.813", - "lastModified": "2024-11-12T17:15:10.833", + "lastModified": "2024-12-03T20:15:16.387", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -23,6 +23,8 @@ "cvssData": { "version": "3.0", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 7.5, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 3.6 @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:10518", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2024:6811", "source": "secalert@redhat.com" @@ -68,10 +72,22 @@ "url": "https://access.redhat.com/errata/RHSA-2024:7408", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:8991", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/errata/RHSA-2024:9136", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9620", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9912", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-7409", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7509.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7509.json index 6b1b25e01fa..7baeb168206 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7509.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7509.json @@ -2,15 +2,42 @@ "id": "CVE-2024-7509", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T22:15:18.250", - "lastModified": "2024-11-22T22:15:18.250", - "vulnStatus": "Received", + "lastModified": "2024-12-03T21:54:37.137", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "Trimble SketchUp SKP File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of SKP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-19576." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo por desbordamiento del b\u00fafer basado en pila en el an\u00e1lisis de archivos SKP de Trimble SketchUp. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Trimble SketchUp. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos SKP. El problema es el resultado de la falta de una validaci\u00f3n adecuada de la longitud de los datos proporcionados por el usuario antes de copiarlos en un b\u00fafer basado en pila. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-19576." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -37,19 +64,49 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trimble:sketchup:22.0.354.0:*:*:*:-:*:*:*", + "matchCriteriaId": "FC326904-121E-497E-9CEA-637D86F1CDB9" + } + ] + } + ] } ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1055/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7510.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7510.json index 6b87a16dd11..74908a87926 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7510.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7510.json @@ -2,15 +2,42 @@ "id": "CVE-2024-7510", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T22:15:18.363", - "lastModified": "2024-11-22T22:15:18.363", - "vulnStatus": "Received", + "lastModified": "2024-12-03T21:36:54.357", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "Trimble SketchUp SKP File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Trimble SketchUp. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of SKP files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-19631." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo en el an\u00e1lisis de archivos SKP de Trimble SketchUp. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de Trimble SketchUp. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos SKP. El problema es el resultado de la falta de validaci\u00f3n de la existencia de un objeto antes de realizar operaciones en el objeto. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-19631." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -37,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,10 +73,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trimble:sketchup:22.0.354.0:*:*:*:-:*:*:*", + "matchCriteriaId": "FC326904-121E-497E-9CEA-637D86F1CDB9" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1056/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7511.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7511.json index 9e4e1595746..32cc505bb0f 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7511.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7511.json @@ -2,15 +2,42 @@ "id": "CVE-2024-7511", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T22:15:18.480", - "lastModified": "2024-11-22T22:15:18.480", - "vulnStatus": "Received", + "lastModified": "2024-12-03T21:31:50.467", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "Trimble SketchUp Pro SKP File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Trimble SketchUp Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PSD files embedded in SKP files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-23000." + }, + { + "lang": "es", + "value": "Vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n de lectura fuera de los l\u00edmites en el an\u00e1lisis de archivos SKP de Trimble SketchUp Pro. Esta vulnerabilidad permite a atacantes remotos divulgar informaci\u00f3n confidencial sobre las instalaciones afectadas de Trimble SketchUp Pro. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos PSD incrustados en archivos SKP. El problema es el resultado de la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede dar como resultado una lectura m\u00e1s all\u00e1 del final de un b\u00fafer asignado. Un atacante puede aprovechar esto junto con otras vulnerabilidades para ejecutar c\u00f3digo arbitrario en el contexto del proceso actual. Era ZDI-CAN-23000." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -46,10 +73,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:trimble:sketchup:23.1.340:*:*:*:pro:*:*:*", + "matchCriteriaId": "C7B0F715-120A-450D-B7DC-5DB375A986E2" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1057/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7998.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7998.json index 232eb03c15d..c65cb35915f 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7998.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7998.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7998", "sourceIdentifier": "security@octopus.com", "published": "2024-08-21T06:15:13.830", - "lastModified": "2024-08-21T12:30:33.697", + "lastModified": "2024-12-03T19:15:13.330", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -23,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N", + "baseScore": 2.6, + "baseSeverity": "LOW", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "HIGH", @@ -30,15 +32,25 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 2.6, - "baseSeverity": "LOW" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.0, "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], "references": [ { "url": "https://advisories.octopus.com/post/2024/sa2024-07/", diff --git a/CVE-2024/CVE-2024-88xx/CVE-2024-8838.json b/CVE-2024/CVE-2024-88xx/CVE-2024-8838.json index 637cbcff539..6c2453e6242 100644 --- a/CVE-2024/CVE-2024-88xx/CVE-2024-8838.json +++ b/CVE-2024/CVE-2024-88xx/CVE-2024-8838.json @@ -2,15 +2,42 @@ "id": "CVE-2024-8838", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T21:15:22.317", - "lastModified": "2024-11-22T21:15:22.317", - "vulnStatus": "Received", + "lastModified": "2024-12-03T22:06:42.107", + "vulnStatus": "Analyzed", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "PDF-XChange Editor XPS File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of XPS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24409." + }, + { + "lang": "es", + "value": "Vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remoto en el an\u00e1lisis de archivos XPS fuera de los l\u00edmites en PDF-XChange Editor. Esta vulnerabilidad permite a atacantes remotos ejecutar c\u00f3digo arbitrario en las instalaciones afectadas de PDF-XChange Editor. Se requiere la interacci\u00f3n del usuario para explotar esta vulnerabilidad, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica existe en el an\u00e1lisis de archivos XPS. El problema es el resultado de la falta de una validaci\u00f3n adecuada de los datos proporcionados por el usuario, lo que puede provocar una lectura m\u00e1s all\u00e1 del final de un b\u00fafer asignado. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del proceso actual. Era ZDI-CAN-24409." } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -37,7 +64,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -46,10 +73,36 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pdf-xchange:pdf-tools:10.3.0.386:*:*:*:*:*:*:*", + "matchCriteriaId": "C93EFAC4-4B02-41B1-A788-0A7FC98CD499" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:10.3.0.386:*:*:*:*:*:*:*", + "matchCriteriaId": "207FF12C-548C-425F-9474-61148DBE69C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1261/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 3eb5bf4cf9f..34e9d1c4933 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-03T19:00:25.275105+00:00 +2024-12-03T23:00:27.651512+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-03T18:46:38.467000+00:00 +2024-12-03T22:23:53.200000+00:00 ``` ### Last Data Feed Release @@ -33,67 +33,59 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -272016 +272031 ``` ### CVEs added in the last Commit -Recently added CVEs: `23` +Recently added CVEs: `15` -- [CVE-2021-29892](CVE-2021/CVE-2021-298xx/CVE-2021-29892.json) (`2024-12-03T17:15:05.760`) -- [CVE-2023-7255](CVE-2023/CVE-2023-72xx/CVE-2023-7255.json) (`2024-12-03T18:15:12.743`) -- [CVE-2024-25019](CVE-2024/CVE-2024-250xx/CVE-2024-25019.json) (`2024-12-03T17:15:09.560`) -- [CVE-2024-25020](CVE-2024/CVE-2024-250xx/CVE-2024-25020.json) (`2024-12-03T18:15:12.997`) -- [CVE-2024-25035](CVE-2024/CVE-2024-250xx/CVE-2024-25035.json) (`2024-12-03T17:15:09.753`) -- [CVE-2024-25036](CVE-2024/CVE-2024-250xx/CVE-2024-25036.json) (`2024-12-03T17:15:09.923`) -- [CVE-2024-29404](CVE-2024/CVE-2024-294xx/CVE-2024-29404.json) (`2024-12-03T17:15:10.087`) -- [CVE-2024-37302](CVE-2024/CVE-2024-373xx/CVE-2024-37302.json) (`2024-12-03T17:15:10.733`) -- [CVE-2024-37303](CVE-2024/CVE-2024-373xx/CVE-2024-37303.json) (`2024-12-03T17:15:10.890`) -- [CVE-2024-40691](CVE-2024/CVE-2024-406xx/CVE-2024-40691.json) (`2024-12-03T17:15:11.037`) -- [CVE-2024-41775](CVE-2024/CVE-2024-417xx/CVE-2024-41775.json) (`2024-12-03T18:15:13.920`) -- [CVE-2024-41776](CVE-2024/CVE-2024-417xx/CVE-2024-41776.json) (`2024-12-03T18:15:14.107`) -- [CVE-2024-41777](CVE-2024/CVE-2024-417xx/CVE-2024-41777.json) (`2024-12-03T18:15:14.293`) -- [CVE-2024-45676](CVE-2024/CVE-2024-456xx/CVE-2024-45676.json) (`2024-12-03T18:15:14.480`) -- [CVE-2024-52544](CVE-2024/CVE-2024-525xx/CVE-2024-52544.json) (`2024-12-03T18:15:15.327`) -- [CVE-2024-52545](CVE-2024/CVE-2024-525xx/CVE-2024-52545.json) (`2024-12-03T18:15:15.543`) -- [CVE-2024-52546](CVE-2024/CVE-2024-525xx/CVE-2024-52546.json) (`2024-12-03T18:15:15.710`) -- [CVE-2024-52547](CVE-2024/CVE-2024-525xx/CVE-2024-52547.json) (`2024-12-03T18:15:15.860`) -- [CVE-2024-52548](CVE-2024/CVE-2024-525xx/CVE-2024-52548.json) (`2024-12-03T18:15:16.023`) -- [CVE-2024-52805](CVE-2024/CVE-2024-528xx/CVE-2024-52805.json) (`2024-12-03T17:15:12.120`) -- [CVE-2024-52815](CVE-2024/CVE-2024-528xx/CVE-2024-52815.json) (`2024-12-03T17:15:12.267`) -- [CVE-2024-53863](CVE-2024/CVE-2024-538xx/CVE-2024-53863.json) (`2024-12-03T17:15:12.633`) -- [CVE-2024-53867](CVE-2024/CVE-2024-538xx/CVE-2024-53867.json) (`2024-12-03T17:15:12.787`) +- [CVE-2024-12053](CVE-2024/CVE-2024-120xx/CVE-2024-12053.json) (`2024-12-03T19:15:08.413`) +- [CVE-2024-40391](CVE-2024/CVE-2024-403xx/CVE-2024-40391.json) (`2024-12-03T22:15:04.740`) +- [CVE-2024-45757](CVE-2024/CVE-2024-457xx/CVE-2024-45757.json) (`2024-12-03T21:15:06.953`) +- [CVE-2024-46625](CVE-2024/CVE-2024-466xx/CVE-2024-46625.json) (`2024-12-03T22:15:04.860`) +- [CVE-2024-48080](CVE-2024/CVE-2024-480xx/CVE-2024-48080.json) (`2024-12-03T19:15:09.947`) +- [CVE-2024-50948](CVE-2024/CVE-2024-509xx/CVE-2024-50948.json) (`2024-12-03T19:15:10.580`) +- [CVE-2024-51114](CVE-2024/CVE-2024-511xx/CVE-2024-51114.json) (`2024-12-03T20:15:15.360`) +- [CVE-2024-51363](CVE-2024/CVE-2024-513xx/CVE-2024-51363.json) (`2024-12-03T22:15:05.013`) +- [CVE-2024-51771](CVE-2024/CVE-2024-517xx/CVE-2024-51771.json) (`2024-12-03T20:15:15.477`) +- [CVE-2024-51772](CVE-2024/CVE-2024-517xx/CVE-2024-51772.json) (`2024-12-03T21:15:07.140`) +- [CVE-2024-51773](CVE-2024/CVE-2024-517xx/CVE-2024-51773.json) (`2024-12-03T21:15:07.280`) +- [CVE-2024-53502](CVE-2024/CVE-2024-535xx/CVE-2024-53502.json) (`2024-12-03T22:15:05.683`) +- [CVE-2024-53672](CVE-2024/CVE-2024-536xx/CVE-2024-53672.json) (`2024-12-03T21:15:07.990`) +- [CVE-2024-53921](CVE-2024/CVE-2024-539xx/CVE-2024-53921.json) (`2024-12-03T19:15:11.957`) +- [CVE-2024-54131](CVE-2024/CVE-2024-541xx/CVE-2024-54131.json) (`2024-12-03T21:15:08.127`) ### CVEs modified in the last Commit -Recently modified CVEs: `32` +Recently modified CVEs: `70` -- [CVE-2023-42859](CVE-2023/CVE-2023-428xx/CVE-2023-42859.json) (`2024-12-03T17:27:41.293`) -- [CVE-2023-42860](CVE-2023/CVE-2023-428xx/CVE-2023-42860.json) (`2024-12-03T17:24:43.420`) -- [CVE-2023-42878](CVE-2023/CVE-2023-428xx/CVE-2023-42878.json) (`2024-12-03T17:17:41.227`) -- [CVE-2023-52345](CVE-2023/CVE-2023-523xx/CVE-2023-52345.json) (`2024-12-03T17:15:08.390`) -- [CVE-2024-20995](CVE-2024/CVE-2024-209xx/CVE-2024-20995.json) (`2024-12-03T17:15:08.597`) -- [CVE-2024-21044](CVE-2024/CVE-2024-210xx/CVE-2024-21044.json) (`2024-12-03T17:15:08.787`) -- [CVE-2024-21052](CVE-2024/CVE-2024-210xx/CVE-2024-21052.json) (`2024-12-03T17:15:08.950`) -- [CVE-2024-21063](CVE-2024/CVE-2024-210xx/CVE-2024-21063.json) (`2024-12-03T17:15:09.103`) -- [CVE-2024-22727](CVE-2024/CVE-2024-227xx/CVE-2024-22727.json) (`2024-12-03T17:15:09.237`) -- [CVE-2024-24426](CVE-2024/CVE-2024-244xx/CVE-2024-24426.json) (`2024-12-03T17:15:09.400`) -- [CVE-2024-28829](CVE-2024/CVE-2024-288xx/CVE-2024-28829.json) (`2024-12-03T17:55:48.257`) -- [CVE-2024-30205](CVE-2024/CVE-2024-302xx/CVE-2024-30205.json) (`2024-12-03T17:15:10.187`) -- [CVE-2024-31695](CVE-2024/CVE-2024-316xx/CVE-2024-31695.json) (`2024-12-03T17:15:10.377`) -- [CVE-2024-34931](CVE-2024/CVE-2024-349xx/CVE-2024-34931.json) (`2024-12-03T17:15:10.530`) -- [CVE-2024-37392](CVE-2024/CVE-2024-373xx/CVE-2024-37392.json) (`2024-12-03T18:15:13.410`) -- [CVE-2024-38036](CVE-2024/CVE-2024-380xx/CVE-2024-38036.json) (`2024-12-03T18:15:13.710`) -- [CVE-2024-38859](CVE-2024/CVE-2024-388xx/CVE-2024-38859.json) (`2024-12-03T17:47:02.467`) -- [CVE-2024-50647](CVE-2024/CVE-2024-506xx/CVE-2024-50647.json) (`2024-12-03T17:15:11.193`) -- [CVE-2024-50648](CVE-2024/CVE-2024-506xx/CVE-2024-50648.json) (`2024-12-03T17:15:11.357`) -- [CVE-2024-50649](CVE-2024/CVE-2024-506xx/CVE-2024-50649.json) (`2024-12-03T17:15:11.520`) -- [CVE-2024-50650](CVE-2024/CVE-2024-506xx/CVE-2024-50650.json) (`2024-12-03T17:15:11.683`) -- [CVE-2024-50724](CVE-2024/CVE-2024-507xx/CVE-2024-50724.json) (`2024-12-03T17:15:11.820`) -- [CVE-2024-51164](CVE-2024/CVE-2024-511xx/CVE-2024-51164.json) (`2024-12-03T17:15:11.970`) -- [CVE-2024-8775](CVE-2024/CVE-2024-87xx/CVE-2024-8775.json) (`2024-12-03T17:15:14.090`) -- [CVE-2024-9902](CVE-2024/CVE-2024-99xx/CVE-2024-9902.json) (`2024-12-03T17:15:14.390`) +- [CVE-2024-46905](CVE-2024/CVE-2024-469xx/CVE-2024-46905.json) (`2024-12-03T20:00:17.570`) +- [CVE-2024-47094](CVE-2024/CVE-2024-470xx/CVE-2024-47094.json) (`2024-12-03T20:01:52.610`) +- [CVE-2024-51378](CVE-2024/CVE-2024-513xx/CVE-2024-51378.json) (`2024-12-03T19:15:10.807`) +- [CVE-2024-52544](CVE-2024/CVE-2024-525xx/CVE-2024-52544.json) (`2024-12-03T21:15:07.390`) +- [CVE-2024-52545](CVE-2024/CVE-2024-525xx/CVE-2024-52545.json) (`2024-12-03T21:15:07.490`) +- [CVE-2024-52546](CVE-2024/CVE-2024-525xx/CVE-2024-52546.json) (`2024-12-03T21:15:07.593`) +- [CVE-2024-52547](CVE-2024/CVE-2024-525xx/CVE-2024-52547.json) (`2024-12-03T21:15:07.707`) +- [CVE-2024-52548](CVE-2024/CVE-2024-525xx/CVE-2024-52548.json) (`2024-12-03T22:15:05.567`) +- [CVE-2024-53059](CVE-2024/CVE-2024-530xx/CVE-2024-53059.json) (`2024-12-03T20:57:20.747`) +- [CVE-2024-53060](CVE-2024/CVE-2024-530xx/CVE-2024-53060.json) (`2024-12-03T20:49:04.903`) +- [CVE-2024-53375](CVE-2024/CVE-2024-533xx/CVE-2024-53375.json) (`2024-12-03T20:15:15.820`) +- [CVE-2024-53564](CVE-2024/CVE-2024-535xx/CVE-2024-53564.json) (`2024-12-03T21:15:07.807`) +- [CVE-2024-53937](CVE-2024/CVE-2024-539xx/CVE-2024-53937.json) (`2024-12-03T19:15:12.127`) +- [CVE-2024-53938](CVE-2024/CVE-2024-539xx/CVE-2024-53938.json) (`2024-12-03T19:15:12.330`) +- [CVE-2024-53939](CVE-2024/CVE-2024-539xx/CVE-2024-53939.json) (`2024-12-03T19:15:12.690`) +- [CVE-2024-53940](CVE-2024/CVE-2024-539xx/CVE-2024-53940.json) (`2024-12-03T19:15:12.910`) +- [CVE-2024-53941](CVE-2024/CVE-2024-539xx/CVE-2024-53941.json) (`2024-12-03T19:15:13.113`) +- [CVE-2024-7391](CVE-2024/CVE-2024-73xx/CVE-2024-7391.json) (`2024-12-03T21:44:10.397`) +- [CVE-2024-7392](CVE-2024/CVE-2024-73xx/CVE-2024-7392.json) (`2024-12-03T22:17:52.127`) +- [CVE-2024-7409](CVE-2024/CVE-2024-74xx/CVE-2024-7409.json) (`2024-12-03T20:15:16.387`) +- [CVE-2024-7509](CVE-2024/CVE-2024-75xx/CVE-2024-7509.json) (`2024-12-03T21:54:37.137`) +- [CVE-2024-7510](CVE-2024/CVE-2024-75xx/CVE-2024-7510.json) (`2024-12-03T21:36:54.357`) +- [CVE-2024-7511](CVE-2024/CVE-2024-75xx/CVE-2024-7511.json) (`2024-12-03T21:31:50.467`) +- [CVE-2024-7998](CVE-2024/CVE-2024-79xx/CVE-2024-7998.json) (`2024-12-03T19:15:13.330`) +- [CVE-2024-8838](CVE-2024/CVE-2024-88xx/CVE-2024-8838.json) (`2024-12-03T22:06:42.107`) ## Download and Usage diff --git a/_state.csv b/_state.csv index cbd111afeb3..c53de8a0e9f 100644 --- a/_state.csv +++ b/_state.csv @@ -126936,7 +126936,7 @@ CVE-2018-9370,0,0,ae53e355aa0524bf60f4d348ee71944e38f6c6c59f44b44474743ec3d5eda5 CVE-2018-9371,0,0,dce1635a39fc875c3a6010e78992681138a4af74d8f57da615da4dd9d5becbf0,2024-11-22T21:25:48.853000 CVE-2018-9372,0,0,5241fff5e37359ca4d40d4d0ef51eddfb8e42f03921d8e136fe460686e5ef5c0,2024-11-19T21:56:45.533000 CVE-2018-9374,0,0,b5c9257b4379d5ec059f557b277f9ab8f86bedde18eae66967ba271cf76e5f31,2024-11-29T22:15:06.327000 -CVE-2018-9376,0,0,ca8cc45f967ea36522e5828a1c658a55ab0d2776b3d6bb7cde3ad78582f34eb1,2024-12-02T21:15:09.107000 +CVE-2018-9376,0,1,43d6dd0e28def70edf6a54cdbf3de982ecd563705b3a57463c6811a2ad8b33db,2024-12-03T19:15:05.937000 CVE-2018-9377,0,0,e4a0a8bd1ac9734ae148f92ac66c4e7d1d997837e82ad8c47cc9f88531e107dc,2024-11-29T22:15:06.483000 CVE-2018-9380,0,0,e6fbe63ca9b9f94eed7d3113363726fcbc9fd32f362f8de02b396f07c6dcdef2,2024-12-02T22:15:08.237000 CVE-2018-9381,0,0,6d23302b8a97082a76241d451afb14bf577899eb10a0c0816bc7882dabaf95b5,2024-12-02T22:15:08.493000 @@ -126945,8 +126945,8 @@ CVE-2018-9409,0,0,ebcda6f7e24e6f698fa6ccd47d9f60bf8bc1c7442cbc31f290fa0b923152d8 CVE-2018-9410,0,0,67eeebcbba32822e3887bccb33fae18efb160aec58d1cb7ea07ebe4be1e04e64,2024-11-22T22:28:51.533000 CVE-2018-9411,0,0,e176a59ad08b39fe1e6853540b0f5379b5df64366124dc7ef673195cfcdd7002,2024-11-22T22:30:25.617000 CVE-2018-9412,0,0,8f50260d1e8b65957e2cb05a966f6136a2dee829d699d386c0ca2a63e589e17c,2024-11-23T00:56:14.623000 -CVE-2018-9413,0,0,c96c3efa9a30492ac98f18f0022a88627e5c62aad3ceec520d5c6c6e2465f89e,2024-12-02T21:15:09.653000 -CVE-2018-9414,0,1,1502707cba8022d2a56ca7e99daf57548667b3f30de1f8fb22b96c6af7e6c423,2024-12-03T18:15:11.267000 +CVE-2018-9413,0,1,c6f4ac4e24b60889b670534f191861c4c8edbffd728fe1cd291cd8a7e281fa1d,2024-12-03T19:15:06.147000 +CVE-2018-9414,0,0,1502707cba8022d2a56ca7e99daf57548667b3f30de1f8fb22b96c6af7e6c423,2024-12-03T18:15:11.267000 CVE-2018-9415,0,0,ed7c0b7190441eec3d5a1d3e25bd99949f1ee50503dc12cac8466031b55d4227,2018-12-12T21:36:26.237000 CVE-2018-9417,0,0,d14f6cd2cf635e766e90a973936df96c48a6f5ddbb0b86d066715267e8c688d6,2024-11-22T22:08:46.630000 CVE-2018-9418,0,0,e851384c008e3a0dde6b54cd54b3ee4e68c29533e11960a94ecde9efdfeb4b80,2024-12-03T16:15:18.587000 @@ -146193,7 +146193,7 @@ CVE-2020-1106,0,0,c069ae616a0efbded861e845c7e66c9fe99af862c5e5916872a71ea06e9b80 CVE-2020-11060,0,0,ad63f874ff1162cb8c35ca1af2320dc15d68de65a0926edf604a2c799c687aa0,2024-11-21T04:56:42.190000 CVE-2020-11061,0,0,0039dbda81c6a936e57d6c83e20103c1c1240d1576284250a884a3736b756243,2024-11-21T04:56:42.313000 CVE-2020-11062,0,0,51c6aa3d164aff5a89b971c366cda93af16aeb3b002411ec97e61d12b8e82e30,2024-11-21T04:56:42.440000 -CVE-2020-11063,0,0,291fb51b47c425bec5a6e80d190bd670f165e07bc61aba57600a3512f954f083,2024-11-21T04:56:42.557000 +CVE-2020-11063,0,1,843af822dfee9c4c934a9b742debfecf7b82c9cdd3a1da5dea19d03d94663568,2024-12-03T20:15:13.003000 CVE-2020-11064,0,0,71c051ced833c30a3a1a8efac394ffda3ba4c75457d71c1b53aae887452f94f7,2024-11-21T04:56:42.673000 CVE-2020-11065,0,0,c88b156f0b7196a504ce0aa37d61de9555d69fe706fe38e09f6514211d6fccf9,2024-11-21T04:56:42.787000 CVE-2020-11066,0,0,3dd61e9b96caea11f4797aa0c61d35d202ba6fa5d3cfcca42ffd02f7f4fbeed0,2024-11-21T04:56:42.903000 @@ -174357,7 +174357,7 @@ CVE-2021-29880,0,0,69bfd213ac99c9f317e412cd5b1bc2e634cda2cc6eee5ed72e94a00793187 CVE-2021-29883,0,0,3ab50cc1fe1f7bad26d22921bf3dab11c24a06808b4f77ba4b912277dc8be5f1,2022-07-12T17:42:04.277000 CVE-2021-29888,0,0,1f80d3b985dc28be5fdec5211f7b487be5eee1d5f8e7bc38bc8ccbab35964ee5,2021-11-03T16:16:07.383000 CVE-2021-29891,0,0,fa30c10bce4a74aaf93785d724e72a41a0181a0c0bdeffe46d8b46a15c82337d,2022-08-25T16:04:47.897000 -CVE-2021-29892,1,1,2a788ff8d94f0260991535b6718b55b3f5e8bd5d066449be3210ad97c3e9a3fa,2024-12-03T17:15:05.760000 +CVE-2021-29892,0,0,2a788ff8d94f0260991535b6718b55b3f5e8bd5d066449be3210ad97c3e9a3fa,2024-12-03T17:15:05.760000 CVE-2021-29894,0,0,cfc28faf33197707204b466c20194044e417df1fc619abda3664ad2944ff52df,2021-10-04T17:14:35.150000 CVE-2021-29899,0,0,81d9b5a8576f3b5fb2617342d2e97387f6d63d198698041961a6a74b03dcb8a5,2022-03-24T14:16:35.617000 CVE-2021-29903,0,0,a03223953564f2473b4b3f6b95893a3020ab7abdbf104166aa48e9facd558572,2021-10-14T17:58:13.797000 @@ -214943,7 +214943,7 @@ CVE-2023-20046,0,0,a28c9dd46c7f8382f7f0d6f52cf27d3e22c751e22b599ebd86059c8012869 CVE-2023-20047,0,0,a576a38bacf817382687ae32b765b6f4114663858b856d42d111196bdfff4269,2024-01-25T17:15:27.527000 CVE-2023-20048,0,0,241c964ebb06e703be2f42894a8f1a8f15c630ce5f500d29b977229045c2413a,2024-11-26T16:09:02.407000 CVE-2023-20049,0,0,1abffa4b450cc4a8b2f64f9647eef61efe0594d963bbc56a204aa6fe5607818e,2023-11-07T04:05:51.407000 -CVE-2023-2005,0,0,7a3ec8787f0cc3167d044c957356d641e165f39b91a5ef78eeb5dc3cf92c566e,2023-07-05T17:16:12.110000 +CVE-2023-2005,0,1,cb3e38dadaa7788fcae6290a7560e65f637afe1ff6b85d9bff4432d298cf2f50,2024-12-03T19:15:06.390000 CVE-2023-20050,0,0,27536266aaf6107594818b4cd149e06321e1969d28311cf555c4715227344218,2023-11-07T04:05:51.780000 CVE-2023-20051,0,0,953e9b156bf220fdf240bd9280b1849a48d9f34cd88f9026db226be2b3a73c42,2023-11-07T04:05:52.150000 CVE-2023-20052,0,0,fe4c2c2ab156d2f317396eb2500adfc1736e39b233f8d390dacb26c34a896625,2024-01-25T17:15:27.740000 @@ -222806,7 +222806,7 @@ CVE-2023-29455,0,0,325721e5417bd04ba7ffa08e9e885ab7f377ee98479242165809b7fcea275 CVE-2023-29456,0,0,73f2679f18e611f61958fd92d8d996809f63b9f0032fceed78c0b47886058942,2023-08-22T19:16:35.827000 CVE-2023-29457,0,0,051cbfd687c7106fadb51e68a8acfc9955079c6f8ff7e701e981946297d701e2,2023-08-22T19:16:35.957000 CVE-2023-29458,0,0,1d2d4ff76a517977527853af73b75986b05c8601efc524ed56549254a334ae79,2023-07-25T15:05:05.530000 -CVE-2023-29459,0,0,a382aa60abba9bd8692ccb1a67d004abc82bee73e632cde35cec3d3dc7b7dff0,2023-07-06T15:47:21.350000 +CVE-2023-29459,0,1,c3c84c578a50a80ad57452c533eadefc3c467bf53829a4b5e05369bfd6a27d10,2024-12-03T20:15:14.167000 CVE-2023-2946,0,0,278c71a5f845556ac284538ef5b9dff915b2218dcdce132a76af638a99747736,2023-06-01T03:46:57.990000 CVE-2023-29460,0,0,2c5455962c5635f59a86c50c24e746ae87f7eed2f44c565fbf7c9bfeb97cc5c6,2023-05-16T18:30:41.293000 CVE-2023-29461,0,0,040694f77a9ce20dc408e6c7ae75a7f2aec9cb2f7c75ac62be8f89097ea2a5bf,2023-05-16T18:30:02.453000 @@ -224112,7 +224112,7 @@ CVE-2023-31301,0,0,8b4aa9e0020370e9364f1514c1548d00f13f3a6f7e88a244d5ac3dcc05554 CVE-2023-31302,0,0,7db878fe5302d808bd5001becdb205fd1302d85ff5b5989c39244fbd498603b5,2024-01-08T13:04:07.097000 CVE-2023-31304,0,0,d35cbd3c1a51f731cb3021ec4d7f26ebe776aa5c814e8a89e6392f12283085fa,2024-11-04T17:35:02.577000 CVE-2023-31305,0,0,af1a24ed09ae428da28818e3b6639df4c603d6ee1ac78ab0a5cce894745493cd,2024-11-06T16:35:06.613000 -CVE-2023-31307,0,1,bd36d7a04bc83cef99bb89abed7c063b2ce8d88d8531a61df7b75a4c3106f86b,2024-12-03T17:15:07.017000 +CVE-2023-31307,0,0,bd36d7a04bc83cef99bb89abed7c063b2ce8d88d8531a61df7b75a4c3106f86b,2024-12-03T17:15:07.017000 CVE-2023-3131,0,0,92b0e6ff89d88f5d5d16464713458f8b0d9ad7ab63634417462d4acc9effd23f,2023-11-07T04:17:57.837000 CVE-2023-31310,0,0,f17e30a0294060da2ce7aa247bba7d7e4f3746a8423691dd74baefa96f0eead0,2024-10-31T15:35:04.980000 CVE-2023-31315,0,0,44428fbe3e922a7707ac2901dc10ee48452105458214ad8f550b81ed93b19a27,2024-08-27T15:35:00.983000 @@ -224124,13 +224124,13 @@ CVE-2023-3134,0,0,56071acdc7623a3f1e8c35f56a75d80cedbc311efc23e7ac51d208245195f5 CVE-2023-31341,0,0,dd24cf83580387b35de43a1761935afa05605b69789156e33c8226af92558012,2024-08-14T02:07:05.410000 CVE-2023-31346,0,0,baf70a7fbcbac8ee2109bb0ede410a1f9d8a0f3d16eca151ea162e0c8735e373,2024-10-24T15:22:58.270000 CVE-2023-31347,0,0,5703df889e7697d9a941bc897ce8eaa50a95592c03760c9ac7c4b13dd799542a,2024-10-22T13:30:27.637000 -CVE-2023-31348,0,1,1a3486380e50f76a445d391370e4805d98ed6ff38802308c1313b3e7b10cbf98,2024-12-03T18:46:38.467000 -CVE-2023-31349,0,1,bba5c58401546853f0e31eb0c8f3a091ae43f3f0fcdd313b2330d0e9a09e883b,2024-12-03T18:37:37.340000 +CVE-2023-31348,0,0,1a3486380e50f76a445d391370e4805d98ed6ff38802308c1313b3e7b10cbf98,2024-12-03T18:46:38.467000 +CVE-2023-31349,0,0,bba5c58401546853f0e31eb0c8f3a091ae43f3f0fcdd313b2330d0e9a09e883b,2024-12-03T18:37:37.340000 CVE-2023-3135,0,0,6bf4d178b889b1c4b1b5225d3bec9008408415fe638f98a0c794b0c27b2df020,2023-11-07T04:17:58.450000 CVE-2023-31355,0,0,69aec8bfd9cbbdf6fccaa5a3f23ea5d697dcae13123e85a3c8dc9b60288b0210,2024-11-26T19:10:21.797000 CVE-2023-31356,0,0,bea061db9cade12e882f1ffccc4c3b6bf3ed6261d08ca2362e9f4fdc16dd90c9,2024-10-30T19:35:03.503000 CVE-2023-3136,0,0,89749c73105b8a3b2f93105e2704853e3e122996e34e8067a103f24e2d5a7180,2023-11-07T04:17:58.613000 -CVE-2023-31366,0,1,3024397a0d4aae2ef43f623686a8e01fdf5340c2590abe5ed9b21fc83aaebfed,2024-12-03T18:30:25.240000 +CVE-2023-31366,0,0,3024397a0d4aae2ef43f623686a8e01fdf5340c2590abe5ed9b21fc83aaebfed,2024-12-03T18:30:25.240000 CVE-2023-3138,0,0,8f5ffff3673e8f74abc6225a3f21e8fa48e79b4bc3826a6eddcc46862b33415a,2023-12-08T19:15:07.580000 CVE-2023-3139,0,0,63da4e4c506673ff4b4b94c15b4d0285dc0dfef1076f2791ebbb5626e7d3bb6f,2023-11-07T04:17:58.783000 CVE-2023-3140,0,0,83445c1e28eed50d0564a2961426f98d0d9629256d1766c5b66f60dd49997477,2023-06-16T18:06:57.083000 @@ -227688,7 +227688,7 @@ CVE-2023-3624,0,0,2359737609e52e7bb8e66c413ea0b9e9b9a124a75d3e344a359ee48efb51b3 CVE-2023-36243,0,0,a76a3e1407c07832ff18ee29c9b1d24ef6483e6e74fd3fc432edff25c45d59f9,2023-06-29T21:02:42.490000 CVE-2023-3625,0,0,647b04f44d9e93fb8acf04cf29ad72643e8ebfcd9cbb941582dcf7f875016807,2024-05-17T02:27:39.443000 CVE-2023-36250,0,0,8505f8f1a034c00d68b3357143683b1d101618afdeca672857baa51073475a53,2024-09-25T20:35:19.840000 -CVE-2023-36252,0,0,137e8a97413fa12d1605bb05b6940edd58b1235ac59afedf9c04c50e482e9521,2023-07-06T16:07:39.287000 +CVE-2023-36252,0,1,eb58e4b8c573316423323d10de47a1b31bb54b4ca2eb3f9511866a1093ae9b95,2024-12-03T19:15:07.270000 CVE-2023-36255,0,0,251e30825623919ebb8b8d717a85233bfec3860670a31ef6494b25e5d2734735,2023-09-18T20:15:09.513000 CVE-2023-36256,0,0,661307eeae985eaad5d2aeb0699d3ade98b15ccc00362c6b7ac3fcee9219222e,2023-07-13T18:39:58.747000 CVE-2023-36258,0,0,f5be4cdb06189fdc97ef95912d49585470375bddc48c99c0c8c398c2c59f3bdc,2024-11-22T17:15:05.750000 @@ -230749,7 +230749,7 @@ CVE-2023-4009,0,0,31ef66ee2384a7e29167fffef0895f5cf8b8d86e23a20e6529f062cf0f920d CVE-2023-40090,0,0,a6fe6a0a57ddfba25e54ae988a1513fccee10f861d719877296294b81374b673,2024-02-02T03:15:34.857000 CVE-2023-40091,0,0,e969e26e3008568904700ece81f790d9b78f3e15528cfc0e613c11527ad04fb8,2024-02-02T03:15:39.110000 CVE-2023-40092,0,0,42fa054bcd3777a6683318bd199740cd15c1b75e8585988805b640a739ab62cb,2024-02-02T03:15:44.960000 -CVE-2023-40093,0,0,84ef8730bc18041bdca6b89d2473bd173bbb8aca45e400d0a74b31814e283a14,2024-11-26T16:33:08.700000 +CVE-2023-40093,0,1,5999a0651b596859c4ca1959f10a7a59769f1c334563136eb10081d03d1d6253,2024-12-03T19:15:07.740000 CVE-2023-40094,0,0,d16973dfe0c474b7656d9ca50be297fb97a6bd0c5038405f353abcee2bbef805,2024-02-02T03:10:05.053000 CVE-2023-40095,0,0,cf3c105ea4f2aa052c27ac17595f726b4a8a201de665acb70c91f74ade676d1a,2024-02-02T03:09:57.887000 CVE-2023-40096,0,0,80c28bf71c8b791e73e10c9865fe8d8ebce552d17765524b6f7ba8d0a8a23dc5,2024-02-02T03:14:44.280000 @@ -232884,12 +232884,12 @@ CVE-2023-42850,0,0,5931fe57c3cb62fdf93e9d6d5bba7fbf9095bc3582c436c90d2fc77b3d0c3 CVE-2023-42852,0,0,51d77abb6759e9386f3b21858804f456fc03ea58878e60b6b3f15e2a16417e72,2024-02-16T15:24:56.403000 CVE-2023-42853,0,0,11982b71ebb82c39e5a22e76bdacfb10bcbdae2a4ea889624b1a4d786842c3e5,2024-03-13T21:15:53.957000 CVE-2023-42854,0,0,f4708dff484f0bcd55c5eebd0727c6d52308a3a96b5b683962e21f1a51d10b6b,2023-11-02T17:59:51.330000 -CVE-2023-42855,0,1,d73b683210c471439f24418097a00ff275f56fb1ccaca4b4a1db0b2a4b8449aa,2024-12-03T17:32:38.343000 +CVE-2023-42855,0,0,d73b683210c471439f24418097a00ff275f56fb1ccaca4b4a1db0b2a4b8449aa,2024-12-03T17:32:38.343000 CVE-2023-42856,0,0,3785bc6082e7fa65742eabd642d5d65c5d33879ffd7643e13cc058ba75458a60,2023-11-02T18:00:05.630000 CVE-2023-42857,0,0,9ea98d96cc65b90009b648670c5da30d2e3d83b1ae536f9a719789ff9eb40128,2023-11-02T18:00:33.847000 -CVE-2023-42858,0,1,b9607fd2e91253bfa70d0cbe127add6cb388b786bf9502e7a4f533f578678b5e,2024-12-03T17:30:04.683000 -CVE-2023-42859,0,1,80a8a2bf5783b9593620673ca1588995af64e7c57b56ee53234d4c605dd1f23a,2024-12-03T17:27:41.293000 -CVE-2023-42860,0,1,deb5203476f8e10dae004b1a553ababb9a26bdca00f61493796b1a710a2a4d1e,2024-12-03T17:24:43.420000 +CVE-2023-42858,0,0,b9607fd2e91253bfa70d0cbe127add6cb388b786bf9502e7a4f533f578678b5e,2024-12-03T17:30:04.683000 +CVE-2023-42859,0,0,80a8a2bf5783b9593620673ca1588995af64e7c57b56ee53234d4c605dd1f23a,2024-12-03T17:27:41.293000 +CVE-2023-42860,0,0,deb5203476f8e10dae004b1a553ababb9a26bdca00f61493796b1a710a2a4d1e,2024-12-03T17:24:43.420000 CVE-2023-42861,0,0,d8d65111e4802e544404dd9d1d2d3c6540cc7742d5e3fa7afcb7a11f5c1a79ab,2024-06-10T17:16:13.247000 CVE-2023-42862,0,0,a36257707b4fb74a8615ecf862e41d30af8f3c8f9308b2858c6cc934e94b61f7,2024-01-17T20:51:42.080000 CVE-2023-42865,0,0,bf2a0a432fe9999b756c62ffd215341250f2d8dc167f4293b6e906b46c209a63,2024-01-17T20:51:12.820000 @@ -232902,7 +232902,7 @@ CVE-2023-42873,0,0,f1055070f5d2c8964679f9d4c375bc90c864cdc2b3efb5cf9fe0466754f26 CVE-2023-42874,0,0,964baee28b6c72a15098069b9e881e1b193059d80a9fe10f47c0787dba9650a1,2023-12-13T23:29:19.097000 CVE-2023-42876,0,0,974317a11812600494105057904f88983c49db0f187d890a9f6b1ea5995af4ff,2024-01-12T14:42:40.430000 CVE-2023-42877,0,0,6cad27eae60657c9f948e06003fc8819bbc3ef2215aadba8c1d4e84902953011,2024-08-01T13:44:48.073000 -CVE-2023-42878,0,1,5d257e70cffd5eb040ee0fb607130b1e7299ba45d71793ad390ba88b3cfe997d,2024-12-03T17:17:41.227000 +CVE-2023-42878,0,0,5d257e70cffd5eb040ee0fb607130b1e7299ba45d71793ad390ba88b3cfe997d,2024-12-03T17:17:41.227000 CVE-2023-42881,0,0,70098e759836313249a706e0cb3a6283e2dcaf1ae77d9c5e80b4ac943c30b13e,2024-01-26T20:50:42.450000 CVE-2023-42882,0,0,d25d8200d86ee6aec5cd25ed7c72a0a44dcf7931e005d38d26518af2e78b4882,2024-02-02T03:10:11.640000 CVE-2023-42883,0,0,034dd058692240ba2f6c465611c8e36bfdac6f60d9f46a4108296185e978baa7,2024-06-12T10:15:26.310000 @@ -232963,20 +232963,20 @@ CVE-2023-42935,0,0,59f1893c4921fd426d37a2853de577c0f93471971948ece90123be426c829 CVE-2023-42936,0,0,c18fe081f1c567d172866792cd7e269db74a129e365dc1e3a0f755df59e92d66,2024-08-27T19:35:06.893000 CVE-2023-42937,0,0,2548bd23d42243683fdde68d9d74c6694ce8fbfe2bf0789c6beda4910f3fe439,2024-01-29T18:33:19.387000 CVE-2023-42938,0,0,d25e9dc245eebb79595e4f006d6b9857b227133a3f844fb3d6037315be9ae599,2024-08-26T15:35:02.077000 -CVE-2023-42939,0,0,0ce71ea134fae56f84234486eae9cf0279fa4b51651ae0082aafa52d86a864ad,2024-02-22T19:07:27.197000 +CVE-2023-42939,0,1,e616f5469a9d7bb93c6568524cd0da091acc5847091d9c388ddeadcb2cb5d967,2024-12-03T20:42:07.280000 CVE-2023-4294,0,0,38ff20ab6e7f39daf98662734eba5d7abaeaa55eac46be3d5953e77ce63f803c,2023-11-07T04:22:25.913000 CVE-2023-42940,0,0,d1747dccf9be170d7d2459f45012020f08d4eb5ce17698d439f59de70dd43655,2024-01-04T14:56:32.530000 CVE-2023-42941,0,0,07ef4c50d699b2c4d697e69c7eba84c968b3abecdc0454485729209830f2d05b,2024-01-16T23:54:14.273000 -CVE-2023-42942,0,0,5f3d335907b121452b79893baeef6c48d60a98bb67df4e841c089c4a7d2bce1f,2024-08-27T16:35:01.703000 +CVE-2023-42942,0,1,3274b98a531cd08d74304340509fb78bde32a21b5cbacb575666b356fbaa6330,2024-12-03T20:40:10.397000 CVE-2023-42943,0,0,8790183efd35acc800e913b3464e91f8a65e51f27e9353b2a98f8ccb4e333257,2024-08-12T15:44:12.630000 -CVE-2023-42945,0,0,ded1b5c2e0337280b23c4c9aa988849a090fc35ab214c2519d212d959fafba41,2024-08-22T14:35:01.547000 -CVE-2023-42946,0,0,c16d53e4640dbc64c39b6f25df218a8a3b9a148c4165025754da6efc5c7966d5,2024-11-07T15:35:06.643000 +CVE-2023-42945,0,1,200d2323886607812ee6e5544cc7dd3d7a9d9cd1bbcf9fd4feec9eae73a4bb8a,2024-12-03T20:37:44.587000 +CVE-2023-42946,0,1,2f891640e91a360138828eb608ca23096bc37ddebdc3147d949a745dda2c8d29,2024-12-03T20:29:31.657000 CVE-2023-42947,0,0,463a7c288ca72ceb5a42872b2d94a5ff7e5b5024cc13eee6b8c843ca1541a18d,2024-04-08T22:47:21.010000 CVE-2023-42948,0,0,e60e6a270a4159f47177637c1f0213b5b06987cbaccbf7c2b067805f6ba007e7,2024-08-12T15:43:25.587000 CVE-2023-42949,0,0,4ba4d25f4f34dd7299f1ae8679a2668afa3ca4ced4c250397b32835ae7ad7953,2024-08-12T15:41:16.120000 CVE-2023-4295,0,0,ec334b74dcc01539baa3eed8300f24e0d43c22b250be6de255e7d71ca4f97cb4,2023-12-28T17:14:36.030000 CVE-2023-42950,0,0,f1d5850b892570a96c5f59ef6bdf8fbbd22dba2618afa507113cc84e9d5cfb6a,2024-08-09T16:35:02.990000 -CVE-2023-42951,0,0,c2b592fed93cc7243fa114a25d8214ba89f9d461bc5878ad805c49747c286a09,2024-11-08T17:35:11.143000 +CVE-2023-42951,0,1,121a5c0c1d17502bed7317173a1705a78522289256ce9a61da10683dfe7402d1,2024-12-03T20:26:23.957000 CVE-2023-42952,0,0,ac8164a1e95a71f3635337c8d1e1e316d92bbb5ce2c711d62963ba080fa32811,2024-02-22T19:07:27.197000 CVE-2023-42953,0,0,c3b7092a84e4c9cf27e3a04a908a1a891d4da828332a56e4b0bb35d9d921787e,2024-11-07T16:35:10.020000 CVE-2023-42954,0,0,f45971a666787f6e4609a5b8ff1e50e22211581a6c5afdc32f83d4251ddb5301,2024-08-27T20:35:05.607000 @@ -237519,7 +237519,7 @@ CVE-2023-49555,0,0,72d812e66246bcb91c6bc002ee3e0548aca407affd9f421b1d887900feb43 CVE-2023-49556,0,0,e966a694d12f1b446adec965c98a4bbdb838e62158c656f71ca2df3c91bb7f74,2024-01-09T16:59:09.227000 CVE-2023-49557,0,0,ab68f52439ca05cc867009cb9a90004fd7e0b396245ba38404fad7ee34dff116,2024-01-09T16:52:22.033000 CVE-2023-49558,0,0,0292793c2dbd787c41d2db53bda3a2a5f7afe4fb78f6bd238bd58976374722a4,2024-01-09T16:49:04.153000 -CVE-2023-49559,0,0,dcd39cb8510f02bef2dc47c7edbffbdde40d7a526a78797dba29c8b12dd3d987,2024-06-13T18:36:09.010000 +CVE-2023-49559,0,1,c02603e188bc3a0923b448b626bdc5315d4d54d2e42179dbe4f4a8ce296ed722,2024-12-03T20:15:14.317000 CVE-2023-4956,0,0,48c602c337af88c084951e3a2c1195ec950bd27715d3d7ebaae450cd36e9d61e,2023-12-13T08:15:51.330000 CVE-2023-49563,0,0,ff22013e5f4db324eaab0d188c730f9fdc3fd3f56c58b042f2dd5573911172a8,2023-12-14T18:30:37.733000 CVE-2023-49566,0,0,5d41a2822babeb9ec619211692e91f45235cebac1ffc90794234a82a955c5d4a,2024-07-16T18:06:05.347000 @@ -238394,7 +238394,7 @@ CVE-2023-50947,0,0,30db9a61d0011f2ecf85fca8fcf7ec32cb3c8d3758342a75df3436e5b526f CVE-2023-50948,0,0,bdb8dfe61e6bb5c0ead710e7634822087e4ba9d4a8aa3d0b38f1d70ff1d5b025,2024-01-11T17:00:50.077000 CVE-2023-50949,0,0,b5f44f6e20174821ef9521b996e8772c222b0c86e038fa496a122146fa429903,2024-04-12T12:44:04.930000 CVE-2023-50950,0,0,44d9f6fce0df4c0cb249dd6910d6c5f827d41fa95ee4793fa82fc6cd0bdbd2d4,2024-01-24T19:42:29.450000 -CVE-2023-50951,0,0,f6602a94bee5ac370ebd327ee71099d1d7184ed6e0d0e6b8d7894abc3d65ab08,2024-02-20T19:50:53.960000 +CVE-2023-50951,0,1,a54c39bbb984c66865707c18f40ef4caa534f821d04266c5357c454be96bbb3d,2024-12-03T20:28:43.647000 CVE-2023-50952,0,0,a42bfb9eb2ec7c3f0ba7edf0dc6ed3e721be6a8d276393fcea326ad1cdea6eda,2024-07-31T19:34:52.883000 CVE-2023-50953,0,0,52036d7752aac445cbb090aea392f5f16e3dcdb55ed4b88e406bc96e30a1871f,2024-07-31T19:13:21.947000 CVE-2023-50954,0,0,baece4f5dc11741de457ffc101bd64213e3d518cabc43705ad07eb4c82b73f9e,2024-08-21T14:02:11.833000 @@ -239364,7 +239364,7 @@ CVE-2023-52341,0,0,752ec91f49f7d27aa4aefb97c1028c0e3ba02b8dbe8f5ef4e4a5be61da661 CVE-2023-52342,0,0,d9217e8a43616eb93ae5900a69930974b98e947284e3031e63af0d98b4863568,2024-08-26T14:35:02.157000 CVE-2023-52343,0,0,72f06a8afa822a3024d5a446620d24cff01d97ee834295104d1b734aa9f75e3e,2024-11-04T17:35:08.043000 CVE-2023-52344,0,0,2746ce7294f9dd645e743c241e219d96848cd26c1bbf2a1d45c502d1d5d069c5,2024-11-08T22:35:05.047000 -CVE-2023-52345,0,1,a60bc116f4901082dea5e8bcacc413c82b3427a572478b12fbcd48cf42f44a18,2024-12-03T17:15:08.390000 +CVE-2023-52345,0,0,a60bc116f4901082dea5e8bcacc413c82b3427a572478b12fbcd48cf42f44a18,2024-12-03T17:15:08.390000 CVE-2023-52346,0,0,abf5870e70e4c81d560fa222012a9514676bbea91379a04e47b0bfe7513e6621,2024-11-04T18:35:03.567000 CVE-2023-52347,0,0,0de571f6617802f0c8b8163db0698d0cafc861c67facc0349aa475f789167481,2024-11-01T15:35:05.800000 CVE-2023-52348,0,0,a78f5b9171ee88d03834f0039162b0633f8a198afe00aea2be4a4f4c2fbe83ff,2024-11-19T22:35:02.473000 @@ -239751,7 +239751,7 @@ CVE-2023-52723,0,0,2fe194d004e97af726d85431e007c3326f52eff7c20e279a9c12c4d1b3f28 CVE-2023-52724,0,0,95120cda4ac6bd6031f2e2daebb9e5bbb1d44f3ad800bed01c5a520101567ca4,2024-04-30T13:11:16.690000 CVE-2023-52725,0,0,6c8006c6d070845e944a8779fc3ce3ac7e3893f3aa940aa4f5f18ea13a44ba8c,2024-07-03T01:43:50.417000 CVE-2023-52726,0,0,461e65a6795b13b587912cbbcf2691811a9fedc1284b87ef3001955692c77f7d,2024-07-03T01:43:51.233000 -CVE-2023-52727,0,0,6e3f9aa52d20e07183a574bf38e951e6604d10504a6e62357a35f6fcf7902554,2024-04-30T13:11:16.690000 +CVE-2023-52727,0,1,a99f786c16c90dfbbafabd50802fabf0de8a61b92c16ea1eb9d66eb802587002,2024-12-03T19:15:07.950000 CVE-2023-52728,0,0,a17f4a262cb474a8f70d7fbfb223259404df4ad19a24c3998d51961fd9af38d7,2024-11-19T23:35:00.713000 CVE-2023-52729,0,0,da51c6481fa4113baece0670394823278ef1d5e497f2483e288777e6e700a4a5,2024-08-05T18:35:03.380000 CVE-2023-5273,0,0,8971c3afc6d4f23e6938d06c8be51237957f11eabc2d94de850619c69fc9fc53,2024-05-17T02:32:57.223000 @@ -241742,7 +241742,7 @@ CVE-2023-7250,0,0,d2697716e6fb6d3106b6b6ee93de27e1a2aa1cee868a8468ee5a044250f131 CVE-2023-7251,0,0,dd7a7df27ce68aab327ba0baa92251358ec7e4d2777ca1ea9021ce7d40f54021,2024-03-26T12:55:05.010000 CVE-2023-7252,0,0,8ef70acf856173de65ceb7ed47edeac099389585dbd7416236a9f38d3052e70c,2024-11-22T15:15:04.990000 CVE-2023-7253,0,0,4436e6df0abbc2be66c875c1a3b7421386cfdc4e7cfd00a94031f9b2a2d0783b,2024-07-03T01:44:30.193000 -CVE-2023-7255,1,1,ba841318b17f99e3bcf2d19d42ab9b2ed81cdd4957ab41c4052c7c67ad67adff,2024-12-03T18:15:12.743000 +CVE-2023-7255,0,0,ba841318b17f99e3bcf2d19d42ab9b2ed81cdd4957ab41c4052c7c67ad67adff,2024-12-03T18:15:12.743000 CVE-2023-7256,0,0,4d31b5d621cc269e867da095170b22428e07c2ba7854722005d4b162e4ce2ea1,2024-09-19T17:53:15.207000 CVE-2023-7258,0,0,743a17302c5d0deefce3c9c18515bc1a780c1d3e967dd943e69bc9c091c417e4,2024-05-15T18:35:11.453000 CVE-2023-7259,0,0,4927c73cd38943cc915f51b0766c09a76100affe33b1049612344f19331c1f96,2024-08-02T09:15:55.730000 @@ -243505,7 +243505,7 @@ CVE-2024-11159,0,0,40c853846b1f5260f445d8196c4d1f6aec01e81777411e7a4839d765e27bf CVE-2024-1116,0,0,4196b5c71a0d802f4c1e9b3a43ac71c958f929e96b26e1ebb01241c6bd176fa3,2024-05-17T02:35:14.983000 CVE-2024-11160,0,0,c2a00c83ebfc94083c99410ffbf76862f5cddeb9d6f2530e0ed9a430c75b3087,2024-11-27T18:15:08.620000 CVE-2024-11165,0,0,95fe2b7c203ba5cc9c6e4fb2522e665475ea40e75b68e18a56b9dddf3a00ff2f,2024-11-14T16:35:05.493000 -CVE-2024-11168,0,0,5e610ba56b770f0c45b8e5f1da8a18409af80ecc6fd32d397017d56ba5ace8ac,2024-11-13T17:01:16.850000 +CVE-2024-11168,0,1,df73a38cf98fe872a11a7ae5d2776746809ac77d7eb7c9299d0fbd3c2e9cf30e,2024-12-03T21:15:05.470000 CVE-2024-1117,0,0,0eff4d8f06fdd3645727772834638be79e19128758cbe94b2a8e7a297167b8d0,2024-05-17T02:35:15.090000 CVE-2024-11175,0,0,a70e7384355b41e57dbae42f60548787ddcd5e64369094201d6e3104c030e304,2024-11-15T22:50:48.817000 CVE-2024-11176,0,0,43e0b836ac427f00f128c5bd48d6743fd191b6efbf5ad7ecd847f5f279d2ce59,2024-11-20T09:15:04.447000 @@ -243909,12 +243909,12 @@ CVE-2024-11963,0,0,1b768f13ae7432af87819b66e9c88a81e009e2b704744a659aae219fb06ce CVE-2024-11964,0,0,f94c574717c50c0184dd47517b1de305bfceb467090489bd5e62aaac299102a8,2024-11-28T17:15:18.500000 CVE-2024-11965,0,0,31af601734e720f7b4898a226ec470eb7b7893d1e57135a43f25ca10822bcc63,2024-11-28T17:15:19.383000 CVE-2024-11966,0,0,5e055161cfb759b43cc69778fc343f8b37e119ddc14d9d9b1e0ff4c55e38b235,2024-11-28T18:15:07.547000 -CVE-2024-11967,0,0,12f18dfc45eb819820254e66461b73c23a82321abe05a31382bf89c4ef0ee0ba,2024-11-28T18:15:07.780000 -CVE-2024-11968,0,0,da1eb41fd3caaae1d6edfd3659687335ef8ca5c9c6a02406ba4c7be157fe3497,2024-11-28T18:15:07.980000 +CVE-2024-11967,0,1,179e3dd97123c4b8b3faa14a32f95da586545a8fae36dd420cfa9023f4b058ee,2024-12-03T20:20:04.177000 +CVE-2024-11968,0,1,4c8e45962195e3bc30ba3ade6a5593c14f2e51bb9212137724bade4969c57980,2024-12-03T20:12:14.177000 CVE-2024-11969,0,0,328ae06406886fb66d7ac1b2c34b1818381f0d888a340c497ddc215ced06af80,2024-11-28T16:15:07.190000 CVE-2024-1197,0,0,eee502956c194e641ee01f282e886cb95c42c3ca82a247ebe6baa4a7059b14c0,2024-05-17T02:35:18.363000 CVE-2024-11970,0,0,1a849bf68450bf6823e4c6c28effecbfa7f1d9d228ab32bedb6122aff4f177bb,2024-12-02T14:48:39.960000 -CVE-2024-11971,0,0,38215aae1affbb1fe3b0b911c5ff0552bf6ce1619ab76a58fad7d4415b59c88a,2024-11-28T22:15:15.090000 +CVE-2024-11971,0,1,3a422b96c75e64944718f4261ea83fbe383ac9a8c822f0cea915713588b2fd46,2024-12-03T20:04:46.493000 CVE-2024-11978,0,0,82a503c1ccc829c5aa4edddd9a1368db8d8d07e5bd911457d7693a4c582d1965,2024-11-29T03:15:14.700000 CVE-2024-11979,0,0,a7d9158b13addb102e25d626e75f83d1385a44201d3dac6e49beea06afd7775f,2024-11-29T03:15:15.653000 CVE-2024-1198,0,0,06e092565c8e3af84c6ebb124845a11ab67d22d2e78b0a86a63d538f0638ff52,2024-05-17T02:35:18.467000 @@ -243940,6 +243940,7 @@ CVE-2024-1202,0,0,6132da5e9762048f130f38f4ec670738f94221153725a0b95c9666bf5c59cb CVE-2024-1203,0,0,b776394b4b874eaeeae3e5b604198862b49ad905e4e26e755c608f17ba381dab,2024-03-13T18:16:18.563000 CVE-2024-1204,0,0,227dcadf8be17e7ba46954487209fff721db299a9b29c34d65c82dfa9a2b5cb2,2024-07-03T01:45:05.337000 CVE-2024-1205,0,0,0a0d23d8cab3c22e48da3af802fa5d4730efda2f1ae3f246ab487b1969fd7c36,2024-03-20T13:00:16.367000 +CVE-2024-12053,1,1,2b398607da9e0d35894a5dae028909ee96e509eaf1448f83891a86a3497d90af,2024-12-03T20:15:14.513000 CVE-2024-1206,0,0,5f77d40826619ff076a6ee2348b6f5023dd16e0c591d0d5d735c076214b8b61d,2024-02-29T13:49:29.390000 CVE-2024-12062,0,0,053134064f0b6efbb78d94709d74965493fd7936bfcf08f9a9a8ec7d826131fc,2024-12-03T10:15:05.493000 CVE-2024-1207,0,0,dcc484c1fca006f292c23965347128c235a983932753c8f043310e93d42eeea4,2024-02-15T02:05:42.313000 @@ -245277,16 +245278,16 @@ CVE-2024-20764,0,0,aaf6aea1cfc81c17e2ef82d097347523784d6c37fa8e664f1fa9ad6c605a3 CVE-2024-20765,0,0,ad91982b1363103e7d071a542448be4f43c1d446a44c46149dd1d5563e96bd7d,2024-02-29T18:06:42.010000 CVE-2024-20766,0,0,898b775b089dd9caddb4b4690630a4034df5907c7b03a6ac372c91b73b803f73,2024-04-10T19:49:51.183000 CVE-2024-20767,0,0,e44fe1f40a168c1d580708d22170c7101344fa827a777107ab7c62d60385df35,2024-03-18T12:38:25.490000 -CVE-2024-20768,0,0,1e3e9e9553fe22dc3d69b454622eff7f4f96055b91832944849f7b2ee61961b0,2024-12-03T14:25:50.643000 +CVE-2024-20768,0,1,fca9dcc18fdb5e923a7d5ffae471944f30c53e8970448c3d9b0c0d1182566ccc,2024-12-03T21:46:08.623000 CVE-2024-20769,0,0,4c236b05669b68ca5ce041ed8b26b6adfc2e0cb9e4a3ee0955957eb96f78ccb6,2024-06-14T19:30:30.037000 CVE-2024-2077,0,0,e7bd6e3d8e34c4ba57719bf938fdc690e0425d907fa9aeaa848477a4c8d06182,2024-05-17T02:38:02.460000 CVE-2024-20770,0,0,2220817887bead81dba660b5070a9bfc8174373fc0e12fc00c386ef0f159eda4,2024-04-10T19:49:51.183000 CVE-2024-20771,0,0,8a01399cb8521b5aca859010ad7618c854f0ca880963c5cf7f625b81f5f7e387,2024-04-11T12:47:44.137000 CVE-2024-20772,0,0,0595740a6eaf79276b6566faf58cddbacedcbdb42883617ae6f1fbf05ec92018,2024-04-10T19:49:51.183000 -CVE-2024-20778,0,0,d8b0a955fe95d7528cc9225c2ba8c99c06ab0fae004443be64cd533fa34dc48a,2024-04-10T13:23:38.787000 -CVE-2024-20779,0,0,c0142fa66e837583428e7b8ef2ba80afae24c58e25a1149ad2bc658acf7f0872,2024-04-10T13:23:38.787000 +CVE-2024-20778,0,1,ff0325b925cb52cb989cf8c7c41190d57642e73ce4423016f8a454a3042e872d,2024-12-03T22:21:38.357000 +CVE-2024-20779,0,1,13c70af693a01da502cbe2a0eab32d0d39e9953765af33985baf7dd03d5d7482,2024-12-03T22:21:48.793000 CVE-2024-2078,0,0,95d50b0faa2bb79eb927804f750375a6eb355124e82816799090199109d7ea11,2024-03-01T14:04:04.827000 -CVE-2024-20780,0,0,63d2009124b332e78b1d536f1b7fe39d5959ba91df376872c85edf10add70c5f,2024-04-10T13:23:38.787000 +CVE-2024-20780,0,1,da9c3255aa1191e665338d2a9d79091a0bc865300aefaac1776dcfbe3906dce3,2024-12-03T22:22:05.807000 CVE-2024-20781,0,0,3ccc8172d5caf5f12275c7e0786ecc3a5145ee77013caf3fe6a53bcd77e15421,2024-08-02T20:13:42.440000 CVE-2024-20782,0,0,591198da9de59648b78059d67fcba2ae1e63c8a4ae642e9b553df4f8e697eefb,2024-08-02T20:16:00.143000 CVE-2024-20783,0,0,ef4c6477d397b423923703c7f26adf752529466272be0c0857be9467ab24edc8,2024-08-02T20:17:12.873000 @@ -245513,7 +245514,7 @@ CVE-2024-20991,0,0,94f0f80e95be2725620dad0c6e5443bdd60acc699a66c91ac7c7279a95dd6 CVE-2024-20992,0,0,ba9800046b8543eaf32ebe0bf6ac96b488e69f6b7913a7d831a97ae919200443,2024-11-27T16:36:46.510000 CVE-2024-20993,0,0,73f1669c85e855fd76979fe84f382e192647648d4f8a2bb0d0085df2877b0bcc,2024-11-27T16:36:44.187000 CVE-2024-20994,0,0,5f7ea9f92d561392870426b5d74a9dfb47bcd28f9445b3d46750647497195eed,2024-11-27T16:36:42.223000 -CVE-2024-20995,0,1,1f9174ba030143632481498c826781249624a95457bca2e98610d80b4844c6dc,2024-12-03T17:15:08.597000 +CVE-2024-20995,0,0,1f9174ba030143632481498c826781249624a95457bca2e98610d80b4844c6dc,2024-12-03T17:15:08.597000 CVE-2024-20996,0,0,fcd2292738608c647a4c519832797e84b76f4989a7b5a3e0a96bd0b4bdb3583b,2024-10-17T17:09:42.857000 CVE-2024-20997,0,0,6fcb219b09789009a115af413ffc8003378371105f5ae76f21264248e97d7ed9,2024-11-27T16:36:39.907000 CVE-2024-20998,0,0,45f0642541da0d531c6249ccae4fbcc371dd659326bb9c94a1fffbd680edd27d,2024-07-03T01:46:21.563000 @@ -245553,7 +245554,7 @@ CVE-2024-21029,0,0,beed54640564c6e877b911608d3aaede78a6c68fba401ae9c1d7333ce2ffd CVE-2024-2103,0,0,56728262bbb9eac431f64527baa684f066aa452f31fabe1cfef087df0e0cc830,2024-04-04T16:33:06.610000 CVE-2024-21030,0,0,8784ba0a3755df5b21c90fc1a3d06189077ff55e4dd10202c7d6a2ef21eadb3a,2024-07-03T01:46:23.853000 CVE-2024-21031,0,0,47da12e0a06b82feddde80c8f657eef9ceaa2d7cc969db6255ee7d3fcecb3433,2024-04-19T17:31:50.307000 -CVE-2024-21032,0,0,224558dfd07c20308a2bd3552df334b44095a07933d7e9c8bab2ef75b9656e34,2024-11-27T16:31:02.343000 +CVE-2024-21032,0,1,2a06eeb4063fbea3927653977fef89bb076a869017643b8a3a2540926b05688c,2024-12-03T19:15:08.570000 CVE-2024-21033,0,0,7bc19cb64c3ae24134dd79d7bbfe9e0ed0d38b98c77be70dc6f288f7e389d27e,2024-11-27T16:30:57.530000 CVE-2024-21034,0,0,b808ea180848747041b7aaaca886e2cee0af839a6638ebb2b8a0217712acb5a2,2024-11-27T16:30:46.090000 CVE-2024-21035,0,0,cfe330df5a88be696e5b022b2535ceaaa50fa26e99e7cc5299822d6e604c17b0,2024-11-27T16:30:11.690000 @@ -245565,7 +245566,7 @@ CVE-2024-21040,0,0,9207f1539b8715e9de73bf8605d282f9258ecbde4b6b5af37d49fb9b9b73b CVE-2024-21041,0,0,53175e4f9f6fe9a06cdb65415f15e9860a5cc1810804215df4199c035c4956b1,2024-10-31T16:35:04.810000 CVE-2024-21042,0,0,2413adf0e19ccd06809883f767218c53f86aa92469ced2e7e97fa65ebb6fc34b,2024-11-27T16:29:25.637000 CVE-2024-21043,0,0,34b86fb6bc70d1cb3f2e8b52f242178af3e3c87a06302294640b6969cd919425,2024-11-06T19:35:09.460000 -CVE-2024-21044,0,1,3f45eec1e46b6a448e745da4861f2365c447de08b700b7dafe3a57ef6b615700,2024-12-03T17:15:08.787000 +CVE-2024-21044,0,0,3f45eec1e46b6a448e745da4861f2365c447de08b700b7dafe3a57ef6b615700,2024-12-03T17:15:08.787000 CVE-2024-21045,0,0,918bd035aa1d6211c105c0b035415fa2c831f7eef3679326aa8e323c6a0fd5ac,2024-11-27T16:29:07.300000 CVE-2024-21046,0,0,6cd7417a9fe1dad42e5e390bd73f6c59f847ce1b22a979e6a850a74e46589580,2024-11-05T16:35:11.803000 CVE-2024-21047,0,0,2bc5d014697923ab8f9837dde11c202b28c9635338e1429d1d2707b2d34f9717,2024-04-26T09:15:10.500000 @@ -245573,7 +245574,7 @@ CVE-2024-21048,0,0,0740c7f75430ed630e47ca8538d7654b46da3ebd0ee4b5951500b7c74c4ef CVE-2024-21049,0,0,9616fde59f011de26fa6ba50e58cd40851be8c65128168cf773f9d94db5d91a8,2024-04-26T09:15:10.567000 CVE-2024-21050,0,0,d94cb733af7c54a4d84e619579d9bde9e102985653759b366a435d84928a9534,2024-04-26T09:15:10.637000 CVE-2024-21051,0,0,5b5b38f20f94692fbee206c4d08ceb1d0f4cd57a972ab2287f632f08a22a09ba,2024-04-26T09:15:10.703000 -CVE-2024-21052,0,1,e3949841d9fa67edbdcab968c6ac42d301424c98f18703ad9fe9bea56c30002d,2024-12-03T17:15:08.950000 +CVE-2024-21052,0,0,e3949841d9fa67edbdcab968c6ac42d301424c98f18703ad9fe9bea56c30002d,2024-12-03T17:15:08.950000 CVE-2024-21053,0,0,7fef0dc012419ed4a2e2c8a891096cd3e5ba1da6901d2a12026f2e7f8894c29a,2024-07-03T01:46:26.233000 CVE-2024-21054,0,0,835b9f20e0e5a67456e3f5d7374f40411fa327258971531851fde9f6c745e99a,2024-07-03T01:46:26.957000 CVE-2024-21055,0,0,7b97a238a9f2f8011d73871f0eaf7f4e90106b5fbf1015a4a4e573715a21c1d0,2024-04-26T09:15:10.953000 @@ -245585,9 +245586,9 @@ CVE-2024-2106,0,0,213f924b1030e277957ab3251c0a5e0aaf21bb221bf06ebf6920975bdeafa5 CVE-2024-21060,0,0,5dad82251c69460b0dcc342dbc8fe5f30ffd6435784fefca48a78f953ddd6047,2024-10-31T16:35:05.517000 CVE-2024-21061,0,0,acce4a5f468dca01931c32e50c6611a1e683c3d9c025ec493bafb29e16c7fe5f,2024-04-26T09:15:11.143000 CVE-2024-21062,0,0,f52b903674b0da400a3e3849ca455d776135add7df0354d62dc29d89b7440bac,2024-04-26T09:15:11.213000 -CVE-2024-21063,0,1,e23f0197e67d00ef65622e3d434aaacac50777a28da39c1b420993e471f6a1a1,2024-12-03T17:15:09.103000 +CVE-2024-21063,0,0,e23f0197e67d00ef65622e3d434aaacac50777a28da39c1b420993e471f6a1a1,2024-12-03T17:15:09.103000 CVE-2024-21064,0,0,5b2971adc59d71b4aaa5c906c9a4f9e6fc91222b1a769debcd275580759920af,2024-07-03T01:46:28.883000 -CVE-2024-21065,0,0,1c4717813b1a034170a9d85c7f01f49a9a6817cd44eb3976adb8d53a84de595b,2024-04-17T12:48:31.863000 +CVE-2024-21065,0,1,531e06a2890a673e9797a31981c044156cb67f03dd1975a6ce161799ca849b63,2024-12-03T19:15:08.777000 CVE-2024-21066,0,0,7da8187d584810bae1a6bae2212c93de6863858adc6479117a4e458e0f55fedc,2024-11-01T15:35:08.567000 CVE-2024-21067,0,0,3c1db72abc041e4cd640c75884818bbbf8c687caa8093bb33878c33da44b6b4d,2024-08-15T15:35:02.413000 CVE-2024-21068,0,0,5397ed6276bc380474002ef2f826d2dbb33ae28ef93eb95352209ca8f93abe8f,2024-04-26T09:15:11.273000 @@ -245704,7 +245705,7 @@ CVE-2024-21170,0,0,af70aab138e0b6f00f1af224e9aedbd73a234a8cfd2b7ba1d7eec319bf92e CVE-2024-21171,0,0,2fd05d07a23e14dbd131721fe68544117ce9a854c5a28a6e860a4826c9defab4,2024-09-12T20:42:17.600000 CVE-2024-21172,0,0,34605c01b861f523beae8f34a8a5378aeef5fdbde4809ce2491bb573bf414892,2024-10-21T12:59:49.070000 CVE-2024-21173,0,0,0a12cbbd305217530b1df35b14cfdef98657ded6769d894b09583b79eff2a588,2024-10-17T16:39:26.610000 -CVE-2024-21174,0,0,ba6844261aa04c1ce6ded1964dc44516b30559a14a2b47a862fad5fb6e961d86,2024-07-17T13:34:20.520000 +CVE-2024-21174,0,1,3aedc4aa4a685a673eda6d373d2980d41a58f103654e9e3fbf1a83af6fe80b33,2024-12-03T20:15:14.673000 CVE-2024-21175,0,0,cb2af54db467d6cb3910a785f432573ba67f0e2903d99aac799349b33385087b,2024-07-19T13:35:41.107000 CVE-2024-21176,0,0,b022e0a78bfd810ce5799e801c017257ad85014c0240c82465310ca387f77de2,2024-07-19T13:35:56.727000 CVE-2024-21177,0,0,dd286b1fc1e65591b4712392d48877586e2af8d98747ab5b6ceffcb0635a5b54,2024-07-19T13:36:47.267000 @@ -246722,7 +246723,7 @@ CVE-2024-22333,0,0,2aea130a34348f78dfbf003fc187c19aae24d1eb68c0b3938ae198b41308d CVE-2024-22334,0,0,1951698d7ab1d55a1824ae76507a3577dbbe6facddaaf9272bcefe471309fc13,2024-04-15T13:15:51.577000 CVE-2024-22335,0,0,a452659277dfc0c00bbebf3f7fdbdbc10eb5e3a4586e5ce33a7b718b3f3008c7,2024-02-20T19:50:53.960000 CVE-2024-22336,0,0,34ed66b8b7f583d44759ce52a251db14fa1a95596195a1c1fd9558e86e073ccc,2024-02-20T19:50:53.960000 -CVE-2024-22337,0,0,76ce26f7a52ed749358f865f3c6811f01f9a0e719e913e60a1e3dce5a9698e51,2024-02-20T19:50:53.960000 +CVE-2024-22337,0,1,1de618a6f28c5fec8fafb6e061eacd56c2db85c65e6102701c7028659734cb3b,2024-12-03T20:37:33.563000 CVE-2024-22338,0,0,e8c119fcc7813a5f8ad34d4aef250cb976af5de302a14bd8a4dc81c7298c7a15,2024-05-31T13:01:46.727000 CVE-2024-22339,0,0,ff71ed4a9397c8cae779b6390f5a620529a660975b4982f9683fc670797ea640,2024-04-15T13:15:31.997000 CVE-2024-2234,0,0,27f5f37b33daca2ec1fe8c2ff22db2eb02885beed0da54584837757cda834bae,2024-07-08T14:18:12.157000 @@ -246947,7 +246948,7 @@ CVE-2024-22722,0,0,2ec00a5c8e46809886d975f9e62c1646ed03ce66e913f1360753f43119db0 CVE-2024-22723,0,0,5e0104614f79979231b68cb0938b4f8c78660f8d758e8dd4467e139288dfbdc1,2024-08-01T13:47:01.343000 CVE-2024-22724,0,0,933dc01fb2520f6f9ab9fa4754177aa8d3c42e94e77de3e74dc91468db49f71f,2024-08-06T15:35:08.610000 CVE-2024-22725,0,0,5fa379724d5fca6a5a451858a4ba6ac34ebc02b0c57c2f76559d231c12c113c5,2024-01-30T20:42:46.143000 -CVE-2024-22727,0,1,bc17139817b54dbe557343f06cbe3841eb840d2294a7055da210550585fddca2,2024-12-03T17:15:09.237000 +CVE-2024-22727,0,0,bc17139817b54dbe557343f06cbe3841eb840d2294a7055da210550585fddca2,2024-12-03T17:15:09.237000 CVE-2024-22729,0,0,768bb63a8e628d1d5ad8c32ce479e7ef65e430464c818e272a86590502c0053a,2024-02-01T15:15:34.173000 CVE-2024-2273,0,0,0a70a78279025f010830c200ec41c70db1b0b3c6a90f640b7fd5d17983a65e86,2024-05-02T18:00:37.360000 CVE-2024-22733,0,0,e9298877351c5016bba78c319c5e21268788f845a90e3f71cf40d2a02eaa557d,2024-11-05T21:35:05.440000 @@ -248058,7 +248059,7 @@ CVE-2024-24409,0,0,dd8ff08f29b98b9528fdb2ee83855d6758a702d939ff7172a903f50f60717 CVE-2024-2441,0,0,748a7ac4d6ed599dc743b338d434f4fac66b4e81d9dc4afe98a976de37bf668f,2024-05-14T16:13:02.773000 CVE-2024-2442,0,0,da6587851d777a7caecc3fd36ba9b67242261a5b34dedee058c0f959b1280fc4,2024-03-20T13:00:16.367000 CVE-2024-24425,0,0,d53ddd215aa141fbc2d2ed66224530fe50b469290961d3787f25d193fdaa18f0,2024-11-19T17:35:09.450000 -CVE-2024-24426,0,1,1ba202c66d22ec01d9165c4229044ba2d8de45fa575e097063ba053bd7d0b3a7,2024-12-03T17:15:09.400000 +CVE-2024-24426,0,0,1ba202c66d22ec01d9165c4229044ba2d8de45fa575e097063ba053bd7d0b3a7,2024-12-03T17:15:09.400000 CVE-2024-2443,0,0,a8bbe87eac8a41399b1d0d3a72e714355872c34062df72f2bddd7214646f509e,2024-03-21T12:58:51.093000 CVE-2024-24431,0,0,df56f81b7c3a1e35add47673987ba3302b83c2d47d8419bd59e79e036d2e2abd,2024-12-03T16:15:21.187000 CVE-2024-2444,0,0,4077967648b87af230c120a80abe8a1c3709647ab561500ac246716e12815b1b,2024-08-08T21:35:09.480000 @@ -248480,9 +248481,9 @@ CVE-2024-25009,0,0,7a49371ecff66a731dba9be39b6c36a2872e7617aa621569c85562cb428fb CVE-2024-2501,0,0,6ce26352b8e14756a33573972eeb4c8a06096eee07ab0fb0ebb1c9238a943b1a,2024-04-10T13:23:38.787000 CVE-2024-25015,0,0,4c1212c8f769823bd4e7049fb129f848dc20c143fc1cc72b02abca5f7451e069,2024-05-01T19:50:25.633000 CVE-2024-25016,0,0,0e9311458b59df4142779e7a8b1d9bd170deea1a4bb4a555b03bbf822c263b92,2024-03-04T13:58:23.447000 -CVE-2024-25019,1,1,ccd03615e77816bdafa146d2befae76372fb27170bd97657f13091bc7ad8349b,2024-12-03T17:15:09.560000 +CVE-2024-25019,0,0,ccd03615e77816bdafa146d2befae76372fb27170bd97657f13091bc7ad8349b,2024-12-03T17:15:09.560000 CVE-2024-2502,0,0,5db5ed3649b395e84b1ef1ea57e3373879dc28bf7136036f8d40e08ab963dda1,2024-08-30T13:00:05.390000 -CVE-2024-25020,1,1,cf24905f4ad158f41a91eb05683b9c255c1d72ad13dcabc6630a58b681b00e7e,2024-12-03T18:15:12.997000 +CVE-2024-25020,0,0,cf24905f4ad158f41a91eb05683b9c255c1d72ad13dcabc6630a58b681b00e7e,2024-12-03T18:15:12.997000 CVE-2024-25021,0,0,8332f86306f4ceab760e5f5e3a003f3f5c62fd1b6b574c6e3af70a41de71cd64,2024-02-22T19:07:27.197000 CVE-2024-25023,0,0,fc27f892e9b9f8b0dcc06c73130838c8d932f593668ebe29c73cf641f9d3b8b1,2024-09-21T10:15:04.760000 CVE-2024-25024,0,0,292b2d39946afd1b9ad5ee06a8815eeb2737c523e74309496dbedf42f7d2468d,2024-09-21T10:15:05 @@ -248492,8 +248493,8 @@ CVE-2024-25029,0,0,73ebd4fbdc79e08bf51bbd35bffc00987416d5257a1f182e37909ac199636 CVE-2024-2503,0,0,69feba8a1ecaa5b47df24cb8640784600105629ed62bcf04c628e0d80623e12e,2024-05-02T18:00:37.360000 CVE-2024-25030,0,0,2fcbb968633b471481b1659cf8f35332f6e433fc3f482d6491bf1056a0790e63,2024-06-10T18:15:27.247000 CVE-2024-25031,0,0,b457525752363b6c80f39091c8baffde9aeb611ca774bb95f18751b6242d3323,2024-08-01T18:17:26.177000 -CVE-2024-25035,1,1,208b5ea027dc4e15dc12c3f8dab42b7181ac958e7fdb4cc060ee878d55f9c2cb,2024-12-03T17:15:09.753000 -CVE-2024-25036,1,1,353076a13c2a382d383576df3337ff5c9ed04f3d3a33d67e1f273ffb0fbd66fd,2024-12-03T17:15:09.923000 +CVE-2024-25035,0,0,208b5ea027dc4e15dc12c3f8dab42b7181ac958e7fdb4cc060ee878d55f9c2cb,2024-12-03T17:15:09.753000 +CVE-2024-25036,0,0,353076a13c2a382d383576df3337ff5c9ed04f3d3a33d67e1f273ffb0fbd66fd,2024-12-03T17:15:09.923000 CVE-2024-2504,0,0,bc1b0b8c3c44aa4ad945cfa7dc04f53a01ffea10c9d5aa9c1cc0cc69512decb1,2024-04-10T13:23:38.787000 CVE-2024-25041,0,0,b2ec9f09accd97793f15836559934b612a38386c531a9d4c48a381afddf5bf6c,2024-08-01T18:19:55.627000 CVE-2024-25046,0,0,eae354cb69572eceb000e17cf2bf7402f41e90996afef91ee4f08eb46291d6fe,2024-06-10T18:15:27.350000 @@ -249199,8 +249200,8 @@ CVE-2024-26042,0,0,2ea8d4dd55cbe369521d040be468f269c837b84a9eac6286bae77d5ed2d0b CVE-2024-26043,0,0,9e5ba2d761fb38599a187ece66b844e2c6f6948768589cb3a7e3e27c1f2048ba,2024-12-03T14:34:19.377000 CVE-2024-26044,0,0,66bac57be53c755cbe995e285249cde839b00b7b1d98f8199c1aa466447b6bfc,2024-12-03T14:32:50.367000 CVE-2024-26045,0,0,16de77a5d4b0cf723bbdcff02c0b9e5ead3b5ea66df2c839632d092fd2d31a4d,2024-12-03T14:32:46.117000 -CVE-2024-26046,0,0,5c87a28b13d53ec29b89a2b33427517db21012c37c446a313fb6274d8fa5a520,2024-04-10T13:23:38.787000 -CVE-2024-26047,0,0,148096905025fd63cbc95f27e9e4e0c5f23280eef70892c2f079c5329b94e086,2024-04-10T13:23:38.787000 +CVE-2024-26046,0,1,0c457d57bf34514107ad4779d9492ae9dcfaf8608bbf002a0eb2a27875e5dbf3,2024-12-03T22:22:16.273000 +CVE-2024-26047,0,1,2089ca080b8d7f7da347608fa836709dba71527ddf473ac9f04b08d05776f800,2024-12-03T22:22:25.890000 CVE-2024-26049,0,0,a3a34d9b7dae7c572a170c4cf9ad06366559734e7c052afbd0e4cb731a5c408a,2024-08-07T13:15:59.723000 CVE-2024-2605,0,0,349e4409ed80d6811abb3d6a22d4a1c2580eb4cb5b90719226cde56ad4b7d78f,2024-08-28T15:35:21.410000 CVE-2024-26050,0,0,e5e2c4f7b84f8f2f1d1ea8570d5ab87ff02bbfb4edf0f2eb8b892f6b238feba4,2024-12-03T14:32:40.333000 @@ -249231,19 +249232,19 @@ CVE-2024-26072,0,0,795aa52dd62646e83ed807713ec96c12320151f66f145549208b2eae946ac CVE-2024-26073,0,0,ea8b0395170bba4c212a67abb89e06fac33b2f03fd0bce7a8e02833ca1d25823,2024-12-03T16:26:34.260000 CVE-2024-26074,0,0,343c9b4e475dacc17a86a9d8e947e779cc9c9f7a1f2d9d30ddfd0d0411a8d1d6,2024-06-14T19:24:23.860000 CVE-2024-26075,0,0,901da86ca412d659e8a18006b04f83d9794756660ad061f7d2773a1db6038c69,2024-06-14T19:20:39.827000 -CVE-2024-26076,0,0,e3d4735c38e5c3c9eb10fc500b9c2e29c498e85efcaf17e85354d76841836419,2024-04-10T13:23:38.787000 +CVE-2024-26076,0,1,190cc6cdd9384b96b496e8a902932592c29e678b94eb62d18b3a55e3a36ad71e,2024-12-03T22:22:34.717000 CVE-2024-26077,0,0,11d79deeaf314f3815fc296aaf122c971232c2b7cee0a2ccfd4d162d209c3c46,2024-06-14T19:35:14.353000 CVE-2024-26078,0,0,15c623e5c49ad76f544f4e36e05701d53300618f3be12cff6120b35ce02daf08,2024-06-14T19:35:02.233000 -CVE-2024-26079,0,0,7def00d245ca33c0ed073b8deb05bb08843edfe5563d53cff951ac5e526b90ee,2024-04-10T13:23:38.787000 +CVE-2024-26079,0,1,1b063ad849193a7a551a28d4ba21923ffd1a62cfc982574c9bf02cdd56365688,2024-12-03T22:22:43.923000 CVE-2024-2608,0,0,034c3f0d69de46d9ba7a73a0532d7d80b727b4c71250c7f2c3749a641f69ef8b,2024-07-03T01:53:22.600000 CVE-2024-26080,0,0,7604d52bd30e88605dff84d8eeb0e9952afe9b0f5abb04468110dd0739ff6514,2024-12-03T16:26:46.317000 CVE-2024-26081,0,0,1d29efd0c7c46f3f7680eb50611ca91569a2766002cfcbb2b36fea018596932d,2024-06-14T19:34:47.583000 CVE-2024-26082,0,0,603b5ee896e39670eda6156999639510b8626e2d981c7d45c9753ffcdefa3124,2024-06-14T19:34:37.370000 CVE-2024-26083,0,0,33df432e039989f8563bd2b33e594330302cc12f6f0d6608747f36d5fb9ed83e,2024-06-14T19:34:23.237000 -CVE-2024-26084,0,0,e94535d0fd312a9be7042fbb14b84a6d7bb2ccb531c92c7a19d0d23e47735c24,2024-04-10T13:23:38.787000 +CVE-2024-26084,0,1,aae0f2cd3263289226cd7325e6d24bcef199a3ecdbd8ee2f6789513d437e617f,2024-12-03T22:22:54.187000 CVE-2024-26085,0,0,0c838fc652f7bf2f364bd685ad543b490f3fba112e65035ae9409ef1c463528f,2024-06-14T19:34:04.773000 CVE-2024-26086,0,0,ae34cc70c1fb5245418ea1021c46e145477ed2510ed19be388b0597933b584d6,2024-06-17T20:31:51.467000 -CVE-2024-26087,0,0,886690623538c9b67d73b3140abb23679c4e72a1155e44ccb96173e256c726c6,2024-04-10T13:23:38.787000 +CVE-2024-26087,0,1,5e0cdaaf19519b5625076cadce0769bea3bf4132eff86668ab1b5a0d9dc1c02d,2024-12-03T22:23:31.950000 CVE-2024-26088,0,0,aed72cfe3c05269ae6fa7444f7478df5bb7d6d6fd37a95c7c481f7f0efb015d9,2024-06-14T20:10:01.653000 CVE-2024-26089,0,0,87f38a9968c3e4028ac78d2f547942af5af438b7e5b9b22788cce73b35aca8df,2024-06-17T20:32:03.657000 CVE-2024-2609,0,0,b6301650fec4122c3c02b6e335400036f83dab48aa35b0d865ffd587777c27c3,2024-08-28T15:35:21.617000 @@ -249254,8 +249255,8 @@ CVE-2024-26093,0,0,c78f8313d7f9ae22e0b6d6b4b7b4f7ac5cc5c06dc88b21c00914a84215154 CVE-2024-26094,0,0,9d2ed7254ec4f2ba31272bea4c933824296834da359032a69be2b9666b077acd,2024-12-03T16:26:56.900000 CVE-2024-26095,0,0,9f6c7bddb38cd6b8f363ea5c70ef041eaf1840874199b0d4f54fdf8f0f85f9ed,2024-06-14T19:55:53.020000 CVE-2024-26096,0,0,a856d1c0d122ca77743cb2f984b701c53176cb71fb426f8e10c7bfcc9817e80e,2024-12-03T16:27:10.247000 -CVE-2024-26097,0,0,cf64c962cadb0fc8f1556505bc07c2350b9f9285ec03ff659cd6a815a0eb0c88,2024-04-10T13:23:38.787000 -CVE-2024-26098,0,0,dbbd02b23dacb0109748d3b2fc272a4103fcd271020bb791bb34007edc8f300f,2024-04-10T13:23:38.787000 +CVE-2024-26097,0,1,e44c5fd875e79800986ab942065ab88a7bac27025422193c75d8420d1aed8e62,2024-12-03T22:23:43.117000 +CVE-2024-26098,0,1,97f417e41d2fe409a4ee69b87b884f59dbeaa5d4f5d0cc0c7ea3085b5464944b,2024-12-03T22:23:53.200000 CVE-2024-2610,0,0,b027d224535ed46303e9cb28e3c541ff296bc0a756671ac358daf18839ba9117,2024-11-06T16:35:15.013000 CVE-2024-26101,0,0,43f2d3fbbb4c4b8f51f15938710fd6d3cc2a2f7ffcb5f068956881a183094b6a,2024-12-03T16:27:19.990000 CVE-2024-26102,0,0,26f73657f4749efd9627e01297796c03b1ed9f54e34743c90b72da281a5393e8,2024-12-03T16:27:31.687000 @@ -249273,14 +249274,14 @@ CVE-2024-26115,0,0,d74160aa381f4e1a51a3ec1cd1d03c99e220f3553ea9e0140484bf904ce91 CVE-2024-26116,0,0,abf59a73286b1cf58bc13403a83e9678e0351f50add52bd78b5eb74a78e51a0f,2024-06-14T19:51:03.750000 CVE-2024-26117,0,0,6c431170e13775aecc2297d81c07dfcb615de89aac569ded89309592114bcd11,2024-06-17T20:31:38.117000 CVE-2024-26118,0,0,51eecbb3f408b7b654b7ea484ab79a4be1e6d997e00ed8c27833ae8c7b8b7702,2024-12-03T16:28:58.907000 -CVE-2024-26119,0,0,c503d1dbd496f47cfcc05acb78d53a5a1697c7292b96b179a782ba7662c08032,2024-03-18T19:40:00.173000 +CVE-2024-26119,0,1,4b9672c4383944698be27ef3681196f885f486afd6d233cd555b9a74ce6885d9,2024-12-03T22:16:51.783000 CVE-2024-2612,0,0,4262bfdf186b50c97c0850391a589444d79ea8f33a25322b9905ef9642e35485,2024-08-12T18:35:36.893000 -CVE-2024-26120,0,0,36e5d4f10867ad6f473ee2c131d347d7586e4f8a8ed54d61685777cb84ad6820,2024-03-18T19:40:00.173000 +CVE-2024-26120,0,1,43dfe6d4a5bd0c25647885b13659676989d5db62934997c87a611f3edfaa57c6,2024-12-03T22:21:01.987000 CVE-2024-26121,0,0,957890214873564856e47183e155f244aa5acc330278ac5f2dbf5d754578caae,2024-06-14T19:56:28.683000 CVE-2024-26122,0,0,57c13883cf54d7ea5563c7f228cb6b0f720cd74558f1835e1bedf6fd46f326a6,2024-04-10T13:23:38.787000 CVE-2024-26123,0,0,d69a78525ed0b2177c48aba91e4b340a6ed0524f9340b64f380733a723672e11,2024-06-14T19:56:46.423000 -CVE-2024-26124,0,0,97133149298ed522b1c3fbdf003183730b397d0b9300590c141c074e9505b3dd,2024-03-18T19:40:00.173000 -CVE-2024-26125,0,0,cf1ba28c002bfb0806c2389a06b3a2626e65b5573e7bdd24b50820830a0583ef,2024-03-18T19:40:00.173000 +CVE-2024-26124,0,1,05e1b75e023e7f39562e91ba3e10093a02347fcc6413576387c93ee80972eeba,2024-12-03T22:21:14.077000 +CVE-2024-26125,0,1,f503cd783f2856196c3c43976be189791e5f167ba0b137ff2d255fa237ac86c1,2024-12-03T22:21:24.047000 CVE-2024-26126,0,0,a44a18a073a69f02ec04f44ffe9515cb0b92fa4e54cde7105c43ba6eea3d84f5,2024-06-20T16:02:57.067000 CVE-2024-26127,0,0,b9d71bd8d7c8687e779fc62c8d4da2b199e98630426fa73ac5fa303dfac123a8,2024-06-20T16:02:47.140000 CVE-2024-26128,0,0,f2a57020e98d0ee07df0edd9be7b798ac36d036800a85dad6f19c3e9d7a8b74a,2024-02-23T02:42:54.547000 @@ -250344,7 +250345,7 @@ CVE-2024-2732,0,0,59c41b28a53d51de59243e9e076d0b70e0706e7684df1ed7a61104bd5a3689 CVE-2024-27320,0,0,322204c7c44b6b07c7c5ce2517955a5763bb970c7a635001dc6670202a7c4e27,2024-09-23T13:56:48.353000 CVE-2024-27321,0,0,21ec13da4bc7743b26ab8f16ae210d29125d1180d3f4bbbecb3541886b29f580,2024-09-20T17:06:58.440000 CVE-2024-27322,0,0,b770b9d962cb08865ef72f437565bd0d77dc69db533af805410b12f466305679,2024-06-10T18:15:28.103000 -CVE-2024-27323,0,0,38592ea93906fb228845a81866b0a5686932b7d61e75313c319e38db86407877,2024-12-03T16:50:34.657000 +CVE-2024-27323,0,1,6c305023feaf03ade31091623ffcdfebff35c3b0cdd2648e0815655a328ef63b,2024-12-03T22:03:36.550000 CVE-2024-27324,0,0,bd68fc610631d765b504e2eb0f9c966837d653f843cbd0dbbbd7151aba723966,2024-04-02T12:50:42.233000 CVE-2024-27325,0,0,91c89b4ca089464e099a6844730ad761f5ea57833c3f8473c9d662fd4df4035a,2024-04-02T12:50:42.233000 CVE-2024-27326,0,0,17ed7eadcf7ccf0f8f633fa32c1b3dd8ae0821c2df09af51de2b083a97bfbfd7,2024-04-02T12:50:42.233000 @@ -251345,7 +251346,7 @@ CVE-2024-28825,0,0,2060c8862968982d4a6159b0b62313dec95ecc020293b85f137ce41396383 CVE-2024-28826,0,0,ccabc68ae1502fb496d2010a22f66c953a12ff1a849372d7235937980a01c570,2024-05-29T13:02:09.280000 CVE-2024-28827,0,0,30d6d403e5c79dbab459dc4233554203969c32826737ea25dceb545e947896f1,2024-07-11T13:05:54.930000 CVE-2024-28828,0,0,f569edfaae2cfaafb15d4f5e29614839e3689bfe76be347c8b67efdf6d0be50b,2024-08-07T17:57:38.413000 -CVE-2024-28829,0,1,7a55640720947d8ce349cb378455ecd484e6615d62727837b8c36597f79843f6,2024-12-03T17:55:48.257000 +CVE-2024-28829,0,0,7a55640720947d8ce349cb378455ecd484e6615d62727837b8c36597f79843f6,2024-12-03T17:55:48.257000 CVE-2024-2883,0,0,4414164b8fa79ba498c6ddbb6ab7a825d3f0a39397b4604f63f00efe5e5aaa16,2024-07-03T01:53:37.420000 CVE-2024-28830,0,0,49bb68528483eea32fe70c10feda0199ddfef50b4330a9b74a5779b200dbf298,2024-06-26T12:44:29.693000 CVE-2024-28831,0,0,8b0cc22b019b2f22717d4926d7f18f8c0f1245da30fda97cee3d4dd670ef131d,2024-06-25T12:24:17.873000 @@ -251795,7 +251796,7 @@ CVE-2024-2940,0,0,ff445ca7ce0af843f5f704c8c90659aeb6511c9f210bd6d3afa6e1f01b0df3 CVE-2024-29400,0,0,8f34751d18d63c75601eb947e8c0e3714d1d567d723f8c0dc5c4c493f22e06b6,2024-07-03T01:52:26.027000 CVE-2024-29401,0,0,14e4834e03b78a3df05cd8e04bcdf90a5bfad72c514740bf2fbb87c81dad0d19,2024-08-05T19:35:11.287000 CVE-2024-29402,0,0,7a60de01cd1e1ba7089d18beb6c6236bedaa49309f0015c7a9cb500a08c82ce3,2024-11-07T16:35:15.387000 -CVE-2024-29404,1,1,cb9da2d67dd4fa648ee43710d0ed869338276429f02da7377b7a3d981388cc36,2024-12-03T17:15:10.087000 +CVE-2024-29404,0,0,cb9da2d67dd4fa648ee43710d0ed869338276429f02da7377b7a3d981388cc36,2024-12-03T17:15:10.087000 CVE-2024-2941,0,0,1d46f1daca1d9b41abf5b871e57cb1a154c8989de86923637267a01c87a2e537,2024-06-26T19:15:13.107000 CVE-2024-29413,0,0,e53aa5e14ae181dd984ec17641b62210a6aaf3e99011fe016e5561f245d20a2f,2024-08-27T20:35:28.013000 CVE-2024-29415,0,0,81703b9c0269e1b460b05361ef90d054c3389b8bf64cccb5dfc5c790069eada7,2024-08-16T14:35:01.260000 @@ -252366,7 +252367,7 @@ CVE-2024-30201,0,0,b519279052e3bf480fab70215e80d453e6672590c8aefdb7acb1d4f5f3735 CVE-2024-30202,0,0,ecd5c9b4bd0ebc202276e86a3d9a7e9f6b3bf262206739b2cbd70f27623f88ba,2024-11-14T20:35:23.057000 CVE-2024-30203,0,0,8b447cfaa3c0f29bed1fa430ec69e0ff721af51bf1f0d5669fc03f342b79df4c,2024-11-07T11:35:05.040000 CVE-2024-30204,0,0,4b2af1187ee5f3703025057d51c0997c41fee3382ca411eec613f6ae404cff0c,2024-11-04T17:35:14.370000 -CVE-2024-30205,0,1,67fef15cf456a2a8a49b7296d8a6faf968ebb587417f5262a0de46685c1fbb16,2024-12-03T17:15:10.187000 +CVE-2024-30205,0,0,67fef15cf456a2a8a49b7296d8a6faf968ebb587417f5262a0de46685c1fbb16,2024-12-03T17:15:10.187000 CVE-2024-30206,0,0,a7d0521ef088000b8f51cc15715463c9e26ba3441057ea1a5875859d791a61b9,2024-06-11T12:15:14.390000 CVE-2024-30207,0,0,93b801e8c0cb837d34644b282b92dd26d7a86790e6531becad283497647bbd2d,2024-06-11T12:15:14.520000 CVE-2024-30208,0,0,57146b9ec8ab54f1968d14f0d8832031fcfdc08d067fc5f7c7e4b7497c1c092e,2024-06-11T12:15:14.623000 @@ -252921,7 +252922,7 @@ CVE-2024-30889,0,0,4055363c9710582a93e9c4afde24f53fb76bf450d1c6c8e60ffc2b185aa7e CVE-2024-3089,0,0,f50243477e19a0c473b8d22e5ff97c5e0852740c2af46b357e2e30b0b527a41c,2024-06-10T19:15:54.210000 CVE-2024-30890,0,0,0f772534d2f25b8992cdb2b7f1614a9b1113da3447c153b6e6f711939289b199,2024-11-04T15:35:31.227000 CVE-2024-30891,0,0,396e17014fd3175e72a9c0a6ece22b5363c9ba81b8e8ea154f79fa53fb440cca,2024-08-19T20:35:15.447000 -CVE-2024-30896,0,0,1c2a8f6103b169f4b2e6374c12c4e276b072d21b33e30de613363d5fad056629,2024-11-27T17:15:10.650000 +CVE-2024-30896,0,1,0330d890e180a2ac4abf50a1066f9a03357f57b7d30c34d26b5fa3e5eb33ba6b,2024-12-03T21:15:06.437000 CVE-2024-3090,0,0,ca58ae48ece7b5420c70058bc4ef34d34b72713bd9fb9580ab51af080cd6b613,2024-05-17T02:39:43.047000 CVE-2024-3091,0,0,ac47144b8dcc6e68da1982025c8274e4d7559a0b603bbff8eb392c09297cdc97,2024-05-17T02:39:43.130000 CVE-2024-30915,0,0,4a451061f2277273de3f1e30d4e5402fc40c4a77bd4f2be73b5ddc38a083afc5,2024-07-03T01:54:16.067000 @@ -253512,7 +253513,7 @@ CVE-2024-31680,0,0,c4628bff4524f4ba02ba3d3e5f2d1afd3e6b045a8d32604fb16cfbf01a187 CVE-2024-31682,0,0,6ad84277376005bde3c5be691a4699ed2a494d2e47836225d1c8ccbe4273b358,2024-10-29T14:35:17.517000 CVE-2024-31684,0,0,a58e80e535316094d398f75f99933a7946ff10472558d364c59331628a9ef154,2024-11-12T18:35:08.927000 CVE-2024-3169,0,0,b6d2ffb09103c8b8a3976e1d11af5d86787ae2ffc33eb4178c248279d95ed274,2024-08-01T13:56:22.240000 -CVE-2024-31695,0,1,8fd4a26ea3223cef6079194978b50afaef81942a9f8f26a61510d854c06985ba,2024-12-03T17:15:10.377000 +CVE-2024-31695,0,0,8fd4a26ea3223cef6079194978b50afaef81942a9f8f26a61510d854c06985ba,2024-12-03T17:15:10.377000 CVE-2024-3170,0,0,e5d3e527beb338f17b4d7e88e470a76429efa4bde538f57bcfe45fe38f4493ae,2024-08-01T13:56:23.270000 CVE-2024-31705,0,0,360c5213fb2e781c07e5b26068537bfd39f5bcae9363979b2bff285237ce8d8a,2024-08-20T17:35:05.360000 CVE-2024-3171,0,0,7ac04b89850dd4c13fd178af0a23f600897d741bf0b6409f6d9c0faa5fbe4cd3,2024-08-01T13:56:24.363000 @@ -254755,7 +254756,7 @@ CVE-2024-33405,0,0,7b64b483e46a97392e43f4b015cd27cd282d4799d58fb8648b12f3802fedd CVE-2024-33406,0,0,8c679048379d6dc3620065008eeb4a0fa8183be266d695e89da0c2d5e3fa0724,2024-07-03T01:58:05.953000 CVE-2024-33407,0,0,ed4a824fbf1e19bcadf3992da26933b694f424ff133570bc43d44a0c7b3a43a9,2024-07-03T01:58:06.720000 CVE-2024-33408,0,0,9ceb89cbe63e2bffb68e241c8e84ce5036184c141f949951d455a3c14bded742,2024-08-01T20:35:56.170000 -CVE-2024-33409,0,0,ffe65aaae5e65bc04175d7ab0fc0b6179a9584a709e9ce972831a579aeaf6f2b,2024-05-28T18:15:09.347000 +CVE-2024-33409,0,1,b05df9e2df3c8beccf4df2b5835962321b4d05b5065811a8df05123def68b89e,2024-12-03T20:15:15.107000 CVE-2024-3341,0,0,9b62fc414d0ed9f7dfa79ade6554806c079faf0ad5addf92df0d4598c1259e85,2024-05-02T18:00:37.360000 CVE-2024-33410,0,0,c078c0658ea8ad68f15ffc8e894b976091875813ae0f7dd53ee1a6c6de68b839,2024-07-03T01:58:07.577000 CVE-2024-33411,0,0,d4b6b59aad1a2b98ba2b07a3f292ce85f1ef1e986776fdf66ecd25dfa92d252b,2024-07-03T01:58:08.337000 @@ -255947,7 +255948,7 @@ CVE-2024-34928,0,0,06617cab0c322a427612e8f6d6917cd063878ec94ca850683c68470a1a2c8 CVE-2024-34929,0,0,80902861c56fffe184d43b652e5b65da73fb217bc0c681573f8c1d15948cf18e,2024-08-01T13:52:26.657000 CVE-2024-3493,0,0,066f7bdb112b4eb90ab428a4a7b97610f00d49e6eb62b740b5f6b8c5b5b2b054,2024-04-16T13:24:07.103000 CVE-2024-34930,0,0,9fb3b8964b5cccf698fe1af2c09b9ebbf2bbb61e30f2dd6c2b71de12b8d3c46b,2024-07-03T02:00:57.490000 -CVE-2024-34931,0,1,7b040e33b160496ad0105f0fa8d11d6c808bf5866885798865a15f0f6269baff,2024-12-03T17:15:10.530000 +CVE-2024-34931,0,0,7b040e33b160496ad0105f0fa8d11d6c808bf5866885798865a15f0f6269baff,2024-12-03T17:15:10.530000 CVE-2024-34932,0,0,b3ae27f61253f7767fbdf3438e64ca1eae22c4d23e1e356e0c8ba8ab5232e6bc,2024-11-20T16:35:19.057000 CVE-2024-34933,0,0,c3dbf950f435984b9b33f4f97b61de10305ed6619e3cc02c8a837894fcd24d4d,2024-07-03T02:00:58.450000 CVE-2024-34934,0,0,c952d1ae16fc59b4ad6a305c684ff2ae339875de2313f11687526116a6f6a313,2024-08-20T15:35:13.137000 @@ -257221,8 +257222,8 @@ CVE-2024-3660,0,0,c3c1c3312c8a9566bf9feedf7d8876d18d19f4aa50138300852d5ac195117e CVE-2024-36600,0,0,e7eab002c297c7d5ce5dd570ac3b60c68bd283d5ad8a781f4e7d7381b748121c,2024-07-03T02:03:24.687000 CVE-2024-36604,0,0,ceabd4d65e8e525e1dbe1c2ad39c0fe240ecb352a8c95aa43d6d84024ca2af4a,2024-08-15T19:35:12.673000 CVE-2024-3661,0,0,c42cca3fa75d9e1e2e62908451948484a5d5cca5f29f392158a6d0b59eb829bd,2024-07-01T15:15:17.187000 -CVE-2024-36610,0,0,978b382e6d2d7458ef4ee665877d5fa279890848d387de447325b7fb46ba2824,2024-12-02T17:15:11.230000 -CVE-2024-36611,0,0,4c2b02528fdd4d9d491867b6131bd05320914a0ba163026a539685333ebc096b,2024-12-03T16:15:22.057000 +CVE-2024-36610,0,1,0927c00cb75f9358070097d5ca895695a905274604112058caa92d1332131322,2024-12-03T21:15:06.600000 +CVE-2024-36611,0,1,8ae1129d2c6d7f04820dc25a51b35eeb79c0ea9714d3891bb92ee90d865f9805,2024-12-03T21:15:06.783000 CVE-2024-36612,0,0,2e5bae787232529157776124a9b65f7f3416dd8775c93aff3efc637bb8af407f,2024-12-02T17:15:11.420000 CVE-2024-36615,0,0,c3893c90b5581100f420f26ee0ccf784458a2107b295d3c77defc3849a0f0672,2024-12-03T16:15:22.197000 CVE-2024-36616,0,0,296a4798d6d750743bea7f8c9bd5c284519a9999e91edf6d3d9b49bc20d67d94,2024-12-02T18:15:09.857000 @@ -257730,8 +257731,8 @@ CVE-2024-37299,0,0,205f0b40a758fdc1dced6d887b5ea436463fde8aa45c00a6907effc08c197 CVE-2024-3730,0,0,f3a19794b78dc38a637f07c4e7db0ac4195dbeda34c530b5cbd488b9ecb411f6,2024-04-25T13:18:02.660000 CVE-2024-37300,0,0,5590a189f2c80a2c0e69ad3b8771a19032b2ef2b4a268875ff14b77477677613,2024-06-13T18:36:09.010000 CVE-2024-37301,0,0,edc8a23be80a0adc425b4edf50a7dcbe1479a99dce59b837847fb08393ce0038,2024-06-13T18:36:09.013000 -CVE-2024-37302,1,1,7540ee377e8f914590c5ebfecfc94146b2a3f69fa425b1e7984809f9edde3caa,2024-12-03T17:15:10.733000 -CVE-2024-37303,1,1,90c24aadbd635ecc97ef584d134867e31666a91d2272348e915419f7b622df98,2024-12-03T17:15:10.890000 +CVE-2024-37302,0,0,7540ee377e8f914590c5ebfecfc94146b2a3f69fa425b1e7984809f9edde3caa,2024-12-03T17:15:10.733000 +CVE-2024-37303,0,0,90c24aadbd635ecc97ef584d134867e31666a91d2272348e915419f7b622df98,2024-12-03T17:15:10.890000 CVE-2024-37304,0,0,51ff2c81cd80d88058aa6d3b84ff7bd3ddd43c76d3fb15284419f7add985f2a7,2024-06-13T18:36:09.010000 CVE-2024-37305,0,0,a35a18378d9858479faa1c229d8034f7e9f595e8a830d5cd9cde2fec42c2e7b6,2024-06-20T12:44:22.977000 CVE-2024-37306,0,0,793d4fb76d193c9cde6559e6d4f42e65455e8eb4e61b0bc936eaa6f9b8fbb6c0,2024-06-13T18:35:19.777000 @@ -257813,7 +257814,7 @@ CVE-2024-37388,0,0,5e976aadc48a067bfe8b054b3afb65dfc2829bfe1215753abaf5d600b1243 CVE-2024-37389,0,0,27f7927000cd6a2429ab617761c45ffb27c2f3c3199f49f01b1eda02927e348e,2024-07-11T14:48:32.300000 CVE-2024-3739,0,0,ba8b07349fdcbf4927f1d53be7924c0ba58d0f09900d65fe34757229d7b34b0f,2024-05-17T02:40:06.067000 CVE-2024-37391,0,0,e99f92be626b4b841a6b299b2728912f45fefbd409010bfee05135471d62af01,2024-07-31T18:33:47.383000 -CVE-2024-37392,0,1,c57b6d8b0609fcac8ed55e1412ac991415047b97cf80e90c77ce6d1c31b26603,2024-12-03T18:15:13.410000 +CVE-2024-37392,0,0,c57b6d8b0609fcac8ed55e1412ac991415047b97cf80e90c77ce6d1c31b26603,2024-12-03T18:15:13.410000 CVE-2024-37393,0,0,b93d796f3c4283b87dfd22c20f36a8116f582a381c44650f39c5ea43e6b806f2,2024-07-03T02:04:18.707000 CVE-2024-37397,0,0,7fbcc51c6b175128d4a712387aaad70ff152c7c1c439f81c942699a1e4599add,2024-09-13T16:35:09.630000 CVE-2024-37398,0,0,d014b7eb9a15e5e3eb9081a631750734a91337406ca89540557d8e0fe4675904,2024-11-18T15:23:23.543000 @@ -258241,7 +258242,7 @@ CVE-2024-38031,0,0,39791687a86cb00a8c8a9bf6c29b8b333e2d9192614552a4ee24252586df5 CVE-2024-38032,0,0,41be2218ab416d77ec81c0853b207c29f9c64191f96c18dcd3b6e6f7560f90e5,2024-07-11T16:31:16.480000 CVE-2024-38033,0,0,1e81123daf9f99850b1ab7ee785cd263ed2b0b018942e514470897032a30503e,2024-07-11T16:27:21.303000 CVE-2024-38034,0,0,e720c7cb8e085ac1619fbec51b8ca1a9266a96c4740c9831ab3943b092aa8264,2024-07-11T16:26:19.257000 -CVE-2024-38036,0,1,ac23c2be19b6c7cd7d2a88bd4672191171c9b11da0e8a168cb5259a112a9c463,2024-12-03T18:15:13.710000 +CVE-2024-38036,0,0,ac23c2be19b6c7cd7d2a88bd4672191171c9b11da0e8a168cb5259a112a9c463,2024-12-03T18:15:13.710000 CVE-2024-38037,0,0,6ee6641359a9997141535dc4bf184fc6adae3314eb2141cf63c27cb33bd18eb6,2024-10-15T14:34:22.820000 CVE-2024-38038,0,0,4aa049265d32d6590c37031d06b9ca2e8eb5e0e6a4aadbb4eb6ba3d0d1ecc8b1,2024-10-15T14:33:46.730000 CVE-2024-38039,0,0,e15a0723c4839431a45e7e12b3249cdf72b61c98dd323f1ba61d1cba1e519674,2024-10-15T14:34:00.893000 @@ -258662,7 +258663,7 @@ CVE-2024-38492,0,0,c16677aadc081311e0e1e91d0375fcc95bd79bb96f874c00db030ff80ceea CVE-2024-38493,0,0,cb3521491e17be78f8f991710ce8fad1d8ce8a5b12243c726011b0461d220d77,2024-10-28T00:35:03.650000 CVE-2024-38494,0,0,414fbd6d2851a15a9d78e377321cacdd692320d773acbcbc218c1cbcdf7a31d9,2024-08-01T13:54:53.837000 CVE-2024-38495,0,0,fea4dcb4fc2311116e216f5501bdcce029e8616b236558b22d9cb3670ca9e419,2024-07-16T13:43:58.773000 -CVE-2024-38496,0,0,6e423c176a887ed5895ae7351498e6b63c7505283576ed5f43b90da3d939aeaf,2024-07-16T13:43:58.773000 +CVE-2024-38496,0,1,01a1900349f3d0adbd135ec854533895da77cbe9c60e719fe6990ff9f4db5d3a,2024-12-03T19:15:09.550000 CVE-2024-3850,0,0,2382357c8e4d6adda4f3540070cc5ea125c45aed93070563af82a0d626955695,2024-06-12T18:12:56.413000 CVE-2024-38501,0,0,107ba9da0def272edbee92f63403371ae902a6026765264509f3ddd58bca6605,2024-08-22T13:34:42.653000 CVE-2024-38502,0,0,b5bdc3f7b1bc56d47ac5d1146c261af04f17a5df43c92f8f1ba3633b24999ec3,2024-08-22T13:35:47.970000 @@ -258998,7 +258999,7 @@ CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d CVE-2024-38856,0,0,cf2c30abb1c3c3e6b03acfa253b7bd98efa464ab76b49fddc2034ce3ce8a3be1,2024-08-28T16:15:58.043000 CVE-2024-38857,0,0,857bbf4d5ee889c68ec1450930f0cf323232ab2d5a162824c8153ee668a7e638,2024-07-02T12:09:16.907000 CVE-2024-38858,0,0,c2e046d5d75320cc690e509cc93285ebeb3c1c26a8f79c6f003385d5db961fad,2024-09-04T14:39:10.203000 -CVE-2024-38859,0,1,d5cd9910194e7ede45677f9f5ea018635b199c144fa350166115cef667345577,2024-12-03T17:47:02.467000 +CVE-2024-38859,0,0,d5cd9910194e7ede45677f9f5ea018635b199c144fa350166115cef667345577,2024-12-03T17:47:02.467000 CVE-2024-3886,0,0,637917caac7fdeed5913d854d310583d9de4da2bf7f910a461c6efc8f1bacf15,2024-09-03T18:48:14.927000 CVE-2024-38860,0,0,266a5ea7baf50ab92e42d7685db3a6cf2803dcca1365001a34024abb32b3b89e,2024-09-20T12:30:51.220000 CVE-2024-38861,0,0,c849569e1ce9ba1b5e191f651dac8e0341ee6fab90d6f85280ffa2b71faa4392,2024-09-30T12:46:20.237000 @@ -259846,6 +259847,7 @@ CVE-2024-4036,0,0,faef85b8ea4d3772643857800ca53857ac0bd4e8c893e27c61e628dc785263 CVE-2024-4037,0,0,835f7b633520c38dc69c5473ca883b788d7739f8c5278809ab72b10ff3489faf,2024-05-24T13:03:05.093000 CVE-2024-4038,0,0,9199a5f679fdf6d4f05942a1d329990ffc0905f3bf6de7561a7af327688cdab4,2024-05-14T16:11:39.510000 CVE-2024-4039,0,0,b18b8aac4336f296c5655f645710463e48a4544089b8c4c20638e847b5c74634,2024-05-14T16:11:39.510000 +CVE-2024-40391,1,1,cbd9b0d424ed91ca3ee4ca4e36de30c2faa4e7dbce8c14db1ebc2cfb4a2106b3,2024-12-03T22:15:04.740000 CVE-2024-40392,0,0,4fca88dff401a8138459da84bc3f01447997dddad0d6609e6db41057956be98a,2024-08-01T13:57:14.083000 CVE-2024-40393,0,0,9b92da21177fe8aa44a5e39548076593e5725a02c42ea3793eafd13d4eb2e51a,2024-08-21T18:13:42.670000 CVE-2024-40394,0,0,6a6373d6840a53222337e137dc03e4cb2a60579893b62069f0f6025fffca56b3,2024-08-01T13:57:15.033000 @@ -260022,7 +260024,7 @@ CVE-2024-40681,0,0,fac9532bdd8d5b6d1b1f49e08b67a17d3abcf6f9f6c80d971ff62d66179ab CVE-2024-40689,0,0,d72047a797aad87fd24dc95664d6dde0e77455bde7da3b63cb978ce1844a86ec,2024-10-19T00:30:36.680000 CVE-2024-4069,0,0,fc5a2986d6746eec6d2dc8871a19fd31bd3dae122b27ac5ac325372fce08edbe,2024-06-04T19:20:29.457000 CVE-2024-40690,0,0,90531c3f5bf2655a59eec8750bd49d0d616cedd303a52fde5af4cabda07abfea,2024-09-10T16:16:41.940000 -CVE-2024-40691,1,1,2e5ac0199faaeb30178fb9a2acdbf74096220c2a50c2d4d61fc7469fdb74dac8,2024-12-03T17:15:11.037000 +CVE-2024-40691,0,0,2e5ac0199faaeb30178fb9a2acdbf74096220c2a50c2d4d61fc7469fdb74dac8,2024-12-03T17:15:11.037000 CVE-2024-40697,0,0,f856503bb71a9cc35c4f2b21ad4463650d9c9dc59f1e2e3c8f1061ecb691990a,2024-08-22T13:27:20.743000 CVE-2024-4070,0,0,f50441c69b27e00682c793729b411e41b0ab8839510e28fbeccbd72a35bcaeb5,2024-06-04T19:20:29.567000 CVE-2024-40703,0,0,c7bdea52d2b22e205d62154ebbe00df525e8e01e7a4b70c25a797f803fb17c50,2024-09-27T16:49:46.177000 @@ -260769,9 +260771,9 @@ CVE-2024-41761,0,0,338c8968760535358ae69eee380114a3e788f32922b0b500d7124a0d4fa3b CVE-2024-4177,0,0,e1d6d87dc8ef62b0d8de94cfe98a875b1cbd39c3640e8e02d8d5a4e8bb3cca88,2024-06-11T17:53:13.710000 CVE-2024-41773,0,0,73b68ae1e3819b7d1bac9bdaf38a7a90512524d32ae7dfbb950bef5b99d479bb,2024-08-26T18:33:07.997000 CVE-2024-41774,0,0,efcbfdf7ce18fcd97c6ecc860adabe2a80f23f77068d5d032fbe380664ccfbc3,2024-08-24T11:15:05.670000 -CVE-2024-41775,1,1,07472990890f284d5d7d4d78df377c400ae7aa9ea4917f4088f45395000c109f,2024-12-03T18:15:13.920000 -CVE-2024-41776,1,1,3937221d1e0a64623563f6b85d8691bc0c1223344b4ac4f8b6097668bc311cf1,2024-12-03T18:15:14.107000 -CVE-2024-41777,1,1,306ab070d2fe50667d0329bff4f8f62654728064d71a9eb0d792571480a9dd59,2024-12-03T18:15:14.293000 +CVE-2024-41775,0,0,07472990890f284d5d7d4d78df377c400ae7aa9ea4917f4088f45395000c109f,2024-12-03T18:15:13.920000 +CVE-2024-41776,0,0,3937221d1e0a64623563f6b85d8691bc0c1223344b4ac4f8b6097668bc311cf1,2024-12-03T18:15:14.107000 +CVE-2024-41777,0,0,306ab070d2fe50667d0329bff4f8f62654728064d71a9eb0d792571480a9dd59,2024-12-03T18:15:14.293000 CVE-2024-41779,0,0,17ec4f61cef6012531e67f2400115e9e222c01b8977f86a87aaadf93ef6e750f,2024-11-22T12:15:18.987000 CVE-2024-41781,0,0,ac78128c66afd97b943956e29afef1e45303dcc74aa8cf3bf627900637de3972,2024-11-22T12:15:19.193000 CVE-2024-41784,0,0,8c6624e71cb1eed477e47e819c637ab44c35481822d3a957ec1d5eebd3832ab4,2024-11-20T14:35:10.117000 @@ -263512,7 +263514,7 @@ CVE-2024-45656,0,0,78d9804910af28b8c176663f88322290c5c713635ecedd69d9bf4321a17d8 CVE-2024-4566,0,0,c4354a4e62a03c97286174a61ad4d2f3843d01589ace1532dbd5a5f84743d16c,2024-05-21T12:37:59.687000 CVE-2024-4567,0,0,55b6508070b71672e22c57660afab28e7ebc1a40a37655965c41825cdc3bc17a,2024-05-14T16:11:39.510000 CVE-2024-45670,0,0,f344d38326cc1ee5115d87c2c3180ef72598459ab3198d147c85e5db126cc391,2024-11-16T00:24:57.203000 -CVE-2024-45676,1,1,ba22aedad1da063b2c55d949125827576f26bc6c6e068deba87367ee2d01f60a,2024-12-03T18:15:14.480000 +CVE-2024-45676,0,0,ba22aedad1da063b2c55d949125827576f26bc6c6e068deba87367ee2d01f60a,2024-12-03T18:15:14.480000 CVE-2024-45678,0,0,a1fda46a16546e5971e32d47cf6c55c6e5adf9e7e7bc6498d2c3cdc35ca99a2c,2024-09-12T20:07:09.640000 CVE-2024-45679,0,0,b98f85803530a208de6f955471a00fda8462357bfd07c53d204959dc086af47d,2024-09-20T12:30:51.220000 CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec4236,2024-05-07T13:39:32.710000 @@ -263561,6 +263563,7 @@ CVE-2024-45752,0,0,c56d2e99daff13fa264a8e02ee453ba88231a536487b9dd847b13fefb0df4 CVE-2024-45754,0,0,27881b9f8c3e60f9d5e35efd217ea03a3a53beb79b5679c0a5048b58d7f60f46,2024-10-15T16:35:07.827000 CVE-2024-45755,0,0,3380a03454f7c2bac1206898ca4fa4184680be886daa8fa0e017d976f6eee31b,2024-11-26T16:15:15.597000 CVE-2024-45756,0,0,c88c00192e21176f6155758efe042517d130d9b657618b8f3b05bd3fe303bdeb,2024-11-25T19:15:10.673000 +CVE-2024-45757,1,1,abaebb2ab2610933dd59b786c90bea3af3f91827dc78a78c6a95522fdc00e5ce,2024-12-03T21:15:06.953000 CVE-2024-45758,0,0,e058696ef4ee1e11dde5d7f4a1626a6964f9190aeabab6642796a352a4a3c2cd,2024-09-06T18:35:13.043000 CVE-2024-45759,0,0,38da8e2a6eeb3db9dc524fe42bbfcaf056530b0773e38bc08f83c4079be512a1,2024-11-26T02:10:03.923000 CVE-2024-4576,0,0,d47b5037987d3332638a14c0dba5a2bae073fe818289e35d14fa9c3b2b647939,2024-10-27T22:35:08.450000 @@ -263919,6 +263922,7 @@ CVE-2024-46610,0,0,dfd11b66ad880194d4e8759fea756317b6075d327e3519259cd11f18ae0f4 CVE-2024-46612,0,0,a589f709811c7445ac7df28a3a7782b0e1ab03ae28a72339e484d8d02cc7d048,2024-09-26T13:32:02.803000 CVE-2024-46613,0,0,5ea77bcf17f248af3d069df5b88a849aa784044eebc39e95db23c0b984f956be,2024-11-19T21:35:06.937000 CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000 +CVE-2024-46625,1,1,e036c2fb3ae85ba95e30ff971b52c755b42dd725f69d5dd7e4b6f064ac659acd,2024-12-03T22:15:04.860000 CVE-2024-46626,0,0,b2dbe1e3c2ee97096cbfddcd538250ce5664f2528c19dd2dc51892ffc471844d,2024-10-04T13:50:43.727000 CVE-2024-46627,0,0,4cc8890cea4e8322a4c476b42c8fefe2b4b66b62a78446cc66eb2d1a373670f4,2024-09-30T12:46:20.237000 CVE-2024-46628,0,0,75b1cdb8791d268c28a8d1c2eb3eabb85cf8645763bd77b2b5fbf5588170833f,2024-10-04T17:18:31.663000 @@ -264176,7 +264180,7 @@ CVE-2024-46898,0,0,1121a0227e884e663de945d1f5ee0881d2211aaf4fceffe823ea2d2dc74e4 CVE-2024-4690,0,0,8a659fbde289577b9d47a4e0b198b3a10d973db6b9b3690d157fcfdd9eceabd6,2024-10-21T15:51:10.467000 CVE-2024-46902,0,0,27aaa174bb37d07c97f320c2cd9d7af55f96c8335147ef8fc1c8a8b59f67e5a3,2024-10-25T14:50:23.897000 CVE-2024-46903,0,0,c5646f2eca42dcdf58f6c7cfced2b89da0d0fd3b53651fe38e295ee3b07935b5,2024-11-01T19:35:27.957000 -CVE-2024-46905,0,0,61d026d9619c108dab285c18a0cf72d8d80132a58f70faff94aa5509533b9382,2024-12-02T15:15:11.443000 +CVE-2024-46905,0,1,c91d8022b40d8ed89db934fe241e50799d39fb19b15c2092d3067ee42632b758,2024-12-03T20:00:17.570000 CVE-2024-46906,0,0,b7342c4add30d58f1a7fc06f53ca3ea14de5f93eb25a93d613be8e7c5aac1102,2024-12-02T15:15:11.633000 CVE-2024-46907,0,0,99a5d98e415fb461a7a64ecd1233b781d36234e513fb2259d5e67154c9356651,2024-12-02T15:15:11.793000 CVE-2024-46908,0,0,d9df5230b86009d0e5d988ab260acc4e7ab8189ce25aa89bbb900b7c4573af2b,2024-12-02T15:15:11.967000 @@ -264319,7 +264323,7 @@ CVE-2024-47087,0,0,00c0418dcbaa10bdb3121773be01ff0430232cec071716dead5062981f005 CVE-2024-47088,0,0,5bc4be26850bfb4e3e396fe3f1262b2500b1973a359f7076f289ec4b80ad5479,2024-09-26T19:12:58.083000 CVE-2024-47089,0,0,1aa118929a8fbaed8fa0c3349daa09104fd9f185af346e27a442cf4679169f72,2024-09-26T19:09:44.377000 CVE-2024-4709,0,0,291d83b7a71e23f3ddf2ffe4b4f9de6c9c89e71bab3de54c457add53e92c99e9,2024-05-20T13:00:34.807000 -CVE-2024-47094,0,0,86767b2e424b6daf37b9304d27e68d1059d395794405d13173a2cfa9cbab28d2,2024-11-29T10:15:10.657000 +CVE-2024-47094,0,1,d24e1f292f7d19d40d32d967d3e72cc931ea886edc80358cb771de69f5f1ca5a,2024-12-03T20:01:52.610000 CVE-2024-47095,0,0,4c36448c484bc2fa6b9b6e1761e7a42a208bcb78aee06cf2f905f47ea2223412,2024-10-10T12:56:30.817000 CVE-2024-4710,0,0,bc3d641a4dcd652350f442cdc80714adde1798c9afb82fb5cdb92bbe3aa27b20,2024-05-21T12:37:59.687000 CVE-2024-4711,0,0,d363465dc42b9acab3c0c0b87ab6c465a5fbabc481e6b69ff97f983a499169d2,2024-07-18T16:32:23.447000 @@ -265041,6 +265045,7 @@ CVE-2024-48073,0,0,f808f327cec1eb1c4e50210dd8e768204bbea0c1ec8029cba6324c290353d CVE-2024-48074,0,0,ad38eed7680db70af45f593399c08c1cb64e93854bc7fa5dd06ea3c6cdff4594,2024-11-08T22:15:20.877000 CVE-2024-48075,0,0,ea51a6e8989069c7238e086ff0e4ee9c35a5a15497aadcf5d7175bb6cb053e9b,2024-11-18T19:35:03.967000 CVE-2024-4808,0,0,9e98599f6886b9041c106d3216212c5c382436edfce35f9a1807d5234e020eab,2024-05-17T02:40:38.870000 +CVE-2024-48080,1,1,022593486978c4a92cc6d5e336a9aacc42caea737307856f209006bb44dc2e6f,2024-12-03T19:15:09.947000 CVE-2024-4809,0,0,27fb5be7556d421437500c3c993a8fe2f6b8b07eb589d66da5852c85ddbdadf0,2024-06-04T19:20:50.867000 CVE-2024-48093,0,0,fc3d238317c807ba6077042bfa1b95e52c8e2ef3cfad3047af5ab5b8b4b30b86,2024-11-01T12:57:03.417000 CVE-2024-4810,0,0,67f5293ce6e2b07ebd74483d90aa4bd648288e3b70a7100b0946bf9b81e90029,2024-05-29T08:15:33.960000 @@ -266658,11 +266663,11 @@ CVE-2024-50634,0,0,fc2a161c2c755e76311d472b0c0ca48eeb524c368ea8177e76956b97738f2 CVE-2024-50636,0,0,9259433c31993ebe40938d91787166813f575cf05ee55bee0909d57bb7de1829,2024-11-19T19:35:14.833000 CVE-2024-50637,0,0,7cb3fd4c2566fc1d1593156e77d24b90af6dfd042618185e839399543b673bed,2024-11-07T14:15:16.780000 CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000 -CVE-2024-50647,0,1,a8132e40e6415680c63502dcfb71c83170a27c8ae17ae2d8709790d4ecaf5c60,2024-12-03T17:15:11.193000 -CVE-2024-50648,0,1,cd768dd502a6a41a750f72e8678d74f0fdb7ca88354fa77c670060f1a5a3d16d,2024-12-03T17:15:11.357000 -CVE-2024-50649,0,1,75af684ee5c50b16f619d7bbac2db41b70d6b9041e53190a772eac935e0bd425,2024-12-03T17:15:11.520000 +CVE-2024-50647,0,0,a8132e40e6415680c63502dcfb71c83170a27c8ae17ae2d8709790d4ecaf5c60,2024-12-03T17:15:11.193000 +CVE-2024-50648,0,0,cd768dd502a6a41a750f72e8678d74f0fdb7ca88354fa77c670060f1a5a3d16d,2024-12-03T17:15:11.357000 +CVE-2024-50649,0,0,75af684ee5c50b16f619d7bbac2db41b70d6b9041e53190a772eac935e0bd425,2024-12-03T17:15:11.520000 CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000 -CVE-2024-50650,0,1,51e56b1d34ec223623aa5ce32045a557a25d3bd1c5a91fb1d138ae1327c6b06e,2024-12-03T17:15:11.683000 +CVE-2024-50650,0,0,51e56b1d34ec223623aa5ce32045a557a25d3bd1c5a91fb1d138ae1327c6b06e,2024-12-03T17:15:11.683000 CVE-2024-50651,0,0,011c4281624dacbc96bb39ed41c7067acfaaf24f648047c3bd252399725a9be8,2024-11-27T21:15:07.573000 CVE-2024-50652,0,0,c46d900b0ec3c3d3dc69c000a8af48eff0cdc2a83f00bffa34618c3851a639e9,2024-11-18T17:11:56.587000 CVE-2024-50653,0,0,351b2ae0bb07d369ff4e76cbcc39f43676534cf729c0eb11791224a2ac34f76b,2024-11-20T15:36:20.257000 @@ -266677,7 +266682,7 @@ CVE-2024-50672,0,0,85b0d6db9be373a6fa69359f08bb412793e42f226dea70f6b5078fe3734ab CVE-2024-5069,0,0,9472ccb93cc67e368452ccbd7690fcdac2e9c6bf3a0a4c1febdda7b23dc05b96,2024-06-04T19:20:58.080000 CVE-2024-5071,0,0,1e84a840bf7fe6d05a333c61daff03721e2399762594abd260e8b415b74d49eb,2024-10-28T21:35:22.430000 CVE-2024-5072,0,0,85aed93503872c17702aba727bb062c3ccc667233546a70047ce6a70e5d2f498,2024-11-19T22:35:11.960000 -CVE-2024-50724,0,1,6e4d1b405e7d4d8af96a4ce9056390bb6e194678013e22ab1b6431ba706461bd,2024-12-03T17:15:11.820000 +CVE-2024-50724,0,0,6e4d1b405e7d4d8af96a4ce9056390bb6e194678013e22ab1b6431ba706461bd,2024-12-03T17:15:11.820000 CVE-2024-5073,0,0,84e84c9e85d38ba2ba8fcac94cd632adf73ebd62caf103a5afc104149a6ce671,2024-05-30T13:15:41.297000 CVE-2024-5074,0,0,323ff3e4be9a1a01795a645c087210e0124e3c1100808fef1bff4cc986dff48b,2024-08-01T13:59:39.780000 CVE-2024-5075,0,0,3a68f5400be3fd65933ca2b54d2fe1b2cd42ebfc5586417b08ab71b3ebef46c2,2024-08-01T13:59:39.960000 @@ -266737,6 +266742,7 @@ CVE-2024-5092,0,0,00bc3fe74171cc3f61d986dd5d1b43711757ac5d30e24bab5f84b663495133 CVE-2024-5093,0,0,13d2e709dd3e7be8048d02a6012bbed004823bd119b45510128e77bb922bb163,2024-06-04T19:20:58.343000 CVE-2024-5094,0,0,a6da916325cb7c5c0cbf108ef5f048d7004d52e417cf8850e363484a9b36d59d,2024-06-04T19:20:58.470000 CVE-2024-50942,0,0,204950dd3d65127a6e64f67cbe6c2f94576ed783d99742deba5414ec8440fade,2024-11-26T21:15:07.470000 +CVE-2024-50948,1,1,9bf83261dbf826c53c1f276a04e06af617475a17b2328241309f3983b9190769,2024-12-03T19:15:10.580000 CVE-2024-5095,0,0,1588c0abfc34bbd50f97e7721e8e7ba42bb279c7cb42725ee04b715e36b1b7b7,2024-06-04T19:20:58.577000 CVE-2024-50955,0,0,8157390cc8753ab3c3dc03f615378f98ac2c1983a215bd6243bc7dc27b80318c,2024-11-15T13:58:08.913000 CVE-2024-50956,0,0,12124e11e67fab80bf49da8101d4c3d956d958942d16765a9a0238618204ee2c,2024-11-25T20:15:09.383000 @@ -266823,6 +266829,7 @@ CVE-2024-51093,0,0,0a822b4a1682e56f2eda76ec69439d08f6dec6cb34fd3d39887c26822f96e CVE-2024-51094,0,0,6e1bb443fcc9dcc5d5db36766451d0d2ba593ec78aa445a2bc9aaa283a01b5d7,2024-11-19T17:35:14.493000 CVE-2024-5110,0,0,97ec9134be0ff29c231012cbb3632c9becbf0944f1a706861520a2aec58057e2,2024-05-20T13:00:04.957000 CVE-2024-5111,0,0,1e1510502a884c6f23b18cee848205aa75aeed3171cb87569d39e4078bf9232b,2024-06-04T19:20:59.907000 +CVE-2024-51114,1,1,ad61961ba7b7da73674bcdd21affb7c799d69973bcec89fc9b90bbc5a98641f7,2024-12-03T20:15:15.360000 CVE-2024-51115,0,0,141fdcdabaf7c1ec8339c92338cf4045ebea4dbb9cb424f39276d597a3da7892,2024-11-06T18:17:17.287000 CVE-2024-51116,0,0,628a52b9257b50cdd3ccc07e8442fee438bd4b142b1a9d47d166ffcd98ae2965,2024-11-06T18:17:17.287000 CVE-2024-5112,0,0,689c76c95598a2f86ee6cadbc1c25854cf35ada5e2d2725de4638c44d7f73797,2024-06-04T19:21:00.007000 @@ -266842,7 +266849,7 @@ CVE-2024-51157,0,0,113cde3c71891d82bf55f2d0b4674fdfc6000fe1838706cb74a6d985959d7 CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000 CVE-2024-51162,0,0,659179ac55d508d31c34cd8742c699a4dc94023e77b3f77dfac64c460e25f9e9,2024-11-22T17:15:09.353000 CVE-2024-51163,0,0,909afcfaa554939e2c78d7e7af80c5c6961aa7c27e1f5cf118fbed2c52564f74,2024-11-27T18:15:17.760000 -CVE-2024-51164,0,1,0c621a3e87a6b805f06b17b773059d9ce7e6f4ff79284caa4397b3c188a41c46,2024-12-03T17:15:11.970000 +CVE-2024-51164,0,0,0c621a3e87a6b805f06b17b773059d9ce7e6f4ff79284caa4397b3c188a41c46,2024-12-03T17:15:11.970000 CVE-2024-5117,0,0,8f71e5dda3348556d6b06143dcd47b79229dad0468d30aa7c38f8c5c1ecb8524,2024-06-04T19:21:00.547000 CVE-2024-51179,0,0,1ac36b7f8ecbb6442c3e82b8bfc190a784ef1fdb6227f3a1da3d4126f204bf98,2024-11-13T20:35:10.303000 CVE-2024-5118,0,0,ede24973ef1505b96fcd3c614d177bf90baaafde820cda4461fa6280b3c2b455,2024-05-20T13:00:04.957000 @@ -266907,11 +266914,12 @@ CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c CVE-2024-51358,0,0,15a6b357b2a15ba2efd09a7258436a688d09605b686100927239b26110c73a5e,2024-11-07T20:35:14.957000 CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000 CVE-2024-51362,0,0,a6e1a40cf5e527208990e8a764ceb58cfefd7f1b5e4a2c9e1905064ef69946f2,2024-11-06T20:35:35.750000 +CVE-2024-51363,1,1,1a718dc87e73de14ce88ee568b473ff8c6c86948d120e61d443ba463ad9363f5,2024-12-03T22:15:05.013000 CVE-2024-51364,0,0,14b2dee82d01d7389bab3881eda1c802d61b28380989b485af4049ffc6cb6a67,2024-11-27T21:15:07.797000 CVE-2024-51367,0,0,321834f3c68e231d48212ed0455e22a6133cdcee14f287745838cf2ad31fdf76,2024-11-27T17:15:13.207000 CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000 CVE-2024-51377,0,0,cf00c0a6e7d0ac48895095961c732d7f23ec2a7e49679df67603156d82aefffb,2024-11-14T23:23:52.997000 -CVE-2024-51378,0,0,25041eea06e8de15fb868a226604237e266234c162cafb1c59832cc50427a9bb,2024-11-01T12:57:03.417000 +CVE-2024-51378,0,1,2fc4fb18f85014556482fb0a3b592153adf2fc1c323319341ddbcbf96ed2ad74,2024-12-03T19:15:10.807000 CVE-2024-51379,0,0,2ac9e22a4ada4c046a62bb7cfce4898a690b6639726f7e96ec64275e3571bb6f,2024-11-06T18:17:17.287000 CVE-2024-5138,0,0,47c03094386326d2315f3415dc7d3ef94b00cbe65c94e42ace003fc1a8714791,2024-09-06T20:35:18.950000 CVE-2024-51380,0,0,f14cbfd3bfbc558498abdac43f5bd2dd3434adc287319fdcc829b18876bf6370,2024-11-06T18:17:17.287000 @@ -267203,6 +267211,9 @@ CVE-2024-51764,0,0,a8a73eac784e4da58b2f9eaba960b7acf037c234db182f16ecf517da51faa CVE-2024-51765,0,0,eee0e3d0a6a166a804fde51a14de5a755c3faab7d2dd1fef179f6d93df02c33c,2024-11-19T17:35:16.103000 CVE-2024-51766,0,0,4904195ccf003ff2a4e40cb35a984f0e7233e777165800dbb1a6cf0ca066526a,2024-11-22T12:15:19.697000 CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000 +CVE-2024-51771,1,1,58e1c7dcb7a2aae9c7fd769b065dcc02ca8929b9609551afc7cd409a6a5943b4,2024-12-03T22:15:05.180000 +CVE-2024-51772,1,1,703d7a4b9e079b29ab9bb8b36260fec09b94a25fa57e36c16470ed6abcb9b8b8,2024-12-03T22:15:05.310000 +CVE-2024-51773,1,1,5e2d8caf1f5b3db622fc4649cadf1fa4a1980c269aa4c2a5f708af400a759a95,2024-12-03T22:15:05.440000 CVE-2024-51774,0,0,669a599ada079f107ff827e67143f083d374e9861d23daa36ef167763e62d529,2024-11-06T17:35:41.767000 CVE-2024-51776,0,0,5ca2c4eb522419754c0be1183c799032dcc5ffdbcb2b4aea116b020281ac6eec,2024-11-12T13:56:24.513000 CVE-2024-51778,0,0,cc75b3182d817e23b6259e8bea41efa67ff795e094696a3ef400f4547e1ce14a,2024-11-12T13:56:24.513000 @@ -267686,11 +267697,11 @@ CVE-2024-52531,0,0,4a9a627b31c610f608576c39893b61b41c0efeb9f9d97b523937261d20004 CVE-2024-52532,0,0,82ab4898c82b79d45f58347a35d13014aa77e1fd942e3edcc771ee91b2c6c3ad,2024-11-12T19:35:16.970000 CVE-2024-52533,0,0,586390a868afdd1378ad560eae2002ee4f7e9b9edb1cd1a36b6cd6c49ba102a3,2024-11-23T21:15:15.090000 CVE-2024-5254,0,0,78882d871be0a19bc95888168cf12372f503de77ac359f287536c8f062c38532,2024-07-19T15:32:05.560000 -CVE-2024-52544,1,1,5a53565160e1063004f0c127eaf6ac40d72cf320f922da3bf32efa9d52ac2252,2024-12-03T18:15:15.327000 -CVE-2024-52545,1,1,256b559498f8d83c8aee5a385d829f73d16105296a9f31506feb36d04fbb3f13,2024-12-03T18:15:15.543000 -CVE-2024-52546,1,1,9dac37e30df5646bd612d864767ab0de309bc6d3f480e59fe22e9eb483142676,2024-12-03T18:15:15.710000 -CVE-2024-52547,1,1,65d15fe4046ff20946693d0c0c0f998b9be4860bbb57d9efc8d6356c8e05fae4,2024-12-03T18:15:15.860000 -CVE-2024-52548,1,1,12379df36a9342eca7a92528323b279eb4a40deddd1fc96bfe4d53c029091310,2024-12-03T18:15:16.023000 +CVE-2024-52544,0,1,dc4f2bf9ed92fd5a9a3d26c46def7b10fe91ddfaad84031aa1a9b721cb5f1e3d,2024-12-03T21:15:07.390000 +CVE-2024-52545,0,1,f159917a3165decd746abc05c415f20d4b4f8722e3e1ee2a30ac7f07512f801f,2024-12-03T21:15:07.490000 +CVE-2024-52546,0,1,eb4fe17e63cd8128bfe1d6a03e7bfdd2bc4a90d6f57e4e2cbe0ecf3f12b100fd,2024-12-03T21:15:07.593000 +CVE-2024-52547,0,1,59230f31accd91e7d256860548577b7831c2ac44853a7e02b39415ec4fd031e1,2024-12-03T21:15:07.707000 +CVE-2024-52548,0,1,9c43e843c5d5758bbbe4f1b613e10e939c7bfbd1edf0746acf49aab3914b4da1,2024-12-03T22:15:05.567000 CVE-2024-52549,0,0,fd75f7ddf331713d4d68d280968ebe1a7937bdcd0767d23dbc768a0c6cf66c13,2024-11-15T14:00:09.720000 CVE-2024-5255,0,0,a9d47c22e8985fc8d8b40f4bef3272595484bdbc8485e44830cb58ee997ab90f,2024-07-19T15:32:18.850000 CVE-2024-52550,0,0,d8f06959647c1a8a773b0bb8df4d1605e4b27f79e88378297551535794b69575,2024-11-26T15:15:34.650000 @@ -267784,14 +267795,14 @@ CVE-2024-52800,0,0,33614182cc9b4d3349a9904c03846eec72212dbb8490ca45f9ad64e956176 CVE-2024-52801,0,0,d525f21f1148c8de036d0ddf88b67ee0013549964accf061ff9bd87a44f68775,2024-11-29T19:15:08.890000 CVE-2024-52802,0,0,ff357ae423b4185f6e8528f29c93636cc2249c9e015517449516a4f8158b5ed5,2024-11-22T16:15:34.283000 CVE-2024-52804,0,0,8f245cf45089b95fdaaac467eb0e4e1eb7afae864da129b7e5bc629b398d8ade,2024-11-22T16:15:34.417000 -CVE-2024-52805,1,1,2c180cb2569a25ba3c710e2429c5941010e859787110cb1a06546b4e6370c033,2024-12-03T17:15:12.120000 +CVE-2024-52805,0,0,2c180cb2569a25ba3c710e2429c5941010e859787110cb1a06546b4e6370c033,2024-12-03T17:15:12.120000 CVE-2024-52806,0,0,1e66f4db39d971971749d7820312b694e65f24529172d67dfa753beb583671a4,2024-12-02T17:15:12.580000 CVE-2024-52809,0,0,989c6fa478d553e2d01696ef3757f80543cb54fc9b37563f1acf5b5911de0279,2024-11-29T19:15:09.030000 CVE-2024-5281,0,0,d8e0f0c592f3cfcf36fc66f961b905d6afba3d53af3789e65e13042755c0a3cb,2024-08-01T13:59:43.367000 CVE-2024-52810,0,0,72dcf4c0c2683dd3fe0322cd1ee30a3ed4e5f334c6c81826d75b9f5c61e14c8f,2024-11-29T19:15:09.163000 CVE-2024-52811,0,0,d732a17bde6f16ede8be31f96ee410aad0e3e114ed23b65cb7e34c8157552b5c,2024-11-25T19:15:11.567000 CVE-2024-52814,0,0,05155b182462de438f0b1b6215658fb7f90ef7f2af8e5a0e3c447f1976037015,2024-11-22T16:15:34.553000 -CVE-2024-52815,1,1,f9e6346133e60160d82630df539be5043ab29ccdc85090b3f37dd4cb982def52,2024-12-03T17:15:12.267000 +CVE-2024-52815,0,0,f9e6346133e60160d82630df539be5043ab29ccdc85090b3f37dd4cb982def52,2024-12-03T17:15:12.267000 CVE-2024-5282,0,0,d02e51c4b0ee276cbc37162ff12b0d5f63d5cb6622dea90c00e2302f02b5f264,2024-08-01T13:59:43.553000 CVE-2024-5283,0,0,b38d3b6d84c245f47c02c6b1221c64126cc1590c1b6b303a3d39721ab1dfca67,2024-08-01T13:59:43.747000 CVE-2024-5284,0,0,a632d154686ad4201398091156d5b5851cc181b1b36b426c7e50520edad6a7e5,2024-08-01T13:59:43.927000 @@ -267862,9 +267873,9 @@ CVE-2024-53055,0,0,64d47de78956af83c8954c5c916fde48522bbfc7b3bfd5262643a9953893d CVE-2024-53056,0,0,e719d74b600631d7a9085c4602d6da5effc3426015a00b0c180b7f70be1e1cf9,2024-11-22T17:55:51.830000 CVE-2024-53057,0,0,2eeaab0609dacbf8f1bc946fe6618acbd41734def9c62090a729afb87a369511,2024-11-22T17:55:23.840000 CVE-2024-53058,0,0,326cfcf8beba7a28c1e8681d3c8f4dd3f2f54ab8671845fef16e904edd28f7d8,2024-11-22T17:53:32.500000 -CVE-2024-53059,0,0,ef43062eebbc97b7be798e9dac3adb53f105cb91d128df8fa7480291f8fa3731,2024-11-19T21:56:45.533000 +CVE-2024-53059,0,1,8de9209182f62b1c8cde1232ceb4dd684e6406c51ee4bf910cb88c16872e7f77,2024-12-03T20:57:20.747000 CVE-2024-5306,0,0,d647292a2595d4b4621658b069669f43be59c7629ba28057e1c1f9a15fcc4dc0,2024-08-23T15:01:42.337000 -CVE-2024-53060,0,0,9edce4ea64c8ed0c6f895af1f7aab9177b8d8496130e5db39451a322e84bc351,2024-12-02T08:15:08.027000 +CVE-2024-53060,0,1,74149c196c1f12bc509412b9719ff439b70d14439885b53f5abe3e06b85b5596,2024-12-03T20:49:04.903000 CVE-2024-53061,0,0,6d963c9bfc1997e983bc399b63ec90861ae1669db79161a0b8424ee0f8527697,2024-11-22T17:51:45.817000 CVE-2024-53062,0,0,e32700c33557358d5784d1ebd21f16a8e87aef87b2e2617962aff7be3c5d737b,2024-11-22T17:47:43.337000 CVE-2024-53063,0,0,d21047234dabc0b4048c3b7c4fc2410307e450c87dc8013e953beb70e76e78cf,2024-11-25T21:08:23.697000 @@ -267964,7 +267975,7 @@ CVE-2024-5336,0,0,2f884d9a8acdce925dfd5f3bbb7e4d857b44070abc5058c1ed58328cd41865 CVE-2024-53364,0,0,708f3ece40bf0bf488cd6ba77ae8795762f91e489b51a867d515c5116d6de69d,2024-12-02T20:15:07.487000 CVE-2024-53365,0,0,f94a22f04b10f25f8afa0eb1104a56f755f11fa91566b703eeea9947dc95908c,2024-11-26T20:15:33.650000 CVE-2024-5337,0,0,2b5f97595978a274de9cc82ffbb4e0a657c957408faf59676ddd95606d164a93,2024-06-04T19:21:05.063000 -CVE-2024-53375,0,0,b686c16d5a9d9c6ff7ab59ef7e382bb1fb40c729bbe54dddf6d66315c37d5e8b,2024-12-02T22:15:10.507000 +CVE-2024-53375,0,1,1b39905c92293c6ad986ecba417e6ce2d1fe3622164937a40688772f31f7a77b,2024-12-03T20:15:15.820000 CVE-2024-5338,0,0,a30664650e5151e5bf507d4d1b27e8e105537061b8462474ea4f7add61cf4b05,2024-06-04T19:21:05.170000 CVE-2024-5339,0,0,f1bbd379636cfad5e34ec0ced69571115fae96e9b2078934f8d5d54e609ed8df,2024-06-04T19:21:05.273000 CVE-2024-5340,0,0,546c56f2649b42bddc6aa9959f384e4ae23101ba059a7107ea7eadf7da74c09f,2024-06-04T19:21:05.373000 @@ -267985,6 +267996,7 @@ CVE-2024-5348,0,0,bc3d8d1f3668d1fc879553d2a82a62e6b9980757b64bfd9f1d5fdacf853f73 CVE-2024-53484,0,0,c9442618db175b392539d76a1a9674a888dcbfcc13582e8461a2dd3982136eb4,2024-12-03T16:15:23.980000 CVE-2024-5349,0,0,095035450c60a13c08898917421d5656b2399179b1253e40806dcf47c3a4d9f7,2024-07-03T15:44:23.807000 CVE-2024-5350,0,0,8440f1aab6c7debe55a047353772f60d1de30f1b1b7f7fc13c3946381d3b4f12,2024-05-28T12:39:42.673000 +CVE-2024-53502,1,1,ebb24c880a01f111412445fba5c7dab38de38afac7e158b369022d22a1846bbf,2024-12-03T22:15:05.683000 CVE-2024-53504,0,0,0cf1059548643389b1e33bad68f218b18235298c923b702dcc5a0c676fd86048,2024-12-02T17:15:13.047000 CVE-2024-53505,0,0,429565da56ff3abdf2d5572d186f8d39966f1f694a5c9ddaefd7405363575dd7,2024-12-02T17:15:13.257000 CVE-2024-53506,0,0,9dfa3208f902ab3513f3502d8928ce98e8eedec2f27ad06842644780d149d8db,2024-12-02T17:15:13.497000 @@ -267998,7 +268010,7 @@ CVE-2024-53554,0,0,438643a55aaa35b78f1b23aac2881a01cc4a8024d9a2bdae2137a7b9fa7a8 CVE-2024-53555,0,0,174e17d1628af05aaf3f22807e86abd0dc7a03bf1129ef93abe75153c9a01a07,2024-11-26T21:15:08.560000 CVE-2024-53556,0,0,6925ef5b3d50b82f5e08a24f19e7ff4e448493177d9879ad27f5ac4d6f2f0b97,2024-11-27T17:15:14.917000 CVE-2024-5356,0,0,85f64e8ba0cebff8187202ea327ca3c906742c5e7d2301ba82b2780a509234eb,2024-06-04T19:21:05.977000 -CVE-2024-53564,0,0,7d70e5f55e37762a76b108e6a64b73672727dd5c5512814b5c83672ff9b30cce,2024-12-03T15:15:11.373000 +CVE-2024-53564,0,1,ee44fd6febf6e3201f87a735b43a7379c65a5b9126e3a8a7c6cc777fa4406be3,2024-12-03T21:15:07.807000 CVE-2024-53566,0,0,dbff5ecbfdcc9c433f6a2fc9ea0927173d5445ca6c33bb6be0347daffda46700,2024-12-02T18:15:11.500000 CVE-2024-5357,0,0,3e42587e7af2230be214dc062d75c1c832a73aeee43ae2fc11277198b34ad5c7,2024-06-07T20:15:12.387000 CVE-2024-5358,0,0,fdd72871ebf6d62b075a63baf142931fcf44d230f54a18747bfadc4ddcff1dbe,2024-06-04T19:21:06.077000 @@ -268021,6 +268033,7 @@ CVE-2024-5364,0,0,96afe929167b2de1681dda607a064227a5b629af3adb1987caaf0917b62b92 CVE-2024-5365,0,0,4b68a39efcc7d1fdd266d085800e02f841a36aae12ede01463956a125c285501,2024-06-04T19:21:06.587000 CVE-2024-5366,0,0,ebdb50e85f32d3970264d5045d82ce95c8965c12926ca2c779990bb15b24ffc0,2024-06-04T19:21:06.690000 CVE-2024-5367,0,0,e1fb712fa137b32c2cb97597a93996bde7ebc629cee38f14d6c04ed9e1154407,2024-06-04T19:21:06.783000 +CVE-2024-53672,1,1,6d3fdada6b3ab91d641b2928f61fe9c334e2d4e70404775528bd633b7420d1ae,2024-12-03T21:15:07.990000 CVE-2024-53673,0,0,661b6e58e03fb62c2aa1ecc993b2257004bc984a0c70a3930af9e7eaf463bd3b,2024-11-27T16:15:14.783000 CVE-2024-53674,0,0,8a5c79f209c5cbb54f78c6e00b940dec235442e0d5729a2a400739bbcabd981c,2024-11-26T22:15:18.713000 CVE-2024-53675,0,0,01989df42cc3673d2d670cddd166ccee1a501522f5e01720638d33a9f30efa8c,2024-11-26T22:15:18.990000 @@ -268137,10 +268150,10 @@ CVE-2024-53859,0,0,4facd2b494aef0ff73beaf08d6d1ca6f6f9ab5c48842cb7bed7f8b39e94a4 CVE-2024-53860,0,0,f686ec46a02a9bc4a804217b41a7af4658fb7390d2c722028f65e08a7a2b5414,2024-11-27T22:15:05.833000 CVE-2024-53861,0,0,c906a7c9ad7960370bb443153ada29d340a316d0e26a761ec82eb161aaf6e2d4,2024-12-02T19:15:12.150000 CVE-2024-53862,0,0,eb71730385f5a115df10825836b94c0319055c91f99db9bfd92d5c3006795a35,2024-12-02T16:15:14.277000 -CVE-2024-53863,1,1,5a92bc2de00c8e9b6f5e801f02c7d9dfc0d6ec9d1318faae277b529e90d877bc,2024-12-03T17:15:12.633000 +CVE-2024-53863,0,0,5a92bc2de00c8e9b6f5e801f02c7d9dfc0d6ec9d1318faae277b529e90d877bc,2024-12-03T17:15:12.633000 CVE-2024-53864,0,0,5333aa1d756baa8b2b2af9d321f1e4bf84fee7810b77a54afa507c359fe16403,2024-11-29T19:15:09.577000 CVE-2024-53865,0,0,4a38354939a410a34cc87939fb2218794cb79b60b95dc7b6ebed34b8c98c2e76,2024-11-29T19:15:09.710000 -CVE-2024-53867,1,1,c12e14351b69d77e6eb8154ca10a6dc95900030fcd5c52428ccf6df2971ed00a,2024-12-03T17:15:12.787000 +CVE-2024-53867,0,0,c12e14351b69d77e6eb8154ca10a6dc95900030fcd5c52428ccf6df2971ed00a,2024-12-03T17:15:12.787000 CVE-2024-5387,0,0,d7455745fd4e2043656d894120ace9fd562ab2b459405f5c80fb87774616ea6e,2024-06-03T19:15:09.500000 CVE-2024-5388,0,0,88068f2d18329bc2e1ad4660154ccfa55826fed94a4e1660b5757c6715c273a8,2024-06-03T19:15:09.557000 CVE-2024-5389,0,0,f6aaaf23dff2a1d7f90a7950cdbb76e8322ef8c0ff1bf8f6173fe4634d169b69,2024-07-09T19:15:13.853000 @@ -268159,14 +268172,15 @@ CVE-2024-53915,0,0,4605c52b83221ae0e3cdd10a9aad63d660542ba26783410343eed38f4ba2e CVE-2024-53916,0,0,8b397b00703240f42bfc4c720e49d6f6e4984c2220fee564d2c3c72e3311b723,2024-11-27T17:15:15.127000 CVE-2024-5392,0,0,b24872fec717fdd1d01c0a9d16cd8dae85d0db85954b236e74ba95a5e5c8352c,2024-06-04T19:21:08.117000 CVE-2024-53920,0,0,a291ce56b664f688b2d6f36f512bf0b737cf558f95f0af0d70bd1b3310ba1ecf,2024-12-02T17:15:13.913000 +CVE-2024-53921,1,1,eb41a4432b5a9d706840e3bfc01bd30d99edb3ace8a9178bddbd38b299a4035c,2024-12-03T20:15:16.153000 CVE-2024-5393,0,0,295d4f9eb57788d71849a73c0b5d6c4f89e92a1e7613c6c16abcfeb4329f6a42,2024-06-04T19:21:08.420000 CVE-2024-53930,0,0,1076c24462100197e38bce4bb3bb1d95bc12e583ba6e6f216b5c96e80fcd4c47,2024-11-26T16:15:21.150000 -CVE-2024-53937,0,0,b25de77736c9e3f417d080678e39d183775a1e387806a300f481aa2e7cce50d5,2024-12-02T23:15:05.673000 -CVE-2024-53938,0,0,00aded0375d391a087a15db921a447eed8670e453691bf728d3fae98e66e6100,2024-12-02T22:15:10.633000 -CVE-2024-53939,0,0,e7320e3797895c63e43c4a9ec5307dd5f614a377bc9de5971ce6aab8c2f2f12b,2024-12-02T22:15:10.757000 +CVE-2024-53937,0,1,9b6d0ba9a6c42a47f6db6dc07703892d094b7f3d0184e6594f2581894b7b74a0,2024-12-03T19:15:12.127000 +CVE-2024-53938,0,1,2e87f1385ed288ab2007c1cdc990e54338f984544f86b42f7b77d94beb038a85,2024-12-03T19:15:12.330000 +CVE-2024-53939,0,1,cc459dfd78d0452776a678ac706ddf20df081009e5bb1cb330ba1e33e93a1425,2024-12-03T19:15:12.690000 CVE-2024-5394,0,0,aaadf9a58796777f85dc2107a816ebb5c0ae4c9d890d2d8c3ab15382290e4f66,2024-06-04T19:21:08.527000 -CVE-2024-53940,0,0,0e2171e6261f48306c1a6c46d350addc4f2e85b214a329e78036a56b49e2ec36,2024-12-02T22:15:10.880000 -CVE-2024-53941,0,0,bb701754b0f29aec99d35aefc4ba9fa9c71af7b26206bbe6f629d295ba6eef01,2024-12-02T22:15:10.993000 +CVE-2024-53940,0,1,2b68513655f7a2f90e0a92f4f20eae855e81730f6c275fc3425f3ffdeb76ac78,2024-12-03T19:15:12.910000 +CVE-2024-53941,0,1,86dc87751055127056ed8da2009cc16b64fb18deaa783d9292dd348e5ff26343,2024-12-03T19:15:13.113000 CVE-2024-5395,0,0,e532c0fafbcef9b666c7ef0302f25a35b4dc4d0c2a33d2079af161ebd3ce2b3c,2024-05-28T12:39:28.377000 CVE-2024-5396,0,0,d0f735b85e524715ed1861b804d3fb37a4720102a88b42bc6f1eec50bfcc099d,2024-06-04T19:21:08.627000 CVE-2024-5397,0,0,79c82f6af34f5d76edc0fe512c9b3e616bf4c7ca15c122380ba9806c73a591a6,2024-06-04T19:21:08.733000 @@ -268205,6 +268219,7 @@ CVE-2024-5412,0,0,5e7f5482cbb5bbe521f2cd5ff48f80c18806840859b33baffa51a21bf41b87 CVE-2024-54123,0,0,adb9d810678343393bca99901a3c1b47719ef78df3ca8f4e2f7e11c7b4e0333a,2024-11-29T19:15:10.287000 CVE-2024-54124,0,0,d93261f0be0c719ea94f116c38fdd88edcab344178e1fea1cd1f60fbeb46997e,2024-11-29T19:15:10.443000 CVE-2024-5413,0,0,b448c8c4fee794a9903e33e6c17f07ddeb3dd7c0bc677024b75809ef047d2c8a,2024-05-28T14:59:09.827000 +CVE-2024-54131,1,1,4b4918afa2a4261da20afce1984c24b92c3cd8c05c3ee6659db317d6cf1d35a8,2024-12-03T21:15:08.127000 CVE-2024-5414,0,0,08acc305e6c9bea4a9589fa3dba157ea62649fb0f8c0ee74aad6ddc09386f1c2,2024-05-28T14:59:09.827000 CVE-2024-5415,0,0,d8ba178a70f3cfb2a3911a07d12ef045cc2ca261b5b8d85db5edc9c9636eef1e,2024-05-28T14:59:09.827000 CVE-2024-54159,0,0,a6966b82b06dc6cc6ffe535670f7fe423d90e23d66a5791ea4c4b55b9827bb58,2024-12-03T15:15:12.097000 @@ -269953,8 +269968,8 @@ CVE-2024-7387,0,0,88a2f5f296b30b6e91a6f72138ece306740eb87629edb428b81d1f03949ce0 CVE-2024-7388,0,0,f17b6292d40b8d2d9d22865fdbf912ed4604c49db111ea9e78f67fdbb858de85,2024-08-13T12:58:25.437000 CVE-2024-7389,0,0,a5776290ae762be985431158def3f2d002b265ca6a95ce830d8f46206854f21a,2024-08-02T12:59:43.990000 CVE-2024-7390,0,0,c78997aaf26baecb9ee1facf6fff2e2cee58e21d2495850b79570450be19582c,2024-09-27T17:45:05.590000 -CVE-2024-7391,0,0,17c80b56dbdf028398db9acf6bdd5aa6d598f8259099e27176babae80ff761fd,2024-11-22T22:15:17.893000 -CVE-2024-7392,0,0,b6c631f7c2325c1c6ea668d8558d5947ec1715b6355b9d17bfc7ffc75d678178,2024-11-22T22:15:18.013000 +CVE-2024-7391,0,1,2752de4ae00b5b2870d0f6d32309617f0c9e8b04345fde12d660bbbcdd1fe039,2024-12-03T21:44:10.397000 +CVE-2024-7392,0,1,df337276c1b7ad5043680e2710dff50a1d97b86398705520a864550842c7662d,2024-12-03T22:17:52.127000 CVE-2024-7394,0,0,311dd8d09f289dca72e294063b3121b4c7fd832b8fb4e9134c8457f94c79d21d,2024-08-29T13:41:24.487000 CVE-2024-7395,0,0,6b93b6db07480e26c0ae715f45aa50cef676fc9c19ea641f155805eb4429ff3f,2024-08-06T16:31:05.780000 CVE-2024-7396,0,0,4ebde91c8a3429e260812e0a142900e161f2137833db297002231fa5cfafb30a,2024-08-06T16:31:05.780000 @@ -269965,7 +269980,7 @@ CVE-2024-7400,0,0,880bea0e2ff4ceadacbe376968f4ebe20bb468fa58e2ed97aa47316bc459f4 CVE-2024-7401,0,0,43ffed7b6ca165f2a0da7944b4e4cef6faa3da0b6dbd419986732fe262f21587,2024-09-05T18:34:17.433000 CVE-2024-7404,0,0,3de89ee628b5ee024a57e174f6f544c149981b7447dbe414eb2dc5874d61c7d0,2024-11-15T13:58:08.913000 CVE-2024-7408,0,0,a5191010d29cd8fd3daea07e74870b9bf130ede8610ab518fb24ce3a11a386f4,2024-08-13T16:06:08.213000 -CVE-2024-7409,0,0,a0a6addbe3c2f0cc1db031d3b6ccbc76b45c7e3857a91ea8908f269e71f57171,2024-11-12T17:15:10.833000 +CVE-2024-7409,0,1,72e398033bc704bfe4ec65b5a205019f271c5fe2539ce50b4e685753ef8da0b9,2024-12-03T20:15:16.387000 CVE-2024-7410,0,0,d4e8b81d7bab3d90baf0746a6fdf1d2e1dd63b1bd2599e20b73bae4467a0729b,2024-08-12T13:41:36.517000 CVE-2024-7411,0,0,233fe970a370850f5b652951fe7b5f603c4b4a66cd3c44f0b67dc9d466e3271d,2024-08-15T13:01:10.150000 CVE-2024-7412,0,0,b7efc7f691385d07c16b9c98953749b4113f5c7d6e2cc5e240ac710642b7a973,2024-08-12T13:41:36.517000 @@ -270052,9 +270067,9 @@ CVE-2024-7505,0,0,9283ee6a6ab413a456fc93717c58da4016a84d79a8d91dde6b3b9d1434d937 CVE-2024-7506,0,0,8ce5e793bea3ef05c090588e0452278f00c3b03b884fc5816b50a2fc0825edd5,2024-09-11T20:02:56.717000 CVE-2024-7507,0,0,6bc1191146772bbaa999b0d6a827100d208121d95729ccca9fad3126c9340161,2024-08-15T13:01:10.150000 CVE-2024-7508,0,0,cc9fd3f81326cb4f7dedbdb36b639e76435caf6502aaca3805406cf4d1de2059,2024-11-22T22:15:18.133000 -CVE-2024-7509,0,0,82555da7b356b441a65f473baf9431612f00d5116cab1b205728632c7c8c2e53,2024-11-22T22:15:18.250000 -CVE-2024-7510,0,0,049a4ac77cf527a2fc2930314ddda2e05c3fb11b3ee4c4cd537e99048914691f,2024-11-22T22:15:18.363000 -CVE-2024-7511,0,0,c80855976a2d2fd6686779fcd72edfac86fcf86bf35f069aa07f5c24c59707df,2024-11-22T22:15:18.480000 +CVE-2024-7509,0,1,1d20a01ba25ba429690bc4a3d75ed6316644cb9406cd3eb90a5bb7d5e7873d40,2024-12-03T21:54:37.137000 +CVE-2024-7510,0,1,8ce7d88d08e2f025c7ca01af440c38c78a7df99170ef1532db9ae3f724a61b2f,2024-12-03T21:36:54.357000 +CVE-2024-7511,0,1,9bf089a5dbb9957d15202d89b865f1149744d0ed4ad1c450b9f46cf07d7d9683,2024-12-03T21:31:50.467000 CVE-2024-7512,0,0,64969c8356c27f20386cdfa0c38d50ded85817d5026c9d96e7d342b04fbd9f28,2024-08-30T18:19:01.187000 CVE-2024-7513,0,0,9e0dea33b007eccb273e626ffa6cce86e938d130dbfcfa937121ca05aa4099ce,2024-08-15T13:01:10.150000 CVE-2024-7514,0,0,655c87ffa4ff4008320c4821d9c63bb232bfab91cd0bfa739db07a9e11bd1757,2024-10-15T12:58:51.050000 @@ -270473,7 +270488,7 @@ CVE-2024-7992,0,0,3b26e0e196b81cc5be7af125c16773e816453e267f4f880c3177869fe0f389 CVE-2024-7993,0,0,f5d8ce4e740e416affd8e0aa81b49c04864f17ee770befacf4a96c4d9988583c,2024-10-21T18:27:01.950000 CVE-2024-7994,0,0,5869f45b11df8c023b86ee171f284a639849bded2dfdba799d5d6a2b878c2a64,2024-10-21T18:35:55.397000 CVE-2024-7995,0,0,9b722cec7fe5ddfbfa2ed97d7d4fe0f5947f1a72064ec24ff3d88276777efbc5,2024-11-06T18:17:17.287000 -CVE-2024-7998,0,0,8aa3505a1b6ed462573d7b65c55c5633ff88a81168885ae03bec6b1db69a2167,2024-08-21T12:30:33.697000 +CVE-2024-7998,0,1,5a96b2d058d8fa22c17d15139fb41166f629052179fc1be6b8add20fbdc8bcac,2024-12-03T19:15:13.330000 CVE-2024-8001,0,0,806349a97813103cc3e8eb86d0f86a64cc01077a115d397b4a475acb9a23d258,2024-11-19T15:41:25.973000 CVE-2024-8003,0,0,1eb6cc8bd16248d54ed281136e233da0a723cb74879af6e3337c9532a3caf8e1,2024-08-21T15:51:28.397000 CVE-2024-8004,0,0,6053860c0b4fdc62f3a7122a051813b35afd677f12aaae8780fae160750aa789,2024-09-04T14:56:46.947000 @@ -271074,7 +271089,7 @@ CVE-2024-8768,0,0,a982019cb3e87700eba7d9922c696779881e32d71a95f1662a9030bc9b15c0 CVE-2024-8770,0,0,092503c78b1ec747d9cd01983ee6d65a49e2eef82871ebe4802ea35253afc2e7,2024-09-27T13:49:29.690000 CVE-2024-8771,0,0,8440e358d9ef6f31cf81e66a5a83b441147afe75ee9c3ad99e3f4526f8f30874,2024-09-30T12:46:20.237000 CVE-2024-8772,0,0,69fe2194f6f1a272b95a9dfa955e0defecb0d89f2fa80479731934d1afc5a40a,2024-11-26T08:15:08.033000 -CVE-2024-8775,0,1,7e08fdaca60bc5d319df0cb13012d16188e623f635de9956a7703298c9a96510,2024-12-03T17:15:14.090000 +CVE-2024-8775,0,0,7e08fdaca60bc5d319df0cb13012d16188e623f635de9956a7703298c9a96510,2024-12-03T17:15:14.090000 CVE-2024-8776,0,0,5f24148b1f2c0e63f94c4b7c4eb112791a653befffb86dbacf9b6c99ebdd5088,2024-09-20T16:38:51.910000 CVE-2024-8777,0,0,abf6497bbb9ed542a83ea295cf446b5b0a64e2a3685378272b7c6e8d7a6d8418,2024-09-20T14:22:19.840000 CVE-2024-8778,0,0,04f76622204759cf035b6cf776488dd4e0117dc8a28cbc6a6f40333ff951b555,2024-09-20T14:23:37.697000 @@ -271135,7 +271150,7 @@ CVE-2024-8834,0,0,ccf3b1cbd9b873f9e8f2c6c9b25ea0d55c495129845f242b63c5f3111f065f CVE-2024-8835,0,0,ac7088e58560f5b8a53a89d7053ca91953fa04c930410cf78b9450022c4f09c2,2024-11-29T20:17:52.063000 CVE-2024-8836,0,0,79e7b0ebef3f34831f5721ae680df12c7c8fda724633587fb2447905129a1385,2024-11-29T20:17:29.823000 CVE-2024-8837,0,0,89e656db04439e6a29296845420167328da47c051242908b0604e6fd8193f958,2024-11-29T20:10:41.130000 -CVE-2024-8838,0,0,e676463d3f7f0a87971635160e5f6d89ae25b12ed9d7c1e6f9c006cc6f501b53,2024-11-22T21:15:22.317000 +CVE-2024-8838,0,1,10d39ca9b78f79c235ce4c6d2c97387f035b10246bb5c06ccf2c04f01720827b,2024-12-03T22:06:42.107000 CVE-2024-8839,0,0,2acbb4e8a6b1624d1785c0132d951382284f4d937031ff128ac25b7244df8702,2024-11-22T21:15:22.427000 CVE-2024-8840,0,0,bd5b89e0d8e6d7cd1adbf7994707d06af9e474015537950245cf092af468c08b,2024-11-22T21:15:22.537000 CVE-2024-8841,0,0,7ed3cd0a4558fa930ad6b076c4b91d74353ec9aac5958cf8e03944b719c15dbd,2024-11-22T21:15:22.657000 @@ -271927,7 +271942,7 @@ CVE-2024-9896,0,0,1349378c85078664635cddd4e92f21938b789e5f2486c02fbf3dda2655343b CVE-2024-9897,0,0,c000f038202bbdf161648c8f1d74fa0a88aad69aa13c730474d96a3fd2473014,2024-11-01T15:27:56.797000 CVE-2024-9898,0,0,34647a8f54872789fb9d153b7e32e611f940664cb6907ab09e4df7e32cdaa8ba,2024-10-18T12:52:33.507000 CVE-2024-9899,0,0,6c76ba1fcc7597d7958a7e74c7de009221352c8fe34414d847a1d4d85ee09e27,2024-10-23T21:15:15.050000 -CVE-2024-9902,0,1,d3514a8252b29f452d3c2fe4a2caa5732203637cca78cbe2e8452f1b90440a5a,2024-12-03T17:15:14.390000 +CVE-2024-9902,0,0,d3514a8252b29f452d3c2fe4a2caa5732203637cca78cbe2e8452f1b90440a5a,2024-12-03T17:15:14.390000 CVE-2024-9903,0,0,244e0ad624c75743e190bc7da6a1b45fe195aaf738d59f8decfde97c8722448f,2024-10-15T12:57:46.880000 CVE-2024-9904,0,0,b8f5bdf1fde920247f061f9c3939c42469f53e3148abd589ac11ba36d4728079,2024-10-15T12:57:46.880000 CVE-2024-9905,0,0,09e20420cf063b331c2f2444287faaf461bdb42e483d150bc77bc6c327c543d3,2024-10-16T22:12:18.153000