diff --git a/CVE-2020/CVE-2020-126xx/CVE-2020-12627.json b/CVE-2020/CVE-2020-126xx/CVE-2020-12627.json index 497274e385e..43b7cd909e6 100644 --- a/CVE-2020/CVE-2020-126xx/CVE-2020-12627.json +++ b/CVE-2020/CVE-2020-126xx/CVE-2020-12627.json @@ -2,7 +2,7 @@ "id": "CVE-2020-12627", "sourceIdentifier": "cve@mitre.org", "published": "2020-05-04T03:15:10.917", - "lastModified": "2021-07-21T11:39:23.747", + "lastModified": "2024-11-19T13:55:30.697", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:calibre-web_project:calibre-web:0.6.6:*:*:*:*:*:*:*", - "matchCriteriaId": "6541E0DD-B74E-4532-A28A-37F35F082F3A" + "criteria": "cpe:2.3:a:janeczku:calibre-web:0.6.6:*:*:*:*:*:*:*", + "matchCriteriaId": "6B2AE5A3-A014-46A6-9582-F1A294C6B7A6" } ] } diff --git a/CVE-2021/CVE-2021-259xx/CVE-2021-25964.json b/CVE-2021/CVE-2021-259xx/CVE-2021-25964.json index 0f033cec7c5..21310865870 100644 --- a/CVE-2021/CVE-2021-259xx/CVE-2021-25964.json +++ b/CVE-2021/CVE-2021-259xx/CVE-2021-25964.json @@ -2,7 +2,7 @@ "id": "CVE-2021-25964", "sourceIdentifier": "vulnerabilitylab@mend.io", "published": "2021-10-04T15:15:07.310", - "lastModified": "2021-10-08T16:54:25.847", + "lastModified": "2024-11-19T13:55:30.697", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -115,10 +115,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*", "versionStartIncluding": "0.6.0", "versionEndExcluding": "0.6.12", - "matchCriteriaId": "6FF6EA1D-D6C6-4A33-877E-F29514871A6D" + "matchCriteriaId": "CC8E66D2-7321-46E4-81CC-097EA0A8794F" } ] } diff --git a/CVE-2021/CVE-2021-259xx/CVE-2021-25965.json b/CVE-2021/CVE-2021-259xx/CVE-2021-25965.json index 7192f994abb..402ebc152fb 100644 --- a/CVE-2021/CVE-2021-259xx/CVE-2021-25965.json +++ b/CVE-2021/CVE-2021-259xx/CVE-2021-25965.json @@ -2,7 +2,7 @@ "id": "CVE-2021-25965", "sourceIdentifier": "vulnerabilitylab@mend.io", "published": "2021-11-16T10:15:06.947", - "lastModified": "2021-11-17T17:57:34.253", + "lastModified": "2024-11-19T13:55:30.697", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -115,10 +115,10 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*", "versionStartIncluding": "0.6.0", "versionEndIncluding": "0.6.13", - "matchCriteriaId": "F0824626-B1BE-45B8-AF97-491AAFA36FB3" + "matchCriteriaId": "703730EE-5EE8-479D-97A3-E1EC55A75369" } ] } diff --git a/CVE-2021/CVE-2021-41xx/CVE-2021-4164.json b/CVE-2021/CVE-2021-41xx/CVE-2021-4164.json index 7653e8be7a6..6fe560d0537 100644 --- a/CVE-2021/CVE-2021-41xx/CVE-2021-4164.json +++ b/CVE-2021/CVE-2021-41xx/CVE-2021-4164.json @@ -2,7 +2,7 @@ "id": "CVE-2021-4164", "sourceIdentifier": "security@huntr.dev", "published": "2022-01-17T13:15:08.193", - "lastModified": "2022-01-22T03:47:47.437", + "lastModified": "2024-11-19T13:55:30.697", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -107,9 +107,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*", "versionEndExcluding": "0.6.15", - "matchCriteriaId": "3F8C0D67-A1E0-42E6-A31D-5590125DEADB" + "matchCriteriaId": "CB86DF8E-5F67-41CA-B657-D8E0A61CD22A" } ] } diff --git a/CVE-2021/CVE-2021-41xx/CVE-2021-4170.json b/CVE-2021/CVE-2021-41xx/CVE-2021-4170.json index c083e9fa381..4aa57358e60 100644 --- a/CVE-2021/CVE-2021-41xx/CVE-2021-4170.json +++ b/CVE-2021/CVE-2021-41xx/CVE-2021-4170.json @@ -2,7 +2,7 @@ "id": "CVE-2021-4170", "sourceIdentifier": "security@huntr.dev", "published": "2022-01-16T21:15:07.900", - "lastModified": "2022-01-22T03:12:41.697", + "lastModified": "2024-11-19T13:55:30.697", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -107,9 +107,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*", "versionEndExcluding": "0.6.15", - "matchCriteriaId": "3F8C0D67-A1E0-42E6-A31D-5590125DEADB" + "matchCriteriaId": "CB86DF8E-5F67-41CA-B657-D8E0A61CD22A" } ] } diff --git a/CVE-2021/CVE-2021-41xx/CVE-2021-4171.json b/CVE-2021/CVE-2021-41xx/CVE-2021-4171.json index edb078f6547..275ecb6c45c 100644 --- a/CVE-2021/CVE-2021-41xx/CVE-2021-4171.json +++ b/CVE-2021/CVE-2021-41xx/CVE-2021-4171.json @@ -2,7 +2,7 @@ "id": "CVE-2021-4171", "sourceIdentifier": "security@huntr.dev", "published": "2022-01-17T10:15:07.857", - "lastModified": "2022-01-24T18:36:32.673", + "lastModified": "2024-11-19T13:55:30.697", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -117,9 +117,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*", "versionEndExcluding": "0.6.15", - "matchCriteriaId": "3F8C0D67-A1E0-42E6-A31D-5590125DEADB" + "matchCriteriaId": "CB86DF8E-5F67-41CA-B657-D8E0A61CD22A" } ] } diff --git a/CVE-2022/CVE-2022-02xx/CVE-2022-0273.json b/CVE-2022/CVE-2022-02xx/CVE-2022-0273.json index 8471960d8f5..3e52de61fed 100644 --- a/CVE-2022/CVE-2022-02xx/CVE-2022-0273.json +++ b/CVE-2022/CVE-2022-02xx/CVE-2022-0273.json @@ -2,7 +2,7 @@ "id": "CVE-2022-0273", "sourceIdentifier": "security@huntr.dev", "published": "2022-01-30T14:15:07.597", - "lastModified": "2022-03-17T16:11:35.453", + "lastModified": "2024-11-19T13:55:30.697", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -117,9 +117,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*", "versionEndExcluding": "0.6.16", - "matchCriteriaId": "617B843B-6C45-4C15-B38C-03A1E9052D91" + "matchCriteriaId": "FB8D7F6F-1609-4EA3-8689-20CC0D5FA4C5" } ] } diff --git a/CVE-2022/CVE-2022-03xx/CVE-2022-0339.json b/CVE-2022/CVE-2022-03xx/CVE-2022-0339.json index 4c0e93d56c7..cdaad8335e9 100644 --- a/CVE-2022/CVE-2022-03xx/CVE-2022-0339.json +++ b/CVE-2022/CVE-2022-03xx/CVE-2022-0339.json @@ -2,7 +2,7 @@ "id": "CVE-2022-0339", "sourceIdentifier": "security@huntr.dev", "published": "2022-01-30T14:15:07.877", - "lastModified": "2022-03-17T16:16:56.813", + "lastModified": "2024-11-19T13:55:30.697", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -117,9 +117,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*", "versionEndExcluding": "0.6.16", - "matchCriteriaId": "617B843B-6C45-4C15-B38C-03A1E9052D91" + "matchCriteriaId": "FB8D7F6F-1609-4EA3-8689-20CC0D5FA4C5" } ] } diff --git a/CVE-2022/CVE-2022-03xx/CVE-2022-0352.json b/CVE-2022/CVE-2022-03xx/CVE-2022-0352.json index cff6808836d..d55d72c5d9b 100644 --- a/CVE-2022/CVE-2022-03xx/CVE-2022-0352.json +++ b/CVE-2022/CVE-2022-03xx/CVE-2022-0352.json @@ -2,7 +2,7 @@ "id": "CVE-2022-0352", "sourceIdentifier": "security@huntr.dev", "published": "2022-01-28T22:15:15.327", - "lastModified": "2022-03-15T16:08:51.150", + "lastModified": "2024-11-19T13:55:30.697", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -117,9 +117,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*", "versionEndExcluding": "0.6.16", - "matchCriteriaId": "617B843B-6C45-4C15-B38C-03A1E9052D91" + "matchCriteriaId": "FB8D7F6F-1609-4EA3-8689-20CC0D5FA4C5" } ] } diff --git a/CVE-2022/CVE-2022-04xx/CVE-2022-0405.json b/CVE-2022/CVE-2022-04xx/CVE-2022-0405.json index e3d937d16c0..8cc9832cf29 100644 --- a/CVE-2022/CVE-2022-04xx/CVE-2022-0405.json +++ b/CVE-2022/CVE-2022-04xx/CVE-2022-0405.json @@ -2,7 +2,7 @@ "id": "CVE-2022-0405", "sourceIdentifier": "security@huntr.dev", "published": "2022-04-03T19:15:07.817", - "lastModified": "2022-04-11T16:07:31.907", + "lastModified": "2024-11-19T13:55:30.697", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -107,9 +107,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*", "versionEndExcluding": "0.6.16", - "matchCriteriaId": "617B843B-6C45-4C15-B38C-03A1E9052D91" + "matchCriteriaId": "FB8D7F6F-1609-4EA3-8689-20CC0D5FA4C5" } ] } diff --git a/CVE-2022/CVE-2022-04xx/CVE-2022-0406.json b/CVE-2022/CVE-2022-04xx/CVE-2022-0406.json index bc36fab1b32..508f9503544 100644 --- a/CVE-2022/CVE-2022-04xx/CVE-2022-0406.json +++ b/CVE-2022/CVE-2022-04xx/CVE-2022-0406.json @@ -2,7 +2,7 @@ "id": "CVE-2022-0406", "sourceIdentifier": "security@huntr.dev", "published": "2022-04-03T19:15:07.880", - "lastModified": "2022-04-09T15:52:49.447", + "lastModified": "2024-11-19T13:55:30.697", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -117,9 +117,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*", "versionEndExcluding": "0.6.16", - "matchCriteriaId": "617B843B-6C45-4C15-B38C-03A1E9052D91" + "matchCriteriaId": "FB8D7F6F-1609-4EA3-8689-20CC0D5FA4C5" } ] } diff --git a/CVE-2022/CVE-2022-07xx/CVE-2022-0766.json b/CVE-2022/CVE-2022-07xx/CVE-2022-0766.json index ffd3cd76e22..f4e2d887ca2 100644 --- a/CVE-2022/CVE-2022-07xx/CVE-2022-0766.json +++ b/CVE-2022/CVE-2022-07xx/CVE-2022-0766.json @@ -2,7 +2,7 @@ "id": "CVE-2022-0766", "sourceIdentifier": "security@huntr.dev", "published": "2022-03-07T07:15:07.257", - "lastModified": "2022-03-11T17:08:58.820", + "lastModified": "2024-11-19T13:55:30.697", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -117,9 +117,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*", "versionEndExcluding": "0.6.17", - "matchCriteriaId": "FFC250B3-EA6A-45C9-8CE4-1456B205320E" + "matchCriteriaId": "E43AE325-09EA-47E5-878F-360B5C90F01D" } ] } diff --git a/CVE-2022/CVE-2022-07xx/CVE-2022-0767.json b/CVE-2022/CVE-2022-07xx/CVE-2022-0767.json index cc0f2723f2f..14a2f503a44 100644 --- a/CVE-2022/CVE-2022-07xx/CVE-2022-0767.json +++ b/CVE-2022/CVE-2022-07xx/CVE-2022-0767.json @@ -2,7 +2,7 @@ "id": "CVE-2022-0767", "sourceIdentifier": "security@huntr.dev", "published": "2022-03-07T07:15:07.463", - "lastModified": "2022-03-14T13:13:13.093", + "lastModified": "2024-11-19T13:55:30.697", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -117,9 +117,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*", "versionEndExcluding": "0.6.17", - "matchCriteriaId": "FFC250B3-EA6A-45C9-8CE4-1456B205320E" + "matchCriteriaId": "E43AE325-09EA-47E5-878F-360B5C90F01D" } ] } diff --git a/CVE-2022/CVE-2022-09xx/CVE-2022-0939.json b/CVE-2022/CVE-2022-09xx/CVE-2022-0939.json index 465634e69e7..4250ab8d52b 100644 --- a/CVE-2022/CVE-2022-09xx/CVE-2022-0939.json +++ b/CVE-2022/CVE-2022-09xx/CVE-2022-0939.json @@ -2,7 +2,7 @@ "id": "CVE-2022-0939", "sourceIdentifier": "security@huntr.dev", "published": "2022-04-04T10:15:08.477", - "lastModified": "2022-04-11T17:30:29.703", + "lastModified": "2024-11-19T13:55:30.697", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -107,9 +107,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*", "versionEndExcluding": "0.6.18", - "matchCriteriaId": "A4296881-9A6D-4E56-A33D-CB8A280F949D" + "matchCriteriaId": "6AC00DC5-E71A-41B8-9728-374A14EE4458" } ] } diff --git a/CVE-2022/CVE-2022-09xx/CVE-2022-0990.json b/CVE-2022/CVE-2022-09xx/CVE-2022-0990.json index 12dd5b0b285..c9abb6867cf 100644 --- a/CVE-2022/CVE-2022-09xx/CVE-2022-0990.json +++ b/CVE-2022/CVE-2022-09xx/CVE-2022-0990.json @@ -2,7 +2,7 @@ "id": "CVE-2022-0990", "sourceIdentifier": "security@huntr.dev", "published": "2022-04-04T18:15:07.817", - "lastModified": "2022-04-12T09:24:40.387", + "lastModified": "2024-11-19T13:55:30.697", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -107,9 +107,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*", "versionEndExcluding": "0.6.18", - "matchCriteriaId": "A4296881-9A6D-4E56-A33D-CB8A280F949D" + "matchCriteriaId": "6AC00DC5-E71A-41B8-9728-374A14EE4458" } ] } diff --git a/CVE-2022/CVE-2022-18xx/CVE-2022-1884.json b/CVE-2022/CVE-2022-18xx/CVE-2022-1884.json index d0a65f98b5f..e25e1860dcf 100644 --- a/CVE-2022/CVE-2022-18xx/CVE-2022-1884.json +++ b/CVE-2022/CVE-2022-18xx/CVE-2022-1884.json @@ -2,8 +2,8 @@ "id": "CVE-2022-1884", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:07.803", - "lastModified": "2024-11-15T20:35:02.693", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-19T14:47:48.443", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -63,8 +83,18 @@ }, "weaknesses": [ { - "source": "security@huntr.dev", + "source": "nvd@nist.gov", "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + }, + { + "source": "security@huntr.dev", + "type": "Secondary", "description": [ { "lang": "en", @@ -73,10 +103,44 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gogs:gogs:*:*:*:*:*:*:*:*", + "versionEndIncluding": "0.12.7", + "matchCriteriaId": "DE99FDD7-1B59-4533-B5FA-F946D0C95630" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://huntr.com/bounties/9cd4e7b7-0979-4e5e-9a1c-388b58dea76b", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-25xx/CVE-2022-2525.json b/CVE-2022/CVE-2022-25xx/CVE-2022-2525.json index 8547fa7eaf4..e1e1bdae168 100644 --- a/CVE-2022/CVE-2022-25xx/CVE-2022-2525.json +++ b/CVE-2022/CVE-2022-25xx/CVE-2022-2525.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2525", "sourceIdentifier": "security@huntr.dev", "published": "2023-04-15T13:15:44.940", - "lastModified": "2023-04-24T18:50:21.427", + "lastModified": "2024-11-19T13:55:30.697", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -78,9 +78,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*", "versionEndExcluding": "0.6.20", - "matchCriteriaId": "D18AE1BC-0C3E-42C4-8DFF-2CFCE44AF39D" + "matchCriteriaId": "4CFCBA02-FCF2-4465-85CC-2A0E784C49D3" } ] } diff --git a/CVE-2022/CVE-2022-307xx/CVE-2022-30765.json b/CVE-2022/CVE-2022-307xx/CVE-2022-30765.json index e397fc94898..7addd6b0b86 100644 --- a/CVE-2022/CVE-2022-307xx/CVE-2022-30765.json +++ b/CVE-2022/CVE-2022-307xx/CVE-2022-30765.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30765", "sourceIdentifier": "cve@mitre.org", "published": "2022-05-16T02:15:06.827", - "lastModified": "2022-05-24T18:58:57.977", + "lastModified": "2024-11-19T13:55:30.697", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:calibre-web_project:calibre-web:0.6.18:*:*:*:*:*:*:*", - "matchCriteriaId": "EE3DE8BF-324A-450B-B4C0-9D9FEED78D6E" + "criteria": "cpe:2.3:a:janeczku:calibre-web:0.6.18:*:*:*:*:*:*:*", + "matchCriteriaId": "CFC2D2B1-9DCA-4F48-8385-0EB880737944" } ] } diff --git a/CVE-2023/CVE-2023-01xx/CVE-2023-0109.json b/CVE-2023/CVE-2023-01xx/CVE-2023-0109.json index f610e76e080..bf72f09df38 100644 --- a/CVE-2023/CVE-2023-01xx/CVE-2023-0109.json +++ b/CVE-2023/CVE-2023-01xx/CVE-2023-0109.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0109", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:08.097", - "lastModified": "2024-11-15T13:58:08.913", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-19T14:44:24.977", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,14 +73,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:usememos:memos:0.9.1:*:*:*:*:*:*:*", + "matchCriteriaId": "02F8AADD-D194-452F-8BF1-75FE8F32A062" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/usememos/memos/commit/46c13a4b7f675b92d297df6dabb4441f13c7cd9c", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/1899ffb2-ce1e-4dc0-af96-972612190f6e", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0737.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0737.json index 03f05d88b0a..c1f1e18e21f 100644 --- a/CVE-2023/CVE-2023-07xx/CVE-2023-0737.json +++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0737.json @@ -2,8 +2,8 @@ "id": "CVE-2023-0737", "sourceIdentifier": "security@huntr.dev", "published": "2024-11-15T11:15:08.363", - "lastModified": "2024-11-15T13:58:08.913", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-19T14:43:04.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -51,14 +73,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wallabag:wallabag:2.5.2:*:*:*:*:*:*:*", + "matchCriteriaId": "CB6D0FA5-9278-432C-B42F-4FFC71B0EB27" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/wallabag/wallabag/commit/268372dbbdd7ef87b84617fdebf95d0a86caf7dc", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/4ba20fe7-4061-4dfb-ab2f-ecaf110641a5", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2106.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2106.json index dfc176a6967..4ebfe0d1cc5 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2106.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2106.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2106", "sourceIdentifier": "security@huntr.dev", "published": "2023-04-15T14:15:07.760", - "lastModified": "2023-04-25T16:29:34.127", + "lastModified": "2024-11-19T13:55:30.697", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -78,9 +78,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:calibre-web_project:calibre-web:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:janeczku:calibre-web:*:*:*:*:*:*:*:*", "versionEndExcluding": "0.6.20", - "matchCriteriaId": "D18AE1BC-0C3E-42C4-8DFF-2CFCE44AF39D" + "matchCriteriaId": "4CFCBA02-FCF2-4465-85CC-2A0E784C49D3" } ] } diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47124.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47124.json index 2717ad89c9b..39b7422fa07 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47124.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47124.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47124", "sourceIdentifier": "security-advisories@github.com", "published": "2023-12-04T21:15:33.850", - "lastModified": "2023-12-07T21:01:24.967", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-19T14:15:16.660", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -153,11 +153,8 @@ ] }, { - "url": "ttps://www.cloudflare.com/learning/ddos/ddos-attack-tools/slowloris/", - "source": "security-advisories@github.com", - "tags": [ - "Broken Link" - ] + "url": "https://www.cloudflare.com/learning/ddos/ddos-attack-tools/slowloris", + "source": "security-advisories@github.com" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10204.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10204.json new file mode 100644 index 00000000000..05daead225a --- /dev/null +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10204.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-10204", + "sourceIdentifier": "3DS.Information-Security@3ds.com", + "published": "2024-11-19T14:15:16.940", + "lastModified": "2024-11-19T14:15:16.940", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Heap-based Buffer Overflow and Uninitialized Variable vulnerabilities exist in the X_B and SAT file reading procedure in eDrawings from Release SOLIDWORKS 2024 through Release SOLIDWORKS 2025. These vulnerabilities could allow an attacker to execute arbitrary code while opening a specially crafted X_B or SAT file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3DS.Information-Security@3ds.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "3DS.Information-Security@3ds.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + }, + { + "lang": "en", + "value": "CWE-457" + } + ] + } + ], + "references": [ + { + "url": "https://www.3ds.com/vulnerability/advisories", + "source": "3DS.Information-Security@3ds.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10924.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10924.json index 3ddffa6d4c7..f029e9b8360 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10924.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10924.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10924", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-15T04:15:03.613", - "lastModified": "2024-11-15T13:58:08.913", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-19T14:15:17.187", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { @@ -68,6 +68,10 @@ "url": "https://plugins.trac.wordpress.org/changeset/3188431/really-simple-ssl", "source": "security@wordfence.com" }, + { + "url": "https://www.wordfence.com/blog/2024/11/really-simple-security-vulnerability/", + "source": "security@wordfence.com" + }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7d5d05ad-1a7a-43d2-bbbf-597e975446be?source=cve", "source": "security@wordfence.com" diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11075.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11075.json new file mode 100644 index 00000000000..b8fb82afee3 --- /dev/null +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11075.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2024-11075", + "sourceIdentifier": "psirt@sick.de", + "published": "2024-11-19T14:15:17.340", + "lastModified": "2024-11-19T14:15:17.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Incoming Goods Suite allows a user with unprivileged access to the underlying system (e.g. local or via SSH) a privilege escalation to the administrative level due to the usage of component vendor Docker images running with root permissions. Exploiting this misconfiguration leads to the fact that an attacker can gain administrative control. over the whole system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@sick.de", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@sick.de", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-250" + } + ] + } + ], + "references": [ + { + "url": "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF", + "source": "psirt@sick.de" + }, + { + "url": "https://sick.com/psirt", + "source": "psirt@sick.de" + }, + { + "url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices", + "source": "psirt@sick.de" + }, + { + "url": "https://www.first.org/cvss/calculator/3.1", + "source": "psirt@sick.de" + }, + { + "url": "https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0005.json", + "source": "psirt@sick.de" + }, + { + "url": "https://www.sick.com/.well-known/csaf/white/2024/sca-2024-0005.pdf", + "source": "psirt@sick.de" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11159.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11159.json index cb75a2ce84d..aa30227fe7a 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11159.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11159.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11159", "sourceIdentifier": "security@mozilla.org", "published": "2024-11-13T14:15:15.330", - "lastModified": "2024-11-13T17:01:16.850", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-19T14:56:37.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,88 @@ "value": "El uso de contenido remoto en mensajes cifrados con OpenPGP puede provocar la divulgaci\u00f3n de texto plano. Esta vulnerabilidad afecta a Thunderbird < 128.4.3 y Thunderbird < 132.0.1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionEndExcluding": "128.4.3", + "matchCriteriaId": "AFC5B426-F05D-4BC9-B70B-2B219990C5A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*", + "versionStartIncluding": "129.0", + "versionEndExcluding": "132.0.1", + "matchCriteriaId": "7662AA1E-5DBA-4BFC-9127-48EAA8AFE5C0" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1925929", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-61/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2024-62/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11198.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11198.json new file mode 100644 index 00000000000..187e411394b --- /dev/null +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11198.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-11198", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-11-19T13:15:04.157", + "lastModified": "2024-11-19T13:15:04.157", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The GD Rating System plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018extra_class\u2019 parameter in all versions up to, and including, 3.6.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/gd-rating-system/tags/3.6.1/d4plib/plugin/d4p.shortcodes.php#L63", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3189622/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/gd-rating-system/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/66cad18d-a433-47f1-9cb6-c619c8717a0d?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11224.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11224.json new file mode 100644 index 00000000000..6115f6c4a8d --- /dev/null +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11224.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2024-11224", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-11-19T13:15:04.423", + "lastModified": "2024-11-19T13:15:04.423", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Parallax Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018position\u2019 parameter in all versions up to, and including, 1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/parallax-image/tags/1.9/assets/shortcode.php#L156", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3189649/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/plugins/parallax-image/#developers", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/56e5f7c9-ad22-43b3-9bfe-0eea1f8040d3?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21538.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21538.json index a524a2e855b..e2b59dace72 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21538.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21538.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21538", "sourceIdentifier": "report@snyk.io", "published": "2024-11-08T05:15:06.453", - "lastModified": "2024-11-08T19:01:03.880", + "lastModified": "2024-11-19T14:15:17.627", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -64,6 +64,10 @@ "url": "https://github.com/moxystudio/node-cross-spawn/pull/160", "source": "report@snyk.io" }, + { + "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-8366349", + "source": "report@snyk.io" + }, { "url": "https://security.snyk.io/vuln/SNYK-JS-CROSSSPAWN-8303230", "source": "report@snyk.io" diff --git a/CVE-2024/CVE-2024-237xx/CVE-2024-23715.json b/CVE-2024/CVE-2024-237xx/CVE-2024-23715.json index 1bb15f617ab..bd11fe20d5b 100644 --- a/CVE-2024/CVE-2024-237xx/CVE-2024-23715.json +++ b/CVE-2024/CVE-2024-237xx/CVE-2024-23715.json @@ -2,8 +2,8 @@ "id": "CVE-2024-23715", "sourceIdentifier": "security@android.com", "published": "2024-11-13T18:15:20.080", - "lastModified": "2024-11-15T14:00:09.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-19T14:03:09.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,66 @@ "value": "En PMRWritePMPageList de pmr.c, existe una posible escritura fuera de los l\u00edmites debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios en el n\u00facleo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/2024-11-01", - "source": "security@android.com" + "source": "security@android.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44206.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44206.json index c5e21654c19..9c78c5d5966 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44206.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44206.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44206", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-24T17:15:16.620", - "lastModified": "2024-10-29T21:35:15.080", - "vulnStatus": "Modified", + "lastModified": "2024-11-19T13:47:18.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -22,20 +22,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", - "privilegesRequired": "LOW", + "privilegesRequired": "NONE", "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "LOW", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "baseScore": 9.3, + "baseSeverity": "CRITICAL" }, - "exploitabilityScore": 2.8, - "impactScore": 2.5 + "exploitabilityScore": 3.9, + "impactScore": 4.7 }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51758.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51758.json index ac2be93d861..d01ff43e32f 100644 --- a/CVE-2024/CVE-2024-517xx/CVE-2024-51758.json +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51758.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51758", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-07T18:15:17.787", - "lastModified": "2024-11-08T19:01:03.880", + "lastModified": "2024-11-19T14:15:17.763", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -22,10 +22,10 @@ "type": "Secondary", "cvssData": { "version": "4.0", - "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "attackVector": "NETWORK", "attackComplexity": "LOW", - "attackRequirements": "NONE", + "attackRequirements": "PRESENT", "privilegesRequired": "NONE", "userInteraction": "PASSIVE", "vulnerableSystemConfidentiality": "LOW", @@ -55,8 +55,8 @@ "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", "providerUrgency": "NOT_DEFINED", - "baseScore": 5.3, - "baseSeverity": "MEDIUM" + "baseScore": 2.3, + "baseSeverity": "LOW" } } ], diff --git a/CVE-2024/CVE-2024-526xx/CVE-2024-52675.json b/CVE-2024/CVE-2024-526xx/CVE-2024-52675.json new file mode 100644 index 00000000000..240bfc35d75 --- /dev/null +++ b/CVE-2024/CVE-2024-526xx/CVE-2024-52675.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-52675", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-19T13:15:04.700", + "lastModified": "2024-11-19T13:15:04.700", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SourceCodester Sentiment Based Movie Rating System 1.0 is vulnerable to SQL Injection in /msrps/movies.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/xubeining/Cve_report/blob/main/Sourcecodester-SQLi-Sentiment-Based-Moive-Rating.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-527xx/CVE-2024-52711.json b/CVE-2024/CVE-2024-527xx/CVE-2024-52711.json new file mode 100644 index 00000000000..63f5542f9fe --- /dev/null +++ b/CVE-2024/CVE-2024-527xx/CVE-2024-52711.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-52711", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-19T14:15:18.207", + "lastModified": "2024-11-19T14:15:18.207", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "DI-8100 v16.07.26A1 is vulnerable to Buffer Overflow In the ip_position_asp function via the ip parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/CLan-nad/CVE/blob/main/D-Link/ip_position_asp/1.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-97xx/CVE-2024-9777.json b/CVE-2024/CVE-2024-97xx/CVE-2024-9777.json new file mode 100644 index 00000000000..24ae2c95cda --- /dev/null +++ b/CVE-2024/CVE-2024-97xx/CVE-2024-9777.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2024-9777", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-11-19T13:15:04.850", + "lastModified": "2024-11-19T13:15:04.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Ashe theme for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.243. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://themes.trac.wordpress.org/browser/ashe/2.242/functions.php#L101", + "source": "security@wordfence.com" + }, + { + "url": "https://themes.trac.wordpress.org/browser/ashe/2.242/functions.php#L112", + "source": "security@wordfence.com" + }, + { + "url": "https://themes.trac.wordpress.org/changeset/248853/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/themes/ashe/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ce6c2f36-9eed-482f-9201-8d26e8c5c369?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9830.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9830.json new file mode 100644 index 00000000000..124e6d8a7c2 --- /dev/null +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9830.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2024-9830", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-11-19T13:15:05.107", + "lastModified": "2024-11-19T13:15:05.107", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Bard theme for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of add_query_arg without appropriate escaping on the URL in all versions up to, and including, 2.216. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://themes.trac.wordpress.org/browser/bard/2.216/functions.php#L109", + "source": "security@wordfence.com" + }, + { + "url": "https://themes.trac.wordpress.org/browser/bard/2.216/functions.php#L98", + "source": "security@wordfence.com" + }, + { + "url": "https://themes.trac.wordpress.org/changeset/248854/", + "source": "security@wordfence.com" + }, + { + "url": "https://wordpress.org/themes/bard/", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9aff1e5b-2f16-43d0-b75a-c07e59a9c15f?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 50b8e56b431..f3693931acc 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-19T13:00:19.355303+00:00 +2024-11-19T15:00:21.040708+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-19T12:15:16.497000+00:00 +2024-11-19T14:56:37.800000+00:00 ``` ### Last Data Feed Release @@ -33,24 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -270311 +270319 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `8` -- [CVE-2024-11036](CVE-2024/CVE-2024-110xx/CVE-2024-11036.json) (`2024-11-19T11:15:04.343`) -- [CVE-2024-11038](CVE-2024/CVE-2024-110xx/CVE-2024-11038.json) (`2024-11-19T11:15:05.683`) -- [CVE-2024-11194](CVE-2024/CVE-2024-111xx/CVE-2024-11194.json) (`2024-11-19T12:15:16.497`) -- [CVE-2024-11195](CVE-2024/CVE-2024-111xx/CVE-2024-11195.json) (`2024-11-19T11:15:05.930`) +- [CVE-2024-10204](CVE-2024/CVE-2024-102xx/CVE-2024-10204.json) (`2024-11-19T14:15:16.940`) +- [CVE-2024-11075](CVE-2024/CVE-2024-110xx/CVE-2024-11075.json) (`2024-11-19T14:15:17.340`) +- [CVE-2024-11198](CVE-2024/CVE-2024-111xx/CVE-2024-11198.json) (`2024-11-19T13:15:04.157`) +- [CVE-2024-11224](CVE-2024/CVE-2024-112xx/CVE-2024-11224.json) (`2024-11-19T13:15:04.423`) +- [CVE-2024-52675](CVE-2024/CVE-2024-526xx/CVE-2024-52675.json) (`2024-11-19T13:15:04.700`) +- [CVE-2024-52711](CVE-2024/CVE-2024-527xx/CVE-2024-52711.json) (`2024-11-19T14:15:18.207`) +- [CVE-2024-9777](CVE-2024/CVE-2024-97xx/CVE-2024-9777.json) (`2024-11-19T13:15:04.850`) +- [CVE-2024-9830](CVE-2024/CVE-2024-98xx/CVE-2024-9830.json) (`2024-11-19T13:15:05.107`) ### CVEs modified in the last Commit -Recently modified CVEs: `1` +Recently modified CVEs: `28` -- [CVE-2024-31141](CVE-2024/CVE-2024-311xx/CVE-2024-31141.json) (`2024-11-19T09:15:03.860`) +- [CVE-2021-4164](CVE-2021/CVE-2021-41xx/CVE-2021-4164.json) (`2024-11-19T13:55:30.697`) +- [CVE-2021-4170](CVE-2021/CVE-2021-41xx/CVE-2021-4170.json) (`2024-11-19T13:55:30.697`) +- [CVE-2021-4171](CVE-2021/CVE-2021-41xx/CVE-2021-4171.json) (`2024-11-19T13:55:30.697`) +- [CVE-2022-0273](CVE-2022/CVE-2022-02xx/CVE-2022-0273.json) (`2024-11-19T13:55:30.697`) +- [CVE-2022-0339](CVE-2022/CVE-2022-03xx/CVE-2022-0339.json) (`2024-11-19T13:55:30.697`) +- [CVE-2022-0352](CVE-2022/CVE-2022-03xx/CVE-2022-0352.json) (`2024-11-19T13:55:30.697`) +- [CVE-2022-0405](CVE-2022/CVE-2022-04xx/CVE-2022-0405.json) (`2024-11-19T13:55:30.697`) +- [CVE-2022-0406](CVE-2022/CVE-2022-04xx/CVE-2022-0406.json) (`2024-11-19T13:55:30.697`) +- [CVE-2022-0766](CVE-2022/CVE-2022-07xx/CVE-2022-0766.json) (`2024-11-19T13:55:30.697`) +- [CVE-2022-0767](CVE-2022/CVE-2022-07xx/CVE-2022-0767.json) (`2024-11-19T13:55:30.697`) +- [CVE-2022-0939](CVE-2022/CVE-2022-09xx/CVE-2022-0939.json) (`2024-11-19T13:55:30.697`) +- [CVE-2022-0990](CVE-2022/CVE-2022-09xx/CVE-2022-0990.json) (`2024-11-19T13:55:30.697`) +- [CVE-2022-1884](CVE-2022/CVE-2022-18xx/CVE-2022-1884.json) (`2024-11-19T14:47:48.443`) +- [CVE-2022-2525](CVE-2022/CVE-2022-25xx/CVE-2022-2525.json) (`2024-11-19T13:55:30.697`) +- [CVE-2022-30765](CVE-2022/CVE-2022-307xx/CVE-2022-30765.json) (`2024-11-19T13:55:30.697`) +- [CVE-2023-0109](CVE-2023/CVE-2023-01xx/CVE-2023-0109.json) (`2024-11-19T14:44:24.977`) +- [CVE-2023-0737](CVE-2023/CVE-2023-07xx/CVE-2023-0737.json) (`2024-11-19T14:43:04.257`) +- [CVE-2023-2106](CVE-2023/CVE-2023-21xx/CVE-2023-2106.json) (`2024-11-19T13:55:30.697`) +- [CVE-2023-47124](CVE-2023/CVE-2023-471xx/CVE-2023-47124.json) (`2024-11-19T14:15:16.660`) +- [CVE-2024-10924](CVE-2024/CVE-2024-109xx/CVE-2024-10924.json) (`2024-11-19T14:15:17.187`) +- [CVE-2024-11159](CVE-2024/CVE-2024-111xx/CVE-2024-11159.json) (`2024-11-19T14:56:37.800`) +- [CVE-2024-21538](CVE-2024/CVE-2024-215xx/CVE-2024-21538.json) (`2024-11-19T14:15:17.627`) +- [CVE-2024-23715](CVE-2024/CVE-2024-237xx/CVE-2024-23715.json) (`2024-11-19T14:03:09.400`) +- [CVE-2024-44206](CVE-2024/CVE-2024-442xx/CVE-2024-44206.json) (`2024-11-19T13:47:18.787`) +- [CVE-2024-51758](CVE-2024/CVE-2024-517xx/CVE-2024-51758.json) (`2024-11-19T14:15:17.763`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 5c6e8c9ef44..6af1582856d 100644 --- a/_state.csv +++ b/_state.csv @@ -147540,7 +147540,7 @@ CVE-2020-12621,0,0,8ce7e90cf5d38925e940068a7ae81f0e149cc8eb6774d0a2c1c7e217670dc CVE-2020-12624,0,0,8a0fc770343fdc04bd996cf45f0ff8eee77a483d3005ca548b79b2bbdd4878fd,2021-07-21T11:39:23.747000 CVE-2020-12625,0,0,ba670072932e2f84ce8a6ee211183dd0aafd451a1d585c003e4b8f0ee8b0710c,2022-09-02T15:42:45.577000 CVE-2020-12626,0,0,ef4ab069cdfdd918b1dfdbdff6dc1e10a89ec07b516956413a5df9b27f4d80a5,2022-09-02T15:42:13.713000 -CVE-2020-12627,0,0,4fda3009492ad546c4d5a3562ffd500cda465cebf90e0a13cff7e8abbd887f5f,2021-07-21T11:39:23.747000 +CVE-2020-12627,0,1,7e8740e74bef375c203c420eadadfc5b0f0a3be281f621e0bb304f065c1e51e4,2024-11-19T13:55:30.697000 CVE-2020-12629,0,0,6302c256329ddcf42ee813098eb846d57616b48336546370f0e8d1971103bb7c,2020-05-06T20:44:34.660000 CVE-2020-1263,0,0,9a370617ef73138b079100cfabf08396db758880aa61ac1612d7dd94a8f958b0,2021-07-21T11:39:23.747000 CVE-2020-12635,0,0,20c8e4b2f600aed040904c974ad6e679133a1f04f71dd085db50281f95159af7,2024-02-14T01:17:43.863000 @@ -171654,8 +171654,8 @@ CVE-2021-25960,0,0,8966318153632386e613d3da07433d0898ebe541ac0542fbd833b88414c9a CVE-2021-25961,0,0,22b470ce8b666ea20e5d0cab6ff8f13de084ad6910d45348aef26ed926ddac00,2021-10-07T17:05:48.717000 CVE-2021-25962,0,0,935f7ba91aea9f19056fdc881199025fe86ee6e75a7a00550a994ee72bbc4ce8,2021-10-06T20:30:01.977000 CVE-2021-25963,0,0,eef6fbaad1cf210ebcdcb4dde111b82ed2ae28fe021f79460bcb208f56e7438b,2021-10-07T03:02:46.987000 -CVE-2021-25964,0,0,1105f4248cfe8217637ea2f1e32fbc092427b3108c6f28f4c181ae24b17795e6,2021-10-08T16:54:25.847000 -CVE-2021-25965,0,0,bdfca22f9f9fd49ade05743667632f9667f3b4bda35d1c7e3625d94a0907a2c8,2021-11-17T17:57:34.253000 +CVE-2021-25964,0,1,bd17926c15c6aafe59c4d31c62272369f814e16dd285b716ff509b30016eb446,2024-11-19T13:55:30.697000 +CVE-2021-25965,0,1,e8c380577323e71372b14eb1db6dea116d02a5d1c09bca2a20f9fba85d976a73,2024-11-19T13:55:30.697000 CVE-2021-25966,0,0,6631aa3daac52e584c6ac4608617627ea90e46497039ab1b233e796a5197021e,2022-02-25T16:10:26.793000 CVE-2021-25967,0,0,4ab84532fd7ed4fc14ba083adea1ce2392a7e866ae5f01e12da82d39bc860ffa,2021-12-02T18:59:55.443000 CVE-2021-25968,0,0,182c7f567a0aaa94a30caeae3513295d58f799b9efd65c2c904f1dab7bc4d009,2021-10-21T23:39:03.337000 @@ -183333,7 +183333,7 @@ CVE-2021-41636,0,0,63eecb7b37c7497bc2d0e66fda0c87c3bb39b2ae9ef4daaf774dfdae2e15c CVE-2021-41637,0,0,3e7106415adaddf34c5f560098cc1181920e94facbddb201ad017dee908edb96,2022-07-01T16:48:40.010000 CVE-2021-41638,0,0,613e6d48da7577b6a41011f792da0d6bf850458d5b4d0fcad9ddc862b5e440cb,2022-07-01T16:54:44.490000 CVE-2021-41639,0,0,e4459c0cc2a18f37534ab8228cfd8beba9d057a0a4566969f9e85d8579ad29e7,2022-07-01T16:54:56.413000 -CVE-2021-4164,0,0,26181d4e06fb35e672b10f10964a70aba9447fc6088db27bea77bead96157982,2022-01-22T03:47:47.437000 +CVE-2021-4164,0,1,20f9d58376f073b688db27821f1a5a1437caea09888301760c03328ec9b9d6e0,2024-11-19T13:55:30.697000 CVE-2021-41641,0,0,471e4e684c15a020d266300f4f064d2429fafbadc4766e60775831b2cf58f0b5,2022-06-21T14:47:44.067000 CVE-2021-41643,0,0,e459bb9b3ae61ce1c0c6d285d271ea229748355da335583ec31fcdddf509d6f3,2021-11-02T19:39:02.490000 CVE-2021-41644,0,0,9865dd6292c1189e24150efd40a621f72aa038c9804a6547447118cc86d16ed2,2021-11-02T18:49:45.500000 @@ -183373,8 +183373,8 @@ CVE-2021-41694,0,0,f50452abd758a90efb8659fe89ef0455f4d267a5131c762b8f8e62ab5bbf1 CVE-2021-41695,0,0,dd9e067ec3b53cda9f935034e15232d6d5e79f62a053b26d0f77f6909e4ac1ef,2021-12-14T15:36:10.400000 CVE-2021-41696,0,0,8e34760fd4621f0aa12fba1e5efd349f7fa4de5d0772846e528bcb8650f3de63,2021-12-14T15:30:11.617000 CVE-2021-41697,0,0,33b358b7127382c3f55513ad663c443b6239f7d67ea40b4e900a1c92ef4cc59d,2021-12-14T15:14:33.733000 -CVE-2021-4170,0,0,37cbcdb61a8ee5f3ba710bd39dc849d34109ce80f3874799c94ebc63d0ba55e0,2022-01-22T03:12:41.697000 -CVE-2021-4171,0,0,7e081fd412650ca1bfd9c672a45b8fcebeb6f3472d43f59bc36a90f173d45e33,2022-01-24T18:36:32.673000 +CVE-2021-4170,0,1,b8beab78ed9dc354a058ea96afab8166fc3706648030e4f45ecdff702a9bd3fb,2024-11-19T13:55:30.697000 +CVE-2021-4171,0,1,4f42b83a708d15892b3fcad03307106e62689103423e13da2e9868050bf6a831,2024-11-19T13:55:30.697000 CVE-2021-41714,0,0,fc9e637af1a0036f13895530a7345d717282538ded5aaa19ffc08da024090e87,2022-06-03T14:15:01.887000 CVE-2021-41715,0,0,e54eedea66b5b1eee4cce4189c84d7d77fe6adbb9ea079fcd98fdaf28b2809e3,2022-04-14T20:28:35.890000 CVE-2021-41716,0,0,cadf2b7de621cc4d3a3a955adc24a880843a6c905295b60f449a49d359880f71,2021-12-08T14:48:53.020000 @@ -187846,7 +187846,7 @@ CVE-2022-0269,0,0,0b042406ed722bed4f08f80b4f00c84357c8cea0b40b051befc2509217a3a6 CVE-2022-0270,0,0,547484ec0a42fe3acfc13bd179336b2c7cf9e5bfa133be62f505695ac6b594fe,2023-07-21T16:53:18.197000 CVE-2022-0271,0,0,b9998bff8556a3e9dd78071b57144ad5eb927440f09838acadc201638d9c53a4,2022-04-15T17:54:39.720000 CVE-2022-0272,0,0,ba39c601e8f8ad770ec51471a81d25ffe2f0563ea1a0215aed7e5549b2ba80bc,2022-04-28T18:40:19.163000 -CVE-2022-0273,0,0,a2c9906b46f54a3fc5103c11411b957a7faa0137e90e264c1c237a108e5927ac,2022-03-17T16:11:35.453000 +CVE-2022-0273,0,1,e1fb46576506bdae178f09dce4f55598d868a4d0fde059b8dd2653558e6b68bf,2024-11-19T13:55:30.697000 CVE-2022-0274,0,0,5b464b8245e5321eeea5cde4c0986f9d63275f8e971c1a66b7e4500348e1edc6,2022-01-25T14:48:16.997000 CVE-2022-0277,0,0,54014335e700fab8a415cb3d21845a08a975de96657a8cbd1df94a58e34845ed,2023-06-29T08:15:09.807000 CVE-2022-0278,0,0,bbe12ed35bb88da2486e8c13a6baaafb99e94fb880ba9c3fdbf3c9d24bfb016a,2022-01-26T03:22:09.423000 @@ -187906,7 +187906,7 @@ CVE-2022-0335,0,0,c87f7140ccb139e3761172aa2f563e4109797f37ee8bf08d3125bcc7f75ad6 CVE-2022-0336,0,0,307b1c206992ca977db64c933e94fd941cf38b8332fd987ef4968a8aafac3993,2023-09-17T09:15:10.277000 CVE-2022-0337,0,0,75762347a627388711d1f024fb68d21bc655a56ca3208dec8afc0cf007c526e8,2023-01-09T19:17:54.197000 CVE-2022-0338,0,0,2606c9f2afde98ccb459d99f4a20258712105b5775cab8d092cb1216a49083f9,2023-08-02T09:15:11.420000 -CVE-2022-0339,0,0,1b98dbf84cebdb5dbd8174a419b58a38b961d56cad735966547a2ec684491256,2022-03-17T16:16:56.813000 +CVE-2022-0339,0,1,5d793d5e53c6da4433011b5271c0b87f58dd5cf7dcbd4198915acb20e4dc641e,2024-11-19T13:55:30.697000 CVE-2022-0341,0,0,6bc29c60602591923783e75b9647c6eedf344c6d18b4537b8c917185e44cb4b4,2022-03-18T18:00:28.817000 CVE-2022-0342,0,0,192c7e727dc228b67703fcbfa825f1994bc25fe903e9046ec3ccd660229b0664,2022-04-04T17:27:58.343000 CVE-2022-0343,0,0,9b4662c7106d8ca9b502a9d147c3d0debb4425324b85f0dcc86bf35395bea467,2022-04-07T16:31:33.783000 @@ -187918,7 +187918,7 @@ CVE-2022-0348,0,0,41d5c28d0d1ab089ac68d1912e05f4337627e5cea9fba44ca38c395f8d8254 CVE-2022-0349,0,0,068d099492481419d374d2003ba2aab3b7d6988afb1cc3a820cd310c5c5be982,2022-03-11T20:44:24.327000 CVE-2022-0350,0,0,4d2f2dd515eed464ce450a16a96b9a4c6b0b857965f9f86d554d1100c638b80f,2023-03-07T22:40:44.473000 CVE-2022-0351,0,0,d8c1cca7ff8811855948a48757571f7f9926e2f30bbcb8ecf722b183b33e26f4,2022-11-09T19:20:23.007000 -CVE-2022-0352,0,0,d655b88d16f1b100cb6807b99936916e268559477432619c05721d420e8f62b3,2022-03-15T16:08:51.150000 +CVE-2022-0352,0,1,0db67f24e45f8cba6dbb901f2e90ca2aaf82b10e7d4d2ffa04beed0cc939d610,2024-11-19T13:55:30.697000 CVE-2022-0353,0,0,1bde6ae86e109805348b0fe8a1ea22f783b296f97417591fd534964877f7a921,2023-10-30T18:18:25.037000 CVE-2022-0354,0,0,08d2a7b0ab08e8bc6919039c3edf04df57c0887581b95ac3307601a9b6d27779,2023-08-08T14:22:24.967000 CVE-2022-0355,0,0,6f40eae045470357a76ef57564a0e59b6ca2e456718480f7cb2332766b81d912,2023-08-02T09:15:11.547000 @@ -187970,8 +187970,8 @@ CVE-2022-0401,0,0,fd0c1ff73b88c5d9692a05caa80d58d887c8a37e7f114a6685c34c493b8913 CVE-2022-0402,0,0,92f9b155923211e2ceee2d42d296863f6f1f38af6d18510a65170addd06c966c,2024-01-22T21:01:52.430000 CVE-2022-0403,0,0,54d3a8e21af141a32e192ed41de5542c8ee2cafce593d7553180addfbe7d22f5,2022-04-11T16:16:43.773000 CVE-2022-0404,0,0,298dccd25c1952207280414f8bd7e0b22fde3e98e64d2fb17b1031e8a652b119,2023-11-07T03:41:14.680000 -CVE-2022-0405,0,0,444a4f2026f3bc69b25c29380ab5e2bf9b910cd7c2c312cf9ef76016a1a95299,2022-04-11T16:07:31.907000 -CVE-2022-0406,0,0,a441ef815a14d749ca2d58b6be22dd9608fe0be8eb3d1dfb9d29d838cf9c4f3a,2022-04-09T15:52:49.447000 +CVE-2022-0405,0,1,3fe2c2fa664b847b5ebb82208e2adeb820c86039416485597b89d2c3c29fb9e8,2024-11-19T13:55:30.697000 +CVE-2022-0406,0,1,ac6dc798d52e1d9df0954afaddd06fcd05ab5e74ee3bd2e718cf9ddf02b5d3c0,2024-11-19T13:55:30.697000 CVE-2022-0407,0,0,0155b2a87f71b0b7fb0916580421bf8b007742dea3e03201cc1d9b516db1f9a1,2022-08-26T17:35:22.767000 CVE-2022-0408,0,0,c5724b74e67f805cb7cef848135fd972bd1216e01e032e5ee72fd927b68010c6,2023-11-07T03:41:15.057000 CVE-2022-0409,0,0,bdddcb1bc9179f07dc0a4ae2adcd12204cfc01caa1f9bd597938d2e20a4a0885,2022-03-01T01:57:03.397000 @@ -188319,8 +188319,8 @@ CVE-2022-0762,0,0,92ae39eefd66ea7cbc32a8686599ec741c84b55a252f147df8d414c0e43894 CVE-2022-0763,0,0,d8fa3da7528e8203bd3a9ef37cccbd85be752760dc10937953f39359a9f93d3b,2022-03-08T17:25:17.980000 CVE-2022-0764,0,0,343066202ab53f2821e9e5df90301b5dd58745b58610e9036f49df289f6d59d2,2023-07-21T17:13:18.700000 CVE-2022-0765,0,0,f45389e2abd373ef50c4b2eaf76af5c989711ff021560b421d272973fd1993b0,2022-04-27T00:07:20.813000 -CVE-2022-0766,0,0,b2ccd107a9d1daab9412c94c8371dbafadae12bb91fd3c16030da56c47874ee7,2022-03-11T17:08:58.820000 -CVE-2022-0767,0,0,c7d6b46f0a32842a8f32b42cac5e239b9b7a650e21a18f0420d715066c6ca00e,2022-03-14T13:13:13.093000 +CVE-2022-0766,0,1,d537f4274da704d1dd3273ac0b381b2b0424512e0ef2fa096f40080f0bc4abf5,2024-11-19T13:55:30.697000 +CVE-2022-0767,0,1,4a8b1abf7bc65f3da8bb9d672e959713f33737890d786c063681fdda56def6c0,2024-11-19T13:55:30.697000 CVE-2022-0768,0,0,7413d50a96f5047476d4044fe93ebaaab8948f5b8b6e5644533ed04e60d94495,2022-03-08T17:34:05.377000 CVE-2022-0769,0,0,186d87009c3299115358ed003347610f261ff2fff63be099b887bf8e21eab2ea,2022-05-04T13:59:27.377000 CVE-2022-0770,0,0,2b2c8df5ef6f7c812d46374c4465bb9d474ff8112a462c85978629ead78fc435,2022-04-04T18:55:52.103000 @@ -188485,7 +188485,7 @@ CVE-2022-0935,0,0,4937ede48adff99b8a82685ce1c47ab995cfa52213926d00546e0ed28661fc CVE-2022-0936,0,0,5e1301a868c51f32d9b1d38c3bd9d5c4e7b252e5c9034d5c170399428a55d018,2022-04-14T20:39:32.157000 CVE-2022-0937,0,0,6ebd398e67ed3e0577049a7473f2e9b69a1755b2dd70b6e7cd0177ef47d0ed36,2022-03-18T18:14:39.940000 CVE-2022-0938,0,0,53311bc36c380c526ea038cf13a8d2ff3d90835a99184a433f43babd3148fad1,2022-03-18T18:09:18.637000 -CVE-2022-0939,0,0,c2915debcf9880de4772fa9e967b96a57b2ee44227ae14b7c60081df92bbbc68,2022-04-11T17:30:29.703000 +CVE-2022-0939,0,1,3282bbb661657d8be93f4071e72224ecc54e53305f8949acb7b8846808175f6e,2024-11-19T13:55:30.697000 CVE-2022-0940,0,0,70c545df86ee91c07e5f16b8db56ecfe025f705cbd301d61814768bd18a46665,2022-03-18T17:58:19.337000 CVE-2022-0941,0,0,ac156d3ea26d89f38610a523301b2336456b75734150d52009650c143803332b,2022-03-18T17:37:51.753000 CVE-2022-0942,0,0,dec36e5bdc2646c8ba8c9b40004d57a13bf18d262c0580e836243465cf2f3bee,2022-03-22T18:06:16.860000 @@ -188536,7 +188536,7 @@ CVE-2022-0986,0,0,1f3d8cfe5b4034f8cb2379ef060f1b0fce7bd502c6c6229913f30a0e5af318 CVE-2022-0987,0,0,f2c42d4d9f95e9749a4c445c80a51b63228a99080839ef62a18bb9765a5a0f2b,2022-07-09T02:16:41.140000 CVE-2022-0988,0,0,f1199d2b132d579bf0e13054467a88fb08e72497869a87789662b30278c0d972,2022-04-01T12:24:18.417000 CVE-2022-0989,0,0,7454afdecfc72b7e4a57bd0f5cbdf02a26a78ca6613e027ac6b4e5823196793c,2022-04-15T20:22:57.330000 -CVE-2022-0990,0,0,221d6abbba16c22be53064dc133896bd80598ba0ff53cf9f7b9a238da1f84bb3,2022-04-12T09:24:40.387000 +CVE-2022-0990,0,1,6457303ddf0d06207cdd8d7192c493deae26fbe206e51758fb7bc61df6f18665,2024-11-19T13:55:30.697000 CVE-2022-0991,0,0,8ca24c514df2eadfc1666ca1ace95d3168a9e969f9b3fcbe0a2a99e49de31694,2022-03-28T18:54:03.633000 CVE-2022-0992,0,0,6fd70fc3b7474ab91729ad584c70484a0877149adc006c6f9bd7347bb2357681,2023-11-07T03:41:41.573000 CVE-2022-0993,0,0,78c1b936011bd648dc08da3df4bfe29b3fe82fd44846684d5bf8f67b8b826931,2024-01-11T09:15:43.237000 @@ -189401,7 +189401,7 @@ CVE-2022-1876,0,0,983e56cac9f7021f952f9f938d45e035dc9acbf02c1272a86efe4cc4b468e0 CVE-2022-1881,0,0,7439c809094624c8b5fdbf022a11f3d774e6fefc61f4a028f8263bd6fe529332,2022-07-27T18:21:16.887000 CVE-2022-1882,0,0,3baaf779da64335ffad3abdda3c3850b06114d069bb0bf1a437e02c2ffe782b9,2023-11-07T03:42:15.460000 CVE-2022-1883,0,0,10b029e5ce85ce2290987adcb3c5745aea973d33d0d3803bfa3a6beb774a6afd,2022-06-03T14:05:34.297000 -CVE-2022-1884,0,0,23b1205baec96f7e23701a3fb895259c618cca15d9600e947a60e6f8ad9e65b7,2024-11-15T20:35:02.693000 +CVE-2022-1884,0,1,b5e47b6fa991326fd5d1cb1d70695a1190edb3eb7f45e2a68cb3debb9e1a9c6d,2024-11-19T14:47:48.443000 CVE-2022-1885,0,0,990571f5f58372d06c86739f0d8507a9bf4c77382683b628e53a4fb6b11f2c45,2022-07-06T18:07:38.497000 CVE-2022-1886,0,0,7934fa97f2a8af4a046d7bb9f14babcddc4a4e2348bcdab16ebde94dde55d5a5,2023-11-07T03:42:15.700000 CVE-2022-1887,0,0,c9859a4b8fe51696b2ace2c5b6406cbbf00272360b5c9ea988467e7b99e94416,2022-12-24T04:23:54.613000 @@ -194407,7 +194407,7 @@ CVE-2022-25246,0,0,470d73336081fafe2504c5ae930c1bc5c3b04d6c1d5bca8e82a1ca62a276c CVE-2022-25247,0,0,f1828753959f3a8ddb7cef9c2b17b9ebe6e005ad9804df2524e5e91b5305ed43,2022-03-28T13:25:59.947000 CVE-2022-25248,0,0,1e003ed9c345c86a0ae7342705f6b5b76c7a524c725fb9f26e480a2de2ce199c,2022-03-28T13:27:40.890000 CVE-2022-25249,0,0,5096787f68913f3af8deec7d28059622eee59c935f342d23008ba2d1adcdb681,2022-03-28T13:29:31.777000 -CVE-2022-2525,0,0,210cce692d9a912425d2e96ebcf9a983eeacf6087702bc018f6146cd0ff7680f,2023-04-24T18:50:21.427000 +CVE-2022-2525,0,1,082d8f171c6cc07e4b131d4117af1cdfc7074009c41676c35c6dc892fa94881d,2024-11-19T13:55:30.697000 CVE-2022-25250,0,0,70256af592b9c49051cb696e3e98b6b318b6b9bd7c026c62389ebc173f763a81,2022-03-28T13:29:56.907000 CVE-2022-25251,0,0,30aa9f042433ef7f24b6a381a3a50cfd25bc3a4fa4c2ee4d2a94c9598ed3cb9e,2022-03-28T13:30:39.300000 CVE-2022-25252,0,0,40a835ffc450f4499e9c229b3d3a44e165cbb918e6082351e6d9edd95f09ca0d,2022-03-28T13:32:35.907000 @@ -198901,7 +198901,7 @@ CVE-2022-30759,0,0,bd8543e5a8b11fb4636241908ba990e450528de2ca3ce6a2cc2c2e92c529e CVE-2022-3076,0,0,04a5db7a7c3a6c41fc8643ca8ef27e8b694c85120ab617b9e4549a6d82fe6ea6,2022-09-27T04:37:44.793000 CVE-2022-30760,0,0,33981d8f48d80e2e251879e187507ead15290cf13fe04528ee7cc8601a8463a9,2022-06-17T19:57:09.527000 CVE-2022-30763,0,0,99c247d1a877e52090357101b5b4001a96c949c6e441faf9185997c22c969e91,2022-10-12T15:32:50.077000 -CVE-2022-30765,0,0,761225e6da5f713d9c25f52dab8c0b338789eb157822a77f4fba5e290157ab62,2022-05-24T18:58:57.977000 +CVE-2022-30765,0,1,21088860b0170d3618cfd9335e6710743a7cf725d376c1f938c4afaf2c7d00aa,2024-11-19T13:55:30.697000 CVE-2022-30767,0,0,4775e6dfb882ca3a196625f46d2186ce01f414513db4c144b862289f8c58d6a5,2023-11-07T03:47:24.783000 CVE-2022-30768,0,0,19753dea6aeae531834932bdbe525a85c3a36862042bf97e7f1ddd6d4e4b3d91,2023-11-07T03:47:24.853000 CVE-2022-30769,0,0,15fa8cc9f9e5fd9012a9ab8a52b506ef029d295e9d752a237cf87b7e4f8050e9,2023-11-07T03:47:24.913000 @@ -212973,7 +212973,7 @@ CVE-2023-0105,0,0,2b12a003cd73110318e79298dd730b028944de31b3b2fd49ae09c6e6c34faf CVE-2023-0106,0,0,05e0d567b91f98b80dba4d8ef37e3d6d93df29ade7db9eb7d74b845f158d4370,2023-01-12T15:04:29.543000 CVE-2023-0107,0,0,cd205e669e16f38bc95e2290070f356c4fee19f825da4c33fef61ad635b5f6dd,2023-01-12T15:04:41.817000 CVE-2023-0108,0,0,70c8cf4e996128d54da9f7301a41fc8c246a66fdfe898b159018bdcb506d722d,2023-01-12T15:05:03.130000 -CVE-2023-0109,0,0,6abc61d95fd57ef73d1f6ec7554842d23df16b10a4dd404e5111c256f31d1109,2024-11-15T13:58:08.913000 +CVE-2023-0109,0,1,f50d684cb180753275a60be1ec93d7781dcc8b49ad130338582e06440ef189bf,2024-11-19T14:44:24.977000 CVE-2023-0110,0,0,b9a61a54a079a5cddcae7f57892e97a4bbf51450edf598dd8a9a1b1c401ebd1f,2023-01-12T15:05:16.323000 CVE-2023-0111,0,0,f766f05747dd6dfbc35868e0369bbe0def763377d79a8a4ea4e4bea44d32809b,2023-01-12T15:05:27.080000 CVE-2023-0112,0,0,66c21565a3c1e4d16d1c053665b40b7925a9b3641bc7aeaa413fbdfe779c924d,2023-01-12T15:05:37.157000 @@ -213577,7 +213577,7 @@ CVE-2023-0733,0,0,e09491ec0935323a2fec770c3ecd0ead271e6d263c55ec182afeeb068268d5 CVE-2023-0734,0,0,8d2fcc12463e0b1abec4a2a51b7df5516739ca6f45b2b04f9bbd78cb0aff604f,2023-03-09T20:55:01.123000 CVE-2023-0735,0,0,9fdced2b47db01a6a01919f52b5ed809a8d21724989b5bfa7955c49171c3b6f7,2023-02-15T19:24:41.473000 CVE-2023-0736,0,0,b3396876d05ebd2f1f90f4354a1dda6ed12cd8c3d0ffb089c43fbadd8845f1a2,2023-02-15T19:25:29.570000 -CVE-2023-0737,0,0,3bb780fc0a538b18d6fde6ba59591151c98c891a49485224230137e3bdf6af31,2024-11-15T13:58:08.913000 +CVE-2023-0737,0,1,51425d6267ef46092b2ea719385b1a24795974b2751701ad1000a997f859dafc,2024-11-19T14:43:04.257000 CVE-2023-0738,0,0,8b8dc61e92f27262b3aa279351d6ab8033f6bacb206b350b6e8e6ebc9af5389e,2023-04-17T16:57:07.133000 CVE-2023-0739,0,0,b1b26d0ce5c494e5d7ada0f8a588c86492d1c9f0144b5f459b8cc611b553c2cd,2023-03-02T02:15:41.857000 CVE-2023-0740,0,0,a07e1065e4de29dd41d3a7cadad7fafff7c778c739891464a73f725e2a440f3d,2023-02-15T20:20:37.850000 @@ -215621,7 +215621,7 @@ CVE-2023-21056,0,0,995fad705f650ff3eaf185ebe882d06b6e4d09c0956a6bcd2bfea6b654417 CVE-2023-21057,0,0,3d44097c3c200f0b17f1879819349cdc18de4e2156ff8226812a4d0777ba6c61,2023-03-30T16:50:36.527000 CVE-2023-21058,0,0,48052587152b716354e8911d9a2a29e6d938c8f474058afbe6f8a5041cd7974a,2023-03-29T15:05:03.910000 CVE-2023-21059,0,0,8db890a27c915f00d6fed020c9f8a480e62ed6ce4dac0ac01a34a7dce78a02ec,2023-03-29T18:44:14.857000 -CVE-2023-2106,0,0,2530ef97ea626e7a8a410e3ebe02b05225ce70661228e6f830656179c6360092,2023-04-25T16:29:34.127000 +CVE-2023-2106,0,1,c92407a6d17b0e3d5e08d0917e8500d57e0daaab221d4d9671a90019b78f71f2,2024-11-19T13:55:30.697000 CVE-2023-21060,0,0,031442d7f4ea5b6ae0e29837a4bbaed861fbcc303822a358b5dc59a5149bb3dd,2023-03-29T18:43:53.737000 CVE-2023-21061,0,0,6490da526ed7065eccbcc696f9f962795cc2b014c6d53d64a6adbd94120f5d18,2023-03-29T15:04:11.227000 CVE-2023-21062,0,0,40c76e318792cc0f78ca458ad4e9dad427e83b5b91f7684d0d6fa2943a6292e0,2023-03-31T12:58:57.567000 @@ -235651,7 +235651,7 @@ CVE-2023-47120,0,0,6e5cf7aa1dce9f494a0c860253344a3950368bcf8ff7b583963ba86c8e76d CVE-2023-47121,0,0,8ef00758c3dec2ac6ff6b649dadab0f948ffb4a5bbb58a181a1e6c7b3ef58d87,2023-11-17T20:20:26.137000 CVE-2023-47122,0,0,a9df5fa9c0e8414d44cffae9c5acb48e2a1801978cf6443f04f6610b9193b585,2023-11-16T17:50:16.327000 CVE-2023-47123,0,0,8d361c371341412b84dc54774df576d9fe69de84d066d55765bb32cbb6494159,2024-04-15T19:12:25.887000 -CVE-2023-47124,0,0,b24bfc9411e27420309cadfb6fbd310b685b721e9bde2692896514b4cea70e13,2023-12-07T21:01:24.967000 +CVE-2023-47124,0,1,bfbe18ebea14402829f796430da020434ba5becbf2d6a1123f98fe9408be1de7,2024-11-19T14:15:16.660000 CVE-2023-47125,0,0,9a2f9293b1bb6384f4c490717940892ab731bd46d8233a43c41e51a52ebe67c3,2023-11-21T02:58:51.787000 CVE-2023-47126,0,0,d7db4dfe43677893f510f67d44655eb1bfaaec58afed097e3332356dc994ae85,2023-11-21T03:01:46.133000 CVE-2023-47127,0,0,3b142b710453a1850b566c196150901604dda76b0ed8a77543fe3542a15724c1,2023-11-21T03:05:46.807000 @@ -242688,6 +242688,7 @@ CVE-2024-10200,0,0,79b6885d13f32a07bf1c1b28ed40296846ec3a4a32b1a087d30356c7c4430 CVE-2024-10201,0,0,fc2d027d5ae19fe93b2c62f794fd44c91138a3ac85ba03fab3fa5acc683a119b,2024-10-24T13:56:56.503000 CVE-2024-10202,0,0,bbf4778e12a2d6f664529db53cb3cf049c2b3a3bf45111e5ee15b039098bfbd2,2024-10-24T13:55:46.110000 CVE-2024-10203,0,0,2281dae8a6da10bb152783d708df85babb66d3a8b4310b54237aa5d49f660e26,2024-11-08T19:01:03.880000 +CVE-2024-10204,1,1,2bd02e2bac83ab0ac328aa1fc70614cb2060e2635606781eb4764e16fcb43f84,2024-11-19T14:15:16.940000 CVE-2024-1021,0,0,89180a6ed9705fc79d8d8a15633a1cfe9e27adac2a4a623501249d49427826d0,2024-05-17T02:35:10.970000 CVE-2024-10214,0,0,f1ffbc47d38f848fe742b18a6312c0e8ed0dcf6ee0fac4acd3827be3368439e7,2024-11-05T17:03:22.953000 CVE-2024-10217,0,0,eb6516ec82f77e9f107386542d4ffb8464a3e61001620c55c2f842dbfbb03b5d,2024-11-13T17:01:16.850000 @@ -243134,7 +243135,7 @@ CVE-2024-10920,0,0,2cf9a2b6fa319444c301d4d5e50d2260546d202b9ce9ceed0622f32574438 CVE-2024-10921,0,0,e4551a7fb6e9a47101373d83ae7e9c0677be8ee1bd96c33a43c9b04fcf7dfcf8,2024-11-15T13:58:08.913000 CVE-2024-10922,0,0,2e8ad1bbe2c22b2f860e82caba9eca723e865a4e9bffae87682e3cfa53e59e0d,2024-11-08T19:01:25.633000 CVE-2024-10923,0,0,a52ee7279b45f6cbb4af1bcb280dc131fb026565d6c8cec2e60c88cc2adb08c1,2024-11-13T21:35:04.867000 -CVE-2024-10924,0,0,81893a916d56c17bfaebe03737efc603a4394519bc7d6f05195e83e8e85b1166,2024-11-15T13:58:08.913000 +CVE-2024-10924,0,1,f04c8f210dbd43873edd1c965424c63b0a41e700e87767db1cdda51a1251ec4f,2024-11-19T14:15:17.187000 CVE-2024-10926,0,0,d4b8448490b176d20ac7d5dd5d9abfb0445d0f8f33211ac22e460a561e976123,2024-11-08T19:01:25.633000 CVE-2024-10927,0,0,89d2896b297590d0b070dc2d6fc3af12d21eeade74b7d5af5a8c30243a174669,2024-11-08T19:01:25.633000 CVE-2024-10928,0,0,d7b9ae13d8f86fa638d0e1d42acef5c90ca0f7e31aac0a4c1ed2473457ce5298,2024-11-08T19:01:25.633000 @@ -243197,8 +243198,8 @@ CVE-2024-11023,0,0,2473f75aeae9518b2cbff4e6006b6c4d1b296463725df83234e5d555adc05 CVE-2024-11026,0,0,5bad097199e56ffd1f4b7755738c2445dc243d6c7a33468e0f417dfbc0b75e4b,2024-11-12T13:56:54.483000 CVE-2024-11028,0,0,a5fce876a39d3e00d472044131a8d336932258a82ff3a02e40bb7ab1cc37c8ff,2024-11-13T17:01:16.850000 CVE-2024-1103,0,0,7224a9abc8ad2624b19754063e5e3f1dd278d487bc1541d6b3a3ae6b5907a9fc,2024-05-17T02:35:14.273000 -CVE-2024-11036,1,1,d675e5fcd86264558c8ff23727fbb64f2e24788c940b91ddfbcfc524916e3912,2024-11-19T11:15:04.343000 -CVE-2024-11038,1,1,ddf495b5dae3abd8d7231b4ebe716524abcd697d9b3ee119e36ae1198ff05c5e,2024-11-19T11:15:05.683000 +CVE-2024-11036,0,0,d675e5fcd86264558c8ff23727fbb64f2e24788c940b91ddfbcfc524916e3912,2024-11-19T11:15:04.343000 +CVE-2024-11038,0,0,ddf495b5dae3abd8d7231b4ebe716524abcd697d9b3ee119e36ae1198ff05c5e,2024-11-19T11:15:05.683000 CVE-2024-1104,0,0,9ee10688672006d34031cfe725e4adf4d669e817d06739b003e5be9062883e98,2024-02-22T19:07:27.197000 CVE-2024-11046,0,0,dae70e42607845033c6b3a286ac389c98e26c8cde81bdbf229658639db4fd302,2024-11-13T21:01:01.540000 CVE-2024-11047,0,0,64dbad14a794669b828bb44eebca3fde6ac51457cfee02dad21b39b0984875d6,2024-11-13T20:56:10.463000 @@ -243227,6 +243228,7 @@ CVE-2024-1107,0,0,7fae6df9cdce298be180c2cb6d3dacceb0e976e847fc87cce19a7d73f37dfe CVE-2024-11070,0,0,3b497257d1d87e8089d11256275eff956cb64bd2c8e5b58c0672dafc5015efdc,2024-11-12T13:55:21.227000 CVE-2024-11073,0,0,ef922d07a39eeb6c1fcac9a877724098fbbee23a8a49829a797889d4fd66dae6,2024-11-18T17:21:19.557000 CVE-2024-11074,0,0,c7750b58e84d96425502da7e4796f4a1eb10b1d5fe8862bb87f009301db1cc6f,2024-11-14T19:06:54.750000 +CVE-2024-11075,1,1,761e28be6547bbc411fda08607dcebea89c364c1988e928612231af9ea8d1c8c,2024-11-19T14:15:17.340000 CVE-2024-11076,0,0,69ee715ef78401e705669ce150a70ba620de69a2c6f89189a55ec0bcea2e068a,2024-11-14T19:14:26.717000 CVE-2024-11077,0,0,017b8d255e80754134e620d058a9d65876d81581be37ad0ebd6cdd417d3b7ba9,2024-11-14T18:57:17.743000 CVE-2024-11078,0,0,d133c6201a7de964272170f882ab0586a90d59fac96ab8e0ce223d3687fb9309,2024-11-12T13:55:21.227000 @@ -243271,7 +243273,7 @@ CVE-2024-1114,0,0,4ba1cd03fbc35862ac6b2ce79da50122dd303ea22f4f4a45a352ffb5be12a8 CVE-2024-11143,0,0,96ffaa2455664e18d60b42605835ada70f7b0d6d8faec6d0bfd534d22c653ec3,2024-11-18T15:03:56.927000 CVE-2024-1115,0,0,4dae9d3d8bef65fab3d547368288cc3126446be18b7fc740123f9a96bd6241e2,2024-05-17T02:35:14.880000 CVE-2024-11150,0,0,3e3c713e3eaad09aa014087e1c0cf6ec0a3f52a733d6f796982bf46a36311d42,2024-11-13T17:01:16.850000 -CVE-2024-11159,0,0,acc315ccca82d4dda8527171d6a7ed0296dd6177834223afd6bc1a7bd47506e8,2024-11-13T17:01:16.850000 +CVE-2024-11159,0,1,e73f6fc4616381942ffbf159704beae47fa0fb666e23bdbb04e5afc5533ba424,2024-11-19T14:56:37.800000 CVE-2024-1116,0,0,4196b5c71a0d802f4c1e9b3a43ac71c958f929e96b26e1ebb01241c6bd176fa3,2024-05-17T02:35:14.983000 CVE-2024-11165,0,0,95fe2b7c203ba5cc9c6e4fb2522e665475ea40e75b68e18a56b9dddf3a00ff2f,2024-11-14T16:35:05.493000 CVE-2024-11168,0,0,5e610ba56b770f0c45b8e5f1da8a18409af80ecc6fd32d397017d56ba5ace8ac,2024-11-13T17:01:16.850000 @@ -243281,8 +243283,9 @@ CVE-2024-1118,0,0,6c399aaded9e96cfac900ecbd30e202d5a6a42d5625667c3de9725b65dc62f CVE-2024-11182,0,0,43e4e2251d845a1f0d31bd2b62102b26d7d278b2b068b2f8e9e82735945af2ae,2024-11-18T15:35:03.553000 CVE-2024-1119,0,0,5426bc48e63724893c52e881a8535fb7954cf4e6383fc287bdb9896410f7d3a0,2024-03-20T13:00:16.367000 CVE-2024-11193,0,0,a70708fa48dd67ba3a86a48525d6b9656d6da3b4be924e80c673ce5d9c638eff,2024-11-15T14:00:09.720000 -CVE-2024-11194,1,1,3f09cfaaf1bae0b33ce415127da993242fd0896d0d6a1bbe0499b944455ec704,2024-11-19T12:15:16.497000 -CVE-2024-11195,1,1,b0b39e8b726cf367e580b97a1acf20ddaa15e4ca546ea5a331ba03634dd94c95,2024-11-19T11:15:05.930000 +CVE-2024-11194,0,0,3f09cfaaf1bae0b33ce415127da993242fd0896d0d6a1bbe0499b944455ec704,2024-11-19T12:15:16.497000 +CVE-2024-11195,0,0,b0b39e8b726cf367e580b97a1acf20ddaa15e4ca546ea5a331ba03634dd94c95,2024-11-19T11:15:05.930000 +CVE-2024-11198,1,1,b9e7cd4a54abc30d31dfc1fb824895a4c6c40ac2f9a16df5a8050d3c2c382b13,2024-11-19T13:15:04.157000 CVE-2024-1120,0,0,4ae965ad3da5f8a3235e6e58dd82dd504b21e474d229ae465351f9f2ed6318d2,2024-03-01T14:04:04.827000 CVE-2024-11206,0,0,4dabdbee4189d67c14faab7077a38bbebaaf9a0412b9485b8ea9f96e93b55b84,2024-11-15T13:58:08.913000 CVE-2024-11207,0,0,98c51622a761e0f4191d7b9bd2fdd9da6fc0915a6a97cca51529b9e5f809abed,2024-11-15T13:58:08.913000 @@ -243297,6 +243300,7 @@ CVE-2024-11214,0,0,0aa99902e65dc6c03e1ca05b11000c9116be8bf762f91cf55a9d960757e4b CVE-2024-11215,0,0,fb8a71cad5204690d7fc24b1c1787d6360fda1c469df5e0270b5ef3894a4902a,2024-11-15T13:58:08.913000 CVE-2024-11217,0,0,5d4ed802680b391d1dbfc3e3b561791ea824d61f478d755424e831d8c9d2195c,2024-11-18T17:11:56.587000 CVE-2024-1122,0,0,0daea6a9b881beb2ea9e563443c7905c114cf68ea1093ef9f6fd6cdf2c48aad7,2024-02-15T19:17:26.630000 +CVE-2024-11224,1,1,c84c6a83be66d403219cac660dbc9e43d81813e8fb46336977cd7169ad26f887,2024-11-19T13:15:04.423000 CVE-2024-1123,0,0,b973e4c54de6f241a32cf221a70e04068421d86df4d000867b2228a54e55ef35,2024-03-11T01:32:39.697000 CVE-2024-11237,0,0,14e448a6a8c58bda6358b06dade390c2a1921b884cc94a3ba12fc6ad79696644,2024-11-15T13:58:08.913000 CVE-2024-11238,0,0,5db87c5bb65e54461cba31fd593252a458b17b662806ea71f4893354fc62157d,2024-11-15T13:58:08.913000 @@ -245520,7 +245524,7 @@ CVE-2024-21534,0,0,9ac533dcca689f9e7455af7cbf2332420a35c484bd84c22299ec85a68ccdc CVE-2024-21535,0,0,2e7744380a1db7060122e5ae23002590579ae07efcc1f1beb06e6a3a8350e174,2024-10-17T20:36:29.213000 CVE-2024-21536,0,0,4f914cfe6666bcd465a58ac4926a267d85d3e48bad9af0623e3ff24aeb06f5b5,2024-11-01T18:03:15.897000 CVE-2024-21537,0,0,b5c780dab93a9075b9d24d6af4e9f73fa194b201a9c6953f660e67892e16f17b,2024-11-01T12:57:03.417000 -CVE-2024-21538,0,0,e8cdab9c6756d7f91f4358b51c5fdc4acd8293095dfa14f99a5a2ff2dfe3d783,2024-11-08T19:01:03.880000 +CVE-2024-21538,0,1,5afe4e6e1afdfc45cdb7e871efdb22a4d29e294c97100d961be6f2afaeab3910,2024-11-19T14:15:17.627000 CVE-2024-21539,0,0,dfd9359e0c564c537268368db999f7713955785d7a4a9df91fee71b6b45e0530,2024-11-19T05:15:16.453000 CVE-2024-2154,0,0,ab5f0b39bb38e5c25606bad964d563e0edda059ff34db22b99ca2b3670b021ff,2024-05-17T02:38:04.970000 CVE-2024-21540,0,0,ca361900c1eaa9a3b1242a94b8aed82eaba7c8170c10a4efa35cbfaad6b1984c,2024-11-17T09:15:11.853000 @@ -247070,7 +247074,7 @@ CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582c CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000 CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000 CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000 -CVE-2024-23715,0,0,be9ca32355354e8e866a9cc5f9269e48161aa8200c02ba6e7048918c9ef2bdb8,2024-11-15T14:00:09.720000 +CVE-2024-23715,0,1,f67a9429a60abeb20fbda725bf24d3fceb209a0fb34d3921cfadf385f0000ac6,2024-11-19T14:03:09.400000 CVE-2024-23716,0,0,72aa4692fe36e515631363961ebc214b187f38d11478c60001fc03eecbbbe02e,2024-09-12T14:35:11.523000 CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000 CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000 @@ -252495,7 +252499,7 @@ CVE-2024-31138,0,0,e862c1086da58a416fbb8daccc103d417726a0d0d62aa3907b1f09b19f01b CVE-2024-31139,0,0,1f981793bc0ffd1f30ec0eaae2f049959f8e2058241da40737858920eb14a44c,2024-03-28T16:07:30.893000 CVE-2024-3114,0,0,438316d71fe40cf2421f9ff6deaed7eac6b8aea65c739d1fa5d800504a4d2afd,2024-08-30T14:15:15.937000 CVE-2024-31140,0,0,1880c35ac5ba5af45eb21413401eeeaab09be8abf223654f6041d65ff3324893,2024-03-28T16:07:30.893000 -CVE-2024-31141,0,1,3f5ae6ea2a40e1292ebb16ade810fc49e7d2222b4096163adbac20123bd74902,2024-11-19T09:15:03.860000 +CVE-2024-31141,0,0,3f5ae6ea2a40e1292ebb16ade810fc49e7d2222b4096163adbac20123bd74902,2024-11-19T09:15:03.860000 CVE-2024-31142,0,0,79f9844398996d5cb9999387049c1b1a171c758196287f587729d5ce656d252f,2024-05-16T15:44:44.683000 CVE-2024-31143,0,0,1f98a77fde40be218a5d12e6b00af8f536e83110a5110bb36201081d2e6f449f,2024-08-21T14:35:09.100000 CVE-2024-31145,0,0,e7458273a6fceef9fb559ad713e774e4312c2d3910ffc413a934edb45195e865,2024-09-26T13:32:02.803000 @@ -262010,7 +262014,7 @@ CVE-2024-44202,0,0,e17cdcd52ced4944b3cb8ebf1e0107ecaca0e3b137318260a8309f5868dfd CVE-2024-44203,0,0,d685507fc8926f060ae77c21f2129dbfe240728483f567355a65325496f5f164,2024-10-31T14:08:10.090000 CVE-2024-44204,0,0,cce14eca29e64799e75cbb56577d73ec78ca9f1623008c609fe84631f2fc2cc3,2024-10-04T17:29:54.933000 CVE-2024-44205,0,0,89e79a6b18bf86e5c6fe07ffb754b6a30f0a4b722301be4dfe77863fc3ec3818,2024-11-05T22:35:09.383000 -CVE-2024-44206,0,0,cce809798797c4f27f98da648a0cb34cc37e85900206791dd0f0bb97bf5465c4,2024-10-29T21:35:15.080000 +CVE-2024-44206,0,1,decc7a643b8a2098ec3c807c883f42411d858ab45b0846bdf8377857f89c0036,2024-11-19T13:47:18.787000 CVE-2024-44207,0,0,5abea1005e83abb1bfbb6f81a0f39beb744ed23d2413d7dffd0c9fbaec188a46,2024-10-04T17:31:41.970000 CVE-2024-44208,0,0,4d7aa9405d343d17597bfad70ff83a926fbd31054b5ebc02d6d462dcb9f00027,2024-10-30T19:35:18.340000 CVE-2024-44213,0,0,c6cff758bc03ecbfd99946547b6f803038e23fd3515589348ba94d44f5467231,2024-10-30T19:35:19.187000 @@ -266282,7 +266286,7 @@ CVE-2024-51754,0,0,7bb02b0dadfa6351503359aa64d9360522f7dd1d2e17f399adc659a202b69 CVE-2024-51755,0,0,8da46be2050120e871a46966a709a4a6c341c8b76decbe7d2852b8155e882a03,2024-11-08T19:01:25.633000 CVE-2024-51756,0,0,7e7db3439c4e45c36bf53dc70dbe779b982ce3f3056b8757e470dab737dd37ba,2024-11-06T18:17:17.287000 CVE-2024-51757,0,0,4a6a6f5d284f7e398e40f49b0f871e08dca74b70a20c565e444a807f2ff3adcf,2024-11-08T19:01:25.633000 -CVE-2024-51758,0,0,f380eb8d34567367d647061664429271d9307b0015af8f1ccfbeb527fa9b8011,2024-11-08T19:01:03.880000 +CVE-2024-51758,0,1,cea74a57b3a5b78703ebb8f80aace1e82108cebb51552a8b14adb1167ed76c66,2024-11-19T14:15:17.763000 CVE-2024-51759,0,0,d7e3fffb9bbe00d7828c69c49042db425ba3a8f69d85eea947e9f519295183f0,2024-11-12T13:56:24.513000 CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000 CVE-2024-51760,0,0,ed9651aa9154a248687433de274acd9501a7b311268ff1812cf9f76a64d59a2e,2024-11-12T13:56:24.513000 @@ -266593,10 +266597,12 @@ CVE-2024-5264,0,0,7660c1edaddd779c29789898410be8f6784b9b682f1b3f0cb339e7e58b2976 CVE-2024-5265,0,0,23ae6b699421b146407b64fc352f84f4385a86a37bc2f3798f85fec07534db6d,2024-07-02T14:51:36.407000 CVE-2024-5266,0,0,0ac195748009e62b525761c49acf97f593b0c2f3ac01d138f9c93c4ef03661dd,2024-07-23T20:17:55.073000 CVE-2024-5267,0,0,46668d154f6ef78d29586983d5d2edaa995ecd77518ea035f59ce7176b7147a1,2024-09-24T18:56:10.507000 +CVE-2024-52675,1,1,2b3759886469230e81e4630134f8a90022497ce2cdfd34c020e9b1c3fe70eda4,2024-11-19T13:15:04.700000 CVE-2024-5268,0,0,a6d8167214bc75f9071a59fc8bc107cab067c253ba36f8c70c02e602f94a1506,2024-09-24T18:47:03.597000 CVE-2024-5269,0,0,fcc703e959dc9fcd54d2dba10777aa46d0a7036a8f955bfd8c508426ccf0b225,2024-09-24T17:50:07.957000 CVE-2024-5270,0,0,7ec6ed8f215026bf9d30718594365eb1a902134340d8c0dfba08c80435c07d35,2024-05-28T12:39:28.377000 CVE-2024-5271,0,0,7285855bafca9dd1fc033351db47cae9ea7831aeb2f80b9313f86f9100e15f62,2024-05-31T13:01:46.727000 +CVE-2024-52711,1,1,ec17aaf4daa36a3b4840ae9c2e59c39b0dfdc1e3f4c268a568196421c142ac48,2024-11-19T14:15:18.207000 CVE-2024-5272,0,0,d387d985ee64cb70308558e1288744b27040b8f28ef99da7e8b0a0af44167dd6,2024-05-28T12:39:28.377000 CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000 CVE-2024-5274,0,0,e7d74c38d2c202c949e1ef012213e640b18c31c48483d84bb8a4761d2997d225,2024-08-14T17:07:13.270000 @@ -270135,6 +270141,7 @@ CVE-2024-9756,0,0,8173cad728731052b89b4b59f3b4da8665b01e9fe6a8b575d907d967b2da64 CVE-2024-9772,0,0,0d1b30d428fb6796ba367d377c6619e6bf9b25cc03796237a99e8a8d275b84f3,2024-10-28T13:58:09.230000 CVE-2024-9775,0,0,e3916d71ec9dd0d5246614a59a1cb4484a6342794b8a5103a7b8b237fed4d20b,2024-11-12T13:56:24.513000 CVE-2024-9776,0,0,82a616b68a2c5818c813f35d61772c622935aa1b119f178b9eaa21355bac63d9,2024-10-15T12:57:46.880000 +CVE-2024-9777,1,1,19b139ad7dcd6fccfeb635876a4cf8731bb5d59162a8950e9feb0f7c70c4529b,2024-11-19T13:15:04.850000 CVE-2024-9778,0,0,0fe7ee5860b89dbc53027fbdd06b191ad5c5e349a3553ba6bc5769975646dd12,2024-10-15T12:57:46.880000 CVE-2024-9780,0,0,82a65b59c0bb0f4aa37b7bc9835ace6b2d8eb95b730adf88705db9589433fda5,2024-10-17T14:18:18.433000 CVE-2024-9781,0,0,cd6f657ed9ef660338f0d777935f231b52aede3f9edb8681363de05250c2257d,2024-10-10T12:51:56.987000 @@ -270180,6 +270187,7 @@ CVE-2024-9825,0,0,43f77069eab20c6659796a5ca73cb04eb18b719fa0ad0721704c789de71379 CVE-2024-9826,0,0,c03e2e0710a5712915ae2341fa5030e5bd74d5917743f7fdf85c043b115b921d,2024-11-01T16:17:10.620000 CVE-2024-9827,0,0,c5e7676b9d011eef0934f8d1e51cd92697f77495088547784042162cb4944824,2024-11-01T16:17:07.187000 CVE-2024-9829,0,0,ea980a1e481fc86407edeb6f0040d6f4a6ff2d17edcbe8d18dd95381292ad49b,2024-10-25T16:30:44.520000 +CVE-2024-9830,1,1,c466e8da0db30e41d5f5f4af952931114240163fd91e6216b7b894fd7be529e6,2024-11-19T13:15:05.107000 CVE-2024-9832,0,0,f83569141ad467d0d58d6d102fc2c3d41921b26196f3d65ebeb4a5f0b165400e,2024-11-15T13:58:08.913000 CVE-2024-9834,0,0,58a96ed6d2e0276f3eaa10de898ae35fd311ab0f6605b68b83724fedae743534,2024-11-15T13:58:08.913000 CVE-2024-9835,0,0,ca18e7b41fab9b483950f5f59199903f1b661b24923c7a18a4c44cf7bcb08f14,2024-11-12T15:35:17.853000