Auto-Update: 2024-11-20T19:00:20.813444+00:00

This commit is contained in:
cad-safe-bot 2024-11-20 19:03:23 +00:00
parent 28cd1071ad
commit 6fa76129b2
83 changed files with 4120 additions and 369 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-13227", "id": "CVE-2017-13227",
"sourceIdentifier": "security@android.com", "sourceIdentifier": "security@android.com",
"published": "2024-11-14T23:15:05.013", "published": "2024-11-14T23:15:05.013",
"lastModified": "2024-11-19T20:25:24.913", "lastModified": "2024-11-20T17:35:01.323",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
} }
] ]
}, },

View File

@ -2,16 +2,55 @@
"id": "CVE-2017-13315", "id": "CVE-2017-13315",
"sourceIdentifier": "security@android.com", "sourceIdentifier": "security@android.com",
"published": "2024-11-19T18:15:18.613", "published": "2024-11-19T18:15:18.613",
"lastModified": "2024-11-19T21:56:45.533", "lastModified": "2024-11-20T17:35:01.990",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In writeToParcel and createFromParcel of DcParamObject.java, there is a permission bypass due to a write size mismatch. This could lead to an elevation of privileges where the user can start an activity with system privileges, with no additional execution privileges needed. User interaction is not needed for exploitation." "value": "In writeToParcel and createFromParcel of DcParamObject.java, there is a permission bypass due to a write size mismatch. This could lead to an elevation of privileges where the user can start an activity with system privileges, with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En writeToParcel y createFromParcel de DcParamObject.java, existe una omisi\u00f3n de permisos debido a una discrepancia en el tama\u00f1o de escritura. Esto podr\u00eda generar una elevaci\u00f3n de privilegios donde el usuario puede iniciar una actividad con privilegios del sistema, sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-131"
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://source.android.com/security/bulletin/2018-05-01", "url": "https://source.android.com/security/bulletin/2018-05-01",

View File

@ -2,16 +2,55 @@
"id": "CVE-2018-9339", "id": "CVE-2018-9339",
"sourceIdentifier": "security@android.com", "sourceIdentifier": "security@android.com",
"published": "2024-11-19T19:15:05.677", "published": "2024-11-19T19:15:05.677",
"lastModified": "2024-11-19T21:56:45.533", "lastModified": "2024-11-20T17:35:03.690",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In writeTypedArrayList and readTypedArrayList of Parcel.java, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." "value": "In writeTypedArrayList and readTypedArrayList of Parcel.java, there is a possible escalation of privilege due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En writeTypedArrayList y readTypedArrayList de Parcel.java, existe una posible escalada de privilegios debido a una confusi\u00f3n de tipos. Esto podr\u00eda generar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-704"
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://source.android.com/security/bulletin/2018-06-01", "url": "https://source.android.com/security/bulletin/2018-06-01",

View File

@ -2,16 +2,55 @@
"id": "CVE-2018-9340", "id": "CVE-2018-9340",
"sourceIdentifier": "security@android.com", "sourceIdentifier": "security@android.com",
"published": "2024-11-19T19:15:05.743", "published": "2024-11-19T19:15:05.743",
"lastModified": "2024-11-19T21:56:45.533", "lastModified": "2024-11-20T17:35:05.083",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In ResStringPool::setTo of ResourceTypes.cpp, it's possible for an attacker to control the value of mStringPoolSize to be out of bounds, causing information disclosure." "value": "In ResStringPool::setTo of ResourceTypes.cpp, it's possible for an attacker to control the value of mStringPoolSize to be out of bounds, causing information disclosure."
},
{
"lang": "es",
"value": "En ResStringPool::setTo de ResourceTypes.cpp, es posible que un atacante controle que el valor de mStringPoolSize est\u00e9 fuera de los l\u00edmites, lo que provoca la divulgaci\u00f3n de informaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://source.android.com/security/bulletin/2018-06-01", "url": "https://source.android.com/security/bulletin/2018-06-01",

View File

@ -2,16 +2,55 @@
"id": "CVE-2018-9341", "id": "CVE-2018-9341",
"sourceIdentifier": "security@android.com", "sourceIdentifier": "security@android.com",
"published": "2024-11-19T19:15:05.817", "published": "2024-11-19T19:15:05.817",
"lastModified": "2024-11-19T21:56:45.533", "lastModified": "2024-11-20T17:35:06.453",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In impeg2d_mc_fullx_fully of impeg2d_mc.c there is a possible out of bound write due to missing bounds check. This could lead to remote arbitrary code execution with no additional execution privileges needed. User interaction is needed for exploitation." "value": "In impeg2d_mc_fullx_fully of impeg2d_mc.c there is a possible out of bound write due to missing bounds check. This could lead to remote arbitrary code execution with no additional execution privileges needed. User interaction is needed for exploitation."
},
{
"lang": "es",
"value": "En impeg2d_mc_fullx_fully de impeg2d_mc.c existe una posible escritura fuera de los l\u00edmites debido a la falta de verificaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo arbitrario sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para su explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://source.android.com/security/bulletin/2018-06-01", "url": "https://source.android.com/security/bulletin/2018-06-01",

View File

@ -2,16 +2,55 @@
"id": "CVE-2018-9344", "id": "CVE-2018-9344",
"sourceIdentifier": "security@android.com", "sourceIdentifier": "security@android.com",
"published": "2024-11-19T19:15:05.877", "published": "2024-11-19T19:15:05.877",
"lastModified": "2024-11-19T21:56:45.533", "lastModified": "2024-11-20T17:35:07.810",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In several functions of DescramblerImpl.cpp, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." "value": "In several functions of DescramblerImpl.cpp, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En varias funciones de DescramblerImpl.cpp, existe un posible use after free debido a un bloqueo inadecuado. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://source.android.com/security/bulletin/2018-06-01", "url": "https://source.android.com/security/bulletin/2018-06-01",

View File

@ -2,16 +2,55 @@
"id": "CVE-2018-9345", "id": "CVE-2018-9345",
"sourceIdentifier": "security@android.com", "sourceIdentifier": "security@android.com",
"published": "2024-11-19T19:15:05.937", "published": "2024-11-19T19:15:05.937",
"lastModified": "2024-11-19T21:56:45.533", "lastModified": "2024-11-20T17:35:09.167",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In BnAudioPolicyService::onTransact of AudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." "value": "In BnAudioPolicyService::onTransact of AudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En BnAudioPolicyService::onTransact de AudioPolicyService.cpp, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a datos no inicializados. Esto podr\u00eda generar una divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://source.android.com/security/bulletin/2018-06-01", "url": "https://source.android.com/security/bulletin/2018-06-01",

View File

@ -2,16 +2,55 @@
"id": "CVE-2018-9346", "id": "CVE-2018-9346",
"sourceIdentifier": "security@android.com", "sourceIdentifier": "security@android.com",
"published": "2024-11-19T19:15:06.000", "published": "2024-11-19T19:15:06.000",
"lastModified": "2024-11-19T21:56:45.533", "lastModified": "2024-11-20T17:35:10.507",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Undergoing Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In BnAudioPolicyService::onTransact of AudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." "value": "In BnAudioPolicyService::onTransact of AudioPolicyService.cpp, there is a possible information disclosure due to uninitialized data. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En BnAudioPolicyService::onTransact de AudioPolicyService.cpp, existe una posible divulgaci\u00f3n de informaci\u00f3n debido a datos no inicializados. Esto podr\u00eda generar una divulgaci\u00f3n de informaci\u00f3n local sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-908"
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://source.android.com/security/bulletin/2018-06-01", "url": "https://source.android.com/security/bulletin/2018-06-01",

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9468",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T17:15:08.783",
"lastModified": "2024-11-20T17:15:08.783",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In query of DownloadManager.java, there is a possible read/write of arbitrary files due to a permissions bypass. This could lead to local information disclosure and file rewriting with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9469",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T17:15:09.040",
"lastModified": "2024-11-20T17:15:09.040",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In multiple functions of ShortcutService.java, there is a possible creation of a spoofed shortcut due to a missing permission check. This could lead to local escalation of privilege in a privileged app with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9470",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.427",
"lastModified": "2024-11-20T18:15:19.427",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In bff_Scanner_addOutPos of Scanner.c, there is a possible out-of-bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege in an unprivileged app with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9471",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.500",
"lastModified": "2024-11-20T18:15:19.500",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the deserialization constructor of NanoAppFilter.java, there is a possible loss of data due to type confusion. This could lead to local escalation of privilege in the system server with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9472",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.550",
"lastModified": "2024-11-20T18:15:19.550",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In xmlMemStrdupLoc of xmlmemory.c, there is a possible out-of-bounds write due to an integer overflow. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9474",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.610",
"lastModified": "2024-11-20T18:15:19.610",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In writeToParcel of MediaPlayer.java, there is a possible serialization/deserialization mismatch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9475",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.670",
"lastModified": "2024-11-20T18:15:19.670",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In HeadsetInterface::ClccResponse of btif_hf.cc, there is a possible out of bounds stack write due to a missing bounds check. This could lead to remote escalation of privilege via Bluetooth, if the recipient has enabled SIP calls with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9477",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.723",
"lastModified": "2024-11-20T18:15:19.723",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the development options section of the Settings app, there is a possible authentication bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9478",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.773",
"lastModified": "2024-11-20T18:15:19.773",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In process_service_attr_req and process_service_search_attr_req of sdp_server.cc, there is an out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. \u00a0User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9479",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.830",
"lastModified": "2024-11-20T18:15:19.830",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In process_service_attr_req and process_service_search_attr_req of sdp_server.cc, there is an out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. \u00a0User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9480",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.890",
"lastModified": "2024-11-20T18:15:19.890",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In bta_hd_get_report_act of bta_hd_act.cc, there is a possible out-of-bounds read due to improper input validation. This could lead to remote information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9481",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.940",
"lastModified": "2024-11-20T18:15:19.940",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In bta_hd_set_report_act of bta_hd_act.cc, there is a possible out-of-bounds read due to an integer overflow. This could lead to remote information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9482",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:20.000",
"lastModified": "2024-11-20T18:15:20.000",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In intr_data_copy_cb of btif_hd.cc, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9483",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:20.053",
"lastModified": "2024-11-20T18:15:20.053",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In bta_dm_remove_sec_dev_entry of bta_dm_act.cc, there is a possible out of bounds read due to a use after free. This could lead to remote information disclosure over bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9484",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:20.107",
"lastModified": "2024-11-20T18:15:20.107",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In l2cu_send_peer_config_rej of l2c_utils.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9485",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:20.163",
"lastModified": "2024-11-20T18:15:20.163",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In l2cble_process_sig_cmd of l2c_ble.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure over bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9486",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:20.220",
"lastModified": "2024-11-20T18:15:20.220",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In hidh_l2cif_data_ind of hidh_conn.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure over bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9487",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:20.277",
"lastModified": "2024-11-20T18:15:20.277",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In setVpnForcedLocked of Vpn.java, there is a possible blocking of internet traffic through vpn due to a bad uid check. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2023-21270", "id": "CVE-2023-21270",
"sourceIdentifier": "security@android.com", "sourceIdentifier": "security@android.com",
"published": "2024-11-19T18:15:19.253", "published": "2024-11-19T18:15:19.253",
"lastModified": "2024-11-19T21:56:45.533", "lastModified": "2024-11-20T17:35:18.563",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "In restorePermissionState of PermissionManagerServiceImpl.java, there is a possible way for an app to keep permissions that should be revoked due to incorrect permission flags cleared during an update. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation." "value": "In restorePermissionState of PermissionManagerServiceImpl.java, there is a possible way for an app to keep permissions that should be revoked due to incorrect permission flags cleared during an update. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En restorePermissionState de PermissionManagerServiceImpl.java, existe una forma posible de que una aplicaci\u00f3n conserve los permisos que deber\u00edan revocarse debido a que se borraron indicadores de permisos incorrectos durante una actualizaci\u00f3n. Esto podr\u00eda provocar una escalada local de privilegios con privilegios de ejecuci\u00f3n de usuario necesarios. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
} }
], ],
"metrics": {},
"references": [ "references": [
{ {
"url": "https://source.android.com/security/bulletin/2023-08-01", "url": "https://source.android.com/security/bulletin/2023-08-01",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35659", "id": "CVE-2023-35659",
"sourceIdentifier": "security@android.com", "sourceIdentifier": "security@android.com",
"published": "2024-11-13T18:15:19.763", "published": "2024-11-13T18:15:19.763",
"lastModified": "2024-11-19T18:31:32.413", "lastModified": "2024-11-20T17:35:20.210",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
} }
] ]
}, },

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35686", "id": "CVE-2023-35686",
"sourceIdentifier": "security@android.com", "sourceIdentifier": "security@android.com",
"published": "2024-11-13T18:15:19.860", "published": "2024-11-13T18:15:19.860",
"lastModified": "2024-11-19T18:09:16.243", "lastModified": "2024-11-20T17:35:20.610",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
} }
] ]
}, },

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-10382", "id": "CVE-2024-10382",
"sourceIdentifier": "cve-coordination@google.com", "sourceIdentifier": "cve-coordination@google.com",
"published": "2024-11-20T11:15:04.280", "published": "2024-11-20T11:15:04.280",
"lastModified": "2024-11-20T11:15:04.280", "lastModified": "2024-11-20T17:35:22.073",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -55,6 +55,28 @@
"baseSeverity": "HIGH" "baseSeverity": "HIGH"
} }
} }
],
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 6.0
}
] ]
}, },
"weaknesses": [ "weaknesses": [
@ -67,6 +89,16 @@
"value": "CWE-502" "value": "CWE-502"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
} }
], ],
"references": [ "references": [

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-11081",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-20T18:15:22.340",
"lastModified": "2024-11-20T18:15:22.340",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-11488",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-20T17:15:14.097",
"lastModified": "2024-11-20T17:15:14.097",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in 115cms up to 20240807 and classified as problematic. This issue affects some unknown processing of the file /app/admin/view/web_user.html. The manipulation of the argument ks leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/Hebing123/cve/issues/70",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.285503",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.285503",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-11489",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-20T17:15:14.847",
"lastModified": "2024-11-20T17:15:14.847",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in 115cms up to 20240807. It has been classified as problematic. Affected is an unknown function of the file /index.php/admin/web/file.html. The manipulation of the argument ks leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/Hebing123/cve/issues/70",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.285504",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.285504",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-11490",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-20T17:15:15.637",
"lastModified": "2024-11-20T17:15:15.637",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in 115cms up to 20240807. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /index.php/admin/web/set.html. The manipulation of the argument type leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/Hebing123/cve/issues/70",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.285505",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.285505",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-11491",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-20T17:15:16.397",
"lastModified": "2024-11-20T17:15:16.397",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in 115cms up to 20240807. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /index.php/admin/web/useradmin.html. The manipulation of the argument ks leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/Hebing123/cve/issues/70",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.285506",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.285506",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2024-11492",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-20T18:15:22.403",
"lastModified": "2024-11-20T18:15:22.403",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in 115cms up to 20240807. This affects an unknown part of the file /index.php/admin/web/appurladd.html. The manipulation of the argument tid leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/Hebing123/cve/issues/70",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.285507",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.285507",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2024-11493",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-20T18:15:22.700",
"lastModified": "2024-11-20T18:15:22.700",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in 115cms up to 20240807. This vulnerability affects unknown code of the file /index.php/setpage/admin/pageAE.html. The manipulation of the argument tid leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/Hebing123/cve/issues/70",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.285508",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.285508",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.442037",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23279", "id": "CVE-2024-23279",
"sourceIdentifier": "product-security@apple.com", "sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:49.693", "published": "2024-03-08T02:15:49.693",
"lastModified": "2024-03-13T21:15:58.063", "lastModified": "2024-11-20T17:35:23.370",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,30 @@
"value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados para las entradas de registro. Este problema se solucion\u00f3 en macOS Sonoma 14.4. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario." "value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados para las entradas de registro. Este problema se solucion\u00f3 en macOS Sonoma 14.4. Es posible que una aplicaci\u00f3n pueda acceder a datos confidenciales del usuario."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
]
},
"references": [ "references": [
{ {
"url": "http://seclists.org/fulldisclosure/2024/Mar/21", "url": "http://seclists.org/fulldisclosure/2024/Mar/21",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-23715", "id": "CVE-2024-23715",
"sourceIdentifier": "security@android.com", "sourceIdentifier": "security@android.com",
"published": "2024-11-13T18:15:20.080", "published": "2024-11-13T18:15:20.080",
"lastModified": "2024-11-19T14:03:09.400", "lastModified": "2024-11-20T17:35:23.597",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 5.9 "impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "CWE-787" "value": "CWE-787"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2357", "id": "CVE-2024-2357",
"sourceIdentifier": "d42dc95b-23f1-4e06-9076-20753a0fb0df", "sourceIdentifier": "d42dc95b-23f1-4e06-9076-20753a0fb0df",
"published": "2024-03-11T20:15:07.867", "published": "2024-03-11T20:15:07.867",
"lastModified": "2024-03-23T03:15:12.690", "lastModified": "2024-11-20T18:35:19.917",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,30 @@
"value": "Se notific\u00f3 a Libreswan Project sobre un problema que causaba que libreswan se reiniciara en algunos escenarios de retransmisi\u00f3n de IKEv2 cuando una conexi\u00f3n est\u00e1 configurada para usar PreSharedKeys (authby=secret) y la conexi\u00f3n no puede encontrar un secreto configurado coincidente. Cuando dicha conexi\u00f3n se agrega autom\u00e1ticamente al inicio usando la palabra clave auto=, puede causar fallas repetidas que conducen a una denegaci\u00f3n de servicio." "value": "Se notific\u00f3 a Libreswan Project sobre un problema que causaba que libreswan se reiniciara en algunos escenarios de retransmisi\u00f3n de IKEv2 cuando una conexi\u00f3n est\u00e1 configurada para usar PreSharedKeys (authby=secret) y la conexi\u00f3n no puede encontrar un secreto configurado coincidente. Cuando dicha conexi\u00f3n se agrega autom\u00e1ticamente al inicio usando la palabra clave auto=, puede causar fallas repetidas que conducen a una denegaci\u00f3n de servicio."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"references": [ "references": [
{ {
"url": "https://libreswan.org/security/CVE-2024-2357", "url": "https://libreswan.org/security/CVE-2024-2357",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26281", "id": "CVE-2024-26281",
"sourceIdentifier": "security@mozilla.org", "sourceIdentifier": "security@mozilla.org",
"published": "2024-02-22T15:15:08.633", "published": "2024-02-22T15:15:08.633",
"lastModified": "2024-02-22T19:07:27.197", "lastModified": "2024-11-20T17:35:24.450",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "Al escanear un URI de JavaScript con el esc\u00e1ner de c\u00f3digos QR, un atacante podr\u00eda haber ejecutado scripts no autorizados en los principales sitios de origen actuales en la barra de URL. Esta vulnerabilidad afecta a Firefox para iOS < 123." "value": "Al escanear un URI de JavaScript con el esc\u00e1ner de c\u00f3digos QR, un atacante podr\u00eda haber ejecutado scripts no autorizados en los principales sitios de origen actuales en la barra de URL. Esta vulnerabilidad afecta a Firefox para iOS < 123."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1868005", "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1868005",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-2759", "id": "CVE-2024-2759",
"sourceIdentifier": "cvd@cert.pl", "sourceIdentifier": "cvd@cert.pl",
"published": "2024-04-04T14:15:10.220", "published": "2024-04-04T14:15:10.220",
"lastModified": "2024-10-10T16:15:08.360", "lastModified": "2024-11-20T18:35:20.200",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,30 @@
"value": "Una vulnerabilidad de control de acceso inadecuado en el complemento Apaczka para PrestaShop permite la recopilaci\u00f3n de informaci\u00f3n de plantillas guardadas sin autenticaci\u00f3n. Este problema afecta al complemento Apaczka para PrestaShop desde la v1 hasta la v4." "value": "Una vulnerabilidad de control de acceso inadecuado en el complemento Apaczka para PrestaShop permite la recopilaci\u00f3n de informaci\u00f3n de plantillas guardadas sin autenticaci\u00f3n. Este problema afecta al complemento Apaczka para PrestaShop desde la v1 hasta la v4."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [ "weaknesses": [
{ {
"source": "cvd@cert.pl", "source": "cvd@cert.pl",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-28068", "id": "CVE-2024-28068",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-07-09T20:15:10.603", "published": "2024-07-09T20:15:10.603",
"lastModified": "2024-07-11T13:06:13.187", "lastModified": "2024-11-20T17:35:25.313",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -39,6 +39,18 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-29292",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-20T18:15:22.970",
"lastModified": "2024-11-20T18:15:22.970",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple OS Command Injection vulnerabilities affecting Kasda KW6512 router software version KW6512_Linux_V1.0 enable an authenticated remote attacker to execute arbitrary OS commands via Quick Setup and Internet page parameters passed to internet.cgi."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/QuartzDust/debfd7ddf934a9f5609d7f1a8cd71154",
"source": "cve@mitre.org"
},
{
"url": "https://www.kasdanet.com/ENHCSZ/pro_view-120.html",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-3048", "id": "CVE-2024-3048",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-04-26T05:15:50.280", "published": "2024-04-26T05:15:50.280",
"lastModified": "2024-04-26T12:58:17.720", "lastModified": "2024-11-20T18:35:21.557",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento Bannerlid de WordPress hasta la versi\u00f3n 1.1.0 no escapa de las URL generadas antes de mostrarlas en atributos, lo que genera Cross-Site Scripting Reflejado que podr\u00edan usarse contra usuarios con privilegios elevados, como administradores." "value": "El complemento Bannerlid de WordPress hasta la versi\u00f3n 1.1.0 no escapa de las URL generadas antes de mostrarlas en atributos, lo que genera Cross-Site Scripting Reflejado que podr\u00edan usarse contra usuarios con privilegios elevados, como administradores."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"references": [ "references": [
{ {
"url": "https://wpscan.com/vulnerability/e179ff7d-137c-48bf-8b18-e874e3f876f4/", "url": "https://wpscan.com/vulnerability/e179ff7d-137c-48bf-8b18-e874e3f876f4/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-3076", "id": "CVE-2024-3076",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-04-26T14:15:07.370", "published": "2024-04-26T14:15:07.370",
"lastModified": "2024-04-26T15:32:22.523", "lastModified": "2024-11-20T18:35:21.813",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento MM-email2image de WordPress hasta la versi\u00f3n 0.2.5 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta desinfecci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador registrado agregue payload XSS Almacenado a trav\u00e9s de un ataque CSRF." "value": "El complemento MM-email2image de WordPress hasta la versi\u00f3n 0.2.5 no tiene verificaci\u00f3n CSRF en algunos lugares y le falta desinfecci\u00f3n y escape, lo que podr\u00eda permitir a los atacantes hacer que el administrador registrado agregue payload XSS Almacenado a trav\u00e9s de un ataque CSRF."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.8,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 2.5
}
]
},
"references": [ "references": [
{ {
"url": "https://wpscan.com/vulnerability/617ec2e9-9058-4a93-8ad4-7ecb85107141/", "url": "https://wpscan.com/vulnerability/617ec2e9-9058-4a93-8ad4-7ecb85107141/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-3281", "id": "CVE-2024-3281",
"sourceIdentifier": "hp-security-alert@hp.com", "sourceIdentifier": "hp-security-alert@hp.com",
"published": "2024-04-09T16:15:08.510", "published": "2024-04-09T16:15:08.510",
"lastModified": "2024-04-10T13:24:22.187", "lastModified": "2024-11-20T18:35:22.063",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 una vulnerabilidad en las versiones de firmware posteriores a 8.0.2.3267 y anteriores a 8.1.3.1301 en dispositivos CCX. Una falla en el proceso de creaci\u00f3n del firmware no restringi\u00f3 adecuadamente el acceso a un recurso por parte de un actor no autorizado." "value": "Se descubri\u00f3 una vulnerabilidad en las versiones de firmware posteriores a 8.0.2.3267 y anteriores a 8.1.3.1301 en dispositivos CCX. Una falla en el proceso de creaci\u00f3n del firmware no restringi\u00f3 adecuadamente el acceso a un recurso por parte de un actor no autorizado."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.3
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://support.hp.com/us-en/document/ish_10388650-10388701-16/hpsbpy03929", "url": "https://support.hp.com/us-en/document/ish_10388650-10388701-16/hpsbpy03929",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-34088", "id": "CVE-2024-34088",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-30T19:15:23.307", "published": "2024-04-30T19:15:23.307",
"lastModified": "2024-04-30T19:35:36.960", "lastModified": "2024-11-20T17:35:26.147",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "En FRRouting (FRR) hasta 9.1, es posible que la funci\u00f3n get_edge() en ospf_te.c en el demonio OSPF devuelva un puntero NULL. En los casos en que las funciones de llamada no manejan el valor NULL devuelto, el daemon OSPF falla, lo que lleva a la denegaci\u00f3n de servicio." "value": "En FRRouting (FRR) hasta 9.1, es posible que la funci\u00f3n get_edge() en ospf_te.c en el demonio OSPF devuelva un puntero NULL. En los casos en que las funciones de llamada no manejan el valor NULL devuelto, el daemon OSPF falla, lo que lleva a la denegaci\u00f3n de servicio."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/FRRouting/frr/pull/15674/commits/34d704fb0ea60dc5063af477a2c11d4884984d4f", "url": "https://github.com/FRRouting/frr/pull/15674/commits/34d704fb0ea60dc5063af477a2c11d4884984d4f",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-34365", "id": "CVE-2024-34365",
"sourceIdentifier": "security@apache.org", "sourceIdentifier": "security@apache.org",
"published": "2024-05-14T15:38:46.400", "published": "2024-05-14T15:38:46.400",
"lastModified": "2024-08-02T03:15:40.200", "lastModified": "2024-11-20T17:35:27.017",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [ "cveTags": [
{ {
@ -22,7 +22,30 @@
"value": "** NO SOPORTADO CUANDO EST\u00c1 ASIGNADO ** Vulnerabilidad de validaci\u00f3n de entrada incorrecta en Apache Karaf Cave. Este problema afecta a todas las versiones de Apache Karaf Cave. Como este proyecto est\u00e1 retirado, no planeamos lanzar una versi\u00f3n que solucione este problema. Se recomienda a los usuarios buscar una alternativa o restringir el acceso a la instancia a usuarios confiables. NOTA: Esta vulnerabilidad solo afecta a los productos que ya no son compatibles con el fabricante." "value": "** NO SOPORTADO CUANDO EST\u00c1 ASIGNADO ** Vulnerabilidad de validaci\u00f3n de entrada incorrecta en Apache Karaf Cave. Este problema afecta a todas las versiones de Apache Karaf Cave. Como este proyecto est\u00e1 retirado, no planeamos lanzar una versi\u00f3n que solucione este problema. Se recomienda a los usuarios buscar una alternativa o restringir el acceso a la instancia a usuarios confiables. NOTA: Esta vulnerabilidad solo afecta a los productos que ya no son compatibles con el fabricante."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 9.1,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [ "weaknesses": [
{ {
"source": "security@apache.org", "source": "security@apache.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-34487", "id": "CVE-2024-34487",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-05-05T03:15:07.167", "published": "2024-05-05T03:15:07.167",
"lastModified": "2024-05-06T12:44:56.377", "lastModified": "2024-11-20T17:35:27.303",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "OFPFlowStats en parser.py en Faucet SDN Ryu 4.34 permite a los atacantes provocar una denegaci\u00f3n de servicio (bucle infinito) mediante inst.length=0." "value": "OFPFlowStats en parser.py en Faucet SDN Ryu 4.34 permite a los atacantes provocar una denegaci\u00f3n de servicio (bucle infinito) mediante inst.length=0."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/faucetsdn/ryu/issues/192", "url": "https://github.com/faucetsdn/ryu/issues/192",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-3471", "id": "CVE-2024-3471",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-02T06:15:50.350", "published": "2024-05-02T06:15:50.350",
"lastModified": "2024-05-02T13:27:25.103", "lastModified": "2024-11-20T18:35:22.923",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento Button Generator de WordPress anterior a 3.0 no tiene activada la verificaci\u00f3n CSRF durante la eliminaci\u00f3n masiva, lo que podr\u00eda permitir a los atacantes crear botones de eliminaci\u00f3n de un administrador que haya iniciado sesi\u00f3n a trav\u00e9s de un ataque CSRF." "value": "El complemento Button Generator de WordPress anterior a 3.0 no tiene activada la verificaci\u00f3n CSRF durante la eliminaci\u00f3n masiva, lo que podr\u00eda permitir a los atacantes crear botones de eliminaci\u00f3n de un administrador que haya iniciado sesi\u00f3n a trav\u00e9s de un ataque CSRF."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.7,
"impactScore": 1.4
}
]
},
"references": [ "references": [
{ {
"url": "https://wpscan.com/vulnerability/a3c282fb-81b8-48bf-8c18-8366ea8ad9af/", "url": "https://wpscan.com/vulnerability/a3c282fb-81b8-48bf-8c18-8366ea8ad9af/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-35283", "id": "CVE-2024-35283",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-05-29T16:15:10.720", "published": "2024-05-29T16:15:10.720",
"lastModified": "2024-05-29T19:50:25.303", "lastModified": "2024-11-20T18:35:20.470",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad en el componente Ignite de Mitel MiContact Center Business hasta la versi\u00f3n 10.0.0.4 podr\u00eda permitir que un atacante no autenticado lleve a cabo un ataque de cross-site scripting (XSS) almacenado debido a una validaci\u00f3n de entrada insuficiente." "value": "Una vulnerabilidad en el componente Ignite de Mitel MiContact Center Business hasta la versi\u00f3n 10.0.0.4 podr\u00eda permitir que un atacante no autenticado lleve a cabo un ataque de cross-site scripting (XSS) almacenado debido a una validaci\u00f3n de entrada insuficiente."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [ "references": [
{ {
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0011", "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0011",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-3629", "id": "CVE-2024-3629",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-15T06:15:12.567", "published": "2024-05-15T06:15:12.567",
"lastModified": "2024-05-15T16:40:19.330", "lastModified": "2024-11-20T18:35:23.183",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento HL Twitter WordPress hasta la versi\u00f3n 2014.1.18 no tiene activada la verificaci\u00f3n CSRF al actualizar su configuraci\u00f3n, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n los cambie mediante un ataque CSRF." "value": "El complemento HL Twitter WordPress hasta la versi\u00f3n 2014.1.18 no tiene activada la verificaci\u00f3n CSRF al actualizar su configuraci\u00f3n, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n los cambie mediante un ataque CSRF."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 2.4,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
}
]
},
"references": [ "references": [
{ {
"url": "https://wpscan.com/vulnerability/c1f6ed2c-0f84-4b13-b39e-5cb91443c2b1/", "url": "https://wpscan.com/vulnerability/c1f6ed2c-0f84-4b13-b39e-5cb91443c2b1/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-3644", "id": "CVE-2024-3644",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-05-16T06:15:10.370", "published": "2024-05-16T06:15:10.370",
"lastModified": "2024-05-16T13:03:05.353", "lastModified": "2024-11-20T18:35:23.437",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -15,7 +15,30 @@
"value": "El complemento Newsletter Popup de WordPress hasta la versi\u00f3n 1.2 no desinfecta ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)." "value": "El complemento Newsletter Popup de WordPress hasta la versi\u00f3n 1.2 no desinfecta ni escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de Cross-Site Scripting Almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n multisitio)."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"references": [ "references": [
{ {
"url": "https://wpscan.com/vulnerability/10eb712a-d9c3-46c9-be6a-02811396fae8/", "url": "https://wpscan.com/vulnerability/10eb712a-d9c3-46c9-be6a-02811396fae8/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46768", "id": "CVE-2024-46768",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-18T08:15:04.853", "published": "2024-09-18T08:15:04.853",
"lastModified": "2024-09-20T12:30:51.220", "lastModified": "2024-11-20T18:19:35.033",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,19 +15,119 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: hwmon: (hp-wmi-sensors) Verificar si existen datos de eventos de WMI El BIOS puede elegir no devolver datos de eventos en respuesta a un evento de WMI, por lo que el objeto ACPI que se pasa al controlador de notificaciones de WMI puede ser NULL. Verifique si existe tal situaci\u00f3n e ignore el evento en ese caso." "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: hwmon: (hp-wmi-sensors) Verificar si existen datos de eventos de WMI El BIOS puede elegir no devolver datos de eventos en respuesta a un evento de WMI, por lo que el objeto ACPI que se pasa al controlador de notificaciones de WMI puede ser NULL. Verifique si existe tal situaci\u00f3n e ignore el evento en ese caso."
} }
], ],
"metrics": {}, "metrics": {
"references": [ "cvssMetricV31": [
{ {
"url": "https://git.kernel.org/stable/c/217539e994e53206bbf3fb330261cc78c480d311", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
}, },
{ "exploitabilityScore": 1.8,
"url": "https://git.kernel.org/stable/c/4b19c83ba108aa66226da5b79810e4d19e005f12", "impactScore": 3.6
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }
]
}, },
"weaknesses": [
{ {
"url": "https://git.kernel.org/stable/c/a54da9df75cd1b4b5028f6c60f9a211532680585", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.5",
"versionEndExcluding": "6.6.51",
"matchCriteriaId": "68960B54-63EE-43D7-A875-28E3ECFA945B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.10",
"matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*",
"matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/217539e994e53206bbf3fb330261cc78c480d311",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4b19c83ba108aa66226da5b79810e4d19e005f12",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a54da9df75cd1b4b5028f6c60f9a211532680585",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46771", "id": "CVE-2024-46771",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-18T08:15:05.010", "published": "2024-09-18T08:15:05.010",
"lastModified": "2024-09-20T12:30:51.220", "lastModified": "2024-11-20T18:20:03.130",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,39 +15,189 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: bcm: Eliminar entrada proc cuando dev no est\u00e1 registrado. syzkaller inform\u00f3 una advertencia en bcm_connect() a continuaci\u00f3n. [0] La repro llama a connect() a vxcan1, elimina vxcan1 y llama a connect() con ifindex == 0. Llamar a connect() para un socket BCM asigna una entrada proc. Luego, bcm_sk(sk)->bound se establece en 1 para evitar m\u00e1s connect(). Sin embargo, eliminar el dispositivo vinculado restablece bcm_sk(sk)->bound a 0 en bcm_notify(). El segundo connect() intenta asignar una entrada proc con el mismo nombre y establece NULL en bcm_sk(sk)->bcm_proc_read, filtrando la entrada proc original. Dado que la entrada proc solo est\u00e1 disponible para sockets conectados, limpiemos la entrada cuando el netdev vinculado no est\u00e9 registrado. [0]: proc_dir_entry 'can-bcm/2456' ya est\u00e1 registrado ADVERTENCIA: CPU: 1 PID: 394 en fs/proc/generic.c:376 proc_register+0x645/0x8f0 fs/proc/generic.c:375 M\u00f3dulos vinculados en: CPU: 1 PID: 394 Comm: syz-executor403 No contaminado 6.10.0-rc7-g852e42cc2dd4 Nombre del hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 RIP: 0010:proc_register+0x645/0x8f0 fs/proc/generic.c:375 C\u00f3digo: 00 00 00 00 00 48 85 ed 0f 85 97 02 00 00 4d 85 f6 0f 85 9f 02 00 00 48 c7 c7 9b cb cf 87 48 89 de 4c 89 fa e8 1c 6f eb fe 90 <0f> 0b 90 90 48 c7 c7 98 37 99 89 e8 cb 7e 22 05 bb 00 00 00 10 48 RSP: 0018:ffa0000000cd7c30 EFLAGS: 00010246 RAX: 9e129be1950f0200 RBX: ff1100011b51582c RCX: ff1100011857cd80 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002 RBP: 0000000000000000 R08: ffd400000000000f R09: ff1100013e78cac0 R10: ffac800000cd7980 R11: ff1100013e12b1f0 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: ff1100011a99a2ec FS: 00007fbd7086f740(0000) GS:ff1100013fd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000200071c0 CR3: 0000000118556004 CR4: 0000000000771ef0 DR0: 0000000000000000 DR1: 00000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400 PKRU: 55555554 Seguimiento de llamadas: proc_create_net_single+0x144/0x210 fs/proc/proc_net.c:220 bcm_connect+0x472/0x840 net/can/bcm.c:1673 __sys_connect_file net/socket.c:2049 [en l\u00ednea] __sys_connect+0x5d2/0x690 net/socket.c:2066 __do_sys_connect net/socket.c:2076 [en l\u00ednea] __se_sys_connect net/socket.c:2073 [en l\u00ednea] __x64_sys_connect+0x8f/0x100 net/socket.c:2073 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xd9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x4b/0x53 RIP: 0033:0x7fbd708b0e5d C\u00f3digo: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48 RSP: 002b:00007fff8cd33f08 EFLAGS: 00000246 ORIG_RAX: 000000000000002a RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fbd708b0e5d RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003 RBP: 0000000000000000 R08: 0000000000000040 R09: 0000000000000040 R10: 0000000000000040 R11: 0000000000000246 R12: 00007fff8cd34098 R13: 0000000000401280 R14: 0000000000406de8 R15: 00007fbd70ab9000 remove_proc_entry: elimina el directorio no vac\u00edo 'net/can-bcm', filtrando al menos '2456'" "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: can: bcm: Eliminar entrada proc cuando dev no est\u00e1 registrado. syzkaller inform\u00f3 una advertencia en bcm_connect() a continuaci\u00f3n. [0] La repro llama a connect() a vxcan1, elimina vxcan1 y llama a connect() con ifindex == 0. Llamar a connect() para un socket BCM asigna una entrada proc. Luego, bcm_sk(sk)->bound se establece en 1 para evitar m\u00e1s connect(). Sin embargo, eliminar el dispositivo vinculado restablece bcm_sk(sk)->bound a 0 en bcm_notify(). El segundo connect() intenta asignar una entrada proc con el mismo nombre y establece NULL en bcm_sk(sk)->bcm_proc_read, filtrando la entrada proc original. Dado que la entrada proc solo est\u00e1 disponible para sockets conectados, limpiemos la entrada cuando el netdev vinculado no est\u00e9 registrado. [0]: proc_dir_entry 'can-bcm/2456' ya est\u00e1 registrado ADVERTENCIA: CPU: 1 PID: 394 en fs/proc/generic.c:376 proc_register+0x645/0x8f0 fs/proc/generic.c:375 M\u00f3dulos vinculados en: CPU: 1 PID: 394 Comm: syz-executor403 No contaminado 6.10.0-rc7-g852e42cc2dd4 Nombre del hardware: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 RIP: 0010:proc_register+0x645/0x8f0 fs/proc/generic.c:375 C\u00f3digo: 00 00 00 00 00 48 85 ed 0f 85 97 02 00 00 4d 85 f6 0f 85 9f 02 00 00 48 c7 c7 9b cb cf 87 48 89 de 4c 89 fa e8 1c 6f eb fe 90 <0f> 0b 90 90 48 c7 c7 98 37 99 89 e8 cb 7e 22 05 bb 00 00 00 10 48 RSP: 0018:ffa0000000cd7c30 EFLAGS: 00010246 RAX: 9e129be1950f0200 RBX: ff1100011b51582c RCX: ff1100011857cd80 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000002 RBP: 0000000000000000 R08: ffd400000000000f R09: ff1100013e78cac0 R10: ffac800000cd7980 R11: ff1100013e12b1f0 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: ff1100011a99a2ec FS: 00007fbd7086f740(0000) GS:ff1100013fd00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 00000000200071c0 CR3: 0000000118556004 CR4: 0000000000771ef0 DR0: 0000000000000000 DR1: 00000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400 PKRU: 55555554 Seguimiento de llamadas: proc_create_net_single+0x144/0x210 fs/proc/proc_net.c:220 bcm_connect+0x472/0x840 net/can/bcm.c:1673 __sys_connect_file net/socket.c:2049 [en l\u00ednea] __sys_connect+0x5d2/0x690 net/socket.c:2066 __do_sys_connect net/socket.c:2076 [en l\u00ednea] __se_sys_connect net/socket.c:2073 [en l\u00ednea] __x64_sys_connect+0x8f/0x100 net/socket.c:2073 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xd9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x4b/0x53 RIP: 0033:0x7fbd708b0e5d C\u00f3digo: ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 73 9f 1b 00 f7 d8 64 89 01 48 RSP: 002b:00007fff8cd33f08 EFLAGS: 00000246 ORIG_RAX: 000000000000002a RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007fbd708b0e5d RDX: 0000000000000010 RSI: 0000000020000040 RDI: 0000000000000003 RBP: 0000000000000000 R08: 0000000000000040 R09: 0000000000000040 R10: 0000000000000040 R11: 0000000000000246 R12: 00007fff8cd34098 R13: 0000000000401280 R14: 0000000000406de8 R15: 00007fbd70ab9000 remove_proc_entry: elimina el directorio no vac\u00edo 'net/can-bcm', filtrando al menos '2456'"
} }
], ],
"metrics": {}, "metrics": {
"references": [ "cvssMetricV31": [
{ {
"url": "https://git.kernel.org/stable/c/10bfacbd5e8d821011d857bee73310457c9c989a", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
}, },
{ "exploitabilityScore": 1.8,
"url": "https://git.kernel.org/stable/c/33ed4ba73caae39f34ab874ba79138badc2c65dd", "impactScore": 3.6
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }
]
}, },
"weaknesses": [
{ {
"url": "https://git.kernel.org/stable/c/3b39dc2901aa7a679a5ca981a3de9f8d5658afe8", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
}, "description": [
{ {
"url": "https://git.kernel.org/stable/c/4377b79323df62eb5d310354f19b4d130ff58d50", "lang": "en",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "value": "NVD-CWE-noinfo"
}, }
{ ]
"url": "https://git.kernel.org/stable/c/5c680022c4e28ba18ea500f3e29f0428271afa92", }
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ],
}, "configurations": [
{ {
"url": "https://git.kernel.org/stable/c/76fe372ccb81b0c89b6cd2fec26e2f38c958be85", "nodes": [
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" {
}, "operator": "OR",
{ "negate": false,
"url": "https://git.kernel.org/stable/c/abb0a615569ec008e8a93d9f3ab2d5b418ea94d4", "cpeMatch": [
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" {
}, "vulnerable": true,
{ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"url": "https://git.kernel.org/stable/c/aec92dbebdbec7567d9f56d7c9296a572b8fd849", "versionStartIncluding": "2.6.25",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "versionEndExcluding": "4.19.322",
"matchCriteriaId": "FDD41833-5EF3-4E8B-BD2B-83D6DF670AAA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.284",
"matchCriteriaId": "6265A402-9C3C-438F-BFC5-4194B2568B85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.226",
"matchCriteriaId": "864FC17C-501A-4823-A643-6F35D65D8A97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.167",
"matchCriteriaId": "043405A4-25FE-45D4-A7BB-2A0C3B7D17C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.110",
"matchCriteriaId": "6B1A95FC-7E7E-428B-BB59-F76640C652AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.51",
"matchCriteriaId": "E4529134-BAC4-4776-840B-304009E181A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.10",
"matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*",
"matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/10bfacbd5e8d821011d857bee73310457c9c989a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/33ed4ba73caae39f34ab874ba79138badc2c65dd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/3b39dc2901aa7a679a5ca981a3de9f8d5658afe8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/4377b79323df62eb5d310354f19b4d130ff58d50",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/5c680022c4e28ba18ea500f3e29f0428271afa92",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/76fe372ccb81b0c89b6cd2fec26e2f38c958be85",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/abb0a615569ec008e8a93d9f3ab2d5b418ea94d4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/aec92dbebdbec7567d9f56d7c9296a572b8fd849",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46774", "id": "CVE-2024-46774",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-18T08:15:05.180", "published": "2024-09-18T08:15:05.180",
"lastModified": "2024-09-20T12:30:51.220", "lastModified": "2024-11-20T18:19:00.327",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,15 +15,74 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc/rtas: Impedir la construcci\u00f3n del gadget Spectre v1 en sys_rtas() Smatch advierte: arch/powerpc/kernel/rtas.c:1932 __do_sys_rtas() advierte: posible problema de Spectre 'args.args' [r] (cap local) Las variables locales 'nargs' y 'nret' provienen directamente de un b\u00fafer proporcionado por el usuario y se usan como \u00edndices en una peque\u00f1a matriz basada en pila y como entradas para copy_to_user() despu\u00e9s de que est\u00e9n sujetas a verificaciones de l\u00edmites. Utilice array_index_nospec() despu\u00e9s de las verificaciones de l\u00edmites para fijar estos valores para la ejecuci\u00f3n especulativa." "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: powerpc/rtas: Impedir la construcci\u00f3n del gadget Spectre v1 en sys_rtas() Smatch advierte: arch/powerpc/kernel/rtas.c:1932 __do_sys_rtas() advierte: posible problema de Spectre 'args.args' [r] (cap local) Las variables locales 'nargs' y 'nret' provienen directamente de un b\u00fafer proporcionado por el usuario y se usan como \u00edndices en una peque\u00f1a matriz basada en pila y como entradas para copy_to_user() despu\u00e9s de que est\u00e9n sujetas a verificaciones de l\u00edmites. Utilice array_index_nospec() despu\u00e9s de las verificaciones de l\u00edmites para fijar estos valores para la ejecuci\u00f3n especulativa."
} }
], ],
"metrics": {}, "metrics": {
"references": [ "cvssMetricV31": [
{ {
"url": "https://git.kernel.org/stable/c/0974d03eb479384466d828d65637814bee6b26d7", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH"
}, },
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{ {
"url": "https://git.kernel.org/stable/c/68d8156480940b79227d58865ec5d2947b9384a8", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.10.10",
"matchCriteriaId": "75C6119D-9E8D-431D-813F-FE84579072CB"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0974d03eb479384466d828d65637814bee6b26d7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/68d8156480940b79227d58865ec5d2947b9384a8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46775", "id": "CVE-2024-46775",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-18T08:15:05.240", "published": "2024-09-18T08:15:05.240",
"lastModified": "2024-09-20T12:30:51.220", "lastModified": "2024-11-20T18:17:13.750",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,15 +15,74 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Validar los valores devueltos por la funci\u00f3n [QU\u00c9 Y C\u00d3MO] Los valores devueltos por la funci\u00f3n deben comprobarse antes de que los datos se puedan usar en funciones posteriores. Esto soluciona 4 problemas de CHECKED_RETURN informados por Coverity." "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Validar los valores devueltos por la funci\u00f3n [QU\u00c9 Y C\u00d3MO] Los valores devueltos por la funci\u00f3n deben comprobarse antes de que los datos se puedan usar en funciones posteriores. Esto soluciona 4 problemas de CHECKED_RETURN informados por Coverity."
} }
], ],
"metrics": {}, "metrics": {
"references": [ "cvssMetricV31": [
{ {
"url": "https://git.kernel.org/stable/c/5639a3048c7079803256374204ad55ec52cd0b49", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
}, },
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{ {
"url": "https://git.kernel.org/stable/c/673f816b9e1e92d1f70e1bf5f21b531e0ff9ad6c", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.10.10",
"matchCriteriaId": "75C6119D-9E8D-431D-813F-FE84579072CB"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/5639a3048c7079803256374204ad55ec52cd0b49",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/673f816b9e1e92d1f70e1bf5f21b531e0ff9ad6c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46776", "id": "CVE-2024-46776",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-18T08:15:05.287", "published": "2024-09-18T08:15:05.287",
"lastModified": "2024-09-20T12:30:51.220", "lastModified": "2024-11-20T17:56:57.290",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,19 +15,88 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: ejecutar DC_LOG_DC despu\u00e9s de comprobar link->link_enc [QU\u00c9] DC_LOG_DC debe ejecutarse despu\u00e9s de comprobar link->link_enc, no antes. Esto soluciona un problema de REVERSE_INULL informado por Coverity." "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: ejecutar DC_LOG_DC despu\u00e9s de comprobar link->link_enc [QU\u00c9] DC_LOG_DC debe ejecutarse despu\u00e9s de comprobar link->link_enc, no antes. Esto soluciona un problema de REVERSE_INULL informado por Coverity."
} }
], ],
"metrics": {}, "metrics": {
"references": [ "cvssMetricV31": [
{ {
"url": "https://git.kernel.org/stable/c/3a82f62b0d9d7687eac47603bb6cd14a50fa718b", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
}, },
{ "exploitabilityScore": 1.8,
"url": "https://git.kernel.org/stable/c/874e3bb302f97b94ac548959ec4f925b8e7b45e2", "impactScore": 3.6
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }
]
}, },
"weaknesses": [
{ {
"url": "https://git.kernel.org/stable/c/adc74d25cdbba978afbb57caec23bbcd0329f7b8", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.51",
"matchCriteriaId": "D4954ED0-8229-4D57-B4B3-CB5154734977"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.10",
"matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/3a82f62b0d9d7687eac47603bb6cd14a50fa718b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/874e3bb302f97b94ac548959ec4f925b8e7b45e2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/adc74d25cdbba978afbb57caec23bbcd0329f7b8",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46777", "id": "CVE-2024-46777",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-18T08:15:05.330", "published": "2024-09-18T08:15:05.330",
"lastModified": "2024-09-20T12:30:51.220", "lastModified": "2024-11-20T17:56:02.287",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,39 +15,158 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: udf: evitar particiones de longitud excesiva Evite montar sistemas de archivos en los que la partici\u00f3n supere los 32 bits utilizados para el n\u00famero de bloque. Tambi\u00e9n reh\u00fase montar sistemas de archivos en los que la longitud de la partici\u00f3n sea tan grande que no podamos indexar bits de forma segura en un mapa de bits de bloques." "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: udf: evitar particiones de longitud excesiva Evite montar sistemas de archivos en los que la partici\u00f3n supere los 32 bits utilizados para el n\u00famero de bloque. Tambi\u00e9n reh\u00fase montar sistemas de archivos en los que la longitud de la partici\u00f3n sea tan grande que no podamos indexar bits de forma segura en un mapa de bits de bloques."
} }
], ],
"metrics": {}, "metrics": {
"references": [ "cvssMetricV31": [
{ {
"url": "https://git.kernel.org/stable/c/0173999123082280cf904bd640015951f194a294", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
}, },
{ "exploitabilityScore": 1.8,
"url": "https://git.kernel.org/stable/c/1497a4484cdb2cf6c37960d788fb6ba67567bdb7", "impactScore": 3.6
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }
]
}, },
"weaknesses": [
{ {
"url": "https://git.kernel.org/stable/c/2ddf831451357c6da4b64645eb797c93c1c054d1", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
}, "description": [
{ {
"url": "https://git.kernel.org/stable/c/551966371e17912564bc387fbeb2ac13077c3db1", "lang": "en",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "value": "NVD-CWE-noinfo"
}, }
{ ]
"url": "https://git.kernel.org/stable/c/925fd8ee80d5348a5e965548e5484d164d19221d", }
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ],
}, "configurations": [
{ {
"url": "https://git.kernel.org/stable/c/a56330761950cb83de1dfb348479f20c56c95f90", "nodes": [
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" {
}, "operator": "OR",
{ "negate": false,
"url": "https://git.kernel.org/stable/c/c0c23130d38e8bc28e9ef581443de9b1fc749966", "cpeMatch": [
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" {
}, "vulnerable": true,
{ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"url": "https://git.kernel.org/stable/c/ebbe26fd54a9621994bc16b14f2ba8f84c089693", "versionEndExcluding": "4.19.322",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "matchCriteriaId": "29162FB8-5FA4-4DC4-86CE-5EB0CAEEF2F3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.284",
"matchCriteriaId": "6265A402-9C3C-438F-BFC5-4194B2568B85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.226",
"matchCriteriaId": "864FC17C-501A-4823-A643-6F35D65D8A97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.167",
"matchCriteriaId": "043405A4-25FE-45D4-A7BB-2A0C3B7D17C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.110",
"matchCriteriaId": "6B1A95FC-7E7E-428B-BB59-F76640C652AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.51",
"matchCriteriaId": "E4529134-BAC4-4776-840B-304009E181A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.10",
"matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/0173999123082280cf904bd640015951f194a294",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1497a4484cdb2cf6c37960d788fb6ba67567bdb7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2ddf831451357c6da4b64645eb797c93c1c054d1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/551966371e17912564bc387fbeb2ac13077c3db1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/925fd8ee80d5348a5e965548e5484d164d19221d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a56330761950cb83de1dfb348479f20c56c95f90",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c0c23130d38e8bc28e9ef581443de9b1fc749966",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ebbe26fd54a9621994bc16b14f2ba8f84c089693",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46778", "id": "CVE-2024-46778",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-18T08:15:05.380", "published": "2024-09-18T08:15:05.380",
"lastModified": "2024-09-20T12:30:51.220", "lastModified": "2024-11-20T17:40:37.847",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,15 +15,74 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: comprobar el valor de UnboundedRequestEnabled CalculateSwathAndDETConfiguration_params_st's UnboundedRequestEnabled es un puntero (es decir, dml_bool_t *UnboundedRequestEnabled) y, por lo tanto, if (p->UnboundedRequestEnabled) comprueba su direcci\u00f3n, no su valor booleano. Esto soluciona 1 problema de REVERSE_INULL informado por Coverity." "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: comprobar el valor de UnboundedRequestEnabled CalculateSwathAndDETConfiguration_params_st's UnboundedRequestEnabled es un puntero (es decir, dml_bool_t *UnboundedRequestEnabled) y, por lo tanto, if (p->UnboundedRequestEnabled) comprueba su direcci\u00f3n, no su valor booleano. Esto soluciona 1 problema de REVERSE_INULL informado por Coverity."
} }
], ],
"metrics": {}, "metrics": {
"references": [ "cvssMetricV31": [
{ {
"url": "https://git.kernel.org/stable/c/4e2b49a85e7974d21364798c5d4aa8070aa864d9", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
}, },
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{ {
"url": "https://git.kernel.org/stable/c/a7b38c7852093385d0605aa3c8a2efd6edd1edfd", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.10.10",
"matchCriteriaId": "75C6119D-9E8D-431D-813F-FE84579072CB"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/4e2b49a85e7974d21364798c5d4aa8070aa864d9",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a7b38c7852093385d0605aa3c8a2efd6edd1edfd",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46780", "id": "CVE-2024-46780",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-18T08:15:05.473", "published": "2024-09-18T08:15:05.473",
"lastModified": "2024-09-20T12:30:51.220", "lastModified": "2024-11-20T17:31:54.440",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,39 +15,189 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nilfs2: protege las referencias a los par\u00e1metros de superbloque expuestos en sysfs Los b\u00faferes de superbloque de nilfs2 no solo se pueden sobrescribir en tiempo de ejecuci\u00f3n para modificaciones/reparaciones, sino que tambi\u00e9n se intercambian regularmente, se reemplazan durante el cambio de tama\u00f1o e incluso se abandonan cuando se degradan a un lado debido a problemas con el dispositivo de respaldo. Por lo tanto, acceder a ellos requiere exclusi\u00f3n mutua utilizando el sem\u00e1foro de lectura/escritura \"nilfs->ns_sem\". Algunos m\u00e9todos de demostraci\u00f3n del atributo sysfs leen este b\u00fafer de superbloque sin la exclusi\u00f3n mutua necesaria, lo que puede causar problemas con la desreferenciaci\u00f3n de punteros y el acceso a la memoria, as\u00ed que arr\u00e9glelo." "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nilfs2: protege las referencias a los par\u00e1metros de superbloque expuestos en sysfs Los b\u00faferes de superbloque de nilfs2 no solo se pueden sobrescribir en tiempo de ejecuci\u00f3n para modificaciones/reparaciones, sino que tambi\u00e9n se intercambian regularmente, se reemplazan durante el cambio de tama\u00f1o e incluso se abandonan cuando se degradan a un lado debido a problemas con el dispositivo de respaldo. Por lo tanto, acceder a ellos requiere exclusi\u00f3n mutua utilizando el sem\u00e1foro de lectura/escritura \"nilfs->ns_sem\". Algunos m\u00e9todos de demostraci\u00f3n del atributo sysfs leen este b\u00fafer de superbloque sin la exclusi\u00f3n mutua necesaria, lo que puede causar problemas con la desreferenciaci\u00f3n de punteros y el acceso a la memoria, as\u00ed que arr\u00e9glelo."
} }
], ],
"metrics": {}, "metrics": {
"references": [ "cvssMetricV31": [
{ {
"url": "https://git.kernel.org/stable/c/157c0d94b4c40887329418c70ef4edd1a8d6b4ed", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
}, },
{ "exploitabilityScore": 1.8,
"url": "https://git.kernel.org/stable/c/19cfeba0e4b8eda51484fcf8cf7d150418e1d880", "impactScore": 3.6
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }
]
}, },
"weaknesses": [
{ {
"url": "https://git.kernel.org/stable/c/683408258917541bdb294cd717c210a04381931e", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
}, "description": [
{ {
"url": "https://git.kernel.org/stable/c/8c6e43b3d5f109cf9c61bc188fcc8175404e924f", "lang": "en",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "value": "NVD-CWE-noinfo"
}, }
{ ]
"url": "https://git.kernel.org/stable/c/962562d4c70c5cdeb4e955d63ff2017c4eca1aad", }
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ],
}, "configurations": [
{ {
"url": "https://git.kernel.org/stable/c/b14e7260bb691d7f563f61da07d61e3c8b59a614", "nodes": [
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" {
}, "operator": "OR",
{ "negate": false,
"url": "https://git.kernel.org/stable/c/b90beafac05931cbfcb6b1bd4f67c1923f47040e", "cpeMatch": [
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" {
}, "vulnerable": true,
{ "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"url": "https://git.kernel.org/stable/c/ba97ba173f9625d5f34a986088979eae8b80d38e", "versionStartIncluding": "3.17",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "versionEndExcluding": "4.19.322",
"matchCriteriaId": "0DF373BC-D49B-4A5C-944C-E227FDEBDFA9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.20",
"versionEndExcluding": "5.4.284",
"matchCriteriaId": "6265A402-9C3C-438F-BFC5-4194B2568B85"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.5",
"versionEndExcluding": "5.10.226",
"matchCriteriaId": "864FC17C-501A-4823-A643-6F35D65D8A97"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.167",
"matchCriteriaId": "043405A4-25FE-45D4-A7BB-2A0C3B7D17C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.110",
"matchCriteriaId": "6B1A95FC-7E7E-428B-BB59-F76640C652AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.51",
"matchCriteriaId": "E4529134-BAC4-4776-840B-304009E181A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.10",
"matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*",
"matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/157c0d94b4c40887329418c70ef4edd1a8d6b4ed",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/19cfeba0e4b8eda51484fcf8cf7d150418e1d880",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/683408258917541bdb294cd717c210a04381931e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8c6e43b3d5f109cf9c61bc188fcc8175404e924f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/962562d4c70c5cdeb4e955d63ff2017c4eca1aad",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b14e7260bb691d7f563f61da07d61e3c8b59a614",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b90beafac05931cbfcb6b1bd4f67c1923f47040e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ba97ba173f9625d5f34a986088979eae8b80d38e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46789", "id": "CVE-2024-46789",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-18T08:15:05.957", "published": "2024-09-18T08:15:05.957",
"lastModified": "2024-09-20T12:30:51.220", "lastModified": "2024-11-20T17:27:03.197",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,15 +15,105 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/slub: agregar comprobaci\u00f3n de s->flags en alloc_tagging_slab_free_hook Cuando se habilitan CONFIG_MEMCG y CONFIG_KFENCE y CONFIG_KMEMLEAK, siempre aparece la siguiente advertencia. Esto se debe a que se produjo la siguiente pila de llamadas: mem_pool_alloc kmem_cache_alloc_noprof slab_alloc_node kfence_alloc Una vez que la asignaci\u00f3n de kfence es exitosa, slab->obj_exts no estar\u00e1 vac\u00edo, porque ya se le ha asignado un valor en kfence_init_pool. Dado que en la funci\u00f3n prepare_slab_obj_exts_hook, realizamos una comprobaci\u00f3n de s->flags y (SLAB_NO_OBJ_EXT | SLAB_NOLEAKTRACE), la funci\u00f3n alloc_tag_add no se llamar\u00e1 como resultado. Por lo tanto, ref->ct permanece NULL. Sin embargo, cuando llamamos a mem_pool_free, dado que obj_ext no est\u00e1 vac\u00edo, finalmente se invoca el escenario alloc_tag_sub. Aqu\u00ed es donde se produce la advertencia. Por lo tanto, deber\u00edamos agregar las comprobaciones correspondientes en alloc_tagging_slab_free_hook. Para el caso de __GFP_NO_OBJ_EXT, no vi el caso espec\u00edfico en el que se usa kfence, por lo que no agregar\u00e9 la comprobaci\u00f3n correspondiente en alloc_tagging_slab_free_hook por ahora. [ 3.734349] ------------[ cortar aqu\u00ed ]------------ [ 3.734807] alloc_tag no se configur\u00f3 [ 3.735129] ADVERTENCIA: CPU: 4 PID: 40 en ./include/linux/alloc_tag.h:130 kmem_cache_free+0x444/0x574 [ 3.735866] M\u00f3dulos vinculados en: autofs4 [ 3.736211] CPU: 4 UID: 0 PID: 40 Comm: ksoftirqd/4 Contaminado: GW 6.11.0-rc3-dirty #1 [ 3.736969] Contaminado: [W]=WARN [ 3.737258] Nombre del hardware: QEMU KVM Virtual Machine, BIOS desconocido 2/2/2022 [ 3.737875] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 3.738501] pc : kmem_cache_free+0x444/0x574 [ 3.738951] lr : kmem_cache_free+0x444/0x574 [ 3.739361] sp : ffff80008357bb60 [ 3.739693] x29: ffff80008357bb70 x28: 0000000000000000 x27: 0000000000000000 [ 3.740338] x26: ffff80008207f000 x25: ffff000b2eb2fd60 x24: ffff0000c0005700 [ 3.740982] x23: ffff8000804229e4 x22: ffff800082080000 x21: ffff800081756000 [ 3.741630] x20: fffffd7ff8253360 x19: 00000000000000a8 x18: ffffffffffffffffff [ 3.742274] x17: ffff800ab327f000 x16: ffff800083398000 x15: ffff800081756df0 [ 3.742919] x14: 0000000000000000 x13: 205d344320202020 x12: 5b5d373038343337 [ 3.743560] x11: ffff80008357b650 x10: 000000000000005d x9 : 00000000ff ffffd0 [3.744231] x8: 7f7f7f7f7f7f7f7f x7: ffff80008237bad0 x6: c0000000ffff7fff [3.744907] x5: ffff80008237ba78 x4: ffff8000820bbad0 x3: 00000000000000001 [ 3.745580] x2 : 68d66547c09f7800 x1 : 68d66547c09f7800 x0 : 0000000000000000 [ 3.746255] Rastreo de llamadas: [ 3.746530] kmem_cache_free+0x444/0x574 [ 3.746931] mem_pool_free+0x44/0xf4 [ 3.747306] free_object_rcu+0xc8/0xdc [ 3.747693] rcu_do_batch+0x234/0x8a4 [ 3.748075] rcu_core+0x230/0x3e4 [ 3.748424] rcu_core_si+0x14/0x1c [ 3.748780] handle_softirqs+0x134/0x378 [ 3.749189] run_ksoftirqd+0x70/0x9c [ 3.749560] smpboot_thread_fn+0x148/0x22c [ 3.749978] kthread+0x10c/0x118 [ 3.750323] ret_from_fork+0x10/0x20 [ 3.750696] ---[ fin de seguimiento 0000000000000000 ]---" "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm/slub: agregar comprobaci\u00f3n de s->flags en alloc_tagging_slab_free_hook Cuando se habilitan CONFIG_MEMCG y CONFIG_KFENCE y CONFIG_KMEMLEAK, siempre aparece la siguiente advertencia. Esto se debe a que se produjo la siguiente pila de llamadas: mem_pool_alloc kmem_cache_alloc_noprof slab_alloc_node kfence_alloc Una vez que la asignaci\u00f3n de kfence es exitosa, slab->obj_exts no estar\u00e1 vac\u00edo, porque ya se le ha asignado un valor en kfence_init_pool. Dado que en la funci\u00f3n prepare_slab_obj_exts_hook, realizamos una comprobaci\u00f3n de s->flags y (SLAB_NO_OBJ_EXT | SLAB_NOLEAKTRACE), la funci\u00f3n alloc_tag_add no se llamar\u00e1 como resultado. Por lo tanto, ref->ct permanece NULL. Sin embargo, cuando llamamos a mem_pool_free, dado que obj_ext no est\u00e1 vac\u00edo, finalmente se invoca el escenario alloc_tag_sub. Aqu\u00ed es donde se produce la advertencia. Por lo tanto, deber\u00edamos agregar las comprobaciones correspondientes en alloc_tagging_slab_free_hook. Para el caso de __GFP_NO_OBJ_EXT, no vi el caso espec\u00edfico en el que se usa kfence, por lo que no agregar\u00e9 la comprobaci\u00f3n correspondiente en alloc_tagging_slab_free_hook por ahora. [ 3.734349] ------------[ cortar aqu\u00ed ]------------ [ 3.734807] alloc_tag no se configur\u00f3 [ 3.735129] ADVERTENCIA: CPU: 4 PID: 40 en ./include/linux/alloc_tag.h:130 kmem_cache_free+0x444/0x574 [ 3.735866] M\u00f3dulos vinculados en: autofs4 [ 3.736211] CPU: 4 UID: 0 PID: 40 Comm: ksoftirqd/4 Contaminado: GW 6.11.0-rc3-dirty #1 [ 3.736969] Contaminado: [W]=WARN [ 3.737258] Nombre del hardware: QEMU KVM Virtual Machine, BIOS desconocido 2/2/2022 [ 3.737875] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 3.738501] pc : kmem_cache_free+0x444/0x574 [ 3.738951] lr : kmem_cache_free+0x444/0x574 [ 3.739361] sp : ffff80008357bb60 [ 3.739693] x29: ffff80008357bb70 x28: 0000000000000000 x27: 0000000000000000 [ 3.740338] x26: ffff80008207f000 x25: ffff000b2eb2fd60 x24: ffff0000c0005700 [ 3.740982] x23: ffff8000804229e4 x22: ffff800082080000 x21: ffff800081756000 [ 3.741630] x20: fffffd7ff8253360 x19: 00000000000000a8 x18: ffffffffffffffffff [ 3.742274] x17: ffff800ab327f000 x16: ffff800083398000 x15: ffff800081756df0 [ 3.742919] x14: 0000000000000000 x13: 205d344320202020 x12: 5b5d373038343337 [ 3.743560] x11: ffff80008357b650 x10: 000000000000005d x9 : 00000000ff ffffd0 [3.744231] x8: 7f7f7f7f7f7f7f7f x7: ffff80008237bad0 x6: c0000000ffff7fff [3.744907] x5: ffff80008237ba78 x4: ffff8000820bbad0 x3: 00000000000000001 [ 3.745580] x2 : 68d66547c09f7800 x1 : 68d66547c09f7800 x0 : 0000000000000000 [ 3.746255] Rastreo de llamadas: [ 3.746530] kmem_cache_free+0x444/0x574 [ 3.746931] mem_pool_free+0x44/0xf4 [ 3.747306] free_object_rcu+0xc8/0xdc [ 3.747693] rcu_do_batch+0x234/0x8a4 [ 3.748075] rcu_core+0x230/0x3e4 [ 3.748424] rcu_core_si+0x14/0x1c [ 3.748780] handle_softirqs+0x134/0x378 [ 3.749189] run_ksoftirqd+0x70/0x9c [ 3.749560] smpboot_thread_fn+0x148/0x22c [ 3.749978] kthread+0x10c/0x118 [ 3.750323] ret_from_fork+0x10/0x20 [ 3.750696] ---[ fin de seguimiento 0000000000000000 ]---"
} }
], ],
"metrics": {}, "metrics": {
"references": [ "cvssMetricV31": [
{ {
"url": "https://git.kernel.org/stable/c/2d476c86ba4745fcbc912ce4627df4fa80caa9ad", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
}, },
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{ {
"url": "https://git.kernel.org/stable/c/ab7ca09520e9c41c219a4427fe0dae24024bfe7f", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.10",
"versionEndExcluding": "6.10.10",
"matchCriteriaId": "D16659A9-BECD-4E13-8994-B096652762E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*",
"matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/2d476c86ba4745fcbc912ce4627df4fa80caa9ad",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ab7ca09520e9c41c219a4427fe0dae24024bfe7f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46815", "id": "CVE-2024-46815",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.370", "published": "2024-09-27T13:15:14.370",
"lastModified": "2024-09-30T12:45:57.823", "lastModified": "2024-11-20T18:22:12.017",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,35 +15,144 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: comprobar num_valid_sets antes de acceder a reader_wm_sets[] [POR QU\u00c9 Y C\u00d3MO] Es necesario comprobar num_valid_sets para evitar un \u00edndice negativo al acceder a reader_wm_sets[num_valid_sets - 1]. Esto soluciona un problema de OVERRUN informado por Coverity." "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: comprobar num_valid_sets antes de acceder a reader_wm_sets[] [POR QU\u00c9 Y C\u00d3MO] Es necesario comprobar num_valid_sets para evitar un \u00edndice negativo al acceder a reader_wm_sets[num_valid_sets - 1]. Esto soluciona un problema de OVERRUN informado por Coverity."
} }
], ],
"metrics": {}, "metrics": {
"references": [ "cvssMetricV31": [
{ {
"url": "https://git.kernel.org/stable/c/21f9cb44f8c60bf6c26487d428b1a09ad3e8aebf", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
}, },
{ "exploitabilityScore": 1.8,
"url": "https://git.kernel.org/stable/c/6a4a08e45e614cfa7a56498cdfaeb7fae2f07fa0", "impactScore": 5.9
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }
]
}, },
"weaknesses": [
{ {
"url": "https://git.kernel.org/stable/c/7c47dd2e92341f2989ab73dbed07f8894593ad7b", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
}, "description": [
{ {
"url": "https://git.kernel.org/stable/c/a72d4996409569027b4609414a14a87679b12267", "lang": "en",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "value": "NVD-CWE-noinfo"
}, }
{ ]
"url": "https://git.kernel.org/stable/c/b36e9b3104c4ba0f2f5dd083dcf6159cb316c996", }
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ],
}, "configurations": [
{ {
"url": "https://git.kernel.org/stable/c/b38a4815f79b87efb196cd5121579fc51e29a7fb", "nodes": [
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" {
}, "operator": "OR",
{ "negate": false,
"url": "https://git.kernel.org/stable/c/c4a7f7c0062fe2c73f70bb7e335199e25bd71492", "cpeMatch": [
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" {
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.4.284",
"matchCriteriaId": "B1C17E9C-479F-4AE4-8344-B7A213DE3E83"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10",
"versionEndExcluding": "5.10.226",
"matchCriteriaId": "99182B6F-D005-4EA0-A29E-EE793EAF5494"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.167",
"matchCriteriaId": "043405A4-25FE-45D4-A7BB-2A0C3B7D17C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.109",
"matchCriteriaId": "790F505A-7933-48F1-B038-380A8BC5C153"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.50",
"matchCriteriaId": "A56A0460-B122-44D6-B0E6-26CE9C891536"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.9",
"matchCriteriaId": "F4469C96-A86B-4CC3-B2D5-C21B6B72641B"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/21f9cb44f8c60bf6c26487d428b1a09ad3e8aebf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/6a4a08e45e614cfa7a56498cdfaeb7fae2f07fa0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/7c47dd2e92341f2989ab73dbed07f8894593ad7b",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a72d4996409569027b4609414a14a87679b12267",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b36e9b3104c4ba0f2f5dd083dcf6159cb316c996",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b38a4815f79b87efb196cd5121579fc51e29a7fb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c4a7f7c0062fe2c73f70bb7e335199e25bd71492",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46816", "id": "CVE-2024-46816",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.433", "published": "2024-09-27T13:15:14.433",
"lastModified": "2024-09-30T12:45:57.823", "lastModified": "2024-11-20T18:02:52.437",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,15 +15,75 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Detener la inicializaci\u00f3n de amdgpu_dm cuando el n\u00famero de enlaces es mayor que max_links [Por qu\u00e9] Advertencia de OVERRUN en el informe de Coverity. Solo hay elementos max_links dentro de dc->links. El recuento de enlaces puede llegar a AMDGPU_DM_MAX_DISPLAY_INDEX 31. [C\u00f3mo] Aseg\u00farese de que el recuento de enlaces sea menor que max_links." "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Detener la inicializaci\u00f3n de amdgpu_dm cuando el n\u00famero de enlaces es mayor que max_links [Por qu\u00e9] Advertencia de OVERRUN en el informe de Coverity. Solo hay elementos max_links dentro de dc->links. El recuento de enlaces puede llegar a AMDGPU_DM_MAX_DISPLAY_INDEX 31. [C\u00f3mo] Aseg\u00farese de que el recuento de enlaces sea menor que max_links."
} }
], ],
"metrics": {}, "metrics": {
"references": [ "cvssMetricV31": [
{ {
"url": "https://git.kernel.org/stable/c/36c39a8dcce210649f2f45f252abaa09fcc1ae87", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
}, },
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{ {
"url": "https://git.kernel.org/stable/c/cf8b16857db702ceb8d52f9219a4613363e2b1cf", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.10",
"versionEndExcluding": "6.10.9",
"matchCriteriaId": "3F5B2E4D-6C25-4CEF-B66C-96048941FD98"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/36c39a8dcce210649f2f45f252abaa09fcc1ae87",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cf8b16857db702ceb8d52f9219a4613363e2b1cf",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46817", "id": "CVE-2024-46817",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.493", "published": "2024-09-27T13:15:14.493",
"lastModified": "2024-09-30T12:45:57.823", "lastModified": "2024-11-20T17:45:43.893",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,35 +15,145 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Detener la inicializaci\u00f3n de amdgpu_dm cuando el n\u00famero de secuencias es mayor que 6 [Por qu\u00e9] Coverity informa una advertencia de OVERRUN. Deber\u00eda abortar la inicializaci\u00f3n de amdgpu_dm. [C\u00f3mo] Devolver el error a amdgpu_dm_init." "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Detener la inicializaci\u00f3n de amdgpu_dm cuando el n\u00famero de secuencias es mayor que 6 [Por qu\u00e9] Coverity informa una advertencia de OVERRUN. Deber\u00eda abortar la inicializaci\u00f3n de amdgpu_dm. [C\u00f3mo] Devolver el error a amdgpu_dm_init."
} }
], ],
"metrics": {}, "metrics": {
"references": [ "cvssMetricV31": [
{ {
"url": "https://git.kernel.org/stable/c/21bbb39863f10f5fb4bf772d15b07d5d13590e9d", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
}, },
{ "exploitabilityScore": 1.8,
"url": "https://git.kernel.org/stable/c/28b515c458aa9c92bfcb99884c94713a5f471cea", "impactScore": 3.6
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }
]
}, },
"weaknesses": [
{ {
"url": "https://git.kernel.org/stable/c/754321ed63f0a4a31252ca72e0bd89a9e1888018", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
}, "description": [
{ {
"url": "https://git.kernel.org/stable/c/84723eb6068c50610c5c0893980d230d7afa2105", "lang": "en",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "value": "NVD-CWE-noinfo"
}, }
{ ]
"url": "https://git.kernel.org/stable/c/94cb77700fa4ae6200486bfa0ba2ac547534afd2", }
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" ],
}, "configurations": [
{ {
"url": "https://git.kernel.org/stable/c/d398c74c881dee695f6eb6138c9891644e1c3d9d", "nodes": [
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" {
}, "operator": "OR",
{ "negate": false,
"url": "https://git.kernel.org/stable/c/d619b91d3c4af60ac422f1763ce53d721fb91262", "cpeMatch": [
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" {
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.4",
"versionEndExcluding": "5.4.284",
"matchCriteriaId": "6ACBB349-F6C0-4395-8228-F0758C99886A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10",
"versionEndExcluding": "5.10.226",
"matchCriteriaId": "99182B6F-D005-4EA0-A29E-EE793EAF5494"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.15.167",
"matchCriteriaId": "043405A4-25FE-45D4-A7BB-2A0C3B7D17C1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.16",
"versionEndExcluding": "6.1.109",
"matchCriteriaId": "790F505A-7933-48F1-B038-380A8BC5C153"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.50",
"matchCriteriaId": "A56A0460-B122-44D6-B0E6-26CE9C891536"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.9",
"matchCriteriaId": "F4469C96-A86B-4CC3-B2D5-C21B6B72641B"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/21bbb39863f10f5fb4bf772d15b07d5d13590e9d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/28b515c458aa9c92bfcb99884c94713a5f471cea",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/754321ed63f0a4a31252ca72e0bd89a9e1888018",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/84723eb6068c50610c5c0893980d230d7afa2105",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/94cb77700fa4ae6200486bfa0ba2ac547534afd2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d398c74c881dee695f6eb6138c9891644e1c3d9d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d619b91d3c4af60ac422f1763ce53d721fb91262",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46820", "id": "CVE-2024-46820",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.707", "published": "2024-09-27T13:15:14.707",
"lastModified": "2024-09-30T12:45:57.823", "lastModified": "2024-11-20T17:34:05.143",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,15 +15,75 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu/vcn: eliminar la desactivaci\u00f3n de IRQ en la suspensi\u00f3n de VCN 5 No habilitamos/deshabilitamos directamente la IRQ de VCN en VCN 5.0.0. Y tampoco manejamos el estado de la IRQ. Por lo tanto, se eliminan las llamadas para deshabilitar la IRQ y establecer el estado. Esto elimina de manera efectiva la advertencia de \"WARN_ON(!amdgpu_irq_enabled(adev, src, type))\" en amdgpu_irq_put()." "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amdgpu/vcn: eliminar la desactivaci\u00f3n de IRQ en la suspensi\u00f3n de VCN 5 No habilitamos/deshabilitamos directamente la IRQ de VCN en VCN 5.0.0. Y tampoco manejamos el estado de la IRQ. Por lo tanto, se eliminan las llamadas para deshabilitar la IRQ y establecer el estado. Esto elimina de manera efectiva la advertencia de \"WARN_ON(!amdgpu_irq_enabled(adev, src, type))\" en amdgpu_irq_put()."
} }
], ],
"metrics": {}, "metrics": {
"references": [ "cvssMetricV31": [
{ {
"url": "https://git.kernel.org/stable/c/10fe1a79cd1bff3048e13120e93c02f8ecd05e9d", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
}, },
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{ {
"url": "https://git.kernel.org/stable/c/aa92264ba6fd4fb570002f69762634221316e7ae", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.10",
"versionEndExcluding": "6.10.9",
"matchCriteriaId": "3F5B2E4D-6C25-4CEF-B66C-96048941FD98"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/10fe1a79cd1bff3048e13120e93c02f8ecd05e9d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/aa92264ba6fd4fb570002f69762634221316e7ae",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46825", "id": "CVE-2024-46825",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:15.027", "published": "2024-09-27T13:15:15.027",
"lastModified": "2024-09-30T12:45:57.823", "lastModified": "2024-11-20T17:24:04.660",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,19 +15,89 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: mvm: usar IWL_FW_CHECK para verificar el ID del enlace La funci\u00f3n de b\u00fasqueda iwl_mvm_rcu_fw_link_id_to_link_conf() normalmente se llama con la entrada del firmware, por lo que deber\u00eda usar IWL_FW_CHECK() en lugar de WARN_ON()." "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: iwlwifi: mvm: usar IWL_FW_CHECK para verificar el ID del enlace La funci\u00f3n de b\u00fasqueda iwl_mvm_rcu_fw_link_id_to_link_conf() normalmente se llama con la entrada del firmware, por lo que deber\u00eda usar IWL_FW_CHECK() en lugar de WARN_ON()."
} }
], ],
"metrics": {}, "metrics": {
"references": [ "cvssMetricV31": [
{ {
"url": "https://git.kernel.org/stable/c/3cca098c91391b3fa48142bfda57048b985c87f6", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
}, },
{ "exploitabilityScore": 1.8,
"url": "https://git.kernel.org/stable/c/415f3634d53c7fb4cf07d2f5a0be7f2e15e6da33", "impactScore": 3.6
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }
]
}, },
"weaknesses": [
{ {
"url": "https://git.kernel.org/stable/c/9215152677d4b321801a92b06f6d5248b2b4465f", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6",
"versionEndExcluding": "6.6.51",
"matchCriteriaId": "25B5F323-C9C2-4F67-BF42-0C5BDD860576"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.10",
"matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/3cca098c91391b3fa48142bfda57048b985c87f6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/415f3634d53c7fb4cf07d2f5a0be7f2e15e6da33",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/9215152677d4b321801a92b06f6d5248b2b4465f",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46826", "id": "CVE-2024-46826",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:15.087", "published": "2024-09-27T13:15:15.087",
"lastModified": "2024-09-30T12:45:57.823", "lastModified": "2024-11-20T17:19:00.183",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,23 +15,102 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ELF: se corrige la lectura doble de kernel.randomize_va_space. El cargador ELF utiliza \"randomize_va_space\" dos veces. Es sysctl y puede cambiar en cualquier momento, por lo que, en teor\u00eda, 2 cargas podr\u00edan ver 2 valores diferentes con consecuencias impredecibles. Se debe emitir exactamente una carga para obtener un valor consistente en una ejecuci\u00f3n." "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ELF: se corrige la lectura doble de kernel.randomize_va_space. El cargador ELF utiliza \"randomize_va_space\" dos veces. Es sysctl y puede cambiar en cualquier momento, por lo que, en teor\u00eda, 2 cargas podr\u00edan ver 2 valores diferentes con consecuencias impredecibles. Se debe emitir exactamente una carga para obtener un valor consistente en una ejecuci\u00f3n."
} }
], ],
"metrics": {}, "metrics": {
"references": [ "cvssMetricV31": [
{ {
"url": "https://git.kernel.org/stable/c/1cf8cd80903073440b6ea055811d04edd24fe4f7", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
}, },
{ "exploitabilityScore": 1.8,
"url": "https://git.kernel.org/stable/c/1f81d51141a234ad0a3874b4d185dc27a521cd27", "impactScore": 3.6
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" }
]
}, },
"weaknesses": [
{ {
"url": "https://git.kernel.org/stable/c/2a97388a807b6ab5538aa8f8537b2463c6988bd2", "source": "nvd@nist.gov",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "type": "Primary",
}, "description": [
{ {
"url": "https://git.kernel.org/stable/c/53f17409abf61f66b6f05aff795e938e5ba811d1", "lang": "en",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.1.110",
"matchCriteriaId": "4B07FE1B-3332-4F75-AABA-811FFB530187"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.2",
"versionEndExcluding": "6.6.51",
"matchCriteriaId": "E4529134-BAC4-4776-840B-304009E181A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.7",
"versionEndExcluding": "6.10.10",
"matchCriteriaId": "ACDEE48C-137A-4731-90D0-A675865E1BED"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/1cf8cd80903073440b6ea055811d04edd24fe4f7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/1f81d51141a234ad0a3874b4d185dc27a521cd27",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/2a97388a807b6ab5538aa8f8537b2463c6988bd2",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/53f17409abf61f66b6f05aff795e938e5ba811d1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-4705", "id": "CVE-2024-4705",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-06-06T02:15:53.663", "published": "2024-06-06T02:15:53.663",
"lastModified": "2024-07-23T21:15:15.147", "lastModified": "2024-11-20T18:58:42.133",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -80,9 +80,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:axelerant:testimonials_widget:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:axelerant:testimonials_widget:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.0.4", "versionEndIncluding": "4.0.4",
"matchCriteriaId": "CA0B05D1-18EA-42D3-BEFA-9A9379B170DC" "matchCriteriaId": "82036303-703C-4012-8F23-D3EDED119C41"
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50968", "id": "CVE-2024-50968",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-11-14T22:15:19.900", "published": "2024-11-14T22:15:19.900",
"lastModified": "2024-11-15T19:55:17.097", "lastModified": "2024-11-20T17:35:28.470",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
} }
] ]
}, },

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-51162",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-20T17:15:18.120",
"lastModified": "2024-11-20T17:15:18.120",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Audimex EE v.15.1.20 and before allows a remote attacker to escalate privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://en.web-audimex.com/ee-auditmanagement",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Cameleon037/CVEs/blob/main/CVE-2024-51162/README.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-51163",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-20T17:15:18.417",
"lastModified": "2024-11-20T17:15:18.417",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Local File Inclusion vulnerability in Vegam Solutions Vegam 4i v.6.3.47.0 and earlier allows a remote attacker to obtain sensitive information via the print labelling function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/rahulkadavil/CVEs/tree/main/CVE-2024-51163",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52613", "id": "CVE-2024-52613",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-11-14T23:15:05.967", "published": "2024-11-14T23:15:05.967",
"lastModified": "2024-11-19T20:39:42.197", "lastModified": "2024-11-20T17:35:28.730",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.8, "exploitabilityScore": 1.8,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
} }
] ]
}, },
@ -49,6 +69,16 @@
"value": "CWE-125" "value": "CWE-125"
} }
] ]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
} }
], ],
"configurations": [ "configurations": [

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-52725",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-20T17:15:18.867",
"lastModified": "2024-11-20T17:15:18.867",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SemCms v4.8 was discovered to contain a SQL injection vulnerability. This allows an attacker to execute arbitrary code via the ldgid parameter in the SEMCMS_SeoAndTag.php component."
}
],
"metrics": {},
"references": [
{
"url": "http://semcms.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Megrez0423/Seecms",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-52739",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-20T18:15:23.393",
"lastModified": "2024-11-20T18:15:23.393",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "D-LINK DI-8400 v16.07.26A1 was discovered to contain multiple remote command execution (RCE) vulnerabilities in the msp_info_htm function via the flag and cmd parameters."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/DI_8400_msp_info_htm_rce/detail.md",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-52769",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-20T17:15:19.907",
"lastModified": "2024-11-20T17:15:19.907",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the component /admin/friendlink_edit of DedeBIZ v6.3.0 allows attackers to execute arbitrary code via uploading a crafted file."
}
],
"metrics": {},
"references": [
{
"url": "https://co-a1natas.feishu.cn/docx/Zsd9dnGUvoBW6tx0G5fcVx6vnBb",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/DedeBIZ/DedeV6/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-52770",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-20T17:15:20.200",
"lastModified": "2024-11-20T17:15:20.200",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the component /admin/file_manage_control of DedeBIZ v6.3.0 allows attackers to execute arbitrary code via uploading a crafted file."
}
],
"metrics": {},
"references": [
{
"url": "https://co-a1natas.feishu.cn/docx/Zsd9dnGUvoBW6tx0G5fcVx6vnBb",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/DedeBIZ/DedeV6/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-52771",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-20T17:15:20.637",
"lastModified": "2024-11-20T17:15:20.637",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "DedeBIZ v6.3.0 was discovered to contain an arbitrary file deletion vulnerability via the component /admin/file_manage_view."
}
],
"metrics": {},
"references": [
{
"url": "https://co-a1natas.feishu.cn/docx/Zsd9dnGUvoBW6tx0G5fcVx6vnBb",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/DedeBIZ/DedeV6/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-52796",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-20T17:15:20.953",
"lastModified": "2024-11-20T17:15:20.953",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Password Pusher, an open source application to communicate sensitive information over the web, comes with a configurable rate limiter. In versions prior to v1.49.0, the rate limiter could be bypassed by forging proxy headers allowing bad actors to send unlimited traffic to the site potentially causing a denial of service. In v1.49.0, a fix was implemented to only authorize proxies on local IPs which resolves this issue. As a workaround, one may add rules to one's proxy and/or firewall to not accept external proxy headers such as `X-Forwarded-*` from clients."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://docs.pwpush.com/docs/proxies/#trusted-proxies",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pglombardo/PasswordPusher/releases/tag/v1.49.0",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pglombardo/PasswordPusher/security/advisories/GHSA-ffp2-8p2h-4m5j",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-7193", "id": "CVE-2024-7193",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-07-29T10:15:02.107", "published": "2024-07-29T10:15:02.107",
"lastModified": "2024-09-11T16:47:59.613", "lastModified": "2024-11-20T17:04:07.447",
"vulnStatus": "Analyzed", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -149,9 +149,9 @@
"cpeMatch": [ "cpeMatch": [
{ {
"vulnerable": true, "vulnerable": true,
"criteria": "cpe:2.3:a:florian_heidenreich:mp3tag:*:*:*:*:*:*:*:*", "criteria": "cpe:2.3:a:mp3tag:mp3tag:*:*:*:*:*:windows:*:*",
"versionEndExcluding": "3.26d", "versionEndExcluding": "3.26e",
"matchCriteriaId": "F7A4E591-B705-4126-9D1B-27FD015B2734" "matchCriteriaId": "632F068C-952D-473F-A1F5-A1B29FB226BD"
} }
] ]
} }
@ -177,21 +177,24 @@
"url": "https://vuldb.com/?ctiid.272614", "url": "https://vuldb.com/?ctiid.272614",
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"tags": [ "tags": [
"Permissions Required" "Permissions Required",
"VDB Entry"
] ]
}, },
{ {
"url": "https://vuldb.com/?id.272614", "url": "https://vuldb.com/?id.272614",
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"tags": [ "tags": [
"Third Party Advisory" "Third Party Advisory",
"VDB Entry"
] ]
}, },
{ {
"url": "https://vuldb.com/?submit.379523", "url": "https://vuldb.com/?submit.379523",
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"tags": [ "tags": [
"Third Party Advisory" "Third Party Advisory",
"VDB Entry"
] ]
} }
] ]

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2024-11-20T17:00:19.994555+00:00 2024-11-20T19:00:20.813444+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2024-11-20T16:58:35.240000+00:00 2024-11-20T18:58:42.133000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,56 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
270713 270747
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `12` Recently added CVEs: `34`
- [CVE-2024-10094](CVE-2024/CVE-2024-100xx/CVE-2024-10094.json) (`2024-11-20T15:15:08.083`) - [CVE-2018-9479](CVE-2018/CVE-2018-94xx/CVE-2018-9479.json) (`2024-11-20T18:15:19.830`)
- [CVE-2024-11484](CVE-2024/CVE-2024-114xx/CVE-2024-11484.json) (`2024-11-20T16:15:19.623`) - [CVE-2018-9480](CVE-2018/CVE-2018-94xx/CVE-2018-9480.json) (`2024-11-20T18:15:19.890`)
- [CVE-2024-11485](CVE-2024/CVE-2024-114xx/CVE-2024-11485.json) (`2024-11-20T16:15:19.990`) - [CVE-2018-9481](CVE-2018/CVE-2018-94xx/CVE-2018-9481.json) (`2024-11-20T18:15:19.940`)
- [CVE-2024-11486](CVE-2024/CVE-2024-114xx/CVE-2024-11486.json) (`2024-11-20T16:15:20.273`) - [CVE-2018-9482](CVE-2018/CVE-2018-94xx/CVE-2018-9482.json) (`2024-11-20T18:15:20.000`)
- [CVE-2024-11487](CVE-2024/CVE-2024-114xx/CVE-2024-11487.json) (`2024-11-20T16:15:20.543`) - [CVE-2018-9483](CVE-2018/CVE-2018-94xx/CVE-2018-9483.json) (`2024-11-20T18:15:20.053`)
- [CVE-2024-51208](CVE-2024/CVE-2024-512xx/CVE-2024-51208.json) (`2024-11-20T15:15:08.740`) - [CVE-2018-9484](CVE-2018/CVE-2018-94xx/CVE-2018-9484.json) (`2024-11-20T18:15:20.107`)
- [CVE-2024-51209](CVE-2024/CVE-2024-512xx/CVE-2024-51209.json) (`2024-11-20T15:15:08.830`) - [CVE-2018-9485](CVE-2018/CVE-2018-94xx/CVE-2018-9485.json) (`2024-11-20T18:15:20.163`)
- [CVE-2024-52470](CVE-2024/CVE-2024-524xx/CVE-2024-52470.json) (`2024-11-20T15:15:10.810`) - [CVE-2018-9486](CVE-2018/CVE-2018-94xx/CVE-2018-9486.json) (`2024-11-20T18:15:20.220`)
- [CVE-2024-52471](CVE-2024/CVE-2024-524xx/CVE-2024-52471.json) (`2024-11-20T15:15:11.010`) - [CVE-2018-9487](CVE-2018/CVE-2018-94xx/CVE-2018-9487.json) (`2024-11-20T18:15:20.277`)
- [CVE-2024-52472](CVE-2024/CVE-2024-524xx/CVE-2024-52472.json) (`2024-11-20T15:15:11.237`) - [CVE-2024-11081](CVE-2024/CVE-2024-110xx/CVE-2024-11081.json) (`2024-11-20T18:15:22.340`)
- [CVE-2024-52473](CVE-2024/CVE-2024-524xx/CVE-2024-52473.json) (`2024-11-20T15:15:11.443`) - [CVE-2024-11488](CVE-2024/CVE-2024-114xx/CVE-2024-11488.json) (`2024-11-20T17:15:14.097`)
- [CVE-2024-52598](CVE-2024/CVE-2024-525xx/CVE-2024-52598.json) (`2024-11-20T15:15:11.667`) - [CVE-2024-11489](CVE-2024/CVE-2024-114xx/CVE-2024-11489.json) (`2024-11-20T17:15:14.847`)
- [CVE-2024-11490](CVE-2024/CVE-2024-114xx/CVE-2024-11490.json) (`2024-11-20T17:15:15.637`)
- [CVE-2024-11491](CVE-2024/CVE-2024-114xx/CVE-2024-11491.json) (`2024-11-20T17:15:16.397`)
- [CVE-2024-11492](CVE-2024/CVE-2024-114xx/CVE-2024-11492.json) (`2024-11-20T18:15:22.403`)
- [CVE-2024-11493](CVE-2024/CVE-2024-114xx/CVE-2024-11493.json) (`2024-11-20T18:15:22.700`)
- [CVE-2024-29292](CVE-2024/CVE-2024-292xx/CVE-2024-29292.json) (`2024-11-20T18:15:22.970`)
- [CVE-2024-51162](CVE-2024/CVE-2024-511xx/CVE-2024-51162.json) (`2024-11-20T17:15:18.120`)
- [CVE-2024-51163](CVE-2024/CVE-2024-511xx/CVE-2024-51163.json) (`2024-11-20T17:15:18.417`)
- [CVE-2024-52725](CVE-2024/CVE-2024-527xx/CVE-2024-52725.json) (`2024-11-20T17:15:18.867`)
- [CVE-2024-52739](CVE-2024/CVE-2024-527xx/CVE-2024-52739.json) (`2024-11-20T18:15:23.393`)
- [CVE-2024-52769](CVE-2024/CVE-2024-527xx/CVE-2024-52769.json) (`2024-11-20T17:15:19.907`)
- [CVE-2024-52770](CVE-2024/CVE-2024-527xx/CVE-2024-52770.json) (`2024-11-20T17:15:20.200`)
- [CVE-2024-52771](CVE-2024/CVE-2024-527xx/CVE-2024-52771.json) (`2024-11-20T17:15:20.637`)
- [CVE-2024-52796](CVE-2024/CVE-2024-527xx/CVE-2024-52796.json) (`2024-11-20T17:15:20.953`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `86` Recently modified CVEs: `47`
- [CVE-2024-49574](CVE-2024/CVE-2024-495xx/CVE-2024-49574.json) (`2024-11-20T16:32:37.770`) - [CVE-2024-34365](CVE-2024/CVE-2024-343xx/CVE-2024-34365.json) (`2024-11-20T17:35:27.017`)
- [CVE-2024-49754](CVE-2024/CVE-2024-497xx/CVE-2024-49754.json) (`2024-11-20T15:02:42.683`) - [CVE-2024-34487](CVE-2024/CVE-2024-344xx/CVE-2024-34487.json) (`2024-11-20T17:35:27.303`)
- [CVE-2024-49866](CVE-2024/CVE-2024-498xx/CVE-2024-49866.json) (`2024-11-20T15:56:07.807`) - [CVE-2024-3471](CVE-2024/CVE-2024-34xx/CVE-2024-3471.json) (`2024-11-20T18:35:22.923`)
- [CVE-2024-50149](CVE-2024/CVE-2024-501xx/CVE-2024-50149.json) (`2024-11-20T15:45:13.163`) - [CVE-2024-35283](CVE-2024/CVE-2024-352xx/CVE-2024-35283.json) (`2024-11-20T18:35:20.470`)
- [CVE-2024-50653](CVE-2024/CVE-2024-506xx/CVE-2024-50653.json) (`2024-11-20T15:36:20.257`) - [CVE-2024-3629](CVE-2024/CVE-2024-36xx/CVE-2024-3629.json) (`2024-11-20T18:35:23.183`)
- [CVE-2024-50654](CVE-2024/CVE-2024-506xx/CVE-2024-50654.json) (`2024-11-20T15:27:08.580`) - [CVE-2024-3644](CVE-2024/CVE-2024-36xx/CVE-2024-3644.json) (`2024-11-20T18:35:23.437`)
- [CVE-2024-51814](CVE-2024/CVE-2024-518xx/CVE-2024-51814.json) (`2024-11-20T15:15:09.277`) - [CVE-2024-46768](CVE-2024/CVE-2024-467xx/CVE-2024-46768.json) (`2024-11-20T18:19:35.033`)
- [CVE-2024-52308](CVE-2024/CVE-2024-523xx/CVE-2024-52308.json) (`2024-11-20T15:07:43.127`) - [CVE-2024-46771](CVE-2024/CVE-2024-467xx/CVE-2024-46771.json) (`2024-11-20T18:20:03.130`)
- [CVE-2024-52401](CVE-2024/CVE-2024-524xx/CVE-2024-52401.json) (`2024-11-20T15:15:10.653`) - [CVE-2024-46774](CVE-2024/CVE-2024-467xx/CVE-2024-46774.json) (`2024-11-20T18:19:00.327`)
- [CVE-2024-52419](CVE-2024/CVE-2024-524xx/CVE-2024-52419.json) (`2024-11-20T15:18:20.727`) - [CVE-2024-46775](CVE-2024/CVE-2024-467xx/CVE-2024-46775.json) (`2024-11-20T18:17:13.750`)
- [CVE-2024-52422](CVE-2024/CVE-2024-524xx/CVE-2024-52422.json) (`2024-11-20T15:12:06.680`) - [CVE-2024-46776](CVE-2024/CVE-2024-467xx/CVE-2024-46776.json) (`2024-11-20T17:56:57.290`)
- [CVE-2024-52427](CVE-2024/CVE-2024-524xx/CVE-2024-52427.json) (`2024-11-20T15:29:52.547`) - [CVE-2024-46777](CVE-2024/CVE-2024-467xx/CVE-2024-46777.json) (`2024-11-20T17:56:02.287`)
- [CVE-2024-52428](CVE-2024/CVE-2024-524xx/CVE-2024-52428.json) (`2024-11-20T15:29:38.023`) - [CVE-2024-46778](CVE-2024/CVE-2024-467xx/CVE-2024-46778.json) (`2024-11-20T17:40:37.847`)
- [CVE-2024-52429](CVE-2024/CVE-2024-524xx/CVE-2024-52429.json) (`2024-11-20T15:28:21.680`) - [CVE-2024-46780](CVE-2024/CVE-2024-467xx/CVE-2024-46780.json) (`2024-11-20T17:31:54.440`)
- [CVE-2024-52430](CVE-2024/CVE-2024-524xx/CVE-2024-52430.json) (`2024-11-20T15:27:58.350`) - [CVE-2024-46789](CVE-2024/CVE-2024-467xx/CVE-2024-46789.json) (`2024-11-20T17:27:03.197`)
- [CVE-2024-52431](CVE-2024/CVE-2024-524xx/CVE-2024-52431.json) (`2024-11-20T15:27:25.293`) - [CVE-2024-46815](CVE-2024/CVE-2024-468xx/CVE-2024-46815.json) (`2024-11-20T18:22:12.017`)
- [CVE-2024-52432](CVE-2024/CVE-2024-524xx/CVE-2024-52432.json) (`2024-11-20T15:26:15.960`) - [CVE-2024-46816](CVE-2024/CVE-2024-468xx/CVE-2024-46816.json) (`2024-11-20T18:02:52.437`)
- [CVE-2024-52433](CVE-2024/CVE-2024-524xx/CVE-2024-52433.json) (`2024-11-20T15:25:17.773`) - [CVE-2024-46817](CVE-2024/CVE-2024-468xx/CVE-2024-46817.json) (`2024-11-20T17:45:43.893`)
- [CVE-2024-52434](CVE-2024/CVE-2024-524xx/CVE-2024-52434.json) (`2024-11-20T16:04:10.167`) - [CVE-2024-46820](CVE-2024/CVE-2024-468xx/CVE-2024-46820.json) (`2024-11-20T17:34:05.143`)
- [CVE-2024-52435](CVE-2024/CVE-2024-524xx/CVE-2024-52435.json) (`2024-11-20T16:58:35.240`) - [CVE-2024-46825](CVE-2024/CVE-2024-468xx/CVE-2024-46825.json) (`2024-11-20T17:24:04.660`)
- [CVE-2024-52436](CVE-2024/CVE-2024-524xx/CVE-2024-52436.json) (`2024-11-20T15:24:35.470`) - [CVE-2024-46826](CVE-2024/CVE-2024-468xx/CVE-2024-46826.json) (`2024-11-20T17:19:00.183`)
- [CVE-2024-53050](CVE-2024/CVE-2024-530xx/CVE-2024-53050.json) (`2024-11-20T16:17:12.003`) - [CVE-2024-4705](CVE-2024/CVE-2024-47xx/CVE-2024-4705.json) (`2024-11-20T18:58:42.133`)
- [CVE-2024-53051](CVE-2024/CVE-2024-530xx/CVE-2024-53051.json) (`2024-11-20T16:16:15.217`) - [CVE-2024-50968](CVE-2024/CVE-2024-509xx/CVE-2024-50968.json) (`2024-11-20T17:35:28.470`)
- [CVE-2024-7836](CVE-2024/CVE-2024-78xx/CVE-2024-7836.json) (`2024-11-20T15:09:34.677`) - [CVE-2024-52613](CVE-2024/CVE-2024-526xx/CVE-2024-52613.json) (`2024-11-20T17:35:28.730`)
- [CVE-2024-9356](CVE-2024/CVE-2024-93xx/CVE-2024-9356.json) (`2024-11-20T15:01:41.627`) - [CVE-2024-7193](CVE-2024/CVE-2024-71xx/CVE-2024-7193.json) (`2024-11-20T17:04:07.447`)
## Download and Usage ## Download and Usage

View File

@ -96970,7 +96970,7 @@ CVE-2017-13221,0,0,57e3b08fba40dbad7e13f1ecaef036f44baab1a7137260bac79cedbd0aaba
CVE-2017-13222,0,0,ebfdf42baf601798adad1e504ba051d585896884b139bf563ee706b616493897,2018-01-24T16:09:05.727000 CVE-2017-13222,0,0,ebfdf42baf601798adad1e504ba051d585896884b139bf563ee706b616493897,2018-01-24T16:09:05.727000
CVE-2017-13225,0,0,435256662af53bc84b96c8ecfbcc5e36a7df54bbec82fdff4a451c067fc3516f,2018-01-25T14:42:54.447000 CVE-2017-13225,0,0,435256662af53bc84b96c8ecfbcc5e36a7df54bbec82fdff4a451c067fc3516f,2018-01-25T14:42:54.447000
CVE-2017-13226,0,0,a63799b06443b94461c2cc06e2e1817db591c161b20b7ad48cffc3add8fc02f9,2019-10-03T00:03:26.223000 CVE-2017-13226,0,0,a63799b06443b94461c2cc06e2e1817db591c161b20b7ad48cffc3add8fc02f9,2019-10-03T00:03:26.223000
CVE-2017-13227,0,0,5f7f7e74107761d5af436ed7ea82d90afdc52ef4ea3a4d4da3872731fe9d2f54,2024-11-19T20:25:24.913000 CVE-2017-13227,0,1,298c91cd6525a66e289471e63f3648a2d80772c5e5ecb99bbc80e8ce07d9c1c2,2024-11-20T17:35:01.323000
CVE-2017-13228,0,0,d6d00cc11b40a6f7cf8c7c7b74c3a16d54ba4bf0782c9a7d7071e50c41c579df,2018-03-13T14:41:27.033000 CVE-2017-13228,0,0,d6d00cc11b40a6f7cf8c7c7b74c3a16d54ba4bf0782c9a7d7071e50c41c579df,2018-03-13T14:41:27.033000
CVE-2017-13229,0,0,7ebc8fa8286ba1d5821a34ad554783788a44485aedcb5ab1d772a4b9b365c210,2018-03-06T19:52:36.463000 CVE-2017-13229,0,0,7ebc8fa8286ba1d5821a34ad554783788a44485aedcb5ab1d772a4b9b365c210,2018-03-06T19:52:36.463000
CVE-2017-13230,0,0,d8a847f5c7c6d9cdce8e19c6fc7435655e7234b7d29ac67a202b7766226c4533,2018-03-13T14:40:12.123000 CVE-2017-13230,0,0,d8a847f5c7c6d9cdce8e19c6fc7435655e7234b7d29ac67a202b7766226c4533,2018-03-13T14:40:12.123000
@ -97063,7 +97063,7 @@ CVE-2017-13311,0,0,55504e7fca37acf50034a712244c28977b52d63a2e0a85783f86e9cd04320
CVE-2017-13312,0,0,b6008dd37efed3ed1dd1887cecd96d4e7119296f7daae93046904c3ca18f8781,2024-11-19T16:35:02.293000 CVE-2017-13312,0,0,b6008dd37efed3ed1dd1887cecd96d4e7119296f7daae93046904c3ca18f8781,2024-11-19T16:35:02.293000
CVE-2017-13313,0,0,9c6a43618c00c0daf8e78c975c9182c8d073005f306ff0e197206a7550c09d34,2024-11-19T16:35:03.173000 CVE-2017-13313,0,0,9c6a43618c00c0daf8e78c975c9182c8d073005f306ff0e197206a7550c09d34,2024-11-19T16:35:03.173000
CVE-2017-13314,0,0,f15cc076ea1dd87f4d0185b4f5bda3970135144fc10252817f13153eff27c1ae,2024-11-19T16:35:03.990000 CVE-2017-13314,0,0,f15cc076ea1dd87f4d0185b4f5bda3970135144fc10252817f13153eff27c1ae,2024-11-19T16:35:03.990000
CVE-2017-13315,0,0,2fbe555c225a62e15b420fd54ea0dfc0dacae80a58e6fd7d7519b9229611b79d,2024-11-19T21:56:45.533000 CVE-2017-13315,0,1,d16ea5a6b80ed40589c9b9f086a0f1c6ce65bee6281581573bcff9f10ee7ebce,2024-11-20T17:35:01.990000
CVE-2017-1332,0,0,784a9ee8c3796f2a11ff24e95ae95a08508911f60f6ead21d91e6503f5824554,2017-08-03T15:46:39.147000 CVE-2017-1332,0,0,784a9ee8c3796f2a11ff24e95ae95a08508911f60f6ead21d91e6503f5824554,2017-08-03T15:46:39.147000
CVE-2017-1333,0,0,3ec8913dbfad3ccab38e891f6e15f9a0101bb53e4d210c158476cd692803a999,2017-11-16T17:13:42.270000 CVE-2017-1333,0,0,3ec8913dbfad3ccab38e891f6e15f9a0101bb53e4d210c158476cd692803a999,2017-11-16T17:13:42.270000
CVE-2017-1334,0,0,406b3dd86a0e9fb2c9a541dafaa2903ce89044fcfe05700f9700b783b2647a7d,2017-10-10T15:07:22.713000 CVE-2017-1334,0,0,406b3dd86a0e9fb2c9a541dafaa2903ce89044fcfe05700f9700b783b2647a7d,2017-10-10T15:07:22.713000
@ -126884,14 +126884,14 @@ CVE-2018-9335,0,0,a4615c2362644f0db16eaee8cf3937ed4f43b5ecf27164e1ed1f54117ac25b
CVE-2018-9336,0,0,ece9df721ed9453241003aa3ca14b7e9da806325e2f8fa4c87f2deb09e87e0cc,2018-06-13T14:27:26.440000 CVE-2018-9336,0,0,ece9df721ed9453241003aa3ca14b7e9da806325e2f8fa4c87f2deb09e87e0cc,2018-06-13T14:27:26.440000
CVE-2018-9337,0,0,fa1438ef5dec1ff612947292d12b5f781ba1ebd09d4937236a9cc31915af5230,2020-02-17T16:15:25.707000 CVE-2018-9337,0,0,fa1438ef5dec1ff612947292d12b5f781ba1ebd09d4937236a9cc31915af5230,2020-02-17T16:15:25.707000
CVE-2018-9338,0,0,40228caba823ad4e1209a735d23de42ebe53e934eb70e92e5f887484ad853af1,2024-11-19T21:56:45.533000 CVE-2018-9338,0,0,40228caba823ad4e1209a735d23de42ebe53e934eb70e92e5f887484ad853af1,2024-11-19T21:56:45.533000
CVE-2018-9339,0,0,54f5417463bea7a3c983ddcd0944219a30f768e67d5011d9d82e7b7aadf28636,2024-11-19T21:56:45.533000 CVE-2018-9339,0,1,709efef40e42bc3c2225b57543207441d20c7ae11456afd083c75a2cdc9efcd2,2024-11-20T17:35:03.690000
CVE-2018-9340,0,0,b7f588fa5025f68e8a28700032e9c596814c35c5aa8f289fd258379c686b1d00,2024-11-19T21:56:45.533000 CVE-2018-9340,0,1,e1bd80ee3e5ace41d8144dcb6345ec04b94a8d02c934bd98bf987da3d9907ae8,2024-11-20T17:35:05.083000
CVE-2018-9341,0,0,60a00ba92b8099d2baa102c805d547c3b453ab3fe836c50f9b5f9b81d6e8bb27,2024-11-19T21:56:45.533000 CVE-2018-9341,0,1,cd9badee59c87b713a540b7c443b6ae5619b04098a98a92b34dccc3138e4e84c,2024-11-20T17:35:06.453000
CVE-2018-9344,0,0,389773b3e9a58e68e8e217f8959fbffbabfe7c425717502deecdcad52c11ca97,2024-11-19T21:56:45.533000 CVE-2018-9344,0,1,65379d2152171423139c5d37a84fb2153c0976314acd795bf036e0babb97c542,2024-11-20T17:35:07.810000
CVE-2018-9345,0,0,5ec61c6df398547a1aeb3762168d2b94fb1d6b165bcda7d4c5460c0bc7d6d403,2024-11-19T21:56:45.533000 CVE-2018-9345,0,1,4ca350d52bd2857345f5bae5382d74c8aba6043d7b12f03b4a66e07250b88245,2024-11-20T17:35:09.167000
CVE-2018-9346,0,0,717c74ed18492e75e7c08ce32bee403100c5bb6275e7bc7af6ddb9b5072eecc4,2024-11-19T21:56:45.533000 CVE-2018-9346,0,1,8047424bed92883715de87714aaea146c43861253f77c3ba87eaffe19bc426eb,2024-11-20T17:35:10.507000
CVE-2018-9347,0,0,004e6ddc7f66bf50b522d5dc4068b89ca2d1ec23406d1738d4ef275b0261e9d4,2018-12-27T13:51:37.067000 CVE-2018-9347,0,0,004e6ddc7f66bf50b522d5dc4068b89ca2d1ec23406d1738d4ef275b0261e9d4,2018-12-27T13:51:37.067000
CVE-2018-9348,0,1,7af83442535298c290a4c9be23d63103bd5378183d38c43ed7368ffef3523d1d,2024-11-20T16:35:02.590000 CVE-2018-9348,0,0,7af83442535298c290a4c9be23d63103bd5378183d38c43ed7368ffef3523d1d,2024-11-20T16:35:02.590000
CVE-2018-9355,0,0,e8ee2b8217cc4365fa52ec9ad40dda0902bdca6141010bdb87ba36c76908b916,2018-12-14T21:00:55.643000 CVE-2018-9355,0,0,e8ee2b8217cc4365fa52ec9ad40dda0902bdca6141010bdb87ba36c76908b916,2018-12-14T21:00:55.643000
CVE-2018-9356,0,0,21c7b89f47d2b248793d1becde812d30b3640d909c40ac658a8c842107272366,2018-12-14T21:00:15.003000 CVE-2018-9356,0,0,21c7b89f47d2b248793d1becde812d30b3640d909c40ac658a8c842107272366,2018-12-14T21:00:15.003000
CVE-2018-9357,0,0,b108f834ec62803dd7e497cf27a71d840f665249e07751f13a6e34a3e56225ce,2018-12-12T15:44:27.167000 CVE-2018-9357,0,0,b108f834ec62803dd7e497cf27a71d840f665249e07751f13a6e34a3e56225ce,2018-12-12T15:44:27.167000
@ -126901,9 +126901,9 @@ CVE-2018-9360,0,0,3e879d3d70c8f6720dcad88cb01da0ff515e82c70350a6677ccacad3d6e042
CVE-2018-9361,0,0,a0b72bd155dbecffae08e26bb9051709d54bfb6a88d40757b7a7e8b1476f88b9,2018-12-13T14:13:25.217000 CVE-2018-9361,0,0,a0b72bd155dbecffae08e26bb9051709d54bfb6a88d40757b7a7e8b1476f88b9,2018-12-13T14:13:25.217000
CVE-2018-9362,0,0,705f4069c581d00ba5969a5d59a9ac1b41a012bf6bce340bb835c9505bb4298b,2018-12-12T22:15:19.507000 CVE-2018-9362,0,0,705f4069c581d00ba5969a5d59a9ac1b41a012bf6bce340bb835c9505bb4298b,2018-12-12T22:15:19.507000
CVE-2018-9363,0,0,1ff56f5d74a0c3a3a4e0210a3e1c49e7031e4ae79d699290af28a0531438e1a5,2023-01-19T16:01:29.963000 CVE-2018-9363,0,0,1ff56f5d74a0c3a3a4e0210a3e1c49e7031e4ae79d699290af28a0531438e1a5,2023-01-19T16:01:29.963000
CVE-2018-9364,0,1,73d9627ba781a0fe7e88a96f4cf4211e491783e7e8d348dfae2492b36ea0f49a,2024-11-20T16:35:03.457000 CVE-2018-9364,0,0,73d9627ba781a0fe7e88a96f4cf4211e491783e7e8d348dfae2492b36ea0f49a,2024-11-20T16:35:03.457000
CVE-2018-9365,0,0,082b64dfcbf004121db72d3f7546008dddc0a4693a19906808fc4f52a2743e72,2024-11-19T21:56:45.533000 CVE-2018-9365,0,0,082b64dfcbf004121db72d3f7546008dddc0a4693a19906808fc4f52a2743e72,2024-11-19T21:56:45.533000
CVE-2018-9366,0,1,0f7c59130f980a3c555b166d8d97d64e42f13ead782c2ea46b10e0bc4d8fd800,2024-11-20T16:35:04.323000 CVE-2018-9366,0,0,0f7c59130f980a3c555b166d8d97d64e42f13ead782c2ea46b10e0bc4d8fd800,2024-11-20T16:35:04.323000
CVE-2018-9367,0,0,6e3d42576b1bba3f49a27b062398e300d1ae34ff95f48a7b310f4e1f7a6a367b,2024-11-19T21:56:45.533000 CVE-2018-9367,0,0,6e3d42576b1bba3f49a27b062398e300d1ae34ff95f48a7b310f4e1f7a6a367b,2024-11-19T21:56:45.533000
CVE-2018-9368,0,0,3eed727016aaa1bdb2ab5590e837fbeae320a0018dd2936f380b32a99670cd83,2024-11-19T21:56:45.533000 CVE-2018-9368,0,0,3eed727016aaa1bdb2ab5590e837fbeae320a0018dd2936f380b32a99670cd83,2024-11-19T21:56:45.533000
CVE-2018-9369,0,0,9395f39f3513afb7330245b4e0c6e2bb02799fed3ddb0f89583c25ad12118d29,2024-11-19T21:56:45.533000 CVE-2018-9369,0,0,9395f39f3513afb7330245b4e0c6e2bb02799fed3ddb0f89583c25ad12118d29,2024-11-19T21:56:45.533000
@ -126913,19 +126913,19 @@ CVE-2018-9372,0,0,5241fff5e37359ca4d40d4d0ef51eddfb8e42f03921d8e136fe460686e5ef5
CVE-2018-9385,0,0,a04751693f742cd9abca42cb6fa43b673fbcc24bbf305f54b6cb4b8b3d812bd4,2018-12-12T21:37:19.207000 CVE-2018-9385,0,0,a04751693f742cd9abca42cb6fa43b673fbcc24bbf305f54b6cb4b8b3d812bd4,2018-12-12T21:37:19.207000
CVE-2018-9409,0,0,2968adb0075b7a844b1483be93f82fcfba96e3349da8031816178caf69a971d2,2024-11-19T21:56:45.533000 CVE-2018-9409,0,0,2968adb0075b7a844b1483be93f82fcfba96e3349da8031816178caf69a971d2,2024-11-19T21:56:45.533000
CVE-2018-9410,0,0,45d71f9ef4f84e4fb6ba694e9a2e9b63ef0d6353576e0fc9edb4a0ce290c4c46,2024-11-19T21:56:45.533000 CVE-2018-9410,0,0,45d71f9ef4f84e4fb6ba694e9a2e9b63ef0d6353576e0fc9edb4a0ce290c4c46,2024-11-19T21:56:45.533000
CVE-2018-9411,0,1,476b90c439a624a41737123423172fd604476c92ec43d209337f6742c8d2dcd6,2024-11-20T16:35:05.247000 CVE-2018-9411,0,0,476b90c439a624a41737123423172fd604476c92ec43d209337f6742c8d2dcd6,2024-11-20T16:35:05.247000
CVE-2018-9412,0,0,af0a26cc2a5cb016d9b3edebc5a3654aa65d5ce51220ae84c7907a388e7c6262,2024-11-19T22:15:18.813000 CVE-2018-9412,0,0,af0a26cc2a5cb016d9b3edebc5a3654aa65d5ce51220ae84c7907a388e7c6262,2024-11-19T22:15:18.813000
CVE-2018-9415,0,0,ed7c0b7190441eec3d5a1d3e25bd99949f1ee50503dc12cac8466031b55d4227,2018-12-12T21:36:26.237000 CVE-2018-9415,0,0,ed7c0b7190441eec3d5a1d3e25bd99949f1ee50503dc12cac8466031b55d4227,2018-12-12T21:36:26.237000
CVE-2018-9417,0,1,cad89e0cf8fc051038cfee3bcefebcea035685758b20e4cd70329109f31d327d,2024-11-20T16:35:06.213000 CVE-2018-9417,0,0,cad89e0cf8fc051038cfee3bcefebcea035685758b20e4cd70329109f31d327d,2024-11-20T16:35:06.213000
CVE-2018-9419,0,1,02f586a4a2c00e05c303918b1a88e30161b3c355e9dad6563af3403c62ed7cd2,2024-11-20T16:35:07.070000 CVE-2018-9419,0,0,02f586a4a2c00e05c303918b1a88e30161b3c355e9dad6563af3403c62ed7cd2,2024-11-20T16:35:07.070000
CVE-2018-9420,0,1,4244e9b7ba45506dcbb1ac13f9ebc7d60b56060cdbeb8f7bbde68f205292d9b8,2024-11-20T16:35:07.940000 CVE-2018-9420,0,0,4244e9b7ba45506dcbb1ac13f9ebc7d60b56060cdbeb8f7bbde68f205292d9b8,2024-11-20T16:35:07.940000
CVE-2018-9421,0,1,54a9a804022b66961a2f89dab10cee1931298e9062d107db078bb888bccbbe90,2024-11-20T16:35:08.780000 CVE-2018-9421,0,0,54a9a804022b66961a2f89dab10cee1931298e9062d107db078bb888bccbbe90,2024-11-20T16:35:08.780000
CVE-2018-9422,0,0,b22e8a2bc8d5adc29f8bdfbdd7dc1e05001e055bf24c72ec70cb010b3e16095b,2019-08-19T20:15:10.567000 CVE-2018-9422,0,0,b22e8a2bc8d5adc29f8bdfbdd7dc1e05001e055bf24c72ec70cb010b3e16095b,2019-08-19T20:15:10.567000
CVE-2018-9424,0,1,8392e361681b6ffeebb99f65d49311a0cb00b9088034b96a36380ddcdb7ccfcb,2024-11-20T16:35:09.627000 CVE-2018-9424,0,0,8392e361681b6ffeebb99f65d49311a0cb00b9088034b96a36380ddcdb7ccfcb,2024-11-20T16:35:09.627000
CVE-2018-9425,0,0,8bb9fe5d8897d0c1ee991ea8f216f809874791aaa9aa06201b1a1ea7da995c7f,2019-10-02T12:37:35.567000 CVE-2018-9425,0,0,8bb9fe5d8897d0c1ee991ea8f216f809874791aaa9aa06201b1a1ea7da995c7f,2019-10-02T12:37:35.567000
CVE-2018-9427,0,0,5486e933f7e8fc1bc0bff04d24f293fbfbce11d5548d03ed415827a8763827af,2018-12-18T17:33:53.610000 CVE-2018-9427,0,0,5486e933f7e8fc1bc0bff04d24f293fbfbce11d5548d03ed415827a8763827af,2018-12-18T17:33:53.610000
CVE-2018-9428,0,1,7526172b0722af8aa599d12d72e857ede50098dfac4f81f1dcd17f4667e5e95c,2024-11-20T16:35:10.460000 CVE-2018-9428,0,0,7526172b0722af8aa599d12d72e857ede50098dfac4f81f1dcd17f4667e5e95c,2024-11-20T16:35:10.460000
CVE-2018-9432,0,1,3d0cf0811ff71e6339ff3a8e156653fbad0df66a3b88267699a739f6f69f0a43,2024-11-20T16:35:11.280000 CVE-2018-9432,0,0,3d0cf0811ff71e6339ff3a8e156653fbad0df66a3b88267699a739f6f69f0a43,2024-11-20T16:35:11.280000
CVE-2018-9433,0,0,76ac368e2919f40617375faecbb76eca06fe5380e348f6d4bddf9cf1d776db9b,2024-11-19T22:15:19.307000 CVE-2018-9433,0,0,76ac368e2919f40617375faecbb76eca06fe5380e348f6d4bddf9cf1d776db9b,2024-11-19T22:15:19.307000
CVE-2018-9436,0,0,c8a247a24c83592bc549534ae7eaaefb20fd255e25c6b61b4321b051f8f1edfb,2018-12-12T21:25:58.460000 CVE-2018-9436,0,0,c8a247a24c83592bc549534ae7eaaefb20fd255e25c6b61b4321b051f8f1edfb,2018-12-12T21:25:58.460000
CVE-2018-9437,0,0,2fe7c032447c4aee2d71cdb7773a63d008648862a1635a0096aea7442fa776a0,2018-12-12T21:23:38.690000 CVE-2018-9437,0,0,2fe7c032447c4aee2d71cdb7773a63d008648862a1635a0096aea7442fa776a0,2018-12-12T21:23:38.690000
@ -126946,10 +126946,28 @@ CVE-2018-9457,0,0,4ba55ba142e7078e2f212cda844d0dde689b9f253951c701c7bca4abadf510
CVE-2018-9458,0,0,1dbbb9d699cf29709cb646fc9beae0f8b0ab2caf8cfb40eec8d64b76e1fb2af0,2019-10-03T00:03:26.223000 CVE-2018-9458,0,0,1dbbb9d699cf29709cb646fc9beae0f8b0ab2caf8cfb40eec8d64b76e1fb2af0,2019-10-03T00:03:26.223000
CVE-2018-9459,0,0,37f92a3a8615ac08ad1157d56af457710a07fd1019b073a6d5f8014670ff7598,2019-01-30T20:03:52.930000 CVE-2018-9459,0,0,37f92a3a8615ac08ad1157d56af457710a07fd1019b073a6d5f8014670ff7598,2019-01-30T20:03:52.930000
CVE-2018-9465,0,0,3393303102eece75c592f8058027ea52136d9a6fe887ab46a73f746fe5320e57,2018-12-12T14:31:22.043000 CVE-2018-9465,0,0,3393303102eece75c592f8058027ea52136d9a6fe887ab46a73f746fe5320e57,2018-12-12T14:31:22.043000
CVE-2018-9466,0,1,8a0bcf1d1447e0805bae81af54b078ca35801107416c23ddf0d4e34acefc60c4,2024-11-20T16:35:12.150000 CVE-2018-9466,0,0,8a0bcf1d1447e0805bae81af54b078ca35801107416c23ddf0d4e34acefc60c4,2024-11-20T16:35:12.150000
CVE-2018-9467,0,0,f5a4d9f86c03009f1de6b0f82410445906224b1309bf765545b0d54afac3483c,2024-11-20T00:15:16.820000 CVE-2018-9467,0,0,f5a4d9f86c03009f1de6b0f82410445906224b1309bf765545b0d54afac3483c,2024-11-20T00:15:16.820000
CVE-2018-9468,1,1,df02ce6b1d3ad6facea805e279cbed7c6c7701712910c294bf68b00df0b469c2,2024-11-20T17:15:08.783000
CVE-2018-9469,1,1,9bff9d593879c1fdf78301c90abaa160b90bd6eac95cba15c05faa69eff3a9a4,2024-11-20T17:15:09.040000
CVE-2018-9470,1,1,b5cccf8f6b9f73a4a95c37b2bbd0781cd6ba57e39dc5fde7c2c904efbd17f814,2024-11-20T18:15:19.427000
CVE-2018-9471,1,1,a25bd887e39eac47b2287f87e3158bc5da1cedaa4466f518bfab743c61723935,2024-11-20T18:15:19.500000
CVE-2018-9472,1,1,6d41a1ef8ff54b7645232023c7bd7e12a653214c2489443a595f5949dfe52bb4,2024-11-20T18:15:19.550000
CVE-2018-9473,0,0,c1bdd895adedc9cea983c10ac747c9f80d48e4298ee85e28850c7d3a483f6fc6,2023-11-07T03:01:36.857000 CVE-2018-9473,0,0,c1bdd895adedc9cea983c10ac747c9f80d48e4298ee85e28850c7d3a483f6fc6,2023-11-07T03:01:36.857000
CVE-2018-9474,1,1,9e2b0489401002dd8acaba51c5f85ce9c9ffae27e01c2b081a4bc10aeb07a6f6,2024-11-20T18:15:19.610000
CVE-2018-9475,1,1,ca68577f7baec870a17f6b527f53952d05f1ae3256058c0a3bfd1858ed849b51,2024-11-20T18:15:19.670000
CVE-2018-9476,0,0,1a47893a31d348e8886bcf5af0104f1b9d6f9c70018616ac539379931cc12516,2023-11-07T03:01:36.913000 CVE-2018-9476,0,0,1a47893a31d348e8886bcf5af0104f1b9d6f9c70018616ac539379931cc12516,2023-11-07T03:01:36.913000
CVE-2018-9477,1,1,0b3782d7dea5a5ed303fb6f5a1565051d2a7ee5c5ec41f3b66100968046d3a3a,2024-11-20T18:15:19.723000
CVE-2018-9478,1,1,cec0fab52d78d1de919f516142ec6b7848350eee24daa8824c8d1e0c4497c216,2024-11-20T18:15:19.773000
CVE-2018-9479,1,1,f22a2731df3aac2b0bdb456ea6856653670bff2ed5601c47970a5d0dbfbf931e,2024-11-20T18:15:19.830000
CVE-2018-9480,1,1,ab859b2ce5aefa70c1732d96640459bfc766e2f04074780af897f8f403546339,2024-11-20T18:15:19.890000
CVE-2018-9481,1,1,784e23fa20ef2fa61ecdefe55b6081e5aef5f3107dd6f81a5e94a6e1cb094637,2024-11-20T18:15:19.940000
CVE-2018-9482,1,1,14d935e2207311ceeb90656bfdedf27cb4585dbf4fa00e0eb424830286d8c440,2024-11-20T18:15:20
CVE-2018-9483,1,1,db4653754d1231afdef6b6a1577601d7b9565f52f1a6b26b29b17caa3c98dc32,2024-11-20T18:15:20.053000
CVE-2018-9484,1,1,3c612c22c918d7eac7620bc0366fec1f7519f5a9e04df68743e1ad55b47e30e5,2024-11-20T18:15:20.107000
CVE-2018-9485,1,1,a6d84f14faaa2d95ec8f919baecaebc6ba9e427635afb4713d0c1a36749252d7,2024-11-20T18:15:20.163000
CVE-2018-9486,1,1,7dc0674674af21a0abccc63bc5778a80ab4b376e9a828d2449c08fd30d791ecd,2024-11-20T18:15:20.220000
CVE-2018-9487,1,1,d1a184d9c48e59ffed2afaf8c24275fa500657c6b909ce47ee106a6d2e37df55,2024-11-20T18:15:20.277000
CVE-2018-9488,0,0,71b6dcf45b61fc203c6b47a6e57d0e676f081e2bcfeee87d14c2243a30065e58,2020-08-24T17:37:01.140000 CVE-2018-9488,0,0,71b6dcf45b61fc203c6b47a6e57d0e676f081e2bcfeee87d14c2243a30065e58,2020-08-24T17:37:01.140000
CVE-2018-9489,0,0,0099c3fefae2b8555e406065f8c8cb7b969ba5c3ca27214a0b4864b328f4581b,2018-12-13T15:00:19.263000 CVE-2018-9489,0,0,0099c3fefae2b8555e406065f8c8cb7b969ba5c3ca27214a0b4864b328f4581b,2018-12-13T15:00:19.263000
CVE-2018-9490,0,0,cc042ad56360c2290ea2dde569ff2c97233270532d7564c204f2685c4a8e9dd4,2023-11-07T03:01:36.990000 CVE-2018-9490,0,0,cc042ad56360c2290ea2dde569ff2c97233270532d7564c204f2685c4a8e9dd4,2023-11-07T03:01:36.990000
@ -212409,7 +212427,7 @@ CVE-2022-48642,0,0,46049320411d54d94258eba770b701bfe0b63d116a731b90894f4499a7e7e
CVE-2022-48643,0,0,f501c66e7560c01128f4bde7ed1c922c51bf2137743e231acbacc80f33921a9a,2024-04-29T12:42:03.667000 CVE-2022-48643,0,0,f501c66e7560c01128f4bde7ed1c922c51bf2137743e231acbacc80f33921a9a,2024-04-29T12:42:03.667000
CVE-2022-48644,0,0,aee50eaa1080ba42d663c290ef222665900fa3d1e2dc76a2a113640774c9167b,2024-04-29T12:42:03.667000 CVE-2022-48644,0,0,aee50eaa1080ba42d663c290ef222665900fa3d1e2dc76a2a113640774c9167b,2024-04-29T12:42:03.667000
CVE-2022-48645,0,0,1e1822917f82ebc32aaccd859c4caaf954dc1b4f7d1404b6f0133173beec7b08,2024-04-29T12:42:03.667000 CVE-2022-48645,0,0,1e1822917f82ebc32aaccd859c4caaf954dc1b4f7d1404b6f0133173beec7b08,2024-04-29T12:42:03.667000
CVE-2022-48646,0,1,8bea7de0422c46737af9f07857644b2d415c6f13cd8219c858b3d30dba8284ff,2024-11-20T15:35:04.650000 CVE-2022-48646,0,0,8bea7de0422c46737af9f07857644b2d415c6f13cd8219c858b3d30dba8284ff,2024-11-20T15:35:04.650000
CVE-2022-48647,0,0,63a2d6011a27e3884bbf52c53c04a6667615b24da49dc1b7925f7441f3b1dc19,2024-04-29T12:42:03.667000 CVE-2022-48647,0,0,63a2d6011a27e3884bbf52c53c04a6667615b24da49dc1b7925f7441f3b1dc19,2024-04-29T12:42:03.667000
CVE-2022-48648,0,0,dfadd22a87307801d0d16b9b01438d2bba84ad33295315fbb2e82d8be6718c71,2024-04-29T12:42:03.667000 CVE-2022-48648,0,0,dfadd22a87307801d0d16b9b01438d2bba84ad33295315fbb2e82d8be6718c71,2024-04-29T12:42:03.667000
CVE-2022-48649,0,0,0a15744c4cfd26154a17feb04c983f0ec779f45173af81b2d41d9c016bdb8dd6,2024-04-29T12:42:03.667000 CVE-2022-48649,0,0,0a15744c4cfd26154a17feb04c983f0ec779f45173af81b2d41d9c016bdb8dd6,2024-04-29T12:42:03.667000
@ -212437,7 +212455,7 @@ CVE-2022-48668,0,0,ffa47e0d1e12cf1e004440647944ea09831e32184ce4ba444d32b7e58f5b8
CVE-2022-48669,0,0,8ce958067a23f607d74ad3dcda99b5322da4d461e9894c58fa34c110f37456b9,2024-10-29T18:35:00.757000 CVE-2022-48669,0,0,8ce958067a23f607d74ad3dcda99b5322da4d461e9894c58fa34c110f37456b9,2024-10-29T18:35:00.757000
CVE-2022-4867,0,0,63e49f2f48f56858cc93b1a43514f2600f0d5c18f31355382513a6c3bcb2d646,2023-01-06T21:26:37.597000 CVE-2022-4867,0,0,63e49f2f48f56858cc93b1a43514f2600f0d5c18f31355382513a6c3bcb2d646,2023-01-06T21:26:37.597000
CVE-2022-48670,0,0,cddc4d913fc705785aa8a403d73ce736c7d9ddcc87a2c75d21fbd304ce895062,2024-07-03T01:39:06.507000 CVE-2022-48670,0,0,cddc4d913fc705785aa8a403d73ce736c7d9ddcc87a2c75d21fbd304ce895062,2024-07-03T01:39:06.507000
CVE-2022-48671,0,1,26a10879293078d6f23578705cdb0c7506c43064a3dd7470bd473270f324811a,2024-11-20T15:35:05.007000 CVE-2022-48671,0,0,26a10879293078d6f23578705cdb0c7506c43064a3dd7470bd473270f324811a,2024-11-20T15:35:05.007000
CVE-2022-48672,0,0,4e4a32048fa82f31bfc1bd6cc9b82dab9d13cb9dd263513a93a223d395400a63,2024-05-23T20:26:40.327000 CVE-2022-48672,0,0,4e4a32048fa82f31bfc1bd6cc9b82dab9d13cb9dd263513a93a223d395400a63,2024-05-23T20:26:40.327000
CVE-2022-48673,0,0,f4ca107000e65831e0fae0fc2f16ecb6733378d4b0e1cb98a580ffc3a21de7b1,2024-05-23T20:26:54.160000 CVE-2022-48673,0,0,f4ca107000e65831e0fae0fc2f16ecb6733378d4b0e1cb98a580ffc3a21de7b1,2024-05-23T20:26:54.160000
CVE-2022-48674,0,0,66af5e576a467c432885af97fab436414fcfc2b2d26a7d233ad109f75295e952,2024-05-23T19:36:25.633000 CVE-2022-48674,0,0,66af5e576a467c432885af97fab436414fcfc2b2d26a7d233ad109f75295e952,2024-05-23T19:36:25.633000
@ -212459,7 +212477,7 @@ CVE-2022-48692,0,0,46546614be66817a48b52a16773b86b62dd71ed7709b7cc7f5f2e6be9c7a9
CVE-2022-48693,0,0,2de2da6c1292fb939817f4985aaa3748704c5e172b80ff619c511ddeeb51fc58,2024-05-23T20:34:08.557000 CVE-2022-48693,0,0,2de2da6c1292fb939817f4985aaa3748704c5e172b80ff619c511ddeeb51fc58,2024-05-23T20:34:08.557000
CVE-2022-48694,0,0,c39c541ec46d540d96fddfe1bdcf81c083d74c7bb84ee90738a9b26551466af0,2024-05-23T20:34:12.060000 CVE-2022-48694,0,0,c39c541ec46d540d96fddfe1bdcf81c083d74c7bb84ee90738a9b26551466af0,2024-05-23T20:34:12.060000
CVE-2022-48695,0,0,8970459b5cf430fc8f110f8b3b9636df1f2a218eaed323426aa62da1f67d7386,2024-05-06T12:44:56.377000 CVE-2022-48695,0,0,8970459b5cf430fc8f110f8b3b9636df1f2a218eaed323426aa62da1f67d7386,2024-05-06T12:44:56.377000
CVE-2022-48696,0,1,e23c474366773c1421aa082864ca5561fd1faf5e520e8db9339604da85db514c,2024-11-20T15:35:05.953000 CVE-2022-48696,0,0,e23c474366773c1421aa082864ca5561fd1faf5e520e8db9339604da85db514c,2024-11-20T15:35:05.953000
CVE-2022-48697,0,0,058012f0826b8abde23f1ccf33c26738446f8a972fffb456e5c8d9b2178f21b0,2024-10-30T16:35:05.693000 CVE-2022-48697,0,0,058012f0826b8abde23f1ccf33c26738446f8a972fffb456e5c8d9b2178f21b0,2024-10-30T16:35:05.693000
CVE-2022-48698,0,0,fbcd1ab35f418e43551eb49c5375c6b7554cf2d127406f8d425fbb9dcb0403a1,2024-10-30T16:35:06.023000 CVE-2022-48698,0,0,fbcd1ab35f418e43551eb49c5375c6b7554cf2d127406f8d425fbb9dcb0403a1,2024-10-30T16:35:06.023000
CVE-2022-48699,0,0,acc89b565cb5cce5b9f8e8bd3da6f880e3d6b9a5e41cd82aa70c3c6804a5dd1a,2024-05-06T12:44:56.377000 CVE-2022-48699,0,0,acc89b565cb5cce5b9f8e8bd3da6f880e3d6b9a5e41cd82aa70c3c6804a5dd1a,2024-05-06T12:44:56.377000
@ -215877,7 +215895,7 @@ CVE-2023-21266,0,0,18d7bcc4c1fdfc1af03411d2e140522d50eb303306a9a01cd215164baa58c
CVE-2023-21267,0,0,228f6f7596b6cb97274c6123e77ddff3343b22ba18b10a96e2055db9bcead853,2024-07-03T01:39:20.417000 CVE-2023-21267,0,0,228f6f7596b6cb97274c6123e77ddff3343b22ba18b10a96e2055db9bcead853,2024-07-03T01:39:20.417000
CVE-2023-21268,0,0,7502585c73530dd6ce3c3ff0a870c3ee2c56fd847c4fb3355c51e0a7f0ac2071,2023-11-15T02:55:56.537000 CVE-2023-21268,0,0,7502585c73530dd6ce3c3ff0a870c3ee2c56fd847c4fb3355c51e0a7f0ac2071,2023-11-15T02:55:56.537000
CVE-2023-21269,0,0,fece9dff3711fe2af86d775cc74a99bad4829a0075d5a2a32efc6af138cb5008,2024-10-09T16:35:01.057000 CVE-2023-21269,0,0,fece9dff3711fe2af86d775cc74a99bad4829a0075d5a2a32efc6af138cb5008,2024-10-09T16:35:01.057000
CVE-2023-21270,0,0,8a339cf3eb459ee43f00f822b6b3616950a89d0287f3432e0e0d80c33aa2c065,2024-11-19T21:56:45.533000 CVE-2023-21270,0,1,1fe5c2357fd389c2fa26892a2779cf8fae56997897dec89089d61f79d70b9e74,2024-11-20T17:35:18.563000
CVE-2023-21271,0,0,3086339ffce7fa60dbd215e725bc9394127b3bd1eb1d62f2277d721d350ea6f3,2023-08-18T19:54:05.827000 CVE-2023-21271,0,0,3086339ffce7fa60dbd215e725bc9394127b3bd1eb1d62f2277d721d350ea6f3,2023-08-18T19:54:05.827000
CVE-2023-21272,0,0,8929585c315334a5cf678abc944b74ca2a510b1cfc115c2eab8b9f06cedbaa56,2024-10-09T16:35:02.920000 CVE-2023-21272,0,0,8929585c315334a5cf678abc944b74ca2a510b1cfc115c2eab8b9f06cedbaa56,2024-10-09T16:35:02.920000
CVE-2023-21273,0,0,1299d8533bbcaea325dcedcf17bc021b0703fb6c70d4dac65290a62467f88245,2023-08-18T19:44:13.167000 CVE-2023-21273,0,0,1299d8533bbcaea325dcedcf17bc021b0703fb6c70d4dac65290a62467f88245,2023-08-18T19:44:13.167000
@ -224006,7 +224024,7 @@ CVE-2023-31273,0,0,df29903cdfe2e4639cd01ec0b69ff28a6c8668dacca1bfa79e65f27a55e93
CVE-2023-31274,0,0,b89ee8f632da93fef49b2f3d613dfb9c880377b8d49fcccc62dc6815bdef2170,2024-01-26T14:59:22.727000 CVE-2023-31274,0,0,b89ee8f632da93fef49b2f3d613dfb9c880377b8d49fcccc62dc6815bdef2170,2024-01-26T14:59:22.727000
CVE-2023-31275,0,0,ee9b08bd9bf3c6d757e06df03df44c9f8e957f613ff033d761c05a4a4deeceff,2023-12-01T02:30:35.647000 CVE-2023-31275,0,0,ee9b08bd9bf3c6d757e06df03df44c9f8e957f613ff033d761c05a4a4deeceff,2023-12-01T02:30:35.647000
CVE-2023-31277,0,0,cb1d21631c3619a70f0bef39bd2a81b34557f72605d5a8226deca37e7d552ce2,2023-07-13T22:58:25.080000 CVE-2023-31277,0,0,cb1d21631c3619a70f0bef39bd2a81b34557f72605d5a8226deca37e7d552ce2,2023-07-13T22:58:25.080000
CVE-2023-31278,0,1,24a5a3af6a026c438962dd77b6767dca44b4602d0816bb1cc6533fbb5b7ecf44,2024-11-20T16:15:19.003000 CVE-2023-31278,0,0,24a5a3af6a026c438962dd77b6767dca44b4602d0816bb1cc6533fbb5b7ecf44,2024-11-20T16:15:19.003000
CVE-2023-3128,0,0,4f672b80ccc21c449b1b4f0d2a6f3f252ad8348ddc02f0d1cc42bc1bc7e40f47,2023-07-21T19:19:27.410000 CVE-2023-3128,0,0,4f672b80ccc21c449b1b4f0d2a6f3f252ad8348ddc02f0d1cc42bc1bc7e40f47,2023-07-21T19:19:27.410000
CVE-2023-31284,0,0,519ad310a54f4ad97f8450fa1072c98b10591b20f13b4c04c10a5f63a0762511,2023-09-14T18:15:09.147000 CVE-2023-31284,0,0,519ad310a54f4ad97f8450fa1072c98b10591b20f13b4c04c10a5f63a0762511,2023-09-14T18:15:09.147000
CVE-2023-31285,0,0,758459fe44f913c095720939040c08acdc1549f15fbd03b79e144f08c344f1b8,2023-05-30T19:15:09.833000 CVE-2023-31285,0,0,758459fe44f913c095720939040c08acdc1549f15fbd03b79e144f08c344f1b8,2023-05-30T19:15:09.833000
@ -224606,7 +224624,7 @@ CVE-2023-3220,0,0,3e074125b66b0b5b753fe9c22f3c8d0675e17e6906dbd8adf813bdbd4f9101
CVE-2023-32200,0,0,6c410962ed2301957690ecb850b2aeb4572768f35e76f9eddc4d1fc62f123dab,2024-10-07T20:35:02.653000 CVE-2023-32200,0,0,6c410962ed2301957690ecb850b2aeb4572768f35e76f9eddc4d1fc62f123dab,2024-10-07T20:35:02.653000
CVE-2023-32201,0,0,bbbd1f40b3e964baff177b82fbc31c506c5654d3df5270207b5a325718b81d44,2023-06-26T18:54:56.827000 CVE-2023-32201,0,0,bbbd1f40b3e964baff177b82fbc31c506c5654d3df5270207b5a325718b81d44,2023-06-26T18:54:56.827000
CVE-2023-32202,0,0,1f67a765cc23e7a134afa0ba5b2b97afa4766da027639f6264eb1fab6add382e,2023-09-05T14:52:21.310000 CVE-2023-32202,0,0,1f67a765cc23e7a134afa0ba5b2b97afa4766da027639f6264eb1fab6add382e,2023-09-05T14:52:21.310000
CVE-2023-32203,0,1,b30deb411ce03b79ace1c1f2260ff8c34e0fb165e85d8d2cf1c9d4e6a9c27f00,2024-11-20T16:15:19.177000 CVE-2023-32203,0,0,b30deb411ce03b79ace1c1f2260ff8c34e0fb165e85d8d2cf1c9d4e6a9c27f00,2024-11-20T16:15:19.177000
CVE-2023-32204,0,0,923d34247a22fa43752652a8e6565dd02d26c79829ae38a0bbcde5c196cbe27f,2023-11-21T01:57:53.810000 CVE-2023-32204,0,0,923d34247a22fa43752652a8e6565dd02d26c79829ae38a0bbcde5c196cbe27f,2023-11-21T01:57:53.810000
CVE-2023-32205,0,0,643575917471f1b5cbffd14ddb4fc3228daa8acb7feed06170823cc92de48491,2024-01-07T11:15:10.760000 CVE-2023-32205,0,0,643575917471f1b5cbffd14ddb4fc3228daa8acb7feed06170823cc92de48491,2024-01-07T11:15:10.760000
CVE-2023-32206,0,0,0d49b7a64d586d5113c17c6e188933356f355a11360378fcad9ef7cc54c4d0f1,2024-01-07T11:15:10.863000 CVE-2023-32206,0,0,0d49b7a64d586d5113c17c6e188933356f355a11360378fcad9ef7cc54c4d0f1,2024-01-07T11:15:10.863000
@ -224942,7 +224960,7 @@ CVE-2023-32535,0,0,058eeddf4545c11d3d626bba0b9655a727f877c461f2d33a6918c298313b3
CVE-2023-32536,0,0,f1d672db7db2a60d1151dbc21f4283da728d1fb5f23a0b3ddaf4c9d446e7c230,2023-06-30T14:37:22.800000 CVE-2023-32536,0,0,f1d672db7db2a60d1151dbc21f4283da728d1fb5f23a0b3ddaf4c9d446e7c230,2023-06-30T14:37:22.800000
CVE-2023-32537,0,0,ed0eb84ee80503673e72c5607d3fe3b283d2dc6762b5cc0326b227066cade4da,2023-06-30T14:37:11.727000 CVE-2023-32537,0,0,ed0eb84ee80503673e72c5607d3fe3b283d2dc6762b5cc0326b227066cade4da,2023-06-30T14:37:11.727000
CVE-2023-32538,0,0,7bb82e1843fd1202338191f7120f471bf404342b1eecb1489cfdb7d70aa56048,2023-06-27T20:50:08.593000 CVE-2023-32538,0,0,7bb82e1843fd1202338191f7120f471bf404342b1eecb1489cfdb7d70aa56048,2023-06-27T20:50:08.593000
CVE-2023-32539,0,1,3a343bf0657586ed1088a8501643f964464b8cc3c8d799afe90104a03337776c,2024-11-20T16:15:19.307000 CVE-2023-32539,0,0,3a343bf0657586ed1088a8501643f964464b8cc3c8d799afe90104a03337776c,2024-11-20T16:15:19.307000
CVE-2023-3254,0,0,df6ad2be08945f7087353835740034d3e8f51fc003178c286e6c89fd44070861,2023-11-07T04:18:21.350000 CVE-2023-3254,0,0,df6ad2be08945f7087353835740034d3e8f51fc003178c286e6c89fd44070861,2023-11-07T04:18:21.350000
CVE-2023-32540,0,0,fee7c3efac8d431719b8eab52758803b277e2727bc53d0d09846010d339808b5,2023-06-12T16:55:37.857000 CVE-2023-32540,0,0,fee7c3efac8d431719b8eab52758803b277e2727bc53d0d09846010d339808b5,2023-06-12T16:55:37.857000
CVE-2023-32541,0,0,d0ab6ff36ceda36233c5b111108f986737f48589d2e4e7bc8dc19fbd6e20b37f,2023-09-28T22:05:22.517000 CVE-2023-32541,0,0,d0ab6ff36ceda36233c5b111108f986737f48589d2e4e7bc8dc19fbd6e20b37f,2023-09-28T22:05:22.517000
@ -227133,7 +227151,7 @@ CVE-2023-35654,0,0,5ec0257719972615a54320d70abd4585860da16cb9145e7dd4cf2a9de0b38
CVE-2023-35655,0,0,46ccfbda32de6d4aaa44064f160c4fe81117afbe213f242d2b419179ac9bae89,2023-10-14T01:44:43.167000 CVE-2023-35655,0,0,46ccfbda32de6d4aaa44064f160c4fe81117afbe213f242d2b419179ac9bae89,2023-10-14T01:44:43.167000
CVE-2023-35656,0,0,351408b3f3ce527e3e9ca146a71adca57765b10d14ffc2f2878145486a62e13f,2023-10-25T10:02:58.693000 CVE-2023-35656,0,0,351408b3f3ce527e3e9ca146a71adca57765b10d14ffc2f2878145486a62e13f,2023-10-25T10:02:58.693000
CVE-2023-35658,0,0,8bcf70abab563df9c5ba967b15bc341b1fdf6e9f2ec89ab41d871dfe9fd14b2f,2023-09-14T02:18:53.670000 CVE-2023-35658,0,0,8bcf70abab563df9c5ba967b15bc341b1fdf6e9f2ec89ab41d871dfe9fd14b2f,2023-09-14T02:18:53.670000
CVE-2023-35659,0,0,d6c763965b197bbfa521fda2c730e984064685d89916f1b70c7225487472804c,2024-11-19T18:31:32.413000 CVE-2023-35659,0,1,31170e6307be117b564d3fd5270e7a03d19c2b548298af8e23e6ce6a501467dd,2024-11-20T17:35:20.210000
CVE-2023-3566,0,0,c2dc7026e794fcf3036669dc6d7e1d3151b5648f6848d46c6c625fc93ddde6f5,2024-05-17T02:27:36.673000 CVE-2023-3566,0,0,c2dc7026e794fcf3036669dc6d7e1d3151b5648f6848d46c6c625fc93ddde6f5,2024-05-17T02:27:36.673000
CVE-2023-35660,0,0,486a712e4d0f56647a1f8028aec97638904ee0fb3391eb5df721854ed5551546,2023-10-18T01:42:58.543000 CVE-2023-35660,0,0,486a712e4d0f56647a1f8028aec97638904ee0fb3391eb5df721854ed5551546,2023-10-18T01:42:58.543000
CVE-2023-35661,0,0,92d005e666e4198e224998a5911b6ec28079a5f8101e9661c640419fbd2863da,2023-10-18T01:45:44.173000 CVE-2023-35661,0,0,92d005e666e4198e224998a5911b6ec28079a5f8101e9661c640419fbd2863da,2023-10-18T01:45:44.173000
@ -227160,7 +227178,7 @@ CVE-2023-35681,0,0,2603f8896e8c125b6797dbd02195d63673d6f51724707bcecf3de29ee5bd3
CVE-2023-35682,0,0,8e5be0df20127646df0c428d0877b5f6025db53a632750e4d83bce87d34712e9,2023-09-13T14:39:22.120000 CVE-2023-35682,0,0,8e5be0df20127646df0c428d0877b5f6025db53a632750e4d83bce87d34712e9,2023-09-13T14:39:22.120000
CVE-2023-35683,0,0,5a67cee00f3de3a526dd990d465ec70cca53419801a3d26ae9d8d814db70f2e8,2023-09-14T02:00:12.517000 CVE-2023-35683,0,0,5a67cee00f3de3a526dd990d465ec70cca53419801a3d26ae9d8d814db70f2e8,2023-09-14T02:00:12.517000
CVE-2023-35684,0,0,09ccb465b40d0eb68fba17fcdf270a630f7753abe8e6c5c89ccedcd22bd9e51b,2023-09-14T02:02:15.467000 CVE-2023-35684,0,0,09ccb465b40d0eb68fba17fcdf270a630f7753abe8e6c5c89ccedcd22bd9e51b,2023-09-14T02:02:15.467000
CVE-2023-35686,0,0,5187321de8af0ba11aaa76804a082d7cef6a77a2be480cbee2a52733235276db,2024-11-19T18:09:16.243000 CVE-2023-35686,0,1,34617fa54ac067d67ae07ae5ad3d4a38c50027007110f600a134e523b8321b8c,2024-11-20T17:35:20.610000
CVE-2023-35687,0,0,c28e4b6a4d942f40e08b784a20dfc07c8f0fcc8f7236ef7809c0123c392aa182,2023-09-14T02:03:49.147000 CVE-2023-35687,0,0,c28e4b6a4d942f40e08b784a20dfc07c8f0fcc8f7236ef7809c0123c392aa182,2023-09-14T02:03:49.147000
CVE-2023-35689,0,0,c77c9e7a23c05ba829d34db48953b7d9e346df1f83dfb61e4b82c0b286c3749f,2023-08-22T01:10:41.940000 CVE-2023-35689,0,0,c77c9e7a23c05ba829d34db48953b7d9e346df1f83dfb61e4b82c0b286c3749f,2023-08-22T01:10:41.940000
CVE-2023-3569,0,0,5a78514f93a9c1a429d4db50f2959ea2876b105709fb83ffa2f2296def39f506,2023-08-14T19:15:13.793000 CVE-2023-3569,0,0,5a78514f93a9c1a429d4db50f2959ea2876b105709fb83ffa2f2296def39f506,2023-08-14T19:15:13.793000
@ -235796,7 +235814,7 @@ CVE-2023-47249,0,0,61aae9bac2ccc907d28da4b6b616b00686bd3325bfdc033118e8ed844dda5
CVE-2023-4725,0,0,1174602c352b76ffc854c95099185c4b198c6993aa8c625a78d2a38905a3b519,2023-11-07T04:22:54.047000 CVE-2023-4725,0,0,1174602c352b76ffc854c95099185c4b198c6993aa8c625a78d2a38905a3b519,2023-11-07T04:22:54.047000
CVE-2023-47250,0,0,5bef24162cc3d9b226047adc1ebe914948b1d0069ffbc35a63a6c49e77cb219b,2023-11-30T20:55:39.480000 CVE-2023-47250,0,0,5bef24162cc3d9b226047adc1ebe914948b1d0069ffbc35a63a6c49e77cb219b,2023-11-30T20:55:39.480000
CVE-2023-47251,0,0,3f45c0ce5eefd1d79487e5113dbe48ac5f81193341547757a5b32c16c4395937,2023-11-30T20:49:57.593000 CVE-2023-47251,0,0,3f45c0ce5eefd1d79487e5113dbe48ac5f81193341547757a5b32c16c4395937,2023-11-30T20:49:57.593000
CVE-2023-47252,0,1,b6c98da65de957145385704404718229c547edee13a89cfc858f16b5a2153ab8,2024-11-20T16:35:15.083000 CVE-2023-47252,0,0,b6c98da65de957145385704404718229c547edee13a89cfc858f16b5a2153ab8,2024-11-20T16:35:15.083000
CVE-2023-47253,0,0,fc84329d82e498ae994af02dcaa574e10c189b51d5bb4420e6dc690118399185,2024-09-05T20:35:13.773000 CVE-2023-47253,0,0,fc84329d82e498ae994af02dcaa574e10c189b51d5bb4420e6dc690118399185,2024-09-05T20:35:13.773000
CVE-2023-47254,0,0,e86e1f0c274ee09b6e8033be3fda315cae0e0dc7742578f0294843357e11f24a,2023-12-12T22:33:48.820000 CVE-2023-47254,0,0,e86e1f0c274ee09b6e8033be3fda315cae0e0dc7742578f0294843357e11f24a,2023-12-12T22:33:48.820000
CVE-2023-47256,0,0,7f49f7889918f7310aac05fd492c0ecdcf70947685b6f4a6783f989c355e44c5,2024-02-15T07:15:08.250000 CVE-2023-47256,0,0,7f49f7889918f7310aac05fd492c0ecdcf70947685b6f4a6783f989c355e44c5,2024-02-15T07:15:08.250000
@ -238025,7 +238043,7 @@ CVE-2023-50429,0,0,cf7c3990876d34813be7786260b9d58e3f0ef74bfa3057d97d875c61dd198
CVE-2023-5043,0,0,24549f6a594c400161517cb178315694a2db415c3b53eae682adf0618aa705bf,2024-03-07T17:15:11.983000 CVE-2023-5043,0,0,24549f6a594c400161517cb178315694a2db415c3b53eae682adf0618aa705bf,2024-03-07T17:15:11.983000
CVE-2023-50430,0,0,2b4176ddd3b9eebfdb3313b53fe15bfa66cbccd2433967b694198d372f0d10e8,2023-12-13T19:10:39.247000 CVE-2023-50430,0,0,2b4176ddd3b9eebfdb3313b53fe15bfa66cbccd2433967b694198d372f0d10e8,2023-12-13T19:10:39.247000
CVE-2023-50431,0,0,ce67465e9f1496f406cce0377694b14ad4509f4122055381a78462991a530b3a,2024-03-25T01:15:54.980000 CVE-2023-50431,0,0,ce67465e9f1496f406cce0377694b14ad4509f4122055381a78462991a530b3a,2024-03-25T01:15:54.980000
CVE-2023-50432,0,1,fa0faddbcef16c5d56a3eb34928fe586c89c5e2a3d1bedf687e91bd5cde3a33a,2024-11-20T16:35:16.027000 CVE-2023-50432,0,0,fa0faddbcef16c5d56a3eb34928fe586c89c5e2a3d1bedf687e91bd5cde3a33a,2024-11-20T16:35:16.027000
CVE-2023-50433,0,0,1236cb1d1900890c10f0cec86536128d745a880515430cbaebcfc664a41166fd,2024-11-01T20:35:02.620000 CVE-2023-50433,0,0,1236cb1d1900890c10f0cec86536128d745a880515430cbaebcfc664a41166fd,2024-11-01T20:35:02.620000
CVE-2023-50434,0,0,dcae0085efa2a160f35308b2cfed9a6c4c97f96728c51d0e99c64b121bad7ee3,2024-08-01T13:45:24.853000 CVE-2023-50434,0,0,dcae0085efa2a160f35308b2cfed9a6c4c97f96728c51d0e99c64b121bad7ee3,2024-08-01T13:45:24.853000
CVE-2023-50436,0,0,ae24d4384178993c11802f29b1b73d6ccd72915a5daa0b3c8c1118e509cedd1f,2024-11-14T20:35:08.293000 CVE-2023-50436,0,0,ae24d4384178993c11802f29b1b73d6ccd72915a5daa0b3c8c1118e509cedd1f,2024-11-14T20:35:08.293000
@ -242634,7 +242652,7 @@ CVE-2024-1009,0,0,97af4237278897e4de60a52c929ac5642d8b709167b278dc1af6a70d4d177e
CVE-2024-10091,0,0,d0b808b13e4ac8a1cdb029b434d2f58c9a91ce65332255a3523a2d40d54e2bbc,2024-10-28T13:58:09.230000 CVE-2024-10091,0,0,d0b808b13e4ac8a1cdb029b434d2f58c9a91ce65332255a3523a2d40d54e2bbc,2024-10-28T13:58:09.230000
CVE-2024-10092,0,0,96aeeb96773a5c0a6e4e68b9196f2f369ac89a58107c1085bc8eadc272cfbb94,2024-10-28T13:58:09.230000 CVE-2024-10092,0,0,96aeeb96773a5c0a6e4e68b9196f2f369ac89a58107c1085bc8eadc272cfbb94,2024-10-28T13:58:09.230000
CVE-2024-10093,0,0,94a330c294b313c7705272073b44baeb2e1acc1449e78c4e0c252c7b91c53316,2024-11-01T18:07:07.003000 CVE-2024-10093,0,0,94a330c294b313c7705272073b44baeb2e1acc1449e78c4e0c252c7b91c53316,2024-11-01T18:07:07.003000
CVE-2024-10094,1,1,2c3da037f182f21a4a0074bb8362ed9f4ab466b113f58753148359eb49c48394,2024-11-20T15:15:08.083000 CVE-2024-10094,0,0,2c3da037f182f21a4a0074bb8362ed9f4ab466b113f58753148359eb49c48394,2024-11-20T15:15:08.083000
CVE-2024-10097,0,0,ebed9ad10c7a648598c4572f4800c95ee8b1505f542b8454e9698f3995387b9d,2024-11-06T19:14:22.817000 CVE-2024-10097,0,0,ebed9ad10c7a648598c4572f4800c95ee8b1505f542b8454e9698f3995387b9d,2024-11-06T19:14:22.817000
CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615abb6,2024-10-21T21:03:53.647000 CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615abb6,2024-10-21T21:03:53.647000
CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000 CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000
@ -242845,7 +242863,7 @@ CVE-2024-10379,0,0,214be4d491421db3527c631a39011912a259f53e90e222f386f0e0be59c25
CVE-2024-1038,0,0,c7b47d6608546def6f3304631405edc76ac6151bae95644217fe0b19e7498b5e,2024-03-13T18:16:18.563000 CVE-2024-1038,0,0,c7b47d6608546def6f3304631405edc76ac6151bae95644217fe0b19e7498b5e,2024-03-13T18:16:18.563000
CVE-2024-10380,0,0,251c7695ebdffe14f2a561bb3be22f7946019d2ec5c5cf9081e853969f1037dd,2024-11-01T16:11:00.217000 CVE-2024-10380,0,0,251c7695ebdffe14f2a561bb3be22f7946019d2ec5c5cf9081e853969f1037dd,2024-11-01T16:11:00.217000
CVE-2024-10381,0,0,c0308fe75631e6e478c4bb91d489e96b1c2dde80a7b938a5a315dee1135c5bea,2024-11-14T21:44:53.280000 CVE-2024-10381,0,0,c0308fe75631e6e478c4bb91d489e96b1c2dde80a7b938a5a315dee1135c5bea,2024-11-14T21:44:53.280000
CVE-2024-10382,0,0,93ad4e5d158f8a5b418f3ca0d0badac34bde469f4309d8aa47291799d978870e,2024-11-20T11:15:04.280000 CVE-2024-10382,0,1,6cb5ff8e8fbaf6d99ec6d0369d0950b2bb65417500c51e58719c4fb1a4cfecd9,2024-11-20T17:35:22.073000
CVE-2024-10386,0,0,92094aeb70b25026044a453c13f522af4eb391b2229044481dc021518acdc439,2024-11-05T20:07:59.487000 CVE-2024-10386,0,0,92094aeb70b25026044a453c13f522af4eb391b2229044481dc021518acdc439,2024-11-05T20:07:59.487000
CVE-2024-10387,0,0,5a1f42d28f618e614b5301c0b94be55a535432bf7194e0692256ccf6aa332018,2024-11-05T20:05:55.323000 CVE-2024-10387,0,0,5a1f42d28f618e614b5301c0b94be55a535432bf7194e0692256ccf6aa332018,2024-11-05T20:05:55.323000
CVE-2024-10388,0,0,baa860af3611995aa3b48c2ac11975f858a05164ea5f5d56cfe1775a5d194758,2024-11-19T21:57:32.967000 CVE-2024-10388,0,0,baa860af3611995aa3b48c2ac11975f858a05164ea5f5d56cfe1775a5d194758,2024-11-19T21:57:32.967000
@ -242944,7 +242962,7 @@ CVE-2024-10507,0,0,f18494a65f96198598cd9275318405539a3d8636ddbe0a37967ba2288eae0
CVE-2024-10508,0,0,af9f95e5d7d630b3cf33e7ae9f2d3118be1f7da09e31e6491ee65e4e58c1137c,2024-11-12T13:56:24.513000 CVE-2024-10508,0,0,af9f95e5d7d630b3cf33e7ae9f2d3118be1f7da09e31e6491ee65e4e58c1137c,2024-11-12T13:56:24.513000
CVE-2024-10509,0,0,a9d05e50f1563ceed5339878fa8c2329eea9e28284f4c0c86984d14b77803f94,2024-11-01T20:52:15.573000 CVE-2024-10509,0,0,a9d05e50f1563ceed5339878fa8c2329eea9e28284f4c0c86984d14b77803f94,2024-11-01T20:52:15.573000
CVE-2024-1051,0,0,301df872c002365b13eaea34d02a8084366516306d472e0b862c9b6067f5d33d,2024-04-01T01:12:59.077000 CVE-2024-1051,0,0,301df872c002365b13eaea34d02a8084366516306d472e0b862c9b6067f5d33d,2024-04-01T01:12:59.077000
CVE-2024-10515,0,1,907400a34dad51b072b2c37123f6c966421eb7a65eb80907a16cb7d23ffaf400,2024-11-20T16:35:17.020000 CVE-2024-10515,0,0,907400a34dad51b072b2c37123f6c966421eb7a65eb80907a16cb7d23ffaf400,2024-11-20T16:35:17.020000
CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef0f,2024-02-15T18:49:40.180000 CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef0f,2024-02-15T18:49:40.180000
CVE-2024-10520,0,0,5acdd0c5659959d9ac18fb296c8b0ca775c2f72b2836f5d69fce1935ac3f49b0,2024-11-20T12:15:18.390000 CVE-2024-10520,0,0,5acdd0c5659959d9ac18fb296c8b0ca775c2f72b2836f5d69fce1935ac3f49b0,2024-11-20T12:15:18.390000
CVE-2024-10523,0,0,a761a52195ca091ecc100fefe31fd4eadda4d831fe94860e2a159923b6d0d68d,2024-11-08T15:14:30.070000 CVE-2024-10523,0,0,a761a52195ca091ecc100fefe31fd4eadda4d831fe94860e2a159923b6d0d68d,2024-11-08T15:14:30.070000
@ -243137,7 +243155,7 @@ CVE-2024-10816,0,0,e858f5d61a9a9365d35b4f1632e08232437088d807fd2da2fd482099073bf
CVE-2024-1082,0,0,1a3a3ef85a9a06621291f657b27812f6a6be683bc843b0137ba9e53485eee330,2024-10-17T15:46:44.327000 CVE-2024-1082,0,0,1a3a3ef85a9a06621291f657b27812f6a6be683bc843b0137ba9e53485eee330,2024-10-17T15:46:44.327000
CVE-2024-10820,0,0,0566121beaf22d29f7b00a50f1224a8b7f80629efb106b01b93307bb617c146c,2024-11-19T17:38:16.363000 CVE-2024-10820,0,0,0566121beaf22d29f7b00a50f1224a8b7f80629efb106b01b93307bb617c146c,2024-11-19T17:38:16.363000
CVE-2024-10824,0,0,6eb650dcc5948040831c411456d27fae52cd783d32ad30faaf04938565b810b8,2024-11-08T19:01:03.880000 CVE-2024-10824,0,0,6eb650dcc5948040831c411456d27fae52cd783d32ad30faaf04938565b810b8,2024-11-08T19:01:03.880000
CVE-2024-10825,0,1,7ed8d1f6d2803d82be5c697a59d4862641f3db104b57c1ab607c40ebc10f9c43,2024-11-20T15:01:19.507000 CVE-2024-10825,0,0,7ed8d1f6d2803d82be5c697a59d4862641f3db104b57c1ab607c40ebc10f9c43,2024-11-20T15:01:19.507000
CVE-2024-10826,0,0,6aa37fdb16b5853a7b5472e25a8ac0220ff66e617581e203df39439d12ed70ca,2024-11-06T18:17:17.287000 CVE-2024-10826,0,0,6aa37fdb16b5853a7b5472e25a8ac0220ff66e617581e203df39439d12ed70ca,2024-11-06T18:17:17.287000
CVE-2024-10827,0,0,6577ad366fcac00efbf959f7905ba60a1d9c696b896b68d8b10d38d71dfd5e3b,2024-11-06T18:17:17.287000 CVE-2024-10827,0,0,6577ad366fcac00efbf959f7905ba60a1d9c696b896b68d8b10d38d71dfd5e3b,2024-11-06T18:17:17.287000
CVE-2024-10828,0,0,9da06f8abbfbcaacd480e3cb9360e183a4e68531d13b5b9c29e9ebf926bd00cf,2024-11-19T17:41:59.290000 CVE-2024-10828,0,0,9da06f8abbfbcaacd480e3cb9360e183a4e68531d13b5b9c29e9ebf926bd00cf,2024-11-19T17:41:59.290000
@ -243172,7 +243190,7 @@ CVE-2024-10884,0,0,af8d0f69b33cc9c8b5f395f0e60a6b7ec1fd0ec15994d8ada3cc1ff2f49e0
CVE-2024-10887,0,0,6f1c620112f0531885feb58bf605da1bdf3e2be3ee69e7f92d5d01d446076f44,2024-11-13T17:01:16.850000 CVE-2024-10887,0,0,6f1c620112f0531885feb58bf605da1bdf3e2be3ee69e7f92d5d01d446076f44,2024-11-13T17:01:16.850000
CVE-2024-1089,0,0,9442709e929187c1b992d082c3eaeec9226480f80fc28198e3a73f4a684640d5,2024-02-29T13:49:29.390000 CVE-2024-1089,0,0,9442709e929187c1b992d082c3eaeec9226480f80fc28198e3a73f4a684640d5,2024-02-29T13:49:29.390000
CVE-2024-10891,0,0,75368c42ada2eff64310eb4f2bf04c277030b9ed62814601df628d2e55a629ad,2024-11-20T10:15:05.273000 CVE-2024-10891,0,0,75368c42ada2eff64310eb4f2bf04c277030b9ed62814601df628d2e55a629ad,2024-11-20T10:15:05.273000
CVE-2024-10897,0,1,5090338464622dc9d5ece2556a5b89ff3e6aa995d53aa797095eaa9a0db6f534,2024-11-20T16:09:16.643000 CVE-2024-10897,0,0,5090338464622dc9d5ece2556a5b89ff3e6aa995d53aa797095eaa9a0db6f534,2024-11-20T16:09:16.643000
CVE-2024-10899,0,0,4368cb3772d2f8c2a1f35ff550289018215916506b0b69e65d8983cd35dad906,2024-11-20T07:15:08.260000 CVE-2024-10899,0,0,4368cb3772d2f8c2a1f35ff550289018215916506b0b69e65d8983cd35dad906,2024-11-20T07:15:08.260000
CVE-2024-1090,0,0,2d0b80c82d6d153c4e0b5412c3fcf892da86ac73a72da4cbf84bfbb064bdcb0c,2024-02-29T13:49:29.390000 CVE-2024-1090,0,0,2d0b80c82d6d153c4e0b5412c3fcf892da86ac73a72da4cbf84bfbb064bdcb0c,2024-02-29T13:49:29.390000
CVE-2024-10900,0,0,f0a1068a03da92137242d5778d1db0773cba2fb63def13779ff35e3410d8f989,2024-11-20T07:15:08.690000 CVE-2024-10900,0,0,f0a1068a03da92137242d5778d1db0773cba2fb63def13779ff35e3410d8f989,2024-11-20T07:15:08.690000
@ -243288,6 +243306,7 @@ CVE-2024-11077,0,0,017b8d255e80754134e620d058a9d65876d81581be37ad0ebd6cdd417d3b7
CVE-2024-11078,0,0,d133c6201a7de964272170f882ab0586a90d59fac96ab8e0ce223d3687fb9309,2024-11-12T13:55:21.227000 CVE-2024-11078,0,0,d133c6201a7de964272170f882ab0586a90d59fac96ab8e0ce223d3687fb9309,2024-11-12T13:55:21.227000
CVE-2024-11079,0,0,d1a710289b6254268300773c7c9b113893f43edc23893d87d06dbeefe81deb1d,2024-11-12T13:55:21.227000 CVE-2024-11079,0,0,d1a710289b6254268300773c7c9b113893f43edc23893d87d06dbeefe81deb1d,2024-11-12T13:55:21.227000
CVE-2024-1108,0,0,72e8aa7ee320c630f0cd3020b574b902dcf572a1d2888f0afb29692e74e18247,2024-02-22T19:07:37.840000 CVE-2024-1108,0,0,72e8aa7ee320c630f0cd3020b574b902dcf572a1d2888f0afb29692e74e18247,2024-02-22T19:07:37.840000
CVE-2024-11081,1,1,868ddada0bf262c198b91d0f6dc5cc082627c1fafb1bc6c0669f2cc02fb00c28,2024-11-20T18:15:22.340000
CVE-2024-11085,0,0,36aaba845c0a90c554661f4023115a3f46c67d2a691dfc21b49793447a4b6d8f,2024-11-18T17:11:17.393000 CVE-2024-11085,0,0,36aaba845c0a90c554661f4023115a3f46c67d2a691dfc21b49793447a4b6d8f,2024-11-18T17:11:17.393000
CVE-2024-11086,0,0,f4d7f35e95dad05e023fed49ac9e59da09a947f51bc79e0e10dc6b97e93d7482,2024-11-20T13:15:04.020000 CVE-2024-11086,0,0,f4d7f35e95dad05e023fed49ac9e59da09a947f51bc79e0e10dc6b97e93d7482,2024-11-20T13:15:04.020000
CVE-2024-1109,0,0,54a246b33f975a42367e7b2f8f64c59b5c20293302ad365ae743bbdf357522c9,2024-02-10T04:13:21.610000 CVE-2024-1109,0,0,54a246b33f975a42367e7b2f8f64c59b5c20293302ad365ae743bbdf357522c9,2024-02-10T04:13:21.610000
@ -243364,8 +243383,8 @@ CVE-2024-11237,0,0,9213e2a4eef9d88853d744219598c19b6ea93ab11d996277723bb7fe3b4da
CVE-2024-11238,0,0,ce4db66c60999acd981d78df2e1b620167b9a91ec92fb71a2c401cfcff716486,2024-11-19T19:01:13.060000 CVE-2024-11238,0,0,ce4db66c60999acd981d78df2e1b620167b9a91ec92fb71a2c401cfcff716486,2024-11-19T19:01:13.060000
CVE-2024-11239,0,0,aefb59a8cfc2086746090c1190902046658072a530e6347767791876e7172fb6,2024-11-19T19:00:43.230000 CVE-2024-11239,0,0,aefb59a8cfc2086746090c1190902046658072a530e6347767791876e7172fb6,2024-11-19T19:00:43.230000
CVE-2024-1124,0,0,913ac2351f43d83be68411d873bf568715eb455fa7fe6219a9189bc1238726a9,2024-03-11T01:32:39.697000 CVE-2024-1124,0,0,913ac2351f43d83be68411d873bf568715eb455fa7fe6219a9189bc1238726a9,2024-03-11T01:32:39.697000
CVE-2024-11240,0,1,3ba578cb5471b3347c2ba7445ad733fff4562786b84385be246158221344c331,2024-11-20T15:09:05.640000 CVE-2024-11240,0,0,3ba578cb5471b3347c2ba7445ad733fff4562786b84385be246158221344c331,2024-11-20T15:09:05.640000
CVE-2024-11241,0,1,871e66d1f90e93c0401c42d346ab079795e0a18eb583e0af35ae18467e55be69,2024-11-20T15:41:34.393000 CVE-2024-11241,0,0,871e66d1f90e93c0401c42d346ab079795e0a18eb583e0af35ae18467e55be69,2024-11-20T15:41:34.393000
CVE-2024-11242,0,0,1118fbe40870c73d892fa7961109d02efc9eea6f6992fd659082a2270dd53e3e,2024-11-18T17:11:56.587000 CVE-2024-11242,0,0,1118fbe40870c73d892fa7961109d02efc9eea6f6992fd659082a2270dd53e3e,2024-11-18T17:11:56.587000
CVE-2024-11243,0,0,0ff1388c8ef64f270cffe8331915ccacdb089ce7746995fcf71ad3772e821364,2024-11-18T17:11:56.587000 CVE-2024-11243,0,0,0ff1388c8ef64f270cffe8331915ccacdb089ce7746995fcf71ad3772e821364,2024-11-18T17:11:56.587000
CVE-2024-11244,0,0,a10509bbd4fa7611874cdfc9b96d4cded99faa29683a34e350fd40f4b0d3b846,2024-11-20T14:36:24.190000 CVE-2024-11244,0,0,a10509bbd4fa7611874cdfc9b96d4cded99faa29683a34e350fd40f4b0d3b846,2024-11-20T14:36:24.190000
@ -243394,14 +243413,14 @@ CVE-2024-11303,0,0,9a7b9cae0b372cb4b98a9231cfc4f16e7c249eea5ffb75fac7627cc81c794
CVE-2024-11304,0,0,22a6a21de6b849517c1b7fe4848b5ad6f5a6501b987b4e9deeeaa72b581b93e9,2024-11-18T17:11:17.393000 CVE-2024-11304,0,0,22a6a21de6b849517c1b7fe4848b5ad6f5a6501b987b4e9deeeaa72b581b93e9,2024-11-18T17:11:17.393000
CVE-2024-11305,0,0,84bf85793dd2f7e730f28343594540d39fad7d3215d7e392bc21ef5e70fc3306,2024-11-18T17:11:17.393000 CVE-2024-11305,0,0,84bf85793dd2f7e730f28343594540d39fad7d3215d7e392bc21ef5e70fc3306,2024-11-18T17:11:17.393000
CVE-2024-11306,0,0,f96161b1705d1a04826829d256bacb8fbd4c72fb30642fc50a3d8ff6dcf71d2f,2024-11-18T17:11:17.393000 CVE-2024-11306,0,0,f96161b1705d1a04826829d256bacb8fbd4c72fb30642fc50a3d8ff6dcf71d2f,2024-11-18T17:11:17.393000
CVE-2024-11308,0,1,6ff9b67de84028aa7763ce5c2e8ff0aec72b200de48a58803396e8f36dec9d6f,2024-11-20T15:17:52.307000 CVE-2024-11308,0,0,6ff9b67de84028aa7763ce5c2e8ff0aec72b200de48a58803396e8f36dec9d6f,2024-11-20T15:17:52.307000
CVE-2024-11309,0,1,6e888424e9050c0accba703ff38a56cd409762a0858c79703ae7a989d309e3ea,2024-11-20T15:17:31.497000 CVE-2024-11309,0,0,6e888424e9050c0accba703ff38a56cd409762a0858c79703ae7a989d309e3ea,2024-11-20T15:17:31.497000
CVE-2024-11310,0,1,b8736457bbb6711cec3d3dbab8f9f0fd7e15d1cfb620ff3b79626c3336421894,2024-11-20T15:17:14.693000 CVE-2024-11310,0,0,b8736457bbb6711cec3d3dbab8f9f0fd7e15d1cfb620ff3b79626c3336421894,2024-11-20T15:17:14.693000
CVE-2024-11311,0,1,8863e400e8ba53ebce56483e3063dde3f1e183df672e0973ba20f57166cff956,2024-11-20T15:17:01.367000 CVE-2024-11311,0,0,8863e400e8ba53ebce56483e3063dde3f1e183df672e0973ba20f57166cff956,2024-11-20T15:17:01.367000
CVE-2024-11312,0,1,47c631428ee31ff974ee21755583eeecc572701cd5c627d74250c06df5188776,2024-11-20T15:16:50.943000 CVE-2024-11312,0,0,47c631428ee31ff974ee21755583eeecc572701cd5c627d74250c06df5188776,2024-11-20T15:16:50.943000
CVE-2024-11313,0,1,54cbfe18e9f9ec4cec89510df9ece23bf28d5a2015bcc6d7f6abc41521dde19a,2024-11-20T15:16:41.033000 CVE-2024-11313,0,0,54cbfe18e9f9ec4cec89510df9ece23bf28d5a2015bcc6d7f6abc41521dde19a,2024-11-20T15:16:41.033000
CVE-2024-11314,0,1,246dedf95548c9e98cc9b4c3a9d38990919f55537fa02d10de1bc950b9d7f7bc,2024-11-20T15:16:25.653000 CVE-2024-11314,0,0,246dedf95548c9e98cc9b4c3a9d38990919f55537fa02d10de1bc950b9d7f7bc,2024-11-20T15:16:25.653000
CVE-2024-11315,0,1,1e40368af4a59fc021b722b7bfa068a2b5cf4504701d2e4dd12e6291f7427d58,2024-11-20T15:16:14.550000 CVE-2024-11315,0,0,1e40368af4a59fc021b722b7bfa068a2b5cf4504701d2e4dd12e6291f7427d58,2024-11-20T15:16:14.550000
CVE-2024-11318,0,0,9febe7cf088687dfbeb6d2d8f74590e0f8059ffca33de9b68ad34437f87d2118,2024-11-18T17:11:17.393000 CVE-2024-11318,0,0,9febe7cf088687dfbeb6d2d8f74590e0f8059ffca33de9b68ad34437f87d2118,2024-11-18T17:11:17.393000
CVE-2024-11319,0,0,10049ab876319f9ecb08a7b21cc61880e37e90d0ecd4d79058dbd3eba0407f5e,2024-11-20T14:59:38.297000 CVE-2024-11319,0,0,10049ab876319f9ecb08a7b21cc61880e37e90d0ecd4d79058dbd3eba0407f5e,2024-11-20T14:59:38.297000
CVE-2024-1132,0,0,3de6e62885ac8497a4c1d8f4950ebedc171b13b33dfedd6a9eea9ae164fd993a,2024-07-03T01:45:01.507000 CVE-2024-1132,0,0,3de6e62885ac8497a4c1d8f4950ebedc171b13b33dfedd6a9eea9ae164fd993a,2024-07-03T01:45:01.507000
@ -243425,11 +243444,17 @@ CVE-2024-1145,0,0,fa713ba5e7e18de90151eee1a4726d9f9f0863a5fccb48575e3f29ec11b883
CVE-2024-1146,0,0,c681ac136637104b7d43e23a49d30f381f11dad3f3f7ec48919504256a9e5b2a,2024-03-19T13:26:46 CVE-2024-1146,0,0,c681ac136637104b7d43e23a49d30f381f11dad3f3f7ec48919504256a9e5b2a,2024-03-19T13:26:46
CVE-2024-1147,0,0,5da69e40e8a720c3c3c366cde1a8363ffbcff6346e82168cfd4c7602d33328bd,2024-03-21T12:58:51.093000 CVE-2024-1147,0,0,5da69e40e8a720c3c3c366cde1a8363ffbcff6346e82168cfd4c7602d33328bd,2024-03-21T12:58:51.093000
CVE-2024-1148,0,0,55b3cfe72144d3f21629750ac052bc7072169844e3b194a6a00d557d611fa424,2024-03-21T12:58:51.093000 CVE-2024-1148,0,0,55b3cfe72144d3f21629750ac052bc7072169844e3b194a6a00d557d611fa424,2024-03-21T12:58:51.093000
CVE-2024-11484,1,1,3aa464aa114e9a16609d997b5976852f2e09e31f2772cc684ca98d8b57443e5b,2024-11-20T16:15:19.623000 CVE-2024-11484,0,0,3aa464aa114e9a16609d997b5976852f2e09e31f2772cc684ca98d8b57443e5b,2024-11-20T16:15:19.623000
CVE-2024-11485,1,1,06e5567ffff9bf5762cacb559e6f60057c15b345cd5b497e93c1b41dfe58bb98,2024-11-20T16:15:19.990000 CVE-2024-11485,0,0,06e5567ffff9bf5762cacb559e6f60057c15b345cd5b497e93c1b41dfe58bb98,2024-11-20T16:15:19.990000
CVE-2024-11486,1,1,7c15b276c5e10bb30088f41a466046358ea98a2439e6b7be46e2551e1312d436,2024-11-20T16:15:20.273000 CVE-2024-11486,0,0,7c15b276c5e10bb30088f41a466046358ea98a2439e6b7be46e2551e1312d436,2024-11-20T16:15:20.273000
CVE-2024-11487,1,1,4dc442ecc0e78fa6f11201dcdffd8036378dd9553b06e5d3bd37c1017aa4a005,2024-11-20T16:15:20.543000 CVE-2024-11487,0,0,4dc442ecc0e78fa6f11201dcdffd8036378dd9553b06e5d3bd37c1017aa4a005,2024-11-20T16:15:20.543000
CVE-2024-11488,1,1,34165f0c813abb9abfee75c83d1b1b40280912f4e239f105712914e94bd63ded,2024-11-20T17:15:14.097000
CVE-2024-11489,1,1,d049b5ca44808d39c4b7cf14a9c92d411e742ce240269b63810bd4e5434ce388,2024-11-20T17:15:14.847000
CVE-2024-1149,0,0,b02f2ba30bfd9b077afbf478cdb43cc9b464ca358abc4a5e9f7416d9d1b2fcff,2024-02-15T17:52:08.970000 CVE-2024-1149,0,0,b02f2ba30bfd9b077afbf478cdb43cc9b464ca358abc4a5e9f7416d9d1b2fcff,2024-02-15T17:52:08.970000
CVE-2024-11490,1,1,d294f3c38443dcd020e5ea017596df459d37913b92096d63a59a27081dd35077,2024-11-20T17:15:15.637000
CVE-2024-11491,1,1,02077d131042a2b8c0e7fccccde442b38220ee5d1826aa568f8f9e4b16f9ebb9,2024-11-20T17:15:16.397000
CVE-2024-11492,1,1,d4e1d6df577e501fd3b6a404785d87e1988a7abce6229191e4d8c1c008a388dc,2024-11-20T18:15:22.403000
CVE-2024-11493,1,1,296e3b8a96345bb7228b40375399765470fa3ea89cf10c3cfe96f69eb025afa1,2024-11-20T18:15:22.700000
CVE-2024-11494,0,0,5890d4fb88df3d8f55b6792aa5c18e107344b1b8b9d64b1485bac263c175d055,2024-11-20T10:15:05.920000 CVE-2024-11494,0,0,5890d4fb88df3d8f55b6792aa5c18e107344b1b8b9d64b1485bac263c175d055,2024-11-20T10:15:05.920000
CVE-2024-11495,0,0,79062961a6b5f76603192d58576bb23157ae662ae3c66c7b46038e4fdb4d0e00,2024-11-20T13:15:04.197000 CVE-2024-11495,0,0,79062961a6b5f76603192d58576bb23157ae662ae3c66c7b46038e4fdb4d0e00,2024-11-20T13:15:04.197000
CVE-2024-1150,0,0,b47a3c09b3a331a50594ab70df2061c7818f30992462806b6f5b7a310a00b60b,2024-02-15T17:42:08.113000 CVE-2024-1150,0,0,b47a3c09b3a331a50594ab70df2061c7818f30992462806b6f5b7a310a00b60b,2024-02-15T17:42:08.113000
@ -244658,14 +244683,14 @@ CVE-2024-20521,0,0,1256f22cccdc014ca7c6dcaf50cda0cfa20b26ee2ae968d316f808a9bafa0
CVE-2024-20522,0,0,4751fc0b46eb3f3442a4302d9aa0da06e525e7320f0f9f33ce2b1091dde97b23,2024-10-08T13:48:19.060000 CVE-2024-20522,0,0,4751fc0b46eb3f3442a4302d9aa0da06e525e7320f0f9f33ce2b1091dde97b23,2024-10-08T13:48:19.060000
CVE-2024-20523,0,0,c7bf45998c89086dd758eb4d3eeb25d63406d90c0a145566280d2888a4fab120,2024-10-08T13:48:29.500000 CVE-2024-20523,0,0,c7bf45998c89086dd758eb4d3eeb25d63406d90c0a145566280d2888a4fab120,2024-10-08T13:48:29.500000
CVE-2024-20524,0,0,1ddae342fccf4faf6880cbe25cc035c1903428edec9e63909e1d89933e06b31e,2024-10-08T13:48:58.273000 CVE-2024-20524,0,0,1ddae342fccf4faf6880cbe25cc035c1903428edec9e63909e1d89933e06b31e,2024-10-08T13:48:58.273000
CVE-2024-20525,0,1,59dc4aba92abfcc2162ca7b3403ad6b4b9bb6aac36132511b6d9628b03b2cf8f,2024-11-20T16:54:28.817000 CVE-2024-20525,0,0,59dc4aba92abfcc2162ca7b3403ad6b4b9bb6aac36132511b6d9628b03b2cf8f,2024-11-20T16:54:28.817000
CVE-2024-20526,0,0,d5fdba07e116955c599b0e877c602ebb6ff11ffa39621c07ebd427a3890514dc,2024-10-31T01:08:26.047000 CVE-2024-20526,0,0,d5fdba07e116955c599b0e877c602ebb6ff11ffa39621c07ebd427a3890514dc,2024-10-31T01:08:26.047000
CVE-2024-20527,0,0,5b97cad145233ee1321aefca8fa73ee586d624b90987cf4c6ada4d285abb361e,2024-11-06T18:17:17.287000 CVE-2024-20527,0,0,5b97cad145233ee1321aefca8fa73ee586d624b90987cf4c6ada4d285abb361e,2024-11-06T18:17:17.287000
CVE-2024-20528,0,0,b3c3f841fc75125a5205a35ff3690af41e74ca1d30b8dfbe0ccd5e301de276b1,2024-11-06T18:17:17.287000 CVE-2024-20528,0,0,b3c3f841fc75125a5205a35ff3690af41e74ca1d30b8dfbe0ccd5e301de276b1,2024-11-06T18:17:17.287000
CVE-2024-20529,0,0,96076969e5241dc9fe05d14b6dc343ccece848b95762ec4c7d4c240c2fed43ff,2024-11-06T18:17:17.287000 CVE-2024-20529,0,0,96076969e5241dc9fe05d14b6dc343ccece848b95762ec4c7d4c240c2fed43ff,2024-11-06T18:17:17.287000
CVE-2024-2053,0,0,0d41c4e474c0960eb5e2399ded25845c51347c47ec843b53809f61d1e3d8fe3e,2024-08-06T15:35:13.397000 CVE-2024-2053,0,0,0d41c4e474c0960eb5e2399ded25845c51347c47ec843b53809f61d1e3d8fe3e,2024-08-06T15:35:13.397000
CVE-2024-20530,0,1,89f56ca3c78a2bee9efa6414cc4c34aaa02fa012a996513ec972d77798cf94f1,2024-11-20T16:50:11.577000 CVE-2024-20530,0,0,89f56ca3c78a2bee9efa6414cc4c34aaa02fa012a996513ec972d77798cf94f1,2024-11-20T16:50:11.577000
CVE-2024-20531,0,1,a1be4e70e21c2b78f27afc6cd1463a9bb057753e7415124d68f04116191b7ac2,2024-11-20T16:45:31.467000 CVE-2024-20531,0,0,a1be4e70e21c2b78f27afc6cd1463a9bb057753e7415124d68f04116191b7ac2,2024-11-20T16:45:31.467000
CVE-2024-20532,0,0,c5e3b86428a883a005ddfeab54408d38b0aa49969c41244793809439d0629a98,2024-11-06T18:17:17.287000 CVE-2024-20532,0,0,c5e3b86428a883a005ddfeab54408d38b0aa49969c41244793809439d0629a98,2024-11-06T18:17:17.287000
CVE-2024-20533,0,0,2d986cd55ad911e02b6bda820adc74cdaa2d545d64c7c4f647bb7a6457b580de,2024-11-06T18:17:17.287000 CVE-2024-20533,0,0,2d986cd55ad911e02b6bda820adc74cdaa2d545d64c7c4f647bb7a6457b580de,2024-11-06T18:17:17.287000
CVE-2024-20534,0,0,4f609adec9e97ecff790786fa44ffb0444b615de359923a987bca63ffbcafec7,2024-11-06T18:17:17.287000 CVE-2024-20534,0,0,4f609adec9e97ecff790786fa44ffb0444b615de359923a987bca63ffbcafec7,2024-11-06T18:17:17.287000
@ -245988,7 +246013,7 @@ CVE-2024-22062,0,0,cc06929fe5df33d033a09c6d5b184881dcbf0939fe62637d4555c345e1a11
CVE-2024-22064,0,0,4ab6f1fd7aac8f5f705eb95fc6fb847518aebb95babd98d77adf15137fe26c27,2024-05-14T16:13:02.773000 CVE-2024-22064,0,0,4ab6f1fd7aac8f5f705eb95fc6fb847518aebb95babd98d77adf15137fe26c27,2024-05-14T16:13:02.773000
CVE-2024-22065,0,0,0787c7694397a7c698dcdd055072a6446d70ea428a21429fa1b1a63fb95542eb,2024-10-29T14:34:04.427000 CVE-2024-22065,0,0,0787c7694397a7c698dcdd055072a6446d70ea428a21429fa1b1a63fb95542eb,2024-10-29T14:34:04.427000
CVE-2024-22066,0,0,04a1f5193e3d1cd4c2ff5e8b00e85bd78f3fa88fdda81531a689089e114ff7c4,2024-11-08T14:31:32.933000 CVE-2024-22066,0,0,04a1f5193e3d1cd4c2ff5e8b00e85bd78f3fa88fdda81531a689089e114ff7c4,2024-11-08T14:31:32.933000
CVE-2024-22067,0,1,c456655c795b0e9f1a95ac9b229d8fa4cec627b3a45c315b13702051fa501216,2024-11-20T16:24:47.843000 CVE-2024-22067,0,0,c456655c795b0e9f1a95ac9b229d8fa4cec627b3a45c315b13702051fa501216,2024-11-20T16:24:47.843000
CVE-2024-22068,0,0,0d00619c52fbf410991eb6fb75db8e695c1b871ad9ed5a9a9a67d1976582dc23,2024-10-10T12:51:56.987000 CVE-2024-22068,0,0,0d00619c52fbf410991eb6fb75db8e695c1b871ad9ed5a9a9a67d1976582dc23,2024-10-10T12:51:56.987000
CVE-2024-22069,0,0,4264d807f7b5f6c2c545419e352dc9886522b6dff10818d72b9f5fb46c144466,2024-08-20T17:22:39.500000 CVE-2024-22069,0,0,4264d807f7b5f6c2c545419e352dc9886522b6dff10818d72b9f5fb46c144466,2024-08-20T17:22:39.500000
CVE-2024-2207,0,0,8ee5e243bdeb55079a285867c41b1d92102261a83307cfe5423cbfee70a33969,2024-11-13T17:01:16.850000 CVE-2024-2207,0,0,8ee5e243bdeb55079a285867c41b1d92102261a83307cfe5423cbfee70a33969,2024-11-13T17:01:16.850000
@ -246706,7 +246731,7 @@ CVE-2024-23198,0,0,21e5938f4d74c8281bf8790da1b84875167859241f1d6235396b8f1f5665d
CVE-2024-23201,0,0,2015a286fe1ca1d8b9078d39d11c89a41b6be37be9d18a49416dd892d150a982,2024-11-01T15:35:09.553000 CVE-2024-23201,0,0,2015a286fe1ca1d8b9078d39d11c89a41b6be37be9d18a49416dd892d150a982,2024-11-01T15:35:09.553000
CVE-2024-23203,0,0,35efc69ad503e337d3e396ab83791d4158b674a366899f0534bda8815d3c1835,2024-03-13T22:15:09.117000 CVE-2024-23203,0,0,35efc69ad503e337d3e396ab83791d4158b674a366899f0534bda8815d3c1835,2024-03-13T22:15:09.117000
CVE-2024-23204,0,0,afae0f8b3e19ab8973af8b7a3b489e4bd91d0fdadf5faf2aa71183f3a9158566,2024-03-13T23:15:45.887000 CVE-2024-23204,0,0,afae0f8b3e19ab8973af8b7a3b489e4bd91d0fdadf5faf2aa71183f3a9158566,2024-03-13T23:15:45.887000
CVE-2024-23205,0,1,4697a73bf9bc3e8ddfb255725f1c8d01e58d660cc4bf4e35d026b49c729dc759,2024-11-20T16:35:17.937000 CVE-2024-23205,0,0,4697a73bf9bc3e8ddfb255725f1c8d01e58d660cc4bf4e35d026b49c729dc759,2024-11-20T16:35:17.937000
CVE-2024-23206,0,0,507c84e2d0e52cafc2157e9d16706cbde18b562da92731ec0900997e5c935fac,2024-06-12T10:15:29.787000 CVE-2024-23206,0,0,507c84e2d0e52cafc2157e9d16706cbde18b562da92731ec0900997e5c935fac,2024-06-12T10:15:29.787000
CVE-2024-23207,0,0,3409f59ce48ebab075a426e39ec672741159cf18513a93ddf138321de73422df,2024-01-26T21:23:37.840000 CVE-2024-23207,0,0,3409f59ce48ebab075a426e39ec672741159cf18513a93ddf138321de73422df,2024-01-26T21:23:37.840000
CVE-2024-23208,0,0,fb50bbc6e7452dfc70caf10aadd5a5063e9a046d2405a71df1d4be3aec2b5c7e,2024-10-21T11:35:04.960000 CVE-2024-23208,0,0,fb50bbc6e7452dfc70caf10aadd5a5063e9a046d2405a71df1d4be3aec2b5c7e,2024-10-21T11:35:04.960000
@ -246784,7 +246809,7 @@ CVE-2024-23275,0,0,2c9c1f4d2ca81860bcf12d49a2478f6772035d6cdcedc7473a9a2bfb8f8df
CVE-2024-23276,0,0,b7fa000b367d55e31a4b1c9fd4a1f238256bf2545a07d5e4a633de96f48c7a44,2024-08-28T16:35:09.187000 CVE-2024-23276,0,0,b7fa000b367d55e31a4b1c9fd4a1f238256bf2545a07d5e4a633de96f48c7a44,2024-08-28T16:35:09.187000
CVE-2024-23277,0,0,329d44f192e6d8ad64377bfea1b406324a89ddf322f5987758a35ef433724dec,2024-03-14T20:34:31.303000 CVE-2024-23277,0,0,329d44f192e6d8ad64377bfea1b406324a89ddf322f5987758a35ef433724dec,2024-03-14T20:34:31.303000
CVE-2024-23278,0,0,766bded776e256695874796c761a698226a698abed559def31f9f418b44fbd0e,2024-08-01T13:47:14.363000 CVE-2024-23278,0,0,766bded776e256695874796c761a698226a698abed559def31f9f418b44fbd0e,2024-08-01T13:47:14.363000
CVE-2024-23279,0,0,04cf6340eed14797588fb60b9db6f98aa22f7faf3625a9866457c3db2729515d,2024-03-13T21:15:58.063000 CVE-2024-23279,0,1,0cfac59bec6198ae482efa1723b7740dc16ed21f2d64facdb2439aacd6044ab3,2024-11-20T17:35:23.370000
CVE-2024-2328,0,0,db4dcfea63581146a34d92e0d3290b1bf593c898de5919596eb70f461d745708,2024-05-02T18:00:37.360000 CVE-2024-2328,0,0,db4dcfea63581146a34d92e0d3290b1bf593c898de5919596eb70f461d745708,2024-05-02T18:00:37.360000
CVE-2024-23280,0,0,ddc6f40a9de9d3a8d8165b26792d447c58ff17ce75e5f106261376a7c5e4a9e1,2024-10-31T17:35:02.803000 CVE-2024-23280,0,0,ddc6f40a9de9d3a8d8165b26792d447c58ff17ce75e5f106261376a7c5e4a9e1,2024-10-31T17:35:02.803000
CVE-2024-23281,0,0,4fecacd73d888b14029108fc1accb8e172c50322968d3c217d22a97f8374b808,2024-11-05T22:35:03.703000 CVE-2024-23281,0,0,4fecacd73d888b14029108fc1accb8e172c50322968d3c217d22a97f8374b808,2024-11-05T22:35:03.703000
@ -247017,7 +247042,7 @@ CVE-2024-23559,0,0,1cfe950943db323f850a4ffa6fa09a9e594439fd864c25048ffda399bb0b3
CVE-2024-23560,0,0,611d6f496e671cc0d1d356211a118fce6e543142f0a1a253e80e1a53fcc9dde1,2024-11-06T22:35:04.240000 CVE-2024-23560,0,0,611d6f496e671cc0d1d356211a118fce6e543142f0a1a253e80e1a53fcc9dde1,2024-11-06T22:35:04.240000
CVE-2024-23561,0,0,05ce6bff2b3c083c40d1cefd8ecfe83b9e8bac92f3576a18d3243c6c46e3bef3,2024-11-04T22:35:03.360000 CVE-2024-23561,0,0,05ce6bff2b3c083c40d1cefd8ecfe83b9e8bac92f3576a18d3243c6c46e3bef3,2024-11-04T22:35:03.360000
CVE-2024-23562,0,0,4d517ea8a2763e5506a865d21e69db429e3d16d2d215329e0568829328a2181b,2024-10-23T23:15:12.397000 CVE-2024-23562,0,0,4d517ea8a2763e5506a865d21e69db429e3d16d2d215329e0568829328a2181b,2024-10-23T23:15:12.397000
CVE-2024-2357,0,0,58f4675a1a89325da5d3ee44283ebc42e89a0cdd69475172a4baac455a4ffac1,2024-03-23T03:15:12.690000 CVE-2024-2357,0,1,047100f7d23f6fc4c73eb91b24ba51665a90b521f0f43784e71468339885fec0,2024-11-20T18:35:19.917000
CVE-2024-23576,0,0,adfa1bbd41df2580fc9b0c7a87cd6221bc650972fa1b63f1cdf4b78644242d49,2024-08-01T16:35:05.990000 CVE-2024-23576,0,0,adfa1bbd41df2580fc9b0c7a87cd6221bc650972fa1b63f1cdf4b78644242d49,2024-08-01T16:35:05.990000
CVE-2024-23579,0,0,c21892456c22f0f232ec5c1ceee77db91725955ceae3295921c8e393b52d9988,2024-07-03T01:47:55.687000 CVE-2024-23579,0,0,c21892456c22f0f232ec5c1ceee77db91725955ceae3295921c8e393b52d9988,2024-07-03T01:47:55.687000
CVE-2024-2358,0,0,6f4feaa02ea37cd82e67534651d9f0b2cdac6734cb6d67d953e75bc77e24ca55,2024-05-16T13:03:05.353000 CVE-2024-2358,0,0,6f4feaa02ea37cd82e67534651d9f0b2cdac6734cb6d67d953e75bc77e24ca55,2024-05-16T13:03:05.353000
@ -247146,7 +247171,7 @@ CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582c
CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000 CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000
CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000 CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000
CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000 CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000
CVE-2024-23715,0,0,f67a9429a60abeb20fbda725bf24d3fceb209a0fb34d3921cfadf385f0000ac6,2024-11-19T14:03:09.400000 CVE-2024-23715,0,1,7243fa8d7c0fc8189b10503618634c6b88707441759db0629ff8ade7ded54469,2024-11-20T17:35:23.597000
CVE-2024-23716,0,0,72aa4692fe36e515631363961ebc214b187f38d11478c60001fc03eecbbbe02e,2024-09-12T14:35:11.523000 CVE-2024-23716,0,0,72aa4692fe36e515631363961ebc214b187f38d11478c60001fc03eecbbbe02e,2024-09-12T14:35:11.523000
CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000 CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000
CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000 CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000
@ -248242,7 +248267,7 @@ CVE-2024-25390,0,0,63baed82e2e9879c1206709290d2b37ce21350411219653506ba97bb1a93c
CVE-2024-25391,0,0,f083d5d8cc92a4e93f6f51d3ea7c9f4db1a85aad2a08d21ec44a79a9fc36d60f,2024-08-01T13:47:43.797000 CVE-2024-25391,0,0,f083d5d8cc92a4e93f6f51d3ea7c9f4db1a85aad2a08d21ec44a79a9fc36d60f,2024-08-01T13:47:43.797000
CVE-2024-25392,0,0,a206d17696fcf4904f59efd952331512dcb83b18b402273ed46f576aef4a6d5f,2024-07-03T01:48:47.150000 CVE-2024-25392,0,0,a206d17696fcf4904f59efd952331512dcb83b18b402273ed46f576aef4a6d5f,2024-07-03T01:48:47.150000
CVE-2024-25393,0,0,a5db428aad7c170c9baea9d18a6180462a997ce75098c3cb1498156e5372e220,2024-07-03T01:48:47.993000 CVE-2024-25393,0,0,a5db428aad7c170c9baea9d18a6180462a997ce75098c3cb1498156e5372e220,2024-07-03T01:48:47.993000
CVE-2024-25394,0,1,98b04192db51c94b5b1b0b9a54ff204f5c7c44e447a1e5699b493a7ae5acd0a8,2024-11-20T16:35:18.833000 CVE-2024-25394,0,0,98b04192db51c94b5b1b0b9a54ff204f5c7c44e447a1e5699b493a7ae5acd0a8,2024-11-20T16:35:18.833000
CVE-2024-25395,0,0,56e51d7cdf071865c9c3e88e6e5ac096f849119a0a671dbbfc83351b3b934eaa,2024-07-03T01:48:49.520000 CVE-2024-25395,0,0,56e51d7cdf071865c9c3e88e6e5ac096f849119a0a671dbbfc83351b3b934eaa,2024-07-03T01:48:49.520000
CVE-2024-25398,0,0,1ca4a836d24b5db40e48b55b365c5f32c1298501340103a0d376f4b670c7179a,2024-08-27T21:35:12.350000 CVE-2024-25398,0,0,1ca4a836d24b5db40e48b55b365c5f32c1298501340103a0d376f4b670c7179a,2024-08-27T21:35:12.350000
CVE-2024-25399,0,0,1476dc50a563fb725fe1946b55f2c733462e19d80809e452ba10c245f29defa3,2024-02-28T14:07:00.563000 CVE-2024-25399,0,0,1476dc50a563fb725fe1946b55f2c733462e19d80809e452ba10c245f29defa3,2024-02-28T14:07:00.563000
@ -248958,7 +248983,7 @@ CVE-2024-26278,0,0,a4bf5f7d4f5a8cc66cc891c37bd6872984880cd4b8b9e994fb28df36f06ab
CVE-2024-26279,0,0,495c848487ea7b68d426f27b99de0402b60520a7c129465843fde2c78b15bbc3,2024-07-19T18:53:34.103000 CVE-2024-26279,0,0,495c848487ea7b68d426f27b99de0402b60520a7c129465843fde2c78b15bbc3,2024-07-19T18:53:34.103000
CVE-2024-2628,0,0,09573b659ba12c91153fe41a3eb70641eb4f8cb568e4e66d7b1cdbd070a295c2,2024-08-06T19:35:04.207000 CVE-2024-2628,0,0,09573b659ba12c91153fe41a3eb70641eb4f8cb568e4e66d7b1cdbd070a295c2,2024-08-06T19:35:04.207000
CVE-2024-26280,0,0,50ad290499bb0e7f4914845cafc39bb50b8cd84bff7c79192f6c4ba13a4d77b8,2024-11-01T18:35:03.183000 CVE-2024-26280,0,0,50ad290499bb0e7f4914845cafc39bb50b8cd84bff7c79192f6c4ba13a4d77b8,2024-11-01T18:35:03.183000
CVE-2024-26281,0,0,79880eb9ab547a64badb9469ec54aaf28b8e0e224b4897c69af19cf6a4aea84d,2024-02-22T19:07:27.197000 CVE-2024-26281,0,1,a849d619186af504504fa06c72a1de5232d101cf0e09841ceadc9c64335b2847,2024-11-20T17:35:24.450000
CVE-2024-26282,0,0,2415bbc5102339f312e8121d8b848d8a0ee85368a51aeb48af30bc997a57bc8a,2024-11-06T23:35:00.770000 CVE-2024-26282,0,0,2415bbc5102339f312e8121d8b848d8a0ee85368a51aeb48af30bc997a57bc8a,2024-11-06T23:35:00.770000
CVE-2024-26283,0,0,70b62f66f453e79526730a72f92e1afaa7ba86c4fe8f0536398a3c1b2d56ab73,2024-08-29T20:36:24.750000 CVE-2024-26283,0,0,70b62f66f453e79526730a72f92e1afaa7ba86c4fe8f0536398a3c1b2d56ab73,2024-08-29T20:36:24.750000
CVE-2024-26284,0,0,ba0c5ee2dd708f43860971c13fc5bba83aa42d583abdba9cf972a949bd992a6b,2024-02-22T19:07:27.197000 CVE-2024-26284,0,0,ba0c5ee2dd708f43860971c13fc5bba83aa42d583abdba9cf972a949bd992a6b,2024-02-22T19:07:27.197000
@ -250053,7 +250078,7 @@ CVE-2024-27572,0,0,021a88f3c1ae2bf66877708ae71a24ab68a5a10fe16311950a18df580d61c
CVE-2024-27574,0,0,3445d7e232fea473b297543f2639b454fd942ac9a4758abe8e2e7d31ea60e498,2024-07-03T01:50:42.303000 CVE-2024-27574,0,0,3445d7e232fea473b297543f2639b454fd942ac9a4758abe8e2e7d31ea60e498,2024-07-03T01:50:42.303000
CVE-2024-27575,0,0,be8794a9d53d194bc575e7dee32b34180e95b0c9ca647d9bec212ab94e155297,2024-07-03T01:50:43.093000 CVE-2024-27575,0,0,be8794a9d53d194bc575e7dee32b34180e95b0c9ca647d9bec212ab94e155297,2024-07-03T01:50:43.093000
CVE-2024-2758,0,0,83f18458ab99013ac8c623c0e7eb4bfe2c9f8eaa4e32e7c3d8c905cc1a10e95f,2024-10-30T19:35:10.840000 CVE-2024-2758,0,0,83f18458ab99013ac8c623c0e7eb4bfe2c9f8eaa4e32e7c3d8c905cc1a10e95f,2024-10-30T19:35:10.840000
CVE-2024-2759,0,0,e8d40e2aa3d5ddadb06d4937582d68fa485ec4260787871b32ec114c396183da,2024-10-10T16:15:08.360000 CVE-2024-2759,0,1,8fccf2a38a3368754121197f810ef4f77572bc3639a0dab551027dac0b629c6b,2024-11-20T18:35:20.200000
CVE-2024-27592,0,0,2bb1866167f07ee9274a3bf581a1ca5a19a85b09e387c0707a33412074dd7fff,2024-11-14T20:35:16.207000 CVE-2024-27592,0,0,2bb1866167f07ee9274a3bf581a1ca5a19a85b09e387c0707a33412074dd7fff,2024-11-14T20:35:16.207000
CVE-2024-27593,0,0,029f3c2e91f81eb13ffd203db20809d92acce3f5ac8b5078e84e11d1f4fdb2ab,2024-07-03T01:50:43.897000 CVE-2024-27593,0,0,029f3c2e91f81eb13ffd203db20809d92acce3f5ac8b5078e84e11d1f4fdb2ab,2024-07-03T01:50:43.897000
CVE-2024-2760,0,0,85c06c3412f2f06c20f37186e39e8f13a8e65a1960bf456bbd20de54d50a8907,2024-09-05T23:15:12.103000 CVE-2024-2760,0,0,85c06c3412f2f06c20f37186e39e8f13a8e65a1960bf456bbd20de54d50a8907,2024-09-05T23:15:12.103000
@ -250425,7 +250450,7 @@ CVE-2024-28064,0,0,5db58ab15827f5d89b98fe3165771037627d7f9c473b580f2abd9ddc572df
CVE-2024-28065,0,0,e0f1de1046eacd4012e9d6249d2050e67e395f04094ef510445210074f331722,2024-04-08T18:49:25.863000 CVE-2024-28065,0,0,e0f1de1046eacd4012e9d6249d2050e67e395f04094ef510445210074f331722,2024-04-08T18:49:25.863000
CVE-2024-28066,0,0,c2a2736221464f46eb769fe0b6456e8f036fffd40dc0d59a61172bd4b1ad730b,2024-08-15T15:35:07.070000 CVE-2024-28066,0,0,c2a2736221464f46eb769fe0b6456e8f036fffd40dc0d59a61172bd4b1ad730b,2024-08-15T15:35:07.070000
CVE-2024-28067,0,0,a4ab36c1a0f02cd85391b8205ae6018b62f1e3ce44037e321802482d111c11e9,2024-10-30T19:35:09.503000 CVE-2024-28067,0,0,a4ab36c1a0f02cd85391b8205ae6018b62f1e3ce44037e321802482d111c11e9,2024-10-30T19:35:09.503000
CVE-2024-28068,0,0,bc3074d56d7203ab69c965398848e97ee8558e2f286e7ec5251e1ecf155f732a,2024-07-11T13:06:13.187000 CVE-2024-28068,0,1,4fbfbac86c2329a3432aa6f25961e53ef015ff37937ef76408aee78939ca2066,2024-11-20T17:35:25.313000
CVE-2024-28069,0,0,c685346bb55bf7387451d2fbf1405ced89c60d435f78a40193e6458bfa4c25b5,2024-08-02T21:35:20.240000 CVE-2024-28069,0,0,c685346bb55bf7387451d2fbf1405ced89c60d435f78a40193e6458bfa4c25b5,2024-08-02T21:35:20.240000
CVE-2024-2807,0,0,72cbbe4530c555d4dd2940aeac6ca3cb99d0e169b305a79bbc9962a7b891ce9f,2024-05-17T02:38:31.100000 CVE-2024-2807,0,0,72cbbe4530c555d4dd2940aeac6ca3cb99d0e169b305a79bbc9962a7b891ce9f,2024-05-17T02:38:31.100000
CVE-2024-28070,0,0,b02bed99aa18fb94d77393e8a0bab2512136cfff81f1cb82c2c934d3f0ee20db,2024-03-17T22:38:29.433000 CVE-2024-28070,0,0,b02bed99aa18fb94d77393e8a0bab2512136cfff81f1cb82c2c934d3f0ee20db,2024-03-17T22:38:29.433000
@ -251272,6 +251297,7 @@ CVE-2024-29278,0,0,1c7d83867b262b09f27588e31bf9841e3af6bdfc0d72746f40dee1d45734a
CVE-2024-2928,0,0,1d00a619d6223f6fddadfce8ecd76fa5d6f829b8d361b3e4066e910bc6258ce4,2024-10-11T15:28:03.530000 CVE-2024-2928,0,0,1d00a619d6223f6fddadfce8ecd76fa5d6f829b8d361b3e4066e910bc6258ce4,2024-10-11T15:28:03.530000
CVE-2024-2929,0,0,513249311f09defaddca00249c92a4d2f3037014552979e20d0e342694062636,2024-03-26T17:09:53.043000 CVE-2024-2929,0,0,513249311f09defaddca00249c92a4d2f3037014552979e20d0e342694062636,2024-03-26T17:09:53.043000
CVE-2024-29291,0,0,63e881e67f8d85b826801f0c870d1358f1a422a57593ef79bb6bae9024abdbc2,2024-08-02T01:15:58.367000 CVE-2024-29291,0,0,63e881e67f8d85b826801f0c870d1358f1a422a57593ef79bb6bae9024abdbc2,2024-08-02T01:15:58.367000
CVE-2024-29292,1,1,f9ce2bfafc7aec21107dd061a2982af230bf54b887c310d3c057e28ff4639d7d,2024-11-20T18:15:22.970000
CVE-2024-29296,0,0,196ce9fc64e2de40c4aad14cdb78662ded04058e63416a22f9fb231921284e33,2024-08-01T13:49:29.143000 CVE-2024-29296,0,0,196ce9fc64e2de40c4aad14cdb78662ded04058e63416a22f9fb231921284e33,2024-08-01T13:49:29.143000
CVE-2024-2930,0,0,2e48243b295a8e93d53a35219b2be0089b750f595ca7624319aaf969e99aaaca,2024-05-17T02:38:37.687000 CVE-2024-2930,0,0,2e48243b295a8e93d53a35219b2be0089b750f595ca7624319aaf969e99aaaca,2024-05-17T02:38:37.687000
CVE-2024-29301,0,0,fd6e891fb9a2f358e58da35cd58c20873301588e91f1b0a5190d88e70e1e8b21,2024-08-05T15:35:14.157000 CVE-2024-29301,0,0,fd6e891fb9a2f358e58da35cd58c20873301588e91f1b0a5190d88e70e1e8b21,2024-08-05T15:35:14.157000
@ -251993,7 +252019,7 @@ CVE-2024-30310,0,0,21368fdcf4a9e18a31e2b9852298271dcdaa60df59c08c1dc5b448b5ec3f2
CVE-2024-30311,0,0,9aaaf7a631f27c18ba0d6e026b9e5bc097be151497f5f87035ce25407b016799,2024-06-10T18:15:30.757000 CVE-2024-30311,0,0,9aaaf7a631f27c18ba0d6e026b9e5bc097be151497f5f87035ce25407b016799,2024-06-10T18:15:30.757000
CVE-2024-30312,0,0,f08a9328fc0df8fc97205027f081abf4a30dc22420a8570eec8a2d548e77aee7,2024-06-10T18:15:30.880000 CVE-2024-30312,0,0,f08a9328fc0df8fc97205027f081abf4a30dc22420a8570eec8a2d548e77aee7,2024-06-10T18:15:30.880000
CVE-2024-30314,0,0,001958112e812873f2afe024af602bc1e18aaeafca421eccd7dc6e99cd4f7d19,2024-05-22T08:15:09.777000 CVE-2024-30314,0,0,001958112e812873f2afe024af602bc1e18aaeafca421eccd7dc6e99cd4f7d19,2024-05-22T08:15:09.777000
CVE-2024-3032,0,1,23903a6cbcf453fd38d8d4b287e955f74e9435539a64a2e4e4033c0e9a9a2ffa,2024-11-20T15:09:42.557000 CVE-2024-3032,0,0,23903a6cbcf453fd38d8d4b287e955f74e9435539a64a2e4e4033c0e9a9a2ffa,2024-11-20T15:09:42.557000
CVE-2024-30321,0,0,77e82c6b15f80502cfe967b03a0cf5e1edff68cc4e25f0455ce9c65c8c4bfbce,2024-11-12T13:15:07.503000 CVE-2024-30321,0,0,77e82c6b15f80502cfe967b03a0cf5e1edff68cc4e25f0455ce9c65c8c4bfbce,2024-11-12T13:15:07.503000
CVE-2024-30322,0,0,f4e26e42e44429b86d19dca1655fc9b0e6d4cf366473cd59d34a3fd4371a1053,2024-04-03T17:24:18.150000 CVE-2024-30322,0,0,f4e26e42e44429b86d19dca1655fc9b0e6d4cf366473cd59d34a3fd4371a1053,2024-04-03T17:24:18.150000
CVE-2024-30323,0,0,d6d47200d4c92fd98c85bfb81a96ff4ecd5c84bf8181d1e9578fd9917f267b5b,2024-04-03T17:24:18.150000 CVE-2024-30323,0,0,d6d47200d4c92fd98c85bfb81a96ff4ecd5c84bf8181d1e9578fd9917f267b5b,2024-04-03T17:24:18.150000
@ -252149,7 +252175,7 @@ CVE-2024-30473,0,0,cc643ea6610c054923dcda820bdbaeee3470f2fed9befe993862cdd8d5602
CVE-2024-30477,0,0,2a9c94bd63166efd66be5d42497334130f49f4b0acff68b2e8385a53a877c218,2024-04-01T01:12:59.077000 CVE-2024-30477,0,0,2a9c94bd63166efd66be5d42497334130f49f4b0acff68b2e8385a53a877c218,2024-04-01T01:12:59.077000
CVE-2024-30478,0,0,8648debe6405c1216a86c901736f7e8905eccc7e01f0ae6ab2126aef21a3be15,2024-04-01T01:12:59.077000 CVE-2024-30478,0,0,8648debe6405c1216a86c901736f7e8905eccc7e01f0ae6ab2126aef21a3be15,2024-04-01T01:12:59.077000
CVE-2024-30479,0,0,dc5972e51ae5c4d9085a312951d31c7a1307033adf582d496a71c4016c267016,2024-05-17T18:36:05.263000 CVE-2024-30479,0,0,dc5972e51ae5c4d9085a312951d31c7a1307033adf582d496a71c4016c267016,2024-05-17T18:36:05.263000
CVE-2024-3048,0,0,fa4900ea10dd8f36641da2f2e00eb4a29f244493fbe084bf6e2111bcb8599925,2024-04-26T12:58:17.720000 CVE-2024-3048,0,1,f9feeaa162c2ed25a6f521625ce5d52a1c23a8331ff895073074f6c4f57088c6,2024-11-20T18:35:21.557000
CVE-2024-30480,0,0,b33b7f57a3321cd5daad33e04d6baf951eb974f794b47e5823d0c4fbb0662cf8,2024-05-17T18:36:05.263000 CVE-2024-30480,0,0,b33b7f57a3321cd5daad33e04d6baf951eb974f794b47e5823d0c4fbb0662cf8,2024-05-17T18:36:05.263000
CVE-2024-30481,0,0,f260eed3e75ce7805654963acb1b9a08407e71ffc153893529b554eea634e098,2024-10-08T20:49:44.620000 CVE-2024-30481,0,0,f260eed3e75ce7805654963acb1b9a08407e71ffc153893529b554eea634e098,2024-10-08T20:49:44.620000
CVE-2024-30482,0,0,10ca3e420c318bd7efd1d9ff7c0685797885e5c3c9336d5f9e0ee32d2856df9c,2024-04-01T01:12:59.077000 CVE-2024-30482,0,0,10ca3e420c318bd7efd1d9ff7c0685797885e5c3c9336d5f9e0ee32d2856df9c,2024-04-01T01:12:59.077000
@ -252374,7 +252400,7 @@ CVE-2024-30736,0,0,2ced33d674490f24caa86d9cd5af28449006fe8e43616ef44cf265003015a
CVE-2024-30737,0,0,061625de72d7496c66f4433249e7e460e27160d9df381544095455b128a43032,2024-05-27T01:15:20.303000 CVE-2024-30737,0,0,061625de72d7496c66f4433249e7e460e27160d9df381544095455b128a43032,2024-05-27T01:15:20.303000
CVE-2024-3074,0,0,692263c5307e015d32e912e35fe257a32ec29872ecbd1850dca3dc8eb976c202,2024-05-02T18:00:37.360000 CVE-2024-3074,0,0,692263c5307e015d32e912e35fe257a32ec29872ecbd1850dca3dc8eb976c202,2024-05-02T18:00:37.360000
CVE-2024-3075,0,0,03cbf98d3e79eb701c4183fdc55446e630b64ce247873cfbbe161828125e0010,2024-04-26T12:58:17.720000 CVE-2024-3075,0,0,03cbf98d3e79eb701c4183fdc55446e630b64ce247873cfbbe161828125e0010,2024-04-26T12:58:17.720000
CVE-2024-3076,0,0,f5e4ecd6010f850ce7c9ea3227c722ea9369b54502ce12bf5737b2c25454d1b2,2024-04-26T15:32:22.523000 CVE-2024-3076,0,1,aa6fc3b51d3057a74b1d22b857f3c37eb304520775132fc3224dcd14e2c0d120,2024-11-20T18:35:21.813000
CVE-2024-3077,0,0,13d0f653548f6e08a428cbd5c76a54d70134d49ca71fc1c43b86001e7767738f,2024-03-29T12:45:02.937000 CVE-2024-3077,0,0,13d0f653548f6e08a428cbd5c76a54d70134d49ca71fc1c43b86001e7767738f,2024-03-29T12:45:02.937000
CVE-2024-3078,0,0,42b453b3e6a827e37a8a77bcf4c4ca7669e48d95d9df326c975a16f05e6cc7f4,2024-05-17T02:39:42.337000 CVE-2024-3078,0,0,42b453b3e6a827e37a8a77bcf4c4ca7669e48d95d9df326c975a16f05e6cc7f4,2024-05-17T02:39:42.337000
CVE-2024-3079,0,0,f1f95675216f703c162f7205baecbbd680e7e08a69a3f6cb5ab9f6df26e36eab,2024-06-17T12:43:31.090000 CVE-2024-3079,0,0,f1f95675216f703c162f7205baecbbd680e7e08a69a3f6cb5ab9f6df26e36eab,2024-06-17T12:43:31.090000
@ -253851,7 +253877,7 @@ CVE-2024-32806,0,0,03e8d32999c3a5efc79b13bc3e4fb18e94e6d99ea0a7399671612649aa44b
CVE-2024-32807,0,0,5fcb2610b0f8f7193730bfceb1c8cf9ee7f988425363a4303f2b55142270c2db,2024-05-17T10:15:10.997000 CVE-2024-32807,0,0,5fcb2610b0f8f7193730bfceb1c8cf9ee7f988425363a4303f2b55142270c2db,2024-05-17T10:15:10.997000
CVE-2024-32808,0,0,0e1a2b235c3b7bd46a18d577ca8639513bc942571c1f797d2fd3e36c55454f3d,2024-04-24T13:39:42.883000 CVE-2024-32808,0,0,0e1a2b235c3b7bd46a18d577ca8639513bc942571c1f797d2fd3e36c55454f3d,2024-04-24T13:39:42.883000
CVE-2024-32809,0,0,d55b0fbad69973f351986c9fcc53d0cd143d959400089a8fce8f63772d8e13b1,2024-05-17T18:35:35.070000 CVE-2024-32809,0,0,d55b0fbad69973f351986c9fcc53d0cd143d959400089a8fce8f63772d8e13b1,2024-05-17T18:35:35.070000
CVE-2024-3281,0,0,7a90ab032af4fdd3d116d1ee3cc663c192a5c7c317678b1801d5faf94d6f70aa,2024-04-10T13:24:22.187000 CVE-2024-3281,0,1,de7ffacc35df72293a3157176532645298406fac4e018f3e7cd35c3df239f98c,2024-11-20T18:35:22.063000
CVE-2024-32810,0,0,6a865bd7e3c08616d003142afb839e5afabf0b835ab7b19d068e7100b21221a2,2024-05-03T12:48:41.067000 CVE-2024-32810,0,0,6a865bd7e3c08616d003142afb839e5afabf0b835ab7b19d068e7100b21221a2,2024-05-03T12:48:41.067000
CVE-2024-32811,0,0,638081b1e5b1b690a9536c1d45979321fbdc88533eddc89e04dcc94ec3198760,2024-06-10T02:52:08.267000 CVE-2024-32811,0,0,638081b1e5b1b690a9536c1d45979321fbdc88533eddc89e04dcc94ec3198760,2024-06-10T02:52:08.267000
CVE-2024-32812,0,0,86238ccef9a58545902a9744b568cff6fc1f9270a86a5025dcc4c13bf66f2c0c,2024-04-24T13:39:42.883000 CVE-2024-32812,0,0,86238ccef9a58545902a9744b568cff6fc1f9270a86a5025dcc4c13bf66f2c0c,2024-04-24T13:39:42.883000
@ -254773,7 +254799,7 @@ CVE-2024-34084,0,0,7d9440ddf04c82559a24e924ee696f81ed9dcd7a55ec24907b743742e82c1
CVE-2024-34085,0,0,5d94e0e1234d28ea1392eb258fba225a24d0a9939e78b10ffa8b6f875a256c7c,2024-05-14T19:17:55.627000 CVE-2024-34085,0,0,5d94e0e1234d28ea1392eb258fba225a24d0a9939e78b10ffa8b6f875a256c7c,2024-05-14T19:17:55.627000
CVE-2024-34086,0,0,104df8351545cea86a5aeab75846aeda1282b00a21f2f9f835c10597aaf719fa,2024-05-14T19:17:55.627000 CVE-2024-34086,0,0,104df8351545cea86a5aeab75846aeda1282b00a21f2f9f835c10597aaf719fa,2024-05-14T19:17:55.627000
CVE-2024-34087,0,0,b43933510c12517787f75bed2112cdd5360e703f06365c71649e9989d251d8cd,2024-08-28T16:35:22.590000 CVE-2024-34087,0,0,b43933510c12517787f75bed2112cdd5360e703f06365c71649e9989d251d8cd,2024-08-28T16:35:22.590000
CVE-2024-34088,0,0,6e1eb2987ec69271c7f130ee4d6c05bf54d17671e3eeb9426a758a6cc9ddbdcb,2024-04-30T19:35:36.960000 CVE-2024-34088,0,1,a80408224d364ca41e4a201f640dddc7eb78225a35e7bd8d6873b90011d1813f,2024-11-20T17:35:26.147000
CVE-2024-34089,0,0,5e7107f526e1d12d254978d5169bae34a870123e709df2c6ba63a16f1fef24b8,2024-05-06T19:53:38.797000 CVE-2024-34089,0,0,5e7107f526e1d12d254978d5169bae34a870123e709df2c6ba63a16f1fef24b8,2024-05-06T19:53:38.797000
CVE-2024-34090,0,0,bd5741ae5c881eed969a6846397df746acefb1b3b796191e30ee091ebe5a715d,2024-11-01T20:35:10.933000 CVE-2024-34090,0,0,bd5741ae5c881eed969a6846397df746acefb1b3b796191e30ee091ebe5a715d,2024-11-01T20:35:10.933000
CVE-2024-34091,0,0,316b2e1c1466fafa03f21d7850553c09c4a77fce34562e440629956736be2b9a,2024-07-03T01:59:22.050000 CVE-2024-34091,0,0,316b2e1c1466fafa03f21d7850553c09c4a77fce34562e440629956736be2b9a,2024-07-03T01:59:22.050000
@ -254954,7 +254980,7 @@ CVE-2024-34361,0,0,5168cc961b7acd32b3151096d37c0368d10fe552c02e8547e9bea1142d188
CVE-2024-34362,0,0,5719c5589fbb1889037578d1ce8361ba73ba257d793c16ea51ae0d2d5ac6391c,2024-06-12T13:29:07.643000 CVE-2024-34362,0,0,5719c5589fbb1889037578d1ce8361ba73ba257d793c16ea51ae0d2d5ac6391c,2024-06-12T13:29:07.643000
CVE-2024-34363,0,0,29fcce7b6e913bdead357ab5b9389335d62a3a260d09f4e099131952c971f5ff,2024-06-11T17:44:14.347000 CVE-2024-34363,0,0,29fcce7b6e913bdead357ab5b9389335d62a3a260d09f4e099131952c971f5ff,2024-06-11T17:44:14.347000
CVE-2024-34364,0,0,16d3b1c447511f5ba065cf18435b78c90cb58ee194acb420be34d56a1e4088a7,2024-06-11T17:20:27.203000 CVE-2024-34364,0,0,16d3b1c447511f5ba065cf18435b78c90cb58ee194acb420be34d56a1e4088a7,2024-06-11T17:20:27.203000
CVE-2024-34365,0,0,052a9c55d263d9f6bcc752c0351fe2cc3f1b3f445147e13ea220b1e1890cf169,2024-08-02T03:15:40.200000 CVE-2024-34365,0,1,2a15532a52d93b882067af0f92df755a1c94eaf5d9ad1f120aa56a5cf6419d41,2024-11-20T17:35:27.017000
CVE-2024-34366,0,0,f5fb53fee5d33e6c04dfd75d1bc82cf4356fcf1cec4db7359e4c88746e95e769,2024-05-06T19:53:38.797000 CVE-2024-34366,0,0,f5fb53fee5d33e6c04dfd75d1bc82cf4356fcf1cec4db7359e4c88746e95e769,2024-05-06T19:53:38.797000
CVE-2024-34367,0,0,b938dbe32bc0f2b2b08fe9afbb49f3e7437c5991332ead460ffded5315763ead,2024-05-06T19:53:38.797000 CVE-2024-34367,0,0,b938dbe32bc0f2b2b08fe9afbb49f3e7437c5991332ead460ffded5315763ead,2024-05-06T19:53:38.797000
CVE-2024-34368,0,0,3be6ba8c94d9b0485281637fbc03b0202fd9deceadc0680ff9568480d31bd12b,2024-05-06T19:53:38.797000 CVE-2024-34368,0,0,3be6ba8c94d9b0485281637fbc03b0202fd9deceadc0680ff9568480d31bd12b,2024-05-06T19:53:38.797000
@ -255075,7 +255101,7 @@ CVE-2024-34481,0,0,e2a3e65c4103fe32da9193eb433184ea87fbd297993203e84b18d9ad821ef
CVE-2024-34483,0,0,6f3bfc57c4ac08b52bc633ea80c521be2c99b03f22d863fb736d441dc611c592,2024-07-03T02:00:16.293000 CVE-2024-34483,0,0,6f3bfc57c4ac08b52bc633ea80c521be2c99b03f22d863fb736d441dc611c592,2024-07-03T02:00:16.293000
CVE-2024-34484,0,0,1f03b9dcfd21c2d1e1e4109b895d9faab7d5dde86fb48f1db146804d6f2ea32a,2024-05-06T12:44:56.377000 CVE-2024-34484,0,0,1f03b9dcfd21c2d1e1e4109b895d9faab7d5dde86fb48f1db146804d6f2ea32a,2024-05-06T12:44:56.377000
CVE-2024-34486,0,0,f93c0e2186ca66e0dc95b1ea19ad0932973e939f81793a6d44ba3fea5b8487f5,2024-08-01T13:52:24.443000 CVE-2024-34486,0,0,f93c0e2186ca66e0dc95b1ea19ad0932973e939f81793a6d44ba3fea5b8487f5,2024-08-01T13:52:24.443000
CVE-2024-34487,0,0,b7a87b83db311954746c44c337769c914868432d37c4805fcdfe8c5bb6239462,2024-05-06T12:44:56.377000 CVE-2024-34487,0,1,f8a502380ab1e377fb91e288027c5b0a32280a04c3867681b304cf44a4ef3e0b,2024-11-20T17:35:27.303000
CVE-2024-34488,0,0,bd1886e792bd0f0be5174d43785b1ee8c3d2805a0b92328a691bf28c3b9e55ad,2024-07-03T02:00:17.670000 CVE-2024-34488,0,0,bd1886e792bd0f0be5174d43785b1ee8c3d2805a0b92328a691bf28c3b9e55ad,2024-07-03T02:00:17.670000
CVE-2024-34489,0,0,98fc4bbdad28e1f470f6bbf8edfd27b4d57977594296e589fe4b4857cec1a304,2024-07-03T02:00:18.727000 CVE-2024-34489,0,0,98fc4bbdad28e1f470f6bbf8edfd27b4d57977594296e589fe4b4857cec1a304,2024-07-03T02:00:18.727000
CVE-2024-34490,0,0,8682749851a19fd719239443e2502b58b0b536d71d97e88f6d39bdad053f0e7a,2024-07-03T02:00:19.953000 CVE-2024-34490,0,0,8682749851a19fd719239443e2502b58b0b536d71d97e88f6d39bdad053f0e7a,2024-07-03T02:00:19.953000
@ -255281,7 +255307,7 @@ CVE-2024-34706,0,0,d37668f824cae92c94d3d4080655a3f7931abe160a13955740cf593692644
CVE-2024-34707,0,0,92351a72b9df02ccb187c386dac1b1a7856d7ac67d7318f75d8c78237ff0f469,2024-05-14T16:12:23.490000 CVE-2024-34707,0,0,92351a72b9df02ccb187c386dac1b1a7856d7ac67d7318f75d8c78237ff0f469,2024-05-14T16:12:23.490000
CVE-2024-34708,0,0,ddcff80f674ca3ed50080eea78a77d561cbc250193cb5d568a1a82a28c5bf6cc,2024-05-14T16:12:23.490000 CVE-2024-34708,0,0,ddcff80f674ca3ed50080eea78a77d561cbc250193cb5d568a1a82a28c5bf6cc,2024-05-14T16:12:23.490000
CVE-2024-34709,0,0,adf6d2b81a5e40a88a3da30770e9ce95dbdae2bb46c4d3799e84ccb57fa2d50c,2024-05-14T16:12:23.490000 CVE-2024-34709,0,0,adf6d2b81a5e40a88a3da30770e9ce95dbdae2bb46c4d3799e84ccb57fa2d50c,2024-05-14T16:12:23.490000
CVE-2024-3471,0,0,37d5fa5373c180db4b5cf77800d262ab0cda510764dcc507d47bfcfad5af4b08,2024-05-02T13:27:25.103000 CVE-2024-3471,0,1,73ff09fc2c28ad3524b5b1ca804dca3bd6fc9f46aa8366de3c284efe7aa3af53,2024-11-20T18:35:22.923000
CVE-2024-34710,0,0,7965ba19eedea6a8e4d4ccc9754ad83b6a2971391afa999b1f4b01b06b69f205,2024-05-21T12:37:59.687000 CVE-2024-34710,0,0,7965ba19eedea6a8e4d4ccc9754ad83b6a2971391afa999b1f4b01b06b69f205,2024-05-21T12:37:59.687000
CVE-2024-34712,0,0,3f1dde6d42ea063d9e476d7cbf6f83ce13ff1b68be852ea9528dcb38a2c181a5,2024-05-14T19:17:55.627000 CVE-2024-34712,0,0,3f1dde6d42ea063d9e476d7cbf6f83ce13ff1b68be852ea9528dcb38a2c181a5,2024-05-14T19:17:55.627000
CVE-2024-34713,0,0,dade094148c26177c5c5e0a9b6aed3312784fd8ef4a22e49caf276d789f44a17,2024-05-14T19:17:55.627000 CVE-2024-34713,0,0,dade094148c26177c5c5e0a9b6aed3312784fd8ef4a22e49caf276d789f44a17,2024-05-14T19:17:55.627000
@ -255432,7 +255458,7 @@ CVE-2024-34929,0,0,80902861c56fffe184d43b652e5b65da73fb217bc0c681573f8c1d15948cf
CVE-2024-3493,0,0,066f7bdb112b4eb90ab428a4a7b97610f00d49e6eb62b740b5f6b8c5b5b2b054,2024-04-16T13:24:07.103000 CVE-2024-3493,0,0,066f7bdb112b4eb90ab428a4a7b97610f00d49e6eb62b740b5f6b8c5b5b2b054,2024-04-16T13:24:07.103000
CVE-2024-34930,0,0,9fb3b8964b5cccf698fe1af2c09b9ebbf2bbb61e30f2dd6c2b71de12b8d3c46b,2024-07-03T02:00:57.490000 CVE-2024-34930,0,0,9fb3b8964b5cccf698fe1af2c09b9ebbf2bbb61e30f2dd6c2b71de12b8d3c46b,2024-07-03T02:00:57.490000
CVE-2024-34931,0,0,6450b229b3dcc76dd273a176e1d510aa697ab04ac79bf201d0e27ca4c52bc840,2024-05-24T01:15:30.977000 CVE-2024-34931,0,0,6450b229b3dcc76dd273a176e1d510aa697ab04ac79bf201d0e27ca4c52bc840,2024-05-24T01:15:30.977000
CVE-2024-34932,0,1,b3ae27f61253f7767fbdf3438e64ca1eae22c4d23e1e356e0c8ba8ab5232e6bc,2024-11-20T16:35:19.057000 CVE-2024-34932,0,0,b3ae27f61253f7767fbdf3438e64ca1eae22c4d23e1e356e0c8ba8ab5232e6bc,2024-11-20T16:35:19.057000
CVE-2024-34933,0,0,c3dbf950f435984b9b33f4f97b61de10305ed6619e3cc02c8a837894fcd24d4d,2024-07-03T02:00:58.450000 CVE-2024-34933,0,0,c3dbf950f435984b9b33f4f97b61de10305ed6619e3cc02c8a837894fcd24d4d,2024-07-03T02:00:58.450000
CVE-2024-34934,0,0,c952d1ae16fc59b4ad6a305c684ff2ae339875de2313f11687526116a6f6a313,2024-08-20T15:35:13.137000 CVE-2024-34934,0,0,c952d1ae16fc59b4ad6a305c684ff2ae339875de2313f11687526116a6f6a313,2024-08-20T15:35:13.137000
CVE-2024-34935,0,0,42663e6f26362b7ff61277b99a542a862a8644dcdaf267511fb39a33d8f4245c,2024-08-01T13:52:27.497000 CVE-2024-34935,0,0,42663e6f26362b7ff61277b99a542a862a8644dcdaf267511fb39a33d8f4245c,2024-08-01T13:52:27.497000
@ -255637,7 +255663,7 @@ CVE-2024-35272,0,0,4c1a47b56d7417b088998b4603214b936945d403bf6190e9e2c7cd926cf7a
CVE-2024-35274,0,0,469db2ced6f82069a481a1e075e780926859c353f46e8b5b311a2688050ba842,2024-11-13T17:01:16.850000 CVE-2024-35274,0,0,469db2ced6f82069a481a1e075e780926859c353f46e8b5b311a2688050ba842,2024-11-13T17:01:16.850000
CVE-2024-3528,0,0,c96e1e132295c243d4fa4a90d8abf77e41d771305ddbcf81d644bca2cdde7da0,2024-05-17T02:39:59.157000 CVE-2024-3528,0,0,c96e1e132295c243d4fa4a90d8abf77e41d771305ddbcf81d644bca2cdde7da0,2024-05-17T02:39:59.157000
CVE-2024-35282,0,0,fe23f4116601299cd085746b33d91adab4014743ea1af63d79bf69af6ebb68e0,2024-09-20T19:44:17.557000 CVE-2024-35282,0,0,fe23f4116601299cd085746b33d91adab4014743ea1af63d79bf69af6ebb68e0,2024-09-20T19:44:17.557000
CVE-2024-35283,0,0,517940d61eca1185fcc5d68a59f62111cbe8fdc81301b4e7c0610afefcc22645,2024-05-29T19:50:25.303000 CVE-2024-35283,0,1,ca0b3f00a38824c3aed71cdb1138e6e91cf615412bca500f8e6650cd8dfad427,2024-11-20T18:35:20.470000
CVE-2024-35284,0,0,3a94c448d00dd5059f3fd361118e6cd65d80e9412861f2d6774f390c6aa71d9d,2024-05-29T19:50:25.303000 CVE-2024-35284,0,0,3a94c448d00dd5059f3fd361118e6cd65d80e9412861f2d6774f390c6aa71d9d,2024-05-29T19:50:25.303000
CVE-2024-35285,0,0,76a41b3575cee58df6a92d4d67ad746bb5986287224218feccad1dc78e0acbbc,2024-10-23T15:12:34.673000 CVE-2024-35285,0,0,76a41b3575cee58df6a92d4d67ad746bb5986287224218feccad1dc78e0acbbc,2024-10-23T15:12:34.673000
CVE-2024-35286,0,0,750facd12e2c01a8ba1e0bf72f7c63f3d0fd7caac4133b6f0d25286457d0ae82,2024-10-23T15:12:34.673000 CVE-2024-35286,0,0,750facd12e2c01a8ba1e0bf72f7c63f3d0fd7caac4133b6f0d25286457d0ae82,2024-10-23T15:12:34.673000
@ -256480,7 +256506,7 @@ CVE-2024-36286,0,0,7d09221a564e0c2df0ff5611559a80db23ca3f0bea1adae57d3ef567da0d5
CVE-2024-36287,0,0,58cd0f96868d0f87ad27a0900cc18166044a8ed0400369c58b15a0b5d92f53af,2024-08-07T16:13:00.603000 CVE-2024-36287,0,0,58cd0f96868d0f87ad27a0900cc18166044a8ed0400369c58b15a0b5d92f53af,2024-08-07T16:13:00.603000
CVE-2024-36288,0,0,f27253452fa242bd38d9e8a6852071d40fc41ce412d6b25543b2bb1fcbe8c01c,2024-07-15T07:15:05.230000 CVE-2024-36288,0,0,f27253452fa242bd38d9e8a6852071d40fc41ce412d6b25543b2bb1fcbe8c01c,2024-07-15T07:15:05.230000
CVE-2024-36289,0,0,c81e4dcba680502adf1e6cb5fb9cf85188de117b98260b47eb77431186ce409a,2024-07-03T02:03:02.973000 CVE-2024-36289,0,0,c81e4dcba680502adf1e6cb5fb9cf85188de117b98260b47eb77431186ce409a,2024-07-03T02:03:02.973000
CVE-2024-3629,0,0,e776b351c13d8fab7d20c1d77ce24b1735377c1f0ada7e55eb9590007cc5c2e8,2024-05-15T16:40:19.330000 CVE-2024-3629,0,1,02f51104eec9b528b26df3269b71deb72cfae6ae02d6f7b5853e996dbdb9db74,2024-11-20T18:35:23.183000
CVE-2024-36294,0,0,ab00c27961eace667f9ea5e5ad7b6cd8c0f468a3668d36549eb32d498e33b135,2024-11-15T14:00:09.720000 CVE-2024-36294,0,0,ab00c27961eace667f9ea5e5ad7b6cd8c0f468a3668d36549eb32d498e33b135,2024-11-15T14:00:09.720000
CVE-2024-3630,0,0,bdc2182e4eec98ff9c8b84bc3c1a34a4c9de2619b28e4dcc17481a1a7a7b6f08,2024-11-07T16:35:19.253000 CVE-2024-3630,0,0,bdc2182e4eec98ff9c8b84bc3c1a34a4c9de2619b28e4dcc17481a1a7a7b6f08,2024-11-07T16:35:19.253000
CVE-2024-36302,0,0,97f37a0491b91273ea881320e1230a32004b42aecc2ad6ef769b0832e9456ade,2024-07-03T02:03:03.750000 CVE-2024-36302,0,0,97f37a0491b91273ea881320e1230a32004b42aecc2ad6ef769b0832e9456ade,2024-07-03T02:03:03.750000
@ -256570,7 +256596,7 @@ CVE-2024-36434,0,0,8fba84c9c20ed6e9e38e371f6a7314cc80d9ab38ed1fc3ffdc1e7c8b52186
CVE-2024-36435,0,0,42aa941ee425d333c537ed403b5f168d15cf55caec805a299bb4c45521e1c947,2024-08-01T13:52:50.527000 CVE-2024-36435,0,0,42aa941ee425d333c537ed403b5f168d15cf55caec805a299bb4c45521e1c947,2024-08-01T13:52:50.527000
CVE-2024-36438,0,0,fcbe2e02dbfe7753ae10ee196c2c3d66e08c15fdea4edc31b3da8e63f435a898,2024-08-01T13:52:51.240000 CVE-2024-36438,0,0,fcbe2e02dbfe7753ae10ee196c2c3d66e08c15fdea4edc31b3da8e63f435a898,2024-08-01T13:52:51.240000
CVE-2024-36439,0,0,53640dcff33bc5be3aae865e96f45e5b04acc4f9a249851cd066fcd8fafec018,2024-08-23T16:18:28.547000 CVE-2024-36439,0,0,53640dcff33bc5be3aae865e96f45e5b04acc4f9a249851cd066fcd8fafec018,2024-08-23T16:18:28.547000
CVE-2024-3644,0,0,5fcc1b95c80e82178a2887dd8939047d13c153da230d7e59629dcecf02b1012a,2024-05-16T13:03:05.353000 CVE-2024-3644,0,1,289cd84d76eba7566a7f3a12e6fe432fd296cc1682decfe552f880b571bb7420,2024-11-20T18:35:23.437000
CVE-2024-36440,0,0,59ab2a39d6c2dd526eff525f8a252fc4b6d83dfd01305d7415645bc4cb89310a,2024-08-23T16:18:28.547000 CVE-2024-36440,0,0,59ab2a39d6c2dd526eff525f8a252fc4b6d83dfd01305d7415645bc4cb89310a,2024-08-23T16:18:28.547000
CVE-2024-36441,0,0,2b88ed4b9b9e3ad047e589055d5c5d9766a5fd9d7690c7cf12f1bc3c5c619d9d,2024-08-23T16:18:28.547000 CVE-2024-36441,0,0,2b88ed4b9b9e3ad047e589055d5c5d9766a5fd9d7690c7cf12f1bc3c5c619d9d,2024-08-23T16:18:28.547000
CVE-2024-36442,0,0,1c399162807c537e1f340452dbe4754afa92739719bfa0084f2ebab835ea4147,2024-08-23T16:18:28.547000 CVE-2024-36442,0,0,1c399162807c537e1f340452dbe4754afa92739719bfa0084f2ebab835ea4147,2024-08-23T16:18:28.547000
@ -256757,7 +256783,7 @@ CVE-2024-36792,0,0,fabceb2ff375c58d64c9553c86e9784f4de9e6f1c14eeb688305657805693
CVE-2024-36795,0,0,421d7caed3f1bfdd012cee0400460351c045d5fa781e1724ee2bfb8de7fe2f98,2024-08-22T16:35:04.130000 CVE-2024-36795,0,0,421d7caed3f1bfdd012cee0400460351c045d5fa781e1724ee2bfb8de7fe2f98,2024-08-22T16:35:04.130000
CVE-2024-3680,0,0,a00e5c81c2599a81ed1e944ed0d1a6cb38236de396da2ad7b68a4f9ced279cbe,2024-05-14T16:11:39.510000 CVE-2024-3680,0,0,a00e5c81c2599a81ed1e944ed0d1a6cb38236de396da2ad7b68a4f9ced279cbe,2024-05-14T16:11:39.510000
CVE-2024-36800,0,0,22057c82ea39171d646a3d69514bfe24d86c6abe66f6737dc702e3f1234458ca,2024-08-22T20:35:16.867000 CVE-2024-36800,0,0,22057c82ea39171d646a3d69514bfe24d86c6abe66f6737dc702e3f1234458ca,2024-08-22T20:35:16.867000
CVE-2024-36801,0,1,c2bf531de1c2a610c941483a05d3e24102f19d33b01ad9c68216ac8cb7184acc,2024-11-20T16:35:19.867000 CVE-2024-36801,0,0,c2bf531de1c2a610c941483a05d3e24102f19d33b01ad9c68216ac8cb7184acc,2024-11-20T16:35:19.867000
CVE-2024-36802,0,0,d90679a1557e63ced02c20ce3a95d6abd566ddbe5bfb37eb5db0c573c610d3f6,2024-06-26T06:15:15.200000 CVE-2024-36802,0,0,d90679a1557e63ced02c20ce3a95d6abd566ddbe5bfb37eb5db0c573c610d3f6,2024-06-26T06:15:15.200000
CVE-2024-3681,0,0,447617aa0ff72974414a3f009efb09a39cced1c45f643ef6f3cd3ded49aa798d,2024-05-02T18:00:37.360000 CVE-2024-3681,0,0,447617aa0ff72974414a3f009efb09a39cced1c45f643ef6f3cd3ded49aa798d,2024-05-02T18:00:37.360000
CVE-2024-36811,0,0,76131c787e3111945e406d523b84d2939422072239845f53446869eacd25ad27,2024-10-28T21:15:04.357000 CVE-2024-36811,0,0,76131c787e3111945e406d523b84d2939422072239845f53446869eacd25ad27,2024-10-28T21:15:04.357000
@ -258205,7 +258231,7 @@ CVE-2024-38596,0,0,46720e55bcd9267a5978001cdabf468fbd47d88589f87bfbfc0df091a7294
CVE-2024-38597,0,0,6c358d88ab1cc72ff393aedcd5fe423ee770c5a3f17802265a5743ec277c9cf5,2024-08-27T18:36:47.313000 CVE-2024-38597,0,0,6c358d88ab1cc72ff393aedcd5fe423ee770c5a3f17802265a5743ec277c9cf5,2024-08-27T18:36:47.313000
CVE-2024-38598,0,0,6997b64945387348ad35d76369c09957b25bff8d2b24a06e77e40994bcbb476f,2024-08-27T18:36:57.630000 CVE-2024-38598,0,0,6997b64945387348ad35d76369c09957b25bff8d2b24a06e77e40994bcbb476f,2024-08-27T18:36:57.630000
CVE-2024-38599,0,0,30a1fe4d2933b9305ccf42078c4cfea08aec9e247b6d735fe9b948c6c8a96f53,2024-07-15T07:15:11.810000 CVE-2024-38599,0,0,30a1fe4d2933b9305ccf42078c4cfea08aec9e247b6d735fe9b948c6c8a96f53,2024-07-15T07:15:11.810000
CVE-2024-3860,0,1,27a00d5a454abc1f2004e6a3c559b934aab3ebf6059bf445f877e47a45b5729c,2024-11-20T16:35:21.687000 CVE-2024-3860,0,0,27a00d5a454abc1f2004e6a3c559b934aab3ebf6059bf445f877e47a45b5729c,2024-11-20T16:35:21.687000
CVE-2024-38600,0,0,6f01059b0d86b91709f99375fdc625d4b6e89a50ed018f8c1ceded934a4f84b9,2024-08-27T16:02:47.373000 CVE-2024-38600,0,0,6f01059b0d86b91709f99375fdc625d4b6e89a50ed018f8c1ceded934a4f84b9,2024-08-27T16:02:47.373000
CVE-2024-38601,0,0,81635fbf930c5251f288be0221fe26c6b2030142ec4fb7ff358af458d07cd268,2024-07-15T07:15:11.943000 CVE-2024-38601,0,0,81635fbf930c5251f288be0221fe26c6b2030142ec4fb7ff358af458d07cd268,2024-07-15T07:15:11.943000
CVE-2024-38602,0,0,02eba94a3d2f10d77d81011dc273bd57fbcb7f7a35d7b986e5851a9bec40a4ca,2024-08-27T16:01:39.983000 CVE-2024-38602,0,0,02eba94a3d2f10d77d81011dc273bd57fbcb7f7a35d7b986e5851a9bec40a4ca,2024-08-27T16:01:39.983000
@ -258569,7 +258595,7 @@ CVE-2024-39173,0,0,7e7488e695a5a0a1cc2cbfd222ab57477e2c94cef7c8b0522ab4aeea25b8c
CVE-2024-39174,0,0,e23d16c301dd77bcbf0c998cdb1fd9e2250ff32896205d07ec7d2fbcb29c498f,2024-07-08T15:49:22.437000 CVE-2024-39174,0,0,e23d16c301dd77bcbf0c998cdb1fd9e2250ff32896205d07ec7d2fbcb29c498f,2024-07-08T15:49:22.437000
CVE-2024-39178,0,0,4ea8e37dcaacf2f946fe933a466396f81b9c59263d7790c31a4f691099ad2885,2024-11-18T19:15:05.310000 CVE-2024-39178,0,0,4ea8e37dcaacf2f946fe933a466396f81b9c59263d7790c31a4f691099ad2885,2024-11-18T19:15:05.310000
CVE-2024-3918,0,0,476a46be6ec9c148a29f5d8b4706a927d6b38a7387c9465eb6003c281a1d7618,2024-05-24T01:15:30.977000 CVE-2024-3918,0,0,476a46be6ec9c148a29f5d8b4706a927d6b38a7387c9465eb6003c281a1d7618,2024-05-24T01:15:30.977000
CVE-2024-39181,0,1,53f78d430de1f3c90ced7f4c31b1c88690ce70fb16be77556622db90677ab162,2024-11-20T16:35:20.850000 CVE-2024-39181,0,0,53f78d430de1f3c90ced7f4c31b1c88690ce70fb16be77556622db90677ab162,2024-11-20T16:35:20.850000
CVE-2024-39182,0,0,51b32df09d912e550efbb72e5951696c8519aefd089e452500578b0d065b1383,2024-08-08T14:35:05.753000 CVE-2024-39182,0,0,51b32df09d912e550efbb72e5951696c8519aefd089e452500578b0d065b1383,2024-08-08T14:35:05.753000
CVE-2024-3919,0,0,33e13c5d81820af884522cd57579a7a0b812a530b82c07df6884548b544ce3e6,2024-08-01T13:56:45.767000 CVE-2024-3919,0,0,33e13c5d81820af884522cd57579a7a0b812a530b82c07df6884548b544ce3e6,2024-08-01T13:56:45.767000
CVE-2024-3920,0,0,d2ca1c7329cc368cadc82dfb98e46c7d8057a15d660865d8baa61df971f7435b,2024-08-09T19:35:09.360000 CVE-2024-3920,0,0,d2ca1c7329cc368cadc82dfb98e46c7d8057a15d660865d8baa61df971f7435b,2024-08-09T19:35:09.360000
@ -258909,7 +258935,7 @@ CVE-2024-39605,0,0,a5d8e60b596ac98c4205247c388074418dc90b00520b572619e1306394829
CVE-2024-39607,0,0,82ab1f90403a4f0d3b9e21e2a488cd41b34ece370e96146e9e8729444d740066,2024-08-01T15:35:17.240000 CVE-2024-39607,0,0,82ab1f90403a4f0d3b9e21e2a488cd41b34ece370e96146e9e8729444d740066,2024-08-01T15:35:17.240000
CVE-2024-39609,0,0,6fd0567e66080bb3875a46402bc6085cc120cf2d6c3a58856814b6539ff05daa,2024-11-19T19:58:29.653000 CVE-2024-39609,0,0,6fd0567e66080bb3875a46402bc6085cc120cf2d6c3a58856814b6539ff05daa,2024-11-19T19:58:29.653000
CVE-2024-3961,0,0,7859b6a2f8e5a01656e72fd209a53f5adaf23f278f08a55d207894f918e1fda9,2024-07-17T13:32:37.647000 CVE-2024-3961,0,0,7859b6a2f8e5a01656e72fd209a53f5adaf23f278f08a55d207894f918e1fda9,2024-07-17T13:32:37.647000
CVE-2024-39610,0,1,78a906525eb532418ee6d458c51f035bb8b9505c7b1742d384bf9dfd00e6f9b8,2024-11-20T15:02:14.297000 CVE-2024-39610,0,0,78a906525eb532418ee6d458c51f035bb8b9505c7b1742d384bf9dfd00e6f9b8,2024-11-20T15:02:14.297000
CVE-2024-39612,0,0,029b5e043f8fa9387c1e935fd25a69e218f8fd7196fe19845233dbfcda84d17e,2024-09-04T16:38:56.383000 CVE-2024-39612,0,0,029b5e043f8fa9387c1e935fd25a69e218f8fd7196fe19845233dbfcda84d17e,2024-09-04T16:38:56.383000
CVE-2024-39613,0,0,a01eb288198c1ee98f509a48683a6028690d03e91539f0fa22857619bc4ca335,2024-09-20T13:59:01.117000 CVE-2024-39613,0,0,a01eb288198c1ee98f509a48683a6028690d03e91539f0fa22857619bc4ca335,2024-09-20T13:59:01.117000
CVE-2024-39614,0,0,80fda44b15f74076f020f7bfc25c89db880e93067c83790f059fc3bf750e00f8,2024-08-01T13:55:55.837000 CVE-2024-39614,0,0,80fda44b15f74076f020f7bfc25c89db880e93067c83790f059fc3bf750e00f8,2024-08-01T13:55:55.837000
@ -259409,7 +259435,7 @@ CVE-2024-40633,0,0,cb8b1e46d2fb0350ee65397b524eda33b035785c4ff54d8f631326909af07
CVE-2024-40634,0,0,f0b1b04d49b6a98a87295b9d83a3ab2b8cbfe90c15ea00701d78a02066d0251e,2024-07-24T12:55:13.223000 CVE-2024-40634,0,0,f0b1b04d49b6a98a87295b9d83a3ab2b8cbfe90c15ea00701d78a02066d0251e,2024-07-24T12:55:13.223000
CVE-2024-40636,0,0,98744b954b3d196b3f10d684008952126f958b809a4f56d792514a1180b74df0,2024-07-18T12:28:43.707000 CVE-2024-40636,0,0,98744b954b3d196b3f10d684008952126f958b809a4f56d792514a1180b74df0,2024-07-18T12:28:43.707000
CVE-2024-40637,0,0,8f01e513c3194bcf30056752321b26e2f21549acaed31b1fc0f5890d359b45ae,2024-07-19T14:37:17.863000 CVE-2024-40637,0,0,8f01e513c3194bcf30056752321b26e2f21549acaed31b1fc0f5890d359b45ae,2024-07-19T14:37:17.863000
CVE-2024-40638,0,1,a7bbe91bcfaaa13b7597aadee35238fb0a87f46bd3b256b00e5face88cc00949,2024-11-20T15:30:37.387000 CVE-2024-40638,0,0,a7bbe91bcfaaa13b7597aadee35238fb0a87f46bd3b256b00e5face88cc00949,2024-11-20T15:30:37.387000
CVE-2024-40639,0,0,8bbb50b2a25542a9b7af4d56fa6e5b2d2c32a2fc32f95961ce4984af08c80bab,2024-07-17T20:15:06.603000 CVE-2024-40639,0,0,8bbb50b2a25542a9b7af4d56fa6e5b2d2c32a2fc32f95961ce4984af08c80bab,2024-07-17T20:15:06.603000
CVE-2024-4064,0,0,3a1a40467a64f04bfa80ae5c066454b06b4092014a9e47cc1a50eb6eb22d315c,2024-05-17T02:40:14.223000 CVE-2024-4064,0,0,3a1a40467a64f04bfa80ae5c066454b06b4092014a9e47cc1a50eb6eb22d315c,2024-05-17T02:40:14.223000
CVE-2024-40640,0,0,7e1f28a17873c57850e387e604bc4923eccdf39126e84bd67e6dd03b6e2f6417,2024-07-18T12:28:43.707000 CVE-2024-40640,0,0,7e1f28a17873c57850e387e604bc4923eccdf39126e84bd67e6dd03b6e2f6417,2024-07-18T12:28:43.707000
@ -260110,8 +260136,8 @@ CVE-2024-41674,0,0,e673b8205e82a534b9a977608e67254dbf60c56054d2121630b866936cabb
CVE-2024-41675,0,0,99d7bb404b6db7a620ac267d34a06ef7dcdda9c80bdd1ecb6c741290a9b47f60,2024-08-23T17:07:28.247000 CVE-2024-41675,0,0,99d7bb404b6db7a620ac267d34a06ef7dcdda9c80bdd1ecb6c741290a9b47f60,2024-08-23T17:07:28.247000
CVE-2024-41676,0,0,f8c727903895dd3f774fa8fafadf4d13b194d23bd32750d21228bccd7e3862a1,2024-08-23T13:44:42.487000 CVE-2024-41676,0,0,f8c727903895dd3f774fa8fafadf4d13b194d23bd32750d21228bccd7e3862a1,2024-08-23T13:44:42.487000
CVE-2024-41677,0,0,350177b79949244cfbc185c5f18aee412a8902a49d36a53e1d4b50536f1effd5,2024-08-12T18:51:29.497000 CVE-2024-41677,0,0,350177b79949244cfbc185c5f18aee412a8902a49d36a53e1d4b50536f1effd5,2024-08-12T18:51:29.497000
CVE-2024-41678,0,1,1e1f47e48910b98d19ecebc471d2f196d6713bab2739668c5f8a5fcb169733b5,2024-11-20T15:21:37.683000 CVE-2024-41678,0,0,1e1f47e48910b98d19ecebc471d2f196d6713bab2739668c5f8a5fcb169733b5,2024-11-20T15:21:37.683000
CVE-2024-41679,0,1,943f9714b883f0bde50b656d218f57684a4c8b6a4c40de85f830dde5e1325f29,2024-11-20T15:21:19.883000 CVE-2024-41679,0,0,943f9714b883f0bde50b656d218f57684a4c8b6a4c40de85f830dde5e1325f29,2024-11-20T15:21:19.883000
CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000 CVE-2024-4168,0,0,7f4f833c88738c683a47d814a058bf8a730868170937a9aca799097bc79bf22f,2024-06-04T19:20:31.690000
CVE-2024-41681,0,0,6dfdc16b96a5715c67e93e3b8e76db2de56f823b305a3ba2f49e1e9df8ebee6d,2024-08-14T18:37:06.540000 CVE-2024-41681,0,0,6dfdc16b96a5715c67e93e3b8e76db2de56f823b305a3ba2f49e1e9df8ebee6d,2024-08-14T18:37:06.540000
CVE-2024-41682,0,0,b98500d64915be62a0e5e2d6d50336319231d8c45c711d39d83e7568c61fc3c7,2024-08-14T18:37:24.413000 CVE-2024-41682,0,0,b98500d64915be62a0e5e2d6d50336319231d8c45c711d39d83e7568c61fc3c7,2024-08-14T18:37:24.413000
@ -261409,8 +261435,8 @@ CVE-2024-43413,0,0,8e6331055eff0a1fc21c13ac1aa5a910957effe87064f315927a5ac8c4d91
CVE-2024-43414,0,0,41d126c00be1a75ca1d7b9b05a3a92eaf49a5d7831c24ad21608856181f8c11a,2024-09-12T21:33:40.887000 CVE-2024-43414,0,0,41d126c00be1a75ca1d7b9b05a3a92eaf49a5d7831c24ad21608856181f8c11a,2024-09-12T21:33:40.887000
CVE-2024-43415,0,0,33623038bce272467978985c7d034b7fd7d9931154f17ac64d12541af9ed8ac3,2024-11-13T19:15:08.580000 CVE-2024-43415,0,0,33623038bce272467978985c7d034b7fd7d9931154f17ac64d12541af9ed8ac3,2024-11-13T19:15:08.580000
CVE-2024-43416,0,0,40511317bce07afc98feefafa1f6dda0a6ec4068936e63f6771ae422dc8a571f,2024-11-19T21:57:56.293000 CVE-2024-43416,0,0,40511317bce07afc98feefafa1f6dda0a6ec4068936e63f6771ae422dc8a571f,2024-11-19T21:57:56.293000
CVE-2024-43417,0,1,98a01f3c648d326021ab363d71d2ee86ebc5cec2b438f65b07a29ef7b2ce7848,2024-11-20T15:21:07.650000 CVE-2024-43417,0,0,98a01f3c648d326021ab363d71d2ee86ebc5cec2b438f65b07a29ef7b2ce7848,2024-11-20T15:21:07.650000
CVE-2024-43418,0,1,095c8b0beb72bf4abaa49fb253f3464e7bd9bdc9a32b2a0922d4be8248869170,2024-11-20T15:20:43.297000 CVE-2024-43418,0,0,095c8b0beb72bf4abaa49fb253f3464e7bd9bdc9a32b2a0922d4be8248869170,2024-11-20T15:20:43.297000
CVE-2024-4342,0,0,2403af0b003f5953a3d2a1b74bf46d64f4a354bc628b01d2ea5f60de4a4002c6,2024-06-03T14:46:24.250000 CVE-2024-4342,0,0,2403af0b003f5953a3d2a1b74bf46d64f4a354bc628b01d2ea5f60de4a4002c6,2024-06-03T14:46:24.250000
CVE-2024-43423,0,0,8fb21f51e563dd938c763581007e890cf5873a7efc6a39a36e929ea32ce34c0c,2024-10-01T15:41:32.537000 CVE-2024-43423,0,0,8fb21f51e563dd938c763581007e890cf5873a7efc6a39a36e929ea32ce34c0c,2024-10-01T15:41:32.537000
CVE-2024-43424,0,0,6d9ffac7d6eb9e50db381baa418d84f2f5d9932ec78b86526bf799eb43b3b4f3,2024-11-05T19:39:33.873000 CVE-2024-43424,0,0,6d9ffac7d6eb9e50db381baa418d84f2f5d9932ec78b86526bf799eb43b3b4f3,2024-11-05T19:39:33.873000
@ -262158,9 +262184,9 @@ CVE-2024-44297,0,0,79b1a7724e5e5ef3ea1a90918f341220daf2a3cd7bb65b3a989c955fd834b
CVE-2024-4430,0,0,137066e4356a4d04e3ad731fb42c3579f278eca0ad3e41ea882926334c71093f,2024-05-14T16:11:39.510000 CVE-2024-4430,0,0,137066e4356a4d04e3ad731fb42c3579f278eca0ad3e41ea882926334c71093f,2024-05-14T16:11:39.510000
CVE-2024-44301,0,0,e57f1a12cf8c57ae2bf8a0deda4abbc44e17e7c3ec00ae41ee84335bdf9af805,2024-10-30T19:35:22.447000 CVE-2024-44301,0,0,e57f1a12cf8c57ae2bf8a0deda4abbc44e17e7c3ec00ae41ee84335bdf9af805,2024-10-30T19:35:22.447000
CVE-2024-44302,0,0,8ecfedad59d8a53cf201de7999f2b2a1319aa7dcff5d0590cb4d2b5e11349389,2024-10-30T17:49:53.193000 CVE-2024-44302,0,0,8ecfedad59d8a53cf201de7999f2b2a1319aa7dcff5d0590cb4d2b5e11349389,2024-10-30T17:49:53.193000
CVE-2024-44306,0,1,30e6b62b20cb4827539838b9ad1117b1c4caf5a6a100e3fa44a4d9f09dbdd63c,2024-11-20T16:35:23.177000 CVE-2024-44306,0,0,30e6b62b20cb4827539838b9ad1117b1c4caf5a6a100e3fa44a4d9f09dbdd63c,2024-11-20T16:35:23.177000
CVE-2024-44307,0,1,9e70c08c83168f1b166f0adb0f44da27d930f75021e34e9c4988cb0e1544104b,2024-11-20T16:35:24.267000 CVE-2024-44307,0,0,9e70c08c83168f1b166f0adb0f44da27d930f75021e34e9c4988cb0e1544104b,2024-11-20T16:35:24.267000
CVE-2024-44308,0,1,205e4729d19a62cea7bcf98856c2047767e5032b4dd25faffb0e6baf2e440c71,2024-11-20T16:35:25.583000 CVE-2024-44308,0,0,205e4729d19a62cea7bcf98856c2047767e5032b4dd25faffb0e6baf2e440c71,2024-11-20T16:35:25.583000
CVE-2024-44309,0,0,2c94a7a6e5a6d9d107289f79e4276d27e42aa524b614d4dc20aa51903eaface0,2024-11-20T00:15:17.137000 CVE-2024-44309,0,0,2c94a7a6e5a6d9d107289f79e4276d27e42aa524b614d4dc20aa51903eaface0,2024-11-20T00:15:17.137000
CVE-2024-4431,0,0,8d95de6ec075320f55907047db89835dd68db45859f7bae49d6625b2a3240b6b,2024-05-24T01:15:30.977000 CVE-2024-4431,0,0,8d95de6ec075320f55907047db89835dd68db45859f7bae49d6625b2a3240b6b,2024-05-24T01:15:30.977000
CVE-2024-4432,0,0,492ff6791a7b1a2e081b9c5249b748792a54b9554ba3a2422039c4bfa6a7bf50,2024-05-20T13:00:34.807000 CVE-2024-4432,0,0,492ff6791a7b1a2e081b9c5249b748792a54b9554ba3a2422039c4bfa6a7bf50,2024-05-20T13:00:34.807000
@ -262869,7 +262895,7 @@ CVE-2024-45604,0,0,8bf71581fc88ef149abd090a70890b5121cb8944654700250436e6871eed9
CVE-2024-45605,0,0,e2dcbd09111d51f02ed3dc28b06a6dfe1b2afb4b9e6f7d6992823c9eafceb7dc,2024-09-26T19:14:00.873000 CVE-2024-45605,0,0,e2dcbd09111d51f02ed3dc28b06a6dfe1b2afb4b9e6f7d6992823c9eafceb7dc,2024-09-26T19:14:00.873000
CVE-2024-45606,0,0,74770cd60bba1a7e3534716f76d2f24e8f6b5a1c9090e259fc4bcbaa501443fe,2024-09-26T19:16:40.720000 CVE-2024-45606,0,0,74770cd60bba1a7e3534716f76d2f24e8f6b5a1c9090e259fc4bcbaa501443fe,2024-09-26T19:16:40.720000
CVE-2024-45607,0,0,9d199e13e4c36b979d30a8467667e188e65d4bf0165b27173d5a6e5dc2ce7529,2024-09-19T02:05:28.707000 CVE-2024-45607,0,0,9d199e13e4c36b979d30a8467667e188e65d4bf0165b27173d5a6e5dc2ce7529,2024-09-19T02:05:28.707000
CVE-2024-45608,0,1,af7c58ddb81b1dc0d2d7b2df9f839e7080f0a2b57fe93d1ebdf7a968766ba076,2024-11-20T15:20:27.390000 CVE-2024-45608,0,0,af7c58ddb81b1dc0d2d7b2df9f839e7080f0a2b57fe93d1ebdf7a968766ba076,2024-11-20T15:20:27.390000
CVE-2024-45609,0,0,2cb777fb37ad8d39d951bd6b53020cf1935b1072d0433c4260effc918cb4fb96,2024-11-19T21:22:06.043000 CVE-2024-45609,0,0,2cb777fb37ad8d39d951bd6b53020cf1935b1072d0433c4260effc918cb4fb96,2024-11-19T21:22:06.043000
CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000 CVE-2024-4561,0,0,8ef61ebc386f7e587b6eb6df8054d64514729591e443c5ac6735c0df58420e0f,2024-05-15T16:40:19.330000
CVE-2024-45610,0,0,22b945effc1025f70b2432de8172d4793098ff2de11f4912624f5e1a161c565e,2024-11-19T21:07:46.790000 CVE-2024-45610,0,0,22b945effc1025f70b2432de8172d4793098ff2de11f4912624f5e1a161c565e,2024-11-19T21:07:46.790000
@ -263424,30 +263450,30 @@ CVE-2024-46764,0,0,12c93d62cf976e0fac2b5ba84bf2f54a4d1d5062174357996a20e7c4bd1fa
CVE-2024-46765,0,0,584f96269688e10aedc11057947f82fa03feb9c9ca3ecb2a522bbf502bad2684,2024-09-26T13:24:29.697000 CVE-2024-46765,0,0,584f96269688e10aedc11057947f82fa03feb9c9ca3ecb2a522bbf502bad2684,2024-09-26T13:24:29.697000
CVE-2024-46766,0,0,55d63c81e0644404ba2b3c5eec2e0e368cac985d5fcde38c97950713f33905c3,2024-09-23T16:15:23.823000 CVE-2024-46766,0,0,55d63c81e0644404ba2b3c5eec2e0e368cac985d5fcde38c97950713f33905c3,2024-09-23T16:15:23.823000
CVE-2024-46767,0,0,fd3b90678eac65bcb3233c07c19427fffd1566d14f3f9a8041e6042771984f5b,2024-09-20T12:30:51.220000 CVE-2024-46767,0,0,fd3b90678eac65bcb3233c07c19427fffd1566d14f3f9a8041e6042771984f5b,2024-09-20T12:30:51.220000
CVE-2024-46768,0,0,404d33c105e2f2e7a4f6108144330470208ba943ab19e3a7f2654703cb3bf44e,2024-09-20T12:30:51.220000 CVE-2024-46768,0,1,ee740127af67ae8086ba37a9f2512a554b9d048c382b04d9070cf9b51579f1a0,2024-11-20T18:19:35.033000
CVE-2024-46769,0,0,c9bbe9575cc2848fce277d2f64a3b4e07e53acfd7fdf23d95dd87f904a651799,2024-09-30T12:44:27.907000 CVE-2024-46769,0,0,c9bbe9575cc2848fce277d2f64a3b4e07e53acfd7fdf23d95dd87f904a651799,2024-09-30T12:44:27.907000
CVE-2024-4677,0,0,06b789b4e22353188f4fa1dbcfc045ef487187889647b738ddd6f1b3dabcd887,2024-06-04T19:20:45.830000 CVE-2024-4677,0,0,06b789b4e22353188f4fa1dbcfc045ef487187889647b738ddd6f1b3dabcd887,2024-06-04T19:20:45.830000
CVE-2024-46770,0,0,7f952820dc90535bd167d3f017a589524ac6f56b9d3dfae2b4b9bd0b58f79ea0,2024-09-23T16:13:25.563000 CVE-2024-46770,0,0,7f952820dc90535bd167d3f017a589524ac6f56b9d3dfae2b4b9bd0b58f79ea0,2024-09-23T16:13:25.563000
CVE-2024-46771,0,0,d3e25589d0aa5cc76f678addd8f11cf59207b44575da23e672799ad7db6233bc,2024-09-20T12:30:51.220000 CVE-2024-46771,0,1,71a4de85b53379f94526037df901498ea6ac4fdcecd02ba212f18e76a39be045,2024-11-20T18:20:03.130000
CVE-2024-46772,0,0,a8ae53586f05d332df3222762c5e7961597b69a5b7445f0db6ae4d1db439b4de,2024-09-23T16:52:17.577000 CVE-2024-46772,0,0,a8ae53586f05d332df3222762c5e7961597b69a5b7445f0db6ae4d1db439b4de,2024-09-23T16:52:17.577000
CVE-2024-46773,0,0,d50dc13b3db60a3fbb1947c3c76c4140c6ced2f89d983703c7f17bd27e5be084,2024-09-23T16:51:59.983000 CVE-2024-46773,0,0,d50dc13b3db60a3fbb1947c3c76c4140c6ced2f89d983703c7f17bd27e5be084,2024-09-23T16:51:59.983000
CVE-2024-46774,0,0,898312b974f7d676e3801eb8898f9749e66804c2df5ac294f95a2f8fc72b8a3a,2024-09-20T12:30:51.220000 CVE-2024-46774,0,1,674493f028c34fd9192163f3608c7ec506bedd3e768bd43034605534a0b63a17,2024-11-20T18:19:00.327000
CVE-2024-46775,0,0,39f7e39a0a2b9096f49799d0bab00e7744bc4ac1b71a53fbddef419b6853ebb9,2024-09-20T12:30:51.220000 CVE-2024-46775,0,1,262156bbdb73176f9653b3b68eae0bc78294be6056ada06350ce5793116d537a,2024-11-20T18:17:13.750000
CVE-2024-46776,0,0,a99442a67c30f6b8b2c7edd14b057b7025440bebaf3c1a97a251694bd1019ccc,2024-09-20T12:30:51.220000 CVE-2024-46776,0,1,b229f205a3358474780929aaa686adb3d080d222663cdf9e1e6c1a3682667d66,2024-11-20T17:56:57.290000
CVE-2024-46777,0,0,64f254a8e69394e560ce14802bd54bf5d7b5322084f6066ae69ad8c2320dab95,2024-09-20T12:30:51.220000 CVE-2024-46777,0,1,65946aeaba38bf8caf0ac1d615bdf194883b7f45fa3d6f1a8acae5d588c93e92,2024-11-20T17:56:02.287000
CVE-2024-46778,0,0,42ed538387ee8783838f45ac891015186bc9fe8d2c7a6ed0b3d8d0096eca7842,2024-09-20T12:30:51.220000 CVE-2024-46778,0,1,63f5cb21b3c66a3fbccb3f4f323eed19d16dbd087dd987cb02ef3d17b8ecfb2c,2024-11-20T17:40:37.847000
CVE-2024-46779,0,0,9459e2bbf4547b8d8450c1952a14b96461b698fba144de37fd66253536f5c10f,2024-09-23T16:37:51.473000 CVE-2024-46779,0,0,9459e2bbf4547b8d8450c1952a14b96461b698fba144de37fd66253536f5c10f,2024-09-23T16:37:51.473000
CVE-2024-4678,0,0,be695eaab1f72a88b10d5b9b54afd539ecd5dccc02b3dde1eca881aeeba1ff59,2024-06-04T19:20:45.930000 CVE-2024-4678,0,0,be695eaab1f72a88b10d5b9b54afd539ecd5dccc02b3dde1eca881aeeba1ff59,2024-06-04T19:20:45.930000
CVE-2024-46780,0,0,450748190a91dea98a59a618a62a7f263f80a5e9eca3c0ec693f8e0a9ab81d08,2024-09-20T12:30:51.220000 CVE-2024-46780,0,1,f11280a31c667cc558d9097b2fdcbf0e351d3b09c3c67c2e9a5986ac93884fb7,2024-11-20T17:31:54.440000
CVE-2024-46781,0,0,b7800767661ad72dc7d9b50173ef44ead44890ec84d2e21b5c9fa258abff2f06,2024-09-23T16:37:07.117000 CVE-2024-46781,0,0,b7800767661ad72dc7d9b50173ef44ead44890ec84d2e21b5c9fa258abff2f06,2024-09-23T16:37:07.117000
CVE-2024-46782,0,0,8fc9ad3608da20697ed5d3ccf36f03f0ef1fd876169984385298851863cf19f3,2024-09-23T16:32:04.373000 CVE-2024-46782,0,0,8fc9ad3608da20697ed5d3ccf36f03f0ef1fd876169984385298851863cf19f3,2024-09-23T16:32:04.373000
CVE-2024-46783,0,1,70531073079a8c8ac29e6e1c446f67895f92dfb43b67b6c609e333e90673bcd9,2024-11-20T15:47:35.273000 CVE-2024-46783,0,0,70531073079a8c8ac29e6e1c446f67895f92dfb43b67b6c609e333e90673bcd9,2024-11-20T15:47:35.273000
CVE-2024-46784,0,0,0bd6e7334c2f225218ac235c8614917f7b12765c1ee877fde8fe6ea5550d1e04,2024-09-26T13:21:30.657000 CVE-2024-46784,0,0,0bd6e7334c2f225218ac235c8614917f7b12765c1ee877fde8fe6ea5550d1e04,2024-09-26T13:21:30.657000
CVE-2024-46785,0,1,3c5b13d46d7bf1096dbbf64131b42dd8dc761cb5c75995e3c1cf54795d42851b,2024-11-20T15:51:33.027000 CVE-2024-46785,0,0,3c5b13d46d7bf1096dbbf64131b42dd8dc761cb5c75995e3c1cf54795d42851b,2024-11-20T15:51:33.027000
CVE-2024-46786,0,0,25c7670eeacc5e83ba81db4459f557d546315f042b4010db6dd6a4480e89f0e5,2024-09-26T12:48:37.447000 CVE-2024-46786,0,0,25c7670eeacc5e83ba81db4459f557d546315f042b4010db6dd6a4480e89f0e5,2024-09-26T12:48:37.447000
CVE-2024-46787,0,1,28621b503bd078f2b0141b3d6d74179143aa95798c87759eebe0f345e318857a,2024-11-20T15:33:08.557000 CVE-2024-46787,0,0,28621b503bd078f2b0141b3d6d74179143aa95798c87759eebe0f345e318857a,2024-11-20T15:33:08.557000
CVE-2024-46788,0,0,695266a8c696b6d7e3425cc0a9ed86e76a0329cbee6a482b93b62801857e8044,2024-09-20T12:30:51.220000 CVE-2024-46788,0,0,695266a8c696b6d7e3425cc0a9ed86e76a0329cbee6a482b93b62801857e8044,2024-09-20T12:30:51.220000
CVE-2024-46789,0,0,a571fb0b950e8c979ab026a9fe716bd6ec64ed8b8cb21d6691e8cab8a49ba099,2024-09-20T12:30:51.220000 CVE-2024-46789,0,1,c3269567de8f6eac1c676e3d988c555c4ae91be4c929b335b733006adf2d460d,2024-11-20T17:27:03.197000
CVE-2024-4679,0,0,9bfb1104bd992ff014fab2b1166f6f818504f2232183224a6a702e4c44b2119a,2024-07-02T12:09:16.907000 CVE-2024-4679,0,0,9bfb1104bd992ff014fab2b1166f6f818504f2232183224a6a702e4c44b2119a,2024-07-02T12:09:16.907000
CVE-2024-46790,0,0,d27eade819ed2fd15185afc828dfb8999a9cfdae3e96ed34fd07c06d351f85e6,2024-09-20T12:30:51.220000 CVE-2024-46790,0,0,d27eade819ed2fd15185afc828dfb8999a9cfdae3e96ed34fd07c06d351f85e6,2024-09-20T12:30:51.220000
CVE-2024-46791,0,0,2949ee11720d44bcaa052e660ce7fdc2dacadc36031963879d79e5b14b90b05b,2024-09-20T18:21:19.457000 CVE-2024-46791,0,0,2949ee11720d44bcaa052e660ce7fdc2dacadc36031963879d79e5b14b90b05b,2024-09-20T18:21:19.457000
@ -263476,19 +263502,19 @@ CVE-2024-46811,0,0,e3c61e9558dd1a3f131364b8d64c8ba6f14ec560c30f285430f0270477a47
CVE-2024-46812,0,0,134272cc7effe83799d5018c6b8c85291ae3808b9eeebc0177d5fdded748636a,2024-09-30T12:45:57.823000 CVE-2024-46812,0,0,134272cc7effe83799d5018c6b8c85291ae3808b9eeebc0177d5fdded748636a,2024-09-30T12:45:57.823000
CVE-2024-46813,0,0,ec855766c2269aedb12237a993dfb5b55059aae43c85d0e5552568c0bcce8660,2024-10-04T17:38:17.740000 CVE-2024-46813,0,0,ec855766c2269aedb12237a993dfb5b55059aae43c85d0e5552568c0bcce8660,2024-10-04T17:38:17.740000
CVE-2024-46814,0,0,80befd72986fd4035afe06cedc03a7664f2ffcaf670ef7869d07a2b36466e8ce,2024-10-04T17:27:47.450000 CVE-2024-46814,0,0,80befd72986fd4035afe06cedc03a7664f2ffcaf670ef7869d07a2b36466e8ce,2024-10-04T17:27:47.450000
CVE-2024-46815,0,0,8e2c427d67a958bd4334f2e61500d197e9f6057cf203fc26da513bf775828fa9,2024-09-30T12:45:57.823000 CVE-2024-46815,0,1,c299d5fd5955b01dea3d800f7bc23cd424d44f684b18d348ce43ae25f9c523b3,2024-11-20T18:22:12.017000
CVE-2024-46816,0,0,6e1ee4b9a0fc40aba55bc57257790b6850327e05245dce2bb930d1d6b61ecbc7,2024-09-30T12:45:57.823000 CVE-2024-46816,0,1,65fec096967b53105bad0893cdaafe0a8bb3271c2ee45a1b1df56c13edd560fe,2024-11-20T18:02:52.437000
CVE-2024-46817,0,0,dc8f68844dd932520dad6317afc3216af6f89b4cba7b42867a432814b5f55ca7,2024-09-30T12:45:57.823000 CVE-2024-46817,0,1,5a8208eec476849ff25de3af23936cbbaef5ec006d085abcf7c4f9c88ae2e37c,2024-11-20T17:45:43.893000
CVE-2024-46818,0,0,fe798b484e17caf3bda06ab6aba71d50cbde163879fa6025cdd90b9e91e24bea,2024-10-04T17:18:36.613000 CVE-2024-46818,0,0,fe798b484e17caf3bda06ab6aba71d50cbde163879fa6025cdd90b9e91e24bea,2024-10-04T17:18:36.613000
CVE-2024-46819,0,0,48d86dbd2f9dcc09d09972864acc79179bab0022e56037f99c750892b571c5b3,2024-10-04T17:11:00.570000 CVE-2024-46819,0,0,48d86dbd2f9dcc09d09972864acc79179bab0022e56037f99c750892b571c5b3,2024-10-04T17:11:00.570000
CVE-2024-4682,0,0,b188d20fdb53d2324882bc38bcdbd4c51d4b6beb562fc8362c2866e7563895e8,2024-06-04T19:20:46.140000 CVE-2024-4682,0,0,b188d20fdb53d2324882bc38bcdbd4c51d4b6beb562fc8362c2866e7563895e8,2024-06-04T19:20:46.140000
CVE-2024-46820,0,0,e02b77fbfb7c27b691f35a8ec06822e6f9168446acdd71a423d10b4bf4e98574,2024-09-30T12:45:57.823000 CVE-2024-46820,0,1,530ef5d90934aa384637a2025e464ca9658f0fb315dfe973fa7d8ac7dac79183,2024-11-20T17:34:05.143000
CVE-2024-46821,0,0,646f132e7ed27c2717e047a01ec92f6d102c4152b9e0279d740913fed403825d,2024-10-04T17:06:43.573000 CVE-2024-46821,0,0,646f132e7ed27c2717e047a01ec92f6d102c4152b9e0279d740913fed403825d,2024-10-04T17:06:43.573000
CVE-2024-46822,0,0,c8a3d9e215b85580ec5917e738992b4dc25efcf9e837d449af86f4aa8203218c,2024-10-02T14:24:01.757000 CVE-2024-46822,0,0,c8a3d9e215b85580ec5917e738992b4dc25efcf9e837d449af86f4aa8203218c,2024-10-02T14:24:01.757000
CVE-2024-46823,0,0,a167de10545a153c3d95daa6a21be068049a4c361c32c751cae65bc6ee29695c,2024-11-20T13:59:52.723000 CVE-2024-46823,0,0,a167de10545a153c3d95daa6a21be068049a4c361c32c751cae65bc6ee29695c,2024-11-20T13:59:52.723000
CVE-2024-46824,0,0,e0a90c0b6b8be6e8cdf7ea82a8f4714c063f5420a085c7bc4fdc88f4640c9615,2024-10-02T14:29:08.417000 CVE-2024-46824,0,0,e0a90c0b6b8be6e8cdf7ea82a8f4714c063f5420a085c7bc4fdc88f4640c9615,2024-10-02T14:29:08.417000
CVE-2024-46825,0,0,aa389e364217a0b9e16c3fcf17f7f0c6382d69ded44339c5aa61a7007a867b8d,2024-09-30T12:45:57.823000 CVE-2024-46825,0,1,489d14aa4370a6b8abf31f5b609f2e027c90ea80208491ed95bd1ab23466dbec,2024-11-20T17:24:04.660000
CVE-2024-46826,0,0,be734978861d0287bcd7e4a1cb0186beed982fdcb864acc473dc75997a104c25,2024-09-30T12:45:57.823000 CVE-2024-46826,0,1,3d93083c38eb2145a4685a9a140cc89964cd35bbc56a9be19b7147ec9ebdc9bd,2024-11-20T17:19:00.183000
CVE-2024-46827,0,0,40baba2ef01956ae5817a5c6c5f01915d6c37f21b62c361b4db5d49834b997d9,2024-09-30T12:45:57.823000 CVE-2024-46827,0,0,40baba2ef01956ae5817a5c6c5f01915d6c37f21b62c361b4db5d49834b997d9,2024-09-30T12:45:57.823000
CVE-2024-46828,0,0,004223b8b179cc9feb2d2821c2f255bfd0f1e8b6e2ee56da948ed2efdc61c3a4,2024-09-30T12:45:57.823000 CVE-2024-46828,0,0,004223b8b179cc9feb2d2821c2f255bfd0f1e8b6e2ee56da948ed2efdc61c3a4,2024-09-30T12:45:57.823000
CVE-2024-46829,0,0,9756f5c42072f53bba1b23c8dae157441c264939ffe910650603ebb072073237,2024-10-02T14:27:57.920000 CVE-2024-46829,0,0,9756f5c42072f53bba1b23c8dae157441c264939ffe910650603ebb072073237,2024-10-02T14:27:57.920000
@ -263656,7 +263682,7 @@ CVE-2024-47046,0,0,7869fbf4e097ddf562d122b002ca5484caa2f32ab0ccc92f893d14cc4f35f
CVE-2024-47047,0,0,d8855532a1b9b01d9e7fc7225d9d8944472a4e5bcd23ab8d15e96ebcc6becd71,2024-09-27T17:03:35.507000 CVE-2024-47047,0,0,d8855532a1b9b01d9e7fc7225d9d8944472a4e5bcd23ab8d15e96ebcc6becd71,2024-09-27T17:03:35.507000
CVE-2024-47048,0,0,3e2f1651277aae0b881ff2293ea5a1adce6f7fca0dbe63c48af088557b921506,2024-09-26T17:12:07.440000 CVE-2024-47048,0,0,3e2f1651277aae0b881ff2293ea5a1adce6f7fca0dbe63c48af088557b921506,2024-09-26T17:12:07.440000
CVE-2024-47049,0,0,3e6b2d17b4e33f39069cb56c499a02c9b742796ce9abde4b775c7183f5720e70,2024-09-27T17:09:46.980000 CVE-2024-47049,0,0,3e6b2d17b4e33f39069cb56c499a02c9b742796ce9abde4b775c7183f5720e70,2024-09-27T17:09:46.980000
CVE-2024-4705,0,0,26b272539ad739bf4cdb858b2e8b5e748c64203d796935ad814b34867a2408a1,2024-07-23T21:15:15.147000 CVE-2024-4705,0,1,d259c4d653df071e68c221dae3247d75c673e9cf20139b6f08dcb899bfa4f077,2024-11-20T18:58:42.133000
CVE-2024-47050,0,0,4296aa963533e4a7521fa22cb8b50e427318f2d783af0da7884f907ad4fc085b,2024-09-27T15:29:21.450000 CVE-2024-47050,0,0,4296aa963533e4a7521fa22cb8b50e427318f2d783af0da7884f907ad4fc085b,2024-09-27T15:29:21.450000
CVE-2024-47058,0,0,1e972d8f0df7a48ab103a834b6d9eb8c181e8f51fba2eb0fd8d68faea4946bf9,2024-09-27T15:31:30.917000 CVE-2024-47058,0,0,1e972d8f0df7a48ab103a834b6d9eb8c181e8f51fba2eb0fd8d68faea4946bf9,2024-09-27T15:31:30.917000
CVE-2024-47059,0,0,1ded05aa2ea1e0adbe840bc57816abecb4dbdb9b2a551e659bc55563f7788a30,2024-09-20T12:30:17.483000 CVE-2024-47059,0,0,1ded05aa2ea1e0adbe840bc57816abecb4dbdb9b2a551e659bc55563f7788a30,2024-09-20T12:30:17.483000
@ -264157,7 +264183,7 @@ CVE-2024-47716,0,0,7f90c3731e690eada425c700cd2a01b8b54c79669e7a532a03b033a5e0cb5
CVE-2024-47717,0,0,44f02bbd6ee4d2f5802475a5ee7700159b1fba306e7a83d7aea28954ffd54fae,2024-10-24T14:32:20.817000 CVE-2024-47717,0,0,44f02bbd6ee4d2f5802475a5ee7700159b1fba306e7a83d7aea28954ffd54fae,2024-10-24T14:32:20.817000
CVE-2024-47718,0,0,e21581e56d9e82562015055761ff23f151158191b649c5b5e92891e3cb7d24cd,2024-10-24T16:31:01.107000 CVE-2024-47718,0,0,e21581e56d9e82562015055761ff23f151158191b649c5b5e92891e3cb7d24cd,2024-10-24T16:31:01.107000
CVE-2024-47719,0,0,8e2d10f10d51b8d1ffdd528a275c798c335f0002db329252bde2bec15f7da284,2024-10-24T16:21:50.937000 CVE-2024-47719,0,0,8e2d10f10d51b8d1ffdd528a275c798c335f0002db329252bde2bec15f7da284,2024-10-24T16:21:50.937000
CVE-2024-4772,0,1,7c59402a2f466b2c311d92993f422b7629fb31f1d185026026451499be39f2fe,2024-11-20T16:35:26.540000 CVE-2024-4772,0,0,7c59402a2f466b2c311d92993f422b7629fb31f1d185026026451499be39f2fe,2024-11-20T16:35:26.540000
CVE-2024-47720,0,0,5042c4947e2165e57f3040e4c9baad4564addab44bedf4897d2ef5a5f6157f9a,2024-10-23T20:53:54.150000 CVE-2024-47720,0,0,5042c4947e2165e57f3040e4c9baad4564addab44bedf4897d2ef5a5f6157f9a,2024-10-23T20:53:54.150000
CVE-2024-47721,0,0,b4c62ba19409dfd2e8a64e410001d91528bd89da7482b214ac6cc576b4cc2348,2024-10-23T20:57:04.897000 CVE-2024-47721,0,0,b4c62ba19409dfd2e8a64e410001d91528bd89da7482b214ac6cc576b4cc2348,2024-10-23T20:57:04.897000
CVE-2024-47722,0,0,68c8d2f090df61a9f49a1f01f75a7ac8cda9d407591cfa0dc0a92c1e0656c53f,2024-10-21T13:15:02.360000 CVE-2024-47722,0,0,68c8d2f090df61a9f49a1f01f75a7ac8cda9d407591cfa0dc0a92c1e0656c53f,2024-10-21T13:15:02.360000
@ -264394,10 +264420,10 @@ CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e
CVE-2024-48061,0,0,3afb2ef6eba7f21135f7c2c854e268a2fe30714157a06ae965803eb7d12a5161,2024-11-06T20:35:30.633000 CVE-2024-48061,0,0,3afb2ef6eba7f21135f7c2c854e268a2fe30714157a06ae965803eb7d12a5161,2024-11-06T20:35:30.633000
CVE-2024-48063,0,0,7dad3075f35e3bd4e2e591484ba350f38d4e17902517b9e5e6279458bc0b207a,2024-11-01T13:15:12.020000 CVE-2024-48063,0,0,7dad3075f35e3bd4e2e591484ba350f38d4e17902517b9e5e6279458bc0b207a,2024-11-01T13:15:12.020000
CVE-2024-48068,0,0,b57c66f0e06cd485d79a2746551ab3ed70890b6a1ad164f0315fd4c2e695ce9c,2024-11-18T17:11:56.587000 CVE-2024-48068,0,0,b57c66f0e06cd485d79a2746551ab3ed70890b6a1ad164f0315fd4c2e695ce9c,2024-11-18T17:11:56.587000
CVE-2024-48069,0,1,af73d11a2c5e3c4cb3bd5b8edb1af18611b09068176dd06ea45087761c48ac05,2024-11-20T16:15:21.127000 CVE-2024-48069,0,0,af73d11a2c5e3c4cb3bd5b8edb1af18611b09068176dd06ea45087761c48ac05,2024-11-20T16:15:21.127000
CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000 CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000
CVE-2024-48070,0,1,a8af1b10ac470446c89d2329f3abc1a5a5e5c27ec1fcb5b205ad2b24dd29f40d,2024-11-20T15:15:08.440000 CVE-2024-48070,0,0,a8af1b10ac470446c89d2329f3abc1a5a5e5c27ec1fcb5b205ad2b24dd29f40d,2024-11-20T15:15:08.440000
CVE-2024-48071,0,1,85d607e5b575e124e93fbfc228dc6959f2846f7d1bfd64e4cacda31ad5d5aa7c,2024-11-20T16:15:21.203000 CVE-2024-48071,0,0,85d607e5b575e124e93fbfc228dc6959f2846f7d1bfd64e4cacda31ad5d5aa7c,2024-11-20T16:15:21.203000
CVE-2024-48072,0,0,539e77ae1f0d95066a73e72899cd98913ded4c75f5047c35b1c5efcb115d9eb2,2024-11-19T21:56:45.533000 CVE-2024-48072,0,0,539e77ae1f0d95066a73e72899cd98913ded4c75f5047c35b1c5efcb115d9eb2,2024-11-19T21:56:45.533000
CVE-2024-48073,0,0,f808f327cec1eb1c4e50210dd8e768204bbea0c1ec8029cba6324c290353d5f5,2024-11-18T15:35:11.227000 CVE-2024-48073,0,0,f808f327cec1eb1c4e50210dd8e768204bbea0c1ec8029cba6324c290353d5f5,2024-11-18T15:35:11.227000
CVE-2024-48074,0,0,ad38eed7680db70af45f593399c08c1cb64e93854bc7fa5dd06ea3c6cdff4594,2024-11-08T22:15:20.877000 CVE-2024-48074,0,0,ad38eed7680db70af45f593399c08c1cb64e93854bc7fa5dd06ea3c6cdff4594,2024-11-08T22:15:20.877000
@ -265049,7 +265075,7 @@ CVE-2024-49558,0,0,3c676b75de26a8476d548ed8b3e232d51677ecb4a62749082177600c22312
CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000 CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000
CVE-2024-49560,0,0,0903f1d2d4b8ea486a494eda9aaa463e3a0d845c10ed5808d6808c17d2b3d951,2024-11-15T17:35:25.407000 CVE-2024-49560,0,0,0903f1d2d4b8ea486a494eda9aaa463e3a0d845c10ed5808d6808c17d2b3d951,2024-11-15T17:35:25.407000
CVE-2024-4957,0,0,e3bb8e47c8dfba146bed7647eff25fc6cc8427bb0bd54429262b4324d627abed,2024-07-03T02:08:22.473000 CVE-2024-4957,0,0,e3bb8e47c8dfba146bed7647eff25fc6cc8427bb0bd54429262b4324d627abed,2024-07-03T02:08:22.473000
CVE-2024-49574,0,1,b617967e93da689f445f38134ba47043080cbdf46d6acc332d4ced620bedb693,2024-11-20T16:32:37.770000 CVE-2024-49574,0,0,b617967e93da689f445f38134ba47043080cbdf46d6acc332d4ced620bedb693,2024-11-20T16:32:37.770000
CVE-2024-49579,0,0,0f0dd66a3db0fe299ae55b9b0e6c22f11c400dc3ee27d05103041b63e67e9d3e,2024-11-14T19:24:45.603000 CVE-2024-49579,0,0,0f0dd66a3db0fe299ae55b9b0e6c22f11c400dc3ee27d05103041b63e67e9d3e,2024-11-14T19:24:45.603000
CVE-2024-4958,0,0,15591ba73d7708bbd560fadc0281274b5c7c2c12545797826fbf6e13e1222639,2024-06-03T14:46:24.250000 CVE-2024-4958,0,0,15591ba73d7708bbd560fadc0281274b5c7c2c12545797826fbf6e13e1222639,2024-06-03T14:46:24.250000
CVE-2024-49580,0,0,89085af96d96dbfcdc87aa1d40157bd1a1b8615e2e8f40b207dbbe916ae159de,2024-11-14T19:25:47.433000 CVE-2024-49580,0,0,89085af96d96dbfcdc87aa1d40157bd1a1b8615e2e8f40b207dbbe916ae159de,2024-11-14T19:25:47.433000
@ -265162,7 +265188,7 @@ CVE-2024-4975,0,0,d684ecfff12b84901405d8ee54394b9595e6fb8a06328936509cd0d9c15207
CVE-2024-49750,0,0,a4d8c273c7d01e1dcb69ab54945d9fa3ef0aafd14a5615789a19e3567d7b1d64,2024-11-06T14:58:19.993000 CVE-2024-49750,0,0,a4d8c273c7d01e1dcb69ab54945d9fa3ef0aafd14a5615789a19e3567d7b1d64,2024-11-06T14:58:19.993000
CVE-2024-49751,0,0,ff7d052700c88a06f3721dad1b8cfae38c2356a33cba16eba3e8bf2b6f89cf9e,2024-10-25T12:56:36.827000 CVE-2024-49751,0,0,ff7d052700c88a06f3721dad1b8cfae38c2356a33cba16eba3e8bf2b6f89cf9e,2024-10-25T12:56:36.827000
CVE-2024-49753,0,0,e48f997c3307c7149c72669441f9343576b6be2cbdb15b89775e89497816dbec,2024-10-28T13:58:09.230000 CVE-2024-49753,0,0,e48f997c3307c7149c72669441f9343576b6be2cbdb15b89775e89497816dbec,2024-10-28T13:58:09.230000
CVE-2024-49754,0,1,ed2e0f19406ac25bc76a580dfaa6f8631e78c3cf326ef15ed52393e05cae3361,2024-11-20T15:02:42.683000 CVE-2024-49754,0,0,ed2e0f19406ac25bc76a580dfaa6f8631e78c3cf326ef15ed52393e05cae3361,2024-11-20T15:02:42.683000
CVE-2024-49755,0,0,b1c1713e62d1c6cff006bddd32caeacb7a00a5abd98bfdd4887a4a4fcdb0308a,2024-10-29T14:34:50.257000 CVE-2024-49755,0,0,b1c1713e62d1c6cff006bddd32caeacb7a00a5abd98bfdd4887a4a4fcdb0308a,2024-10-29T14:34:50.257000
CVE-2024-49756,0,0,17e2aa8675de07a9bb36aad326a0b90c2e6105df968303ed06bc9a1149a476bc,2024-10-25T12:56:36.827000 CVE-2024-49756,0,0,17e2aa8675de07a9bb36aad326a0b90c2e6105df968303ed06bc9a1149a476bc,2024-10-25T12:56:36.827000
CVE-2024-49757,0,0,41883c0db2190e07eb75f1500b6be8583d0953bfe5f6820811285d92db2c4bda,2024-10-28T13:58:09.230000 CVE-2024-49757,0,0,41883c0db2190e07eb75f1500b6be8583d0953bfe5f6820811285d92db2c4bda,2024-10-28T13:58:09.230000
@ -265207,7 +265233,7 @@ CVE-2024-49862,0,0,e0b25be7c75d96f390f553fe793605e2691bfb34c1e389879a3cd9200ce6c
CVE-2024-49863,0,0,41eb15cefa65add4e21060b9ff62fd64839f2e02cd81a7af8fe6b7da8453fc42,2024-10-24T19:43:56.103000 CVE-2024-49863,0,0,41eb15cefa65add4e21060b9ff62fd64839f2e02cd81a7af8fe6b7da8453fc42,2024-10-24T19:43:56.103000
CVE-2024-49864,0,0,96541b20ea77eed56578d15c758ad186bec1b76c78e0506944db187153986d6b,2024-11-13T14:23:48.437000 CVE-2024-49864,0,0,96541b20ea77eed56578d15c758ad186bec1b76c78e0506944db187153986d6b,2024-11-13T14:23:48.437000
CVE-2024-49865,0,0,c4cae66eab62f15595d2364d0fa9447b0b6ab33d31dbe60340c7ef0ef852d1c8,2024-10-24T03:44:33.947000 CVE-2024-49865,0,0,c4cae66eab62f15595d2364d0fa9447b0b6ab33d31dbe60340c7ef0ef852d1c8,2024-10-24T03:44:33.947000
CVE-2024-49866,0,1,7be7bec3117c7bf135e3e4e3f53ef9223048093a28ac0b045fb0dfdd87af99c6,2024-11-20T15:56:07.807000 CVE-2024-49866,0,0,7be7bec3117c7bf135e3e4e3f53ef9223048093a28ac0b045fb0dfdd87af99c6,2024-11-20T15:56:07.807000
CVE-2024-49867,0,0,8cf0edae8c53a5633dfdab99e974869bd44d9ce40d8ab9b187966727a0a7f801,2024-11-08T16:15:29.037000 CVE-2024-49867,0,0,8cf0edae8c53a5633dfdab99e974869bd44d9ce40d8ab9b187966727a0a7f801,2024-11-08T16:15:29.037000
CVE-2024-49868,0,0,37c62afa96c12b59911ddae25d514351b0179ee480e85deb28aec35b35f691a5,2024-11-08T16:15:29.227000 CVE-2024-49868,0,0,37c62afa96c12b59911ddae25d514351b0179ee480e85deb28aec35b35f691a5,2024-11-08T16:15:29.227000
CVE-2024-49869,0,0,1ef7e6775f5061caa7e4dead4df8426a79419a75af385b7d702a23087606b23b,2024-10-24T20:28:21.597000 CVE-2024-49869,0,0,1ef7e6775f5061caa7e4dead4df8426a79419a75af385b7d702a23087606b23b,2024-10-24T20:28:21.597000
@ -265508,7 +265534,7 @@ CVE-2024-50145,0,0,9aaca4c4bd27c56de1138e3b927e1f83dfbefe24220661e4c64f210cd7f4f
CVE-2024-50146,0,0,83cb2097aede05a37ed22fe91250148414614fbfbc27a9d9bf4084439218e44f,2024-11-18T21:17:20.177000 CVE-2024-50146,0,0,83cb2097aede05a37ed22fe91250148414614fbfbc27a9d9bf4084439218e44f,2024-11-18T21:17:20.177000
CVE-2024-50147,0,0,19cb78047eb77e5af1037ee9fe335e24c06d2ab34710287cdbbbd96f88dc61cf,2024-11-18T21:19:21.917000 CVE-2024-50147,0,0,19cb78047eb77e5af1037ee9fe335e24c06d2ab34710287cdbbbd96f88dc61cf,2024-11-18T21:19:21.917000
CVE-2024-50148,0,0,b78a3ca0d8d61b221cf8c735216722e85a5c8281737b5b60308b4cfdcd343cb9,2024-11-18T21:24:05.020000 CVE-2024-50148,0,0,b78a3ca0d8d61b221cf8c735216722e85a5c8281737b5b60308b4cfdcd343cb9,2024-11-18T21:24:05.020000
CVE-2024-50149,0,1,891896447125cd04cd8b365cef97b2f51516fbcfe4972f5824a7392d9a8d1ae1,2024-11-20T15:45:13.163000 CVE-2024-50149,0,0,891896447125cd04cd8b365cef97b2f51516fbcfe4972f5824a7392d9a8d1ae1,2024-11-20T15:45:13.163000
CVE-2024-5015,0,0,57e7561ea7b4a22dc47e95fb948c2e633eea845a4a10c36b8de173108bb8285f,2024-08-21T13:37:02.370000 CVE-2024-5015,0,0,57e7561ea7b4a22dc47e95fb948c2e633eea845a4a10c36b8de173108bb8285f,2024-08-21T13:37:02.370000
CVE-2024-50150,0,0,4196baec43f7736780778c168a778671c8558d06a0e2cf6ab733073a0abb416a,2024-11-08T19:01:03.880000 CVE-2024-50150,0,0,4196baec43f7736780778c168a778671c8558d06a0e2cf6ab733073a0abb416a,2024-11-08T19:01:03.880000
CVE-2024-50151,0,0,d9ce0dc9cc067e6fa22cf39a277f3e88a2611e6930bd9b5641d4f23f2714aae3,2024-11-08T19:01:03.880000 CVE-2024-50151,0,0,d9ce0dc9cc067e6fa22cf39a277f3e88a2611e6930bd9b5641d4f23f2714aae3,2024-11-08T19:01:03.880000
@ -265944,8 +265970,8 @@ CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd85
CVE-2024-50650,0,0,79073e45a142b2e7e0b1ffcbc4f3efa33ba6c864e47e5edadaac92d5aa2c4220,2024-11-18T17:11:56.587000 CVE-2024-50650,0,0,79073e45a142b2e7e0b1ffcbc4f3efa33ba6c864e47e5edadaac92d5aa2c4220,2024-11-18T17:11:56.587000
CVE-2024-50651,0,0,e1e29eae9615e8af1d8d4e541563c16521fb17dbf6afeff80e640e07c7702ef2,2024-11-18T17:11:56.587000 CVE-2024-50651,0,0,e1e29eae9615e8af1d8d4e541563c16521fb17dbf6afeff80e640e07c7702ef2,2024-11-18T17:11:56.587000
CVE-2024-50652,0,0,c46d900b0ec3c3d3dc69c000a8af48eff0cdc2a83f00bffa34618c3851a639e9,2024-11-18T17:11:56.587000 CVE-2024-50652,0,0,c46d900b0ec3c3d3dc69c000a8af48eff0cdc2a83f00bffa34618c3851a639e9,2024-11-18T17:11:56.587000
CVE-2024-50653,0,1,351b2ae0bb07d369ff4e76cbcc39f43676534cf729c0eb11791224a2ac34f76b,2024-11-20T15:36:20.257000 CVE-2024-50653,0,0,351b2ae0bb07d369ff4e76cbcc39f43676534cf729c0eb11791224a2ac34f76b,2024-11-20T15:36:20.257000
CVE-2024-50654,0,1,852ec98b8770e8761131177d563306c16f9d93ec13622504cc7153f7938dd76e,2024-11-20T15:27:08.580000 CVE-2024-50654,0,0,852ec98b8770e8761131177d563306c16f9d93ec13622504cc7153f7938dd76e,2024-11-20T15:27:08.580000
CVE-2024-50655,0,0,d4ec558baa450e21b64b8fb6af74e8e4b7a98438007bcf88b64f95732f73b83a,2024-11-19T21:51:00.987000 CVE-2024-50655,0,0,d4ec558baa450e21b64b8fb6af74e8e4b7a98438007bcf88b64f95732f73b83a,2024-11-19T21:51:00.987000
CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000 CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000
CVE-2024-50667,0,0,0dcbd7b35b311fe7a681d780dcbe2293327603709e31a27594acb760866d084d,2024-11-12T17:35:12.270000 CVE-2024-50667,0,0,0dcbd7b35b311fe7a681d780dcbe2293327603709e31a27594acb760866d084d,2024-11-12T17:35:12.270000
@ -266017,7 +266043,7 @@ CVE-2024-50955,0,0,8157390cc8753ab3c3dc03f615378f98ac2c1983a215bd6243bc7dc27b803
CVE-2024-50956,0,0,61199958fcf25ae9206f0f8875ee79a0e783a402692b34e9d18c29f4a470b75f,2024-11-15T13:58:08.913000 CVE-2024-50956,0,0,61199958fcf25ae9206f0f8875ee79a0e783a402692b34e9d18c29f4a470b75f,2024-11-15T13:58:08.913000
CVE-2024-5096,0,0,5ed717834c38883681c6d180e391a0fccee5714f6ff3215bd896b6366e61be87,2024-06-04T19:20:58.687000 CVE-2024-5096,0,0,5ed717834c38883681c6d180e391a0fccee5714f6ff3215bd896b6366e61be87,2024-06-04T19:20:58.687000
CVE-2024-50966,0,0,c0f005c4299dd685198e56d1be45ab03ba5dbee734217c81e9ee9426dc60d25f,2024-11-08T19:01:03.880000 CVE-2024-50966,0,0,c0f005c4299dd685198e56d1be45ab03ba5dbee734217c81e9ee9426dc60d25f,2024-11-08T19:01:03.880000
CVE-2024-50968,0,0,8c4a378aa29139c2d1edfb8be9d371ec199bf37fbc913c101e94bbcd552ffb7c,2024-11-15T19:55:17.097000 CVE-2024-50968,0,1,865af00b0d3359238b453f9ef69955e0280211f860d95e8839fe9707addc1032,2024-11-20T17:35:28.470000
CVE-2024-50969,0,0,f82f81fef8a82d72e4053f9ec8030a8d4d20833c5d6be0f5bb0e03f29d0491f9,2024-11-14T14:47:53.487000 CVE-2024-50969,0,0,f82f81fef8a82d72e4053f9ec8030a8d4d20833c5d6be0f5bb0e03f29d0491f9,2024-11-14T14:47:53.487000
CVE-2024-5097,0,0,f8c17c92eeab06c631c7e3bccbcd56a5be798bb0ae3554a5ecf4b2a49f948336,2024-06-04T19:20:58.787000 CVE-2024-5097,0,0,f8c17c92eeab06c631c7e3bccbcd56a5be798bb0ae3554a5ecf4b2a49f948336,2024-06-04T19:20:58.787000
CVE-2024-50970,0,0,8dd8091efad0e3e366d58c3e5e49254ef2beed41cb2828ce8202543afc0c5fb4,2024-11-18T20:35:05.977000 CVE-2024-50970,0,0,8dd8091efad0e3e366d58c3e5e49254ef2beed41cb2828ce8202543afc0c5fb4,2024-11-18T20:35:05.977000
@ -266109,6 +266135,8 @@ CVE-2024-51152,0,0,2fc415b0efc6d5417097e1245b382b91c976aaa5917a1040e7761d3f03c4c
CVE-2024-51156,0,0,950cb85b625d9788feaa8ca00bca17d1dc7f49ab66d36281c4121d0068dc7fe0,2024-11-18T18:35:06.703000 CVE-2024-51156,0,0,950cb85b625d9788feaa8ca00bca17d1dc7f49ab66d36281c4121d0068dc7fe0,2024-11-18T18:35:06.703000
CVE-2024-51157,0,0,113cde3c71891d82bf55f2d0b4674fdfc6000fe1838706cb74a6d985959d76d5,2024-11-18T15:35:13.060000 CVE-2024-51157,0,0,113cde3c71891d82bf55f2d0b4674fdfc6000fe1838706cb74a6d985959d76d5,2024-11-18T15:35:13.060000
CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000 CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000
CVE-2024-51162,1,1,1be07bd670c45a51346041c05a664e0548effc328bc31730e943243cf7caa6dd,2024-11-20T17:15:18.120000
CVE-2024-51163,1,1,2ee787ecc47f7f401ec200ba94b7e62bfd2bcdba9d49d68dcab0a0ec8127078a,2024-11-20T17:15:18.417000
CVE-2024-51164,0,0,ceab88983ac8f1f076554a5fc06b1fdf761a41119ff559a9cb41cb2ae46055ec,2024-11-18T17:11:56.587000 CVE-2024-51164,0,0,ceab88983ac8f1f076554a5fc06b1fdf761a41119ff559a9cb41cb2ae46055ec,2024-11-18T17:11:56.587000
CVE-2024-5117,0,0,8f71e5dda3348556d6b06143dcd47b79229dad0468d30aa7c38f8c5c1ecb8524,2024-06-04T19:21:00.547000 CVE-2024-5117,0,0,8f71e5dda3348556d6b06143dcd47b79229dad0468d30aa7c38f8c5c1ecb8524,2024-06-04T19:21:00.547000
CVE-2024-51179,0,0,1ac36b7f8ecbb6442c3e82b8bfc190a784ef1fdb6227f3a1da3d4126f204bf98,2024-11-13T20:35:10.303000 CVE-2024-51179,0,0,1ac36b7f8ecbb6442c3e82b8bfc190a784ef1fdb6227f3a1da3d4126f204bf98,2024-11-13T20:35:10.303000
@ -266122,8 +266150,8 @@ CVE-2024-51189,0,0,35e25bc3ffc29f26f90767c986f34840e3ceb43dde83583aa3e60434ef9d4
CVE-2024-5119,0,0,6bb53ca9f8946448e1a7958af9df5b73fe1f36069f7b2aedbfc033eb827d83be,2024-06-04T19:21:00.657000 CVE-2024-5119,0,0,6bb53ca9f8946448e1a7958af9df5b73fe1f36069f7b2aedbfc033eb827d83be,2024-06-04T19:21:00.657000
CVE-2024-51190,0,0,02493ace343d801c2c96f83a09a920c8f88e12adfc58225d3b0b4f5c18c7e600,2024-11-12T13:55:21.227000 CVE-2024-51190,0,0,02493ace343d801c2c96f83a09a920c8f88e12adfc58225d3b0b4f5c18c7e600,2024-11-12T13:55:21.227000
CVE-2024-5120,0,0,512e5b032e12a79292f06756f99bf223a47a4b934de5206e20b5529b01ef61b6,2024-06-04T19:21:00.760000 CVE-2024-5120,0,0,512e5b032e12a79292f06756f99bf223a47a4b934de5206e20b5529b01ef61b6,2024-06-04T19:21:00.760000
CVE-2024-51208,1,1,df2a346078976c37c3e2589a200578b6dbb4bfd9da8ccfe7b8c6899da1f48450,2024-11-20T15:15:08.740000 CVE-2024-51208,0,0,df2a346078976c37c3e2589a200578b6dbb4bfd9da8ccfe7b8c6899da1f48450,2024-11-20T15:15:08.740000
CVE-2024-51209,1,1,5193df27fee0b78bbdc7c2b1f184598c324815ff66602ff4d95528a6d5d80cc4,2024-11-20T15:15:08.830000 CVE-2024-51209,0,0,5193df27fee0b78bbdc7c2b1f184598c324815ff66602ff4d95528a6d5d80cc4,2024-11-20T15:15:08.830000
CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3bdb,2024-06-04T19:21:00.860000 CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3bdb,2024-06-04T19:21:00.860000
CVE-2024-51211,0,0,581556a1bd92632bbd04cf9aebe233d1f5e96f417c538ff40e3ed80078a79ca9,2024-11-12T13:56:54.483000 CVE-2024-51211,0,0,581556a1bd92632bbd04cf9aebe233d1f5e96f417c538ff40e3ed80078a79ca9,2024-11-12T13:56:54.483000
CVE-2024-51213,0,0,a598a44042c959028b27d1b964937a81a14ecccc57789a4658084176eb433102,2024-11-12T18:35:33.433000 CVE-2024-51213,0,0,a598a44042c959028b27d1b964937a81a14ecccc57789a4658084176eb433102,2024-11-12T18:35:33.433000
@ -266504,7 +266532,7 @@ CVE-2024-51810,0,0,549393ef55bfeaa10bacf5eab19a7f288a29ac42cef384d88f5eedcb45180
CVE-2024-51811,0,0,c3aeb720a545e51755d532198c2abdc83efba780e137ef31bb72259e442a2dac,2024-11-19T21:57:32.967000 CVE-2024-51811,0,0,c3aeb720a545e51755d532198c2abdc83efba780e137ef31bb72259e442a2dac,2024-11-19T21:57:32.967000
CVE-2024-51812,0,0,02f43140d289864be158795111468c5df6a7496f2148e1822f8482211ec782b2,2024-11-19T21:57:32.967000 CVE-2024-51812,0,0,02f43140d289864be158795111468c5df6a7496f2148e1822f8482211ec782b2,2024-11-19T21:57:32.967000
CVE-2024-51813,0,0,881717fa3ecd7ac7d0617f645bf9efe6c17eaa1fcf36e99fe920e6653b9955d9,2024-11-19T21:57:32.967000 CVE-2024-51813,0,0,881717fa3ecd7ac7d0617f645bf9efe6c17eaa1fcf36e99fe920e6653b9955d9,2024-11-19T21:57:32.967000
CVE-2024-51814,0,1,dbff728a4bb725cd61a55f9b86a3b2cfa71283c788fbc8b18818e13bf895164f,2024-11-20T15:15:09.277000 CVE-2024-51814,0,0,dbff728a4bb725cd61a55f9b86a3b2cfa71283c788fbc8b18818e13bf895164f,2024-11-20T15:15:09.277000
CVE-2024-51816,0,0,8fc70476a3889656ef33f9afbdbb737c9f6e4b707f3dcc28c9ce574c6061d052,2024-11-19T21:57:32.967000 CVE-2024-51816,0,0,8fc70476a3889656ef33f9afbdbb737c9f6e4b707f3dcc28c9ce574c6061d052,2024-11-19T21:57:32.967000
CVE-2024-51817,0,0,20f680e52bd4285719fadbc157e923760b56af7bafeb285f28103b1939afa9d0,2024-11-19T21:57:32.967000 CVE-2024-51817,0,0,20f680e52bd4285719fadbc157e923760b56af7bafeb285f28103b1939afa9d0,2024-11-19T21:57:32.967000
CVE-2024-51819,0,0,bec0915328d873462a4ad31df1c7c2e51d312796bf4ba393de43d362e9dec6da,2024-11-19T21:57:32.967000 CVE-2024-51819,0,0,bec0915328d873462a4ad31df1c7c2e51d312796bf4ba393de43d362e9dec6da,2024-11-19T21:57:32.967000
@ -266727,7 +266755,7 @@ CVE-2024-52303,0,0,57a6450ca3f2acaad0d7a5708a267a8f541a38de3d501010a97d19dc2553c
CVE-2024-52304,0,0,0a277b5748fc03086c52a906e139b6d4003ef5456e902af6a142f3fb7ee5873a,2024-11-19T21:57:32.967000 CVE-2024-52304,0,0,0a277b5748fc03086c52a906e139b6d4003ef5456e902af6a142f3fb7ee5873a,2024-11-19T21:57:32.967000
CVE-2024-52305,0,0,fb3e1fe1f55433965f9f85cb35ad56a3033a246ddb638ca95e4c6fc4285767e7,2024-11-19T18:04:12.680000 CVE-2024-52305,0,0,fb3e1fe1f55433965f9f85cb35ad56a3033a246ddb638ca95e4c6fc4285767e7,2024-11-19T18:04:12.680000
CVE-2024-52306,0,0,dfac1396e024093252f9cdf330e5f0eab10833af9a739a326458e40b25c9c7da,2024-11-19T15:02:45.053000 CVE-2024-52306,0,0,dfac1396e024093252f9cdf330e5f0eab10833af9a739a326458e40b25c9c7da,2024-11-19T15:02:45.053000
CVE-2024-52308,0,1,0db58aa0fd04755222aa7bdf601c835c719685fb73c2d21a31da5f6db6051fd8,2024-11-20T15:07:43.127000 CVE-2024-52308,0,0,0db58aa0fd04755222aa7bdf601c835c719685fb73c2d21a31da5f6db6051fd8,2024-11-20T15:07:43.127000
CVE-2024-5231,0,0,255bed42ab2a064a39e6f8c88880296d2f7a7d154f3db6dc7f4df2fa244d299f,2024-06-04T19:21:02.640000 CVE-2024-5231,0,0,255bed42ab2a064a39e6f8c88880296d2f7a7d154f3db6dc7f4df2fa244d299f,2024-06-04T19:21:02.640000
CVE-2024-52311,0,0,440cc6f6193f2a4b57d7c7c4a4f4b3f01242ca6df6bc89770050e09d3b499acf,2024-11-12T13:56:54.483000 CVE-2024-52311,0,0,440cc6f6193f2a4b57d7c7c4a4f4b3f01242ca6df6bc89770050e09d3b499acf,2024-11-12T13:56:54.483000
CVE-2024-52312,0,0,e095caa38b1d55aa1661d9e6b591e2f5164609c3e5c2884b5f60aa22d851bdcc,2024-11-12T13:56:54.483000 CVE-2024-52312,0,0,e095caa38b1d55aa1661d9e6b591e2f5164609c3e5c2884b5f60aa22d851bdcc,2024-11-12T13:56:54.483000
@ -266796,7 +266824,7 @@ CVE-2024-52398,0,0,e5bdf8bd1e6e6ba29b95e6bd3948deedce03b788ce3b7c86fbe57b02a2d81
CVE-2024-52399,0,0,07c7cf273d38fdbaf95ad790ac160d741defdb72f19d4c82c904f30f440acdc0,2024-11-18T17:11:17.393000 CVE-2024-52399,0,0,07c7cf273d38fdbaf95ad790ac160d741defdb72f19d4c82c904f30f440acdc0,2024-11-18T17:11:17.393000
CVE-2024-5240,0,0,f498b44970022e280094b55bfe8352214cc561bf319f52e66772660c36836426,2024-06-04T19:21:03.623000 CVE-2024-5240,0,0,f498b44970022e280094b55bfe8352214cc561bf319f52e66772660c36836426,2024-06-04T19:21:03.623000
CVE-2024-52400,0,0,44b0790e8e233d5851b26d34fd4519ebdf170be728fb130b9b94645b40759b20,2024-11-18T17:11:17.393000 CVE-2024-52400,0,0,44b0790e8e233d5851b26d34fd4519ebdf170be728fb130b9b94645b40759b20,2024-11-18T17:11:17.393000
CVE-2024-52401,0,1,3c7ad87ad1fb28107d2ad7c694246e1a6d2d5c20b770ace549f2906e31aa19ab,2024-11-20T15:15:10.653000 CVE-2024-52401,0,0,3c7ad87ad1fb28107d2ad7c694246e1a6d2d5c20b770ace549f2906e31aa19ab,2024-11-20T15:15:10.653000
CVE-2024-52402,0,0,143e1d780eb37d2cde5443a043c2a644572b3c77f04f98f0ee533952e691736e,2024-11-19T21:56:45.533000 CVE-2024-52402,0,0,143e1d780eb37d2cde5443a043c2a644572b3c77f04f98f0ee533952e691736e,2024-11-19T21:56:45.533000
CVE-2024-52403,0,0,6aa15ef348a999b51ff4538558f3d975f3457a7b8bb81fab35d4412a585a766a,2024-11-18T17:11:17.393000 CVE-2024-52403,0,0,6aa15ef348a999b51ff4538558f3d975f3457a7b8bb81fab35d4412a585a766a,2024-11-18T17:11:17.393000
CVE-2024-52404,0,0,48dc8a2f2e6059d5ac0938582d5d8d22444e4b63438da11dae47f3bbf5cb3c07,2024-11-18T17:11:17.393000 CVE-2024-52404,0,0,48dc8a2f2e6059d5ac0938582d5d8d22444e4b63438da11dae47f3bbf5cb3c07,2024-11-18T17:11:17.393000
@ -266815,26 +266843,26 @@ CVE-2024-52415,0,0,f21cef685cb9331554c3a9593db27e3c461879e2157c0326f8a0ec52f296f
CVE-2024-52416,0,0,772b2f7a98d658000abbec2309afddbd39b233f5dbc3890f465aff8777803c32,2024-11-18T17:11:17.393000 CVE-2024-52416,0,0,772b2f7a98d658000abbec2309afddbd39b233f5dbc3890f465aff8777803c32,2024-11-18T17:11:17.393000
CVE-2024-52417,0,0,85192d1e85503352c4fa9586bbe5bef1781cb507ba5ab8dae01705d4a6d80653,2024-11-19T21:57:32.967000 CVE-2024-52417,0,0,85192d1e85503352c4fa9586bbe5bef1781cb507ba5ab8dae01705d4a6d80653,2024-11-19T21:57:32.967000
CVE-2024-52418,0,0,cae0ff9c02a75dad97a46113c435b978bb74fdddf4e4c8ecf64aca8dd516f659,2024-11-19T21:57:32.967000 CVE-2024-52418,0,0,cae0ff9c02a75dad97a46113c435b978bb74fdddf4e4c8ecf64aca8dd516f659,2024-11-19T21:57:32.967000
CVE-2024-52419,0,1,cea9862b38881ee6b8ea0656d923448e377d2bec00aea399743cad62336d258c,2024-11-20T15:18:20.727000 CVE-2024-52419,0,0,cea9862b38881ee6b8ea0656d923448e377d2bec00aea399743cad62336d258c,2024-11-20T15:18:20.727000
CVE-2024-5242,0,0,8cd95bcd77d40a92ee0a6d389bf812b544cb6fb4b8301f7049b84de17fceaeef,2024-05-24T01:15:30.977000 CVE-2024-5242,0,0,8cd95bcd77d40a92ee0a6d389bf812b544cb6fb4b8301f7049b84de17fceaeef,2024-05-24T01:15:30.977000
CVE-2024-52420,0,0,2cb30faa86447010f6f2c0a8bab5654f0c634929245006dc4c54ed00602072a3,2024-11-19T21:56:45.533000 CVE-2024-52420,0,0,2cb30faa86447010f6f2c0a8bab5654f0c634929245006dc4c54ed00602072a3,2024-11-19T21:56:45.533000
CVE-2024-52421,0,0,62d805b3a16a7d18da43ffdb2dfc842acf3a47153a56546b0066b2d5d56af31f,2024-11-19T21:56:45.533000 CVE-2024-52421,0,0,62d805b3a16a7d18da43ffdb2dfc842acf3a47153a56546b0066b2d5d56af31f,2024-11-19T21:56:45.533000
CVE-2024-52422,0,1,2ca19a7331492f34d75873cb2d5c1dafe58aa3a24e659a2cfde08f4411481dc0,2024-11-20T15:12:06.680000 CVE-2024-52422,0,0,2ca19a7331492f34d75873cb2d5c1dafe58aa3a24e659a2cfde08f4411481dc0,2024-11-20T15:12:06.680000
CVE-2024-52423,0,0,4396d7f62487e6daaec36d37ec8194b9098b85e3bfa891916208754cb6abb9dd,2024-11-20T14:56:13.147000 CVE-2024-52423,0,0,4396d7f62487e6daaec36d37ec8194b9098b85e3bfa891916208754cb6abb9dd,2024-11-20T14:56:13.147000
CVE-2024-52424,0,0,92c7a4f694477b0c4adbf5f52c44f2bc67a72e6754c53ddf12883836fcf8fd5a,2024-11-20T14:47:46.877000 CVE-2024-52424,0,0,92c7a4f694477b0c4adbf5f52c44f2bc67a72e6754c53ddf12883836fcf8fd5a,2024-11-20T14:47:46.877000
CVE-2024-52425,0,0,7b79e59d5c7916ff5a38769e37eb8655b09a371aae55a8bf43184161ecda71f0,2024-11-20T14:43:05.467000 CVE-2024-52425,0,0,7b79e59d5c7916ff5a38769e37eb8655b09a371aae55a8bf43184161ecda71f0,2024-11-20T14:43:05.467000
CVE-2024-52426,0,0,6b0290274d67e9fe59d70ab5f7cef8b5ed4ca1da67db6eea39b93bfd596fc737,2024-11-20T14:41:43.077000 CVE-2024-52426,0,0,6b0290274d67e9fe59d70ab5f7cef8b5ed4ca1da67db6eea39b93bfd596fc737,2024-11-20T14:41:43.077000
CVE-2024-52427,0,1,19fb87879ffe0765091721b1721c69ddde5ae8f201b5abfc1afd7c1d504d191d,2024-11-20T15:29:52.547000 CVE-2024-52427,0,0,19fb87879ffe0765091721b1721c69ddde5ae8f201b5abfc1afd7c1d504d191d,2024-11-20T15:29:52.547000
CVE-2024-52428,0,1,fb188838fd4b584d30f7a0b1f1794defe447087a9181233dcfb5d3d6bb70449b,2024-11-20T15:29:38.023000 CVE-2024-52428,0,0,fb188838fd4b584d30f7a0b1f1794defe447087a9181233dcfb5d3d6bb70449b,2024-11-20T15:29:38.023000
CVE-2024-52429,0,1,22348abd476cc3deaf038c9d20773ea7e6adc045d0a8ad1a514552038aad0671,2024-11-20T15:28:21.680000 CVE-2024-52429,0,0,22348abd476cc3deaf038c9d20773ea7e6adc045d0a8ad1a514552038aad0671,2024-11-20T15:28:21.680000
CVE-2024-5243,0,0,a611ca30664e8a20900f5d6960dcfa388a8eac21aa2051106052824f1ce073bc,2024-05-24T01:15:30.977000 CVE-2024-5243,0,0,a611ca30664e8a20900f5d6960dcfa388a8eac21aa2051106052824f1ce073bc,2024-05-24T01:15:30.977000
CVE-2024-52430,0,1,5c8f5e9ed9795fbb23c4b2af30568215fb8e78b82ee4fefcbb6f90468ecba679,2024-11-20T15:27:58.350000 CVE-2024-52430,0,0,5c8f5e9ed9795fbb23c4b2af30568215fb8e78b82ee4fefcbb6f90468ecba679,2024-11-20T15:27:58.350000
CVE-2024-52431,0,1,4111ae9ee1fc8271b2e0856133a91dad6a035a0629f2d6af466b323a807dddc2,2024-11-20T15:27:25.293000 CVE-2024-52431,0,0,4111ae9ee1fc8271b2e0856133a91dad6a035a0629f2d6af466b323a807dddc2,2024-11-20T15:27:25.293000
CVE-2024-52432,0,1,3d020550d230219b3bf489dbe4f3c6f0330e3ef76b109b62ef57197fa5e4c402,2024-11-20T15:26:15.960000 CVE-2024-52432,0,0,3d020550d230219b3bf489dbe4f3c6f0330e3ef76b109b62ef57197fa5e4c402,2024-11-20T15:26:15.960000
CVE-2024-52433,0,1,bf2117fcbe51caaa01114d280e0327217823e633d55614af9e7dacab1dcdb932,2024-11-20T15:25:17.773000 CVE-2024-52433,0,0,bf2117fcbe51caaa01114d280e0327217823e633d55614af9e7dacab1dcdb932,2024-11-20T15:25:17.773000
CVE-2024-52434,0,1,c085f289e188d8008b27027b8f717d061311a552ad3167d24e698385cfa3bd00,2024-11-20T16:04:10.167000 CVE-2024-52434,0,0,c085f289e188d8008b27027b8f717d061311a552ad3167d24e698385cfa3bd00,2024-11-20T16:04:10.167000
CVE-2024-52435,0,1,d0a29e7c15c68c2532e6f36ed9da42be9924024a5537b89a4d72ef6ecfb3d73a,2024-11-20T16:58:35.240000 CVE-2024-52435,0,0,d0a29e7c15c68c2532e6f36ed9da42be9924024a5537b89a4d72ef6ecfb3d73a,2024-11-20T16:58:35.240000
CVE-2024-52436,0,1,e25c8bbc379b77ff7dca583cec44c8ab4569d5bf3e8acf17e857cd5bd01300d7,2024-11-20T15:24:35.470000 CVE-2024-52436,0,0,e25c8bbc379b77ff7dca583cec44c8ab4569d5bf3e8acf17e857cd5bd01300d7,2024-11-20T15:24:35.470000
CVE-2024-52437,0,0,919f311130b57eebb1d1dd68fdcabc4aced488ca04d6d661b5497a46423dde5f,2024-11-20T12:15:19.133000 CVE-2024-52437,0,0,919f311130b57eebb1d1dd68fdcabc4aced488ca04d6d661b5497a46423dde5f,2024-11-20T12:15:19.133000
CVE-2024-52438,0,0,7cbfd43b78eb199a9384650d6e0ae42f64cd4f7239f83b963194d5c836b70846,2024-11-20T12:15:19.390000 CVE-2024-52438,0,0,7cbfd43b78eb199a9384650d6e0ae42f64cd4f7239f83b963194d5c836b70846,2024-11-20T12:15:19.390000
CVE-2024-52439,0,0,6d190c01571ed430526e0001854eecb6d513a994b9acb9f04b30037c5db18ae6,2024-11-20T12:15:19.637000 CVE-2024-52439,0,0,6d190c01571ed430526e0001854eecb6d513a994b9acb9f04b30037c5db18ae6,2024-11-20T12:15:19.637000
@ -266854,10 +266882,10 @@ CVE-2024-52450,0,0,002d848f8b202503bc5f349083e6360328b5ca35b8e488d4cb20477667418
CVE-2024-52451,0,0,c4dda19ad903fd6f4cd91db91be4b7e0b1f40513a3624be5b88bb657ca6869ae,2024-11-20T12:15:22.427000 CVE-2024-52451,0,0,c4dda19ad903fd6f4cd91db91be4b7e0b1f40513a3624be5b88bb657ca6869ae,2024-11-20T12:15:22.427000
CVE-2024-5246,0,0,481ebf23b779dd3e32e9e0cda77aaee7d0bfc9eca82266cde6c77415f4c9c730,2024-07-03T02:08:44.767000 CVE-2024-5246,0,0,481ebf23b779dd3e32e9e0cda77aaee7d0bfc9eca82266cde6c77415f4c9c730,2024-07-03T02:08:44.767000
CVE-2024-5247,0,0,fdfe6c1388c42f602cdcb0ffda38b56b5f1ed960e60bfada435f42d294b2956e,2024-05-24T01:15:30.977000 CVE-2024-5247,0,0,fdfe6c1388c42f602cdcb0ffda38b56b5f1ed960e60bfada435f42d294b2956e,2024-05-24T01:15:30.977000
CVE-2024-52470,1,1,1056a8e921e929245f25b46d1b7e1a435f2ea3ebf136056d5c86cf3721d0fcd8,2024-11-20T15:15:10.810000 CVE-2024-52470,0,0,1056a8e921e929245f25b46d1b7e1a435f2ea3ebf136056d5c86cf3721d0fcd8,2024-11-20T15:15:10.810000
CVE-2024-52471,1,1,d8b300ef69bfcbcb29a9b3cfe811f085cc9237972a5d7ecbe7073758ecdf12a9,2024-11-20T15:15:11.010000 CVE-2024-52471,0,0,d8b300ef69bfcbcb29a9b3cfe811f085cc9237972a5d7ecbe7073758ecdf12a9,2024-11-20T15:15:11.010000
CVE-2024-52472,1,1,ce2cab3222d8b621b2ba91024fe7494b0185a8ad2ea776f56b82d385cdb5d210,2024-11-20T15:15:11.237000 CVE-2024-52472,0,0,ce2cab3222d8b621b2ba91024fe7494b0185a8ad2ea776f56b82d385cdb5d210,2024-11-20T15:15:11.237000
CVE-2024-52473,1,1,5130e33c6a3f3d98a0fc58c19aa3c06c52bf935b44f029d120d52d53c95d1f26,2024-11-20T15:15:11.443000 CVE-2024-52473,0,0,5130e33c6a3f3d98a0fc58c19aa3c06c52bf935b44f029d120d52d53c95d1f26,2024-11-20T15:15:11.443000
CVE-2024-5248,0,0,6cfa5cec6de457c13d7096887dc7c2d8bd99f0e898238886822e69d1ee66037e,2024-11-03T17:15:14.860000 CVE-2024-5248,0,0,6cfa5cec6de457c13d7096887dc7c2d8bd99f0e898238886822e69d1ee66037e,2024-11-03T17:15:14.860000
CVE-2024-5249,0,0,7881e207dd06fe76500d559735f87b1084a494789351514ee988debe74e79673,2024-10-01T14:26:17.410000 CVE-2024-5249,0,0,7881e207dd06fe76500d559735f87b1084a494789351514ee988debe74e79673,2024-10-01T14:26:17.410000
CVE-2024-5250,0,0,b4b370273f1fe30d94b715ad219dda570a7dcb84192abd50c3cb746299bdbb93,2024-10-01T14:33:47.727000 CVE-2024-5250,0,0,b4b370273f1fe30d94b715ad219dda570a7dcb84192abd50c3cb746299bdbb93,2024-10-01T14:33:47.727000
@ -266921,11 +266949,11 @@ CVE-2024-52587,0,0,4ff6d32c0cce5d4db211ff88731438a9a256421cd5f2b2cabeafbdadc8a29
CVE-2024-5259,0,0,b3c664cd11ddb9db1b34b50011b18499fc5ac06e8b6b6a588e8cf7d8bc26fc37,2024-06-11T17:44:42.783000 CVE-2024-5259,0,0,b3c664cd11ddb9db1b34b50011b18499fc5ac06e8b6b6a588e8cf7d8bc26fc37,2024-06-11T17:44:42.783000
CVE-2024-52595,0,0,9350e5c85067e132d51c2548051208f53f3e040f154d457bd6c129e1523fcb4c,2024-11-19T22:15:21.120000 CVE-2024-52595,0,0,9350e5c85067e132d51c2548051208f53f3e040f154d457bd6c129e1523fcb4c,2024-11-19T22:15:21.120000
CVE-2024-52597,0,0,0dc15f04b10696c300efbe4aac63baeff7d573b005de682671a7397a19d8fe4d,2024-11-20T14:15:17.967000 CVE-2024-52597,0,0,0dc15f04b10696c300efbe4aac63baeff7d573b005de682671a7397a19d8fe4d,2024-11-20T14:15:17.967000
CVE-2024-52598,1,1,477258740433139def022fa49fc642fb7eea1c94a8945d9797525cab03b121cb,2024-11-20T15:15:11.667000 CVE-2024-52598,0,0,477258740433139def022fa49fc642fb7eea1c94a8945d9797525cab03b121cb,2024-11-20T15:15:11.667000
CVE-2024-5260,0,0,1ea9956e2812efb1ad02a50e6e15b3c5419e86ea96923b6afc83449c65511582,2024-07-02T12:09:16.907000 CVE-2024-5260,0,0,1ea9956e2812efb1ad02a50e6e15b3c5419e86ea96923b6afc83449c65511582,2024-07-02T12:09:16.907000
CVE-2024-52600,0,0,889882d763fff118298a79c0992b9d094668285ba42b3979d1acce7319312517,2024-11-19T21:56:45.533000 CVE-2024-52600,0,0,889882d763fff118298a79c0992b9d094668285ba42b3979d1acce7319312517,2024-11-19T21:56:45.533000
CVE-2024-5261,0,0,0592ac8c89e0cb8027f6648912b9536cab36db7fb70868109d4e1f51168ecc2f,2024-06-25T18:50:42.040000 CVE-2024-5261,0,0,0592ac8c89e0cb8027f6648912b9536cab36db7fb70868109d4e1f51168ecc2f,2024-06-25T18:50:42.040000
CVE-2024-52613,0,0,459074184075f7287395d99f0f5a393f7f6f3bf8fc38dc9383b0dd34b217716c,2024-11-19T20:39:42.197000 CVE-2024-52613,0,1,5250f63c9c5511452022eabcd6488c8c26c81f478ff3445bc230db37173dd9d3,2024-11-20T17:35:28.730000
CVE-2024-52614,0,0,691c38d1248080ff09180daa940a0ea35464380839e23dd93b5188ae19dfbdb8,2024-11-20T06:15:16.023000 CVE-2024-52614,0,0,691c38d1248080ff09180daa940a0ea35464380839e23dd93b5188ae19dfbdb8,2024-11-20T06:15:16.023000
CVE-2024-5262,0,0,83603483afb7387d019b476baa2cae004e6d4e7f9b65a5997b6545bcd7a41b63,2024-06-11T17:18:50.600000 CVE-2024-5262,0,0,83603483afb7387d019b476baa2cae004e6d4e7f9b65a5997b6545bcd7a41b63,2024-06-11T17:18:50.600000
CVE-2024-5263,0,0,997be873c6f28955b5d0d8cb5df3c06ebeb17c50a7068003806eac08a0ed2846,2024-08-07T16:01:35.217000 CVE-2024-5263,0,0,997be873c6f28955b5d0d8cb5df3c06ebeb17c50a7068003806eac08a0ed2846,2024-08-07T16:01:35.217000
@ -266941,18 +266969,24 @@ CVE-2024-5271,0,0,7285855bafca9dd1fc033351db47cae9ea7831aeb2f80b9313f86f9100e15f
CVE-2024-52711,0,0,78721fa26ebd510269586a73a1d757b8cf5c952035a30436ca3be9b5757e4b65,2024-11-19T21:57:32.967000 CVE-2024-52711,0,0,78721fa26ebd510269586a73a1d757b8cf5c952035a30436ca3be9b5757e4b65,2024-11-19T21:57:32.967000
CVE-2024-52714,0,0,658ca957fccc95dcf66f192b351e1eb1aa79e66fe1fbde58b681eba4d3166214,2024-11-19T21:56:45.533000 CVE-2024-52714,0,0,658ca957fccc95dcf66f192b351e1eb1aa79e66fe1fbde58b681eba4d3166214,2024-11-19T21:56:45.533000
CVE-2024-5272,0,0,d387d985ee64cb70308558e1288744b27040b8f28ef99da7e8b0a0af44167dd6,2024-05-28T12:39:28.377000 CVE-2024-5272,0,0,d387d985ee64cb70308558e1288744b27040b8f28ef99da7e8b0a0af44167dd6,2024-05-28T12:39:28.377000
CVE-2024-52725,1,1,33f6fa34c3dd7f326aa8525752182246593fbe26f97c40f7481f5dc188051048,2024-11-20T17:15:18.867000
CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000 CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000
CVE-2024-52739,1,1,101c0b9876bf858a76409f50d2e2d09af749568b9decaf9de2879046e254c2a3,2024-11-20T18:15:23.393000
CVE-2024-5274,0,0,e7d74c38d2c202c949e1ef012213e640b18c31c48483d84bb8a4761d2997d225,2024-08-14T17:07:13.270000 CVE-2024-5274,0,0,e7d74c38d2c202c949e1ef012213e640b18c31c48483d84bb8a4761d2997d225,2024-08-14T17:07:13.270000
CVE-2024-5275,0,0,0a8f92936fd54cfeba80497afbb5044228db5d667d0dcb3a75c34af54c4c0fca,2024-06-20T12:44:01.637000 CVE-2024-5275,0,0,0a8f92936fd54cfeba80497afbb5044228db5d667d0dcb3a75c34af54c4c0fca,2024-06-20T12:44:01.637000
CVE-2024-52759,0,0,80eaed11a6f63280332e88d3cbf4b0530a8471b6b3c6b18c568aa62f2956ad50,2024-11-19T21:56:45.533000 CVE-2024-52759,0,0,80eaed11a6f63280332e88d3cbf4b0530a8471b6b3c6b18c568aa62f2956ad50,2024-11-19T21:56:45.533000
CVE-2024-5276,0,0,b98c8bf623aeff1994feca32cb34066ea8ef6a81fb35099972c112f59613dd44,2024-06-26T12:44:29.693000 CVE-2024-5276,0,0,b98c8bf623aeff1994feca32cb34066ea8ef6a81fb35099972c112f59613dd44,2024-06-26T12:44:29.693000
CVE-2024-52762,0,0,353c63bf6aa3aeb3f0cdcf47d86962135e93381335c1d6bdfca45cd78f17fe81,2024-11-19T21:56:45.533000 CVE-2024-52762,0,0,353c63bf6aa3aeb3f0cdcf47d86962135e93381335c1d6bdfca45cd78f17fe81,2024-11-19T21:56:45.533000
CVE-2024-52763,0,0,c5573017d062db00f6bed25c6759761baf5200224a59e32fc8cc1b829343cac2,2024-11-19T21:56:45.533000 CVE-2024-52763,0,0,c5573017d062db00f6bed25c6759761baf5200224a59e32fc8cc1b829343cac2,2024-11-19T21:56:45.533000
CVE-2024-52769,1,1,b6cb45d7326db7c74bf072246ac67a1dfffc75d7966f0886ca77640876da3fd2,2024-11-20T17:15:19.907000
CVE-2024-5277,0,0,c22b3e398c55d24f660b1a45a3310a9c6b0abef458e72374f87af318fc09202a,2024-10-09T14:49:25.753000 CVE-2024-5277,0,0,c22b3e398c55d24f660b1a45a3310a9c6b0abef458e72374f87af318fc09202a,2024-10-09T14:49:25.753000
CVE-2024-52770,1,1,7aa9649a9670c716ce311ac92684885a9b795e1a2574f48cc59bb70ef562262a,2024-11-20T17:15:20.200000
CVE-2024-52771,1,1,5216faefced1eff97e71e61bc18807aec97654fb9fefe72a0573a6ba693a0484,2024-11-20T17:15:20.637000
CVE-2024-5278,0,0,f0307415163f20adf37f2c92a0ed4578caa6aa4e699bedaa3aae52fa3124b77a,2024-10-17T13:56:49.813000 CVE-2024-5278,0,0,f0307415163f20adf37f2c92a0ed4578caa6aa4e699bedaa3aae52fa3124b77a,2024-10-17T13:56:49.813000
CVE-2024-52788,0,0,10422e316ff1cd1c42e0724b49036642b5ea260660f059be4278fcd3695d7b6c,2024-11-19T21:56:45.533000 CVE-2024-52788,0,0,10422e316ff1cd1c42e0724b49036642b5ea260660f059be4278fcd3695d7b6c,2024-11-19T21:56:45.533000
CVE-2024-52789,0,0,f36dc0a54a71530ea75878243901cd19d9ac10d089d77a73bd61490fb92dd90d,2024-11-19T21:56:45.533000 CVE-2024-52789,0,0,f36dc0a54a71530ea75878243901cd19d9ac10d089d77a73bd61490fb92dd90d,2024-11-19T21:56:45.533000
CVE-2024-5279,0,0,2c6d1e53ece85fba55c2b83835d7abf75ca4da167ddbecc0aa984e59d469dd0e,2024-06-04T19:21:04.240000 CVE-2024-5279,0,0,2c6d1e53ece85fba55c2b83835d7abf75ca4da167ddbecc0aa984e59d469dd0e,2024-06-04T19:21:04.240000
CVE-2024-52796,1,1,c4bd427fdb738f1679f0a9210a59387be5f22896c83df074062019be41d6dd7e,2024-11-20T17:15:20.953000
CVE-2024-5280,0,0,86594c27d113c80fe7aa0a775d64720f8f3d823c49f62206ae5f1ae12a324b16,2024-08-01T13:59:43.187000 CVE-2024-5280,0,0,86594c27d113c80fe7aa0a775d64720f8f3d823c49f62206ae5f1ae12a324b16,2024-08-01T13:59:43.187000
CVE-2024-5281,0,0,d8e0f0c592f3cfcf36fc66f961b905d6afba3d53af3789e65e13042755c0a3cb,2024-08-01T13:59:43.367000 CVE-2024-5281,0,0,d8e0f0c592f3cfcf36fc66f961b905d6afba3d53af3789e65e13042755c0a3cb,2024-08-01T13:59:43.367000
CVE-2024-5282,0,0,d02e51c4b0ee276cbc37162ff12b0d5f63d5cb6622dea90c00e2302f02b5f264,2024-08-01T13:59:43.553000 CVE-2024-5282,0,0,d02e51c4b0ee276cbc37162ff12b0d5f63d5cb6622dea90c00e2302f02b5f264,2024-08-01T13:59:43.553000
@ -267010,8 +267044,8 @@ CVE-2024-53047,0,0,a0801a2f6d3c55ef95cce30e94c6ed5a76950eafd193774abe55034cb7349
CVE-2024-53048,0,0,529447b7e47a46804ce5665f7064fdc0578a20909c47292e6baa06ace21a4eed,2024-11-19T21:56:45.533000 CVE-2024-53048,0,0,529447b7e47a46804ce5665f7064fdc0578a20909c47292e6baa06ace21a4eed,2024-11-19T21:56:45.533000
CVE-2024-53049,0,0,44d5e40e9eda60f021fd6c5857150e80b7654dfc6b0568fd979dc505a8f632cc,2024-11-19T21:56:45.533000 CVE-2024-53049,0,0,44d5e40e9eda60f021fd6c5857150e80b7654dfc6b0568fd979dc505a8f632cc,2024-11-19T21:56:45.533000
CVE-2024-5305,0,0,d7ef5e26da1b4b55d5a1323c739605451e8b0fffa749e9d5cf8a79ba440fa94f,2024-08-23T15:05:41.013000 CVE-2024-5305,0,0,d7ef5e26da1b4b55d5a1323c739605451e8b0fffa749e9d5cf8a79ba440fa94f,2024-08-23T15:05:41.013000
CVE-2024-53050,0,1,20b380eb0c1b82b4c23c14b6a409df233b8c78c5b14431ffad3f70180fc3f0bc,2024-11-20T16:17:12.003000 CVE-2024-53050,0,0,20b380eb0c1b82b4c23c14b6a409df233b8c78c5b14431ffad3f70180fc3f0bc,2024-11-20T16:17:12.003000
CVE-2024-53051,0,1,d08b50fe0fbed16215b8e87b88d62e9cfc8b1b1f63adc6052ddeda3f7d9f4025,2024-11-20T16:16:15.217000 CVE-2024-53051,0,0,d08b50fe0fbed16215b8e87b88d62e9cfc8b1b1f63adc6052ddeda3f7d9f4025,2024-11-20T16:16:15.217000
CVE-2024-53052,0,0,00a80d5d24696944ad7f2545aeaa0e5e3c340f70db4818e22c43bbf88d353ba0,2024-11-19T21:56:45.533000 CVE-2024-53052,0,0,00a80d5d24696944ad7f2545aeaa0e5e3c340f70db4818e22c43bbf88d353ba0,2024-11-19T21:56:45.533000
CVE-2024-53053,0,0,9e6ce7c2ede2f5707b2e28210262ef33b549de207ac6e812772a6b597406567b,2024-11-19T21:56:45.533000 CVE-2024-53053,0,0,9e6ce7c2ede2f5707b2e28210262ef33b549de207ac6e812772a6b597406567b,2024-11-19T21:56:45.533000
CVE-2024-53054,0,0,a90bf902c758209738d8e7389175368e1542f41cbbf37e52394bd445b0b8001d,2024-11-19T21:56:45.533000 CVE-2024-53054,0,0,a90bf902c758209738d8e7389175368e1542f41cbbf37e52394bd445b0b8001d,2024-11-19T21:56:45.533000
@ -268664,7 +268698,7 @@ CVE-2024-7189,0,0,ff23bad07ab6275204285dcbecd341c53e0f43077ff255ee222be124d95deb
CVE-2024-7190,0,0,6b10a3300e7f1568fb96fd13af7e875d61c31bab7b7b7e6416cbb0109bea73d4,2024-08-23T14:23:56.243000 CVE-2024-7190,0,0,6b10a3300e7f1568fb96fd13af7e875d61c31bab7b7b7e6416cbb0109bea73d4,2024-08-23T14:23:56.243000
CVE-2024-7191,0,0,05a58f0ea89619617ea6d05464587bd2a57828801e18ec1f64442f7e68c768f8,2024-08-23T14:24:48.103000 CVE-2024-7191,0,0,05a58f0ea89619617ea6d05464587bd2a57828801e18ec1f64442f7e68c768f8,2024-08-23T14:24:48.103000
CVE-2024-7192,0,0,6102e2c061b392d7cc60badb5f7058fe4f352fff0fcb923589fe1aff828e98a0,2024-08-23T14:25:37.527000 CVE-2024-7192,0,0,6102e2c061b392d7cc60badb5f7058fe4f352fff0fcb923589fe1aff828e98a0,2024-08-23T14:25:37.527000
CVE-2024-7193,0,0,dd80ed0d2df4634fbcb8c6fe154f9a55283158b63bfb6074f48bd9b87a10cf87,2024-09-11T16:47:59.613000 CVE-2024-7193,0,1,a7792ab358806bb530ac0c5ce816eeadff0824c0332b64e6f400175db8173aba,2024-11-20T17:04:07.447000
CVE-2024-7194,0,0,fb8fb327a2568c1f320f1950bfd0d09d6807afbd06bbd21f9382e7a1490f26a5,2024-08-12T14:35:56.040000 CVE-2024-7194,0,0,fb8fb327a2568c1f320f1950bfd0d09d6807afbd06bbd21f9382e7a1490f26a5,2024-08-12T14:35:56.040000
CVE-2024-7195,0,0,6200e8d18c215bbfa8ef0be79e3a73b7174d7501600a48a5810d4c572cbb7769,2024-08-12T14:35:58.443000 CVE-2024-7195,0,0,6200e8d18c215bbfa8ef0be79e3a73b7174d7501600a48a5810d4c572cbb7769,2024-08-12T14:35:58.443000
CVE-2024-7196,0,0,aa78bda25303d7508f05178076eb7f1847a629e60799ff5c817fd6b3a1be9a5a,2024-08-12T14:36:00.460000 CVE-2024-7196,0,0,aa78bda25303d7508f05178076eb7f1847a629e60799ff5c817fd6b3a1be9a5a,2024-08-12T14:36:00.460000
@ -269201,7 +269235,7 @@ CVE-2024-7832,0,0,d4a13ef09d831987125a8ecb9cb6f57fc4d78d65bea0a84d0e17ca92ee69e7
CVE-2024-7833,0,0,b984e9fbf1df09267f07d264c50d0ef7583d91d54c2e1f8dd098a2d9fc6334c8,2024-08-19T16:00:21.393000 CVE-2024-7833,0,0,b984e9fbf1df09267f07d264c50d0ef7583d91d54c2e1f8dd098a2d9fc6334c8,2024-08-19T16:00:21.393000
CVE-2024-7834,0,0,ebe9de8b36536d4820911cd556ba678f6b7b55833622e60cf4b49b06fccd4ac0,2024-09-05T17:52:06.147000 CVE-2024-7834,0,0,ebe9de8b36536d4820911cd556ba678f6b7b55833622e60cf4b49b06fccd4ac0,2024-09-05T17:52:06.147000
CVE-2024-7835,0,0,a98c27e86b496b21f60fe5d08184e2ecc9eaf4566c38f6b900e7048c14c277ba,2024-09-26T13:32:55.343000 CVE-2024-7835,0,0,a98c27e86b496b21f60fe5d08184e2ecc9eaf4566c38f6b900e7048c14c277ba,2024-09-26T13:32:55.343000
CVE-2024-7836,0,1,4aa8c455c02fb139d867b1dee10e356cdead87793286ea57d5c4ac5ed708a549,2024-11-20T15:09:34.677000 CVE-2024-7836,0,0,4aa8c455c02fb139d867b1dee10e356cdead87793286ea57d5c4ac5ed708a549,2024-11-20T15:09:34.677000
CVE-2024-7838,0,0,27df02a5cc65e831a93d364f5957ee1462f1aebc7844c7c31edfb410cb0a1545,2024-08-20T19:16:59.373000 CVE-2024-7838,0,0,27df02a5cc65e831a93d364f5957ee1462f1aebc7844c7c31edfb410cb0a1545,2024-08-20T19:16:59.373000
CVE-2024-7839,0,0,188e96c2e6da74526fb5bd6714aa4962487dce47bff2bfe2c2ee9934d7c43ce6,2024-08-19T21:18:14.097000 CVE-2024-7839,0,0,188e96c2e6da74526fb5bd6714aa4962487dce47bff2bfe2c2ee9934d7c43ce6,2024-08-19T21:18:14.097000
CVE-2024-7840,0,0,963356a9762201b3473b18afed67c4be12b6ccd9205428ff0b709dc8e1190467,2024-10-15T14:52:57.110000 CVE-2024-7840,0,0,963356a9762201b3473b18afed67c4be12b6ccd9205428ff0b709dc8e1190467,2024-10-15T14:52:57.110000
@ -270297,7 +270331,7 @@ CVE-2024-9351,0,0,33d034faa3e6b0aeb71bafa0ae8b2ea418555ae0b07eef9d890e7c43507fa4
CVE-2024-9352,0,0,788f5bf16f633f8f02e340b198528b062bcda6aeec70a897601eaf656cd6ab6a,2024-10-18T12:52:33.507000 CVE-2024-9352,0,0,788f5bf16f633f8f02e340b198528b062bcda6aeec70a897601eaf656cd6ab6a,2024-10-18T12:52:33.507000
CVE-2024-9353,0,0,64ddffc3239a0d67e3b79e48af9889b2f8d89027aa9c53de3cc5595dbd6f2fd7,2024-10-08T18:50:51.357000 CVE-2024-9353,0,0,64ddffc3239a0d67e3b79e48af9889b2f8d89027aa9c53de3cc5595dbd6f2fd7,2024-10-08T18:50:51.357000
CVE-2024-9355,0,0,570ad877d483bb09965789a55ded749f6bf93157d75b7c1bf9e468e102c889b7,2024-11-15T20:15:21.523000 CVE-2024-9355,0,0,570ad877d483bb09965789a55ded749f6bf93157d75b7c1bf9e468e102c889b7,2024-11-15T20:15:21.523000
CVE-2024-9356,0,1,29c2a7ef856f7f8c8f9866d78eaa9a05e4ca83219bf1420c5acc0f1b2b458aa2,2024-11-20T15:01:41.627000 CVE-2024-9356,0,0,29c2a7ef856f7f8c8f9866d78eaa9a05e4ca83219bf1420c5acc0f1b2b458aa2,2024-11-20T15:01:41.627000
CVE-2024-9357,0,0,ecac5cca1d13ae41e27c64ccd21707ad2b9f6cb13725a3072faecffbc49d78e9,2024-11-12T13:55:21.227000 CVE-2024-9357,0,0,ecac5cca1d13ae41e27c64ccd21707ad2b9f6cb13725a3072faecffbc49d78e9,2024-11-12T13:55:21.227000
CVE-2024-9358,0,0,ad1311c8435fb7ce092ff9c8b7c1abe83209465bc92e72b7b733a8ea9fa4bf3c,2024-10-04T13:51:25.567000 CVE-2024-9358,0,0,ad1311c8435fb7ce092ff9c8b7c1abe83209465bc92e72b7b733a8ea9fa4bf3c,2024-10-04T13:51:25.567000
CVE-2024-9359,0,0,c3e20cb7feaf9e2d5c48c39f4d484e16226f28d5df197104e70b6a5f0b84dc00,2024-10-04T18:54:12.417000 CVE-2024-9359,0,0,c3e20cb7feaf9e2d5c48c39f4d484e16226f28d5df197104e70b6a5f0b84dc00,2024-10-04T18:54:12.417000

Can't render this file because it is too large.