Auto-Update: 2024-12-18T15:00:47.748228+00:00

This commit is contained in:
cad-safe-bot 2024-12-18 15:04:12 +00:00
parent 07df3e7389
commit 6fc7da1490
51 changed files with 2412 additions and 260 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-13312",
"sourceIdentifier": "security@android.com",
"published": "2024-11-15T22:15:14.300",
"lastModified": "2024-11-19T16:35:02.293",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:49:59.103",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B578E383-0D77-4AC7-9C81-3F0B8C18E033"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-05-01",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-13313",
"sourceIdentifier": "security@android.com",
"published": "2024-11-15T22:15:14.373",
"lastModified": "2024-11-19T16:35:03.173",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:44:13.577",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-835"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,61 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E70C6D8D-C9C3-4D92-8DFC-71F59E068295"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "691FA41B-C2CE-413F-ABB1-0B22CB322807"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "09E6085C-A61E-4A89-BF80-EDD9A7DF1E47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D835D592-2423-44C6-804A-3AD010112E7C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "568E2561-A068-46A2-B331-BBA91FC96F0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B578E383-0D77-4AC7-9C81-3F0B8C18E033"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-05-01",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-13314",
"sourceIdentifier": "security@android.com",
"published": "2024-11-15T22:15:14.440",
"lastModified": "2024-11-19T16:35:03.990",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:36:21.610",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,51 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "09E6085C-A61E-4A89-BF80-EDD9A7DF1E47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D835D592-2423-44C6-804A-3AD010112E7C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "568E2561-A068-46A2-B331-BBA91FC96F0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B578E383-0D77-4AC7-9C81-3F0B8C18E033"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-05-01",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2017-13315",
"sourceIdentifier": "security@android.com",
"published": "2024-11-19T18:15:18.613",
"lastModified": "2024-11-20T17:35:01.990",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:23:37.877",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-131"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,61 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E70C6D8D-C9C3-4D92-8DFC-71F59E068295"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "691FA41B-C2CE-413F-ABB1-0B22CB322807"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "09E6085C-A61E-4A89-BF80-EDD9A7DF1E47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D835D592-2423-44C6-804A-3AD010112E7C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "568E2561-A068-46A2-B331-BBA91FC96F0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B578E383-0D77-4AC7-9C81-3F0B8C18E033"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-05-01",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-9365",
"sourceIdentifier": "security@android.com",
"published": "2024-11-19T21:15:05.587",
"lastModified": "2024-11-21T16:15:15.473",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:20:32.350",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,61 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E70C6D8D-C9C3-4D92-8DFC-71F59E068295"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:6.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "691FA41B-C2CE-413F-ABB1-0B22CB322807"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "09E6085C-A61E-4A89-BF80-EDD9A7DF1E47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D835D592-2423-44C6-804A-3AD010112E7C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "568E2561-A068-46A2-B331-BBA91FC96F0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B578E383-0D77-4AC7-9C81-3F0B8C18E033"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-07-01",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2018-9468",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T17:15:08.783",
"lastModified": "2024-11-21T13:57:24.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:18:23.677",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -39,10 +59,68 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "09E6085C-A61E-4A89-BF80-EDD9A7DF1E47"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D835D592-2423-44C6-804A-3AD010112E7C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:7.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "568E2561-A068-46A2-B331-BBA91FC96F0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B578E383-0D77-4AC7-9C81-3F0B8C18E033"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B06BE74B-83F4-41A3-8AD3-2E6248F7B0B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8DFAAD08-36DA-4C95-8200-C29FE5B6B854"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-15594",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-09-30T18:15:22.333",
"lastModified": "2024-11-21T05:05:49.313",
"lastModified": "2024-12-18T14:34:36.427",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -105,9 +105,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zohocorp:application_control_plus:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:zohocorp:manageengine_application_control_plus:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.511",
"matchCriteriaId": "8138BB72-FFBA-41ED-872B-45F12C1F7E80"
"matchCriteriaId": "DF31CC08-8FB7-4913-925E-FDFE4E4DC366"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2020-15595",
"sourceIdentifier": "cve@mitre.org",
"published": "2020-09-30T18:15:22.413",
"lastModified": "2024-11-21T05:05:49.457",
"lastModified": "2024-12-18T14:34:36.427",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -105,9 +105,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:zohocorp:application_control_plus:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:zohocorp:manageengine_application_control_plus:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.511",
"matchCriteriaId": "8138BB72-FFBA-41ED-872B-45F12C1F7E80"
"matchCriteriaId": "DF31CC08-8FB7-4913-925E-FDFE4E4DC366"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-21270",
"sourceIdentifier": "security@android.com",
"published": "2024-11-19T18:15:19.253",
"lastModified": "2024-11-20T17:35:18.563",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:22:02.343",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,41 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C64C1583-CDE0-4C1F-BDE6-05643C1BDD72"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2023-08-01",
"source": "security@android.com"
"source": "security@android.com",
"tags": [
"Patch",
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2023-34990",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-12-18T13:15:05.547",
"lastModified": "2024-12-18T13:15:05.547",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 allows attacker to execute unauthorized code or commands via specially crafted web requests."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-23"
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-144",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12653",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-16T16:15:06.593",
"lastModified": "2024-12-16T16:15:06.593",
"vulnStatus": "Received",
"lastModified": "2024-12-18T13:53:28.700",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in FabulaTech USB over Network 6.0.6.1. Affected is the function 0x22040C in the library ftusbbus2.sys of the component IOCT Handler. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en FabulaTech USB over Network 6.0.6.1. La funci\u00f3n afectada es 0x22040C en la librer\u00eda ftusbbus2.sys del componente IOCT Handler. La manipulaci\u00f3n provoca la desreferenciaci\u00f3n de puntero nulo. Se requiere acceso local para abordar este ataque. El exploit se ha divulgado al p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta divulgaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,24 +142,64 @@
"value": "CWE-476"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabulatech:usb_over_network:6.0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "32432255-3075-4B68-885D-FF4E626BBFE1"
}
]
}
]
}
],
"references": [
{
"url": "https://shareforall.notion.site/FabulaTech-USB-over-Network-Client-ftusbbus2-0x22040C-NPD-DOS-15160437bb1e80228995f9a74a5c233c?pvs=4",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.288522",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.288522",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.456026",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-12654",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-16T16:15:06.810",
"lastModified": "2024-12-16T16:15:06.810",
"vulnStatus": "Received",
"lastModified": "2024-12-18T13:42:22.853",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in FabulaTech USB over Network 6.0.6.1. Affected by this vulnerability is the function 0x220408 in the library ftusbbus2.sys of the component IOCT Handler. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad clasificada como problem\u00e1tica en FabulaTech USB over Network 6.0.6.1. La funci\u00f3n 0x220408 de la librer\u00eda ftusbbus2.sys del componente IOCT Handler se ve afectada por esta vulnerabilidad. La manipulaci\u00f3n provoca la desreferenciaci\u00f3n de puntero nulo. Es necesario realizar un ataque local. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -76,6 +80,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -107,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,24 +142,64 @@
"value": "CWE-476"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabulatech:usb_over_network:6.0.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "32432255-3075-4B68-885D-FF4E626BBFE1"
}
]
}
]
}
],
"references": [
{
"url": "https://shareforall.notion.site/FabulaTech-USB-over-Network-Client-ftusbbus2-0x220408-NPD-DOS-15160437bb1e803e9b3df784e61c6dcd",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.288523",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.288523",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.456028",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-48889",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-12-18T13:15:06.463",
"lastModified": "2024-12-18T13:15:06.463",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability [CWE-78] in FortiManager version 7.6.0, version 7.4.4 and below, version 7.2.7 and below, version 7.0.12 and below, version 6.4.14 and below and FortiManager Cloud version 7.4.4 and below, version 7.2.7 to 7.2.1, version 7.0.12 to 7.0.1 may allow an authenticated remote attacker to execute unauthorized code via FGFM crafted requests."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-425",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49551",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T20:15:19.110",
"lastModified": "2024-12-10T20:15:19.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:45:20.283",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,53 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:media_encoder:*:*:*:*:*:*:*:*",
"versionEndExcluding": "24.6.3",
"matchCriteriaId": "0B06C85E-8410-42CB-A94B-C3EC9E7682A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:media_encoder:25.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F762C3A9-45B9-4177-AF1D-BED7EAF1F19E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/media-encoder/apsb24-93.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49552",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T20:15:19.297",
"lastModified": "2024-12-10T20:15:19.297",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:45:10.450",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,55 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:media_encoder:*:*:*:*:*:*:*:*",
"versionEndExcluding": "24.6.3",
"matchCriteriaId": "0B06C85E-8410-42CB-A94B-C3EC9E7682A2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:media_encoder:25.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F762C3A9-45B9-4177-AF1D-BED7EAF1F19E"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/media-encoder/apsb24-93.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49553",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T20:15:19.530",
"lastModified": "2024-12-10T20:15:19.530",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:44:55.723",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,53 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:media_encoder:*:*:*:*:*:*:*:*",
"versionEndExcluding": "24.6.4",
"matchCriteriaId": "D4C487AB-3B7F-41A1-A764-AEA7840607E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:media_encoder:25.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F762C3A9-45B9-4177-AF1D-BED7EAF1F19E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/media-encoder/apsb24-93.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49554",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T20:15:19.963",
"lastModified": "2024-12-10T20:15:19.963",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:44:39.800",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,53 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:media_encoder:*:*:*:*:*:*:*:*",
"versionEndExcluding": "24.6.4",
"matchCriteriaId": "D4C487AB-3B7F-41A1-A764-AEA7840607E1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:media_encoder:25.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F762C3A9-45B9-4177-AF1D-BED7EAF1F19E"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/media-encoder/apsb24-93.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-4995",
"sourceIdentifier": "cvd@cert.pl",
"published": "2024-12-18T12:15:09.940",
"lastModified": "2024-12-18T12:15:09.940",
"lastModified": "2024-12-18T13:15:06.603",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -18,17 +18,17 @@
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:U/V:C/RE:M/U:Amber",
"baseScore": 9.2,
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:U/V:C/RE:M/U:Amber",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-50570",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-12-18T13:15:06.723",
"lastModified": "2024-12-18T13:15:06.723",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cleartext Storage of Sensitive Information vulnerability [CWE-312] in FortiClientWindows 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.0 through 7.0.13 and FortiClientLinux 7.4.0 through 7.4.2, 7.2.0 through 7.2.7, 7.0.0 through 7.0.13 may permit a local authenticated user to retrieve VPN password via memory dump, due to JavaScript's garbage collector"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:N/A:N",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.6,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-278",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52822",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T22:15:14.070",
"lastModified": "2024-12-10T22:15:14.070",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-18T14:35:48.033",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.22.0",
"matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.11.0",
"matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52823",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T22:15:14.223",
"lastModified": "2024-12-10T22:15:14.223",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-18T14:35:57.397",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.22.0",
"matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.11.0",
"matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52824",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T22:15:14.367",
"lastModified": "2024-12-10T22:15:14.367",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-18T14:36:05.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.22.0",
"matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.11.0",
"matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52825",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T22:15:14.523",
"lastModified": "2024-12-10T22:15:14.523",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-18T14:36:15.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.22.0",
"matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.11.0",
"matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52826",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T22:15:14.687",
"lastModified": "2024-12-10T22:15:14.687",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-18T14:36:23.140",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.22.0",
"matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.11.0",
"matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52833",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T22:15:18.250",
"lastModified": "2024-12-10T22:15:18.250",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:37:46.917",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:substance_3d_modeler:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.14.1",
"matchCriteriaId": "EBD3683C-D9A5-45EC-BF8F-CE9720A9F64B"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d-modeler/apsb24-102.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52837",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T22:15:18.850",
"lastModified": "2024-12-10T22:15:18.850",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-18T14:34:46.873",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.22.0",
"matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.11.0",
"matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52838",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T22:15:19.000",
"lastModified": "2024-12-10T22:15:19.000",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-18T14:34:59.720",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.22.0",
"matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.11.0",
"matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52839",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T22:15:19.150",
"lastModified": "2024-12-10T22:15:19.150",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-18T14:35:11.923",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.22.0",
"matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.11.0",
"matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52840",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T22:15:19.297",
"lastModified": "2024-12-10T22:15:19.297",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-18T14:35:19.387",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.22.0",
"matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.11.0",
"matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52844",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T22:15:19.900",
"lastModified": "2024-12-10T22:15:19.900",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-18T14:35:26.830",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,37 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*",
"versionEndExcluding": "6.5.22.0",
"matchCriteriaId": "4A30C141-E776-4D0C-8F40-17C9560BF2A3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*",
"versionEndExcluding": "2024.11.0",
"matchCriteriaId": "32D69634-ED91-469C-B4C8-FE1E942DCCE4"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-69.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52994",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:19.310",
"lastModified": "2024-12-10T21:15:19.310",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:38:48.680",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:substance_3d_sampler:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.5.2",
"matchCriteriaId": "D276D732-CD9B-4AB1-A969-AE51E015D685"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d-sampler/apsb24-100.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52995",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:19.440",
"lastModified": "2024-12-10T21:15:19.440",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:38:36.227",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,50 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:substance_3d_sampler:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.5.2",
"matchCriteriaId": "D276D732-CD9B-4AB1-A969-AE51E015D685"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d-sampler/apsb24-100.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52996",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:19.573",
"lastModified": "2024-12-10T21:15:19.573",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:38:24.727",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,50 @@
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:substance_3d_sampler:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.5.2",
"matchCriteriaId": "D276D732-CD9B-4AB1-A969-AE51E015D685"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d-sampler/apsb24-100.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54037",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:21.080",
"lastModified": "2024-12-10T21:15:21.080",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:40:29.303",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.0,
"impactScore": 5.8
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,10 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.4.9",
"matchCriteriaId": "599EEA89-BDA1-4FF2-9B78-103DDDD1E262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0",
"versionEndExcluding": "12.7",
"matchCriteriaId": "E877A861-6761-4E6E-8589-34C30346DCEE"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/connect/apsb24-99.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54039",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:21.337",
"lastModified": "2024-12-10T21:15:21.337",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:40:37.587",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.4.9",
"matchCriteriaId": "599EEA89-BDA1-4FF2-9B78-103DDDD1E262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0",
"versionEndExcluding": "12.7",
"matchCriteriaId": "E877A861-6761-4E6E-8589-34C30346DCEE"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/connect/apsb24-99.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54040",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:21.463",
"lastModified": "2024-12-10T21:15:21.463",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:40:44.710",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.4.9",
"matchCriteriaId": "599EEA89-BDA1-4FF2-9B78-103DDDD1E262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0",
"versionEndExcluding": "12.7",
"matchCriteriaId": "E877A861-6761-4E6E-8589-34C30346DCEE"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/connect/apsb24-99.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54041",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:21.590",
"lastModified": "2024-12-10T21:15:21.590",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:40:52.247",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.4.9",
"matchCriteriaId": "599EEA89-BDA1-4FF2-9B78-103DDDD1E262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0",
"versionEndExcluding": "12.7",
"matchCriteriaId": "E877A861-6761-4E6E-8589-34C30346DCEE"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/connect/apsb24-99.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54042",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:21.720",
"lastModified": "2024-12-10T21:15:21.720",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:41:18.750",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,10 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.4.9",
"matchCriteriaId": "599EEA89-BDA1-4FF2-9B78-103DDDD1E262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0",
"versionEndExcluding": "12.7",
"matchCriteriaId": "E877A861-6761-4E6E-8589-34C30346DCEE"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/connect/apsb24-99.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54043",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:21.850",
"lastModified": "2024-12-10T21:15:21.850",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:41:29.400",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,10 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.4.9",
"matchCriteriaId": "599EEA89-BDA1-4FF2-9B78-103DDDD1E262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0",
"versionEndExcluding": "12.7",
"matchCriteriaId": "E877A861-6761-4E6E-8589-34C30346DCEE"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/connect/apsb24-99.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54044",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:21.977",
"lastModified": "2024-12-10T21:15:21.977",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:41:48.010",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,10 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.4.9",
"matchCriteriaId": "599EEA89-BDA1-4FF2-9B78-103DDDD1E262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0",
"versionEndExcluding": "12.7",
"matchCriteriaId": "E877A861-6761-4E6E-8589-34C30346DCEE"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/connect/apsb24-99.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54045",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:22.110",
"lastModified": "2024-12-10T21:15:22.110",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:41:55.727",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,10 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.4.9",
"matchCriteriaId": "599EEA89-BDA1-4FF2-9B78-103DDDD1E262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0",
"versionEndExcluding": "12.7",
"matchCriteriaId": "E877A861-6761-4E6E-8589-34C30346DCEE"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/connect/apsb24-99.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54046",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:22.237",
"lastModified": "2024-12-10T21:15:22.237",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:42:06.897",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,10 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.4.9",
"matchCriteriaId": "599EEA89-BDA1-4FF2-9B78-103DDDD1E262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0",
"versionEndExcluding": "12.7",
"matchCriteriaId": "E877A861-6761-4E6E-8589-34C30346DCEE"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/connect/apsb24-99.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54047",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:22.360",
"lastModified": "2024-12-10T21:15:22.360",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:42:14.767",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,10 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.4.9",
"matchCriteriaId": "599EEA89-BDA1-4FF2-9B78-103DDDD1E262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0",
"versionEndExcluding": "12.7",
"matchCriteriaId": "E877A861-6761-4E6E-8589-34C30346DCEE"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/connect/apsb24-99.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54048",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:22.490",
"lastModified": "2024-12-10T21:15:22.490",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:42:22.940",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,10 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.4.9",
"matchCriteriaId": "599EEA89-BDA1-4FF2-9B78-103DDDD1E262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0",
"versionEndExcluding": "12.7",
"matchCriteriaId": "E877A861-6761-4E6E-8589-34C30346DCEE"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/connect/apsb24-99.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54049",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-12-10T21:15:22.627",
"lastModified": "2024-12-10T21:15:22.627",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-18T14:42:33.907",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,10 +51,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.4.9",
"matchCriteriaId": "599EEA89-BDA1-4FF2-9B78-103DDDD1E262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:connect:*:*:*:*:*:*:*:*",
"versionStartIncluding": "12.0",
"versionEndExcluding": "12.7",
"matchCriteriaId": "E877A861-6761-4E6E-8589-34C30346DCEE"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/connect/apsb24-99.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54502",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-12-12T02:15:30.957",
"lastModified": "2024-12-12T16:15:56.587",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-18T14:13:13.297",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,30 +81,103 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.2",
"matchCriteriaId": "12581F66-E5CF-4B04-A94C-E56DE31D0B62"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.2",
"matchCriteriaId": "61B67D76-E2DA-46D7-9E43-4E18D542AA57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.2",
"matchCriteriaId": "02BF92BD-305C-46CA-8A77-C247AF8B1BC0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0",
"versionEndExcluding": "15.2",
"matchCriteriaId": "A29E5D37-B333-4B43-9E4A-012CDD2C406D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.2",
"matchCriteriaId": "3B719BB6-424F-4612-8809-0DF25022C29C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.2",
"matchCriteriaId": "16F83EAF-2879-4515-BC44-6AE5006D35EE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.2",
"matchCriteriaId": "8C446885-2BC5-454D-88A1-146B17C051C3"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121837",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121839",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121843",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121844",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121845",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121846",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54514",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-12-12T02:15:31.643",
"lastModified": "2024-12-12T16:15:56.743",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-18T14:05:50.673",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -39,30 +59,117 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.2",
"matchCriteriaId": "61B67D76-E2DA-46D7-9E43-4E18D542AA57"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.2",
"matchCriteriaId": "02BF92BD-305C-46CA-8A77-C247AF8B1BC0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "13.0",
"versionEndExcluding": "13.7.2",
"matchCriteriaId": "30D66414-3769-4793-A9BF-A39E8CAB31D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.7.2",
"matchCriteriaId": "617CA14A-5EA4-4112-A564-DB1A5109A066"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0",
"versionEndExcluding": "15.2",
"matchCriteriaId": "A29E5D37-B333-4B43-9E4A-012CDD2C406D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.2",
"matchCriteriaId": "3B719BB6-424F-4612-8809-0DF25022C29C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.2",
"matchCriteriaId": "8C446885-2BC5-454D-88A1-146B17C051C3"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121837",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121839",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121840",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121842",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121843",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/121844",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54524",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-12-12T02:15:31.803",
"lastModified": "2024-12-12T17:15:11.020",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-12-18T13:59:47.450",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0",
"versionEndExcluding": "15.2",
"matchCriteriaId": "A29E5D37-B333-4B43-9E4A-012CDD2C406D"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121839",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,45 @@
{
"id": "CVE-2024-56128",
"sourceIdentifier": "security@apache.org",
"published": "2024-12-18T14:15:23.277",
"lastModified": "2024-12-18T14:15:23.277",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Implementation of Authentication Algorithm in Apache Kafka's SCRAM implementation.\n\nIssue Summary:\nApache Kafka's implementation of the Salted Challenge Response Authentication Mechanism (SCRAM) did not fully adhere to the requirements of RFC 5802 [1].\nSpecifically, as per RFC 5802, the server must verify that the nonce sent by the client in the second message matches the nonce sent by the server in its first message.\nHowever, Kafka's SCRAM implementation did not perform this validation.\n\nImpact:\nThis vulnerability is exploitable only when an attacker has plaintext access to the SCRAM authentication exchange. However, the usage of SCRAM over plaintext is strongly\ndiscouraged as it is considered an insecure practice [2]. Apache Kafka recommends deploying SCRAM exclusively with TLS encryption to protect SCRAM exchanges from interception [3].\nDeployments using SCRAM with TLS are not affected by this issue.\n\nHow to Detect If You Are Impacted:\nIf your deployment uses SCRAM authentication over plaintext communication channels (without TLS encryption), you are likely impacted.\nTo check if TLS is enabled, review your server.properties configuration file for listeners property. If you have SASL_PLAINTEXT in the listeners, then you are likely impacted.\n\nFix Details:\nThe issue has been addressed by introducing nonce verification in the final message of the SCRAM authentication exchange to ensure compliance with RFC 5802.\n\nAffected Versions:\nApache Kafka versions 0.10.2.0 through 3.9.0, excluding the fixed versions below.\n\nFixed Versions:\n3.9.0\n3.8.1\n3.7.2\n\nUsers are advised to upgrade to 3.7.2 or later to mitigate this issue.\n\nRecommendations for Mitigation:\nUsers unable to upgrade to the fixed versions can mitigate the issue by:\n- Using TLS with SCRAM Authentication:\nAlways deploy SCRAM over TLS to encrypt authentication exchanges and protect against interception.\n- Considering Alternative Authentication Mechanisms:\nEvaluate alternative authentication mechanisms, such as PLAIN, Kerberos or OAuth with TLS, which provide additional layers of security."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-303"
}
]
}
],
"references": [
{
"url": "https://datatracker.ietf.org/doc/html/rfc5802",
"source": "security@apache.org"
},
{
"url": "https://datatracker.ietf.org/doc/html/rfc5802#section-9",
"source": "security@apache.org"
},
{
"url": "https://kafka.apache.org/documentation/#security_sasl_scram_security",
"source": "security@apache.org"
},
{
"url": "https://lists.apache.org/thread/84dh4so32lwn7wr6c5s9mwh381vx9wkw",
"source": "security@apache.org"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-18T13:01:15.057411+00:00
2024-12-18T15:00:47.748228+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-18T12:59:51.003000+00:00
2024-12-18T14:49:59.103000+00:00
```
### Last Data Feed Release
@ -33,41 +33,48 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
274236
274240
```
### CVEs added in the last Commit
Recently added CVEs: `21`
Recently added CVEs: `4`
- [CVE-2024-11291](CVE-2024/CVE-2024-112xx/CVE-2024-11291.json) (`2024-12-18T12:15:08.710`)
- [CVE-2024-11912](CVE-2024/CVE-2024-119xx/CVE-2024-11912.json) (`2024-12-18T12:15:08.950`)
- [CVE-2024-11926](CVE-2024/CVE-2024-119xx/CVE-2024-11926.json) (`2024-12-18T12:15:09.107`)
- [CVE-2024-47104](CVE-2024/CVE-2024-471xx/CVE-2024-47104.json) (`2024-12-18T11:15:05.763`)
- [CVE-2024-49677](CVE-2024/CVE-2024-496xx/CVE-2024-49677.json) (`2024-12-18T12:15:09.767`)
- [CVE-2024-4995](CVE-2024/CVE-2024-49xx/CVE-2024-4995.json) (`2024-12-18T12:15:09.940`)
- [CVE-2024-4996](CVE-2024/CVE-2024-49xx/CVE-2024-4996.json) (`2024-12-18T12:15:10.120`)
- [CVE-2024-51646](CVE-2024/CVE-2024-516xx/CVE-2024-51646.json) (`2024-12-18T12:15:10.270`)
- [CVE-2024-52485](CVE-2024/CVE-2024-524xx/CVE-2024-52485.json) (`2024-12-18T12:15:10.417`)
- [CVE-2024-54270](CVE-2024/CVE-2024-542xx/CVE-2024-54270.json) (`2024-12-18T12:15:10.570`)
- [CVE-2024-54350](CVE-2024/CVE-2024-543xx/CVE-2024-54350.json) (`2024-12-18T12:15:10.713`)
- [CVE-2024-55975](CVE-2024/CVE-2024-559xx/CVE-2024-55975.json) (`2024-12-18T12:15:10.850`)
- [CVE-2024-55983](CVE-2024/CVE-2024-559xx/CVE-2024-55983.json) (`2024-12-18T12:15:11.003`)
- [CVE-2024-55984](CVE-2024/CVE-2024-559xx/CVE-2024-55984.json) (`2024-12-18T12:15:11.167`)
- [CVE-2024-55985](CVE-2024/CVE-2024-559xx/CVE-2024-55985.json) (`2024-12-18T12:15:11.323`)
- [CVE-2024-55997](CVE-2024/CVE-2024-559xx/CVE-2024-55997.json) (`2024-12-18T12:15:11.477`)
- [CVE-2024-56008](CVE-2024/CVE-2024-560xx/CVE-2024-56008.json) (`2024-12-18T12:15:11.630`)
- [CVE-2024-56010](CVE-2024/CVE-2024-560xx/CVE-2024-56010.json) (`2024-12-18T12:15:11.790`)
- [CVE-2024-56016](CVE-2024/CVE-2024-560xx/CVE-2024-56016.json) (`2024-12-18T12:15:11.940`)
- [CVE-2024-56058](CVE-2024/CVE-2024-560xx/CVE-2024-56058.json) (`2024-12-18T12:15:12.087`)
- [CVE-2024-56059](CVE-2024/CVE-2024-560xx/CVE-2024-56059.json) (`2024-12-18T12:15:12.237`)
- [CVE-2023-34990](CVE-2023/CVE-2023-349xx/CVE-2023-34990.json) (`2024-12-18T13:15:05.547`)
- [CVE-2024-48889](CVE-2024/CVE-2024-488xx/CVE-2024-48889.json) (`2024-12-18T13:15:06.463`)
- [CVE-2024-50570](CVE-2024/CVE-2024-505xx/CVE-2024-50570.json) (`2024-12-18T13:15:06.723`)
- [CVE-2024-56128](CVE-2024/CVE-2024-561xx/CVE-2024-56128.json) (`2024-12-18T14:15:23.277`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `45`
- [CVE-2024-10095](CVE-2024/CVE-2024-100xx/CVE-2024-10095.json) (`2024-12-18T12:59:51.003`)
- [CVE-2024-52826](CVE-2024/CVE-2024-528xx/CVE-2024-52826.json) (`2024-12-18T14:36:23.140`)
- [CVE-2024-52833](CVE-2024/CVE-2024-528xx/CVE-2024-52833.json) (`2024-12-18T14:37:46.917`)
- [CVE-2024-52837](CVE-2024/CVE-2024-528xx/CVE-2024-52837.json) (`2024-12-18T14:34:46.873`)
- [CVE-2024-52838](CVE-2024/CVE-2024-528xx/CVE-2024-52838.json) (`2024-12-18T14:34:59.720`)
- [CVE-2024-52839](CVE-2024/CVE-2024-528xx/CVE-2024-52839.json) (`2024-12-18T14:35:11.923`)
- [CVE-2024-52840](CVE-2024/CVE-2024-528xx/CVE-2024-52840.json) (`2024-12-18T14:35:19.387`)
- [CVE-2024-52844](CVE-2024/CVE-2024-528xx/CVE-2024-52844.json) (`2024-12-18T14:35:26.830`)
- [CVE-2024-52994](CVE-2024/CVE-2024-529xx/CVE-2024-52994.json) (`2024-12-18T14:38:48.680`)
- [CVE-2024-52995](CVE-2024/CVE-2024-529xx/CVE-2024-52995.json) (`2024-12-18T14:38:36.227`)
- [CVE-2024-52996](CVE-2024/CVE-2024-529xx/CVE-2024-52996.json) (`2024-12-18T14:38:24.727`)
- [CVE-2024-54037](CVE-2024/CVE-2024-540xx/CVE-2024-54037.json) (`2024-12-18T14:40:29.303`)
- [CVE-2024-54039](CVE-2024/CVE-2024-540xx/CVE-2024-54039.json) (`2024-12-18T14:40:37.587`)
- [CVE-2024-54040](CVE-2024/CVE-2024-540xx/CVE-2024-54040.json) (`2024-12-18T14:40:44.710`)
- [CVE-2024-54041](CVE-2024/CVE-2024-540xx/CVE-2024-54041.json) (`2024-12-18T14:40:52.247`)
- [CVE-2024-54042](CVE-2024/CVE-2024-540xx/CVE-2024-54042.json) (`2024-12-18T14:41:18.750`)
- [CVE-2024-54043](CVE-2024/CVE-2024-540xx/CVE-2024-54043.json) (`2024-12-18T14:41:29.400`)
- [CVE-2024-54044](CVE-2024/CVE-2024-540xx/CVE-2024-54044.json) (`2024-12-18T14:41:48.010`)
- [CVE-2024-54045](CVE-2024/CVE-2024-540xx/CVE-2024-54045.json) (`2024-12-18T14:41:55.727`)
- [CVE-2024-54046](CVE-2024/CVE-2024-540xx/CVE-2024-54046.json) (`2024-12-18T14:42:06.897`)
- [CVE-2024-54047](CVE-2024/CVE-2024-540xx/CVE-2024-54047.json) (`2024-12-18T14:42:14.767`)
- [CVE-2024-54048](CVE-2024/CVE-2024-540xx/CVE-2024-54048.json) (`2024-12-18T14:42:22.940`)
- [CVE-2024-54049](CVE-2024/CVE-2024-540xx/CVE-2024-54049.json) (`2024-12-18T14:42:33.907`)
- [CVE-2024-54502](CVE-2024/CVE-2024-545xx/CVE-2024-54502.json) (`2024-12-18T14:13:13.297`)
- [CVE-2024-54514](CVE-2024/CVE-2024-545xx/CVE-2024-54514.json) (`2024-12-18T14:05:50.673`)
- [CVE-2024-54524](CVE-2024/CVE-2024-545xx/CVE-2024-54524.json) (`2024-12-18T13:59:47.450`)
## Download and Usage

View File

@ -97064,10 +97064,10 @@ CVE-2017-13309,0,0,3d8e7c6309c5c1cafb1c6dfedda758dfd05930dec41aa79ea05cff52c2199
CVE-2017-1331,0,0,792619ac2a7d190b79ad04ab26e4fcee4a33db57f943c84c9bb254e3cdb1243d,2024-11-21T03:21:43.777000
CVE-2017-13310,0,0,16fbc2a02fd9a331fd87bcb47c76c7495b76a04bb51e6d9523fb3a1c1a2317f1,2024-12-17T20:29:35.577000
CVE-2017-13311,0,0,d76817caceb61441ada35ebc2969b4501415429984925844913929a7610c7e2e,2024-11-19T17:35:01.903000
CVE-2017-13312,0,0,b307b742550b9f8eba0dafa6fd8961d2ce3e603c71a9d0eaddee2a317231ef6e,2024-11-19T16:35:02.293000
CVE-2017-13313,0,0,f6d65e26fd47c6fe9e325312f6317ce4a47024b696d667fbc8b0a0d8d76e3108,2024-11-19T16:35:03.173000
CVE-2017-13314,0,0,bd185168205ff11f1804d138ef1c452bba07054e48891d7dd66cbbe281ace665,2024-11-19T16:35:03.990000
CVE-2017-13315,0,0,3498e74d86bff1913740982f613e64bc597db0b3277ef76e7cecc32a81503fb1,2024-11-20T17:35:01.990000
CVE-2017-13312,0,1,c44d98863e62fba9ae5e37c4d8aeb3f73f1c47967d04ebc8d0cbb03e2afa31fc,2024-12-18T14:49:59.103000
CVE-2017-13313,0,1,0d6ac6befe081fba487675eab4252804ea375d01dfaa562bad14e41aa9aacf4b,2024-12-18T14:44:13.577000
CVE-2017-13314,0,1,33c48e6d8e6524fa065f82448defa764b8b3b9330b06ac294ae8e04b2d271ecd,2024-12-18T14:36:21.610000
CVE-2017-13315,0,1,a6c9ce499de7cc31ed3e6113da58d1ddbfa19fcf87a648f22bfa38731642b2e7,2024-12-18T14:23:37.877000
CVE-2017-13316,0,0,c4c5129b9dbb6560afe63cb0142b790bbb3b4646bf79ff3cb413c25a7131034f,2024-11-29T22:15:04.140000
CVE-2017-13319,0,0,f23393a69de133f7a90b48ab44b5288d95b1d1856c774cba21f21a354eb95583,2024-11-29T22:15:04.860000
CVE-2017-1332,0,0,0269de81100b11e03b79ed33c30dc865a85b59fb90a2c2fe1abeaca397fa8d4e,2024-11-21T03:21:43.893000
@ -126928,7 +126928,7 @@ CVE-2018-9361,0,0,74621d1d1c0510b4e41d32863195fc57c81ef6080eb8141968c4cdb0aea60b
CVE-2018-9362,0,0,fcfd49a31efa129f3b71bfc1dba6f226ae9fe7959a199b87b995b6adc6501ba4,2024-11-21T04:15:24.360000
CVE-2018-9363,0,0,c591779bd7ee777b9730788b66e5bd10702e64ee214a51b2037d79b697d2291d,2024-11-21T04:15:24.487000
CVE-2018-9364,0,0,1500c9fea6f902f1b88a2060def80bcde55a9c796709027ddafeada29b2995d7,2024-11-22T21:22:14.020000
CVE-2018-9365,0,0,d83c3445e0cba99bf8b7785b91d974814ab3b4ffae22cf40c31b855d6330ba99,2024-11-21T16:15:15.473000
CVE-2018-9365,0,1,fe01ff6d2b65cc8939ce3fc90c381ed2b7091b2e793a4e02ab8101b5fd9cad57,2024-12-18T14:20:32.350000
CVE-2018-9366,0,0,5df4bba79daab1336433d7fefcadd485ac6fc89b95be03103da77984ced3d29f,2024-11-22T21:23:11.303000
CVE-2018-9367,0,0,b66f0930613c3a3e261417c8a6dd1169f72966ee9d3d7e042ddb2e629ace349d,2024-11-22T21:23:04.237000
CVE-2018-9368,0,0,b5eff1a3bc2b3f1128cb225395f214d3bfa469157068c63b732fb9e4412d9b70,2024-11-22T21:23:32.820000
@ -127012,7 +127012,7 @@ CVE-2018-9463,0,0,d4d844c05cd708ecfc7b2b2fe54aedf1979065835dec8bb48f0ba4759b3ac6
CVE-2018-9465,0,0,cb2efd2b80efc3b600077998298a31fa09fe425af40f55a1a9b3acceb259a706,2024-11-21T04:15:31.130000
CVE-2018-9466,0,0,a6ce5776a6a0bc572eb2fe9b93668c302dbc661dc68279f63c0e20dc3a242886,2024-11-22T21:29:09.617000
CVE-2018-9467,0,0,fc2dc1d34992c43bebd9ec5fb99a903623aaf110c20cb7b73e1288eb66ff9671,2024-11-22T21:27:26.783000
CVE-2018-9468,0,0,d89504cd09f9648509d44051e7602c6bb669d0ed3c285828589054ad081c7cd4,2024-11-21T13:57:24.187000
CVE-2018-9468,0,1,712fcfcf449bd84eb4db83ccc59d4797e74a383a411cd983e63ec05459635d94,2024-12-18T14:18:23.677000
CVE-2018-9469,0,0,200fafd517230d7c60e99d0545023427b2ed0fea5f80b63e01f3970800eec88f,2024-11-21T13:57:24.187000
CVE-2018-9470,0,0,6c434e88b3a4ab49aa790c553fea10cad2868865a792336987538d708f28e046,2024-11-21T13:57:24.187000
CVE-2018-9471,0,0,123e430dbaf8168f87abec50778f935958df85047ec1c6bb448ec65261ec9ed8,2024-11-21T13:57:24.187000
@ -150481,8 +150481,8 @@ CVE-2020-15590,0,0,eaf7a20fa2d3dddbd13df2e08c60d4b64ff4985ad0dd351c57b7582ba6c76
CVE-2020-15591,0,0,43651c8e5035fbc2d3eebf92de36f41aa2d911daf333a28326f34990382b0fdc,2024-11-21T05:05:48.873000
CVE-2020-15592,0,0,2a68b72b03ab5c287ffa8a8d432b309cd7d51ebd271d4373fb0a2667761bf65a,2024-11-21T05:05:49.023000
CVE-2020-15593,0,0,88a72e7a531309804d00a966e83ae9396478dea8c4c97c55a4c30fffec4e3804,2024-11-21T05:05:49.167000
CVE-2020-15594,0,0,c21e69880fd071ed9eb076e30e79945a5ef06144445f37bea963f34ba8980d2c,2024-11-21T05:05:49.313000
CVE-2020-15595,0,0,751e7a0844dfe87adc1149f45ea66a3855152c97836e2cf9f1b2738568b77a40,2024-11-21T05:05:49.457000
CVE-2020-15594,0,1,41d8ff70da4383a62caa7c2929f3b208777d1aebaebe193534610f95ca724f54,2024-12-18T14:34:36.427000
CVE-2020-15595,0,1,84c8d2820e6ad402905ccddf7b1cd1319f0332c32cbf1dbf934bec1abc27b54c,2024-12-18T14:34:36.427000
CVE-2020-15596,0,0,5d9ab39ec3b111e8938db8208890e181a90bde06b1b2a36366757c162e681123,2024-11-21T05:05:49.603000
CVE-2020-15597,0,0,d5b4e5f41d3f76ac8685edcd9a62e7527d62e39b918aad59a53ee5a5f346da35,2024-11-21T05:05:49.757000
CVE-2020-15598,0,0,29c4cf6a206458a549a864bb573a7abc87e995b8609723825d1a72deba575b91,2024-11-21T05:05:49.910000
@ -216016,7 +216016,7 @@ CVE-2023-21266,0,0,41056af2ff44c658c3d7400d35b437dca755e0d267939a09aed4042fcf6b8
CVE-2023-21267,0,0,6638b0087b6d8932602002a7e8d08da2fed80a4581d01b616763baebe7bf0683,2024-11-21T07:42:31.333000
CVE-2023-21268,0,0,966b6eaa52dc2224769524db7defdbe0f2eaa7a2a6172417194471cfbd373807,2024-11-21T07:42:31.460000
CVE-2023-21269,0,0,c88325238d3e3688bd26fb079dfc796c8c700d8d0bb88fb8fe9ce0403d8347f1,2024-11-21T07:42:31.587000
CVE-2023-21270,0,0,be491865f01eeba868e74a425fbc0185066d81532f275bd4e9b561b58e6c2022,2024-11-20T17:35:18.563000
CVE-2023-21270,0,1,8e3ac5718df0e59647bf13e55913b5346e5936aba8dd705030bc10ffe3b18e7e,2024-12-18T14:22:02.343000
CVE-2023-21271,0,0,d6ce25bfda5fb8eace72cb13696e026026d00885917c7b921b8b8c2965f4dcda,2024-11-21T07:42:31.947000
CVE-2023-21272,0,0,2551733aca613408fb500b7a9902a0645171dc393606369404c055bc779accae,2024-11-21T07:42:32.073000
CVE-2023-21273,0,0,95c7324d81a31e5e26c923038780c886381676790dbb37eb313bb58ffd854b53,2024-11-21T07:42:32.217000
@ -227041,6 +227041,7 @@ CVE-2023-34987,0,0,239bfa56c2b3c2a64ffb9989e3a04ce7690423bc2723612a3fec5d17d1ef0
CVE-2023-34988,0,0,c281aba51286e8262e1bd5a87d0371ac1701ceb8bc379cec0e6a7add4865aee2,2024-11-21T08:07:47.030000
CVE-2023-34989,0,0,9c93395b1d7506c69552441fe317a37c9c65f626459b205c15815f9a4c5bb10a,2024-11-21T08:07:47.157000
CVE-2023-3499,0,0,d53e968d6b98b3b8f4eba87e9d3bb6bd7e12149baa210aafdf7bf82922fb6251,2024-11-21T08:17:23.880000
CVE-2023-34990,1,1,4425c34c09295b4b7565c66affc7dc667e0e726b367f6f914e5d7ec5b7952e05,2024-12-18T13:15:05.547000
CVE-2023-34991,0,0,edca71b869336e025d2f35da854260f4cdb9820b0b9bfc84c32d69158d1c8c0d,2024-11-21T08:07:47.280000
CVE-2023-34992,0,0,a0b956affc14ae52e19caf75bfd96c683d594334cda2c7ce7bc9d403ae1b0e84,2024-11-21T08:07:47.417000
CVE-2023-34993,0,0,f25d5feb0a738fb2f1edb4bcb70c6024043b6f1869f6fd7fa178a04679a49c7b,2024-11-21T08:07:47.547000
@ -243082,7 +243083,7 @@ CVE-2024-10091,0,0,244835544befc14a0ba664699f50b681fca0c5387af75b0db99291b956c48
CVE-2024-10092,0,0,3187158205da52d65b1fd5fde676bfb3bfd6fed14de72d76a8aab9b275f77138,2024-10-28T13:58:09.230000
CVE-2024-10093,0,0,c59046555fb4e55c30f34ec91ac62910be408e9628c1cf31aaf113495f33e4fd,2024-11-01T18:07:07.003000
CVE-2024-10094,0,0,e63fac5d529dc5bceb010fd479146f46858cd90c1e360601f682aec7c32291c2,2024-11-21T13:57:24.187000
CVE-2024-10095,0,1,7be965c3275839227029409c680ba1f671ec7b8fcaba42e7a973dc116b9093e1,2024-12-18T12:59:51.003000
CVE-2024-10095,0,0,7be965c3275839227029409c680ba1f671ec7b8fcaba42e7a973dc116b9093e1,2024-12-18T12:59:51.003000
CVE-2024-10097,0,0,7121c39d2c238d666aa68f098cbf1d5544a9aab3221767519c48769f9658d5d8,2024-11-06T19:14:22.817000
CVE-2024-10099,0,0,ff238a91e24fcb0a85fcb34f700c80404c8e345e8e0c333898778e0f4a6cf856,2024-10-21T21:03:53.647000
CVE-2024-1010,0,0,b760c6839f8ba4fc102d84ec8eb422be6a7986ee41491a18032e2ca8b34ccde5,2024-11-21T08:49:35.243000
@ -244045,7 +244046,7 @@ CVE-2024-1128,0,0,b5697d53bd1cc8361103858a196325f5d64208a9e9a1888a08b3143838ba17
CVE-2024-11280,0,0,c6c99c2b8008dd804efc112557dc7f34f3207d1ea9c17d95b04cb9020689b542,2024-12-17T12:15:19.343000
CVE-2024-11289,0,0,1d2443a1a9242c04e29818ad13875ac1c58e80e7866f1501dec4b2d1a8559f61,2024-12-06T10:15:05.450000
CVE-2024-1129,0,0,cbf5818dce2e4cd60590d30546d905436cb36b8ec16eeb56ee9382ffddfc0bc3,2024-11-21T08:49:51.773000
CVE-2024-11291,1,1,2cf15ce460c7aba26cc92cc41e6feb3c11e580646437c6ad209f9fd7450b0fdf,2024-12-18T12:15:08.710000
CVE-2024-11291,0,0,2cf15ce460c7aba26cc92cc41e6feb3c11e580646437c6ad209f9fd7450b0fdf,2024-12-18T12:15:08.710000
CVE-2024-11292,0,0,44d76ae9b7e309446be6c076fee918f16faf12f6eba1bd4aed88a2108eee73db,2024-12-06T09:15:05.993000
CVE-2024-11293,0,0,963e5cd86fd8964150efb764dabf7f60f1898cb3eb1113839b414494aefc5068,2024-12-04T08:15:06.343000
CVE-2024-11294,0,0,2eb006c700872e4221a5d65f1f84540c18c42b5a19bdffcef60597b889db391d,2024-12-17T09:15:05.193000
@ -244532,12 +244533,12 @@ CVE-2024-11906,0,0,bd06f91b81ce065886b8d405edb88e6a7d8f769e622325bb6fd5cdbba074c
CVE-2024-1191,0,0,6f7a8128ca74425a818c30dd0345aad863d38fbb6a993214ffab466088e49214,2024-11-21T08:50:00.150000
CVE-2024-11910,0,0,7cdc56d220bb226d66f2e09af7dfa09212676d67ef40d93704c67462fa98d7df,2024-12-13T09:15:06.543000
CVE-2024-11911,0,0,caa0b453641ff9f186639ae770eb52db38531714654a626a4eab9e32db68000f,2024-12-13T09:15:07.083000
CVE-2024-11912,1,1,fd00ef8938fde1ad7f771834102d2a306c5a726aced6f24d18f621b4fda8b9a3,2024-12-18T12:15:08.950000
CVE-2024-11912,0,0,fd00ef8938fde1ad7f771834102d2a306c5a726aced6f24d18f621b4fda8b9a3,2024-12-18T12:15:08.950000
CVE-2024-11914,0,0,fa4ae25ac8caf18cb116501f16c4447bae56afeb864dc904882202ad6cc9632f,2024-12-12T04:15:06.983000
CVE-2024-11918,0,0,f7031582b21494aaa2ccab4dd4ab92d52bf9f67c1445d9fb72b363b717cfc06b,2024-11-28T06:15:08.347000
CVE-2024-1192,0,0,feeadd7788bda0ae41e0b060ef10672169205cb5b73feeee0610abe95f0f97d2,2024-11-21T08:50:00.287000
CVE-2024-11925,0,0,77043a2dc07077ec38aa584033543217cc9fb39ce00751159aa83ba0aa54cc6b,2024-11-28T07:15:05.267000
CVE-2024-11926,1,1,baba6306cf533ff903f4dad88b2b137bc601e7849d607c260cbaf97669347fa1,2024-12-18T12:15:09.107000
CVE-2024-11926,0,0,baba6306cf533ff903f4dad88b2b137bc601e7849d607c260cbaf97669347fa1,2024-12-18T12:15:09.107000
CVE-2024-11928,0,0,4eb81c3b991253e17b093831750d2f60d8030675796e16e7e29cc29429037a0b,2024-12-10T11:15:07.220000
CVE-2024-1193,0,0,dfff57fc9ce7a1dbebe4335de503e2f3e62619c8f53eebdea960e5ff40a71456,2024-11-21T08:50:00.427000
CVE-2024-11933,0,0,ff719b80c8b04b1955877df42e564ce90eac2c09e4f59c20e785f18a1e8804d6,2024-12-03T16:04:10.350000
@ -244869,8 +244870,8 @@ CVE-2024-12644,0,0,4fe46a77976cb26c8db1a8817f8d60588d7d627c677def113b1f0c3da34da
CVE-2024-12645,0,0,e2bf7e02fc7f9b197fb94f8f3f7739958eb1e7eb714f268785ecfdf27c30d30a,2024-12-16T07:15:06.560000
CVE-2024-12646,0,0,edf55cca2f63c5514783a7adeb1b585499807b56f798173f78bff573d5a90371,2024-12-16T07:15:06.737000
CVE-2024-1265,0,0,b39c324e3936d2b2eba136bb9fb37e8f905e9dd3fbb95d7d724d951e7512509f,2024-11-21T08:50:11.610000
CVE-2024-12653,0,0,6f848225024de4c14a49213377e690a08093550ba762598c765246a77e1e7837,2024-12-16T16:15:06.593000
CVE-2024-12654,0,0,1a7da902bc86773b1718a5279a6b089664e285ca426600f81a29cdf8c07c3da6,2024-12-16T16:15:06.810000
CVE-2024-12653,0,1,0bdff4965d01bd6aa73fcbedd02b053581ebdedd8d7404b8f9233029d8912bb7,2024-12-18T13:53:28.700000
CVE-2024-12654,0,1,dd847f86178d706ec068f649f759ab2d8fa9222fd8627ac6c45d7d35cd5983cc,2024-12-18T13:42:22.853000
CVE-2024-12655,0,0,7ceaaca6f02716eece2d7e73d7d09c21cdb7429363dd024bbff0d12b620fab5c,2024-12-16T17:15:09.147000
CVE-2024-12656,0,0,d7ca036e72b675c7410eee2a09d0c8b1a09bf6f11bc270d361aec72d2859b2e9,2024-12-16T17:15:09.340000
CVE-2024-12657,0,0,d62bb2296e60c72ad405696503588543100255cd21c67ed32539ab7099fc2c10,2024-12-16T17:15:09.520000
@ -265440,7 +265441,7 @@ CVE-2024-4709,0,0,613e57ae1ceb02dcd7cd23d2e724aec8eab6480f5f138696ad2d1f217ee1ae
CVE-2024-47094,0,0,d24e1f292f7d19d40d32d967d3e72cc931ea886edc80358cb771de69f5f1ca5a,2024-12-03T20:01:52.610000
CVE-2024-47095,0,0,ab3ae5fb8cc2610821c1dec2e1fa7073f06cbe80c80fa571d8c05d61db95648f,2024-10-10T12:56:30.817000
CVE-2024-4710,0,0,9c507813f9fc80a7b0290c71ebb56c5cafbe3613f57bf93e1120a9c56f52904d,2024-11-21T09:43:25.600000
CVE-2024-47104,1,1,495d25b5470a35cca2a2f33e6af7aaae09698e2f7d25049602857c1ae4c17548,2024-12-18T11:15:05.763000
CVE-2024-47104,0,0,495d25b5470a35cca2a2f33e6af7aaae09698e2f7d25049602857c1ae4c17548,2024-12-18T11:15:05.763000
CVE-2024-47107,0,0,cbccf574787d61b4f6ca0e02b243f9353763dfcf6f42da1d1ab7d0498a1d160e,2024-12-07T15:15:04.123000
CVE-2024-4711,0,0,e4ef71037ebae75f1c7783581ae71eaf15c6142551362f95bff0adb8f63f9b15,2024-11-21T09:43:25.710000
CVE-2024-47115,0,0,64bb47e915974f1dfec3d4bee74763bed48bbf036cf9597873496ec80cb951dc,2024-12-07T13:19:14.783000
@ -266533,6 +266534,7 @@ CVE-2024-48872,0,0,e0488ddfbbc97cfa53cf7ce570cabf334ccaf2abe7ec833ab649dfba44be6
CVE-2024-48874,0,0,d4dab0701d320c08fdb5c4d13166c7fa76f47b4f8118adcdce9e1ede30e7393e,2024-12-10T19:44:16.093000
CVE-2024-48878,0,0,61df8c716ea1a9423d8f98d007fe741d86381fb579c3442ef6d827deee3b213c,2024-11-05T19:44:58.650000
CVE-2024-4888,0,0,133d57bae18b01966145fd4e4ce13e18e7959193dbb6b4323cb9d35593035efb,2024-11-21T09:43:47.830000
CVE-2024-48889,1,1,b99a18a39ebe41baa99e9049c80af5c10744c585f33eb90839266c39885a6833,2024-12-18T13:15:06.463000
CVE-2024-4889,0,0,54e41cd985dde0162870a1a62b42a9fd40bf90446677bc64ce2d3dd7fe90e1b1,2024-11-21T09:43:47.970000
CVE-2024-48895,0,0,2619cbfc056db229022c601c361879a86e8ef7297a78db8864167658fcd89d44,2024-11-21T13:57:24.187000
CVE-2024-48896,0,0,68f9b7eee2d42fd99555582d831f186b3535e450fad14d101fd4d18eb273b831,2024-11-20T14:47:12.777000
@ -267017,10 +267019,10 @@ CVE-2024-49547,0,0,31d064572e588da367222cf3c44bb5ee27c3fa51bcc463f67454b0c37f45d
CVE-2024-49548,0,0,bb1a8bdd70dce7f53d2e671417cf49d2f2712f7c017af0c5a7569f94c4c28a16,2024-12-10T21:15:17.617000
CVE-2024-49549,0,0,9deb18d5ee12538d6eb1657f82a2cdf52686d4b974f294fe2ff86160f99fbacd,2024-12-10T21:15:17.753000
CVE-2024-49550,0,0,27e56b904436c74833992eef941b9e27e78e6d34b2add18e9d4136f40cc8e03c,2024-12-10T21:15:17.903000
CVE-2024-49551,0,0,6a5000b5b130f3d782685704346a9d1b7db7e484719193d92815f9273f199b1c,2024-12-10T20:15:19.110000
CVE-2024-49552,0,0,0f7e472fa7e941d64afbd9753e4a98e187ad13d19fdf6b0623cae687891d624b,2024-12-10T20:15:19.297000
CVE-2024-49553,0,0,e23a7d22394690f1b2761284715a5dd8a9172267b9fd922f11713e47243dffd5,2024-12-10T20:15:19.530000
CVE-2024-49554,0,0,44009e613789808b47ec1d2bd2cdfeead87fee08c74978684f2b40e190e7ae33,2024-12-10T20:15:19.963000
CVE-2024-49551,0,1,611d0bb85efb705c2141b0e3ba3a4b055fd8590ff0cdb0b5ca59704d936432a7,2024-12-18T14:45:20.283000
CVE-2024-49552,0,1,1dd42e31d4b7a11f1169e7d95fa23421a35a65b3445da360d90510d9f668bd4a,2024-12-18T14:45:10.450000
CVE-2024-49553,0,1,eb55870165fda3571b7ba6c0913cad8b831c7cff4c74e1be9ab313aaf34a7571,2024-12-18T14:44:55.723000
CVE-2024-49554,0,1,9fed37ff04eac9a74771214a2591c8062f71b41f5a61981624c0ed7a40fac3e2,2024-12-18T14:44:39.800000
CVE-2024-49557,0,0,6601a96c4bc210f01d32593bfa488dfcd4eaf5855ed8b64d0dab8c422cb09b1a,2024-11-15T17:36:47.110000
CVE-2024-49558,0,0,d6190c4fa083ad35fb776a8089e14895ccaced89c942fbc8e925117ea666e076,2024-11-15T17:35:54.480000
CVE-2024-4956,0,0,b59f0fa653d583ff50139b3494916619d3242eed1a7ae59aab01da9b6e8c6c91,2024-11-21T09:43:56.520000
@ -267117,7 +267119,7 @@ CVE-2024-49673,0,0,5cfbaeb230b289604e6a9a17a0e3169a5fd351a546e39f0d9f8cdbcaef1b2
CVE-2024-49674,0,0,485cc36f092613aa15cc1bf9c84e4863b887e4a287065a305bbaf4e37c253850,2024-11-01T12:57:03.417000
CVE-2024-49675,0,0,b7fbdd38c92d79ba1d7bcc6ed0be95e3d48c155f778ae6bd0a0ba79a52dcf7e9,2024-11-06T22:24:22.907000
CVE-2024-49676,0,0,5e84a7f815d1b9044cdeca37f68c539b4cbe8969197e93a16e488c34b320dc93,2024-10-25T12:56:36.827000
CVE-2024-49677,1,1,9b95a0c54be2f3a3b825b7321144b8a29c710b057aa4cd9ca09142432eaa41c8,2024-12-18T12:15:09.767000
CVE-2024-49677,0,0,9b95a0c54be2f3a3b825b7321144b8a29c710b057aa4cd9ca09142432eaa41c8,2024-12-18T12:15:09.767000
CVE-2024-49678,0,0,319a818bec0536024df1c2df86fbfbecb9d910baf74659a55d48a69eb70b5fda,2024-10-29T14:34:04.427000
CVE-2024-49679,0,0,69366457d136ea54a3b6926990a6003dde86feed848c00d8b78be39be0d98ee7,2024-11-08T14:52:24.823000
CVE-2024-4968,0,0,5c01ac4183eb6b049ceed5603d9de2600208167774b0c29de75a6b09dcf8cd7e,2024-11-21T09:43:58.297000
@ -267294,7 +267296,7 @@ CVE-2024-49946,0,0,4282502abb14004f3ad3b6990ba1eea19c5a1f24f9e8009830652e8dcd140
CVE-2024-49947,0,0,45246e2f634d00c4f196249e0c002c9ac4a3e83049907010f1a2ea778482c097,2024-11-12T21:25:21.870000
CVE-2024-49948,0,0,3c07375ebdcbc88e821363a12991edcd9ef0a0e6f3e0ea074854719cb756d20d,2024-11-12T21:19:24.440000
CVE-2024-49949,0,0,862d00735d151a14c8eadd98da18017da1bd5bd1db3933cfea0083036e3d13f8,2024-11-12T21:03:59.377000
CVE-2024-4995,1,1,311d73f94712d43484eb5a9a868c6f771d7f103c26ce938da17c32c3ddb1edb1,2024-12-18T12:15:09.940000
CVE-2024-4995,0,1,986418d30d21cfb98312b300bb79eecd8b7d17f957cd4c96230861aa29869492,2024-12-18T13:15:06.603000
CVE-2024-49950,0,0,a3b2e262aca9e244ab2da6b1f6a174049eadab2e9a1c66c343347b7a6457968f,2024-12-14T21:15:31.613000
CVE-2024-49951,0,0,1bcd56af774503e3361ae7748b61405667859f87d6c481b76256bab77dfaa560,2024-12-14T21:15:32.053000
CVE-2024-49952,0,0,4211d2a9f88cb08f96387a31b9ab3d61b023ec569e7605a0a8bc222d3124b341,2024-11-13T00:46:03.893000
@ -267305,7 +267307,7 @@ CVE-2024-49956,0,0,ad41e742c241feac4d7d72745b86d5b76fa77783fcd0fc01df15ad2e54cc7
CVE-2024-49957,0,0,9fe20b814f873df80408128cebb309ff4cb21aaafe57f30b76e489a1f3b92b1a,2024-11-08T16:15:33.963000
CVE-2024-49958,0,0,5a97ea90ba1b12a92ad466299cd8b86dadc4bd73e96d0f2c30a9c22bc81604fc,2024-11-08T16:15:34.497000
CVE-2024-49959,0,0,6fe07b5cdf4fe31cd38dce519a93cee53aeca01693535ae376b18ac0b1feb771,2024-11-08T16:15:34.923000
CVE-2024-4996,1,1,46cadb52903517fe87cbb6981ddc580cd04057e637a71401fff7fce04e8a9988,2024-12-18T12:15:10.120000
CVE-2024-4996,0,0,46cadb52903517fe87cbb6981ddc580cd04057e637a71401fff7fce04e8a9988,2024-12-18T12:15:10.120000
CVE-2024-49960,0,0,acab1eb31f27cdc9f4ae9bec65ad798d53c3a894c6765df6ead00c7435d0c074,2024-11-17T15:15:18.527000
CVE-2024-49961,0,0,dde3df5f8bdf7f3dca86d86905800e80b0cf9f5a049803c6b644a59c20edafeb,2024-11-07T19:22:15.323000
CVE-2024-49962,0,0,9e23d9ec87abc1ddc1631ece5ff7f04c4c36be12aa82158171cb5a65d60f4061,2024-11-08T16:15:35.413000
@ -267940,6 +267942,7 @@ CVE-2024-5056,0,0,8fffdd4127619c786aa0989407007469ff9a6aa73bf668207b4ad19c19de15
CVE-2024-50560,0,0,849cbb22dc43c9735ca18b0189950c1e8b5ecac4d47888f5bcbc5715b936ca6b,2024-11-13T19:57:26.073000
CVE-2024-50561,0,0,6a51b1f26d5cf18987d57ec188dc14932c4d4312c95a1bfb0fba3e588b50e618,2024-11-13T19:57:56.313000
CVE-2024-5057,0,0,4e84b19a66dd237677e71f8f6b2954676ecae2fca742ad51c75df8e74bfe774e,2024-09-20T19:31:39.437000
CVE-2024-50570,1,1,f9157bc75575272446e4073921d61d6ebbbed4953349b34b8c3f0c79945a24c4,2024-12-18T13:15:06.723000
CVE-2024-50572,0,0,87b1aa24f79c401027b600910fcd433cb81a62e025ef81c863f015edbd3acb6f,2024-11-13T19:59:16.777000
CVE-2024-50573,0,0,5e3f4c1fdb2489361c9b59a48c617ae9eab2b22b74a42b1c1ca13ebdc04a62f4,2024-10-29T17:12:14.760000
CVE-2024-50574,0,0,19a8794809392a79fd68e4eae98e9cf9304f94ab7b7bbefdac60fad919a3e7be,2024-10-29T17:16:11.277000
@ -268454,7 +268457,7 @@ CVE-2024-51642,0,0,5152e85707089a7f3186d35c0774851bc910b269c16bcf282f6f8c964d97d
CVE-2024-51643,0,0,6cd95bcb0b7533023b50646b0fac301aca8db2d6cdd664093da0890b1d9cb32a,2024-11-19T21:57:32.967000
CVE-2024-51644,0,0,34e478edea57d0615ca8c922c7e7d4b0973519169e85ccc175b6a394b6401123,2024-11-19T21:57:32.967000
CVE-2024-51645,0,0,06028be70e3cbb5560cab4fc4dcc9fdb4e95ab08be7c034a585406faa5e25e73,2024-11-19T21:57:32.967000
CVE-2024-51646,1,1,b391865e870d9134387057bc06f0e5d67ed66c2d1ef2083a2b758d08cb39d757,2024-12-18T12:15:10.270000
CVE-2024-51646,0,0,b391865e870d9134387057bc06f0e5d67ed66c2d1ef2083a2b758d08cb39d757,2024-12-18T12:15:10.270000
CVE-2024-51647,0,0,0324321535da7d43ca4deac4fdb3c1e7d74c19d7383440bb5b1349d55f97e233,2024-11-12T13:56:24.513000
CVE-2024-51648,0,0,dbb0968afe4034eda92af49d97342dc91c1ea36f66d8dfaf80e8afd706de0c57,2024-11-19T21:57:32.967000
CVE-2024-51649,0,0,c81969392142cf30b442ca2488ba5a508853d5d91fdf922f672d341833d4b7a4,2024-11-19T21:57:32.967000
@ -269041,7 +269044,7 @@ CVE-2024-52481,0,0,a7309831bf78d36e2ea1cd8b30d3ef08bb169830c7beaff56276c63bc5fd7
CVE-2024-52482,0,0,fe3f09e5e14bd802eba12c8c9f67e8414b606975733469038e3912792e967fa2,2024-12-02T14:15:09.603000
CVE-2024-52483,0,0,b3f8c3a0b11741f29ce99b7a7e45ec466bf2e703c6eae60631e7734657eb12df,2024-12-02T14:15:09.740000
CVE-2024-52484,0,0,9c617bb84889d9dd5697e12280aa625dd9b3ccee97deaa14f0f662833ea68d80,2024-12-02T14:15:09.883000
CVE-2024-52485,1,1,3c00772177329aa6d3970654ef07f7985dffe24c62754084e3d8316b6d92de77,2024-12-18T12:15:10.417000
CVE-2024-52485,0,0,3c00772177329aa6d3970654ef07f7985dffe24c62754084e3d8316b6d92de77,2024-12-18T12:15:10.417000
CVE-2024-52486,0,0,5193c625f02d6aae6fbac2a099657fbf4740615e561f3fade25a73861458812f,2024-12-02T14:15:10.017000
CVE-2024-52487,0,0,1c40351f41ab17b71a0bba45de03b1c3b444df985e36d6893bd7a478b47e5095,2024-12-02T14:15:10.147000
CVE-2024-52489,0,0,114f5b0fd631bb50a3164b9ce3be5beb08fbc61365ea62d5efe502aef3fc623d,2024-12-02T14:15:10.320000
@ -269217,11 +269220,11 @@ CVE-2024-52816,0,0,65718f19cb2a012b57ef8da79137eacc99e273905d4b5a57cf388720343e4
CVE-2024-52817,0,0,efe63aa74be98b62fb8efa77a61c6f381ccaef4b4fb5791a86cabb88197bdeaa,2024-12-17T16:15:10.480000
CVE-2024-52818,0,0,dcc413435dcf9a0af7b50af7ae991dda0838f2f16eef7b8a7c245b50433a355c,2024-12-17T16:15:02.203000
CVE-2024-5282,0,0,4f51eeaed389eb920a9aeb3a8c1e7ea5a9931768c3b7eb6744dae1b0adac061c,2024-11-21T09:47:20.920000
CVE-2024-52822,0,0,de168dae8d5e9b619f818fea9698f17a1675c4571323f9435a38243ee158a0af,2024-12-10T22:15:14.070000
CVE-2024-52823,0,0,c698bd3e1d4c228c0b799985c54a2563f1186410fdde64b0a02dd35b551284ac,2024-12-10T22:15:14.223000
CVE-2024-52824,0,0,22f8ac8ccfdb7e1278bcd6bceb01b6406240b57f49ba41e6fdc490642d555018,2024-12-10T22:15:14.367000
CVE-2024-52825,0,0,f6c7de461626f494f258610f02023d95a0faea3377d5d6bf893dc7a6f8b50c6c,2024-12-10T22:15:14.523000
CVE-2024-52826,0,0,ebceb8fd4644abe4fcac3555110f5d71817faa9c5361d18a359b935819a9d0f7,2024-12-10T22:15:14.687000
CVE-2024-52822,0,1,b22cafd5257f10f5073e0f374a0d447cde3ff37287c43d6b35cf7538951510ff,2024-12-18T14:35:48.033000
CVE-2024-52823,0,1,60a92de261074317b7fbcbb26089c290cd6b225912af8fc2c46673befce41c22,2024-12-18T14:35:57.397000
CVE-2024-52824,0,1,4ad454480717c6a1ddf7ff65bef603b57f7b3fef6a73a54b0be27fbf86e37543,2024-12-18T14:36:05.817000
CVE-2024-52825,0,1,22b446091da7d8a51fc25dc5cd2d4a06d6f87b184dbd7d292030afe026e9d25a,2024-12-18T14:36:15.417000
CVE-2024-52826,0,1,1cb02c2e1532d9fe3dd2cd2d373f5125d0525c3df87b513eb69078e738134aaa,2024-12-18T14:36:23.140000
CVE-2024-52827,0,0,4cff649de3d95b42209b4473a6f0f81906bc0ec9497ad33594b5e031c6c755ec,2024-12-13T16:30:28.017000
CVE-2024-52828,0,0,b91fe6328a18fb3b30a5eabdd9d8505c62acd230a6c59a5f57df74efc21022fc,2024-12-13T16:31:44.753000
CVE-2024-52829,0,0,c106e3d1fce91af490fece8750d8c3941c825efb7a57e842b25787e876aa82f3,2024-12-13T17:12:13.453000
@ -269229,19 +269232,19 @@ CVE-2024-5283,0,0,2e4c0e59b537a1fa6ef21044d27ad6c5c503d962bc23f2bfaaea7d6483dfc4
CVE-2024-52830,0,0,520275838c0dd5c92182498e39edb487b6f8eb3d04d45f85e0b9a800aba0348d,2024-12-13T17:18:43.007000
CVE-2024-52831,0,0,febc6ce542b9dea4fc3ebc985b026e7cd9b8167d00a2e198d286f4415587ad5f,2024-12-13T17:20:24.467000
CVE-2024-52832,0,0,7cffb2271f69c746cdef4738f588d99cba2378e891601a03a56800f8f1a2044d,2024-12-13T17:20:37.987000
CVE-2024-52833,0,0,b87ae23d62a9abda226d13364208a16ded613f5f37d916dba69bff3a51871d24,2024-12-10T22:15:18.250000
CVE-2024-52833,0,1,751a005b876b2ea1c588dd46853cf3b76001db256f88e1e9dc37654077d36db6,2024-12-18T14:37:46.917000
CVE-2024-52834,0,0,347eaba9bc4ad85ef5dbc05cebef0fcb760c58a6d09f0b408ba67fa855d111fa,2024-12-13T17:20:47.050000
CVE-2024-52835,0,0,557a364e982453bccf292c228d0a61611ef88a1259bb5b4c993a22d496fa48bf,2024-12-13T16:13:32.757000
CVE-2024-52836,0,0,bb631b92ccd3891aad956d691a76e9dd7443cb1739d057b2be16684bc359f123,2024-12-13T16:14:29.700000
CVE-2024-52837,0,0,6cb32f0da540838c72f165cfc5d4a7356745c41660902841bb5c827d307cb933,2024-12-10T22:15:18.850000
CVE-2024-52838,0,0,b40d20001f56412e700a167550f51861663731f3f6771a9b41dae4365e1be492,2024-12-10T22:15:19
CVE-2024-52839,0,0,5e34fd2437ea066f550d0402ebdcaf04360ef7dadc57c4425a3d731e61b00847,2024-12-10T22:15:19.150000
CVE-2024-52837,0,1,349efd4e08effcd00056f33be7a4b2cdd210775020cf785043d6f37aea6e53ed,2024-12-18T14:34:46.873000
CVE-2024-52838,0,1,b60793e4d0224f64023e50b7bc13fab6acdbf2c4e838748a9aacd4fdcdab8a35,2024-12-18T14:34:59.720000
CVE-2024-52839,0,1,37c691f868df4d2aff4458ac7178866f15a38d17e9534e07c494713eb51f3572,2024-12-18T14:35:11.923000
CVE-2024-5284,0,0,f27d035f8fcaa3c5dd2f39806299edcb6edf39605d373e0e7746729a950daa3c,2024-11-21T09:47:21.243000
CVE-2024-52840,0,0,27cf4f72ff4c677861cd94fdfa2422b22a73443ebfda483de1c83f9727fa09d3,2024-12-10T22:15:19.297000
CVE-2024-52840,0,1,8aed5dc01ff182fb548191a463492c217b9fbc9225631748b5d9054898c2eb7a,2024-12-18T14:35:19.387000
CVE-2024-52841,0,0,c8467e34a184eae8ce4b1586866b104207c3fcaa8a38c3dea3df3bb5325a76b9,2024-12-13T16:14:51.557000
CVE-2024-52842,0,0,edbd163abecabb58f05c4fd89ad1573cbbe839ed3c8ab35519a641c99210c33d,2024-12-13T18:24:06.850000
CVE-2024-52843,0,0,5fd72c40f0ae5ad98a380113e9bb4e1565078e456e19e0a3b876eaaefbc71b33,2024-12-13T17:54:11.087000
CVE-2024-52844,0,0,685685a557ee6ce8c1975b71fb0ebbb683d2c816b5bb58fddd1900f448b71e74,2024-12-10T22:15:19.900000
CVE-2024-52844,0,1,e95f6733cfd59033d5259410d695702408c383031f175584990ed0b352a90a0b,2024-12-18T14:35:26.830000
CVE-2024-52845,0,0,5afdf9f50a91c1c6cc8c83e6aba2293e2effe3a02c7213a80cd349be6bfa509e,2024-12-13T17:51:52.947000
CVE-2024-52846,0,0,53ae29cfadfd5847e49bef6406b8098a1a394806f811a3481e607809b9d15215,2024-12-13T17:48:57.057000
CVE-2024-52847,0,0,9e4c91e8efedf4ca2af8b61d77e21f4db510b33eb05aa1fad0ff557e1469568d,2024-12-13T17:46:39.203000
@ -269318,9 +269321,9 @@ CVE-2024-52990,0,0,1a8258608b63e768b81712a1a814b5b5bd50621818ba954ed68179d4a00a0
CVE-2024-52991,0,0,31b863d2e03e48d18e25f425a4f20cecd39fb1c77024ce95c801312d4f3b7752,2024-12-13T17:27:06.727000
CVE-2024-52992,0,0,4d53291470ab136f27a66ea7467884b716a4a5aea28b831ea4c4a4f7882e290c,2024-12-13T17:26:54.557000
CVE-2024-52993,0,0,db5998c6ae30c948d19b78a1af997a52a94f5ef929b12f2d7b8b14bad2b95a24,2024-12-13T17:26:44.473000
CVE-2024-52994,0,0,1a31f52357a2a4910d4e9cd4626e2577db13115412040b730450f2d812a0c48b,2024-12-10T21:15:19.310000
CVE-2024-52995,0,0,2692a76c779157404b329cb9d76981a4c07d0d8412eb660afef9f4aca1adafcb,2024-12-10T21:15:19.440000
CVE-2024-52996,0,0,b4c02854bcc5c7afa1b98444dd307d7d020a19b1b0400cee186fe908e2ff7068,2024-12-10T21:15:19.573000
CVE-2024-52994,0,1,c998bea66b845df8b2b6b90703ba2003e446cba57ceb9d0593eba768fd0209a8,2024-12-18T14:38:48.680000
CVE-2024-52995,0,1,6a31c320fdfe444795b4f4a7b3ace65e7a30cbacaffe2dd49cd9a4f319f6f559,2024-12-18T14:38:36.227000
CVE-2024-52996,0,1,352b91e59b5b6883ee5377d034459d1c8e41fed8425d131ce1df9a0a25e0e58e,2024-12-18T14:38:24.727000
CVE-2024-52997,0,0,4bab8dd1c249700329744c631b9c50fcd74d421720a6dd9cecd7f81f37dea809,2024-12-10T21:15:19.740000
CVE-2024-52998,0,0,6290b7bcb6009685ce74422e3ebe6e84d8aa2373cdb09dbaf200385294d7d729,2024-12-03T14:32:51.580000
CVE-2024-52999,0,0,33d693dd8ea7b996acf75cfb9082fde4a08b008c5d482a4ef8516eb8f33def3e,2024-12-12T18:52:43.880000
@ -269826,20 +269829,20 @@ CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159
CVE-2024-54032,0,0,09cba91a1df36e472a78f8f144bb0e8b61b676d406db1792f2031c6b3f2fb2b6,2024-12-10T21:15:20.690000
CVE-2024-54034,0,0,966edd017a57a1808f5de74caa3cb2bc440d3f55cf34a20417d369b2c7aa38e8,2024-12-10T21:15:20.817000
CVE-2024-54036,0,0,3018605477ed7dbca479c548307fd9bd3dfad4d0112e1f577cf4e868d3c9a01b,2024-12-10T21:15:20.947000
CVE-2024-54037,0,0,19a51bcfd5922b35451c2051315e3a0b30572afdad38cf1bef9dfaeefd30d162,2024-12-10T21:15:21.080000
CVE-2024-54037,0,1,f556890ba3fe80df125187ebcadddc7ae2b89a3c8454bb4084a0b553458107af,2024-12-18T14:40:29.303000
CVE-2024-54038,0,0,92ce715c583f62225c8c85cc0d83f79cb82abf9ebe1a12a974431832bf726201,2024-12-10T21:15:21.210000
CVE-2024-54039,0,0,078b20af3d4a442d7823c7b0ff393447b19e8f4600f66173662e17e8ee1fcb6e,2024-12-10T21:15:21.337000
CVE-2024-54039,0,1,71aebf25c5147d9790628c00b402ce1cee82b243f9de77d9f70b222872f7f46c,2024-12-18T14:40:37.587000
CVE-2024-5404,0,0,3740c7be3046d2190332188e66ec21e8b1d4282df75b875095c31d64e80fbe92,2024-11-21T09:47:35.213000
CVE-2024-54040,0,0,2b5a873956ea5c89b196591f1deae293fe07511ba0ef3ae23bb7c255d417e0b4,2024-12-10T21:15:21.463000
CVE-2024-54041,0,0,9da1a302e9f59c0266dbdf1deefa5ccc7001f4e7bcc95c133482efd213163256,2024-12-10T21:15:21.590000
CVE-2024-54042,0,0,b37d04f041a5808b4803ad9ede2a9ea0a1bfdb6dc2352d1aeff9a4ec854d2150,2024-12-10T21:15:21.720000
CVE-2024-54043,0,0,1898ad0bbca7bfb9f934cf52a2fc72f901f34382006e34e218a7a106d4281319,2024-12-10T21:15:21.850000
CVE-2024-54044,0,0,1ff123eccd66e7cddf1f4c18e4a4747b341dcfd50ecb62138fc5800355a13be8,2024-12-10T21:15:21.977000
CVE-2024-54045,0,0,4fac0ecfb17c503792f06c2c719f48ca5059c8d5f681cad36d4c9c6366f47f8c,2024-12-10T21:15:22.110000
CVE-2024-54046,0,0,7ae469fb8f2d682e6d3f6f530e5a4144bb49f39a5d00ced75c569118026cf659,2024-12-10T21:15:22.237000
CVE-2024-54047,0,0,47f73595c6f4dc4aac9d12857905bfc15c2981a08953021da095fd6cd723ddb2,2024-12-10T21:15:22.360000
CVE-2024-54048,0,0,46a5c51666910e855f7b25097bfa2bd4c9509c93dbf5b71f89360397f00e5a0c,2024-12-10T21:15:22.490000
CVE-2024-54049,0,0,805ab2da307acce2ea8332c08a7ed18417bfab8c4d4ffb088de3e7d2ad470d64,2024-12-10T21:15:22.627000
CVE-2024-54040,0,1,13233b484ebb0fc9bf3b9db7209ca33808cdf1c4b9bbbc04e46251909657b46e,2024-12-18T14:40:44.710000
CVE-2024-54041,0,1,d9bcc030129bf6dec82b04a143991ef06874386036703482c0d5681793cd304a,2024-12-18T14:40:52.247000
CVE-2024-54042,0,1,d205e714ae3b471ec5751c4d7d1256e8dde35c581fdb843feba182830d6e5b5b,2024-12-18T14:41:18.750000
CVE-2024-54043,0,1,a09d048cd5fad08e1c76aae1659cafdd14c558b6d3443af54df5e3f9eb9a7869,2024-12-18T14:41:29.400000
CVE-2024-54044,0,1,00a7a44023c704d5d2eeeaa4254894fe51a133f16d96695f5d6e03479217de9e,2024-12-18T14:41:48.010000
CVE-2024-54045,0,1,16afccc174d0d1eb47914c68c8c94946afb636a9e0351682dbd249dbd8289141,2024-12-18T14:41:55.727000
CVE-2024-54046,0,1,886025f67a00b517cf304eea4a10a7bff2cdeb7eb08408123ad3b2b3ebc95f79,2024-12-18T14:42:06.897000
CVE-2024-54047,0,1,e9a3750e3cf6d428500a5ecf267ff6e8fa190a5d46e36bbbc36c6a5f87e787ea,2024-12-18T14:42:14.767000
CVE-2024-54048,0,1,1732d4671bbeea0157b6640f3723e4501447d2b687ba3a9a6cb84ef94950a1a8,2024-12-18T14:42:22.940000
CVE-2024-54049,0,1,b25add6c7f4972fe04c3adfdc0b2278f3dba4fd570c385f036735c8663a66627,2024-12-18T14:42:33.907000
CVE-2024-5405,0,0,8df36cd9ebb4aacfaea97c0ae9188e72e9768324f03849be72121f482af48749,2024-11-21T09:47:35.333000
CVE-2024-54050,0,0,ee890076fea5f3ad9c6bc161fd143e9721aca9308eee09b7d2528e630a5ae13a,2024-12-10T21:15:22.767000
CVE-2024-54051,0,0,0b1f5c4d6a6660f6eca551d294b306144268ea170824a2e433c9ff96bee1678e,2024-12-10T21:15:22.927000
@ -269991,7 +269994,7 @@ CVE-2024-54267,0,0,19b2edf2ab0201b0d80c620d39e4fa0e8c80c1bf2b0a4f3c81a4c7c9c9e94
CVE-2024-54268,0,0,1f33f3ea0aadfaf832c2d90a075ea324c76d65bcbc684f81278d9e88a8b75851,2024-12-13T15:15:31.080000
CVE-2024-54269,0,0,80ac095d31433aafabf7debefee962a6f6c2eac87daa457c3fe90f17fcc9678f,2024-12-11T10:15:07.790000
CVE-2024-5427,0,0,0e5a4a243a6c356d48858411e10959c0d2b5ef3e2a4a055bc1bad76f470ca7d5,2024-11-21T09:47:38.020000
CVE-2024-54270,1,1,6c903904805b92d7828dc048abb44933efe419074a352ae063e0c4ebebea5eaa,2024-12-18T12:15:10.570000
CVE-2024-54270,0,0,6c903904805b92d7828dc048abb44933efe419074a352ae063e0c4ebebea5eaa,2024-12-18T12:15:10.570000
CVE-2024-54271,0,0,621ff0326d2fc9dd051c122a542b742e69a78619f0308f7a42511469d1077041,2024-12-13T15:15:31.230000
CVE-2024-54272,0,0,92081ca9070adab845842b45780f43a5b69bd1bc7503c421572a47c2f97ed814,2024-12-13T15:15:31.367000
CVE-2024-54273,0,0,7de1d07a96d26729c0f10f3cecfc2d5673378ba2d504e5d75819c414633476fe,2024-12-13T15:15:31.497000
@ -270077,7 +270080,7 @@ CVE-2024-54347,0,0,9ecffa953e0884bbd46d6103688207c54883dbdda010bfeb70a36a3a1d570
CVE-2024-54348,0,0,aa27cf6b15bab24c6c600c9630a13cf2537b1e8caebdcb4ef68f3fe5d90bcee2,2024-12-16T16:15:08.477000
CVE-2024-54349,0,0,1827028321e929a3a9304e3cc0db0d3b606a5800582305628e60ae52cd7428a1,2024-12-13T15:15:42.440000
CVE-2024-5435,0,0,be7b01e002899800d7c367843f4cb71728bce729e4821fb8e6b5065711ce87d0,2024-11-21T09:47:40.767000
CVE-2024-54350,1,1,9b1b46ea9a35c61fd7ad36161d113317be573e993dc087f39eb8044615408f66,2024-12-18T12:15:10.713000
CVE-2024-54350,0,0,9b1b46ea9a35c61fd7ad36161d113317be573e993dc087f39eb8044615408f66,2024-12-18T12:15:10.713000
CVE-2024-54351,0,0,c7129cdf0b23517dec940400cbe9c6a0f2d69d5f8af88980273177b73e05253c,2024-12-13T15:15:42.573000
CVE-2024-54352,0,0,d6b00b28bc731c1d7480280f5844dfeeba94e7552fbc8fc902c4d74620e2809a,2024-12-16T15:15:07.707000
CVE-2024-54353,0,0,56c899c16f980be7d5ae16bb63bd232789506aa08518290600f7451bf40d052c,2024-12-16T15:15:07.867000
@ -270200,7 +270203,7 @@ CVE-2024-54498,0,0,fc98c473c1335953bb96a6e6cd9754f341ebec98c3d5942a318f55432f437
CVE-2024-5450,0,0,24d03210219d9f2f3eeb200aadfbbd2297fa2c6b8d7ee9efe09cbafc9256a693,2024-11-21T09:47:42.517000
CVE-2024-54500,0,0,657f282c345a307f53f35dde04bf557f78e33359ddf485d7b8b3507dfe14769f,2024-12-13T18:34:26.490000
CVE-2024-54501,0,0,53a4207c1a9b8c09d2aa36aac95634b59bf35106c5d727899990d0735b43a2db,2024-12-12T17:15:10.837000
CVE-2024-54502,0,0,4fcd6d230b9c5da2bf606cc321abba798a8639dec496d3faadfe85d3a2ced000,2024-12-12T16:15:56.587000
CVE-2024-54502,0,1,0d530603cb62daf612c8e9f528cce0e30598037590c6f193eadb47d9a4b82777,2024-12-18T14:13:13.297000
CVE-2024-54503,0,0,e82e1cc53ce4edc412c3815492fda2911d5e300ada63831244d44df64c1dffb7,2024-12-13T19:15:09.727000
CVE-2024-54504,0,0,bb03ec612268af63063ae51e589216e30653413b6baaf8d7e8860c5e5b629ab1,2024-12-16T18:15:11.317000
CVE-2024-54505,0,0,a90c7f848a0c4214637edeae9c3a0316f06e116644b32639b5ba817d96b2ce78,2024-12-13T18:43:13.217000
@ -270209,10 +270212,10 @@ CVE-2024-54508,0,0,d56b4a8254b12af7295bad2aeed77ff208b735dc12ecbae90c5116eeac15d
CVE-2024-5451,0,0,20c45f860616b7f2fb649e3fe37f7d2b12e76160bf7131f2da5e11d5d4dbf253,2024-11-21T09:47:42.677000
CVE-2024-54510,0,0,41760ed29ca005a3bcf19679bc5f9d3112d6162f99c7272e8e6073225291c2cc,2024-12-13T18:07:49.633000
CVE-2024-54513,0,0,59e90aab7af338ce166e9f6872df66dd31c7c6fbffec6972f97a29bde7559e69,2024-12-13T18:09:28.273000
CVE-2024-54514,0,0,380ef09666130bacefa842b3b0a77661fb0c21e237fde90a103631522071a162,2024-12-12T16:15:56.743000
CVE-2024-54514,0,1,6d1b7501f54b581c9fad4ccbc7c7ec7f90e2e83a8a1d8bac1a1733a97e309873,2024-12-18T14:05:50.673000
CVE-2024-54515,0,0,c445bd848e4bc13ffd78ff33c0ea49b95c8a73b35bda3dc25adccc76a7fc0eac,2024-12-13T18:15:31.650000
CVE-2024-5452,0,0,b01b2e3bd56dc4d1c97364b861c6906ac1d43b69b37e06474f7fb830a26b907e,2024-11-21T09:47:42.793000
CVE-2024-54524,0,0,5b400e695af2f949d2ec71578d693bc64ad75aad1f72a1927a39d0da75803b87,2024-12-12T17:15:11.020000
CVE-2024-54524,0,1,f1841b79a984dc339395e420615a7246f02aaa993793861427c269ef59ff9324,2024-12-18T13:59:47.450000
CVE-2024-54526,0,0,aefe7086f2d764fc872d00eaa2f2173838af254c5b93971d556108953f443875,2024-12-16T22:15:07.320000
CVE-2024-54527,0,0,0bdb505436860de3001c9f8bc7d8b06aed949a47878b0053a48f86090c332969,2024-12-16T19:15:09.313000
CVE-2024-54528,0,0,907ebed6815f9bd0b298566a5f1bfb05901aa5e62ed532357217cb276556f398,2024-12-16T19:15:09.480000
@ -270462,7 +270465,7 @@ CVE-2024-55970,0,0,758b82af3b693a427bceeb6ff3980817487e79e485f9519217bb4cb4cf8b5
CVE-2024-55972,0,0,1c44851ff34933b5d9d20c1d43229f33a01d18ccacf7c33b8ab8ff687a3ae63c,2024-12-16T15:15:23.613000
CVE-2024-55973,0,0,88c683f476bee0b08a38ad5028fbfed3d3c5274f5b3a1ebfb1df181a1a2f2141,2024-12-16T15:15:23.767000
CVE-2024-55974,0,0,64a3805e2dde6492ed0dae16ddb2d242bbca0f63953aa16f3a50643bc6d911ba,2024-12-16T15:15:24.397000
CVE-2024-55975,1,1,764f7e5d25ad0ccbf88d3972a2821b6803c61ed40bd12ebf3c66d169865d4405,2024-12-18T12:15:10.850000
CVE-2024-55975,0,0,764f7e5d25ad0ccbf88d3972a2821b6803c61ed40bd12ebf3c66d169865d4405,2024-12-18T12:15:10.850000
CVE-2024-55976,0,0,677d9056c69dbe1fb1ca305a501c341e634fb161039746fcfd3fad470d57a092,2024-12-16T15:15:24.550000
CVE-2024-55977,0,0,00bde74b9c09b028f5e45be95decc038680e51a23a68e23798ad262b3f6d0941,2024-12-16T15:15:24.700000
CVE-2024-55978,0,0,70de8549de34b7beae6d0c7d53f0c88e5e5163d577c6d4b77e1e9a0d3587d5cb,2024-12-16T15:15:24.840000
@ -270471,9 +270474,9 @@ CVE-2024-5598,0,0,2cf80b31fb178896d7f3a9a8e95bb15f7d3d96fd4d258d8fe02fb96f5cf562
CVE-2024-55980,0,0,c8db833ec7e6e3c339e99eae8d44a99f2eed3deef5836a2ec493c77fc198dde4,2024-12-16T15:15:25.130000
CVE-2024-55981,0,0,f883699a36d99fb40d792fa40c88a353cf593e1183b7ec4c5e05b2733ffab54f,2024-12-16T15:15:25.283000
CVE-2024-55982,0,0,5d9583881751b8be02c821a9caf92f4429cb26fc56f032f5634573dbe01fe6ce,2024-12-16T15:15:25.433000
CVE-2024-55983,1,1,ed51250b22bb87e1d3deb79978e63e6171ace6a12e6bf51eda55c9b1db86c836,2024-12-18T12:15:11.003000
CVE-2024-55984,1,1,650491b22fccf1cd632a677fa09dc7fcb6acd68da252d22f02700aa841c546d8,2024-12-18T12:15:11.167000
CVE-2024-55985,1,1,587793072f3cc35a94189b128fcb7f51bc2ffb2cd3bb9c31011d070ce90589ea,2024-12-18T12:15:11.323000
CVE-2024-55983,0,0,ed51250b22bb87e1d3deb79978e63e6171ace6a12e6bf51eda55c9b1db86c836,2024-12-18T12:15:11.003000
CVE-2024-55984,0,0,650491b22fccf1cd632a677fa09dc7fcb6acd68da252d22f02700aa841c546d8,2024-12-18T12:15:11.167000
CVE-2024-55985,0,0,587793072f3cc35a94189b128fcb7f51bc2ffb2cd3bb9c31011d070ce90589ea,2024-12-18T12:15:11.323000
CVE-2024-55986,0,0,38dc69c582c764aa6783802fb0171e7b5042b834a050391697f2a15e6b5a2ec7,2024-12-16T15:15:25.577000
CVE-2024-55987,0,0,320fc215a551586a71623e41c709ba0ae15b4b8c18f560d8881b040eb63bf602,2024-12-16T15:15:25.733000
CVE-2024-55988,0,0,78318cefbf0a9cd3679cf8f17eeba7d821228ea534660f38950e54bc7283ddc6,2024-12-16T15:15:25.890000
@ -270484,7 +270487,7 @@ CVE-2024-55992,0,0,66c21f67530201c357756290067290b55d9160751eedffe023b99fe9beda4
CVE-2024-55993,0,0,01857b4340d022453a35608fc0d89f3b2236d7e97f49b7795fa10f528b7ad3bf,2024-12-16T15:15:26.523000
CVE-2024-55994,0,0,11be206618ebd59d6dd447780d180264658d58838f7be46230ab26bdde64cecd,2024-12-16T15:15:26.677000
CVE-2024-55996,0,0,2565ba93c1f065db19de84241b28dc4a2fba083a567a0913fd4af777e3b95656,2024-12-16T15:15:26.820000
CVE-2024-55997,1,1,3390aaddf620af1066037b898cdbfe0095ccde5d2499e5d696282b8a0efb908d,2024-12-18T12:15:11.477000
CVE-2024-55997,0,0,3390aaddf620af1066037b898cdbfe0095ccde5d2499e5d696282b8a0efb908d,2024-12-18T12:15:11.477000
CVE-2024-55998,0,0,710f5de4b14b0c0d8579bbf1dfad86e9bc65fb05373752f5527d05614fac6aa3,2024-12-16T15:15:26.957000
CVE-2024-55999,0,0,bbc3255d877ba6fbd7a1898cc98740c856c51f1d6439a774d8af06fc147ebd17,2024-12-16T16:15:08.973000
CVE-2024-5600,0,0,9ec61c0439dd991245dd59b838c072ef06691da563abf803dab52d51cc92f007,2024-11-21T09:47:59.817000
@ -270493,21 +270496,21 @@ CVE-2024-56003,0,0,625ce523f1770738acc9f8f197189066eb7c396a7124f58b14e9fc0502e63
CVE-2024-56004,0,0,000434e0597f438da98218913e2ee2cb6238f56be36ccc6ef3c06ee0c32a6af1,2024-12-16T15:15:27.233000
CVE-2024-56005,0,0,548e74b83a6ea05a9027b723682f0bf87d4d468fe2385c211a67a524bf422b89,2024-12-16T15:15:27.370000
CVE-2024-56007,0,0,44c512d713a31fc6d0d0b8146683eb2f5c27273cd3a84a44340acadf5fa1a6bf,2024-12-16T15:15:27.507000
CVE-2024-56008,1,1,3b8fbd8b3ee3791e886659ade89fcfd460edc1be00ea822a7493245c7b1b214e,2024-12-18T12:15:11.630000
CVE-2024-56008,0,0,3b8fbd8b3ee3791e886659ade89fcfd460edc1be00ea822a7493245c7b1b214e,2024-12-18T12:15:11.630000
CVE-2024-56009,0,0,775ac8634fcf4ecad99e9b5042c330f466f24f7950d7edd2b87f8adc82ecdec5,2024-12-16T15:15:27.643000
CVE-2024-5601,0,0,acbfc7658ae08d87e0393a42bceb6ed0cbea62f439f049ccb260c38457891d44,2024-11-21T09:47:59.930000
CVE-2024-56010,1,1,21883f22e947f57141020fb892ef52a00c3559ee05ea9d105e802a3866cb5081,2024-12-18T12:15:11.790000
CVE-2024-56010,0,0,21883f22e947f57141020fb892ef52a00c3559ee05ea9d105e802a3866cb5081,2024-12-18T12:15:11.790000
CVE-2024-56011,0,0,0a424cb818da7335bf1f0c462b0a349e91b8f3641cc66bb68166f781c159c53b,2024-12-16T15:15:27.803000
CVE-2024-56012,0,0,1294e1b9cfda889d2897343dbdd5a8f0d69df1b88d00748e64c163cc5857799d,2024-12-16T15:15:27.943000
CVE-2024-56013,0,0,98d5f16619c75bf7700fe13a8918184b7016cc1b87371ca36dfb3fcf7e341f9c,2024-12-16T15:15:28.090000
CVE-2024-56015,0,0,a40d49c757aa948f90c29b7c6bdf9b80dad98326d3e52005d5d7b1f0a780c74b,2024-12-16T15:15:28.230000
CVE-2024-56016,1,1,cc1acd220f500c5fac906dcdd897f5e0a0ebd8d18a678408fc7adbda2eeb5196,2024-12-18T12:15:11.940000
CVE-2024-56016,0,0,cc1acd220f500c5fac906dcdd897f5e0a0ebd8d18a678408fc7adbda2eeb5196,2024-12-18T12:15:11.940000
CVE-2024-56017,0,0,7eef9fb5124dee0b581e34fbc52a1cfe55d67df71e2e8706e4badc71fbd3ebc8,2024-12-16T23:15:06.923000
CVE-2024-5602,0,0,f0b74b0cc64b84af5cc9e3e41d215e059dc6bc39d5e4f09c9ace9e8dd21b7bc5,2024-11-21T09:48:00.070000
CVE-2024-5604,0,0,8891da3265bc2c375fdbcf484ffb602948ffb13c3bebcf06f381e67d81cf40c0,2024-11-21T09:48:00.187000
CVE-2024-5605,0,0,a58f7d5ea1a1f097543f1fa828fe0f4d77e53004da146d280334895bad6f3fd1,2024-11-21T09:48:00.363000
CVE-2024-56058,1,1,d7e1e75319cea0dd695b37cd1b28e514a80c81cf5d420babece36e7b419a0e40,2024-12-18T12:15:12.087000
CVE-2024-56059,1,1,73f5e7159a8847c53d07080a32e41db34a65a1756d37f0a879f517ecfda2399c,2024-12-18T12:15:12.237000
CVE-2024-56058,0,0,d7e1e75319cea0dd695b37cd1b28e514a80c81cf5d420babece36e7b419a0e40,2024-12-18T12:15:12.087000
CVE-2024-56059,0,0,73f5e7159a8847c53d07080a32e41db34a65a1756d37f0a879f517ecfda2399c,2024-12-18T12:15:12.237000
CVE-2024-5606,0,0,98eaf774fa1e05fbd39a41e5847ce28629e9cd607119c8a5d04808d521a366d5,2024-11-21T09:48:00.483000
CVE-2024-5607,0,0,2f2e883967a2421396c2c72ed671760bd1b0ce90e12a34d10be305825ec8d97f,2024-11-21T09:48:00.667000
CVE-2024-56072,0,0,88ae4fab448aef17d7ce79e69ee4a7b01a08327e8323b97aaa0bf31e47edc0fa,2024-12-16T17:15:13.500000
@ -270524,6 +270527,7 @@ CVE-2024-5609,0,0,4c03a855f07c8ea18d8e7a70e1e2d3467f32254daea5abf62f130fb919fa93
CVE-2024-5611,0,0,52c51c7a288f3c0ab122ffc809ef2624c3045fff37cac024f8608d70739aac41,2024-11-21T09:48:00.920000
CVE-2024-56112,0,0,c0764d57c8621e012754919d62c22e086c1612ad1fec50477bfc7128c3e19f91,2024-12-16T16:15:10.313000
CVE-2024-5612,0,0,fa9f2c267dc0651754a7af098fdc2eb62147cefb9c269a544f85a4928011ea0a,2024-11-21T09:48:01.037000
CVE-2024-56128,1,1,1d3914c35096298dd539210dd18a0cbe7523f2850a4adc631b73c19bf299d23e,2024-12-18T14:15:23.277000
CVE-2024-5613,0,0,7adefd0ffa78c5730a0bdb9525773949feed9eb79c6b9e6014b5dbc5d6f802b4,2024-11-21T09:48:01.160000
CVE-2024-56139,0,0,51f3702c94f0ffd91c7bd6b4a37a8fbb30240d1963c2f10d645e10159f128016,2024-12-17T19:15:07.010000
CVE-2024-5614,0,0,dbfe1b67548311692c56bb8d68c3048c964ba6dbbed397928536eff3aafacba1,2024-11-21T09:48:01.283000

Can't render this file because it is too large.