Auto-Update: 2024-12-31T17:00:20.640076+00:00

This commit is contained in:
cad-safe-bot 2024-12-31 17:03:44 +00:00
parent e8a5e1aa29
commit 708cdac5ef
36 changed files with 2482 additions and 246 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-46979", "id": "CVE-2021-46979",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:37.230", "published": "2024-02-28T09:15:37.230",
"lastModified": "2024-11-21T06:35:06.310", "lastModified": "2024-12-31T16:02:49.137",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,31 +15,115 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: core: arreglar la eliminaci\u00f3n de los controladores ioctl Actualmente, los controladores ioctl se eliminan dos veces. Por primera vez durante iio_device_unregister() y luego dentro de iio_device_unregister_eventset() y iio_buffers_free_sysfs_and_mask(). La doble liberaci\u00f3n conduce al p\u00e1nico en el kernel. Para solucionar este problema, no toque directamente la lista de controladores ioctl, sino que permita que el c\u00f3digo responsable del registro llame a la rutina de limpieza coincidente." "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: core: arreglar la eliminaci\u00f3n de los controladores ioctl Actualmente, los controladores ioctl se eliminan dos veces. Por primera vez durante iio_device_unregister() y luego dentro de iio_device_unregister_eventset() y iio_buffers_free_sysfs_and_mask(). La doble liberaci\u00f3n conduce al p\u00e1nico en el kernel. Para solucionar este problema, no toque directamente la lista de controladores ioctl, sino que permita que el c\u00f3digo responsable del registro llame a la rutina de limpieza coincidente."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.11.22",
"matchCriteriaId": "83B53E9A-F426-4C03-9A5F-A931FF79827E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.5",
"matchCriteriaId": "0274929A-B36C-4F4C-AB22-30A0DD6B995B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/11e1cae5da4096552f7c091476cbadbc0d1817da", "url": "https://git.kernel.org/stable/c/11e1cae5da4096552f7c091476cbadbc0d1817da",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/901f84de0e16bde10a72d7eb2f2eb73fcde8fa1a", "url": "https://git.kernel.org/stable/c/901f84de0e16bde10a72d7eb2f2eb73fcde8fa1a",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/ab6c935ba3a04317632f3b8b68675bdbaf395303", "url": "https://git.kernel.org/stable/c/ab6c935ba3a04317632f3b8b68675bdbaf395303",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/11e1cae5da4096552f7c091476cbadbc0d1817da", "url": "https://git.kernel.org/stable/c/11e1cae5da4096552f7c091476cbadbc0d1817da",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/901f84de0e16bde10a72d7eb2f2eb73fcde8fa1a", "url": "https://git.kernel.org/stable/c/901f84de0e16bde10a72d7eb2f2eb73fcde8fa1a",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/ab6c935ba3a04317632f3b8b68675bdbaf395303", "url": "https://git.kernel.org/stable/c/ab6c935ba3a04317632f3b8b68675bdbaf395303",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-46980", "id": "CVE-2021-46980",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:37.273", "published": "2024-02-28T09:15:37.273",
"lastModified": "2024-11-21T06:35:06.453", "lastModified": "2024-12-31T16:06:11.213",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,39 +15,136 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: typec: ucsi: recupera todos los PDO en lugar de solo los primeros 4 commits 4dbc6a4ef06d (\"usb: typec: ucsi: guarda objetos de datos de energ\u00eda en modo PD\") introdujo la recuperaci\u00f3n de los PDO cuando se conectan a una fuente compatible con PD. Pero solo se reciben los primeros 4 PDO, ya que ese es el n\u00famero m\u00e1ximo que se puede recuperar a la vez dada la limitaci\u00f3n de longitud de MESSAGE_IN (16 bytes). Sin embargo, seg\u00fan las especificaciones de PD, una fuente conectada puede anunciar hasta un m\u00e1ximo de 7 PDO. Si dicha fuente est\u00e1 conectada, es posible que el PPM haya negociado un contrato de energ\u00eda con uno de los PDO con un \u00edndice mayor que 4, y se reflejar\u00eda en el campo de posici\u00f3n del objeto del objeto de datos de solicitud (RDO). Esto dar\u00eda como resultado un acceso fuera de los l\u00edmites cuando se usa rdo_index() para indexar en la matriz src_pdos en ucsi_psy_get_voltage_now(). Con la ayuda del verificador UBSAN -fsanitize=array-bounds habilitado, este problema exacto se revela cuando se conecta a un adaptador de fuente PD que anuncia 5 PDO y el PPM firma un contrato despu\u00e9s de seleccionar el quinto. [ 151.545106][ T70] Excepci\u00f3n inesperada de BRK del kernel en EL1 [ 151.545112][ T70] Error interno: controlador BRK: f2005512 [#1] SMP PREEMPT ... [ 151.545499][ T70] pc : ucsi_psy_get_prop+0x208/0x20c [ 151.545507 ] [ T70] lr : power_supply_show_property+0xc0/0x328 ... [ 151.545542][ T70] Rastreo de llamadas: [ 151.545544][ T70] ucsi_psy_get_prop+0x208/0x20c [ 151.545546][ T70] power_supply_uevent+0x1a4/0x 2f0 [151.545550][T70] dev_uevent+0x200/0x384 [ 151.545555][ T70] kobject_uevent_env+0x1d4/0x7e8 [ 151.545557][ T70] power_supply_changed_work+0x174/0x31c [ 151.545562][ T70] Process_one_work+0x244/0 x6f0 [ 151.545564][ T70] work_thread+0x3e0/0xa64 Nosotros Puede resolver esto recuperando y almacenando hasta un m\u00e1ximo de 7 PDO en la matriz con->src_pdos. Esto implicar\u00eda dos llamadas al comando GET_PDOS." "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: typec: ucsi: recupera todos los PDO en lugar de solo los primeros 4 commits 4dbc6a4ef06d (\"usb: typec: ucsi: guarda objetos de datos de energ\u00eda en modo PD\") introdujo la recuperaci\u00f3n de los PDO cuando se conectan a una fuente compatible con PD. Pero solo se reciben los primeros 4 PDO, ya que ese es el n\u00famero m\u00e1ximo que se puede recuperar a la vez dada la limitaci\u00f3n de longitud de MESSAGE_IN (16 bytes). Sin embargo, seg\u00fan las especificaciones de PD, una fuente conectada puede anunciar hasta un m\u00e1ximo de 7 PDO. Si dicha fuente est\u00e1 conectada, es posible que el PPM haya negociado un contrato de energ\u00eda con uno de los PDO con un \u00edndice mayor que 4, y se reflejar\u00eda en el campo de posici\u00f3n del objeto del objeto de datos de solicitud (RDO). Esto dar\u00eda como resultado un acceso fuera de los l\u00edmites cuando se usa rdo_index() para indexar en la matriz src_pdos en ucsi_psy_get_voltage_now(). Con la ayuda del verificador UBSAN -fsanitize=array-bounds habilitado, este problema exacto se revela cuando se conecta a un adaptador de fuente PD que anuncia 5 PDO y el PPM firma un contrato despu\u00e9s de seleccionar el quinto. [ 151.545106][ T70] Excepci\u00f3n inesperada de BRK del kernel en EL1 [ 151.545112][ T70] Error interno: controlador BRK: f2005512 [#1] SMP PREEMPT ... [ 151.545499][ T70] pc : ucsi_psy_get_prop+0x208/0x20c [ 151.545507 ] [ T70] lr : power_supply_show_property+0xc0/0x328 ... [ 151.545542][ T70] Rastreo de llamadas: [ 151.545544][ T70] ucsi_psy_get_prop+0x208/0x20c [ 151.545546][ T70] power_supply_uevent+0x1a4/0x 2f0 [151.545550][T70] dev_uevent+0x200/0x384 [ 151.545555][ T70] kobject_uevent_env+0x1d4/0x7e8 [ 151.545557][ T70] power_supply_changed_work+0x174/0x31c [ 151.545562][ T70] Process_one_work+0x244/0 x6f0 [ 151.545564][ T70] work_thread+0x3e0/0xa64 Nosotros Puede resolver esto recuperando y almacenando hasta un m\u00e1ximo de 7 PDO en la matriz con->src_pdos. Esto implicar\u00eda dos llamadas al comando GET_PDOS."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.8",
"versionEndExcluding": "5.10.38",
"matchCriteriaId": "48EEEAD2-D08A-422C-8830-6CCF86E89E64"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.11.22",
"matchCriteriaId": "83B53E9A-F426-4C03-9A5F-A931FF79827E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.5",
"matchCriteriaId": "0274929A-B36C-4F4C-AB22-30A0DD6B995B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/1f4642b72be79757f050924a9b9673b6a02034bc", "url": "https://git.kernel.org/stable/c/1f4642b72be79757f050924a9b9673b6a02034bc",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/5e9c6f58b01e6fdfbc740390c01f542a35c97e57", "url": "https://git.kernel.org/stable/c/5e9c6f58b01e6fdfbc740390c01f542a35c97e57",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/a453bfd7ef15fd9d524004d3ca7b05353a302911", "url": "https://git.kernel.org/stable/c/a453bfd7ef15fd9d524004d3ca7b05353a302911",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/e5366bea0277425e1868ba20eeb27c879d5a6e2d", "url": "https://git.kernel.org/stable/c/e5366bea0277425e1868ba20eeb27c879d5a6e2d",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/1f4642b72be79757f050924a9b9673b6a02034bc", "url": "https://git.kernel.org/stable/c/1f4642b72be79757f050924a9b9673b6a02034bc",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/5e9c6f58b01e6fdfbc740390c01f542a35c97e57", "url": "https://git.kernel.org/stable/c/5e9c6f58b01e6fdfbc740390c01f542a35c97e57",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/a453bfd7ef15fd9d524004d3ca7b05353a302911", "url": "https://git.kernel.org/stable/c/a453bfd7ef15fd9d524004d3ca7b05353a302911",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/e5366bea0277425e1868ba20eeb27c879d5a6e2d", "url": "https://git.kernel.org/stable/c/e5366bea0277425e1868ba20eeb27c879d5a6e2d",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-46982", "id": "CVE-2021-46982",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:37.367", "published": "2024-02-28T09:15:37.367",
"lastModified": "2024-11-21T06:35:06.777", "lastModified": "2024-12-31T16:08:54.203",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,39 +15,136 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: comprimir: corregir la condici\u00f3n de ejecuci\u00f3n de sobrescritura frente a truncar pos_fsstress testcase presenta un p\u00e1nico como se muestra a continuaci\u00f3n: ------------[ cortar aqu\u00ed ]--- --------- \u00a1ERROR del kernel en fs/f2fs/compress.c:1082! c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] SMP PTI CPU: 4 PID: 2753477 Comm: kworker/u16:2 Contaminado: G OE 5.12.0-rc1-custom #1 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.14.0-2 01/04/2014 Cola de trabajo: reescritura wb_workfn (flush-252:16) RIP: 0010:prepare_compress_overwrite+0x4c0/0x760 [f2fs] Seguimiento de llamadas: f2fs_prepare_compress_overwrite+0x5f/0x80 [f2fs] f2fs_write_cache_pages+ 0x468/0x8a0 [f2fs] f2fs_write_data_pages+0x2a4/0x2f0 [f2fs] do_writepages+0x38/0xc0 __writeback_single_inode+0x44/0x2a0 writeback_sb_inodes+0x223/0x4d0 __writeback_inodes_wb+0x56/0xf0 wb_writeback+0x1dd/0 x290 wb_workfn+0x309/0x500 proceso_one_work+0x220/0x3c0 trabajador_thread+0x53/ 0x420 kthread+0x12f/0x150 ret_from_fork+0x22/0x30 La causa principal es que truncate() puede correr con sobrescritura como se muestra a continuaci\u00f3n, por lo que un recuento de referencias restante en la p\u00e1gina no puede garantizar que la p\u00e1gina se adjunte en el \u00e1rbol de mapeo todo el tiempo, despu\u00e9s del truncamiento, m\u00e1s adelante find_lock_page() puede devolver un puntero NULL. - prepare_compress_overwrite - f2fs_pagecache_get_page - unlock_page - f2fs_setattr - truncate_setsize - truncate_inode_page - delete_from_page_cache - find_lock_page Solucione este problema evitando hacer referencia a la p\u00e1gina actualizada." "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: f2fs: comprimir: corregir la condici\u00f3n de ejecuci\u00f3n de sobrescritura frente a truncar pos_fsstress testcase presenta un p\u00e1nico como se muestra a continuaci\u00f3n: ------------[ cortar aqu\u00ed ]--- --------- \u00a1ERROR del kernel en fs/f2fs/compress.c:1082! c\u00f3digo de operaci\u00f3n no v\u00e1lido: 0000 [#1] SMP PTI CPU: 4 PID: 2753477 Comm: kworker/u16:2 Contaminado: G OE 5.12.0-rc1-custom #1 Nombre del hardware: PC est\u00e1ndar QEMU (i440FX + PIIX, 1996), BIOS 1.14.0-2 01/04/2014 Cola de trabajo: reescritura wb_workfn (flush-252:16) RIP: 0010:prepare_compress_overwrite+0x4c0/0x760 [f2fs] Seguimiento de llamadas: f2fs_prepare_compress_overwrite+0x5f/0x80 [f2fs] f2fs_write_cache_pages+ 0x468/0x8a0 [f2fs] f2fs_write_data_pages+0x2a4/0x2f0 [f2fs] do_writepages+0x38/0xc0 __writeback_single_inode+0x44/0x2a0 writeback_sb_inodes+0x223/0x4d0 __writeback_inodes_wb+0x56/0xf0 wb_writeback+0x1dd/0 x290 wb_workfn+0x309/0x500 proceso_one_work+0x220/0x3c0 trabajador_thread+0x53/ 0x420 kthread+0x12f/0x150 ret_from_fork+0x22/0x30 La causa principal es que truncate() puede correr con sobrescritura como se muestra a continuaci\u00f3n, por lo que un recuento de referencias restante en la p\u00e1gina no puede garantizar que la p\u00e1gina se adjunte en el \u00e1rbol de mapeo todo el tiempo, despu\u00e9s del truncamiento, m\u00e1s adelante find_lock_page() puede devolver un puntero NULL. - prepare_compress_overwrite - f2fs_pagecache_get_page - unlock_page - f2fs_setattr - truncate_setsize - truncate_inode_page - delete_from_page_cache - find_lock_page Solucione este problema evitando hacer referencia a la p\u00e1gina actualizada."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.0,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.6",
"versionEndExcluding": "5.10.38",
"matchCriteriaId": "E13DFC88-3633-414B-8409-9272DE29A99C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.11.22",
"matchCriteriaId": "83B53E9A-F426-4C03-9A5F-A931FF79827E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.5",
"matchCriteriaId": "0274929A-B36C-4F4C-AB22-30A0DD6B995B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/5639b73fd3bc6fc8ca72e3a9ac15aacaabd7ebff", "url": "https://git.kernel.org/stable/c/5639b73fd3bc6fc8ca72e3a9ac15aacaabd7ebff",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/64acb100fe3beb5d20184d0ae3307235bd3555c4", "url": "https://git.kernel.org/stable/c/64acb100fe3beb5d20184d0ae3307235bd3555c4",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/936158b15e2648253afb824d252c910c496d34b5", "url": "https://git.kernel.org/stable/c/936158b15e2648253afb824d252c910c496d34b5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/a949dc5f2c5cfe0c910b664650f45371254c0744", "url": "https://git.kernel.org/stable/c/a949dc5f2c5cfe0c910b664650f45371254c0744",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/5639b73fd3bc6fc8ca72e3a9ac15aacaabd7ebff", "url": "https://git.kernel.org/stable/c/5639b73fd3bc6fc8ca72e3a9ac15aacaabd7ebff",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/64acb100fe3beb5d20184d0ae3307235bd3555c4", "url": "https://git.kernel.org/stable/c/64acb100fe3beb5d20184d0ae3307235bd3555c4",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/936158b15e2648253afb824d252c910c496d34b5", "url": "https://git.kernel.org/stable/c/936158b15e2648253afb824d252c910c496d34b5",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/a949dc5f2c5cfe0c910b664650f45371254c0744", "url": "https://git.kernel.org/stable/c/a949dc5f2c5cfe0c910b664650f45371254c0744",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2021-46986", "id": "CVE-2021-46986",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-02-28T09:15:37.540", "published": "2024-02-28T09:15:37.540",
"lastModified": "2024-11-21T06:35:07.760", "lastModified": "2024-12-31T16:14:55.390",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -15,39 +15,136 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: usb: dwc3: gadget: estructura de gadget libre solo despu\u00e9s de liberar los puntos finales. Como parte de el commit e81a7018d93a (\"usb: dwc3: asignar estructura de gadget din\u00e1micamente\"), se agreg\u00f3 dwc3_gadget_release() que libere la estructura dwc->gadget al retirar el dispositivo cuando se llama a usb_del_gadget_udc() en dwc3_gadget_exit(). Sin embargo, simplemente liberar el gadget da como resultado una situaci\u00f3n de puntero colgante: los puntos finales creados en dwc3_gadget_init_endpoints() tienen sus miembros dep->endpoint.ep_list encadenados fuera del list_head anclado en dwc->gadget->ep_list. Por lo tanto, cuando se libera dwc->gadget, el primer dwc3_ep de la lista ahora tiene un puntero anterior colgante y lo mismo ocurre con el siguiente puntero de dwc3_ep al final de la lista. El dwc3_gadget_free_endpoints() que sigue dar\u00e1 como resultado un use-after-free cuando llame a list_del(). Esto se detect\u00f3 habilitando KASAN y realizando una desvinculaci\u00f3n del controlador. La reciente confirmaci\u00f3n 568262bf5492 (\"usb: dwc3: core: Add Shutdown Callback for dwc3\") tambi\u00e9n expone esto como un p\u00e1nico durante el apagado. Hay algunas posibilidades para solucionar este problema. Una podr\u00eda ser realizar un list_del() del propio gadget->ep_list que lo elimine del resto de la cadena dwc3_ep. Otro enfoque es lo que hace este parche, al dividir la llamada usb_del_gadget_udc() en sus componentes separados \"del\" y \"put\". Esto permite llamar a dwc3_gadget_free_endpoints() antes de que el gadget se libere finalmente con usb_put_gadget()." "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: usb: dwc3: gadget: estructura de gadget libre solo despu\u00e9s de liberar los puntos finales. Como parte de el commit e81a7018d93a (\"usb: dwc3: asignar estructura de gadget din\u00e1micamente\"), se agreg\u00f3 dwc3_gadget_release() que libere la estructura dwc->gadget al retirar el dispositivo cuando se llama a usb_del_gadget_udc() en dwc3_gadget_exit(). Sin embargo, simplemente liberar el gadget da como resultado una situaci\u00f3n de puntero colgante: los puntos finales creados en dwc3_gadget_init_endpoints() tienen sus miembros dep->endpoint.ep_list encadenados fuera del list_head anclado en dwc->gadget->ep_list. Por lo tanto, cuando se libera dwc->gadget, el primer dwc3_ep de la lista ahora tiene un puntero anterior colgante y lo mismo ocurre con el siguiente puntero de dwc3_ep al final de la lista. El dwc3_gadget_free_endpoints() que sigue dar\u00e1 como resultado un use-after-free cuando llame a list_del(). Esto se detect\u00f3 habilitando KASAN y realizando una desvinculaci\u00f3n del controlador. La reciente confirmaci\u00f3n 568262bf5492 (\"usb: dwc3: core: Add Shutdown Callback for dwc3\") tambi\u00e9n expone esto como un p\u00e1nico durante el apagado. Hay algunas posibilidades para solucionar este problema. Una podr\u00eda ser realizar un list_del() del propio gadget->ep_list que lo elimine del resto de la cadena dwc3_ep. Otro enfoque es lo que hace este parche, al dividir la llamada usb_del_gadget_udc() en sus componentes separados \"del\" y \"put\". Esto permite llamar a dwc3_gadget_free_endpoints() antes de que el gadget se libere finalmente con usb_put_gadget()."
} }
], ],
"metrics": {}, "metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.10",
"versionEndExcluding": "5.10.38",
"matchCriteriaId": "8051E54C-C4D7-4B79-90C8-3C0B5A772262"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.11",
"versionEndExcluding": "5.11.22",
"matchCriteriaId": "83B53E9A-F426-4C03-9A5F-A931FF79827E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.12",
"versionEndExcluding": "5.12.5",
"matchCriteriaId": "0274929A-B36C-4F4C-AB22-30A0DD6B995B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "0CBAD0FC-C281-4666-AB2F-F8E6E1165DF7"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://git.kernel.org/stable/c/1ea775021282d90e1d08d696b7ab54aa75d688e5", "url": "https://git.kernel.org/stable/c/1ea775021282d90e1d08d696b7ab54aa75d688e5",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/b4b8e9601d7ee8806d2687f081a42485d27674a1", "url": "https://git.kernel.org/stable/c/b4b8e9601d7ee8806d2687f081a42485d27674a1",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/bb9c74a5bd1462499fe5ccb1e3c5ac40dcfa9139", "url": "https://git.kernel.org/stable/c/bb9c74a5bd1462499fe5ccb1e3c5ac40dcfa9139",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/bc0cdd72493236fb72b390ad38ce581e353c143c", "url": "https://git.kernel.org/stable/c/bc0cdd72493236fb72b390ad38ce581e353c143c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/1ea775021282d90e1d08d696b7ab54aa75d688e5", "url": "https://git.kernel.org/stable/c/1ea775021282d90e1d08d696b7ab54aa75d688e5",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/b4b8e9601d7ee8806d2687f081a42485d27674a1", "url": "https://git.kernel.org/stable/c/b4b8e9601d7ee8806d2687f081a42485d27674a1",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/bb9c74a5bd1462499fe5ccb1e3c5ac40dcfa9139", "url": "https://git.kernel.org/stable/c/bb9c74a5bd1462499fe5ccb1e3c5ac40dcfa9139",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://git.kernel.org/stable/c/bc0cdd72493236fb72b390ad38ce581e353c143c", "url": "https://git.kernel.org/stable/c/bc0cdd72493236fb72b390ad38ce581e353c143c",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2022-43842", "id": "CVE-2022-43842",
"sourceIdentifier": "psirt@us.ibm.com", "sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-02-23T19:15:08.243", "published": "2024-02-23T19:15:08.243",
"lastModified": "2024-11-21T07:27:15.937", "lastModified": "2024-12-31T15:32:22.737",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 4.7 "impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
} }
] ]
}, },
@ -51,22 +71,105 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:aspera_console:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.4.0",
"versionEndExcluding": "3.4.2",
"matchCriteriaId": "36E8C5AD-1A02-4D0D-8D77-3D7E0CA5E9AE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:-:*:*:*:*:*:*",
"matchCriteriaId": "85E41019-C6D4-4CE6-8560-63697E22D30F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_1:*:*:*:*:*:*",
"matchCriteriaId": "04A1A613-67C4-4980-A707-D43638F9108D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_2:*:*:*:*:*:*",
"matchCriteriaId": "00824D6B-F2FD-4E2B-A8E9-9552883D190C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_3:*:*:*:*:*:*",
"matchCriteriaId": "C0D15741-C6AD-45A9-A6C8-1848A51FC630"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_4:*:*:*:*:*:*",
"matchCriteriaId": "833812B2-9142-437C-8EF7-8B27D0AC4D39"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_5:*:*:*:*:*:*",
"matchCriteriaId": "E6F2E6AB-3865-4CCD-96C6-55A0C9065EB8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:aspera_console:3.4.2:patch_level_6:*:*:*:*:*:*",
"matchCriteriaId": "D16849BE-F970-45E9-AF1D-C60125D19AA1"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/239079", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/239079",
"source": "psirt@us.ibm.com" "source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://www.ibm.com/support/pages/node/7122632", "url": "https://www.ibm.com/support/pages/node/7122632",
"source": "psirt@us.ibm.com" "source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/239079", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/239079",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://www.ibm.com/support/pages/node/7122632", "url": "https://www.ibm.com/support/pages/node/7122632",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2023-6602",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-12-31T15:15:06.240",
"lastModified": "2024-12-31T15:15:06.240",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in FFmpeg's TTY Demuxer. This vulnerability allows possible data exfiltration via improper parsing of non-TTY-compliant input files in HLS playlists."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-99"
}
]
}
],
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2334338",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2334338",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2023-6603",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-12-31T15:15:07.490",
"lastModified": "2024-12-31T15:15:07.490",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in FFmpeg's HLS playlist parsing. This vulnerability allows a denial of service via a maliciously crafted HLS playlist that triggers a null pointer dereference during initialization."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-99"
}
]
}
],
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2334335",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2334335",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-13067", "id": "CVE-2024-13067",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-31T09:15:05.307", "published": "2024-12-31T09:15:05.307",
"lastModified": "2024-12-31T09:15:05.307", "lastModified": "2024-12-31T16:15:25.280",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "A vulnerability was found in CodeAstro Online Food Ordering System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/all_users.php of the component All Users Page. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." "value": "A vulnerability was found in CodeAstro Online Food Ordering System 1.0 and classified as critical. This issue affects some unknown processing of the file /admin/all_users.php of the component All Users Page. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en CodeAstro Online Food Ordering System 1.0 y se ha clasificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /admin/all_users.php del componente All Users Page. La manipulaci\u00f3n conduce a controles de acceso inadecuados. El ataque puede iniciarse de forma remota. El exploit ha sido divulgado al p\u00fablico y puede utilizarse."
} }
], ],
"metrics": { "metrics": {
@ -107,7 +111,7 @@
"weaknesses": [ "weaknesses": [
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Primary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -140,6 +144,10 @@
{ {
"url": "https://vuldb.com/?submit.472081", "url": "https://vuldb.com/?submit.472081",
"source": "cna@vuldb.com" "source": "cna@vuldb.com"
},
{
"url": "https://github.com/shaturo1337/POCs/blob/main/Broken%20Access%20Control%20in%20Online%20Food%20Ordering%20System.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-13069", "id": "CVE-2024-13069",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-31T11:15:06.933", "published": "2024-12-31T11:15:06.933",
"lastModified": "2024-12-31T11:15:06.933", "lastModified": "2024-12-31T16:15:25.580",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -111,7 +111,7 @@
"weaknesses": [ "weaknesses": [
{ {
"source": "cna@vuldb.com", "source": "cna@vuldb.com",
"type": "Primary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -144,6 +144,10 @@
{ {
"url": "https://www.sourcecodester.com/", "url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com" "source": "cna@vuldb.com"
},
{
"url": "https://github.com/shaturo1337/POCs/blob/main/Stored%20XSS%20Vulnerability%20in%20Multi%20Role%20Login%20System.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
} }
] ]
} }

View File

@ -0,0 +1,149 @@
{
"id": "CVE-2024-13070",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-31T15:15:07.853",
"lastModified": "2024-12-31T15:15:07.853",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in CodeAstro Online Food Ordering System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/update_users.php of the component Update User Page. The manipulation of the argument user_upd leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://codeastro.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/shaturo1337/POCs/blob/main/RCE%20via%20SQL%20Injection%20in%20Online%20Food%20Ordering%20System.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.289825",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.289825",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.472104",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/shaturo1337/POCs/blob/main/RCE%20via%20SQL%20Injection%20in%20Online%20Food%20Ordering%20System.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2024-13072",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-31T15:15:08.083",
"lastModified": "2024-12-31T15:15:08.083",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in 1000 Projects Beauty Parlour Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/add-customer-services.php of the component Customer Detail Handler. The manipulation of the argument sids[] leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://1000projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/lings3346/CVE/blob/main/SQL_Injection_in_Beauty_Parlour_Management_System.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.289826",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.289826",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.472165",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1317", "id": "CVE-2024-1317",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-02-29T01:43:47.307", "published": "2024-02-29T01:43:47.307",
"lastModified": "2024-11-21T08:50:19.267", "lastModified": "2024-12-31T16:57:11.080",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,30 +39,80 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:themeisle:rss_aggregator_by_feedzy:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.4.2",
"matchCriteriaId": "30EF6728-3376-474E-8319-6C8576696B5D"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://plugins.trac.wordpress.org/browser/feedzy-rss-feeds/tags/4.4.2/includes/admin/feedzy-rss-feeds-import.php#L2623", "url": "https://plugins.trac.wordpress.org/browser/feedzy-rss-feeds/tags/4.4.2/includes/admin/feedzy-rss-feeds-import.php#L2623",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/changeset/3033749/feedzy-rss-feeds/tags/4.4.3/includes/admin/feedzy-rss-feeds-admin.php?old=3030538&old_path=feedzy-rss-feeds%2Ftags%2F4.4.2%2Fincludes%2Fadmin%2Ffeedzy-rss-feeds-admin.php", "url": "https://plugins.trac.wordpress.org/changeset/3033749/feedzy-rss-feeds/tags/4.4.3/includes/admin/feedzy-rss-feeds-admin.php?old=3030538&old_path=feedzy-rss-feeds%2Ftags%2F4.4.2%2Fincludes%2Fadmin%2Ffeedzy-rss-feeds-admin.php",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cf57aeaa-e37e-4b22-aeaa-f0a9f4877484?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cf57aeaa-e37e-4b22-aeaa-f0a9f4877484?source=cve",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Patch",
"Third Party Advisory"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/browser/feedzy-rss-feeds/tags/4.4.2/includes/admin/feedzy-rss-feeds-import.php#L2623", "url": "https://plugins.trac.wordpress.org/browser/feedzy-rss-feeds/tags/4.4.2/includes/admin/feedzy-rss-feeds-import.php#L2623",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/changeset/3033749/feedzy-rss-feeds/tags/4.4.3/includes/admin/feedzy-rss-feeds-admin.php?old=3030538&old_path=feedzy-rss-feeds%2Ftags%2F4.4.2%2Fincludes%2Fadmin%2Ffeedzy-rss-feeds-admin.php", "url": "https://plugins.trac.wordpress.org/changeset/3033749/feedzy-rss-feeds/tags/4.4.3/includes/admin/feedzy-rss-feeds-admin.php?old=3030538&old_path=feedzy-rss-feeds%2Ftags%2F4.4.2%2Fincludes%2Fadmin%2Ffeedzy-rss-feeds-admin.php",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cf57aeaa-e37e-4b22-aeaa-f0a9f4877484?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cf57aeaa-e37e-4b22-aeaa-f0a9f4877484?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1318", "id": "CVE-2024-1318",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-02-29T01:43:47.457", "published": "2024-02-29T01:43:47.457",
"lastModified": "2024-11-21T08:50:19.403", "lastModified": "2024-12-31T16:56:50.763",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,38 +39,94 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:themeisle:rss_aggregator_by_feedzy:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "4.4.2",
"matchCriteriaId": "30EF6728-3376-474E-8319-6C8576696B5D"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://plugins.trac.wordpress.org/browser/feedzy-rss-feeds/tags/4.4.2/includes/admin/feedzy-rss-feeds-admin.php#L1053", "url": "https://plugins.trac.wordpress.org/browser/feedzy-rss-feeds/tags/4.4.2/includes/admin/feedzy-rss-feeds-admin.php#L1053",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/browser/feedzy-rss-feeds/tags/4.4.2/includes/admin/feedzy-rss-feeds-import.php#L1022", "url": "https://plugins.trac.wordpress.org/browser/feedzy-rss-feeds/tags/4.4.2/includes/admin/feedzy-rss-feeds-import.php#L1022",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/changeset/3033749/feedzy-rss-feeds/tags/4.4.3/includes/admin/feedzy-rss-feeds-admin.php?old=3030538&old_path=feedzy-rss-feeds%2Ftags%2F4.4.2%2Fincludes%2Fadmin%2Ffeedzy-rss-feeds-admin.php", "url": "https://plugins.trac.wordpress.org/changeset/3033749/feedzy-rss-feeds/tags/4.4.3/includes/admin/feedzy-rss-feeds-admin.php?old=3030538&old_path=feedzy-rss-feeds%2Ftags%2F4.4.2%2Fincludes%2Fadmin%2Ffeedzy-rss-feeds-admin.php",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/181edcec-a57d-4516-935d-6777d2de77ae?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/181edcec-a57d-4516-935d-6777d2de77ae?source=cve",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Patch",
"Third Party Advisory"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/browser/feedzy-rss-feeds/tags/4.4.2/includes/admin/feedzy-rss-feeds-admin.php#L1053", "url": "https://plugins.trac.wordpress.org/browser/feedzy-rss-feeds/tags/4.4.2/includes/admin/feedzy-rss-feeds-admin.php#L1053",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/browser/feedzy-rss-feeds/tags/4.4.2/includes/admin/feedzy-rss-feeds-import.php#L1022", "url": "https://plugins.trac.wordpress.org/browser/feedzy-rss-feeds/tags/4.4.2/includes/admin/feedzy-rss-feeds-import.php#L1022",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/changeset/3033749/feedzy-rss-feeds/tags/4.4.3/includes/admin/feedzy-rss-feeds-admin.php?old=3030538&old_path=feedzy-rss-feeds%2Ftags%2F4.4.2%2Fincludes%2Fadmin%2Ffeedzy-rss-feeds-admin.php", "url": "https://plugins.trac.wordpress.org/changeset/3033749/feedzy-rss-feeds/tags/4.4.3/includes/admin/feedzy-rss-feeds-admin.php?old=3030538&old_path=feedzy-rss-feeds%2Ftags%2F4.4.2%2Fincludes%2Fadmin%2Ffeedzy-rss-feeds-admin.php",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/181edcec-a57d-4516-935d-6777d2de77ae?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/181edcec-a57d-4516-935d-6777d2de77ae?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1334", "id": "CVE-2024-1334",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-02-29T01:43:47.793", "published": "2024-02-29T01:43:47.793",
"lastModified": "2024-11-21T08:50:21.517", "lastModified": "2024-12-31T16:48:40.290",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,22 +39,64 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagerecycle:imagerecycle_pdf_\\&_image_compression:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.1.14",
"matchCriteriaId": "CD8DED9B-43A3-431E-9E3D-EC137E57A535"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression", "url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0318ec4a-185a-405d-90f8-008ba373114b?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0318ec4a-185a-405d-90f8-008ba373114b?source=cve",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression", "url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0318ec4a-185a-405d-90f8-008ba373114b?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0318ec4a-185a-405d-90f8-008ba373114b?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1335", "id": "CVE-2024-1335",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-02-29T01:43:47.953", "published": "2024-02-29T01:43:47.953",
"lastModified": "2024-11-21T08:50:21.630", "lastModified": "2024-12-31T16:50:11.167",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,22 +39,64 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagerecycle:imagerecycle_pdf_\\&_image_compression:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.1.14",
"matchCriteriaId": "CD8DED9B-43A3-431E-9E3D-EC137E57A535"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression", "url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b3900e4f-4ae4-4026-89df-b63bd869a763?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b3900e4f-4ae4-4026-89df-b63bd869a763?source=cve",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression", "url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b3900e4f-4ae4-4026-89df-b63bd869a763?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b3900e4f-4ae4-4026-89df-b63bd869a763?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1336", "id": "CVE-2024-1336",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-02-29T01:43:48.137", "published": "2024-02-29T01:43:48.137",
"lastModified": "2024-11-21T08:50:21.747", "lastModified": "2024-12-31T16:51:04.857",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,22 +39,64 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagerecycle:imagerecycle_pdf_\\&_image_compression:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.1.14",
"matchCriteriaId": "CD8DED9B-43A3-431E-9E3D-EC137E57A535"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression", "url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ca4cf299-9dee-4ebf-83f3-4c3471bd9fb0?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ca4cf299-9dee-4ebf-83f3-4c3471bd9fb0?source=cve",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression", "url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ca4cf299-9dee-4ebf-83f3-4c3471bd9fb0?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ca4cf299-9dee-4ebf-83f3-4c3471bd9fb0?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1338", "id": "CVE-2024-1338",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-02-29T01:43:48.430", "published": "2024-02-29T01:43:48.430",
"lastModified": "2024-11-21T08:50:21.963", "lastModified": "2024-12-31T16:51:41.113",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,22 +39,64 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagerecycle:imagerecycle_pdf_\\&_image_compression:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.1.14",
"matchCriteriaId": "CD8DED9B-43A3-431E-9E3D-EC137E57A535"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression", "url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Product"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5e3dd131-dbd8-431c-96f4-4ab2c3be4dbd?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5e3dd131-dbd8-431c-96f4-4ab2c3be4dbd?source=cve",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression", "url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5e3dd131-dbd8-431c-96f4-4ab2c3be4dbd?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5e3dd131-dbd8-431c-96f4-4ab2c3be4dbd?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1339", "id": "CVE-2024-1339",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2024-02-29T01:43:48.603", "published": "2024-02-29T01:43:48.603",
"lastModified": "2024-11-21T08:50:22.077", "lastModified": "2024-12-31T16:52:24.407",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,22 +39,66 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:imagerecycle:imagerecycle_pdf_\\&_image_compression:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.1.14",
"matchCriteriaId": "CD8DED9B-43A3-431E-9E3D-EC137E57A535"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression", "url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d08e462-8297-477e-89da-47f26bd6beae?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d08e462-8297-477e-89da-47f26bd6beae?source=cve",
"source": "security@wordfence.com" "source": "security@wordfence.com",
"tags": [
"Patch",
"Third Party Advisory"
]
}, },
{ {
"url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression", "url": "https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d08e462-8297-477e-89da-47f26bd6beae?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d08e462-8297-477e-89da-47f26bd6beae?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1749", "id": "CVE-2024-1749",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-22T20:15:56.403", "published": "2024-02-22T20:15:56.403",
"lastModified": "2024-11-21T08:51:13.700", "lastModified": "2024-12-31T15:00:58.700",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 0.9, "exploitabilityScore": 0.9,
"impactScore": 1.4 "impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -76,30 +96,65 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bdtask:bhojon:2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "CD16B0BF-878A-4CCE-A2C7-96D0ACF1566B"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://drive.google.com/file/d/1oM1h3E9G17lgkbSnhq7FQjfAtEojDNFo/view?usp=sharing", "url": "https://drive.google.com/file/d/1oM1h3E9G17lgkbSnhq7FQjfAtEojDNFo/view?usp=sharing",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Exploit"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.254531", "url": "https://vuldb.com/?ctiid.254531",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
}, },
{ {
"url": "https://vuldb.com/?id.254531", "url": "https://vuldb.com/?id.254531",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
}, },
{ {
"url": "https://drive.google.com/file/d/1oM1h3E9G17lgkbSnhq7FQjfAtEojDNFo/view?usp=sharing", "url": "https://drive.google.com/file/d/1oM1h3E9G17lgkbSnhq7FQjfAtEojDNFo/view?usp=sharing",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.254531", "url": "https://vuldb.com/?ctiid.254531",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
}, },
{ {
"url": "https://vuldb.com/?id.254531", "url": "https://vuldb.com/?id.254531",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1750", "id": "CVE-2024-1750",
"sourceIdentifier": "cna@vuldb.com", "sourceIdentifier": "cna@vuldb.com",
"published": "2024-02-22T20:15:56.643", "published": "2024-02-22T20:15:56.643",
"lastModified": "2024-11-21T08:51:13.837", "lastModified": "2024-12-31T15:08:18.000",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.2, "exploitabilityScore": 2.2,
"impactScore": 3.4 "impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
} }
], ],
"cvssMetricV2": [ "cvssMetricV2": [
@ -76,30 +96,68 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:temmokumvc:temmokumvc:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.3",
"matchCriteriaId": "6F43AE9A-800E-462C-81B2-AE1560CFA41B"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://note.zhaoj.in/share/OrBH8zLKUPOA", "url": "https://note.zhaoj.in/share/OrBH8zLKUPOA",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.254532", "url": "https://vuldb.com/?ctiid.254532",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
}, },
{ {
"url": "https://vuldb.com/?id.254532", "url": "https://vuldb.com/?id.254532",
"source": "cna@vuldb.com" "source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://note.zhaoj.in/share/OrBH8zLKUPOA", "url": "https://note.zhaoj.in/share/OrBH8zLKUPOA",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
}, },
{ {
"url": "https://vuldb.com/?ctiid.254532", "url": "https://vuldb.com/?ctiid.254532",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
}, },
{ {
"url": "https://vuldb.com/?id.254532", "url": "https://vuldb.com/?id.254532",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24772", "id": "CVE-2024-24772",
"sourceIdentifier": "security@apache.org", "sourceIdentifier": "security@apache.org",
"published": "2024-02-28T12:15:47.273", "published": "2024-02-28T12:15:47.273",
"lastModified": "2024-11-21T08:59:40.283", "lastModified": "2024-12-31T16:22:12.747",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 1.4 "impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
} }
] ]
}, },
@ -49,24 +69,75 @@
"value": "CWE-20" "value": "CWE-20"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.0.4",
"matchCriteriaId": "61A22FBB-3B48-450E-890E-47AD28B387CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.1.0",
"versionEndExcluding": "3.1.1",
"matchCriteriaId": "FFA07ED1-0A94-4801-8C7B-D38FADC4CEB8"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "http://www.openwall.com/lists/oss-security/2024/02/28/5", "url": "http://www.openwall.com/lists/oss-security/2024/02/28/5",
"source": "security@apache.org" "source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.apache.org/thread/gfl3ckwy6y9tpz9jmpv62orh2q346sn5", "url": "https://lists.apache.org/thread/gfl3ckwy6y9tpz9jmpv62orh2q346sn5",
"source": "security@apache.org" "source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}, },
{ {
"url": "http://www.openwall.com/lists/oss-security/2024/02/28/5", "url": "http://www.openwall.com/lists/oss-security/2024/02/28/5",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.apache.org/thread/gfl3ckwy6y9tpz9jmpv62orh2q346sn5", "url": "https://lists.apache.org/thread/gfl3ckwy6y9tpz9jmpv62orh2q346sn5",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24773", "id": "CVE-2024-24773",
"sourceIdentifier": "security@apache.org", "sourceIdentifier": "security@apache.org",
"published": "2024-02-28T12:15:47.477", "published": "2024-02-28T12:15:47.477",
"lastModified": "2024-11-21T08:59:40.423", "lastModified": "2024-12-31T16:23:25.093",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 1.2, "exploitabilityScore": 1.2,
"impactScore": 3.6 "impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
} }
] ]
}, },
@ -49,24 +69,75 @@
"value": "CWE-863" "value": "CWE-863"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.0.4",
"matchCriteriaId": "61A22FBB-3B48-450E-890E-47AD28B387CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.1.0",
"versionEndExcluding": "3.1.1",
"matchCriteriaId": "FFA07ED1-0A94-4801-8C7B-D38FADC4CEB8"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "http://www.openwall.com/lists/oss-security/2024/02/28/4", "url": "http://www.openwall.com/lists/oss-security/2024/02/28/4",
"source": "security@apache.org" "source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.apache.org/thread/h66fy6nj41cfx07zh7l552w6dmtjh501", "url": "https://lists.apache.org/thread/h66fy6nj41cfx07zh7l552w6dmtjh501",
"source": "security@apache.org" "source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}, },
{ {
"url": "http://www.openwall.com/lists/oss-security/2024/02/28/4", "url": "http://www.openwall.com/lists/oss-security/2024/02/28/4",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.apache.org/thread/h66fy6nj41cfx07zh7l552w6dmtjh501", "url": "https://lists.apache.org/thread/h66fy6nj41cfx07zh7l552w6dmtjh501",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24779", "id": "CVE-2024-24779",
"sourceIdentifier": "security@apache.org", "sourceIdentifier": "security@apache.org",
"published": "2024-02-28T12:15:47.660", "published": "2024-02-28T12:15:47.660",
"lastModified": "2024-11-21T08:59:41.143", "lastModified": "2024-12-31T16:26:31.327",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 3.1, "exploitabilityScore": 3.1,
"impactScore": 1.4 "impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
} }
] ]
}, },
@ -51,22 +71,63 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*",
"versionEndIncluding": "3.0.4",
"matchCriteriaId": "F5D1642C-2CB9-43A0-B816-4E44354F1521"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.1.0",
"versionEndExcluding": "3.1.1",
"matchCriteriaId": "FFA07ED1-0A94-4801-8C7B-D38FADC4CEB8"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "http://www.openwall.com/lists/oss-security/2024/02/28/6", "url": "http://www.openwall.com/lists/oss-security/2024/02/28/6",
"source": "security@apache.org" "source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.apache.org/thread/xzhz1m5bb9zxhyqgoy4q2d689b3zp4pq", "url": "https://lists.apache.org/thread/xzhz1m5bb9zxhyqgoy4q2d689b3zp4pq",
"source": "security@apache.org" "source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}, },
{ {
"url": "http://www.openwall.com/lists/oss-security/2024/02/28/6", "url": "http://www.openwall.com/lists/oss-security/2024/02/28/6",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.apache.org/thread/xzhz1m5bb9zxhyqgoy4q2d689b3zp4pq", "url": "https://lists.apache.org/thread/xzhz1m5bb9zxhyqgoy4q2d689b3zp4pq",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-25133",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-12-31T15:15:08.283",
"lastModified": "2024-12-31T15:15:08.283",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the Hive ClusterDeployments resource in OpenShift Dedicated. In certain conditions, this issue may allow a developer account on a Hive-enabled cluster to obtain cluster-admin privileges by executing arbitrary commands on the hive/hive-controllers pod."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2260372",
"source": "secalert@redhat.com"
},
{
"url": "https://github.com/openshift/hive/pull/2306",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-26016", "id": "CVE-2024-26016",
"sourceIdentifier": "security@apache.org", "sourceIdentifier": "security@apache.org",
"published": "2024-02-28T12:15:47.850", "published": "2024-02-28T12:15:47.850",
"lastModified": "2024-11-21T09:01:46.090", "lastModified": "2024-12-31T16:27:58.487",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 1.4 "impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
} }
] ]
}, },
@ -51,22 +71,63 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.0.4",
"matchCriteriaId": "61A22FBB-3B48-450E-890E-47AD28B387CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.1.0",
"versionEndExcluding": "3.1.1",
"matchCriteriaId": "FFA07ED1-0A94-4801-8C7B-D38FADC4CEB8"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "http://www.openwall.com/lists/oss-security/2024/02/28/7", "url": "http://www.openwall.com/lists/oss-security/2024/02/28/7",
"source": "security@apache.org" "source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.apache.org/thread/76v1jjcylgk4p3m0258qr359ook3vl8s", "url": "https://lists.apache.org/thread/76v1jjcylgk4p3m0258qr359ook3vl8s",
"source": "security@apache.org" "source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}, },
{ {
"url": "http://www.openwall.com/lists/oss-security/2024/02/28/7", "url": "http://www.openwall.com/lists/oss-security/2024/02/28/7",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.apache.org/thread/76v1jjcylgk4p3m0258qr359ook3vl8s", "url": "https://lists.apache.org/thread/76v1jjcylgk4p3m0258qr359ook3vl8s",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27087", "id": "CVE-2024-27087",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2024-02-26T17:15:10.783", "published": "2024-02-26T17:15:10.783",
"lastModified": "2024-11-21T09:03:49.970", "lastModified": "2024-12-31T15:34:15.493",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.1, "exploitabilityScore": 2.1,
"impactScore": 2.5 "impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
} }
] ]
}, },
@ -49,24 +69,65 @@
"value": "CWE-79" "value": "CWE-79"
} }
] ]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:getkirby:kirby:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.0.0",
"versionEndExcluding": "4.1.1",
"matchCriteriaId": "E14BEE12-BE86-4527-9BCA-194ACE2C2050"
}
]
}
]
} }
], ],
"references": [ "references": [
{ {
"url": "https://github.com/getkirby/kirby/commit/cda3dd9a15228d35e62ff86cfa87a67e7c687437", "url": "https://github.com/getkirby/kirby/commit/cda3dd9a15228d35e62ff86cfa87a67e7c687437",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://github.com/getkirby/kirby/security/advisories/GHSA-63h4-w25c-3qv4", "url": "https://github.com/getkirby/kirby/security/advisories/GHSA-63h4-w25c-3qv4",
"source": "security-advisories@github.com" "source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://github.com/getkirby/kirby/commit/cda3dd9a15228d35e62ff86cfa87a67e7c687437", "url": "https://github.com/getkirby/kirby/commit/cda3dd9a15228d35e62ff86cfa87a67e7c687437",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://github.com/getkirby/kirby/security/advisories/GHSA-63h4-w25c-3qv4", "url": "https://github.com/getkirby/kirby/security/advisories/GHSA-63h4-w25c-3qv4",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27315", "id": "CVE-2024-27315",
"sourceIdentifier": "security@apache.org", "sourceIdentifier": "security@apache.org",
"published": "2024-02-28T10:15:09.650", "published": "2024-02-28T10:15:09.650",
"lastModified": "2024-11-21T09:04:18.873", "lastModified": "2024-12-31T16:16:15.510",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 2.8, "exploitabilityScore": 2.8,
"impactScore": 1.4 "impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
} }
] ]
}, },
@ -51,18 +71,55 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.0.4",
"matchCriteriaId": "61A22FBB-3B48-450E-890E-47AD28B387CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.1.0",
"versionEndExcluding": "3.1.1",
"matchCriteriaId": "FFA07ED1-0A94-4801-8C7B-D38FADC4CEB8"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://lists.apache.org/thread/qcwbx7q2s3ynsd405895bx3wcwq32j7z", "url": "https://lists.apache.org/thread/qcwbx7q2s3ynsd405895bx3wcwq32j7z",
"source": "security@apache.org" "source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}, },
{ {
"url": "http://www.openwall.com/lists/oss-security/2024/02/28/3", "url": "http://www.openwall.com/lists/oss-security/2024/02/28/3",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.apache.org/thread/qcwbx7q2s3ynsd405895bx3wcwq32j7z", "url": "https://lists.apache.org/thread/qcwbx7q2s3ynsd405895bx3wcwq32j7z",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2024-52047",
"sourceIdentifier": "security@trendmicro.com",
"published": "2024-12-31T16:15:25.923",
"lastModified": "2024-12-31T16:15:25.923",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A widget local file inclusion vulnerability in Trend Micro Apex One could allow a remote attacker to execute arbitrary code on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://success.trendmicro.com/en-US/solution/KA-0016669",
"source": "security@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-52048",
"sourceIdentifier": "security@trendmicro.com",
"published": "2024-12-31T16:15:26.063",
"lastModified": "2024-12-31T16:15:26.063",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A LogServer link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. This vulnerability is similar to, but not identical to CVE-2024-52049.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-266"
}
]
}
],
"references": [
{
"url": "https://success.trendmicro.com/en-US/solution/KA-0018217",
"source": "security@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-52049",
"sourceIdentifier": "security@trendmicro.com",
"published": "2024-12-31T16:15:26.193",
"lastModified": "2024-12-31T16:15:26.193",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A LogServer link following vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations. This vulnerability is similar to, but not identical to CVE-2024-52048.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-266"
}
]
}
],
"references": [
{
"url": "https://success.trendmicro.com/en-US/solution/KA-0018217",
"source": "security@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-52050",
"sourceIdentifier": "security@trendmicro.com",
"published": "2024-12-31T16:15:26.313",
"lastModified": "2024-12-31T16:15:26.313",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A LogServer arbitrary file creation vulnerability in Trend Micro Apex One could allow a local attacker to escalate privileges on affected installations.\r\n\r\nPlease note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
}
],
"references": [
{
"url": "https://success.trendmicro.com/en-US/solution/KA-0018217",
"source": "security@trendmicro.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-53647",
"sourceIdentifier": "security@trendmicro.com",
"published": "2024-12-31T16:15:26.437",
"lastModified": "2024-12-31T16:15:26.437",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Trend Micro ID Security, version 3.0 and below contains a vulnerability that could allow an attacker to send an unlimited number of email verification requests without any restriction, potentially leading to abuse or denial of service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security@trendmicro.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-307"
},
{
"lang": "en",
"value": "CWE-400"
},
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"references": [
{
"url": "https://helpcenter.trendmicro.com/en-us/article/tmka-06710",
"source": "security@trendmicro.com"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2024-56198",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-31T16:15:27.247",
"lastModified": "2024-12-31T16:15:27.247",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "path-sanitizer is a simple lightweight npm package for sanitizing paths to prevent Path Traversal. Prior to 3.1.0, the filters can be bypassed using .=%5c which results in a path traversal. This vulnerability is fixed in 3.1.0."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/cabraviva/path-sanitizer/commit/b6d2319eac910dffdfacc8460f5b5cc5a1518ead",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/cabraviva/path-sanitizer/security/advisories/GHSA-94p5-r7cc-3rpr",
"source": "security-advisories@github.com"
},
{
"url": "https://www.loom.com/share/b766ece5193842848ce7562fcd559256?sid=fd826eb6-0eee-4601-bf0e-9cfee5c56e9d",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2024-56802",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-31T16:15:28.240",
"lastModified": "2024-12-31T16:15:28.240",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tapir is a private Terraform registry. Tapir versions 0.9.0 and 0.9.1 are facing a critical issue with scope-able Deploykeys where attackers can guess the key to get write access to the registry. User must upgrade to 0.9.2."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://github.com/PacoVK/tapir/commit/c36360b611fa0ba4f5e250fa43ecf8a294785a03",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/PacoVK/tapir/security/advisories/GHSA-rj9m-qf65-f5gg",
"source": "security-advisories@github.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2024-12-31T15:00:19.927646+00:00 2024-12-31T17:00:20.640076+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2024-12-31T14:50:15.207000+00:00 2024-12-31T16:57:11.080000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,50 +33,53 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
275274 275286
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `31` Recently added CVEs: `12`
- [CVE-2024-51667](CVE-2024/CVE-2024-516xx/CVE-2024-51667.json) (`2024-12-31T14:15:23.827`) - [CVE-2023-6602](CVE-2023/CVE-2023-66xx/CVE-2023-6602.json) (`2024-12-31T15:15:06.240`)
- [CVE-2024-55991](CVE-2024/CVE-2024-559xx/CVE-2024-55991.json) (`2024-12-31T13:15:07.170`) - [CVE-2023-6603](CVE-2023/CVE-2023-66xx/CVE-2023-6603.json) (`2024-12-31T15:15:07.490`)
- [CVE-2024-55995](CVE-2024/CVE-2024-559xx/CVE-2024-55995.json) (`2024-12-31T14:15:23.963`) - [CVE-2024-13070](CVE-2024/CVE-2024-130xx/CVE-2024-13070.json) (`2024-12-31T15:15:07.853`)
- [CVE-2024-56002](CVE-2024/CVE-2024-560xx/CVE-2024-56002.json) (`2024-12-31T14:15:24.120`) - [CVE-2024-13072](CVE-2024/CVE-2024-130xx/CVE-2024-13072.json) (`2024-12-31T15:15:08.083`)
- [CVE-2024-56031](CVE-2024/CVE-2024-560xx/CVE-2024-56031.json) (`2024-12-31T13:15:07.343`) - [CVE-2024-25133](CVE-2024/CVE-2024-251xx/CVE-2024-25133.json) (`2024-12-31T15:15:08.283`)
- [CVE-2024-56039](CVE-2024/CVE-2024-560xx/CVE-2024-56039.json) (`2024-12-31T13:15:07.517`) - [CVE-2024-52047](CVE-2024/CVE-2024-520xx/CVE-2024-52047.json) (`2024-12-31T16:15:25.923`)
- [CVE-2024-56040](CVE-2024/CVE-2024-560xx/CVE-2024-56040.json) (`2024-12-31T14:15:24.333`) - [CVE-2024-52048](CVE-2024/CVE-2024-520xx/CVE-2024-52048.json) (`2024-12-31T16:15:26.063`)
- [CVE-2024-56041](CVE-2024/CVE-2024-560xx/CVE-2024-56041.json) (`2024-12-31T13:15:07.670`) - [CVE-2024-52049](CVE-2024/CVE-2024-520xx/CVE-2024-52049.json) (`2024-12-31T16:15:26.193`)
- [CVE-2024-56042](CVE-2024/CVE-2024-560xx/CVE-2024-56042.json) (`2024-12-31T13:15:07.823`) - [CVE-2024-52050](CVE-2024/CVE-2024-520xx/CVE-2024-52050.json) (`2024-12-31T16:15:26.313`)
- [CVE-2024-56043](CVE-2024/CVE-2024-560xx/CVE-2024-56043.json) (`2024-12-31T14:15:24.497`) - [CVE-2024-53647](CVE-2024/CVE-2024-536xx/CVE-2024-53647.json) (`2024-12-31T16:15:26.437`)
- [CVE-2024-56044](CVE-2024/CVE-2024-560xx/CVE-2024-56044.json) (`2024-12-31T14:15:24.680`) - [CVE-2024-56198](CVE-2024/CVE-2024-561xx/CVE-2024-56198.json) (`2024-12-31T16:15:27.247`)
- [CVE-2024-56045](CVE-2024/CVE-2024-560xx/CVE-2024-56045.json) (`2024-12-31T14:15:24.827`) - [CVE-2024-56802](CVE-2024/CVE-2024-568xx/CVE-2024-56802.json) (`2024-12-31T16:15:28.240`)
- [CVE-2024-56046](CVE-2024/CVE-2024-560xx/CVE-2024-56046.json) (`2024-12-31T13:15:07.997`)
- [CVE-2024-56061](CVE-2024/CVE-2024-560xx/CVE-2024-56061.json) (`2024-12-31T14:15:24.970`)
- [CVE-2024-56064](CVE-2024/CVE-2024-560xx/CVE-2024-56064.json) (`2024-12-31T13:15:08.157`)
- [CVE-2024-56066](CVE-2024/CVE-2024-560xx/CVE-2024-56066.json) (`2024-12-31T14:15:25.117`)
- [CVE-2024-56067](CVE-2024/CVE-2024-560xx/CVE-2024-56067.json) (`2024-12-31T13:15:08.323`)
- [CVE-2024-56068](CVE-2024/CVE-2024-560xx/CVE-2024-56068.json) (`2024-12-31T13:15:08.483`)
- [CVE-2024-56070](CVE-2024/CVE-2024-560xx/CVE-2024-56070.json) (`2024-12-31T14:15:25.257`)
- [CVE-2024-56071](CVE-2024/CVE-2024-560xx/CVE-2024-56071.json) (`2024-12-31T13:15:08.633`)
- [CVE-2024-56203](CVE-2024/CVE-2024-562xx/CVE-2024-56203.json) (`2024-12-31T14:15:25.400`)
- [CVE-2024-56204](CVE-2024/CVE-2024-562xx/CVE-2024-56204.json) (`2024-12-31T14:15:25.547`)
- [CVE-2024-56205](CVE-2024/CVE-2024-562xx/CVE-2024-56205.json) (`2024-12-31T13:15:08.803`)
- [CVE-2024-56206](CVE-2024/CVE-2024-562xx/CVE-2024-56206.json) (`2024-12-31T14:15:25.680`)
- [CVE-2024-56207](CVE-2024/CVE-2024-562xx/CVE-2024-56207.json) (`2024-12-31T14:15:25.830`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `6` Recently modified CVEs: `22`
- [CVE-2022-41737](CVE-2022/CVE-2022-417xx/CVE-2022-41737.json) (`2024-12-31T14:19:48.027`) - [CVE-2021-46979](CVE-2021/CVE-2021-469xx/CVE-2021-46979.json) (`2024-12-31T16:02:49.137`)
- [CVE-2022-41738](CVE-2022/CVE-2022-417xx/CVE-2022-41738.json) (`2024-12-31T14:21:08.167`) - [CVE-2021-46980](CVE-2021/CVE-2021-469xx/CVE-2021-46980.json) (`2024-12-31T16:06:11.213`)
- [CVE-2024-1297](CVE-2024/CVE-2024-12xx/CVE-2024-1297.json) (`2024-12-31T14:28:27.090`) - [CVE-2021-46982](CVE-2021/CVE-2021-469xx/CVE-2021-46982.json) (`2024-12-31T16:08:54.203`)
- [CVE-2024-1644](CVE-2024/CVE-2024-16xx/CVE-2024-1644.json) (`2024-12-31T14:30:42.993`) - [CVE-2021-46986](CVE-2021/CVE-2021-469xx/CVE-2021-46986.json) (`2024-12-31T16:14:55.390`)
- [CVE-2024-1748](CVE-2024/CVE-2024-17xx/CVE-2024-1748.json) (`2024-12-31T14:50:15.207`) - [CVE-2022-43842](CVE-2022/CVE-2022-438xx/CVE-2022-43842.json) (`2024-12-31T15:32:22.737`)
- [CVE-2024-26284](CVE-2024/CVE-2024-262xx/CVE-2024-26284.json) (`2024-12-31T14:39:53.067`) - [CVE-2024-13067](CVE-2024/CVE-2024-130xx/CVE-2024-13067.json) (`2024-12-31T16:15:25.280`)
- [CVE-2024-13069](CVE-2024/CVE-2024-130xx/CVE-2024-13069.json) (`2024-12-31T16:15:25.580`)
- [CVE-2024-1317](CVE-2024/CVE-2024-13xx/CVE-2024-1317.json) (`2024-12-31T16:57:11.080`)
- [CVE-2024-1318](CVE-2024/CVE-2024-13xx/CVE-2024-1318.json) (`2024-12-31T16:56:50.763`)
- [CVE-2024-1334](CVE-2024/CVE-2024-13xx/CVE-2024-1334.json) (`2024-12-31T16:48:40.290`)
- [CVE-2024-1335](CVE-2024/CVE-2024-13xx/CVE-2024-1335.json) (`2024-12-31T16:50:11.167`)
- [CVE-2024-1336](CVE-2024/CVE-2024-13xx/CVE-2024-1336.json) (`2024-12-31T16:51:04.857`)
- [CVE-2024-1338](CVE-2024/CVE-2024-13xx/CVE-2024-1338.json) (`2024-12-31T16:51:41.113`)
- [CVE-2024-1339](CVE-2024/CVE-2024-13xx/CVE-2024-1339.json) (`2024-12-31T16:52:24.407`)
- [CVE-2024-1749](CVE-2024/CVE-2024-17xx/CVE-2024-1749.json) (`2024-12-31T15:00:58.700`)
- [CVE-2024-1750](CVE-2024/CVE-2024-17xx/CVE-2024-1750.json) (`2024-12-31T15:08:18.000`)
- [CVE-2024-24772](CVE-2024/CVE-2024-247xx/CVE-2024-24772.json) (`2024-12-31T16:22:12.747`)
- [CVE-2024-24773](CVE-2024/CVE-2024-247xx/CVE-2024-24773.json) (`2024-12-31T16:23:25.093`)
- [CVE-2024-24779](CVE-2024/CVE-2024-247xx/CVE-2024-24779.json) (`2024-12-31T16:26:31.327`)
- [CVE-2024-26016](CVE-2024/CVE-2024-260xx/CVE-2024-26016.json) (`2024-12-31T16:27:58.487`)
- [CVE-2024-27087](CVE-2024/CVE-2024-270xx/CVE-2024-27087.json) (`2024-12-31T15:34:15.493`)
- [CVE-2024-27315](CVE-2024/CVE-2024-273xx/CVE-2024-27315.json) (`2024-12-31T16:16:15.510`)
## Download and Usage ## Download and Usage

View File

@ -187166,14 +187166,14 @@ CVE-2021-46975,0,0,379ee4cd812bfdbb2fdb73351c9c5db9b3f393ba3702c95ca5be896799b9e
CVE-2021-46976,0,0,e1a10dcaf0ca218c08f2f984000603635b5a62d77a616e1c0588f5d4012ca1ec,2024-11-21T06:35:05.727000 CVE-2021-46976,0,0,e1a10dcaf0ca218c08f2f984000603635b5a62d77a616e1c0588f5d4012ca1ec,2024-11-21T06:35:05.727000
CVE-2021-46977,0,0,abaefec21bb41f64086d5f605340075c6e9256ac541d13045f609ae6a6ea143f,2024-11-21T06:35:05.900000 CVE-2021-46977,0,0,abaefec21bb41f64086d5f605340075c6e9256ac541d13045f609ae6a6ea143f,2024-11-21T06:35:05.900000
CVE-2021-46978,0,0,7632bd72af74ec52ab23e8393618f1c9e0bd62aa29238b1cbf24fe508f87bc32,2024-11-21T06:35:06.053000 CVE-2021-46978,0,0,7632bd72af74ec52ab23e8393618f1c9e0bd62aa29238b1cbf24fe508f87bc32,2024-11-21T06:35:06.053000
CVE-2021-46979,0,0,531de05bbc8ad6efe1fbafbf466163775d426cc7b4be7151c7d6528b9725a804,2024-11-21T06:35:06.310000 CVE-2021-46979,0,1,05df5f108a7023926f84cc70e853c6e15ebcff4fd26aafd819986e545f0e2bb9,2024-12-31T16:02:49.137000
CVE-2021-46980,0,0,e219ad1d8c6deb10790768406f1eda9c91628230504231f3150f7d138bf87fd2,2024-11-21T06:35:06.453000 CVE-2021-46980,0,1,29ac8bbf5f73a90878471644d925c41e8453bf7f55274777895600ed9f7abcdc,2024-12-31T16:06:11.213000
CVE-2021-46981,0,0,281b8d3bd5246febb07b2f37e1e28153bb01deea8dd3565580ccf7e81f7832ef,2024-12-06T15:59:55.120000 CVE-2021-46981,0,0,281b8d3bd5246febb07b2f37e1e28153bb01deea8dd3565580ccf7e81f7832ef,2024-12-06T15:59:55.120000
CVE-2021-46982,0,0,bb878d503654868c0717fbf5b1fa1e14a56b4780ede186a2e70c46577c95e9c9,2024-11-21T06:35:06.777000 CVE-2021-46982,0,1,17e362745f95948871744d5a1829fc78fe60c616101b3031eb5d1b76b89e5fbf,2024-12-31T16:08:54.203000
CVE-2021-46983,0,0,7623a46cfb41eb0accdf877d2048554768c69745b1a465c2891d4276d6274c99,2024-12-06T16:02:03.857000 CVE-2021-46983,0,0,7623a46cfb41eb0accdf877d2048554768c69745b1a465c2891d4276d6274c99,2024-12-06T16:02:03.857000
CVE-2021-46984,0,0,d9cce9d726ee3d6403e2144a0618518d03488b8f6aa8580231d506cf0d7c311a,2024-12-06T15:00:58.083000 CVE-2021-46984,0,0,d9cce9d726ee3d6403e2144a0618518d03488b8f6aa8580231d506cf0d7c311a,2024-12-06T15:00:58.083000
CVE-2021-46985,0,0,b55f7da4d8af6b538e5342c699879b38a7eac54f39c8d2da26b510610f029cd8,2024-12-06T15:02:17.187000 CVE-2021-46985,0,0,b55f7da4d8af6b538e5342c699879b38a7eac54f39c8d2da26b510610f029cd8,2024-12-06T15:02:17.187000
CVE-2021-46986,0,0,e8bf96e7d68a0a39498049c9247d2d34f593bd8c73d1f880d85fb602a45b9951,2024-11-21T06:35:07.760000 CVE-2021-46986,0,1,708b085c0fe7c0bf61a17323e3c4ab1e77b1149488de2d24b27351080a4f664b,2024-12-31T16:14:55.390000
CVE-2021-46987,0,0,8b30e27b6b209d80685bed3bea9ab3c4c2b966757291dae1784881a91a36c579,2024-12-06T15:07:49.483000 CVE-2021-46987,0,0,8b30e27b6b209d80685bed3bea9ab3c4c2b966757291dae1784881a91a36c579,2024-12-06T15:07:49.483000
CVE-2021-46988,0,0,de8d73a57494caab48e725962c4418d3d631d0723f1dc9c9f4d6cd417f6dc70a,2024-12-26T15:01:37.110000 CVE-2021-46988,0,0,de8d73a57494caab48e725962c4418d3d631d0723f1dc9c9f4d6cd417f6dc70a,2024-12-26T15:01:37.110000
CVE-2021-46989,0,0,600337192eb6414d45bda3482618305f3b218774e0cae5d5e975853340f7b41b,2024-11-21T06:35:08.167000 CVE-2021-46989,0,0,600337192eb6414d45bda3482618305f3b218774e0cae5d5e975853340f7b41b,2024-11-21T06:35:08.167000
@ -207715,8 +207715,8 @@ CVE-2022-41733,0,0,a33bad2d096cfabf94fd96ab2c15c910567f83330493f202c0337dfe5fa35
CVE-2022-41734,0,0,3d9bdafd545e87b6f7b40b5fae82e1bbe3202ea7063823ef45692f74c3a5138a,2024-11-21T07:23:45.457000 CVE-2022-41734,0,0,3d9bdafd545e87b6f7b40b5fae82e1bbe3202ea7063823ef45692f74c3a5138a,2024-11-21T07:23:45.457000
CVE-2022-41735,0,0,79ae46b378050f3063db7f1e154eb6fd129e1b507178a4589652afc913d1565f,2024-11-21T07:23:45.580000 CVE-2022-41735,0,0,79ae46b378050f3063db7f1e154eb6fd129e1b507178a4589652afc913d1565f,2024-11-21T07:23:45.580000
CVE-2022-41736,0,0,b9fa7599a6edb105accb67d3ed449e8a41a61f0a60f4e25331e041b5266671d5,2024-11-21T07:23:45.713000 CVE-2022-41736,0,0,b9fa7599a6edb105accb67d3ed449e8a41a61f0a60f4e25331e041b5266671d5,2024-11-21T07:23:45.713000
CVE-2022-41737,0,1,bd3495393ed0eb9d03402d761c345751e872f1a1d5dc29dd84adc370983bc2ab,2024-12-31T14:19:48.027000 CVE-2022-41737,0,0,bd3495393ed0eb9d03402d761c345751e872f1a1d5dc29dd84adc370983bc2ab,2024-12-31T14:19:48.027000
CVE-2022-41738,0,1,f0537fd1bb25c514424cbd88901c97cb7b1b9c51dd793956eeebf732e75a12c0,2024-12-31T14:21:08.167000 CVE-2022-41738,0,0,f0537fd1bb25c514424cbd88901c97cb7b1b9c51dd793956eeebf732e75a12c0,2024-12-31T14:21:08.167000
CVE-2022-41739,0,0,0927b42a7e6f4842bb1aafcdc53a502c11511d195af4c6bfbd7e78cd3eccf651,2024-11-21T07:23:46.063000 CVE-2022-41739,0,0,0927b42a7e6f4842bb1aafcdc53a502c11511d195af4c6bfbd7e78cd3eccf651,2024-11-21T07:23:46.063000
CVE-2022-4174,0,0,6639057865298a59c68ab0005d05cdf41270faddb234659455633202cd6b8187,2024-11-21T07:34:43.140000 CVE-2022-4174,0,0,6639057865298a59c68ab0005d05cdf41270faddb234659455633202cd6b8187,2024-11-21T07:34:43.140000
CVE-2022-41740,0,0,0b6f76e30c7e215c2244d6260926569cff33efa87e81c9bff42cc0279fcdbf83,2024-11-21T07:23:46.190000 CVE-2022-41740,0,0,0b6f76e30c7e215c2244d6260926569cff33efa87e81c9bff42cc0279fcdbf83,2024-11-21T07:23:46.190000
@ -209388,7 +209388,7 @@ CVE-2022-43830,0,0,2f64150b363b8e69222f4767b2a962c4259c9aa91848800fda8ecd6f999d6
CVE-2022-43831,0,0,4b824d13f4654134bfaa17c7c5acf538260c76da9795c9bb806d1640e5487247,2024-11-21T07:27:15.673000 CVE-2022-43831,0,0,4b824d13f4654134bfaa17c7c5acf538260c76da9795c9bb806d1640e5487247,2024-11-21T07:27:15.673000
CVE-2022-4384,0,0,25f24049ccb5584ac2286059b580466c788619146479cad249f1b9e96586286f,2024-11-21T07:35:10.520000 CVE-2022-4384,0,0,25f24049ccb5584ac2286059b580466c788619146479cad249f1b9e96586286f,2024-11-21T07:35:10.520000
CVE-2022-43841,0,0,5e658697ccfadbb9f98074078502198ab979b928c36ff4bdaf8f2f2a83f1efff,2024-11-21T07:27:15.813000 CVE-2022-43841,0,0,5e658697ccfadbb9f98074078502198ab979b928c36ff4bdaf8f2f2a83f1efff,2024-11-21T07:27:15.813000
CVE-2022-43842,0,0,cb0c5f963bf2c360020d575c325e3e7f8de6c8b39159aff8e8bf2aeecc9d860e,2024-11-21T07:27:15.937000 CVE-2022-43842,0,1,6e561483c3801b15ff00dd2bfb39984ef10bf648e6925ca1d605d91b8d4bb1e3,2024-12-31T15:32:22.737000
CVE-2022-43843,0,0,aa4e8920b27430c0e020c56337aaf572b7590d86ac4b80d6e5ec6ab868ab7eb7,2024-11-21T07:27:16.070000 CVE-2022-43843,0,0,aa4e8920b27430c0e020c56337aaf572b7590d86ac4b80d6e5ec6ab868ab7eb7,2024-11-21T07:27:16.070000
CVE-2022-43844,0,0,12fe96ea4e7f35e34da57a23786e8679400ecf390c193dcfa13dea7351d25cce,2024-11-21T07:27:16.227000 CVE-2022-43844,0,0,12fe96ea4e7f35e34da57a23786e8679400ecf390c193dcfa13dea7351d25cce,2024-11-21T07:27:16.227000
CVE-2022-43845,0,0,4dd0555a0d80dc6547097d2325e631aae8cc1a25ed03e0c104688f7fd5b7e883,2024-09-30T15:53:01.643000 CVE-2022-43845,0,0,4dd0555a0d80dc6547097d2325e631aae8cc1a25ed03e0c104688f7fd5b7e883,2024-09-30T15:53:01.643000
@ -237357,7 +237357,7 @@ CVE-2023-48771,0,0,a4a424861e0d7acc67ca6d05c1c28418c8585c100a79b9b63aab858158b6a
CVE-2023-48772,0,0,0c43ac47883d8df1dd3af913749f86f550e73578fea685085738b693f50aa21c,2024-11-21T08:32:25.287000 CVE-2023-48772,0,0,0c43ac47883d8df1dd3af913749f86f550e73578fea685085738b693f50aa21c,2024-11-21T08:32:25.287000
CVE-2023-48773,0,0,69c2d10ce53d5bed5abbbabd5452f88c034b79ad27513b7475e9a369aba8c011,2024-11-21T08:32:25.420000 CVE-2023-48773,0,0,69c2d10ce53d5bed5abbbabd5452f88c034b79ad27513b7475e9a369aba8c011,2024-11-21T08:32:25.420000
CVE-2023-48774,0,0,df67987526796cf9139d3a58e2031842a7b4119a36678e2120d6525442d00f66,2024-12-09T13:15:33.937000 CVE-2023-48774,0,0,df67987526796cf9139d3a58e2031842a7b4119a36678e2120d6525442d00f66,2024-12-09T13:15:33.937000
CVE-2023-48775,1,1,774bced3459c83730c54539a34e01f9d304231fd886b3f930056e1a5effa8a40,2024-12-31T13:15:05.650000 CVE-2023-48775,0,0,774bced3459c83730c54539a34e01f9d304231fd886b3f930056e1a5effa8a40,2024-12-31T13:15:05.650000
CVE-2023-48776,0,0,60422db6013f51551677e22d94d4d864bd4aac472b3cb692bc594e8b25dde16d,2024-12-09T13:15:34.077000 CVE-2023-48776,0,0,60422db6013f51551677e22d94d4d864bd4aac472b3cb692bc594e8b25dde16d,2024-12-09T13:15:34.077000
CVE-2023-48777,0,0,da2fb312c81f4d39e1f6b619e89a76e40c7e69d7c2693339a128d1645085873b,2024-11-21T08:32:25.547000 CVE-2023-48777,0,0,da2fb312c81f4d39e1f6b619e89a76e40c7e69d7c2693339a128d1645085873b,2024-11-21T08:32:25.547000
CVE-2023-48778,0,0,65cedce3479eb1a4b909913b713ad810f6c269d477fecb40f5921fedfb5b424e,2024-11-21T08:32:25.667000 CVE-2023-48778,0,0,65cedce3479eb1a4b909913b713ad810f6c269d477fecb40f5921fedfb5b424e,2024-11-21T08:32:25.667000
@ -238694,7 +238694,7 @@ CVE-2023-50847,0,0,8af88a86a3973ffb9b180f3688093f1185c41115fba9de24528f2281cbaca
CVE-2023-50848,0,0,03098ffc01df1a6f925be974e2b8b2896eb8309e51fcdf8dbc50d422b690e589,2024-11-21T08:37:24.307000 CVE-2023-50848,0,0,03098ffc01df1a6f925be974e2b8b2896eb8309e51fcdf8dbc50d422b690e589,2024-11-21T08:37:24.307000
CVE-2023-50849,0,0,d5fdca61f99f1dbfefeff38bb6cfb6fd829f36ca030c93562f4c6219bc386f41,2024-11-21T08:37:24.440000 CVE-2023-50849,0,0,d5fdca61f99f1dbfefeff38bb6cfb6fd829f36ca030c93562f4c6219bc386f41,2024-11-21T08:37:24.440000
CVE-2023-5085,0,0,c3dc096463ec9767731a311106d0ff3749acd54e0bded3788615c36bbd3edb19,2024-11-21T08:41:02.137000 CVE-2023-5085,0,0,c3dc096463ec9767731a311106d0ff3749acd54e0bded3788615c36bbd3edb19,2024-11-21T08:41:02.137000
CVE-2023-50850,1,1,8ca7c1ebf08daa8c3797d045750434034b7121f316e1dc7d8b1bbe6fdbd397a8,2024-12-31T13:15:06.940000 CVE-2023-50850,0,0,8ca7c1ebf08daa8c3797d045750434034b7121f316e1dc7d8b1bbe6fdbd397a8,2024-12-31T13:15:06.940000
CVE-2023-50851,0,0,b23caecb559751b1d7c39c8e23f07629189c7f211a209dc78210c3aab52fd434,2024-11-21T08:37:24.553000 CVE-2023-50851,0,0,b23caecb559751b1d7c39c8e23f07629189c7f211a209dc78210c3aab52fd434,2024-11-21T08:37:24.553000
CVE-2023-50852,0,0,07e31b4498bb410dbcfd349d83d51403c44c3e6184f018d4c847cae472dc96c2,2024-11-21T08:37:24.673000 CVE-2023-50852,0,0,07e31b4498bb410dbcfd349d83d51403c44c3e6184f018d4c847cae472dc96c2,2024-11-21T08:37:24.673000
CVE-2023-50853,0,0,132512219726e09d089c7105fb3a1079c0f04772601a90b12042f17457979fc7,2024-11-21T08:37:24.797000 CVE-2023-50853,0,0,132512219726e09d089c7105fb3a1079c0f04772601a90b12042f17457979fc7,2024-11-21T08:37:24.797000
@ -241572,6 +241572,8 @@ CVE-2023-6597,0,0,89b58fa3929cae1473acd78809c36d26c8296660b8913ae3a27336303cbd49
CVE-2023-6598,0,0,6053f14e270dc7076cdc46c9acbd31f7f0ee707160eb4a14b11a84dc8ad71002,2024-11-21T08:44:10.607000 CVE-2023-6598,0,0,6053f14e270dc7076cdc46c9acbd31f7f0ee707160eb4a14b11a84dc8ad71002,2024-11-21T08:44:10.607000
CVE-2023-6599,0,0,b0308b9ca19634b3fb537e54bec970bdcf5229a8d791c9c7b7b83a8cf17b1088,2024-11-21T08:44:10.740000 CVE-2023-6599,0,0,b0308b9ca19634b3fb537e54bec970bdcf5229a8d791c9c7b7b83a8cf17b1088,2024-11-21T08:44:10.740000
CVE-2023-6600,0,0,2434010c942a6205776298fb5a7e14d80ba060213c80be479cc1c00dcc02dd91,2024-11-21T08:44:10.873000 CVE-2023-6600,0,0,2434010c942a6205776298fb5a7e14d80ba060213c80be479cc1c00dcc02dd91,2024-11-21T08:44:10.873000
CVE-2023-6602,1,1,ff6032b5f30c87b074d8cc9771855adb5de988c336a4516bc6c8c8438fbc5efa,2024-12-31T15:15:06.240000
CVE-2023-6603,1,1,b6c173a7c5257b96a51f84fa889a1cc7499c1e0d4eb844cace7688371ad7a964,2024-12-31T15:15:07.490000
CVE-2023-6606,0,0,8c51965fe5b8c0f5bc9f15f26c28d2f6ae9ab77217ae35702f9542ba8aa7d3dd,2024-11-21T08:44:11 CVE-2023-6606,0,0,8c51965fe5b8c0f5bc9f15f26c28d2f6ae9ab77217ae35702f9542ba8aa7d3dd,2024-11-21T08:44:11
CVE-2023-6607,0,0,b26de4c0815d9e5bfb034470256846caa6d64731defe9bbb333e33aa5af35930,2024-11-21T08:44:11.200000 CVE-2023-6607,0,0,b26de4c0815d9e5bfb034470256846caa6d64731defe9bbb333e33aa5af35930,2024-11-21T08:44:11.200000
CVE-2023-6608,0,0,e345741cecbf23cc4076c5f2284f1330a317f8731383fc6e8c7c4d9d02af8e3a,2024-11-21T08:44:11.360000 CVE-2023-6608,0,0,e345741cecbf23cc4076c5f2284f1330a317f8731383fc6e8c7c4d9d02af8e3a,2024-11-21T08:44:11.360000
@ -245226,7 +245228,7 @@ CVE-2024-12966,0,0,2b9f12982839474c2e9bdcaa35313f34a8e49674ee4c820004a347386206e
CVE-2024-12967,0,0,373940667d19816c3418d961d099af60d3af6231ff28cd91d7af64f003be34e3,2024-12-30T15:15:08.143000 CVE-2024-12967,0,0,373940667d19816c3418d961d099af60d3af6231ff28cd91d7af64f003be34e3,2024-12-30T15:15:08.143000
CVE-2024-12968,0,0,0365cfa50aed25aedb7b14e0121254d6a1ab1fc0b7f758bc56f083b331d8bb13,2024-12-27T17:15:07.867000 CVE-2024-12968,0,0,0365cfa50aed25aedb7b14e0121254d6a1ab1fc0b7f758bc56f083b331d8bb13,2024-12-27T17:15:07.867000
CVE-2024-12969,0,0,11cb52c0f3a8d2b5e3f9f455e34a756b2b5e55ad686d92ced4ed9827b4f944c8,2024-12-27T17:15:07.993000 CVE-2024-12969,0,0,11cb52c0f3a8d2b5e3f9f455e34a756b2b5e55ad686d92ced4ed9827b4f944c8,2024-12-27T17:15:07.993000
CVE-2024-1297,0,1,be31694658346ee468905bb61ed45bf681e56bb20ac49e80e658637c7d9e5bfd,2024-12-31T14:28:27.090000 CVE-2024-1297,0,0,be31694658346ee468905bb61ed45bf681e56bb20ac49e80e658637c7d9e5bfd,2024-12-31T14:28:27.090000
CVE-2024-12976,0,0,d8d82f821858178cd7d8f1c6b845051fdd1295a5c139d430dc7de27604806bc6,2024-12-27T19:15:08 CVE-2024-12976,0,0,d8d82f821858178cd7d8f1c6b845051fdd1295a5c139d430dc7de27604806bc6,2024-12-27T19:15:08
CVE-2024-12977,0,0,9458814f2ac9e7493633a6831104d1d77636f0bfc645e189a28897428c96b0b7,2024-12-27T19:15:08.130000 CVE-2024-12977,0,0,9458814f2ac9e7493633a6831104d1d77636f0bfc645e189a28897428c96b0b7,2024-12-27T19:15:08.130000
CVE-2024-12978,0,0,04a59dc4b363139238466108de9e8a94b7678b4462324185368dbf91da408f7c,2024-12-27T04:15:05.603000 CVE-2024-12978,0,0,04a59dc4b363139238466108de9e8a94b7678b4462324185368dbf91da408f7c,2024-12-27T04:15:05.603000
@ -245305,9 +245307,11 @@ CVE-2024-13051,0,0,1be1ae94a61dba469e5e49f0e3a210eb507d631c9c82589acffd3c6321150
CVE-2024-13058,0,0,91396049ed5baf4a6f156f57d5990485463c9e52e997b4c7fdc31249002c7bf7,2024-12-30T22:15:05.957000 CVE-2024-13058,0,0,91396049ed5baf4a6f156f57d5990485463c9e52e997b4c7fdc31249002c7bf7,2024-12-30T22:15:05.957000
CVE-2024-1306,0,0,0542247252f536db3d3f5f372f6b06cf8f9322e7de2b3d2f5040c13d3f80547b,2024-11-21T08:50:17.053000 CVE-2024-1306,0,0,0542247252f536db3d3f5f372f6b06cf8f9322e7de2b3d2f5040c13d3f80547b,2024-11-21T08:50:17.053000
CVE-2024-13061,0,0,b03feaa2f4fc804226d0585c376accf3d822de2d58d31f55dfdc314d7922b688,2024-12-31T12:15:22.967000 CVE-2024-13061,0,0,b03feaa2f4fc804226d0585c376accf3d822de2d58d31f55dfdc314d7922b688,2024-12-31T12:15:22.967000
CVE-2024-13067,0,0,dac89381ddeb2bd239b81d96b3005b135a2a8c3e5a25d9e952411ecf22b373e9,2024-12-31T09:15:05.307000 CVE-2024-13067,0,1,e9d43e6d22a143227a87a6afa965695645cbe92ac8a9cc3c1dbae98beb301933,2024-12-31T16:15:25.280000
CVE-2024-13069,0,0,b4e1c0fcfc5a6354256ed66051b3e6362f182a10b32b325ebc3e8293696eb528,2024-12-31T11:15:06.933000 CVE-2024-13069,0,1,59f5977c5ed98428bf813528205c28472dbe30bb8d317db36e1c6f0f99974166,2024-12-31T16:15:25.580000
CVE-2024-1307,0,0,791d403fd6ce043b636953425f5891ef42986249387c4cd3003ec2c058fbc715,2024-11-21T08:50:17.233000 CVE-2024-1307,0,0,791d403fd6ce043b636953425f5891ef42986249387c4cd3003ec2c058fbc715,2024-11-21T08:50:17.233000
CVE-2024-13070,1,1,1cf6b1571384c6cecb57fe9aaf4aa9da6835f5a35960878853e71f5290759cba,2024-12-31T15:15:07.853000
CVE-2024-13072,1,1,72b084e261b2ef9878198bf1cc32f04fdebebb613fd4a06e3be4b4d0925fd51d,2024-12-31T15:15:08.083000
CVE-2024-1308,0,0,b2bb733c7402260f9ace902e9d676967e691f690d52b513a8afbdef713b7d4c5,2024-11-21T08:50:17.413000 CVE-2024-1308,0,0,b2bb733c7402260f9ace902e9d676967e691f690d52b513a8afbdef713b7d4c5,2024-11-21T08:50:17.413000
CVE-2024-1309,0,0,46059633232401d149997e4f4dfdb966bb51f1c7d1649dc6d177fd25783e7c4a,2024-11-22T20:03:02.910000 CVE-2024-1309,0,0,46059633232401d149997e4f4dfdb966bb51f1c7d1649dc6d177fd25783e7c4a,2024-11-22T20:03:02.910000
CVE-2024-1310,0,0,8eacc1832dc63ed57a42c33584abbb481a62a43a07e6f25f2b4df813accea989,2024-11-21T08:50:17.717000 CVE-2024-1310,0,0,8eacc1832dc63ed57a42c33584abbb481a62a43a07e6f25f2b4df813accea989,2024-11-21T08:50:17.717000
@ -245316,8 +245320,8 @@ CVE-2024-1312,0,0,d16b3ecc82cd74d4071dc20055eab0a36b43013bc6757c1d62cda1a87b890d
CVE-2024-1313,0,0,cad1078661641c2022e5f0188a431d9a70908db5ab4b61d98e0389abbba8b680,2024-11-21T08:50:18.207000 CVE-2024-1313,0,0,cad1078661641c2022e5f0188a431d9a70908db5ab4b61d98e0389abbba8b680,2024-11-21T08:50:18.207000
CVE-2024-1315,0,0,e1f16e3b2be06db6b65befc45bb21c6efb290182d3477c01a71033b0effe0c2a,2024-11-21T08:50:18.373000 CVE-2024-1315,0,0,e1f16e3b2be06db6b65befc45bb21c6efb290182d3477c01a71033b0effe0c2a,2024-11-21T08:50:18.373000
CVE-2024-1316,0,0,ec6b544cc876a8479e8de890063434d877e95d2641a1a8c864b5c959e6dbfa7d,2024-11-21T08:50:19.090000 CVE-2024-1316,0,0,ec6b544cc876a8479e8de890063434d877e95d2641a1a8c864b5c959e6dbfa7d,2024-11-21T08:50:19.090000
CVE-2024-1317,0,0,c43eeac6c69ecfd7572b7752e05e682d40594f9ea3c3cac0cd3f4003dc2eccb7,2024-11-21T08:50:19.267000 CVE-2024-1317,0,1,a1d296c91e245cb27c998bff4f84250fb1101a61ebac429b7ce35a2ceb239c73,2024-12-31T16:57:11.080000
CVE-2024-1318,0,0,fde1fbfc24445712414dff4d6b39226e039c928c18378a7d09fd1053c7b83b76,2024-11-21T08:50:19.403000 CVE-2024-1318,0,1,875ffbabaf295988fe72077a5574dbe20799a2a8618e7dc53ba31731145c671a,2024-12-31T16:56:50.763000
CVE-2024-1319,0,0,e6fca38f8817c3f0a93cd5d73a5a9417a178ac65495356d684dc26f204fa5765,2024-11-21T08:50:19.530000 CVE-2024-1319,0,0,e6fca38f8817c3f0a93cd5d73a5a9417a178ac65495356d684dc26f204fa5765,2024-11-21T08:50:19.530000
CVE-2024-1320,0,0,80370b3cf95d31a327dfcead0766151687bef5425baa11f9a4606b327981e1e5,2024-11-21T08:50:19.647000 CVE-2024-1320,0,0,80370b3cf95d31a327dfcead0766151687bef5425baa11f9a4606b327981e1e5,2024-11-21T08:50:19.647000
CVE-2024-1321,0,0,64c53fddfcf700442bf3bc09eea0aa8fb2f1c68b08bca44e74ca22c8291fb906,2024-11-21T08:50:19.770000 CVE-2024-1321,0,0,64c53fddfcf700442bf3bc09eea0aa8fb2f1c68b08bca44e74ca22c8291fb906,2024-11-21T08:50:19.770000
@ -245333,12 +245337,12 @@ CVE-2024-1330,0,0,502ca86aa36ef0d9cec38bb132d44e809a7c14b6c55791005f8847665ecf98
CVE-2024-1331,0,0,b8018aa4d406613d3ec27aefa47c4e3b21af15db4ddfb753850f1de6f3ba1fdc,2024-11-21T08:50:21.027000 CVE-2024-1331,0,0,b8018aa4d406613d3ec27aefa47c4e3b21af15db4ddfb753850f1de6f3ba1fdc,2024-11-21T08:50:21.027000
CVE-2024-1332,0,0,43a2cb0465d1ed7fa77b51d32b9ef650ccc5cd8e8f972f53915014a8e37bc428,2024-11-21T08:50:21.220000 CVE-2024-1332,0,0,43a2cb0465d1ed7fa77b51d32b9ef650ccc5cd8e8f972f53915014a8e37bc428,2024-11-21T08:50:21.220000
CVE-2024-1333,0,0,7e67218d34e52c77cd12091eb7bec4820751f8a3faacd15e7977a33b9d658d65,2024-11-21T08:50:21.337000 CVE-2024-1333,0,0,7e67218d34e52c77cd12091eb7bec4820751f8a3faacd15e7977a33b9d658d65,2024-11-21T08:50:21.337000
CVE-2024-1334,0,0,0613abe7a6a12de7526cdee66002829a8024bc47889fe9b623e296fb796d9613,2024-11-21T08:50:21.517000 CVE-2024-1334,0,1,8823bf53da4897f18ca7daefd05e524ce4cfc11c398467ab7dbcaff8bf5ff61a,2024-12-31T16:48:40.290000
CVE-2024-1335,0,0,abf8e6ad525915bfc67a77b3c5fd0980595573fd7a4f428b7c29c4c6d0861ecf,2024-11-21T08:50:21.630000 CVE-2024-1335,0,1,ea54176718e6f94079a9e0779ed189aee51a9a9a11d01cd222ee449cf90ad29f,2024-12-31T16:50:11.167000
CVE-2024-1336,0,0,ff8d23c2576b494586c958bbd456a985212a02c5849b17a753892e91b82b2235,2024-11-21T08:50:21.747000 CVE-2024-1336,0,1,e5af9edfda730c68424d9af5f33f1559bbd76b64d2169dc5b805af38e3d13bae,2024-12-31T16:51:04.857000
CVE-2024-1337,0,0,ecd9569d803b0ad7e93765437336dbe54b6bca900bd0d8d6a4265ae95a2bd0fa,2024-11-21T08:50:21.857000 CVE-2024-1337,0,0,ecd9569d803b0ad7e93765437336dbe54b6bca900bd0d8d6a4265ae95a2bd0fa,2024-11-21T08:50:21.857000
CVE-2024-1338,0,0,3fcdf8a66a7215a5acd568dd784fa9c45ae47f77dd7d23fc0d2d2fdb76828154,2024-11-21T08:50:21.963000 CVE-2024-1338,0,1,ab4982baab3aa45d716862f735c7d62f5694d660c186b3fec0b7b79ca0d36280,2024-12-31T16:51:41.113000
CVE-2024-1339,0,0,f8c0eb6dea9c8e68c0d26e34db2db9091e3f6b5b569c33422017e7810a3fda3b,2024-11-21T08:50:22.077000 CVE-2024-1339,0,1,d43b3428c44a61ce6aa9affeac8c926c01429483d88c5e02ec9790aec2a3254f,2024-12-31T16:52:24.407000
CVE-2024-1340,0,0,779cbb4786989b99b13d0df5bfadd47a6bb17fb76227d8a826f245b565dc9020,2024-11-21T08:50:22.180000 CVE-2024-1340,0,0,779cbb4786989b99b13d0df5bfadd47a6bb17fb76227d8a826f245b565dc9020,2024-11-21T08:50:22.180000
CVE-2024-1341,0,0,090bf84c5ce2b0dfeca3a04f998237d36add49409b51be286587af2f8364beb8,2024-11-21T08:50:22.300000 CVE-2024-1341,0,0,090bf84c5ce2b0dfeca3a04f998237d36add49409b51be286587af2f8364beb8,2024-11-21T08:50:22.300000
CVE-2024-1342,0,0,2f41e6eac1e33a309fc72543d371a67df7cdf22eae12449849cd3aab8e438d93,2024-10-14T22:15:03.180000 CVE-2024-1342,0,0,2f41e6eac1e33a309fc72543d371a67df7cdf22eae12449849cd3aab8e438d93,2024-10-14T22:15:03.180000
@ -245620,7 +245624,7 @@ CVE-2024-1640,0,0,5a1a433d9c4fff99641db26e31a901ba05b22ce24bea862e61bd65501e5ebe
CVE-2024-1641,0,0,b0df7adf6fe0b4743c932c7cebd3b80c6d328f692d983d1d9ad69f21762a38a0,2024-11-21T08:50:59.157000 CVE-2024-1641,0,0,b0df7adf6fe0b4743c932c7cebd3b80c6d328f692d983d1d9ad69f21762a38a0,2024-11-21T08:50:59.157000
CVE-2024-1642,0,0,212f14be7d8459e9a508bd3a70180152c6bcf203731c8036b94fea507b9fac7b,2024-11-21T08:50:59.280000 CVE-2024-1642,0,0,212f14be7d8459e9a508bd3a70180152c6bcf203731c8036b94fea507b9fac7b,2024-11-21T08:50:59.280000
CVE-2024-1643,0,0,23a51e500cbbb14eb0edb6213fdbe45992476107d29301a7ac00c541a3990120,2024-11-21T08:50:59.403000 CVE-2024-1643,0,0,23a51e500cbbb14eb0edb6213fdbe45992476107d29301a7ac00c541a3990120,2024-11-21T08:50:59.403000
CVE-2024-1644,0,1,ca5626d9cf912b2ce4bee93299ee7b5c513887bff992bcfcb23fbacc3bb135ea,2024-12-31T14:30:42.993000 CVE-2024-1644,0,0,ca5626d9cf912b2ce4bee93299ee7b5c513887bff992bcfcb23fbacc3bb135ea,2024-12-31T14:30:42.993000
CVE-2024-1645,0,0,fc2db15dc582e529d4e2d85af443e9dede47328e7ae86a8af4f691034414bd50,2024-11-21T08:50:59.670000 CVE-2024-1645,0,0,fc2db15dc582e529d4e2d85af443e9dede47328e7ae86a8af4f691034414bd50,2024-11-21T08:50:59.670000
CVE-2024-1646,0,0,5059540515ce7eb8ae68b15c4eec4ff01ea4b884936486b4b6938c6175d66543,2024-11-21T08:50:59.783000 CVE-2024-1646,0,0,5059540515ce7eb8ae68b15c4eec4ff01ea4b884936486b4b6938c6175d66543,2024-11-21T08:50:59.783000
CVE-2024-1647,0,0,61673824377e23ed6345f1ce2d3e2dfdab70aa35a8f57fa1b19d6f80febcb2a6,2024-11-21T08:50:59.913000 CVE-2024-1647,0,0,61673824377e23ed6345f1ce2d3e2dfdab70aa35a8f57fa1b19d6f80febcb2a6,2024-11-21T08:50:59.913000
@ -245720,9 +245724,9 @@ CVE-2024-1744,0,0,e57e89c1c38c1b4f16fac07cd4c094af44c29de3b59f0a0effddbbf171558f
CVE-2024-1745,0,0,abd8adfe6df8d51ddd96937437915d89e70976d02fbf70da9c7aba7a8dc30da2,2024-11-21T08:51:13.010000 CVE-2024-1745,0,0,abd8adfe6df8d51ddd96937437915d89e70976d02fbf70da9c7aba7a8dc30da2,2024-11-21T08:51:13.010000
CVE-2024-1746,0,0,d737ae6f99df6e75b9f9e494f5de9d239aa5dc5be6bc3fd9000ad7db33bb4a0d,2024-11-21T08:51:13.197000 CVE-2024-1746,0,0,d737ae6f99df6e75b9f9e494f5de9d239aa5dc5be6bc3fd9000ad7db33bb4a0d,2024-11-21T08:51:13.197000
CVE-2024-1747,0,0,27286aec8fdbaab5a8f39768113911219c8413c899f355e1ed4f720cbf58b487,2024-08-01T15:35:05.150000 CVE-2024-1747,0,0,27286aec8fdbaab5a8f39768113911219c8413c899f355e1ed4f720cbf58b487,2024-08-01T15:35:05.150000
CVE-2024-1748,0,1,74d4cea0e1c1e4a98588fa2c5afc3a34ad68ccf8b3cd99bacd857379be149895,2024-12-31T14:50:15.207000 CVE-2024-1748,0,0,74d4cea0e1c1e4a98588fa2c5afc3a34ad68ccf8b3cd99bacd857379be149895,2024-12-31T14:50:15.207000
CVE-2024-1749,0,0,5f1973c08e03b3504b8d096510f87ce22f1dbb3adac8d6616bb05d53cb66da89,2024-11-21T08:51:13.700000 CVE-2024-1749,0,1,07e2a36d9ad03d4437e74380edf301acc801a649896e27c665ad7589dcbb493c,2024-12-31T15:00:58.700000
CVE-2024-1750,0,0,aa85da8d40a8b0e8c87075f8f689437cd6e5b4ef5d1d026d29db099b9d4714e2,2024-11-21T08:51:13.837000 CVE-2024-1750,0,1,fef6cbfaa97593c57d704c7e0fa8c0ee9d4eefb72692ba6adb5d415e3678f776,2024-12-31T15:08:18
CVE-2024-1751,0,0,ab01569a5cf06f449728e9489242c171643dba40d6c01524f77775fddd5807fc,2024-11-21T08:51:13.987000 CVE-2024-1751,0,0,ab01569a5cf06f449728e9489242c171643dba40d6c01524f77775fddd5807fc,2024-11-21T08:51:13.987000
CVE-2024-1752,0,0,899790f65b6ea36fdaaec55cf9cba5c9e8120dada21d406f68487a9d2bb0a9d3,2024-11-21T08:51:14.110000 CVE-2024-1752,0,0,899790f65b6ea36fdaaec55cf9cba5c9e8120dada21d406f68487a9d2bb0a9d3,2024-11-21T08:51:14.110000
CVE-2024-1753,0,0,97eb25eefdb4797c38bcadc3519b75967ef4d30f53fb9cc57a3b33325f64503d,2024-11-26T20:15:26.237000 CVE-2024-1753,0,0,97eb25eefdb4797c38bcadc3519b75967ef4d30f53fb9cc57a3b33325f64503d,2024-11-26T20:15:26.237000
@ -249542,13 +249546,13 @@ CVE-2024-24768,0,0,f4716eea5cbfdded2fe5819f0fafcdfc1765e4a8285654efd5160f3d68471
CVE-2024-2477,0,0,d4fbb6a7199582203d04c57c4a507f5e44f438036cba94fbb2367befe030bb8a,2024-11-21T09:09:50.353000 CVE-2024-2477,0,0,d4fbb6a7199582203d04c57c4a507f5e44f438036cba94fbb2367befe030bb8a,2024-11-21T09:09:50.353000
CVE-2024-24770,0,0,edfb7c51cf2941d43343c18f1e3c5112e25a691c8b6403b153771dc1a6637c61,2024-11-21T08:59:39.977000 CVE-2024-24770,0,0,edfb7c51cf2941d43343c18f1e3c5112e25a691c8b6403b153771dc1a6637c61,2024-11-21T08:59:39.977000
CVE-2024-24771,0,0,7009a7a317e9017a3c8d089f11274418ce8fa0caca973c650c21be34c755d8be,2024-11-21T08:59:40.127000 CVE-2024-24771,0,0,7009a7a317e9017a3c8d089f11274418ce8fa0caca973c650c21be34c755d8be,2024-11-21T08:59:40.127000
CVE-2024-24772,0,0,3dd1b6911ebf1a17c00e496994e0b6469a35aa320b403d1b3c8ca5a81c7035db,2024-11-21T08:59:40.283000 CVE-2024-24772,0,1,fa8d8afa3e6ee94ef81794f1afdf8fa58557e5bb82b8f60f170c5a1ad8ce93e7,2024-12-31T16:22:12.747000
CVE-2024-24773,0,0,8be4988cc91b9f4e26bab950161608100de67117a3260bd71fad5696b221b5d4,2024-11-21T08:59:40.423000 CVE-2024-24773,0,1,be5dbf7a6261cbe0532f99bcba9db1f6241b8c06edacadc478f7c52545d83eb5,2024-12-31T16:23:25.093000
CVE-2024-24774,0,0,f6081191014f835b364f01c2d06774fe804398159465de16dc62a593984303eb,2024-11-21T08:59:40.547000 CVE-2024-24774,0,0,f6081191014f835b364f01c2d06774fe804398159465de16dc62a593984303eb,2024-11-21T08:59:40.547000
CVE-2024-24775,0,0,5fbf4068aee5b4a63d5bc8c27165baed12b61ed8648f8952c732695b9d7ee9dd,2024-11-21T08:59:40.720000 CVE-2024-24775,0,0,5fbf4068aee5b4a63d5bc8c27165baed12b61ed8648f8952c732695b9d7ee9dd,2024-11-21T08:59:40.720000
CVE-2024-24776,0,0,a2f3ec067717ca04fbf18f3a449f632e7089db64e0a17c019f843c8598b0286f,2024-11-21T08:59:40.850000 CVE-2024-24776,0,0,a2f3ec067717ca04fbf18f3a449f632e7089db64e0a17c019f843c8598b0286f,2024-11-21T08:59:40.850000
CVE-2024-24777,0,0,c46e7117281fbe7f2ffae8cc271867d3ae614f1ea7039937a5b87028aa4a092b,2024-11-21T08:59:41.007000 CVE-2024-24777,0,0,c46e7117281fbe7f2ffae8cc271867d3ae614f1ea7039937a5b87028aa4a092b,2024-11-21T08:59:41.007000
CVE-2024-24779,0,0,913c8b0ca6161d3799afa1173ae119ae45044a093b0e95b6abda7e691a02e6f2,2024-11-21T08:59:41.143000 CVE-2024-24779,0,1,f7bc46f29c0a12895669fc7cc6a9283783810500702236b348f45b5c02f935f9,2024-12-31T16:26:31.327000
CVE-2024-2478,0,0,e85196d894b10e02f1a421f833798ced2a47eb5d6f2dba4c90c6c4ecef4da3bf,2024-11-21T09:09:50.483000 CVE-2024-2478,0,0,e85196d894b10e02f1a421f833798ced2a47eb5d6f2dba4c90c6c4ecef4da3bf,2024-11-21T09:09:50.483000
CVE-2024-24781,0,0,056ec447dbcc83fc2a310224e9277e0a17bd56759c2d803ede35170578118e80,2024-11-21T08:59:41.280000 CVE-2024-24781,0,0,056ec447dbcc83fc2a310224e9277e0a17bd56759c2d803ede35170578118e80,2024-11-21T08:59:41.280000
CVE-2024-24782,0,0,80499092009d98ba529bfca673a7ac4275b61ad8394a4890122e575a7c7e8097,2024-11-21T08:59:41.467000 CVE-2024-24782,0,0,80499092009d98ba529bfca673a7ac4275b61ad8394a4890122e575a7c7e8097,2024-11-21T08:59:41.467000
@ -249860,6 +249864,7 @@ CVE-2024-25129,0,0,2604b0d083aa6b811ce626d5e0d68fa8a4d20df83b064e942d8925d782144
CVE-2024-2513,0,0,36a2204c3fd6b7b0d5979029682413ad27d7399117bcab08af84ed0f3129ba46,2024-11-21T09:09:54.893000 CVE-2024-2513,0,0,36a2204c3fd6b7b0d5979029682413ad27d7399117bcab08af84ed0f3129ba46,2024-11-21T09:09:54.893000
CVE-2024-25130,0,0,857561f7163809aaab52302af2067a400725f38d7068fc40b7911a37097dbdc8,2024-11-21T09:00:19.023000 CVE-2024-25130,0,0,857561f7163809aaab52302af2067a400725f38d7068fc40b7911a37097dbdc8,2024-11-21T09:00:19.023000
CVE-2024-25131,0,0,ceb8f79a596f7dfcc1a6c1d7239611c1edcfd90538f3aabea1606b25009f15f3,2024-12-19T15:15:07.070000 CVE-2024-25131,0,0,ceb8f79a596f7dfcc1a6c1d7239611c1edcfd90538f3aabea1606b25009f15f3,2024-12-19T15:15:07.070000
CVE-2024-25133,1,1,54a24b7a0d6c8ade3e83aafb0186b534bbf4b25fcc368eefe5f6bd50e4143e04,2024-12-31T15:15:08.283000
CVE-2024-25136,0,0,fd3e659838fe8e60e31caed167fe0a2ee44d58da08a3516e05cbf377e2acecc5,2024-11-21T09:00:19.150000 CVE-2024-25136,0,0,fd3e659838fe8e60e31caed167fe0a2ee44d58da08a3516e05cbf377e2acecc5,2024-11-21T09:00:19.150000
CVE-2024-25137,0,0,551f3b541fbbc9dcd6b47f5c71c8a46148d1a721582998d20fa87f2cf6578d35,2024-11-21T09:00:19.287000 CVE-2024-25137,0,0,551f3b541fbbc9dcd6b47f5c71c8a46148d1a721582998d20fa87f2cf6578d35,2024-11-21T09:00:19.287000
CVE-2024-25138,0,0,1698c5f2bc9a0b670f8c6e4fc5e4345882415f9bfce2ea6fa639d6363cc0ad04,2024-11-21T09:00:19.407000 CVE-2024-25138,0,0,1698c5f2bc9a0b670f8c6e4fc5e4345882415f9bfce2ea6fa639d6363cc0ad04,2024-11-21T09:00:19.407000
@ -250461,7 +250466,7 @@ CVE-2024-26007,0,0,5566a1952f2701dd4149a375a6c93e3c6434006ebc54211b6a50bcacb2b01
CVE-2024-26010,0,0,aa94400b6d9b88521b847077f70baf8416af93283c6afed0d9452bca0e3c5cd0,2024-12-11T19:54:35.323000 CVE-2024-26010,0,0,aa94400b6d9b88521b847077f70baf8416af93283c6afed0d9452bca0e3c5cd0,2024-12-11T19:54:35.323000
CVE-2024-26011,0,0,c11541fdad772e94b22af8e91bceb09116d56319f79d2943860d22ca66673a67,2024-12-12T19:33:58.833000 CVE-2024-26011,0,0,c11541fdad772e94b22af8e91bceb09116d56319f79d2943860d22ca66673a67,2024-12-12T19:33:58.833000
CVE-2024-26015,0,0,61e1ee285e159a140490fe9bac1615210ace2b02df5e5f1a9d7b48836125a67e,2024-11-21T09:01:45.940000 CVE-2024-26015,0,0,61e1ee285e159a140490fe9bac1615210ace2b02df5e5f1a9d7b48836125a67e,2024-11-21T09:01:45.940000
CVE-2024-26016,0,0,9e0dd0c92fd9be6b95f7f1bc21dbcc0d708f36282cade5ecfae3de9213ad30e7,2024-11-21T09:01:46.090000 CVE-2024-26016,0,1,dd632393ecfda7bcefa8170ded33d72e8e2f0339866b8ccf741d814fe6f9ab75,2024-12-31T16:27:58.487000
CVE-2024-26017,0,0,11d040a25f5c2d5c2e1e2401973b3159ea6e8ba153c9a2238d873c2f164fc160,2024-11-15T14:00:09.720000 CVE-2024-26017,0,0,11d040a25f5c2d5c2e1e2401973b3159ea6e8ba153c9a2238d873c2f164fc160,2024-11-15T14:00:09.720000
CVE-2024-26018,0,0,2ce937190f1a3d6a5b32ac3dc44844a76544d21abc3c13edb30e7e9f1ae3e868,2024-11-21T09:01:46.343000 CVE-2024-26018,0,0,2ce937190f1a3d6a5b32ac3dc44844a76544d21abc3c13edb30e7e9f1ae3e868,2024-11-21T09:01:46.343000
CVE-2024-26019,0,0,47740102c6ff96f7cdf82a61ec34d114a985da5f23a4590422c0d7ffc1d08c5f,2024-11-25T19:15:08.683000 CVE-2024-26019,0,0,47740102c6ff96f7cdf82a61ec34d114a985da5f23a4590422c0d7ffc1d08c5f,2024-11-25T19:15:08.683000
@ -250737,7 +250742,7 @@ CVE-2024-26280,0,0,4dba0b4b9e72b2f6fda48443a2b6037b4825bda1db2a34cc5aafddc35a399
CVE-2024-26281,0,0,107386b8a39e0d33b9b54932351e82ca730a36737855b38bfd913716a0abc880,2024-11-21T09:02:17.870000 CVE-2024-26281,0,0,107386b8a39e0d33b9b54932351e82ca730a36737855b38bfd913716a0abc880,2024-11-21T09:02:17.870000
CVE-2024-26282,0,0,2cc47a64c57207c0b4b1555e1dbd660936d462eb1025057272aa17e84ed0cc58,2024-11-21T09:02:18.053000 CVE-2024-26282,0,0,2cc47a64c57207c0b4b1555e1dbd660936d462eb1025057272aa17e84ed0cc58,2024-11-21T09:02:18.053000
CVE-2024-26283,0,0,67727c15898ca0345e0ba65415a8a83e2c55a918f47c457090dc0b76ef2f95ab,2024-11-21T09:02:18.220000 CVE-2024-26283,0,0,67727c15898ca0345e0ba65415a8a83e2c55a918f47c457090dc0b76ef2f95ab,2024-11-21T09:02:18.220000
CVE-2024-26284,0,1,572db44ab010fc15f514ad94f364d0e8fa76b6e5465b3fd409004443f7ab1ec5,2024-12-31T14:39:53.067000 CVE-2024-26284,0,0,572db44ab010fc15f514ad94f364d0e8fa76b6e5465b3fd409004443f7ab1ec5,2024-12-31T14:39:53.067000
CVE-2024-26287,0,0,a6aa5e3005a08ad2bdeb88cca399334d57123c9b3cf8d04b234e0711a3fc2654,2024-02-22T12:15:46.420000 CVE-2024-26287,0,0,a6aa5e3005a08ad2bdeb88cca399334d57123c9b3cf8d04b234e0711a3fc2654,2024-02-22T12:15:46.420000
CVE-2024-26288,0,0,d914eed56ced35579f60a9694d621623fae12b5d0fc07aba61628a768aebea04,2024-11-21T09:02:18.523000 CVE-2024-26288,0,0,d914eed56ced35579f60a9694d621623fae12b5d0fc07aba61628a768aebea04,2024-11-21T09:02:18.523000
CVE-2024-26289,0,0,48a7a7a5fafdfa8d5f7dbc61909a6d99dc01723526113e644f30f0e41ba2dc35,2024-11-21T09:02:18.637000 CVE-2024-26289,0,0,48a7a7a5fafdfa8d5f7dbc61909a6d99dc01723526113e644f30f0e41ba2dc35,2024-11-21T09:02:18.637000
@ -251408,7 +251413,7 @@ CVE-2024-27083,0,0,0a867c69f0761d5202838e0d6673017855748c22aaa12a5775e2cc9879208
CVE-2024-27084,0,0,338f54f6691d2c6f86b17bf560fce22137a7c3f7f032f3603eb755d855416e16,2024-02-26T18:15:07.920000 CVE-2024-27084,0,0,338f54f6691d2c6f86b17bf560fce22137a7c3f7f032f3603eb755d855416e16,2024-02-26T18:15:07.920000
CVE-2024-27085,0,0,7a91f42e83883eebf7dd79388750166b8b0238d867e5bd66c97606b795c57c1c,2024-11-21T09:03:49.710000 CVE-2024-27085,0,0,7a91f42e83883eebf7dd79388750166b8b0238d867e5bd66c97606b795c57c1c,2024-11-21T09:03:49.710000
CVE-2024-27086,0,0,31b4ebe2efce4a28ab0b8bcfc7f002678828a55ea41b5b1acf463da459be833a,2024-11-21T09:03:49.830000 CVE-2024-27086,0,0,31b4ebe2efce4a28ab0b8bcfc7f002678828a55ea41b5b1acf463da459be833a,2024-11-21T09:03:49.830000
CVE-2024-27087,0,0,a30c4a0842d0b884edc7eac3501ad7dbd544f92e50a229796f2cadcb24f253a9,2024-11-21T09:03:49.970000 CVE-2024-27087,0,1,cc4f44d5158441803a17a794aacfbc4914f18711058d4d238e9a570fec7d2a9b,2024-12-31T15:34:15.493000
CVE-2024-27088,0,0,f43c66360a7c9299381d0e299f4816628fffeea3c5fa73c594ae9d718302efbe,2024-11-21T09:03:50.097000 CVE-2024-27088,0,0,f43c66360a7c9299381d0e299f4816628fffeea3c5fa73c594ae9d718302efbe,2024-11-21T09:03:50.097000
CVE-2024-27089,0,0,32c5f647bd4542a63d3920acbc84f8120e07a411286d59ab2a36ed9130fb3505,2024-02-26T20:19:06.073000 CVE-2024-27089,0,0,32c5f647bd4542a63d3920acbc84f8120e07a411286d59ab2a36ed9130fb3505,2024-02-26T20:19:06.073000
CVE-2024-2709,0,0,297c40d248d51ec740c7403fb26c5d03674e102d285a860c91e917ac0e61ced7,2024-12-12T17:29:29.930000 CVE-2024-2709,0,0,297c40d248d51ec740c7403fb26c5d03674e102d285a860c91e917ac0e61ced7,2024-12-12T17:29:29.930000
@ -251629,7 +251634,7 @@ CVE-2024-27311,0,0,0c755bcc622ed9c321ec0b34f3a1b0b3952780668adba0a01799036912b6a
CVE-2024-27312,0,0,950a896b01dadefd880d8932f3955c9f66315651b266e13635b82b30b52a3a82,2024-11-25T15:14:53.217000 CVE-2024-27312,0,0,950a896b01dadefd880d8932f3955c9f66315651b266e13635b82b30b52a3a82,2024-11-25T15:14:53.217000
CVE-2024-27313,0,0,35d4fc5dcf7fd82874d8066658bb141d6133e1d7a3505f1ab33a062d023280f6,2024-11-27T16:24:25.567000 CVE-2024-27313,0,0,35d4fc5dcf7fd82874d8066658bb141d6133e1d7a3505f1ab33a062d023280f6,2024-11-27T16:24:25.567000
CVE-2024-27314,0,0,c7800ff43b3dde4e64855ff4c8e9e09054f2d9523de2c8225fcf94e9bdda5465,2024-11-21T09:04:18.717000 CVE-2024-27314,0,0,c7800ff43b3dde4e64855ff4c8e9e09054f2d9523de2c8225fcf94e9bdda5465,2024-11-21T09:04:18.717000
CVE-2024-27315,0,0,be98118c04322eb8e07da5f2e25cc656385ab6d4aad67832c37271985f9488bb,2024-11-21T09:04:18.873000 CVE-2024-27315,0,1,69876f0445be2a257463a9ba8aea4c576cbe92cff0d007bfe9a7f96610752dec,2024-12-31T16:16:15.510000
CVE-2024-27316,0,0,24fdf0f9b0ad852f5d9fcb01da998781549ca6c0b793197d9e2355018b079f16,2024-11-21T09:04:18.993000 CVE-2024-27316,0,0,24fdf0f9b0ad852f5d9fcb01da998781549ca6c0b793197d9e2355018b079f16,2024-11-21T09:04:18.993000
CVE-2024-27317,0,0,b8cb397c1dd25df8528d924f4a62d807beeea4e76cb88f463ebe43293b5fadac,2024-11-21T09:04:19.237000 CVE-2024-27317,0,0,b8cb397c1dd25df8528d924f4a62d807beeea4e76cb88f463ebe43293b5fadac,2024-11-21T09:04:19.237000
CVE-2024-27318,0,0,a39bb4bb6ceefb9dab21937c537b420423d8cb9a6ce6d647023eb496b3d6b5b8,2024-11-21T09:04:19.373000 CVE-2024-27318,0,0,a39bb4bb6ceefb9dab21937c537b420423d8cb9a6ce6d647023eb496b3d6b5b8,2024-11-21T09:04:19.373000
@ -267603,19 +267608,19 @@ CVE-2024-49682,0,0,1be8ca92696fefc2dbcfcb6321a4e4bba71eb7e99599246dbba19a2990e0e
CVE-2024-49683,0,0,7be9ea3f510dbaa7fe885cdcb7745560fbc269f7e9bd22850dce90772b3593dd,2024-10-25T12:56:07.750000 CVE-2024-49683,0,0,7be9ea3f510dbaa7fe885cdcb7745560fbc269f7e9bd22850dce90772b3593dd,2024-10-25T12:56:07.750000
CVE-2024-49684,0,0,36531d7cf4c7a4e38f6860bda9ec7c0d48195d2fcc27ad0578736763df8ccca2,2024-10-25T12:56:36.827000 CVE-2024-49684,0,0,36531d7cf4c7a4e38f6860bda9ec7c0d48195d2fcc27ad0578736763df8ccca2,2024-10-25T12:56:36.827000
CVE-2024-49685,0,0,caea3f86fb77aaa3e3026aa8a74adcd66d73ae057e76042ddf5cfe89f39cb8d6,2024-11-01T12:57:03.417000 CVE-2024-49685,0,0,caea3f86fb77aaa3e3026aa8a74adcd66d73ae057e76042ddf5cfe89f39cb8d6,2024-11-01T12:57:03.417000
CVE-2024-49686,1,1,b09a989fa167ab1ce18532d3f65453d6c2aa0cd048c77a99694ea7a0211f1ccc,2024-12-31T14:15:23.137000 CVE-2024-49686,0,0,b09a989fa167ab1ce18532d3f65453d6c2aa0cd048c77a99694ea7a0211f1ccc,2024-12-31T14:15:23.137000
CVE-2024-49687,1,1,d32ef769baab79f9a783c3a7ba1875acf663f6989de09a3ed4f0c110fc5e4904,2024-12-31T14:15:23.430000 CVE-2024-49687,0,0,d32ef769baab79f9a783c3a7ba1875acf663f6989de09a3ed4f0c110fc5e4904,2024-12-31T14:15:23.430000
CVE-2024-49689,0,0,5b95dcb1b308ac9918618c653b8d612d05dba2416c0a5caade9d4ff079c39dcd,2024-11-19T21:57:32.967000 CVE-2024-49689,0,0,5b95dcb1b308ac9918618c653b8d612d05dba2416c0a5caade9d4ff079c39dcd,2024-11-19T21:57:32.967000
CVE-2024-4969,0,0,590a42a007878875f8821a8461ae21649b587614d8fa87d6d7abc856a4793907,2024-11-21T09:43:58.430000 CVE-2024-4969,0,0,590a42a007878875f8821a8461ae21649b587614d8fa87d6d7abc856a4793907,2024-11-21T09:43:58.430000
CVE-2024-49690,0,0,e7d1fbeec3ae6b3b41207427caf7ef895bb3e2f53a7a24c5af615a4c19bee7df,2024-10-25T12:56:36.827000 CVE-2024-49690,0,0,e7d1fbeec3ae6b3b41207427caf7ef895bb3e2f53a7a24c5af615a4c19bee7df,2024-10-25T12:56:36.827000
CVE-2024-49691,0,0,2f3c33899873b4bca45696103bf1bbca6b35f2f5e193db4c70c0b540bc208ed1,2024-10-25T12:56:07.750000 CVE-2024-49691,0,0,2f3c33899873b4bca45696103bf1bbca6b35f2f5e193db4c70c0b540bc208ed1,2024-10-25T12:56:07.750000
CVE-2024-49692,0,0,63f1db65001fdd89311c7274cad5fd7c03efa214b1be9bf8dfe49d3d0c423ea9,2024-11-08T14:55:56.947000 CVE-2024-49692,0,0,63f1db65001fdd89311c7274cad5fd7c03efa214b1be9bf8dfe49d3d0c423ea9,2024-11-08T14:55:56.947000
CVE-2024-49693,0,0,44d78874f13d80a90e8b1d3381135df2d470fd44cf95ccececddf651f87dfe70,2024-11-08T15:19:50.400000 CVE-2024-49693,0,0,44d78874f13d80a90e8b1d3381135df2d470fd44cf95ccececddf651f87dfe70,2024-11-08T15:19:50.400000
CVE-2024-49694,1,1,6e0f0d9798d01bf3abec9994165635447a13247b6e1041947298899e65232b56,2024-12-31T14:15:23.567000 CVE-2024-49694,0,0,6e0f0d9798d01bf3abec9994165635447a13247b6e1041947298899e65232b56,2024-12-31T14:15:23.567000
CVE-2024-49695,0,0,83cd58e8b597dad6e6c36cfc6ae43f6a32a1a4af5eeaeb26b9996a7c576928f1,2024-11-08T15:20:33.257000 CVE-2024-49695,0,0,83cd58e8b597dad6e6c36cfc6ae43f6a32a1a4af5eeaeb26b9996a7c576928f1,2024-11-08T15:20:33.257000
CVE-2024-49696,0,0,527dc628015bfd53942eb90e4ad813b4a45b3c729bd97fce7834df7a63766ec9,2024-11-08T15:21:12.533000 CVE-2024-49696,0,0,527dc628015bfd53942eb90e4ad813b4a45b3c729bd97fce7834df7a63766ec9,2024-11-08T15:21:12.533000
CVE-2024-49697,0,0,530eb2f42eba87aaffb73d54c4b9e27dfb5194483cfcc3edf311ece4f08a0142,2024-11-19T21:57:32.967000 CVE-2024-49697,0,0,530eb2f42eba87aaffb73d54c4b9e27dfb5194483cfcc3edf311ece4f08a0142,2024-11-19T21:57:32.967000
CVE-2024-49698,1,1,cc5f3b18b4d3442e78743a42c4c6d5e28454ee6e32e659bae8ddcbc3df2e8c9f,2024-12-31T14:15:23.697000 CVE-2024-49698,0,0,cc5f3b18b4d3442e78743a42c4c6d5e28454ee6e32e659bae8ddcbc3df2e8c9f,2024-12-31T14:15:23.697000
CVE-2024-4970,0,0,ceae782189e36ea72b2794d871ba0e98c5d8d6d33670b120902bfb4e771c4acb,2024-11-21T09:43:58.627000 CVE-2024-4970,0,0,ceae782189e36ea72b2794d871ba0e98c5d8d6d33670b120902bfb4e771c4acb,2024-11-21T09:43:58.627000
CVE-2024-49701,0,0,faa8cd67d7f87e8b700116e3ea01c26a0bace35a674e83df64e802c479757838,2024-10-25T12:56:36.827000 CVE-2024-49701,0,0,faa8cd67d7f87e8b700116e3ea01c26a0bace35a674e83df64e802c479757838,2024-10-25T12:56:36.827000
CVE-2024-49702,0,0,95504b65313eac7b0c032b66b56870b8b510aa5556c8e61dadfd6a9c41944713,2024-11-08T14:32:56.010000 CVE-2024-49702,0,0,95504b65313eac7b0c032b66b56870b8b510aa5556c8e61dadfd6a9c41944713,2024-11-08T14:32:56.010000
@ -268974,7 +268979,7 @@ CVE-2024-51662,0,0,238aef4ec3bb2103208d2571b222a192ce1bc63b5768c596b0550f9a53024
CVE-2024-51663,0,0,23de5c091a55aa24b19c5d5920ebb2a18811a61b1cfb0c1e54c00fb912be0326,2024-11-18T16:54:02.457000 CVE-2024-51663,0,0,23de5c091a55aa24b19c5d5920ebb2a18811a61b1cfb0c1e54c00fb912be0326,2024-11-18T16:54:02.457000
CVE-2024-51664,0,0,7c9d89a93636181c0db5f633dce66403f4afe72a6f264ac128d68991d43b436b,2024-11-18T16:55:08.183000 CVE-2024-51664,0,0,7c9d89a93636181c0db5f633dce66403f4afe72a6f264ac128d68991d43b436b,2024-11-18T16:55:08.183000
CVE-2024-51665,0,0,ca0d2b7081d27d1deb85dc534f4acbfcf953445abd78727c39ccd205fd72c238,2024-11-06T22:07:10.707000 CVE-2024-51665,0,0,ca0d2b7081d27d1deb85dc534f4acbfcf953445abd78727c39ccd205fd72c238,2024-11-06T22:07:10.707000
CVE-2024-51667,1,1,7894353927f6dba7e43d2daffdcd82bc4ea644f0c896c9845d5e282557fbe100,2024-12-31T14:15:23.827000 CVE-2024-51667,0,0,7894353927f6dba7e43d2daffdcd82bc4ea644f0c896c9845d5e282557fbe100,2024-12-31T14:15:23.827000
CVE-2024-51668,0,0,14a8d783e672310bba3467db772e216d308161cfb0eb152a89517fa6214249c8,2024-11-18T16:51:31.227000 CVE-2024-51668,0,0,14a8d783e672310bba3467db772e216d308161cfb0eb152a89517fa6214249c8,2024-11-18T16:51:31.227000
CVE-2024-51669,0,0,82aa3c5d679c42aa50b8bb219111bca86e29e8d5f223b00587efeaee0978ad5f,2024-11-25T14:46:27.873000 CVE-2024-51669,0,0,82aa3c5d679c42aa50b8bb219111bca86e29e8d5f223b00587efeaee0978ad5f,2024-11-25T14:46:27.873000
CVE-2024-5167,0,0,fe77c2bef4dda4bcd8edc49a185a6194f97f2f334490811a5fdb0dbedfde855f,2024-11-21T09:47:06.823000 CVE-2024-5167,0,0,fe77c2bef4dda4bcd8edc49a185a6194f97f2f334490811a5fdb0dbedfde855f,2024-11-21T09:47:06.823000
@ -269296,7 +269301,11 @@ CVE-2024-52034,0,0,8072163119d29e3d7cc1af6d3ff22d184e9e2263ebc70094a6b8e6922599c
CVE-2024-5204,0,0,861a03c6b8b38defa5d93991a4825262ae7b814b89fc2ffc1e32a59f04171e4e,2024-11-21T09:47:10.927000 CVE-2024-5204,0,0,861a03c6b8b38defa5d93991a4825262ae7b814b89fc2ffc1e32a59f04171e4e,2024-11-21T09:47:10.927000
CVE-2024-52043,0,0,e434d805f99fdc6c5e33568cd1a8288e62a5c6170cf35ff5cddabfded34908c6,2024-11-08T20:39:36.233000 CVE-2024-52043,0,0,e434d805f99fdc6c5e33568cd1a8288e62a5c6170cf35ff5cddabfded34908c6,2024-11-08T20:39:36.233000
CVE-2024-52046,0,0,226283db324e2d9b866e00b93c22fb02aa41377a5347123e63df9758cf7f6088,2024-12-25T11:15:05.293000 CVE-2024-52046,0,0,226283db324e2d9b866e00b93c22fb02aa41377a5347123e63df9758cf7f6088,2024-12-25T11:15:05.293000
CVE-2024-52047,1,1,e05cbf7f7684d528fa05d3d1e73490e32a72a3a9217677f0d70f0354095e58e7,2024-12-31T16:15:25.923000
CVE-2024-52048,1,1,f9102a06b7d67d9a10d4aa5f95dc0bd9007fd9888890ffe133800481335c4e30,2024-12-31T16:15:26.063000
CVE-2024-52049,1,1,31ef03240011d8abebb1ffeb24543c7eda748e4370012b7b8574e64ec5842205,2024-12-31T16:15:26.193000
CVE-2024-5205,0,0,23f687d8508f2ecb4f71db4183b652438c4bb3a68c03d14351c40e82c1576079,2024-11-21T09:47:11.033000 CVE-2024-5205,0,0,23f687d8508f2ecb4f71db4183b652438c4bb3a68c03d14351c40e82c1576079,2024-11-21T09:47:11.033000
CVE-2024-52050,1,1,c02644a595d1c2b09bf55ac4e9a01181114da0a0f5df878f77119e37bc62a76f,2024-12-31T16:15:26.313000
CVE-2024-52051,0,0,2a88c8f9f62c39002493c9459b82ce96cec1cb4b6741ecfb88f77d798525819b,2024-12-10T14:30:44.957000 CVE-2024-52051,0,0,2a88c8f9f62c39002493c9459b82ce96cec1cb4b6741ecfb88f77d798525819b,2024-12-10T14:30:44.957000
CVE-2024-52052,0,0,5eeeac48f24ac467a2621d7950234ff504286fc9da5b2ff1ce8d348695057bf0,2024-11-21T23:15:04.520000 CVE-2024-52052,0,0,5eeeac48f24ac467a2621d7950234ff504286fc9da5b2ff1ce8d348695057bf0,2024-11-21T23:15:04.520000
CVE-2024-52053,0,0,634822104ec4d4af8aa9cf0854397b2e2ea6f5f55e9fc999886a29a44842f7b3,2024-11-21T23:15:05.387000 CVE-2024-52053,0,0,634822104ec4d4af8aa9cf0854397b2e2ea6f5f55e9fc999886a29a44842f7b3,2024-11-21T23:15:05.387000
@ -270200,6 +270209,7 @@ CVE-2024-53623,0,0,531ddce100784ec8b317b297b660a260e518e8b80f64012824aac6bf3d828
CVE-2024-5363,0,0,26d4875386ad8c3215b4c09e1b67dd8ce62939d9e762298e9b8ac4e18d0732aa,2024-11-21T09:47:30.223000 CVE-2024-5363,0,0,26d4875386ad8c3215b4c09e1b67dd8ce62939d9e762298e9b8ac4e18d0732aa,2024-11-21T09:47:30.223000
CVE-2024-53635,0,0,69eb99ebd3cc8f0f627f786197a00b6b987c88368caf03b14418ba15ea7b94e4,2024-11-27T18:15:18.130000 CVE-2024-53635,0,0,69eb99ebd3cc8f0f627f786197a00b6b987c88368caf03b14418ba15ea7b94e4,2024-11-27T18:15:18.130000
CVE-2024-5364,0,0,70608899f95aca150ea63ad11d46a4a5108c90127a7a301ace82188c2357f63e,2024-11-21T09:47:30.357000 CVE-2024-5364,0,0,70608899f95aca150ea63ad11d46a4a5108c90127a7a301ace82188c2357f63e,2024-11-21T09:47:30.357000
CVE-2024-53647,1,1,6aca2ff09386897ac522c375bf181a9919ad06f06064d2a47f457ead377101ad,2024-12-31T16:15:26.437000
CVE-2024-5365,0,0,1cfce3a239d45132ff3721a342529a7c8292cbd269d61639965b045e1105a397,2024-11-21T09:47:30.490000 CVE-2024-5365,0,0,1cfce3a239d45132ff3721a342529a7c8292cbd269d61639965b045e1105a397,2024-11-21T09:47:30.490000
CVE-2024-5366,0,0,3d4708898dde8c46157274fab31aec2bb1d6d4355897d80e5ba83e77521494aa,2024-11-21T09:47:30.617000 CVE-2024-5366,0,0,3d4708898dde8c46157274fab31aec2bb1d6d4355897d80e5ba83e77521494aa,2024-11-21T09:47:30.617000
CVE-2024-5367,0,0,a7221799367d103e649a718fec766a2c3243ad87477c7760cdab4ba0815d2580,2024-11-21T09:47:30.747000 CVE-2024-5367,0,0,a7221799367d103e649a718fec766a2c3243ad87477c7760cdab4ba0815d2580,2024-11-21T09:47:30.747000
@ -271152,18 +271162,18 @@ CVE-2024-55988,0,0,29432b6415b04c94a8d0eb1b75a845ef08e4008189b66c52efa14e8cba241
CVE-2024-55989,0,0,e707f533a0988b2bfc57216e816a527d20614cdc90c948dd911308abe1511f6b,2024-12-16T15:15:26.073000 CVE-2024-55989,0,0,e707f533a0988b2bfc57216e816a527d20614cdc90c948dd911308abe1511f6b,2024-12-16T15:15:26.073000
CVE-2024-5599,0,0,f3e32e76596c8dfbbbc9f620e9218f469ed68b0de9d9b75b168201bc4595067e,2024-11-21T09:47:59.700000 CVE-2024-5599,0,0,f3e32e76596c8dfbbbc9f620e9218f469ed68b0de9d9b75b168201bc4595067e,2024-11-21T09:47:59.700000
CVE-2024-55990,0,0,70f1199a2919622861e5a195578358ac645b32788dd8f22871a4f0f6544e2cfc,2024-12-16T15:15:26.223000 CVE-2024-55990,0,0,70f1199a2919622861e5a195578358ac645b32788dd8f22871a4f0f6544e2cfc,2024-12-16T15:15:26.223000
CVE-2024-55991,1,1,2b6d2a3b225da208b08cf2e053300f940a5081a46e0134ada17e746c11ce3341,2024-12-31T13:15:07.170000 CVE-2024-55991,0,0,2b6d2a3b225da208b08cf2e053300f940a5081a46e0134ada17e746c11ce3341,2024-12-31T13:15:07.170000
CVE-2024-55992,0,0,3a92a53b1b28088a747dc25e51b5a5298ed8fdee5a7752908d383f0e1e0fd152,2024-12-16T15:15:26.377000 CVE-2024-55992,0,0,3a92a53b1b28088a747dc25e51b5a5298ed8fdee5a7752908d383f0e1e0fd152,2024-12-16T15:15:26.377000
CVE-2024-55993,0,0,ae36d342f4e92c3c91fa789f8952d6e3879ec56feb7ffab543c711907e566de3,2024-12-16T15:15:26.523000 CVE-2024-55993,0,0,ae36d342f4e92c3c91fa789f8952d6e3879ec56feb7ffab543c711907e566de3,2024-12-16T15:15:26.523000
CVE-2024-55994,0,0,7e04714a38a4c38bb08df1f7ab727dd23504a238fc0c7a013bceb4c7eef3a1ac,2024-12-16T15:15:26.677000 CVE-2024-55994,0,0,7e04714a38a4c38bb08df1f7ab727dd23504a238fc0c7a013bceb4c7eef3a1ac,2024-12-16T15:15:26.677000
CVE-2024-55995,1,1,fc49e8e56aad5b2b05dbca0f97ad93b25c41309b5542c10c7bcc4aa919bf50ae,2024-12-31T14:15:23.963000 CVE-2024-55995,0,0,fc49e8e56aad5b2b05dbca0f97ad93b25c41309b5542c10c7bcc4aa919bf50ae,2024-12-31T14:15:23.963000
CVE-2024-55996,0,0,051525527c437967b20b933fdd4a5eda5562774a9c966611224281057a9b5a40,2024-12-16T15:15:26.820000 CVE-2024-55996,0,0,051525527c437967b20b933fdd4a5eda5562774a9c966611224281057a9b5a40,2024-12-16T15:15:26.820000
CVE-2024-55997,0,0,4ddd75ddbd7e8cba6002090848d5f28f908b98196d746d4696bd512d6e85dc00,2024-12-18T12:15:11.477000 CVE-2024-55997,0,0,4ddd75ddbd7e8cba6002090848d5f28f908b98196d746d4696bd512d6e85dc00,2024-12-18T12:15:11.477000
CVE-2024-55998,0,0,d76278d3c46a1747090a2639250ffe1cfc4ff55a8d82cdf9add0285b6a55398c,2024-12-16T15:15:26.957000 CVE-2024-55998,0,0,d76278d3c46a1747090a2639250ffe1cfc4ff55a8d82cdf9add0285b6a55398c,2024-12-16T15:15:26.957000
CVE-2024-55999,0,0,55efb565e9f4beedd46b3a3d41fbf23eb559d384546ca63d9e1d7ea34eac926b,2024-12-16T16:15:08.973000 CVE-2024-55999,0,0,55efb565e9f4beedd46b3a3d41fbf23eb559d384546ca63d9e1d7ea34eac926b,2024-12-16T16:15:08.973000
CVE-2024-5600,0,0,9ec61c0439dd991245dd59b838c072ef06691da563abf803dab52d51cc92f007,2024-11-21T09:47:59.817000 CVE-2024-5600,0,0,9ec61c0439dd991245dd59b838c072ef06691da563abf803dab52d51cc92f007,2024-11-21T09:47:59.817000
CVE-2024-56001,0,0,5139231e1834dfdb01fa94db9cdc4fd99b8a1cdda6840a89cc6d0fd5e49e75db,2024-12-16T15:15:27.090000 CVE-2024-56001,0,0,5139231e1834dfdb01fa94db9cdc4fd99b8a1cdda6840a89cc6d0fd5e49e75db,2024-12-16T15:15:27.090000
CVE-2024-56002,1,1,98ef174125c58d4077496bb09ec9806035cfd38b1b8fcc4064fa5eba6c4bdd43,2024-12-31T14:15:24.120000 CVE-2024-56002,0,0,98ef174125c58d4077496bb09ec9806035cfd38b1b8fcc4064fa5eba6c4bdd43,2024-12-31T14:15:24.120000
CVE-2024-56003,0,0,00f6c93c049c9977ecf4fe9b8499c83382c15c3e34f2e2e2e82b604ea04338d0,2024-12-16T16:15:09.113000 CVE-2024-56003,0,0,00f6c93c049c9977ecf4fe9b8499c83382c15c3e34f2e2e2e82b604ea04338d0,2024-12-16T16:15:09.113000
CVE-2024-56004,0,0,24e2c56dce37d20761feaa3ae43804a7a5a5da718efe84028cf96e0063b8d0d3,2024-12-16T15:15:27.233000 CVE-2024-56004,0,0,24e2c56dce37d20761feaa3ae43804a7a5a5da718efe84028cf96e0063b8d0d3,2024-12-16T15:15:27.233000
CVE-2024-56005,0,0,41e3f9524fba561942e40759337ee83ef99e503ed528828be049c8240cca65aa,2024-12-16T15:15:27.370000 CVE-2024-56005,0,0,41e3f9524fba561942e40759337ee83ef99e503ed528828be049c8240cca65aa,2024-12-16T15:15:27.370000
@ -271179,16 +271189,16 @@ CVE-2024-56015,0,0,dfe5c22265c2efda8e516b0d8c875d07a90e2f08f73621c0911a45a6859c2
CVE-2024-56016,0,0,72352c145c24e5c7235f05940e5baa008585f6941c1f5a0f55cd9079c6cdfebe,2024-12-18T12:15:11.940000 CVE-2024-56016,0,0,72352c145c24e5c7235f05940e5baa008585f6941c1f5a0f55cd9079c6cdfebe,2024-12-18T12:15:11.940000
CVE-2024-56017,0,0,712e189d98a2fef52195f7721a474e0e74c8371658ef85b000d5f3fb7476b956,2024-12-16T23:15:06.923000 CVE-2024-56017,0,0,712e189d98a2fef52195f7721a474e0e74c8371658ef85b000d5f3fb7476b956,2024-12-16T23:15:06.923000
CVE-2024-5602,0,0,f0b74b0cc64b84af5cc9e3e41d215e059dc6bc39d5e4f09c9ace9e8dd21b7bc5,2024-11-21T09:48:00.070000 CVE-2024-5602,0,0,f0b74b0cc64b84af5cc9e3e41d215e059dc6bc39d5e4f09c9ace9e8dd21b7bc5,2024-11-21T09:48:00.070000
CVE-2024-56031,1,1,164d110e676e1c7a453ddbd792f4656e271b4b29a8622a61c1824848da1a39d7,2024-12-31T13:15:07.343000 CVE-2024-56031,0,0,164d110e676e1c7a453ddbd792f4656e271b4b29a8622a61c1824848da1a39d7,2024-12-31T13:15:07.343000
CVE-2024-56039,1,1,b478b593c841086df3059cb687969d54e2e0fc84360d19ab1d6fab2484be0468,2024-12-31T13:15:07.517000 CVE-2024-56039,0,0,b478b593c841086df3059cb687969d54e2e0fc84360d19ab1d6fab2484be0468,2024-12-31T13:15:07.517000
CVE-2024-5604,0,0,8891da3265bc2c375fdbcf484ffb602948ffb13c3bebcf06f381e67d81cf40c0,2024-11-21T09:48:00.187000 CVE-2024-5604,0,0,8891da3265bc2c375fdbcf484ffb602948ffb13c3bebcf06f381e67d81cf40c0,2024-11-21T09:48:00.187000
CVE-2024-56040,1,1,f74b3aa9cc0036aa1c48534068a22cf04f07572eb2bdb25711b867d8aa5ae75d,2024-12-31T14:15:24.333000 CVE-2024-56040,0,0,f74b3aa9cc0036aa1c48534068a22cf04f07572eb2bdb25711b867d8aa5ae75d,2024-12-31T14:15:24.333000
CVE-2024-56041,1,1,803939e50272a57b84f1198de5f2c20f11b30050b0ff6368477bf471d9f262fe,2024-12-31T13:15:07.670000 CVE-2024-56041,0,0,803939e50272a57b84f1198de5f2c20f11b30050b0ff6368477bf471d9f262fe,2024-12-31T13:15:07.670000
CVE-2024-56042,1,1,f41ed15c0bbf35b125fd87b3110d680e49a36ea7adf1e3f761462be13596960c,2024-12-31T13:15:07.823000 CVE-2024-56042,0,0,f41ed15c0bbf35b125fd87b3110d680e49a36ea7adf1e3f761462be13596960c,2024-12-31T13:15:07.823000
CVE-2024-56043,1,1,7b6dbdaa2f9c8b9c5038038ef6bb0012a89be6e5534807cc5c85e6e9633d4b4d,2024-12-31T14:15:24.497000 CVE-2024-56043,0,0,7b6dbdaa2f9c8b9c5038038ef6bb0012a89be6e5534807cc5c85e6e9633d4b4d,2024-12-31T14:15:24.497000
CVE-2024-56044,1,1,e335382a2f943bd89f97e542c8944917c115e64cb78fc7b2c557008b11740a04,2024-12-31T14:15:24.680000 CVE-2024-56044,0,0,e335382a2f943bd89f97e542c8944917c115e64cb78fc7b2c557008b11740a04,2024-12-31T14:15:24.680000
CVE-2024-56045,1,1,8970223aa8bae9e142b25e5ceffb0deb537010a30612651ccf0c3c715db9ec9c,2024-12-31T14:15:24.827000 CVE-2024-56045,0,0,8970223aa8bae9e142b25e5ceffb0deb537010a30612651ccf0c3c715db9ec9c,2024-12-31T14:15:24.827000
CVE-2024-56046,1,1,0ea6d4d6e776d8a38c35dd5765e9562f6fe89d60e1c3da8a991aef5f5d3536b0,2024-12-31T13:15:07.997000 CVE-2024-56046,0,0,0ea6d4d6e776d8a38c35dd5765e9562f6fe89d60e1c3da8a991aef5f5d3536b0,2024-12-31T13:15:07.997000
CVE-2024-56047,0,0,83f2a6b23cf66f0a3517133f72c396641a8fcb2654419d1243a68e7351e0c8e2,2024-12-18T19:15:12.197000 CVE-2024-56047,0,0,83f2a6b23cf66f0a3517133f72c396641a8fcb2654419d1243a68e7351e0c8e2,2024-12-18T19:15:12.197000
CVE-2024-56048,0,0,704a7c76e471adab013ca3860c8d3d086c9ab580904e503d2d9e9c3e8cd3fe40,2024-12-18T19:15:12.333000 CVE-2024-56048,0,0,704a7c76e471adab013ca3860c8d3d086c9ab580904e503d2d9e9c3e8cd3fe40,2024-12-18T19:15:12.333000
CVE-2024-56049,0,0,2a3abf0d0029b2c8d81ded058c8d6dd0c0a2c30acc0773a6a3fa87493498baa2,2024-12-18T19:15:12.470000 CVE-2024-56049,0,0,2a3abf0d0029b2c8d81ded058c8d6dd0c0a2c30acc0773a6a3fa87493498baa2,2024-12-18T19:15:12.470000
@ -271203,14 +271213,14 @@ CVE-2024-56057,0,0,52ab628951e1d719b316ba7abe1325c61108c1e1b94190c530d208ac2916e
CVE-2024-56058,0,0,acc256b72c6ddf178feafe627688e78f25a5d2961313a94b4eed1089cb116425,2024-12-18T12:15:12.087000 CVE-2024-56058,0,0,acc256b72c6ddf178feafe627688e78f25a5d2961313a94b4eed1089cb116425,2024-12-18T12:15:12.087000
CVE-2024-56059,0,0,54cd8436a78994ce8bff57ca5e507720ff26093eb1124abb1e7cdd3e2c39fdfb,2024-12-18T12:15:12.237000 CVE-2024-56059,0,0,54cd8436a78994ce8bff57ca5e507720ff26093eb1124abb1e7cdd3e2c39fdfb,2024-12-18T12:15:12.237000
CVE-2024-5606,0,0,98eaf774fa1e05fbd39a41e5847ce28629e9cd607119c8a5d04808d521a366d5,2024-11-21T09:48:00.483000 CVE-2024-5606,0,0,98eaf774fa1e05fbd39a41e5847ce28629e9cd607119c8a5d04808d521a366d5,2024-11-21T09:48:00.483000
CVE-2024-56061,1,1,a927c092dd0f95397e0b307c4e1af3e8d5bb91f2a179bdfbffe24b5ff58f5233,2024-12-31T14:15:24.970000 CVE-2024-56061,0,0,a927c092dd0f95397e0b307c4e1af3e8d5bb91f2a179bdfbffe24b5ff58f5233,2024-12-31T14:15:24.970000
CVE-2024-56064,1,1,c92953f604dbab61878ff679cbb2e798705688f7ee2ce65f0fa32fe474bb539d,2024-12-31T13:15:08.157000 CVE-2024-56064,0,0,c92953f604dbab61878ff679cbb2e798705688f7ee2ce65f0fa32fe474bb539d,2024-12-31T13:15:08.157000
CVE-2024-56066,1,1,01aedb23e256a17287f4e2685f8a139aa0bf4d7c2cd9e70526b093041a5fc74c,2024-12-31T14:15:25.117000 CVE-2024-56066,0,0,01aedb23e256a17287f4e2685f8a139aa0bf4d7c2cd9e70526b093041a5fc74c,2024-12-31T14:15:25.117000
CVE-2024-56067,1,1,5767ad166f2dc6b99e9b5333bee9e51f87f01f4372cdb6bfa1bf5c9bbf869a41,2024-12-31T13:15:08.323000 CVE-2024-56067,0,0,5767ad166f2dc6b99e9b5333bee9e51f87f01f4372cdb6bfa1bf5c9bbf869a41,2024-12-31T13:15:08.323000
CVE-2024-56068,1,1,b15e0be15a5e6c7166470b5c00fff2521399d614dad3a6d77dcd89cfa369f5f9,2024-12-31T13:15:08.483000 CVE-2024-56068,0,0,b15e0be15a5e6c7166470b5c00fff2521399d614dad3a6d77dcd89cfa369f5f9,2024-12-31T13:15:08.483000
CVE-2024-5607,0,0,2f2e883967a2421396c2c72ed671760bd1b0ce90e12a34d10be305825ec8d97f,2024-11-21T09:48:00.667000 CVE-2024-5607,0,0,2f2e883967a2421396c2c72ed671760bd1b0ce90e12a34d10be305825ec8d97f,2024-11-21T09:48:00.667000
CVE-2024-56070,1,1,cdda6b10584d633f8db0ff2915b492bb06809767c9f02d72ebcbfca8ba566624,2024-12-31T14:15:25.257000 CVE-2024-56070,0,0,cdda6b10584d633f8db0ff2915b492bb06809767c9f02d72ebcbfca8ba566624,2024-12-31T14:15:25.257000
CVE-2024-56071,1,1,ab621aad8232ade06424a85f2d8ed086951040fe7cf9a05e25eb8e2d8dbf5542,2024-12-31T13:15:08.633000 CVE-2024-56071,0,0,ab621aad8232ade06424a85f2d8ed086951040fe7cf9a05e25eb8e2d8dbf5542,2024-12-31T13:15:08.633000
CVE-2024-56072,0,0,2f21e51bf736a459519872f37115b6d7b720b5912764e3d8251d315755964ab0,2024-12-16T17:15:13.500000 CVE-2024-56072,0,0,2f21e51bf736a459519872f37115b6d7b720b5912764e3d8251d315755964ab0,2024-12-16T17:15:13.500000
CVE-2024-56073,0,0,a6e397ff32d75ae8a3c1cdd7aec666fbdab955f0ddcd3e039f43dae421674c4b,2024-12-16T17:15:13.700000 CVE-2024-56073,0,0,a6e397ff32d75ae8a3c1cdd7aec666fbdab955f0ddcd3e039f43dae421674c4b,2024-12-16T17:15:13.700000
CVE-2024-56074,0,0,a14415b5ae296cd11e2e04c1575df9e68986e1feed991423320ce9c846af3c6a,2024-12-16T16:15:09.250000 CVE-2024-56074,0,0,a14415b5ae296cd11e2e04c1575df9e68986e1feed991423320ce9c846af3c6a,2024-12-16T16:15:09.250000
@ -271244,14 +271254,15 @@ CVE-2024-56174,0,0,3281f470ed49ef5807bf603f02908731fff1047853105938ff5649e5ffd7e
CVE-2024-56175,0,0,22a48fcf93fd39d784b2031be3d0660428d6c59d54d025f00f9098a9f5f6144b,2024-12-18T15:15:13.723000 CVE-2024-56175,0,0,22a48fcf93fd39d784b2031be3d0660428d6c59d54d025f00f9098a9f5f6144b,2024-12-18T15:15:13.723000
CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000 CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000
CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000 CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000
CVE-2024-56198,1,1,ac6612cbcb1f1d330025bdf013693d4c97ad1bd5a42a86f11eae0185ae408070,2024-12-31T16:15:27.247000
CVE-2024-5620,0,0,240638ef58a29a459ed1037710fcf1b7e875e31a78e263978233bb4c4a8442da,2024-11-21T09:48:01.930000 CVE-2024-5620,0,0,240638ef58a29a459ed1037710fcf1b7e875e31a78e263978233bb4c4a8442da,2024-11-21T09:48:01.930000
CVE-2024-56200,0,0,3879bcf029467f661c4f86f22f421720527f4e18cebe03faa8ac0ac24cb0d998,2024-12-19T19:15:08.280000 CVE-2024-56200,0,0,3879bcf029467f661c4f86f22f421720527f4e18cebe03faa8ac0ac24cb0d998,2024-12-19T19:15:08.280000
CVE-2024-56201,0,0,8a150a16c59122912c829dcd4ae74581ec42a93463074adfa3bf7e42e1708846,2024-12-24T02:15:06.580000 CVE-2024-56201,0,0,8a150a16c59122912c829dcd4ae74581ec42a93463074adfa3bf7e42e1708846,2024-12-24T02:15:06.580000
CVE-2024-56203,1,1,87cd3e25a9eb36f353b5ede7cce12e80474d5fa0d0e800dada2c68b85a91c38c,2024-12-31T14:15:25.400000 CVE-2024-56203,0,0,87cd3e25a9eb36f353b5ede7cce12e80474d5fa0d0e800dada2c68b85a91c38c,2024-12-31T14:15:25.400000
CVE-2024-56204,1,1,eec426f5396455f118a0a267bf1fd4ab4987d5297285510170ff16fa0e6391b5,2024-12-31T14:15:25.547000 CVE-2024-56204,0,0,eec426f5396455f118a0a267bf1fd4ab4987d5297285510170ff16fa0e6391b5,2024-12-31T14:15:25.547000
CVE-2024-56205,1,1,9a0f3841073ebbf89dec55ba2314d59c466225592306299e8d627596adb9be68,2024-12-31T13:15:08.803000 CVE-2024-56205,0,0,9a0f3841073ebbf89dec55ba2314d59c466225592306299e8d627596adb9be68,2024-12-31T13:15:08.803000
CVE-2024-56206,1,1,09037a1d42773fe86cf8ab52ec9fc54de9650f782c5a7d16fb472459344c664a,2024-12-31T14:15:25.680000 CVE-2024-56206,0,0,09037a1d42773fe86cf8ab52ec9fc54de9650f782c5a7d16fb472459344c664a,2024-12-31T14:15:25.680000
CVE-2024-56207,1,1,1a69ed56edb9e5f7f1f5307f542fb58b13690e6b6d5b15f16ee8ed26df80a564,2024-12-31T14:15:25.830000 CVE-2024-56207,0,0,1a69ed56edb9e5f7f1f5307f542fb58b13690e6b6d5b15f16ee8ed26df80a564,2024-12-31T14:15:25.830000
CVE-2024-56209,0,0,af796ddb1e278686af452acab93e48795e8ac6892478f6485dfcd1bf2a1f79d9,2024-12-31T11:15:07.173000 CVE-2024-56209,0,0,af796ddb1e278686af452acab93e48795e8ac6892478f6485dfcd1bf2a1f79d9,2024-12-31T11:15:07.173000
CVE-2024-56210,0,0,85c79aee6f65dc95344949ff91273158b7de13483e8e1dff247bdafd0f574e29,2024-12-31T11:15:07.337000 CVE-2024-56210,0,0,85c79aee6f65dc95344949ff91273158b7de13483e8e1dff247bdafd0f574e29,2024-12-31T11:15:07.337000
CVE-2024-56211,0,0,2561ac63bcd02a4c3d6e2563fe50f290b21325c58f8548dae7eb232bdf996af3,2024-12-31T10:15:09.390000 CVE-2024-56211,0,0,2561ac63bcd02a4c3d6e2563fe50f290b21325c58f8548dae7eb232bdf996af3,2024-12-31T10:15:09.390000
@ -271613,6 +271624,7 @@ CVE-2024-56799,0,0,0dd8de9f29ee83d8d3d1718949c04ffed21addd8ed96891a089cf418021b9
CVE-2024-5680,0,0,926c5c2f45d297ec0fa81be8768753266fc85d73f972d4984111118e8fceffa2,2024-11-21T09:48:08.837000 CVE-2024-5680,0,0,926c5c2f45d297ec0fa81be8768753266fc85d73f972d4984111118e8fceffa2,2024-11-21T09:48:08.837000
CVE-2024-56800,0,0,2d9ccaf12da8a18d45c48258f139cc5fdee9e79e0e5d7096bfd7de919c9c0c9a,2024-12-30T19:15:08.333000 CVE-2024-56800,0,0,2d9ccaf12da8a18d45c48258f139cc5fdee9e79e0e5d7096bfd7de919c9c0c9a,2024-12-30T19:15:08.333000
CVE-2024-56801,0,0,ceaecdb1b2443408b3d440c831110179f2ea438cecab41e9ec9b39e4392684c3,2024-12-30T19:15:08.483000 CVE-2024-56801,0,0,ceaecdb1b2443408b3d440c831110179f2ea438cecab41e9ec9b39e4392684c3,2024-12-30T19:15:08.483000
CVE-2024-56802,1,1,da728ab84e76725e7f1ed6578c989f7ec589be40d92bd30231bd6257f075c533,2024-12-31T16:15:28.240000
CVE-2024-5681,0,0,25a463be80d3bb29af40554a62ba0e4276aefee689d98e36dee0bcfe769073f6,2024-11-21T09:48:08.953000 CVE-2024-5681,0,0,25a463be80d3bb29af40554a62ba0e4276aefee689d98e36dee0bcfe769073f6,2024-11-21T09:48:08.953000
CVE-2024-5682,0,0,61babb4b22790f05b1e6fb044157f817a85668af929c91e823c0d3ae99b2f335,2024-09-20T12:30:51.220000 CVE-2024-5682,0,0,61babb4b22790f05b1e6fb044157f817a85668af929c91e823c0d3ae99b2f335,2024-09-20T12:30:51.220000
CVE-2024-5683,0,0,881352e7cddbf9570cae104e43894ad6185c01dcb07cd1be33b2f8fea4b1c33b,2024-11-21T09:48:09.327000 CVE-2024-5683,0,0,881352e7cddbf9570cae104e43894ad6185c01dcb07cd1be33b2f8fea4b1c33b,2024-11-21T09:48:09.327000

Can't render this file because it is too large.