Auto-Update: 2024-11-28T00:58:39.707859+00:00

This commit is contained in:
cad-safe-bot 2024-11-28 01:01:52 +00:00
parent c259fbdb92
commit 776d8bf3df
24 changed files with 1128 additions and 49 deletions

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9351",
"sourceIdentifier": "security@android.com",
"published": "2024-11-27T23:15:04.343",
"lastModified": "2024-11-27T23:15:04.343",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In ih264e_fmt_conv_420p_to_420sp of ih264e_fmt_conv.c there is a possible out of bound read due to missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9352",
"sourceIdentifier": "security@android.com",
"published": "2024-11-27T23:15:04.467",
"lastModified": "2024-11-27T23:15:04.467",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In ihevcd_allocate_dynamic_bufs of ihevcd_api.c there is a possible resource exhaustion due to integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9353",
"sourceIdentifier": "security@android.com",
"published": "2024-11-27T23:15:04.560",
"lastModified": "2024-11-27T23:15:04.560",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In ihevcd_parse_slice_data of ihevcd_parse_slice.c there is a possible heap buffer out of bound read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9354",
"sourceIdentifier": "security@android.com",
"published": "2024-11-27T23:15:04.650",
"lastModified": "2024-11-27T23:15:04.650",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In VideoFrameScheduler.cpp of VideoFrameScheduler::PLL::fit, there is a\u00a0possible remote denial of service due to divide by 0. This could lead to\u00a0remote denial of service with no additional execution privileges needed.\u00a0User interaction is needed for exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2018-9374",
"sourceIdentifier": "security@android.com",
"published": "2024-11-28T00:15:03.827",
"lastModified": "2024-11-28T00:15:03.827",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In installPackageLI of PackageManagerService.java, there is a possible\u00a0permissions bypass. This could lead to local escalation of privilege with\u00a0User execution privileges needed. User interaction is not needed for\u00a0exploitation."
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01",
"source": "security@android.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11787",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-28T00:15:04.000",
"lastModified": "2024-11-28T00:15:04.000",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fuji Electric Monitouch V-SFT V10 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of V10 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24413."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1614/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11789",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-28T00:15:04.153",
"lastModified": "2024-11-28T00:15:04.153",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fuji Electric Monitouch V-SFT V10 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of V10 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24448."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1615/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11790",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-28T00:15:04.297",
"lastModified": "2024-11-28T00:15:04.297",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fuji Electric Monitouch V-SFT V10 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of V10 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24449."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1616/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11791",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-28T00:15:04.467",
"lastModified": "2024-11-28T00:15:04.467",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fuji Electric Monitouch V-SFT V8C File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of V8C files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24450."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1617/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11792",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-28T00:15:04.603",
"lastModified": "2024-11-28T00:15:04.603",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fuji Electric Monitouch V-SFT V8 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of V8 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24502."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1618/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11793",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-28T00:15:04.730",
"lastModified": "2024-11-28T00:15:04.730",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fuji Electric Monitouch V-SFT V9C File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of V9C files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24503."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1619/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11794",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-28T00:15:04.883",
"lastModified": "2024-11-28T00:15:04.883",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fuji Electric Monitouch V-SFT V10 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of V10 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24504."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1620/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11795",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-28T00:15:05.017",
"lastModified": "2024-11-28T00:15:05.017",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fuji Electric Monitouch V-SFT V8 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of V8 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24505."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1621/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11796",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-28T00:15:05.173",
"lastModified": "2024-11-28T00:15:05.173",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fuji Electric Monitouch V-SFT V9C File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of V9C files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24506."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1622/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11797",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-28T00:15:05.323",
"lastModified": "2024-11-28T00:15:05.323",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fuji Electric Monitouch V-SFT V8 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of V8 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24662."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1623/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11798",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-28T00:15:05.463",
"lastModified": "2024-11-28T00:15:05.463",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fuji Electric Monitouch V-SFT X1 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of X1 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24663."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1624/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11799",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-28T00:15:05.603",
"lastModified": "2024-11-28T00:15:05.603",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fuji Electric Tellus Lite V-Simulator 5 V8 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of V8 files in the V-Simulator 5 component. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24664."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1625/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11800",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-28T00:15:05.747",
"lastModified": "2024-11-28T00:15:05.747",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fuji Electric Tellus Lite V-Simulator 5 V8 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of V8 files in the V-Simulator 5 component. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24768."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1626/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11801",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-28T00:15:05.873",
"lastModified": "2024-11-28T00:15:05.873",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fuji Electric Tellus Lite V-Simulator 5 V8 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of V8 files in the V-Simulator 5 component. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24769."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1627/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11802",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-28T00:15:06.007",
"lastModified": "2024-11-28T00:15:06.007",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fuji Electric Tellus Lite V-Simulator 5 V8 File Parsing Stack-Based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of V8 files in the V-Simulator 5 component. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24770."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1628/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11803",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-28T00:15:06.143",
"lastModified": "2024-11-28T00:15:06.143",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fuji Electric Tellus Lite V-Simulator 5 V8 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Tellus Lite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of V8 files in the V-Simulator 5 component. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24771."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1629/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-11933",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2024-11-28T00:15:06.283",
"lastModified": "2024-11-28T00:15:06.283",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Fuji Electric Monitouch V-SFT X1 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Fuji Electric Monitouch V-SFT. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of X1 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24548."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1630/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-27T23:00:54.090821+00:00
2024-11-28T00:58:39.707859+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-27T22:15:05.833000+00:00
2024-11-28T00:15:06.283000+00:00
```
### Last Data Feed Release
@ -33,41 +33,41 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
271535
271557
```
### CVEs added in the last Commit
Recently added CVEs: `10`
Recently added CVEs: `22`
- [CVE-2017-13320](CVE-2017/CVE-2017-133xx/CVE-2017-13320.json) (`2024-11-27T22:15:04.800`)
- [CVE-2017-13321](CVE-2017/CVE-2017-133xx/CVE-2017-13321.json) (`2024-11-27T22:15:04.900`)
- [CVE-2017-13323](CVE-2017/CVE-2017-133xx/CVE-2017-13323.json) (`2024-11-27T22:15:04.983`)
- [CVE-2018-9349](CVE-2018/CVE-2018-93xx/CVE-2018-9349.json) (`2024-11-27T22:15:05.090`)
- [CVE-2018-9350](CVE-2018/CVE-2018-93xx/CVE-2018-9350.json) (`2024-11-27T22:15:05.197`)
- [CVE-2024-51364](CVE-2024/CVE-2024-513xx/CVE-2024-51364.json) (`2024-11-21T20:15:44.020`)
- [CVE-2024-53260](CVE-2024/CVE-2024-532xx/CVE-2024-53260.json) (`2024-11-27T22:15:05.353`)
- [CVE-2024-53858](CVE-2024/CVE-2024-538xx/CVE-2024-53858.json) (`2024-11-27T22:15:05.520`)
- [CVE-2024-53859](CVE-2024/CVE-2024-538xx/CVE-2024-53859.json) (`2024-11-27T22:15:05.673`)
- [CVE-2024-53860](CVE-2024/CVE-2024-538xx/CVE-2024-53860.json) (`2024-11-27T22:15:05.833`)
- [CVE-2018-9351](CVE-2018/CVE-2018-93xx/CVE-2018-9351.json) (`2024-11-27T23:15:04.343`)
- [CVE-2018-9352](CVE-2018/CVE-2018-93xx/CVE-2018-9352.json) (`2024-11-27T23:15:04.467`)
- [CVE-2018-9353](CVE-2018/CVE-2018-93xx/CVE-2018-9353.json) (`2024-11-27T23:15:04.560`)
- [CVE-2018-9354](CVE-2018/CVE-2018-93xx/CVE-2018-9354.json) (`2024-11-27T23:15:04.650`)
- [CVE-2018-9374](CVE-2018/CVE-2018-93xx/CVE-2018-9374.json) (`2024-11-28T00:15:03.827`)
- [CVE-2024-11787](CVE-2024/CVE-2024-117xx/CVE-2024-11787.json) (`2024-11-28T00:15:04.000`)
- [CVE-2024-11789](CVE-2024/CVE-2024-117xx/CVE-2024-11789.json) (`2024-11-28T00:15:04.153`)
- [CVE-2024-11790](CVE-2024/CVE-2024-117xx/CVE-2024-11790.json) (`2024-11-28T00:15:04.297`)
- [CVE-2024-11791](CVE-2024/CVE-2024-117xx/CVE-2024-11791.json) (`2024-11-28T00:15:04.467`)
- [CVE-2024-11792](CVE-2024/CVE-2024-117xx/CVE-2024-11792.json) (`2024-11-28T00:15:04.603`)
- [CVE-2024-11793](CVE-2024/CVE-2024-117xx/CVE-2024-11793.json) (`2024-11-28T00:15:04.730`)
- [CVE-2024-11794](CVE-2024/CVE-2024-117xx/CVE-2024-11794.json) (`2024-11-28T00:15:04.883`)
- [CVE-2024-11795](CVE-2024/CVE-2024-117xx/CVE-2024-11795.json) (`2024-11-28T00:15:05.017`)
- [CVE-2024-11796](CVE-2024/CVE-2024-117xx/CVE-2024-11796.json) (`2024-11-28T00:15:05.173`)
- [CVE-2024-11797](CVE-2024/CVE-2024-117xx/CVE-2024-11797.json) (`2024-11-28T00:15:05.323`)
- [CVE-2024-11798](CVE-2024/CVE-2024-117xx/CVE-2024-11798.json) (`2024-11-28T00:15:05.463`)
- [CVE-2024-11799](CVE-2024/CVE-2024-117xx/CVE-2024-11799.json) (`2024-11-28T00:15:05.603`)
- [CVE-2024-11800](CVE-2024/CVE-2024-118xx/CVE-2024-11800.json) (`2024-11-28T00:15:05.747`)
- [CVE-2024-11801](CVE-2024/CVE-2024-118xx/CVE-2024-11801.json) (`2024-11-28T00:15:05.873`)
- [CVE-2024-11802](CVE-2024/CVE-2024-118xx/CVE-2024-11802.json) (`2024-11-28T00:15:06.007`)
- [CVE-2024-11803](CVE-2024/CVE-2024-118xx/CVE-2024-11803.json) (`2024-11-28T00:15:06.143`)
- [CVE-2024-11933](CVE-2024/CVE-2024-119xx/CVE-2024-11933.json) (`2024-11-28T00:15:06.283`)
### CVEs modified in the last Commit
Recently modified CVEs: `12`
Recently modified CVEs: `0`
- [CVE-2024-11392](CVE-2024/CVE-2024-113xx/CVE-2024-11392.json) (`2024-11-27T21:55:00.983`)
- [CVE-2024-11393](CVE-2024/CVE-2024-113xx/CVE-2024-11393.json) (`2024-11-27T21:54:58.570`)
- [CVE-2024-11394](CVE-2024/CVE-2024-113xx/CVE-2024-11394.json) (`2024-11-27T21:54:52.887`)
- [CVE-2024-31484](CVE-2024/CVE-2024-314xx/CVE-2024-31484.json) (`2024-11-27T21:15:07.400`)
- [CVE-2024-50187](CVE-2024/CVE-2024-501xx/CVE-2024-50187.json) (`2024-11-27T21:33:58.713`)
- [CVE-2024-50303](CVE-2024/CVE-2024-503xx/CVE-2024-50303.json) (`2024-11-27T21:29:30.267`)
- [CVE-2024-50304](CVE-2024/CVE-2024-503xx/CVE-2024-50304.json) (`2024-11-27T21:20:08.113`)
- [CVE-2024-50651](CVE-2024/CVE-2024-506xx/CVE-2024-50651.json) (`2024-11-27T21:15:07.573`)
- [CVE-2024-52951](CVE-2024/CVE-2024-529xx/CVE-2024-52951.json) (`2024-11-27T21:15:07.997`)
- [CVE-2024-53042](CVE-2024/CVE-2024-530xx/CVE-2024-53042.json) (`2024-11-27T21:09:40.700`)
- [CVE-2024-53597](CVE-2024/CVE-2024-535xx/CVE-2024-53597.json) (`2024-11-27T21:15:08.170`)
- [CVE-2024-9420](CVE-2024/CVE-2024-94xx/CVE-2024-9420.json) (`2024-11-27T21:15:08.357`)
## Download and Usage

View File

@ -97070,9 +97070,9 @@ CVE-2017-13315,0,0,d16ea5a6b80ed40589c9b9f086a0f1c6ce65bee6281581573bcff9f10ee7e
CVE-2017-13316,0,0,5db58d5fcffc666dbf46dcd9ec43d4700444ee57d99469243ffa93bd56c0868d,2024-11-27T20:15:22.363000
CVE-2017-13319,0,0,1d1b7dfdf2779ff2945134b62ddc3791719a4e5d79b113376b0605acf4afdecc,2024-11-27T20:15:22.493000
CVE-2017-1332,0,0,784a9ee8c3796f2a11ff24e95ae95a08508911f60f6ead21d91e6503f5824554,2017-08-03T15:46:39.147000
CVE-2017-13320,1,1,de91243412dd43ee85eff8af5b611185796470ba65437f956b129b0a7ac18300,2024-11-27T22:15:04.800000
CVE-2017-13321,1,1,3ef527fe1b1c77388a090f66cd4fc38df7299a309df655e09080f710af7f68a8,2024-11-27T22:15:04.900000
CVE-2017-13323,1,1,b846dc8e55e399e7a1e6836361bb561a98765f43d77858d6935ca27ca897203c,2024-11-27T22:15:04.983000
CVE-2017-13320,0,0,de91243412dd43ee85eff8af5b611185796470ba65437f956b129b0a7ac18300,2024-11-27T22:15:04.800000
CVE-2017-13321,0,0,3ef527fe1b1c77388a090f66cd4fc38df7299a309df655e09080f710af7f68a8,2024-11-27T22:15:04.900000
CVE-2017-13323,0,0,b846dc8e55e399e7a1e6836361bb561a98765f43d77858d6935ca27ca897203c,2024-11-27T22:15:04.983000
CVE-2017-1333,0,0,3ec8913dbfad3ccab38e891f6e15f9a0101bb53e4d210c158476cd692803a999,2017-11-16T17:13:42.270000
CVE-2017-1334,0,0,406b3dd86a0e9fb2c9a541dafaa2903ce89044fcfe05700f9700b783b2647a7d,2017-10-10T15:07:22.713000
CVE-2017-1335,0,0,b4a4c4ceab320c0448477587defc160489b79dc191839b439254c53bf621ace5,2017-10-10T15:08:05.843000
@ -126911,8 +126911,12 @@ CVE-2018-9345,0,0,9088018caabf82275cae10a91c6c951b29b1132e400477d435fc3e026fbf10
CVE-2018-9346,0,0,7b3ffcf2c599b1ca45fc9362a7edc8a6b7cb4040a988482d54ba2191d8e834c0,2024-11-22T16:26:16.143000
CVE-2018-9347,0,0,004e6ddc7f66bf50b522d5dc4068b89ca2d1ec23406d1738d4ef275b0261e9d4,2018-12-27T13:51:37.067000
CVE-2018-9348,0,0,1e52cd3e7fe64078256a975e9434db6f814769b9353caff59c9044c95fe7f30c,2024-11-22T21:14:05.813000
CVE-2018-9349,1,1,1ec898f6f78e054584e11b8f72b4678ecddc41ba346c89b86409a5b107146e43,2024-11-27T22:15:05.090000
CVE-2018-9350,1,1,4a1d2f92bfae5d6df3c835ec5f8b5a6cd6d525e155781cadf73bd709e4a84044,2024-11-27T22:15:05.197000
CVE-2018-9349,0,0,1ec898f6f78e054584e11b8f72b4678ecddc41ba346c89b86409a5b107146e43,2024-11-27T22:15:05.090000
CVE-2018-9350,0,0,4a1d2f92bfae5d6df3c835ec5f8b5a6cd6d525e155781cadf73bd709e4a84044,2024-11-27T22:15:05.197000
CVE-2018-9351,1,1,9c8dc76f325443d2af09564f69a7d6289b0498b7244f03d79b61c3b4a50b4c4d,2024-11-27T23:15:04.343000
CVE-2018-9352,1,1,8ece7877aa94119895e2fd49311f9899770d4dda8ae2d811be2cb2d5341165eb,2024-11-27T23:15:04.467000
CVE-2018-9353,1,1,c522d18fc4abc6f6a0a63f1deada0c502f1b5f96434a80e3e9a1c3c391f6d4f0,2024-11-27T23:15:04.560000
CVE-2018-9354,1,1,043e16cd6bd66c9b34f19d6cdddb5b438e1e4de0a18dd80cef438f00d49545ef,2024-11-27T23:15:04.650000
CVE-2018-9355,0,0,e8ee2b8217cc4365fa52ec9ad40dda0902bdca6141010bdb87ba36c76908b916,2018-12-14T21:00:55.643000
CVE-2018-9356,0,0,21c7b89f47d2b248793d1becde812d30b3640d909c40ac658a8c842107272366,2018-12-14T21:00:15.003000
CVE-2018-9357,0,0,b108f834ec62803dd7e497cf27a71d840f665249e07751f13a6e34a3e56225ce,2018-12-12T15:44:27.167000
@ -126931,6 +126935,7 @@ CVE-2018-9369,0,0,aba8b31bfaad07093e35204c3acbfdd205ba52be28c76bf4d75bf1f22d977b
CVE-2018-9370,0,0,ae53e355aa0524bf60f4d348ee71944e38f6c6c59f44b44474743ec3d5eda58d,2024-11-22T21:24:57.467000
CVE-2018-9371,0,0,dce1635a39fc875c3a6010e78992681138a4af74d8f57da615da4dd9d5becbf0,2024-11-22T21:25:48.853000
CVE-2018-9372,0,0,5241fff5e37359ca4d40d4d0ef51eddfb8e42f03921d8e136fe460686e5ef5c0,2024-11-19T21:56:45.533000
CVE-2018-9374,1,1,98a6fbbb04a2957aedc1b044162badd058f6e51b87cbbbc6085ee46fbc44a729,2024-11-28T00:15:03.827000
CVE-2018-9385,0,0,a04751693f742cd9abca42cb6fa43b673fbcc24bbf305f54b6cb4b8b3d812bd4,2018-12-12T21:37:19.207000
CVE-2018-9409,0,0,ebcda6f7e24e6f698fa6ccd47d9f60bf8bc1c7442cbc31f290fa0b923152d8a0,2024-11-20T20:35:04.480000
CVE-2018-9410,0,0,67eeebcbba32822e3887bccb33fae18efb160aec58d1cb7ea07ebe4be1e04e64,2024-11-22T22:28:51.533000
@ -243575,9 +243580,9 @@ CVE-2024-11385,0,0,b8c574c75cf2cea00a757d377dc474503f06328c73f6861f0cd8dff47b3ce
CVE-2024-11387,0,0,570819d44f260948aed21f18e713c0988e86544acdb78701fe81de7ec470e4a6,2024-11-23T05:15:06.833000
CVE-2024-11388,0,0,cc4ce5951e6443c6719f0b47e25fd91148c8919ab17cf08bd038e67541d941d5,2024-11-26T17:23:56.647000
CVE-2024-1139,0,0,3dc684f5c9c2296003368c61d669c2f327953a7aefcd4f9a72abdc4b058cbe13,2024-05-16T23:15:47.323000
CVE-2024-11392,0,1,1e5f2ec38300a521839918df7c104887d1b6dd0c3952db0a36cb8a2513cfddaf,2024-11-27T21:55:00.983000
CVE-2024-11393,0,1,19dee016144f4c49671550a1a20a1c722bca8a9d767501dcdfc03cfe728a7c2b,2024-11-27T21:54:58.570000
CVE-2024-11394,0,1,ed715a5643cd62dc08ee2cf492057b775795efb9422c8c56a37f188481d1231f,2024-11-27T21:54:52.887000
CVE-2024-11392,0,0,1e5f2ec38300a521839918df7c104887d1b6dd0c3952db0a36cb8a2513cfddaf,2024-11-27T21:55:00.983000
CVE-2024-11393,0,0,19dee016144f4c49671550a1a20a1c722bca8a9d767501dcdfc03cfe728a7c2b,2024-11-27T21:54:58.570000
CVE-2024-11394,0,0,ed715a5643cd62dc08ee2cf492057b775795efb9422c8c56a37f188481d1231f,2024-11-27T21:54:52.887000
CVE-2024-11395,0,0,e97b88024677a483ae4a42afe9a8440978faa48e4e721bb1c822953f8252b946,2024-11-19T21:56:45.533000
CVE-2024-1140,0,0,346c2ed0aaabc419b4aefe2cf8513b81b972566618f29982168bc7166c832ab2,2024-02-27T19:17:32.253000
CVE-2024-11400,0,0,2b6a39a96cf5696646b5b9e32fab47bfc23a160a64905ed162280ce11db7d350,2024-11-25T15:02:53.013000
@ -243785,8 +243790,24 @@ CVE-2024-1175,0,0,190484da8a43d8915393af59d3a99a603fc65c2c05796109a63c7e3028461e
CVE-2024-1176,0,0,3a9729597b8ae5d1f7a6b2981371f9af662d86aa4ba3ac1ac5a3a2992dbcfc6a,2024-03-13T18:16:18.563000
CVE-2024-1177,0,0,d9cdcff987bd78d6f32a7f8b0a8d2970109268852041331a890d212ad12ebb88,2024-02-13T14:06:04.817000
CVE-2024-1178,0,0,1ff4a71536018366c289bfb8a1aa1adef7208a3ae26719efcdb84bec870fcd3d,2024-03-05T13:41:01.900000
CVE-2024-11787,1,1,8884b7c43bffdc761343b898533952062d862c4863a9b6bcdc4c5c48c1360306,2024-11-28T00:15:04
CVE-2024-11789,1,1,d06b95e66e5a22c78892acbd98b353175ae61fe9608345830498ff2e4f5fdb23,2024-11-28T00:15:04.153000
CVE-2024-1179,0,0,18b2d0d135c66f5f21d2d252edc06809b11030eef4b80a686f580bba7c87222c,2024-04-02T12:50:42.233000
CVE-2024-11790,1,1,7eb0efb57861215d25474c9177a9b5846faf133f14c18a77853199cc14929512,2024-11-28T00:15:04.297000
CVE-2024-11791,1,1,f7812facc833566721316fedb7fc13ab5fda3902d97cca96c1e9a04c70f6ce62,2024-11-28T00:15:04.467000
CVE-2024-11792,1,1,724265a84bf5adbc66d134c3e007b45dde7354148574ac833d7840743d528d86,2024-11-28T00:15:04.603000
CVE-2024-11793,1,1,4f3f24004a83dffb075d3766670bb1f47439f6afdd8003bba20bd8941410dc1a,2024-11-28T00:15:04.730000
CVE-2024-11794,1,1,71af81b031f48800032ea660984c279b031b17bf80e20d95e76454e481374a42,2024-11-28T00:15:04.883000
CVE-2024-11795,1,1,4d86cb62ace95a984949122078c830a55ddcd9651627f072a68610a81f11cc16,2024-11-28T00:15:05.017000
CVE-2024-11796,1,1,d34e310658f8306339ba7b6f3b0bc7ddf2283092bf7e37f360abebfe2a77d0c3,2024-11-28T00:15:05.173000
CVE-2024-11797,1,1,09f562a8cec3f54f1200a3a350f5254ad41da142ee62c861567d0bf2cf7a0ccb,2024-11-28T00:15:05.323000
CVE-2024-11798,1,1,e442f0b00f0382a9e026e028e005f3773bd40e2e3b3c712c69a3e592929720ba,2024-11-28T00:15:05.463000
CVE-2024-11799,1,1,21b96b10b4ae8a3e7ce2ac91ee6d2ef180e896d673e06481b2cbe4e89a06dbfb,2024-11-28T00:15:05.603000
CVE-2024-1180,0,0,bb83e3fdc0a8f87f14b71aa596dc16c65435770562b16333b2c46b0a903dc99c,2024-04-03T17:24:18.150000
CVE-2024-11800,1,1,452e646ca4272df50dba618a6bbe5597902065fb71dbf212269417af86b3c28f,2024-11-28T00:15:05.747000
CVE-2024-11801,1,1,9f7fb4a596ccaeab8fec5833422864785f9b02d4e4cdf4de8584f0f02ff993f7,2024-11-28T00:15:05.873000
CVE-2024-11802,1,1,6f4d24723a8ed97073be195e50e0db56014f2b2ea65777a9a07412229fff3a98,2024-11-28T00:15:06.007000
CVE-2024-11803,1,1,81a74b13e4dbf770a17aeec0a98f9e92d283ae44a8459caff765261ca92e6496,2024-11-28T00:15:06.143000
CVE-2024-1181,0,0,3ab1ccda9f702c4fc6b350844c2c0edd9e45550807a44d2d8746213d5ed7378e,2024-03-20T13:00:16.367000
CVE-2024-11817,0,0,878ee2179044a99d330d167a93477de960b6cf592f6203d72eec9805c4d5d74a,2024-11-26T23:15:04.990000
CVE-2024-11818,0,0,db7694cd2fdcae7c78aac428fa42653e88b1d41dfdd73e2502c588c9613c4f73,2024-11-27T00:15:17.727000
@ -243807,6 +243828,7 @@ CVE-2024-1190,0,0,97174d698ee0a283db94af4be93c59e8a1814d898054ed7eb2fd6bfac02921
CVE-2024-1191,0,0,6e38ed7db5944087a721298d0ec64e89db09082a4119551dba4b0f62276916e5,2024-05-17T02:35:17.640000
CVE-2024-1192,0,0,2496c5c2bd24b6b1e653d79a0dbb975771788d1c54262403d529d1a596a31073,2024-05-17T02:35:17.743000
CVE-2024-1193,0,0,ffb9a4095d8f9913e32a4a9fb84e7d515c719215bffa9c1271257c84c947030d,2024-05-17T02:35:17.833000
CVE-2024-11933,1,1,3433d4a1e3008dbc27cbfa1dc50a084b7635bb7e5060f72b313d4ef9f8b985f0,2024-11-28T00:15:06.283000
CVE-2024-1194,0,0,2ada7ec0067a4a6c15e16c8b6d60d2605ff0ff50c80d53e3de0a5fe7493767f7,2024-05-17T02:35:17.933000
CVE-2024-1195,0,0,524480b99d81e527b71e9b6d2b12e0f3d16697f860efe8d11194cd8cf60ecd57,2024-05-17T02:35:18.037000
CVE-2024-1196,0,0,173789435a8c6c5c60dcb01ff025ba37f5dda093bc9fc2e5668920b347e89874,2024-06-26T15:15:19.377000
@ -253271,7 +253293,7 @@ CVE-2024-31480,0,0,86a08888be6144dad7f109bcbc1e02bef137f5ec61892a589a8c1d32bdd1d
CVE-2024-31481,0,0,3cfd49abb9f667805e469e5ad5364d7cc935c3e4cd673de3efb106e0bfc78efb,2024-07-03T01:55:02.813000
CVE-2024-31482,0,0,89e6919adebfceffee7b9ef72fc557a7257e2359e0de4d03c9ea7df82ed31700,2024-07-03T01:55:03.583000
CVE-2024-31483,0,0,519829a2f9d5dd95c3e6944bc92a380bac70999db81f241e46039c30f2ff0d28,2024-05-15T16:40:19.330000
CVE-2024-31484,0,1,659d2e969344deede1af2ac26a238cb0f51c82aeb2ea05f6e3ba4fe2a034a834,2024-11-27T21:15:07.400000
CVE-2024-31484,0,0,659d2e969344deede1af2ac26a238cb0f51c82aeb2ea05f6e3ba4fe2a034a834,2024-11-27T21:15:07.400000
CVE-2024-31485,0,0,95e7eeaa8d3876cb40bd1169861bc0a7332c54b51b97ae90600f4cdafa502dad,2024-07-04T07:15:10.720000
CVE-2024-31486,0,0,8bbeb872b9695d04b4cd3936fc99563ad2e7fa2388523728e9f4697b70eb399e,2024-07-04T07:15:10.823000
CVE-2024-31487,0,0,368cd96ee83829999b330b1c4a6d940da3ad3f90b7509cd8e5ad307aa0e2655f,2024-04-10T13:24:22.187000
@ -266003,7 +266025,7 @@ CVE-2024-50183,0,0,1a5c85761b67f4951d4aead272e8cbaeeb6fb4ad164fc8c52190afa66b399
CVE-2024-50184,0,0,cb05ed3cbf4320d0b6539ece765682947c4e4dd01f32eb669ed72a68abce565e,2024-11-08T19:01:03.880000
CVE-2024-50185,0,0,595738e2988b3e2c25066779b5891f8412116ebeed8b468125ac9343052411c0,2024-11-08T19:01:03.880000
CVE-2024-50186,0,0,dc12eba11107a35c5b7f7b4fe757f427daaaa77d7848dff65a7950111c79ee69,2024-11-08T19:01:03.880000
CVE-2024-50187,0,1,607048623b7e0497d5b4d09af6eed758877b192144932ed6b00d55e35de54033,2024-11-27T21:33:58.713000
CVE-2024-50187,0,0,607048623b7e0497d5b4d09af6eed758877b192144932ed6b00d55e35de54033,2024-11-27T21:33:58.713000
CVE-2024-50188,0,0,a0f9600f02706c4c4c201ae8fa928c2340849d4ff2323579e41ceb41b53346b3,2024-11-27T16:14:31.370000
CVE-2024-50189,0,0,5d4f496901033a53673f3eb245c0783e3367982581bb1f34ad55281445cbc8bd,2024-11-27T16:16:12.133000
CVE-2024-5019,0,0,208ddc99e1f67b7d6822e7ee095131f1b9c059678d4d2eeb2b2f9eae704845da,2024-08-21T13:43:03.670000
@ -266127,8 +266149,8 @@ CVE-2024-5030,0,0,bb4b715ea840400227e7a7cb9b03010c40389d422c5926920262a0b6d21748
CVE-2024-50300,0,0,357f2775ab252a4a06a076fcdc9db464e297da34ef827354cfabd45ea720901e,2024-11-19T21:57:32.967000
CVE-2024-50301,0,0,6032947c407edcb765791472d12ec09751cf709dcb1308b0f858d51bd46219d3,2024-11-19T21:57:32.967000
CVE-2024-50302,0,0,c276d48aa253104f6ab94ac380d2127bc623569a115a2b5fb8d69864e82f6893,2024-11-27T15:27:00.187000
CVE-2024-50303,0,1,bc6cc55b32c0f00ab508749d7c62fbc3dbe6ae3c9749209c3284b75426b67658,2024-11-27T21:29:30.267000
CVE-2024-50304,0,1,ab4ac6c83c5fcd0daa3f28b1fef9d12686959148cc70f8acad5f569d84c52c37,2024-11-27T21:20:08.113000
CVE-2024-50303,0,0,bc6cc55b32c0f00ab508749d7c62fbc3dbe6ae3c9749209c3284b75426b67658,2024-11-27T21:29:30.267000
CVE-2024-50304,0,0,ab4ac6c83c5fcd0daa3f28b1fef9d12686959148cc70f8acad5f569d84c52c37,2024-11-27T21:20:08.113000
CVE-2024-50305,0,0,b03fd6d501d19d7b209a06f202d725af272151828bcd7418064455026a0a9df5,2024-11-15T13:58:08.913000
CVE-2024-50306,0,0,99b8de1207b2fdc71c13146c7372e7163a77f6f60a3176c55d7bfb57d63fa38c,2024-11-15T13:58:08.913000
CVE-2024-50307,0,0,6d2dcfccb50c0c30fd7d9bda3b36490982da8110db31d087befc4509a1d360cd,2024-10-28T13:58:09.230000
@ -266422,7 +266444,7 @@ CVE-2024-50648,0,0,8d88e1a56eec66687b18c12dd639177f29571163e2e04fe20c5aaa77060d8
CVE-2024-50649,0,0,30f98c934ecd40b39fb07714211655ed46ad00ddd9fab5b075877284c12cdf85,2024-11-18T17:11:56.587000
CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000
CVE-2024-50650,0,0,79073e45a142b2e7e0b1ffcbc4f3efa33ba6c864e47e5edadaac92d5aa2c4220,2024-11-18T17:11:56.587000
CVE-2024-50651,0,1,011c4281624dacbc96bb39ed41c7067acfaaf24f648047c3bd252399725a9be8,2024-11-27T21:15:07.573000
CVE-2024-50651,0,0,011c4281624dacbc96bb39ed41c7067acfaaf24f648047c3bd252399725a9be8,2024-11-27T21:15:07.573000
CVE-2024-50652,0,0,c46d900b0ec3c3d3dc69c000a8af48eff0cdc2a83f00bffa34618c3851a639e9,2024-11-18T17:11:56.587000
CVE-2024-50653,0,0,351b2ae0bb07d369ff4e76cbcc39f43676534cf729c0eb11791224a2ac34f76b,2024-11-20T15:36:20.257000
CVE-2024-50654,0,0,852ec98b8770e8761131177d563306c16f9d93ec13622504cc7153f7938dd76e,2024-11-20T15:27:08.580000
@ -266666,7 +266688,7 @@ CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c
CVE-2024-51358,0,0,15a6b357b2a15ba2efd09a7258436a688d09605b686100927239b26110c73a5e,2024-11-07T20:35:14.957000
CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000
CVE-2024-51362,0,0,a6e1a40cf5e527208990e8a764ceb58cfefd7f1b5e4a2c9e1905064ef69946f2,2024-11-06T20:35:35.750000
CVE-2024-51364,1,1,14b2dee82d01d7389bab3881eda1c802d61b28380989b485af4049ffc6cb6a67,2024-11-27T21:15:07.797000
CVE-2024-51364,0,0,14b2dee82d01d7389bab3881eda1c802d61b28380989b485af4049ffc6cb6a67,2024-11-27T21:15:07.797000
CVE-2024-51367,0,0,321834f3c68e231d48212ed0455e22a6133cdcee14f287745838cf2ad31fdf76,2024-11-27T17:15:13.207000
CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000
CVE-2024-51377,0,0,cf00c0a6e7d0ac48895095961c732d7f23ec2a7e49679df67603156d82aefffb,2024-11-14T23:23:52.997000
@ -267521,7 +267543,7 @@ CVE-2024-52945,0,0,63027697b61e71930738cff69e21a659b1ff06f97d852d7c9fcc49bfd7768
CVE-2024-52946,0,0,ef4806982226269ca873cfccc34dff633254ace5ad4fa6e29d31cbf5dd0c16de,2024-11-18T17:11:17.393000
CVE-2024-52947,0,0,032f06f1ece995cd81c8fde69d4726dfc9340376c69a3aad6534cd5f5b5e3ade,2024-11-18T18:35:09.517000
CVE-2024-5295,0,0,a4e592514ef2498b5a4a173dae0a6cbcfb9c607b7fa3ff86ebe7c3784f138898,2024-05-24T01:15:30.977000
CVE-2024-52951,0,1,4f77302715e291bd3843554a9356d88678d030837403f75cea194d660ae12efa,2024-11-27T21:15:07.997000
CVE-2024-52951,0,0,4f77302715e291bd3843554a9356d88678d030837403f75cea194d660ae12efa,2024-11-27T21:15:07.997000
CVE-2024-52958,0,0,6ac9e217d9bc0433c548430fb0f3b6b9332a74d03a1b74c65d1c288770e97224,2024-11-27T06:15:18.590000
CVE-2024-52959,0,0,ec1380cbf80c452cc4c173df77383a977439e1ad3214342e17040813236ddc54,2024-11-27T06:15:19.083000
CVE-2024-5296,0,0,9bd527352a89f2b4ccfc677e3fc5feb9bb09c1923dac2d4ba397c3469bcfc648,2024-05-24T01:15:30.977000
@ -267533,7 +267555,7 @@ CVE-2024-5301,0,0,e6554ba8ce305faf67a147a1164dfd0369262e65017220af5d0bddff099286
CVE-2024-5302,0,0,39889567f28c32113cd40d7a6613b67998b6932facc1ad2f99b57c33f7aef565,2024-09-25T15:22:17.627000
CVE-2024-5303,0,0,217ef39fe65f9c942556432bd246389e62862800142bbf571d971052d849f886,2024-09-25T15:24:18.680000
CVE-2024-5304,0,0,d968010935b9808df14ec3827c68c660e5030ff1e10dd473ede1e120c2d0020a,2024-08-23T15:06:10.100000
CVE-2024-53042,0,1,d7e0d4c1a2c730be549db3ae70702c5a27a3ad932f1d5de3c69038d87b197c91,2024-11-27T21:09:40.700000
CVE-2024-53042,0,0,d7e0d4c1a2c730be549db3ae70702c5a27a3ad932f1d5de3c69038d87b197c91,2024-11-27T21:09:40.700000
CVE-2024-53043,0,0,8605345b311f80d829276d5452f92df6619a24b70030cd2d41c05e3973bef2d1,2024-11-22T22:22:03.963000
CVE-2024-53044,0,0,13db87ec8352bc7d7a9e5edecc2ddf5bacb85c33a4ca911a96d3b6b927e39574,2024-11-27T16:40:06.963000
CVE-2024-53045,0,0,153919019dd492ee2f8a4bd103dc9fb649fa232c55f1697b430888fbb999af0c,2024-11-27T16:41:06.737000
@ -267608,7 +267630,7 @@ CVE-2024-53254,0,0,ee53e9b703f27318442647deb86c75e2def0aedf5170eb37f9fbf3bd5e253
CVE-2024-53255,0,0,d61a8d7710c40f67983bd99e9267ded1e91d86ea0747c698bd8cab97316873cd,2024-11-25T19:15:11.760000
CVE-2024-53258,0,0,a915b82637f40f0c10b7fb4e3ffc3bc669fcfe23ea0f5d157743938cb68f10dd,2024-11-25T20:15:10.030000
CVE-2024-5326,0,0,2be4cbe8832da29a051a88af0386c312f2db765fd88a5b2a911937a61354bc30,2024-05-30T13:15:41.297000
CVE-2024-53260,1,1,f8456e8751226ee5d041fd86437235b7d18924e40a17ade86dc5cd10d0203ce0,2024-11-27T22:15:05.353000
CVE-2024-53260,0,0,f8456e8751226ee5d041fd86437235b7d18924e40a17ade86dc5cd10d0203ce0,2024-11-27T22:15:05.353000
CVE-2024-53261,0,0,26d255de57d248944569dc2de87b17d6f9e71a4446cd8213a8b457b4c29b3a3f,2024-11-25T20:15:10.217000
CVE-2024-53262,0,0,b58ac4cb966f18ebf91dd1e51ed9015ec986a3fab28fed8c4a716894290c935b,2024-11-25T20:15:10.423000
CVE-2024-53264,0,0,64598e6605a3f57619c8b05bea357fbb1b03d76a4c95c28fa651641f6632c6ba,2024-11-27T19:15:33.400000
@ -267656,7 +267678,7 @@ CVE-2024-5356,0,0,85f64e8ba0cebff8187202ea327ca3c906742c5e7d2301ba82b2780a509234
CVE-2024-5357,0,0,3e42587e7af2230be214dc062d75c1c832a73aeee43ae2fc11277198b34ad5c7,2024-06-07T20:15:12.387000
CVE-2024-5358,0,0,fdd72871ebf6d62b075a63baf142931fcf44d230f54a18747bfadc4ddcff1dbe,2024-06-04T19:21:06.077000
CVE-2024-5359,0,0,0dc709734361df5232c8a75ae2b832e7f1398579fd9d2edbd5174e887cf59eee,2024-06-04T19:21:06.183000
CVE-2024-53597,0,1,6fb1877a0982ea160cbc42724beb034aa3214028a5ebc23f5e6957510a045bcf,2024-11-27T21:15:08.170000
CVE-2024-53597,0,0,6fb1877a0982ea160cbc42724beb034aa3214028a5ebc23f5e6957510a045bcf,2024-11-27T21:15:08.170000
CVE-2024-53599,0,0,fd3383bf56de062fbdbeb229ef5252493e3482e4bcfabf0584010575f7387ef2,2024-11-25T21:15:21.993000
CVE-2024-5360,0,0,9a09bdfd8f70d621de992279dbf64a12a444818faeedf82bbd859ed192a0d3f0,2024-05-28T12:39:42.673000
CVE-2024-53603,0,0,162b8a1c0030915029673db748be5d0adb733dae81b9ae207cb34767108f84eb,2024-11-27T16:15:14.583000
@ -267697,9 +267719,9 @@ CVE-2024-53844,0,0,f54d4575fccfa45cb1306e55e04ed154008d30b320d65227acd00b96c54e3
CVE-2024-53849,0,0,7af089348f539339d95898472d9d3628c7f064721068fcc5bf049d36df5b9760,2024-11-27T00:15:18.223000
CVE-2024-5385,0,0,5113296fe5b95e2ca5ffa573f35631b642d4f934e6e56cfebf21d51c8e50ce86,2024-05-28T12:39:28.377000
CVE-2024-53855,0,0,3b7a475c32d1d09fe2eb4189fd1d6fb7d653d88d8eb34139f0255f4c5d06f551,2024-11-27T19:15:33.563000
CVE-2024-53858,1,1,6c64b7a629ccdbeeaa44425cb24892d67f2dbeb5f6725b97741be6047ebd2567,2024-11-27T22:15:05.520000
CVE-2024-53859,1,1,4facd2b494aef0ff73beaf08d6d1ca6f6f9ab5c48842cb7bed7f8b39e94a454f,2024-11-27T22:15:05.673000
CVE-2024-53860,1,1,f686ec46a02a9bc4a804217b41a7af4658fb7390d2c722028f65e08a7a2b5414,2024-11-27T22:15:05.833000
CVE-2024-53858,0,0,6c64b7a629ccdbeeaa44425cb24892d67f2dbeb5f6725b97741be6047ebd2567,2024-11-27T22:15:05.520000
CVE-2024-53859,0,0,4facd2b494aef0ff73beaf08d6d1ca6f6f9ab5c48842cb7bed7f8b39e94a454f,2024-11-27T22:15:05.673000
CVE-2024-53860,0,0,f686ec46a02a9bc4a804217b41a7af4658fb7390d2c722028f65e08a7a2b5414,2024-11-27T22:15:05.833000
CVE-2024-5387,0,0,d7455745fd4e2043656d894120ace9fd562ab2b459405f5c80fb87774616ea6e,2024-06-03T19:15:09.500000
CVE-2024-5388,0,0,88068f2d18329bc2e1ad4660154ccfa55826fed94a4e1660b5757c6715c273a8,2024-06-03T19:15:09.557000
CVE-2024-5389,0,0,f6aaaf23dff2a1d7f90a7950cdbb76e8322ef8c0ff1bf8f6173fe4634d169b69,2024-07-09T19:15:13.853000
@ -271095,7 +271117,7 @@ CVE-2024-9413,0,0,a06de6835130fe994a1b9f10a16e4d390bb61a1bb02ceb9b43d0f4e1eeae35
CVE-2024-9414,0,0,5c21f14ec376abe57dfce5e862247c317429afdd9c8e1a9c0b90f9672b7f519b,2024-10-18T12:52:33.507000
CVE-2024-9417,0,0,c74a648d5508a7a2c2d3e505619e54040658d58791e6150e9a0fe8cbf972b416,2024-10-07T17:48:28.117000
CVE-2024-9419,0,0,a3f1d241a393213976f2495a35f5bc1427a284fa16c4a0b19d1f7c056beff495,2024-11-01T12:57:03.417000
CVE-2024-9420,0,1,7cbefdf032fe0567969b6ba264c077f2ba33a750aa1b8c11379439a2eb5b6650,2024-11-27T21:15:08.357000
CVE-2024-9420,0,0,7cbefdf032fe0567969b6ba264c077f2ba33a750aa1b8c11379439a2eb5b6650,2024-11-27T21:15:08.357000
CVE-2024-9421,0,0,c9b1d003792a28014f7a9846d6ca15c83ef06308c8117d3bc2489a9bd808c180,2024-10-10T20:59:01.600000
CVE-2024-9422,0,0,3242f2eeb70d9d89ffc7472e52728dbd225610b756ab6cac13d3580a5b2df4b3,2024-11-22T18:15:18.287000
CVE-2024-9423,0,0,080f0a87d4561f3316974a1b5473f0b3836e39e629c6273c7813cc62b41d4a31,2024-10-04T13:50:43.727000

Can't render this file because it is too large.