From 7a7480846aba7241c530a74b725487c5be611d8a Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 12 Nov 2024 19:03:24 +0000 Subject: [PATCH] Auto-Update: 2024-11-12T19:00:22.928945+00:00 --- CVE-2023/CVE-2023-404xx/CVE-2023-40457.json | 14 +- CVE-2023/CVE-2023-66xx/CVE-2023-6681.json | 8 +- CVE-2023/CVE-2023-72xx/CVE-2023-7250.json | 6 +- CVE-2024/CVE-2024-109xx/CVE-2024-10923.json | 78 ++++ CVE-2024/CVE-2024-109xx/CVE-2024-10943.json | 100 +++++ CVE-2024/CVE-2024-109xx/CVE-2024-10944.json | 100 +++++ CVE-2024/CVE-2024-109xx/CVE-2024-10945.json | 100 +++++ CVE-2024/CVE-2024-109xx/CVE-2024-10971.json | 4 +- CVE-2024/CVE-2024-110xx/CVE-2024-11004.json | 56 +++ CVE-2024/CVE-2024-110xx/CVE-2024-11005.json | 56 +++ CVE-2024/CVE-2024-110xx/CVE-2024-11006.json | 56 +++ CVE-2024/CVE-2024-111xx/CVE-2024-11138.json | 141 +++++++ CVE-2024/CVE-2024-219xx/CVE-2024-21937.json | 56 +++ CVE-2024/CVE-2024-219xx/CVE-2024-21938.json | 56 +++ CVE-2024/CVE-2024-219xx/CVE-2024-21939.json | 56 +++ CVE-2024/CVE-2024-219xx/CVE-2024-21945.json | 56 +++ CVE-2024/CVE-2024-219xx/CVE-2024-21946.json | 56 +++ CVE-2024/CVE-2024-219xx/CVE-2024-21949.json | 56 +++ CVE-2024/CVE-2024-219xx/CVE-2024-21957.json | 56 +++ CVE-2024/CVE-2024-219xx/CVE-2024-21958.json | 56 +++ CVE-2024/CVE-2024-219xx/CVE-2024-21974.json | 56 +++ CVE-2024/CVE-2024-219xx/CVE-2024-21975.json | 56 +++ CVE-2024/CVE-2024-219xx/CVE-2024-21976.json | 86 ++++ CVE-2024/CVE-2024-22xx/CVE-2024-2236.json | 6 +- CVE-2024/CVE-2024-253xx/CVE-2024-25369.json | 39 +- CVE-2024/CVE-2024-253xx/CVE-2024-25373.json | 39 +- CVE-2024/CVE-2024-268xx/CVE-2024-26804.json | 39 +- CVE-2024/CVE-2024-276xx/CVE-2024-27625.json | 39 +- CVE-2024/CVE-2024-290xx/CVE-2024-29007.json | 27 +- CVE-2024/CVE-2024-301xx/CVE-2024-30133.json | 56 +++ CVE-2024/CVE-2024-316xx/CVE-2024-31684.json | 39 +- CVE-2024/CVE-2024-340xx/CVE-2024-34044.json | 39 +- CVE-2024/CVE-2024-357xx/CVE-2024-35797.json | 39 +- CVE-2024/CVE-2024-358xx/CVE-2024-35878.json | 39 +- CVE-2024/CVE-2024-360xx/CVE-2024-36061.json | 39 +- CVE-2024/CVE-2024-370xx/CVE-2024-37086.json | 14 +- CVE-2024/CVE-2024-382xx/CVE-2024-38203.json | 56 +++ CVE-2024/CVE-2024-382xx/CVE-2024-38255.json | 56 +++ CVE-2024/CVE-2024-382xx/CVE-2024-38264.json | 56 +++ CVE-2024/CVE-2024-384xx/CVE-2024-38480.json | 39 +- CVE-2024/CVE-2024-392xx/CVE-2024-39226.json | 144 ++++--- CVE-2024/CVE-2024-419xx/CVE-2024-41992.json | 39 +- CVE-2024/CVE-2024-434xx/CVE-2024-43447.json | 56 +++ CVE-2024/CVE-2024-434xx/CVE-2024-43449.json | 56 +++ CVE-2024/CVE-2024-434xx/CVE-2024-43450.json | 56 +++ CVE-2024/CVE-2024-434xx/CVE-2024-43451.json | 56 +++ CVE-2024/CVE-2024-434xx/CVE-2024-43452.json | 56 +++ CVE-2024/CVE-2024-434xx/CVE-2024-43459.json | 56 +++ CVE-2024/CVE-2024-434xx/CVE-2024-43462.json | 56 +++ CVE-2024/CVE-2024-434xx/CVE-2024-43498.json | 56 +++ CVE-2024/CVE-2024-434xx/CVE-2024-43499.json | 56 +++ CVE-2024/CVE-2024-435xx/CVE-2024-43530.json | 56 +++ CVE-2024/CVE-2024-435xx/CVE-2024-43598.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43602.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43620.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43621.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43622.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43623.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43624.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43625.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43626.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43627.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43628.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43629.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43630.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43631.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43633.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43634.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43635.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43636.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43637.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43638.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43639.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43640.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43641.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43642.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43643.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43644.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43645.json | 56 +++ CVE-2024/CVE-2024-436xx/CVE-2024-43646.json | 56 +++ CVE-2024/CVE-2024-457xx/CVE-2024-45769.json | 6 +- CVE-2024/CVE-2024-457xx/CVE-2024-45770.json | 6 +- CVE-2024/CVE-2024-469xx/CVE-2024-46965.json | 39 +- CVE-2024/CVE-2024-477xx/CVE-2024-47779.json | 4 +- CVE-2024/CVE-2024-483xx/CVE-2024-48322.json | 39 +- CVE-2024/CVE-2024-489xx/CVE-2024-48993.json | 56 +++ CVE-2024/CVE-2024-489xx/CVE-2024-48994.json | 56 +++ CVE-2024/CVE-2024-489xx/CVE-2024-48995.json | 56 +++ CVE-2024/CVE-2024-489xx/CVE-2024-48996.json | 56 +++ CVE-2024/CVE-2024-489xx/CVE-2024-48997.json | 56 +++ CVE-2024/CVE-2024-489xx/CVE-2024-48998.json | 56 +++ CVE-2024/CVE-2024-489xx/CVE-2024-48999.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49000.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49001.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49002.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49003.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49004.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49005.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49006.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49007.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49008.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49009.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49010.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49011.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49012.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49013.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49014.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49015.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49016.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49017.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49018.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49019.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49021.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49026.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49027.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49028.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49029.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49030.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49031.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49032.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49033.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49039.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49040.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49043.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49044.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49046.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49048.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49049.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49050.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49051.json | 56 +++ CVE-2024/CVE-2024-490xx/CVE-2024-49056.json | 63 +++ CVE-2024/CVE-2024-493xx/CVE-2024-49369.json | 80 ++++ CVE-2024/CVE-2024-495xx/CVE-2024-49514.json | 56 +++ CVE-2024/CVE-2024-495xx/CVE-2024-49521.json | 56 +++ CVE-2024/CVE-2024-495xx/CVE-2024-49526.json | 56 +++ CVE-2024/CVE-2024-495xx/CVE-2024-49527.json | 56 +++ CVE-2024/CVE-2024-495xx/CVE-2024-49528.json | 56 +++ CVE-2024/CVE-2024-503xx/CVE-2024-50336.json | 82 ++++ CVE-2024/CVE-2024-506xx/CVE-2024-50667.json | 39 +- CVE-2024/CVE-2024-509xx/CVE-2024-50989.json | 39 +- CVE-2024/CVE-2024-510xx/CVE-2024-51026.json | 39 +- CVE-2024/CVE-2024-511xx/CVE-2024-51135.json | 39 +- CVE-2024/CVE-2024-512xx/CVE-2024-51213.json | 39 +- CVE-2024/CVE-2024-517xx/CVE-2024-51720.json | 44 +++ CVE-2024/CVE-2024-517xx/CVE-2024-51749.json | 60 +++ CVE-2024/CVE-2024-517xx/CVE-2024-51750.json | 60 +++ CVE-2024/CVE-2024-520xx/CVE-2024-52010.json | 86 ++++ CVE-2024/CVE-2024-57xx/CVE-2024-5742.json | 6 +- CVE-2024/CVE-2024-62xx/CVE-2024-6239.json | 6 +- CVE-2024/CVE-2024-66xx/CVE-2024-6655.json | 6 +- CVE-2024/CVE-2024-74xx/CVE-2024-7409.json | 6 +- CVE-2024/CVE-2024-75xx/CVE-2024-7571.json | 56 +++ CVE-2024/CVE-2024-80xx/CVE-2024-8068.json | 78 ++++ CVE-2024/CVE-2024-80xx/CVE-2024-8069.json | 78 ++++ CVE-2024/CVE-2024-82xx/CVE-2024-8235.json | 24 +- CVE-2024/CVE-2024-85xx/CVE-2024-8539.json | 56 +++ CVE-2024/CVE-2024-93xx/CVE-2024-9341.json | 10 +- CVE-2024/CVE-2024-94xx/CVE-2024-9407.json | 10 +- CVE-2024/CVE-2024-96xx/CVE-2024-9675.json | 10 +- CVE-2024/CVE-2024-96xx/CVE-2024-9676.json | 10 +- CVE-2024/CVE-2024-98xx/CVE-2024-9842.json | 60 +++ CVE-2024/CVE-2024-98xx/CVE-2024-9843.json | 56 +++ CVE-2024/CVE-2024-99xx/CVE-2024-9999.json | 60 +++ README.md | 110 +++--- _state.csv | 409 +++++++++++++------- 165 files changed, 8630 insertions(+), 322 deletions(-) create mode 100644 CVE-2024/CVE-2024-109xx/CVE-2024-10923.json create mode 100644 CVE-2024/CVE-2024-109xx/CVE-2024-10943.json create mode 100644 CVE-2024/CVE-2024-109xx/CVE-2024-10944.json create mode 100644 CVE-2024/CVE-2024-109xx/CVE-2024-10945.json create mode 100644 CVE-2024/CVE-2024-110xx/CVE-2024-11004.json create mode 100644 CVE-2024/CVE-2024-110xx/CVE-2024-11005.json create mode 100644 CVE-2024/CVE-2024-110xx/CVE-2024-11006.json create mode 100644 CVE-2024/CVE-2024-111xx/CVE-2024-11138.json create mode 100644 CVE-2024/CVE-2024-219xx/CVE-2024-21937.json create mode 100644 CVE-2024/CVE-2024-219xx/CVE-2024-21938.json create mode 100644 CVE-2024/CVE-2024-219xx/CVE-2024-21939.json create mode 100644 CVE-2024/CVE-2024-219xx/CVE-2024-21945.json create mode 100644 CVE-2024/CVE-2024-219xx/CVE-2024-21946.json create mode 100644 CVE-2024/CVE-2024-219xx/CVE-2024-21949.json create mode 100644 CVE-2024/CVE-2024-219xx/CVE-2024-21957.json create mode 100644 CVE-2024/CVE-2024-219xx/CVE-2024-21958.json create mode 100644 CVE-2024/CVE-2024-219xx/CVE-2024-21974.json create mode 100644 CVE-2024/CVE-2024-219xx/CVE-2024-21975.json create mode 100644 CVE-2024/CVE-2024-219xx/CVE-2024-21976.json create mode 100644 CVE-2024/CVE-2024-301xx/CVE-2024-30133.json create mode 100644 CVE-2024/CVE-2024-382xx/CVE-2024-38203.json create mode 100644 CVE-2024/CVE-2024-382xx/CVE-2024-38255.json create mode 100644 CVE-2024/CVE-2024-382xx/CVE-2024-38264.json create mode 100644 CVE-2024/CVE-2024-434xx/CVE-2024-43447.json create mode 100644 CVE-2024/CVE-2024-434xx/CVE-2024-43449.json create mode 100644 CVE-2024/CVE-2024-434xx/CVE-2024-43450.json create mode 100644 CVE-2024/CVE-2024-434xx/CVE-2024-43451.json create mode 100644 CVE-2024/CVE-2024-434xx/CVE-2024-43452.json create mode 100644 CVE-2024/CVE-2024-434xx/CVE-2024-43459.json create mode 100644 CVE-2024/CVE-2024-434xx/CVE-2024-43462.json create mode 100644 CVE-2024/CVE-2024-434xx/CVE-2024-43498.json create mode 100644 CVE-2024/CVE-2024-434xx/CVE-2024-43499.json create mode 100644 CVE-2024/CVE-2024-435xx/CVE-2024-43530.json create mode 100644 CVE-2024/CVE-2024-435xx/CVE-2024-43598.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43602.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43620.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43621.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43622.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43623.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43624.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43625.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43626.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43627.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43628.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43629.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43630.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43631.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43633.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43634.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43635.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43636.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43637.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43638.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43639.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43640.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43641.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43642.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43643.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43644.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43645.json create mode 100644 CVE-2024/CVE-2024-436xx/CVE-2024-43646.json create mode 100644 CVE-2024/CVE-2024-489xx/CVE-2024-48993.json create mode 100644 CVE-2024/CVE-2024-489xx/CVE-2024-48994.json create mode 100644 CVE-2024/CVE-2024-489xx/CVE-2024-48995.json create mode 100644 CVE-2024/CVE-2024-489xx/CVE-2024-48996.json create mode 100644 CVE-2024/CVE-2024-489xx/CVE-2024-48997.json create mode 100644 CVE-2024/CVE-2024-489xx/CVE-2024-48998.json create mode 100644 CVE-2024/CVE-2024-489xx/CVE-2024-48999.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49000.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49001.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49002.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49003.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49004.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49005.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49006.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49007.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49008.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49009.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49010.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49011.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49012.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49013.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49014.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49015.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49016.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49017.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49018.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49019.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49021.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49026.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49027.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49028.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49029.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49030.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49031.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49032.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49033.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49039.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49040.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49043.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49044.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49046.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49048.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49049.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49050.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49051.json create mode 100644 CVE-2024/CVE-2024-490xx/CVE-2024-49056.json create mode 100644 CVE-2024/CVE-2024-493xx/CVE-2024-49369.json create mode 100644 CVE-2024/CVE-2024-495xx/CVE-2024-49514.json create mode 100644 CVE-2024/CVE-2024-495xx/CVE-2024-49521.json create mode 100644 CVE-2024/CVE-2024-495xx/CVE-2024-49526.json create mode 100644 CVE-2024/CVE-2024-495xx/CVE-2024-49527.json create mode 100644 CVE-2024/CVE-2024-495xx/CVE-2024-49528.json create mode 100644 CVE-2024/CVE-2024-503xx/CVE-2024-50336.json create mode 100644 CVE-2024/CVE-2024-517xx/CVE-2024-51720.json create mode 100644 CVE-2024/CVE-2024-517xx/CVE-2024-51749.json create mode 100644 CVE-2024/CVE-2024-517xx/CVE-2024-51750.json create mode 100644 CVE-2024/CVE-2024-520xx/CVE-2024-52010.json create mode 100644 CVE-2024/CVE-2024-75xx/CVE-2024-7571.json create mode 100644 CVE-2024/CVE-2024-80xx/CVE-2024-8068.json create mode 100644 CVE-2024/CVE-2024-80xx/CVE-2024-8069.json create mode 100644 CVE-2024/CVE-2024-85xx/CVE-2024-8539.json create mode 100644 CVE-2024/CVE-2024-98xx/CVE-2024-9842.json create mode 100644 CVE-2024/CVE-2024-98xx/CVE-2024-9843.json create mode 100644 CVE-2024/CVE-2024-99xx/CVE-2024-9999.json diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40457.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40457.json index f2ef4485d7c..99c62fc667b 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40457.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40457.json @@ -2,7 +2,7 @@ "id": "CVE-2023-40457", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T00:15:13.817", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T18:35:01.990", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -23,6 +23,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + } + ], "references": [ { "url": "https://blog.benjojo.co.uk/asset/JgH8G5duO1", diff --git a/CVE-2023/CVE-2023-66xx/CVE-2023-6681.json b/CVE-2023/CVE-2023-66xx/CVE-2023-6681.json index 53cf648beb9..07635a24f6d 100644 --- a/CVE-2023/CVE-2023-66xx/CVE-2023-6681.json +++ b/CVE-2023/CVE-2023-66xx/CVE-2023-6681.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6681", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-12T14:15:08.003", - "lastModified": "2024-10-10T14:32:07.260", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-12T18:15:17.333", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -142,6 +142,10 @@ "Third Party Advisory" ] }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9281", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-6681", "source": "secalert@redhat.com", diff --git a/CVE-2023/CVE-2023-72xx/CVE-2023-7250.json b/CVE-2023/CVE-2023-72xx/CVE-2023-7250.json index fe27223d731..92f04298e73 100644 --- a/CVE-2023/CVE-2023-72xx/CVE-2023-7250.json +++ b/CVE-2023/CVE-2023-72xx/CVE-2023-7250.json @@ -2,7 +2,7 @@ "id": "CVE-2023-7250", "sourceIdentifier": "secalert@redhat.com", "published": "2024-03-18T13:15:06.910", - "lastModified": "2024-07-02T23:15:10.377", + "lastModified": "2024-11-12T17:15:05.750", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -56,6 +56,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:4241", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9185", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2023-7250", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10923.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10923.json new file mode 100644 index 00000000000..a8db472c5fc --- /dev/null +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10923.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-10923", + "sourceIdentifier": "security@opentext.com", + "published": "2024-11-12T17:15:05.947", + "lastModified": "2024-11-12T17:15:05.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in OpenText\u2122 ALM Octane Management allows Stored XSS.\u00a0The vulnerability could result in a remote code execution attack. \n\nThis issue affects ALM Octane Management: from 16.2.100 through 24.4." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:A/V:C/RE:M/U:Red", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NEGLIGIBLE", + "automatable": "NO", + "recovery": "AUTOMATIC", + "valueDensity": "CONCENTRATED", + "vulnerabilityResponseEffort": "MODERATE", + "providerUrgency": "RED", + "baseScore": 8.6, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@opentext.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://portal.microfocus.com/s/article/KM000036146?language=en_US", + "source": "security@opentext.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10943.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10943.json new file mode 100644 index 00000000000..9f90a29d6d5 --- /dev/null +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10943.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-10943", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2024-11-12T17:15:06.147", + "lastModified": "2024-11-12T17:15:06.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An\nauthentication bypass vulnerability exists in the affected product. The\nvulnerability exists due to shared secrets across accounts and could allow a threat\nactor to impersonate a user if the threat actor is able to enumerate additional\ninformation required during authentication." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + } + } + ], + "cvssMetricV31": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1710.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10944.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10944.json new file mode 100644 index 00000000000..9790d22c9e3 --- /dev/null +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10944.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-10944", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2024-11-12T17:15:06.397", + "lastModified": "2024-11-12T17:15:06.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Remote\nCode Execution vulnerability exists in the affected product. The vulnerability requires\na high level of permissions and exists due to improper input validation resulting\nin the possibility of a malicious Updated Agent being deployed." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:A/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 7.1, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.7, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1710.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10945.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10945.json new file mode 100644 index 00000000000..cb4ebe8bea8 --- /dev/null +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10945.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-10945", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2024-11-12T17:15:06.640", + "lastModified": "2024-11-12T17:15:06.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A Local Privilege Escalation vulnerability exists in the affected product. The vulnerability requires a local, low privileged threat actor to replace certain files during update and exists due to a failure to perform proper security checks before installation." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 7.0, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1710.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10971.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10971.json index cd41dcbe042..b3c93d77316 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10971.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10971.json @@ -2,13 +2,13 @@ "id": "CVE-2024-10971", "sourceIdentifier": "security@devolutions.net", "published": "2024-11-12T16:15:19.930", - "lastModified": "2024-11-12T16:15:19.930", + "lastModified": "2024-11-12T17:15:06.870", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper access control in the Password History feature in Devolutions DVLS 2024.3.7 and earlier allows a malicious authenticated user to obtain sensitive data via faulty permission." + "value": "Improper access control in the Password History feature in Devolutions DVLS 2024.3.6 and earlier allows a malicious authenticated user to obtain sensitive data via faulty permission." } ], "metrics": {}, diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11004.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11004.json new file mode 100644 index 00000000000..3224270c7ae --- /dev/null +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11004.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-11004", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T17:15:06.943", + "lastModified": "2024-11-12T17:15:06.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Reflected XSS in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote unauthenticated attacker to obtain admin privileges. User interaction is required." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.4, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.7, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11005.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11005.json new file mode 100644 index 00000000000..9477bc3da23 --- /dev/null +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11005.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-11005", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T17:15:07.130", + "lastModified": "2024-11-12T17:15:07.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Command injection in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11006.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11006.json new file mode 100644 index 00000000000..1eb8a526723 --- /dev/null +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11006.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-11006", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T17:15:07.333", + "lastModified": "2024-11-12T17:15:07.333", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Command injection in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11138.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11138.json new file mode 100644 index 00000000000..f3056d9a4a6 --- /dev/null +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11138.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-11138", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-12T18:15:17.543", + "lastModified": "2024-11-12T18:15:17.543", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in DedeCMS 5.7.116. This affects an unknown part of the file /dede/uploads/dede/friendlink_add.php. The manipulation of the argument logoimg leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 2.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:N/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "PARTIAL", + "baseScore": 3.3 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + }, + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/falling-snow1/cve1/blob/main/DedeCMS%20V5.7.116%20has%20Remote%20Code%20Excute%20vulnerability.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.283977", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.283977", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.441900", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21937.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21937.json new file mode 100644 index 00000000000..72730356bd2 --- /dev/null +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21937.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21937", + "sourceIdentifier": "psirt@amd.com", + "published": "2024-11-12T18:15:17.863", + "lastModified": "2024-11-12T18:15:17.863", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect default permissions in the AMD HIP SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-6015.html", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21938.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21938.json new file mode 100644 index 00000000000..90b034e2132 --- /dev/null +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21938.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21938", + "sourceIdentifier": "psirt@amd.com", + "published": "2024-11-12T18:15:18.073", + "lastModified": "2024-11-12T18:15:18.073", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect default permissions in the AMD Management Plugin for the Microsoft\u00ae System Center Configuration Manager (SCCM) installation directory could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-9005.html", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21939.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21939.json new file mode 100644 index 00000000000..d30ada35547 --- /dev/null +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21939.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21939", + "sourceIdentifier": "psirt@amd.com", + "published": "2024-11-12T18:15:18.263", + "lastModified": "2024-11-12T18:15:18.263", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect default permissions in the AMD Cloud Manageability Service (ACMS) Software installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-9006.html", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21945.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21945.json new file mode 100644 index 00000000000..b2c5de8fb35 --- /dev/null +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21945.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21945", + "sourceIdentifier": "psirt@amd.com", + "published": "2024-11-12T18:15:18.450", + "lastModified": "2024-11-12T18:15:18.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect default permissions in the AMD RyzenTM Master monitoring SDK installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-9004.html", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21946.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21946.json new file mode 100644 index 00000000000..da5225b1892 --- /dev/null +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21946.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21946", + "sourceIdentifier": "psirt@amd.com", + "published": "2024-11-12T18:15:18.633", + "lastModified": "2024-11-12T18:15:18.633", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect default permissions in the AMD RyzenTM Master Utility installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-9004.html", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21949.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21949.json new file mode 100644 index 00000000000..07b497130f1 --- /dev/null +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21949.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21949", + "sourceIdentifier": "psirt@amd.com", + "published": "2024-11-12T18:15:18.813", + "lastModified": "2024-11-12T18:15:18.813", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper validation of user input in the NPU driver could allow an attacker to provide a buffer with unexpected size, potentially leading to system crash." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7017.html", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21957.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21957.json new file mode 100644 index 00000000000..ac56443c4a7 --- /dev/null +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21957.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21957", + "sourceIdentifier": "psirt@amd.com", + "published": "2024-11-12T18:15:19.050", + "lastModified": "2024-11-12T18:15:19.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect default permissions in the AMD Management Console installation directory could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-9003.html", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21958.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21958.json new file mode 100644 index 00000000000..1334f3a12a6 --- /dev/null +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21958.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21958", + "sourceIdentifier": "psirt@amd.com", + "published": "2024-11-12T18:15:19.340", + "lastModified": "2024-11-12T18:15:19.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect default permissions in the AMD Provisioning Console installation directory could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "references": [ + { + "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-9007.html", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21974.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21974.json new file mode 100644 index 00000000000..b1e2248cc74 --- /dev/null +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21974.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21974", + "sourceIdentifier": "psirt@amd.com", + "published": "2024-11-12T18:15:19.533", + "lastModified": "2024-11-12T18:15:19.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in the NPU driver could allow an attacker to supply a specially crafted pointer potentially leading to arbitrary code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7017.html", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21975.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21975.json new file mode 100644 index 00000000000..cc1ba079bb9 --- /dev/null +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21975.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21975", + "sourceIdentifier": "psirt@amd.com", + "published": "2024-11-12T18:15:19.723", + "lastModified": "2024-11-12T18:15:19.723", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in the NPU driver could allow an attacker to supply a specially crafted pointer potentially leading to arbitrary code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7017.html", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-219xx/CVE-2024-21976.json b/CVE-2024/CVE-2024-219xx/CVE-2024-21976.json new file mode 100644 index 00000000000..973dea51445 --- /dev/null +++ b/CVE-2024/CVE-2024-219xx/CVE-2024-21976.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-21976", + "sourceIdentifier": "psirt@amd.com", + "published": "2024-11-12T18:15:19.920", + "lastModified": "2024-11-12T18:35:03.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper input validation in the NPU driver could allow an attacker to supply a specially crafted pointer potentially leading to arbitrary code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@amd.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7017.html", + "source": "psirt@amd.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2236.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2236.json index 3f0c624b493..ae038075f1a 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2236.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2236.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2236", "sourceIdentifier": "secalert@redhat.com", "published": "2024-03-06T22:15:57.977", - "lastModified": "2024-09-14T04:15:02.903", + "lastModified": "2024-11-12T18:15:20.150", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:9404", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-2236", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25369.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25369.json index 2cfe4e76613..59c9ebbc956 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25369.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25369.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25369", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-22T20:15:56.880", - "lastModified": "2024-02-23T02:42:54.547", + "lastModified": "2024-11-12T18:35:04.640", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de cross site scripting (XSS) reflejado en FUEL CMS 1.5.2 permite a los atacantes ejecutar c\u00f3digo arbitrario a trav\u00e9s de una cadena manipulada despu\u00e9s del par\u00e1metro group_id." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/liyako/vulnerability/blob/main/POC/FUEL%20CMS%20Reflected%20Cross-Site%20Scripting%20%28XSS%29.md", diff --git a/CVE-2024/CVE-2024-253xx/CVE-2024-25373.json b/CVE-2024/CVE-2024-253xx/CVE-2024-25373.json index 1c0ae3839fa..5e5763b060c 100644 --- a/CVE-2024/CVE-2024-253xx/CVE-2024-25373.json +++ b/CVE-2024/CVE-2024-253xx/CVE-2024-25373.json @@ -2,7 +2,7 @@ "id": "CVE-2024-25373", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-15T19:15:14.750", - "lastModified": "2024-02-15T19:55:09.230", + "lastModified": "2024-11-12T18:35:05.530", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que Tenda AC10V4.0 V16.03.10.20 conten\u00eda un desbordamiento en la regi\u00f3n stack de la memoria a trav\u00e9s del par\u00e1metro de p\u00e1gina en la funci\u00f3n sub_49B384." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.1, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/cvdyfbwa/IoT-Tenda-Router/blob/main/sub_49B384.md", diff --git a/CVE-2024/CVE-2024-268xx/CVE-2024-26804.json b/CVE-2024/CVE-2024-268xx/CVE-2024-26804.json index 0ae312ee986..a720619a3f7 100644 --- a/CVE-2024/CVE-2024-268xx/CVE-2024-26804.json +++ b/CVE-2024/CVE-2024-268xx/CVE-2024-26804.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26804", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-04T09:15:09.217", - "lastModified": "2024-11-05T10:15:51.333", + "lastModified": "2024-11-12T17:35:03.920", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: ip_tunnel: evita el crecimiento perpetuo del espacio libre syzkaller activado despu\u00e9s de kasan splat: ERROR: KASAN: use-after-free en __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector.c:1170 Lectura del tama\u00f1o 1 en la direcci\u00f3n ffff88812fb4000e mediante la tarea syz-executor183/5191 [..] kasan_report+0xda/0x110 mm/kasan/report.c:588 __skb_flow_dissect+0x19d1/0x7a50 net/core/flow_dissector.c:1170 skb_flow_dissect_flow_key incluir/linux /skbuff.h:1514 [en l\u00ednea] ___skb_get_hash net/core/flow_dissector.c:1791 [en l\u00ednea] __skb_get_hash+0xc7/0x540 net/core/flow_dissector.c:1856 skb_get_hash include/linux/skbuff.h:1556 [en l\u00ednea] ip_tunnel_xmit +0x1855/0x33c0 net/ipv4/ip_tunnel.c:748 ipip_tunnel_xmit+0x3cc/0x4e0 net/ipv4/ipip.c:308 __netdev_start_xmit include/linux/netdevice.h:4940 [en l\u00ednea] netdev_start_xmit include/linux/netdevice.h:4954 [en l\u00ednea] xmit_one net/core/dev.c:3548 [en l\u00ednea] dev_hard_start_xmit+0x13d/0x6d0 net/core/dev.c:3564 __dev_queue_xmit+0x7c1/0x3d60 net/core/dev.c:4349 dev_queue_xmit include/linux/netdevice .h:3134 [en l\u00ednea] neigh_connected_output+0x42c/0x5d0 net/core/neighbour.c:1592 ... ip_finish_output2+0x833/0x2550 net/ipv4/ip_output.c:235 ip_finish_output+0x31/0x310 net/ipv4/ip_output.c :323 .. iptunnel_xmit+0x5b4/0x9b0 net/ipv4/ip_tunnel_core.c:82 ip_tunnel_xmit+0x1dbc/0x33c0 net/ipv4/ip_tunnel.c:831 ipgre_xmit+0x4a1/0x980 net/ipv4/ip_gre.c:665 __netdev_start_xmit incluir /linux /netdevice.h:4940 [en l\u00ednea] netdev_start_xmit include/linux/netdevice.h:4954 [en l\u00ednea] xmit_one net/core/dev.c:3548 [en l\u00ednea] dev_hard_start_xmit+0x13d/0x6d0 net/core/dev.c:3564 . .. El s\u00edmbolo se produce porque skb->data apunta m\u00e1s all\u00e1 del \u00e1rea asignada de skb->head. Esto se debe a que la capa vecina hace: __skb_pull(skb, skb_network_offset(skb)); ... pero skb_network_offset() devuelve un desplazamiento negativo y el argumento __skb_pull() no est\u00e1 firmado. OIA, nosotros, skb->los datos, se \"ajustan\" en un valor enorme. El valor negativo se devuelve porque la distancia de skb->head y skb->data es superior a 64k y skb->network_header (u16) se ha ajustado. El error est\u00e1 en la infraestructura ip_tunnel, lo que puede hacer que dev->needed_headroom se incremente hasta el infinito. El reproductor syzkaller consta de paquetes que se enrutan a trav\u00e9s de un t\u00fanel gre y una ruta de paquetes encapsulados gre que apuntan a otro t\u00fanel (ipip). La encapsulaci\u00f3n ipip encuentra gre0 como el siguiente dispositivo de salida. Esto da como resultado el siguiente patr\u00f3n: 1). El primer paquete se enviar\u00e1 a trav\u00e9s de gre0. La b\u00fasqueda de ruta encontr\u00f3 un dispositivo de salida, ipip0. 2). ip_tunnel_xmit para gre0 aumenta gre0->needed_headroom seg\u00fan el dispositivo de salida futuro, rt.dev->needed_headroom (ipip0). 3). ipoutput/start_xmit mueve skb a ipip0. que ejecuta la misma ruta de c\u00f3digo nuevamente (xmit recursividad). 4). El paso de enrutamiento para el paquete post-gre0-encap encuentra gre0 como dispositivo de salida para usar con el paquete encapsulado ipip0. tunl0->needed_headroom luego se incrementa seg\u00fan el espacio libre del dispositivo gre0 (ya aumentado). Esto se repite para cada paquete futuro: gre0->needed_headroom se infla porque el paso ipip0 de los paquetes anteriores increment\u00f3 el espacio libre rt->dev (gre0), y ipip0 se increment\u00f3 porque se aument\u00f3 el espacio necesario_headroom de gre0. Para cada paquete posterior, gre/ipip0->needed_headroom crece hasta que las reasignaciones posteriores a la expansi\u00f3n del cabezal dan como resultado una distancia skb->head/data de m\u00e1s de 64k. Una vez que eso sucede, skb->network_header (u16) se ajusta cuando pskb_expand_head intenta asegurarse de que skb_network_offset() no cambie despu\u00e9s de la expansi\u00f3n/reasignaci\u00f3n del espacio libre. Despu\u00e9s de esto, skb_network_offset(skb) devuelve un resultado diferente (y negativo) posterior a la expansi\u00f3n del espacio libre.---trucado---" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/049d7989c67e8dd50f07a2096dbafdb41331fb9b", diff --git a/CVE-2024/CVE-2024-276xx/CVE-2024-27625.json b/CVE-2024/CVE-2024-276xx/CVE-2024-27625.json index bd7a991c64e..e0da7ecefb9 100644 --- a/CVE-2024/CVE-2024-276xx/CVE-2024-27625.json +++ b/CVE-2024/CVE-2024-276xx/CVE-2024-27625.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27625", "sourceIdentifier": "cve@mitre.org", "published": "2024-03-05T14:15:49.160", - "lastModified": "2024-03-05T14:27:46.090", + "lastModified": "2024-11-12T18:35:06.473", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "CMS Made Simple versi\u00f3n 2.2.19 es vulnerable a Cross Site Scripting (XSS). Esta vulnerabilidad reside en el m\u00f3dulo Administrador de archivos del panel de administraci\u00f3n. Espec\u00edficamente, el problema surge debido a una sanitizaci\u00f3n inadecuada de la entrada del usuario en el campo \"Nuevo directorio\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://packetstormsecurity.com/files/177243/CMS-Made-Simple-2.2.19-Cross-Site-Scripting.html", diff --git a/CVE-2024/CVE-2024-290xx/CVE-2024-29007.json b/CVE-2024/CVE-2024-290xx/CVE-2024-29007.json index c7a8e689feb..421d86f05eb 100644 --- a/CVE-2024/CVE-2024-290xx/CVE-2024-29007.json +++ b/CVE-2024/CVE-2024-290xx/CVE-2024-29007.json @@ -2,7 +2,7 @@ "id": "CVE-2024-29007", "sourceIdentifier": "security@apache.org", "published": "2024-04-04T08:15:06.970", - "lastModified": "2024-04-04T12:48:41.700", + "lastModified": "2024-11-12T18:35:07.403", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Se podr\u00eda enga\u00f1ar al servidor de administraci\u00f3n de CloudStack y a la m\u00e1quina virtual de almacenamiento secundario para que realicen solicitudes a recursos restringidos o aleatorios mediante las siguientes redirecciones HTTP 301 presentadas por servidores externos al descargar plantillas o ISO. Se recomienda a los usuarios actualizar a la versi\u00f3n 4.18.1.1 o 4.19.0.1, que soluciona este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30133.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30133.json new file mode 100644 index 00000000000..ddb44a57325 --- /dev/null +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30133.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-30133", + "sourceIdentifier": "psirt@hcl.com", + "published": "2024-11-12T17:15:07.590", + "lastModified": "2024-11-12T18:35:07.980", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "HCL Traveler for Microsoft Outlook (HTMO) is susceptible to a control flow vulnerability. The application does not sufficiently manage its control flow during execution, creating conditions in which the control flow can be modified in unexpected ways." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@hcl.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-670" + } + ] + } + ], + "references": [ + { + "url": "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0114725", + "source": "psirt@hcl.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-316xx/CVE-2024-31684.json b/CVE-2024/CVE-2024-316xx/CVE-2024-31684.json index eb19fd8b8c7..c887e0ad808 100644 --- a/CVE-2024/CVE-2024-316xx/CVE-2024-31684.json +++ b/CVE-2024/CVE-2024-316xx/CVE-2024-31684.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31684", "sourceIdentifier": "cve@mitre.org", "published": "2024-06-03T19:15:09.260", - "lastModified": "2024-06-03T19:23:17.807", + "lastModified": "2024-11-12T18:35:08.927", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El control de acceso incorrecto en el mecanismo de autenticaci\u00f3n de huellas dactilares de Bitdefender Mobile Security v4.11.3-gms permite a los atacantes eludir la autenticaci\u00f3n de huellas dactilares debido al uso de una API obsoleta." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "https://play.google.com/store/apps/details?id=com.choiceoflove.dating&hl=en_US", diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34044.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34044.json index 4983808f4d0..74838fe6ad1 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34044.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34044.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34044", "sourceIdentifier": "cve@mitre.org", "published": "2024-04-30T00:15:07.607", - "lastModified": "2024-04-30T13:11:16.690", + "lastModified": "2024-11-12T17:35:04.873", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La funci\u00f3n O-RAN E2T I-Release buildPrometheusList puede tener una desreferencia de puntero NULL porque peerInfo puede ser NULL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://jira.o-ran-sc.org/browse/RIC-1043", diff --git a/CVE-2024/CVE-2024-357xx/CVE-2024-35797.json b/CVE-2024/CVE-2024-357xx/CVE-2024-35797.json index 7cd0ec5bb0d..aea10d28c5e 100644 --- a/CVE-2024/CVE-2024-357xx/CVE-2024-35797.json +++ b/CVE-2024/CVE-2024-357xx/CVE-2024-35797.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35797", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-17T14:15:11.937", - "lastModified": "2024-05-17T18:35:35.070", + "lastModified": "2024-11-12T17:35:05.710", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mm: cachestat: corrige dos errores de shmem Cuando cachestat en shmem se ejecuta con intercambio e invalidaci\u00f3n, hay dos errores posibles: 1) Un error de intercambio puede haber resultado en una entrada de intercambio envenenada en la matriz x del inodo shmem. Llamar a get_shadow_from_swap_cache() dar\u00e1 como resultado un acceso fuera de los l\u00edmites a swapper_spaces[]. Valide la entrada con non_swap_entry() antes de continuar. 2) Cuando encontramos una entrada de intercambio v\u00e1lida en el inodo de shmem, es posible que la entrada oculta en el cach\u00e9 de intercambio a\u00fan no exista: el intercambio de E/S a\u00fan est\u00e1 en progreso y estamos antes de __remove_mapping; swapin, invalidaci\u00f3n o swapoff han eliminado la sombra de swapcache despu\u00e9s de que vimos la entrada de intercambio shmem. Esto enviar\u00e1 un NULL aworkingset_test_recent(). Este \u00faltimo opera exclusivamente con bits de puntero, por lo que no fallar\u00e1 (el nodo 0, el ID de memcg 0, la marca de tiempo de desalojo 0, etc. son todas entradas v\u00e1lidas), pero es una prueba falsa. En teor\u00eda, eso podr\u00eda resultar en un recuento falso de \"desalojados recientemente\". Un falso positivo as\u00ed no ser\u00eda el fin del mundo. Pero para mayor claridad del c\u00f3digo y solidez (futura), sea expl\u00edcito sobre este caso. Libere get_shadow_from_swap_cache() y devuelva NULL." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/24a0e73d544439bb9329fbbafac44299e548a677", diff --git a/CVE-2024/CVE-2024-358xx/CVE-2024-35878.json b/CVE-2024/CVE-2024-358xx/CVE-2024-35878.json index ac9abbe3939..8b2eb47e32b 100644 --- a/CVE-2024/CVE-2024-358xx/CVE-2024-35878.json +++ b/CVE-2024/CVE-2024-358xx/CVE-2024-35878.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35878", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-19T09:15:09.090", - "lastModified": "2024-05-20T13:00:04.957", + "lastModified": "2024-11-12T17:35:06.573", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: de: m\u00f3dulo: evita la desreferencia del puntero NULL en vsnprintf() En of_modalias(), podemos pasar los par\u00e1metros str y len que provocar\u00edan un kernel ups en vsnprintf() ya que solo permite pasar un ptr NULL cuando la longitud tambi\u00e9n es 0. Adem\u00e1s, necesitamos filtrar los valores negativos del par\u00e1metro len ya que estos dar\u00e1n como resultado un b\u00fafer realmente enorme ya que snprintf() toma el par\u00e1metro size_t mientras que el nuestro es ssize_t... Encontrado por el Centro de verificaci\u00f3n de Linux (linuxtesting.org) con la herramienta de an\u00e1lisis est\u00e1tico Svace." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/544561dc56f7e69a053c25e11e6170f48bb97898", diff --git a/CVE-2024/CVE-2024-360xx/CVE-2024-36061.json b/CVE-2024/CVE-2024-360xx/CVE-2024-36061.json index 8e329752eee..93bcdd50f32 100644 --- a/CVE-2024/CVE-2024-360xx/CVE-2024-36061.json +++ b/CVE-2024/CVE-2024-360xx/CVE-2024-36061.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36061", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T20:15:17.673", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T17:35:07.450", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Los dispositivos EnGenius EWS356-FIT hasta la versi\u00f3n 1.1.30 permiten la inyecci\u00f3n ciega de comandos del sistema operativo. Esto permite que un atacante ejecute comandos arbitrarios del sistema operativo a trav\u00e9s de metacaracteres de shell en las utilidades Ping y Speed Test." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://github.com/actuator/cve/blob/main/Engenius/CVE-2024-36061", diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37086.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37086.json index eb788d0b0a9..b74009d4a69 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37086.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37086.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37086", "sourceIdentifier": "security@vmware.com", "published": "2024-06-25T15:15:12.570", - "lastModified": "2024-06-25T18:50:42.040", + "lastModified": "2024-11-12T18:35:10.230", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24505", diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38203.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38203.json new file mode 100644 index 00000000000..eea5e069d02 --- /dev/null +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38203.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38203", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:20.720", + "lastModified": "2024-11-12T18:15:20.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Package Library Manager Information Disclosure Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38203", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38255.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38255.json new file mode 100644 index 00000000000..e9599e678fb --- /dev/null +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38255.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38255", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:21.043", + "lastModified": "2024-11-12T18:15:21.043", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38255", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-382xx/CVE-2024-38264.json b/CVE-2024/CVE-2024-382xx/CVE-2024-38264.json new file mode 100644 index 00000000000..bce1ebc5061 --- /dev/null +++ b/CVE-2024/CVE-2024-382xx/CVE-2024-38264.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-38264", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:21.390", + "lastModified": "2024-11-12T18:15:21.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Virtual Hard Disk (VHDX) Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-591" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38264", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-384xx/CVE-2024-38480.json b/CVE-2024/CVE-2024-384xx/CVE-2024-38480.json index 21e66db8520..d8e02470128 100644 --- a/CVE-2024/CVE-2024-384xx/CVE-2024-38480.json +++ b/CVE-2024/CVE-2024-384xx/CVE-2024-38480.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38480", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-07-01T05:15:04.613", - "lastModified": "2024-07-01T12:37:24.220", + "lastModified": "2024-11-12T18:35:13.150", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La aplicaci\u00f3n \"Piccoma\" para versiones de Android e iOS anteriores a la 6.20.0 utiliza una clave API codificada para un servicio externo, lo que puede permitir que un atacante local obtenga la clave API. Tenga en cuenta que los usuarios de la aplicaci\u00f3n no se ven directamente afectados por esta vulnerabilidad." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], "references": [ { "url": "https://apps.apple.com/jp/app/%E3%83%94%E3%83%83%E3%82%B3%E3%83%9E/id1091496983", diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39226.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39226.json index 6b9b690686a..86b1b2f4b72 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39226.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39226.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39226", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-06T16:15:48.757", - "lastModified": "2024-08-15T16:15:19.493", + "lastModified": "2024-11-12T17:35:08.293", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ @@ -60,9 +90,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.5.8:*:*:*:*:*:*:*", - "matchCriteriaId": "25FB0820-4ABA-4998-86BB-878B17468245" + "vulnerable": false, + "criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82" } ] }, @@ -71,9 +101,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:gl-inet:mt6000:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CCDE99A6-DA15-4E4B-8C60-CCB9D580BD82" + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:mt6000_firmware:4.5.8:*:*:*:*:*:*:*", + "matchCriteriaId": "25FB0820-4ABA-4998-86BB-878B17468245" } ] } @@ -82,17 +112,6 @@ { "operator": "AND", "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.16:*:*:*:*:*:*:*", - "matchCriteriaId": "72ECCE6C-E44B-4165-8FB6-55008C376274" - } - ] - }, { "operator": "OR", "negate": false, @@ -103,23 +122,23 @@ "matchCriteriaId": "D6DBF472-E98E-4E00-B6A0-6D8FA1678AEA" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:gl-inet:x300b_firmware:4.5.16:*:*:*:*:*:*:*", - "matchCriteriaId": "FBA22E2A-8C0B-44D4-917F-4A929C266AD3" + "criteria": "cpe:2.3:o:gl-inet:a1300_firmware:4.5.16:*:*:*:*:*:*:*", + "matchCriteriaId": "72ECCE6C-E44B-4165-8FB6-55008C376274" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -130,23 +149,23 @@ "matchCriteriaId": "B2AA4BAC-C6D1-42C0-94E9-5B05AC24A235" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.5.16:*:*:*:*:*:*:*", - "matchCriteriaId": "C75FBC4F-7547-47F4-8577-FA31CF9A95EA" + "criteria": "cpe:2.3:o:gl-inet:x300b_firmware:4.5.16:*:*:*:*:*:*:*", + "matchCriteriaId": "FBA22E2A-8C0B-44D4-917F-4A929C266AD3" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -157,23 +176,23 @@ "matchCriteriaId": "BCB312FD-370C-4DF9-961F-F0C4920AA368" } ] - } - ] - }, - { - "operator": "AND", - "nodes": [ + }, { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:4.5.16:*:*:*:*:*:*:*", - "matchCriteriaId": "43114B40-C368-435A-91EC-B4666CC691CB" + "criteria": "cpe:2.3:o:gl-inet:ax1800_firmware:4.5.16:*:*:*:*:*:*:*", + "matchCriteriaId": "C75FBC4F-7547-47F4-8577-FA31CF9A95EA" } ] - }, + } + ] + }, + { + "operator": "AND", + "nodes": [ { "operator": "OR", "negate": false, @@ -184,6 +203,17 @@ "matchCriteriaId": "FF453954-BC32-4577-8CE4-066812193495" } ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:axt1800_firmware:4.5.16:*:*:*:*:*:*:*", + "matchCriteriaId": "43114B40-C368-435A-91EC-B4666CC691CB" + } + ] } ] }, @@ -195,9 +225,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:4.5.16:*:*:*:*:*:*:*", - "matchCriteriaId": "5222AC63-91C6-4B99-8FDD-2CCFD1CA66EF" + "vulnerable": false, + "criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28" } ] }, @@ -206,9 +236,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:gl-inet:mt2500:-:*:*:*:*:*:*:*", - "matchCriteriaId": "3ADF5BF3-0F52-4947-8BC2-3505EDEEDF28" + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:mt2500_firmware:4.5.16:*:*:*:*:*:*:*", + "matchCriteriaId": "5222AC63-91C6-4B99-8FDD-2CCFD1CA66EF" } ] } @@ -249,9 +279,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.8:*:*:*:*:*:*:*", - "matchCriteriaId": "95C80395-9A66-4952-8259-89623C5EC065" + "vulnerable": false, + "criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C" } ] }, @@ -260,9 +290,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:h:gl-inet:x3000:-:*:*:*:*:*:*:*", - "matchCriteriaId": "9479FFAA-9C87-4530-884D-B96055A3D41C" + "vulnerable": true, + "criteria": "cpe:2.3:o:gl-inet:x3000_firmware:4.4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "95C80395-9A66-4952-8259-89623C5EC065" } ] } diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41992.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41992.json index 6c34d96c427..88446571ca3 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41992.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41992.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41992", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T01:15:04.813", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T18:35:14.290", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La versi\u00f3n wfa_dut de Wi-Fi Alliance (en Wi-Fi Test Suite) hasta la versi\u00f3n 9.0.0 permite la inyecci\u00f3n de comandos del sistema operativo a trav\u00e9s de tramas 802.11x porque se utiliza la funci\u00f3n de librer\u00eda system(). Por ejemplo, en los dispositivos Arcadyan FMIMG51AX000J, esto lleva a la ejecuci\u00f3n remota del c\u00f3digo wfaTGSendPing como root a trav\u00e9s del tr\u00e1fico al puerto TCP 8000 o 8080 en una interfaz LAN. En otros dispositivos, esto puede ser explotable a trav\u00e9s de una interfaz WAN." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], "references": [ { "url": "https://ssd-disclosure.com/ssd-advisory-arcadyan-fmimg51ax000j-wifi-alliance-rce/", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43447.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43447.json new file mode 100644 index 00000000000..3e3a604ffca --- /dev/null +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43447.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43447", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:21.707", + "lastModified": "2024-11-12T18:15:21.707", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows SMBv3 Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43447", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43449.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43449.json new file mode 100644 index 00000000000..86d43dc4290 --- /dev/null +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43449.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43449", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:21.977", + "lastModified": "2024-11-12T18:15:21.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows USB Video Class System Driver Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43449", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43450.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43450.json new file mode 100644 index 00000000000..e7ff049e029 --- /dev/null +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43450.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43450", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:22.237", + "lastModified": "2024-11-12T18:15:22.237", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows DNS Spoofing Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-924" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43450", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43451.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43451.json new file mode 100644 index 00000000000..f409490c810 --- /dev/null +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43451.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43451", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:22.483", + "lastModified": "2024-11-12T18:15:22.483", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NTLM Hash Disclosure Spoofing Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-73" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43451", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43452.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43452.json new file mode 100644 index 00000000000..fac02284b4a --- /dev/null +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43452.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43452", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:22.737", + "lastModified": "2024-11-12T18:15:22.737", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Registry Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43452", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43459.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43459.json new file mode 100644 index 00000000000..737ca94eef2 --- /dev/null +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43459.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43459", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:23.090", + "lastModified": "2024-11-12T18:15:23.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43459", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43462.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43462.json new file mode 100644 index 00000000000..5cd98a464d4 --- /dev/null +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43462.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43462", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:23.370", + "lastModified": "2024-11-12T18:15:23.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43462", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43498.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43498.json new file mode 100644 index 00000000000..e92bc254ef8 --- /dev/null +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43498.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43498", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:24.110", + "lastModified": "2024-11-12T18:15:24.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": ".NET and Visual Studio Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43498", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43499.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43499.json new file mode 100644 index 00000000000..774a9db4c3e --- /dev/null +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43499.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43499", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:24.363", + "lastModified": "2024-11-12T18:15:24.363", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": ".NET and Visual Studio Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-606" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43499", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43530.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43530.json new file mode 100644 index 00000000000..719ea1cda2d --- /dev/null +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43530.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43530", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:25.997", + "lastModified": "2024-11-12T18:15:25.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Update Stack Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43530", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-435xx/CVE-2024-43598.json b/CVE-2024/CVE-2024-435xx/CVE-2024-43598.json new file mode 100644 index 00000000000..fc8665a447a --- /dev/null +++ b/CVE-2024/CVE-2024-435xx/CVE-2024-43598.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43598", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:28.277", + "lastModified": "2024-11-12T18:15:28.277", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LightGBM Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43598", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43602.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43602.json new file mode 100644 index 00000000000..3187d8d2ded --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43602.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43602", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:28.563", + "lastModified": "2024-11-12T18:15:28.563", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Azure CycleCloud Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43602", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43620.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43620.json new file mode 100644 index 00000000000..fcdcc75995d --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43620.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43620", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:29.037", + "lastModified": "2024-11-12T18:15:29.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Telephony Service Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43620", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43621.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43621.json new file mode 100644 index 00000000000..9bef642a9e2 --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43621.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43621", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:29.270", + "lastModified": "2024-11-12T18:15:29.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Telephony Service Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43621", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43622.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43622.json new file mode 100644 index 00000000000..a29c0603d01 --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43622.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43622", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:29.513", + "lastModified": "2024-11-12T18:15:29.513", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Telephony Service Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43622", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43623.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43623.json new file mode 100644 index 00000000000..8d6031f29d7 --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43623.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43623", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:29.743", + "lastModified": "2024-11-12T18:15:29.743", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows NT OS Kernel Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43623", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43624.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43624.json new file mode 100644 index 00000000000..1df670c01ea --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43624.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43624", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:29.987", + "lastModified": "2024-11-12T18:15:29.987", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Hyper-V Shared Virtual Disk Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43624", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43625.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43625.json new file mode 100644 index 00000000000..f4c332da226 --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43625.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43625", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:30.230", + "lastModified": "2024-11-12T18:15:30.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Windows VMSwitch Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.4, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43625", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43626.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43626.json new file mode 100644 index 00000000000..00dd6092935 --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43626.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43626", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:30.443", + "lastModified": "2024-11-12T18:15:30.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Telephony Service Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43626", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43627.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43627.json new file mode 100644 index 00000000000..5cea56c2a88 --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43627.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43627", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:30.663", + "lastModified": "2024-11-12T18:15:30.663", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Telephony Service Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43627", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43628.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43628.json new file mode 100644 index 00000000000..20cde8da2b0 --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43628.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43628", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:30.900", + "lastModified": "2024-11-12T18:15:30.900", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Telephony Service Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43628", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43629.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43629.json new file mode 100644 index 00000000000..ad7ccae4d5a --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43629.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43629", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:31.133", + "lastModified": "2024-11-12T18:15:31.133", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows DWM Core Library Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43629", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43630.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43630.json new file mode 100644 index 00000000000..60208440675 --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43630.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43630", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:31.353", + "lastModified": "2024-11-12T18:15:31.353", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Kernel Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43630", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43631.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43631.json new file mode 100644 index 00000000000..2d4023fab6c --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43631.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43631", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:31.580", + "lastModified": "2024-11-12T18:15:31.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Secure Kernel Mode Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43631", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43633.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43633.json new file mode 100644 index 00000000000..fee2022851c --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43633.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43633", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:31.800", + "lastModified": "2024-11-12T18:15:31.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Hyper-V Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-591" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43633", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43634.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43634.json new file mode 100644 index 00000000000..b96fd55cce8 --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43634.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43634", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:32.050", + "lastModified": "2024-11-12T18:15:32.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows USB Video Class System Driver Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43634", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43635.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43635.json new file mode 100644 index 00000000000..2f018ec66ee --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43635.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43635", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:32.287", + "lastModified": "2024-11-12T18:15:32.287", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Telephony Service Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43635", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43636.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43636.json new file mode 100644 index 00000000000..ddfeb0421c4 --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43636.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43636", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:32.537", + "lastModified": "2024-11-12T18:15:32.537", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Win32k Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43636", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43637.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43637.json new file mode 100644 index 00000000000..d0ca8f4c842 --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43637.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43637", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:32.773", + "lastModified": "2024-11-12T18:15:32.773", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows USB Video Class System Driver Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43637", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43638.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43638.json new file mode 100644 index 00000000000..e4ed90429af --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43638.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43638", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:33.013", + "lastModified": "2024-11-12T18:15:33.013", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows USB Video Class System Driver Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43638", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43639.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43639.json new file mode 100644 index 00000000000..13d26cd4c22 --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43639.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43639", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:33.267", + "lastModified": "2024-11-12T18:15:33.267", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Kerberos Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-197" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43639", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43640.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43640.json new file mode 100644 index 00000000000..72d90c48754 --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43640.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43640", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:33.507", + "lastModified": "2024-11-12T18:15:33.507", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Kernel-Mode Driver Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43640", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43641.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43641.json new file mode 100644 index 00000000000..f4b6c3bb29e --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43641.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43641", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:33.727", + "lastModified": "2024-11-12T18:15:33.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Registry Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43641", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43642.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43642.json new file mode 100644 index 00000000000..1faaea4aaf5 --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43642.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43642", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:33.960", + "lastModified": "2024-11-12T18:15:33.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows SMB Denial of Service Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43642", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43643.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43643.json new file mode 100644 index 00000000000..d5801bfd4dc --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43643.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43643", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:34.370", + "lastModified": "2024-11-12T18:15:34.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows USB Video Class System Driver Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43643", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43644.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43644.json new file mode 100644 index 00000000000..2a092c5891f --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43644.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43644", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:34.643", + "lastModified": "2024-11-12T18:15:34.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Client-Side Caching Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43644", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43645.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43645.json new file mode 100644 index 00000000000..b1a8f3e31e7 --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43645.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43645", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:34.903", + "lastModified": "2024-11-12T18:15:34.903", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Defender Application Control (WDAC) Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-693" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43645", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-436xx/CVE-2024-43646.json b/CVE-2024/CVE-2024-436xx/CVE-2024-43646.json new file mode 100644 index 00000000000..bae9b0522dc --- /dev/null +++ b/CVE-2024/CVE-2024-436xx/CVE-2024-43646.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-43646", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:35.150", + "lastModified": "2024-11-12T18:15:35.150", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Secure Kernel Mode Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-822" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43646", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45769.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45769.json index efb28dc98b9..802d888ebbd 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45769.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45769.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45769", "sourceIdentifier": "secalert@redhat.com", "published": "2024-09-19T09:15:02.343", - "lastModified": "2024-09-20T12:30:17.483", + "lastModified": "2024-11-12T18:15:35.427", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -84,6 +84,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:6848", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9452", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-45769", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-457xx/CVE-2024-45770.json b/CVE-2024/CVE-2024-457xx/CVE-2024-45770.json index 59bdaf45e14..1d4b4c2d949 100644 --- a/CVE-2024/CVE-2024-457xx/CVE-2024-45770.json +++ b/CVE-2024/CVE-2024-457xx/CVE-2024-45770.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45770", "sourceIdentifier": "secalert@redhat.com", "published": "2024-09-19T09:15:02.613", - "lastModified": "2024-09-20T12:30:17.483", + "lastModified": "2024-11-12T18:15:35.643", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -84,6 +84,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:6848", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9452", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-45770", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46965.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46965.json index 481056a756e..ba8688d6b51 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46965.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46965.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46965", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T20:15:17.740", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T17:35:09.427", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La aplicaci\u00f3n DS allvideo.downloader.browser (tambi\u00e9n conocida como Fast Video Downloader: Browser) hasta la versi\u00f3n 1.6-RC1 para Android permite a un atacante ejecutar c\u00f3digo JavaScript arbitrario a trav\u00e9s del componente allvideo.downloader.browser.DefaultBrowserActivity." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/actuator/allvideo.downloader.browser/blob/main/CVE-2024-46965", diff --git a/CVE-2024/CVE-2024-477xx/CVE-2024-47779.json b/CVE-2024/CVE-2024-477xx/CVE-2024-47779.json index 8116691426e..0cba56cca9f 100644 --- a/CVE-2024/CVE-2024-477xx/CVE-2024-47779.json +++ b/CVE-2024/CVE-2024-477xx/CVE-2024-47779.json @@ -2,13 +2,13 @@ "id": "CVE-2024-47779", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-15T16:15:04.963", - "lastModified": "2024-10-16T16:38:43.170", + "lastModified": "2024-11-12T17:15:08.037", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Element is a Matrix web client built using the Matrix React SDK .Element Web versions 1.11.70 through 1.11.80 contain a vulnerability which can, under specially crafted conditions, lead to the access token becoming exposed to third parties. At least one vector has been identified internally, involving malicious widgets, but other vectors may exist. Note that despite superficial similarity to CVE-2024-47771, this is an entirely separate vulnerability, caused by a separate piece of code included only in Element Web. Element Web and Element Desktop share most but not all, of their code and this vulnerability exists in the part of the code base which is not shared between the projects. Users are strongly advised to upgrade to version 1.11.81 to remediate the issue. As a workaround, avoid granting permissions to untrusted widgets." + "value": "Element is a Matrix web client built using the Matrix React SDK. Element Web versions 1.11.70 through 1.11.80 contain a vulnerability which can, under specially crafted conditions, lead to the access token becoming exposed to third parties. At least one vector has been identified internally, involving malicious widgets, but other vectors may exist. Note that despite superficial similarity to CVE-2024-47771, this is an entirely separate vulnerability, caused by a separate piece of code included only in Element Web. Element Web and Element Desktop share most but not all, of their code and this vulnerability exists in the part of the code base which is not shared between the projects. Users are strongly advised to upgrade to version 1.11.81 to remediate the issue. As a workaround, avoid granting permissions to untrusted widgets." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48322.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48322.json index 7d28b34080b..41dc788e572 100644 --- a/CVE-2024/CVE-2024-483xx/CVE-2024-48322.json +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48322.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48322", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T20:15:17.807", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T17:35:10.953", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "UsersController.php en Run.codes 1.5.2 y anteriores tiene una vulnerabilidad de condici\u00f3n de ejecuci\u00f3n de restablecimiento de contrase\u00f1a." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], "references": [ { "url": "https://github.com/runcodes-icmc/server", diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48993.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48993.json new file mode 100644 index 00000000000..884db500a1d --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48993.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48993", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:35.840", + "lastModified": "2024-11-12T18:15:35.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48993", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48994.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48994.json new file mode 100644 index 00000000000..38224b747cb --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48994.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48994", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:36.117", + "lastModified": "2024-11-12T18:15:36.117", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48994", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48995.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48995.json new file mode 100644 index 00000000000..3060e7e118d --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48995.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48995", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:36.360", + "lastModified": "2024-11-12T18:15:36.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48995", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48996.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48996.json new file mode 100644 index 00000000000..680727e3921 --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48996.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48996", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:36.637", + "lastModified": "2024-11-12T18:15:36.637", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48996", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48997.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48997.json new file mode 100644 index 00000000000..ba0b82773c2 --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48997.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48997", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:36.870", + "lastModified": "2024-11-12T18:15:36.870", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48997", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48998.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48998.json new file mode 100644 index 00000000000..acc1e26c4fd --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48998.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48998", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:37.110", + "lastModified": "2024-11-12T18:15:37.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48998", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-489xx/CVE-2024-48999.json b/CVE-2024/CVE-2024-489xx/CVE-2024-48999.json new file mode 100644 index 00000000000..9c615e9eefa --- /dev/null +++ b/CVE-2024/CVE-2024-489xx/CVE-2024-48999.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-48999", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:37.340", + "lastModified": "2024-11-12T18:15:37.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-48999", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49000.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49000.json new file mode 100644 index 00000000000..bc54707e368 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49000.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49000", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:37.577", + "lastModified": "2024-11-12T18:15:37.577", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49000", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49001.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49001.json new file mode 100644 index 00000000000..15d9c5198cd --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49001.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49001", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:37.807", + "lastModified": "2024-11-12T18:15:37.807", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49001", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49002.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49002.json new file mode 100644 index 00000000000..dfbd80ce54e --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49002.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49002", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:38.040", + "lastModified": "2024-11-12T18:15:38.040", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49002", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49003.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49003.json new file mode 100644 index 00000000000..42d7ed8243c --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49003.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49003", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:38.257", + "lastModified": "2024-11-12T18:15:38.257", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49003", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49004.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49004.json new file mode 100644 index 00000000000..b8207b070d5 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49004.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49004", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:38.500", + "lastModified": "2024-11-12T18:15:38.500", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49004", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49005.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49005.json new file mode 100644 index 00000000000..23d25bfb266 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49005.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49005", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:38.740", + "lastModified": "2024-11-12T18:15:38.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49005", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49006.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49006.json new file mode 100644 index 00000000000..1454d1d7fdc --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49006.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49006", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:38.963", + "lastModified": "2024-11-12T18:15:38.963", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49006", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49007.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49007.json new file mode 100644 index 00000000000..2540fbf4007 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49007.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49007", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:39.203", + "lastModified": "2024-11-12T18:15:39.203", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49007", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49008.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49008.json new file mode 100644 index 00000000000..b858a8e67a3 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49008.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49008", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:39.423", + "lastModified": "2024-11-12T18:15:39.423", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49008", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49009.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49009.json new file mode 100644 index 00000000000..707967b9d32 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49009.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49009", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:39.650", + "lastModified": "2024-11-12T18:15:39.650", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49009", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49010.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49010.json new file mode 100644 index 00000000000..13615668d64 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49010.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49010", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:39.870", + "lastModified": "2024-11-12T18:15:39.870", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49010", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49011.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49011.json new file mode 100644 index 00000000000..f088cfbdb94 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49011.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49011", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:40.087", + "lastModified": "2024-11-12T18:15:40.087", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49011", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49012.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49012.json new file mode 100644 index 00000000000..0553e119554 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49012.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49012", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:40.307", + "lastModified": "2024-11-12T18:15:40.307", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49012", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49013.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49013.json new file mode 100644 index 00000000000..3e8e8b66b69 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49013.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49013", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:40.530", + "lastModified": "2024-11-12T18:15:40.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49013", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49014.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49014.json new file mode 100644 index 00000000000..fe04390fed9 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49014.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49014", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:40.737", + "lastModified": "2024-11-12T18:15:40.737", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49014", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49015.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49015.json new file mode 100644 index 00000000000..2de67a52b64 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49015.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49015", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:40.953", + "lastModified": "2024-11-12T18:15:40.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49015", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49016.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49016.json new file mode 100644 index 00000000000..59ba5e8d3af --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49016.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49016", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:41.177", + "lastModified": "2024-11-12T18:15:41.177", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49016", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49017.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49017.json new file mode 100644 index 00000000000..ebcaa830420 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49017.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49017", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:41.407", + "lastModified": "2024-11-12T18:15:41.407", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49017", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49018.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49018.json new file mode 100644 index 00000000000..74ad3b8e125 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49018.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49018", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:41.637", + "lastModified": "2024-11-12T18:15:41.637", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Server Native Client Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-197" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49018", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49019.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49019.json new file mode 100644 index 00000000000..fe4b5cebd3e --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49019.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49019", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:41.863", + "lastModified": "2024-11-12T18:15:41.863", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Active Directory Certificate Services Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1390" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49019", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49021.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49021.json new file mode 100644 index 00000000000..d8ee387901e --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49021.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49021", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:42.100", + "lastModified": "2024-11-12T18:15:42.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft SQL Server Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49021", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49026.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49026.json new file mode 100644 index 00000000000..306d774f951 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49026.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49026", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:42.357", + "lastModified": "2024-11-12T18:15:42.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Excel Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49026", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49027.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49027.json new file mode 100644 index 00000000000..d045d0fb334 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49027.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49027", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:42.590", + "lastModified": "2024-11-12T18:15:42.590", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Excel Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49027", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49028.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49028.json new file mode 100644 index 00000000000..48afc8adec5 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49028.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49028", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:42.810", + "lastModified": "2024-11-12T18:15:42.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Excel Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49028", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49029.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49029.json new file mode 100644 index 00000000000..19271043977 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49029.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49029", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:43.017", + "lastModified": "2024-11-12T18:15:43.017", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Excel Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49029", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49030.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49030.json new file mode 100644 index 00000000000..3a155414e3b --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49030.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49030", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:43.260", + "lastModified": "2024-11-12T18:15:43.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Excel Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49030", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49031.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49031.json new file mode 100644 index 00000000000..e2ef6ca48c7 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49031.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49031", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:43.483", + "lastModified": "2024-11-12T18:15:43.483", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Office Graphics Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49031", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49032.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49032.json new file mode 100644 index 00000000000..aad1e4f4abf --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49032.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49032", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:43.737", + "lastModified": "2024-11-12T18:15:43.737", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Office Graphics Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49032", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49033.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49033.json new file mode 100644 index 00000000000..1f6a326402d --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49033.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49033", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:43.950", + "lastModified": "2024-11-12T18:15:43.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Word Security Feature Bypass Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49033", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49039.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49039.json new file mode 100644 index 00000000000..f23d491ccde --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49039.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49039", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:44.160", + "lastModified": "2024-11-12T18:15:44.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Task Scheduler Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49039", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49040.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49040.json new file mode 100644 index 00000000000..60148b94081 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49040.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49040", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:44.410", + "lastModified": "2024-11-12T18:15:44.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft Exchange Server Spoofing Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-451" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49040", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49043.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49043.json new file mode 100644 index 00000000000..13ed08fa97c --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49043.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49043", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:44.637", + "lastModified": "2024-11-12T18:15:44.637", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft.SqlServer.XEvent.Configuration.dll Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49043", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49044.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49044.json new file mode 100644 index 00000000000..1f8136c66fd --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49044.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49044", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:44.867", + "lastModified": "2024-11-12T18:15:44.867", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Visual Studio Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 6.7, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49044", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49046.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49046.json new file mode 100644 index 00000000000..19b67c13b33 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49046.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49046", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:45.100", + "lastModified": "2024-11-12T18:15:45.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49046", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49048.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49048.json new file mode 100644 index 00000000000..4b43a5dd534 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49048.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49048", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:45.353", + "lastModified": "2024-11-12T18:15:45.353", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "TorchGeo Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49048", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49049.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49049.json new file mode 100644 index 00000000000..8d6bc633700 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49049.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49049", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:45.587", + "lastModified": "2024-11-12T18:15:45.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Visual Studio Code Remote Extension Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49049", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49050.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49050.json new file mode 100644 index 00000000000..b8497c5ee58 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49050.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49050", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:45.810", + "lastModified": "2024-11-12T18:15:45.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Visual Studio Code Python Extension Remote Code Execution Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-501" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49050", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49051.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49051.json new file mode 100644 index 00000000000..08100211659 --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49051.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49051", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:46.037", + "lastModified": "2024-11-12T18:15:46.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Microsoft PC Manager Elevation of Privilege Vulnerability" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-59" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49051", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49056.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49056.json new file mode 100644 index 00000000000..d2dc52fb19c --- /dev/null +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49056.json @@ -0,0 +1,63 @@ +{ + "id": "CVE-2024-49056", + "sourceIdentifier": "secure@microsoft.com", + "published": "2024-11-12T18:15:46.273", + "lastModified": "2024-11-12T18:15:46.273", + "vulnStatus": "Received", + "cveTags": [ + { + "sourceIdentifier": "secure@microsoft.com", + "tags": [ + "exclusively-hosted-service" + ] + } + ], + "descriptions": [ + { + "lang": "en", + "value": "Authentication bypass by assumed-immutable data on airlift.microsoft.com allows an authorized attacker to elevate privileges over a network." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-302" + } + ] + } + ], + "references": [ + { + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49056", + "source": "secure@microsoft.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-493xx/CVE-2024-49369.json b/CVE-2024/CVE-2024-493xx/CVE-2024-49369.json new file mode 100644 index 00000000000..52312c81ab0 --- /dev/null +++ b/CVE-2024/CVE-2024-493xx/CVE-2024-49369.json @@ -0,0 +1,80 @@ +{ + "id": "CVE-2024-49369", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-12T17:15:08.250", + "lastModified": "2024-11-12T17:15:08.250", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. The TLS certificate validation in all Icinga 2 versions starting from 2.4.0 was flawed, allowing an attacker to impersonate both trusted cluster nodes as well as any API users that use TLS client certificates for authentication (ApiUser objects with the client_cn attribute set). This vulnerability has been fixed in v2.14.3, v2.13.10, v2.12.11, and v2.11.12." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Icinga/icinga2/commit/0419a2c36de408e9a703aec0962061ec9a285d3c", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Icinga/icinga2/commit/2febc5e18ae0c93d989e64ebc2a9fd90e7205ad8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Icinga/icinga2/commit/3504fc7ed688c10d86988e2029a65efc311393fe", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Icinga/icinga2/commit/869a7d6f0fe38c748e67bacc1fbdd42c933030f6", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Icinga/icinga2/commit/8fed6608912c752b337d977f730547875a820831", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-j7wq-r9mg-9wpv", + "source": "security-advisories@github.com" + }, + { + "url": "https://icinga.com/blog/2024/11/12/critical-icinga-2-security-releases-2-14-3", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49514.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49514.json new file mode 100644 index 00000000000..c7f53d0cbce --- /dev/null +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49514.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49514", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T17:15:08.490", + "lastModified": "2024-11-12T17:15:08.490", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Photoshop Desktop versions 24.7.3, 25.11 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/photoshop/apsb24-89.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49521.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49521.json new file mode 100644 index 00000000000..bfbde4362cd --- /dev/null +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49521.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49521", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T17:15:08.783", + "lastModified": "2024-11-12T17:15:08.783", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Adobe Commerce versions 3.2.5 and earlier are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to a security feature bypass. A low privileged attacker could exploit this vulnerability to send crafted requests from the vulnerable server to internal systems, which could result in the bypassing of security measures such as firewalls. Exploitation of this issue does not require user interaction." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/magento/apsb24-90.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49526.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49526.json new file mode 100644 index 00000000000..86a7ecc407e --- /dev/null +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49526.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49526", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T17:15:09.020", + "lastModified": "2024-11-12T17:15:09.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Animate versions 23.0.7, 24.0.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49527.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49527.json new file mode 100644 index 00000000000..974caddb708 --- /dev/null +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49527.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49527", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T17:15:09.240", + "lastModified": "2024-11-12T17:15:09.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Animate versions 23.0.7, 24.0.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. An attacker could leverage this vulnerability to bypass mitigations such as ASLR. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49528.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49528.json new file mode 100644 index 00000000000..31fbb751197 --- /dev/null +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49528.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49528", + "sourceIdentifier": "psirt@adobe.com", + "published": "2024-11-12T17:15:09.453", + "lastModified": "2024-11-12T17:15:09.453", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Animate versions 23.0.7, 24.0.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@adobe.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://helpx.adobe.com/security/products/animate/apsb24-76.html", + "source": "psirt@adobe.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50336.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50336.json new file mode 100644 index 00000000000..a98683c5bc9 --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50336.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-50336", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-12T17:15:09.680", + "lastModified": "2024-11-12T17:15:09.680", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "matrix-js-sdk is a Matrix messaging protocol Client-Server SDK for JavaScript. matrix-js-sdk before 34.11.0 is vulnerable to client-side path traversal via crafted MXC URIs. A malicious room member can trigger clients based on the matrix-js-sdk to issue arbitrary authenticated GET requests to the client's homeserver. Fixed in matrix-js-sdk 34.11.1." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-xvg8-m4x3-w6xr", + "source": "security-advisories@github.com" + }, + { + "url": "https://spec.matrix.org/v1.12/client-server-api/#security-considerations-5", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50667.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50667.json index 045a084393c..6b3e03c3635 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50667.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50667.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50667", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T19:15:03.960", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T17:35:12.270", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "El boa httpd de Trendnet TEW-820AP 1.01.B01 tiene una vulnerabilidad de desbordamiento de pila en /boafrm/formIPv6Addr, /boafrm/formIpv6Setup, /boafrm/formDnsv6. La raz\u00f3n es que la comprobaci\u00f3n de la direcci\u00f3n IPv6 no es suficiente, lo que permite a los atacantes construir payloads para los ataques." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://github.com/ixout/iotVuls/blob/main/Trendnet/TEW_820/report.md", diff --git a/CVE-2024/CVE-2024-509xx/CVE-2024-50989.json b/CVE-2024/CVE-2024-509xx/CVE-2024-50989.json index 76be2c38d87..65e1db43ccf 100644 --- a/CVE-2024/CVE-2024-509xx/CVE-2024-50989.json +++ b/CVE-2024/CVE-2024-509xx/CVE-2024-50989.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50989", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T15:15:06.390", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T18:35:31.437", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de inyecci\u00f3n SQL en /omrs/admin/search.php en PHPGurukul Online Marriage Registration System v1.0 permite a un atacante ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro \"searchdata\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/vkcyberexpert/CVE-Writeup/blob/main/PHPGurukul/Marriage%20Registration/SQL%20Injction.pdf.pdf", diff --git a/CVE-2024/CVE-2024-510xx/CVE-2024-51026.json b/CVE-2024/CVE-2024-510xx/CVE-2024-51026.json index 77d20fe1db3..601b9d43519 100644 --- a/CVE-2024/CVE-2024-510xx/CVE-2024-51026.json +++ b/CVE-2024/CVE-2024-510xx/CVE-2024-51026.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51026", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T21:15:06.683", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T18:35:32.357", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "El sistema NetAdmin IAM (versi\u00f3n 4.0.30319) tiene una vulnerabilidad de Cross Site Scripting (XSS) en el endpoint /BalloonSave.ashx, donde es posible inyectar un payload malicioso en el campo Content=." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/BrotherOfJhonny/CVE-2024-51026_Overview", diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51135.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51135.json index 6e33044ef94..1d21f8993b8 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51135.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51135.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51135", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T19:15:04.047", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T17:35:13.127", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de entidad externa XML (XXE) en el componente DocumentBuilderFactory de powertac-server v1.9.0 permite a los atacantes acceder a informaci\u00f3n confidencial o ejecutar c\u00f3digo arbitrario mediante el suministro de una solicitud manipulada que contiene entidades XML maliciosas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "http://www.powertac.org/", diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51213.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51213.json index 6c603a5aa30..cedb73b5151 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51213.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51213.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51213", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T23:15:05.900", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T18:35:33.433", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de Cross Site Scripting en Online Shop Store v.1.0 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente login.php." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Prabhatsk7/CVE/blob/main/CVE-2024-51213", diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51720.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51720.json new file mode 100644 index 00000000000..1541eb02579 --- /dev/null +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51720.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-51720", + "sourceIdentifier": "secure@blackberry.com", + "published": "2024-11-12T18:15:46.693", + "lastModified": "2024-11-12T18:15:46.693", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An insufficient entropy vulnerability in the SecuSUITE Secure Client Authentication (SCA) Server of SecuSUITE versions 5.0.420 and earlier could allow an attacker to potentially enroll an attacker-controlled device to the victim\u2019s account and telephone number." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "secure@blackberry.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 + } + ] + }, + "references": [ + { + "url": "https://support.blackberry.com/pkb/s/article/140220", + "source": "secure@blackberry.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51749.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51749.json new file mode 100644 index 00000000000..e7a80a75d6a --- /dev/null +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51749.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-51749", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-12T17:15:09.910", + "lastModified": "2024-11-12T17:15:09.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Element is a Matrix web client built using the Matrix React SDK. Versions of Element Web and Desktop earlier than 1.11.85 do not check if thumbnails for attachments, stickers and images are coherent. It is possible to add thumbnails to events trigger a file download once clicked. Fixed in element-web 1.11.85." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-451" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/element-hq/element-web/commit/a00c343435d633e64de2c0548217aa611c7bbef5", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/element-hq/element-web/security/advisories/GHSA-5486-384g-mcx2", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51750.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51750.json new file mode 100644 index 00000000000..e5d053ad8a7 --- /dev/null +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51750.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-51750", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-12T17:15:10.130", + "lastModified": "2024-11-12T17:15:10.130", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Element is a Matrix web client built using the Matrix React SDK. A malicious homeserver can send invalid messages over federation which can prevent Element Web and Desktop from rendering single messages or the entire room containing them. This was patched in Element Web and Desktop 1.11.85." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.1, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-248" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/element-hq/element-web/commit/231073c578d5f92b33cde7aa2b0b9c5836b2dc48", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/element-hq/element-web/security/advisories/GHSA-w36j-v56h-q9pc", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-520xx/CVE-2024-52010.json b/CVE-2024/CVE-2024-520xx/CVE-2024-52010.json new file mode 100644 index 00000000000..743da08f10c --- /dev/null +++ b/CVE-2024/CVE-2024-520xx/CVE-2024-52010.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-52010", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-12T17:15:10.370", + "lastModified": "2024-11-12T17:15:10.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Zoraxy is a general purpose HTTP reverse proxy and forwarding tool. A command injection vulnerability in the Web SSH feature allows an authenticated attacker to execute arbitrary commands as root on the host. Zoraxy has a Web SSH terminal feature that allows authenticated users to connect to SSH servers from their browsers. In HandleCreateProxySession the request to create an SSH session is handled. An attacker can exploit the username variable to escape from the bash command and inject arbitrary commands into sshCommand. This is possible, because, unlike hostname and port, the username is not validated or sanitized." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 8.6, + "baseSeverity": "HIGH" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/tobychui/zoraxy/commit/2e9bc77a5d832bff1093058d42ce7a61382e4bc6", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/tobychui/zoraxy/commit/c07d5f85dfc37bd32819358ed7d4bc32c604e8f0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/tobychui/zoraxy/security/advisories/GHSA-7hpf-g48v-hw3j", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-57xx/CVE-2024-5742.json b/CVE-2024/CVE-2024-57xx/CVE-2024-5742.json index e07bc5e89cc..658fc0bf577 100644 --- a/CVE-2024/CVE-2024-57xx/CVE-2024-5742.json +++ b/CVE-2024/CVE-2024-57xx/CVE-2024-5742.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5742", "sourceIdentifier": "secalert@redhat.com", "published": "2024-06-12T09:15:23.037", - "lastModified": "2024-10-07T20:15:07.173", + "lastModified": "2024-11-12T18:15:46.973", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -135,6 +135,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:6986", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9430", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-5742", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6239.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6239.json index 133140ac56b..3db6bb7a981 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6239.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6239.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6239", "sourceIdentifier": "secalert@redhat.com", "published": "2024-06-21T14:15:14.007", - "lastModified": "2024-09-18T09:15:05.803", + "lastModified": "2024-11-12T17:15:10.520", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -129,6 +129,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:5305", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9167", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-6239", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6655.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6655.json index fd0d32602af..01f2babca61 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6655.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6655.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6655", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-16T15:15:12.597", - "lastModified": "2024-09-25T01:15:45.070", + "lastModified": "2024-11-12T17:15:10.680", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -56,6 +56,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:6963", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9184", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-6655", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-74xx/CVE-2024-7409.json b/CVE-2024/CVE-2024-74xx/CVE-2024-7409.json index 28b55e77b82..04b91d68b7a 100644 --- a/CVE-2024/CVE-2024-74xx/CVE-2024-7409.json +++ b/CVE-2024/CVE-2024-74xx/CVE-2024-7409.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7409", "sourceIdentifier": "secalert@redhat.com", "published": "2024-08-05T14:15:35.813", - "lastModified": "2024-10-01T05:15:12.650", + "lastModified": "2024-11-12T17:15:10.833", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -68,6 +68,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:7408", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9136", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-7409", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7571.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7571.json new file mode 100644 index 00000000000..4c248393ded --- /dev/null +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7571.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-7571", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T17:15:10.973", + "lastModified": "2024-11-12T17:15:10.973", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect permissions in Ivanti Secure Access Client before 22.7R4 allows a local authenticated attacker to escalate their privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-267" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8068.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8068.json new file mode 100644 index 00000000000..8f32d035819 --- /dev/null +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8068.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-8068", + "sourceIdentifier": "secure@citrix.com", + "published": "2024-11-12T18:15:47.450", + "lastModified": "2024-11-12T18:15:47.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Privilege escalation to NetworkService Account access\u00a0in Citrix Session Recording when an attacker is an authenticated user in the same Windows Active Directory domain as the session recording server domain" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@citrix.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "secure@citrix.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://support.citrix.com/s/article/CTX691941-citrix-session-recording-security-bulletin-for-cve20248068-and-cve20248069?language=en_US", + "source": "secure@citrix.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8069.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8069.json new file mode 100644 index 00000000000..337a22197ed --- /dev/null +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8069.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-8069", + "sourceIdentifier": "secure@citrix.com", + "published": "2024-11-12T18:15:47.603", + "lastModified": "2024-11-12T18:15:47.603", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Limited remote code execution with privilege of a NetworkService Account access\u00a0in\u00a0Citrix Session Recording if the attacker is an authenticated user on the same intranet as the session recording server" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "secure@citrix.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + } + } + ] + }, + "weaknesses": [ + { + "source": "secure@citrix.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://support.citrix.com/s/article/CTX691941-citrix-session-recording-security-bulletin-for-cve20248068-and-cve20248069?language=en_US", + "source": "secure@citrix.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8235.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8235.json index 2d1aeec3481..69882595cc8 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8235.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8235.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8235", "sourceIdentifier": "secalert@redhat.com", "published": "2024-08-30T17:15:15.783", - "lastModified": "2024-09-25T18:56:19.090", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-12T17:15:11.197", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -90,11 +90,9 @@ "negate": false, "cpeMatch": [ { - "vulnerable": true, - "criteria": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", - "versionStartIncluding": "10.4.0", - "versionEndExcluding": "10.7.0", - "matchCriteriaId": "C0CCD8C5-8BD8-42B5-ABAB-F68D4BDB4E10" + "vulnerable": false, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" } ] }, @@ -103,9 +101,11 @@ "negate": false, "cpeMatch": [ { - "vulnerable": false, - "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", - "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + "vulnerable": true, + "criteria": "cpe:2.3:a:redhat:libvirt:*:*:*:*:*:*:*:*", + "versionStartIncluding": "10.4.0", + "versionEndExcluding": "10.7.0", + "matchCriteriaId": "C0CCD8C5-8BD8-42B5-ABAB-F68D4BDB4E10" } ] } @@ -113,6 +113,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:9128", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-8235", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-85xx/CVE-2024-8539.json b/CVE-2024/CVE-2024-85xx/CVE-2024-8539.json new file mode 100644 index 00000000000..fa00c309e54 --- /dev/null +++ b/CVE-2024/CVE-2024-85xx/CVE-2024-8539.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-8539", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T17:15:11.357", + "lastModified": "2024-11-12T17:15:11.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper authorization in Ivanti Secure Access Client before version 22.7R3 allows a local authenticated attacker to modify sensitive configuration files." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-267" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9341.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9341.json index 467bf2a7368..dadb35ac25a 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9341.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9341.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9341", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-01T19:15:09.500", - "lastModified": "2024-11-07T08:15:13.577", + "lastModified": "2024-11-12T18:15:47.840", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -88,6 +88,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:8846", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9454", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9459", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-9341", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9407.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9407.json index 8b5261f4ba3..ff961f4f0ab 100644 --- a/CVE-2024/CVE-2024-94xx/CVE-2024-9407.json +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9407.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9407", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-01T21:15:08.530", - "lastModified": "2024-11-11T17:15:05.457", + "lastModified": "2024-11-12T18:15:48.057", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -60,6 +60,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:9051", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9454", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9459", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-9407", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9675.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9675.json index 666f13cf4d3..052b8afc844 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9675.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9675.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9675", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-09T15:15:17.837", - "lastModified": "2024-11-11T17:15:05.587", + "lastModified": "2024-11-12T18:15:48.180", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -100,6 +100,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:9051", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9454", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9459", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-9675", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9676.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9676.json index adcea26f66f..6928a65cc2f 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9676.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9676.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9676", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-15T16:15:06.933", - "lastModified": "2024-11-11T18:15:15.440", + "lastModified": "2024-11-12T18:15:48.340", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -84,6 +84,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:9051", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9454", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9459", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-9676", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9842.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9842.json new file mode 100644 index 00000000000..54e7c934ca3 --- /dev/null +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9842.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-9842", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T17:15:11.580", + "lastModified": "2024-11-12T17:15:11.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Incorrect permissions in Ivanti Secure Access Client before version 22.7R4 allows a local authenticated attacker to create arbitrary folders." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-267" + }, + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9843.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9843.json new file mode 100644 index 00000000000..d626fcba404 --- /dev/null +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9843.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-9843", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T17:15:11.793", + "lastModified": "2024-11-12T17:15:11.793", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A buffer over-read in Ivanti Secure Access Client before 22.7R4 allows a local unauthenticated attacker to cause a denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.0, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-99xx/CVE-2024-9999.json b/CVE-2024/CVE-2024-99xx/CVE-2024-9999.json new file mode 100644 index 00000000000..e1ddbc42b2a --- /dev/null +++ b/CVE-2024/CVE-2024-99xx/CVE-2024-9999.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-9999", + "sourceIdentifier": "security@progress.com", + "published": "2024-11-12T17:15:12.013", + "lastModified": "2024-11-12T17:15:12.013", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In WS_FTP Server versions before 8.8.9 (2022.0.9), an Incorrect Implementation of Authentication Algorithm in the Web Transfer Module allows users to skip the second-factor verification and log in with username and password only." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-303" + } + ] + } + ], + "references": [ + { + "url": "https://community.progress.com/s/article/WS-FTP-Server-Service-Pack-November-2024", + "source": "security@progress.com" + }, + { + "url": "https://www.progress.com/ftp-server", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index bae6d48bdd3..f5520cb3819 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-12T17:00:23.233250+00:00 +2024-11-12T19:00:22.928945+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-12T16:35:25.143000+00:00 +2024-11-12T18:35:33.433000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -269186 +269311 ``` ### CVEs added in the last Commit -Recently added CVEs: `44` +Recently added CVEs: `125` -- [CVE-2024-50317](CVE-2024/CVE-2024-503xx/CVE-2024-50317.json) (`2024-11-12T16:15:23.347`) -- [CVE-2024-50318](CVE-2024/CVE-2024-503xx/CVE-2024-50318.json) (`2024-11-12T16:15:23.537`) -- [CVE-2024-50319](CVE-2024/CVE-2024-503xx/CVE-2024-50319.json) (`2024-11-12T16:15:23.713`) -- [CVE-2024-50320](CVE-2024/CVE-2024-503xx/CVE-2024-50320.json) (`2024-11-12T16:15:23.910`) -- [CVE-2024-50321](CVE-2024/CVE-2024-503xx/CVE-2024-50321.json) (`2024-11-12T16:15:24.100`) -- [CVE-2024-50322](CVE-2024/CVE-2024-503xx/CVE-2024-50322.json) (`2024-11-12T16:15:24.280`) -- [CVE-2024-50323](CVE-2024/CVE-2024-503xx/CVE-2024-50323.json) (`2024-11-12T16:15:24.473`) -- [CVE-2024-50324](CVE-2024/CVE-2024-503xx/CVE-2024-50324.json) (`2024-11-12T16:15:24.653`) -- [CVE-2024-50326](CVE-2024/CVE-2024-503xx/CVE-2024-50326.json) (`2024-11-12T16:15:24.840`) -- [CVE-2024-50327](CVE-2024/CVE-2024-503xx/CVE-2024-50327.json) (`2024-11-12T16:15:25.023`) -- [CVE-2024-50328](CVE-2024/CVE-2024-503xx/CVE-2024-50328.json) (`2024-11-12T16:15:25.207`) -- [CVE-2024-50329](CVE-2024/CVE-2024-503xx/CVE-2024-50329.json) (`2024-11-12T16:15:25.383`) -- [CVE-2024-50330](CVE-2024/CVE-2024-503xx/CVE-2024-50330.json) (`2024-11-12T16:15:25.573`) -- [CVE-2024-50331](CVE-2024/CVE-2024-503xx/CVE-2024-50331.json) (`2024-11-12T16:15:25.773`) -- [CVE-2024-50386](CVE-2024/CVE-2024-503xx/CVE-2024-50386.json) (`2024-11-12T15:15:10.397`) -- [CVE-2024-51562](CVE-2024/CVE-2024-515xx/CVE-2024-51562.json) (`2024-11-12T15:15:10.820`) -- [CVE-2024-51563](CVE-2024/CVE-2024-515xx/CVE-2024-51563.json) (`2024-11-12T15:15:10.903`) -- [CVE-2024-51564](CVE-2024/CVE-2024-515xx/CVE-2024-51564.json) (`2024-11-12T15:15:10.993`) -- [CVE-2024-51565](CVE-2024/CVE-2024-515xx/CVE-2024-51565.json) (`2024-11-12T15:15:11.083`) -- [CVE-2024-51566](CVE-2024/CVE-2024-515xx/CVE-2024-51566.json) (`2024-11-12T15:15:11.170`) -- [CVE-2024-52296](CVE-2024/CVE-2024-522xx/CVE-2024-52296.json) (`2024-11-12T16:15:26.030`) -- [CVE-2024-52297](CVE-2024/CVE-2024-522xx/CVE-2024-52297.json) (`2024-11-12T16:15:26.230`) -- [CVE-2024-8074](CVE-2024/CVE-2024-80xx/CVE-2024-8074.json) (`2024-11-12T15:15:11.673`) -- [CVE-2024-8495](CVE-2024/CVE-2024-84xx/CVE-2024-8495.json) (`2024-11-12T16:15:26.560`) -- [CVE-2024-9420](CVE-2024/CVE-2024-94xx/CVE-2024-9420.json) (`2024-11-12T16:15:26.760`) +- [CVE-2024-49044](CVE-2024/CVE-2024-490xx/CVE-2024-49044.json) (`2024-11-12T18:15:44.867`) +- [CVE-2024-49046](CVE-2024/CVE-2024-490xx/CVE-2024-49046.json) (`2024-11-12T18:15:45.100`) +- [CVE-2024-49048](CVE-2024/CVE-2024-490xx/CVE-2024-49048.json) (`2024-11-12T18:15:45.353`) +- [CVE-2024-49049](CVE-2024/CVE-2024-490xx/CVE-2024-49049.json) (`2024-11-12T18:15:45.587`) +- [CVE-2024-49050](CVE-2024/CVE-2024-490xx/CVE-2024-49050.json) (`2024-11-12T18:15:45.810`) +- [CVE-2024-49051](CVE-2024/CVE-2024-490xx/CVE-2024-49051.json) (`2024-11-12T18:15:46.037`) +- [CVE-2024-49056](CVE-2024/CVE-2024-490xx/CVE-2024-49056.json) (`2024-11-12T18:15:46.273`) +- [CVE-2024-49369](CVE-2024/CVE-2024-493xx/CVE-2024-49369.json) (`2024-11-12T17:15:08.250`) +- [CVE-2024-49514](CVE-2024/CVE-2024-495xx/CVE-2024-49514.json) (`2024-11-12T17:15:08.490`) +- [CVE-2024-49521](CVE-2024/CVE-2024-495xx/CVE-2024-49521.json) (`2024-11-12T17:15:08.783`) +- [CVE-2024-49526](CVE-2024/CVE-2024-495xx/CVE-2024-49526.json) (`2024-11-12T17:15:09.020`) +- [CVE-2024-49527](CVE-2024/CVE-2024-495xx/CVE-2024-49527.json) (`2024-11-12T17:15:09.240`) +- [CVE-2024-49528](CVE-2024/CVE-2024-495xx/CVE-2024-49528.json) (`2024-11-12T17:15:09.453`) +- [CVE-2024-50336](CVE-2024/CVE-2024-503xx/CVE-2024-50336.json) (`2024-11-12T17:15:09.680`) +- [CVE-2024-51720](CVE-2024/CVE-2024-517xx/CVE-2024-51720.json) (`2024-11-12T18:15:46.693`) +- [CVE-2024-51749](CVE-2024/CVE-2024-517xx/CVE-2024-51749.json) (`2024-11-12T17:15:09.910`) +- [CVE-2024-51750](CVE-2024/CVE-2024-517xx/CVE-2024-51750.json) (`2024-11-12T17:15:10.130`) +- [CVE-2024-52010](CVE-2024/CVE-2024-520xx/CVE-2024-52010.json) (`2024-11-12T17:15:10.370`) +- [CVE-2024-7571](CVE-2024/CVE-2024-75xx/CVE-2024-7571.json) (`2024-11-12T17:15:10.973`) +- [CVE-2024-8068](CVE-2024/CVE-2024-80xx/CVE-2024-8068.json) (`2024-11-12T18:15:47.450`) +- [CVE-2024-8069](CVE-2024/CVE-2024-80xx/CVE-2024-8069.json) (`2024-11-12T18:15:47.603`) +- [CVE-2024-8539](CVE-2024/CVE-2024-85xx/CVE-2024-8539.json) (`2024-11-12T17:15:11.357`) +- [CVE-2024-9842](CVE-2024/CVE-2024-98xx/CVE-2024-9842.json) (`2024-11-12T17:15:11.580`) +- [CVE-2024-9843](CVE-2024/CVE-2024-98xx/CVE-2024-9843.json) (`2024-11-12T17:15:11.793`) +- [CVE-2024-9999](CVE-2024/CVE-2024-99xx/CVE-2024-9999.json) (`2024-11-12T17:15:12.013`) ### CVEs modified in the last Commit -Recently modified CVEs: `61` +Recently modified CVEs: `38` -- [CVE-2024-43439](CVE-2024/CVE-2024-434xx/CVE-2024-43439.json) (`2024-11-12T15:35:10.043`) -- [CVE-2024-46891](CVE-2024/CVE-2024-468xx/CVE-2024-46891.json) (`2024-11-12T15:35:11.240`) -- [CVE-2024-46894](CVE-2024/CVE-2024-468xx/CVE-2024-46894.json) (`2024-11-12T15:35:12.310`) -- [CVE-2024-46962](CVE-2024/CVE-2024-469xx/CVE-2024-46962.json) (`2024-11-12T16:35:18.293`) -- [CVE-2024-46963](CVE-2024/CVE-2024-469xx/CVE-2024-46963.json) (`2024-11-12T16:35:19.117`) -- [CVE-2024-46964](CVE-2024/CVE-2024-469xx/CVE-2024-46964.json) (`2024-11-12T16:35:19.933`) -- [CVE-2024-46966](CVE-2024/CVE-2024-469xx/CVE-2024-46966.json) (`2024-11-12T16:35:20.790`) -- [CVE-2024-47593](CVE-2024/CVE-2024-475xx/CVE-2024-47593.json) (`2024-11-12T15:35:13.233`) -- [CVE-2024-49401](CVE-2024/CVE-2024-494xx/CVE-2024-49401.json) (`2024-11-12T16:10:18.870`) -- [CVE-2024-49402](CVE-2024/CVE-2024-494xx/CVE-2024-49402.json) (`2024-11-12T15:09:10.890`) -- [CVE-2024-50096](CVE-2024/CVE-2024-500xx/CVE-2024-50096.json) (`2024-11-12T16:16:33.703`) -- [CVE-2024-50097](CVE-2024/CVE-2024-500xx/CVE-2024-50097.json) (`2024-11-12T16:18:00.477`) -- [CVE-2024-50098](CVE-2024/CVE-2024-500xx/CVE-2024-50098.json) (`2024-11-12T16:25:48.717`) -- [CVE-2024-50099](CVE-2024/CVE-2024-500xx/CVE-2024-50099.json) (`2024-11-12T16:28:30.633`) -- [CVE-2024-50102](CVE-2024/CVE-2024-501xx/CVE-2024-50102.json) (`2024-11-12T15:08:00.563`) -- [CVE-2024-50104](CVE-2024/CVE-2024-501xx/CVE-2024-50104.json) (`2024-11-12T15:05:45.587`) -- [CVE-2024-50105](CVE-2024/CVE-2024-501xx/CVE-2024-50105.json) (`2024-11-12T15:06:14.500`) -- [CVE-2024-50106](CVE-2024/CVE-2024-501xx/CVE-2024-50106.json) (`2024-11-12T15:07:39.707`) -- [CVE-2024-50601](CVE-2024/CVE-2024-506xx/CVE-2024-50601.json) (`2024-11-12T16:35:22.810`) -- [CVE-2024-52533](CVE-2024/CVE-2024-525xx/CVE-2024-52533.json) (`2024-11-12T16:35:24.297`) -- [CVE-2024-6126](CVE-2024/CVE-2024-61xx/CVE-2024-6126.json) (`2024-11-12T15:15:11.403`) -- [CVE-2024-6501](CVE-2024/CVE-2024-65xx/CVE-2024-6501.json) (`2024-11-12T15:15:11.530`) -- [CVE-2024-6604](CVE-2024/CVE-2024-66xx/CVE-2024-6604.json) (`2024-11-12T16:35:25.143`) -- [CVE-2024-9835](CVE-2024/CVE-2024-98xx/CVE-2024-9835.json) (`2024-11-12T15:35:17.853`) -- [CVE-2024-9836](CVE-2024/CVE-2024-98xx/CVE-2024-9836.json) (`2024-11-12T15:35:18.093`) +- [CVE-2024-35878](CVE-2024/CVE-2024-358xx/CVE-2024-35878.json) (`2024-11-12T17:35:06.573`) +- [CVE-2024-36061](CVE-2024/CVE-2024-360xx/CVE-2024-36061.json) (`2024-11-12T17:35:07.450`) +- [CVE-2024-37086](CVE-2024/CVE-2024-370xx/CVE-2024-37086.json) (`2024-11-12T18:35:10.230`) +- [CVE-2024-38480](CVE-2024/CVE-2024-384xx/CVE-2024-38480.json) (`2024-11-12T18:35:13.150`) +- [CVE-2024-39226](CVE-2024/CVE-2024-392xx/CVE-2024-39226.json) (`2024-11-12T17:35:08.293`) +- [CVE-2024-41992](CVE-2024/CVE-2024-419xx/CVE-2024-41992.json) (`2024-11-12T18:35:14.290`) +- [CVE-2024-45769](CVE-2024/CVE-2024-457xx/CVE-2024-45769.json) (`2024-11-12T18:15:35.427`) +- [CVE-2024-45770](CVE-2024/CVE-2024-457xx/CVE-2024-45770.json) (`2024-11-12T18:15:35.643`) +- [CVE-2024-46965](CVE-2024/CVE-2024-469xx/CVE-2024-46965.json) (`2024-11-12T17:35:09.427`) +- [CVE-2024-47779](CVE-2024/CVE-2024-477xx/CVE-2024-47779.json) (`2024-11-12T17:15:08.037`) +- [CVE-2024-48322](CVE-2024/CVE-2024-483xx/CVE-2024-48322.json) (`2024-11-12T17:35:10.953`) +- [CVE-2024-50667](CVE-2024/CVE-2024-506xx/CVE-2024-50667.json) (`2024-11-12T17:35:12.270`) +- [CVE-2024-50989](CVE-2024/CVE-2024-509xx/CVE-2024-50989.json) (`2024-11-12T18:35:31.437`) +- [CVE-2024-51026](CVE-2024/CVE-2024-510xx/CVE-2024-51026.json) (`2024-11-12T18:35:32.357`) +- [CVE-2024-51135](CVE-2024/CVE-2024-511xx/CVE-2024-51135.json) (`2024-11-12T17:35:13.127`) +- [CVE-2024-51213](CVE-2024/CVE-2024-512xx/CVE-2024-51213.json) (`2024-11-12T18:35:33.433`) +- [CVE-2024-5742](CVE-2024/CVE-2024-57xx/CVE-2024-5742.json) (`2024-11-12T18:15:46.973`) +- [CVE-2024-6239](CVE-2024/CVE-2024-62xx/CVE-2024-6239.json) (`2024-11-12T17:15:10.520`) +- [CVE-2024-6655](CVE-2024/CVE-2024-66xx/CVE-2024-6655.json) (`2024-11-12T17:15:10.680`) +- [CVE-2024-7409](CVE-2024/CVE-2024-74xx/CVE-2024-7409.json) (`2024-11-12T17:15:10.833`) +- [CVE-2024-8235](CVE-2024/CVE-2024-82xx/CVE-2024-8235.json) (`2024-11-12T17:15:11.197`) +- [CVE-2024-9341](CVE-2024/CVE-2024-93xx/CVE-2024-9341.json) (`2024-11-12T18:15:47.840`) +- [CVE-2024-9407](CVE-2024/CVE-2024-94xx/CVE-2024-9407.json) (`2024-11-12T18:15:48.057`) +- [CVE-2024-9675](CVE-2024/CVE-2024-96xx/CVE-2024-9675.json) (`2024-11-12T18:15:48.180`) +- [CVE-2024-9676](CVE-2024/CVE-2024-96xx/CVE-2024-9676.json) (`2024-11-12T18:15:48.340`) ## Download and Usage diff --git a/_state.csv b/_state.csv index f1840ec8d3e..5adf0893d1b 100644 --- a/_state.csv +++ b/_state.csv @@ -16782,7 +16782,7 @@ CVE-2006-0997,0,0,991d701029b8962de39c4a94bce98784b353f47f12613b7b1d1ae4805420a8 CVE-2006-0998,0,0,5fd57cb2bc9c2de0f4e282b8466285f04c809e423b9691776cd038d37136efa8,2020-02-24T14:15:24.557000 CVE-2006-0999,0,0,16b847e2d564d023a5ba02daa1340bf92dcb51abe5a466e5e6b3b577f4ddfaad,2020-02-24T14:15:24.557000 CVE-2006-1000,0,0,a9d1eea525a149e4d5a648e88c4e9e0281df850672f3509f180397c960301e38,2018-10-18T16:30:09.463000 -CVE-2006-10001,0,1,7e2800fe90b96e8d0f2f01ea8e1f31f305d565190689e8a733e018a423e46882,2024-11-12T15:38:25.570000 +CVE-2006-10001,0,0,7e2800fe90b96e8d0f2f01ea8e1f31f305d565190689e8a733e018a423e46882,2024-11-12T15:38:25.570000 CVE-2006-1001,0,0,25679361c1c118c54b02e2d8ef37e64d3b286e6df731d4e98b94d5ad1b45f702,2017-10-19T01:29:03.673000 CVE-2006-1002,0,0,a9670ac1711979851f0dcebf2d41a8c2d37bb529ba627a730cb206fcdf1aa052,2018-10-18T16:30:10.150000 CVE-2006-1003,0,0,b81c65081590193e1b5617a72beee75e205be86c7e0fd45cd32e10c4166d5d06,2017-07-20T01:30:14.317000 @@ -224084,7 +224084,7 @@ CVE-2023-31700,0,0,55e8a67e547de58edc83863583088b7362c3c2fa6d5f8582aa8d36b490106 CVE-2023-31701,0,0,d63fbecac8e262cc76ed273c8132ef0d79d7e143b88fec57d71788e6825ebb69,2023-05-25T17:34:40.853000 CVE-2023-31702,0,0,f7af9bcb4c9a7182fbaffa7cc96f74428f05a6fc0545f4bc2c6318439862a0dd,2023-05-25T15:51:23.433000 CVE-2023-31703,0,0,591fd3e3042cdf3c19c72eb6418bb489ed8c7011a923c7a635ed02e14e495d69,2023-05-25T15:52:01.867000 -CVE-2023-31704,0,1,686c9882f786a66722828faffe0ec71d7336f3573d82f79c0e2eeb4f492dda77,2024-11-12T15:35:01.787000 +CVE-2023-31704,0,0,686c9882f786a66722828faffe0ec71d7336f3573d82f79c0e2eeb4f492dda77,2024-11-12T15:35:01.787000 CVE-2023-31705,0,0,ffa75e05045f456e7986ff2d26b923ff5ab765c8ce5479909998ed938e1804d0,2023-07-21T13:56:35.257000 CVE-2023-31707,0,0,b5bbdead45a6ce250c04fea60370d5652db3d0a66e9beb6667046ee5667bc03a,2023-05-26T02:06:14.377000 CVE-2023-31708,0,0,ee9e40f7a9a7688cc0cae519557ebd4be27d8368b4f0aff05f5c5c00e641c471,2023-05-27T03:39:56.307000 @@ -230827,7 +230827,7 @@ CVE-2023-40453,0,0,130c1ba245794699f114636eda3c5cf90574ba5b46bd6a704fe406b89dec0 CVE-2023-40454,0,0,c10b12346537ef1e5c8787b1e2fe9d4cb45cf0b585647c357d5bb525587ce317,2023-11-07T04:20:15.070000 CVE-2023-40455,0,0,058abdb8c2eae30e165ec5b264dbf295ba8e09c6c3830c69886965016a5de75b,2023-10-12T02:29:35.947000 CVE-2023-40456,0,0,7169803686183a5f1d426b39f88228ec6dce3691ab53bc177c949c7a8fd9efca,2023-11-07T04:20:15.193000 -CVE-2023-40457,0,0,8edfd8dabc5faeea08709e6458f97126e7a4aaabc2aa16ca1e65d28feaaa5413,2024-11-12T13:55:21.227000 +CVE-2023-40457,0,1,f66f1d5e2e0ac40e6f32530b5b5610f48deb1491ee6ad3c3cb1657188a034168,2024-11-12T18:35:01.990000 CVE-2023-40458,0,0,79a445a17e1f85e1f6c9345cf6a43d9301aed3a647416fbf1fc2770253362cdc,2023-12-05T01:55:09.410000 CVE-2023-40459,0,0,72958d07cda00b0c6d4ae1b61eff24e072a6de9dcd7e9245179ab8da7c7dd63d,2023-12-08T15:47:51.637000 CVE-2023-4046,0,0,74357e4a22d4d6aa6afa8fb2beea6097492a98a519070e944818d05926f858bb,2024-10-22T16:35:14.267000 @@ -240950,7 +240950,7 @@ CVE-2023-6677,0,0,e8d7b2ac483abddd5fb5246b0ccb58f2167ff8c7d9bb3d75a435f4c19bbf40 CVE-2023-6678,0,0,1b6b891a0a4426afd1f075411ff63c2743633b69b418dac3850de8598da1bdb5,2024-10-03T07:15:25.903000 CVE-2023-6679,0,0,8a553df1f73da3c3f6a8806f65fbad51b05599efca34aa3bb086ca5c7375d091,2024-09-16T16:15:11.767000 CVE-2023-6680,0,0,c6542118c55ee22c9b7c10aee5216ffa75acaf15d09a32564befb52a8c8ef3f4,2023-12-19T20:51:03.237000 -CVE-2023-6681,0,0,d360fedbf0c997e91a93b42a556bffc4945068180194d5383c7ee98c6935bb41,2024-10-10T14:32:07.260000 +CVE-2023-6681,0,1,ed277c59f3d312dc8556dfc6a1d1c9b2636fac1d961e3e3f2341af755c66b76d,2024-11-12T18:15:17.333000 CVE-2023-6682,0,0,69333011d542843f9f8a1cff6b2418572503758c6c0e55bd5de3a41edb291769,2024-10-03T07:15:26.070000 CVE-2023-6683,0,0,b645b2687895ad9ffdd472ae3eb052dcc4d9790cb61e30172f134f068042e89a,2024-09-14T00:15:14.397000 CVE-2023-6684,0,0,da2814d561e54fcd1c06571b2900d34494328fc42cf13ea916a741c8e290cd99,2024-01-17T20:41:05.143000 @@ -241461,7 +241461,7 @@ CVE-2023-7246,0,0,050d4503ff5d2fc1e4ed53053f9ee9630c64fe69870c591a8ba326c5d224f6 CVE-2023-7247,0,0,11dff8be09894b40cbed69114f71626bb57aa842b25cc2bedf8081784fe369f7,2024-08-12T14:35:03.053000 CVE-2023-7248,0,0,89fb0153d5d95a0d63adb7f25676b5b6c97388e661ba5f8924ac36ffce0f3f87,2024-07-26T19:11:49.893000 CVE-2023-7249,0,0,edc651203a9405def51a7acf8d5e1ea94a3c703618e6136a6e052f78ab77b7a0,2024-08-13T17:13:50.917000 -CVE-2023-7250,0,0,9a5f9775079474ddc45acce310e1f8cd06db79a566ee35ec7f63e8af33eee385,2024-07-02T23:15:10.377000 +CVE-2023-7250,0,1,d2697716e6fb6d3106b6b6ee93de27e1a2aa1cee868a8468ee5a044250f1319b,2024-11-12T17:15:05.750000 CVE-2023-7251,0,0,dd7a7df27ce68aab327ba0baa92251358ec7e4d2777ca1ea9021ce7d40f54021,2024-03-26T12:55:05.010000 CVE-2023-7252,0,0,a96b97f43999a9df13dd6b86a1c20c7b99309234cadd0538e19b9a3c2d31e5fc,2024-07-03T01:44:29.993000 CVE-2023-7253,0,0,4436e6df0abbc2be66c875c1a3b7421386cfdc4e7cfd00a94031f9b2a2d0783b,2024-07-03T01:44:30.193000 @@ -241776,7 +241776,7 @@ CVE-2024-0335,0,0,e7e090fd097a40a14fdf48dd790743e7f5ab16f43bcf6eb22bfc1b29fd2377 CVE-2024-0336,0,0,9aee920f4a5a0c04ff35e8f707096c50efb4022bceb3480b4da076fedf257149,2024-06-03T14:46:24.250000 CVE-2024-0337,0,0,eee1079f39054de873ab2c1c61df1366e60a284dc7a482cc04bc23b2010b4529,2024-08-01T19:35:09.993000 CVE-2024-0338,0,0,70505a995548ae9a90a762e5c254ec8226f91c5690ecf3e95b0138eb38a5ec9e,2024-02-09T19:28:45.703000 -CVE-2024-0340,0,1,996747747a825f6540395b86a93d1d8a405914bded56f64225ddee7d9a560594,2024-11-12T16:15:19.680000 +CVE-2024-0340,0,0,996747747a825f6540395b86a93d1d8a405914bded56f64225ddee7d9a560594,2024-11-12T16:15:19.680000 CVE-2024-0341,0,0,680923dff3cdc70d6ba9942573970086160b44b5db51b08f3c7252eed19e3791,2024-05-17T02:34:31.867000 CVE-2024-0342,0,0,46f8abddb1e51abb54c2a39d052de05423c1c2cc780aa2f6e5037ced9e262617,2024-05-17T02:34:31.980000 CVE-2024-0343,0,0,48a93e50e1ffec89cf65602aeae3fcdcb44ff23036051f47bac49d0ff25b3cd2,2024-05-17T02:34:32.080000 @@ -242595,7 +242595,7 @@ CVE-2024-10310,0,0,3b0decb54117e1f6369f0c8a49822eb1c6d4be5cb40b8b5a9079fd842cd0c CVE-2024-10312,0,0,d10f0012149342545ee317e492eeaf284c6b634b254526457f270c7ce4937a16,2024-10-29T14:34:04.427000 CVE-2024-10313,0,0,0a692e743da8a6f5929e9a5e61a16c962249b9fbffffedea4a154098bf7390c0,2024-10-25T12:56:07.750000 CVE-2024-10314,0,0,4ff424a08f54d46f95f43c7d51534e0e6342cc7a5b817ec1e4e580680bb1c702,2024-11-12T13:55:21.227000 -CVE-2024-10315,0,1,eceb96083ee1121320d8024fa3cfb5eb813c348987001d9bdcf2a127c724f9d0,2024-11-12T15:15:06.147000 +CVE-2024-10315,0,0,eceb96083ee1121320d8024fa3cfb5eb813c348987001d9bdcf2a127c724f9d0,2024-11-12T15:15:06.147000 CVE-2024-10318,0,0,c9c0b32165e110789e705dc55263c8f26a928f9dce25281896f08d394c1b97f7,2024-11-08T19:51:49.380000 CVE-2024-10319,0,0,521a2584bb331a8cf29df932b8069e068af4d281b03c20cc06073eb127cb6582,2024-11-08T15:25:16.317000 CVE-2024-1032,0,0,06925fc416f8ceea7fb895efc2e3f765d4f064c5150968a9409448741aa1fb78,2024-05-17T02:35:11.947000 @@ -242924,12 +242924,16 @@ CVE-2024-10919,0,0,e8fbb923eb829e965254205b876d7ef672d5aac59877ea419609aa8d8f6bb CVE-2024-1092,0,0,4e514cbeb8cbdb0016fe4cb374f3dffe448e95b35a82b13ed7cb7be1b7fe61c2,2024-02-13T19:43:06.247000 CVE-2024-10920,0,0,2cf9a2b6fa319444c301d4d5e50d2260546d202b9ce9ceed0622f3257443827f,2024-11-06T18:17:17.287000 CVE-2024-10922,0,0,2e8ad1bbe2c22b2f860e82caba9eca723e865a4e9bffae87682e3cfa53e59e0d,2024-11-08T19:01:25.633000 +CVE-2024-10923,1,1,82c317d92ab1af3f47ad0ad4c35f20bd39aa6b7b5483e38f4b25d2b1b0295625,2024-11-12T17:15:05.947000 CVE-2024-10926,0,0,d4b8448490b176d20ac7d5dd5d9abfb0445d0f8f33211ac22e460a561e976123,2024-11-08T19:01:25.633000 CVE-2024-10927,0,0,89d2896b297590d0b070dc2d6fc3af12d21eeade74b7d5af5a8c30243a174669,2024-11-08T19:01:25.633000 CVE-2024-10928,0,0,d7b9ae13d8f86fa638d0e1d42acef5c90ca0f7e31aac0a4c1ed2473457ce5298,2024-11-08T19:01:25.633000 CVE-2024-1093,0,0,de7ad9b72d87a55cf339c2dc774b7bea1d33bb68e3b932a439fb6fd6a0ef5b53,2024-03-05T13:41:01.900000 CVE-2024-1094,0,0,e9e492360318e20689e515fe6138ed3b8630e834f4abf2efeafd987f7e7b2dc6,2024-06-17T12:42:04.623000 CVE-2024-10941,0,0,13c9aa5648736117eddcc05b7c7bbd41bd256da81c39332a1bd9e9e846bf4626,2024-11-08T19:01:25.633000 +CVE-2024-10943,1,1,84c07fdcd8c5106d81f33b83afbfffe38cf4ca09d97554fa1a2524231064ce3f,2024-11-12T17:15:06.147000 +CVE-2024-10944,1,1,fad9252603f4f5e633aab60761cddb765b5389cacf71dca515252fac65e41aa6,2024-11-12T17:15:06.397000 +CVE-2024-10945,1,1,4e477166a1f6f50ebc376c175bf644c0d42879d182fdd9cbb451bcdfb5071cc7,2024-11-12T17:15:06.640000 CVE-2024-10946,0,0,53c127b5d01f3eb86df399cdeeb942bf199714aabfb134ba6a8dac66d645a2f4,2024-11-08T19:01:25.633000 CVE-2024-10947,0,0,0411e4a4d7c1a87e65d7d83c82156a4ec968e1f848bfec751aba34746b5cca7a,2024-11-08T19:01:03.880000 CVE-2024-1095,0,0,e70da3b629cae08421ac3ff6db71fb525bf872b735f906aa9168a1a3feae7dcb,2024-03-05T13:41:01.900000 @@ -242943,7 +242947,7 @@ CVE-2024-10966,0,0,3df47cfeba07424dbca1650d45cf844f6cc1bcda5f1462544d39e404a912c CVE-2024-10967,0,0,045953be48e7bafc650cdaba1889b3cce653fc03383c0343e3292851109279a3,2024-11-08T19:01:03.880000 CVE-2024-10968,0,0,f600c79ff6183eb1b51f4003b01ba4a417fb853b88c9cd1f3e9f06879ffd32fe,2024-11-08T19:01:03.880000 CVE-2024-10969,0,0,34fb384baf8f9b6070297fa30997eac3a4fc91278070bd97f872695ea721a856,2024-11-08T19:01:03.880000 -CVE-2024-10971,1,1,e01cc48d2fbbca763136aba8650890c04c72d0489e6634d35f671e5198c3cca8,2024-11-12T16:15:19.930000 +CVE-2024-10971,0,1,b4b82dfc872fef33ddffdd14312b6666aaa239c31cf44b5ba468870e23f38075,2024-11-12T17:15:06.870000 CVE-2024-10975,0,0,f38693c9a402e208f0de21f91edcefa5c1f789073d3e380787ea5dd138f197fa,2024-11-08T19:01:03.880000 CVE-2024-1098,0,0,7637c79f93f6fef4c2ad0472be16e5b2b85cffeb9436b7defda280fbd3390871,2024-05-17T02:35:14.017000 CVE-2024-10987,0,0,0f5f40b95778e745d3c36eceef208d20fa1e84c6479725fa9e8e4c2b6e2464d8,2024-11-08T19:01:03.880000 @@ -242961,7 +242965,10 @@ CVE-2024-10998,0,0,41f387fbf1645aa90b35c52ac0db0cc1b6181351deba62e7b43db2377129b CVE-2024-10999,0,0,25c169fccdcc9e88a3876005f32d4643213fc0492b1ed51816b7a93f6109fc6e,2024-11-08T19:01:03.880000 CVE-2024-1100,0,0,f004473b9cf0d9d95a81c6b2db685e986de4389d0d38ab5c3537c8bbd36c025b,2024-07-03T01:44:59.517000 CVE-2024-11000,0,0,4fb6c84b88e18aeb98d1b738e518210fb6a3e1010153945ab3cfa9fceb300001,2024-11-08T19:01:03.880000 -CVE-2024-11007,1,1,b6b07f0f1b717bb71ca1b4cfa8c9c66fbc9870ae254868dd40a59be0d6f05465,2024-11-12T16:15:20.050000 +CVE-2024-11004,1,1,bdd615d7fc4237dd1e34b18175b7a4bd23ea93fdaf86a550ff5db989d73c3b40,2024-11-12T17:15:06.943000 +CVE-2024-11005,1,1,6625a7034e44e3470d0593f642bc7d15f05d206a40a9f5a10fb4cb5474d25cf2,2024-11-12T17:15:07.130000 +CVE-2024-11006,1,1,68e6bf66f299a92baed5e7aaa3945d18465ada80a70b895680302f34e929ef13,2024-11-12T17:15:07.333000 +CVE-2024-11007,0,0,b6b07f0f1b717bb71ca1b4cfa8c9c66fbc9870ae254868dd40a59be0d6f05465,2024-11-12T16:15:20.050000 CVE-2024-11016,0,0,e06fd1e37d2bc29c8627eb88aec0c98e8edfc5d8e9aa4e4b0a05b03aac4f15bc,2024-11-12T13:55:21.227000 CVE-2024-11017,0,0,b6f5a0fdb93950e300deb11212bccdb1604dbaaea57c853aac4276b5e817e85e,2024-11-12T13:55:21.227000 CVE-2024-11018,0,0,f910e24d784d244818fd4780466645417572116f0165d15d5cf863939db2411e,2024-11-12T13:55:21.227000 @@ -242985,7 +242992,7 @@ CVE-2024-11057,0,0,f4d60f6fab1190311646d9264bfdcce59d278fed16386a412e93a051a1fca CVE-2024-11058,0,0,d71101d6ff89adc4dd72f5095ac1a64dea67b10c01cd7f3f72418eed1f520205,2024-11-12T13:55:21.227000 CVE-2024-11059,0,0,de7cfb30a6274819a2f3576f81d64b58ec0837ba2b51799f2a317460e7cb2779,2024-11-12T13:55:21.227000 CVE-2024-1106,0,0,20cb4a0a045157ac9e013fd166b9513d5a44a1304cf8a8ccabd3185b4a52ab40,2024-10-27T23:35:01.747000 -CVE-2024-11060,0,1,59a41911bcfc298095aabf4f558a2377a774e2b5628861d2f98e8a12c664f388,2024-11-12T16:15:20.447000 +CVE-2024-11060,0,0,59a41911bcfc298095aabf4f558a2377a774e2b5628861d2f98e8a12c664f388,2024-11-12T16:15:20.447000 CVE-2024-11061,0,0,ee12d74725b75271cde8b1d917e4dbdeaf688fb1c0b14088569080190058ad0c,2024-11-12T13:55:21.227000 CVE-2024-11062,0,0,fd55df6ee60df3ac3e659d07193cf97542af5dcd211c78f8b53360e3a9e97cc9,2024-11-12T13:55:21.227000 CVE-2024-11063,0,0,1a3eff04d87f74bc64be56e4515d0ac1a1dad44d3ef5f9e41d9c2ff803dd28c6,2024-11-12T13:55:21.227000 @@ -243013,15 +243020,16 @@ CVE-2024-11101,0,0,a2b85a410a212ab95b03a0a6c633679b89052f56b8c74d4fa60b641fe5c20 CVE-2024-11102,0,0,460c291b099a678065bd11e1bbf8bd3fff3f3d6e3ee0d55ca5f7bdf40e5eda3d,2024-11-12T13:55:21.227000 CVE-2024-1111,0,0,f15445887f26214e7eb2759298bdfed96c32a982bdf7c3d908e39f1fc291a984,2024-05-17T02:35:14.527000 CVE-2024-1112,0,0,a074043c8f95f29514c3f59ea2279c09f17d99731ab21d34b196cbe82c1cf23d,2024-02-09T14:34:41.827000 -CVE-2024-11121,0,1,78c7f01d1528f5af7c7c0921f9908f534edd8a79fcf13b8e8ba56ec04209ef7f,2024-11-12T16:15:20.770000 -CVE-2024-11122,0,1,8b39eb171f905156949631c8c8e8a5af8e744e4719ba7b47f1a185280518c4e7,2024-11-12T16:15:20.873000 -CVE-2024-11123,0,1,2c2c3a47aaef9d48349e1017759c96035abab5e51ba4d62444aa173a7ccd2b65,2024-11-12T16:15:20.990000 -CVE-2024-11124,0,1,efd601a275819de67bd20a9a8d3bf2e3170b2fecab4aaf15486a28875c9a9123,2024-11-12T15:48:59.103000 -CVE-2024-11125,1,1,122a7b88d4467b2583e8cd046c15116b4ff84a1dc79b401a73643c2cfd3066b9,2024-11-12T15:48:59.103000 -CVE-2024-11126,1,1,b967d4c9797ae557d5008a2e89e34b56b8ab089540ce69fba53b421e80e1e708,2024-11-12T15:48:59.103000 -CVE-2024-11127,1,1,872c91b8fef54d334e58f460ad31540519bfcc5b745ac9da794cfe9b05f34fe8,2024-11-12T15:48:59.103000 +CVE-2024-11121,0,0,78c7f01d1528f5af7c7c0921f9908f534edd8a79fcf13b8e8ba56ec04209ef7f,2024-11-12T16:15:20.770000 +CVE-2024-11122,0,0,8b39eb171f905156949631c8c8e8a5af8e744e4719ba7b47f1a185280518c4e7,2024-11-12T16:15:20.873000 +CVE-2024-11123,0,0,2c2c3a47aaef9d48349e1017759c96035abab5e51ba4d62444aa173a7ccd2b65,2024-11-12T16:15:20.990000 +CVE-2024-11124,0,0,efd601a275819de67bd20a9a8d3bf2e3170b2fecab4aaf15486a28875c9a9123,2024-11-12T15:48:59.103000 +CVE-2024-11125,0,0,122a7b88d4467b2583e8cd046c15116b4ff84a1dc79b401a73643c2cfd3066b9,2024-11-12T15:48:59.103000 +CVE-2024-11126,0,0,b967d4c9797ae557d5008a2e89e34b56b8ab089540ce69fba53b421e80e1e708,2024-11-12T15:48:59.103000 +CVE-2024-11127,0,0,872c91b8fef54d334e58f460ad31540519bfcc5b745ac9da794cfe9b05f34fe8,2024-11-12T15:48:59.103000 CVE-2024-1113,0,0,6955c6c679809523d129efea09ef779c898e264f7e3230a68d2b1fd615c8f410,2024-05-17T02:35:14.663000 -CVE-2024-11130,1,1,578a772ca1269be9bdc99bb966d7eb9c39dbd0e02e5dba4d3229d53dfaceb8e4,2024-11-12T15:48:59.103000 +CVE-2024-11130,0,0,578a772ca1269be9bdc99bb966d7eb9c39dbd0e02e5dba4d3229d53dfaceb8e4,2024-11-12T15:48:59.103000 +CVE-2024-11138,1,1,880c841f831a3231f2a2e94e0c11fd28807c2a95758488ce39dcd6a3792cc342,2024-11-12T18:15:17.543000 CVE-2024-1114,0,0,4ba1cd03fbc35862ac6b2ce79da50122dd303ea22f4f4a45a352ffb5be12a8ee,2024-05-17T02:35:14.777000 CVE-2024-1115,0,0,4dae9d3d8bef65fab3d547368288cc3126446be18b7fc740123f9a96bd6241e2,2024-05-17T02:35:14.880000 CVE-2024-1116,0,0,4196b5c71a0d802f4c1e9b3a43ac71c958f929e96b26e1ebb01241c6bd176fa3,2024-05-17T02:35:14.983000 @@ -243058,7 +243066,7 @@ CVE-2024-1147,0,0,5da69e40e8a720c3c3c366cde1a8363ffbcff6346e82168cfd4c7602d33328 CVE-2024-1148,0,0,55b3cfe72144d3f21629750ac052bc7072169844e3b194a6a00d557d611fa424,2024-03-21T12:58:51.093000 CVE-2024-1149,0,0,b02f2ba30bfd9b077afbf478cdb43cc9b464ca358abc4a5e9f7416d9d1b2fcff,2024-02-15T17:52:08.970000 CVE-2024-1150,0,0,b47a3c09b3a331a50594ab70df2061c7818f30992462806b6f5b7a310a00b60b,2024-02-15T17:42:08.113000 -CVE-2024-1151,0,1,7121c04433e319cadf01da487c5bbfa2040f1a20de12a9b96c3c123bdd1e595e,2024-11-12T16:15:21.213000 +CVE-2024-1151,0,0,7121c04433e319cadf01da487c5bbfa2040f1a20de12a9b96c3c123bdd1e595e,2024-11-12T16:15:21.213000 CVE-2024-1153,0,0,ef044a07a9d08d9e4b985a54be5b7192d28514cd606cdbcd1ece01d4ab3f4a43,2024-09-16T17:39:45.023000 CVE-2024-1155,0,0,d758d36f3a75477090d9513d8ce1d0fb91b0226929e863bd461e737f3d8138d1,2024-02-20T19:50:53.960000 CVE-2024-1156,0,0,d72992d03594c16afadbf16a64f145c65aa8548416754605a40b83a0941682ae,2024-02-20T19:50:53.960000 @@ -245507,11 +245515,22 @@ CVE-2024-21918,0,0,742b173c7dcca847586b3391775dbdbe8cf845cb3792806068b182f51bb9a CVE-2024-21919,0,0,17b9ef89ab049d67d3ba5d623527fb2d2cb4b013bdd1ced697ea307068eedea1,2024-03-26T17:09:53.043000 CVE-2024-21920,0,0,efae5f91f3c13ea098899efbd9298ae4cffb0d59d9536b3843182476a9397fd1,2024-03-26T17:09:53.043000 CVE-2024-2193,0,0,122bbc4272c132b83a700a76d93edb5ac61ae458bc4cc3c2f2865bcd2babf1e6,2024-10-29T16:35:13.023000 +CVE-2024-21937,1,1,b87d98de42bebe23153f1c85305668cdcab2c19da20ad82edffca7413220d104,2024-11-12T18:15:17.863000 +CVE-2024-21938,1,1,19cb3b969e423af3ddf9fa03d8569d3ab03a534e36cce19e8f302e7b62131c14,2024-11-12T18:15:18.073000 +CVE-2024-21939,1,1,6031d9497f6ed5b812aca4d315348c36f381cc5040f6b4853a63411f8c1ca3f1,2024-11-12T18:15:18.263000 CVE-2024-2194,0,0,0e5ae4464806cff80b610073b7b679519a42660f4236dd411b709bf3ba1b49c9,2024-03-13T18:15:58.530000 +CVE-2024-21945,1,1,fce2d6482929a4c763e216d2b52fd868431cc616fde27464f2f8a716a2c8a46e,2024-11-12T18:15:18.450000 +CVE-2024-21946,1,1,6ed223a95b2c1fe4e4585a27575c1126b2d5e2b1a7711ff12062b5f784306b9e,2024-11-12T18:15:18.633000 +CVE-2024-21949,1,1,d5eb277f64774a74419a2c56d5e5c2e576b86aa93a11ad54cafa679cfef6117f,2024-11-12T18:15:18.813000 CVE-2024-2195,0,0,bb0953f36325af10b37984088b8b1459185284ada2095a83a3bbf8eda597a9b0,2024-04-10T19:49:51.183000 +CVE-2024-21957,1,1,0e04ca86e4884bcf65ba6dc9408acf9feaa42d17dbb76c2a5c98adf0a6a978e1,2024-11-12T18:15:19.050000 +CVE-2024-21958,1,1,e172cd0f194b977f7aab4d3f449d45211998847f61fa00467dc4a01e059b3871,2024-11-12T18:15:19.340000 CVE-2024-2196,0,0,8ec133a9075bc1567c504d98dff21f157cca962585a8b4ec57dc32003f56e460,2024-04-10T19:49:51.183000 CVE-2024-2197,0,0,c0f73e1956ff9edc11d589212e34e54996b4c99f318ed5889f3320f37bab4ded,2024-06-05T23:15:33.943000 CVE-2024-21972,0,0,faeb67500b1dc4ef8f1b7649334b23a7c70f07a8990a8b6dfa5400e248a30e42,2024-04-24T13:39:42.883000 +CVE-2024-21974,1,1,cd40f31d16999fa460c0102d6164e9d81abe62fce1a64935eb8f5e40b45dc4a4,2024-11-12T18:15:19.533000 +CVE-2024-21975,1,1,c98e05c5a1f279f46603da105def4a0f441343f2fb77dd7362537810a4e189d0,2024-11-12T18:15:19.723000 +CVE-2024-21976,1,1,197c9e566528c5421dc8bbd01435a12444da8c485f4acae12f5a05472f30e7b7,2024-11-12T18:35:03.770000 CVE-2024-21978,0,0,bd0ca29172ff67905ab419fb6e0b63fad45bf4b2c53567c94e0d7e696a373aa9,2024-08-06T16:30:24.547000 CVE-2024-21979,0,0,69d970687ec7fc10c2117ffd8a662f03f2976fe858767ebadf9aede1ce3bc7bd,2024-04-24T13:39:42.883000 CVE-2024-2198,0,0,1df4cff98d86f3bfed69b5c9a5afedec636b00bc821bafe7fe3fd5ac8b6e5483,2024-04-10T13:23:38.787000 @@ -245762,7 +245781,7 @@ CVE-2024-22253,0,0,99373fd467fe1494c70def9a33c277abe9ef8000626bb6e83f26af7d49c26 CVE-2024-22254,0,0,20d7e9ec4979d70b7eb4baedee6a35555829a7b91aea3c15baf85c60eb6e51bf,2024-08-14T19:35:18.467000 CVE-2024-22255,0,0,8e7a40c5bf54cf100359b6bd89ec7ed5b7b9b1826e219d741464964078f159ff,2024-11-04T18:35:06.477000 CVE-2024-22256,0,0,dcbf1bed6a2eb60ed505918b467b6ef5ef784547429273c505574abd3ae01acd,2024-03-12T15:01:32.347000 -CVE-2024-22257,0,1,deda0b5f6a8517bc02c2038e4f08a84e8e42d2c5375167943196ec92b20f1e7c,2024-11-12T16:35:07.147000 +CVE-2024-22257,0,0,deda0b5f6a8517bc02c2038e4f08a84e8e42d2c5375167943196ec92b20f1e7c,2024-11-12T16:35:07.147000 CVE-2024-22258,0,0,4b97201062488eaff51b24fbc9ae28b1f946f20fc4b3f47d5337472a99498617,2024-03-20T13:00:16.367000 CVE-2024-22259,0,0,1619807ca0dd0d25e590483ba5fe046c92691b86131dda52a5fc321e717fd519,2024-07-03T01:47:10.080000 CVE-2024-2226,0,0,d1bdd7002c5ec8a69fcb10676a03d7f656c6960181e2ea18b4c07683d5e897e3,2024-04-10T13:23:38.787000 @@ -245856,7 +245875,7 @@ CVE-2024-22356,0,0,d7816a9ba601446ddf2f1791b2a20c669256f6d1556e00ed5243ed494ceab CVE-2024-22357,0,0,0bb0c823fb3ba54d21074ab797aca42f7312b217f24630a0cf642d75fe688e72,2024-04-12T12:43:57.400000 CVE-2024-22358,0,0,c07de741e1bd331a637c3117a238b4cd328eb061aeff477aa27560ea4017f135,2024-04-15T13:15:31.997000 CVE-2024-22359,0,0,7527962a22af823da8ade98e556ee19eb46f6b251e797d4d139c988ae5d9426a,2024-04-15T13:15:31.997000 -CVE-2024-2236,0,0,e5b6845b6af232ea28836733d1c554f2997af2cc954a6fedfc237cd2b5ae70a2,2024-09-14T04:15:02.903000 +CVE-2024-2236,0,1,8e184bdc8f2c69c7b2b70ce72648e36e8e4d44abd1be0153d52d871c11afeb43,2024-11-12T18:15:20.150000 CVE-2024-22360,0,0,794526f63f464dad1a4d5860395245506ca742cb67b982581354267152f1e10b,2024-06-10T17:16:19.007000 CVE-2024-22361,0,0,e267f7a58b4385dec5a7f5aef03064380edb1a73a3ecd2124af7f1bc930e0f03,2024-02-16T21:35:31.953000 CVE-2024-22362,0,0,2767965890a6410063670fad313b54e2e770a22b941b7425a3750acfeece9725,2024-08-01T23:15:33.430000 @@ -246256,7 +246275,7 @@ CVE-2024-23146,0,0,c9ab3b2b65b697d473465cd7dcbbd37ee7743393b6257d030c7d43f735d4e CVE-2024-23147,0,0,5501f17ecc0a7e07475f9f72a63761eb8934129647aa8037d87bee0bdf7e043a,2024-07-03T01:47:34.407000 CVE-2024-23148,0,0,f163092e189644bb6f69811a212b9b411504f9f98d2b1dd4d6e9852bde1c5117,2024-07-03T01:47:34.640000 CVE-2024-23149,0,0,7651a42b0863370940c42057e714040687fb0f0a0647b4edfeea6ae3db85c5d5,2024-06-25T12:24:17.873000 -CVE-2024-2315,1,1,82ac007adc37f93efa55750ad424520c02632a1e6baef3a0d159ff1d04fed436,2024-11-12T16:35:08.840000 +CVE-2024-2315,0,0,82ac007adc37f93efa55750ad424520c02632a1e6baef3a0d159ff1d04fed436,2024-11-12T16:35:08.840000 CVE-2024-23150,0,0,2ec2a3f5ae0ed899b10a9a3ad1ef287d5eb257340d2b38f86c7e5aa0270d1e52,2024-07-03T01:47:35.010000 CVE-2024-23151,0,0,53d13e8b9ba2cd63d85aa3df3bb17c4d39810557d3e3d9a803388619628364a3,2024-07-11T15:05:24.300000 CVE-2024-23152,0,0,0e8fa6b6600b8d3f08ca387890587855a0e6e8d15b4239d0aa342d6bdc58521b,2024-11-06T15:35:12.300000 @@ -247799,9 +247818,9 @@ CVE-2024-25359,0,0,0fb20cbc3a9d97e4b1c7aeba16baa279c02f24b91366fceb9801ea8cdef6c CVE-2024-2536,0,0,65acd52804d1fab5b7f8fb23c09b74c0bf5acd3bf488cb768800ded49c99706e,2024-04-10T13:23:38.787000 CVE-2024-25360,0,0,18228c4da58d3befde1ec0cbe2994e34acc50177b9c54cf9ce9c4f0991b9e948,2024-10-30T20:35:11.017000 CVE-2024-25366,0,0,fcf0bd0bcec5d3ac613d0f087b722a9736b6c16fe60db374ab304707fd794e91,2024-08-16T18:35:06.990000 -CVE-2024-25369,0,0,59ffb0bc2370235574d9929dc2e6276b267db724d8340eb583c27a6ab908bf38,2024-02-23T02:42:54.547000 +CVE-2024-25369,0,1,eb1896ca06c5544b92ef50e2b7bebd94259dfff6718ea6ef2bb6382a8fbf3c8b,2024-11-12T18:35:04.640000 CVE-2024-2537,0,0,ce9753e7852cdca037deeb9816f11b74c3d1bde3479050982fbbe15f57049a4a,2024-03-17T22:38:29.433000 -CVE-2024-25373,0,0,8b108df567bc6595dd4ad4ca6eff6b93bf10e738419eb2300ba8e864b03adcfc,2024-02-15T19:55:09.230000 +CVE-2024-25373,0,1,cfb937e26000a1ecebf4805de7b25129439b2f8f73f7e5676e7d2361e7774201,2024-11-12T18:35:05.530000 CVE-2024-25376,0,0,6a816dff6e980af2ce9830b28c1e10df0bab9ab3e8e9a695c06849f72c23c21a,2024-07-08T14:17:44.317000 CVE-2024-2538,0,0,96690084e77867f632925185565058513a74653c4a93273678766dca17a7e737,2024-03-20T13:00:16.367000 CVE-2024-25381,0,0,b4fb94c2ff759334b95a9dd33df801dc79f3dc0507b3672549ff1ba98cbfc56a,2024-08-26T14:35:03.033000 @@ -248887,7 +248906,7 @@ CVE-2024-26800,0,0,d9626497fc0514a06475f8f757d41af46eae3f75d016b2bd5949325f1e198 CVE-2024-26801,0,0,17f4b5c68dab5b5a7663dd6bd5f0c9475aac821e31bdb1ca0b817c579fea55e4,2024-11-05T10:15:51.107000 CVE-2024-26802,0,0,e88ecfd83cde660c90d62c8ec8f6d09fcab3b0e798e249611f11031273c5aa1e,2024-04-04T12:48:22.650000 CVE-2024-26803,0,0,790ca232a01e4848a2dbe4fcf8f810964fda874268a106da8300da28d3787b70,2024-04-04T12:48:22.650000 -CVE-2024-26804,0,0,a8b1b966b1cc92d21625cd9c969ee45005c3551c6b52d31acb577dcdd00e0846,2024-11-05T10:15:51.333000 +CVE-2024-26804,0,1,d61c296f026473ac17a7c776907f2cde0a388e8bfb3e0d463ca3ad6448a3c754,2024-11-12T17:35:03.920000 CVE-2024-26805,0,0,bb47bd469c267c732eb9b710b891fdcd2fa28f148836a061a5205e3498f86415,2024-11-05T10:15:51.440000 CVE-2024-26806,0,0,b6725acf00439752a6ccaf38cc0125393e82403fa930840dc236717f44eb4a77,2024-04-04T12:48:22.650000 CVE-2024-26807,0,0,104a4e4d854016f8b324666da2a6519a8e2f2a9b7b206527a539918e69652d81,2024-06-20T10:15:09.303000 @@ -249632,7 +249651,7 @@ CVE-2024-2762,0,0,979c743da794d07a0349103a85145b617e85e603af562156eb1dfe0982ad17 CVE-2024-27620,0,0,a6cd517087288a476282a828ad06f1425f605eb49a5acbc3c4b9fdfa51cf4c1e,2024-08-01T13:48:33.830000 CVE-2024-27622,0,0,d36e42f80fadc01b57dce713d0e942cdb5061aeef02f106f66a87171df29d206,2024-08-05T21:35:04.990000 CVE-2024-27623,0,0,908e722a38df81c5e163df23fcc18187660fed41610c0b2838365cfd8fe61d3a,2024-08-03T20:35:05.903000 -CVE-2024-27625,0,0,5a80a79b2cfd5c4ff9f33f1df3098e8fbb1574b439d0275831cc7fabd6a9afa8,2024-03-05T14:27:46.090000 +CVE-2024-27625,0,1,4f20a4d64999286db2136c2b3159d6621c9bb45fb126cf59c99198f7d644139b,2024-11-12T18:35:06.473000 CVE-2024-27626,0,0,5bf5940d7781229a9f7ff240be2a4af6b20f5041c7d9a167792650ddcfcced0e,2024-08-05T15:35:13.137000 CVE-2024-27627,0,0,8abb75ad84b16904abb94e78ca7c6cc9c26036e320c7934e825972d299570c58,2024-08-05T17:35:08.113000 CVE-2024-27628,0,0,4ce05c55412fc4c447421f46fe72c28be9e75420f28dfb2af66d8c4d8126c7d2,2024-07-11T15:05:31.010000 @@ -250066,7 +250085,7 @@ CVE-2024-28159,0,0,4a9f4f91b8aea86a42bde029558a44ab2b24f6212168e8c6c34372a6626e7 CVE-2024-2816,0,0,1ff2465397674739fa53ccc9486babdbd16fc63821544c8b1e2bf9f4ddfd16ff,2024-05-17T02:38:32.100000 CVE-2024-28160,0,0,e52617550a8ff7dbfa6f0a6742a3be164312b10bed4d3f17aad19c179569ef4f,2024-11-07T17:35:16.407000 CVE-2024-28161,0,0,732a0ccf3a0c78179498ba4c5715c7787b053aa5997b6e9c437de4d97e88e833,2024-05-01T18:15:17.180000 -CVE-2024-28162,0,1,755d306fd311701bbe86ac9be3ec2b0c299df65b6f39b9390d67e843d3998f72,2024-11-12T16:35:08.007000 +CVE-2024-28162,0,0,755d306fd311701bbe86ac9be3ec2b0c299df65b6f39b9390d67e843d3998f72,2024-11-12T16:35:08.007000 CVE-2024-28163,0,0,b559a456c891fdcf20fbbbab8887f6be9d0dfdc7fd048fd9d3a99e789aac31bd,2024-09-28T23:15:13.217000 CVE-2024-28164,0,0,ad548c66e5661c4e8af5a7b236b78552ef27421cd91cd0f63f8c805acf9b4cbb,2024-08-06T16:40:49.433000 CVE-2024-28165,0,0,46715a30feb276737abc87d7ed511464bf9b4ab74c972d46bf629bd896d4f942,2024-05-14T19:18:31.490000 @@ -250570,7 +250589,7 @@ CVE-2024-29001,0,0,ea0999e7ae3252c47574d76ad7b90323f375b0c9a9c410d4dd593d389b503 CVE-2024-29003,0,0,c1d9289fd327b3b3fe2922e6699b27bde12063e2b9ba45e1eb1bf9261fa9b314,2024-04-23T15:15:49.640000 CVE-2024-29004,0,0,9ef5b203a98e2d1eebce75b708b2ffc086e9812d18fc5bf73722cd72675a4664,2024-06-06T19:05:52.730000 CVE-2024-29006,0,0,03ea486bf400d900d0dbda2f2d6e252ead6c17c2d66dc02317ddc11f9fe45793,2024-04-04T12:48:41.700000 -CVE-2024-29007,0,0,1bc8f2d51e9e796e6f61421a3cdbc0330cf4aa65f2dfdce8f79200260310a9ff,2024-04-04T12:48:41.700000 +CVE-2024-29007,0,1,4a1ceba513fb4f5159f9ebcc5fd71727bd28110957beefaf2caeb6534dd7158d,2024-11-12T18:35:07.403000 CVE-2024-29008,0,0,42fe22c1bb27681010ec9f7d44bd7d4e548e909f0ccf7819d30641f2fff39d5c,2024-08-29T21:35:08.120000 CVE-2024-29009,0,0,c999c21ebc8ce72023b158b0839d7fb43384cfe622c24110433dc886fa8798b2,2024-08-27T21:35:19.367000 CVE-2024-2901,0,0,e2df063e5347fadf4cf214e5695112bea43ff5509c25d82b3b42077531327e19,2024-05-17T02:38:36.427000 @@ -251361,6 +251380,7 @@ CVE-2024-30128,0,0,c924b379265c859e8daf7f44eeec6d1dc40d7540b45d81bbd3137e5592a1e CVE-2024-3013,0,0,6f68abb10d211d077c48c60372c20fba216cedafa08cc66982d3e5be234b2590,2024-05-17T02:39:40.710000 CVE-2024-30130,0,0,8448ce55a01a9b4e45eabf08a2080330d22dcd23bef5d840e0a0228a0f910b0f,2024-07-19T13:01:44.567000 CVE-2024-30132,0,0,2755ce31fca62f5cb6c9467e2e9dd0f46b1eb8e96cf72e2eba3ab725581a0713,2024-10-29T21:35:05.643000 +CVE-2024-30133,1,1,22ce94cfbfa55e7ff92bf64ba04e6010d48cef6835c442bcc58f93ee083ee251,2024-11-12T18:35:07.980000 CVE-2024-30134,0,0,b5401f953dda8a57b606a9ace80dca0a0a00325ba4573c5e6f1c325a9f248829,2024-09-30T12:46:20.237000 CVE-2024-30135,0,0,434c5499719264a4e2ad07af1f36d8ed1af6151b19467e0009865806919aee63,2024-06-28T10:27:00.920000 CVE-2024-3014,0,0,c46983235075ad6c61a858c21d5be28ec226124df8363686d4a4d1cade05d3fc,2024-05-17T02:39:40.800000 @@ -252057,10 +252077,10 @@ CVE-2024-31077,0,0,4ee4934fb388f0c6aecae8ff57d029bcb5098c8db84cc409e7cf47f67893e CVE-2024-31078,0,0,b0bbe41ef9db9ceb087fcafc0c2efaa7f33c48976a0bab70d091b39f8b940d0d,2024-05-07T13:39:32.710000 CVE-2024-31079,0,0,7b022d1b68d2e4d6083918cd5bedebc752ca3a191d73bb4a1d52466186b516fb,2024-06-10T18:15:31.023000 CVE-2024-3108,0,0,da90f8f46c09bcb2198c43fdf0f557ced476d6d11a9810f11a2eca18dace7b1f,2024-05-03T14:17:53.690000 -CVE-2024-31080,0,1,3b9d2494033fb387c3c295eb2de7b3d391834f87e7478f31592089c17b045145,2024-11-12T15:15:07.940000 -CVE-2024-31081,0,1,25382389172b3c9784b69fb4b12eb1ccebb3959688c6518df06f4bb777c7baeb,2024-11-12T15:15:08.220000 +CVE-2024-31080,0,0,3b9d2494033fb387c3c295eb2de7b3d391834f87e7478f31592089c17b045145,2024-11-12T15:15:07.940000 +CVE-2024-31081,0,0,25382389172b3c9784b69fb4b12eb1ccebb3959688c6518df06f4bb777c7baeb,2024-11-12T15:15:08.220000 CVE-2024-31082,0,0,5f84509c4a6c966fba50cc7893587e621dc1a2c2fc05bf4607662efd4efd87fb,2024-07-14T19:15:02.080000 -CVE-2024-31083,0,1,690a27f3dd2345803e961ebbf97659386725d113a2a1b6666464350f6c1bdae8,2024-11-12T15:15:08.420000 +CVE-2024-31083,0,0,690a27f3dd2345803e961ebbf97659386725d113a2a1b6666464350f6c1bdae8,2024-11-12T15:15:08.420000 CVE-2024-31084,0,0,41d634f6947380fbd38163b98d20d79eadd7ac98ab45077f59de33db1d3e4818,2024-04-01T01:12:59.077000 CVE-2024-31085,0,0,590e50ba650eba0770b80fe595ca66df49dffc2ecf0c3c269ceba9c6316e22c6,2024-04-01T01:12:59.077000 CVE-2024-31086,0,0,31a67a259725637ee05247eefd01e9dfcec241510014a139d8adb34fad01a2f3,2024-04-15T13:15:31.997000 @@ -252548,7 +252568,7 @@ CVE-2024-31678,0,0,45c8b2607673d8af8b3ec231962e66bcea8064211e1867ed0addb4c93b773 CVE-2024-3168,0,0,e53f03656f19e0e47c6622c3da3e06f5dd93aaeae623b38784e05f0c565a375b,2024-08-01T13:56:21.960000 CVE-2024-31680,0,0,c4628bff4524f4ba02ba3d3e5f2d1afd3e6b045a8d32604fb16cfbf01a187619,2024-09-06T22:35:01.557000 CVE-2024-31682,0,0,6ad84277376005bde3c5be691a4699ed2a494d2e47836225d1c8ccbe4273b358,2024-10-29T14:35:17.517000 -CVE-2024-31684,0,0,ad75a69893dade6ac7e684ae6347f5d7476c0bca032591c2e980bc01013d54f5,2024-06-03T19:23:17.807000 +CVE-2024-31684,0,1,a58e80e535316094d398f75f99933a7946ff10472558d364c59331628a9ef154,2024-11-12T18:35:08.927000 CVE-2024-3169,0,0,b6d2ffb09103c8b8a3976e1d11af5d86787ae2ffc33eb4178c248279d95ed274,2024-08-01T13:56:22.240000 CVE-2024-3170,0,0,e5d3e527beb338f17b4d7e88e470a76429efa4bde538f57bcfe45fe38f4493ae,2024-08-01T13:56:23.270000 CVE-2024-31705,0,0,360c5213fb2e781c07e5b26068537bfd39f5bcae9363979b2bff285237ce8d8a,2024-08-20T17:35:05.360000 @@ -253960,9 +253980,9 @@ CVE-2024-33654,0,0,59ce1dc0a959d8fd849b3bf72d6a089a8a29bff8045c4a710ae01079c92a9 CVE-2024-33655,0,0,9e64ca7b34c4566d1306046984ab49450e7da90a07f23b1974ef43c7b46b8b70,2024-08-22T19:35:27.177000 CVE-2024-33656,0,0,bcce08f394a095ebca60ada0fb4a4aafac76a15e930d7944ca1f9457799a1c56,2024-08-21T17:24:59.627000 CVE-2024-33657,0,0,4304e9ad6a833f4e772f3f337e66d35550f113c5280de638d62e655b681eb6cd,2024-08-21T17:24:59.627000 -CVE-2024-33658,1,1,7ec786af652018554563dd5034aeee301f75b566ef802a05fbc7cb6fd23d9467,2024-11-12T16:35:09.080000 +CVE-2024-33658,0,0,7ec786af652018554563dd5034aeee301f75b566ef802a05fbc7cb6fd23d9467,2024-11-12T16:35:09.080000 CVE-2024-3366,0,0,a2c419b6dceb854c8524f6fea56c90f31e3f9047e1890ead74a66fe52a9e4023,2024-05-17T02:39:53.090000 -CVE-2024-33660,1,1,4b17c364098df26036513f96d1c9980a4cfb9666b7b21b4b9ccccafda7d67e09,2024-11-12T16:35:09.330000 +CVE-2024-33660,0,0,4b17c364098df26036513f96d1c9980a4cfb9666b7b21b4b9ccccafda7d67e09,2024-11-12T16:35:09.330000 CVE-2024-33661,0,0,1fe83f392b56cfa5102f5ff20013157b18140b66b95ef00cb93915789153e2d5,2024-07-03T01:58:33.073000 CVE-2024-33662,0,0,39e1cd5f3535462ce03b3b7218d482fa87d6e966ad84208fedd426957dabfc0a,2024-10-04T13:50:43.727000 CVE-2024-33663,0,0,e1e5e3bf2bfb6f84f42175dcb29cc9799e837d7e631a8436167d9acbf72c8e21,2024-09-03T20:15:07.433000 @@ -254239,7 +254259,7 @@ CVE-2024-34032,0,0,f382d8e9e535c3e35473773ca93bbe1fa995e376c547e3ef1cae2ee436ce2 CVE-2024-34033,0,0,e74c4015073921eba0b380055240c50d190f0b5a639f065734e866639ffc0d74,2024-05-03T12:50:34.250000 CVE-2024-3404,0,0,10c208e9c1c33ee7dcd03a739682ca2312353eb2114ec4d6a2398be396bdd59b,2024-09-24T14:11:26.940000 CVE-2024-34043,0,0,53746d879667589cb2311df11a4aae652da57dcc560b773c0549055163d481d1,2024-08-01T13:52:14.133000 -CVE-2024-34044,0,0,3bf550daebff9661b99c320a41c6714394baf6dc397c76dfc83e0b8999ac3eeb,2024-04-30T13:11:16.690000 +CVE-2024-34044,0,1,8248cda349e007d967c48664b98468ff114052b264ae77a92508400a112bef56,2024-11-12T17:35:04.873000 CVE-2024-34045,0,0,79bd65de67c0efbec24a2f08a1536c9cc87b90b692934d062800de780d7b669e,2024-07-03T01:59:18.230000 CVE-2024-34046,0,0,3af63485a8307d182b057fc6835d7e7e37c1dbc1f2b63b0c05e957ed68af1c33,2024-11-01T16:35:17.327000 CVE-2024-34047,0,0,e066e60743914316ea4d7d917884e0cba407f608337595ec8ca6f0119046db4a,2024-11-06T16:35:17.080000 @@ -254747,14 +254767,14 @@ CVE-2024-34670,0,0,c7f7a5e478bc1a10ace61979abf21c947b061684824f9606c72fa122e8a61 CVE-2024-34671,0,0,a08598303b7cc44bc7ce36474bf6973e3d3c57f08611bad7aa18ef971deedc26,2024-10-10T12:57:21.987000 CVE-2024-34672,0,0,5b999fcfa370bba972f9e6370e3179075f4c5c678a82b2140b4d119a0d64c655,2024-10-10T12:56:30.817000 CVE-2024-34673,0,0,7f83fbf08444ae07cde3023a5310d65400d5764991b6b85a9db840c7c7fb62e3,2024-11-06T18:17:17.287000 -CVE-2024-34674,0,1,6db49eb94e9b436eebb5ac220cc4d275009cd7fd336993987f387575b81bd4b2,2024-11-12T16:08:56.463000 -CVE-2024-34675,0,1,892df28b69656f69365a7f8edc71187489e44c6810037789232a9b103c622a2c,2024-11-12T16:08:22.760000 -CVE-2024-34676,0,1,df9adda1a41a0cbaab93a9021708d73f1a05c18677018cfcb6bc6ec91d4684ea,2024-11-12T15:31:08.867000 -CVE-2024-34677,0,1,419d94cd80168e6c9c2f23d30d4c431dd3314ccc20a0abdd048aea94917456ff,2024-11-12T16:07:39.377000 -CVE-2024-34678,0,1,65e25f5dedc7a695a283c64763eb4a380fce0913cd365be28d481950ffc5b3e7,2024-11-12T15:30:20.817000 -CVE-2024-34679,0,1,563019ead4b642cddeb5252c9e4ae0dd09e3c21cb5939b7438c2a740788ef446,2024-11-12T16:09:28.760000 +CVE-2024-34674,0,0,6db49eb94e9b436eebb5ac220cc4d275009cd7fd336993987f387575b81bd4b2,2024-11-12T16:08:56.463000 +CVE-2024-34675,0,0,892df28b69656f69365a7f8edc71187489e44c6810037789232a9b103c622a2c,2024-11-12T16:08:22.760000 +CVE-2024-34676,0,0,df9adda1a41a0cbaab93a9021708d73f1a05c18677018cfcb6bc6ec91d4684ea,2024-11-12T15:31:08.867000 +CVE-2024-34677,0,0,419d94cd80168e6c9c2f23d30d4c431dd3314ccc20a0abdd048aea94917456ff,2024-11-12T16:07:39.377000 +CVE-2024-34678,0,0,65e25f5dedc7a695a283c64763eb4a380fce0913cd365be28d481950ffc5b3e7,2024-11-12T15:30:20.817000 +CVE-2024-34679,0,0,563019ead4b642cddeb5252c9e4ae0dd09e3c21cb5939b7438c2a740788ef446,2024-11-12T16:09:28.760000 CVE-2024-3468,0,0,b143f709020bfa0c4d31a3d3e75dcacae5f0344d8dcf22b8e7a02c60ed5e45e0,2024-06-13T18:36:09.010000 -CVE-2024-34680,0,1,12a76f66aacec2683c917e4fae09c1bf140017e6e48295370847dc703f71717a,2024-11-12T16:04:08.997000 +CVE-2024-34680,0,0,12a76f66aacec2683c917e4fae09c1bf140017e6e48295370847dc703f71717a,2024-11-12T16:04:08.997000 CVE-2024-34681,0,0,74e83c108d86c9c111ba1513170d8663aad0047805851f01eef53e1e70cada33,2024-11-06T18:17:17.287000 CVE-2024-34682,0,0,7f365da8ccb9669e20a136ed19bf8c74956c08dd18722ca07ecd4a5371d1f200,2024-11-06T18:17:17.287000 CVE-2024-34683,0,0,9d29c0ceca80aeb9ddf34072d48291a9d5d5d5decac1bcbe5defe30bff14c867,2024-08-09T20:04:44.060000 @@ -255213,16 +255233,16 @@ CVE-2024-35409,0,0,c1e09f17fc040d1a54c6ca919b4e6df91e3a03195ff96673036c48a4d8f8f CVE-2024-3541,0,0,14abae851d976e531eb89e36d00e68f1b4222a58cf78e09467f8f13cc823ff73,2024-05-17T02:40:00.373000 CVE-2024-35410,0,0,9934f2e6e366ff34bdd808724edcc20da9d4ffa302f6042b1ef31ec5c87c8f5b,2024-11-12T13:56:54.483000 CVE-2024-35418,0,0,127590939381ac9ea1bca215e8e87a187a90e6c39b1f8c2664dbc969ec02cf66,2024-11-12T13:56:54.483000 -CVE-2024-35419,0,1,77ead0780a68b696ac114e0cafe1c352c44b6817832d7b710fb85987af543cdc,2024-11-12T16:35:09.570000 +CVE-2024-35419,0,0,77ead0780a68b696ac114e0cafe1c352c44b6817832d7b710fb85987af543cdc,2024-11-12T16:35:09.570000 CVE-2024-3542,0,0,5a8537177eac38ffc4c0459430c529ffd4234d4390bfe331be843583f4e31e36,2024-06-26T18:15:15.750000 CVE-2024-35420,0,0,4c667b45d6476240fa11c340168a28995c519352d0d8af72f70403dfb921e277,2024-11-12T13:56:54.483000 -CVE-2024-35421,0,1,352e363e5c883c2c66505e433f951e8999b219db6cbd6293c4bdd2f64e99938a,2024-11-12T16:35:10.447000 -CVE-2024-35422,0,1,1241ed0ebb5f391f2364e38fffd979f9b99255d936a154e4d0a9366f235ba4b3,2024-11-12T16:35:14.203000 -CVE-2024-35423,0,1,33eb9412472842bd71735d54f4c85e836f85667840484c5493e4d718f535e52a,2024-11-12T16:35:15.027000 -CVE-2024-35424,0,1,8f9b74f0581e1381a713da933ea07c1f760187c5723033074f0a03cba05ada50,2024-11-12T16:35:15.950000 -CVE-2024-35425,0,1,538c5756994fbfa9bb6e2b4a7135507d66d437c2f1230100d3db4bf3aed8d797,2024-11-12T16:35:16.757000 -CVE-2024-35426,0,1,cdf55b854f7935bab6485801289e5a7c59c712ac998c9a7cb2e4b1f025d5f407,2024-11-12T15:35:05.420000 -CVE-2024-35427,0,1,db4cb5cdaf461bb557f3a629331b90f2d54e1960844658d8fa00caa57802d362,2024-11-12T15:35:05.710000 +CVE-2024-35421,0,0,352e363e5c883c2c66505e433f951e8999b219db6cbd6293c4bdd2f64e99938a,2024-11-12T16:35:10.447000 +CVE-2024-35422,0,0,1241ed0ebb5f391f2364e38fffd979f9b99255d936a154e4d0a9366f235ba4b3,2024-11-12T16:35:14.203000 +CVE-2024-35423,0,0,33eb9412472842bd71735d54f4c85e836f85667840484c5493e4d718f535e52a,2024-11-12T16:35:15.027000 +CVE-2024-35424,0,0,8f9b74f0581e1381a713da933ea07c1f760187c5723033074f0a03cba05ada50,2024-11-12T16:35:15.950000 +CVE-2024-35425,0,0,538c5756994fbfa9bb6e2b4a7135507d66d437c2f1230100d3db4bf3aed8d797,2024-11-12T16:35:16.757000 +CVE-2024-35426,0,0,cdf55b854f7935bab6485801289e5a7c59c712ac998c9a7cb2e4b1f025d5f407,2024-11-12T15:35:05.420000 +CVE-2024-35427,0,0,db4cb5cdaf461bb557f3a629331b90f2d54e1960844658d8fa00caa57802d362,2024-11-12T15:35:05.710000 CVE-2024-35428,0,0,3c09284a2d1421b49e443adf71c33cb44461617fe2c22ed9a85a4142b030cc7e,2024-07-18T16:52:56.760000 CVE-2024-35429,0,0,330b233a9d961e5ab60bb84ab073545ccf41085088e749b133fee4692c3b4424,2024-08-01T13:52:40.290000 CVE-2024-3543,0,0,14aebe52440b6c29accdfa7acf400fe951e7d7441b56210ed47a5a2c1e52128f,2024-05-02T18:00:37.360000 @@ -255485,7 +255505,7 @@ CVE-2024-35793,0,0,3bdab6aefbdb92609dd5d1d2221b1fd9e877cefdad437c4799c3b5ed0e463 CVE-2024-35794,0,0,98eed75e6df024f22b4bb41a36fc36e3e9baa5185ab79fb95f0f4482b261c48a,2024-05-17T18:35:35.070000 CVE-2024-35795,0,0,c4375eb0dac66668e1eb3c75468506dbe063c57de76a5bbc7908d84ae07fa095,2024-05-17T18:35:35.070000 CVE-2024-35796,0,0,ae4abcb8ad9f6f490bd16b1eba9dc94eab40136dc368dbb51a897b6a16bd8836,2024-11-05T10:16:37.803000 -CVE-2024-35797,0,0,5d191573df70b8ecabb4b3e8db1feb40dcd5737961b1f2da8e55d32c7ff2e1b8,2024-05-17T18:35:35.070000 +CVE-2024-35797,0,1,fc40034f33fd113f5dde1c6de83ad778a174ddbe1c0d42a9a2504386df9c1593,2024-11-12T17:35:05.710000 CVE-2024-35798,0,0,c6621222abaf060f395461638bd7c76ec0183db720d30b3003bc12d1b0276d22,2024-05-17T18:35:35.070000 CVE-2024-35799,0,0,2dce7d3c01c6b462983682ed86f45e0447833392232f61fcdb54d3cb67bf0d68,2024-07-03T02:02:11.170000 CVE-2024-3580,0,0,ac379b7c61198dcc5d9b9e5b61b78e72864de0a9836d2f6b5f591e1184a84d66,2024-11-07T17:35:21.603000 @@ -255573,7 +255593,7 @@ CVE-2024-35874,0,0,3f9cf166158c93dc476fb8654991540d2336f2d5d38b587de46fb9ac634f5 CVE-2024-35875,0,0,8ab9621867535870defa53a806e98a2282aeda1bda484993ec9b5afbb0ec82ec,2024-05-20T13:00:04.957000 CVE-2024-35876,0,0,21d4e04307171f23eb20581ae687ed873b8b572985d4124c23ec05853b41f51c,2024-05-23T14:15:09.830000 CVE-2024-35877,0,0,b8a3600906e93a36a74422104fb1b31b46c153811d076aee87bef6ab0300bd6d,2024-11-05T10:16:48.080000 -CVE-2024-35878,0,0,fc62f44fa6fdfdc52094a163373d9f52a1a85a04c030ea6948c89e21d6effcbe,2024-05-20T13:00:04.957000 +CVE-2024-35878,0,1,74497324101b664530bba888b14a5640c2af6f23f0241985b182aad27d33a01f,2024-11-12T17:35:06.573000 CVE-2024-35879,0,0,597429864a470884e5e756c3df3fe8e5a0bdd1fa9904af526ac68ec0fda1fe39,2024-11-05T10:16:48.390000 CVE-2024-3588,0,0,4dedbcc4313ba8cb11aaace549e0dd1c777d3f65d96b9f644afcfeb2c777e541,2024-05-02T18:00:37.360000 CVE-2024-35880,0,0,b61a1904bbe5a8757c8c8dcb2ea7338c39ae9ea79235b0c7cefd4210649437e6,2024-05-20T13:00:04.957000 @@ -255767,7 +255787,7 @@ CVE-2024-36056,0,0,1ad654e1db1ea66b26b566d0bde36516eb16d5510c8338c17ed9148cd915f CVE-2024-36059,0,0,1bfcf57b05ec1b5718039a8c5e3ecbe365e021b33c057bee57a114304a3b8db6,2024-07-09T16:22:38.580000 CVE-2024-3606,0,0,d0a3a8d7c3b8995b719f693dd3907a6cc0220e7bd0b5d59f68093556b8c3a6af,2024-05-02T18:00:37.360000 CVE-2024-36060,0,0,0aa7d62145c5618b7f76bb2535f9fc77a196990e59fda038d7a6d0a4665703fe,2024-11-01T12:57:03.417000 -CVE-2024-36061,0,0,10b600ea9e81162f2fdf5c7ce1bb9189f75ce1544ec86abdd84a86301daf6307,2024-11-12T13:55:21.227000 +CVE-2024-36061,0,1,1aff6eb5914cfa2aecdff1eeb735beacd175daa744ac3ba38e1c642f11faa093,2024-11-12T17:35:07.450000 CVE-2024-36062,0,0,b3531d0a2dc0e87d59ab63f084c9edf17440e45c41fc2b9fc6cd7ee0d3d225ea,2024-11-08T19:01:03.880000 CVE-2024-36063,0,0,137e9651a11a86729a19db077a10e17c476e8bdc06700335b2e00d6c3dad3c82,2024-11-08T19:01:03.880000 CVE-2024-36064,0,0,783529a7ed67c566f9b5978c94a6c15f086f6661d090c8cd3e70b94f4926834f,2024-11-08T19:01:03.880000 @@ -256448,7 +256468,7 @@ CVE-2024-37081,0,0,1657c2c6215fa861c8bf708a3b65df9501dd8a14588c6f7d5718007f5ce77 CVE-2024-37082,0,0,cdf7ab7ec235a04ab3547ac9302ea8fb37a25e6b12903e2e739c3b31068e7382,2024-07-12T17:15:10.220000 CVE-2024-37084,0,0,e8df0694fdec2710f267b23abcc1607a09f45be7ad027071682046814f69bbe8,2024-08-26T16:11:27.507000 CVE-2024-37085,0,0,be808461657e3f85c79619a0be351a3b72207b354595ab61cabce57cc7cf3b37,2024-08-08T14:48:49.303000 -CVE-2024-37086,0,0,9068529bdb3d555265b7f816c31a19ade60e24d8cc46d6bccf0934fca43600dd,2024-06-25T18:50:42.040000 +CVE-2024-37086,0,1,2e25451f3b134f0441eef6a18fecdcf95a8356f98bb426dbca09ace240a08533,2024-11-12T18:35:10.230000 CVE-2024-37087,0,0,43aed8bcf7bf19587f693af8d68aefcbb6d8364f5ad3ee6823f45607d542a0c4,2024-10-31T14:35:15.630000 CVE-2024-37089,0,0,4079e469a0b9c8eff7513f19c004b5889c685b5a744b48949620385f99d2cae6,2024-08-20T20:15:43.643000 CVE-2024-37090,0,0,5d012601ead052938e64a5cf6fbacb664a926b0431e026ab44832a3c42b6a7e0,2024-08-16T14:19:42.403000 @@ -256612,7 +256632,7 @@ CVE-2024-37266,0,0,44943b1bec747c3c4ecddbc943aaff365210584d2dac21ff41065ed54e40d CVE-2024-37267,0,0,0d692f1d5fdd2443078b17f2b54167a732ba33e5479382e14b7e2bd4b6ec49a8,2024-07-25T13:47:43.833000 CVE-2024-37268,0,0,32108042cd6042edb5d9a980c4bc9e7e171800cf8a42366d53d95c0b76a50314,2024-08-29T18:56:01.267000 CVE-2024-37269,0,0,5492c3e2784c69694729387dab80db99196a2883d5d6034e825fece97f9e6e31,2024-11-01T20:24:53.730000 -CVE-2024-3727,0,1,f1091ff91b0c17dfc5be2440e4c5dfe3e0c3d5c059984006e946ee5589d55aa4,2024-11-12T15:15:09.300000 +CVE-2024-3727,0,0,f1091ff91b0c17dfc5be2440e4c5dfe3e0c3d5c059984006e946ee5589d55aa4,2024-11-12T15:15:09.300000 CVE-2024-37270,0,0,09adf8729d6feae3191994dc6f2b286449a8e4d910f8c343a3a9496ea050a29f,2024-07-11T13:05:54.930000 CVE-2024-37271,0,0,82adde283ff9dacc0f77be200c055ea2f2c58a80387c070880c7d1f2c1068d32,2024-07-25T13:46:39.273000 CVE-2024-37273,0,0,2a85b1da0ca6e483bcfb6dea755537146c70a6967cba53f16b02bbb377a77813,2024-08-15T14:35:03.053000 @@ -256700,7 +256720,7 @@ CVE-2024-37354,0,0,1c9c2b9759a27bc79306f5cb9126cef72a7c04362733e7564295ad2108318 CVE-2024-37356,0,0,87be71b6c397fc4ae7045a825136d0160763f40b355adc848988c0a36a53749b,2024-07-15T07:15:07.650000 CVE-2024-3736,0,0,b941adb3999a1882f23d91471ffa003b4e585e64ac32ac14e9275a75eb2f6460,2024-06-04T19:20:23.987000 CVE-2024-37364,0,0,ede4925e44433ddaa6ada4b563ccb7aeb6a9e3cb870f402cba816f78552263a4,2024-07-03T02:04:15.133000 -CVE-2024-37365,1,1,33101015494fc888bdf285e1057a873d002960df3a0d94721f5e9bc481653c68,2024-11-12T15:48:59.103000 +CVE-2024-37365,0,0,33101015494fc888bdf285e1057a873d002960df3a0d94721f5e9bc481653c68,2024-11-12T15:48:59.103000 CVE-2024-37367,0,0,fc795c705b992ce820b48f0d2d268ffab4e95ab1a4d3d8de7fa966ee5dbe9cc9,2024-08-16T19:29:01.433000 CVE-2024-37368,0,0,40e16212115ad0befe218b2b8486634b2a8dd47d668209808f605a27a2118d54,2024-06-17T12:42:04.623000 CVE-2024-37369,0,0,4a0e873966c59da3f94ba1e845b6380e279da692e22304116efbf6efc4fb0a5d,2024-06-17T12:42:04.623000 @@ -257316,6 +257336,7 @@ CVE-2024-3820,0,0,8985e7d1e7aecc5fe081b43705d723ec0ca067093ca4a65f30dd280cab8408 CVE-2024-38200,0,0,d566a27ccd0b19f8229e9b6ce0a19c6b80662cfcd111693b799cdefa30455084,2024-08-13T18:15:29.720000 CVE-2024-38201,0,0,53005100dd7a84f045f26370f955e41247a7f9394ca3dbb51556ee597d1af3a2,2024-08-15T20:30:00.737000 CVE-2024-38202,0,0,d8ddfa5317ca7a8f5c085e0bd9baf44e75fb52705e1273330d4eed88c0e41067,2024-10-16T02:15:05.713000 +CVE-2024-38203,1,1,ed7d5509e2c5a230a3712333b4f596681a2a583b7c57939e9ca00dabc9b21d3f,2024-11-12T18:15:20.720000 CVE-2024-38204,0,0,9cc89ba83302b9bd215e463218ee1cc7be153f8e1ca4eb483b926bd28092eec5,2024-11-08T15:34:14.467000 CVE-2024-38206,0,0,159422281702f43b217eea303b5c7354ebb2179d51ac658c6c0c018b5ec16a40,2024-08-14T00:15:08.213000 CVE-2024-38207,0,0,48fecb3171f70b225df97b5c11256a860a73d4f7fff133be4c81b71e774668c7,2024-09-19T22:15:05.710000 @@ -257369,6 +257390,7 @@ CVE-2024-38250,0,0,acc8c041b5bb5ffe101c2b85cbef2b6922f42f19867f7d0b00ea1d0a8cc19 CVE-2024-38252,0,0,6469f2116fecff10b3fac36d53cdeb28de763c385aca7d73b3649b24b01808d9,2024-09-13T15:23:18.010000 CVE-2024-38253,0,0,3419bc908b3c8eca0a5649994b4df17f0edf85700f941607866ddc31d72da0a4,2024-09-13T15:20:59.970000 CVE-2024-38254,0,0,51e07d963269d194219f11a7f07791c63d4b27fc12cb6d3b8ac346f9bf2c86ec,2024-09-13T15:16:48.427000 +CVE-2024-38255,1,1,9059d2a6819bc714c0aabeee50f6558faa52832179d416b6aae0eeca8d66287b,2024-11-12T18:15:21.043000 CVE-2024-38256,0,0,2716cfae0f1f9233f52a2225afa7ed0b6aac310a887e60636554d0b32b5b97e3,2024-09-13T15:05:30.070000 CVE-2024-38257,0,0,3a8b2af4adcb4bdfc01df1b0ecd23bc52fe1bc4f0791eb3347f047cb2790f5a2,2024-09-13T15:03:00.917000 CVE-2024-38258,0,0,6c786148de3caa551f00d4f5be537f09b4e147b1bb4e421666b8f6ad512325e1,2024-09-13T15:00:54.153000 @@ -257378,6 +257400,7 @@ CVE-2024-38260,0,0,73cef9e77ce89bf4b93fa7a1c854f856e4e4e75ffa70f23f415d57a3b75d2 CVE-2024-38261,0,0,a036027ac3cc4115cfd09259c55f148edfe89fd6345b9787b8699b3ba958bdb8,2024-10-22T19:33:29.160000 CVE-2024-38262,0,0,058977b60bd52839342064fbab52f3e208a09db53eaf57c3ad301c83ca1834f0,2024-10-22T12:54:48.080000 CVE-2024-38263,0,0,f46aea6861be934017dd7285d8a02938dbd0902e0b8a60fe9326066622646e6c,2024-09-13T14:55:01.400000 +CVE-2024-38264,1,1,6113fb235ef175594720be48c34bf8026a99de059c934bdfbf7ec3a401d274dd,2024-11-12T18:15:21.390000 CVE-2024-38265,0,0,b987041af82bf224d305440dfe3a1e78cb0c2c2842cb9ac29ad480c0d374426a,2024-10-22T19:33:43.260000 CVE-2024-38266,0,0,24812493931b23eb9f9c734be2317a33135a030c22860333943c8effa1ea4408,2024-09-26T13:32:55.343000 CVE-2024-38267,0,0,e71850959c90aba1f66e5470156760ebdd22f551c837bdf538f552a253eba944,2024-09-30T15:52:52.787000 @@ -257542,7 +257565,7 @@ CVE-2024-38475,0,0,4434bbc9e26235e103b2ea8722d70e74e682dd306d9d4b03d295c12ec512f CVE-2024-38476,0,0,4dc405e6abe8ebf298b73a343c8daaff34dea74ec39521b4e5e4a255a423f89d,2024-10-29T17:35:06.547000 CVE-2024-38477,0,0,f870fe888c8d23cfdfdc0433edf103c8cad01a9d525dd04e1a70d1ea4bc3e13e,2024-08-21T15:11:30.857000 CVE-2024-3848,0,0,3a1e7dbb50cc54ecdbcc89881c429869965f00f9d2e1eb9f088acc297fe8920f,2024-05-16T13:03:05.353000 -CVE-2024-38480,0,0,04c4f9e75ecb94da8a57533882d0899c4c9616c45f6d4f0fa40fb0af2c036f64,2024-07-01T12:37:24.220000 +CVE-2024-38480,0,1,6eb9cee6c02610ad5600c451b6902c31f702ef5c26caea9038a07913b62ebd8a,2024-11-12T18:35:13.150000 CVE-2024-38481,0,0,a84ef873be05988cbfb5d94abd02b4ab54b65ea0e48ede31f1ebc6095538ede7,2024-08-02T13:54:44.360000 CVE-2024-38482,0,0,9abc0a21b4d338765e493606e519fec01088c089d21089e2acce085b7e1d0261,2024-09-05T16:04:53.577000 CVE-2024-38483,0,0,51f88f94318796eba13a7aef4a0099bdc9ac91b78081d907e8da9e4b8d885fde,2024-09-18T19:19:24.453000 @@ -258038,7 +258061,7 @@ CVE-2024-3922,0,0,d93b594e75035330ffbe6c52b35218aa3c4c95531df86f73f7a2c93c08b19b CVE-2024-39220,0,0,cffdc7781bb5a48c8af1f6973408b621ad60d81fad4d0ce74cb4feeeca56b86d,2024-07-09T16:22:52.750000 CVE-2024-39223,0,0,f54ba99b81aef6a1a473e3f0b32cd7be01aae3fd33418d38ef44eeff204ead38,2024-10-25T18:35:06.463000 CVE-2024-39225,0,0,967bd0a79163136bba6e3e394c24ab42a107f2cade4053bebd45ebbe7a971cdb,2024-08-15T16:15:19.317000 -CVE-2024-39226,0,0,795af5d2bfe7e0b32f75745d1bcb51aae69a7d95811f3267e75c2594cf597057,2024-08-15T16:15:19.493000 +CVE-2024-39226,0,1,43cdd6783d22a0f4195d75d906be3723fb60bbc50a9f82410ce8a213baf6f593,2024-11-12T17:35:08.293000 CVE-2024-39227,0,0,9b9dd0fff6f6efe1b1b7968ed33a92edd9262d57a609d9726e0c0ac59c14becb,2024-08-15T16:15:19.650000 CVE-2024-39228,0,0,77a80a8a1bc69fecf027e961f4d8b2052c1f2e33e082a913fa56c2ae65ea23b1,2024-08-15T16:15:19.800000 CVE-2024-39229,0,0,b4b3823124f3bc9ea90ea2bf51960fefa03fffb294236ab9c3c28ca969852c64,2024-08-15T16:15:19.953000 @@ -258061,7 +258084,7 @@ CVE-2024-39276,0,0,32d71e300deae390ebad47139e8119dcf57d5112942186e3daeae896a6726 CVE-2024-39277,0,0,19274852af9a44581ed7b5da931e969f3e8eeda9b8a06df6105e4982b2efa2f4,2024-08-20T14:35:25.887000 CVE-2024-39278,0,0,51fae5fc06f1bea217dd270a1a945e50fc908e01cdd6aa79fc8df1b8bf725907,2024-10-04T14:36:35.340000 CVE-2024-3928,0,0,3771bfd5d61bb660489266159da597b0f2838c8fcc0fdb41f660ee68264744db,2024-06-06T20:15:13.813000 -CVE-2024-39281,1,1,3419a2439625cfc41f8c1fc2af52d02a93ea28cf83965accb2fa3b9f5e648646,2024-11-12T15:48:59.103000 +CVE-2024-39281,0,0,3419a2439625cfc41f8c1fc2af52d02a93ea28cf83965accb2fa3b9f5e648646,2024-11-12T15:48:59.103000 CVE-2024-39283,0,0,3cb180f3de5aa4a3b64779758cf8f61008b6ae73b857127aaaa5aa752ce57774,2024-09-12T19:15:46.390000 CVE-2024-39287,0,0,95145d1fbc5d3c99088ebf6343df14053c1bba8568afd021848bf0425c858769,2024-08-29T14:23:31.807000 CVE-2024-3929,0,0,f18b8c9cdb1e48904246b7e57e142d1a1782977d19d7fe85b4105fb3a35bceaa,2024-04-25T13:18:13.537000 @@ -259765,7 +259788,7 @@ CVE-2024-41989,0,0,e902f47b7607adc4839df00802ec4b9f801f5195050e557f24fe6e1b06bac CVE-2024-4199,0,0,fcf36265d6a610d83a178901804339aadd89406ac8a1349d6da6f71c3e13bfe9,2024-05-15T16:40:19.330000 CVE-2024-41990,0,0,a9d3bfe1152ea007eb5df4a4d15c3972fabe2ab7cf6c4dc84957655472913a10,2024-08-07T20:49:50.480000 CVE-2024-41991,0,0,c38f7b679bd3e48c46db9fd1c6390ab9383b0c22d8669d807f374055f46ee42b,2024-08-07T20:48:22.403000 -CVE-2024-41992,0,0,85601128659507913ce454ce38b9646a27756e1b2f8094d380ad8f669bc24e6d,2024-11-12T13:55:21.227000 +CVE-2024-41992,0,1,d3e22822172edc97c99de26fd87c6501303884a14874a305b9f919f079d1083b,2024-11-12T18:35:14.290000 CVE-2024-41995,0,0,79638f0d10c16b237f07db3242d98d294e87bf4205be8c6d9c3c7b90790704bd,2024-08-06T16:30:24.547000 CVE-2024-41996,0,0,29b8c50df43b1c66bff4b5734acbca34adccc097a107dedf36398e589357d13d,2024-08-26T16:35:11.247000 CVE-2024-41997,0,0,84a3f0ea395077fa02b4a334ab8509ff391bef43bdcea38ddd875b5794f83bfd,2024-10-16T20:35:12.430000 @@ -260144,7 +260167,7 @@ CVE-2024-42439,0,0,08f9e0083219c02517835f74d205a3e990d7afc9a56ebae8a3bd402fa7b88 CVE-2024-4244,0,0,0a1e4c7b4cff7996944f75b62aaefc0f51495a17918fe625b6507a3d9892e7a7,2024-06-04T19:20:33.593000 CVE-2024-42440,0,0,19ccc0e809e3e2bf1e830128a29110680f7fa87923d96851d116e1e89bcae87a,2024-08-28T23:59:01.537000 CVE-2024-42441,0,0,f25ce01d00bee15651b5d0ef3b027baaf54cad0dca0cb0ace6ef530480ea5aeb,2024-08-28T23:58:06.960000 -CVE-2024-42442,1,1,306f406ac9ff3a980ab9901f0a039ac0129570a9f45cbf4008a29fe28189eb26,2024-11-12T15:48:59.103000 +CVE-2024-42442,0,0,306f406ac9ff3a980ab9901f0a039ac0129570a9f45cbf4008a29fe28189eb26,2024-11-12T15:48:59.103000 CVE-2024-42447,0,0,68027c21ffcefe32f56a7a559d44cc2a1c6b0b32c4ec80fa56a1f1b8e20a917b,2024-08-30T17:35:29.533000 CVE-2024-4245,0,0,bc150cb423e680075dcbfa7aff18f43429f7c6ca789bf05cb5f53de998c993ba,2024-06-04T19:20:33.693000 CVE-2024-42458,0,0,92fe6004383d793b0d5cb11f4d02a69450774ac5606c98f7e6de587e1b590522,2024-09-05T15:51:34.307000 @@ -260786,40 +260809,47 @@ CVE-2024-43411,0,0,17fae2b6c19a1c99d860c5f9c414f25b1a9d716a3875184bd3648e5d7c506 CVE-2024-43412,0,0,d8be950c692563feabe854c0542abee7aa58fa64820fe9c692a8fb330f15b7b0,2024-09-12T20:20:56.763000 CVE-2024-43413,0,0,8e6331055eff0a1fc21c13ac1aa5a910957effe87064f315927a5ac8c4d9163f,2024-09-12T20:18:46.097000 CVE-2024-43414,0,0,41d126c00be1a75ca1d7b9b05a3a92eaf49a5d7831c24ad21608856181f8c11a,2024-09-12T21:33:40.887000 -CVE-2024-43415,1,1,082764aa1a5232a9ae1e21d50b6462503489f9e7efae337fc46173e3a650cc93,2024-11-12T16:15:21.800000 +CVE-2024-43415,0,0,082764aa1a5232a9ae1e21d50b6462503489f9e7efae337fc46173e3a650cc93,2024-11-12T16:15:21.800000 CVE-2024-4342,0,0,2403af0b003f5953a3d2a1b74bf46d64f4a354bc628b01d2ea5f60de4a4002c6,2024-06-03T14:46:24.250000 CVE-2024-43423,0,0,8fb21f51e563dd938c763581007e890cf5873a7efc6a39a36e929ea32ce34c0c,2024-10-01T15:41:32.537000 CVE-2024-43424,0,0,6d9ffac7d6eb9e50db381baa418d84f2f5d9932ec78b86526bf799eb43b3b4f3,2024-11-05T19:39:33.873000 CVE-2024-43425,0,0,938233c36f296352d9985e1fd2ce4b16f2764e2564dfb74da585a571295076c0,2024-11-08T19:01:03.880000 CVE-2024-43426,0,0,2e98ed8cd0fe3bbd03bc31edcafe875e17ec3c3fbf69dc03657573f422300921,2024-11-08T19:01:03.880000 -CVE-2024-43427,0,1,c0afa9190bfbd3a42daa26b3156ede180ba7e66263d84fafeb811083b81b57ec,2024-11-12T15:35:06.950000 +CVE-2024-43427,0,0,c0afa9190bfbd3a42daa26b3156ede180ba7e66263d84fafeb811083b81b57ec,2024-11-12T15:35:06.950000 CVE-2024-43428,0,0,b5ed04eb9991b8a533d52401aafbeac39cc5aa45a83db20224d68df7b23b336a,2024-11-08T19:01:03.880000 CVE-2024-43429,0,0,d5111a217563ee616d3370639b319524d6cbcf7a4714cd852bf9ababc3df3c3b,2024-11-12T13:55:21.227000 -CVE-2024-43430,0,1,56b9aa97c4cdbeb7d02668c0a21fc9e420a493aa45c3ca05f334d7cfa97343ea,2024-11-12T15:35:07.837000 +CVE-2024-43430,0,0,56b9aa97c4cdbeb7d02668c0a21fc9e420a493aa45c3ca05f334d7cfa97343ea,2024-11-12T15:35:07.837000 CVE-2024-43431,0,0,b9005a05e5507a46df12a8ffbb839f8f4313b143d14ebe18ef1c5cef640c905e,2024-11-08T19:01:03.880000 -CVE-2024-43432,0,1,6882cdf5acd71ff08ac60ea8ef39b61d02a539f240a4304bb1e0c1af091cba8f,2024-11-12T16:35:17.560000 -CVE-2024-43433,0,1,3a89c1a0d786a23f3bdeface2c8474ea1ae11dbc43b2728b4c205fba292f9317,2024-11-12T15:35:08.567000 +CVE-2024-43432,0,0,6882cdf5acd71ff08ac60ea8ef39b61d02a539f240a4304bb1e0c1af091cba8f,2024-11-12T16:35:17.560000 +CVE-2024-43433,0,0,3a89c1a0d786a23f3bdeface2c8474ea1ae11dbc43b2728b4c205fba292f9317,2024-11-12T15:35:08.567000 CVE-2024-43434,0,0,8ffb2c6afb4ed4c9c792f8915838fc9f8b7d930620a4823c5b60db456a6beae1,2024-11-08T19:01:03.880000 -CVE-2024-43435,0,1,becce87a04db8aac99572600f300ced2262bdf09091d0d712bce2624d790fe65,2024-11-12T15:35:09.300000 +CVE-2024-43435,0,0,becce87a04db8aac99572600f300ced2262bdf09091d0d712bce2624d790fe65,2024-11-12T15:35:09.300000 CVE-2024-43436,0,0,d5a3a1ab85fb023046251b174592264fb917cdc48f222f2755feafd455c0e61d,2024-11-08T19:01:03.880000 CVE-2024-43437,0,0,8f10e345b4160b4fc9f94a3f2509a5bb9474e33f9fe79e6cf5ab43a1a18d8b98,2024-11-12T13:55:21.227000 CVE-2024-43438,0,0,875baee488d8f8241783e175bd68620af647e40659767e34acd9ef245d347a44,2024-11-08T19:01:03.880000 -CVE-2024-43439,0,1,06954d00b1e484b5d61b522da4ccbdb6b5a0e70b7c5499f89ed6b82345a0167e,2024-11-12T15:35:10.043000 +CVE-2024-43439,0,0,06954d00b1e484b5d61b522da4ccbdb6b5a0e70b7c5499f89ed6b82345a0167e,2024-11-12T15:35:10.043000 CVE-2024-4344,0,0,0e21345ffbddb43f0000901c1c1f7a4c33b525c68a381cd32a35ab8e755aa5fd,2024-06-03T14:46:24.250000 CVE-2024-43440,0,0,3deee55ee11303962828a1a1b49c99d7d9284f6df5f48904a5eb9b6fe3a55147,2024-11-08T19:01:03.880000 CVE-2024-43442,0,0,5431c5e587ae45a37d19d37e97d6aeb67638f78f0db0677df8b847e3725ec6a3,2024-08-26T16:35:12.860000 CVE-2024-43443,0,0,41bfb91b7f7c9bee48be0f5c8ffcdaa9039df695b92734c0f1b611ea064f9e04,2024-08-26T12:47:20.187000 CVE-2024-43444,0,0,869e12b3e86ded10c38d8795cc34fa22bd804c0b1d5e73f28a97d45f8e95ed59,2024-08-26T12:47:20.187000 +CVE-2024-43447,1,1,fd5dc05f53671d6e56806be84ae616fa8c21743882389a6d301dbdf7371f9492,2024-11-12T18:15:21.707000 +CVE-2024-43449,1,1,a9d39682e29a7558796782d77b36f45700e4a3a35fea1199a237b2086f7730d0,2024-11-12T18:15:21.977000 CVE-2024-4345,0,0,991a52fb88968c952c460a76f59f283c0ad80fedc25d9533338fbc3b0d515f60,2024-05-07T13:39:32.710000 +CVE-2024-43450,1,1,7df4e2c6bdc2de57eedf815ed01c76f77185d9316d9f5dd85ddb20c7f799fd74,2024-11-12T18:15:22.237000 +CVE-2024-43451,1,1,6e278dc59b3dd08ae7d0e162b1026695587a953c50aa1a5eb37eb44a9e3db640,2024-11-12T18:15:22.483000 +CVE-2024-43452,1,1,192c33eb1252a75f8c2aab86957281998f0d88198ec9948f6cd7dad5aee3b49b,2024-11-12T18:15:22.737000 CVE-2024-43453,0,0,987e6c8ce7e8f2e1d3f9232b14d73438f55ce61f84bbe67fdf49d3284ca0d7f9,2024-10-22T19:29:44.997000 CVE-2024-43454,0,0,f0995c64c71167afbbf899e7ce1038e4a80441f5a273809866a5c3103af339c0,2024-09-13T14:52:28.570000 CVE-2024-43455,0,0,7effa4d2d49733857a939b9c56001fb62c3a8618d5be7fb4155055d0a4466b05,2024-09-13T14:50:02.390000 CVE-2024-43456,0,0,7e33172df2a3bcdeebebada3a1490c286c11a1e92c4e5a2d00db0b809ed4d2cc,2024-10-21T21:28:15.323000 CVE-2024-43457,0,0,2d39da1954a904290cdb655f8413466318bc2fb9e79e95d1239baead98599e5b,2024-09-17T16:25:03.037000 CVE-2024-43458,0,0,d510a08722ad4b01e3bd416a3ff1688485cee9b82fed026222465a1f7268669b,2024-09-17T16:24:06.837000 +CVE-2024-43459,1,1,d5037f8a4f48f5c3d66ded9dd4a60ea3063b2ad1d7c85d2e60934c7ecffd39cd,2024-11-12T18:15:23.090000 CVE-2024-4346,0,0,9d7617b39f85e35f3b425bc36c01c8cc51c24d84e65ff0d34bf4ea7488f000ec,2024-05-07T13:39:32.710000 CVE-2024-43460,0,0,9c3132d78cea7fa8b50b764b3c03f944da46eae998a999bbcb3ad24e42826c5d,2024-09-25T19:18:53.350000 CVE-2024-43461,0,0,f99d1573520331446defc217a57faaa313e0a37923c807afd46dd8502623f146,2024-09-17T11:17:22.597000 +CVE-2024-43462,1,1,dcb118ab6310d15cee3c6688c2508510c40179ca42a32a7c36bf5535fa374c7e,2024-11-12T18:15:23.370000 CVE-2024-43463,0,0,82ed3b86032aeae7f20effff7ac01fc984a98742e5e7914a0bb7560978dad83f,2024-09-17T16:08:58.350000 CVE-2024-43464,0,0,42956114f68b1d67be14842639914b420d38d850d63203f2075370bc159d7270,2024-09-13T14:48:05.247000 CVE-2024-43465,0,0,5d9250aa7e038ca65d71b1061a2d776c0916a5a9d4039f0bae2a50bea6fdecc1,2024-09-13T14:46:33.210000 @@ -260851,6 +260881,8 @@ CVE-2024-43492,0,0,af0e73844988f19d42832ecb20006b5ce23817c5aa51bd592ac57ea711827 CVE-2024-43495,0,0,d2a8d4c3f203ea859641059613f0257436e0f701c3b0d8de8a57b0ddb10ca75e,2024-09-18T13:55:07.100000 CVE-2024-43496,0,0,1e4f277010291ea8388e3463633269924e9ec7b9c2f947668d81da4d3ef80c37,2024-09-23T17:32:54.663000 CVE-2024-43497,0,0,2537458188d3ab9aa76faa081a4fee596da658de243be9f1924628f34744e854,2024-10-17T21:15:30.827000 +CVE-2024-43498,1,1,1f35ed1545d6c5166cb859e2d06e662c8324baa4f30ecd41ed7be561583a4462,2024-11-12T18:15:24.110000 +CVE-2024-43499,1,1,a450a73950e2c11952b9119a41547ce6f3f50f48bde59e5b11a00eee4fad1964,2024-11-12T18:15:24.363000 CVE-2024-4350,0,0,064be752b5def38b2ae127a671a2419b00cbe1db7bc8e8e49beca0c95658f61b,2024-08-30T18:18:37.130000 CVE-2024-43500,0,0,78bdbde8586a4aeadf73d960935866ca71ecb415ed1914c17c331c1e31d9dae2,2024-10-17T21:01:08.067000 CVE-2024-43501,0,0,3dab9521c0cc7c6361671a7526673e1c684c3d41e5a05cbd155304b95f78c3a9,2024-10-17T21:06:07.377000 @@ -260883,6 +260915,7 @@ CVE-2024-43527,0,0,b6eaaba86dd8df9b16e2ceea37b465e563d9f1276c446132f9cd04caa2aba CVE-2024-43528,0,0,c078a6601673a23e9f5cb9927d553390a34b2f1fb3f3c869076da972c659e11d,2024-10-16T21:47:05.543000 CVE-2024-43529,0,0,6d2e5c631923a97dc2fc3a94b6294dc3ad5e559d16d70ff1d0c82c75d4ea2458,2024-10-16T21:48:07.683000 CVE-2024-4353,0,0,aba01e17f5523fea8114a858821f92c407b11c64f22dee184f29d8c270ca2d70,2024-08-07T19:15:48.223000 +CVE-2024-43530,1,1,3e81581a01c8173b2ded33dca3212e4dd708e3d259691c77f9757e3a122d237b,2024-11-12T18:15:25.997000 CVE-2024-43532,0,0,c4a5dec645ee682c2fb747712fd0b31ac99f4ae71f14f2366a2b1d631440f236,2024-10-16T21:51:34.370000 CVE-2024-43533,0,0,0f9ce0b0dadab4dc53059badbfdc228def8a270b47abc0d441c46b976784c440,2024-10-16T21:48:30.067000 CVE-2024-43534,0,0,a57be74fbdb76e88ff1715c3f432c68cba04c18e2f38436ceafe7daae64c58a1,2024-10-16T21:49:06.767000 @@ -260947,9 +260980,11 @@ CVE-2024-43592,0,0,66ef8868710faf1076b1b13051f2c75eebafbfe5976017df5a4f00073c2c6 CVE-2024-43593,0,0,7e17c95f595bed9729f21273d821a92cb32423e919d0faf83c37ed5dcd8b802f,2024-10-22T19:30:19.870000 CVE-2024-43595,0,0,c9530dd7915099d4a86e6d6506504fdd984e781ac89cb128030fa646bffdb2c0,2024-10-18T16:55:06.487000 CVE-2024-43596,0,0,0f30448ecbbf09d34768a5a54fbdb251259ce851c310b81f9cbc1d14d274f939,2024-10-18T16:59:08.667000 +CVE-2024-43598,1,1,8ded11a76338fff282c0dfec3dad15abd8849affc64cc49be07bbb6a0ac929d0,2024-11-12T18:15:28.277000 CVE-2024-43599,0,0,46d81ec2898b49efc1d06eab918dd819a14dff6d746dfc96a1846004d908dfe9,2024-10-17T20:03:28.687000 CVE-2024-4360,0,0,ecc9c2c2d55d835e0dd1d5a0ca496992d866a587cb1717ba0b6dc8cd29acfd1c,2024-08-12T13:41:36.517000 CVE-2024-43601,0,0,70d1af092a29e0256385b0b1eb94d28b1b04d755b5d71c8bb3ee4a255fe9335f,2024-11-08T22:15:20.270000 +CVE-2024-43602,1,1,52cfc3551a8b0c140d6cfebbb01b18cf93906ca4992dcfa4de2723bf6edbfa57,2024-11-12T18:15:28.563000 CVE-2024-43603,0,0,d2fca24eb56e369fa155c253fb46551545c3a138800b20bacb862233e9cfec55,2024-10-17T19:55:34.360000 CVE-2024-43604,0,0,f6faaab53dedc3cc5ca882966371cef6b85571d62bbd9d0efe6e399cbea7c221,2024-10-17T19:54:24.387000 CVE-2024-43607,0,0,f77e9baeaed71ae01585aac88f6e4a22dbbcabcaaded574a516f1ff34eb6e860,2024-10-22T19:03:17.993000 @@ -260963,8 +260998,34 @@ CVE-2024-43614,0,0,37f86979c4c4ec96d0dd61c1d9daa59ec511d8fd5452834efe232d695cc74 CVE-2024-43615,0,0,841e5833e1934c639d3a9a11a43505704ba14c449fb8c86b43a2c5341378c86b,2024-10-21T21:00:34.967000 CVE-2024-43616,0,0,15ca7e9be3a91b920fd3f7c8d4a29e60f6c23503343614efbabdf7dee4793679,2024-10-21T20:47:00.313000 CVE-2024-4362,0,0,16bcb3e7fd20cddcf2afd5e423805494786dbf969e82eb67d1ba08cf8ffd4c26,2024-05-22T12:46:53.887000 +CVE-2024-43620,1,1,a89f3687014cfa76446e03cdef447409a9bb3ca1ff342423a4833ce6ee910b93,2024-11-12T18:15:29.037000 +CVE-2024-43621,1,1,5e4ca447b30ec22517bee91fc8aee55ec5079eca6e081a3ac8377a4bf17895fa,2024-11-12T18:15:29.270000 +CVE-2024-43622,1,1,eb07a52098d836214810f5143267be5c4a8191069ad2bb293131a33d343e48f9,2024-11-12T18:15:29.513000 +CVE-2024-43623,1,1,24cfd714e82858dbff9864b5a63659ea7ac1925ba1c0cb1f3dbe358166dfc089,2024-11-12T18:15:29.743000 +CVE-2024-43624,1,1,27ece5de752d6c8d3edf5caf81d528c8a17fbcebb01ea27b7612896ed4e8f796,2024-11-12T18:15:29.987000 +CVE-2024-43625,1,1,476042d81912eb9699e913cbc9e957d8c61e6522a288ea02ce3e817c97e192ae,2024-11-12T18:15:30.230000 +CVE-2024-43626,1,1,cfb4dde7fe1ebce8110fb3f9e83bd0fc67dfe7aadf721b67b0f60c7574567ef1,2024-11-12T18:15:30.443000 +CVE-2024-43627,1,1,1a13f18a248e3ad01daa04f78bdb55c367ac28d74da28b3eaa066ea3ed56a3aa,2024-11-12T18:15:30.663000 +CVE-2024-43628,1,1,da79ae0ff44f74b03cf1bdc4c6d2ef3c9fa6312e718d119a163944088c82b055,2024-11-12T18:15:30.900000 +CVE-2024-43629,1,1,9c7673f5d8988c67bdedca35c716a40114af9b4a0cd31e4aeb55cbdb52655a62,2024-11-12T18:15:31.133000 CVE-2024-4363,0,0,2c7c654c7422e9473b7010560ae2a1c2e3350cf44cdf9b6cc5ffb58dc4446aff,2024-05-15T16:40:19.330000 +CVE-2024-43630,1,1,a5c7bf7c3ef0d1ee850ba78ff0b1a2f0fc7bd842c4a77736ab003d4f2bb9a80a,2024-11-12T18:15:31.353000 +CVE-2024-43631,1,1,0bd1b0a0289a5e6c9804e3247ed45b108e6f5c084be7609274a509940e580dcf,2024-11-12T18:15:31.580000 +CVE-2024-43633,1,1,86868102ac0ad8bcd8ae7aa208615a24c96332718596ae24b257d0c334426af1,2024-11-12T18:15:31.800000 +CVE-2024-43634,1,1,aa53f0e61132a8691e2baf0cbb16a868d792e11c5adb7fed7ce98c0b1ff11432,2024-11-12T18:15:32.050000 +CVE-2024-43635,1,1,49c5b316cabc011ab4743d0cae9393e5b46b1ebb17a90877cdd29cd7c61fa01b,2024-11-12T18:15:32.287000 +CVE-2024-43636,1,1,53d6284ad6dca106bdc09c16c5472a1c40c6fe43f810305c433c33f36d2c47a5,2024-11-12T18:15:32.537000 +CVE-2024-43637,1,1,f368c069d2871e756ea863018a036b8a217ba90f8b961b2073691067fe827995,2024-11-12T18:15:32.773000 +CVE-2024-43638,1,1,d9eeb1ecb58aec08c00d4d8d60f5a98c6738bc00cd652bff5433e7b58bdd2a83,2024-11-12T18:15:33.013000 +CVE-2024-43639,1,1,ab466b0fcf3cab315de53821e916473489c1a8a2197d93350688431bb3aa5d4c,2024-11-12T18:15:33.267000 CVE-2024-4364,0,0,9332cb50f761fbdff3ec7a6ec045f13accb15b963b30845c4aa93399b834b7a1,2024-07-24T20:23:31.487000 +CVE-2024-43640,1,1,a29916ec781fc13a4728099e9ca82db63cae0680c2104623f2070932a6f26dc1,2024-11-12T18:15:33.507000 +CVE-2024-43641,1,1,d2452db9e83f520151066fdb972ae0d85ecdd1a2faf421aea0ad149c5cc32841,2024-11-12T18:15:33.727000 +CVE-2024-43642,1,1,84180c72d76f52f700354c063eff146964e41a3e719de5a2376331be8c17f7b0,2024-11-12T18:15:33.960000 +CVE-2024-43643,1,1,6f884d626134a66e6ec21cee99f125bbdd80a321f415c6f42fdac96b91342925,2024-11-12T18:15:34.370000 +CVE-2024-43644,1,1,33ade150481c4249d5d54b50b7a8d371133283c1a34a7a35c1a7d2758baedfa6,2024-11-12T18:15:34.643000 +CVE-2024-43645,1,1,054266445ff72ddabafc074684f7f09b40f7de4b23894a781d79f1ebfe6e32ab,2024-11-12T18:15:34.903000 +CVE-2024-43646,1,1,2974bb49a8cf15910c7030c2ed6052330b4a4c0707a373b34075e3e12a730a7a,2024-11-12T18:15:35.150000 CVE-2024-43647,0,0,ee5840489343f77483691f4446146948d3f18b1595eba8d71ff6f621d4acd601,2024-09-10T12:09:50.377000 CVE-2024-4365,0,0,63c2db9b70aba81bf4acd057c8457c31612ae1811b001c9773701935bfb8f554,2024-05-24T01:15:30.977000 CVE-2024-4366,0,0,bbfa79c99a69a6ab3a1454de708e5610ad18f6066e78d9171ac36b6f6e6eece9,2024-05-24T13:03:05.093000 @@ -262002,7 +262063,7 @@ CVE-2024-45285,0,0,432443f16f3bc2cd7fd6662743de8a85c2d23de3c5e8c63d8a475d82e46b6 CVE-2024-45286,0,0,8f2e1da507766dacf9e0cae8531253d3a4901ee6705aefce0b8c842c2e03783f,2024-09-10T12:09:50.377000 CVE-2024-45287,0,0,045bfb0d53167c55abd32c57163028c51920368f50e2cf76774839485016e81f,2024-09-06T16:26:26.303000 CVE-2024-45288,0,0,955296d26f6688a711bb67949962e8bc8a5c80938f39e5cdb2e043fe3c66ded8,2024-09-05T14:35:25.337000 -CVE-2024-45289,1,1,5e95c0d4464ba6185c0cab13d978288aa2ff5c53e6063898a90eb8848c488ff0,2024-11-12T15:48:59.103000 +CVE-2024-45289,0,0,5e95c0d4464ba6185c0cab13d978288aa2ff5c53e6063898a90eb8848c488ff0,2024-11-12T15:48:59.103000 CVE-2024-4529,0,0,5fbb4c14219ef7d51954458b7780a68dbee769876e9489db6e9ba34bd68834fa,2024-07-03T02:07:42.220000 CVE-2024-45290,0,0,47b2969bc1a747d3ad8c94a2a1403ba705f7312da0ef51083401cc2cbbe8b318,2024-10-16T19:54:53.397000 CVE-2024-45291,0,0,d43c3b21f765f29ad064a7621a2d1e18446d51e2e184bc6e561edf1a1c4d2c29,2024-10-16T19:09:52.697000 @@ -262257,9 +262318,9 @@ CVE-2024-45764,0,0,e55812b3262ad9c7b90a9a57055a85b654c45e8378b7440ff062b836e6265 CVE-2024-45765,0,0,324589effb5b27643e9f79a9ce88d0d046eea5e6cb4756946ff245c0d7153827,2024-11-08T19:01:03.880000 CVE-2024-45766,0,0,1ac6d864cfa84a9455e326aaa02a3b21331a9d91fce801a33cf0dbf2664ff28d,2024-10-18T12:53:04.627000 CVE-2024-45767,0,0,eb5f868ea4691213c1364b02500bffd0f089d1b21eaacec7a6a56a798a8a0e81,2024-10-18T12:53:04.627000 -CVE-2024-45769,0,0,8008e87928d7d924cb6edc7a002ab7d174233b35bc221ee2578339101437b36f,2024-09-20T12:30:17.483000 +CVE-2024-45769,0,1,68a2a61eadf42c80605ce04117a3301a4bc932c0f0fb7e1da09aa7ee31344d24,2024-11-12T18:15:35.427000 CVE-2024-4577,0,0,b55cac970df35b2daf21f1bc20cfa9dd0965f08c49eae1007fc9a139f9980913,2024-08-14T19:23:47.253000 -CVE-2024-45770,0,0,e98fab17d907c24beb2a28773665764214c6145643120e7f9304697540dec889,2024-09-20T12:30:17.483000 +CVE-2024-45770,0,1,9c8c7fc9fdf0b72fbb9d716faed9837ec24c65464a5ce38c4a50fad0b84880d1,2024-11-12T18:15:35.643000 CVE-2024-45771,0,0,754a0f27219aa2eb6179ec627ac31099e8e2882043a643cfa7921ddb03dbb66f,2024-09-09T15:35:11.567000 CVE-2024-45772,0,0,d4fcff511ac9c702d11d2981d4f53f578a5b533222a07c5c21d8a62a8451fded,2024-10-04T13:20:58.327000 CVE-2024-45773,0,0,fa80a32ca25578799d772108a6e7f2b87164fbdfd3820c41dab7e96e6c83084e,2024-09-30T12:45:57.823000 @@ -262838,9 +262899,9 @@ CVE-2024-46888,0,0,118adcbecc3a22835a285a6c166c4bedc644275fd6692c0b3b890f2737ef0 CVE-2024-46889,0,0,3c62f07a743a2b39b09de968f4f3db8c262650ccbfbc60333dd3911073d37c8c,2024-11-12T13:55:21.227000 CVE-2024-4689,0,0,a13cc88d2e9b12d452cf9b42ce57cc1735d851f3f551a07c40e7bb0f2ee113b8,2024-05-14T16:11:39.510000 CVE-2024-46890,0,0,f116e6ca8bed2d160f28a0600ac376bc3ac8885dcc3e94a602d7ead798ac1d0f,2024-11-12T13:55:21.227000 -CVE-2024-46891,0,1,2548c4af1be93d5604200e5665ed8ea56a190b29806575f2e119202139af8813,2024-11-12T15:35:11.240000 +CVE-2024-46891,0,0,2548c4af1be93d5604200e5665ed8ea56a190b29806575f2e119202139af8813,2024-11-12T15:35:11.240000 CVE-2024-46892,0,0,832998be000f46348b602428fda150245906b189ed2422479a67b8966ab7d9bd,2024-11-12T13:55:21.227000 -CVE-2024-46894,0,1,599bde0d989bd689283a3a82d91bbb2451f40f3e50006e12b8e4666ea02d1f4f,2024-11-12T15:35:12.310000 +CVE-2024-46894,0,0,599bde0d989bd689283a3a82d91bbb2451f40f3e50006e12b8e4666ea02d1f4f,2024-11-12T15:35:12.310000 CVE-2024-46897,0,0,2e86e25932c3365c9fccf8620fea0f0e322915cee2108f33175688332c9426e1,2024-10-22T14:09:46.913000 CVE-2024-46898,0,0,1121a0227e884e663de945d1f5ee0881d2211aaf4fceffe823ea2d2dc74e4f9c,2024-10-17T17:52:00.700000 CVE-2024-4690,0,0,8a659fbde289577b9d47a4e0b198b3a10d973db6b9b3690d157fcfdd9eceabd6,2024-10-21T15:51:10.467000 @@ -262874,11 +262935,11 @@ CVE-2024-46959,0,0,49609311db8eb2484a5bda279fc39cc9dccd98f1d151343e94689d8818c06 CVE-2024-4696,0,0,b8ce6d89da084f88972905e9878372f109e48889eae7d9f95b30ecbbc63816ed,2024-06-17T12:43:31.090000 CVE-2024-46960,0,0,34c9db930ef4e9e6f8b9462edd0bebd8143074b581b4cd4eaf2ae451689fb83c,2024-11-08T19:01:03.880000 CVE-2024-46961,0,0,6281dfd23f05aedb5a57016518bf840f9c3236bd7244aca077f0eeaa5baad6cb,2024-11-08T19:01:03.880000 -CVE-2024-46962,0,1,0548157d7c5de74bb44620f2ef4d424089f2c91f1caa9ef46af393d2ab234d0d,2024-11-12T16:35:18.293000 -CVE-2024-46963,0,1,b3eeeff171042ae94da59aca70d325e187226ed1b77924489ea1d0cb9ef2bff9,2024-11-12T16:35:19.117000 -CVE-2024-46964,0,1,9566b7e7fac378fec90f5c4450fce11c64d6e1ff19e90136f23f197651aeb491,2024-11-12T16:35:19.933000 -CVE-2024-46965,0,0,939d1e34dd2480d5958b1a0271f08f2a59c4b43e7302e3bfd92a53764523ae42,2024-11-12T13:55:21.227000 -CVE-2024-46966,0,1,2dc70b10b093ab52972025bec2f51704bf269615cf39a0a1e82c4c898655227f,2024-11-12T16:35:20.790000 +CVE-2024-46962,0,0,0548157d7c5de74bb44620f2ef4d424089f2c91f1caa9ef46af393d2ab234d0d,2024-11-12T16:35:18.293000 +CVE-2024-46963,0,0,b3eeeff171042ae94da59aca70d325e187226ed1b77924489ea1d0cb9ef2bff9,2024-11-12T16:35:19.117000 +CVE-2024-46964,0,0,9566b7e7fac378fec90f5c4450fce11c64d6e1ff19e90136f23f197651aeb491,2024-11-12T16:35:19.933000 +CVE-2024-46965,0,1,97ca4b72439238ebe100af52f81acd4f8393bf48297283fc3a2578dd3a15fc61,2024-11-12T17:35:09.427000 +CVE-2024-46966,0,0,2dc70b10b093ab52972025bec2f51704bf269615cf39a0a1e82c4c898655227f,2024-11-12T16:35:20.790000 CVE-2024-4697,0,0,3bc62a9bb9952d026af8ecd13a98f81fa60290945109a2f6023ef384956822fe,2024-06-04T16:57:41.053000 CVE-2024-46970,0,0,6ef16041ee18068670ae3579af5d9c59d6c6488d479945d9220353b5e1ab4205,2024-09-20T13:23:29.700000 CVE-2024-46976,0,0,02f78d527d01c9aa774dc796f1ceed3fea7faea62af60e78d26c9cc8325cba03,2024-09-23T18:27:05.920000 @@ -263263,7 +263324,7 @@ CVE-2024-47530,0,0,fed1c84544c0e51056ec77fc5d6317c40fbcbb8ff2284050a11260f26a3d0 CVE-2024-47531,0,0,3c1eac025448da4ef56a64b8782ce45f8d883f9cb11cc38200fa63f6c47d35ec,2024-10-04T13:51:25.567000 CVE-2024-47532,0,0,8782a61a2e6393b4eaa2920ce672fbaf71cd431530e5dbfab9dfea37a0c9da22,2024-10-04T13:51:25.567000 CVE-2024-47534,0,0,3fdf39e9d60bdd61b891053803d0cdd86e1d9b2f1594fae7730f1f0f0b99a057,2024-10-11T15:15:05.490000 -CVE-2024-47535,1,1,6dde72bb5d0032ab953f239c28fe6ffd689632c5bc3e3e335b36c4024e90ddf3,2024-11-12T16:15:22.237000 +CVE-2024-47535,0,0,6dde72bb5d0032ab953f239c28fe6ffd689632c5bc3e3e335b36c4024e90ddf3,2024-11-12T16:15:22.237000 CVE-2024-47536,0,0,353df15c5abe486c0bd2000eeee4b00375b2403ebe72a10be7f49c66f18c4bd4,2024-10-04T13:51:25.567000 CVE-2024-4754,0,0,43efa3a5287d05b500ecfcf4503ad62e1b41a22939150352bf102c1b98a3511a,2024-06-24T12:57:36.513000 CVE-2024-47549,0,0,113d97e5056ed200778519e504bac77f5b27816ee70d3059de963f972da95681,2024-11-05T19:40:52.070000 @@ -263290,7 +263351,7 @@ CVE-2024-47588,0,0,784219c1ff1f8b9473f80c254cc66a71926e8c3d6e40be5aaefe6b62ee08c CVE-2024-4759,0,0,88e594c7c898a4e82a1a8532a1f049d1a9fe25baf60278988c21dabe64f2896b,2024-07-03T02:08:02.923000 CVE-2024-47590,0,0,c753d8c8fff8996c1d065cd36652a978ed4f5524609cd99b50669bc05bf4ecb8,2024-11-12T13:55:21.227000 CVE-2024-47592,0,0,d50f90a32b1d664dd933a768f3eed2f3a853946f4a68bc9410b951adb6fc8f95,2024-11-12T13:55:21.227000 -CVE-2024-47593,0,1,5719cca65cf0b6dd229ca6ab81d4395c74dda132bf396e7340283b24564be6f3,2024-11-12T15:35:13.233000 +CVE-2024-47593,0,0,5719cca65cf0b6dd229ca6ab81d4395c74dda132bf396e7340283b24564be6f3,2024-11-12T15:35:13.233000 CVE-2024-47594,0,0,1ae534f7a3c1c97ead2076790a49a30a6aebae2067756e88afe36b9237831ffa,2024-10-10T12:57:21.987000 CVE-2024-47595,0,0,ba21651773888aa8d2743ba8a0a71f7f213256467724b419ffc59a50270127b5,2024-11-12T13:55:21.227000 CVE-2024-4760,0,0,b4849d754e19ff5b62ce1dfa55ef4652903c511172eef769e0d0e48dc2803d03,2024-05-16T15:44:44.683000 @@ -263468,7 +263529,7 @@ CVE-2024-4777,0,0,96d0d896ebb105a32ed437e794c8fc4ba926ad921436ba17bdb49a1a49737b CVE-2024-47771,0,0,c2cc2e4162d5c6e4f811bab9afb437dc72be4e038984be37caa0528862aa918c,2024-10-16T16:38:43.170000 CVE-2024-47772,0,0,93ca3579d4342831fe2d471a4caadcb35a70b0d6469fc266411c3792b3d90e0a,2024-10-19T00:58:21.947000 CVE-2024-47773,0,0,9ec3c242835bf576bc0968a82a3b46699041f8e41d118ea66f5704cf28b5d58f,2024-10-10T12:56:30.817000 -CVE-2024-47779,0,0,ece58918dff4ba465e02a560061492b581e51a3f4b4a21f4777831317fb3e250,2024-10-16T16:38:43.170000 +CVE-2024-47779,0,1,5f35e8aa4452b188a7ed79805178dc2710160d52596e1c24b8778a31542e007a,2024-11-12T17:15:08.037000 CVE-2024-4778,0,0,e3020a287fa6ceae8ff9c78434f10af4d17cf4058dd5bf80208c921b6bc68bef,2024-07-03T02:08:09.053000 CVE-2024-47780,0,0,ff94d6824af803f8c7126d802f9a510e2f7e61826db064781dbb229b5b3ef329,2024-10-10T12:56:30.817000 CVE-2024-47781,0,0,942905ddf0e252a3fb77e10ba3da26f7a3985ae743d3e1737c070a7332d5f79d,2024-10-10T12:57:21.987000 @@ -263554,10 +263615,10 @@ CVE-2024-47901,0,0,351c2de719aa37343f5b8705371f6ea3811b8e193d3e2965a197dc16aa263 CVE-2024-47902,0,0,2363b86854bd24a49201ca293fb87d24363aec990236fe9e9bf134a5daa38aeb,2024-10-30T15:48:39.207000 CVE-2024-47903,0,0,7e28902499cd69638cf23751436e57fbe15e705859d687d60c9f544fac8af41e,2024-10-30T15:54:34.647000 CVE-2024-47904,0,0,21b127b0effcb8b297c48dd7cd57e94387991d137ef282d6dd7cb6727add6e3b,2024-10-30T15:39:06.020000 -CVE-2024-47905,1,1,456f2af09d79de028522d9d2fe7c339af1a91ee887144c6e68be318fd4f6c6ea,2024-11-12T16:15:22.473000 -CVE-2024-47906,1,1,415c56fc6b2389a67bd4a684531b844637d1600f12a9fe2fbe259e519afd8c04,2024-11-12T16:15:22.670000 -CVE-2024-47907,1,1,038c623216fbd12a58fca1b8911d218a1fc7314353ecc4e226c145ce074a681e,2024-11-12T16:15:22.887000 -CVE-2024-47909,1,1,2046646b27165d0d6d7260825af83df5574fec1c19d0f9cd5f0e2de0763d9fef,2024-11-12T16:15:23.080000 +CVE-2024-47905,0,0,456f2af09d79de028522d9d2fe7c339af1a91ee887144c6e68be318fd4f6c6ea,2024-11-12T16:15:22.473000 +CVE-2024-47906,0,0,415c56fc6b2389a67bd4a684531b844637d1600f12a9fe2fbe259e519afd8c04,2024-11-12T16:15:22.670000 +CVE-2024-47907,0,0,038c623216fbd12a58fca1b8911d218a1fc7314353ecc4e226c145ce074a681e,2024-11-12T16:15:22.887000 +CVE-2024-47909,0,0,2046646b27165d0d6d7260825af83df5574fec1c19d0f9cd5f0e2de0763d9fef,2024-11-12T16:15:23.080000 CVE-2024-4791,0,0,45f7f0badd9eeca0c08f0ffcf78bd3c1e9a171e1e79fba42777d793a804985ff,2024-05-17T02:40:37.090000 CVE-2024-47910,0,0,da0097185007355b026dacc76d86a72088b7bf1d898f5a147fff92f16ae106b9,2024-10-07T19:37:43.677000 CVE-2024-47911,0,0,1780d2f9891b374cce407dc3e6f68171fc1b0dbbc46286fbacc7f087c63dae2c,2024-10-07T19:37:44.613000 @@ -263737,7 +263798,7 @@ CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc33808 CVE-2024-48307,0,0,935ee3e0328307bbb03111416c4595c4eff3ac408a08578a24f622dddb9d0c64,2024-11-01T12:57:03.417000 CVE-2024-48311,0,0,354d288e073d9064d21602cf2204c79fdbedf6cf54999e8a50b7d788e057c63f,2024-11-01T12:57:03.417000 CVE-2024-48312,0,0,ed565171c6e4291e871155bd5278a308c07670573cfb5e604423e67b93f19726,2024-11-06T18:17:17.287000 -CVE-2024-48322,0,0,5c481f296f210b18b3f4dfb94df32fe4d600b1dbbb14b3cbc5f00244d235d6c2,2024-11-12T13:55:21.227000 +CVE-2024-48322,0,1,5014dc4df55f26b1dca9f29be8de14165ec82c00bf9c57fe11ac1db7b65d8ee8,2024-11-12T17:35:10.953000 CVE-2024-48325,0,0,e332aafd0b1c5c187131f74a886273143993554010ab80fd42869ff8b361baa6,2024-11-08T19:01:25.633000 CVE-2024-48336,0,0,fc603531e511f454d9e88137c47d1879fc0b1949207c95b33f03f4156054a935,2024-11-04T20:35:10.193000 CVE-2024-48342,0,0,cab27a7526b8debabab042631051135b3c12f9f8dc84e657f2f251a3750f9436,2024-11-04T07:15:11.437000 @@ -263972,13 +264033,59 @@ CVE-2024-4897,0,0,b80483aa02f533d1f5c4695afa1f7ec5dae4ecfa8b472cf561efa5d05f8ff1 CVE-2024-4898,0,0,a64ada88476e7dbd5dca1f8ed9406bed15a3acb87fadbe7d9a4f3102502b7a67,2024-07-23T17:50:44.033000 CVE-2024-48987,0,0,bb1285db59c3075341f96aec62f9b4ce4709041d90082c7f3534792a4d32fb84,2024-10-15T12:58:51.050000 CVE-2024-4899,0,0,7d0ca1543842829897b22c32fd7c3ea389ea1c85b28761d045bc30da0b354462,2024-07-03T02:08:16.280000 +CVE-2024-48993,1,1,4aa3474fb9be5265fd715e9087c0fb8d42da2cadb7c5e0de118eac24d9462c1b,2024-11-12T18:15:35.840000 +CVE-2024-48994,1,1,552421b92673fa07495920552477c16d668d05f05bf83bc63d1f3ef090be75c8,2024-11-12T18:15:36.117000 +CVE-2024-48995,1,1,653f6e396fa20d6dabdcf9bb90eb50e56dfacf4fef02ff1047984567e5060b43,2024-11-12T18:15:36.360000 +CVE-2024-48996,1,1,4ec76bdd6dfc64511a23331244301c0b48a3317df18e4113c55f9324ff6b7f6a,2024-11-12T18:15:36.637000 +CVE-2024-48997,1,1,0d7eba61679db9a577258cdabc3a0ee9e706e499ab5d5e219cbb9495b214f0b1,2024-11-12T18:15:36.870000 +CVE-2024-48998,1,1,89380a7df552e91c4963a30424b195f41861837559e3274f22d4ed9470e5299a,2024-11-12T18:15:37.110000 +CVE-2024-48999,1,1,b43e594557d3fb7da0f94c18d9f035ab327604c2039b3a6d71defd41e731e8a4,2024-11-12T18:15:37.340000 CVE-2024-4900,0,0,2074e15c0050e8989f750822fa85e67702dc13ece861470c246a4c4acb047889,2024-06-24T12:57:36.513000 +CVE-2024-49000,1,1,60f748b10decd71d30d54f7b79d3830017b1cace1043996f2b013d9a711e017f,2024-11-12T18:15:37.577000 +CVE-2024-49001,1,1,85bce25075340bab1720e8aa9bec179d87b1c940dbbc87243a52531071c69eb5,2024-11-12T18:15:37.807000 +CVE-2024-49002,1,1,06c23743160dae54eeb5ec3a2b981759c8dd403bbeeca2433c7393399a2ee4e3,2024-11-12T18:15:38.040000 +CVE-2024-49003,1,1,814584cf889f73888d9707f7a3b40ba45ec00bcbec725f00774d715b23fa52a8,2024-11-12T18:15:38.257000 +CVE-2024-49004,1,1,6835419d010b1bf3bd4b4fab335fb9d501797ee94978e958b6810022fa9e6481,2024-11-12T18:15:38.500000 +CVE-2024-49005,1,1,150da98046359373514b30f3b75524045a7f42d8bdcb2db080c2ccd69995f9ba,2024-11-12T18:15:38.740000 +CVE-2024-49006,1,1,1fbc3e76f663287d4b6f83ed6af0c40aa4fc3cd89f3700eaad35d71a60ed7f13,2024-11-12T18:15:38.963000 +CVE-2024-49007,1,1,a948e38f3656824d5e76054d5b28a449633195ab7c3d217d5532c34c0372cc9b,2024-11-12T18:15:39.203000 +CVE-2024-49008,1,1,df30a0699d80d1c513cbbfe380c65e5791a2edff9f5a494966ace72aac28c9ca,2024-11-12T18:15:39.423000 +CVE-2024-49009,1,1,ee65240657ccb84cf8418a6fbc2faa681e13085fea3545634d764108e1c236f3,2024-11-12T18:15:39.650000 CVE-2024-4901,0,0,038977315c18c98069a655ab35eb2b501ae92d62e5deb196337fd2891dd989fe,2024-06-28T13:18:19.407000 +CVE-2024-49010,1,1,3dab60e769a9f644e35c93b4a004707359378bf9513ba186e54033bea6f71f61,2024-11-12T18:15:39.870000 +CVE-2024-49011,1,1,5ba8a2882f8f24407a62b041576f38a0f350979bc69588225c89c56ddab32e75,2024-11-12T18:15:40.087000 +CVE-2024-49012,1,1,838a9a4c10874935f79466ffabb516d97b5d11a2bdaa8b67f1068f3434089049,2024-11-12T18:15:40.307000 +CVE-2024-49013,1,1,6ef0bbc7aa928e1a6a08ee1075bd6a883f85d2be9c4bbd497786ce867cdbecd8,2024-11-12T18:15:40.530000 +CVE-2024-49014,1,1,43dc904e9156da2390b269c474ec4b93c168be252c4571e6535135e7b18e459e,2024-11-12T18:15:40.737000 +CVE-2024-49015,1,1,86ee6a5bcc07a85ec567923b7eeeeaf2439547c7e192b8db4d6ab2030e6af3e4,2024-11-12T18:15:40.953000 +CVE-2024-49016,1,1,16214ec6bb7fe4aa2ade3e55455e98d18465e0b421d6069624afe3a208832445,2024-11-12T18:15:41.177000 +CVE-2024-49017,1,1,dcb9cbeed4f1a551674fcdc7d73ce07143b7fede04b17051094ff809cc2472c3,2024-11-12T18:15:41.407000 +CVE-2024-49018,1,1,4a24e8cc7cde3239de7d5468b3f264730bfbc184f075b9071aab26fd77ea9c85,2024-11-12T18:15:41.637000 +CVE-2024-49019,1,1,cee470b1ab6bd4a64376470650617561a54547a9eccb11a3dac588f87e24fcff,2024-11-12T18:15:41.863000 CVE-2024-4902,0,0,41bb791734595d42fd1c69ded99c61dc232bf3972633339d010380dd468a9fb6,2024-10-29T18:07:23.897000 +CVE-2024-49021,1,1,a066c3ba4969c320f3aa5ec139d951df96eac307afe8afdc1475b4aa03f96552,2024-11-12T18:15:42.100000 CVE-2024-49023,0,0,af47ee9dc5b34537abe1e2a50e9a1a6dd7bec2ff89d9910cf199b8b7e8fc3c1a,2024-10-18T17:01:32.803000 +CVE-2024-49026,1,1,1651dbbb13962c4d9c55558a2ad9b67dd4fb1094d8891ffe03f694b688ae4e70,2024-11-12T18:15:42.357000 +CVE-2024-49027,1,1,983cbf68b040e30c362cfd5eccc66679f6adb9f011501133103faa1c18d90d98,2024-11-12T18:15:42.590000 +CVE-2024-49028,1,1,014642fed3b67124bbaf0a16bffcc8291badb91217450981b4aa6d593607edf7,2024-11-12T18:15:42.810000 +CVE-2024-49029,1,1,eaf292e8fe053720568f3d201a1924255818066402ef01790720e28e9a8acbd3,2024-11-12T18:15:43.017000 CVE-2024-4903,0,0,9834633a0ed5c23d729720f750c23f97a9d35acd2a8ef750805e2c39c4f8bfe7,2024-06-07T20:15:11.967000 +CVE-2024-49030,1,1,a771b57b99a22d1a23bb3eb48aac03817808b18f2b135636ab2f6178056ba314,2024-11-12T18:15:43.260000 +CVE-2024-49031,1,1,4d19c8a975caa24e6b9da7542a9780cbb167fa0186406d2762380989d57ff550,2024-11-12T18:15:43.483000 +CVE-2024-49032,1,1,bee7c4c9b814c413805fa15e83f6e73bf7788b208af3fa41e1d1d2dc00139626,2024-11-12T18:15:43.737000 +CVE-2024-49033,1,1,0ba4d0e17dce154819dd20cf81db8b1f1924b2e20b0e94b205f98469cd600002,2024-11-12T18:15:43.950000 +CVE-2024-49039,1,1,d2e1e0ebe6ada843cc40e1e7d15e746ad3fe4eae3d601db11112a7c883d7d711,2024-11-12T18:15:44.160000 CVE-2024-4904,0,0,e08155723dc24ff1bcb5adf9d2f839d33f4e022ac557667a35564764380e5202,2024-06-04T19:20:52.380000 +CVE-2024-49040,1,1,dec61fae24fb566a69ad68ad2aaa7a5a6789b873a1b8bef8517c5dbdbb51d507,2024-11-12T18:15:44.410000 +CVE-2024-49043,1,1,32929d48a7e0b95b4e01f89996060723a654c3b651a61ae467ec5aff07482c9f,2024-11-12T18:15:44.637000 +CVE-2024-49044,1,1,b77357c2a07ac0180bab063805a6c9c3970741c08e0232d72872ae2ed3f2afa8,2024-11-12T18:15:44.867000 +CVE-2024-49046,1,1,03e0514c649fd6a24dab2859fd6c7092da43daa6c90daf283dec52ddc8d1ffce,2024-11-12T18:15:45.100000 +CVE-2024-49048,1,1,2a5d63efeebb6bcea92423e855e3404c0b055ec0291d36b753d6b7d1fa3dba89,2024-11-12T18:15:45.353000 +CVE-2024-49049,1,1,0bd83fee3a2cb4b027aa8356f5562a63ef444b7c78b8bce694d0ad5fb18d6ec7,2024-11-12T18:15:45.587000 CVE-2024-4905,0,0,acf7154e104fe12ce44ad2e90ccc9d1c19899bcc28d8f8bfc61002cc40187062,2024-06-04T19:20:52.480000 +CVE-2024-49050,1,1,7ad647f6e89650bc52dc3df1190408951223db456bd7cea1bb3006c1fadb459d,2024-11-12T18:15:45.810000 +CVE-2024-49051,1,1,62ba82fa8287d5ee244fbcfd7893487223083a64bcb9ff1c85b45252c604a537,2024-11-12T18:15:46.037000 +CVE-2024-49056,1,1,00997cecb947dc90cb5357beb05ac805b0b12cfb601822ca6a85f635ee238a54,2024-11-12T18:15:46.273000 CVE-2024-4906,0,0,dcabb97348a8cb55b860a9e76b2d4e839fce25f207d8f1f73aadb53eff678110,2024-06-04T19:20:52.587000 CVE-2024-4907,0,0,89cf000cbe1b65b5529bee88595d69713864cb4ca68c5cee750a10d4257b63ad,2024-06-07T20:15:12.077000 CVE-2024-4908,0,0,3762060553f2912238245a2ee2164293eb895a92d4f73c18aef2dad30449d1a2,2024-06-04T19:20:52.687000 @@ -264138,6 +264245,7 @@ CVE-2024-49361,0,0,f551e9abf09d421b2a081416ae11d1d19a91d21656c86d2519f1c7f0e2810 CVE-2024-49366,0,0,1ea5441e3f8684e26cb3e2ee03927aa37cfc22f8ddf1688cacc08e4a6c38e9c1,2024-11-07T15:15:04.587000 CVE-2024-49367,0,0,a00a7c814532ad3abb0f836142856607dc752da167ff2cb313965be7a6e5269e,2024-11-07T14:57:17.393000 CVE-2024-49368,0,0,8be4e296ee1ec30084981da91255270e2fb2a840014ea77ee3103f7dcd091363,2024-11-06T18:28:54.440000 +CVE-2024-49369,1,1,9e26291cd584e06158ca310cfdd788844b4d39482aaebbb0e1389563be2688fe,2024-11-12T17:15:08.250000 CVE-2024-49370,0,0,a5cd1a59d8359f30b64653ed20bc47230e4ab479f61eed26e21f9e51248ce0d7,2024-11-06T22:31:30.160000 CVE-2024-49373,0,0,4aa9cfdbe744fd3ae046ca1eeb4ecc11fd5a7b167271bdbcafbe01dffbbbe75a,2024-10-30T21:16:59.213000 CVE-2024-49376,0,0,190dbce5bcb7aada06f0c8b342eac2772846cf5d2a5dcc8eecc468a0b9c5d5e3,2024-10-28T13:58:09.230000 @@ -264165,8 +264273,8 @@ CVE-2024-49398,0,0,1964f2918f2b62a12a26449777ec3d512771c9e0a90e6a92142f1221cf2a6 CVE-2024-49399,0,0,280599d675596d0a62f92142e8a452afef09a7da5cc6b00dfa86815a1f9a12f9,2024-10-18T12:52:33.507000 CVE-2024-4940,0,0,4accffc853c801fe14d0f801549945291e8d9583e559383dea39b767fc7e6ff0,2024-06-24T12:57:36.513000 CVE-2024-49400,0,0,4447b6d98624a8004ac0954b08a6ad26989e2084cf92d73c9f3d9262ea896967,2024-11-01T19:35:28.673000 -CVE-2024-49401,0,1,e4e7a53ed67bf34b96a2df01f2e624360397577809634daec0842bb0bcf4acfd,2024-11-12T16:10:18.870000 -CVE-2024-49402,0,1,9fc729ce71983a63730fac9cf49d2dcd330e50e027d114e2cf4a6d8a75db59e5,2024-11-12T15:09:10.890000 +CVE-2024-49401,0,0,e4e7a53ed67bf34b96a2df01f2e624360397577809634daec0842bb0bcf4acfd,2024-11-12T16:10:18.870000 +CVE-2024-49402,0,0,9fc729ce71983a63730fac9cf49d2dcd330e50e027d114e2cf4a6d8a75db59e5,2024-11-12T15:09:10.890000 CVE-2024-49403,0,0,30ab3381faa6d7588cea33834cd2f42484461ab2cf4edefed13e4f5f8acd0e2a,2024-11-06T18:17:17.287000 CVE-2024-49404,0,0,a007566a9da4c28e8f8777017a12bdcea2903129c7189e896131b83a0527aebd,2024-11-06T18:17:17.287000 CVE-2024-49405,0,0,1bb2048dae8ed8362c07dc596854188d431500a6863f51793b048857c1e63321,2024-11-06T18:17:17.287000 @@ -264185,9 +264293,14 @@ CVE-2024-4948,0,0,b89edbe3d3547ee2159af9ec22fd67b98f6c6885f88dc0c929a5ea68a98b8f CVE-2024-4949,0,0,5c7ef1902f4beea866d1c7d9373440674707dc0a06c9e278c0f4652ccc170adc,2024-07-03T02:08:21.370000 CVE-2024-4950,0,0,e5fcb740f07c681c8eb3b4901aae32c365007c0ebdd7c7b0ee473dbffae68af1,2024-07-03T02:08:22.150000 CVE-2024-49501,0,0,b68f4d3131dd45c8240c685b13eebbf7042a3a95ee975ccc7d0b4e65e2269371,2024-11-01T12:57:03.417000 +CVE-2024-49514,1,1,fe3cd61e6edb3a955f917fd1f98aedf45300f5ff0f3fe7aa55d6e408449890a9,2024-11-12T17:15:08.490000 +CVE-2024-49521,1,1,7e8e66f083bd756531bba6a14d7aad9b1d63ed72dfc4381deebc9aec9cd79d4e,2024-11-12T17:15:08.783000 CVE-2024-49522,0,0,b49aefd5a73ccd26563c8b91d3f2d98c089948509c56be654cf3171337fc2496,2024-11-08T18:06:01.930000 CVE-2024-49523,0,0,f80724f56253226f78ea56271ee80d62b3ba148e1878999be1900b25d2719668,2024-11-08T19:01:03.880000 CVE-2024-49524,0,0,e7793eab2fff9b59c976da4b69592a395e034319e6c39d07f8b75673444fce47,2024-11-08T19:01:03.880000 +CVE-2024-49526,1,1,051e7f12fb7ac4367f11e983ab3f961f563e63bf5e90a5f3139fe918f907e26c,2024-11-12T17:15:09.020000 +CVE-2024-49527,1,1,7970df5db528123d9e02fe0b1537fc193026570b6d54e63f7e3ca88303f92c4b,2024-11-12T17:15:09.240000 +CVE-2024-49528,1,1,c765fb8951c4f632df5c650432cd82aa37c54cfcfd972e9020621dc7157abc06,2024-11-12T17:15:09.453000 CVE-2024-49557,0,0,2a5d766ad2ace9ca4473e381728b5667e6cadd8340da6faf7936ed125bc7364d,2024-11-12T13:55:21.227000 CVE-2024-49558,0,0,47432e1f54f695adb17b8dc00f9577022f45f8f0ba5da018a951249b00715362,2024-11-12T13:55:21.227000 CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000 @@ -264582,18 +264695,18 @@ CVE-2024-50092,0,0,1bae9326eae1f879c38112725312fe16a36edc58131a09667f9f496857ede CVE-2024-50093,0,0,419eb8dddfe2833bb713253843fa8eb7e9c480ddcfa4547a406e999eb86f6dab,2024-11-08T16:49:33.143000 CVE-2024-50094,0,0,8d554d91d10f3417f68354112f98d683c81490048baf5a5ec9ac8bffadb7c106,2024-11-06T18:17:17.287000 CVE-2024-50095,0,0,7be15323a65def7978ea05e4974ba938ad3e79e6f92c2da07d665bf4a6736f61,2024-11-06T18:17:17.287000 -CVE-2024-50096,0,1,59e9e22e22a35fc41761fb6664d3b0e7ffc6127f6a63b7a2456268dcccdbe871,2024-11-12T16:16:33.703000 -CVE-2024-50097,0,1,6a3e01ed40c6f1cc408bee915019f76f6de63ed3a690ad6a8a96d61449cd92c4,2024-11-12T16:18:00.477000 -CVE-2024-50098,0,1,230ad2bf5f50188402342a41640634e743511b0d9a5c8add0ac5aed1f1d611c2,2024-11-12T16:25:48.717000 -CVE-2024-50099,0,1,2068c9cb44a603652fa68a4fcb0da524a100cd681ef2ad455f5fccf4d3235d37,2024-11-12T16:28:30.633000 +CVE-2024-50096,0,0,59e9e22e22a35fc41761fb6664d3b0e7ffc6127f6a63b7a2456268dcccdbe871,2024-11-12T16:16:33.703000 +CVE-2024-50097,0,0,6a3e01ed40c6f1cc408bee915019f76f6de63ed3a690ad6a8a96d61449cd92c4,2024-11-12T16:18:00.477000 +CVE-2024-50098,0,0,230ad2bf5f50188402342a41640634e743511b0d9a5c8add0ac5aed1f1d611c2,2024-11-12T16:25:48.717000 +CVE-2024-50099,0,0,2068c9cb44a603652fa68a4fcb0da524a100cd681ef2ad455f5fccf4d3235d37,2024-11-12T16:28:30.633000 CVE-2024-5010,0,0,3c850c266940942fbe09adbb4c98bc7afc61c3edf80ecba9d04f15eeefca6109,2024-09-06T22:42:39.017000 CVE-2024-50100,0,0,ea83177858e02e925341fb5f4effc0f0f81a22c62489feb4fcf01044f5024b83,2024-11-12T14:57:44.877000 CVE-2024-50101,0,0,177592c2bddeab02a0a775beadc6528f45c3b5091ee703b99ad5c00ed6933235,2024-11-12T14:59:22.600000 -CVE-2024-50102,0,1,698eb727e31750ac5982efeb0aa315e92ee1ea8f0357f87e8de6e50b6fa7680d,2024-11-12T15:08:00.563000 +CVE-2024-50102,0,0,698eb727e31750ac5982efeb0aa315e92ee1ea8f0357f87e8de6e50b6fa7680d,2024-11-12T15:08:00.563000 CVE-2024-50103,0,0,f7388d1b8248faac199af938c5b063ca25ea4a29439f14300925ad8fea65924b,2024-11-08T16:15:46.900000 -CVE-2024-50104,0,1,0ec6aaaf4d9f4ef8d0ae34dee7b208be05ea49fc9c1639b27592587272841351,2024-11-12T15:05:45.587000 -CVE-2024-50105,0,1,7392bdca5286c99199a69cf508ec45301a69859e0c809e006c5e2e0ecb4020a0,2024-11-12T15:06:14.500000 -CVE-2024-50106,0,1,cb65f3b194c6bbabc39b6bd289f1749babe2eefff8be89a7e03387b8beb9444d,2024-11-12T15:07:39.707000 +CVE-2024-50104,0,0,0ec6aaaf4d9f4ef8d0ae34dee7b208be05ea49fc9c1639b27592587272841351,2024-11-12T15:05:45.587000 +CVE-2024-50105,0,0,7392bdca5286c99199a69cf508ec45301a69859e0c809e006c5e2e0ecb4020a0,2024-11-12T15:06:14.500000 +CVE-2024-50106,0,0,cb65f3b194c6bbabc39b6bd289f1749babe2eefff8be89a7e03387b8beb9444d,2024-11-12T15:07:39.707000 CVE-2024-50107,0,0,c3e237eae128528ae6608a26b966efe022ddebd6d0c53a652e91aaf0e9101d42,2024-11-08T21:27:32.240000 CVE-2024-50108,0,0,61f04b1d5ef9c1df693048d65fcbe3cda602cc0f45d0d93919c517d1234dcd46,2024-11-08T21:28:02.227000 CVE-2024-50109,0,0,0ebe5d7138c22e8bf3233a37f05b45ad5ddc39f30de8d0d87fc7fb2741661abb,2024-11-08T21:30:11.820000 @@ -264773,26 +264886,27 @@ CVE-2024-50311,0,0,a911784e609d4ab74e0290e5d915dbb7b1471b8d97b5435937a13bc8c9811 CVE-2024-50312,0,0,8b68d956a110cf88efd2db7bdd6fdd3dc5b02186497d9ae2cbca0852915a398f,2024-10-30T18:35:56.753000 CVE-2024-50313,0,0,1f9bfdd78a62f9b5771008b0c7fd93e4e221029be8c4ff06400d9d0c1dd48acc,2024-11-12T13:55:21.227000 CVE-2024-50315,0,0,4cc2faf3d8c489bc195ea9b1b71e3db71fb7f18259f91c4f6bf82e911f7ad06a,2024-11-06T18:15:06.173000 -CVE-2024-50317,1,1,21181d5262dff64e96921704a346ae9ab0370d3b47ce5035a8889c8495ec5f96,2024-11-12T16:15:23.347000 -CVE-2024-50318,1,1,a206caac1aba0b0fe8ff6f1e38a7971260fb237865d9c73765ec10bc36b0fa6c,2024-11-12T16:15:23.537000 -CVE-2024-50319,1,1,6b7e7e3a7b0f25dceaac3f7d32915b22fda7c8db327984fa51dfe6c6d3680734,2024-11-12T16:15:23.713000 +CVE-2024-50317,0,0,21181d5262dff64e96921704a346ae9ab0370d3b47ce5035a8889c8495ec5f96,2024-11-12T16:15:23.347000 +CVE-2024-50318,0,0,a206caac1aba0b0fe8ff6f1e38a7971260fb237865d9c73765ec10bc36b0fa6c,2024-11-12T16:15:23.537000 +CVE-2024-50319,0,0,6b7e7e3a7b0f25dceaac3f7d32915b22fda7c8db327984fa51dfe6c6d3680734,2024-11-12T16:15:23.713000 CVE-2024-5032,0,0,e2dd01f18d9397a3c892e6f9436384b2c9baea7d6f6081290ca836f05f0fc527,2024-08-01T13:59:38.540000 -CVE-2024-50320,1,1,aea70720eee0368638fdd9bb36da4980a9b55ecc6a2ef528a4d4e61482537b1f,2024-11-12T16:15:23.910000 -CVE-2024-50321,1,1,05b963a1004e403aeba2d8e862a1b0d7625e749f302d7f8785993c74b8c299bb,2024-11-12T16:15:24.100000 -CVE-2024-50322,1,1,8de8898b0433a1331b47a12978727250bf621e3fc5ab94b4dc0c5c73fa862472,2024-11-12T16:15:24.280000 -CVE-2024-50323,1,1,cf18e342925fad22c769a98924e658db1df1635c9db9acc9a972975f13951fc9,2024-11-12T16:15:24.473000 -CVE-2024-50324,1,1,5691fe7984f3540e04dbb6a817402d61e82e8e08c64ee77fd14659e05104f9ac,2024-11-12T16:15:24.653000 -CVE-2024-50326,1,1,aa16d351292625872c442b44b54aad7f430637dcdf3c7d5c9657367d3a233397,2024-11-12T16:15:24.840000 -CVE-2024-50327,1,1,2b40bb502f836073dced40ac05a4840c07f121493c2492038809eb643c37f790,2024-11-12T16:15:25.023000 -CVE-2024-50328,1,1,f2c640c32afe1abb6d3c73e1c9541aa2fc816b737be721e25682ab5e4cb57100,2024-11-12T16:15:25.207000 -CVE-2024-50329,1,1,4bf1f20748f3ad00581bd86caa8ed3a4ad0897ba32eaad21ef9f2a375f6fc12e,2024-11-12T16:15:25.383000 +CVE-2024-50320,0,0,aea70720eee0368638fdd9bb36da4980a9b55ecc6a2ef528a4d4e61482537b1f,2024-11-12T16:15:23.910000 +CVE-2024-50321,0,0,05b963a1004e403aeba2d8e862a1b0d7625e749f302d7f8785993c74b8c299bb,2024-11-12T16:15:24.100000 +CVE-2024-50322,0,0,8de8898b0433a1331b47a12978727250bf621e3fc5ab94b4dc0c5c73fa862472,2024-11-12T16:15:24.280000 +CVE-2024-50323,0,0,cf18e342925fad22c769a98924e658db1df1635c9db9acc9a972975f13951fc9,2024-11-12T16:15:24.473000 +CVE-2024-50324,0,0,5691fe7984f3540e04dbb6a817402d61e82e8e08c64ee77fd14659e05104f9ac,2024-11-12T16:15:24.653000 +CVE-2024-50326,0,0,aa16d351292625872c442b44b54aad7f430637dcdf3c7d5c9657367d3a233397,2024-11-12T16:15:24.840000 +CVE-2024-50327,0,0,2b40bb502f836073dced40ac05a4840c07f121493c2492038809eb643c37f790,2024-11-12T16:15:25.023000 +CVE-2024-50328,0,0,f2c640c32afe1abb6d3c73e1c9541aa2fc816b737be721e25682ab5e4cb57100,2024-11-12T16:15:25.207000 +CVE-2024-50329,0,0,4bf1f20748f3ad00581bd86caa8ed3a4ad0897ba32eaad21ef9f2a375f6fc12e,2024-11-12T16:15:25.383000 CVE-2024-5033,0,0,34cd1f889798bbfeb338d8d711a920994993596df17d9daf9b428477bffed7c1,2024-08-01T13:59:38.730000 -CVE-2024-50330,1,1,771ff2d5e100ab9210de0d27d4a40526cf5c5c2f269f70c5fa45a099f7bd6f72,2024-11-12T16:15:25.573000 -CVE-2024-50331,1,1,d5c844d0542128f3375f6be6d4c7604f8ac2699563b6027e946f5a0f510c54b7,2024-11-12T16:15:25.773000 +CVE-2024-50330,0,0,771ff2d5e100ab9210de0d27d4a40526cf5c5c2f269f70c5fa45a099f7bd6f72,2024-11-12T16:15:25.573000 +CVE-2024-50331,0,0,d5c844d0542128f3375f6be6d4c7604f8ac2699563b6027e946f5a0f510c54b7,2024-11-12T16:15:25.773000 CVE-2024-50332,0,0,9656d38bcfb11514c440d951a58b16e4a5fcba542ce41e8a3824831aeb409389,2024-11-06T18:17:17.287000 CVE-2024-50333,0,0,4401ab12299711f5c870abfc6cd15c77232e2aa5f01bc8c09f095498f866c9c7,2024-11-06T18:17:17.287000 CVE-2024-50334,0,0,f1904bf4f599c0615877538d390ce8a4f2f074393bfa4b43c380ab7ec9b0624c,2024-11-08T19:51:58.433000 CVE-2024-50335,0,0,30b0738ceedc1a1fb3bb1288fecf67aef4015dca447e6a6bbd65ec5d7cafcbc2,2024-11-08T15:09:07.440000 +CVE-2024-50336,1,1,a2fd7051b5ec00d745cea5bff6a53de142cd24f54ac4cdb2e9100668bebdf01e,2024-11-12T17:15:09.680000 CVE-2024-5034,0,0,ecc1ebd0e8a7a2aea01c9ce5ac07669525947175e7e55790f4a8e8a0b317bae8,2024-08-01T13:59:38.920000 CVE-2024-50340,0,0,7fe99995b303f24a1e9f1f89a7fb3e3a3b6b19d546946b79fcfc20de0db067df,2024-11-08T19:01:25.633000 CVE-2024-50341,0,0,2e9917337f37c3b47e4050a6c46cfbe9a68961d285ca45432129645fe2fcaf2f,2024-11-08T19:01:25.633000 @@ -264813,7 +264927,7 @@ CVE-2024-50378,0,0,363ccac602ebd2db0e355ee3adb0fa1db2db17fafd04c23325c4255122e79 CVE-2024-5038,0,0,99b942f340bd77179350025250d1eccbd97ee2b6f6339af49bfd1a72be63cbf5,2024-06-11T17:41:37.883000 CVE-2024-50382,0,0,f0709ea17e5f95032091a174ec66193a9596281fe9af192634610c6cbe74c173,2024-10-25T12:56:36.827000 CVE-2024-50383,0,0,e2190fcc52d7d22ac332b0c05a25a337fdc4e67265af4d4eac38727251637b62,2024-10-25T12:56:36.827000 -CVE-2024-50386,1,1,af2f7aff238e0120fb47ce3493182910827a9aec5cdeef05c470df6afce2b2c3,2024-11-12T15:48:59.103000 +CVE-2024-50386,0,0,af2f7aff238e0120fb47ce3493182910827a9aec5cdeef05c470df6afce2b2c3,2024-11-12T15:48:59.103000 CVE-2024-5039,0,0,d4eca04aa1b7f16d8be388592f13108d7bb098b959dcbbbcd1cb04ce7429f2b9,2024-05-29T15:18:26.427000 CVE-2024-5040,0,0,28e80b4d31908c888f58e8aabf481f59f60dc445c02b92b96b8990cba6ed3432,2024-05-22T12:46:53.887000 CVE-2024-50407,0,0,4fb5f00a58beefd4cfac77c8419361c961ad849f2db4f958a95f873505b783a5,2024-11-07T20:28:22.860000 @@ -264969,7 +265083,7 @@ CVE-2024-50592,0,0,1ea6423960cc50e93195b2cf1d9f7905b125a77bfd5004aeb42759deb6410 CVE-2024-50593,0,0,2990c55af886ff8c2c12dbcca8abdce067826f7d03b201038626b94cf51f8774,2024-11-08T19:01:03.880000 CVE-2024-50599,0,0,3c6f0c29bfc51c064c63c37a765c151941367295dbdeff70ad17448c4c631795,2024-11-08T19:01:03.880000 CVE-2024-5060,0,0,70a4b23a22f78db2884c1ce0fa906b767ee25d155e7de23427bff751940319e4,2024-05-24T13:03:05.093000 -CVE-2024-50601,0,1,46ceecbb3e4c2063d575a1c7f505458091c6749e5bd2062743f6726b0449df35,2024-11-12T16:35:22.810000 +CVE-2024-50601,0,0,46ceecbb3e4c2063d575a1c7f505458091c6749e5bd2062743f6726b0449df35,2024-11-12T16:35:22.810000 CVE-2024-50602,0,0,45e9269102f2b541d78d641e3b6d4f0d7b12a8e026b5814df3e38d2c0c706172,2024-10-30T18:35:16.237000 CVE-2024-5061,0,0,acb15fde0f7701ee7d55862ecbc276a299a2eba41aa60a0bce397763155cd902,2024-09-03T15:11:56.787000 CVE-2024-50610,0,0,2336f18018549d31226ad5c4df53b32342f6a9adf12b0e16f4241999fbebe853,2024-10-30T19:35:30.033000 @@ -264989,7 +265103,7 @@ CVE-2024-50637,0,0,7cb3fd4c2566fc1d1593156e77d24b90af6dfd042618185e839399543b673 CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000 CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000 CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000 -CVE-2024-50667,0,0,e1e6fd05dc47d8d0018e6051a77007d9f2a6e89a4ed76dd1a7ea5db0cdc3d1be,2024-11-12T13:55:21.227000 +CVE-2024-50667,0,1,0dcbd7b35b311fe7a681d780dcbe2293327603709e31a27594acb760866d084d,2024-11-12T17:35:12.270000 CVE-2024-5067,0,0,7a5f09523c1a14d6651905f1f8853395c32eebb526caa99a81fddc9a443e16ea,2024-09-05T17:29:32.287000 CVE-2024-5069,0,0,9472ccb93cc67e368452ccbd7690fcdac2e9c6bf3a0a4c1febdda7b23dc05b96,2024-06-04T19:20:58.080000 CVE-2024-5071,0,0,1e84a840bf7fe6d05a333c61daff03721e2399762594abd260e8b415b74d49eb,2024-10-28T21:35:22.430000 @@ -265025,7 +265139,7 @@ CVE-2024-5096,0,0,5ed717834c38883681c6d180e391a0fccee5714f6ff3215bd896b6366e61be CVE-2024-50966,0,0,17999db3c119b65097d64bae028974d0e6d4cf5d6910c7a7a211536c5ff5b48a,2024-11-08T19:01:03.880000 CVE-2024-5097,0,0,f8c17c92eeab06c631c7e3bccbcd56a5be798bb0ae3554a5ecf4b2a49f948336,2024-06-04T19:20:58.787000 CVE-2024-5098,0,0,51bb68a404444dbad57c4444d3880f6dd34c8b10fc09ab7783a9da02fb8f5608,2024-06-04T19:20:58.887000 -CVE-2024-50989,0,0,e4c0fe2b8431c4258cd2ecc4a0f559aa989b45362bfebaa4c143315581a69ae6,2024-11-12T13:55:21.227000 +CVE-2024-50989,0,1,539ed9c0a64887e69fa9cae96035a115db3a8a96afe0045140278b0fb7737495,2024-11-12T18:35:31.437000 CVE-2024-5099,0,0,c449033239abbf7fd2bba4f64694ff77374623f364f0fa141d0a92a151a3ab2c,2024-06-04T19:20:58.993000 CVE-2024-50990,0,0,3e42f63cb4cce2bde832528585cd9a59c20bb79b20e8a372aa48cab82b38c511,2024-11-12T13:55:21.227000 CVE-2024-50991,0,0,d7b9dadf9ffde3571101ab4cd85a569d9cef8837174cd0bebf677a2bed448c13,2024-11-12T13:55:21.227000 @@ -265064,7 +265178,7 @@ CVE-2024-51021,0,0,b06ad1dc7caa63f0b78f2a692ebfbc7dc3db4861942e25ad61d65ea6408ad CVE-2024-51022,0,0,9c971f391f021663a674f6ebedab01c215349ea525c288aa5349243311884419,2024-11-05T16:35:35 CVE-2024-51023,0,0,b12f806c39027dd585f6605b170e48144a3513f557c323acb9850f669a22caef,2024-11-05T21:35:11.923000 CVE-2024-51024,0,0,2602616b46cde149e40ad1ec2305c8463ebfa9f137264738865d2534ea931b9c,2024-11-05T20:35:25.253000 -CVE-2024-51026,0,0,a53b987681fad958b0e0dfc0b8c2f642e8987d295f398a795d1e53509e193c12,2024-11-12T13:55:21.227000 +CVE-2024-51026,0,1,62fad2f07d50146e8433d063d38894194ce538e71bf191ac14b4c471f5cbc87a,2024-11-12T18:35:32.357000 CVE-2024-5103,0,0,aef0baf1fd7c527670ecf099c59b541b0a60e91a3e6b8de1c582546f74d7df46,2024-06-04T19:20:59.297000 CVE-2024-51030,0,0,8864f5f848b4bd116cf6c117fc9413494345870c652480a21b492e7685b9b04b,2024-11-08T19:01:03.880000 CVE-2024-51031,0,0,1e5ab5cf9c7a25d9afff4cfa33f3918bc3dcf7d5460284d217623f0076ca881a,2024-11-08T19:01:03.880000 @@ -265092,7 +265206,7 @@ CVE-2024-5112,0,0,689c76c95598a2f86ee6cadbc1c25854cf35ada5e2d2725de4638c44d7f737 CVE-2024-51127,0,0,5cbf021500110127b38f6de54e9823061ea68366b333afb20ed57e2e95d1d646,2024-11-06T19:25:14.607000 CVE-2024-5113,0,0,d52da1935c57c4016d19b1f0658aa6603ac8563b2af10cf87d5ce42568a3ed96,2024-06-04T19:21:00.113000 CVE-2024-51132,0,0,741849111477a3dea70a3f4f159f318bcb11e986e2637afecf8a608cf70fdf87,2024-11-06T20:35:34.173000 -CVE-2024-51135,0,0,aebbe945d05ea335f860f10cf11e685c81af5045a7f037fa95d2a93ccbf5d4c7,2024-11-12T13:55:21.227000 +CVE-2024-51135,0,1,14e718ab6bbce05ef8372500586cdca65e1edc88403906fd3621efeb1c3a8273,2024-11-12T17:35:13.127000 CVE-2024-51136,0,0,b7028b746c76b0b8db7064a5c94d8b9b8b4865b267652b712081099f88f87998,2024-11-06T19:31:15.230000 CVE-2024-5114,0,0,51655375bf74d88d0b44bf3106775b49d83b04b179d3446b4a92ffe727b17b66,2024-06-04T19:21:00.217000 CVE-2024-5115,0,0,566281473e2daa2487dd251e202869dc3059aeec07f7c63daa38b65c3bae3de7,2024-06-04T19:21:00.323000 @@ -265112,7 +265226,7 @@ CVE-2024-51190,0,0,02493ace343d801c2c96f83a09a920c8f88e12adfc58225d3b0b4f5c18c7e CVE-2024-5120,0,0,512e5b032e12a79292f06756f99bf223a47a4b934de5206e20b5529b01ef61b6,2024-06-04T19:21:00.760000 CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3bdb,2024-06-04T19:21:00.860000 CVE-2024-51211,0,0,581556a1bd92632bbd04cf9aebe233d1f5e96f417c538ff40e3ed80078a79ca9,2024-11-12T13:56:54.483000 -CVE-2024-51213,0,0,e80d55ec078755f28e4f2823f010f3744ad69702e08407d1517faeef4f279468,2024-11-12T13:55:21.227000 +CVE-2024-51213,0,1,a598a44042c959028b27d1b964937a81a14ecccc57789a4658084176eb433102,2024-11-12T18:35:33.433000 CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b5e,2024-06-04T19:21:00.963000 CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000 CVE-2024-5124,0,0,ddf4d98394e08878019bd952c44f2cfd27f047274d82fb0e14f997780f16638c,2024-11-04T11:15:06.937000 @@ -265245,11 +265359,11 @@ CVE-2024-51559,0,0,b17587668bf1fcdf8614b57042a4b834f20517fc8070e196d9febcde44d49 CVE-2024-5156,0,0,15fe916f4b576f7b7dc0d841e2e4a8f8e08add666a82cde7e5fe7e09d48d907a,2024-06-20T16:07:50.417000 CVE-2024-51560,0,0,5b2c84d8610ec2edb11a42487f6e0689a8de9b9ddfab441dd6ac7032ac0dbce7,2024-11-08T15:18:23.127000 CVE-2024-51561,0,0,d71b2d828707663b98815777acaed98461639611e766153c60c99f137da7ec5c,2024-11-06T15:59:22.287000 -CVE-2024-51562,1,1,fe610cc013729c8af4c0b6006d6da24eec90314b1067757a197b5262800d653d,2024-11-12T15:48:59.103000 -CVE-2024-51563,1,1,2d347c28cbc78362947b188a3185f76348ad44842e23de59a47a9ceaf56f323d,2024-11-12T15:48:59.103000 -CVE-2024-51564,1,1,2a3fa0d7f95d894fddea7476f08ed8e1b4cc2dfdc93197749dce255ab65a5b03,2024-11-12T15:48:59.103000 -CVE-2024-51565,1,1,268c5fc5f5654cdf45c259e5efa246e803558982504eb6a99041ca05854b3559,2024-11-12T15:48:59.103000 -CVE-2024-51566,1,1,b55ef8d39b21e0a92f0e6043a59cae0857ec3e9029ad8197208495b77fb52192,2024-11-12T15:48:59.103000 +CVE-2024-51562,0,0,fe610cc013729c8af4c0b6006d6da24eec90314b1067757a197b5262800d653d,2024-11-12T15:48:59.103000 +CVE-2024-51563,0,0,2d347c28cbc78362947b188a3185f76348ad44842e23de59a47a9ceaf56f323d,2024-11-12T15:48:59.103000 +CVE-2024-51564,0,0,2a3fa0d7f95d894fddea7476f08ed8e1b4cc2dfdc93197749dce255ab65a5b03,2024-11-12T15:48:59.103000 +CVE-2024-51565,0,0,268c5fc5f5654cdf45c259e5efa246e803558982504eb6a99041ca05854b3559,2024-11-12T15:48:59.103000 +CVE-2024-51566,0,0,b55ef8d39b21e0a92f0e6043a59cae0857ec3e9029ad8197208495b77fb52192,2024-11-12T15:48:59.103000 CVE-2024-51567,0,0,9629c1871377d5b3a8fc7e24f37cf5fff8c7d9ecc5af9890fa03e865aa78aead,2024-11-08T21:14:28.807000 CVE-2024-51568,0,0,ef96c64ab696ce1dd0f4d9f421838b3895b55219506da5bc264e22e1b5e0e5b2,2024-11-01T12:57:03.417000 CVE-2024-5157,0,0,24d31b037c5fbef35f77d9be746cd537f78e6f1e98b9c21955d97a62fe59949f,2024-07-03T02:08:34.407000 @@ -265373,6 +265487,7 @@ CVE-2024-51717,0,0,0528e0c7d07059ca5fe41ea6d661ea92cc786d699804e48039ef2d1479e3a CVE-2024-51718,0,0,9aa3261b8e536504ad8ba3c429c49299ec7c49e625e7595a30d4e4107362d460,2024-11-12T13:56:24.513000 CVE-2024-51719,0,0,7154cc207b4cfbe8cd3be353a6dbfab77953efea32b8e79fce767fd25daf7885,2024-11-12T13:56:24.513000 CVE-2024-5172,0,0,b469524ff2309ced9aec08b056578c23e8b8b5248adb8fcea2b38cb214c81275,2024-07-05T14:05:48.213000 +CVE-2024-51720,1,1,434c7f1cd608c8a8e0929d5e78edaeaa4f00f076ce1382a343572fb11633fea7,2024-11-12T18:15:46.693000 CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da6464,2024-06-26T12:44:29.693000 CVE-2024-51734,0,0,1cd13d8635d39c437cbb33b350735ec8f4fced2309825670ef2275f584df030b,2024-11-05T20:35:26.167000 CVE-2024-51735,0,0,4d68a755141918a79130284871e942292c9f37924aba0b94103b08a16b1df114,2024-11-06T18:17:17.287000 @@ -265384,6 +265499,8 @@ CVE-2024-51745,0,0,37db28606ad10f651e6f62f94e51def5fb50b1cfae8314bc96328b8b65ad3 CVE-2024-51746,0,0,3cd98a267aedbbeeb4ad193a68e5bacd0a1a46a62f6ccca5880e9520a47fbe14,2024-11-06T18:17:17.287000 CVE-2024-51747,0,0,25d6bd0ff3f85d39d80ee11112a05e1ad8216b6c2fd2794d35d1e9542fc2ceb9,2024-11-12T13:55:21.227000 CVE-2024-51748,0,0,9b7477705169f4bb30c6616f4b3aeff3f2e76cd4ce9e40c06c7b918e82c19551,2024-11-12T13:55:21.227000 +CVE-2024-51749,1,1,44a4006a3d05df466dcd484279d411d9075929ddca60bc79c3ac80e5632c0e7a,2024-11-12T17:15:09.910000 +CVE-2024-51750,1,1,4fbf34437a32eb55b4cefc7911497e2e839218b9573cf66a27093479e70dcf8e,2024-11-12T17:15:10.130000 CVE-2024-51751,0,0,5e82f37cf3dfc23b4c489447a3752cbf986237e64e94f63b0a07a70b000b7b12,2024-11-08T19:01:25.633000 CVE-2024-51752,0,0,e4bd7dfff09e294fe713d9b76aba7fd50689256bee0d75d076093e0fe4805888,2024-11-06T18:17:17.287000 CVE-2024-51753,0,0,bf33e866ff4adcdc8169c4272817d8f4f57258218421ea7cafddbf38a1c6e30a,2024-11-06T18:17:17.287000 @@ -265458,6 +265575,7 @@ CVE-2024-52004,0,0,5fa07d0a35480bd23f86ea684f2a0f66c5e4b9b2bf1fbc1961b6e8f9dcc62 CVE-2024-52007,0,0,9b9844f37c4a4c3cef932fa358d8594e2305c52695217b7622048372b9ab612f,2024-11-12T13:56:54.483000 CVE-2024-52009,0,0,8bbf25e6f645e131b823aafb60173e6af960fce613c6d8dadc55e928f3ee2540,2024-11-12T13:56:54.483000 CVE-2024-5201,0,0,64f0da97aed099b7390504c61b2a584cf361827a66e92ad103d8b3995d82fd05,2024-05-24T01:15:30.977000 +CVE-2024-52010,1,1,a8505d4d20a2ff8b67f096529a55be288529a590cb7065e29ae652896c8efa93,2024-11-12T17:15:10.370000 CVE-2024-52013,0,0,dc6fa1208648c6e0d094b332c10d38b0f7c8c8c6d93ae518d64f679a86a6ec4c,2024-11-05T16:35:36.337000 CVE-2024-52014,0,0,545c92489d8cb508f0bdcb65d9f6b19ac8bf6a61dd5add79060ed642cb14b442,2024-11-05T16:35:37.113000 CVE-2024-52015,0,0,a5e53232b1f16aa28db7ce5cbb2aada710eba0b2a30b6ad4f54922682b071803,2024-11-05T16:35:37.890000 @@ -265507,8 +265625,8 @@ CVE-2024-5228,0,0,d7fb18ef663e7fbb963ee04e575f2bc258b900955c0912600676521519fad8 CVE-2024-52286,0,0,a006a0be971b0e96964504e5809b0d7c6410ed1592b8c4976d82ae2953104dc3,2024-11-12T13:55:21.227000 CVE-2024-52288,0,0,8f949332b60260488906ff1b8c70f9a1209d9b10278c3c334faa6ae7259272ba,2024-11-12T13:55:21.227000 CVE-2024-5229,0,0,787c92e076dbd9dca682f832ee22f0e31b439c91ed2d6b58a8c544f86d4189c3,2024-07-03T02:08:42.827000 -CVE-2024-52296,1,1,e1d3676ac45354462ec68621ba5d0e3065cda95d7796d7a3da6af17f09b9d248,2024-11-12T16:15:26.030000 -CVE-2024-52297,1,1,476242ed3a5f6d85484bec0586307ad55a8c506bda5fa6246f3822c9b0f980d0,2024-11-12T16:15:26.230000 +CVE-2024-52296,0,0,e1d3676ac45354462ec68621ba5d0e3065cda95d7796d7a3da6af17f09b9d248,2024-11-12T16:15:26.030000 +CVE-2024-52297,0,0,476242ed3a5f6d85484bec0586307ad55a8c506bda5fa6246f3822c9b0f980d0,2024-11-12T16:15:26.230000 CVE-2024-5230,0,0,f45c8274ba28e0dc58bed98870ed092580a9c18662584e7c3debbd7f7cd359f4,2024-06-04T19:21:02.540000 CVE-2024-5231,0,0,255bed42ab2a064a39e6f8c88880296d2f7a7d154f3db6dc7f4df2fa244d299f,2024-06-04T19:21:02.640000 CVE-2024-52311,0,0,440cc6f6193f2a4b57d7c7c4a4f4b3f01242ca6df6bc89770050e09d3b499acf,2024-11-12T13:56:54.483000 @@ -265549,7 +265667,7 @@ CVE-2024-5253,0,0,73f9562f224a9a11b8b8279a7bf00d920003fa046cb7c88a3a55caf281adab CVE-2024-52530,0,0,33b7429eb7eb3be95001923a1f89646e5a1cfe585e3ad31147ffb8fafc52d42f,2024-11-12T13:55:21.227000 CVE-2024-52531,0,0,8cb0e01e69eb879d3a531e10dfc8fc193c666536142557a776eb4bc19dd211cb,2024-11-12T13:55:21.227000 CVE-2024-52532,0,0,ceac3c72c1c60bdab26132bf0ee3396fe51ade03b31a6af19ddc21f1a4f3dd27,2024-11-12T13:55:21.227000 -CVE-2024-52533,0,1,81d75647e8fcacbe880bcd9f7eaf399938e1df4314078c30bc37f40639859c7b,2024-11-12T16:35:24.297000 +CVE-2024-52533,0,0,81d75647e8fcacbe880bcd9f7eaf399938e1df4314078c30bc37f40639859c7b,2024-11-12T16:35:24.297000 CVE-2024-5254,0,0,78882d871be0a19bc95888168cf12372f503de77ac359f287536c8f062c38532,2024-07-19T15:32:05.560000 CVE-2024-5255,0,0,a9d47c22e8985fc8d8b40f4bef3272595484bdbc8485e44830cb58ee997ab90f,2024-07-19T15:32:18.850000 CVE-2024-5256,0,0,c0c79be075ef53b66bd4c726b840e366d70c6f0c56013178c0440e2e2bf91c1e,2024-09-24T18:41:40.007000 @@ -265983,7 +266101,7 @@ CVE-2024-5736,0,0,542f55758b5fdb7d00740d25c91b14abb056e9aea19176254ebe8a8a94099d CVE-2024-5737,0,0,d0320412366343a8bfdfa83f09ec33ad8bab76c39c727d4c2240c621c15a4ff2,2024-07-03T14:09:22.483000 CVE-2024-5739,0,0,607ae99ef991c260ab7d753d294117f20a4326531a649cb8963e8228c76ca454,2024-06-13T18:36:09.013000 CVE-2024-5741,0,0,b15f10a28254188cb533f28bdc6de62f4cf75bad53d1465adcc506123fe667cc,2024-08-16T20:38:08.053000 -CVE-2024-5742,0,0,c310dd28e6218f94af8f7597fa59ff6226be5f6bc18ba1f4cf6bdcb5be377788,2024-10-07T20:15:07.173000 +CVE-2024-5742,0,1,2dbc0be584cf2e6f101407cb819e6e1c9b28fd50abc0c32dd4c3e2d2cf8a9da5,2024-11-12T18:15:46.973000 CVE-2024-5744,0,0,fa6836e3173f8cf048b3a987cfb64279b64d7f456da598f49d9aa4b85f5c51d9,2024-08-01T13:59:58.940000 CVE-2024-5745,0,0,45e4cce1990a5332f3fc13a691f25e40551bee96d698b0361d8c0089ac80523d,2024-08-06T14:37:59.943000 CVE-2024-5746,0,0,08e42433314420a93bea44176cf4cc0a169742251a575020722ab2e02c28ff80,2024-06-21T11:22:01.687000 @@ -266318,7 +266436,7 @@ CVE-2024-6122,0,0,06803cba232580597a75bb268bd4b066a1cc7965fffda32fa54d013022be6b CVE-2024-6123,0,0,e5cb7862ae434be3489ddc1babc06be5b6b7d8b0ae968d68e19b0440d485ee4a,2024-08-14T14:15:27.870000 CVE-2024-6124,0,0,dbae4ba6931a49b60006ec1ed4b58995a60c43677eb3c396860d17e670311bc6,2024-08-27T11:15:04.617000 CVE-2024-6125,0,0,dcd2ab56787ddae0f7c175c392cba81a8765f3e4738004aeecc40e1ed002ca73,2024-06-20T12:44:01.637000 -CVE-2024-6126,0,1,2cc8b72789e1a4853a8a3c067f455bf8c94af855bdaad1798c163c58dbfe69c4,2024-11-12T15:15:11.403000 +CVE-2024-6126,0,0,2cc8b72789e1a4853a8a3c067f455bf8c94af855bdaad1798c163c58dbfe69c4,2024-11-12T15:15:11.403000 CVE-2024-6127,0,0,78b2d5dd67e9c05b32bbe278fa7cdf65d5c6c9d848f18552ef9889ec17d13cda,2024-06-28T10:27:00.920000 CVE-2024-6128,0,0,752c35ccc9ca0893ce78cfd348cd97a47a4c4389e751d1fa12a176ad61b65ba8,2024-09-20T23:21:47.123000 CVE-2024-6129,0,0,2ff762b7cd1a3a05b9f7a7bf543ed96dfafb16d6f8890a34166ecd6ab87a1ddd,2024-09-20T19:21:03.763000 @@ -266418,7 +266536,7 @@ CVE-2024-6235,0,0,3389c73a6ea8d57ad4659a54003738203401403add7f113413f0341ee66fc3 CVE-2024-6236,0,0,ea4366a2dacd229dc05ea79ccc864c81d00975b5a5c000367714796c8eb1d7e4,2024-08-01T14:00:16.777000 CVE-2024-6237,0,0,42d974b137e9f6fa213536980d088f395c1fe724ef5f0786bbfbf5436af83280,2024-08-29T18:15:14.947000 CVE-2024-6238,0,0,ed9c2d1c6c6b7ce98df1d438dedd8db9b89c4dbb8c302ebc32aa84b1d702412d,2024-10-30T16:35:29.987000 -CVE-2024-6239,0,0,331baa2e2a54956b72059cf6f370c174a3a7f88f365f410b1d7435c4cb7f3fbb,2024-09-18T09:15:05.803000 +CVE-2024-6239,0,1,58265368843e2e1a60d2defda07ec1d9f9e15a7d13a9c4cde54a90c9e90e9c03,2024-11-12T17:15:10.520000 CVE-2024-6240,0,0,ac0ea1c33037082252bc61d50d67379872fe94c26d657b4cc70544d56df4853f,2024-06-24T19:10:38.983000 CVE-2024-6241,0,0,6290249fb2556f2c86210bd1da990f0543c81351c0646b54f9f1e8ad7a654dfa,2024-06-24T19:42:44.280000 CVE-2024-6242,0,0,3710863ac72ff4e84ea0fd78a36f5e9434d67cfe63e5360760beb47932695486,2024-08-01T16:45:25.400000 @@ -266648,7 +266766,7 @@ CVE-2024-6497,0,0,b980a8afca3367d307f1b8ae084c1de1478e48fcb0a6d42a16be67c3823c34 CVE-2024-6498,0,0,1ed281221bc697855933115a42dfe940bdc52a0072d0e3695abed7f798c88ab5,2024-09-06T17:35:19.293000 CVE-2024-6499,0,0,5aefcf3098945d08365a478f93189a0b1b6a19cac1228ed97908dfeeb06cd006,2024-09-26T22:07:50.040000 CVE-2024-6500,0,0,d6e17cf29259cccc059c07e88e123ff08e9fd8308cfe5e11844bc5a9a1491c18,2024-08-19T13:00:23.117000 -CVE-2024-6501,0,1,308ca90e0c6a5a78d481d91b2651b0fc358fbf8323e207c9fcfc8e1195173709,2024-11-12T15:15:11.530000 +CVE-2024-6501,0,0,308ca90e0c6a5a78d481d91b2651b0fc358fbf8323e207c9fcfc8e1195173709,2024-11-12T15:15:11.530000 CVE-2024-6502,0,0,7304740865a2d9646b306af4eab2981d10cf59323822892a921ddddc4962ea79,2024-09-11T16:49:28.650000 CVE-2024-6504,0,0,6666bb3ba2314d1147da34b1413146555668de024ce515e1e34c91b1fe32472b,2024-09-10T13:53:28.387000 CVE-2024-6505,0,0,2472b280b959c45a84076dc8298b1f0ea15132bfdd2f045bf3ab100aab446db1,2024-09-19T06:15:03.463000 @@ -266738,7 +266856,7 @@ CVE-2024-6600,0,0,d38b8e15b440ec379e5d4dcf9d0495a2b72fd02b3eb8c13111cb9109e14989 CVE-2024-6601,0,0,1b3b880d323fbc5730a980592d9133d50798789725a5a19bb934e3d6e9a6650b,2024-10-30T20:35:39.587000 CVE-2024-6602,0,0,f6a87652a2fe583b38a38e64b24a5e6d6d6790eb720538440a254ce49a22d782,2024-07-16T18:15:08.900000 CVE-2024-6603,0,0,69cec991ec6c96faca0e6549878f06a74d4f5b721edfdd20399a8cd286528c4f,2024-07-16T18:15:08.990000 -CVE-2024-6604,0,1,9069e1e4303827c6bac2a3f980520353e2df4612754e7a70e6afd1b8541d78f4,2024-11-12T16:35:25.143000 +CVE-2024-6604,0,0,9069e1e4303827c6bac2a3f980520353e2df4612754e7a70e6afd1b8541d78f4,2024-11-12T16:35:25.143000 CVE-2024-6605,0,0,c63bd0135437fcc4d79120f4a6d6fc9c887b669225a222a69b4002ddda65549b,2024-08-01T14:00:29.013000 CVE-2024-6606,0,0,1a43f6b156f00ca0284491ac0129496772fc5a0993a21ff17fb319d7882c2e97,2024-07-16T18:15:09.247000 CVE-2024-6607,0,0,e0f051eabf509802774447af80a0c738a4502496130b70b32bcf3185bbfd563c,2024-08-01T14:00:30.023000 @@ -266784,7 +266902,7 @@ CVE-2024-6651,0,0,ea873d27b7e6cf0926f77a6ff240509b7d4aeaa1088e1cf3aab190452e4555 CVE-2024-6652,0,0,3ff791c25c8f732c3947124509e73704873817ec6683dce373132d784d769eca,2024-10-17T12:39:41.690000 CVE-2024-6653,0,0,d93d31cbf15b722e8213bd0a1f350049b73a325a73fea026c81bdae5013a3c4f,2024-07-11T13:15:10.147000 CVE-2024-6654,0,0,33944ebc74d30c3cdd06834dbc588c95f63dc73814119ce0f62926870f548873,2024-10-09T09:15:06.713000 -CVE-2024-6655,0,0,a32b97bcdf109b29c8d77151fae7b1b28b3012a09ea60dee2c55a3acae47acc7,2024-09-25T01:15:45.070000 +CVE-2024-6655,0,1,4d06a36663441a51ec98ad7b55317ee7b839f9c6dd933c193603d639d10a05e0,2024-11-12T17:15:10.680000 CVE-2024-6656,0,0,fccb6ec07442f587d9028dc0c59041af34b9eaf4dddb92d180741d5c3d5aee87,2024-09-19T13:05:44.953000 CVE-2024-6657,0,0,f0f99d433013d36173a76c2d6f29d8b00e049abe2c9619ab26aa1901dbe42314,2024-11-04T15:15:24.440000 CVE-2024-6658,0,0,c59a5bc453b7b50f1c8c3eefda7e3a6df21ab1a88b2d2e9df9362f9733c6e2a7,2024-09-23T20:15:05.560000 @@ -267384,7 +267502,7 @@ CVE-2024-7399,0,0,94de8cab81b119f815fa73c008811f38562f3609d3da13634aecbd720ea861 CVE-2024-7400,0,0,880bea0e2ff4ceadacbe376968f4ebe20bb468fa58e2ed97aa47316bc459f45c,2024-09-30T12:46:20.237000 CVE-2024-7401,0,0,43ffed7b6ca165f2a0da7944b4e4cef6faa3da0b6dbd419986732fe262f21587,2024-09-05T18:34:17.433000 CVE-2024-7408,0,0,a5191010d29cd8fd3daea07e74870b9bf130ede8610ab518fb24ce3a11a386f4,2024-08-13T16:06:08.213000 -CVE-2024-7409,0,0,e344117b22347370b6959672db9a2532903deb2c5b89a1ea7048d8db1b77db2d,2024-10-01T05:15:12.650000 +CVE-2024-7409,0,1,a0a6addbe3c2f0cc1db031d3b6ccbc76b45c7e3857a91ea8908f269e71f57171,2024-11-12T17:15:10.833000 CVE-2024-7410,0,0,d4e8b81d7bab3d90baf0746a6fdf1d2e1dd63b1bd2599e20b73bae4467a0729b,2024-08-12T13:41:36.517000 CVE-2024-7411,0,0,233fe970a370850f5b652951fe7b5f603c4b4a66cd3c44f0b67dc9d466e3271d,2024-08-15T13:01:10.150000 CVE-2024-7412,0,0,b7efc7f691385d07c16b9c98953749b4113f5c7d6e2cc5e240ac710642b7a973,2024-08-12T13:41:36.517000 @@ -267520,6 +267638,7 @@ CVE-2024-7567,0,0,8d84928fabcffd92f0ffc65ee27fdbbaa4428b293e351afb4071fd1cdbd8df CVE-2024-7568,0,0,fc850c4dc7382eb1c532a12fdb074c868e94a69ea2940a03f3f65bba93f8ff11,2024-09-27T00:41:18.483000 CVE-2024-7569,0,0,7a3c8e4eac2ebf96df0505057d22d968c760196f85eb753352a8b6e99487f183,2024-09-06T21:57:23.037000 CVE-2024-7570,0,0,a798807066be1648665e55a9f25a11b0e98e29601d4d1c9335361e48181aae93,2024-09-06T21:59:00.830000 +CVE-2024-7571,1,1,5c0533dd4ecdb63a7ac7493e32da992f80b34c401fc4396f8c1aa9a3b784ef28,2024-11-12T17:15:10.973000 CVE-2024-7573,0,0,7b157c1bc586485011758f6317cb8548eaad83544501bf2e76c604287d08292a,2024-08-28T12:57:27.610000 CVE-2024-7574,0,0,20d9970481b83bc1831e248b5fd88e17f245f697fcf3310f9ca87d287eec943e,2024-08-12T13:41:36.517000 CVE-2024-7575,0,0,e8306ce8528f787b0f27b2039d1a16892d7951cab83d446a20e0ed4cab1e1e05,2024-10-03T13:52:23.060000 @@ -267917,11 +268036,13 @@ CVE-2024-8056,0,0,7d94e922f5f6064358baece439e000bb5b536e03070693d567d210e7b17a44 CVE-2024-8059,0,0,bdae740e9708e98c12d1deb7f7b4958a4e9e21cc3d70a47ecc6f19d9246061d0,2024-09-14T11:47:14.677000 CVE-2024-8064,0,0,9afbec42e91ccdf5ae5f9527bb691367cd47bbf3ee2caa0cb5423b43e5fdd860,2024-08-30T16:15:11.120000 CVE-2024-8067,0,0,21c0729ad9dc772677b9fbf75bb24db3bcf4512001a88b1eef9d39bf31f69153,2024-09-26T13:32:02.803000 +CVE-2024-8068,1,1,df5bb5cbd57ee571f3a69df64a9005315a4220113d4ece4ae527c7a4c22e2236,2024-11-12T18:15:47.450000 +CVE-2024-8069,1,1,f54e8a7820a67cb4ee6825af332233688e897633a7f16db4082a6a76ee2050cc,2024-11-12T18:15:47.603000 CVE-2024-8070,0,0,fe9b454067f74b13c9d22e1bfea14cc77320169fffe5e56dce182517c870c1a6,2024-10-15T12:57:46.880000 CVE-2024-8071,0,0,ac7c2c7e7df896f6bfe7f17a6e74f8de236e5ec843865384cdf53fde1e533098,2024-08-23T15:34:53.913000 CVE-2024-8072,0,0,08fafb0bed7b0568fefcb8938e0e01cf4acf3cb153d4b847bc3e1d9427344a62,2024-08-22T14:35:18.797000 CVE-2024-8073,0,0,10b7625a2313189ee3b842662d1479fc9c76da034a2ab4b4a904df4cf34a67e5,2024-09-12T20:58:56.413000 -CVE-2024-8074,1,1,076dc0b186a0afea61c1a9a5ea4ed9867805411ce7c2a803d30f87fae20b0c22,2024-11-12T15:48:59.103000 +CVE-2024-8074,0,0,076dc0b186a0afea61c1a9a5ea4ed9867805411ce7c2a803d30f87fae20b0c22,2024-11-12T15:48:59.103000 CVE-2024-8075,0,0,ade4c273165c7aec4765c6326040b76c5f63a113e2ed288ff931d9df9094655a,2024-08-29T21:57:51.377000 CVE-2024-8076,0,0,17f13fca60dc9f294e50e141a5e871f314ee6e5e737c4e528c1768c1265f9d75,2024-08-29T21:58:31.820000 CVE-2024-8077,0,0,52c1674bca408deb5f4af1cbc16aa8747d849ce452283a87adbc49089818e7d0,2024-08-29T21:59:08.997000 @@ -268047,7 +268168,7 @@ CVE-2024-8230,0,0,51972d3a01eef60d4ec2fcebcc43d9f517d40a0a396b61ca7c24bdef0d5fcb CVE-2024-8231,0,0,446131483e8b45e43bdf8638b1d57bddc78ae79290a43024fb0cbf42d668bb64,2024-10-16T20:01:30.877000 CVE-2024-8232,0,0,5572b7d7bb007c2d5d81196fae90ff25fc17db53d2496173f3c02b5439ff5273,2024-09-11T16:26:11.920000 CVE-2024-8234,0,0,870a131a53db84d6497bde7de38de6b7411ad7686be0738cd78fff93fab14909,2024-08-30T13:00:05.390000 -CVE-2024-8235,0,0,b786ef24a32ef6e274d547283632e384bd9e424c03fcdd4e02e8982f754d2de6,2024-09-25T18:56:19.090000 +CVE-2024-8235,0,1,5e9780352477158854c36359d48e25d3513888b0f7edea2fdcc69371ba803fc8,2024-11-12T17:15:11.197000 CVE-2024-8239,0,0,9ef6151772b4426305cdb3a97d7dc90da8f7e43d6a503c000880c7bb8166db9a,2024-10-07T15:48:35.887000 CVE-2024-8241,0,0,a45702ddf12409bcabe5a92099c2b574d3c26b3fd7159f1bd1748fa16b9a5652,2024-09-26T22:03:42.123000 CVE-2024-8242,0,0,0ef1d79e78cd55267ee51ab0995f6e2480e4463ebaece6d40e7de318a22ccc8c,2024-09-18T15:47:56.553000 @@ -268239,7 +268360,7 @@ CVE-2024-8485,0,0,a23363c7e119dcd66690422c5888ab97f710d472d308cfeb1e931d4e393131 CVE-2024-8486,0,0,a895c2dfc5296c31033d2d8775c35d4e89c74a55a8e4a0d1cd2be303d1154f98,2024-10-07T17:48:28.117000 CVE-2024-8488,0,0,0a3c72da0e3d6042858531d99f20f7d46ebd7634c2988e0b42f58011241f998b,2024-10-10T12:56:30.817000 CVE-2024-8490,0,0,5ff62dababbd8edfb72d0a97e4807df424b78f87491e2373479d6c84fbd14d32,2024-09-27T18:36:00.053000 -CVE-2024-8495,1,1,123bc3e7f16c35d61872897698b0fa7f122111fb7b6bc25343bcafd7ca188a34,2024-11-12T16:15:26.560000 +CVE-2024-8495,0,0,123bc3e7f16c35d61872897698b0fa7f122111fb7b6bc25343bcafd7ca188a34,2024-11-12T16:15:26.560000 CVE-2024-8497,0,0,903ccc83158de7417bc6f3ffdca83d1bf1fc40ad14228b01a3e1e063e242f9a9,2024-09-26T13:32:02.803000 CVE-2024-8499,0,0,bc10e268953f3510a56a82c76a3284d959caf9db18a1ecb3936e6906e82e8732,2024-11-08T21:01:13.457000 CVE-2024-8500,0,0,4a6f945879b83f03905c3f0642d30c4c3935515f8d05579f7adc4234c4210fca,2024-10-25T16:43:24.040000 @@ -268267,6 +268388,7 @@ CVE-2024-8531,0,0,6247771452e4454422e50e876a5da9e38ac5a7aad08135621b5b288e87bf9b CVE-2024-8533,0,0,ceba1d609043d018dd2a5c62af783c64aebd2125e63ee811ba18e8a1d6a8510b,2024-09-19T01:57:23.830000 CVE-2024-8536,0,0,a7b1e09acaf4ac1b8946f962d2bb0e6dee99d2fed00608df37ed579fb4435262,2024-10-03T18:16:17.740000 CVE-2024-8538,0,0,037a1de419d434bcf3dba0ee797a8b9a465b537393317b1c47cc2bb770ec2f49,2024-09-26T16:28:02.990000 +CVE-2024-8539,1,1,ab508558deccf561edf9fbd11e9cd3c77778b51668042bb9ac7ffa9072153a75,2024-11-12T17:15:11.357000 CVE-2024-8541,0,0,1d636de0a06aff3dc69296630bf4988ffb67af97b387ae9a3d55e4d7f8f169de,2024-11-08T15:07:08.400000 CVE-2024-8543,0,0,1827ebc325d7546f1e75a8e16ffad13bc42c9eac828d9fdcb95bbdde0c532bed,2024-09-27T16:46:26.243000 CVE-2024-8544,0,0,029a23631e96ee15c1045dd3fa22aca85d39405998de7d891aefcd30e632fd70,2024-09-27T12:57:21.617000 @@ -268794,7 +268916,7 @@ CVE-2024-9327,0,0,9bb62fae114b1c29588ad2672d640859a17a9f3af7375a799fc34e218e9d39 CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000 CVE-2024-9329,0,0,45383f73609cef2d97bbcc2a37f0da26902c147f00f71a92dd725b6696a1e709,2024-10-07T15:52:47.267000 CVE-2024-9333,0,0,29d3d497691b594c7c49948d48e229bbe8c23108f2eef552b2f92cd89acf1f06,2024-10-04T13:50:43.727000 -CVE-2024-9341,0,0,7547053127fd864606063a8ad0e325a2056d5818fa8a88d914f6cb31ddc5a945,2024-11-07T08:15:13.577000 +CVE-2024-9341,0,1,cbd9ba7700b736ca77295d40baf5d6006565a235e3e2c6893b45c65c02e66af9,2024-11-12T18:15:47.840000 CVE-2024-9344,0,0,d870e129ed50c7683cdbbee07d60a73dcd8b852b9805e9d5932c8a41008c379e,2024-10-08T15:06:57.470000 CVE-2024-9345,0,0,b08be38bdc65e7df784af6af5cf36510583fc49f8a0ab62bc24aed87f83f55d0,2024-10-08T16:10:17.567000 CVE-2024-9346,0,0,62d32d35d45fd426e51a0ed8886468a70178025d3407ee17aee209be78f55958,2024-10-15T12:58:51.050000 @@ -268843,14 +268965,14 @@ CVE-2024-9401,0,0,9842edf4bc941b30860cfd929934eb8ba10b8d9f58d891f69f78bdfbf96f46 CVE-2024-9402,0,0,04bb4c5739f014caa4b772ec804b7222edbe186c7bb2fe331673658400879b23,2024-10-04T13:51:25.567000 CVE-2024-9403,0,0,c1afe1062aca6f3e2bbfc345cdb3697cf0c5243163e1e418a6944c658c5bb841,2024-10-04T13:51:25.567000 CVE-2024-9405,0,0,5a1aaacdf03c4deeb5787d411c40d8ad3aed60be9320ac0ab9cd4983368bffee,2024-10-04T13:51:25.567000 -CVE-2024-9407,0,0,5db42493e37378926c61ab42630e7509400310b16c31f46908f72e92834afb94,2024-11-11T17:15:05.457000 +CVE-2024-9407,0,1,97b0f3234f51cc30c3a97226cb930f5fbbe39fd25f9f23131a758552af9f8ee9,2024-11-12T18:15:48.057000 CVE-2024-9410,0,0,f1caeb057101bc11b923104c4939c2a18b358804c54a293851a2bbe945ca8cb5,2024-10-07T17:48:28.117000 CVE-2024-9411,0,0,09446adc9a52ba88acfc951352e9088b24cfd1cdb8a001643ee070875c43ffef,2024-10-04T13:51:25.567000 CVE-2024-9412,0,0,aa9a3d3cdb3659b02012ef158f2f0c675ff0de511272afae470c48f556502feb,2024-10-10T12:51:56.987000 CVE-2024-9414,0,0,5c21f14ec376abe57dfce5e862247c317429afdd9c8e1a9c0b90f9672b7f519b,2024-10-18T12:52:33.507000 CVE-2024-9417,0,0,c74a648d5508a7a2c2d3e505619e54040658d58791e6150e9a0fe8cbf972b416,2024-10-07T17:48:28.117000 CVE-2024-9419,0,0,a3f1d241a393213976f2495a35f5bc1427a284fa16c4a0b19d1f7c056beff495,2024-11-01T12:57:03.417000 -CVE-2024-9420,1,1,16abe743c10c84ef66d4a9297b6d91aa254bf942da6fed8f6490dfaf0762e547,2024-11-12T16:15:26.760000 +CVE-2024-9420,0,0,16abe743c10c84ef66d4a9297b6d91aa254bf942da6fed8f6490dfaf0762e547,2024-11-12T16:15:26.760000 CVE-2024-9421,0,0,c9b1d003792a28014f7a9846d6ca15c83ef06308c8117d3bc2489a9bd808c180,2024-10-10T20:59:01.600000 CVE-2024-9423,0,0,080f0a87d4561f3316974a1b5473f0b3836e39e629c6273c7813cc62b41d4a31,2024-10-04T13:50:43.727000 CVE-2024-9425,0,0,bc1d05d29533f5db80147aca0ebcf5dcf1807c002307822e9b1efd4c274ae327,2024-10-22T13:55:04.537000 @@ -269000,8 +269122,8 @@ CVE-2024-9667,0,0,db0574de12822738c38c8016441ce46841c68ee532fe6a4e072cebc9412ff1 CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000 CVE-2024-9671,0,0,421f1b0ad6825ff096efd81ac122f33bafcdf7b21693a85f65613389bca55f89,2024-10-10T12:51:56.987000 CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000 -CVE-2024-9675,0,0,5884a5995b9fb9a040efcf36aa7bf19a912e63a985e4dd6502e1f25a1f8a6b69,2024-11-11T17:15:05.587000 -CVE-2024-9676,0,0,ca2916674bf5233a81cea91b0af20401df950e41a61145a4ac3b490b2925e185,2024-11-11T18:15:15.440000 +CVE-2024-9675,0,1,1b7950bbf002083ee4e53e944da02c5d76cc5e5eff0c248f9219501dde315b12,2024-11-12T18:15:48.180000 +CVE-2024-9676,0,1,f335a00e94a1cdc6c48644a159e81b69c2cad1467f7b2e1ae370b9d47106ad4d,2024-11-12T18:15:48.340000 CVE-2024-9677,0,0,944e049c847e061867c66e6b586a0cd99260b04bc2e2059d736567bf47cae00c,2024-10-23T15:12:34.673000 CVE-2024-9680,0,0,db0e4e19e09673238ffe3dfbb8e95974e9346a75b4fd6d9319c03e5970bb644e,2024-10-16T15:07:36.123000 CVE-2024-9681,0,0,5184b45d0c5be56c6e66f5f4d21584d3fd220046fb9bac6604ac868b54d81bd8,2024-11-06T18:17:17.287000 @@ -269066,10 +269188,12 @@ CVE-2024-9825,0,0,43f77069eab20c6659796a5ca73cb04eb18b719fa0ad0721704c789de71379 CVE-2024-9826,0,0,c03e2e0710a5712915ae2341fa5030e5bd74d5917743f7fdf85c043b115b921d,2024-11-01T16:17:10.620000 CVE-2024-9827,0,0,c5e7676b9d011eef0934f8d1e51cd92697f77495088547784042162cb4944824,2024-11-01T16:17:07.187000 CVE-2024-9829,0,0,ea980a1e481fc86407edeb6f0040d6f4a6ff2d17edcbe8d18dd95381292ad49b,2024-10-25T16:30:44.520000 -CVE-2024-9835,0,1,ca18e7b41fab9b483950f5f59199903f1b661b24923c7a18a4c44cf7bcb08f14,2024-11-12T15:35:17.853000 -CVE-2024-9836,0,1,5d120048cea246a15edceb1ecc1c13de92be1dc1c21567e1e478f7428ef25fec,2024-11-12T15:35:18.093000 +CVE-2024-9835,0,0,ca18e7b41fab9b483950f5f59199903f1b661b24923c7a18a4c44cf7bcb08f14,2024-11-12T15:35:17.853000 +CVE-2024-9836,0,0,5d120048cea246a15edceb1ecc1c13de92be1dc1c21567e1e478f7428ef25fec,2024-11-12T15:35:18.093000 CVE-2024-9837,0,0,bb8fbc31e530027dfddbaf6dae2f5d1b4333d91b7cafcea32a3d82a1ea54dea9,2024-10-15T12:57:46.880000 CVE-2024-9841,0,0,ebdd51eec8479d80c9266cdceb915506aec1278560e194f65ea2f5d20595b81b,2024-11-08T19:01:03.880000 +CVE-2024-9842,1,1,5d3c7d33c46623a6a4c130167cdaba2fd4966b2d78a512bcd127a5ed3a622d91,2024-11-12T17:15:11.580000 +CVE-2024-9843,1,1,3f6b82b935801794016ddce6f74345815fb60145546c8b6ecadc582329b1f681,2024-11-12T17:15:11.793000 CVE-2024-9846,0,0,173656afdffd3fc8df737b5cdb277d7e27d47fc010c3df17216e30b52661a1bb,2024-11-06T14:58:04.160000 CVE-2024-9848,0,0,b402d34d635014e43cf3d9b875728458bb9e45308a715285ac01e2036b42d252,2024-10-22T16:42:25.867000 CVE-2024-9853,0,0,b003ea260222d309866f9bc6bcac4c0549c1930cf36d8d49eac92c8d99d9053c,2024-10-28T13:58:09.230000 @@ -269185,3 +269309,4 @@ CVE-2024-9991,0,0,adb978eaa002da8be608de3b4e550af4ed1a2d2f51d6542eb9fa168b402820 CVE-2024-9996,0,0,d5e7827ad5391d78a31addd2ca4c41dc6e5d45abf975a0bf7cf45c9296bda120,2024-11-01T16:27:30.387000 CVE-2024-9997,0,0,a8e0d075074a0193393843d7836722691de5269a9c302917e51ae6ca5570db59,2024-11-01T16:27:34.960000 CVE-2024-9998,0,0,0419a3dad23ae850906f2650ca4d40b180999b4a5d360bcc1b838f8893ae2af5,2024-11-12T11:15:03.840000 +CVE-2024-9999,1,1,bb030ee002ce7e75d47116d14be8ec7d0062c1687025da8684bec130b2c84a87,2024-11-12T17:15:12.013000