From 7ba80c8a4cefa0ae3bb6f864b3871973b92c3553 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Tue, 12 Nov 2024 17:03:24 +0000 Subject: [PATCH] Auto-Update: 2024-11-12T17:00:23.233250+00:00 --- CVE-2006/CVE-2006-100xx/CVE-2006-10001.json | 6 +- CVE-2023/CVE-2023-317xx/CVE-2023-31704.json | 14 +- CVE-2024/CVE-2024-03xx/CVE-2024-0340.json | 6 +- CVE-2024/CVE-2024-103xx/CVE-2024-10315.json | 4 +- CVE-2024/CVE-2024-109xx/CVE-2024-10971.json | 33 + CVE-2024/CVE-2024-110xx/CVE-2024-11007.json | 56 ++ CVE-2024/CVE-2024-110xx/CVE-2024-11060.json | 4 +- CVE-2024/CVE-2024-111xx/CVE-2024-11121.json | 4 +- CVE-2024/CVE-2024-111xx/CVE-2024-11122.json | 4 +- CVE-2024/CVE-2024-111xx/CVE-2024-11123.json | 4 +- CVE-2024/CVE-2024-111xx/CVE-2024-11124.json | 4 +- CVE-2024/CVE-2024-111xx/CVE-2024-11125.json | 141 +++ CVE-2024/CVE-2024-111xx/CVE-2024-11126.json | 137 +++ CVE-2024/CVE-2024-111xx/CVE-2024-11127.json | 145 +++ CVE-2024/CVE-2024-111xx/CVE-2024-11130.json | 141 +++ CVE-2024/CVE-2024-11xx/CVE-2024-1151.json | 6 +- CVE-2024/CVE-2024-222xx/CVE-2024-22257.json | 14 +- CVE-2024/CVE-2024-23xx/CVE-2024-2315.json | 100 ++ CVE-2024/CVE-2024-281xx/CVE-2024-28162.json | 39 +- CVE-2024/CVE-2024-310xx/CVE-2024-31080.json | 10 +- CVE-2024/CVE-2024-310xx/CVE-2024-31081.json | 10 +- CVE-2024/CVE-2024-310xx/CVE-2024-31083.json | 10 +- CVE-2024/CVE-2024-336xx/CVE-2024-33658.json | 100 ++ CVE-2024/CVE-2024-336xx/CVE-2024-33660.json | 100 ++ CVE-2024/CVE-2024-346xx/CVE-2024-34674.json | 608 ++++++++++- CVE-2024/CVE-2024-346xx/CVE-2024-34675.json | 238 ++++- CVE-2024/CVE-2024-346xx/CVE-2024-34676.json | 608 ++++++++++- CVE-2024/CVE-2024-346xx/CVE-2024-34677.json | 608 ++++++++++- CVE-2024/CVE-2024-346xx/CVE-2024-34678.json | 608 ++++++++++- CVE-2024/CVE-2024-346xx/CVE-2024-34679.json | 238 ++++- CVE-2024/CVE-2024-346xx/CVE-2024-34680.json | 608 ++++++++++- CVE-2024/CVE-2024-354xx/CVE-2024-35419.json | 39 +- CVE-2024/CVE-2024-354xx/CVE-2024-35421.json | 39 +- CVE-2024/CVE-2024-354xx/CVE-2024-35422.json | 14 +- CVE-2024/CVE-2024-354xx/CVE-2024-35423.json | 39 +- CVE-2024/CVE-2024-354xx/CVE-2024-35424.json | 39 +- CVE-2024/CVE-2024-354xx/CVE-2024-35425.json | 14 +- CVE-2024/CVE-2024-354xx/CVE-2024-35426.json | 27 +- CVE-2024/CVE-2024-354xx/CVE-2024-35427.json | 39 +- CVE-2024/CVE-2024-373xx/CVE-2024-37365.json | 100 ++ CVE-2024/CVE-2024-37xx/CVE-2024-3727.json | 14 +- CVE-2024/CVE-2024-392xx/CVE-2024-39281.json | 33 + CVE-2024/CVE-2024-424xx/CVE-2024-42442.json | 56 ++ CVE-2024/CVE-2024-434xx/CVE-2024-43415.json | 64 ++ CVE-2024/CVE-2024-434xx/CVE-2024-43427.json | 14 +- CVE-2024/CVE-2024-434xx/CVE-2024-43430.json | 14 +- CVE-2024/CVE-2024-434xx/CVE-2024-43432.json | 14 +- CVE-2024/CVE-2024-434xx/CVE-2024-43433.json | 14 +- CVE-2024/CVE-2024-434xx/CVE-2024-43435.json | 14 +- CVE-2024/CVE-2024-434xx/CVE-2024-43439.json | 14 +- CVE-2024/CVE-2024-452xx/CVE-2024-45289.json | 33 + CVE-2024/CVE-2024-468xx/CVE-2024-46891.json | 14 +- CVE-2024/CVE-2024-468xx/CVE-2024-46894.json | 14 +- CVE-2024/CVE-2024-469xx/CVE-2024-46962.json | 39 +- CVE-2024/CVE-2024-469xx/CVE-2024-46963.json | 39 +- CVE-2024/CVE-2024-469xx/CVE-2024-46964.json | 39 +- CVE-2024/CVE-2024-469xx/CVE-2024-46966.json | 39 +- CVE-2024/CVE-2024-475xx/CVE-2024-47535.json | 60 ++ CVE-2024/CVE-2024-475xx/CVE-2024-47593.json | 14 +- CVE-2024/CVE-2024-479xx/CVE-2024-47905.json | 56 ++ CVE-2024/CVE-2024-479xx/CVE-2024-47906.json | 60 ++ CVE-2024/CVE-2024-479xx/CVE-2024-47907.json | 56 ++ CVE-2024/CVE-2024-479xx/CVE-2024-47909.json | 56 ++ CVE-2024/CVE-2024-494xx/CVE-2024-49401.json | 423 +++++++- CVE-2024/CVE-2024-494xx/CVE-2024-49402.json | 238 ++++- CVE-2024/CVE-2024-500xx/CVE-2024-50096.json | 140 ++- CVE-2024/CVE-2024-500xx/CVE-2024-50097.json | 99 +- CVE-2024/CVE-2024-500xx/CVE-2024-50098.json | 109 +- CVE-2024/CVE-2024-500xx/CVE-2024-50099.json | 157 ++- CVE-2024/CVE-2024-501xx/CVE-2024-50102.json | 90 +- CVE-2024/CVE-2024-501xx/CVE-2024-50104.json | 92 +- CVE-2024/CVE-2024-501xx/CVE-2024-50105.json | 90 +- CVE-2024/CVE-2024-501xx/CVE-2024-50106.json | 90 +- CVE-2024/CVE-2024-503xx/CVE-2024-50317.json | 56 ++ CVE-2024/CVE-2024-503xx/CVE-2024-50318.json | 56 ++ CVE-2024/CVE-2024-503xx/CVE-2024-50319.json | 56 ++ CVE-2024/CVE-2024-503xx/CVE-2024-50320.json | 56 ++ CVE-2024/CVE-2024-503xx/CVE-2024-50321.json | 56 ++ CVE-2024/CVE-2024-503xx/CVE-2024-50322.json | 56 ++ CVE-2024/CVE-2024-503xx/CVE-2024-50323.json | 56 ++ CVE-2024/CVE-2024-503xx/CVE-2024-50324.json | 56 ++ CVE-2024/CVE-2024-503xx/CVE-2024-50326.json | 56 ++ CVE-2024/CVE-2024-503xx/CVE-2024-50327.json | 56 ++ CVE-2024/CVE-2024-503xx/CVE-2024-50328.json | 56 ++ CVE-2024/CVE-2024-503xx/CVE-2024-50329.json | 56 ++ CVE-2024/CVE-2024-503xx/CVE-2024-50330.json | 56 ++ CVE-2024/CVE-2024-503xx/CVE-2024-50331.json | 56 ++ CVE-2024/CVE-2024-503xx/CVE-2024-50386.json | 64 ++ CVE-2024/CVE-2024-506xx/CVE-2024-50601.json | 39 +- CVE-2024/CVE-2024-515xx/CVE-2024-51562.json | 33 + CVE-2024/CVE-2024-515xx/CVE-2024-51563.json | 33 + CVE-2024/CVE-2024-515xx/CVE-2024-51564.json | 33 + CVE-2024/CVE-2024-515xx/CVE-2024-51565.json | 33 + CVE-2024/CVE-2024-515xx/CVE-2024-51566.json | 33 + CVE-2024/CVE-2024-522xx/CVE-2024-52296.json | 60 ++ CVE-2024/CVE-2024-522xx/CVE-2024-52297.json | 64 ++ CVE-2024/CVE-2024-525xx/CVE-2024-52533.json | 39 +- CVE-2024/CVE-2024-61xx/CVE-2024-6126.json | 6 +- CVE-2024/CVE-2024-65xx/CVE-2024-6501.json | 6 +- CVE-2024/CVE-2024-66xx/CVE-2024-6604.json | 39 +- CVE-2024/CVE-2024-80xx/CVE-2024-8074.json | 78 ++ CVE-2024/CVE-2024-84xx/CVE-2024-8495.json | 56 ++ CVE-2024/CVE-2024-94xx/CVE-2024-9420.json | 56 ++ CVE-2024/CVE-2024-98xx/CVE-2024-9835.json | 27 +- CVE-2024/CVE-2024-98xx/CVE-2024-9836.json | 27 +- README.md | 110 +- _state.csv | 1006 ++++++++++--------- 107 files changed, 9193 insertions(+), 689 deletions(-) create mode 100644 CVE-2024/CVE-2024-109xx/CVE-2024-10971.json create mode 100644 CVE-2024/CVE-2024-110xx/CVE-2024-11007.json create mode 100644 CVE-2024/CVE-2024-111xx/CVE-2024-11125.json create mode 100644 CVE-2024/CVE-2024-111xx/CVE-2024-11126.json create mode 100644 CVE-2024/CVE-2024-111xx/CVE-2024-11127.json create mode 100644 CVE-2024/CVE-2024-111xx/CVE-2024-11130.json create mode 100644 CVE-2024/CVE-2024-23xx/CVE-2024-2315.json create mode 100644 CVE-2024/CVE-2024-336xx/CVE-2024-33658.json create mode 100644 CVE-2024/CVE-2024-336xx/CVE-2024-33660.json create mode 100644 CVE-2024/CVE-2024-373xx/CVE-2024-37365.json create mode 100644 CVE-2024/CVE-2024-392xx/CVE-2024-39281.json create mode 100644 CVE-2024/CVE-2024-424xx/CVE-2024-42442.json create mode 100644 CVE-2024/CVE-2024-434xx/CVE-2024-43415.json create mode 100644 CVE-2024/CVE-2024-452xx/CVE-2024-45289.json create mode 100644 CVE-2024/CVE-2024-475xx/CVE-2024-47535.json create mode 100644 CVE-2024/CVE-2024-479xx/CVE-2024-47905.json create mode 100644 CVE-2024/CVE-2024-479xx/CVE-2024-47906.json create mode 100644 CVE-2024/CVE-2024-479xx/CVE-2024-47907.json create mode 100644 CVE-2024/CVE-2024-479xx/CVE-2024-47909.json create mode 100644 CVE-2024/CVE-2024-503xx/CVE-2024-50317.json create mode 100644 CVE-2024/CVE-2024-503xx/CVE-2024-50318.json create mode 100644 CVE-2024/CVE-2024-503xx/CVE-2024-50319.json create mode 100644 CVE-2024/CVE-2024-503xx/CVE-2024-50320.json create mode 100644 CVE-2024/CVE-2024-503xx/CVE-2024-50321.json create mode 100644 CVE-2024/CVE-2024-503xx/CVE-2024-50322.json create mode 100644 CVE-2024/CVE-2024-503xx/CVE-2024-50323.json create mode 100644 CVE-2024/CVE-2024-503xx/CVE-2024-50324.json create mode 100644 CVE-2024/CVE-2024-503xx/CVE-2024-50326.json create mode 100644 CVE-2024/CVE-2024-503xx/CVE-2024-50327.json create mode 100644 CVE-2024/CVE-2024-503xx/CVE-2024-50328.json create mode 100644 CVE-2024/CVE-2024-503xx/CVE-2024-50329.json create mode 100644 CVE-2024/CVE-2024-503xx/CVE-2024-50330.json create mode 100644 CVE-2024/CVE-2024-503xx/CVE-2024-50331.json create mode 100644 CVE-2024/CVE-2024-503xx/CVE-2024-50386.json create mode 100644 CVE-2024/CVE-2024-515xx/CVE-2024-51562.json create mode 100644 CVE-2024/CVE-2024-515xx/CVE-2024-51563.json create mode 100644 CVE-2024/CVE-2024-515xx/CVE-2024-51564.json create mode 100644 CVE-2024/CVE-2024-515xx/CVE-2024-51565.json create mode 100644 CVE-2024/CVE-2024-515xx/CVE-2024-51566.json create mode 100644 CVE-2024/CVE-2024-522xx/CVE-2024-52296.json create mode 100644 CVE-2024/CVE-2024-522xx/CVE-2024-52297.json create mode 100644 CVE-2024/CVE-2024-80xx/CVE-2024-8074.json create mode 100644 CVE-2024/CVE-2024-84xx/CVE-2024-8495.json create mode 100644 CVE-2024/CVE-2024-94xx/CVE-2024-9420.json diff --git a/CVE-2006/CVE-2006-100xx/CVE-2006-10001.json b/CVE-2006/CVE-2006-100xx/CVE-2006-10001.json index c17a0e8645c..74a048da661 100644 --- a/CVE-2006/CVE-2006-100xx/CVE-2006-10001.json +++ b/CVE-2006/CVE-2006-100xx/CVE-2006-10001.json @@ -2,7 +2,7 @@ "id": "CVE-2006-10001", "sourceIdentifier": "cna@vuldb.com", "published": "2023-03-05T21:15:09.693", - "lastModified": "2024-05-17T00:27:42.883", + "lastModified": "2024-11-12T15:38:25.570", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -101,9 +101,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:pluginmirror:subscribe_to_comments:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:markjaquith:subscribe_to_comments:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "2.0.8", - "matchCriteriaId": "F9526C08-063B-4211-868E-25358D53FFD5" + "matchCriteriaId": "D27DAE94-3644-493F-9CEB-C0347173C41A" } ] } diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31704.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31704.json index efec54c33d3..a93623eb304 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31704.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31704.json @@ -2,8 +2,8 @@ "id": "CVE-2023-31704", "sourceIdentifier": "cve@mitre.org", "published": "2023-07-13T15:15:08.930", - "lastModified": "2023-10-04T15:07:27.313", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-12T15:35:01.787", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -45,6 +45,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0340.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0340.json index 16fdf4fefe8..36621082a47 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0340.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0340.json @@ -2,7 +2,7 @@ "id": "CVE-2024-0340", "sourceIdentifier": "secalert@redhat.com", "published": "2024-01-09T18:15:47.503", - "lastModified": "2024-09-14T00:15:14.997", + "lastModified": "2024-11-12T16:15:19.680", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -133,6 +133,10 @@ "url": "https://access.redhat.com/errata/RHSA-2024:3627", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9315", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-0340", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10315.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10315.json index 592b59ba6a5..c7e359af096 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10315.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10315.json @@ -2,13 +2,13 @@ "id": "CVE-2024-10315", "sourceIdentifier": "security@puppet.com", "published": "2024-11-11T20:15:17.223", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T15:15:06.147", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In Gliffy Online an insecure configuration was discovered in versions before 4.14.0-6" + "value": "In Gliffy Online an insecure configuration was discovered in versions before 4.14.0-6. Reported by Ather Iqbal." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10971.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10971.json new file mode 100644 index 00000000000..cd41dcbe042 --- /dev/null +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10971.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-10971", + "sourceIdentifier": "security@devolutions.net", + "published": "2024-11-12T16:15:19.930", + "lastModified": "2024-11-12T16:15:19.930", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper access control in the Password History feature in Devolutions DVLS 2024.3.7 and earlier allows a malicious authenticated user to obtain sensitive data via faulty permission." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "security@devolutions.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://devolutions.net/security/advisories/DEVO-2024-0015/", + "source": "security@devolutions.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11007.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11007.json new file mode 100644 index 00000000000..1a429c3c35c --- /dev/null +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11007.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-11007", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T16:15:20.050", + "lastModified": "2024-11-12T16:15:20.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Command injection in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote authenticated attacker with admin privileges to achieve remote code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-110xx/CVE-2024-11060.json b/CVE-2024/CVE-2024-110xx/CVE-2024-11060.json index 6fe13413f19..b6c5c7b4b7c 100644 --- a/CVE-2024/CVE-2024-110xx/CVE-2024-11060.json +++ b/CVE-2024/CVE-2024-110xx/CVE-2024-11060.json @@ -2,13 +2,13 @@ "id": "CVE-2024-11060", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-11T01:15:04.233", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T16:15:20.447", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability classified as critical has been found in Jinher Network Collaborative Management Platform ??????????? 1.0. Affected is an unknown function of the file /C6/JHSoft.Web.AcceptAip/AcceptShow.aspx/. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + "value": "A vulnerability classified as critical has been found in Jinher Network Collaborative Management Platform \u91d1\u548c\u6570\u5b57\u5316\u667a\u80fd\u529e\u516c\u5e73\u53f0 1.0. Affected is an unknown function of the file /C6/JHSoft.Web.AcceptAip/AcceptShow.aspx/. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11121.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11121.json index 0c2c97828ac..8b73360a360 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11121.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11121.json @@ -2,13 +2,13 @@ "id": "CVE-2024-11121", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-12T13:15:06.360", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T16:15:20.770", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability classified as critical was found in ???????????? Lingdang CRM up to 8.6.4.3. Affected by this vulnerability is an unknown functionality of the file /crm/WeiXinApp/marketing/index.php?module=Users&action=getActionList. The manipulation of the argument userid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability classified as critical was found in \u4e0a\u6d77\u7075\u5f53\u4fe1\u606f\u79d1\u6280\u6709\u9650\u516c\u53f8 Lingdang CRM up to 8.6.4.3. Affected by this vulnerability is an unknown functionality of the file /crm/WeiXinApp/marketing/index.php?module=Users&action=getActionList. The manipulation of the argument userid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11122.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11122.json index 50d9ff2b86d..9669969d342 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11122.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11122.json @@ -2,13 +2,13 @@ "id": "CVE-2024-11122", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-12T13:15:06.700", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T16:15:20.873", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability, which was classified as critical, has been found in ???????????? Lingdang CRM up to 8.6.4.3. Affected by this issue is some unknown functionality of the file /crm/wechatSession/index.php?msgid=1&operation=upload. The manipulation of the argument file leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability, which was classified as critical, has been found in \u4e0a\u6d77\u7075\u5f53\u4fe1\u606f\u79d1\u6280\u6709\u9650\u516c\u53f8 Lingdang CRM up to 8.6.4.3. Affected by this issue is some unknown functionality of the file /crm/wechatSession/index.php?msgid=1&operation=upload. The manipulation of the argument file leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11123.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11123.json index 4984b164ba3..a4d948d471d 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11123.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11123.json @@ -2,13 +2,13 @@ "id": "CVE-2024-11123", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-12T13:15:06.987", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T16:15:20.990", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A vulnerability, which was classified as problematic, was found in ???????????? Lingdang CRM up to 8.6.4.3. This affects an unknown part of the file /crm/data/pdf.php. The manipulation of the argument url with the input ../config.inc.php leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + "value": "A vulnerability, which was classified as problematic, was found in \u4e0a\u6d77\u7075\u5f53\u4fe1\u606f\u79d1\u6280\u6709\u9650\u516c\u53f8 Lingdang CRM up to 8.6.4.3. This affects an unknown part of the file /crm/data/pdf.php. The manipulation of the argument url with the input ../config.inc.php leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." } ], "metrics": { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11124.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11124.json index 975e97815d7..dae464034bd 100644 --- a/CVE-2024/CVE-2024-111xx/CVE-2024-11124.json +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11124.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11124", "sourceIdentifier": "cna@vuldb.com", "published": "2024-11-12T14:15:16.260", - "lastModified": "2024-11-12T14:15:16.260", - "vulnStatus": "Received", + "lastModified": "2024-11-12T15:48:59.103", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11125.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11125.json new file mode 100644 index 00000000000..1a714c570db --- /dev/null +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11125.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-11125", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-12T15:15:06.347", + "lastModified": "2024-11-12T15:48:59.103", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in GetSimpleCMS 3.3.16 and classified as problematic. This issue affects some unknown processing of the file /admin/profile.php. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.9, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 5.0 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + }, + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Zeynalxan/zero-day/blob/main/GetSimpleCMS-CVE.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.283973", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.283973", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.437090", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11126.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11126.json new file mode 100644 index 00000000000..3cd219f6db6 --- /dev/null +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11126.json @@ -0,0 +1,137 @@ +{ + "id": "CVE-2024-11126", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-12T15:15:06.637", + "lastModified": "2024-11-12T15:48:59.103", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Digistar AG-30 Plus 2.6b. It has been classified as problematic. Affected is an unknown function of the component Login Page. The manipulation leads to improper restriction of excessive authentication attempts. The complexity of an attack is rather high. The exploitability is told to be difficult. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "ADJACENT", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 2.3, + "baseSeverity": "LOW" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:A/AC:H/Au:N/C:P/I:N/A:N", + "accessVector": "ADJACENT_NETWORK", + "accessComplexity": "HIGH", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 1.8 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 3.2, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + }, + { + "lang": "en", + "value": "CWE-799" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.283974", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.283974", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.437096", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11127.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11127.json new file mode 100644 index 00000000000..7a4363b71a8 --- /dev/null +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11127.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2024-11127", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-12T15:15:06.920", + "lastModified": "2024-11-12T15:48:59.103", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Job Recruitment up to 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file admin.php. The manipulation of the argument userid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL", + "baseScore": 6.5 + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/ljllll123/cve/blob/main/sql-1.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.283975", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.283975", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.441841", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11130.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11130.json new file mode 100644 index 00000000000..6e35d594a4d --- /dev/null +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11130.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2024-11130", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-12T15:15:07.243", + "lastModified": "2024-11-12T15:48:59.103", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in ZZCMS up to 2023. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/msg.php. The manipulation of the argument keyword leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.1, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 2.4, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N", + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "MULTIPLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE", + "baseScore": 3.3 + }, + "baseSeverity": "LOW", + "exploitabilityScore": 6.4, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/En0t5/vul/blob/main/zzcms-msg-xss.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.283976", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.283976", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.439699", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-11xx/CVE-2024-1151.json b/CVE-2024/CVE-2024-11xx/CVE-2024-1151.json index bf89c3c476b..5c11ef6597c 100644 --- a/CVE-2024/CVE-2024-11xx/CVE-2024-1151.json +++ b/CVE-2024/CVE-2024-11xx/CVE-2024-1151.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1151", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-11T15:15:07.890", - "lastModified": "2024-09-05T16:15:07.097", + "lastModified": "2024-11-12T16:15:21.213", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -174,6 +174,10 @@ "Issue Tracking" ] }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9315", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-1151", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-222xx/CVE-2024-22257.json b/CVE-2024/CVE-2024-222xx/CVE-2024-22257.json index 9fcab1a416d..b9c264d196c 100644 --- a/CVE-2024/CVE-2024-222xx/CVE-2024-22257.json +++ b/CVE-2024/CVE-2024-222xx/CVE-2024-22257.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22257", "sourceIdentifier": "security@vmware.com", "published": "2024-03-18T15:15:41.790", - "lastModified": "2024-04-19T07:15:09.223", + "lastModified": "2024-11-12T16:35:07.147", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], "references": [ { "url": "https://security.netapp.com/advisory/ntap-20240419-0005/", diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2315.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2315.json new file mode 100644 index 00000000000..9fef0d873f9 --- /dev/null +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2315.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-2315", + "sourceIdentifier": "biossecurity@ami.com", + "published": "2024-11-12T15:15:07.737", + "lastModified": "2024-11-12T16:35:08.840", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "APTIOV contains a vulnerability in BIOS where may cause Improper Access Control by a local attacker. Successful exploitation of this vulnerability may lead to unexpected SPI flash modifications and BIOS boot kit launches, also impacting the availability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "biossecurity@ami.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 6.8, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "biossecurity@ami.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/2024/AMI-SA-2024004.pdf", + "source": "biossecurity@ami.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-281xx/CVE-2024-28162.json b/CVE-2024/CVE-2024-281xx/CVE-2024-28162.json index 01e749b5e92..1dffb8247fc 100644 --- a/CVE-2024/CVE-2024-281xx/CVE-2024-28162.json +++ b/CVE-2024/CVE-2024-281xx/CVE-2024-28162.json @@ -2,7 +2,7 @@ "id": "CVE-2024-28162", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2024-03-06T17:15:11.140", - "lastModified": "2024-05-01T18:15:17.223", + "lastModified": "2024-11-12T16:35:08.007", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En Jenkins Delphix Plugin 3.0.1 a 3.1.0 (ambos inclusive), una opci\u00f3n global para que los administradores habiliten o deshabiliten la validaci\u00f3n de certificados SSL/TLS para conexiones de la Torre de control de datos (DCT) no surte efecto hasta que se reinicia al cambiar de validaci\u00f3n deshabilitada a validaci\u00f3n habilitada." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.6, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/03/06/3", diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31080.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31080.json index 4ce3a7cc0f4..c80921941fb 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31080.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31080.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31080", "sourceIdentifier": "secalert@redhat.com", "published": "2024-04-04T14:15:10.330", - "lastModified": "2024-09-16T19:16:09.680", + "lastModified": "2024-11-12T15:15:07.940", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -104,6 +104,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:3343", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9093", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9122", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-31080", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31081.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31081.json index 5ab8ef98ede..46716311f24 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31081.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31081.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31081", "sourceIdentifier": "secalert@redhat.com", "published": "2024-04-04T14:15:10.593", - "lastModified": "2024-09-16T19:16:09.940", + "lastModified": "2024-11-12T15:15:08.220", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -104,6 +104,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:3343", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9093", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9122", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-31081", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-310xx/CVE-2024-31083.json b/CVE-2024/CVE-2024-310xx/CVE-2024-31083.json index faf92e80d3e..5023d0f4c5c 100644 --- a/CVE-2024/CVE-2024-310xx/CVE-2024-31083.json +++ b/CVE-2024/CVE-2024-310xx/CVE-2024-31083.json @@ -2,7 +2,7 @@ "id": "CVE-2024-31083", "sourceIdentifier": "secalert@redhat.com", "published": "2024-04-05T12:15:37.577", - "lastModified": "2024-09-16T19:16:10.120", + "lastModified": "2024-11-12T15:15:08.420", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -104,6 +104,14 @@ "url": "https://access.redhat.com/errata/RHSA-2024:3343", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9093", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9122", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-31083", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33658.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33658.json new file mode 100644 index 00000000000..489b9ad63af --- /dev/null +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33658.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-33658", + "sourceIdentifier": "biossecurity@ami.com", + "published": "2024-11-12T15:15:08.610", + "lastModified": "2024-11-12T16:35:09.080", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "APTIOV contains a vulnerability in BIOS where an attacker may cause an Improper Restriction of Operations within the Bounds of a Memory Buffer by local. Successful exploitation of this vulnerability may lead to privilege escalation and potentially arbitrary code execution, and impact Integrity." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "biossecurity@ami.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:H/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "biossecurity@ami.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/2024/AMI-SA-2024004.pdf", + "source": "biossecurity@ami.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-336xx/CVE-2024-33660.json b/CVE-2024/CVE-2024-336xx/CVE-2024-33660.json new file mode 100644 index 00000000000..ef4af928046 --- /dev/null +++ b/CVE-2024/CVE-2024-336xx/CVE-2024-33660.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-33660", + "sourceIdentifier": "biossecurity@ami.com", + "published": "2024-11-12T15:15:08.727", + "lastModified": "2024-11-12T16:35:09.330", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An exploit is possible where an actor with physical access can manipulate SPI flash without being detected." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "biossecurity@ami.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 5.2, + "baseSeverity": "MEDIUM" + } + } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 4.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "biossecurity@ami.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-494" + } + ] + } + ], + "references": [ + { + "url": "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/2024/AMI-SA-2024004.pdf", + "source": "biossecurity@ami.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34674.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34674.json index 81d5840145f..c7ed23564f6 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34674.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34674.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34674", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:03.473", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T16:08:56.463", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,592 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F1525232-54F0-467F-9575-2445F73F43B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2E61388E-2542-4198-8BC6-ABB20930F01A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "06092D16-EBD5-489C-81D2-F6E0F922AE7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E070DA79-8F09-4877-BFBA-3F23564DD8C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D80C2C7A-6F48-48B8-ACAD-720FC797F836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "EE03013A-AAB3-4426-BB22-E1487D3B3F6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "57CE2207-ADF3-42F9-83D7-E7C530BDAACF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr_sep-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "EE6DDF76-7C22-4AE7-A84E-431807413952" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDE4D65E-8F9B-4810-AED6-95564A97D741" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0AF1EDA0-2712-4C3C-8D8A-89E154BB63DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6239D93F-CA0E-4120-96A1-FB63276EAEE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "CD382E2D-0B51-4908-989A-88E083FC85BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "61D507C0-086B-4139-A560-126964DFA579" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "57B125ED-D939-4CBC-9E96-BBCF02402A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF85AA7B-E1C7-4946-92B4-E4D545CAACDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B6871BC1-19F4-4F0C-88D8-4000590D8D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9FA72654-2389-4709-BC70-59EC4349A826" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "79C89A24-B07F-43D2-AE83-8F4F03D6C114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E4187BA1-226E-4976-A642-2F6DAE85538E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BFB2B338-5E04-4136-939F-749A3B163656" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C908A5B3-C47B-4DA1-A62F-F8FD77FF960D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C17A088-2CA1-4818-940F-2FEFA881D598" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "1DD187E2-2655-407D-87F9-135A9D45F783" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7EB9C6E-CF84-4E4D-94D8-39233F8EC4DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "ABFE99DC-4495-4D4F-80D4-C29A1D22A9C5" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=11", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34675.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34675.json index f730d5549c2..d300f9b93b1 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34675.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34675.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34675", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:03.643", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T16:08:22.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,222 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7EB9C6E-CF84-4E4D-94D8-39233F8EC4DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "ABFE99DC-4495-4D4F-80D4-C29A1D22A9C5" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=11", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34676.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34676.json index e3eb3c5ad62..43127dd60c7 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34676.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34676.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34676", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:03.820", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T15:31:08.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,592 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F1525232-54F0-467F-9575-2445F73F43B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2E61388E-2542-4198-8BC6-ABB20930F01A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "06092D16-EBD5-489C-81D2-F6E0F922AE7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E070DA79-8F09-4877-BFBA-3F23564DD8C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D80C2C7A-6F48-48B8-ACAD-720FC797F836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "EE03013A-AAB3-4426-BB22-E1487D3B3F6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "57CE2207-ADF3-42F9-83D7-E7C530BDAACF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr_sep-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "EE6DDF76-7C22-4AE7-A84E-431807413952" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDE4D65E-8F9B-4810-AED6-95564A97D741" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0AF1EDA0-2712-4C3C-8D8A-89E154BB63DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6239D93F-CA0E-4120-96A1-FB63276EAEE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "CD382E2D-0B51-4908-989A-88E083FC85BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "61D507C0-086B-4139-A560-126964DFA579" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "57B125ED-D939-4CBC-9E96-BBCF02402A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF85AA7B-E1C7-4946-92B4-E4D545CAACDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B6871BC1-19F4-4F0C-88D8-4000590D8D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9FA72654-2389-4709-BC70-59EC4349A826" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "79C89A24-B07F-43D2-AE83-8F4F03D6C114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E4187BA1-226E-4976-A642-2F6DAE85538E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BFB2B338-5E04-4136-939F-749A3B163656" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C908A5B3-C47B-4DA1-A62F-F8FD77FF960D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C17A088-2CA1-4818-940F-2FEFA881D598" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "1DD187E2-2655-407D-87F9-135A9D45F783" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7EB9C6E-CF84-4E4D-94D8-39233F8EC4DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "ABFE99DC-4495-4D4F-80D4-C29A1D22A9C5" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=11", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34677.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34677.json index e8dc2c0c14f..3e82db2b74b 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34677.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34677.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34677", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:03.980", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T16:07:39.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,592 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F1525232-54F0-467F-9575-2445F73F43B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2E61388E-2542-4198-8BC6-ABB20930F01A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "06092D16-EBD5-489C-81D2-F6E0F922AE7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E070DA79-8F09-4877-BFBA-3F23564DD8C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D80C2C7A-6F48-48B8-ACAD-720FC797F836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "EE03013A-AAB3-4426-BB22-E1487D3B3F6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "57CE2207-ADF3-42F9-83D7-E7C530BDAACF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr_sep-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "EE6DDF76-7C22-4AE7-A84E-431807413952" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDE4D65E-8F9B-4810-AED6-95564A97D741" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0AF1EDA0-2712-4C3C-8D8A-89E154BB63DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6239D93F-CA0E-4120-96A1-FB63276EAEE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "CD382E2D-0B51-4908-989A-88E083FC85BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "61D507C0-086B-4139-A560-126964DFA579" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "57B125ED-D939-4CBC-9E96-BBCF02402A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF85AA7B-E1C7-4946-92B4-E4D545CAACDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B6871BC1-19F4-4F0C-88D8-4000590D8D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9FA72654-2389-4709-BC70-59EC4349A826" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "79C89A24-B07F-43D2-AE83-8F4F03D6C114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E4187BA1-226E-4976-A642-2F6DAE85538E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BFB2B338-5E04-4136-939F-749A3B163656" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C908A5B3-C47B-4DA1-A62F-F8FD77FF960D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C17A088-2CA1-4818-940F-2FEFA881D598" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "1DD187E2-2655-407D-87F9-135A9D45F783" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7EB9C6E-CF84-4E4D-94D8-39233F8EC4DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "ABFE99DC-4495-4D4F-80D4-C29A1D22A9C5" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=11", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34678.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34678.json index 23076757c9f..e49cdfc870a 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34678.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34678.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34678", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:04.153", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T15:30:20.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,592 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F1525232-54F0-467F-9575-2445F73F43B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2E61388E-2542-4198-8BC6-ABB20930F01A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "06092D16-EBD5-489C-81D2-F6E0F922AE7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E070DA79-8F09-4877-BFBA-3F23564DD8C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D80C2C7A-6F48-48B8-ACAD-720FC797F836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "EE03013A-AAB3-4426-BB22-E1487D3B3F6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "57CE2207-ADF3-42F9-83D7-E7C530BDAACF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr_sep-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "EE6DDF76-7C22-4AE7-A84E-431807413952" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDE4D65E-8F9B-4810-AED6-95564A97D741" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0AF1EDA0-2712-4C3C-8D8A-89E154BB63DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6239D93F-CA0E-4120-96A1-FB63276EAEE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "CD382E2D-0B51-4908-989A-88E083FC85BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "61D507C0-086B-4139-A560-126964DFA579" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "57B125ED-D939-4CBC-9E96-BBCF02402A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF85AA7B-E1C7-4946-92B4-E4D545CAACDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B6871BC1-19F4-4F0C-88D8-4000590D8D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9FA72654-2389-4709-BC70-59EC4349A826" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "79C89A24-B07F-43D2-AE83-8F4F03D6C114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E4187BA1-226E-4976-A642-2F6DAE85538E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BFB2B338-5E04-4136-939F-749A3B163656" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C908A5B3-C47B-4DA1-A62F-F8FD77FF960D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C17A088-2CA1-4818-940F-2FEFA881D598" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "1DD187E2-2655-407D-87F9-135A9D45F783" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7EB9C6E-CF84-4E4D-94D8-39233F8EC4DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "ABFE99DC-4495-4D4F-80D4-C29A1D22A9C5" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=11", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34679.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34679.json index 23fee379056..bdf81ee8e1b 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34679.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34679.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34679", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:04.317", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T16:09:28.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,222 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7EB9C6E-CF84-4E4D-94D8-39233F8EC4DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "ABFE99DC-4495-4D4F-80D4-C29A1D22A9C5" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=11", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-346xx/CVE-2024-34680.json b/CVE-2024/CVE-2024-346xx/CVE-2024-34680.json index 72620c76ec3..8ba24691948 100644 --- a/CVE-2024/CVE-2024-346xx/CVE-2024-34680.json +++ b/CVE-2024/CVE-2024-346xx/CVE-2024-34680.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34680", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:04.477", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T16:04:08.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,592 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:-:*:*:*:*:*:*", + "matchCriteriaId": "D757450C-270E-4FB2-A50C-7F769FED558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EC4A2EBA-038B-44D5-84F3-FF326CD1C62D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "40EB3FC1-D79A-40C7-9E2B-573E20780982" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F1525232-54F0-467F-9575-2445F73F43B5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0ABFBBDB-E935-4C54-865A-0E607497DA87" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7B738B6B-78CE-4618-B70D-6BC9ED453105" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2E61388E-2542-4198-8BC6-ABB20930F01A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "3899E3E7-1284-4223-A258-DA691F5D62FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "ECD961EA-6881-4A14-83DE-C6972F6F681C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "18940389-1FBD-48B2-BCF0-1D709C2C3045" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "011CC4F5-6701-41E9-BC7D-CFE6EFF682AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "13E145E2-CE11-4EE5-9085-B4960FE4F52F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B3556856-6F56-465C-8254-BB3CD8252FF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3BBC8B6-1D2B-47C9-93EE-3D3DC43062F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "02600CDD-6862-4146-88E8-A2E73B7ED534" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "2DB353A1-BE96-4FB5-9F4D-0119DC51F24E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "35F40D59-034B-44FB-8DCD-D469B50DE7E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC84021B-9846-40FB-834B-7C5BECEFFEAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "06092D16-EBD5-489C-81D2-F6E0F922AE7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BC3F8572-578B-4D19-9453-1D03DA55EF70" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EEABF42E-578E-4689-B80D-B305467AA72D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E070DA79-8F09-4877-BFBA-3F23564DD8C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9137C66C-4966-4C90-ABE9-7E22F7E29BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E261C9D8-1E74-44B8-9F11-F5769CF8B7FD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D80C2C7A-6F48-48B8-ACAD-720FC797F836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "18CD523B-530E-4187-8BFF-729CDAC69282" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C28D3CD-DD34-4334-B03F-794B31A4BF48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "EE03013A-AAB3-4426-BB22-E1487D3B3F6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "5A81C86D-F1FE-4166-8F37-D7170E6B30FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "A3D80783-523A-455E-B1AD-0961086F79E6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D5EF09DB-023A-40CB-9C94-020172383EEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "89BE2958-0BEE-4CFD-A0BA-494DE62E7F32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5C5B44E9-BA5B-4CFB-8452-B52B6CC833F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-oct-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "57CE2207-ADF3-42F9-83D7-E7C530BDAACF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "B0329C50-B904-480D-8EBB-F2757049FC81" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "E1553CEA-FCF4-4A9C-85FE-F7DB7A500443" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:12.0:smr_sep-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "EE6DDF76-7C22-4AE7-A84E-431807413952" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDE4D65E-8F9B-4810-AED6-95564A97D741" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0AF1EDA0-2712-4C3C-8D8A-89E154BB63DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6239D93F-CA0E-4120-96A1-FB63276EAEE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "CD382E2D-0B51-4908-989A-88E083FC85BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "61D507C0-086B-4139-A560-126964DFA579" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "57B125ED-D939-4CBC-9E96-BBCF02402A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF85AA7B-E1C7-4946-92B4-E4D545CAACDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B6871BC1-19F4-4F0C-88D8-4000590D8D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9FA72654-2389-4709-BC70-59EC4349A826" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "79C89A24-B07F-43D2-AE83-8F4F03D6C114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E4187BA1-226E-4976-A642-2F6DAE85538E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BFB2B338-5E04-4136-939F-749A3B163656" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C908A5B3-C47B-4DA1-A62F-F8FD77FF960D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C17A088-2CA1-4818-940F-2FEFA881D598" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "1DD187E2-2655-407D-87F9-135A9D45F783" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7EB9C6E-CF84-4E4D-94D8-39233F8EC4DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "ABFE99DC-4495-4D4F-80D4-C29A1D22A9C5" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=11", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-354xx/CVE-2024-35419.json b/CVE-2024/CVE-2024-354xx/CVE-2024-35419.json index 1dc7da72e03..b81b1701eb0 100644 --- a/CVE-2024/CVE-2024-354xx/CVE-2024-35419.json +++ b/CVE-2024/CVE-2024-354xx/CVE-2024-35419.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35419", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-08T22:15:15.913", - "lastModified": "2024-11-12T13:56:54.483", + "lastModified": "2024-11-12T16:35:09.570", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que el commit 385e1 de wac conten\u00eda un desbordamiento de pila a trav\u00e9s de la funci\u00f3n load_module en /wac-asan/wa.c. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un archivo wasm manipulado a medida." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/haruki3hhh/8b9e1922083abef33a9024017eb2b9fe", diff --git a/CVE-2024/CVE-2024-354xx/CVE-2024-35421.json b/CVE-2024/CVE-2024-354xx/CVE-2024-35421.json index e4fead621d2..7326f97b5bb 100644 --- a/CVE-2024/CVE-2024-354xx/CVE-2024-35421.json +++ b/CVE-2024/CVE-2024-354xx/CVE-2024-35421.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35421", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-08T22:15:16.090", - "lastModified": "2024-11-12T13:56:54.483", + "lastModified": "2024-11-12T16:35:10.447", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que vmir e8117 conten\u00eda una violaci\u00f3n de segmentaci\u00f3n a trav\u00e9s de la funci\u00f3n wasm_parse_block en /src/vmir_wasm_parser.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/haruki3hhh/318c4e35531f9e3b01df51016ac5c12b", diff --git a/CVE-2024/CVE-2024-354xx/CVE-2024-35422.json b/CVE-2024/CVE-2024-354xx/CVE-2024-35422.json index 88d28420a92..1e038c25865 100644 --- a/CVE-2024/CVE-2024-354xx/CVE-2024-35422.json +++ b/CVE-2024/CVE-2024-354xx/CVE-2024-35422.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35422", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-08T22:15:16.180", - "lastModified": "2024-11-12T13:56:54.483", + "lastModified": "2024-11-12T16:35:14.203", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -16,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/haruki3hhh/21f9ad538db2a98e651cfe34ba4176f3", diff --git a/CVE-2024/CVE-2024-354xx/CVE-2024-35423.json b/CVE-2024/CVE-2024-354xx/CVE-2024-35423.json index f638166c39d..7c3331a96ea 100644 --- a/CVE-2024/CVE-2024-354xx/CVE-2024-35423.json +++ b/CVE-2024/CVE-2024-354xx/CVE-2024-35423.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35423", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-08T22:15:16.257", - "lastModified": "2024-11-12T13:56:54.483", + "lastModified": "2024-11-12T16:35:15.027", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que vmir e8117 conten\u00eda un desbordamiento de b\u00fafer de mont\u00f3n a trav\u00e9s de la funci\u00f3n wasm_parse_section_functions en /src/vmir_wasm_parser.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/haruki3hhh/32fd20583f2008e6b68caaaaf4ecf237", diff --git a/CVE-2024/CVE-2024-354xx/CVE-2024-35424.json b/CVE-2024/CVE-2024-354xx/CVE-2024-35424.json index f8277b1b895..55b1dd1c63a 100644 --- a/CVE-2024/CVE-2024-354xx/CVE-2024-35424.json +++ b/CVE-2024/CVE-2024-354xx/CVE-2024-35424.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35424", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-08T22:15:16.343", - "lastModified": "2024-11-12T13:56:54.483", + "lastModified": "2024-11-12T16:35:15.950", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que vmir e8117 conten\u00eda una violaci\u00f3n de segmentaci\u00f3n a trav\u00e9s de la funci\u00f3n import_function en /src/vmir_wasm_parser.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/haruki3hhh/58fa3df36ca7d0c972c7481cf80ffd80", diff --git a/CVE-2024/CVE-2024-354xx/CVE-2024-35425.json b/CVE-2024/CVE-2024-354xx/CVE-2024-35425.json index 5f7079c3ca6..5bbe7349f01 100644 --- a/CVE-2024/CVE-2024-354xx/CVE-2024-35425.json +++ b/CVE-2024/CVE-2024-354xx/CVE-2024-35425.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35425", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-08T22:15:16.430", - "lastModified": "2024-11-12T13:56:54.483", + "lastModified": "2024-11-12T16:35:16.757", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -16,6 +16,18 @@ } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/haruki3hhh/c64ff6431c71be1b08e15d4ff480ce6b", diff --git a/CVE-2024/CVE-2024-354xx/CVE-2024-35426.json b/CVE-2024/CVE-2024-354xx/CVE-2024-35426.json index 17b05559a03..18d59ddc255 100644 --- a/CVE-2024/CVE-2024-354xx/CVE-2024-35426.json +++ b/CVE-2024/CVE-2024-354xx/CVE-2024-35426.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35426", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-08T23:15:03.580", - "lastModified": "2024-11-12T13:56:54.483", + "lastModified": "2024-11-12T15:35:05.420", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Se descubri\u00f3 que vmir e8117 contiene un desbordamiento de pila a trav\u00e9s de la funci\u00f3n init_local_vars en /src/vmir_wasm_parser.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://gist.github.com/haruki3hhh/9d2a5a139a8b72517009953d0ba7338c", diff --git a/CVE-2024/CVE-2024-354xx/CVE-2024-35427.json b/CVE-2024/CVE-2024-354xx/CVE-2024-35427.json index 20c0575bfd9..cfca3587b8e 100644 --- a/CVE-2024/CVE-2024-354xx/CVE-2024-35427.json +++ b/CVE-2024/CVE-2024-354xx/CVE-2024-35427.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35427", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-08T23:15:03.680", - "lastModified": "2024-11-12T13:56:54.483", + "lastModified": "2024-11-12T15:35:05.710", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que vmir e8117 conten\u00eda una violaci\u00f3n de segmentaci\u00f3n a trav\u00e9s de la funci\u00f3n export_function en /src/vmir_wasm_parser.c." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/haruki3hhh/1edba199c52039791bbcb33a5196c1c3", diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37365.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37365.json new file mode 100644 index 00000000000..a6114f092a2 --- /dev/null +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37365.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2024-37365", + "sourceIdentifier": "PSIRT@rockwellautomation.com", + "published": "2024-11-12T15:15:08.923", + "lastModified": "2024-11-12T15:48:59.103", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A remote code execution vulnerability exists in the affected\nproduct. The vulnerability allows users to save projects within the public\ndirectory allowing anyone with local access to modify and/or delete files. Additionally,\na malicious user could potentially leverage this vulnerability to escalate\ntheir privileges by changing the macro to execute arbitrary code." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 7.0, + "baseSeverity": "HIGH" + } + } + ], + "cvssMetricV31": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.3, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "PSIRT@rockwellautomation.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1709.html", + "source": "PSIRT@rockwellautomation.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-37xx/CVE-2024-3727.json b/CVE-2024/CVE-2024-37xx/CVE-2024-3727.json index 13afc1194bf..48a8ca00d3f 100644 --- a/CVE-2024/CVE-2024-37xx/CVE-2024-3727.json +++ b/CVE-2024/CVE-2024-37xx/CVE-2024-3727.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3727", "sourceIdentifier": "secalert@redhat.com", "published": "2024-05-14T15:42:07.060", - "lastModified": "2024-10-31T05:15:05.160", + "lastModified": "2024-11-12T15:15:09.300", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -128,6 +128,18 @@ "url": "https://access.redhat.com/errata/RHSA-2024:8425", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9097", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9098", + "source": "secalert@redhat.com" + }, + { + "url": "https://access.redhat.com/errata/RHSA-2024:9102", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-3727", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39281.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39281.json new file mode 100644 index 00000000000..3835034702f --- /dev/null +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39281.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-39281", + "sourceIdentifier": "secteam@freebsd.org", + "published": "2024-11-12T15:15:09.203", + "lastModified": "2024-11-12T15:48:59.103", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The command ctl_persistent_reserve_out allows the caller to specify an arbitrary size which will be passed to the kernel's memory allocator." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "secteam@freebsd.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://security.freebsd.org/advisories/FreeBSD-SA-24:18.ctl.asc", + "source": "secteam@freebsd.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42442.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42442.json new file mode 100644 index 00000000000..2d392e46344 --- /dev/null +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42442.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-42442", + "sourceIdentifier": "biossecurity@ami.com", + "published": "2024-11-12T15:15:09.780", + "lastModified": "2024-11-12T15:48:59.103", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "APTIOV contains a vulnerability in the BIOS where a user or attacker may cause an improper restriction of operations within the bounds of a memory buffer over the network. A successful exploitation of this vulnerability may lead to code execution outside of the intended System Management Mode." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "biossecurity@ami.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "biossecurity@ami.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://9443417.fs1.hubspotusercontent-na1.net/hubfs/9443417/Security%20Advisories/2024/AMI-SA-2024004.pdf", + "source": "biossecurity@ami.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43415.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43415.json new file mode 100644 index 00000000000..3b1df548537 --- /dev/null +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43415.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-43415", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-12T16:15:21.800", + "lastModified": "2024-11-12T16:15:21.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An improper neutralization of special elements used in an SQL command in the papertrail/version- model of the decidim_awesome-module <= v0.11.1 (> 0.9.0) allows an authenticated admin user to manipulate sql queries to disclose information, read and write \ufb01les or execute commands." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW", + "baseScore": 9.0, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/decidim-ice/decidim-module-decidim_awesome/commit/84374037d34a3ac80dc18406834169c65869f11b", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/decidim-ice/decidim-module-decidim_awesome/security/advisories/GHSA-cxwf-qc32-375f", + "source": "security-advisories@github.com" + }, + { + "url": "https://pentest.ait.ac.at/security-advisory/decidim-awesome-sql-injection-in-adminaccountability", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43427.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43427.json index ad54496aafe..6927d96a9f8 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43427.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43427.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43427", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-11-11T13:15:03.530", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T15:35:06.950", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304255", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43430.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43430.json index e9a252c4552..95892a8be68 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43430.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43430.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43430", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-11-11T13:15:04.053", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T15:35:07.837", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304258", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43432.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43432.json index 26bf7a65bf0..5aca7fbf7c7 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43432.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43432.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43432", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-11-11T13:15:04.233", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T16:35:17.560", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] + } + ], "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304260", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43433.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43433.json index 2512aa363cf..de78b9af231 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43433.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43433.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43433", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-11-11T13:15:04.410", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T15:35:08.567", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304261", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43435.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43435.json index 2e12e444619..83b2b56e74d 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43435.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43435.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43435", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-11-11T13:15:04.580", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T15:35:09.300", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304263", diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43439.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43439.json index 74b5d678725..cf7a9ea8768 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43439.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43439.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43439", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-11-11T16:15:14.770", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T15:35:10.043", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2304268", diff --git a/CVE-2024/CVE-2024-452xx/CVE-2024-45289.json b/CVE-2024/CVE-2024-452xx/CVE-2024-45289.json new file mode 100644 index 00000000000..a14edf07ba8 --- /dev/null +++ b/CVE-2024/CVE-2024-452xx/CVE-2024-45289.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-45289", + "sourceIdentifier": "secteam@freebsd.org", + "published": "2024-11-12T15:15:10.070", + "lastModified": "2024-11-12T15:48:59.103", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The fetch(3) library uses environment variables for passing certain information, including the revocation file pathname. The environment variable name used by fetch(1) to pass the filename to the library was incorrect, in effect ignoring the option.\n\nFetch would still connect to a host presenting a certificate included in the revocation file passed to the --crl option." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "secteam@freebsd.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-665" + } + ] + } + ], + "references": [ + { + "url": "https://security.freebsd.org/advisories/FreeBSD-SA-24:18.ctl.asc", + "source": "secteam@freebsd.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46891.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46891.json index 8f6f269c9b2..b5df7a05185 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46891.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46891.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46891", "sourceIdentifier": "productcert@siemens.com", "published": "2024-11-12T13:15:09.693", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T15:35:11.240", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -89,6 +89,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46894.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46894.json index e26f558b21f..6664a24cffd 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46894.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46894.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46894", "sourceIdentifier": "productcert@siemens.com", "published": "2024-11-12T13:15:10.193", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T15:35:12.310", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -89,6 +89,16 @@ "value": "CWE-200" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46962.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46962.json index 0b98325baf2..dc958377079 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46962.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46962.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46962", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T21:15:06.437", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T16:35:18.293", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La aplicaci\u00f3n SYQ com.downloader.video.fast (tambi\u00e9n conocida como Master Video Downloader) hasta la versi\u00f3n 2.0 para Android permite a un atacante ejecutar c\u00f3digo JavaScript arbitrario a trav\u00e9s del componente com.downloader.video.fast.SpeedMainAct." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 9.1, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/actuator/com.downloader.video.fast/blob/main/CVE-2024-46962", diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46963.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46963.json index 822351633e5..51ab5b66366 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46963.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46963.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46963", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T21:15:06.493", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T16:35:19.117", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La aplicaci\u00f3n com.superfast.video.downloader (tambi\u00e9n conocida como Super Unlimited Video Downloader - All in One) hasta la versi\u00f3n 5.1.9 para Android permite a un atacante ejecutar c\u00f3digo JavaScript arbitrario a trav\u00e9s del componente com.bluesky.browser.ui.BrowserMainActivity." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/actuator/com.superfast.video.downloader/blob/main/CVE-2024-46963", diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46964.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46964.json index e2374d41682..051e67adab9 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46964.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46964.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46964", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T21:15:06.560", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T16:35:19.933", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La aplicaci\u00f3n com.video.downloader.all (tambi\u00e9n conocida como All Video Downloader) hasta la versi\u00f3n 11.28 para Android permite a un atacante ejecutar c\u00f3digo JavaScript arbitrario a trav\u00e9s del componente com.video.downloader.all.StartActivity." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/actuator/com.video.downloader.all/blob/main/CVE-2024-46964", diff --git a/CVE-2024/CVE-2024-469xx/CVE-2024-46966.json b/CVE-2024/CVE-2024-469xx/CVE-2024-46966.json index 17792d0b927..a737bd0b5cf 100644 --- a/CVE-2024/CVE-2024-469xx/CVE-2024-46966.json +++ b/CVE-2024/CVE-2024-469xx/CVE-2024-46966.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46966", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T21:15:06.620", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T16:35:20.790", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La aplicaci\u00f3n Ikhgur mn.ikhgur.khotoch (tambi\u00e9n conocida como Video Downloader Pro & Browser) hasta la versi\u00f3n 1.0.42 para Android permite a un atacante ejecutar c\u00f3digo JavaScript arbitrario a trav\u00e9s del componente mn.ikhgur.khotoch.MainActivity." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 8.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/actuator/mn.ikhgur.khotoch/blob/main/CVE-2024-46966", diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47535.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47535.json new file mode 100644 index 00000000000..ba9666dbcd3 --- /dev/null +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47535.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-47535", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-12T16:15:22.237", + "lastModified": "2024-11-12T16:15:22.237", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Netty is an asynchronous event-driven network application framework for rapid development of maintainable high performance protocol servers & clients. An unsafe reading of environment file could potentially cause a denial of service in Netty. When loaded on an Windows application, Netty attempts to load a file that does not exist. If an attacker creates such a large file, the Netty application crashes. This vulnerability is fixed in 4.1.115." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/netty/netty/commit/fbf7a704a82e7449b48bd0bbb679f5661c6d61a3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-475xx/CVE-2024-47593.json b/CVE-2024/CVE-2024-475xx/CVE-2024-47593.json index 98417b99608..e19cfc25bac 100644 --- a/CVE-2024/CVE-2024-475xx/CVE-2024-47593.json +++ b/CVE-2024/CVE-2024-475xx/CVE-2024-47593.json @@ -2,7 +2,7 @@ "id": "CVE-2024-47593", "sourceIdentifier": "cna@sap.com", "published": "2024-11-12T01:15:05.480", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T15:35:13.233", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://me.sap.com/notes/3508947", diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47905.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47905.json new file mode 100644 index 00000000000..37eb21ad4a3 --- /dev/null +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47905.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47905", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T16:15:22.473", + "lastModified": "2024-11-12T16:15:22.473", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker with admin privileges to cause a denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47906.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47906.json new file mode 100644 index 00000000000..65135593db3 --- /dev/null +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47906.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-47906", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T16:15:22.670", + "lastModified": "2024-11-12T16:15:22.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Excessive binary privileges in Ivanti Connect Secure which affects versions 22.4R2 through 22.7R2.2 inclusive within the R2 release line and Ivanti Policy Secure before version 22.7R1.2 allow a local authenticated attacker to escalate privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-267" + }, + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47907.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47907.json new file mode 100644 index 00000000000..8ea8bc5e9ba --- /dev/null +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47907.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47907", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T16:15:22.887", + "lastModified": "2024-11-12T16:15:22.887", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A stack-based buffer overflow in IPsec of Ivanti Connect Secure before version 22.7R2.3 allows a remote unauthenticated attacker to cause a denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47909.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47909.json new file mode 100644 index 00000000000..99ce4c9e6b0 --- /dev/null +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47909.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47909", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T16:15:23.080", + "lastModified": "2024-11-12T16:15:23.080", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker with admin privileges to cause a denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 4.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-494xx/CVE-2024-49401.json b/CVE-2024/CVE-2024-494xx/CVE-2024-49401.json index 3660562a638..b80ae2cbb42 100644 --- a/CVE-2024/CVE-2024-494xx/CVE-2024-49401.json +++ b/CVE-2024/CVE-2024-494xx/CVE-2024-49401.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49401", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:04.973", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T16:10:18.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 7.1, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,407 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*", + "matchCriteriaId": "A123EDB1-3048-44B0-8D4D-39A2B24B5F6B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDE4D65E-8F9B-4810-AED6-95564A97D741" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "70825981-F895-4BFD-9B6E-92BFF0D67023" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A5E68B7B-BA08-4E8C-B60A-B3836C6986BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "0AF1EDA0-2712-4C3C-8D8A-89E154BB63DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "88DC0A82-CAF3-4E88-8A4D-8AF79D0C226D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6239D93F-CA0E-4120-96A1-FB63276EAEE8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "CD382E2D-0B51-4908-989A-88E083FC85BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "299284DA-85AB-4162-B858-E67E5C6C14F7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "38B7AB56-AB65-4557-A91C-40CA2FD12351" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "61D507C0-086B-4139-A560-126964DFA579" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "D98F307E-3B01-4C17-86E5-1C6299919417" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "952CA843-7CF0-4424-BDA4-3F2A93E077B6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "57B125ED-D939-4CBC-9E96-BBCF02402A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "7D7DA96D-9C25-4DDA-A6BF-D998AC346B89" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "07AC19C6-D245-4C3A-90CC-A931A901EA0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF85AA7B-E1C7-4946-92B4-E4D545CAACDF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "34114DDC-DCDA-4306-8D23-2E628873171F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "B6871BC1-19F4-4F0C-88D8-4000590D8D5A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9FA72654-2389-4709-BC70-59EC4349A826" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "85E4E8C1-749F-4A1C-8333-6BAFBF8B64D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "E346DCBD-7DEB-464F-B917-8624BE87D646" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "79C89A24-B07F-43D2-AE83-8F4F03D6C114" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "5F73D594-178F-4FC8-9F40-0E545E2647B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "5697984D-08BA-412F-9BDF-26B658B0ADBC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "E4187BA1-226E-4976-A642-2F6DAE85538E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3F3EF3F1-4E54-46E3-A308-69656A29FBD2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "73F22C26-52FC-42A7-B263-0CC7770A8C6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "BFB2B338-5E04-4136-939F-749A3B163656" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "D2B24866-2B3A-4A1A-8B75-EF7A7541797A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3D30C02C-91FB-4D29-AF49-7903158E8FEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "EBB29F18-A929-432B-B20C-365401E6CA12" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "2B6D9064-844B-4D3F-AAE4-D170DF45EF8D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-oct-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C908A5B3-C47B-4DA1-A62F-F8FD77FF960D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4C17A088-2CA1-4818-940F-2FEFA881D598" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "C581B7EE-CD08-4D6E-8858-EA8FA631F84C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:13.0:smr-sep-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "1DD187E2-2655-407D-87F9-135A9D45F783" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7EB9C6E-CF84-4E4D-94D8-39233F8EC4DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "ABFE99DC-4495-4D4F-80D4-C29A1D22A9C5" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=11", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-494xx/CVE-2024-49402.json b/CVE-2024/CVE-2024-494xx/CVE-2024-49402.json index 0034ee80949..8a1279b19a0 100644 --- a/CVE-2024/CVE-2024-494xx/CVE-2024-49402.json +++ b/CVE-2024/CVE-2024-494xx/CVE-2024-49402.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49402", "sourceIdentifier": "mobile.security@samsung.com", "published": "2024-11-06T03:15:05.153", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T15:09:10.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 4.6, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + }, { "source": "mobile.security@samsung.com", "type": "Secondary", @@ -39,10 +59,222 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*", + "matchCriteriaId": "3093F6FE-C562-4F62-97B7-CA0D2DDF9BBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CBFF102-91A9-4BCC-BB43-912896BFCCEA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DAB2A0D7-8F4F-4128-AE09-D2658D793BF7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6A89AE5B-4D1A-4ADA-B572-38B1FC4ED54C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "401980A7-E64A-4773-83EB-C93B50AE0F73" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "CC6E2FC7-2BAF-4C7B-9E0F-D9F844041A35" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "6E12AB0B-728A-4478-B237-78CBAA2A44C5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "0501033A-0D51-41E8-91A9-E72B6EE3F78D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "2A901EFE-90BA-474C-88D2-8A3E7D99C0E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "DF7B3213-520A-49F0-A183-C73A37A56854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "30F706F3-34F6-4D43-AE5E-C202C700A333" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "FD8B9CD3-063E-481E-BE7C-1628ADA71849" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "12C17130-A0C0-49E1-8525-9D65F0275270" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "4FAA7790-A323-4ECA-834E-F19E59C571F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "9CE09EF7-B024-4D79-9400-C8223CDFBB86" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "C339A665-413D-443F-AD04-F71C161235D0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "213AC4D5-3B95-4120-B72D-A9327BADE2BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "3DD61EDA-98ED-4309-B54F-0CF8B7D07DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7DCB465-A0F7-496E-BE45-0B5FA1508D93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6D65C03E-7BC3-491A-8621-A8C93FBA0A69" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "4ECB0B7A-590C-460C-878B-9A78CB37D259" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "D66CF415-6C4A-4AF3-B660-B2E9CF484B51" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "31B5B670-ACDE-4A64-97C5-358D79C65080" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "EAFE015F-8130-4F10-A553-420F0BB2A132" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "141E541B-8FA5-4829-A413-4F1DC19E9AE1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "77CE3494-F7C0-497B-8491-107D31C9A91F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "ACEA385E-3931-4438-A2A9-0357651F9B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "A57CB118-46CC-4CE8-ACC3-A806CD2C25A9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*", + "matchCriteriaId": "84F3023F-E65C-4871-A65A-738EFF64D365" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "6DD1F78D-EA98-4825-A0EA-703196DDE5E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "BDDB3FBE-99EC-4763-961B-2C436D864A1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "1B02110E-71FB-495F-86CA-F2A4E55C0E42" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "931CC6D7-A42D-4482-B901-B539DFF89C3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-oct-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "F7EB9C6E-CF84-4E4D-94D8-39233F8EC4DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*", + "matchCriteriaId": "852A1BEC-438F-4D1E-B361-87BD57D50157" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*", + "matchCriteriaId": "84ED2366-D4BA-4094-94AC-AD6E7AEBB6FF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*", + "matchCriteriaId": "ABFE99DC-4495-4D4F-80D4-C29A1D22A9C5" + } + ] + } + ] + } + ], "references": [ { "url": "https://security.samsungmobile.com/securityUpdate.smsb?year=2024&month=11", - "source": "mobile.security@samsung.com" + "source": "mobile.security@samsung.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50096.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50096.json index c3edfa0d4d1..7f06c3795bb 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50096.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50096.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50096", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T17:15:06.870", - "lastModified": "2024-11-08T16:15:46.477", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T16:16:33.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,35 +15,155 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nouveau/dmem: Se corrige la vulnerabilidad en migrants_to_ram tras un error de copia. La funci\u00f3n `nouveau_dmem_copy_one` garantiza que el comando de copia push se env\u00ede al firmware del dispositivo, pero no rastrea si se ejecut\u00f3 correctamente. En el caso de un error de copia (por ejemplo, fallo del firmware o hardware), el comando de copia push se enviar\u00e1 a trav\u00e9s del canal de firmware y `nouveau_dmem_copy_one` probablemente informar\u00e1 el \u00e9xito, lo que llevar\u00e1 a la funci\u00f3n `migrate_to_ram` a devolver una p\u00e1gina HIGH_USER sucia al usuario. Esto puede resultar en una vulnerabilidad de seguridad, ya que una p\u00e1gina HIGH_USER que puede contener datos confidenciales o da\u00f1ados podr\u00eda devolverse al usuario. Para evitar esta vulnerabilidad, asignamos una p\u00e1gina cero. Por lo tanto, en caso de un error, se devolver\u00e1 al usuario una p\u00e1gina no sucia (cero)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.1", + "versionEndExcluding": "5.4.285", + "matchCriteriaId": "1182B577-D9D7-4DC8-AAA4-C3BCAC9E115C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.227", + "matchCriteriaId": "795A3EE6-0CAB-4409-A903-151C94ACECC0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.168", + "matchCriteriaId": "4D51C05D-455B-4D8D-89E7-A58E140B864C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.113", + "matchCriteriaId": "D01BD22E-ACD1-4618-9D01-6116570BE1EE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.57", + "matchCriteriaId": "05D83DB8-7465-4F88-AFB2-980011992AC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.4", + "matchCriteriaId": "AA84D336-CE9A-4535-B901-1AD77EC17C34" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/614bfb2050982d23d53d0d51c4079dba0437c883", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/697e3ddcf1f8b68bd531fc34eead27c000bdf3e1", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/73f75d2b5aee5a735cf64b8ab4543d5c20dbbdd9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/835745a377a4519decd1a36d6b926e369b3033e2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/8c3de9282dde21ce3c1bf1bde3166a4510547aa9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ab4d113b6718b076046018292f821d5aa4b844f8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fd9bb7e996bab9b9049fffe3f3d3b50dee191d27", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50097.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50097.json index 3fa7585ad02..a94955e32b7 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50097.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50097.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50097", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T17:15:06.937", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T16:18:00.477", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,19 +15,106 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: fec: no guardar el estado de PTP si PTP no es compatible. Algunas plataformas (como i.MX25 e i.MX27) no son compatibles con PTP, por lo que en estas plataformas no se llama a fec_ptp_init() y los miembros relacionados en fep no se inicializan. Sin embargo, se llama a fec_ptp_save_state() de forma incondicional, lo que hace que el kernel entre en p\u00e1nico. Por lo tanto, agregue una condici\u00f3n para que no se llame a fec_ptp_save_state() si PTP no es compatible." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.6.55", + "versionEndExcluding": "6.6.57", + "matchCriteriaId": "4496023C-E162-4DAA-B411-543CFAF178F6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.4", + "matchCriteriaId": "AA84D336-CE9A-4535-B901-1AD77EC17C34" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.10.4", + "versionEndExcluding": "6.11", + "matchCriteriaId": "6D416D9F-373E-4412-A172-24D9BF64DAE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/3192e8d4a1ef9fc9bd7a59cdce51543367e5edd6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/6be063071a457767ee229db13f019c2ec03bfe44", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7745e14f4c036ce94a5eb05d06e49b0d84b306f9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50098.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50098.json index e338ae9f2b4..136d1a0200b 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50098.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50098.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50098", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T18:15:13.620", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T16:25:48.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,23 +15,118 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: ufs: core: Establecer SDEV_OFFLINE cuando se apaga UFS. Hay un historial de interbloqueo si se realiza el reinicio al comienzo del arranque. SDEV_QUIESCE se estableci\u00f3 para todos los scsi_devices de LU por el apagado de UFS, y en ese momento el controlador de audio estaba esperando a blk_mq_submit_bio() sosteniendo un mutex_lock mientras le\u00eda el binario fw. Despu\u00e9s de eso, ocurri\u00f3 un problema de interbloqueo mientras el apagado del controlador de audio estaba esperando mutex_unlock de blk_mq_submit_bio(). Para resolver esto, establezca SDEV_OFFLINE para todas las LU excepto WLUN, de modo que cualquier E/S que se caiga despu\u00e9s de un apagado de UFS devuelva un error. [ 31.907781]I[0: swapper/0: 0] 1 130705007 1651079834 11289729804 0 D( 2) 3 ffffff882e208000 * init [apagado_dispositivo] [ 31.907793]I[0: swapper/0: 0] Mutex: 0xffffff8849a2b8b0: owner[0xffffff882e28cb00 kworker/6:0 :49] [ 31.907806]I[0: swapper/0: 0] Rastreo de llamadas: [ 31.907810]I[0: swapper/0: 0] __switch_to+0x174/0x338 [ 31.907819]I[0: intercambiador/0: 0] __schedule+0x5ec/0x9cc [ 31.907826]I[0: intercambiador/0: 0] schedule+0x7c/0xe8 [ 31.907834]I[0: intercambiador/0: 0] schedule_preempt_disabled+0x24/0x40 [ 31.907842]I[0: intercambiador/0: 0] __mutex_lock+0x408/0xdac [ 31.907849]I[0: intercambiador/0: 0] __mutex_lock_slowpath+0x14/0x24 [ 31.907858]I[0: intercambiador/0: 0] mutex_lock+0x40/0xec [ 31.907866]I[0: intercambiador/0: 0] device_shutdown+0x108/0x280 [ 31.907875]I[0: intercambiador/0: 0] kernel_restart+0x4c/0x11c [ 31.907883]I[0: intercambiador/0: 0] __arm64_sys_reboot+0x15c/0x280 [ 31.907890]I[0: intercambiador/0: 0] invoke_syscall+0x70/0x158 [ 31.907899]I[0: intercambiador/0: 0] el0_svc_common+0xb4/0xf4 [ 31.907909]I[0: intercambiador/0: 0] do_el0_svc+0x2c/0xb0 [ 31.907918]I[0: intercambiador/0: 0] el0_svc+0x34/0xe0 [ 31.907928]I[0: intercambiador/0: 0] el0t_64_sync_handler+0x68/0xb4 [ 31.907937]I[0: intercambiador/0: 0] el0t_64_sync+0x1a0/0x1a4 [ 31.908774]I[0: intercambiador/0: 0] 49 0 11960702 11236868007 0 D( 2) 6 ffffff882e28cb00 * kworker/6:0 [__bio_queue_enter] [ 31.908783]I[0: swapper/0: 0] Rastreo de llamadas: [ 31.908788]I[0: swapper/0: 0] __switch_to+0x174/0x338 [ 31.908796]I[0: swapper/0: 0] __schedule+0x5ec/0x9cc [ 31.908803]I[0: swapper/0: 0] schedule+0x7c/0xe8 [ 31.908811]I[0: swapper/0: 0] __bio_queue_enter+0xb8/0x178 [ 31.908818]I[0: swapper/0: 0] blk_mq_submit_bio+0x194/0x67c [ 31.908827]I[0: intercambiador/0: 0] __submit_bio+0xb8/0x19c" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.14", + "versionEndExcluding": "6.1.114", + "matchCriteriaId": "5EEBC9DD-FA37-4761-9C9C-770A7C51EEC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.58", + "matchCriteriaId": "6B9489BC-825E-4EEE-8D93-F93C801988C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.5", + "matchCriteriaId": "6E62D61A-F704-44DB-A311-17B7534DA7BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/19a198b67767d952c8f3d0cf24eb3100522a8223", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7774d23622416dbbbdb21bf342b3f0d92cf1dc0f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7bd9af254275fad7071d85f04616560deb598d7d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/7de759fceacff5660abf9590d11114215a9d5f3c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50099.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50099.json index a7a69461578..7e70a5def72 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50099.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50099.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50099", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T18:15:13.690", - "lastModified": "2024-11-08T16:15:46.590", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T16:28:30.633", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,39 +15,174 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: arm64: sondas: Eliminar el soporte roto de uprobe LDR (literal). Las funciones simulation_ldr_literal() y simulation_ldrsw_literal() no son seguras para usar con uprobes. Ambas funciones se escribieron originalmente para usar con kprobes y acceder a la memoria con accesos C simples. Cuando se agreg\u00f3 uprobes, se reutilizaron sin modificar a pesar de que no pueden acceder de manera segura a la memoria del usuario. Hay tres problemas clave: 1) Los accesos C simples no tienen entradas extable correspondientes y, por lo tanto, si encuentran un fallo, el kernel los tratar\u00e1 como accesos no intencionales a la memoria del usuario, lo que resultar\u00e1 en un BUG() que matar\u00e1 el hilo del kernel y probablemente conducir\u00e1 a m\u00e1s problemas (por ejemplo, bloqueo o panic()). 2) Los accesos C simples est\u00e1n sujetos a HW PAN y SW PAN, y por lo tanto, cuando cualquiera de ellos est\u00e1 en uso, cualquier intento de simular un acceso a la memoria del usuario fallar\u00e1. Por lo tanto, ni simulation_ldr_literal() ni simulation_ldrsw_literal() pueden hacer nada \u00fatil al simular una instrucci\u00f3n de usuario en cualquier sistema con HW PAN o SW PAN. 3) Los accesos C simples son privilegiados, ya que se ejecutan en el contexto del n\u00facleo y, en la pr\u00e1ctica, pueden acceder a un peque\u00f1o rango de direcciones virtuales del n\u00facleo. Las instrucciones que simulan tienen un rango de +/-1 MiB y, dado que las instrucciones simuladas deben ser instrucciones de usuario en el rango de direcciones TTBR0, estas pueden direccionar el \u00faltimo MiB del rango de direcciones de TTBR1 envolviendo hacia abajo desde una direcci\u00f3n en el primer MiB del rango de direcciones TTBR0. En los n\u00facleos contempor\u00e1neos, los \u00faltimos 8 MiB del rango de direcciones TTBR1 est\u00e1n reservados y los accesos a estos siempre fallar\u00e1n, lo que significa que esto no es peor que (1). Hist\u00f3ricamente, era te\u00f3ricamente posible que el mapa lineal o vmemmap se derramara en los \u00faltimos 8 MiB del rango de direcciones TTBR1, pero en la pr\u00e1ctica esto es extremadamente improbable que ocurra ya que esto requerir\u00eda: * Tener suficiente memoria f\u00edsica para llenar todo el mapa lineal hasta el \u00faltimo 1 MiB del rango de direcciones TTBR1. * Tener mala suerte con la aleatorizaci\u00f3n KASLR del mapa lineal de modo que la regi\u00f3n poblada se superponga con el \u00faltimo 1 MiB del rango de direcciones TTBR. ... y en cualquier caso, si nos desbord\u00e1ramos en la p\u00e1gina final, habr\u00eda problemas m\u00e1s grandes ya que la p\u00e1gina final tendr\u00eda alias con punteros de error. Pr\u00e1cticamente hablando, (1) y (2) son los grandes problemas. Dado que no ha habido informes de problemas desde que se introdujo el c\u00f3digo roto, parece que nadie conf\u00eda en sondear estas instrucciones con uprobes. Evite estos problemas al no permitir uprobes en LDR (literal) y LDRSW (literal), y al limitar el uso de simulation_ldr_literal() y simulation_ldrsw_literal() a kprobes. Los intentos de colocar uprobes en LDR (literal) y LDRSW (literal) ser\u00e1n rechazados ya que arm_probe_decode_insn() devolver\u00e1 INSN_REJECTED. En el futuro, podemos considerar la introducci\u00f3n de compatibilidad con uprobes funcionales para estas instrucciones, pero esto requerir\u00e1 un trabajo m\u00e1s significativo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.10", + "versionEndExcluding": "4.19.323", + "matchCriteriaId": "56700326-E491-4B17-B143-B939C5EC1DBE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.285", + "matchCriteriaId": "B5A89369-320F-47FC-8695-56F61F87E4C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.228", + "matchCriteriaId": "9062315F-AB89-4ABE-8C13-B75927689F66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.169", + "matchCriteriaId": "18BEDAD6-86F8-457C-952F-C35698B3D07F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.114", + "matchCriteriaId": "10FD2B3E-C7D9-4A9C-BD64-41877EDF88EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.58", + "matchCriteriaId": "6B9489BC-825E-4EEE-8D93-F93C801988C8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.5", + "matchCriteriaId": "6E62D61A-F704-44DB-A311-17B7534DA7BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/20cde998315a3d2df08e26079a3ea7501abce6db", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/3728b4eb27910ffedd173018279a970705f2e03a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/9f1e7735474e7457a4d919a517900e46868ae5f6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/acc450aa07099d071b18174c22a1119c57da8227", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ad4bc35a6d22e9ff9b67d0d0c38bce654232f195", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ae743deca78d9e4b7f4f60ad2f95e20e8ea057f9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/bae792617a7e911477f67a3aff850ad4ddf51572", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/cc86f2e9876c8b5300238cec6bf0bd8c842078ee", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50102.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50102.json index d8ee757f0e9..ff51ca4a92a 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50102.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50102.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50102", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T18:15:13.877", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T15:08:00.563", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,95 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86: se soluciona el problema de especulaci\u00f3n no can\u00f3nica de enmascaramiento de direcciones de usuario Resulta que AMD tiene un problema de \"Meltdown Lite(tm)\" con los accesos no can\u00f3nicos en el espacio del kernel. Y entonces, usar solo el bit alto para decidir si un acceso est\u00e1 en el espacio del usuario o en el espacio del kernel termina con la buena y vieja \"filtraci\u00f3n de datos especulativos\" si tienes el gadget correcto usando el resultado: CVE-2020-12965 \"Ejecuci\u00f3n transitoria de accesos no can\u00f3nicos\" Ahora, el kernel rodea el acceso con un par STAC/CLAC, y esas instrucciones terminan serializando la ejecuci\u00f3n en arquitecturas Zen m\u00e1s antiguas, lo que cierra la ventana de especulaci\u00f3n. Pero eso era cierto solo hasta Zen 5, que renombra el bit AC [1]. Eso mejora mucho el rendimiento de STAC/CLAC, pero tambi\u00e9n significa que la ventana de especulaci\u00f3n ahora est\u00e1 abierta. Tenga en cuenta que esto no solo afecta al nuevo enmascaramiento de direcci\u00f3n, sino tambi\u00e9n a la comprobaci\u00f3n regular valid_user_address() utilizada por access_ok() y a la versi\u00f3n asm de la comprobaci\u00f3n del bit de signo en los ayudantes get_user(). No afecta a las variantes put_user() o clear_user(), ya que no hay ning\u00fan resultado especulativo que se pueda utilizar en un gadget para esas operaciones." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.4", + "versionEndExcluding": "6.11.6", + "matchCriteriaId": "DFE3B17B-8A2D-4BE4-AECF-C6853F85CDDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", + "matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/291313693677a345d4f50aae3c68e28b469f601e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/86e6b1547b3d013bc392adf775b89318441403c2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50104.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50104.json index a4a0f2d5a5d..d752d0544e7 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50104.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50104.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50104", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T18:15:13.993", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T15:05:45.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -12,18 +12,98 @@ }, { "lang": "es", - "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: qcom: sdm845: agregar asignaci\u00f3n de flujo de tiempo de ejecuci\u00f3n de Soundwire faltante Durante la migraci\u00f3n de la asignaci\u00f3n de flujo de tiempo de ejecuci\u00f3n de Soundwire desde el controlador Qualcomm Soundwire a los controladores de tarjeta de sonido del SoC, se olvid\u00f3 la tarjeta de sonido sdm845. En este punto, cualquier intento de reproducci\u00f3n o inicio del demonio de audio, por ejemplo en sdm845-db845c (placa Qualcomm RB3), dar\u00e1 como resultado una desreferenciaci\u00f3n del puntero de flujo NULL: No se puede manejar la desreferencia del puntero NULL del n\u00facleo en la direcci\u00f3n virtual 0000000000000020 Informaci\u00f3n de aborto de memoria: ESR = 0x0000000096000004 EC = 0x25: DABT (EL actual), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: error de traducci\u00f3n de nivel 0 Informaci\u00f3n de aborto de datos: ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Superposici\u00f3n = 0, DirtyBit = 0, Xs = 0 usuario pgtable: p\u00e1ginas de 4k, VA de 48 bits, pgdp=0000000101ecf000 [0000000000000020] pgd=0000000000000000, p4d=0000000000000000 Error interno: Oops: 0000000096000004 [#1] PREEMPT M\u00f3dulos SMP vinculados en: ... CPU: 5 UID: 0 PID: 1198 Comm: aplay No contaminado 6.12.0-rc2-qcomlt-arm64-00059-g9d78f315a362-dirty #18 Nombre del hardware: Thundercomm Dragonboard 845c (DT) pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : sdw_stream_add_slave+0x44/0x380 [bus_soundwire] lr : sdw_stream_add_slave+0x44/0x380 [bus_soundwire] sp : ffff80008a2035c0 x29: ffff80008a2035c0 x28: ffff80008a203978 x27: 000000000000000 x26: 00000000000000c0 x25: 0000000000000000 x24: ffff1676025f4800 x23: ffff167600ff1cb8 x22: ffff167600ff1c98 x21: 0000000000000003 x20: ffff167607316000 x19: ffff167604e64e80 x18: 0000000000000000 x17: 0000000000000000 x16: ffffcec265074160 x15: 0000000000000000 x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 x11: 00000000000000000 x10: 0000000000000000 x9 : 0000000000000000 x8 : 0000000000000000 x7 : 0000000000000000 x6 : ffff167600ff1cec x5 : ffffcec22cfa2010 x4 : 0000000000000000 x3 : 0000000000000003 x2 : ffff167613f836c0 x1 : 0000000000000000 x0 : ffff16761feb60b8 Rastreo de llamadas: sdw_stream_add_slave+0x44/0x380 [bus de cable de sonido] wsa881x_hw_params+0x68/0x80 [snd_soc_wsa881x] snd_soc_dai_hw_params+0x3c/0xa4 __soc_pcm_hw_params+0x230/0x660 dpcm_be_dai_hw_params+0x1d0/0x3f8 dpcm_fe_dai_hw_params+0x98/0x268 snd_pcm_hw_params+0x124/0x460 snd_pcm_common_ioctl+0x998/0x16e8 snd_pcm_ioctl+0x34/0x58 __arm64_sys_ioctl+0xac/0xf8 invocar_syscall+0x48/0x104 el0_svc_common.constprop.0+0x40/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x34/0xe0 el0t_64_sync_handler+0x120/0x12c el0t_64_sync+0x190/0x194 C\u00f3digo: aa0403fb f9418400 9100e000 9400102f (f8420f22) ---[ fin de seguimiento 000000000000000 ]--- 0000000000006108 : 6108: d503233f paciasp 610c: a9b97bfd stp x29, x30, [sp, #-112]! 6110: 910003fd movimiento x29, movimiento r\u00e1pido 6114: a90153f3 movimiento r\u00e1pido x19, x20, [movimiento r\u00e1pido, n.\u00b0 16] 6118: a9025bf5 movimiento r\u00e1pido x21, x22, [movimiento r\u00e1pido, n.\u00b0 32] 611c: aa0103f6 movimiento x22, x1 6120: 2a0303f5 movimiento r\u00e1pido w21, w3 6124: a90363f7 movimiento r\u00e1pido x23, x24, [movimiento r\u00e1pido, n.\u00b0 48] 6128: aa0003f8 movimiento r\u00e1pido x24, x0 612c: aa0203f7 movimiento r\u00e1pido x23, x2 6130: a9046bf9 movimiento r\u00e1pido x25, x26, [movimiento r\u00e1pido, n.\u00b0 64] 6134: aa0403f9 mov x25, x4 <-- x4 copiado a x25 6138: a90573fb stp x27, x28, [sp, #80] 613c: aa0403fb mov x27, x4 6140: f9418400 ldr x0, [x0, #776] 6144: 9100e000 agrega x0, x0, #0x38 6148: 94000000 bl 0 614c: f8420f22 ldr x2, [x25, #32]! <-- desplazamiento 0x44 ^^^ Esto es 0x6108 + desplazamiento 0x44 desde el comienzo de sdw_stream_add_slave() donde ocurre la interrupci\u00f3n de datos. Se llama a wsa881x_hw_params() con stream = NULL y se pasa m\u00e1s adelante en el registro x4 (quinto argumento ---truncado---" + "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: qcom: sdm845: agregar asignaci\u00f3n de flujo de tiempo de ejecuci\u00f3n de Soundwire faltante Durante la migraci\u00f3n de la asignaci\u00f3n de flujo de tiempo de ejecuci\u00f3n de Soundwire desde el controlador Qualcomm Soundwire a los controladores de tarjeta de sonido del SoC, se olvid\u00f3 la tarjeta de sonido sdm845. En este punto, cualquier intento de reproducci\u00f3n o inicio del daemon de audio, por ejemplo en sdm845-db845c (placa Qualcomm RB3), dar\u00e1 como resultado una desreferenciaci\u00f3n del puntero de flujo NULL: No se puede manejar la desreferencia del puntero NULL del n\u00facleo en la direcci\u00f3n virtual 0000000000000020 Informaci\u00f3n de aborto de memoria: ESR = 0x0000000096000004 EC = 0x25: DABT (EL actual), IL = 32 bits SET = 0, FnV = 0 EA = 0, S1PTW = 0 FSC = 0x04: error de traducci\u00f3n de nivel 0 Informaci\u00f3n de aborto de datos: ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000 CM = 0, WnR = 0, TnD = 0, TagAccess = 0 GCS = 0, Superposici\u00f3n = 0, DirtyBit = 0, Xs = 0 usuario pgtable: p\u00e1ginas de 4k, VA de 48 bits, pgdp=0000000101ecf000 [0000000000000020] pgd=0000000000000000, p4d=0000000000000000 Error interno: Oops: 0000000096000004 [#1] PREEMPT M\u00f3dulos SMP vinculados en: ... CPU: 5 UID: 0 PID: 1198 Comm: aplay No contaminado 6.12.0-rc2-qcomlt-arm64-00059-g9d78f315a362-dirty #18 Nombre del hardware: Thundercomm Dragonboard 845c (DT) pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--) pc : sdw_stream_add_slave+0x44/0x380 [bus_soundwire] lr : sdw_stream_add_slave+0x44/0x380 [bus_soundwire] sp : ffff80008a2035c0 x29: ffff80008a2035c0 x28: ffff80008a203978 x27: 000000000000000 x26: 00000000000000c0 x25: 0000000000000000 x24: ffff1676025f4800 x23: ffff167600ff1cb8 x22: ffff167600ff1c98 x21: 0000000000000003 x20: ffff167607316000 x19: ffff167604e64e80 x18: 0000000000000000 x17: 0000000000000000 x16: ffffcec265074160 x15: 0000000000000000 x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000 x11: 00000000000000000 x10: 0000000000000000 x9 : 0000000000000000 x8 : 0000000000000000 x7 : 0000000000000000 x6 : ffff167600ff1cec x5 : ffffcec22cfa2010 x4 : 0000000000000000 x3 : 0000000000000003 x2 : ffff167613f836c0 x1 : 0000000000000000 x0 : ffff16761feb60b8 Rastreo de llamadas: sdw_stream_add_slave+0x44/0x380 [bus de cable de sonido] wsa881x_hw_params+0x68/0x80 [snd_soc_wsa881x] snd_soc_dai_hw_params+0x3c/0xa4 __soc_pcm_hw_params+0x230/0x660 dpcm_be_dai_hw_params+0x1d0/0x3f8 dpcm_fe_dai_hw_params+0x98/0x268 snd_pcm_hw_params+0x124/0x460 snd_pcm_common_ioctl+0x998/0x16e8 snd_pcm_ioctl+0x34/0x58 __arm64_sys_ioctl+0xac/0xf8 invocar_syscall+0x48/0x104 el0_svc_common.constprop.0+0x40/0xe0 do_el0_svc+0x1c/0x28 el0_svc+0x34/0xe0 el0t_64_sync_handler+0x120/0x12c el0t_64_sync+0x190/0x194 C\u00f3digo: aa0403fb f9418400 9100e000 9400102f (f8420f22) ---[ fin de seguimiento 000000000000000 ]--- 0000000000006108 : 6108: d503233f paciasp 610c: a9b97bfd stp x29, x30, [sp, #-112]! 6110: 910003fd movimiento x29, movimiento r\u00e1pido 6114: a90153f3 movimiento r\u00e1pido x19, x20, [movimiento r\u00e1pido, n.\u00b0 16] 6118: a9025bf5 movimiento r\u00e1pido x21, x22, [movimiento r\u00e1pido, n.\u00b0 32] 611c: aa0103f6 movimiento x22, x1 6120: 2a0303f5 movimiento r\u00e1pido w21, w3 6124: a90363f7 movimiento r\u00e1pido x23, x24, [movimiento r\u00e1pido, n.\u00b0 48] 6128: aa0003f8 movimiento r\u00e1pido x24, x0 612c: aa0203f7 movimiento r\u00e1pido x23, x2 6130: a9046bf9 movimiento r\u00e1pido x25, x26, [movimiento r\u00e1pido, n.\u00b0 64] 6134: aa0403f9 mov x25, x4 <-- x4 copiado a x25 6138: a90573fb stp x27, x28, [sp, #80] 613c: aa0403fb mov x27, x4 6140: f9418400 ldr x0, [x0, #776] 6144: 9100e000 agrega x0, x0, #0x38 6148: 94000000 bl 0 614c: f8420f22 ldr x2, [x25, #32]! <-- desplazamiento 0x44 ^^^ Esto es 0x6108 + desplazamiento 0x44 desde el comienzo de sdw_stream_add_slave() donde ocurre la interrupci\u00f3n de datos. Se llama a wsa881x_hw_params() con stream = NULL y se pasa m\u00e1s adelante en el registro x4 (quinto argumento ---truncado---" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.11.6", + "matchCriteriaId": "2CAA29A6-36B4-4C90-A862-A816F65153DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", + "matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://git.kernel.org/stable/c/d0e806b0cc6260b59c65e606034a63145169c04c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/fc34d36879f87e5a3813fb66655b8bdb90c7b0d8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50105.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50105.json index d400cb97c82..bab9c8c00d8 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50105.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50105.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50105", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T18:15:14.063", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T15:06:14.500", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,95 @@ "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ASoC: qcom: sc7280: Fix missing Soundwire runtime stream alloc Commit 15c7fab0e047 (\"ASoC: qcom: Move Soundwire runtime stream alloc to soundcards\") movi\u00f3 la asignaci\u00f3n de tiempo de ejecuci\u00f3n de flujo Soundwire del controlador Qualcomm Soundwire al controlador de tarjeta de sonido de cada m\u00e1quina individual, excepto que olvid\u00f3 actualizar la tarjeta SC7280. Al igual que para otras tarjetas de sonido Qualcomm que usan Soundwire, el controlador de la tarjeta debe asignar y liberar el tiempo de ejecuci\u00f3n. De lo contrario, la reproducci\u00f3n de sonido dar\u00e1 como resultado una desreferencia de puntero NULL u otro efecto de accesos a memoria no inicializados (lo que se confirm\u00f3 en SDM845 que ten\u00eda un problema similar)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.8", + "versionEndExcluding": "6.11.6", + "matchCriteriaId": "2CAA29A6-36B4-4C90-A862-A816F65153DB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", + "matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/176a41ebec42a921277cd34e8c0c2e776a9dd6c4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/db7e59e6a39a4d3d54ca8197c796557e6d480b0d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-501xx/CVE-2024-50106.json b/CVE-2024/CVE-2024-501xx/CVE-2024-50106.json index 450520d0237..6d645a476c0 100644 --- a/CVE-2024/CVE-2024-501xx/CVE-2024-50106.json +++ b/CVE-2024/CVE-2024-501xx/CVE-2024-50106.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50106", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T18:15:14.120", - "lastModified": "2024-11-06T18:17:17.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-12T15:07:39.707", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,95 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: nfsd: arregla la ejecuci\u00f3n entre laundromat y free_stateid. Hay una ejecuci\u00f3n entre el manejo de laundromat de delegaciones revocadas y un cliente que env\u00eda la operaci\u00f3n free_stateid. El hilo de laundromat encuentra que la delegaci\u00f3n ha expirado y necesita ser revocada, por lo que marca el stid de delegaci\u00f3n revocado y lo pone en una lista de reaper, pero luego desbloquea el bloqueo de estado y la revocaci\u00f3n de delegaci\u00f3n real ocurre sin el bloqueo. Una vez que el stid est\u00e1 marcado como revocado, un hilo de procesamiento de free_stateid en ejecuci\u00f3n hace lo siguiente: (1) llama a list_del_init() que lo elimina de la lista de reaper y (2) libera la estructura del stid de delegaci\u00f3n. El hilo de laundromat termina sin llamar a la funci\u00f3n revoke_delegation() para esta delegaci\u00f3n en particular, pero eso significa que no liberar\u00e1 la concesi\u00f3n de bloqueo que existe en el archivo. Ahora, una nueva apertura para este archivo llega y termina encontrando que la lista de arrendamientos no est\u00e1 vac\u00eda y llama a nfsd_breaker_owns_lease() que termina intentando desreferenciar un stateid de delegaci\u00f3n liberado. Lo que genera la siguiente advertencia de KASAN de use-after-free: kernel: == ... 2069.0.0.0.0 08/03/2024 n\u00facleo: Seguimiento de llamadas: n\u00facleo: dump_backtrace+0x98/0x120 n\u00facleo: show_stack+0x1c/0x30 n\u00facleo: dump_stack_lvl+0x80/0xe8 n\u00facleo: print_address_description.constprop.0+0x84/0x390 n\u00facleo: print_report+0xa4/0x268 n\u00facleo: kasan_report+0xb4/0xf8 n\u00facleo: __asan_report_load8_noabort+0x1c/0x28 n\u00facleo: nfsd_breaker_owns_lease+0x140/0x160 [nfsd] n\u00facleo: nfsd_file_do_acquire+0xb3c/0x11d0 [nfsd] n\u00facleo: nfsd_file_acquire_opened+0x84/0x110 [nfsd] n\u00facleo: nfs4_get_vfs_file+0x634/0x958 [nfsd] n\u00facleo: nfsd4_process_open2+0xa40/0x1a40 [nfsd] n\u00facleo: nfsd4_open+0xa08/0xe80 [nfsd] n\u00facleo: nfsd4_proc_compound+0xb8c/0x2130 [nfsd] n\u00facleo: nfsd_dispatch+0x22c/0x718 [nfsd] n\u00facleo: svc_process_common+0x8e8/0x1960 [sunrpc] n\u00facleo: svc_process+0x3d4/0x7e0 [sunrpc] n\u00facleo: svc_handle_xprt+0x828/0xe10 [sunrpc] kernel: svc_recv+0x2cc/0x6a8 [sunrpc] kernel: nfsd+0x270/0x400 [nfsd] kernel: kthread+0x288/0x310 kernel: ret_from_fork+0x10/0x20 Este parche propone una soluci\u00f3n basada en agregar 2 nuevos valores de stid adicionales sc_status que ayudan a coordinar entre la lavander\u00eda y otras operaciones (nfsd4_free_stateid() y nfsd4_delegreturn()). Primero, para asegurarse de que una vez que el stid est\u00e9 marcado como revocado, no sea eliminado por nfsd4_free_stateid(), la lavander\u00eda tome una referencia en el stateid. Luego, al coordinar si el stid se ha colocado en la lista cl_revoked o si estamos procesando FREE_STATEID y debemos asegurarnos de eliminarlo de la lista, cada uno verifica ese estado y act\u00faa en consecuencia. Si laundromat ha agregado a la lista cl_revoke antes de la llegada de FREE_STATEID, entonces nfsd4_free_stateid() sabe eliminarlo de la lista. Si nfsd4_free_stateid() encuentra que las operaciones llegaron antes de que laundromat lo haya colocado en la lista cl_revoke, marca el estado como liberado y luego laundromat ya no lo agregar\u00e1 a la lista. Adem\u00e1s, para nfsd4_delegreturn() cuando buscamos el stid especificado, necesitamos acceder a los stid que est\u00e1n marcados como eliminados o liberables, significa que laundromat ha comenzado a procesarlo pero no ha terminado y este delegreturn debe devolver nfserr_deleg_revoked y no nfserr_bad_stateid. Este \u00faltimo no activar\u00e1 un FREE_STATEID y la falta del mismo dejar\u00e1 este stid en la lista cl_revoked indefinidamente." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.17", + "versionEndExcluding": "6.11.6", + "matchCriteriaId": "570099BE-0B19-4950-8FD5-4E24B814E579" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*", + "matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*", + "matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc3:*:*:*:*:*:*", + "matchCriteriaId": "3C95E234-D335-4B6C-96BF-E2CEBD8654ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc4:*:*:*:*:*:*", + "matchCriteriaId": "E0F717D8-3014-4F84-8086-0124B2111379" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/8dd91e8d31febf4d9cca3ae1bb4771d33ae7ee5a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/967faa26f313a62e7bebc55d5b8122eaee43b929", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50317.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50317.json new file mode 100644 index 00000000000..381f64d12e1 --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50317.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-50317", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T16:15:23.347", + "lastModified": "2024-11-12T16:15:23.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A null pointer dereference in Ivanti Avalanche before 6.4.6 allows a remote unauthenticated attacker to cause a denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-Multiple-CVEs-Q4-2024-Release", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50318.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50318.json new file mode 100644 index 00000000000..ffdf41d26cd --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50318.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-50318", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T16:15:23.537", + "lastModified": "2024-11-12T16:15:23.537", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A null pointer dereference in Ivanti Avalanche before 6.4.6 allows a remote unauthenticated attacker to cause a denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-Multiple-CVEs-Q4-2024-Release", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50319.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50319.json new file mode 100644 index 00000000000..ff6b0ceb4d7 --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50319.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-50319", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T16:15:23.713", + "lastModified": "2024-11-12T16:15:23.713", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An infinite loop in Ivanti Avalanche before 6.4.6 allows a remote unauthenticated attacker to cause a denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-Multiple-CVEs-Q4-2024-Release", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50320.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50320.json new file mode 100644 index 00000000000..aa26ac9e933 --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50320.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-50320", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T16:15:23.910", + "lastModified": "2024-11-12T16:15:23.910", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An infinite loop in Ivanti Avalanche before 6.4.6 allows a remote unauthenticated attacker to cause a denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-Multiple-CVEs-Q4-2024-Release", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50321.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50321.json new file mode 100644 index 00000000000..89c3bfe741b --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50321.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-50321", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T16:15:24.100", + "lastModified": "2024-11-12T16:15:24.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An infinite loop in Ivanti Avalanche before 6.4.6 allows a remote unauthenticated attacker to cause a denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-Multiple-CVEs-Q4-2024-Release", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50322.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50322.json new file mode 100644 index 00000000000..1a89502d056 --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50322.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-50322", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T16:15:24.280", + "lastModified": "2024-11-12T16:15:24.280", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update\u00a0allows a local unauthenticated attacker to achieve code execution. User interaction is required." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50323.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50323.json new file mode 100644 index 00000000000..d7450d00d21 --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50323.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-50323", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T16:15:24.473", + "lastModified": "2024-11-12T16:15:24.473", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update\u00a0allows a local unauthenticated attacker to achieve code execution. User interaction is required." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50324.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50324.json new file mode 100644 index 00000000000..7f8f69d03fa --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50324.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-50324", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T16:15:24.653", + "lastModified": "2024-11-12T16:15:24.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update\u00a0allows a remote authenticated attacker with admin privileges to achieve remote code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50326.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50326.json new file mode 100644 index 00000000000..f9eb2352903 --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50326.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-50326", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T16:15:24.840", + "lastModified": "2024-11-12T16:15:24.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update\u00a0allows a remote authenticated attacker with admin privileges to achieve remote code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50327.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50327.json new file mode 100644 index 00000000000..5797093fded --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50327.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-50327", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T16:15:25.023", + "lastModified": "2024-11-12T16:15:25.023", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update\u00a0allows a remote authenticated attacker with admin privileges to achieve remote code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50328.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50328.json new file mode 100644 index 00000000000..f70b43dc0fc --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50328.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-50328", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T16:15:25.207", + "lastModified": "2024-11-12T16:15:25.207", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update\u00a0allows a remote authenticated attacker with admin privileges to achieve remote code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50329.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50329.json new file mode 100644 index 00000000000..fad6b517d6e --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50329.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-50329", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T16:15:25.383", + "lastModified": "2024-11-12T16:15:25.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Path traversal in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update\u00a0allows a remote unauthenticated attacker to achieve remote code execution. User interaction is required." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50330.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50330.json new file mode 100644 index 00000000000..ab147522dcc --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50330.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-50330", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T16:15:25.573", + "lastModified": "2024-11-12T16:15:25.573", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL injection in Ivanti Endpoint Manager before 2024 November Security Update or 2022 SU6 November Security Update\u00a0allows a remote unauthenticated attacker to achieve remote code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-EPM-November-2024-for-EPM-2024-and-EPM-2022", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50331.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50331.json new file mode 100644 index 00000000000..d44c335d747 --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50331.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-50331", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T16:15:25.773", + "lastModified": "2024-11-12T16:15:25.773", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An out-of-bounds read vulnerability in Ivanti Avalanche before 6.4.6 allows a remote unauthenticated attacker to leak sensitive information in memory." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-Multiple-CVEs-Q4-2024-Release", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50386.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50386.json new file mode 100644 index 00000000000..686a7f5ba14 --- /dev/null +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50386.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-50386", + "sourceIdentifier": "security@apache.org", + "published": "2024-11-12T15:15:10.397", + "lastModified": "2024-11-12T15:48:59.103", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Account users in Apache CloudStack by default are allowed to register templates to be downloaded directly to the primary storage for deploying instances. Due to missing validation checks for KVM-compatible templates in CloudStack 4.0.0 through 4.18.2.4 and 4.19.0.0 through 4.19.1.2, an attacker that can register templates, can use them to deploy malicious instances on KVM-based environments and exploit this to gain access to the host filesystems that could result in the compromise of resource integrity and confidentiality, data loss, denial of service, and availability of KVM-based infrastructure managed by CloudStack.\n\n\nUsers are recommended to upgrade to Apache CloudStack 4.18.2.5 or 4.19.1.3, or later, which addresses this issue. \n\nAdditionally, all user-registered KVM-compatible templates can be scanned and checked that they are flat files that should not be using any additional or unnecessary features. For example, operators can run the following command on their file-based primary storage(s) and inspect the output. An empty output for the disk being validated means it has no references to the host filesystems; on the other hand, if the output for the disk being validated is not empty, it might indicate a compromised disk. However, bear in mind that (i) volumes created from templates will have references for the templates at first and (ii) volumes can be consolidated while migrating, losing their references to the templates. Therefore, the command execution for the primary storages can show both false positives and false negatives.\n\n\nfor file in $(find /path/to/storage/ -type f -regex [a-f0-9\\-]*.*); do echo \"Retrieving file [$file] info. If the output is not empty, that might indicate a compromised disk; check it carefully.\"; qemu-img info -U $file | grep file: ; printf \"\\n\\n\"; done\nFor checking the whole template/volume features of each disk, operators can run the following command:\n\n\nfor file in $(find /path/to/storage/ -type f -regex [a-f0-9\\-]*.*); do echo \"Retrieving file [$file] info.\"; qemu-img info -U $file; printf \"\\n\\n\"; done" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@apache.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@apache.org", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://cloudstack.apache.org/blog/security-release-advisory-4.18.2.5-4.19.1.3", + "source": "security@apache.org" + }, + { + "url": "https://lists.apache.org/thread/d0x83c2cyglzzdw8csbop7mj7h83z95y", + "source": "security@apache.org" + }, + { + "url": "https://www.shapeblue.com/shapeblue-security-advisory-apache-cloudstack-security-releases-4-18-2-5-and-4-19-1-3/", + "source": "security@apache.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50601.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50601.json index d1c3819ef63..43a08287838 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50601.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50601.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50601", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T23:15:05.763", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T16:35:22.810", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Las vulnerabilidades XSS persistentes y reflejado en la cookie themeMode y el par\u00e1metro URL _h de Axigen Mail Server hasta la versi\u00f3n 10.5.28 permiten a los atacantes ejecutar c\u00f3digo JavaScript arbitrario. Su explotaci\u00f3n podr\u00eda provocar el secuestro de sesiones, la fuga de datos y una mayor explotaci\u00f3n mediante un ataque de varias etapas. Se corrigi\u00f3 en las versiones 10.3.3.67, 10.4.42 y 10.5.29." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://www.axigen.com/knowledgebase/Axigen-WebMail-Persistent-and-Reflected-XSS-Vulnerabilities-CVE-2024-50601-_403.html", diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51562.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51562.json new file mode 100644 index 00000000000..886f25c5365 --- /dev/null +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51562.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-51562", + "sourceIdentifier": "secteam@freebsd.org", + "published": "2024-11-12T15:15:10.820", + "lastModified": "2024-11-12T15:48:59.103", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The NVMe driver function nvme_opc_get_log_page is vulnerable to a buffer over-read from a guest-controlled value." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "secteam@freebsd.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://security.freebsd.org/advisories/FreeBSD-SA-24:17.bhyve.asc", + "source": "secteam@freebsd.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51563.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51563.json new file mode 100644 index 00000000000..5c4794fe33b --- /dev/null +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51563.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-51563", + "sourceIdentifier": "secteam@freebsd.org", + "published": "2024-11-12T15:15:10.903", + "lastModified": "2024-11-12T15:48:59.103", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The virtio_vq_recordon function is subject to a time-of-check to time-of-use (TOCTOU) race condition." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "secteam@freebsd.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] + } + ], + "references": [ + { + "url": "https://security.freebsd.org/advisories/FreeBSD-SA-24:17.bhyve.asc", + "source": "secteam@freebsd.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51564.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51564.json new file mode 100644 index 00000000000..7bcbc3fd069 --- /dev/null +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51564.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-51564", + "sourceIdentifier": "secteam@freebsd.org", + "published": "2024-11-12T15:15:10.993", + "lastModified": "2024-11-12T15:48:59.103", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A guest can trigger an infinite loop in the hda audio driver." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "secteam@freebsd.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1285" + } + ] + } + ], + "references": [ + { + "url": "https://security.freebsd.org/advisories/FreeBSD-SA-24:17.bhyve.asc", + "source": "secteam@freebsd.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51565.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51565.json new file mode 100644 index 00000000000..34c1b17c56c --- /dev/null +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51565.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-51565", + "sourceIdentifier": "secteam@freebsd.org", + "published": "2024-11-12T15:15:11.083", + "lastModified": "2024-11-12T15:48:59.103", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The hda driver is vulnerable to a buffer over-read from a guest-controlled value." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "secteam@freebsd.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://security.freebsd.org/advisories/FreeBSD-SA-24:17.bhyve.asc", + "source": "secteam@freebsd.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51566.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51566.json new file mode 100644 index 00000000000..af06cc2e0ce --- /dev/null +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51566.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-51566", + "sourceIdentifier": "secteam@freebsd.org", + "published": "2024-11-12T15:15:11.170", + "lastModified": "2024-11-12T15:48:59.103", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The NVMe driver queue processing is vulernable to guest-induced infinite loops." + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "secteam@freebsd.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1285" + } + ] + } + ], + "references": [ + { + "url": "https://security.freebsd.org/advisories/FreeBSD-SA-24:17.bhyve.asc", + "source": "secteam@freebsd.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-522xx/CVE-2024-52296.json b/CVE-2024/CVE-2024-522xx/CVE-2024-52296.json new file mode 100644 index 00000000000..899de44b297 --- /dev/null +++ b/CVE-2024/CVE-2024-522xx/CVE-2024-52296.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-52296", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-12T16:15:26.030", + "lastModified": "2024-11-12T16:15:26.030", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "libosdp is an implementation of IEC 60839-11-5 OSDP (Open Supervised Device Protocol) and provides a C library with support for C++, Rust and Python3. At ospd_common.c, on the osdp_reply_name function, any reply id between REPLY_ACK and REPLY_XRD is valid, but names array do not declare all of the range. On a case of an undefined reply id within the range, name will be null (name = names[reply_id - REPLY_ACK];). Null name will casue a crash on next line: if (name[0] == '\\0') as null[0] is invalid. As this logic is not limited to a secure connection, attacker may trigger this vulnerability without any prior knowledge. This issue is fixed in 2.4.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/goToMain/libosdp/commit/24409e98a260176765956ec766a04cb35984fab1", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/goToMain/libosdp/security/advisories/GHSA-7945-5mcv-f2pp", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-522xx/CVE-2024-52297.json b/CVE-2024/CVE-2024-522xx/CVE-2024-52297.json new file mode 100644 index 00000000000..2fdef2df776 --- /dev/null +++ b/CVE-2024/CVE-2024-522xx/CVE-2024-52297.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-52297", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-12T16:15:26.230", + "lastModified": "2024-11-12T16:15:26.230", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Tolgee is an open-source localization platform. Tolgee 3.81.1 included the all configuration properties in the PublicConfiguratioDTO publicly exposed to users. This vulnerability is fixed in v3.81.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/tolgee/tolgee-platform/pull/2481/files#diff-d16735590f0f2db7cd782e2966fa18426b94b5e4030fa8b1f5e00cd55686fe7f", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/tolgee/tolgee-platform/pull/2689/files", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/tolgee/tolgee-platform/security/advisories/GHSA-3wr3-889v-pgcj", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52533.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52533.json index aa843eaaf65..adc3347de94 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52533.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52533.json @@ -2,7 +2,7 @@ "id": "CVE-2024-52533", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T23:15:05.967", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T16:35:24.297", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "gio/gsocks4aproxy.c en GNOME GLib anterior a 2.82.1 tiene un error de un byte y el consiguiente desbordamiento de b\u00fafer porque SOCKS4_CONN_MSG_LEN no es suficiente para un car\u00e1cter '\\0' final." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3461", diff --git a/CVE-2024/CVE-2024-61xx/CVE-2024-6126.json b/CVE-2024/CVE-2024-61xx/CVE-2024-6126.json index 8e3b9a1be98..ab94d054993 100644 --- a/CVE-2024/CVE-2024-61xx/CVE-2024-6126.json +++ b/CVE-2024/CVE-2024-61xx/CVE-2024-6126.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6126", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-03T15:15:06.470", - "lastModified": "2024-07-05T12:55:51.367", + "lastModified": "2024-11-12T15:15:11.403", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:9325", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-6126", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-65xx/CVE-2024-6501.json b/CVE-2024/CVE-2024-65xx/CVE-2024-6501.json index b8e8957e262..5a45824d77d 100644 --- a/CVE-2024/CVE-2024-65xx/CVE-2024-6501.json +++ b/CVE-2024/CVE-2024-65xx/CVE-2024-6501.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6501", "sourceIdentifier": "secalert@redhat.com", "published": "2024-07-09T20:15:12.470", - "lastModified": "2024-07-11T13:06:13.187", + "lastModified": "2024-11-12T15:15:11.530", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -52,6 +52,10 @@ } ], "references": [ + { + "url": "https://access.redhat.com/errata/RHSA-2024:9317", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-6501", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-66xx/CVE-2024-6604.json b/CVE-2024/CVE-2024-66xx/CVE-2024-6604.json index 28093c858ae..06e70677e7d 100644 --- a/CVE-2024/CVE-2024-66xx/CVE-2024-6604.json +++ b/CVE-2024/CVE-2024-66xx/CVE-2024-6604.json @@ -2,7 +2,7 @@ "id": "CVE-2024-6604", "sourceIdentifier": "security@mozilla.org", "published": "2024-07-09T15:15:12.597", - "lastModified": "2024-07-16T18:15:09.077", + "lastModified": "2024-11-12T16:35:25.143", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Errores de seguridad de la memoria presentes en Firefox 127, Firefox ESR 115.12 y Thunderbird 115.12. Algunos de estos errores mostraron evidencia de corrupci\u00f3n de memoria y suponemos que con suficiente esfuerzo algunos de ellos podr\u00edan haberse aprovechado para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox < 128 y Firefox ESR < 115.13." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1748105%2C1837550%2C1884266", diff --git a/CVE-2024/CVE-2024-80xx/CVE-2024-8074.json b/CVE-2024/CVE-2024-80xx/CVE-2024-8074.json new file mode 100644 index 00000000000..376bb7d434a --- /dev/null +++ b/CVE-2024/CVE-2024-80xx/CVE-2024-8074.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2024-8074", + "sourceIdentifier": "iletisim@usom.gov.tr", + "published": "2024-11-12T15:15:11.673", + "lastModified": "2024-11-12T15:48:59.103", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Privilege Management vulnerability in Nomysoft Informatics Nomysem allows Collect Data as Provided by Users.This issue affects Nomysem: before 13.10.2024." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED", + "baseScore": 9.3, + "baseSeverity": "CRITICAL" + } + } + ] + }, + "weaknesses": [ + { + "source": "iletisim@usom.gov.tr", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://www.usom.gov.tr/bildirim/tr-24-1847", + "source": "iletisim@usom.gov.tr" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-84xx/CVE-2024-8495.json b/CVE-2024/CVE-2024-84xx/CVE-2024-8495.json new file mode 100644 index 00000000000..2478ee300f8 --- /dev/null +++ b/CVE-2024/CVE-2024-84xx/CVE-2024-8495.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-8495", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T16:15:26.560", + "lastModified": "2024-11-12T16:15:26.560", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A null pointer dereference in Ivanti Connect Secure before version 22.7R2.1 and Ivanti Policy Secure before version 22.7R1.1 allows a remote unauthenticated attacker to cause a denial of service." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-94xx/CVE-2024-9420.json b/CVE-2024/CVE-2024-94xx/CVE-2024-9420.json new file mode 100644 index 00000000000..365f0aba3d9 --- /dev/null +++ b/CVE-2024/CVE-2024-94xx/CVE-2024-9420.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-9420", + "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "published": "2024-11-12T16:15:26.760", + "lastModified": "2024-11-12T16:15:26.760", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A use-after-free in Ivanti Connect Secure before version 22.7R2.3 and Ivanti Policy Secure before version 22.7R1.2 allows a remote authenticated attacker to achieve remote code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs", + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9835.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9835.json index e4340182c4f..4848db18e00 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9835.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9835.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9835", "sourceIdentifier": "contact@wpscan.com", "published": "2024-11-12T06:15:04.677", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T15:35:17.853", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento RSS Feed Widget de WordPress anterior a la versi\u00f3n 3.0.1 no escapa al par\u00e1metro $_SERVER['REQUEST_URI'] antes de mostrarlo nuevamente en un atributo, lo que podr\u00eda generar Cross Site Scripting reflejado en navegadores web antiguos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/0277b060-805d-4b85-b5a4-fa93a731cd8d/", diff --git a/CVE-2024/CVE-2024-98xx/CVE-2024-9836.json b/CVE-2024/CVE-2024-98xx/CVE-2024-9836.json index 3f8062b6314..888cae40740 100644 --- a/CVE-2024/CVE-2024-98xx/CVE-2024-9836.json +++ b/CVE-2024/CVE-2024-98xx/CVE-2024-9836.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9836", "sourceIdentifier": "contact@wpscan.com", "published": "2024-11-12T06:15:04.767", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2024-11-12T15:35:18.093", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El complemento RSS Feed Widget de WordPress anterior a la versi\u00f3n 3.0.0 no valida ni escapa algunos de sus atributos de c\u00f3digo corto antes de mostrarlos nuevamente en una p\u00e1gina/publicaci\u00f3n donde est\u00e1 incrustado el c\u00f3digo corto, lo que podr\u00eda permitir a los usuarios con el rol de colaborador y superior realizar ataques de Cross Site Scripting almacenado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 5.9, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/f87af54e-3e58-4c29-8a30-e7d52234c9d4/", diff --git a/README.md b/README.md index 0e279850a9c..bae6d48bdd3 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-12T15:00:38.996511+00:00 +2024-11-12T17:00:23.233250+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-12T14:59:22.600000+00:00 +2024-11-12T16:35:25.143000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -269142 +269186 ``` ### CVEs added in the last Commit -Recently added CVEs: `27` +Recently added CVEs: `44` -- [CVE-2024-11122](CVE-2024/CVE-2024-111xx/CVE-2024-11122.json) (`2024-11-12T13:15:06.700`) -- [CVE-2024-11123](CVE-2024/CVE-2024-111xx/CVE-2024-11123.json) (`2024-11-12T13:15:06.987`) -- [CVE-2024-11124](CVE-2024/CVE-2024-111xx/CVE-2024-11124.json) (`2024-11-12T14:15:16.260`) -- [CVE-2024-29119](CVE-2024/CVE-2024-291xx/CVE-2024-29119.json) (`2024-11-12T13:15:07.263`) -- [CVE-2024-36140](CVE-2024/CVE-2024-361xx/CVE-2024-36140.json) (`2024-11-12T13:15:07.957`) -- [CVE-2024-44102](CVE-2024/CVE-2024-441xx/CVE-2024-44102.json) (`2024-11-12T13:15:08.203`) -- [CVE-2024-46888](CVE-2024/CVE-2024-468xx/CVE-2024-46888.json) (`2024-11-12T13:15:08.927`) -- [CVE-2024-46889](CVE-2024/CVE-2024-468xx/CVE-2024-46889.json) (`2024-11-12T13:15:09.200`) -- [CVE-2024-46890](CVE-2024/CVE-2024-468xx/CVE-2024-46890.json) (`2024-11-12T13:15:09.463`) -- [CVE-2024-46891](CVE-2024/CVE-2024-468xx/CVE-2024-46891.json) (`2024-11-12T13:15:09.693`) -- [CVE-2024-46892](CVE-2024/CVE-2024-468xx/CVE-2024-46892.json) (`2024-11-12T13:15:09.940`) -- [CVE-2024-46894](CVE-2024/CVE-2024-468xx/CVE-2024-46894.json) (`2024-11-12T13:15:10.193`) -- [CVE-2024-47783](CVE-2024/CVE-2024-477xx/CVE-2024-47783.json) (`2024-11-12T13:15:10.433`) -- [CVE-2024-47808](CVE-2024/CVE-2024-478xx/CVE-2024-47808.json) (`2024-11-12T13:15:10.677`) -- [CVE-2024-47940](CVE-2024/CVE-2024-479xx/CVE-2024-47940.json) (`2024-11-12T13:15:10.920`) -- [CVE-2024-47941](CVE-2024/CVE-2024-479xx/CVE-2024-47941.json) (`2024-11-12T13:15:11.167`) -- [CVE-2024-47942](CVE-2024/CVE-2024-479xx/CVE-2024-47942.json) (`2024-11-12T13:15:11.427`) -- [CVE-2024-50310](CVE-2024/CVE-2024-503xx/CVE-2024-50310.json) (`2024-11-12T13:15:11.660`) -- [CVE-2024-50313](CVE-2024/CVE-2024-503xx/CVE-2024-50313.json) (`2024-11-12T13:15:11.910`) -- [CVE-2024-50557](CVE-2024/CVE-2024-505xx/CVE-2024-50557.json) (`2024-11-12T13:15:12.157`) -- [CVE-2024-50558](CVE-2024/CVE-2024-505xx/CVE-2024-50558.json) (`2024-11-12T13:15:12.403`) -- [CVE-2024-50559](CVE-2024/CVE-2024-505xx/CVE-2024-50559.json) (`2024-11-12T13:15:12.653`) -- [CVE-2024-50560](CVE-2024/CVE-2024-505xx/CVE-2024-50560.json) (`2024-11-12T13:15:12.913`) -- [CVE-2024-50561](CVE-2024/CVE-2024-505xx/CVE-2024-50561.json) (`2024-11-12T13:15:13.260`) -- [CVE-2024-50572](CVE-2024/CVE-2024-505xx/CVE-2024-50572.json) (`2024-11-12T13:15:13.503`) +- [CVE-2024-50317](CVE-2024/CVE-2024-503xx/CVE-2024-50317.json) (`2024-11-12T16:15:23.347`) +- [CVE-2024-50318](CVE-2024/CVE-2024-503xx/CVE-2024-50318.json) (`2024-11-12T16:15:23.537`) +- [CVE-2024-50319](CVE-2024/CVE-2024-503xx/CVE-2024-50319.json) (`2024-11-12T16:15:23.713`) +- [CVE-2024-50320](CVE-2024/CVE-2024-503xx/CVE-2024-50320.json) (`2024-11-12T16:15:23.910`) +- [CVE-2024-50321](CVE-2024/CVE-2024-503xx/CVE-2024-50321.json) (`2024-11-12T16:15:24.100`) +- [CVE-2024-50322](CVE-2024/CVE-2024-503xx/CVE-2024-50322.json) (`2024-11-12T16:15:24.280`) +- [CVE-2024-50323](CVE-2024/CVE-2024-503xx/CVE-2024-50323.json) (`2024-11-12T16:15:24.473`) +- [CVE-2024-50324](CVE-2024/CVE-2024-503xx/CVE-2024-50324.json) (`2024-11-12T16:15:24.653`) +- [CVE-2024-50326](CVE-2024/CVE-2024-503xx/CVE-2024-50326.json) (`2024-11-12T16:15:24.840`) +- [CVE-2024-50327](CVE-2024/CVE-2024-503xx/CVE-2024-50327.json) (`2024-11-12T16:15:25.023`) +- [CVE-2024-50328](CVE-2024/CVE-2024-503xx/CVE-2024-50328.json) (`2024-11-12T16:15:25.207`) +- [CVE-2024-50329](CVE-2024/CVE-2024-503xx/CVE-2024-50329.json) (`2024-11-12T16:15:25.383`) +- [CVE-2024-50330](CVE-2024/CVE-2024-503xx/CVE-2024-50330.json) (`2024-11-12T16:15:25.573`) +- [CVE-2024-50331](CVE-2024/CVE-2024-503xx/CVE-2024-50331.json) (`2024-11-12T16:15:25.773`) +- [CVE-2024-50386](CVE-2024/CVE-2024-503xx/CVE-2024-50386.json) (`2024-11-12T15:15:10.397`) +- [CVE-2024-51562](CVE-2024/CVE-2024-515xx/CVE-2024-51562.json) (`2024-11-12T15:15:10.820`) +- [CVE-2024-51563](CVE-2024/CVE-2024-515xx/CVE-2024-51563.json) (`2024-11-12T15:15:10.903`) +- [CVE-2024-51564](CVE-2024/CVE-2024-515xx/CVE-2024-51564.json) (`2024-11-12T15:15:10.993`) +- [CVE-2024-51565](CVE-2024/CVE-2024-515xx/CVE-2024-51565.json) (`2024-11-12T15:15:11.083`) +- [CVE-2024-51566](CVE-2024/CVE-2024-515xx/CVE-2024-51566.json) (`2024-11-12T15:15:11.170`) +- [CVE-2024-52296](CVE-2024/CVE-2024-522xx/CVE-2024-52296.json) (`2024-11-12T16:15:26.030`) +- [CVE-2024-52297](CVE-2024/CVE-2024-522xx/CVE-2024-52297.json) (`2024-11-12T16:15:26.230`) +- [CVE-2024-8074](CVE-2024/CVE-2024-80xx/CVE-2024-8074.json) (`2024-11-12T15:15:11.673`) +- [CVE-2024-8495](CVE-2024/CVE-2024-84xx/CVE-2024-8495.json) (`2024-11-12T16:15:26.560`) +- [CVE-2024-9420](CVE-2024/CVE-2024-94xx/CVE-2024-9420.json) (`2024-11-12T16:15:26.760`) ### CVEs modified in the last Commit -Recently modified CVEs: `424` +Recently modified CVEs: `61` -- [CVE-2024-52350](CVE-2024/CVE-2024-523xx/CVE-2024-52350.json) (`2024-11-12T13:55:21.227`) -- [CVE-2024-52351](CVE-2024/CVE-2024-523xx/CVE-2024-52351.json) (`2024-11-12T13:55:21.227`) -- [CVE-2024-52352](CVE-2024/CVE-2024-523xx/CVE-2024-52352.json) (`2024-11-12T13:55:21.227`) -- [CVE-2024-52353](CVE-2024/CVE-2024-523xx/CVE-2024-52353.json) (`2024-11-12T13:55:21.227`) -- [CVE-2024-52354](CVE-2024/CVE-2024-523xx/CVE-2024-52354.json) (`2024-11-12T13:55:21.227`) -- [CVE-2024-52355](CVE-2024/CVE-2024-523xx/CVE-2024-52355.json) (`2024-11-12T13:55:21.227`) -- [CVE-2024-52356](CVE-2024/CVE-2024-523xx/CVE-2024-52356.json) (`2024-11-12T13:55:21.227`) -- [CVE-2024-52357](CVE-2024/CVE-2024-523xx/CVE-2024-52357.json) (`2024-11-12T13:55:21.227`) -- [CVE-2024-52358](CVE-2024/CVE-2024-523xx/CVE-2024-52358.json) (`2024-11-12T13:55:21.227`) -- [CVE-2024-52530](CVE-2024/CVE-2024-525xx/CVE-2024-52530.json) (`2024-11-12T13:55:21.227`) -- [CVE-2024-52531](CVE-2024/CVE-2024-525xx/CVE-2024-52531.json) (`2024-11-12T13:55:21.227`) -- [CVE-2024-52532](CVE-2024/CVE-2024-525xx/CVE-2024-52532.json) (`2024-11-12T13:55:21.227`) -- [CVE-2024-52533](CVE-2024/CVE-2024-525xx/CVE-2024-52533.json) (`2024-11-12T13:55:21.227`) -- [CVE-2024-8756](CVE-2024/CVE-2024-87xx/CVE-2024-8756.json) (`2024-11-12T13:56:24.513`) -- [CVE-2024-8881](CVE-2024/CVE-2024-88xx/CVE-2024-8881.json) (`2024-11-12T13:55:21.227`) -- [CVE-2024-8882](CVE-2024/CVE-2024-88xx/CVE-2024-8882.json) (`2024-11-12T13:55:21.227`) -- [CVE-2024-8960](CVE-2024/CVE-2024-89xx/CVE-2024-8960.json) (`2024-11-12T13:56:24.513`) -- [CVE-2024-9226](CVE-2024/CVE-2024-92xx/CVE-2024-9226.json) (`2024-11-12T13:56:24.513`) -- [CVE-2024-9262](CVE-2024/CVE-2024-92xx/CVE-2024-9262.json) (`2024-11-12T13:56:24.513`) -- [CVE-2024-9270](CVE-2024/CVE-2024-92xx/CVE-2024-9270.json) (`2024-11-12T13:56:24.513`) -- [CVE-2024-9357](CVE-2024/CVE-2024-93xx/CVE-2024-9357.json) (`2024-11-12T13:55:21.227`) -- [CVE-2024-9775](CVE-2024/CVE-2024-97xx/CVE-2024-9775.json) (`2024-11-12T13:56:24.513`) -- [CVE-2024-9835](CVE-2024/CVE-2024-98xx/CVE-2024-9835.json) (`2024-11-12T13:55:21.227`) -- [CVE-2024-9836](CVE-2024/CVE-2024-98xx/CVE-2024-9836.json) (`2024-11-12T13:55:21.227`) -- [CVE-2024-9874](CVE-2024/CVE-2024-98xx/CVE-2024-9874.json) (`2024-11-12T13:56:24.513`) +- [CVE-2024-43439](CVE-2024/CVE-2024-434xx/CVE-2024-43439.json) (`2024-11-12T15:35:10.043`) +- [CVE-2024-46891](CVE-2024/CVE-2024-468xx/CVE-2024-46891.json) (`2024-11-12T15:35:11.240`) +- [CVE-2024-46894](CVE-2024/CVE-2024-468xx/CVE-2024-46894.json) (`2024-11-12T15:35:12.310`) +- [CVE-2024-46962](CVE-2024/CVE-2024-469xx/CVE-2024-46962.json) (`2024-11-12T16:35:18.293`) +- [CVE-2024-46963](CVE-2024/CVE-2024-469xx/CVE-2024-46963.json) (`2024-11-12T16:35:19.117`) +- [CVE-2024-46964](CVE-2024/CVE-2024-469xx/CVE-2024-46964.json) (`2024-11-12T16:35:19.933`) +- [CVE-2024-46966](CVE-2024/CVE-2024-469xx/CVE-2024-46966.json) (`2024-11-12T16:35:20.790`) +- [CVE-2024-47593](CVE-2024/CVE-2024-475xx/CVE-2024-47593.json) (`2024-11-12T15:35:13.233`) +- [CVE-2024-49401](CVE-2024/CVE-2024-494xx/CVE-2024-49401.json) (`2024-11-12T16:10:18.870`) +- [CVE-2024-49402](CVE-2024/CVE-2024-494xx/CVE-2024-49402.json) (`2024-11-12T15:09:10.890`) +- [CVE-2024-50096](CVE-2024/CVE-2024-500xx/CVE-2024-50096.json) (`2024-11-12T16:16:33.703`) +- [CVE-2024-50097](CVE-2024/CVE-2024-500xx/CVE-2024-50097.json) (`2024-11-12T16:18:00.477`) +- [CVE-2024-50098](CVE-2024/CVE-2024-500xx/CVE-2024-50098.json) (`2024-11-12T16:25:48.717`) +- [CVE-2024-50099](CVE-2024/CVE-2024-500xx/CVE-2024-50099.json) (`2024-11-12T16:28:30.633`) +- [CVE-2024-50102](CVE-2024/CVE-2024-501xx/CVE-2024-50102.json) (`2024-11-12T15:08:00.563`) +- [CVE-2024-50104](CVE-2024/CVE-2024-501xx/CVE-2024-50104.json) (`2024-11-12T15:05:45.587`) +- [CVE-2024-50105](CVE-2024/CVE-2024-501xx/CVE-2024-50105.json) (`2024-11-12T15:06:14.500`) +- [CVE-2024-50106](CVE-2024/CVE-2024-501xx/CVE-2024-50106.json) (`2024-11-12T15:07:39.707`) +- [CVE-2024-50601](CVE-2024/CVE-2024-506xx/CVE-2024-50601.json) (`2024-11-12T16:35:22.810`) +- [CVE-2024-52533](CVE-2024/CVE-2024-525xx/CVE-2024-52533.json) (`2024-11-12T16:35:24.297`) +- [CVE-2024-6126](CVE-2024/CVE-2024-61xx/CVE-2024-6126.json) (`2024-11-12T15:15:11.403`) +- [CVE-2024-6501](CVE-2024/CVE-2024-65xx/CVE-2024-6501.json) (`2024-11-12T15:15:11.530`) +- [CVE-2024-6604](CVE-2024/CVE-2024-66xx/CVE-2024-6604.json) (`2024-11-12T16:35:25.143`) +- [CVE-2024-9835](CVE-2024/CVE-2024-98xx/CVE-2024-9835.json) (`2024-11-12T15:35:17.853`) +- [CVE-2024-9836](CVE-2024/CVE-2024-98xx/CVE-2024-9836.json) (`2024-11-12T15:35:18.093`) ## Download and Usage diff --git a/_state.csv b/_state.csv index d71f5143d4e..f1840ec8d3e 100644 --- a/_state.csv +++ b/_state.csv @@ -16782,7 +16782,7 @@ CVE-2006-0997,0,0,991d701029b8962de39c4a94bce98784b353f47f12613b7b1d1ae4805420a8 CVE-2006-0998,0,0,5fd57cb2bc9c2de0f4e282b8466285f04c809e423b9691776cd038d37136efa8,2020-02-24T14:15:24.557000 CVE-2006-0999,0,0,16b847e2d564d023a5ba02daa1340bf92dcb51abe5a466e5e6b3b577f4ddfaad,2020-02-24T14:15:24.557000 CVE-2006-1000,0,0,a9d1eea525a149e4d5a648e88c4e9e0281df850672f3509f180397c960301e38,2018-10-18T16:30:09.463000 -CVE-2006-10001,0,0,4da5d6c98218a4d85fcbbde01b6525fabd6aaa6e6bcf63cfa3c0927bde4f06aa,2024-05-17T00:27:42.883000 +CVE-2006-10001,0,1,7e2800fe90b96e8d0f2f01ea8e1f31f305d565190689e8a733e018a423e46882,2024-11-12T15:38:25.570000 CVE-2006-1001,0,0,25679361c1c118c54b02e2d8ef37e64d3b286e6df731d4e98b94d5ad1b45f702,2017-10-19T01:29:03.673000 CVE-2006-1002,0,0,a9670ac1711979851f0dcebf2d41a8c2d37bb529ba627a730cb206fcdf1aa052,2018-10-18T16:30:10.150000 CVE-2006-1003,0,0,b81c65081590193e1b5617a72beee75e205be86c7e0fd45cd32e10c4166d5d06,2017-07-20T01:30:14.317000 @@ -145379,11 +145379,11 @@ CVE-2020-1036,0,0,2874076b164573c9efd1f421af714a327548905044a81ef0e8ef1552d41acb CVE-2020-10364,0,0,611ab9368b8f83e21cead790c378447607502fb33a5a29a9f13f245e88a058ce,2021-07-21T11:39:23.747000 CVE-2020-10365,0,0,d3d68b994e9bb439f53a91ee98dcef796959b6dd3c666ec37fae3d2b425582d8,2020-03-27T14:06:01.573000 CVE-2020-10366,0,0,4e2a033e67dfec1f609656013334699a8eb3fc01e5fc13ccd6a347df3aa59246,2020-04-09T13:42:55.633000 -CVE-2020-10367,0,1,d5c0b2bc94828d9e49797050d61767c78043d86cd13fcfa005f6a26e83021f21,2024-11-12T13:55:21.227000 -CVE-2020-10368,0,1,117b0e0cbcc43ebc84d32afcfebfdc395b9bc1f819866463192f66ac7706f618,2024-11-12T13:55:21.227000 -CVE-2020-10369,0,1,dd5a4007e6e83c3c090ed0d7084fc5ce4adb2588c24a3cd80a09d441ce85675a,2024-11-12T13:55:21.227000 +CVE-2020-10367,0,0,d5c0b2bc94828d9e49797050d61767c78043d86cd13fcfa005f6a26e83021f21,2024-11-12T13:55:21.227000 +CVE-2020-10368,0,0,117b0e0cbcc43ebc84d32afcfebfdc395b9bc1f819866463192f66ac7706f618,2024-11-12T13:55:21.227000 +CVE-2020-10369,0,0,dd5a4007e6e83c3c090ed0d7084fc5ce4adb2588c24a3cd80a09d441ce85675a,2024-11-12T13:55:21.227000 CVE-2020-1037,0,0,37b1f612d83cc30e182161b72b7dc2b33f54db0b1459846101bbe7832ab961da,2021-07-21T11:39:23.747000 -CVE-2020-10370,0,1,87a9fc1e81d9cf0f587d0be9933b7749c33d2f87fc425f3532bae1abe12eb056,2024-11-12T13:55:21.227000 +CVE-2020-10370,0,0,87a9fc1e81d9cf0f587d0be9933b7749c33d2f87fc425f3532bae1abe12eb056,2024-11-12T13:55:21.227000 CVE-2020-10372,0,0,057fe8c3886242ba4743ee0731c1b3e91bd8fbd5a9e094cfadb7ecd7f966e658,2020-03-12T18:43:14.093000 CVE-2020-10374,0,0,e0f5cf824a69e15c19ce778116ec2d478043887f56c7a9bb00a2741bd484b3e6,2020-06-25T16:15:11.720000 CVE-2020-10375,0,0,15c11a13974b4c046916cbe154b2872bf5997eee5295d16adb96c2f3f2d2a322,2021-07-21T11:39:23.747000 @@ -178528,7 +178528,7 @@ CVE-2021-35465,0,0,4b40f2b45af9ec0164fa72705921db5f1b77a62d6ff8c449d4a17854ab8ac CVE-2021-35469,0,0,a587ed95e25d1382ac367eee42f15573c5a79c9cdd594adf12a01139af795092,2021-07-19T14:06:16.277000 CVE-2021-3547,0,0,f595c8015d8baa6bd1a62ebce3408c6f420d2e86a4376e57a05473047d1168aa,2022-10-27T12:22:43.533000 CVE-2021-35472,0,0,e466d5ad2f2a80b4ba0e1bfa2a33c254e082505f4937060ee5dd54bad8c013c8,2021-08-11T15:31:21.203000 -CVE-2021-35473,0,1,11258f32600bdb5626167f146df98e0d66ad0b5cdf9f467c47d430acfb1cc9c0,2024-11-12T13:55:21.227000 +CVE-2021-35473,0,0,11258f32600bdb5626167f146df98e0d66ad0b5cdf9f467c47d430acfb1cc9c0,2024-11-12T13:55:21.227000 CVE-2021-35474,0,0,d630b5060f1559d9408d5370a1905ba3c16c56cadbdc14d4b0bbc392332371f9,2021-09-20T18:54:54.040000 CVE-2021-35475,0,0,263c975acc88e371a5a2ff65ef4308846de5257ff3719c93490216d8f0c3a54d,2021-07-01T16:02:54.013000 CVE-2021-35477,0,0,71b9e463e20f82dabd3fd53dbc939aa60018a38659174e658a66faf9b8626d08,2023-11-07T03:36:31.740000 @@ -183321,7 +183321,7 @@ CVE-2021-41731,0,0,e6e3ae708cb53c3ee174f23b1c9f4a781449f711c97fa0c8a78a607f5ef8f CVE-2021-41732,0,0,897f66499ebbed068f851fa966a737d858d6beb30b12d36d7461474c03f754d1,2024-08-04T04:15:52.463000 CVE-2021-41733,0,0,a725fec9a1a6247805745405c4a02baf8d225a69ff70ff07765035ffd0080b34,2021-11-09T19:59:21.390000 CVE-2021-41736,0,0,af26875a9ac9429f2e98dd9f2c1bc5ec136a44a22f31c345a4e9732b67f1d317,2022-03-28T20:52:06.847000 -CVE-2021-41737,0,1,4441ff8a2931b31b2fdc48253354b5899414760495ca059735a1c0812c2da3b3,2024-11-12T13:55:21.227000 +CVE-2021-41737,0,0,4441ff8a2931b31b2fdc48253354b5899414760495ca059735a1c0812c2da3b3,2024-11-12T13:55:21.227000 CVE-2021-41738,0,0,5ecef1922584bd33f22d216a7c0c4a032a1a7e6d0f93421920e97565f6d61230,2023-11-07T03:38:59.843000 CVE-2021-41739,0,0,88e08a7f86585fea82594e389c7305bb5b0e4ea5e959031890111bbec15040ea,2023-11-07T03:38:59.903000 CVE-2021-41744,0,0,27671c50c8426c0fa11c45ec2325d871ef966a0ab3e64e276e305da6188796d4,2021-10-28T19:19:48.443000 @@ -224084,7 +224084,7 @@ CVE-2023-31700,0,0,55e8a67e547de58edc83863583088b7362c3c2fa6d5f8582aa8d36b490106 CVE-2023-31701,0,0,d63fbecac8e262cc76ed273c8132ef0d79d7e143b88fec57d71788e6825ebb69,2023-05-25T17:34:40.853000 CVE-2023-31702,0,0,f7af9bcb4c9a7182fbaffa7cc96f74428f05a6fc0545f4bc2c6318439862a0dd,2023-05-25T15:51:23.433000 CVE-2023-31703,0,0,591fd3e3042cdf3c19c72eb6418bb489ed8c7011a923c7a635ed02e14e495d69,2023-05-25T15:52:01.867000 -CVE-2023-31704,0,0,08fdd7d0465386540f14b48b69ca21c1ebb29ff8c81f45ddb5fd011fd9041679,2023-10-04T15:07:27.313000 +CVE-2023-31704,0,1,686c9882f786a66722828faffe0ec71d7336f3573d82f79c0e2eeb4f492dda77,2024-11-12T15:35:01.787000 CVE-2023-31705,0,0,ffa75e05045f456e7986ff2d26b923ff5ab765c8ce5479909998ed938e1804d0,2023-07-21T13:56:35.257000 CVE-2023-31707,0,0,b5bbdead45a6ce250c04fea60370d5652db3d0a66e9beb6667046ee5667bc03a,2023-05-26T02:06:14.377000 CVE-2023-31708,0,0,ee9e40f7a9a7688cc0cae519557ebd4be27d8368b4f0aff05f5c5c00e641c471,2023-05-27T03:39:56.307000 @@ -224980,7 +224980,7 @@ CVE-2023-32731,0,0,f5b20cd935470deab085f6c111e8d1950272a743476be1c8555a474bd86c5 CVE-2023-32732,0,0,18024f5bb1af130f4639e890b5bb0ff3bff0accb6ce1fd7b108d3b0ffc49d810,2023-08-02T16:43:16.320000 CVE-2023-32734,0,0,f1661076c61a5a855e53aea466d6c60c5da25ac1a542ddb53ebd1d4fbe55ac5c,2023-08-03T17:03:51.680000 CVE-2023-32735,0,0,46c9e2e385c269980b06016014f93f645437f023a043b2a218140ad0f7528e8b,2024-07-09T18:19:14.047000 -CVE-2023-32736,1,1,d8bb25771ff9569f0fd9f4069f18d6bd82d1ff9327697ff690ccbc35aa58d0c5,2024-11-12T13:55:21.227000 +CVE-2023-32736,0,0,d8bb25771ff9569f0fd9f4069f18d6bd82d1ff9327697ff690ccbc35aa58d0c5,2024-11-12T13:55:21.227000 CVE-2023-32737,0,0,639a513d18a19466fc46aac8e036051176772ee3ce845037d06e2e12fedaad6e,2024-07-09T18:19:14.047000 CVE-2023-32738,0,0,1513637e01ba4ec82dc12e26194f5e5ba30ed452358b49aecba033927b2a5a11,2023-11-07T15:07:59.987000 CVE-2023-32739,0,0,b0b50f13029564abdf98290f22d7ba79d7ee2f715337a013c9888df672ebfa1d,2023-11-15T18:53:54.840000 @@ -230827,7 +230827,7 @@ CVE-2023-40453,0,0,130c1ba245794699f114636eda3c5cf90574ba5b46bd6a704fe406b89dec0 CVE-2023-40454,0,0,c10b12346537ef1e5c8787b1e2fe9d4cb45cf0b585647c357d5bb525587ce317,2023-11-07T04:20:15.070000 CVE-2023-40455,0,0,058abdb8c2eae30e165ec5b264dbf295ba8e09c6c3830c69886965016a5de75b,2023-10-12T02:29:35.947000 CVE-2023-40456,0,0,7169803686183a5f1d426b39f88228ec6dce3691ab53bc177c949c7a8fd9efca,2023-11-07T04:20:15.193000 -CVE-2023-40457,0,1,8edfd8dabc5faeea08709e6458f97126e7a4aaabc2aa16ca1e65d28feaaa5413,2024-11-12T13:55:21.227000 +CVE-2023-40457,0,0,8edfd8dabc5faeea08709e6458f97126e7a4aaabc2aa16ca1e65d28feaaa5413,2024-11-12T13:55:21.227000 CVE-2023-40458,0,0,79a445a17e1f85e1f6c9345cf6a43d9301aed3a647416fbf1fc2770253362cdc,2023-12-05T01:55:09.410000 CVE-2023-40459,0,0,72958d07cda00b0c6d4ae1b61eff24e072a6de9dcd7e9245179ab8da7c7dd63d,2023-12-08T15:47:51.637000 CVE-2023-4046,0,0,74357e4a22d4d6aa6afa8fb2beea6097492a98a519070e944818d05926f858bb,2024-10-22T16:35:14.267000 @@ -234891,7 +234891,7 @@ CVE-2023-46277,0,0,be6fe4d0b7cb70dd6214423a62fcfe115996bdd636e939e24cf7a25f94904 CVE-2023-46278,0,0,283a5f4d3b1f995039a2ae4f0ff4efe94da460721819375532b8f8104a5b1ff6,2023-11-08T23:22:08.177000 CVE-2023-46279,0,0,cad5cbf92c67be5e79c0f7d5a9fbe732104c543f1cf9a464893a67bc498495cf,2023-12-19T17:40:49.427000 CVE-2023-4628,0,0,9dd80f318e00bb6d35ea5e4f6175e104ad476846cbe758532913d6d17d532560,2024-03-12T12:40:13.500000 -CVE-2023-46280,0,1,2342bd16e52e4a1e6b8b6f03113ca2ee2e48f16d0ae45a510b9bfc780dc4d494,2024-11-12T13:15:05.960000 +CVE-2023-46280,0,0,2342bd16e52e4a1e6b8b6f03113ca2ee2e48f16d0ae45a510b9bfc780dc4d494,2024-11-12T13:15:05.960000 CVE-2023-46281,0,0,9e42d11f6e44c68ffa995cada1abff96d1cb7f7ad10f82a0b722d5cacfd60b73,2024-10-08T09:15:09.133000 CVE-2023-46282,0,0,f4d05dc2bb1859eaf46348465b22815a02beeb115bddd8ce8cb8d563024f8e04,2024-10-08T09:15:09.323000 CVE-2023-46283,0,0,be6dc8aece8c2be89e9f46d04539c09aa93d6ddf8cc93d640545f5b056809e56,2024-10-08T09:15:09.543000 @@ -236906,7 +236906,7 @@ CVE-2023-49060,0,0,0f125d0d07dbe270a6f07b57aa641d1848f31c22fb855ca4bf11b4d5b4ef2 CVE-2023-49061,0,0,dc7136ec78ed5cf0b1889d9e499076dc7861b57a74e858b10a634425002df41f,2023-11-28T19:45:33.650000 CVE-2023-49062,0,0,1d72476c88fb45368b58247aec1688b0093de275b1093249720b62193de89ed0,2023-12-04T19:46:20.953000 CVE-2023-49068,0,0,182c6949abe2a827480e4301e5ed188cb126ad03424cd6905a2140b6a730140b,2023-12-01T13:53:23.050000 -CVE-2023-49069,0,1,2af3cf1f0bb18e0323d97165a5ea9d30a5b5e8bc0ae00d03dae2483c49c53c91,2024-11-12T13:15:06.193000 +CVE-2023-49069,0,0,2af3cf1f0bb18e0323d97165a5ea9d30a5b5e8bc0ae00d03dae2483c49c53c91,2024-11-12T13:15:06.193000 CVE-2023-4907,0,0,ee7fec7a11df58ff005b9b63ad49a50bb70f5f4e575258375cd0f49a03cc2ad7,2024-01-31T17:15:17.750000 CVE-2023-49070,0,0,631766166232ba486ccd48cb00f4afe564eec8aa0b473067715b1f04d1a8cd4e,2023-12-29T18:15:39.103000 CVE-2023-49073,0,0,2a69c4407ae45adf60baf11d8aa993141dc3f78b1f8dc71c70987fff6214c4d6,2024-07-11T16:00:30.427000 @@ -241776,7 +241776,7 @@ CVE-2024-0335,0,0,e7e090fd097a40a14fdf48dd790743e7f5ab16f43bcf6eb22bfc1b29fd2377 CVE-2024-0336,0,0,9aee920f4a5a0c04ff35e8f707096c50efb4022bceb3480b4da076fedf257149,2024-06-03T14:46:24.250000 CVE-2024-0337,0,0,eee1079f39054de873ab2c1c61df1366e60a284dc7a482cc04bc23b2010b4529,2024-08-01T19:35:09.993000 CVE-2024-0338,0,0,70505a995548ae9a90a762e5c254ec8226f91c5690ecf3e95b0138eb38a5ec9e,2024-02-09T19:28:45.703000 -CVE-2024-0340,0,0,a4c5b2e3707afec748747b5f6f8f5e97b8d64e53be42216b212bd107258f19c3,2024-09-14T00:15:14.997000 +CVE-2024-0340,0,1,996747747a825f6540395b86a93d1d8a405914bded56f64225ddee7d9a560594,2024-11-12T16:15:19.680000 CVE-2024-0341,0,0,680923dff3cdc70d6ba9942573970086160b44b5db51b08f3c7252eed19e3791,2024-05-17T02:34:31.867000 CVE-2024-0342,0,0,46f8abddb1e51abb54c2a39d052de05423c1c2cc780aa2f6e5037ced9e262617,2024-05-17T02:34:31.980000 CVE-2024-0343,0,0,48a93e50e1ffec89cf65602aeae3fcdcb44ff23036051f47bac49d0ff25b3cd2,2024-05-17T02:34:32.080000 @@ -242511,7 +242511,7 @@ CVE-2024-10170,0,0,43858dc94e553ea996e2f62171c2a07580bf4384f9d10283ecd355d244289 CVE-2024-10171,0,0,6def7c486839e6a93365a9531b31890798e7138f9c8ee651ff23d937de5aea60,2024-10-21T21:33:26.937000 CVE-2024-10173,0,0,a9b223ad26342bae0ecb573e6f6a805ec316d304fdef819b8c7ff56b9edef74b,2024-10-22T17:05:13.483000 CVE-2024-10176,0,0,142987a8f419783b163ba6354525e6bb8e3054620537017112986773c0d037e4,2024-10-25T12:56:07.750000 -CVE-2024-10179,0,1,b6f906bf2251f6ec1278434f5e59f81c6d3b24bc371546ed64bbf189a1c8b783,2024-11-12T13:55:21.227000 +CVE-2024-10179,0,0,b6f906bf2251f6ec1278434f5e59f81c6d3b24bc371546ed64bbf189a1c8b783,2024-11-12T13:55:21.227000 CVE-2024-1018,0,0,6a41753bbb9bddfdeb27e8da1aa301f604399583ccfe73ec2b7c0e024f66f45f,2024-05-17T02:35:10.733000 CVE-2024-10180,0,0,eeda8a52eb376af37ac54d80ec17aa95c78c556dda331af160350bff0915b632,2024-10-25T12:56:07.750000 CVE-2024-10181,0,0,1545b5e92aab580204c085811e002ea8b0b09666646d30a334a87ed0d4fa275c,2024-10-29T14:34:04.427000 @@ -242552,12 +242552,12 @@ CVE-2024-10233,0,0,ae75a6902cbd361dba7f0db59261b7e58fb8ced87e17031187e0bfd405b07 CVE-2024-10234,0,0,29441fe4cd8bfbe6b6cb2ad55d7c2d2c9161b1369f9e713c11aec1dfec3e0850,2024-10-30T18:50:59.883000 CVE-2024-1024,0,0,d47b3d3840cd70db883d335219cea52b6b4fa0e3fdfc3f4d41efc4b833dff6a1,2024-05-17T02:35:11.210000 CVE-2024-10241,0,0,ae512d639185a0ae3de570db96ee11e8b4269e6da724c94a52e42eddaeb0b4fe,2024-10-29T14:34:04.427000 -CVE-2024-10245,0,1,a0531404f8e42b22ebf8edf706088f8f3bbff70573c99f5feaf6c300487731f6,2024-11-12T13:55:21.227000 +CVE-2024-10245,0,0,a0531404f8e42b22ebf8edf706088f8f3bbff70573c99f5feaf6c300487731f6,2024-11-12T13:55:21.227000 CVE-2024-10250,0,0,8accb693817c35c7e4f9fa710076ead819720d8653e5052fbeeec31b3a5b47d2,2024-10-25T16:37:32.777000 CVE-2024-1026,0,0,e127bb5d00442b36eed0e6ff6513a3a42c45706876a3a5f2167365447fb898e7,2024-05-17T02:35:11.320000 -CVE-2024-10261,0,1,c0bacd51f8c13c6f93273b74702fb7ce7659bc324c7b90c6cfb500b131b8dd02,2024-11-12T13:56:24.513000 +CVE-2024-10261,0,0,c0bacd51f8c13c6f93273b74702fb7ce7659bc324c7b90c6cfb500b131b8dd02,2024-11-12T13:56:24.513000 CVE-2024-10263,0,0,d8274159492686a2b3c754959bfc4509f9c9201a502006a3dee5515647626798,2024-11-08T15:59:41.633000 -CVE-2024-10265,0,1,ad4b5b30e90a17d26886c85885da0a35f71b763cdca55a0b0e1529b2cdb299ef,2024-11-12T13:55:21.227000 +CVE-2024-10265,0,0,ad4b5b30e90a17d26886c85885da0a35f71b763cdca55a0b0e1529b2cdb299ef,2024-11-12T13:55:21.227000 CVE-2024-10266,0,0,c93db2a67de792a64ad3b8f3ae10accf6f21ac600e94cc18aca994ed95268502,2024-10-29T14:34:04.427000 CVE-2024-10269,0,0,52654717b4b93a8e333771abfdcd93e402d393cb11d01db52c12e8f4aa3192bf,2024-11-08T19:01:03.880000 CVE-2024-1027,0,0,7cdd04f65f65ce162dee4b0e860b968e4c1a6b7f21d53e978519c8259363a858,2024-05-17T02:35:11.427000 @@ -242570,8 +242570,8 @@ CVE-2024-10280,0,0,80d3551a7846d386eaa7773e34e82873be79fb4129972791d3d9c2f22c644 CVE-2024-10281,0,0,96f941de80b9e6605dd27180456ff1a7884752f0502e3b6d50c69f446bf67663,2024-11-01T13:52:35.563000 CVE-2024-10282,0,0,00a985d7bfb96134d31159304cf531d6c0061ffb90897fa0ead3d7b798d22c38,2024-11-01T13:47:10.087000 CVE-2024-10283,0,0,52cb15e61a200ef7bcb75d4f7f5106c86faddcdb0e96de607271f9f7dfc5b3d7,2024-11-01T14:08:24.997000 -CVE-2024-10284,0,1,ba451d45ec30e7a0f6f214a9ef86485f07257a6ce37a5892a15ba032f80df1c7,2024-11-12T13:56:54.483000 -CVE-2024-10285,0,1,bdd74cc498994590f687666d400df58aea1de84946f64b9324e2fe1795f2f4c2,2024-11-12T13:56:54.483000 +CVE-2024-10284,0,0,ba451d45ec30e7a0f6f214a9ef86485f07257a6ce37a5892a15ba032f80df1c7,2024-11-12T13:56:54.483000 +CVE-2024-10285,0,0,bdd74cc498994590f687666d400df58aea1de84946f64b9324e2fe1795f2f4c2,2024-11-12T13:56:54.483000 CVE-2024-10286,0,0,00d08dc008bd1989e54b5705c1beff1950aa6f43f0a4065f0f61313516d3cdf8,2024-10-24T04:08:14.833000 CVE-2024-10287,0,0,f35de541a09293478313fb52f4e207e82b325b3fc6432429ed8850f6465c2bda,2024-10-24T04:07:33.057000 CVE-2024-10288,0,0,fd731f2fa655e977394860f265053908b8d125d4076d3124439c81d187b95c3b,2024-10-24T04:07:45.110000 @@ -242581,7 +242581,7 @@ CVE-2024-10290,0,0,554c14bf86d2356052ac39788fb0ad56602d77a74cd88f42cb8fe953fecea CVE-2024-10291,0,0,8507b4447fcd8fcc7aa118a709f5691fbd662f3c7fbb1d55694140494fcc8310,2024-10-30T13:23:47.827000 CVE-2024-10292,0,0,426a6dd878f8fed452ebd6448d3edb5b732c219a4b0073be487941c8e5287eea,2024-10-30T13:40:07.353000 CVE-2024-10293,0,0,8e56039c8372aa88e5dabe6a523be86aef575434b11facd48a467e1a8dc36c3c,2024-10-30T13:37:27.067000 -CVE-2024-10294,0,1,1b99472d33f6f1fc7f70454bad88416e61c161d950e3cf9ec9b9496f776484d4,2024-11-12T13:56:54.483000 +CVE-2024-10294,0,0,1b99472d33f6f1fc7f70454bad88416e61c161d950e3cf9ec9b9496f776484d4,2024-11-12T13:56:54.483000 CVE-2024-10295,0,0,6652cb1ba0fbcf79be2ce93900852a2eaa83c004fb3d256848ed837ee1d41cf1,2024-11-04T23:15:03.773000 CVE-2024-10296,0,0,a167e288d770dbaf1b2cdb5a1f53629a1025f7402c7add21139cd0e6f9a1db2d,2024-10-30T15:13:18.077000 CVE-2024-10297,0,0,7059e1e2bb8cf8e51a328b566020cbc23abd446f188f444527bfee9442b2adad,2024-10-25T12:56:36.827000 @@ -242594,12 +242594,12 @@ CVE-2024-1031,0,0,6576162a78ac686f55e5931a6b8f02ff6c7312ac04792581e6d78da8a91700 CVE-2024-10310,0,0,3b0decb54117e1f6369f0c8a49822eb1c6d4be5cb40b8b5a9079fd842cd0c653,2024-11-04T13:06:20.190000 CVE-2024-10312,0,0,d10f0012149342545ee317e492eeaf284c6b634b254526457f270c7ce4937a16,2024-10-29T14:34:04.427000 CVE-2024-10313,0,0,0a692e743da8a6f5929e9a5e61a16c962249b9fbffffedea4a154098bf7390c0,2024-10-25T12:56:07.750000 -CVE-2024-10314,0,1,4ff424a08f54d46f95f43c7d51534e0e6342cc7a5b817ec1e4e580680bb1c702,2024-11-12T13:55:21.227000 -CVE-2024-10315,0,1,4e957b80a07aed5049f4c1554ad24b5db32362cfa58b51a8613fc66932ec4b62,2024-11-12T13:55:21.227000 +CVE-2024-10314,0,0,4ff424a08f54d46f95f43c7d51534e0e6342cc7a5b817ec1e4e580680bb1c702,2024-11-12T13:55:21.227000 +CVE-2024-10315,0,1,eceb96083ee1121320d8024fa3cfb5eb813c348987001d9bdcf2a127c724f9d0,2024-11-12T15:15:06.147000 CVE-2024-10318,0,0,c9c0b32165e110789e705dc55263c8f26a928f9dce25281896f08d394c1b97f7,2024-11-08T19:51:49.380000 CVE-2024-10319,0,0,521a2584bb331a8cf29df932b8069e068af4d281b03c20cc06073eb127cb6582,2024-11-08T15:25:16.317000 CVE-2024-1032,0,0,06925fc416f8ceea7fb895efc2e3f765d4f064c5150968a9409448741aa1fb78,2024-05-17T02:35:11.947000 -CVE-2024-10323,0,1,05fb05b5af6eb70332696a9f115bfe34c070859ec6fbc1a30ebcb9ed7138d926,2024-11-12T13:55:21.227000 +CVE-2024-10323,0,0,05fb05b5af6eb70332696a9f115bfe34c070859ec6fbc1a30ebcb9ed7138d926,2024-11-12T13:55:21.227000 CVE-2024-10325,0,0,c6f88079ac22a9091bf71035663ec83de5617fab99af997896d6ec6bdca8a204,2024-11-08T19:01:03.880000 CVE-2024-10327,0,0,5a1546502e73211d148718e818d15cec9bc5841df26bde254740ef77c9d65b28,2024-10-25T12:56:07.750000 CVE-2024-10329,0,0,aa7a42ea4cf0e5f5abf4a60b69d94b5c2177a6fa12ec61ac3de40c80882e4efd,2024-11-08T15:59:16.407000 @@ -242615,14 +242615,14 @@ CVE-2024-10340,0,0,86c71b5cd9d3256a3a96f0206fa643848ca73015f559230bc3985df65e9e3 CVE-2024-10341,0,0,cee111fac6415e06ee00d7cd99c9382c566a15f39228a22e729de830098b01dd,2024-11-05T17:51:44.597000 CVE-2024-10342,0,0,a674c6499a8c6205c44b5186f38cedfb618a6a3a28286164189d9d013947c529,2024-11-05T17:52:00.610000 CVE-2024-10343,0,0,4101b5a530cab96c4e2ed3f7591bd8e9e62c4ce861db441511cf50880ecd2465,2024-10-25T12:56:07.750000 -CVE-2024-10344,0,1,8d72050142bd52cfda406dc866a711842cc70b12971d6dbf2411282f0f803700,2024-11-12T13:55:21.227000 -CVE-2024-10345,0,1,1c4c3dff9b7af9ef5d58c5e1c42f508a1d10aa845e8fbae73ed2ffa788a852d0,2024-11-12T13:55:21.227000 +CVE-2024-10344,0,0,8d72050142bd52cfda406dc866a711842cc70b12971d6dbf2411282f0f803700,2024-11-12T13:55:21.227000 +CVE-2024-10345,0,0,1c4c3dff9b7af9ef5d58c5e1c42f508a1d10aa845e8fbae73ed2ffa788a852d0,2024-11-12T13:55:21.227000 CVE-2024-10348,0,0,96d66129081e4ce98aabfda8de19f87e27a10e041aba21213984895d9fd39e79,2024-10-30T13:03:48.520000 CVE-2024-10349,0,0,8d5c3da9bdcdc8f86a503a14ddc6c01f002b6d511310d252a1bc3bc26cccbea1,2024-10-30T13:14:01.303000 CVE-2024-1035,0,0,792864ab2b0f8151b262ffe209c5f075ae9ac530a32ee5bddc4609b3d7d6306a,2024-05-17T02:35:12.253000 CVE-2024-10350,0,0,1eff377645f31addadbf2a414de92964c33d8decf15f763410afce73538f2275,2024-10-30T14:29:55.480000 CVE-2024-10351,0,0,d96465bc197904e1c8467ab1c779dca90857f09f2fd46dfb7e44741dfd94bb7e,2024-11-01T16:15:23.800000 -CVE-2024-10352,0,1,5ede8dcfd141c5222be083226ccdc2e9b9d9055843e6b4b1063e607877370fcd,2024-11-12T13:56:24.513000 +CVE-2024-10352,0,0,5ede8dcfd141c5222be083226ccdc2e9b9d9055843e6b4b1063e607877370fcd,2024-11-12T13:56:24.513000 CVE-2024-10353,0,0,e06260810ab2f8d83e8148f12eacebfdfa4f171568dc8f755f0a84d5679240e8,2024-10-30T16:21:35.113000 CVE-2024-10354,0,0,b93bbc475560ddb322fc6987c8bb9a496754455b51c6de71617d975e234845da,2024-10-30T16:32:48.453000 CVE-2024-10355,0,0,2602c2076153349e7adf5f2683fe39bdc0cb3abdcbf15a26de13daaf9ad9d066,2024-10-30T17:13:02.417000 @@ -242714,7 +242714,7 @@ CVE-2024-10467,0,0,0959022357cf258f2ec15616b199ed6d5c4a5ce20fc70e0ac2b4b4ceaa1b9 CVE-2024-10468,0,0,83bc1c79b32264405aab0075e1e410144135f8ec245c6acd9a90fb3cdcacdf08,2024-11-04T13:29:23.937000 CVE-2024-10469,0,0,c023e9dfb8e38961747979c6b3a11e6b64f49a167ced1df26b660ad57b7e9425,2024-11-05T16:51:35.450000 CVE-2024-1047,0,0,9e4259d94ff11bf1ad41662d7bc4dfa8d24742c305a04d1b6bfc3e99b49e569b,2024-02-08T14:20:23.387000 -CVE-2024-10470,0,1,a1e42a94b1ab92bb172948d5f556160411eda471cfe55f94496fa89ac969feb5,2024-11-12T13:56:24.513000 +CVE-2024-10470,0,0,a1e42a94b1ab92bb172948d5f556160411eda471cfe55f94496fa89ac969feb5,2024-11-12T13:56:24.513000 CVE-2024-10474,0,0,e927def1f3fd2126e99e660d96adf5a931edb32585de89bb5c57d9d2e8d1c817,2024-11-04T13:34:48.513000 CVE-2024-10477,0,0,ec5d3377a9eba885093e83f0ffc2c5214a9fc83d05d2bcf419cfa0429899b307,2024-10-29T14:34:04.427000 CVE-2024-10478,0,0,a63bf38a8bfa46322ffe79a3260a2e62e4168a517fb088dc75202387c0a46091,2024-10-29T14:34:04.427000 @@ -242732,7 +242732,7 @@ CVE-2024-10503,0,0,5901dbd83c85c212a435232844f46b142c9818a62915d94d4bf7f6af2043e CVE-2024-10505,0,0,c2e4dc18acc74e5271db8cb3e15214f9dd0d0109f9bfb244eed546322fc7a27b,2024-11-06T16:38:28.750000 CVE-2024-10506,0,0,0939772e626263a52337b63c636fa0ed508985935d55c41e4bf2e3b45cb2569c,2024-11-05T16:22:39.830000 CVE-2024-10507,0,0,f18494a65f96198598cd9275318405539a3d8636ddbe0a37967ba2288eae01ea,2024-11-05T16:23:56.073000 -CVE-2024-10508,0,1,af9f95e5d7d630b3cf33e7ae9f2d3118be1f7da09e31e6491ee65e4e58c1137c,2024-11-12T13:56:24.513000 +CVE-2024-10508,0,0,af9f95e5d7d630b3cf33e7ae9f2d3118be1f7da09e31e6491ee65e4e58c1137c,2024-11-12T13:56:24.513000 CVE-2024-10509,0,0,a9d05e50f1563ceed5339878fa8c2329eea9e28284f4c0c86984d14b77803f94,2024-11-01T20:52:15.573000 CVE-2024-1051,0,0,301df872c002365b13eaea34d02a8084366516306d472e0b862c9b6067f5d33d,2024-04-01T01:12:59.077000 CVE-2024-1052,0,0,2826dc83bebd9032f48348a63ffd25025c2a6126abd483892ed79004a77aef0f,2024-02-15T18:49:40.180000 @@ -242741,13 +242741,13 @@ CVE-2024-10525,0,0,cfad79154f466fe96736eabfa65cac8f6409e21deb7f07d79c02c68ee3f19 CVE-2024-10526,0,0,0fa46d8ccf5c219359a0535980da66887fa2b5cd7efbd75d68b15fd2b882e15b,2024-11-08T19:01:03.880000 CVE-2024-1053,0,0,3d9e5b8218feb39348551f4e96f20fbacd04f2b39830165bb00a553a3d3c5ccf,2024-02-22T19:07:27.197000 CVE-2024-10535,0,0,14a566633b856f0bcfd07185d246772590c919ba8cb5a244786d38adaffa8830,2024-11-08T21:19:27.540000 -CVE-2024-10538,0,1,4ab251483fb21027e3e4f8d5203aec3b7b19274377f176e91d194b41d48f7f4e,2024-11-12T13:55:21.227000 +CVE-2024-10538,0,0,4ab251483fb21027e3e4f8d5203aec3b7b19274377f176e91d194b41d48f7f4e,2024-11-12T13:55:21.227000 CVE-2024-1054,0,0,f8e7e53b5707aaecdfe1ea6fba53413ba04bed5cdf673762252b510775f984b1,2024-02-29T13:49:29.390000 CVE-2024-10540,0,0,d72994b8ce256d6087bbd8c05a3cb9446a5f50c733a3ad70b615c2d8dd4c3c0c,2024-11-04T13:18:27.017000 CVE-2024-10543,0,0,78e6de226aa4ccb5cb5b260268ce156b234621147350989dafddd9817bf9323e,2024-11-08T21:19:02.700000 CVE-2024-10544,0,0,d84fa7aeaabdc2cfe5861efef74c5b30022ed51487865228c56366868169c4d7,2024-11-01T12:57:03.417000 CVE-2024-10546,0,0,fe7c4bb80388357d2012de9abcf9bdb2510a4d8644b958f5e63299c9a417e4c8,2024-11-01T12:57:03.417000 -CVE-2024-10547,0,1,dd2ca02968fac3313f4dd9066814c9e75a14176f7b83142b042cd18e8be62972,2024-11-12T13:56:24.513000 +CVE-2024-10547,0,0,dd2ca02968fac3313f4dd9066814c9e75a14176f7b83142b042cd18e8be62972,2024-11-12T13:56:24.513000 CVE-2024-1055,0,0,ccc78f7d4bd63bcc448b5e62f7789de0e1a26ab036272b89eca521cba41a35e3,2024-02-14T18:59:33.780000 CVE-2024-10556,0,0,9e890aa0736585c2680fcc04ab1fac9d39c575c83d0f2617bdc1a9e76edbcf53,2024-11-01T20:51:35.617000 CVE-2024-10557,0,0,916270a9974bff554871e6150633c47888d2f31193bcd036f4a8e8f28cf81721,2024-11-01T20:48:56.980000 @@ -242757,9 +242757,9 @@ CVE-2024-10561,0,0,29b70870967a739c229fbeecbb009b70108489636df3647702a2fd1c0595a CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b1769,2024-04-22T13:28:43.747000 CVE-2024-10573,0,0,9063cc223ea5dcb15427b5dfc605e5a082c0cb2c41a32875a4278d827b140fe0,2024-11-01T12:57:03.417000 CVE-2024-1058,0,0,6b5e9e2c8572168cf164dc3fe2cb55f99ab49ff2791e71ab226d135ab3271443,2024-02-29T13:49:29.390000 -CVE-2024-10586,0,1,f1f769b86eb6d000daef591c5f367193d87a3d50622221457cbf9ad14bf94bab,2024-11-12T13:56:54.483000 -CVE-2024-10588,0,1,c2bcaed6fe7b435f43e9c22f77453914df70e3466f4c66fa7dbe7829c2fb6e04,2024-11-12T13:56:24.513000 -CVE-2024-10589,0,1,a6d8f39b47e9cb3150ad138c8d50791b37f1119d54a24371f819b9a1d868ac19,2024-11-12T13:56:24.513000 +CVE-2024-10586,0,0,f1f769b86eb6d000daef591c5f367193d87a3d50622221457cbf9ad14bf94bab,2024-11-12T13:56:54.483000 +CVE-2024-10588,0,0,c2bcaed6fe7b435f43e9c22f77453914df70e3466f4c66fa7dbe7829c2fb6e04,2024-11-12T13:56:24.513000 +CVE-2024-10589,0,0,a6d8f39b47e9cb3150ad138c8d50791b37f1119d54a24371f819b9a1d868ac19,2024-11-12T13:56:24.513000 CVE-2024-1059,0,0,76d1b9b40438f497b680a6494941e57752e942263b38e7996980a78bf67b658a,2024-02-05T20:50:26.783000 CVE-2024-10594,0,0,015abb205f2a621c92b02e8c535085d082f03901ef52c99004ce024df21aac90,2024-11-05T17:05:10.533000 CVE-2024-10595,0,0,d179e6b790ca43e523540de6b39a763d6d0e5ba29d81ee639fa2f43517880b37,2024-11-01T20:57:26.027000 @@ -242788,12 +242788,12 @@ CVE-2024-10619,0,0,a69d9e7a25ac11fb3b1ab17e7ce2294adef4cd488803cb21c60293a84d322 CVE-2024-1062,0,0,53c2a4b70765879dede7c2b012e736d65206f674e39d16fefc7ae9d1f40809b4,2024-10-10T14:22:28.617000 CVE-2024-10620,0,0,4dd83ed220196cf5b3c219f5184483daa552d936ba95729fb226d3ff120308e1,2024-11-01T12:57:03.417000 CVE-2024-10621,0,0,be1e03a4177ce290a2933b649deef1a5a206c547833b9b659dec2fc68dba2fee,2024-11-08T19:01:03.880000 -CVE-2024-10625,0,1,a861353b7c6a629a6c9ef44266f89dd01b131fe5b27428b83cc2cb051db74b0e,2024-11-12T13:56:24.513000 -CVE-2024-10626,0,1,0fd3170b789cad36b0ee942eee22dc1080f7cc47b829e7b9eea0fcdf0e0c0c4a,2024-11-12T13:56:24.513000 -CVE-2024-10627,0,1,dd31dbe632ffa95c00548e45679996b70b15cd01d1f2c43a8b8a598b1f25f37f,2024-11-12T13:56:24.513000 +CVE-2024-10625,0,0,a861353b7c6a629a6c9ef44266f89dd01b131fe5b27428b83cc2cb051db74b0e,2024-11-12T13:56:24.513000 +CVE-2024-10626,0,0,0fd3170b789cad36b0ee942eee22dc1080f7cc47b829e7b9eea0fcdf0e0c0c4a,2024-11-12T13:56:24.513000 +CVE-2024-10627,0,0,dd31dbe632ffa95c00548e45679996b70b15cd01d1f2c43a8b8a598b1f25f37f,2024-11-12T13:56:24.513000 CVE-2024-1063,0,0,74a897918202555ab7dea6b1737e329d32a036051a3381cf0244644b537611c7,2024-02-05T18:25:57.167000 CVE-2024-1064,0,0,f25346ba7587521e1585b34f9b82a63a0a8099891451ea7215e7704632eec54a,2024-02-12T18:42:14.777000 -CVE-2024-10640,0,1,ac7ef83b735eb08b750b4180f25c0a9a90933cf1f06dab6672ff07257389aab2,2024-11-12T13:56:24.513000 +CVE-2024-10640,0,0,ac7ef83b735eb08b750b4180f25c0a9a90933cf1f06dab6672ff07257389aab2,2024-11-12T13:56:24.513000 CVE-2024-10647,0,0,d9ba6608fa541fc383d43441f89db693ddba6534bf6884ce75536f94bd98d4ae,2024-11-08T21:20:50.847000 CVE-2024-1065,0,0,6b929e111558868b0121ca43ebc298de03b6cbdcab98142e875670ec0e17e759,2024-07-03T01:44:57.727000 CVE-2024-10651,0,0,27e099c503dc290e7aac94cd4c1c6b71240bd597597b5702eaef779ee4808c6c,2024-11-01T12:57:03.417000 @@ -242809,23 +242809,23 @@ CVE-2024-1066,0,0,7cd919bef6acbf4a1ab59632c47efb8ac6efc2d2c9f422a5fc3bf23611a0e2 CVE-2024-10660,0,0,f525208ea29c8266cde1476239eda59ff1f0ab9a3e7bdbee9dd171ceb2cef109,2024-11-05T17:04:45.093000 CVE-2024-10661,0,0,3a8f12267875f9e533b9d9d2b244a0cfff287128b133c964cf1107af67490bfa,2024-11-05T14:30:37.787000 CVE-2024-10662,0,0,7f193b35faecba25eb69b45c896888a79d54755e1824e8384db4944270b09c04,2024-11-05T14:30:16.847000 -CVE-2024-10667,0,1,8c3b4c9a2974763bbe2a826956e8c92748c65fd783dec0a85476416fcfdde1dc,2024-11-12T13:56:24.513000 +CVE-2024-10667,0,0,8c3b4c9a2974763bbe2a826956e8c92748c65fd783dec0a85476416fcfdde1dc,2024-11-12T13:56:24.513000 CVE-2024-10668,0,0,ad6a1e988aa7f35451b56c605706e2e8d28df7ceaf4537d00be5d4d05186782b,2024-11-08T19:01:03.880000 -CVE-2024-10669,0,1,23093ef05e499c533c3a2d4bc80a20165a28e5f349ac3746239f8d0e4e64a94d,2024-11-12T13:56:24.513000 +CVE-2024-10669,0,0,23093ef05e499c533c3a2d4bc80a20165a28e5f349ac3746239f8d0e4e64a94d,2024-11-12T13:56:24.513000 CVE-2024-1067,0,0,54f094f38a51fcd0954e79c36caca8c799a450eda4559137980b77dd6d9caf6c,2024-05-03T14:17:53.690000 -CVE-2024-10672,0,1,c864c3de395e8739605a5afd0146c9dc4a84323daf2b7dbc99539babdaa61a13,2024-11-12T13:55:21.227000 -CVE-2024-10673,0,1,721fbd2c7f4fd52d46e9315cad58bcfcec74c6705f993232b5ed88d0e5ca2848,2024-11-12T13:56:24.513000 -CVE-2024-10674,0,1,d16f584849190e67ddd9b044fe809cc53716f0604b4d903c0b675313c791d9a1,2024-11-12T13:56:24.513000 -CVE-2024-10676,0,1,c4d26028c65dae8ee24a6ae71fbafbbbdf2f434e1b4ee4c7591876108357a5b0,2024-11-12T13:56:24.513000 +CVE-2024-10672,0,0,c864c3de395e8739605a5afd0146c9dc4a84323daf2b7dbc99539babdaa61a13,2024-11-12T13:55:21.227000 +CVE-2024-10673,0,0,721fbd2c7f4fd52d46e9315cad58bcfcec74c6705f993232b5ed88d0e5ca2848,2024-11-12T13:56:24.513000 +CVE-2024-10674,0,0,d16f584849190e67ddd9b044fe809cc53716f0604b4d903c0b675313c791d9a1,2024-11-12T13:56:24.513000 +CVE-2024-10676,0,0,c4d26028c65dae8ee24a6ae71fbafbbbdf2f434e1b4ee4c7591876108357a5b0,2024-11-12T13:56:24.513000 CVE-2024-1068,0,0,affccf40ed47a318eb2ecd8e307c56fa640a43f94e3b3e8b50a778ab4a9c998f,2024-08-26T19:35:04.287000 -CVE-2024-10683,0,1,81b5edc9806b9d41a626cf134b47e67b5d64e10aaf06aa6e2f1151e4509d5dd6,2024-11-12T13:56:24.513000 -CVE-2024-10685,0,1,735dc2f0f480642d8ccf07f78f6e1a8d59da145d42e7702cb885b90e2b756411,2024-11-12T13:55:21.227000 +CVE-2024-10683,0,0,81b5edc9806b9d41a626cf134b47e67b5d64e10aaf06aa6e2f1151e4509d5dd6,2024-11-12T13:56:24.513000 +CVE-2024-10685,0,0,735dc2f0f480642d8ccf07f78f6e1a8d59da145d42e7702cb885b90e2b756411,2024-11-12T13:55:21.227000 CVE-2024-10687,0,0,2d74811f2fc6d3aaef423135ea18016bd4a20ce3a927ba94efb8aa3eac4c5b2f,2024-11-08T15:26:52.523000 -CVE-2024-10688,0,1,2bcb0cc2d0a39373aaf27b3a9b6b49c4606abf5541b93372733fc379535c54ca,2024-11-12T13:56:24.513000 +CVE-2024-10688,0,0,2bcb0cc2d0a39373aaf27b3a9b6b49c4606abf5541b93372733fc379535c54ca,2024-11-12T13:56:24.513000 CVE-2024-1069,0,0,9f4b19e535b82e8b50b814b402985dc45959fb8eebaa25a120ba3f787349c9c3,2024-02-06T20:11:52.587000 -CVE-2024-10693,0,1,2a11d3d5f51d0b8c3f7c9ca79b8ec09785ef4fc759c11326213a65170220169f,2024-11-12T13:56:24.513000 +CVE-2024-10693,0,0,2a11d3d5f51d0b8c3f7c9ca79b8ec09785ef4fc759c11326213a65170220169f,2024-11-12T13:56:24.513000 CVE-2024-10694,0,0,05c164a4732350edd5fee46247e775b1e69a11363b78cebc8b6784de8da1fb44,2024-11-11T21:15:06.030000 -CVE-2024-10695,0,1,b5551f18720c3992d4cbffe3b44039a24aa131396124cb89424c3c4f8c05f581,2024-11-12T13:55:21.227000 +CVE-2024-10695,0,0,b5551f18720c3992d4cbffe3b44039a24aa131396124cb89424c3c4f8c05f581,2024-11-12T13:55:21.227000 CVE-2024-10697,0,0,5ee797b1e2524fad720ed5d33aa07ee55b1575ecedb30200e209173b28d177f2,2024-11-04T14:18:20.337000 CVE-2024-10698,0,0,a92f2679f791986edabfcd01d7de3581b39e330ef0fdfebb28883ec3d8b768c2,2024-11-04T14:20:58.853000 CVE-2024-10699,0,0,34f3ee81b53049f9113d5634ca7220c0a13ff33a1cbb6ebcca291fb5d022be13,2024-11-05T20:15:56.417000 @@ -242878,14 +242878,14 @@ CVE-2024-10765,0,0,ff207dbaed362f27d141d8f991437f9efb859b44cbbeb5f387917f93fd11e CVE-2024-10766,0,0,e35f492b9f66f3ec904d31d42b260648e53321433ee2cae35a4e477e4ef293a0,2024-11-06T14:59:34.303000 CVE-2024-10768,0,0,594fbdf596dfab7cfec85356d137af72f3f7c97c4f287c31f07abfe79e0c4dc2,2024-11-06T15:04:45.200000 CVE-2024-1077,0,0,9052c519c4a7de5cf3516fc923116c25b788d5b36a137a2e416fb3d37403344d,2024-07-03T01:44:58.330000 -CVE-2024-10770,0,1,0f5897dd9aba481faece95da66f5bd3d6a2ccff92cbfd04ce22fd4f1ffbf1962,2024-11-12T13:56:24.513000 -CVE-2024-10779,0,1,03484221afac3766470b5ced8d3332eee24d28c027104d12405179c89d30afec,2024-11-12T13:56:24.513000 +CVE-2024-10770,0,0,0f5897dd9aba481faece95da66f5bd3d6a2ccff92cbfd04ce22fd4f1ffbf1962,2024-11-12T13:56:24.513000 +CVE-2024-10779,0,0,03484221afac3766470b5ced8d3332eee24d28c027104d12405179c89d30afec,2024-11-12T13:56:24.513000 CVE-2024-1078,0,0,88568fa2f20f5ea8de25fda48576808429bbc616448df571a879f056db565620,2024-02-14T18:39:51.437000 CVE-2024-1079,0,0,0a964f4e43e1a2d85a40a4753c5354fe293facf65d0ebcc06031e68ccad95a0f,2024-02-14T19:33:09.977000 -CVE-2024-10790,0,1,c5195852541315ac22dd1b614848e72547c3a099e7858697bb9ee4c86225d43f,2024-11-12T13:55:21.227000 +CVE-2024-10790,0,0,c5195852541315ac22dd1b614848e72547c3a099e7858697bb9ee4c86225d43f,2024-11-12T13:55:21.227000 CVE-2024-10791,0,0,a1ab37f8c195110cb663fc7e474028527dca661a169201c0160b30306fac4c75,2024-11-06T15:05:38.240000 CVE-2024-1080,0,0,9acdbacec5fb31283e62a6d3f1b1bde4de3af0ce021840a5a12a8cd06719b667,2024-03-13T18:16:18.563000 -CVE-2024-10801,0,1,3a88e665dce12d6cd350c00c6be6179e940c16e7a45bcfb9cfdce8ce89fd3527,2024-11-12T13:56:24.513000 +CVE-2024-10801,0,0,3a88e665dce12d6cd350c00c6be6179e940c16e7a45bcfb9cfdce8ce89fd3527,2024-11-12T13:56:24.513000 CVE-2024-10805,0,0,30683214c49996b99622c593b0d2824b7195979c84652d13638c9eb82a2ea54d,2024-11-07T17:09:07.057000 CVE-2024-10806,0,0,e15ec6423ae1ad698fb4ad5b42c94e3a5d06fef4f5e8a29e70adae83dbef0510,2024-11-06T15:06:48.493000 CVE-2024-10807,0,0,783f0ac6c475ea7fcbd6f31f293edee7b9729e4af159ee9eb5bd3f13eec67953,2024-11-06T15:07:09.930000 @@ -242893,13 +242893,13 @@ CVE-2024-10808,0,0,dac986d7fa4c7c52dcde054490fe5f45d88b724de3dc68cd9eaa633ce97a4 CVE-2024-10809,0,0,ea652f7f5676144619aa1801e4ca90f6a805fad57a8917b37e98b94898936ddb,2024-11-06T15:14:48.213000 CVE-2024-1081,0,0,b9ecb327bf229081db54279065262fbdf204fadb84142fe6a647ad5480db67c8,2024-02-22T19:07:27.197000 CVE-2024-10810,0,0,24dc4cb4af16bbf52a3428afcf948782067630e0ddcd0604e4c08419e6e83436,2024-11-06T15:16:12.497000 -CVE-2024-10814,0,1,895125174ba4aa7c23fdeb954976ebdf264a7eadd4d29cafe1df1a629d7d5976,2024-11-12T13:56:24.513000 +CVE-2024-10814,0,0,895125174ba4aa7c23fdeb954976ebdf264a7eadd4d29cafe1df1a629d7d5976,2024-11-12T13:56:24.513000 CVE-2024-1082,0,0,1a3a3ef85a9a06621291f657b27812f6a6be683bc843b0137ba9e53485eee330,2024-10-17T15:46:44.327000 CVE-2024-10824,0,0,6eb650dcc5948040831c411456d27fae52cd783d32ad30faaf04938565b810b8,2024-11-08T19:01:03.880000 CVE-2024-10826,0,0,6aa37fdb16b5853a7b5472e25a8ac0220ff66e617581e203df39439d12ed70ca,2024-11-06T18:17:17.287000 CVE-2024-10827,0,0,6577ad366fcac00efbf959f7905ba60a1d9c696b896b68d8b10d38d71dfd5e3b,2024-11-06T18:17:17.287000 CVE-2024-1083,0,0,f65354685ac9d5e6ec0c7d89ef33fa98a96cad0e23da0316206039cbd9c94fda,2024-03-13T18:16:18.563000 -CVE-2024-10837,0,1,c80ee8e64cd911e3ab2efc7873524bd8e71ebc0fc7365371148c92b52a8b267a,2024-11-12T13:56:24.513000 +CVE-2024-10837,0,0,c80ee8e64cd911e3ab2efc7873524bd8e71ebc0fc7365371148c92b52a8b267a,2024-11-12T13:56:24.513000 CVE-2024-10839,0,0,959999d7d9e7ad6c83b2a659b5f94ea06306dfe2c58a8ebc0b6485e885f4cafa,2024-11-08T19:01:03.880000 CVE-2024-1084,0,0,b38be98d35d4290a3ce2408da5081c91dd802a2448815858b2cd8d2247674e10,2024-10-17T15:46:42.330000 CVE-2024-10840,0,0,3088ecb88b6f610106137e52cd92a9df0637e9f9f20cd58417274c10e35a041a,2024-11-06T22:49:12.173000 @@ -242910,8 +242910,8 @@ CVE-2024-10845,0,0,e23b6836533b6527e69274c9897179b623fe8ac43fca2950e064d79cbfdb6 CVE-2024-1085,0,0,1d186f1dd445cf86c8be70ef01a658a198ecb65ca5305ee36e96f272e65874b8,2024-02-05T20:41:40.513000 CVE-2024-1086,0,0,3e819e2fff80149e3f377751fd1fb28a52f8791d9e5d08990c549613b15214b2,2024-08-14T19:41:08.673000 CVE-2024-1087,0,0,9751a2fe52b8f14e0fc1c9d86ee656c42465ba61ef03201895b6c1868f5679fd,2024-01-31T13:15:11.030000 -CVE-2024-10871,0,1,68bab79b21893b436f4ab4e6d9a6ec3633c42e31b376d40213e506317551e1bb,2024-11-12T13:56:24.513000 -CVE-2024-10876,0,1,bbf9ae62b029e2f20c90d639924bd19ca16772574bbaf6f19776b0310de3890f,2024-11-12T13:56:24.513000 +CVE-2024-10871,0,0,68bab79b21893b436f4ab4e6d9a6ec3633c42e31b376d40213e506317551e1bb,2024-11-12T13:56:24.513000 +CVE-2024-10876,0,0,bbf9ae62b029e2f20c90d639924bd19ca16772574bbaf6f19776b0310de3890f,2024-11-12T13:56:24.513000 CVE-2024-1088,0,0,7487e11aa2518f6cc93d89dd95a39f5c8d6e4a1b2567cf073eed09f7df78257a,2024-03-05T13:41:01.900000 CVE-2024-1089,0,0,9442709e929187c1b992d082c3eaeec9226480f80fc28198e3a73f4a684640d5,2024-02-29T13:49:29.390000 CVE-2024-1090,0,0,2d0b80c82d6d153c4e0b5412c3fcf892da86ac73a72da4cbf84bfbb064bdcb0c,2024-02-29T13:49:29.390000 @@ -242919,7 +242919,7 @@ CVE-2024-1091,0,0,54ee7e9ca708166212a73aaa10e4715176fe17b55fbce1ee0ea8f95d289d46 CVE-2024-10914,0,0,a19349a4797c04ddb77f70975a0145b559e2c17ff8d6db53557df6669e0449a1,2024-11-08T19:53:04.793000 CVE-2024-10915,0,0,b06bfc4427bf3f30a98b7ce390941759d780f67755e284354baa2af5087ffe27,2024-11-08T20:11:10.973000 CVE-2024-10916,0,0,bc544f9bd284df1d2cb2c93c5b72a85d457acf8720f73da6b50b8a164264f036,2024-11-08T20:11:37.567000 -CVE-2024-10917,0,1,1eea699579f5dcb0f1ea716ba091b6b657cbea6b54620c9aa27bd72862f79a0d,2024-11-12T13:55:21.227000 +CVE-2024-10917,0,0,1eea699579f5dcb0f1ea716ba091b6b657cbea6b54620c9aa27bd72862f79a0d,2024-11-12T13:55:21.227000 CVE-2024-10919,0,0,e8fbb923eb829e965254205b876d7ef672d5aac59877ea419609aa8d8f6bb3e9,2024-11-08T21:07:58.383000 CVE-2024-1092,0,0,4e514cbeb8cbdb0016fe4cb374f3dffe448e95b35a82b13ed7cb7be1b7fe61c2,2024-02-13T19:43:06.247000 CVE-2024-10920,0,0,2cf9a2b6fa319444c301d4d5e50d2260546d202b9ce9ceed0622f3257443827f,2024-11-06T18:17:17.287000 @@ -242933,8 +242933,8 @@ CVE-2024-10941,0,0,13c9aa5648736117eddcc05b7c7bbd41bd256da81c39332a1bd9e9e846bf4 CVE-2024-10946,0,0,53c127b5d01f3eb86df399cdeeb942bf199714aabfb134ba6a8dac66d645a2f4,2024-11-08T19:01:25.633000 CVE-2024-10947,0,0,0411e4a4d7c1a87e65d7d83c82156a4ec968e1f848bfec751aba34746b5cca7a,2024-11-08T19:01:03.880000 CVE-2024-1095,0,0,e70da3b629cae08421ac3ff6db71fb525bf872b735f906aa9168a1a3feae7dcb,2024-03-05T13:41:01.900000 -CVE-2024-10953,0,1,496fd56d3a163ffff52ed6786827de0c1da0afb8656a03af3cf0cf6c1de87d4a,2024-11-12T13:56:54.483000 -CVE-2024-10958,0,1,1806620eb2a491b4745fe6586d7e000d81410e80d95e8349012db8321e637b6e,2024-11-12T13:55:21.227000 +CVE-2024-10953,0,0,496fd56d3a163ffff52ed6786827de0c1da0afb8656a03af3cf0cf6c1de87d4a,2024-11-12T13:56:54.483000 +CVE-2024-10958,0,0,1806620eb2a491b4745fe6586d7e000d81410e80d95e8349012db8321e637b6e,2024-11-12T13:55:21.227000 CVE-2024-1096,0,0,9e6ec92aa91c226f1dce82b660bd82ecda12366a7db0465d5ab79a9947cb0a51,2024-03-21T02:51:34.720000 CVE-2024-10963,0,0,eee86a3aedc7174854dc69b5daad7ddd56acd624730edee3419c240e1ae079c9,2024-11-11T18:15:14.487000 CVE-2024-10964,0,0,59c42738567fc9804ec2d61407344d8d58a5472c34e273ef586a2c76a2aefe85,2024-11-08T19:01:03.880000 @@ -242943,6 +242943,7 @@ CVE-2024-10966,0,0,3df47cfeba07424dbca1650d45cf844f6cc1bcda5f1462544d39e404a912c CVE-2024-10967,0,0,045953be48e7bafc650cdaba1889b3cce653fc03383c0343e3292851109279a3,2024-11-08T19:01:03.880000 CVE-2024-10968,0,0,f600c79ff6183eb1b51f4003b01ba4a417fb853b88c9cd1f3e9f06879ffd32fe,2024-11-08T19:01:03.880000 CVE-2024-10969,0,0,34fb384baf8f9b6070297fa30997eac3a4fc91278070bd97f872695ea721a856,2024-11-08T19:01:03.880000 +CVE-2024-10971,1,1,e01cc48d2fbbca763136aba8650890c04c72d0489e6634d35f671e5198c3cca8,2024-11-12T16:15:19.930000 CVE-2024-10975,0,0,f38693c9a402e208f0de21f91edcefa5c1f789073d3e380787ea5dd138f197fa,2024-11-08T19:01:03.880000 CVE-2024-1098,0,0,7637c79f93f6fef4c2ad0472be16e5b2b85cffeb9436b7defda280fbd3390871,2024-05-17T02:35:14.017000 CVE-2024-10987,0,0,0f5f40b95778e745d3c36eceef208d20fa1e84c6479725fa9e8e4c2b6e2464d8,2024-11-08T19:01:03.880000 @@ -242960,62 +242961,67 @@ CVE-2024-10998,0,0,41f387fbf1645aa90b35c52ac0db0cc1b6181351deba62e7b43db2377129b CVE-2024-10999,0,0,25c169fccdcc9e88a3876005f32d4643213fc0492b1ed51816b7a93f6109fc6e,2024-11-08T19:01:03.880000 CVE-2024-1100,0,0,f004473b9cf0d9d95a81c6b2db685e986de4389d0d38ab5c3537c8bbd36c025b,2024-07-03T01:44:59.517000 CVE-2024-11000,0,0,4fb6c84b88e18aeb98d1b738e518210fb6a3e1010153945ab3cfa9fceb300001,2024-11-08T19:01:03.880000 -CVE-2024-11016,0,1,e06fd1e37d2bc29c8627eb88aec0c98e8edfc5d8e9aa4e4b0a05b03aac4f15bc,2024-11-12T13:55:21.227000 -CVE-2024-11017,0,1,b6f5a0fdb93950e300deb11212bccdb1604dbaaea57c853aac4276b5e817e85e,2024-11-12T13:55:21.227000 -CVE-2024-11018,0,1,f910e24d784d244818fd4780466645417572116f0165d15d5cf863939db2411e,2024-11-12T13:55:21.227000 -CVE-2024-11019,0,1,f89d8e239acf21c689103a90bda0330a82b8f8c0eafd269b988be5a36b1bf94e,2024-11-12T13:55:21.227000 +CVE-2024-11007,1,1,b6b07f0f1b717bb71ca1b4cfa8c9c66fbc9870ae254868dd40a59be0d6f05465,2024-11-12T16:15:20.050000 +CVE-2024-11016,0,0,e06fd1e37d2bc29c8627eb88aec0c98e8edfc5d8e9aa4e4b0a05b03aac4f15bc,2024-11-12T13:55:21.227000 +CVE-2024-11017,0,0,b6f5a0fdb93950e300deb11212bccdb1604dbaaea57c853aac4276b5e817e85e,2024-11-12T13:55:21.227000 +CVE-2024-11018,0,0,f910e24d784d244818fd4780466645417572116f0165d15d5cf863939db2411e,2024-11-12T13:55:21.227000 +CVE-2024-11019,0,0,f89d8e239acf21c689103a90bda0330a82b8f8c0eafd269b988be5a36b1bf94e,2024-11-12T13:55:21.227000 CVE-2024-1102,0,0,0928bf44049eedf97e0b54e5fbfa6f0206fb5c0a5ae4e275eff0db0e3aa685dd,2024-10-16T15:15:15.150000 -CVE-2024-11020,0,1,d0934784925958ce42b22267494b68d4b80dfa18c46898cd01ed909504109ad3,2024-11-12T13:55:21.227000 -CVE-2024-11021,0,1,1f1b1e0ac42bf91b0cc89759732493fd6cec807d801e0bfbbf7c7144b73114bf,2024-11-12T13:55:21.227000 -CVE-2024-11026,0,1,5bad097199e56ffd1f4b7755738c2445dc243d6c7a33468e0f417dfbc0b75e4b,2024-11-12T13:56:54.483000 +CVE-2024-11020,0,0,d0934784925958ce42b22267494b68d4b80dfa18c46898cd01ed909504109ad3,2024-11-12T13:55:21.227000 +CVE-2024-11021,0,0,1f1b1e0ac42bf91b0cc89759732493fd6cec807d801e0bfbbf7c7144b73114bf,2024-11-12T13:55:21.227000 +CVE-2024-11026,0,0,5bad097199e56ffd1f4b7755738c2445dc243d6c7a33468e0f417dfbc0b75e4b,2024-11-12T13:56:54.483000 CVE-2024-1103,0,0,7224a9abc8ad2624b19754063e5e3f1dd278d487bc1541d6b3a3ae6b5907a9fc,2024-05-17T02:35:14.273000 CVE-2024-1104,0,0,9ee10688672006d34031cfe725e4adf4d669e817d06739b003e5be9062883e98,2024-02-22T19:07:27.197000 -CVE-2024-11046,0,1,dcd925d5c73f06f1ace376a125bb575f7b315d9652d799723b1102cf9a0002bf,2024-11-12T13:56:24.513000 -CVE-2024-11047,0,1,62c80055c1e83d51885fa95899f09b154c263aa2568536bdec0a14d6fceec41d,2024-11-12T13:56:24.513000 -CVE-2024-11048,0,1,c47c7e172d2484981aa9ce82dc4829987410f86852315bc7d515b43bf33914dc,2024-11-12T13:56:24.513000 -CVE-2024-11049,0,1,b32f7109487bc986f17f8a46eb9cc8cb1f0e96bfe0591fca882d7e5919dd9014,2024-11-12T13:56:24.513000 -CVE-2024-11050,0,1,90ab244978cef45af7f095c82b640f3cf8f2d9477d1dab1199c3f2987aed170e,2024-11-12T13:56:24.513000 -CVE-2024-11051,0,1,eb9e15965e4cd0c6f388b6eb1187188afb18b6da215e4b4c9a8311016e9cd0cc,2024-11-12T13:56:24.513000 -CVE-2024-11054,0,1,394506123e0eb139c8cd8550dbcefd136456928efd9946deb73088c629a735c3,2024-11-12T13:56:24.513000 -CVE-2024-11055,0,1,8753cb0f9e0c463951b38cd6aa776389b7f8fae7636d2e40ff9d7e2ceabb0dba,2024-11-12T13:55:21.227000 -CVE-2024-11056,0,1,260e6276db037c1b83afa3a84dcfe60a67f837ee8245c0e77eb0e6c4b686db55,2024-11-12T13:55:21.227000 -CVE-2024-11057,0,1,f4d60f6fab1190311646d9264bfdcce59d278fed16386a412e93a051a1fca225,2024-11-12T13:55:21.227000 -CVE-2024-11058,0,1,d71101d6ff89adc4dd72f5095ac1a64dea67b10c01cd7f3f72418eed1f520205,2024-11-12T13:55:21.227000 -CVE-2024-11059,0,1,de7cfb30a6274819a2f3576f81d64b58ec0837ba2b51799f2a317460e7cb2779,2024-11-12T13:55:21.227000 +CVE-2024-11046,0,0,dcd925d5c73f06f1ace376a125bb575f7b315d9652d799723b1102cf9a0002bf,2024-11-12T13:56:24.513000 +CVE-2024-11047,0,0,62c80055c1e83d51885fa95899f09b154c263aa2568536bdec0a14d6fceec41d,2024-11-12T13:56:24.513000 +CVE-2024-11048,0,0,c47c7e172d2484981aa9ce82dc4829987410f86852315bc7d515b43bf33914dc,2024-11-12T13:56:24.513000 +CVE-2024-11049,0,0,b32f7109487bc986f17f8a46eb9cc8cb1f0e96bfe0591fca882d7e5919dd9014,2024-11-12T13:56:24.513000 +CVE-2024-11050,0,0,90ab244978cef45af7f095c82b640f3cf8f2d9477d1dab1199c3f2987aed170e,2024-11-12T13:56:24.513000 +CVE-2024-11051,0,0,eb9e15965e4cd0c6f388b6eb1187188afb18b6da215e4b4c9a8311016e9cd0cc,2024-11-12T13:56:24.513000 +CVE-2024-11054,0,0,394506123e0eb139c8cd8550dbcefd136456928efd9946deb73088c629a735c3,2024-11-12T13:56:24.513000 +CVE-2024-11055,0,0,8753cb0f9e0c463951b38cd6aa776389b7f8fae7636d2e40ff9d7e2ceabb0dba,2024-11-12T13:55:21.227000 +CVE-2024-11056,0,0,260e6276db037c1b83afa3a84dcfe60a67f837ee8245c0e77eb0e6c4b686db55,2024-11-12T13:55:21.227000 +CVE-2024-11057,0,0,f4d60f6fab1190311646d9264bfdcce59d278fed16386a412e93a051a1fca225,2024-11-12T13:55:21.227000 +CVE-2024-11058,0,0,d71101d6ff89adc4dd72f5095ac1a64dea67b10c01cd7f3f72418eed1f520205,2024-11-12T13:55:21.227000 +CVE-2024-11059,0,0,de7cfb30a6274819a2f3576f81d64b58ec0837ba2b51799f2a317460e7cb2779,2024-11-12T13:55:21.227000 CVE-2024-1106,0,0,20cb4a0a045157ac9e013fd166b9513d5a44a1304cf8a8ccabd3185b4a52ab40,2024-10-27T23:35:01.747000 -CVE-2024-11060,0,1,e822ca030e591a2bbf6a05b38b24573b215857d28f4ccfd98afde869421cab71,2024-11-12T13:55:21.227000 -CVE-2024-11061,0,1,ee12d74725b75271cde8b1d917e4dbdeaf688fb1c0b14088569080190058ad0c,2024-11-12T13:55:21.227000 -CVE-2024-11062,0,1,fd55df6ee60df3ac3e659d07193cf97542af5dcd211c78f8b53360e3a9e97cc9,2024-11-12T13:55:21.227000 -CVE-2024-11063,0,1,1a3eff04d87f74bc64be56e4515d0ac1a1dad44d3ef5f9e41d9c2ff803dd28c6,2024-11-12T13:55:21.227000 -CVE-2024-11064,0,1,fbc6fc46169b65b5e9f021a6e3aa02dddacbcbeaa8df4c510741f7cfa069b0a2,2024-11-12T13:55:21.227000 -CVE-2024-11065,0,1,bfb35f980499608a9a3496379264eb51d60e25932db9b7623457d633eef9a55d,2024-11-12T13:55:21.227000 -CVE-2024-11066,0,1,a4cbe189914f12c5d2c97a6da0947cc3e10eb247702d656a1dbe04db5cfbb7fb,2024-11-12T13:55:21.227000 -CVE-2024-11067,0,1,5483dbfbd683f340236ce9255ef6a7c7f72011fb5216fc7269ab5aac0d5213a7,2024-11-12T13:55:21.227000 -CVE-2024-11068,0,1,4b051dd1e90eddfcfc88c8711edd0209408a9ba2f8b4588824fefefed2e09378,2024-11-12T13:55:21.227000 +CVE-2024-11060,0,1,59a41911bcfc298095aabf4f558a2377a774e2b5628861d2f98e8a12c664f388,2024-11-12T16:15:20.447000 +CVE-2024-11061,0,0,ee12d74725b75271cde8b1d917e4dbdeaf688fb1c0b14088569080190058ad0c,2024-11-12T13:55:21.227000 +CVE-2024-11062,0,0,fd55df6ee60df3ac3e659d07193cf97542af5dcd211c78f8b53360e3a9e97cc9,2024-11-12T13:55:21.227000 +CVE-2024-11063,0,0,1a3eff04d87f74bc64be56e4515d0ac1a1dad44d3ef5f9e41d9c2ff803dd28c6,2024-11-12T13:55:21.227000 +CVE-2024-11064,0,0,fbc6fc46169b65b5e9f021a6e3aa02dddacbcbeaa8df4c510741f7cfa069b0a2,2024-11-12T13:55:21.227000 +CVE-2024-11065,0,0,bfb35f980499608a9a3496379264eb51d60e25932db9b7623457d633eef9a55d,2024-11-12T13:55:21.227000 +CVE-2024-11066,0,0,a4cbe189914f12c5d2c97a6da0947cc3e10eb247702d656a1dbe04db5cfbb7fb,2024-11-12T13:55:21.227000 +CVE-2024-11067,0,0,5483dbfbd683f340236ce9255ef6a7c7f72011fb5216fc7269ab5aac0d5213a7,2024-11-12T13:55:21.227000 +CVE-2024-11068,0,0,4b051dd1e90eddfcfc88c8711edd0209408a9ba2f8b4588824fefefed2e09378,2024-11-12T13:55:21.227000 CVE-2024-1107,0,0,7fae6df9cdce298be180c2cb6d3dacceb0e976e847fc87cce19a7d73f37dfe2b,2024-09-16T19:08:27.840000 -CVE-2024-11070,0,1,3b497257d1d87e8089d11256275eff956cb64bd2c8e5b58c0672dafc5015efdc,2024-11-12T13:55:21.227000 -CVE-2024-11073,0,1,7b275d77346d3baae5145fae1e1bc949854bb720c1a66c386a5f1f31e520bae5,2024-11-12T13:55:21.227000 -CVE-2024-11074,0,1,b0b432f9f11178b738766f16248994f53b322af072bbf835d11e0cca21060089,2024-11-12T13:55:21.227000 -CVE-2024-11076,0,1,68aaa806834c6f72f1c370289d32181f8562b1175818d8ed99e5a507b1de4718,2024-11-12T13:55:21.227000 -CVE-2024-11077,0,1,7830786a737704d18ab799bfc0c7fcb4f9e81db66cd6fb6cafa4ccac62736f64,2024-11-12T13:55:21.227000 -CVE-2024-11078,0,1,d133c6201a7de964272170f882ab0586a90d59fac96ab8e0ce223d3687fb9309,2024-11-12T13:55:21.227000 -CVE-2024-11079,0,1,d1a710289b6254268300773c7c9b113893f43edc23893d87d06dbeefe81deb1d,2024-11-12T13:55:21.227000 +CVE-2024-11070,0,0,3b497257d1d87e8089d11256275eff956cb64bd2c8e5b58c0672dafc5015efdc,2024-11-12T13:55:21.227000 +CVE-2024-11073,0,0,7b275d77346d3baae5145fae1e1bc949854bb720c1a66c386a5f1f31e520bae5,2024-11-12T13:55:21.227000 +CVE-2024-11074,0,0,b0b432f9f11178b738766f16248994f53b322af072bbf835d11e0cca21060089,2024-11-12T13:55:21.227000 +CVE-2024-11076,0,0,68aaa806834c6f72f1c370289d32181f8562b1175818d8ed99e5a507b1de4718,2024-11-12T13:55:21.227000 +CVE-2024-11077,0,0,7830786a737704d18ab799bfc0c7fcb4f9e81db66cd6fb6cafa4ccac62736f64,2024-11-12T13:55:21.227000 +CVE-2024-11078,0,0,d133c6201a7de964272170f882ab0586a90d59fac96ab8e0ce223d3687fb9309,2024-11-12T13:55:21.227000 +CVE-2024-11079,0,0,d1a710289b6254268300773c7c9b113893f43edc23893d87d06dbeefe81deb1d,2024-11-12T13:55:21.227000 CVE-2024-1108,0,0,72e8aa7ee320c630f0cd3020b574b902dcf572a1d2888f0afb29692e74e18247,2024-02-22T19:07:37.840000 CVE-2024-1109,0,0,54a246b33f975a42367e7b2f8f64c59b5c20293302ad365ae743bbdf357522c9,2024-02-10T04:13:21.610000 -CVE-2024-11096,0,1,c3ff544a53c1563b81fded1ba3057d9b03d9b4212c24283ee7f8f621c81cae5e,2024-11-12T13:55:21.227000 -CVE-2024-11097,0,1,0f425a00a4219c8aee24d98bfdb80d7664413f5722ae7291836b25044ba023ac,2024-11-12T13:55:21.227000 -CVE-2024-11099,0,1,0d75e4efa70a7f7616a150766816298dc17fa44d2c8e77459984ac245b921285,2024-11-12T13:55:21.227000 +CVE-2024-11096,0,0,c3ff544a53c1563b81fded1ba3057d9b03d9b4212c24283ee7f8f621c81cae5e,2024-11-12T13:55:21.227000 +CVE-2024-11097,0,0,0f425a00a4219c8aee24d98bfdb80d7664413f5722ae7291836b25044ba023ac,2024-11-12T13:55:21.227000 +CVE-2024-11099,0,0,0d75e4efa70a7f7616a150766816298dc17fa44d2c8e77459984ac245b921285,2024-11-12T13:55:21.227000 CVE-2024-1110,0,0,2a7a998b7b1ccd0c64d40f28b7bfefdfe0681031ac010f23e86b81b22a7f4df6,2024-02-10T04:13:13.260000 -CVE-2024-11100,0,1,c492dc436c5e7b0bafe38365cc0f5202d40cfdc5e0c2327c30b822de79afcadd,2024-11-12T13:55:21.227000 -CVE-2024-11101,0,1,a2b85a410a212ab95b03a0a6c633679b89052f56b8c74d4fa60b641fe5c20a93,2024-11-12T13:55:21.227000 -CVE-2024-11102,0,1,460c291b099a678065bd11e1bbf8bd3fff3f3d6e3ee0d55ca5f7bdf40e5eda3d,2024-11-12T13:55:21.227000 +CVE-2024-11100,0,0,c492dc436c5e7b0bafe38365cc0f5202d40cfdc5e0c2327c30b822de79afcadd,2024-11-12T13:55:21.227000 +CVE-2024-11101,0,0,a2b85a410a212ab95b03a0a6c633679b89052f56b8c74d4fa60b641fe5c20a93,2024-11-12T13:55:21.227000 +CVE-2024-11102,0,0,460c291b099a678065bd11e1bbf8bd3fff3f3d6e3ee0d55ca5f7bdf40e5eda3d,2024-11-12T13:55:21.227000 CVE-2024-1111,0,0,f15445887f26214e7eb2759298bdfed96c32a982bdf7c3d908e39f1fc291a984,2024-05-17T02:35:14.527000 CVE-2024-1112,0,0,a074043c8f95f29514c3f59ea2279c09f17d99731ab21d34b196cbe82c1cf23d,2024-02-09T14:34:41.827000 -CVE-2024-11121,1,1,8f261648e8aa7626b51bf12e0e689982b79b03806c0768425612d8e79bdb20ae,2024-11-12T13:55:21.227000 -CVE-2024-11122,1,1,bd60c79703cf3b891ead101520e775ea03d8d0414bf7aeff344e254d9c5f222b,2024-11-12T13:55:21.227000 -CVE-2024-11123,1,1,54ab2bdc2850cfd69641ecef390de470e964ebf14f44b4579b638a94e63eb56f,2024-11-12T13:55:21.227000 -CVE-2024-11124,1,1,73fa4700ca267613075e73b1858cece6b4601482a9fbec3e00b976e592da535c,2024-11-12T14:15:16.260000 +CVE-2024-11121,0,1,78c7f01d1528f5af7c7c0921f9908f534edd8a79fcf13b8e8ba56ec04209ef7f,2024-11-12T16:15:20.770000 +CVE-2024-11122,0,1,8b39eb171f905156949631c8c8e8a5af8e744e4719ba7b47f1a185280518c4e7,2024-11-12T16:15:20.873000 +CVE-2024-11123,0,1,2c2c3a47aaef9d48349e1017759c96035abab5e51ba4d62444aa173a7ccd2b65,2024-11-12T16:15:20.990000 +CVE-2024-11124,0,1,efd601a275819de67bd20a9a8d3bf2e3170b2fecab4aaf15486a28875c9a9123,2024-11-12T15:48:59.103000 +CVE-2024-11125,1,1,122a7b88d4467b2583e8cd046c15116b4ff84a1dc79b401a73643c2cfd3066b9,2024-11-12T15:48:59.103000 +CVE-2024-11126,1,1,b967d4c9797ae557d5008a2e89e34b56b8ab089540ce69fba53b421e80e1e708,2024-11-12T15:48:59.103000 +CVE-2024-11127,1,1,872c91b8fef54d334e58f460ad31540519bfcc5b745ac9da794cfe9b05f34fe8,2024-11-12T15:48:59.103000 CVE-2024-1113,0,0,6955c6c679809523d129efea09ef779c898e264f7e3230a68d2b1fd615c8f410,2024-05-17T02:35:14.663000 +CVE-2024-11130,1,1,578a772ca1269be9bdc99bb966d7eb9c39dbd0e02e5dba4d3229d53dfaceb8e4,2024-11-12T15:48:59.103000 CVE-2024-1114,0,0,4ba1cd03fbc35862ac6b2ce79da50122dd303ea22f4f4a45a352ffb5be12a8ee,2024-05-17T02:35:14.777000 CVE-2024-1115,0,0,4dae9d3d8bef65fab3d547368288cc3126446be18b7fc740123f9a96bd6241e2,2024-05-17T02:35:14.880000 CVE-2024-1116,0,0,4196b5c71a0d802f4c1e9b3a43ac71c958f929e96b26e1ebb01241c6bd176fa3,2024-05-17T02:35:14.983000 @@ -243052,7 +243058,7 @@ CVE-2024-1147,0,0,5da69e40e8a720c3c3c366cde1a8363ffbcff6346e82168cfd4c7602d33328 CVE-2024-1148,0,0,55b3cfe72144d3f21629750ac052bc7072169844e3b194a6a00d557d611fa424,2024-03-21T12:58:51.093000 CVE-2024-1149,0,0,b02f2ba30bfd9b077afbf478cdb43cc9b464ca358abc4a5e9f7416d9d1b2fcff,2024-02-15T17:52:08.970000 CVE-2024-1150,0,0,b47a3c09b3a331a50594ab70df2061c7818f30992462806b6f5b7a310a00b60b,2024-02-15T17:42:08.113000 -CVE-2024-1151,0,0,4bd96d45d8577f9810851348ab4eeb008c26399957744dd5c6d2cb4a43cb1738,2024-09-05T16:15:07.097000 +CVE-2024-1151,0,1,7121c04433e319cadf01da487c5bbfa2040f1a20de12a9b96c3c123bdd1e595e,2024-11-12T16:15:21.213000 CVE-2024-1153,0,0,ef044a07a9d08d9e4b985a54be5b7192d28514cd606cdbcd1ece01d4ab3f4a43,2024-09-16T17:39:45.023000 CVE-2024-1155,0,0,d758d36f3a75477090d9513d8ce1d0fb91b0226929e863bd461e737f3d8138d1,2024-02-20T19:50:53.960000 CVE-2024-1156,0,0,d72992d03594c16afadbf16a64f145c65aa8548416754605a40b83a0941682ae,2024-02-20T19:50:53.960000 @@ -245521,7 +245527,7 @@ CVE-2024-21989,0,0,b37107fd2c4d1a57e1c54ea23713cd824a129161eab1168533bf8418858bd CVE-2024-2199,0,0,59cfdd5614277a4cdfe41ed7cee8f7ffdb9b280026c3b9f68d7d87a26f4892e7,2024-08-21T13:15:04.610000 CVE-2024-21990,0,0,3f2777f17d0268e19ae7208ee53d1e5f87b95b7b3f1f72a38c6db4b42aa0ce21,2024-04-18T13:04:28.900000 CVE-2024-21993,0,0,1aeea33da01281c76910db77ddd07bc0b5d9326e4ee4935be542983c253cdefc,2024-09-10T17:39:40.353000 -CVE-2024-21994,0,1,978cf917c4a483e63eff22e81479adf121c8fd6a269668f89848428ad3408230,2024-11-12T13:56:54.483000 +CVE-2024-21994,0,0,978cf917c4a483e63eff22e81479adf121c8fd6a269668f89848428ad3408230,2024-11-12T13:56:54.483000 CVE-2024-2200,0,0,d5a4c544d7b3fb05e31b9bd6329cd0f60f6524be79f4f8737689831ac183f031,2024-04-10T13:23:38.787000 CVE-2024-22002,0,0,3f46bf566ffde9830b437d34f578da579affa782f9e33834d952fd66d67c0a78,2024-07-03T01:46:58.073000 CVE-2024-22004,0,0,b52e7465a30d7c5ebe6c493dd6cc2d67cc064cc642f18d912a28d694a4c404f1,2024-04-08T18:49:25.863000 @@ -245756,7 +245762,7 @@ CVE-2024-22253,0,0,99373fd467fe1494c70def9a33c277abe9ef8000626bb6e83f26af7d49c26 CVE-2024-22254,0,0,20d7e9ec4979d70b7eb4baedee6a35555829a7b91aea3c15baf85c60eb6e51bf,2024-08-14T19:35:18.467000 CVE-2024-22255,0,0,8e7a40c5bf54cf100359b6bd89ec7ed5b7b9b1826e219d741464964078f159ff,2024-11-04T18:35:06.477000 CVE-2024-22256,0,0,dcbf1bed6a2eb60ed505918b467b6ef5ef784547429273c505574abd3ae01acd,2024-03-12T15:01:32.347000 -CVE-2024-22257,0,0,83d5592ba2658b12f45fdbdc1fa843be7cd4148ccfa8d90acba9b43bfc7d1437,2024-04-19T07:15:09.223000 +CVE-2024-22257,0,1,deda0b5f6a8517bc02c2038e4f08a84e8e42d2c5375167943196ec92b20f1e7c,2024-11-12T16:35:07.147000 CVE-2024-22258,0,0,4b97201062488eaff51b24fbc9ae28b1f946f20fc4b3f47d5337472a99498617,2024-03-20T13:00:16.367000 CVE-2024-22259,0,0,1619807ca0dd0d25e590483ba5fe046c92691b86131dda52a5fc321e717fd519,2024-07-03T01:47:10.080000 CVE-2024-2226,0,0,d1bdd7002c5ec8a69fcb10676a03d7f656c6960181e2ea18b4c07683d5e897e3,2024-04-10T13:23:38.787000 @@ -246250,6 +246256,7 @@ CVE-2024-23146,0,0,c9ab3b2b65b697d473465cd7dcbbd37ee7743393b6257d030c7d43f735d4e CVE-2024-23147,0,0,5501f17ecc0a7e07475f9f72a63761eb8934129647aa8037d87bee0bdf7e043a,2024-07-03T01:47:34.407000 CVE-2024-23148,0,0,f163092e189644bb6f69811a212b9b411504f9f98d2b1dd4d6e9852bde1c5117,2024-07-03T01:47:34.640000 CVE-2024-23149,0,0,7651a42b0863370940c42057e714040687fb0f0a0647b4edfeea6ae3db85c5d5,2024-06-25T12:24:17.873000 +CVE-2024-2315,1,1,82ac007adc37f93efa55750ad424520c02632a1e6baef3a0d159ff1d04fed436,2024-11-12T16:35:08.840000 CVE-2024-23150,0,0,2ec2a3f5ae0ed899b10a9a3ad1ef287d5eb257340d2b38f86c7e5aa0270d1e52,2024-07-03T01:47:35.010000 CVE-2024-23151,0,0,53d13e8b9ba2cd63d85aa3df3bb17c4d39810557d3e3d9a803388619628364a3,2024-07-11T15:05:24.300000 CVE-2024-23152,0,0,0e8fa6b6600b8d3f08ca387890587855a0e6e8d15b4239d0aa342d6bdc58521b,2024-11-06T15:35:12.300000 @@ -246963,7 +246970,7 @@ CVE-2024-2398,0,0,1df50a613e2f34671ada45040fb8ddc3d4f8857a9d7670bf2946d253e5c247 CVE-2024-23980,0,0,bf2b71f939973eb2601ccef55cf253f9d61b06b906f33487d035e08b35f3546f,2024-05-17T18:36:05.263000 CVE-2024-23981,0,0,6986b178e2ea3287638a3d1f9ab311d36d0d1884ba34669bf9e0c674564a83dd,2024-09-06T20:27:57.367000 CVE-2024-23982,0,0,e20dba7ecea0c7b0131ca1d7f8e3faacb630088896c2abfd0452f78392132abf,2024-02-14T18:04:45.380000 -CVE-2024-23983,0,1,fee3b3675e425c1767d0b2dfc9efa51faa949cd1bb08dea3ea8a9d1cdc84368a,2024-11-12T13:55:21.227000 +CVE-2024-23983,0,0,fee3b3675e425c1767d0b2dfc9efa51faa949cd1bb08dea3ea8a9d1cdc84368a,2024-11-12T13:55:21.227000 CVE-2024-23984,0,0,d3e73193a48d5d3cf92db1c5b64a20f69007ddc7f878f4f1b9cdbda94c886b24,2024-09-16T18:03:16.707000 CVE-2024-23985,0,0,8249d0d4805632d5c5b5c3e0e9d62d8a14497ce894e5db21c14ac796aaeb2e32,2024-02-01T17:33:41.777000 CVE-2024-2399,0,0,6767e789c5e7e80586d75b3b6704c8a0508ed89afe73da734c95859ddd63a842,2024-03-15T12:53:06.423000 @@ -247731,9 +247738,9 @@ CVE-2024-25249,0,0,c8f53501756495a734a74ff7add6ed7b337966c8ca29065859babe4290aee CVE-2024-2525,0,0,0cd1ed7faad83b5a9e935ff66736a2f3ef52e3e5ca65ec7de6d2b90849c09724,2024-06-11T18:15:13.263000 CVE-2024-25250,0,0,30390a3108791fc3d353462d14426df849232b29aa14c37ad0af97fffe69a039,2024-08-27T20:35:13.350000 CVE-2024-25251,0,0,4d70de3df6118fbe7d3792c31913c0db5782c21a7d7e078c726229fd1ced9ad9,2024-08-16T18:35:06.257000 -CVE-2024-25253,0,1,203e38d78a9973d5dbfb7af68d6a7c0b966f27bc99e20e476215b8274464b2e3,2024-11-12T13:55:21.227000 -CVE-2024-25254,0,1,75baddadf2a950e768e45e3a21845924dd8061ec79f88172fc21d9dabfdad57e,2024-11-12T13:55:21.227000 -CVE-2024-25255,0,1,2ad57274319723666388ccf1bc79a31890093fb314bff7241db703f8228d1e30,2024-11-12T13:55:21.227000 +CVE-2024-25253,0,0,203e38d78a9973d5dbfb7af68d6a7c0b966f27bc99e20e476215b8274464b2e3,2024-11-12T13:55:21.227000 +CVE-2024-25254,0,0,75baddadf2a950e768e45e3a21845924dd8061ec79f88172fc21d9dabfdad57e,2024-11-12T13:55:21.227000 +CVE-2024-25255,0,0,2ad57274319723666388ccf1bc79a31890093fb314bff7241db703f8228d1e30,2024-11-12T13:55:21.227000 CVE-2024-2526,0,0,da44cbcd46359ce613873d7604fc44e9ca075cba9a523edc17aed5804a21af9d,2024-05-17T02:38:17.223000 CVE-2024-25260,0,0,6fa7a07676f89be99cdfd9160294fea45305c2bf656b7b3f6b3836cc1f08767b,2024-08-01T13:47:38.247000 CVE-2024-25262,0,0,8f24f4c38fd90e744be4f19671fa5e63b5c263766ec9e369e10b77ef5ec75569,2024-09-04T19:35:11.910000 @@ -249583,12 +249590,12 @@ CVE-2024-2752,0,0,9ac4a8690eeceffd759ff2fb7b55e32f8cb8bb4afb752110bdafa62b8f4bb6 CVE-2024-27521,0,0,142655bf7422b3c81bdc37fb7ef4329756d07238f339af47f3bda39ff16ed820,2024-08-09T21:35:03.300000 CVE-2024-27524,0,0,08e4bd6ccc21c266f96d6111b83d7d95158b2c7ca600162e7e70631b4fc240b9,2024-11-04T20:35:04.913000 CVE-2024-27525,0,0,e06f7e0695efcbe9bfa15a3ac23251ff54875c477a75b737778895eddfe51566,2024-11-04T20:35:05.800000 -CVE-2024-27527,0,1,f5026b1127d28c6f574e83d2008e38ddf99291dd8d6bdc8287a221c89fbc4228,2024-11-12T13:56:54.483000 -CVE-2024-27528,0,1,8e5e64d5896bb4f08bd65010fee44fd4bc816b91322c1d5da165f686fa4515e5,2024-11-12T13:56:54.483000 -CVE-2024-27529,0,1,ae5ac30d91d813ffb496447ac8ec9db4673e6f5f2a047bfebea87038b4ba4195,2024-11-12T13:56:54.483000 +CVE-2024-27527,0,0,f5026b1127d28c6f574e83d2008e38ddf99291dd8d6bdc8287a221c89fbc4228,2024-11-12T13:56:54.483000 +CVE-2024-27528,0,0,8e5e64d5896bb4f08bd65010fee44fd4bc816b91322c1d5da165f686fa4515e5,2024-11-12T13:56:54.483000 +CVE-2024-27529,0,0,ae5ac30d91d813ffb496447ac8ec9db4673e6f5f2a047bfebea87038b4ba4195,2024-11-12T13:56:54.483000 CVE-2024-2753,0,0,49ae39425f6531deb039d8727a759281a000c2c0b8058f4a13a0491f93794534,2024-08-30T22:15:06.227000 -CVE-2024-27530,0,1,d0e8cf9b008d00f34dc2439135c42d2b17ad385268aed8a62bc7cc21862e8d54,2024-11-12T13:56:54.483000 -CVE-2024-27532,0,1,33108dad0c7ee7bb8522025ebca4a44eac30b0fdc3bf3f3af35b25e37a41b55f,2024-11-12T13:56:54.483000 +CVE-2024-27530,0,0,d0e8cf9b008d00f34dc2439135c42d2b17ad385268aed8a62bc7cc21862e8d54,2024-11-12T13:56:54.483000 +CVE-2024-27532,0,0,33108dad0c7ee7bb8522025ebca4a44eac30b0fdc3bf3f3af35b25e37a41b55f,2024-11-12T13:56:54.483000 CVE-2024-27536,0,0,c377b0d21fbb5c7de68c4946896ec2f8ec67ef0d39bad02515cbb41c44d1bebd,2024-04-23T22:15:07.037000 CVE-2024-27537,0,0,3cbe9bcef09fe4fba870050d9e0c130363a525b398fa9371487301911d20249d,2024-04-23T22:15:07.087000 CVE-2024-2754,0,0,b524638ab8c26ee5de4a612af59349eaa47dac80099d3c62a685c43527d6353b,2024-05-17T02:38:28.527000 @@ -250059,7 +250066,7 @@ CVE-2024-28159,0,0,4a9f4f91b8aea86a42bde029558a44ab2b24f6212168e8c6c34372a6626e7 CVE-2024-2816,0,0,1ff2465397674739fa53ccc9486babdbd16fc63821544c8b1e2bf9f4ddfd16ff,2024-05-17T02:38:32.100000 CVE-2024-28160,0,0,e52617550a8ff7dbfa6f0a6742a3be164312b10bed4d3f17aad19c179569ef4f,2024-11-07T17:35:16.407000 CVE-2024-28161,0,0,732a0ccf3a0c78179498ba4c5715c7787b053aa5997b6e9c437de4d97e88e833,2024-05-01T18:15:17.180000 -CVE-2024-28162,0,0,1ec7e71177e25cd293cbbf1e2069c505933e30b0255293c8f25c76750a7bdefc,2024-05-01T18:15:17.223000 +CVE-2024-28162,0,1,755d306fd311701bbe86ac9be3ec2b0c299df65b6f39b9390d67e843d3998f72,2024-11-12T16:35:08.007000 CVE-2024-28163,0,0,b559a456c891fdcf20fbbbab8887f6be9d0dfdc7fd048fd9d3a99e789aac31bd,2024-09-28T23:15:13.217000 CVE-2024-28164,0,0,ad548c66e5661c4e8af5a7b236b78552ef27421cd91cd0f63f8c805acf9b4cbb,2024-08-06T16:40:49.433000 CVE-2024-28165,0,0,46715a30feb276737abc87d7ed511464bf9b4ab74c972d46bf629bd896d4f942,2024-05-14T19:18:31.490000 @@ -250632,7 +250639,7 @@ CVE-2024-29071,0,0,9573b1daf2437c3a5d598bb2715607359543c337565b61f9e632dcab5540e CVE-2024-29072,0,0,50e2db556663c43fd665c3ae801a5bd36f73f0e7479a230bf4ff9553f9fcd995,2024-06-10T18:15:30.110000 CVE-2024-29073,0,0,c7a1ecc52b2710f20eb4ca399da6fabfc271c86a39117df7ecabe6454fad279f,2024-09-18T18:31:42.290000 CVE-2024-29074,0,0,dae045c5f696de776b77da3987f8405651ce1bf4fa99e4d5313acc43e5165076,2024-04-02T12:50:42.233000 -CVE-2024-29075,0,1,5f4ceb8e1519bbaa6bc09ea81eba95b9d8df6e5520fb957f27607d429d5b6e04,2024-11-12T13:55:21.227000 +CVE-2024-29075,0,0,5f4ceb8e1519bbaa6bc09ea81eba95b9d8df6e5520fb957f27607d429d5b6e04,2024-11-12T13:55:21.227000 CVE-2024-29078,0,0,a4fab3b35091f8fd08881f2bf49d899dc5478faeb8df15472b3560684c1a5420,2024-05-28T12:39:28.377000 CVE-2024-2908,0,0,3845fc124bc9f710736d5363f9b086190df4e2925cb4e5b4a7eb9455fd55b3c6,2024-07-03T01:53:38.703000 CVE-2024-29080,0,0,122d2248f2a74104ef56e4b4f36a007e3f0c20d936565d94fb482f471e756277,2024-07-22T13:00:53.287000 @@ -250671,7 +250678,7 @@ CVE-2024-29115,0,0,b12a9dbf612250a49df2e6948fc40b23d35ff13f6aa9d2beedd64c49a8ed8 CVE-2024-29116,0,0,d85dc6ae194d83c2dbd05b4e1cc8c25eaf9e91cd72cd7e6ae549c7eb131b7c33,2024-03-19T16:33:58.680000 CVE-2024-29117,0,0,7cbc86fd47b57aac5bdcb66853eac01c2823bf8c332ca79b8820d49cc7cba209,2024-03-19T16:33:58.680000 CVE-2024-29118,0,0,1cf920921a96fd5f0eb418dbd890604a04de50213d4066e1f2401f217f180df5,2024-03-19T16:33:58.680000 -CVE-2024-29119,1,1,738a7b7e804b6feffc33f998d5fbd83a1b05ef16b9a6d435f583f42a46ae6f6c,2024-11-12T13:55:21.227000 +CVE-2024-29119,0,0,738a7b7e804b6feffc33f998d5fbd83a1b05ef16b9a6d435f583f42a46ae6f6c,2024-11-12T13:55:21.227000 CVE-2024-2912,0,0,f62836a8afe15e49afc11abef746f6e05f5ae0f68099e584fae53277c8c9f769,2024-05-22T16:15:09.713000 CVE-2024-29120,0,0,78c90aabb60b47ae0f53200ae68c321a924594adaa36ca07ddfc55333a41ac19,2024-07-18T12:28:43.707000 CVE-2024-29121,0,0,6325c10b522d77de76e2af8d35d0ad7dde2dffd7703677e5c3f9cd67ab864731,2024-03-19T16:33:58.680000 @@ -251528,7 +251535,7 @@ CVE-2024-30311,0,0,9aaaf7a631f27c18ba0d6e026b9e5bc097be151497f5f87035ce25407b016 CVE-2024-30312,0,0,f08a9328fc0df8fc97205027f081abf4a30dc22420a8570eec8a2d548e77aee7,2024-06-10T18:15:30.880000 CVE-2024-30314,0,0,001958112e812873f2afe024af602bc1e18aaeafca421eccd7dc6e99cd4f7d19,2024-05-22T08:15:09.777000 CVE-2024-3032,0,0,3ff0e9ee56a036f5520ddd218b15f57f43b4ef20b5bd57e06a8e81c2e3d08ed1,2024-07-02T14:45:48.633000 -CVE-2024-30321,0,1,77e82c6b15f80502cfe967b03a0cf5e1edff68cc4e25f0455ce9c65c8c4bfbce,2024-11-12T13:15:07.503000 +CVE-2024-30321,0,0,77e82c6b15f80502cfe967b03a0cf5e1edff68cc4e25f0455ce9c65c8c4bfbce,2024-11-12T13:15:07.503000 CVE-2024-30322,0,0,f4e26e42e44429b86d19dca1655fc9b0e6d4cf366473cd59d34a3fd4371a1053,2024-04-03T17:24:18.150000 CVE-2024-30323,0,0,d6d47200d4c92fd98c85bfb81a96ff4ecd5c84bf8181d1e9578fd9917f267b5b,2024-04-03T17:24:18.150000 CVE-2024-30324,0,0,2ba1ad1289d8b66663b4964e19479732233e6bad3226f2e9625162b9429d0e05,2024-04-03T17:24:18.150000 @@ -252050,10 +252057,10 @@ CVE-2024-31077,0,0,4ee4934fb388f0c6aecae8ff57d029bcb5098c8db84cc409e7cf47f67893e CVE-2024-31078,0,0,b0bbe41ef9db9ceb087fcafc0c2efaa7f33c48976a0bab70d091b39f8b940d0d,2024-05-07T13:39:32.710000 CVE-2024-31079,0,0,7b022d1b68d2e4d6083918cd5bedebc752ca3a191d73bb4a1d52466186b516fb,2024-06-10T18:15:31.023000 CVE-2024-3108,0,0,da90f8f46c09bcb2198c43fdf0f557ced476d6d11a9810f11a2eca18dace7b1f,2024-05-03T14:17:53.690000 -CVE-2024-31080,0,0,ecd0d410fea74fb7c91ad22d750980f869c4831a29d7eb05952bb8886c92aff7,2024-09-16T19:16:09.680000 -CVE-2024-31081,0,0,b0cbd83f79cbd38494b283ae9f38a0c1987a0d4ce2de77931640b2637a0fb263,2024-09-16T19:16:09.940000 +CVE-2024-31080,0,1,3b9d2494033fb387c3c295eb2de7b3d391834f87e7478f31592089c17b045145,2024-11-12T15:15:07.940000 +CVE-2024-31081,0,1,25382389172b3c9784b69fb4b12eb1ccebb3959688c6518df06f4bb777c7baeb,2024-11-12T15:15:08.220000 CVE-2024-31082,0,0,5f84509c4a6c966fba50cc7893587e621dc1a2c2fc05bf4607662efd4efd87fb,2024-07-14T19:15:02.080000 -CVE-2024-31083,0,0,a0c45f44a468f97a391d6186e49ab385384a73266089fd9ed99476b006798258,2024-09-16T19:16:10.120000 +CVE-2024-31083,0,1,690a27f3dd2345803e961ebbf97659386725d113a2a1b6666464350f6c1bdae8,2024-11-12T15:15:08.420000 CVE-2024-31084,0,0,41d634f6947380fbd38163b98d20d79eadd7ac98ab45077f59de33db1d3e4818,2024-04-01T01:12:59.077000 CVE-2024-31085,0,0,590e50ba650eba0770b80fe595ca66df49dffc2ecf0c3c269ceba9c6316e22c6,2024-04-01T01:12:59.077000 CVE-2024-31086,0,0,31a67a259725637ee05247eefd01e9dfcec241510014a139d8adb34fad01a2f3,2024-04-15T13:15:31.997000 @@ -253953,7 +253960,9 @@ CVE-2024-33654,0,0,59ce1dc0a959d8fd849b3bf72d6a089a8a29bff8045c4a710ae01079c92a9 CVE-2024-33655,0,0,9e64ca7b34c4566d1306046984ab49450e7da90a07f23b1974ef43c7b46b8b70,2024-08-22T19:35:27.177000 CVE-2024-33656,0,0,bcce08f394a095ebca60ada0fb4a4aafac76a15e930d7944ca1f9457799a1c56,2024-08-21T17:24:59.627000 CVE-2024-33657,0,0,4304e9ad6a833f4e772f3f337e66d35550f113c5280de638d62e655b681eb6cd,2024-08-21T17:24:59.627000 +CVE-2024-33658,1,1,7ec786af652018554563dd5034aeee301f75b566ef802a05fbc7cb6fd23d9467,2024-11-12T16:35:09.080000 CVE-2024-3366,0,0,a2c419b6dceb854c8524f6fea56c90f31e3f9047e1890ead74a66fe52a9e4023,2024-05-17T02:39:53.090000 +CVE-2024-33660,1,1,4b17c364098df26036513f96d1c9980a4cfb9666b7b21b4b9ccccafda7d67e09,2024-11-12T16:35:09.330000 CVE-2024-33661,0,0,1fe83f392b56cfa5102f5ff20013157b18140b66b95ef00cb93915789153e2d5,2024-07-03T01:58:33.073000 CVE-2024-33662,0,0,39e1cd5f3535462ce03b3b7218d482fa87d6e966ad84208fedd426957dabfc0a,2024-10-04T13:50:43.727000 CVE-2024-33663,0,0,e1e5e3bf2bfb6f84f42175dcb29cc9799e837d7e631a8436167d9acbf72c8e21,2024-09-03T20:15:07.433000 @@ -253990,7 +253999,7 @@ CVE-2024-33694,0,0,26d440cb75dcd86544ffadb69d95d3097f1e6a23ac05fe9a05fb2494be46d CVE-2024-33695,0,0,496bc8a3b6cc06e0f2cb2ff5ef3180780eefdd07d63e68d063cf97ba79dd8598,2024-04-26T15:32:22.523000 CVE-2024-33696,0,0,8adc0db7b8cce33b994e835fa3f282e25f1f4ef5644a2aed7cd50d800fe731e7,2024-04-26T15:32:22.523000 CVE-2024-33697,0,0,4a571113caa6ccf495d29be30608c42f9dddf9084d1562bed260e698c04aae88,2024-04-26T15:32:22.523000 -CVE-2024-33698,0,1,80f9728a007b76bec9e55fcababf9ce2d8cb5c11944f565f0d36feef068c4511,2024-11-12T13:15:07.653000 +CVE-2024-33698,0,0,80f9728a007b76bec9e55fcababf9ce2d8cb5c11944f565f0d36feef068c4511,2024-11-12T13:15:07.653000 CVE-2024-33699,0,0,81b1f37e6f990294e3d0e58469f3ce075096d2792432fa2b41bba58241b973e9,2024-11-08T17:09:29.790000 CVE-2024-33700,0,0,800096d409fd3a2a3a42bcca491373284624d5b7e93ac5ccde5cb0263c58657d,2024-11-08T17:06:16.147000 CVE-2024-3371,0,0,d2e6ea20ce5eb692a4e48c27aedae40a56c8f7db204eed4d633cbd78a04f68c4,2024-04-26T15:15:49.357000 @@ -254209,8 +254218,8 @@ CVE-2024-34010,0,0,7772431fddbfa4456518c6f3c79bfb5e61dd9e04f9a0c45164641cb3c48c8 CVE-2024-34011,0,0,1cdf95201b7c3fac8642eb93e0c0ec77c02ae32f22e51c68db8a6f76ced93031,2024-04-30T13:11:16.690000 CVE-2024-34012,0,0,5230526342507ce0f85dd47c2323d42603a1fbec4e476f393dfaf1722db209eb,2024-08-07T15:33:46.150000 CVE-2024-34013,0,0,31f555436f56628c9b80feda54af6c121f0002b6c021c0928728c76ed328d68f,2024-07-19T13:01:44.567000 -CVE-2024-34014,0,1,19c5264c523207a9d1612333579b4bd9958d1edf33e7a29ece8ee000c8e7d9d7,2024-11-12T13:55:21.227000 -CVE-2024-34015,0,1,35df50e6184bdbd395cc459e0d389536c51d42126dba9273f088c696d33a0fa1,2024-11-12T13:55:21.227000 +CVE-2024-34014,0,0,19c5264c523207a9d1612333579b4bd9958d1edf33e7a29ece8ee000c8e7d9d7,2024-11-12T13:55:21.227000 +CVE-2024-34015,0,0,35df50e6184bdbd395cc459e0d389536c51d42126dba9273f088c696d33a0fa1,2024-11-12T13:55:21.227000 CVE-2024-34016,0,0,0c2a3147a84e04c06db0d6af075b8e16276b7cf9e5f22acd81f74dbeca1a1c49,2024-09-20T12:31:20.110000 CVE-2024-34017,0,0,379da20aff6514952cc55653119ad0cbc16efa57414348c26e21b9e45ed9a8a1,2024-09-12T17:16:09.890000 CVE-2024-34018,0,0,85758f76e2c70fa3c1ddd863e0fd37888b91679fea3b3a22992906144958936b,2024-09-12T17:17:20.873000 @@ -254738,14 +254747,14 @@ CVE-2024-34670,0,0,c7f7a5e478bc1a10ace61979abf21c947b061684824f9606c72fa122e8a61 CVE-2024-34671,0,0,a08598303b7cc44bc7ce36474bf6973e3d3c57f08611bad7aa18ef971deedc26,2024-10-10T12:57:21.987000 CVE-2024-34672,0,0,5b999fcfa370bba972f9e6370e3179075f4c5c678a82b2140b4d119a0d64c655,2024-10-10T12:56:30.817000 CVE-2024-34673,0,0,7f83fbf08444ae07cde3023a5310d65400d5764991b6b85a9db840c7c7fb62e3,2024-11-06T18:17:17.287000 -CVE-2024-34674,0,0,8f6ea897ef696c85f2cf32a1e78457ae5fcaadee9dc149785dc200ced2ccbe68,2024-11-06T18:17:17.287000 -CVE-2024-34675,0,0,85e77a124c9b0930a000cb7d1e6b21287199f1e516871f519122e7a8a39d8d6e,2024-11-06T18:17:17.287000 -CVE-2024-34676,0,0,d6fe8dfa4b37d0857cd8f59029314a2e3ff2a9e56606612918be8977a523c53f,2024-11-06T18:17:17.287000 -CVE-2024-34677,0,0,645ed887e5e44e5044e8437d4b35871309ff8b8879bc60727f65682c38fae2a6,2024-11-06T18:17:17.287000 -CVE-2024-34678,0,0,c41b03686431110896396e26f8c1185638cf9d2bc67169ea8d59a1f475b3ce26,2024-11-06T18:17:17.287000 -CVE-2024-34679,0,0,6f77efdf9879de749b3809311925a7aaec602488efc2814b41f6d652ca61d54f,2024-11-06T18:17:17.287000 +CVE-2024-34674,0,1,6db49eb94e9b436eebb5ac220cc4d275009cd7fd336993987f387575b81bd4b2,2024-11-12T16:08:56.463000 +CVE-2024-34675,0,1,892df28b69656f69365a7f8edc71187489e44c6810037789232a9b103c622a2c,2024-11-12T16:08:22.760000 +CVE-2024-34676,0,1,df9adda1a41a0cbaab93a9021708d73f1a05c18677018cfcb6bc6ec91d4684ea,2024-11-12T15:31:08.867000 +CVE-2024-34677,0,1,419d94cd80168e6c9c2f23d30d4c431dd3314ccc20a0abdd048aea94917456ff,2024-11-12T16:07:39.377000 +CVE-2024-34678,0,1,65e25f5dedc7a695a283c64763eb4a380fce0913cd365be28d481950ffc5b3e7,2024-11-12T15:30:20.817000 +CVE-2024-34679,0,1,563019ead4b642cddeb5252c9e4ae0dd09e3c21cb5939b7438c2a740788ef446,2024-11-12T16:09:28.760000 CVE-2024-3468,0,0,b143f709020bfa0c4d31a3d3e75dcacae5f0344d8dcf22b8e7a02c60ed5e45e0,2024-06-13T18:36:09.010000 -CVE-2024-34680,0,0,8025c4524d7c2d250fc1e7f9d788bf2e3baff70aab679db3d27ab73933cdd22d,2024-11-06T18:17:17.287000 +CVE-2024-34680,0,1,12a76f66aacec2683c917e4fae09c1bf140017e6e48295370847dc703f71717a,2024-11-12T16:04:08.997000 CVE-2024-34681,0,0,74e83c108d86c9c111ba1513170d8663aad0047805851f01eef53e1e70cada33,2024-11-06T18:17:17.287000 CVE-2024-34682,0,0,7f365da8ccb9669e20a136ed19bf8c74956c08dd18722ca07ecd4a5371d1f200,2024-11-06T18:17:17.287000 CVE-2024-34683,0,0,9d29c0ceca80aeb9ddf34072d48291a9d5d5d5decac1bcbe5defe30bff14c867,2024-08-09T20:04:44.060000 @@ -255202,18 +255211,18 @@ CVE-2024-35401,0,0,e20c7deeda0300f83b1078cc4b3716ac7ed24c4deff40921468ca6f87181f CVE-2024-35403,0,0,4d9a98843a184aa3f7fed28ea2e26cfcf04b1cff379a69b2f7e72017e9a927ab,2024-07-03T02:01:44.377000 CVE-2024-35409,0,0,c1e09f17fc040d1a54c6ca919b4e6df91e3a03195ff96673036c48a4d8f8f539,2024-08-20T15:35:15.637000 CVE-2024-3541,0,0,14abae851d976e531eb89e36d00e68f1b4222a58cf78e09467f8f13cc823ff73,2024-05-17T02:40:00.373000 -CVE-2024-35410,0,1,9934f2e6e366ff34bdd808724edcc20da9d4ffa302f6042b1ef31ec5c87c8f5b,2024-11-12T13:56:54.483000 -CVE-2024-35418,0,1,127590939381ac9ea1bca215e8e87a187a90e6c39b1f8c2664dbc969ec02cf66,2024-11-12T13:56:54.483000 -CVE-2024-35419,0,1,79d5a4b5dcbe4e8eaf7fd55e488336beca6605ee161decf1cb87124f4bef4457,2024-11-12T13:56:54.483000 +CVE-2024-35410,0,0,9934f2e6e366ff34bdd808724edcc20da9d4ffa302f6042b1ef31ec5c87c8f5b,2024-11-12T13:56:54.483000 +CVE-2024-35418,0,0,127590939381ac9ea1bca215e8e87a187a90e6c39b1f8c2664dbc969ec02cf66,2024-11-12T13:56:54.483000 +CVE-2024-35419,0,1,77ead0780a68b696ac114e0cafe1c352c44b6817832d7b710fb85987af543cdc,2024-11-12T16:35:09.570000 CVE-2024-3542,0,0,5a8537177eac38ffc4c0459430c529ffd4234d4390bfe331be843583f4e31e36,2024-06-26T18:15:15.750000 -CVE-2024-35420,0,1,4c667b45d6476240fa11c340168a28995c519352d0d8af72f70403dfb921e277,2024-11-12T13:56:54.483000 -CVE-2024-35421,0,1,7e87ac3f5410e04e9abb36fdd338b79031b328859540810f63e4d493d6c0601b,2024-11-12T13:56:54.483000 -CVE-2024-35422,0,1,b9bfa2f034cc28aa329b7303c5d5535b358012d05cdc610f1af9887acfa0b93f,2024-11-12T13:56:54.483000 -CVE-2024-35423,0,1,56d92ec2919d56dd22b81ac5eb15ec06a5e03b6a369cacba48d7c74f18cc2073,2024-11-12T13:56:54.483000 -CVE-2024-35424,0,1,91778ea6f9a3fcaeb3f6c435f71721bc1c0da0f9c9d9dc57ba2d684a2b349e95,2024-11-12T13:56:54.483000 -CVE-2024-35425,0,1,a926bcbe623ec40ccd614a0f3b859bfcf6214b6f1ee8799ccb7c0f737e258ad2,2024-11-12T13:56:54.483000 -CVE-2024-35426,0,1,56983239ea77e47170ba9ea9cd0da0ca626f318406f7400ccb4105a247802954,2024-11-12T13:56:54.483000 -CVE-2024-35427,0,1,b2e4830751ded3811da38047fd71578b327b0b289951171b7ec7e633c1aa5d27,2024-11-12T13:56:54.483000 +CVE-2024-35420,0,0,4c667b45d6476240fa11c340168a28995c519352d0d8af72f70403dfb921e277,2024-11-12T13:56:54.483000 +CVE-2024-35421,0,1,352e363e5c883c2c66505e433f951e8999b219db6cbd6293c4bdd2f64e99938a,2024-11-12T16:35:10.447000 +CVE-2024-35422,0,1,1241ed0ebb5f391f2364e38fffd979f9b99255d936a154e4d0a9366f235ba4b3,2024-11-12T16:35:14.203000 +CVE-2024-35423,0,1,33eb9412472842bd71735d54f4c85e836f85667840484c5493e4d718f535e52a,2024-11-12T16:35:15.027000 +CVE-2024-35424,0,1,8f9b74f0581e1381a713da933ea07c1f760187c5723033074f0a03cba05ada50,2024-11-12T16:35:15.950000 +CVE-2024-35425,0,1,538c5756994fbfa9bb6e2b4a7135507d66d437c2f1230100d3db4bf3aed8d797,2024-11-12T16:35:16.757000 +CVE-2024-35426,0,1,cdf55b854f7935bab6485801289e5a7c59c712ac998c9a7cb2e4b1f025d5f407,2024-11-12T15:35:05.420000 +CVE-2024-35427,0,1,db4cb5cdaf461bb557f3a629331b90f2d54e1960844658d8fa00caa57802d362,2024-11-12T15:35:05.710000 CVE-2024-35428,0,0,3c09284a2d1421b49e443adf71c33cb44461617fe2c22ed9a85a4142b030cc7e,2024-07-18T16:52:56.760000 CVE-2024-35429,0,0,330b233a9d961e5ab60bb84ab073545ccf41085088e749b133fee4692c3b4424,2024-08-01T13:52:40.290000 CVE-2024-3543,0,0,14aebe52440b6c29accdfa7acf400fe951e7d7441b56210ed47a5a2c1e52128f,2024-05-02T18:00:37.360000 @@ -255461,7 +255470,7 @@ CVE-2024-35779,0,0,706445338be7aae5f251c8b956a0c3bf0868336274fe9963a1a9e43c59067 CVE-2024-35780,0,0,685b106b3d65ae1869c2c1c35a0354f69b2eb70c614d38b4e2c684c295e7d786,2024-06-20T12:44:01.637000 CVE-2024-35781,0,0,aa3ec547f8f8f306fe8ea0fb55240637cbf26b27603624da2638b54b69436759,2024-06-24T19:15:58.517000 CVE-2024-35782,0,0,dbc038df298fe5384dd87379cd2931409975f0d218f64474d4c9dcc1abcf8e97,2024-06-05T19:50:20.463000 -CVE-2024-35783,0,1,d79ab68d42244f130ba11443da6d22068dae4bdc2cf757ffecee969e6f6215aa,2024-11-12T13:15:07.830000 +CVE-2024-35783,0,0,d79ab68d42244f130ba11443da6d22068dae4bdc2cf757ffecee969e6f6215aa,2024-11-12T13:15:07.830000 CVE-2024-35784,0,0,5d7a60327e3aea236c6954addcecd342bc4303bf9f4ddbf6fdcb56f7d7e890e7,2024-05-17T18:35:35.070000 CVE-2024-35785,0,0,215198d3fe49082f5135d6e547d9efd784a139fec730129e983f97c5bc887ba2,2024-11-05T10:16:36.367000 CVE-2024-35786,0,0,e8af1ef6ccd4fa218271a6a20ff9f509feb225a9368ed4f0a4c142495813a3de,2024-05-17T18:35:35.070000 @@ -255758,7 +255767,7 @@ CVE-2024-36056,0,0,1ad654e1db1ea66b26b566d0bde36516eb16d5510c8338c17ed9148cd915f CVE-2024-36059,0,0,1bfcf57b05ec1b5718039a8c5e3ecbe365e021b33c057bee57a114304a3b8db6,2024-07-09T16:22:38.580000 CVE-2024-3606,0,0,d0a3a8d7c3b8995b719f693dd3907a6cc0220e7bd0b5d59f68093556b8c3a6af,2024-05-02T18:00:37.360000 CVE-2024-36060,0,0,0aa7d62145c5618b7f76bb2535f9fc77a196990e59fda038d7a6d0a4665703fe,2024-11-01T12:57:03.417000 -CVE-2024-36061,0,1,10b600ea9e81162f2fdf5c7ce1bb9189f75ce1544ec86abdd84a86301daf6307,2024-11-12T13:55:21.227000 +CVE-2024-36061,0,0,10b600ea9e81162f2fdf5c7ce1bb9189f75ce1544ec86abdd84a86301daf6307,2024-11-12T13:55:21.227000 CVE-2024-36062,0,0,b3531d0a2dc0e87d59ab63f084c9edf17440e45c41fc2b9fc6cd7ee0d3d225ea,2024-11-08T19:01:03.880000 CVE-2024-36063,0,0,137e9651a11a86729a19db077a10e17c476e8bdc06700335b2e00d6c3dad3c82,2024-11-08T19:01:03.880000 CVE-2024-36064,0,0,783529a7ed67c566f9b5978c94a6c15f086f6661d090c8cd3e70b94f4926834f,2024-11-08T19:01:03.880000 @@ -255816,7 +255825,7 @@ CVE-2024-36136,0,0,5d95909c13f0d8392324a7365478397dba5326ae554d2812281ea77aabac6 CVE-2024-36137,0,0,9438d2b71ef73887d75e6f454e33b7f397670092254d4a5da60582748cb22f74,2024-09-09T13:03:38.303000 CVE-2024-36138,0,0,e6354c672dea5a9efe6496da7c00037de66d6aa6e785f55fccdeccb25bc2c9b3,2024-09-09T18:35:09.367000 CVE-2024-3614,0,0,7d52e3588cbb3715dc858d110e11a928859b665db7d4d54abdbcae84467ecd9e,2024-05-17T02:40:01.707000 -CVE-2024-36140,1,1,339aa114c9b4ee85084777ff864435ce00ae50f8bdcd2f9c6e4c47ffb9909a55,2024-11-12T13:55:21.227000 +CVE-2024-36140,0,0,339aa114c9b4ee85084777ff864435ce00ae50f8bdcd2f9c6e4c47ffb9909a55,2024-11-12T13:55:21.227000 CVE-2024-36141,0,0,18db6c112ccc0d71f5b13b30aecab0a5f2370100cf994f0af07b87507f970796,2024-06-14T20:02:18.553000 CVE-2024-36142,0,0,6ae7dd3b3d84d3e60ab36df1a1df499d7a9063449a2d0a679757a0e6ad8f4e57,2024-06-14T20:00:46.803000 CVE-2024-36143,0,0,b9ffa4a4b0c08b2c09cabc08087789a8d9178358a74a11dff2dc25f2bba0c28f,2024-06-14T19:58:25.220000 @@ -255929,7 +255938,7 @@ CVE-2024-36244,0,0,72ec9199c50b58fba1710bd51385a13f86b624ab2159e939e6a1444afbe8d CVE-2024-36246,0,0,d22d56b3ac190fbff4b5b820bf9253b2e2f7fd0137ac45e12945d45896804b68,2024-08-15T17:35:07.080000 CVE-2024-36247,0,0,16c6efe40503daf1080fcbf6d9a009e1a3c1386098439c6bda19cf80a4941086,2024-09-23T14:16:11.290000 CVE-2024-3625,0,0,fb0a948a4b5da0bdab04bf1595a286af67dd68466c0feac9aee7f6c3556ca9e2,2024-04-26T12:58:17.720000 -CVE-2024-36250,0,1,f1ff69f14ede471d045ecea4e07eb768c64aa81715b0797b12e949899e7345f9,2024-11-12T13:56:24.513000 +CVE-2024-36250,0,0,f1ff69f14ede471d045ecea4e07eb768c64aa81715b0797b12e949899e7345f9,2024-11-12T13:56:24.513000 CVE-2024-36252,0,0,4edf18ae557d8c3498076af1a69a7b853e545554a27b9b0b40bcb780d22c50d6,2024-07-03T02:02:59.060000 CVE-2024-36255,0,0,a469b4be0a60fb4a2e32368cbd9ff1f41eb30d9e30ebf5e64783accfe9b2d73a,2024-05-28T12:39:28.377000 CVE-2024-36257,0,0,de59e82b2cc868e7dbd975a3494539da4e2b96eaf9e15fff111a5d725848914c,2024-07-05T17:06:28.517000 @@ -256603,7 +256612,7 @@ CVE-2024-37266,0,0,44943b1bec747c3c4ecddbc943aaff365210584d2dac21ff41065ed54e40d CVE-2024-37267,0,0,0d692f1d5fdd2443078b17f2b54167a732ba33e5479382e14b7e2bd4b6ec49a8,2024-07-25T13:47:43.833000 CVE-2024-37268,0,0,32108042cd6042edb5d9a980c4bc9e7e171800cf8a42366d53d95c0b76a50314,2024-08-29T18:56:01.267000 CVE-2024-37269,0,0,5492c3e2784c69694729387dab80db99196a2883d5d6034e825fece97f9e6e31,2024-11-01T20:24:53.730000 -CVE-2024-3727,0,0,b4ce865f62bafd3dc815d8549b0ea67d6c2ff3d32f651a7a8608e4dfd0460fa5,2024-10-31T05:15:05.160000 +CVE-2024-3727,0,1,f1091ff91b0c17dfc5be2440e4c5dfe3e0c3d5c059984006e946ee5589d55aa4,2024-11-12T15:15:09.300000 CVE-2024-37270,0,0,09adf8729d6feae3191994dc6f2b286449a8e4d910f8c343a3a9496ea050a29f,2024-07-11T13:05:54.930000 CVE-2024-37271,0,0,82adde283ff9dacc0f77be200c055ea2f2c58a80387c070880c7d1f2c1068d32,2024-07-25T13:46:39.273000 CVE-2024-37273,0,0,2a85b1da0ca6e483bcfb6dea755537146c70a6967cba53f16b02bbb377a77813,2024-08-15T14:35:03.053000 @@ -256691,6 +256700,7 @@ CVE-2024-37354,0,0,1c9c2b9759a27bc79306f5cb9126cef72a7c04362733e7564295ad2108318 CVE-2024-37356,0,0,87be71b6c397fc4ae7045a825136d0160763f40b355adc848988c0a36a53749b,2024-07-15T07:15:07.650000 CVE-2024-3736,0,0,b941adb3999a1882f23d91471ffa003b4e585e64ac32ac14e9275a75eb2f6460,2024-06-04T19:20:23.987000 CVE-2024-37364,0,0,ede4925e44433ddaa6ada4b563ccb7aeb6a9e3cb870f402cba816f78552263a4,2024-07-03T02:04:15.133000 +CVE-2024-37365,1,1,33101015494fc888bdf285e1057a873d002960df3a0d94721f5e9bc481653c68,2024-11-12T15:48:59.103000 CVE-2024-37367,0,0,fc795c705b992ce820b48f0d2d268ffab4e95ab1a4d3d8de7fa966ee5dbe9cc9,2024-08-16T19:29:01.433000 CVE-2024-37368,0,0,40e16212115ad0befe218b2b8486634b2a8dd47d668209808f605a27a2118d54,2024-06-17T12:42:04.623000 CVE-2024-37369,0,0,4a0e873966c59da3f94ba1e845b6380e279da692e22304116efbf6efc4fb0a5d,2024-06-17T12:42:04.623000 @@ -257855,7 +257865,7 @@ CVE-2024-38818,0,0,622849f8ff4dfc75febef96b69e498222845497635b94ea6c1bb47520700e CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d46,2024-05-17T02:40:10.457000 CVE-2024-38820,0,0,50758758d32f5bb9d0664ab5254e279459d398846823826c47d2a8b01a7200dc,2024-11-05T21:35:09.393000 CVE-2024-38821,0,0,bb251b2231aa5ec8776de9aee89d7b4c729d7a41bc68ac186fa12d01aa093b81,2024-10-28T13:58:09.230000 -CVE-2024-38826,0,1,d2dc3bc0b0f77945ea4b1900d4b45fc9041d9a4783cdeb176eb488aedabdfbeb,2024-11-12T13:55:21.227000 +CVE-2024-38826,0,0,d2dc3bc0b0f77945ea4b1900d4b45fc9041d9a4783cdeb176eb488aedabdfbeb,2024-11-12T13:55:21.227000 CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000 CVE-2024-3885,0,0,9b28a2ee85edfe77753e71858fb1438bd68a9b6ee299843f3a5752cca4753d01,2024-05-02T18:00:37.360000 CVE-2024-38856,0,0,cf2c30abb1c3c3e6b03acfa253b7bd98efa464ab76b49fddc2034ce3ce8a3be1,2024-08-28T16:15:58.043000 @@ -258051,6 +258061,7 @@ CVE-2024-39276,0,0,32d71e300deae390ebad47139e8119dcf57d5112942186e3daeae896a6726 CVE-2024-39277,0,0,19274852af9a44581ed7b5da931e969f3e8eeda9b8a06df6105e4982b2efa2f4,2024-08-20T14:35:25.887000 CVE-2024-39278,0,0,51fae5fc06f1bea217dd270a1a945e50fc908e01cdd6aa79fc8df1b8bf725907,2024-10-04T14:36:35.340000 CVE-2024-3928,0,0,3771bfd5d61bb660489266159da597b0f2838c8fcc0fdb41f660ee68264744db,2024-06-06T20:15:13.813000 +CVE-2024-39281,1,1,3419a2439625cfc41f8c1fc2af52d02a93ea28cf83965accb2fa3b9f5e648646,2024-11-12T15:48:59.103000 CVE-2024-39283,0,0,3cb180f3de5aa4a3b64779758cf8f61008b6ae73b857127aaaa5aa752ce57774,2024-09-12T19:15:46.390000 CVE-2024-39287,0,0,95145d1fbc5d3c99088ebf6343df14053c1bba8568afd021848bf0425c858769,2024-08-29T14:23:31.807000 CVE-2024-3929,0,0,f18b8c9cdb1e48904246b7e57e142d1a1782977d19d7fe85b4105fb3a35bceaa,2024-04-25T13:18:13.537000 @@ -258111,7 +258122,7 @@ CVE-2024-39350,0,0,933f5cf4e1e8654d4184b998e6e3d84f4d423cc036a81e5a6851a5092c592 CVE-2024-39351,0,0,9b4d39161319839f1a0a214dc211a28fd92f2da777165762a051c899eb88a499,2024-06-28T10:27:00.920000 CVE-2024-39352,0,0,2125967ac59376c4e2a4b0fc39ded99823f5fb5459f0421dba32eed656bdf603,2024-06-28T10:27:00.920000 CVE-2024-39353,0,0,2167a4e696755ebb97fec80f167f71100aa107b125d2865a5fb1a76c1e17f7f4,2024-07-05T17:06:55.800000 -CVE-2024-39354,0,1,9a28ef530387e111c461944af4e0d300591f7f1f655a1f7d86a6dd34c432f8df,2024-11-12T13:55:21.227000 +CVE-2024-39354,0,0,9a28ef530387e111c461944af4e0d300591f7f1f655a1f7d86a6dd34c432f8df,2024-11-12T13:55:21.227000 CVE-2024-3936,0,0,eb020bb37778f80e494a260dbac71fcd852240dc2c6ce10d95e3bece33882ba5,2024-05-02T18:00:37.360000 CVE-2024-39361,0,0,8673bcaced52217297c8c7fce708f73bcd943cb4e490aea668f5945b814898d2,2024-07-05T17:07:34.827000 CVE-2024-39362,0,0,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000 @@ -258343,7 +258354,7 @@ CVE-2024-39598,0,0,7470f47887cb5c1b68f5de254806da714a54b198dfff3cc99fe82ab56ad8b CVE-2024-39599,0,0,71c6e22ff50e3a1f14090d5ce5359c041b1ab088b8ff29fe36a33f35ff802136,2024-07-09T18:19:14.047000 CVE-2024-39600,0,0,3f218b3b2797556a97f50f1b3db443b951be2a33b8f95e3d04ecb200803e8aaa,2024-07-09T18:19:14.047000 CVE-2024-39601,0,0,7691c6b30f5986c79e8398298f8afaed5e766d08eb3fdbaa17ee23cfa6227202,2024-07-24T12:55:13.223000 -CVE-2024-39605,0,1,a5d8e60b596ac98c4205247c388074418dc90b00520b572619e13063948297f8,2024-11-12T13:55:21.227000 +CVE-2024-39605,0,0,a5d8e60b596ac98c4205247c388074418dc90b00520b572619e13063948297f8,2024-11-12T13:55:21.227000 CVE-2024-39607,0,0,82ab1f90403a4f0d3b9e21e2a488cd41b34ece370e96146e9e8729444d740066,2024-08-01T15:35:17.240000 CVE-2024-3961,0,0,7859b6a2f8e5a01656e72fd209a53f5adaf23f278f08a55d207894f918e1fda9,2024-07-17T13:32:37.647000 CVE-2024-39612,0,0,029b5e043f8fa9387c1e935fd25a69e218f8fd7196fe19845233dbfcda84d17e,2024-09-04T16:38:56.383000 @@ -259754,13 +259765,13 @@ CVE-2024-41989,0,0,e902f47b7607adc4839df00802ec4b9f801f5195050e557f24fe6e1b06bac CVE-2024-4199,0,0,fcf36265d6a610d83a178901804339aadd89406ac8a1349d6da6f71c3e13bfe9,2024-05-15T16:40:19.330000 CVE-2024-41990,0,0,a9d3bfe1152ea007eb5df4a4d15c3972fabe2ab7cf6c4dc84957655472913a10,2024-08-07T20:49:50.480000 CVE-2024-41991,0,0,c38f7b679bd3e48c46db9fd1c6390ab9383b0c22d8669d807f374055f46ee42b,2024-08-07T20:48:22.403000 -CVE-2024-41992,0,1,85601128659507913ce454ce38b9646a27756e1b2f8094d380ad8f669bc24e6d,2024-11-12T13:55:21.227000 +CVE-2024-41992,0,0,85601128659507913ce454ce38b9646a27756e1b2f8094d380ad8f669bc24e6d,2024-11-12T13:55:21.227000 CVE-2024-41995,0,0,79638f0d10c16b237f07db3242d98d294e87bf4205be8c6d9c3c7b90790704bd,2024-08-06T16:30:24.547000 CVE-2024-41996,0,0,29b8c50df43b1c66bff4b5734acbca34adccc097a107dedf36398e589357d13d,2024-08-26T16:35:11.247000 CVE-2024-41997,0,0,84a3f0ea395077fa02b4a334ab8509ff391bef43bdcea38ddd875b5794f83bfd,2024-10-16T20:35:12.430000 CVE-2024-41999,0,0,a370380ae5e595c1d409f5d8d8f92b14e0e23ae9708051ce0a7058f9d91625a3,2024-09-30T17:35:09.340000 CVE-2024-4200,0,0,4cd240b08c44457e11ab7d0e46f05e7d4edddbc268bf54e61982ff7b6b50f3a4,2024-05-15T18:35:11.453000 -CVE-2024-42000,0,1,2a6ef489e8022f0e5c1eba30d0b9bf961a756a0bdcd143f6001b190791ee9e4b,2024-11-12T13:56:24.513000 +CVE-2024-42000,0,0,2a6ef489e8022f0e5c1eba30d0b9bf961a756a0bdcd143f6001b190791ee9e4b,2024-11-12T13:56:24.513000 CVE-2024-42001,0,0,fcbbb9fe256b159250061e78a0e74ebb6632e1ed1a0fdada8381ebf9439eb017,2024-08-20T16:37:05.447000 CVE-2024-42005,0,0,6e7acd676fdd0820d0ef383abbd9c31b747692d4d747e9756762f959c9b515e9,2024-10-23T18:22:48.937000 CVE-2024-42006,0,0,cac16dcebbdfd7db60164c8c9c083b31913f86e474f6e93c1530c3119039cdca,2024-08-21T13:26:54.577000 @@ -260086,7 +260097,7 @@ CVE-2024-42369,0,0,2db0203d9e1c9ed86d7e5fe91c7527c5d07f66504aa58aae16d195697c2be CVE-2024-4237,0,0,c38818d0c288b1eec57a9be9e655b05254cb3f3487787a1ecd91e69d9c20b38c,2024-05-17T02:40:19.580000 CVE-2024-42370,0,0,62e839a91edcd64bb21dabf32c60522dd52dc9540883662a6d8c03c0ecbecadd,2024-08-12T13:41:36.517000 CVE-2024-42371,0,0,f8671ba77e17492262f6b6323bd0f75755bc55999a70f1247a3b42a51bbd5e7a,2024-09-10T12:09:50.377000 -CVE-2024-42372,0,1,df21219adb434b71a1a76b283c437f74d1588d2b923678cbf4b3a64c8b34fc76,2024-11-12T13:55:21.227000 +CVE-2024-42372,0,0,df21219adb434b71a1a76b283c437f74d1588d2b923678cbf4b3a64c8b34fc76,2024-11-12T13:55:21.227000 CVE-2024-42373,0,0,0a911f8c7b65a5ac6f64a8e43f34010f8e931ac83329dff9f7884c56f10ce33a,2024-09-12T13:26:37.753000 CVE-2024-42374,0,0,f269e9c4776cdc5b8dc54432285004e2049939b4c19e5a365ffb07a0c87786a3,2024-09-16T16:25:54.430000 CVE-2024-42375,0,0,f88914f78c046f57acc08161978ed742ad9df5262df6fb06ce5cd75ac24c71ad,2024-09-12T13:46:39.527000 @@ -260133,6 +260144,7 @@ CVE-2024-42439,0,0,08f9e0083219c02517835f74d205a3e990d7afc9a56ebae8a3bd402fa7b88 CVE-2024-4244,0,0,0a1e4c7b4cff7996944f75b62aaefc0f51495a17918fe625b6507a3d9892e7a7,2024-06-04T19:20:33.593000 CVE-2024-42440,0,0,19ccc0e809e3e2bf1e830128a29110680f7fa87923d96851d116e1e89bcae87a,2024-08-28T23:59:01.537000 CVE-2024-42441,0,0,f25ce01d00bee15651b5d0ef3b027baaf54cad0dca0cb0ace6ef530480ea5aeb,2024-08-28T23:58:06.960000 +CVE-2024-42442,1,1,306f406ac9ff3a980ab9901f0a039ac0129570a9f45cbf4008a29fe28189eb26,2024-11-12T15:48:59.103000 CVE-2024-42447,0,0,68027c21ffcefe32f56a7a559d44cc2a1c6b0b32c4ec80fa56a1f1b8e20a917b,2024-08-30T17:35:29.533000 CVE-2024-4245,0,0,bc150cb423e680075dcbfa7aff18f43429f7c6ca789bf05cb5f53de998c993ba,2024-06-04T19:20:33.693000 CVE-2024-42458,0,0,92fe6004383d793b0d5cb11f4d02a69450774ac5606c98f7e6de587e1b590522,2024-09-05T15:51:34.307000 @@ -260774,24 +260786,25 @@ CVE-2024-43411,0,0,17fae2b6c19a1c99d860c5f9c414f25b1a9d716a3875184bd3648e5d7c506 CVE-2024-43412,0,0,d8be950c692563feabe854c0542abee7aa58fa64820fe9c692a8fb330f15b7b0,2024-09-12T20:20:56.763000 CVE-2024-43413,0,0,8e6331055eff0a1fc21c13ac1aa5a910957effe87064f315927a5ac8c4d9163f,2024-09-12T20:18:46.097000 CVE-2024-43414,0,0,41d126c00be1a75ca1d7b9b05a3a92eaf49a5d7831c24ad21608856181f8c11a,2024-09-12T21:33:40.887000 +CVE-2024-43415,1,1,082764aa1a5232a9ae1e21d50b6462503489f9e7efae337fc46173e3a650cc93,2024-11-12T16:15:21.800000 CVE-2024-4342,0,0,2403af0b003f5953a3d2a1b74bf46d64f4a354bc628b01d2ea5f60de4a4002c6,2024-06-03T14:46:24.250000 CVE-2024-43423,0,0,8fb21f51e563dd938c763581007e890cf5873a7efc6a39a36e929ea32ce34c0c,2024-10-01T15:41:32.537000 CVE-2024-43424,0,0,6d9ffac7d6eb9e50db381baa418d84f2f5d9932ec78b86526bf799eb43b3b4f3,2024-11-05T19:39:33.873000 CVE-2024-43425,0,0,938233c36f296352d9985e1fd2ce4b16f2764e2564dfb74da585a571295076c0,2024-11-08T19:01:03.880000 CVE-2024-43426,0,0,2e98ed8cd0fe3bbd03bc31edcafe875e17ec3c3fbf69dc03657573f422300921,2024-11-08T19:01:03.880000 -CVE-2024-43427,0,1,a5d852a8b64e359c0a57c10c70e5a97e7ab016b1afc2797c542331cf12322b00,2024-11-12T13:55:21.227000 +CVE-2024-43427,0,1,c0afa9190bfbd3a42daa26b3156ede180ba7e66263d84fafeb811083b81b57ec,2024-11-12T15:35:06.950000 CVE-2024-43428,0,0,b5ed04eb9991b8a533d52401aafbeac39cc5aa45a83db20224d68df7b23b336a,2024-11-08T19:01:03.880000 -CVE-2024-43429,0,1,d5111a217563ee616d3370639b319524d6cbcf7a4714cd852bf9ababc3df3c3b,2024-11-12T13:55:21.227000 -CVE-2024-43430,0,1,3ee504d2aa3176b6c9511347f3e621fbca9e34dbbde41443cbaee60af93e7f8f,2024-11-12T13:55:21.227000 +CVE-2024-43429,0,0,d5111a217563ee616d3370639b319524d6cbcf7a4714cd852bf9ababc3df3c3b,2024-11-12T13:55:21.227000 +CVE-2024-43430,0,1,56b9aa97c4cdbeb7d02668c0a21fc9e420a493aa45c3ca05f334d7cfa97343ea,2024-11-12T15:35:07.837000 CVE-2024-43431,0,0,b9005a05e5507a46df12a8ffbb839f8f4313b143d14ebe18ef1c5cef640c905e,2024-11-08T19:01:03.880000 -CVE-2024-43432,0,1,0a05c068d1ce2e45ed5fcd4b281ef6595c8977244a3d1a2dc6a1666cd8b6d07f,2024-11-12T13:55:21.227000 -CVE-2024-43433,0,1,2d2a30ff36b3c88c162701c07f2a5ecb38843e48c1b9efb92db3cc0912d8a651,2024-11-12T13:55:21.227000 +CVE-2024-43432,0,1,6882cdf5acd71ff08ac60ea8ef39b61d02a539f240a4304bb1e0c1af091cba8f,2024-11-12T16:35:17.560000 +CVE-2024-43433,0,1,3a89c1a0d786a23f3bdeface2c8474ea1ae11dbc43b2728b4c205fba292f9317,2024-11-12T15:35:08.567000 CVE-2024-43434,0,0,8ffb2c6afb4ed4c9c792f8915838fc9f8b7d930620a4823c5b60db456a6beae1,2024-11-08T19:01:03.880000 -CVE-2024-43435,0,1,19653ca1abb3a601151e091c688a75ae2db23c267cf96ef3552a2772ed224465,2024-11-12T13:55:21.227000 +CVE-2024-43435,0,1,becce87a04db8aac99572600f300ced2262bdf09091d0d712bce2624d790fe65,2024-11-12T15:35:09.300000 CVE-2024-43436,0,0,d5a3a1ab85fb023046251b174592264fb917cdc48f222f2755feafd455c0e61d,2024-11-08T19:01:03.880000 -CVE-2024-43437,0,1,8f10e345b4160b4fc9f94a3f2509a5bb9474e33f9fe79e6cf5ab43a1a18d8b98,2024-11-12T13:55:21.227000 +CVE-2024-43437,0,0,8f10e345b4160b4fc9f94a3f2509a5bb9474e33f9fe79e6cf5ab43a1a18d8b98,2024-11-12T13:55:21.227000 CVE-2024-43438,0,0,875baee488d8f8241783e175bd68620af647e40659767e34acd9ef245d347a44,2024-11-08T19:01:03.880000 -CVE-2024-43439,0,1,3b234428653f62cdd8bc0933f432f7d98549e9de81afbba7ba7327dd40e3d7b2,2024-11-12T13:55:21.227000 +CVE-2024-43439,0,1,06954d00b1e484b5d61b522da4ccbdb6b5a0e70b7c5499f89ed6b82345a0167e,2024-11-12T15:35:10.043000 CVE-2024-4344,0,0,0e21345ffbddb43f0000901c1c1f7a4c33b525c68a381cd32a35ab8e755aa5fd,2024-06-03T14:46:24.250000 CVE-2024-43440,0,0,3deee55ee11303962828a1a1b49c99d7d9284f6df5f48904a5eb9b6fe3a55147,2024-11-08T19:01:03.880000 CVE-2024-43442,0,0,5431c5e587ae45a37d19d37e97d6aeb67638f78f0db0677df8b847e3725ec6a3,2024-08-26T16:35:12.860000 @@ -261322,7 +261335,7 @@ CVE-2024-44099,0,0,4225e962ab30bccafe3791f0d606bbec04f80a361f6ed22909e224c17cd46 CVE-2024-4410,0,0,ca43b98286a78ab63b5139b50b93fc074ee9aec4c16e78097aa3514c43622322,2024-07-29T14:12:08.783000 CVE-2024-44100,0,0,55add0e1d3c482299f51180f43855e3b3b24a13213cd2d9c6f34e5bde5fa49b1,2024-10-28T13:50:50.743000 CVE-2024-44101,0,0,6af26fd7e19a3aecc2b2537b325ce3c6972f55a947c0d533d9844805f59dfcd6,2024-10-28T13:59:28.003000 -CVE-2024-44102,1,1,da59303e8d1a6d35f2619e7cfcdc4865e6d81938d21f57617bb56e49e4e49709,2024-11-12T13:55:21.227000 +CVE-2024-44102,0,0,da59303e8d1a6d35f2619e7cfcdc4865e6d81938d21f57617bb56e49e4e49709,2024-11-12T13:55:21.227000 CVE-2024-44103,0,0,709653e0e681c50169d2a31a1ca4fa07ba0b9e103bee0789c715365497e0794a,2024-09-18T17:18:39.040000 CVE-2024-44104,0,0,929a3e88a508b197778cb9d698752e7d95d2a1fd6ba54e089d4187ada17accb8,2024-09-18T17:33:06.413000 CVE-2024-44105,0,0,6ace8c54c3fc6c9b1684fd8d42f178f1cce19bf6d08f58b02fdc3857633db641,2024-09-18T17:48:11.193000 @@ -261538,7 +261551,7 @@ CVE-2024-4454,0,0,ef12942a51bdcd592bf2170096c1c09a451df07ea3cdb4fb15fcced864f88f CVE-2024-44540,0,0,4abad310f91dcba57b664a0055c040b07c16796e1c5dc9c0c69652281e33825a,2024-09-26T13:32:55.343000 CVE-2024-44541,0,0,3a1e561d6510cb46fc3025d4e567327c4a8fc313204436661e66190b9e443f5d,2024-09-12T12:35:54.013000 CVE-2024-44542,0,0,ae61c0f5fd9542e820a853b434527731c00f8fe17ea27a1b37dfc0ba3c44f2e0,2024-09-20T12:30:17.483000 -CVE-2024-44546,0,1,ef894c50d1b82d502d187f7d11467601cd1ac9e07c2228137e86cc3a48080955,2024-11-12T13:55:21.227000 +CVE-2024-44546,0,0,ef894c50d1b82d502d187f7d11467601cd1ac9e07c2228137e86cc3a48080955,2024-11-12T13:55:21.227000 CVE-2024-44549,0,0,95d002d4c0f2cba16cd184ab62e810c42d47abc2b51570dfaaedb60ad257bca3,2024-08-27T14:28:55.157000 CVE-2024-4455,0,0,266cd4e6dd8917294ad9c9f8fba8b2f0acb52688c86d3ca408cceaa482353b44,2024-05-24T13:03:05.093000 CVE-2024-44550,0,0,9f267ccbfa739b7dd965bc2964320acade2cb81782d1bf956b8f3a920e81fa22,2024-08-27T14:29:02.370000 @@ -261607,7 +261620,7 @@ CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c0 CVE-2024-44760,0,0,0d252ff08482783aaee88c027910c09101e7f32f15f52b69e5e2b4482012606e,2024-08-30T15:55:41.137000 CVE-2024-44761,0,0,2cb43df04a70791b0f0fb8982142da3403b663e9582e8c16ce12d7edd85714da,2024-08-30T16:00:30.557000 CVE-2024-44762,0,0,a4d9c40079155e25bc23610bf9eb4b9c915e9b457539684228b809ce3110b930,2024-10-18T12:53:04.627000 -CVE-2024-44765,0,1,f49b0ddc47e501e666f4838593930e2064ad96de66f6bc89ed89c1395c14c839,2024-11-12T13:56:54.483000 +CVE-2024-44765,0,0,f49b0ddc47e501e666f4838593930e2064ad96de66f6bc89ed89c1395c14c839,2024-11-12T13:56:54.483000 CVE-2024-4477,0,0,b275cf91a81ef0e33ced77c1c5ba5e17245e6b33fc991fd87901e463b723d83e,2024-07-12T16:12:03.717000 CVE-2024-44775,0,0,205ee8ae27d9197291c9317d68e5db327a872699c5adb78e1d5b21baab0f0fd4,2024-10-16T19:35:10.167000 CVE-2024-44776,0,0,553f0ea6859d4ff6b6f354ecc1fde63fb20d3cedbc33d036b9304dfd1b315c86,2024-09-03T18:33:26.287000 @@ -261825,8 +261838,8 @@ CVE-2024-45076,0,0,5fb321e82c08a6c58252337bee6e5fcb4b13786a863fe8ca643f04e713d05 CVE-2024-4508,0,0,26388c420646a8ddc4ee2de628a691e0fa51808e2f848ae0f9b7aad58ccb1298,2024-05-17T02:40:26.220000 CVE-2024-45085,0,0,a565381ecb911dfe05cdd12fd3e31f62bfcf9bb3dc78353a9c71e368d734c50b,2024-11-08T15:13:11.307000 CVE-2024-45086,0,0,4c6cc09258471d9b9c2c13bdbf534b3ba8ab7fabaf8d588e8672331873d00305,2024-11-06T23:04:04.673000 -CVE-2024-45087,0,1,1294b81c38a555967b5b16c6d9f63f22d8154d8af8826cc5f5b6134645a87f69,2024-11-12T13:55:21.227000 -CVE-2024-45088,0,1,da13ef252293f10322facb48d792fb9355326cf4a00f9e2448097d3a90577756,2024-11-12T13:55:21.227000 +CVE-2024-45087,0,0,1294b81c38a555967b5b16c6d9f63f22d8154d8af8826cc5f5b6134645a87f69,2024-11-12T13:55:21.227000 +CVE-2024-45088,0,0,da13ef252293f10322facb48d792fb9355326cf4a00f9e2448097d3a90577756,2024-11-12T13:55:21.227000 CVE-2024-4509,0,0,996942a0a2c59f4d53067a2868fbad35944719504585e3998bbd4d788c545588,2024-06-04T19:20:40.347000 CVE-2024-45096,0,0,d4f642a1e6bb8f30a3a63abc6de33d2a734d4a63841c63adbbf0861fc10b1ff8,2024-09-06T12:34:17.957000 CVE-2024-45097,0,0,66f33176e0c07f5466116654bcd7c2847267016c1af22914a830c235e4290102,2024-09-06T12:51:59.750000 @@ -261989,6 +262002,7 @@ CVE-2024-45285,0,0,432443f16f3bc2cd7fd6662743de8a85c2d23de3c5e8c63d8a475d82e46b6 CVE-2024-45286,0,0,8f2e1da507766dacf9e0cae8531253d3a4901ee6705aefce0b8c842c2e03783f,2024-09-10T12:09:50.377000 CVE-2024-45287,0,0,045bfb0d53167c55abd32c57163028c51920368f50e2cf76774839485016e81f,2024-09-06T16:26:26.303000 CVE-2024-45288,0,0,955296d26f6688a711bb67949962e8bc8a5c80938f39e5cdb2e043fe3c66ded8,2024-09-05T14:35:25.337000 +CVE-2024-45289,1,1,5e95c0d4464ba6185c0cab13d978288aa2ff5c53e6063898a90eb8848c488ff0,2024-11-12T15:48:59.103000 CVE-2024-4529,0,0,5fbb4c14219ef7d51954458b7780a68dbee769876e9489db6e9ba34bd68834fa,2024-07-03T02:07:42.220000 CVE-2024-45290,0,0,47b2969bc1a747d3ad8c94a2a1403ba705f7312da0ef51083401cc2cbbe8b318,2024-10-16T19:54:53.397000 CVE-2024-45291,0,0,d43c3b21f765f29ad064a7621a2d1e18446d51e2e184bc6e561edf1a1c4d2c29,2024-10-16T19:09:52.697000 @@ -262288,7 +262302,7 @@ CVE-2024-45823,0,0,69c87ecc16422910e33b859f46eb5ec7fd2de42f8535f15441d6fdd097693 CVE-2024-45824,0,0,10e16d904d2154d7119c6df05a22810044cd3b50093fd71dfd8bbe566411a270,2024-09-12T18:14:03.913000 CVE-2024-45825,0,0,772075ec5deeaf7c7029f931ec15621230c7b2330dcd87b5ccf7ab7721cf06f6,2024-10-02T14:43:08.720000 CVE-2024-45826,0,0,09e161f625f954ed804a43ac07521f29edea4489bb062a3b0321529236e21762,2024-10-02T14:35:38.017000 -CVE-2024-45827,0,1,c4689c00102ce1ca9471e1f9a6fc9b7e9733731c7395c6ab75742a226b740aca,2024-11-12T13:55:21.227000 +CVE-2024-45827,0,0,c4689c00102ce1ca9471e1f9a6fc9b7e9733731c7395c6ab75742a226b740aca,2024-11-12T13:55:21.227000 CVE-2024-45829,0,0,5a50c2ccafc0459af20b4b18eda721dd7b1e71f587c5cdc73dd4360d8d24a56b,2024-11-05T19:38:57.827000 CVE-2024-4583,0,0,80422ff6020fca1720c5a88e28ab76aaa9a918b3afa6700e13782e64857c6739,2024-06-04T19:20:42.857000 CVE-2024-45833,0,0,d66bcdb35ef05ab6c240a22f01c308be4dcef309fd562be6507d54a47e85401a,2024-09-23T13:43:42.073000 @@ -262573,7 +262587,7 @@ CVE-2024-46609,0,0,867378c24ca26a245e4713a4ba27c2af9d0d9faadf75c6778954203857675 CVE-2024-4661,0,0,c3df946503e9b828d76c6d82332cda3e4be930bda3f80537afbf8f2ae2d7bc25,2024-10-31T18:21:43.683000 CVE-2024-46610,0,0,dfd11b66ad880194d4e8759fea756317b6075d327e3519259cd11f18ae0f4b82,2024-09-30T16:30:50.833000 CVE-2024-46612,0,0,a589f709811c7445ac7df28a3a7782b0e1ab03ae28a72339e484d8d02cc7d048,2024-09-26T13:32:02.803000 -CVE-2024-46613,0,1,7a5ba393c74ba93ae59ac1a71306ee81029bd9ebcbd046dc584d8c4028bc8f8f,2024-11-12T13:55:21.227000 +CVE-2024-46613,0,0,7a5ba393c74ba93ae59ac1a71306ee81029bd9ebcbd046dc584d8c4028bc8f8f,2024-11-12T13:55:21.227000 CVE-2024-4662,0,0,42d3ec88d759fc9bf88fc92972e0c9891830916b90a0cdbb0331ad5486f420dd,2024-05-24T01:15:30.977000 CVE-2024-46626,0,0,b2dbe1e3c2ee97096cbfddcd538250ce5664f2528c19dd2dc51892ffc471844d,2024-10-04T13:50:43.727000 CVE-2024-46627,0,0,4cc8890cea4e8322a4c476b42c8fefe2b4b66b62a78446cc66eb2d1a373670f4,2024-09-30T12:46:20.237000 @@ -262820,13 +262834,13 @@ CVE-2024-46872,0,0,782a6347112bd8d3e8131c6f94bbde936c76c99b3c4577466eff75a75fa70 CVE-2024-4688,0,0,52289ed8c0286442cd44c00a18386eec964a66f3ff263d13f6b3a47ad78257b2,2024-06-20T20:15:19.617000 CVE-2024-46886,0,0,a928062ae00bc94e4a7abf511f66b23a1126250ea4d99006bdee4b18a22b92db,2024-10-10T12:56:30.817000 CVE-2024-46887,0,0,b7a0812e4d4a8d09f6eb4da630d645c25b0d554f80d4c4a4c7b07d79f22299bd,2024-10-10T12:56:30.817000 -CVE-2024-46888,1,1,118adcbecc3a22835a285a6c166c4bedc644275fd6692c0b3b890f2737ef0847,2024-11-12T13:55:21.227000 -CVE-2024-46889,1,1,3c62f07a743a2b39b09de968f4f3db8c262650ccbfbc60333dd3911073d37c8c,2024-11-12T13:55:21.227000 +CVE-2024-46888,0,0,118adcbecc3a22835a285a6c166c4bedc644275fd6692c0b3b890f2737ef0847,2024-11-12T13:55:21.227000 +CVE-2024-46889,0,0,3c62f07a743a2b39b09de968f4f3db8c262650ccbfbc60333dd3911073d37c8c,2024-11-12T13:55:21.227000 CVE-2024-4689,0,0,a13cc88d2e9b12d452cf9b42ce57cc1735d851f3f551a07c40e7bb0f2ee113b8,2024-05-14T16:11:39.510000 -CVE-2024-46890,1,1,f116e6ca8bed2d160f28a0600ac376bc3ac8885dcc3e94a602d7ead798ac1d0f,2024-11-12T13:55:21.227000 -CVE-2024-46891,1,1,9cac069058205dd82ff44ed2dd06e2bff4fa66fb0657a9486f288db15ef01cc9,2024-11-12T13:55:21.227000 -CVE-2024-46892,1,1,832998be000f46348b602428fda150245906b189ed2422479a67b8966ab7d9bd,2024-11-12T13:55:21.227000 -CVE-2024-46894,1,1,01a388837d3fe799245e5dd216fbcf6180e56977895ef3bb0567721ae1547770,2024-11-12T13:55:21.227000 +CVE-2024-46890,0,0,f116e6ca8bed2d160f28a0600ac376bc3ac8885dcc3e94a602d7ead798ac1d0f,2024-11-12T13:55:21.227000 +CVE-2024-46891,0,1,2548c4af1be93d5604200e5665ed8ea56a190b29806575f2e119202139af8813,2024-11-12T15:35:11.240000 +CVE-2024-46892,0,0,832998be000f46348b602428fda150245906b189ed2422479a67b8966ab7d9bd,2024-11-12T13:55:21.227000 +CVE-2024-46894,0,1,599bde0d989bd689283a3a82d91bbb2451f40f3e50006e12b8e4666ea02d1f4f,2024-11-12T15:35:12.310000 CVE-2024-46897,0,0,2e86e25932c3365c9fccf8620fea0f0e322915cee2108f33175688332c9426e1,2024-10-22T14:09:46.913000 CVE-2024-46898,0,0,1121a0227e884e663de945d1f5ee0881d2211aaf4fceffe823ea2d2dc74e4f9c,2024-10-17T17:52:00.700000 CVE-2024-4690,0,0,8a659fbde289577b9d47a4e0b198b3a10d973db6b9b3690d157fcfdd9eceabd6,2024-10-21T15:51:10.467000 @@ -262848,23 +262862,23 @@ CVE-2024-46946,0,0,5adf6fed09d7522a85c453ac4c470cad5917d88736dbb3b605636f5befca4 CVE-2024-46947,0,0,b59f7f41af30aded4ad65024485f8c1125aef585b68596d5293e6a508028cc3d,2024-11-08T19:35:17.037000 CVE-2024-46948,0,0,5eb36279b3db7d39a170e75a824e340b32845061d149091503a0443c63f28aee,2024-11-08T19:01:03.880000 CVE-2024-4695,0,0,aa253f1bdce79ef626aa7622c4e367006f6b60359a6a2b0af989b23a6e81f980,2024-05-21T12:37:59.687000 -CVE-2024-46951,0,1,f7856a5dde7937a47da4c48bb63b279f0e9e01244c8373bc9a31b359d037a44d,2024-11-12T13:55:21.227000 -CVE-2024-46952,0,1,85d50c97437fea65cc1151115a97820312883ddfd70f6ca7b643c8ac38b503ee,2024-11-12T13:55:21.227000 -CVE-2024-46953,0,1,71ad7cf837c73b0dfabae1ff0b361a18613eb03fffe5758938e28582f6cbdca2,2024-11-12T13:55:21.227000 -CVE-2024-46954,0,1,b3b00bcbbff3d63d8397974f1b0bf40209c369e9b725dcf5b355cafb51e6bd9d,2024-11-12T13:55:21.227000 -CVE-2024-46955,0,1,b6a31120fcfb9f044c1f71394c8ace5986db0bf3dbf67db1e1e44230460fd384,2024-11-12T13:55:21.227000 -CVE-2024-46956,0,1,60f19518a0b8606474b10d47490d2efd8ca6c2bc275be981da1ce0be913f6317,2024-11-12T13:55:21.227000 +CVE-2024-46951,0,0,f7856a5dde7937a47da4c48bb63b279f0e9e01244c8373bc9a31b359d037a44d,2024-11-12T13:55:21.227000 +CVE-2024-46952,0,0,85d50c97437fea65cc1151115a97820312883ddfd70f6ca7b643c8ac38b503ee,2024-11-12T13:55:21.227000 +CVE-2024-46953,0,0,71ad7cf837c73b0dfabae1ff0b361a18613eb03fffe5758938e28582f6cbdca2,2024-11-12T13:55:21.227000 +CVE-2024-46954,0,0,b3b00bcbbff3d63d8397974f1b0bf40209c369e9b725dcf5b355cafb51e6bd9d,2024-11-12T13:55:21.227000 +CVE-2024-46955,0,0,b6a31120fcfb9f044c1f71394c8ace5986db0bf3dbf67db1e1e44230460fd384,2024-11-12T13:55:21.227000 +CVE-2024-46956,0,0,60f19518a0b8606474b10d47490d2efd8ca6c2bc275be981da1ce0be913f6317,2024-11-12T13:55:21.227000 CVE-2024-46957,0,0,1a1f161c8d8bab3db62f1fa9272e11eb4217a378f1fb9334b95d7f852bd44900,2024-09-26T16:15:08.883000 CVE-2024-46958,0,0,a066074c8ea90ca6497e29c818dbf400ff90cc8827530871d9d45fb4a3abe93e,2024-09-20T22:41:38.223000 CVE-2024-46959,0,0,49609311db8eb2484a5bda279fc39cc9dccd98f1d151343e94689d8818c061d9,2024-09-20T14:35:13.063000 CVE-2024-4696,0,0,b8ce6d89da084f88972905e9878372f109e48889eae7d9f95b30ecbbc63816ed,2024-06-17T12:43:31.090000 CVE-2024-46960,0,0,34c9db930ef4e9e6f8b9462edd0bebd8143074b581b4cd4eaf2ae451689fb83c,2024-11-08T19:01:03.880000 CVE-2024-46961,0,0,6281dfd23f05aedb5a57016518bf840f9c3236bd7244aca077f0eeaa5baad6cb,2024-11-08T19:01:03.880000 -CVE-2024-46962,0,1,637de171a5b40b79cbb8590c2ce32c09013419daa85f0b7bef99eabd22687d14,2024-11-12T13:55:21.227000 -CVE-2024-46963,0,1,5fe829bc723789e066747c7b68245dc7e574cb4bc952825ddcf20908f9e75ecd,2024-11-12T13:55:21.227000 -CVE-2024-46964,0,1,e3b54ffb507fe28c48b85f071d29709e5af6de061bd72799affc2e7ef7067271,2024-11-12T13:55:21.227000 -CVE-2024-46965,0,1,939d1e34dd2480d5958b1a0271f08f2a59c4b43e7302e3bfd92a53764523ae42,2024-11-12T13:55:21.227000 -CVE-2024-46966,0,1,6f24fe34b355e10161d935069410718588e08e5cce53d01a4ba358192181b973,2024-11-12T13:55:21.227000 +CVE-2024-46962,0,1,0548157d7c5de74bb44620f2ef4d424089f2c91f1caa9ef46af393d2ab234d0d,2024-11-12T16:35:18.293000 +CVE-2024-46963,0,1,b3eeeff171042ae94da59aca70d325e187226ed1b77924489ea1d0cb9ef2bff9,2024-11-12T16:35:19.117000 +CVE-2024-46964,0,1,9566b7e7fac378fec90f5c4450fce11c64d6e1ff19e90136f23f197651aeb491,2024-11-12T16:35:19.933000 +CVE-2024-46965,0,0,939d1e34dd2480d5958b1a0271f08f2a59c4b43e7302e3bfd92a53764523ae42,2024-11-12T13:55:21.227000 +CVE-2024-46966,0,1,2dc70b10b093ab52972025bec2f51704bf269615cf39a0a1e82c4c898655227f,2024-11-12T16:35:20.790000 CVE-2024-4697,0,0,3bc62a9bb9952d026af8ecd13a98f81fa60290945109a2f6023ef384956822fe,2024-06-04T16:57:41.053000 CVE-2024-46970,0,0,6ef16041ee18068670ae3579af5d9c59d6c6488d479945d9220353b5e1ab4205,2024-09-20T13:23:29.700000 CVE-2024-46976,0,0,02f78d527d01c9aa774dc796f1ceed3fea7faea62af60e78d26c9cc8325cba03,2024-09-23T18:27:05.920000 @@ -262984,7 +262998,7 @@ CVE-2024-47128,0,0,9295fbc3793df82ded419a2f8b919ed963c41a092d03655dc6cce57546463 CVE-2024-47129,0,0,452da217b1f5cf309ec7a2dae7685dda69961ff67f6a0249b7b454ce55330724,2024-10-17T18:15:06.930000 CVE-2024-4713,0,0,a3c96b0a67396332ccb3b3b7da032ec990741228737b0623d292fd0ff6dd150b,2024-06-04T19:20:46.913000 CVE-2024-47130,0,0,9e52b34ecc84aeecf5485cad45360e89ca586e91e062db722158986b68611fc1,2024-10-17T18:15:07.130000 -CVE-2024-47131,0,1,aad32778ebe370f990ce9d95c37c46e0e7dce30078c011ec3ff9e6c9c8cf4413,2024-11-12T13:55:21.227000 +CVE-2024-47131,0,0,aad32778ebe370f990ce9d95c37c46e0e7dce30078c011ec3ff9e6c9c8cf4413,2024-11-12T13:55:21.227000 CVE-2024-47134,0,0,c469be51a68158c099c563ecb132d768058c9b0b7de566d173182963980dd322,2024-10-16T13:50:32.607000 CVE-2024-47135,0,0,59ae1232976c8e51aae73aa97b8d4fb50a4b33eb7aa7372298dfcd77c19c0bd9,2024-10-15T18:21:04.813000 CVE-2024-47136,0,0,b3835ea7cec22b9e908913d2c98cbfff753b1b672a4d126777b942724ad7f9c9,2024-10-15T18:20:40.387000 @@ -263249,6 +263263,7 @@ CVE-2024-47530,0,0,fed1c84544c0e51056ec77fc5d6317c40fbcbb8ff2284050a11260f26a3d0 CVE-2024-47531,0,0,3c1eac025448da4ef56a64b8782ce45f8d883f9cb11cc38200fa63f6c47d35ec,2024-10-04T13:51:25.567000 CVE-2024-47532,0,0,8782a61a2e6393b4eaa2920ce672fbaf71cd431530e5dbfab9dfea37a0c9da22,2024-10-04T13:51:25.567000 CVE-2024-47534,0,0,3fdf39e9d60bdd61b891053803d0cdd86e1d9b2f1594fae7730f1f0f0b99a057,2024-10-11T15:15:05.490000 +CVE-2024-47535,1,1,6dde72bb5d0032ab953f239c28fe6ffd689632c5bc3e3e335b36c4024e90ddf3,2024-11-12T16:15:22.237000 CVE-2024-47536,0,0,353df15c5abe486c0bd2000eeee4b00375b2403ebe72a10be7f49c66f18c4bd4,2024-10-04T13:51:25.567000 CVE-2024-4754,0,0,43efa3a5287d05b500ecfcf4503ad62e1b41a22939150352bf102c1b98a3511a,2024-06-24T12:57:36.513000 CVE-2024-47549,0,0,113d97e5056ed200778519e504bac77f5b27816ee70d3059de963f972da95681,2024-11-05T19:40:52.070000 @@ -263269,15 +263284,15 @@ CVE-2024-47565,0,0,1f4de7ea43d4059fde3978664bf9271defcef7d2ededc73cf25a3c2fbdf29 CVE-2024-4757,0,0,8697ca9e70d5ba37736a0a67620900f7a3da7cbcb97e29086de20de73cd3bfef,2024-07-03T02:08:02.463000 CVE-2024-47575,0,0,3cf8bcedc769b7028fe6e8dbdea49ae873e037612d2dd7820ba5eca10d70f99d,2024-11-08T21:16:28.987000 CVE-2024-4758,0,0,725af37997323245576176c0490558b45926193602683436c3054da734872332,2024-07-03T02:08:02.707000 -CVE-2024-47586,0,1,a044dc5eec295c16634c6ec1ed8ed37aaf4022404407624cb4c7b862b4acccab,2024-11-12T13:55:21.227000 -CVE-2024-47587,0,1,64bdf3be3a24eaa7bebc30d4d4b2d02c284025d4c095744ca605067612dd6888,2024-11-12T13:55:21.227000 -CVE-2024-47588,0,1,784219c1ff1f8b9473f80c254cc66a71926e8c3d6e40be5aaefe6b62ee08ca20,2024-11-12T13:55:21.227000 +CVE-2024-47586,0,0,a044dc5eec295c16634c6ec1ed8ed37aaf4022404407624cb4c7b862b4acccab,2024-11-12T13:55:21.227000 +CVE-2024-47587,0,0,64bdf3be3a24eaa7bebc30d4d4b2d02c284025d4c095744ca605067612dd6888,2024-11-12T13:55:21.227000 +CVE-2024-47588,0,0,784219c1ff1f8b9473f80c254cc66a71926e8c3d6e40be5aaefe6b62ee08ca20,2024-11-12T13:55:21.227000 CVE-2024-4759,0,0,88e594c7c898a4e82a1a8532a1f049d1a9fe25baf60278988c21dabe64f2896b,2024-07-03T02:08:02.923000 -CVE-2024-47590,0,1,c753d8c8fff8996c1d065cd36652a978ed4f5524609cd99b50669bc05bf4ecb8,2024-11-12T13:55:21.227000 -CVE-2024-47592,0,1,d50f90a32b1d664dd933a768f3eed2f3a853946f4a68bc9410b951adb6fc8f95,2024-11-12T13:55:21.227000 -CVE-2024-47593,0,1,d85f49463ae6a5e30f4d2582d964129d98bb5b6668bb2b9ab15d62b3931e60c7,2024-11-12T13:55:21.227000 +CVE-2024-47590,0,0,c753d8c8fff8996c1d065cd36652a978ed4f5524609cd99b50669bc05bf4ecb8,2024-11-12T13:55:21.227000 +CVE-2024-47592,0,0,d50f90a32b1d664dd933a768f3eed2f3a853946f4a68bc9410b951adb6fc8f95,2024-11-12T13:55:21.227000 +CVE-2024-47593,0,1,5719cca65cf0b6dd229ca6ab81d4395c74dda132bf396e7340283b24564be6f3,2024-11-12T15:35:13.233000 CVE-2024-47594,0,0,1ae534f7a3c1c97ead2076790a49a30a6aebae2067756e88afe36b9237831ffa,2024-10-10T12:57:21.987000 -CVE-2024-47595,0,1,ba21651773888aa8d2743ba8a0a71f7f213256467724b419ffc59a50270127b5,2024-11-12T13:55:21.227000 +CVE-2024-47595,0,0,ba21651773888aa8d2743ba8a0a71f7f213256467724b419ffc59a50270127b5,2024-11-12T13:55:21.227000 CVE-2024-4760,0,0,b4849d754e19ff5b62ce1dfa55ef4652903c511172eef769e0d0e48dc2803d03,2024-05-16T15:44:44.683000 CVE-2024-47604,0,0,b0efef5184edb4bd92f957620365342f5c009f62a58e0b01524e6418b748fe0c,2024-10-04T13:51:25.567000 CVE-2024-47608,0,0,6780a5cb01bdd639af89827da283834e6f19c572d8e127e2ec22fed13c61e1be,2024-10-07T18:51:05.650000 @@ -263458,13 +263473,13 @@ CVE-2024-4778,0,0,e3020a287fa6ceae8ff9c78434f10af4d17cf4058dd5bf80208c921b6bc68b CVE-2024-47780,0,0,ff94d6824af803f8c7126d802f9a510e2f7e61826db064781dbb229b5b3ef329,2024-10-10T12:56:30.817000 CVE-2024-47781,0,0,942905ddf0e252a3fb77e10ba3da26f7a3985ae743d3e1737c070a7332d5f79d,2024-10-10T12:57:21.987000 CVE-2024-47782,0,0,378aebd3accf9c3d67ee33eb38516895e49edcc53cea98d4b8c2ea1a1799fb1e,2024-10-10T12:57:21.987000 -CVE-2024-47783,1,1,6eed9b3fe82006d43473d1b9683880b3603486d4920f638d13a38eac8273e0ff,2024-11-12T13:55:21.227000 +CVE-2024-47783,0,0,6eed9b3fe82006d43473d1b9683880b3603486d4920f638d13a38eac8273e0ff,2024-11-12T13:55:21.227000 CVE-2024-47789,0,0,5cca8aa9572eb6cd0c059882137f083cb8544427e147bc3f1f0eab6346cef001,2024-10-14T11:15:11.797000 CVE-2024-4779,0,0,7a9d6158e8d260b03b3581dd37b23bd10d59ba6243714ad236ba79968e8d9b16,2024-05-24T01:15:30.977000 CVE-2024-47790,0,0,d4701041e3b7826b48d6d13bc4c86004b58b4b8b272120def31051056a8f0260,2024-10-14T11:15:11.930000 CVE-2024-47793,0,0,9908766d9802c80c9f07e38bc1dd6d38dc8823614346066184a43b3d9b28a705,2024-10-21T21:25:36.697000 CVE-2024-47797,0,0,33c4997ae4057f3ee3a7a27f532a8c67312598a72be5d687fb49b6e9959476d3,2024-11-06T15:24:53.210000 -CVE-2024-47799,0,1,de5bae16ec2678599ddf765fb89319547d13abf6f56de5efb31661988db58076,2024-11-12T13:55:21.227000 +CVE-2024-47799,0,0,de5bae16ec2678599ddf765fb89319547d13abf6f56de5efb31661988db58076,2024-11-12T13:55:21.227000 CVE-2024-4780,0,0,4aec24b958d50bff73d14c7bd2f67b2a9793d4893d5ddbdba18f0fb02ea18cc9,2024-07-16T13:43:58.773000 CVE-2024-47801,0,0,e103685798e8b2dbc73e6876d080a93ca119ff0fe2d3b72153089026c306290a,2024-11-05T19:34:53.927000 CVE-2024-47803,0,0,c5fc789c0abab09fdf5d93ade8e681a0cefd26750cb76c66db7bdbaf646effcb,2024-10-04T13:50:43.727000 @@ -263472,7 +263487,7 @@ CVE-2024-47804,0,0,b396c78511f759659afac343048b57f2d8797b9724cc7a1ccef3ee3198778 CVE-2024-47805,0,0,cbdd25fce45aa799e9910f10ad3a10b0c588c33ed8f87431100693f0e37d8bb1,2024-10-04T13:50:43.727000 CVE-2024-47806,0,0,7da0bb8e7fc9c3b1d389ccbc624a09ba22b5eddfdda079b80b993589f773a85c,2024-10-04T13:50:43.727000 CVE-2024-47807,0,0,6f73fcbd170bbcb4214e07d010ddde34567b580923105f0e5418ba9615969635,2024-10-04T13:50:43.727000 -CVE-2024-47808,1,1,fd4fbc984d364873085d48d37d2028376f331a69960d57eed922fa6b1526947c,2024-11-12T13:55:21.227000 +CVE-2024-47808,0,0,fd4fbc984d364873085d48d37d2028376f331a69960d57eed922fa6b1526947c,2024-11-12T13:55:21.227000 CVE-2024-4781,0,0,75b4bbbeaedf32c6df964ae89a5896455d04ecbdf24f849877528cd42d17cfaf,2024-08-19T13:00:23.117000 CVE-2024-47812,0,0,397cf931cad747f9187f7df48c5f8098bd69901273af0ea8d48fb67c933d46b4,2024-10-10T12:51:56.987000 CVE-2024-47813,0,0,48a41eb36e488d083cd1f60a29be681cee836eceff483fa252745c12924671c8,2024-10-10T12:51:56.987000 @@ -263539,6 +263554,10 @@ CVE-2024-47901,0,0,351c2de719aa37343f5b8705371f6ea3811b8e193d3e2965a197dc16aa263 CVE-2024-47902,0,0,2363b86854bd24a49201ca293fb87d24363aec990236fe9e9bf134a5daa38aeb,2024-10-30T15:48:39.207000 CVE-2024-47903,0,0,7e28902499cd69638cf23751436e57fbe15e705859d687d60c9f544fac8af41e,2024-10-30T15:54:34.647000 CVE-2024-47904,0,0,21b127b0effcb8b297c48dd7cd57e94387991d137ef282d6dd7cb6727add6e3b,2024-10-30T15:39:06.020000 +CVE-2024-47905,1,1,456f2af09d79de028522d9d2fe7c339af1a91ee887144c6e68be318fd4f6c6ea,2024-11-12T16:15:22.473000 +CVE-2024-47906,1,1,415c56fc6b2389a67bd4a684531b844637d1600f12a9fe2fbe259e519afd8c04,2024-11-12T16:15:22.670000 +CVE-2024-47907,1,1,038c623216fbd12a58fca1b8911d218a1fc7314353ecc4e226c145ce074a681e,2024-11-12T16:15:22.887000 +CVE-2024-47909,1,1,2046646b27165d0d6d7260825af83df5574fec1c19d0f9cd5f0e2de0763d9fef,2024-11-12T16:15:23.080000 CVE-2024-4791,0,0,45f7f0badd9eeca0c08f0ffcf78bd3c1e9a171e1e79fba42777d793a804985ff,2024-05-17T02:40:37.090000 CVE-2024-47910,0,0,da0097185007355b026dacc76d86a72088b7bf1d898f5a147fff92f16ae106b9,2024-10-07T19:37:43.677000 CVE-2024-47911,0,0,1780d2f9891b374cce407dc3e6f68171fc1b0dbbc46286fbacc7f087c63dae2c,2024-10-07T19:37:44.613000 @@ -263548,9 +263567,9 @@ CVE-2024-4792,0,0,d367db616eff60413675ec0cb96dcf5072899c5126e3ab7b85dd0b323d2aa0 CVE-2024-4793,0,0,d7ea24a63b045e67640f8521c21cc9fd0113236775183a92ddafb3253726675a,2024-06-04T19:20:49.390000 CVE-2024-47939,0,0,fb0122088811efc1ccf3ce2b970c428eb00ae94db66e7aa25ff544122afe9a3d,2024-11-01T12:57:03.417000 CVE-2024-4794,0,0,ae0da7f20a3f797e26793f17108eae7df40bf3f3b44a06ce135aa4fe4b35db7e,2024-06-04T19:20:49.487000 -CVE-2024-47940,1,1,1158482f16b002b31e249659ae2cc5d6c1525c0c3960366e05587c7dc14f748c,2024-11-12T13:55:21.227000 -CVE-2024-47941,1,1,2be744b301fde0fba1a240050c3d9245391d6352af7cc5bdeb6ffc6455359c17,2024-11-12T13:55:21.227000 -CVE-2024-47942,1,1,00e10171a05daca3a57ee1df3f927e105190a4a46041adf33b57a28142f4bc42,2024-11-12T13:55:21.227000 +CVE-2024-47940,0,0,1158482f16b002b31e249659ae2cc5d6c1525c0c3960366e05587c7dc14f748c,2024-11-12T13:55:21.227000 +CVE-2024-47941,0,0,2be744b301fde0fba1a240050c3d9245391d6352af7cc5bdeb6ffc6455359c17,2024-11-12T13:55:21.227000 +CVE-2024-47942,0,0,00e10171a05daca3a57ee1df3f927e105190a4a46041adf33b57a28142f4bc42,2024-11-12T13:55:21.227000 CVE-2024-47943,0,0,d4d5358ab48548c04867b54233602bd267d194af91388df45333461289a48f25,2024-10-15T12:57:46.880000 CVE-2024-47944,0,0,8c2dcd259cac2bc345d70afe119d0b88c60fe63597fe98a2528a606f007cae1c,2024-10-15T16:35:09.410000 CVE-2024-47945,0,0,55dd1a9d68ac241f4312e57ed6d79883a9185bbba2d8714aa4e48fddc29f70d5,2024-10-21T19:41:10.407000 @@ -263624,7 +263643,7 @@ CVE-2024-4806,0,0,f8a0e203429c4f99450a15aa6a4b26ee8c7effa68e79948138bc0eccf2af8e CVE-2024-48061,0,0,3afb2ef6eba7f21135f7c2c854e268a2fe30714157a06ae965803eb7d12a5161,2024-11-06T20:35:30.633000 CVE-2024-48063,0,0,7dad3075f35e3bd4e2e591484ba350f38d4e17902517b9e5e6279458bc0b207a,2024-11-01T13:15:12.020000 CVE-2024-4807,0,0,e5ccc41d46958232939be978f4766518ab72a806619364a653b00c23b63fbc68,2024-06-04T19:20:50.770000 -CVE-2024-48073,0,1,410986e3bac5b99d20c35e908ba9e14361ecff8b8737388dcc22bfd8d08857aa,2024-11-12T13:56:54.483000 +CVE-2024-48073,0,0,410986e3bac5b99d20c35e908ba9e14361ecff8b8737388dcc22bfd8d08857aa,2024-11-12T13:56:54.483000 CVE-2024-48074,0,0,ad38eed7680db70af45f593399c08c1cb64e93854bc7fa5dd06ea3c6cdff4594,2024-11-08T22:15:20.877000 CVE-2024-4808,0,0,9e98599f6886b9041c106d3216212c5c382436edfce35f9a1807d5234e020eab,2024-05-17T02:40:38.870000 CVE-2024-4809,0,0,27fb5be7556d421437500c3c993a8fe2f6b8b07eb589d66da5852c85ddbdadf0,2024-06-04T19:20:50.867000 @@ -263718,7 +263737,7 @@ CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc33808 CVE-2024-48307,0,0,935ee3e0328307bbb03111416c4595c4eff3ac408a08578a24f622dddb9d0c64,2024-11-01T12:57:03.417000 CVE-2024-48311,0,0,354d288e073d9064d21602cf2204c79fdbedf6cf54999e8a50b7d788e057c63f,2024-11-01T12:57:03.417000 CVE-2024-48312,0,0,ed565171c6e4291e871155bd5278a308c07670573cfb5e604423e67b93f19726,2024-11-06T18:17:17.287000 -CVE-2024-48322,0,1,5c481f296f210b18b3f4dfb94df32fe4d600b1dbbb14b3cbc5f00244d235d6c2,2024-11-12T13:55:21.227000 +CVE-2024-48322,0,0,5c481f296f210b18b3f4dfb94df32fe4d600b1dbbb14b3cbc5f00244d235d6c2,2024-11-12T13:55:21.227000 CVE-2024-48325,0,0,e332aafd0b1c5c187131f74a886273143993554010ab80fd42869ff8b361baa6,2024-11-08T19:01:25.633000 CVE-2024-48336,0,0,fc603531e511f454d9e88137c47d1879fc0b1949207c95b33f03f4156054a935,2024-11-04T20:35:10.193000 CVE-2024-48342,0,0,cab27a7526b8debabab042631051135b3c12f9f8dc84e657f2f251a3750f9436,2024-11-04T07:15:11.437000 @@ -263892,8 +263911,8 @@ CVE-2024-48825,0,0,ad369d1cf502489a8c86407b4cab4059378b0524ef59b99c231bc11027e4f CVE-2024-48826,0,0,75c9450df85723c7e5fe507735f7be7d84001c192ccab935bbc0ccf65a95117e,2024-10-29T19:35:27.303000 CVE-2024-48827,0,0,b8784c14c4c0a2af4d656264bee611472f424ecc32bdba68ae4a9cb4ecb6178a,2024-10-15T12:58:51.050000 CVE-2024-4883,0,0,66fd0c7113b75e4613bf51e6b10a097cc5dcf57aa3f97b3df0e5c31c4210be62,2024-09-06T22:46:17.103000 -CVE-2024-48837,0,1,f5488c45b5b240917695042772d5a51760ce591b49d83868db6d3f484decff9e,2024-11-12T13:55:21.227000 -CVE-2024-48838,0,1,2e9787182617613ac5c5c71a35da89da4e0da1fca7b29929c3f69c43fe9528d6,2024-11-12T13:55:21.227000 +CVE-2024-48837,0,0,f5488c45b5b240917695042772d5a51760ce591b49d83868db6d3f484decff9e,2024-11-12T13:55:21.227000 +CVE-2024-48838,0,0,2e9787182617613ac5c5c71a35da89da4e0da1fca7b29929c3f69c43fe9528d6,2024-11-12T13:55:21.227000 CVE-2024-4884,0,0,a2dcec8e16e916f3e6bf44fbf27e64f395ae27ac96c65779b6d04fbf5173b4c4,2024-09-06T22:45:59.233000 CVE-2024-4885,0,0,2608f2aa7fb5189467bda7bb610d4e03f1b43256b775a84e60ba9a3b8ac9b260,2024-09-06T22:44:27.840000 CVE-2024-4886,0,0,d27ca09c7d3a0108a7cfa4692eb479eab6127452085468fbf17d7a45144cc1ee,2024-06-11T17:14:56.323000 @@ -263931,7 +263950,7 @@ CVE-2024-48933,0,0,eab55cc4133fd12eb852707496206c0c064cf1bfef188e95346821cf2dadf CVE-2024-48936,0,0,202c3a156bee1b2512b5fe2822e4aae4f593d6287e38823043400d9ff6e54ff7,2024-10-30T21:35:10.387000 CVE-2024-48937,0,0,53216fc8a6fbe5febb4c086d6958028e95a58513bdf6caced98eaac34038db0e,2024-10-17T19:48:11.163000 CVE-2024-48938,0,0,42546c0230f7c9740d6f2b303141b0c584cd79f3d515c30c7b8554d560fc1ee9,2024-10-17T19:49:56.327000 -CVE-2024-48939,0,1,49c30ac3ed6a74a719d8c797de297e3971f9929c1211ae188996fe057081a241,2024-11-12T13:55:21.227000 +CVE-2024-48939,0,0,49c30ac3ed6a74a719d8c797de297e3971f9929c1211ae188996fe057081a241,2024-11-12T13:55:21.227000 CVE-2024-4894,0,0,1906244d072f236ffca4e7ab82222b86cb7f201e42e01d4517f3ab933ca907f5,2024-05-15T16:40:19.330000 CVE-2024-48941,0,0,96d5eae18aed5942dcf07fb408430a3860f6be4f858a12cc1546cac40f719d2f,2024-10-11T21:36:46.327000 CVE-2024-48942,0,0,8e0a2bf9dd24a5a385f196f7b0656ab299e53cb741eb92aa617f57ef48ee5dff,2024-10-11T21:36:47.090000 @@ -264137,17 +264156,17 @@ CVE-2024-4939,0,0,02ebdbdecbb04fb797cb0e62af7790a7212959b717e5fa68d9d371341b4150 CVE-2024-49390,0,0,bf8e2af7ccbb4b660c65e9bd08fe703dbfad2824c259f85985bd9875cc0e074f,2024-10-18T20:11:32.270000 CVE-2024-49391,0,0,7f95620910cf80d65ac312e14b00de0efd9f4bd72d46b29596e3846aec7b2c93,2024-10-18T20:10:38.790000 CVE-2024-49392,0,0,56ddd6b8f3dc25b477998ea94d765b7032f9ba1bc48f4ba6c67a16ed201e6e0b,2024-10-18T20:10:05.850000 -CVE-2024-49393,0,1,83b33f94bc0a890ae8015a4ed5dce4d277f670e0c99dffed665baadb9eb37c6d,2024-11-12T13:55:21.227000 -CVE-2024-49394,0,1,031d1d6e7ca3ed47247df4f54ef799c27cf191a70ddccb1f4dafcfb74483fbca,2024-11-12T13:55:21.227000 -CVE-2024-49395,0,1,605a480cfa5ba2b643a3c74f1826c9664120d88b37c574cbbccc2ec762f781ab,2024-11-12T13:55:21.227000 +CVE-2024-49393,0,0,83b33f94bc0a890ae8015a4ed5dce4d277f670e0c99dffed665baadb9eb37c6d,2024-11-12T13:55:21.227000 +CVE-2024-49394,0,0,031d1d6e7ca3ed47247df4f54ef799c27cf191a70ddccb1f4dafcfb74483fbca,2024-11-12T13:55:21.227000 +CVE-2024-49395,0,0,605a480cfa5ba2b643a3c74f1826c9664120d88b37c574cbbccc2ec762f781ab,2024-11-12T13:55:21.227000 CVE-2024-49396,0,0,dbaa3d388154985d86e8594d731b97904294f985dcd6b939c9b3040fa96316c2,2024-10-18T12:52:33.507000 CVE-2024-49397,0,0,958762caa5006a67fc74324331d920e22a8fe3617537f208fec92361877cfad4,2024-10-18T12:52:33.507000 CVE-2024-49398,0,0,1964f2918f2b62a12a26449777ec3d512771c9e0a90e6a92142f1221cf2a6f15,2024-10-18T12:52:33.507000 CVE-2024-49399,0,0,280599d675596d0a62f92142e8a452afef09a7da5cc6b00dfa86815a1f9a12f9,2024-10-18T12:52:33.507000 CVE-2024-4940,0,0,4accffc853c801fe14d0f801549945291e8d9583e559383dea39b767fc7e6ff0,2024-06-24T12:57:36.513000 CVE-2024-49400,0,0,4447b6d98624a8004ac0954b08a6ad26989e2084cf92d73c9f3d9262ea896967,2024-11-01T19:35:28.673000 -CVE-2024-49401,0,0,3427810f268e9c731630e7d9a328bdd18c263d346c722a4e166cf53fee136a63,2024-11-06T18:17:17.287000 -CVE-2024-49402,0,0,ad5715c8063772fc057279f9ec58007b11662ce6d89cea8bfc5c55b820d68240,2024-11-06T18:17:17.287000 +CVE-2024-49401,0,1,e4e7a53ed67bf34b96a2df01f2e624360397577809634daec0842bb0bcf4acfd,2024-11-12T16:10:18.870000 +CVE-2024-49402,0,1,9fc729ce71983a63730fac9cf49d2dcd330e50e027d114e2cf4a6d8a75db59e5,2024-11-12T15:09:10.890000 CVE-2024-49403,0,0,30ab3381faa6d7588cea33834cd2f42484461ab2cf4edefed13e4f5f8acd0e2a,2024-11-06T18:17:17.287000 CVE-2024-49404,0,0,a007566a9da4c28e8f8777017a12bdcea2903129c7189e896131b83a0527aebd,2024-11-06T18:17:17.287000 CVE-2024-49405,0,0,1bb2048dae8ed8362c07dc596854188d431500a6863f51793b048857c1e63321,2024-11-06T18:17:17.287000 @@ -264169,10 +264188,10 @@ CVE-2024-49501,0,0,b68f4d3131dd45c8240c685b13eebbf7042a3a95ee975ccc7d0b4e65e2269 CVE-2024-49522,0,0,b49aefd5a73ccd26563c8b91d3f2d98c089948509c56be654cf3171337fc2496,2024-11-08T18:06:01.930000 CVE-2024-49523,0,0,f80724f56253226f78ea56271ee80d62b3ba148e1878999be1900b25d2719668,2024-11-08T19:01:03.880000 CVE-2024-49524,0,0,e7793eab2fff9b59c976da4b69592a395e034319e6c39d07f8b75673444fce47,2024-11-08T19:01:03.880000 -CVE-2024-49557,0,1,2a5d766ad2ace9ca4473e381728b5667e6cadd8340da6faf7936ed125bc7364d,2024-11-12T13:55:21.227000 -CVE-2024-49558,0,1,47432e1f54f695adb17b8dc00f9577022f45f8f0ba5da018a951249b00715362,2024-11-12T13:55:21.227000 +CVE-2024-49557,0,0,2a5d766ad2ace9ca4473e381728b5667e6cadd8340da6faf7936ed125bc7364d,2024-11-12T13:55:21.227000 +CVE-2024-49558,0,0,47432e1f54f695adb17b8dc00f9577022f45f8f0ba5da018a951249b00715362,2024-11-12T13:55:21.227000 CVE-2024-4956,0,0,319b39cd7f80ef1a8cfcc633b91e7d5f141facd950994947b42a7565c106a7a4,2024-05-17T18:36:31.297000 -CVE-2024-49560,0,1,ab312f3dd70e163a5c72b63be519379ba38d0c543c55c0ea8821e33d6ab68e6b,2024-11-12T13:55:21.227000 +CVE-2024-49560,0,0,ab312f3dd70e163a5c72b63be519379ba38d0c543c55c0ea8821e33d6ab68e6b,2024-11-12T13:55:21.227000 CVE-2024-4957,0,0,e3bb8e47c8dfba146bed7647eff25fc6cc8427bb0bd54429262b4324d627abed,2024-07-03T02:08:22.473000 CVE-2024-49579,0,0,4674118b21cb39ebeef2b4743f0ed75dcd0002fe01b9b902589f8dc4995b5f10,2024-10-18T12:52:33.507000 CVE-2024-4958,0,0,15591ba73d7708bbd560fadc0281274b5c7c2c12545797826fbf6e13e1222639,2024-06-03T14:46:24.250000 @@ -264563,18 +264582,18 @@ CVE-2024-50092,0,0,1bae9326eae1f879c38112725312fe16a36edc58131a09667f9f496857ede CVE-2024-50093,0,0,419eb8dddfe2833bb713253843fa8eb7e9c480ddcfa4547a406e999eb86f6dab,2024-11-08T16:49:33.143000 CVE-2024-50094,0,0,8d554d91d10f3417f68354112f98d683c81490048baf5a5ec9ac8bffadb7c106,2024-11-06T18:17:17.287000 CVE-2024-50095,0,0,7be15323a65def7978ea05e4974ba938ad3e79e6f92c2da07d665bf4a6736f61,2024-11-06T18:17:17.287000 -CVE-2024-50096,0,0,909d09d3b77fc484dfec9c5eb1212f48d60cd31f438f53b3a699d71d9c453549,2024-11-08T16:15:46.477000 -CVE-2024-50097,0,0,1e19c3b9c1e2e37e95df9d9009f79edaf0220dd0d6934058e29be2c02535695a,2024-11-06T18:17:17.287000 -CVE-2024-50098,0,0,cf431c67b59033618fb36a658b582ea62152d8b19728778d1421d727c45b83a7,2024-11-06T18:17:17.287000 -CVE-2024-50099,0,0,906337b2a070500172e6dc4c08f3da4632025da5e255074bab057bfa7a726529,2024-11-08T16:15:46.590000 +CVE-2024-50096,0,1,59e9e22e22a35fc41761fb6664d3b0e7ffc6127f6a63b7a2456268dcccdbe871,2024-11-12T16:16:33.703000 +CVE-2024-50097,0,1,6a3e01ed40c6f1cc408bee915019f76f6de63ed3a690ad6a8a96d61449cd92c4,2024-11-12T16:18:00.477000 +CVE-2024-50098,0,1,230ad2bf5f50188402342a41640634e743511b0d9a5c8add0ac5aed1f1d611c2,2024-11-12T16:25:48.717000 +CVE-2024-50099,0,1,2068c9cb44a603652fa68a4fcb0da524a100cd681ef2ad455f5fccf4d3235d37,2024-11-12T16:28:30.633000 CVE-2024-5010,0,0,3c850c266940942fbe09adbb4c98bc7afc61c3edf80ecba9d04f15eeefca6109,2024-09-06T22:42:39.017000 -CVE-2024-50100,0,1,ea83177858e02e925341fb5f4effc0f0f81a22c62489feb4fcf01044f5024b83,2024-11-12T14:57:44.877000 -CVE-2024-50101,0,1,177592c2bddeab02a0a775beadc6528f45c3b5091ee703b99ad5c00ed6933235,2024-11-12T14:59:22.600000 -CVE-2024-50102,0,0,8fd44c4a8d660d019b8c0f66cb6904e5a1c8e3a17fcea236b7b7019c992ceb8c,2024-11-06T18:17:17.287000 +CVE-2024-50100,0,0,ea83177858e02e925341fb5f4effc0f0f81a22c62489feb4fcf01044f5024b83,2024-11-12T14:57:44.877000 +CVE-2024-50101,0,0,177592c2bddeab02a0a775beadc6528f45c3b5091ee703b99ad5c00ed6933235,2024-11-12T14:59:22.600000 +CVE-2024-50102,0,1,698eb727e31750ac5982efeb0aa315e92ee1ea8f0357f87e8de6e50b6fa7680d,2024-11-12T15:08:00.563000 CVE-2024-50103,0,0,f7388d1b8248faac199af938c5b063ca25ea4a29439f14300925ad8fea65924b,2024-11-08T16:15:46.900000 -CVE-2024-50104,0,0,0a03fa8616f24786fc437645bd296ca0d38abe7ace79a2ca8ba72fe2582f7777,2024-11-06T18:17:17.287000 -CVE-2024-50105,0,0,ebcb68f88678e4c8d85a22decf4b0f24e8f4a103c214c492268d0e1167ee68dc,2024-11-06T18:17:17.287000 -CVE-2024-50106,0,0,10cb92f800d3539f7667fd27745ea897b092c4e1dd4e560332eb31f585d132cf,2024-11-06T18:17:17.287000 +CVE-2024-50104,0,1,0ec6aaaf4d9f4ef8d0ae34dee7b208be05ea49fc9c1639b27592587272841351,2024-11-12T15:05:45.587000 +CVE-2024-50105,0,1,7392bdca5286c99199a69cf508ec45301a69859e0c809e006c5e2e0ecb4020a0,2024-11-12T15:06:14.500000 +CVE-2024-50106,0,1,cb65f3b194c6bbabc39b6bd289f1749babe2eefff8be89a7e03387b8beb9444d,2024-11-12T15:07:39.707000 CVE-2024-50107,0,0,c3e237eae128528ae6608a26b966efe022ddebd6d0c53a652e91aaf0e9101d42,2024-11-08T21:27:32.240000 CVE-2024-50108,0,0,61f04b1d5ef9c1df693048d65fcbe3cda602cc0f45d0d93919c517d1234dcd46,2024-11-08T21:28:02.227000 CVE-2024-50109,0,0,0ebe5d7138c22e8bf3233a37f05b45ad5ddc39f30de8d0d87fc7fb2741661abb,2024-11-08T21:30:11.820000 @@ -264690,72 +264709,86 @@ CVE-2024-50209,0,0,8a8805a93a7ad4720dce18e0fc6a19c9829749a589bcab3a3e272b745ce15 CVE-2024-5021,0,0,38505cbaa011793e28d7950a2ea2daf96aac6ed3db846bcaf517334c4dc7fa50,2024-06-20T12:44:01.637000 CVE-2024-50210,0,0,39887cb7f7dc73362120106f57cbc0747a59b3d51e3a41b9091d50f5c44af891,2024-11-08T19:01:03.880000 CVE-2024-50211,0,0,789a6df7d2c02bd672dc452fcbc42c98aa068123f2fd8cc57a38a73d58fa13ac,2024-11-08T19:01:03.880000 -CVE-2024-50212,0,1,befc3c4f2399c98b74eaa8ec2965db6d6768d3d3be42bd748e5e2378cdaa8f99,2024-11-12T13:56:24.513000 -CVE-2024-50213,0,1,d33d90fd727ceb9d16c37902e1e5fe600fd111a566094370997f5f993729d7b4,2024-11-12T13:56:24.513000 -CVE-2024-50214,0,1,391525e2ae02cd626770e9e9b5e15b489b0738fc2200bc5d666e6b974f62828a,2024-11-12T13:56:24.513000 -CVE-2024-50215,0,1,72a1c2fd96cf3f8adb7fbbb7c51f0eee2b5c97f2080d1f11fe81591870ade062,2024-11-12T13:56:24.513000 -CVE-2024-50216,0,1,173c858fca904c6b8ae3808e39fe7eb2abffc64106c67c7401645a47033740f6,2024-11-12T13:56:24.513000 -CVE-2024-50217,0,1,c9c7be9cefdd1c2145964f4ba7cfd9cabc4c80c3fe813bca02cba94822e3809c,2024-11-12T13:56:24.513000 -CVE-2024-50218,0,1,0fb6d6d645b3a2c6757f1c38779b956e24c411c7561ebff1cb364f4755c7ba07,2024-11-12T13:56:24.513000 +CVE-2024-50212,0,0,befc3c4f2399c98b74eaa8ec2965db6d6768d3d3be42bd748e5e2378cdaa8f99,2024-11-12T13:56:24.513000 +CVE-2024-50213,0,0,d33d90fd727ceb9d16c37902e1e5fe600fd111a566094370997f5f993729d7b4,2024-11-12T13:56:24.513000 +CVE-2024-50214,0,0,391525e2ae02cd626770e9e9b5e15b489b0738fc2200bc5d666e6b974f62828a,2024-11-12T13:56:24.513000 +CVE-2024-50215,0,0,72a1c2fd96cf3f8adb7fbbb7c51f0eee2b5c97f2080d1f11fe81591870ade062,2024-11-12T13:56:24.513000 +CVE-2024-50216,0,0,173c858fca904c6b8ae3808e39fe7eb2abffc64106c67c7401645a47033740f6,2024-11-12T13:56:24.513000 +CVE-2024-50217,0,0,c9c7be9cefdd1c2145964f4ba7cfd9cabc4c80c3fe813bca02cba94822e3809c,2024-11-12T13:56:24.513000 +CVE-2024-50218,0,0,0fb6d6d645b3a2c6757f1c38779b956e24c411c7561ebff1cb364f4755c7ba07,2024-11-12T13:56:24.513000 CVE-2024-50219,0,0,57ca6b6c0667d0c6ff47560f6866cfa36318c7798583ecd36bd30e6bd0856676,2024-11-11T14:15:15.210000 CVE-2024-5022,0,0,b83f09821687b900e7e3c962c3fdf76320d3bf46277a4004f5c59e7ba07e152d,2024-10-28T21:35:22.210000 -CVE-2024-50220,0,1,9248275c722aa0ee65ec48818ac68fc6b5c034875ac5f558813310c90770c3df,2024-11-12T13:56:24.513000 -CVE-2024-50221,0,1,837e9820d0025e10ffcd16610192fedab6af280e37bb9cd33e43608ed8c3dbab,2024-11-12T13:56:24.513000 -CVE-2024-50222,0,1,18444961597048efbe9032c498fce3b0ccecdbf3ea349a4544d05ffd766fc988,2024-11-12T13:56:24.513000 -CVE-2024-50223,0,1,d7c23bd418b73e793d58a8fa1645f31ade315b6e12b709ada82aee71dfb8c638,2024-11-12T13:56:24.513000 -CVE-2024-50224,0,1,b008f6eead631d70880601fca933fbafaa007488f7472d3af61fc3b0b4372aa4,2024-11-12T13:56:24.513000 -CVE-2024-50225,0,1,89689733e35e6cd9419b99b6283eb57db849db664095fe32d4eaaa80b9e3a50f,2024-11-12T13:56:24.513000 -CVE-2024-50226,0,1,be195cf2d1abd4f6518b8f9b3b6bf20fb019f7ae97e337fc3094684ec872e950,2024-11-12T13:56:24.513000 -CVE-2024-50227,0,1,e2fc3026a4796dbe3840fabfbecbb504baddef9a999e27e03ee6f1f65a228b58,2024-11-12T13:56:24.513000 -CVE-2024-50228,0,1,75c865d39ef34a7936468d605a87fd1159c5b7985759f49af3b29aee9f74a920,2024-11-12T13:56:24.513000 -CVE-2024-50229,0,1,db48f639566488febe491ced1540227dbb50fbe4a3feec114195f408129d7944,2024-11-12T13:56:24.513000 +CVE-2024-50220,0,0,9248275c722aa0ee65ec48818ac68fc6b5c034875ac5f558813310c90770c3df,2024-11-12T13:56:24.513000 +CVE-2024-50221,0,0,837e9820d0025e10ffcd16610192fedab6af280e37bb9cd33e43608ed8c3dbab,2024-11-12T13:56:24.513000 +CVE-2024-50222,0,0,18444961597048efbe9032c498fce3b0ccecdbf3ea349a4544d05ffd766fc988,2024-11-12T13:56:24.513000 +CVE-2024-50223,0,0,d7c23bd418b73e793d58a8fa1645f31ade315b6e12b709ada82aee71dfb8c638,2024-11-12T13:56:24.513000 +CVE-2024-50224,0,0,b008f6eead631d70880601fca933fbafaa007488f7472d3af61fc3b0b4372aa4,2024-11-12T13:56:24.513000 +CVE-2024-50225,0,0,89689733e35e6cd9419b99b6283eb57db849db664095fe32d4eaaa80b9e3a50f,2024-11-12T13:56:24.513000 +CVE-2024-50226,0,0,be195cf2d1abd4f6518b8f9b3b6bf20fb019f7ae97e337fc3094684ec872e950,2024-11-12T13:56:24.513000 +CVE-2024-50227,0,0,e2fc3026a4796dbe3840fabfbecbb504baddef9a999e27e03ee6f1f65a228b58,2024-11-12T13:56:24.513000 +CVE-2024-50228,0,0,75c865d39ef34a7936468d605a87fd1159c5b7985759f49af3b29aee9f74a920,2024-11-12T13:56:24.513000 +CVE-2024-50229,0,0,db48f639566488febe491ced1540227dbb50fbe4a3feec114195f408129d7944,2024-11-12T13:56:24.513000 CVE-2024-5023,0,0,63ebd4218020d01998ceddb622d35154b9496df68f9db12eb6b4711fe09e7d24,2024-05-17T18:36:31.297000 -CVE-2024-50230,0,1,9c8d5f2dc667ea42cb62609eecc6f7be10b1185979e05368a860fbfb20f0331c,2024-11-12T13:56:24.513000 -CVE-2024-50231,0,1,7a8f610ecec005cadb84f4a16992695834c99230d17326baff53f1fe7ec9eaf3,2024-11-12T13:56:24.513000 -CVE-2024-50232,0,1,a72223ccf10520dcf3c840efe5804d622695c92bebf1442a6d5ba17a0e2b469a,2024-11-12T13:56:24.513000 -CVE-2024-50233,0,1,f85277268d32f4634ddf9805a0dfeee732b76ca10c3f343cc982942a9f050b6e,2024-11-12T13:56:24.513000 -CVE-2024-50234,0,1,58e899dd4ebed7824409f9f6dced51234f5d2daf27d86dbae12afa430b8c7dc0,2024-11-12T13:56:24.513000 -CVE-2024-50235,0,1,d262b0f1318289b84cf3d4dfb7127e25346f53bc323fa3b5befc7e6e0d59ff6c,2024-11-12T13:56:24.513000 -CVE-2024-50236,0,1,7352035a14d78c01622a750806b9a10ecbd80f9f5d7dd4c54d0b496023c976a1,2024-11-12T13:56:24.513000 -CVE-2024-50237,0,1,153554820f4f1f6877db56eb08bf1ff52c5580c63136198cf80fa5593b6b43d8,2024-11-12T13:56:24.513000 -CVE-2024-50238,0,1,21164d1932c9aa271a33a6621964cad7de0c843345a5007873ea26ed595a6df8,2024-11-12T13:56:24.513000 -CVE-2024-50239,0,1,ae9533a10286a9391938836e3faebe0216113e3227b3f19609bb2d2ea3609aeb,2024-11-12T13:56:24.513000 +CVE-2024-50230,0,0,9c8d5f2dc667ea42cb62609eecc6f7be10b1185979e05368a860fbfb20f0331c,2024-11-12T13:56:24.513000 +CVE-2024-50231,0,0,7a8f610ecec005cadb84f4a16992695834c99230d17326baff53f1fe7ec9eaf3,2024-11-12T13:56:24.513000 +CVE-2024-50232,0,0,a72223ccf10520dcf3c840efe5804d622695c92bebf1442a6d5ba17a0e2b469a,2024-11-12T13:56:24.513000 +CVE-2024-50233,0,0,f85277268d32f4634ddf9805a0dfeee732b76ca10c3f343cc982942a9f050b6e,2024-11-12T13:56:24.513000 +CVE-2024-50234,0,0,58e899dd4ebed7824409f9f6dced51234f5d2daf27d86dbae12afa430b8c7dc0,2024-11-12T13:56:24.513000 +CVE-2024-50235,0,0,d262b0f1318289b84cf3d4dfb7127e25346f53bc323fa3b5befc7e6e0d59ff6c,2024-11-12T13:56:24.513000 +CVE-2024-50236,0,0,7352035a14d78c01622a750806b9a10ecbd80f9f5d7dd4c54d0b496023c976a1,2024-11-12T13:56:24.513000 +CVE-2024-50237,0,0,153554820f4f1f6877db56eb08bf1ff52c5580c63136198cf80fa5593b6b43d8,2024-11-12T13:56:24.513000 +CVE-2024-50238,0,0,21164d1932c9aa271a33a6621964cad7de0c843345a5007873ea26ed595a6df8,2024-11-12T13:56:24.513000 +CVE-2024-50239,0,0,ae9533a10286a9391938836e3faebe0216113e3227b3f19609bb2d2ea3609aeb,2024-11-12T13:56:24.513000 CVE-2024-5024,0,0,9dd3417f324a3df55f488e05c68d1854a15dd73bd49fdda06475c54e037a76e5,2024-09-04T14:33:57.200000 -CVE-2024-50240,0,1,2f077ad4fd5ccdf3b5ba2ce44e85364d2e13615cffc06674304da8dd186b1324,2024-11-12T13:56:24.513000 -CVE-2024-50241,0,1,a5bf76cb61364c8fcd93873dc49a757de39dd690c5891f004aa15d752ba3c201,2024-11-12T13:56:24.513000 -CVE-2024-50242,0,1,bdafe50a7ca91d1a9ac9fdfd320305af1da5c21b6c2e9faf44e9b3ca97eb393e,2024-11-12T13:56:24.513000 -CVE-2024-50243,0,1,ffe29014db78edfbbe5a9cd3ae22e3f07e52f16b2a387bd8803443925a985f5e,2024-11-12T13:56:24.513000 -CVE-2024-50244,0,1,4b0c17572dce723bd348c4e88bfa6d365c65ddc82e849218dc553de0732e2ba6,2024-11-12T13:56:24.513000 -CVE-2024-50245,0,1,54362644fc56d6b02bbdc2579258c8fabfcf0e5c1dbc290479a2a87423964ec5,2024-11-12T13:56:24.513000 -CVE-2024-50246,0,1,c6d2ae2a6030f6786d3cf9dd0f3cc823500b5dd2b71bfe454efb20441f5e2591,2024-11-12T13:56:24.513000 -CVE-2024-50247,0,1,85b169d2dc6a15291ba96d491cf58ac7fe11896248b2228eaea29a2428618f6b,2024-11-12T13:56:24.513000 -CVE-2024-50248,0,1,3e55857ff4a613601bb11fb36a21ebd35f5998e091f5297863be6a975cad5346,2024-11-12T13:56:24.513000 -CVE-2024-50249,0,1,43e91f42e3c76d4efde81544554f8bdfdead0751feca270ea2651623161f25bf,2024-11-12T13:56:24.513000 +CVE-2024-50240,0,0,2f077ad4fd5ccdf3b5ba2ce44e85364d2e13615cffc06674304da8dd186b1324,2024-11-12T13:56:24.513000 +CVE-2024-50241,0,0,a5bf76cb61364c8fcd93873dc49a757de39dd690c5891f004aa15d752ba3c201,2024-11-12T13:56:24.513000 +CVE-2024-50242,0,0,bdafe50a7ca91d1a9ac9fdfd320305af1da5c21b6c2e9faf44e9b3ca97eb393e,2024-11-12T13:56:24.513000 +CVE-2024-50243,0,0,ffe29014db78edfbbe5a9cd3ae22e3f07e52f16b2a387bd8803443925a985f5e,2024-11-12T13:56:24.513000 +CVE-2024-50244,0,0,4b0c17572dce723bd348c4e88bfa6d365c65ddc82e849218dc553de0732e2ba6,2024-11-12T13:56:24.513000 +CVE-2024-50245,0,0,54362644fc56d6b02bbdc2579258c8fabfcf0e5c1dbc290479a2a87423964ec5,2024-11-12T13:56:24.513000 +CVE-2024-50246,0,0,c6d2ae2a6030f6786d3cf9dd0f3cc823500b5dd2b71bfe454efb20441f5e2591,2024-11-12T13:56:24.513000 +CVE-2024-50247,0,0,85b169d2dc6a15291ba96d491cf58ac7fe11896248b2228eaea29a2428618f6b,2024-11-12T13:56:24.513000 +CVE-2024-50248,0,0,3e55857ff4a613601bb11fb36a21ebd35f5998e091f5297863be6a975cad5346,2024-11-12T13:56:24.513000 +CVE-2024-50249,0,0,43e91f42e3c76d4efde81544554f8bdfdead0751feca270ea2651623161f25bf,2024-11-12T13:56:24.513000 CVE-2024-5025,0,0,5975a4de967bb092ff1a32c8663c734972c139617eb709a92a7c0cc78b284359,2024-05-22T12:46:53.887000 -CVE-2024-50250,0,1,d8fcdb40bef1001ea2a411536bde4271adef2199df08d096c0a9ec3ef47def51,2024-11-12T13:56:24.513000 -CVE-2024-50251,0,1,62b5e2b214fdab150b4f3867fe89f5bac1b73fe03f9ee76cb9676f0fbb0a9279,2024-11-12T13:56:24.513000 -CVE-2024-50252,0,1,4b1d39889f62157a184e6bdf7eb53cda020d226d56e12ff5c70f55edc79ab4a2,2024-11-12T13:56:24.513000 -CVE-2024-50253,0,1,1b2eec23a19d66100687b6ffb1a7cd6c4e42c433503fa74f71430e8927743bf7,2024-11-12T13:56:24.513000 -CVE-2024-50254,0,1,fe9bd35f3da78b0f44083d8329cad73ac1c6f090285dea0a576a303cd96184fb,2024-11-12T13:56:24.513000 -CVE-2024-50255,0,1,ecb1652001c89ea12392206e26b9fcb1eaa915d0fe70f3c842b29178db03dbef,2024-11-12T13:56:24.513000 -CVE-2024-50256,0,1,2ddf616ad9092258f20a24903320119bde3e581655fd231ee23497c20dc13851,2024-11-12T13:56:24.513000 -CVE-2024-50257,0,1,77f545a47dc82457cd59427a8f5e0fe433c31f26034f5e3881da6497ef21225b,2024-11-12T13:56:24.513000 -CVE-2024-50258,0,1,8cfc1328995434fde0f6380d22d70f3ce5e7a8d3057eabd376d6ba5d354ee0d9,2024-11-12T13:56:24.513000 -CVE-2024-50259,0,1,f925a4db4dcd122437f9a6e8927ab90813121431650d14e88a53671417de5170,2024-11-12T13:56:24.513000 -CVE-2024-50260,0,1,dbf8ad3f71dbbd736869ee4a6db138fff2678aaab0ea300663c7b98293894853,2024-11-12T13:56:24.513000 -CVE-2024-50261,0,1,b4e106f44d4a2eb815d0dd8f540fce25308f032b907e878b88914bfdb4dcb64c,2024-11-12T13:56:24.513000 -CVE-2024-50262,0,1,7a7f52a4ecfb838a90895bdb7de5974a897853cb994760b548442b80ee554dd4,2024-11-12T13:56:24.513000 -CVE-2024-50263,0,1,2e071cb68f4a0777e46edaa767663e26ff7c76ecb6dc8a74b30d3bdec9f4ef8b,2024-11-12T13:55:21.227000 +CVE-2024-50250,0,0,d8fcdb40bef1001ea2a411536bde4271adef2199df08d096c0a9ec3ef47def51,2024-11-12T13:56:24.513000 +CVE-2024-50251,0,0,62b5e2b214fdab150b4f3867fe89f5bac1b73fe03f9ee76cb9676f0fbb0a9279,2024-11-12T13:56:24.513000 +CVE-2024-50252,0,0,4b1d39889f62157a184e6bdf7eb53cda020d226d56e12ff5c70f55edc79ab4a2,2024-11-12T13:56:24.513000 +CVE-2024-50253,0,0,1b2eec23a19d66100687b6ffb1a7cd6c4e42c433503fa74f71430e8927743bf7,2024-11-12T13:56:24.513000 +CVE-2024-50254,0,0,fe9bd35f3da78b0f44083d8329cad73ac1c6f090285dea0a576a303cd96184fb,2024-11-12T13:56:24.513000 +CVE-2024-50255,0,0,ecb1652001c89ea12392206e26b9fcb1eaa915d0fe70f3c842b29178db03dbef,2024-11-12T13:56:24.513000 +CVE-2024-50256,0,0,2ddf616ad9092258f20a24903320119bde3e581655fd231ee23497c20dc13851,2024-11-12T13:56:24.513000 +CVE-2024-50257,0,0,77f545a47dc82457cd59427a8f5e0fe433c31f26034f5e3881da6497ef21225b,2024-11-12T13:56:24.513000 +CVE-2024-50258,0,0,8cfc1328995434fde0f6380d22d70f3ce5e7a8d3057eabd376d6ba5d354ee0d9,2024-11-12T13:56:24.513000 +CVE-2024-50259,0,0,f925a4db4dcd122437f9a6e8927ab90813121431650d14e88a53671417de5170,2024-11-12T13:56:24.513000 +CVE-2024-50260,0,0,dbf8ad3f71dbbd736869ee4a6db138fff2678aaab0ea300663c7b98293894853,2024-11-12T13:56:24.513000 +CVE-2024-50261,0,0,b4e106f44d4a2eb815d0dd8f540fce25308f032b907e878b88914bfdb4dcb64c,2024-11-12T13:56:24.513000 +CVE-2024-50262,0,0,7a7f52a4ecfb838a90895bdb7de5974a897853cb994760b548442b80ee554dd4,2024-11-12T13:56:24.513000 +CVE-2024-50263,0,0,2e071cb68f4a0777e46edaa767663e26ff7c76ecb6dc8a74b30d3bdec9f4ef8b,2024-11-12T13:55:21.227000 CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000 CVE-2024-50307,0,0,6d2dcfccb50c0c30fd7d9bda3b36490982da8110db31d087befc4509a1d360cd,2024-10-28T13:58:09.230000 CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000 -CVE-2024-50310,1,1,8ca1d30e05e8d14940210b5289df4fe889b7bcbf7d81126e5203abf9701afd02,2024-11-12T13:55:21.227000 +CVE-2024-50310,0,0,8ca1d30e05e8d14940210b5289df4fe889b7bcbf7d81126e5203abf9701afd02,2024-11-12T13:55:21.227000 CVE-2024-50311,0,0,a911784e609d4ab74e0290e5d915dbb7b1471b8d97b5435937a13bc8c9811bb6,2024-10-30T18:39:40.617000 CVE-2024-50312,0,0,8b68d956a110cf88efd2db7bdd6fdd3dc5b02186497d9ae2cbca0852915a398f,2024-10-30T18:35:56.753000 -CVE-2024-50313,1,1,1f9bfdd78a62f9b5771008b0c7fd93e4e221029be8c4ff06400d9d0c1dd48acc,2024-11-12T13:55:21.227000 +CVE-2024-50313,0,0,1f9bfdd78a62f9b5771008b0c7fd93e4e221029be8c4ff06400d9d0c1dd48acc,2024-11-12T13:55:21.227000 CVE-2024-50315,0,0,4cc2faf3d8c489bc195ea9b1b71e3db71fb7f18259f91c4f6bf82e911f7ad06a,2024-11-06T18:15:06.173000 +CVE-2024-50317,1,1,21181d5262dff64e96921704a346ae9ab0370d3b47ce5035a8889c8495ec5f96,2024-11-12T16:15:23.347000 +CVE-2024-50318,1,1,a206caac1aba0b0fe8ff6f1e38a7971260fb237865d9c73765ec10bc36b0fa6c,2024-11-12T16:15:23.537000 +CVE-2024-50319,1,1,6b7e7e3a7b0f25dceaac3f7d32915b22fda7c8db327984fa51dfe6c6d3680734,2024-11-12T16:15:23.713000 CVE-2024-5032,0,0,e2dd01f18d9397a3c892e6f9436384b2c9baea7d6f6081290ca836f05f0fc527,2024-08-01T13:59:38.540000 +CVE-2024-50320,1,1,aea70720eee0368638fdd9bb36da4980a9b55ecc6a2ef528a4d4e61482537b1f,2024-11-12T16:15:23.910000 +CVE-2024-50321,1,1,05b963a1004e403aeba2d8e862a1b0d7625e749f302d7f8785993c74b8c299bb,2024-11-12T16:15:24.100000 +CVE-2024-50322,1,1,8de8898b0433a1331b47a12978727250bf621e3fc5ab94b4dc0c5c73fa862472,2024-11-12T16:15:24.280000 +CVE-2024-50323,1,1,cf18e342925fad22c769a98924e658db1df1635c9db9acc9a972975f13951fc9,2024-11-12T16:15:24.473000 +CVE-2024-50324,1,1,5691fe7984f3540e04dbb6a817402d61e82e8e08c64ee77fd14659e05104f9ac,2024-11-12T16:15:24.653000 +CVE-2024-50326,1,1,aa16d351292625872c442b44b54aad7f430637dcdf3c7d5c9657367d3a233397,2024-11-12T16:15:24.840000 +CVE-2024-50327,1,1,2b40bb502f836073dced40ac05a4840c07f121493c2492038809eb643c37f790,2024-11-12T16:15:25.023000 +CVE-2024-50328,1,1,f2c640c32afe1abb6d3c73e1c9541aa2fc816b737be721e25682ab5e4cb57100,2024-11-12T16:15:25.207000 +CVE-2024-50329,1,1,4bf1f20748f3ad00581bd86caa8ed3a4ad0897ba32eaad21ef9f2a375f6fc12e,2024-11-12T16:15:25.383000 CVE-2024-5033,0,0,34cd1f889798bbfeb338d8d711a920994993596df17d9daf9b428477bffed7c1,2024-08-01T13:59:38.730000 +CVE-2024-50330,1,1,771ff2d5e100ab9210de0d27d4a40526cf5c5c2f269f70c5fa45a099f7bd6f72,2024-11-12T16:15:25.573000 +CVE-2024-50331,1,1,d5c844d0542128f3375f6be6d4c7604f8ac2699563b6027e946f5a0f510c54b7,2024-11-12T16:15:25.773000 CVE-2024-50332,0,0,9656d38bcfb11514c440d951a58b16e4a5fcba542ce41e8a3824831aeb409389,2024-11-06T18:17:17.287000 CVE-2024-50333,0,0,4401ab12299711f5c870abfc6cd15c77232e2aa5f01bc8c09f095498f866c9c7,2024-11-06T18:17:17.287000 CVE-2024-50334,0,0,f1904bf4f599c0615877538d390ce8a4f2f074393bfa4b43c380ab7ec9b0624c,2024-11-08T19:51:58.433000 @@ -264780,6 +264813,7 @@ CVE-2024-50378,0,0,363ccac602ebd2db0e355ee3adb0fa1db2db17fafd04c23325c4255122e79 CVE-2024-5038,0,0,99b942f340bd77179350025250d1eccbd97ee2b6f6339af49bfd1a72be63cbf5,2024-06-11T17:41:37.883000 CVE-2024-50382,0,0,f0709ea17e5f95032091a174ec66193a9596281fe9af192634610c6cbe74c173,2024-10-25T12:56:36.827000 CVE-2024-50383,0,0,e2190fcc52d7d22ac332b0c05a25a337fdc4e67265af4d4eac38727251637b62,2024-10-25T12:56:36.827000 +CVE-2024-50386,1,1,af2f7aff238e0120fb47ce3493182910827a9aec5cdeef05c470df6afce2b2c3,2024-11-12T15:48:59.103000 CVE-2024-5039,0,0,d4eca04aa1b7f16d8be388592f13108d7bb098b959dcbbbcd1cb04ce7429f2b9,2024-05-29T15:18:26.427000 CVE-2024-5040,0,0,28e80b4d31908c888f58e8aabf481f59f60dc445c02b92b96b8990cba6ed3432,2024-05-22T12:46:53.887000 CVE-2024-50407,0,0,4fb5f00a58beefd4cfac77c8419361c961ad849f2db4f958a95f873505b783a5,2024-11-07T20:28:22.860000 @@ -264893,7 +264927,7 @@ CVE-2024-50511,0,0,d2405bceb5490caa25d48c9eaccd1b135c0f31fb2801d8eda1baf830c34ba CVE-2024-50512,0,0,d3eb5beba15659e24233a17e23ff12b2ae18a8a0e2a2662e84998527ef3378d4,2024-11-01T12:57:03.417000 CVE-2024-5052,0,0,1db4612270fc4085b1cc808dfe93eaa2dc99045707c3296716068fcb2c40c936,2024-05-17T18:35:35.070000 CVE-2024-50523,0,0,9dc64520b14d8d5fcbb0c8efcb510b29b3e2269a6933f1788aab4d5518713a80,2024-11-06T15:46:32.907000 -CVE-2024-50524,0,1,852b101a8ae079b1795221124ba9296d78d61951435c1ea2f3870e7b5b7f6bd2,2024-11-12T13:56:24.513000 +CVE-2024-50524,0,0,852b101a8ae079b1795221124ba9296d78d61951435c1ea2f3870e7b5b7f6bd2,2024-11-12T13:56:24.513000 CVE-2024-50525,0,0,e457a4e5f2a29e6ea2dab28cfa0e8d818a3a9d2aa36a168e705f164fa4d6dd20,2024-11-06T15:42:52.993000 CVE-2024-50526,0,0,a38a0e990ccb8f0f5df4c3fd67cc6acb2ad0edab97bd70b44583c49c064fc336,2024-11-06T17:07:02.417000 CVE-2024-50527,0,0,6eb8801b6392b9232c5e9383943c0eafecf0046409f67ab436e320236953f3aa,2024-11-06T17:06:23.250000 @@ -264902,18 +264936,18 @@ CVE-2024-50529,0,0,575f9a44d1152b0df164fc3f7b58f5425e3a00c3302d62a94d397aedcef79 CVE-2024-5053,0,0,85ba036ea0ce8a641df5f4bb0e9116ce37b7603e5543e179441180f635dd17ca,2024-10-04T16:02:22.037000 CVE-2024-50530,0,0,379afb3cd5bb6212bb350d557f04d1566104563b1c4ae420a09ed615234ec789,2024-11-06T17:02:05.543000 CVE-2024-50531,0,0,6a1304599f087ca8d0e7c0cd6930e198fee602ac0bb303da7eb267c873904896,2024-11-06T16:34:13.990000 -CVE-2024-50539,0,1,f6a8443f6456cd2978b7cf3e4eab7a6716ac164c4ac14ac0a517e8986e261054,2024-11-12T13:56:24.513000 -CVE-2024-50544,0,1,20c0b4747279e80deddd7c87d7d299968ec62427305dde75692b84db338d4074,2024-11-12T13:56:24.513000 +CVE-2024-50539,0,0,f6a8443f6456cd2978b7cf3e4eab7a6716ac164c4ac14ac0a517e8986e261054,2024-11-12T13:56:24.513000 +CVE-2024-50544,0,0,20c0b4747279e80deddd7c87d7d299968ec62427305dde75692b84db338d4074,2024-11-12T13:56:24.513000 CVE-2024-5055,0,0,346404cc585681a2fe5319ad3cd387f2171e7718710adaf135152ad352635ebd,2024-05-17T18:35:35.070000 CVE-2024-50550,0,0,0d2291a684da454f82b0b3876a679625fedb67aa405d9eb4df12eeb34adbbab4,2024-10-29T14:34:04.427000 -CVE-2024-50557,1,1,0d03533db80b2800d4de8951161905b408815adcd0ddb81fb357288db781c1ff,2024-11-12T13:55:21.227000 -CVE-2024-50558,1,1,3387a291dc53c089b4734d4ee41cfbc005368b54a0e39a6145fcc55af91d3552,2024-11-12T13:55:21.227000 -CVE-2024-50559,1,1,94a3a0c7dde71b2a1cba4ad8bb65fc7693988825dbf6b319035a272cc396ca28,2024-11-12T13:55:21.227000 +CVE-2024-50557,0,0,0d03533db80b2800d4de8951161905b408815adcd0ddb81fb357288db781c1ff,2024-11-12T13:55:21.227000 +CVE-2024-50558,0,0,3387a291dc53c089b4734d4ee41cfbc005368b54a0e39a6145fcc55af91d3552,2024-11-12T13:55:21.227000 +CVE-2024-50559,0,0,94a3a0c7dde71b2a1cba4ad8bb65fc7693988825dbf6b319035a272cc396ca28,2024-11-12T13:55:21.227000 CVE-2024-5056,0,0,b09a6a74de5b053675f9afc4f104e067ee8a59f791091ecbf85080c4327f1e74,2024-08-23T16:04:14.643000 -CVE-2024-50560,1,1,b843bca7b6a40f916c397549b2e42d27f2eb824dea7bfae926fed916903cd3e6,2024-11-12T13:55:21.227000 -CVE-2024-50561,1,1,b588bd675e5176b44b60f7eef24038c74103e95b71ac19ebc75b4b604b17a0e9,2024-11-12T13:55:21.227000 +CVE-2024-50560,0,0,b843bca7b6a40f916c397549b2e42d27f2eb824dea7bfae926fed916903cd3e6,2024-11-12T13:55:21.227000 +CVE-2024-50561,0,0,b588bd675e5176b44b60f7eef24038c74103e95b71ac19ebc75b4b604b17a0e9,2024-11-12T13:55:21.227000 CVE-2024-5057,0,0,6ac23c507e757b24b72de98245da87576f9a2b62e0f8d57278541740a6070ccf,2024-09-20T19:31:39.437000 -CVE-2024-50572,1,1,ad5a819397cf2d6fbf086e60f7062c28027416de63387718e6910136cb5bfb09,2024-11-12T13:55:21.227000 +CVE-2024-50572,0,0,ad5a819397cf2d6fbf086e60f7062c28027416de63387718e6910136cb5bfb09,2024-11-12T13:55:21.227000 CVE-2024-50573,0,0,6166bba949b905ceb4319678694597e7477dff6436071dabfbd162d318e60f8a,2024-10-29T17:12:14.760000 CVE-2024-50574,0,0,b4c85ee17cab7a2dc3355aa11a3a7bb2af1a1df68c9041971813110ae5b2fe8a,2024-10-29T17:16:11.277000 CVE-2024-50575,0,0,fc32d20f0e12c8f088f3b45de0e6be389ad7ff627245b3eedb03a983727ced9c,2024-10-29T17:18:26.957000 @@ -264935,7 +264969,7 @@ CVE-2024-50592,0,0,1ea6423960cc50e93195b2cf1d9f7905b125a77bfd5004aeb42759deb6410 CVE-2024-50593,0,0,2990c55af886ff8c2c12dbcca8abdce067826f7d03b201038626b94cf51f8774,2024-11-08T19:01:03.880000 CVE-2024-50599,0,0,3c6f0c29bfc51c064c63c37a765c151941367295dbdeff70ad17448c4c631795,2024-11-08T19:01:03.880000 CVE-2024-5060,0,0,70a4b23a22f78db2884c1ce0fa906b767ee25d155e7de23427bff751940319e4,2024-05-24T13:03:05.093000 -CVE-2024-50601,0,1,85a0cc68e7d6301a74918b2d497fb47d678814d8250642c0442610e62be3405c,2024-11-12T13:55:21.227000 +CVE-2024-50601,0,1,46ceecbb3e4c2063d575a1c7f505458091c6749e5bd2062743f6726b0449df35,2024-11-12T16:35:22.810000 CVE-2024-50602,0,0,45e9269102f2b541d78d641e3b6d4f0d7b12a8e026b5814df3e38d2c0c706172,2024-10-30T18:35:16.237000 CVE-2024-5061,0,0,acb15fde0f7701ee7d55862ecbc276a299a2eba41aa60a0bce397763155cd902,2024-09-03T15:11:56.787000 CVE-2024-50610,0,0,2336f18018549d31226ad5c4df53b32342f6a9adf12b0e16f4241999fbebe853,2024-10-30T19:35:30.033000 @@ -264950,12 +264984,12 @@ CVE-2024-50623,0,0,71c6fad96d3194eba7d5d7edd081f9ad30cc6decd08744ac71e97f086f12f CVE-2024-50624,0,0,2f6d7cbc06ddd09de063e5bd0feef072f438fbd478c20a099bcf6256ed039f90,2024-10-30T21:35:12.223000 CVE-2024-5063,0,0,3ea00cb3f53084b2393e5a818811e5957f116b348338ce87a59f64292b187a9f,2024-06-04T19:20:57.760000 CVE-2024-50634,0,0,1259534018b84fc966c6bbf71883176c6258839dafca0d12474268de67eb80a9,2024-11-08T19:01:03.880000 -CVE-2024-50636,0,1,2fc9138fa183119876b777928207f426f13352402fa782392dc2b828754f0184,2024-11-12T13:55:21.227000 +CVE-2024-50636,0,0,2fc9138fa183119876b777928207f426f13352402fa782392dc2b828754f0184,2024-11-12T13:55:21.227000 CVE-2024-50637,0,0,7cb3fd4c2566fc1d1593156e77d24b90af6dfd042618185e839399543b673bed,2024-11-07T14:15:16.780000 CVE-2024-5064,0,0,d857d2e0ee5316e135c4045ce3a7ab1579933a9b029d66480995681ffcc21c71,2024-06-04T19:20:57.870000 CVE-2024-5065,0,0,0430cc7c42876b1507fe619bbbc6ece1ba2c878f57a5564022a1efa295cd852d,2024-06-04T19:20:57.977000 CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000 -CVE-2024-50667,0,1,e1e6fd05dc47d8d0018e6051a77007d9f2a6e89a4ed76dd1a7ea5db0cdc3d1be,2024-11-12T13:55:21.227000 +CVE-2024-50667,0,0,e1e6fd05dc47d8d0018e6051a77007d9f2a6e89a4ed76dd1a7ea5db0cdc3d1be,2024-11-12T13:55:21.227000 CVE-2024-5067,0,0,7a5f09523c1a14d6651905f1f8853395c32eebb526caa99a81fddc9a443e16ea,2024-09-05T17:29:32.287000 CVE-2024-5069,0,0,9472ccb93cc67e368452ccbd7690fcdac2e9c6bf3a0a4c1febdda7b23dc05b96,2024-06-04T19:20:58.080000 CVE-2024-5071,0,0,1e84a840bf7fe6d05a333c61daff03721e2399762594abd260e8b415b74d49eb,2024-10-28T21:35:22.430000 @@ -264970,11 +265004,11 @@ CVE-2024-5079,0,0,03cab751fae6538cdd3ee0f9a467090b1b9dca8ded972c9a24812d90a2b62a CVE-2024-5080,0,0,88ae00b43e12b64ab9ecc2d4c4ea1fe4d89b86d4c131aa05e4a989c5a4e3b207,2024-08-01T13:59:40.707000 CVE-2024-50801,0,0,b02fd2a4d914f47ebf18861bef14a429b26208dd8058232ee786f89bcea879c0,2024-11-04T19:35:13.810000 CVE-2024-50802,0,0,8492f5be24f5ad2918f47970062e4bc2c1c3f432ad972af1d330cb18adac5b2e,2024-11-04T19:35:14.907000 -CVE-2024-50808,0,1,1a667410201903fdc8230c48df98057d6516bd370b3a4500e5037005f86c9f20,2024-11-12T13:56:54.483000 -CVE-2024-50809,0,1,0543ed682b74f6a15eb703e6e2e2cbff22bee156f875bd21c519fc7274b9287c,2024-11-12T13:56:54.483000 +CVE-2024-50808,0,0,1a667410201903fdc8230c48df98057d6516bd370b3a4500e5037005f86c9f20,2024-11-12T13:56:54.483000 +CVE-2024-50809,0,0,0543ed682b74f6a15eb703e6e2e2cbff22bee156f875bd21c519fc7274b9287c,2024-11-12T13:56:54.483000 CVE-2024-5081,0,0,0bebffdc717b25462ccb5a198cb29076c0fa0475011c795b0df7ab25d1acf197,2024-08-05T15:35:16.180000 -CVE-2024-50810,0,1,7da23b2ab88a2657cb76543548549613aa1f561df30582c648f7520bf514f0d4,2024-11-12T13:56:54.483000 -CVE-2024-50811,0,1,d8ef1ac40dcb898d28bb949cb8cb9a8ce73f83d8e224524d33d6a2ba92df335a,2024-11-12T13:56:54.483000 +CVE-2024-50810,0,0,7da23b2ab88a2657cb76543548549613aa1f561df30582c648f7520bf514f0d4,2024-11-12T13:56:54.483000 +CVE-2024-50811,0,0,d8ef1ac40dcb898d28bb949cb8cb9a8ce73f83d8e224524d33d6a2ba92df335a,2024-11-12T13:56:54.483000 CVE-2024-5084,0,0,79705ce3d53f6e7c72da00fccc935c6da44be9bf4354c31cd8528afb5e0a643e,2024-05-24T01:15:30.977000 CVE-2024-5085,0,0,6942e3068671e85a9578eddbb7240c8706dd53cd6ec5670c5d4ddd91c950a30a,2024-05-24T01:15:30.977000 CVE-2024-5086,0,0,cace1182cf9be3136b0c613ecdabc086a9a0b40661f04ebd6e230acc3565cbb0,2024-05-29T13:02:09.280000 @@ -264991,10 +265025,10 @@ CVE-2024-5096,0,0,5ed717834c38883681c6d180e391a0fccee5714f6ff3215bd896b6366e61be CVE-2024-50966,0,0,17999db3c119b65097d64bae028974d0e6d4cf5d6910c7a7a211536c5ff5b48a,2024-11-08T19:01:03.880000 CVE-2024-5097,0,0,f8c17c92eeab06c631c7e3bccbcd56a5be798bb0ae3554a5ecf4b2a49f948336,2024-06-04T19:20:58.787000 CVE-2024-5098,0,0,51bb68a404444dbad57c4444d3880f6dd34c8b10fc09ab7783a9da02fb8f5608,2024-06-04T19:20:58.887000 -CVE-2024-50989,0,1,e4c0fe2b8431c4258cd2ecc4a0f559aa989b45362bfebaa4c143315581a69ae6,2024-11-12T13:55:21.227000 +CVE-2024-50989,0,0,e4c0fe2b8431c4258cd2ecc4a0f559aa989b45362bfebaa4c143315581a69ae6,2024-11-12T13:55:21.227000 CVE-2024-5099,0,0,c449033239abbf7fd2bba4f64694ff77374623f364f0fa141d0a92a151a3ab2c,2024-06-04T19:20:58.993000 -CVE-2024-50990,0,1,3e42f63cb4cce2bde832528585cd9a59c20bb79b20e8a372aa48cab82b38c511,2024-11-12T13:55:21.227000 -CVE-2024-50991,0,1,d7b9dadf9ffde3571101ab4cd85a569d9cef8837174cd0bebf677a2bed448c13,2024-11-12T13:55:21.227000 +CVE-2024-50990,0,0,3e42f63cb4cce2bde832528585cd9a59c20bb79b20e8a372aa48cab82b38c511,2024-11-12T13:55:21.227000 +CVE-2024-50991,0,0,d7b9dadf9ffde3571101ab4cd85a569d9cef8837174cd0bebf677a2bed448c13,2024-11-12T13:55:21.227000 CVE-2024-50993,0,0,a9de4dd48dde3ac3fa9f8b5743f41b5b56dac32227b8c8bf2e6472e6c2af5c67,2024-11-05T17:35:19.567000 CVE-2024-50994,0,0,a5cc8cf1e738761f065a4f27d82e61f2db641d34c682578fe3c2a1afe6ece327,2024-11-05T17:35:20.363000 CVE-2024-50995,0,0,60f0d71d86c3ab99e9e53c92c51f008106e52e339b3ed722bcfbc442b7e04dd9,2024-11-05T17:35:21.167000 @@ -265030,15 +265064,15 @@ CVE-2024-51021,0,0,b06ad1dc7caa63f0b78f2a692ebfbc7dc3db4861942e25ad61d65ea6408ad CVE-2024-51022,0,0,9c971f391f021663a674f6ebedab01c215349ea525c288aa5349243311884419,2024-11-05T16:35:35 CVE-2024-51023,0,0,b12f806c39027dd585f6605b170e48144a3513f557c323acb9850f669a22caef,2024-11-05T21:35:11.923000 CVE-2024-51024,0,0,2602616b46cde149e40ad1ec2305c8463ebfa9f137264738865d2534ea931b9c,2024-11-05T20:35:25.253000 -CVE-2024-51026,0,1,a53b987681fad958b0e0dfc0b8c2f642e8987d295f398a795d1e53509e193c12,2024-11-12T13:55:21.227000 +CVE-2024-51026,0,0,a53b987681fad958b0e0dfc0b8c2f642e8987d295f398a795d1e53509e193c12,2024-11-12T13:55:21.227000 CVE-2024-5103,0,0,aef0baf1fd7c527670ecf099c59b541b0a60e91a3e6b8de1c582546f74d7df46,2024-06-04T19:20:59.297000 CVE-2024-51030,0,0,8864f5f848b4bd116cf6c117fc9413494345870c652480a21b492e7685b9b04b,2024-11-08T19:01:03.880000 CVE-2024-51031,0,0,1e5ab5cf9c7a25d9afff4cfa33f3918bc3dcf7d5460284d217623f0076ca881a,2024-11-08T19:01:03.880000 CVE-2024-51032,0,0,ec7a3f58b1b13bff81847fdcad7b6dc259b873fcbfe047be514b3d445ebe4aca,2024-11-08T19:01:03.880000 CVE-2024-5104,0,0,8d4ff1d965ca43b16b77c8055dc82631e6e8123b480d913038100bbc16c5fc14,2024-06-04T19:20:59.397000 CVE-2024-5105,0,0,c1afcbdfab9cbf8b7401c36e665ea5449fdb0423f5baf719d1747abc02484d12,2024-06-04T19:20:59.500000 -CVE-2024-51054,0,1,679f1ab11a6bd17f8826d1e56c02f08fe3c1b163f6815abb310103211e2f5032,2024-11-12T13:55:21.227000 -CVE-2024-51055,0,1,bc6e923abc09fb516723039d0c80e2e1c973506d67c4fd7e8b98b13ae600002a,2024-11-12T13:56:54.483000 +CVE-2024-51054,0,0,679f1ab11a6bd17f8826d1e56c02f08fe3c1b163f6815abb310103211e2f5032,2024-11-12T13:55:21.227000 +CVE-2024-51055,0,0,bc6e923abc09fb516723039d0c80e2e1c973506d67c4fd7e8b98b13ae600002a,2024-11-12T13:56:54.483000 CVE-2024-5106,0,0,0c609f41f655027086ae34a799c5dba7518161802bc29d490607b24bb6cca58b,2024-05-20T13:00:04.957000 CVE-2024-51060,0,0,402a659a58502cf6652d1569d08a8e1bb7141b9ef84b5e613167d10864e0cd4d,2024-11-01T17:35:08.443000 CVE-2024-51063,0,0,9e69a8a911d8071b54e4574d5d702b1952770d32179ac558a313a9f533d2704b,2024-11-01T17:35:09.657000 @@ -265058,27 +265092,27 @@ CVE-2024-5112,0,0,689c76c95598a2f86ee6cadbc1c25854cf35ada5e2d2725de4638c44d7f737 CVE-2024-51127,0,0,5cbf021500110127b38f6de54e9823061ea68366b333afb20ed57e2e95d1d646,2024-11-06T19:25:14.607000 CVE-2024-5113,0,0,d52da1935c57c4016d19b1f0658aa6603ac8563b2af10cf87d5ce42568a3ed96,2024-06-04T19:21:00.113000 CVE-2024-51132,0,0,741849111477a3dea70a3f4f159f318bcb11e986e2637afecf8a608cf70fdf87,2024-11-06T20:35:34.173000 -CVE-2024-51135,0,1,aebbe945d05ea335f860f10cf11e685c81af5045a7f037fa95d2a93ccbf5d4c7,2024-11-12T13:55:21.227000 +CVE-2024-51135,0,0,aebbe945d05ea335f860f10cf11e685c81af5045a7f037fa95d2a93ccbf5d4c7,2024-11-12T13:55:21.227000 CVE-2024-51136,0,0,b7028b746c76b0b8db7064a5c94d8b9b8b4865b267652b712081099f88f87998,2024-11-06T19:31:15.230000 CVE-2024-5114,0,0,51655375bf74d88d0b44bf3106775b49d83b04b179d3446b4a92ffe727b17b66,2024-06-04T19:21:00.217000 CVE-2024-5115,0,0,566281473e2daa2487dd251e202869dc3059aeec07f7c63daa38b65c3bae3de7,2024-06-04T19:21:00.323000 CVE-2024-51152,0,0,61a76bcbf6bd75d4afc028e09aa200a0b1945b75db18b8f83b3142e2484dc5e3,2024-11-08T19:01:03.880000 -CVE-2024-51157,0,1,15c268449f10cd3f5e2b0f898333f8df5f6a7a275257a0f4491ba5cb90f1b17e,2024-11-12T13:56:54.483000 +CVE-2024-51157,0,0,15c268449f10cd3f5e2b0f898333f8df5f6a7a275257a0f4491ba5cb90f1b17e,2024-11-12T13:56:54.483000 CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000 CVE-2024-5117,0,0,8f71e5dda3348556d6b06143dcd47b79229dad0468d30aa7c38f8c5c1ecb8524,2024-06-04T19:21:00.547000 CVE-2024-5118,0,0,ede24973ef1505b96fcd3c614d177bf90baaafde820cda4461fa6280b3c2b455,2024-05-20T13:00:04.957000 CVE-2024-51180,0,0,291417569b0494624857cced13999289421aea811a146f5e21654eb2df5dd0c1,2024-11-04T13:37:15.737000 CVE-2024-51181,0,0,113da0b9d3296c95d5bef97b0c59442bc79ba9bb3dbb2c1b2baabdd141b84fe6,2024-11-04T13:39:48.413000 -CVE-2024-51186,0,1,ecbd09b77ae77cdfbdab2ab6628b77e4371c5a546df67d7dbfc3646e5b2ec142,2024-11-12T13:55:21.227000 -CVE-2024-51187,0,1,985002ca904865da616607b236f148770176f709bfa535fdb33cee1be9676e5a,2024-11-12T13:55:21.227000 -CVE-2024-51188,0,1,13986d2935d4cbbb06b61af21788a3b856d3586938aa3348b0a9519fa9c62c69,2024-11-12T13:55:21.227000 -CVE-2024-51189,0,1,35e25bc3ffc29f26f90767c986f34840e3ceb43dde83583aa3e60434ef9d49e5,2024-11-12T13:55:21.227000 +CVE-2024-51186,0,0,ecbd09b77ae77cdfbdab2ab6628b77e4371c5a546df67d7dbfc3646e5b2ec142,2024-11-12T13:55:21.227000 +CVE-2024-51187,0,0,985002ca904865da616607b236f148770176f709bfa535fdb33cee1be9676e5a,2024-11-12T13:55:21.227000 +CVE-2024-51188,0,0,13986d2935d4cbbb06b61af21788a3b856d3586938aa3348b0a9519fa9c62c69,2024-11-12T13:55:21.227000 +CVE-2024-51189,0,0,35e25bc3ffc29f26f90767c986f34840e3ceb43dde83583aa3e60434ef9d49e5,2024-11-12T13:55:21.227000 CVE-2024-5119,0,0,6bb53ca9f8946448e1a7958af9df5b73fe1f36069f7b2aedbfc033eb827d83be,2024-06-04T19:21:00.657000 -CVE-2024-51190,0,1,02493ace343d801c2c96f83a09a920c8f88e12adfc58225d3b0b4f5c18c7e600,2024-11-12T13:55:21.227000 +CVE-2024-51190,0,0,02493ace343d801c2c96f83a09a920c8f88e12adfc58225d3b0b4f5c18c7e600,2024-11-12T13:55:21.227000 CVE-2024-5120,0,0,512e5b032e12a79292f06756f99bf223a47a4b934de5206e20b5529b01ef61b6,2024-06-04T19:21:00.760000 CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3bdb,2024-06-04T19:21:00.860000 -CVE-2024-51211,0,1,581556a1bd92632bbd04cf9aebe233d1f5e96f417c538ff40e3ed80078a79ca9,2024-11-12T13:56:54.483000 -CVE-2024-51213,0,1,e80d55ec078755f28e4f2823f010f3744ad69702e08407d1517faeef4f279468,2024-11-12T13:55:21.227000 +CVE-2024-51211,0,0,581556a1bd92632bbd04cf9aebe233d1f5e96f417c538ff40e3ed80078a79ca9,2024-11-12T13:56:54.483000 +CVE-2024-51213,0,0,e80d55ec078755f28e4f2823f010f3744ad69702e08407d1517faeef4f279468,2024-11-12T13:55:21.227000 CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b5e,2024-06-04T19:21:00.963000 CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000 CVE-2024-5124,0,0,ddf4d98394e08878019bd952c44f2cfd27f047274d82fb0e14f997780f16638c,2024-11-04T11:15:06.937000 @@ -265158,14 +265192,14 @@ CVE-2024-5148,0,0,bd5836562cd7c4456364427f29f33cc1c67447ccbfc1a9320a1023f854c7eb CVE-2024-51481,0,0,79865ece5695e59d21a71c5242cb6b84c6582b835d3ed06315b12ef5cbe5ff4e,2024-11-01T12:57:03.417000 CVE-2024-51482,0,0,bfd63cd113518065a1bebad51613f86054f6e228acaf54013add2bd0a434c523,2024-11-05T14:15:14.840000 CVE-2024-51483,0,0,f70c42f235544d305181618bf39f85a2958b60e254bcd1640771f1e1cba85c88,2024-11-01T20:24:53.730000 -CVE-2024-51484,0,1,702c9eef66989d49f443105697529c0366c78728d1841138606db38ce216d817,2024-11-12T13:55:21.227000 -CVE-2024-51485,0,1,31fff43947b857d031a4fdbb88a07c40af7e2b11b292e3abc7f2012e09de9d36,2024-11-12T13:55:21.227000 -CVE-2024-51486,0,1,cfb832dac4d0cbf401700dcb55c0c7132e9df371a60e5f7ffc5aa427e996f6c8,2024-11-12T13:55:21.227000 -CVE-2024-51487,0,1,9d095d095278ad4a0dff54fce8de4e672ea8d9b24e1c51cb430743545d0db5d0,2024-11-12T13:55:21.227000 -CVE-2024-51488,0,1,ddbc9992d74d320bfbf1c9bd238e20d40adcec2b3d076a6778151cca6b5c7323,2024-11-12T13:55:21.227000 -CVE-2024-51489,0,1,0cefbe4dbcaaa0866187eb099ea8321597437d0d4248404acf8187700f80279a,2024-11-12T13:55:21.227000 +CVE-2024-51484,0,0,702c9eef66989d49f443105697529c0366c78728d1841138606db38ce216d817,2024-11-12T13:55:21.227000 +CVE-2024-51485,0,0,31fff43947b857d031a4fdbb88a07c40af7e2b11b292e3abc7f2012e09de9d36,2024-11-12T13:55:21.227000 +CVE-2024-51486,0,0,cfb832dac4d0cbf401700dcb55c0c7132e9df371a60e5f7ffc5aa427e996f6c8,2024-11-12T13:55:21.227000 +CVE-2024-51487,0,0,9d095d095278ad4a0dff54fce8de4e672ea8d9b24e1c51cb430743545d0db5d0,2024-11-12T13:55:21.227000 +CVE-2024-51488,0,0,ddbc9992d74d320bfbf1c9bd238e20d40adcec2b3d076a6778151cca6b5c7323,2024-11-12T13:55:21.227000 +CVE-2024-51489,0,0,0cefbe4dbcaaa0866187eb099ea8321597437d0d4248404acf8187700f80279a,2024-11-12T13:55:21.227000 CVE-2024-5149,0,0,35aba13432990695b4ab26ada33d31578be519ff456b8edf807a15027d0b18f5,2024-06-06T14:15:01.960000 -CVE-2024-51490,0,1,e5bdf7d95e72c9b23f7eecc13cbbb80b5cece600f0fbe7e15102dd77e088e5e6,2024-11-12T13:55:21.227000 +CVE-2024-51490,0,0,e5bdf7d95e72c9b23f7eecc13cbbb80b5cece600f0fbe7e15102dd77e088e5e6,2024-11-12T13:55:21.227000 CVE-2024-51492,0,0,0a58c7013d2cd1abea36461b62b0843b3a8fe747b96ce2f6ac388e3c542b0b6c,2024-11-01T21:15:15.080000 CVE-2024-51493,0,0,905ca061a7e2249944cb0aec37c9054b75e237343bc05a733cf47492ea8f9f1d,2024-11-06T18:17:17.287000 CVE-2024-51498,0,0,a215c64a461c357224f24d4e16a3f3f3214ac081278e197bc9556945ad303f5e,2024-11-05T16:04:26.053000 @@ -265211,88 +265245,93 @@ CVE-2024-51559,0,0,b17587668bf1fcdf8614b57042a4b834f20517fc8070e196d9febcde44d49 CVE-2024-5156,0,0,15fe916f4b576f7b7dc0d841e2e4a8f8e08add666a82cde7e5fe7e09d48d907a,2024-06-20T16:07:50.417000 CVE-2024-51560,0,0,5b2c84d8610ec2edb11a42487f6e0689a8de9b9ddfab441dd6ac7032ac0dbce7,2024-11-08T15:18:23.127000 CVE-2024-51561,0,0,d71b2d828707663b98815777acaed98461639611e766153c60c99f137da7ec5c,2024-11-06T15:59:22.287000 +CVE-2024-51562,1,1,fe610cc013729c8af4c0b6006d6da24eec90314b1067757a197b5262800d653d,2024-11-12T15:48:59.103000 +CVE-2024-51563,1,1,2d347c28cbc78362947b188a3185f76348ad44842e23de59a47a9ceaf56f323d,2024-11-12T15:48:59.103000 +CVE-2024-51564,1,1,2a3fa0d7f95d894fddea7476f08ed8e1b4cc2dfdc93197749dce255ab65a5b03,2024-11-12T15:48:59.103000 +CVE-2024-51565,1,1,268c5fc5f5654cdf45c259e5efa246e803558982504eb6a99041ca05854b3559,2024-11-12T15:48:59.103000 +CVE-2024-51566,1,1,b55ef8d39b21e0a92f0e6043a59cae0857ec3e9029ad8197208495b77fb52192,2024-11-12T15:48:59.103000 CVE-2024-51567,0,0,9629c1871377d5b3a8fc7e24f37cf5fff8c7d9ecc5af9890fa03e865aa78aead,2024-11-08T21:14:28.807000 CVE-2024-51568,0,0,ef96c64ab696ce1dd0f4d9f421838b3895b55219506da5bc264e22e1b5e0e5b2,2024-11-01T12:57:03.417000 CVE-2024-5157,0,0,24d31b037c5fbef35f77d9be746cd537f78e6f1e98b9c21955d97a62fe59949f,2024-07-03T02:08:34.407000 -CVE-2024-51570,0,1,c32b58de950118e1e049594e92f53929812b854ff223f3930e4209ac944b600a,2024-11-12T13:56:24.513000 -CVE-2024-51571,0,1,3fd77a33a50e24f063546fc706f0cc6af0599e1b1745ad0ad52f8eaeb4035ce4,2024-11-12T13:55:21.227000 -CVE-2024-51572,0,1,e36a0d79fd5466e04d56f9d05b85ac8bdbef478a0fdb70e313323a42a460bbc9,2024-11-12T13:55:21.227000 -CVE-2024-51573,0,1,c432194fc3380fbd38edd3d2a88d8599c5647c8bdc05f1fc683b484e2b3b5f45,2024-11-12T13:55:21.227000 -CVE-2024-51574,0,1,9c654cc0482b25776b4f75ca34d186eb76f7e060745b35b5856806eeebb16d24,2024-11-12T13:55:21.227000 -CVE-2024-51575,0,1,254f25158e3aabddeb5476e398058610db2121dc5bcdddbb7824411226a2ee06,2024-11-12T13:55:21.227000 -CVE-2024-51576,0,1,49e1f9dd0373539f7b95614840fb33163156d2af984ac21162548fd9ce230f24,2024-11-12T13:55:21.227000 -CVE-2024-51577,0,1,27478846db3291cf5df4d743022cd029160e1c2262ce8972a66d697c0fc9efe6,2024-11-12T13:56:24.513000 -CVE-2024-51578,0,1,e4c0bd743bc0948822fb1c77e5f2361d4f6e3e814050867c1549548fe955e80f,2024-11-12T13:56:24.513000 -CVE-2024-51579,0,1,8ae8cfa212f9001fc90242d533effbb068d26cffd78a0f0bc338ea4caf58bc15,2024-11-12T13:56:24.513000 +CVE-2024-51570,0,0,c32b58de950118e1e049594e92f53929812b854ff223f3930e4209ac944b600a,2024-11-12T13:56:24.513000 +CVE-2024-51571,0,0,3fd77a33a50e24f063546fc706f0cc6af0599e1b1745ad0ad52f8eaeb4035ce4,2024-11-12T13:55:21.227000 +CVE-2024-51572,0,0,e36a0d79fd5466e04d56f9d05b85ac8bdbef478a0fdb70e313323a42a460bbc9,2024-11-12T13:55:21.227000 +CVE-2024-51573,0,0,c432194fc3380fbd38edd3d2a88d8599c5647c8bdc05f1fc683b484e2b3b5f45,2024-11-12T13:55:21.227000 +CVE-2024-51574,0,0,9c654cc0482b25776b4f75ca34d186eb76f7e060745b35b5856806eeebb16d24,2024-11-12T13:55:21.227000 +CVE-2024-51575,0,0,254f25158e3aabddeb5476e398058610db2121dc5bcdddbb7824411226a2ee06,2024-11-12T13:55:21.227000 +CVE-2024-51576,0,0,49e1f9dd0373539f7b95614840fb33163156d2af984ac21162548fd9ce230f24,2024-11-12T13:55:21.227000 +CVE-2024-51577,0,0,27478846db3291cf5df4d743022cd029160e1c2262ce8972a66d697c0fc9efe6,2024-11-12T13:56:24.513000 +CVE-2024-51578,0,0,e4c0bd743bc0948822fb1c77e5f2361d4f6e3e814050867c1549548fe955e80f,2024-11-12T13:56:24.513000 +CVE-2024-51579,0,0,8ae8cfa212f9001fc90242d533effbb068d26cffd78a0f0bc338ea4caf58bc15,2024-11-12T13:56:24.513000 CVE-2024-5158,0,0,b58e7eaee1d1dd9c5e85390b8596c36aa736d240ceb0715ad1a8e256309daea1,2024-09-15T19:35:04.757000 -CVE-2024-51580,0,1,e2a32c41257caec3031326bafdc3550ec3e06f2bb007bc587302a53944b829ec,2024-11-12T13:56:24.513000 -CVE-2024-51581,0,1,a5e4593a055514b3e859c7a86f50e9a2ed71a180696f8050c3810f639f2ebcbb,2024-11-12T13:56:24.513000 +CVE-2024-51580,0,0,e2a32c41257caec3031326bafdc3550ec3e06f2bb007bc587302a53944b829ec,2024-11-12T13:56:24.513000 +CVE-2024-51581,0,0,a5e4593a055514b3e859c7a86f50e9a2ed71a180696f8050c3810f639f2ebcbb,2024-11-12T13:56:24.513000 CVE-2024-51582,0,0,9c6a2abc6ff39ea954384c7b38779cdbe6d44511f3a75194c8ab9223c55c709b,2024-11-06T15:47:13.077000 -CVE-2024-51583,0,1,c77d595da3f05eb3dcd27ab59c74c06830416a1e11cfedf13223d1c1e952987e,2024-11-12T13:56:24.513000 -CVE-2024-51584,0,1,298ca816ee40f0cddf11db4cd81fe9334a204f71585feb600bab8dc026120fa9,2024-11-12T13:56:24.513000 -CVE-2024-51585,0,1,f8f0159c16016c8277cf65597d8f99b43d67be3e4576e769b2c2d94060d5ff5c,2024-11-12T13:56:24.513000 -CVE-2024-51586,0,1,a8972424c5984945ec92c9d745b8e4e19d8648e53cf9bf4412423a5729e18a26,2024-11-12T13:56:24.513000 -CVE-2024-51587,0,1,e9f51090d9fa9675336bc7bbe1c57c65ee721fe84e77e75530bdeca2bbd3390e,2024-11-12T13:56:24.513000 -CVE-2024-51588,0,1,86887bb25af63d8afae760e3bff597b6e65d20856876b111e550c616afd70db1,2024-11-12T13:56:24.513000 -CVE-2024-51589,0,1,4352c7b10d513c73c468cf162405842f1aca94517899c3343788aa1230c49906,2024-11-12T13:56:24.513000 +CVE-2024-51583,0,0,c77d595da3f05eb3dcd27ab59c74c06830416a1e11cfedf13223d1c1e952987e,2024-11-12T13:56:24.513000 +CVE-2024-51584,0,0,298ca816ee40f0cddf11db4cd81fe9334a204f71585feb600bab8dc026120fa9,2024-11-12T13:56:24.513000 +CVE-2024-51585,0,0,f8f0159c16016c8277cf65597d8f99b43d67be3e4576e769b2c2d94060d5ff5c,2024-11-12T13:56:24.513000 +CVE-2024-51586,0,0,a8972424c5984945ec92c9d745b8e4e19d8648e53cf9bf4412423a5729e18a26,2024-11-12T13:56:24.513000 +CVE-2024-51587,0,0,e9f51090d9fa9675336bc7bbe1c57c65ee721fe84e77e75530bdeca2bbd3390e,2024-11-12T13:56:24.513000 +CVE-2024-51588,0,0,86887bb25af63d8afae760e3bff597b6e65d20856876b111e550c616afd70db1,2024-11-12T13:56:24.513000 +CVE-2024-51589,0,0,4352c7b10d513c73c468cf162405842f1aca94517899c3343788aa1230c49906,2024-11-12T13:56:24.513000 CVE-2024-5159,0,0,6487690749e64572084b0b1ffb84b7950e8b682c3129ca3d21d0dbc204e9ec91,2024-10-25T19:35:15.010000 -CVE-2024-51590,0,1,2b2dd3629e58a1a0a584c789ff16e47b54d755aa79cd57fc09a49fbe103244b5,2024-11-12T13:56:24.513000 -CVE-2024-51591,0,1,6d2975a097891da87bbd5c82248101e38c5dac59ad3f3a768163709cd8b12c7d,2024-11-12T13:56:24.513000 -CVE-2024-51592,0,1,d7967d1b981bf412d08b0a25269c7d321b022b9cea0f3a4b67df42b6afa94a25,2024-11-12T13:56:24.513000 -CVE-2024-51593,0,1,0b8922825fb0b901603d2f67d3b43c5b8e0349818c9523e9ebd1542dcf2e04bf,2024-11-12T13:56:24.513000 -CVE-2024-51594,0,1,6349168b6c38502c80c5202765ac4a54912ffa4126b37a3166a4be8b98199c58,2024-11-12T13:56:24.513000 -CVE-2024-51595,0,1,86c632a830d98810cba6685fef0932835324b783d480bd1e19dc70d238e88d12,2024-11-12T13:56:24.513000 -CVE-2024-51596,0,1,68d56f326e86c174368dc8e5c4f277c0b65894f0149206735201856a3bb51840,2024-11-12T13:56:24.513000 -CVE-2024-51597,0,1,506ea8c3ccd37fd10cf92a9da4f6b30af469b7e869d78e2a86278b8ad4eb302c,2024-11-12T13:56:24.513000 -CVE-2024-51598,0,1,ab45aa537bf288c8af2bb6366c2e9a74b71582c9d0d27efbfe545b94537181da,2024-11-12T13:56:24.513000 -CVE-2024-51599,0,1,5cd988e2787a53cdc2d1a464fab74b9367513165a89a10c905f4537cb27134dd,2024-11-12T13:56:24.513000 +CVE-2024-51590,0,0,2b2dd3629e58a1a0a584c789ff16e47b54d755aa79cd57fc09a49fbe103244b5,2024-11-12T13:56:24.513000 +CVE-2024-51591,0,0,6d2975a097891da87bbd5c82248101e38c5dac59ad3f3a768163709cd8b12c7d,2024-11-12T13:56:24.513000 +CVE-2024-51592,0,0,d7967d1b981bf412d08b0a25269c7d321b022b9cea0f3a4b67df42b6afa94a25,2024-11-12T13:56:24.513000 +CVE-2024-51593,0,0,0b8922825fb0b901603d2f67d3b43c5b8e0349818c9523e9ebd1542dcf2e04bf,2024-11-12T13:56:24.513000 +CVE-2024-51594,0,0,6349168b6c38502c80c5202765ac4a54912ffa4126b37a3166a4be8b98199c58,2024-11-12T13:56:24.513000 +CVE-2024-51595,0,0,86c632a830d98810cba6685fef0932835324b783d480bd1e19dc70d238e88d12,2024-11-12T13:56:24.513000 +CVE-2024-51596,0,0,68d56f326e86c174368dc8e5c4f277c0b65894f0149206735201856a3bb51840,2024-11-12T13:56:24.513000 +CVE-2024-51597,0,0,506ea8c3ccd37fd10cf92a9da4f6b30af469b7e869d78e2a86278b8ad4eb302c,2024-11-12T13:56:24.513000 +CVE-2024-51598,0,0,ab45aa537bf288c8af2bb6366c2e9a74b71582c9d0d27efbfe545b94537181da,2024-11-12T13:56:24.513000 +CVE-2024-51599,0,0,5cd988e2787a53cdc2d1a464fab74b9367513165a89a10c905f4537cb27134dd,2024-11-12T13:56:24.513000 CVE-2024-5160,0,0,761bdadb9ac3f89d156978519ca326c5704c62592c7f03e703ecc7e802a865d7,2024-07-03T02:08:36.807000 -CVE-2024-51601,0,1,1c0dbdb8639065f7f5ea5f6062d0125a4c4ce4b0c601912e96fe5db543ebfd2a,2024-11-12T13:56:24.513000 -CVE-2024-51602,0,1,822f9c86566535e8535c86995cf3af8d3cfe52baf5520ff85e767e1c3e7259ea,2024-11-12T13:56:24.513000 -CVE-2024-51603,0,1,8b39030ffd0cb3459341d14dd644b429e38d44c25946f2093686635047f23972,2024-11-12T13:56:24.513000 -CVE-2024-51604,0,1,d6aae3a059c834fc01b3c5ecd18a671e61f67a1403ae9009e32e762b5707c5b2,2024-11-12T13:56:24.513000 -CVE-2024-51605,0,1,3181370e86e19cb15e2ba0b512a12ea9b3036b112f432239f6f810bbb742dc02,2024-11-12T13:56:24.513000 -CVE-2024-51606,0,1,61d903570c41f8ecc789fdc77801e89c3d78ab8cca550fba71efce5b622081e6,2024-11-12T13:56:24.513000 -CVE-2024-51607,0,1,6430a32ad0ccdbe2b5e85b260802defe649419f41be04507feb4e50aaec51a17,2024-11-12T13:56:24.513000 -CVE-2024-51608,0,1,46c5636e6f48f84a8b05b616194b0dcea297c89a55c4ba43c6768a441aed0281,2024-11-12T13:56:24.513000 -CVE-2024-51609,0,1,bdacddd36d4478311d0e370dd66653041590222d52917f624a76f218c050dde8,2024-11-12T13:56:24.513000 +CVE-2024-51601,0,0,1c0dbdb8639065f7f5ea5f6062d0125a4c4ce4b0c601912e96fe5db543ebfd2a,2024-11-12T13:56:24.513000 +CVE-2024-51602,0,0,822f9c86566535e8535c86995cf3af8d3cfe52baf5520ff85e767e1c3e7259ea,2024-11-12T13:56:24.513000 +CVE-2024-51603,0,0,8b39030ffd0cb3459341d14dd644b429e38d44c25946f2093686635047f23972,2024-11-12T13:56:24.513000 +CVE-2024-51604,0,0,d6aae3a059c834fc01b3c5ecd18a671e61f67a1403ae9009e32e762b5707c5b2,2024-11-12T13:56:24.513000 +CVE-2024-51605,0,0,3181370e86e19cb15e2ba0b512a12ea9b3036b112f432239f6f810bbb742dc02,2024-11-12T13:56:24.513000 +CVE-2024-51606,0,0,61d903570c41f8ecc789fdc77801e89c3d78ab8cca550fba71efce5b622081e6,2024-11-12T13:56:24.513000 +CVE-2024-51607,0,0,6430a32ad0ccdbe2b5e85b260802defe649419f41be04507feb4e50aaec51a17,2024-11-12T13:56:24.513000 +CVE-2024-51608,0,0,46c5636e6f48f84a8b05b616194b0dcea297c89a55c4ba43c6768a441aed0281,2024-11-12T13:56:24.513000 +CVE-2024-51609,0,0,bdacddd36d4478311d0e370dd66653041590222d52917f624a76f218c050dde8,2024-11-12T13:56:24.513000 CVE-2024-5161,0,0,f120c7db938e25c7983d6c400da502880d5ffbc93ab4e5e05351c3fca8fbd038,2024-07-24T17:54:42.387000 -CVE-2024-51610,0,1,0c5999073d5ab9119b43a93ca30f63ab8745f39e68c0616117ee986d0b9671e4,2024-11-12T13:56:24.513000 -CVE-2024-51611,0,1,df71ebdad6b83784c059a213dbfeff0cd4ad4cfa07621a54c78ae28de90b182c,2024-11-12T13:56:24.513000 -CVE-2024-51612,0,1,68d292e6c4edc9ad2cb6a4f4df85c4beb58f5e75eb303880d4a399c88b63d1b7,2024-11-12T13:56:24.513000 -CVE-2024-51613,0,1,e5e09d28c859e2362905d8484d126a9fa39bc52028d1cd16464bb2210975b217,2024-11-12T13:56:24.513000 -CVE-2024-51614,0,1,63cdeacb54d19dcfb54e02c8657a90ad9ae3a114b299bd21c1e05a1c274f1760,2024-11-12T13:56:24.513000 -CVE-2024-51616,0,1,cf636cc1f193b36cff5e148daead26866a401c0d74193e3062126d3d950e7af4,2024-11-12T13:56:24.513000 -CVE-2024-51618,0,1,a14f9a40a8de2c9a06120521248f457bd75487776ac5e30c5360bbecd2f15681,2024-11-12T13:56:24.513000 -CVE-2024-51619,0,1,9daf6f1e73b14b529f51029c6377343fdb7ce142e1c16778232f8faed4174718,2024-11-12T13:56:24.513000 +CVE-2024-51610,0,0,0c5999073d5ab9119b43a93ca30f63ab8745f39e68c0616117ee986d0b9671e4,2024-11-12T13:56:24.513000 +CVE-2024-51611,0,0,df71ebdad6b83784c059a213dbfeff0cd4ad4cfa07621a54c78ae28de90b182c,2024-11-12T13:56:24.513000 +CVE-2024-51612,0,0,68d292e6c4edc9ad2cb6a4f4df85c4beb58f5e75eb303880d4a399c88b63d1b7,2024-11-12T13:56:24.513000 +CVE-2024-51613,0,0,e5e09d28c859e2362905d8484d126a9fa39bc52028d1cd16464bb2210975b217,2024-11-12T13:56:24.513000 +CVE-2024-51614,0,0,63cdeacb54d19dcfb54e02c8657a90ad9ae3a114b299bd21c1e05a1c274f1760,2024-11-12T13:56:24.513000 +CVE-2024-51616,0,0,cf636cc1f193b36cff5e148daead26866a401c0d74193e3062126d3d950e7af4,2024-11-12T13:56:24.513000 +CVE-2024-51618,0,0,a14f9a40a8de2c9a06120521248f457bd75487776ac5e30c5360bbecd2f15681,2024-11-12T13:56:24.513000 +CVE-2024-51619,0,0,9daf6f1e73b14b529f51029c6377343fdb7ce142e1c16778232f8faed4174718,2024-11-12T13:56:24.513000 CVE-2024-5162,0,0,b916c521cfe3c1fb21956086b784f2a8541eeb514496e084206ecc726f921efe,2024-07-24T17:53:33.277000 -CVE-2024-51620,0,1,bfd69e25a9e77ddd401d4a1b1999124e3c4c84f4fd212f13fc0e2b6020e1b0ad,2024-11-12T13:56:24.513000 -CVE-2024-51621,0,1,f77cd707e2f21edd13b25bcd0677bd3dea84c4a5f32044d4dfa4bf07c1f93080,2024-11-12T13:56:24.513000 -CVE-2024-51622,0,1,abf9f576a9e2a4294b85ddeadc483f9df973b3acddb40c468c9e56963ee28c20,2024-11-12T13:56:24.513000 -CVE-2024-51623,0,1,85c4aacf63ef4d6d28ee705d04a090e0eb59b6ed29fc0cb08726ddfd4f1c426e,2024-11-12T13:56:24.513000 -CVE-2024-51625,0,1,f4e7f4c713858eefce7560adcb091ba71e60e879c554602c7bb2e06ba68798b1,2024-11-12T13:56:24.513000 +CVE-2024-51620,0,0,bfd69e25a9e77ddd401d4a1b1999124e3c4c84f4fd212f13fc0e2b6020e1b0ad,2024-11-12T13:56:24.513000 +CVE-2024-51621,0,0,f77cd707e2f21edd13b25bcd0677bd3dea84c4a5f32044d4dfa4bf07c1f93080,2024-11-12T13:56:24.513000 +CVE-2024-51622,0,0,abf9f576a9e2a4294b85ddeadc483f9df973b3acddb40c468c9e56963ee28c20,2024-11-12T13:56:24.513000 +CVE-2024-51623,0,0,85c4aacf63ef4d6d28ee705d04a090e0eb59b6ed29fc0cb08726ddfd4f1c426e,2024-11-12T13:56:24.513000 +CVE-2024-51625,0,0,f4e7f4c713858eefce7560adcb091ba71e60e879c554602c7bb2e06ba68798b1,2024-11-12T13:56:24.513000 CVE-2024-51626,0,0,1464c1c98efb870dcd3b5a35eb6a7feff3782c73b32d47b788148d4cc3703554,2024-11-06T22:10:20.517000 -CVE-2024-51627,0,1,21942255847ede6f299a58d60b0cc92425258e5aa2e2eef1513644a14c810aa1,2024-11-12T13:56:24.513000 -CVE-2024-51628,0,1,0416d155e9e763312d6db76fc9fc0ccb947d4e7a8811fb80b47bd412ba9c26dd,2024-11-12T13:56:24.513000 -CVE-2024-51629,0,1,8fd6cffa4a071b783d75e372e4377b945ace761a35b1aa56e5b22b5ec2829df1,2024-11-12T13:56:24.513000 +CVE-2024-51627,0,0,21942255847ede6f299a58d60b0cc92425258e5aa2e2eef1513644a14c810aa1,2024-11-12T13:56:24.513000 +CVE-2024-51628,0,0,0416d155e9e763312d6db76fc9fc0ccb947d4e7a8811fb80b47bd412ba9c26dd,2024-11-12T13:56:24.513000 +CVE-2024-51629,0,0,8fd6cffa4a071b783d75e372e4377b945ace761a35b1aa56e5b22b5ec2829df1,2024-11-12T13:56:24.513000 CVE-2024-5163,0,0,1f45f157a740def8c3f1c2e097025198bc2166983108f63600058e7c57408d30,2024-08-21T06:15:07.277000 -CVE-2024-51630,0,1,22adffaa9039d1fe9e03a4e48d178f89d1bd36af85559e36a535a227a69b456d,2024-11-12T13:56:24.513000 -CVE-2024-51647,0,1,0c6d8f9a804912e43c7869d3b717f4cbcd6166cf1be9c7b6f9ef329e8fce46cc,2024-11-12T13:56:24.513000 +CVE-2024-51630,0,0,22adffaa9039d1fe9e03a4e48d178f89d1bd36af85559e36a535a227a69b456d,2024-11-12T13:56:24.513000 +CVE-2024-51647,0,0,0c6d8f9a804912e43c7869d3b717f4cbcd6166cf1be9c7b6f9ef329e8fce46cc,2024-11-12T13:56:24.513000 CVE-2024-5165,0,0,2b7469c3d25cc1e03e7fcca1607bc78daf489d82c018a0fbc4f3b815c328cf85,2024-05-24T01:15:30.977000 CVE-2024-5166,0,0,5c544eab21844e01fabd3874ed7776a55145987bd3a510311ad16f12f33bd2bc,2024-05-22T18:59:20.240000 CVE-2024-51661,0,0,7f81708d1fd43600536029afc897b01b4855aee3d2fe39c5692b8132139274de,2024-11-08T15:02:08.660000 -CVE-2024-51662,0,1,f5359332d7a9d4e37aab99663d0e73af1a60912d65021c3415523622490d6f78,2024-11-12T13:56:24.513000 -CVE-2024-51663,0,1,ddfbfefbc7a60682ba4fd5adc3f91d6c6ef86922dae3505b62e59555b1a68629,2024-11-12T13:56:24.513000 -CVE-2024-51664,0,1,f57811c0abc589cff3297f759189abd0529924ea2c107b407c1d4b0c093360b5,2024-11-12T13:56:24.513000 +CVE-2024-51662,0,0,f5359332d7a9d4e37aab99663d0e73af1a60912d65021c3415523622490d6f78,2024-11-12T13:56:24.513000 +CVE-2024-51663,0,0,ddfbfefbc7a60682ba4fd5adc3f91d6c6ef86922dae3505b62e59555b1a68629,2024-11-12T13:56:24.513000 +CVE-2024-51664,0,0,f57811c0abc589cff3297f759189abd0529924ea2c107b407c1d4b0c093360b5,2024-11-12T13:56:24.513000 CVE-2024-51665,0,0,836ecda2a38ee75dca042d09339ec8247ed79262a6a8d01bd25035a2e84a5ce0,2024-11-06T22:07:10.707000 -CVE-2024-51668,0,1,48200efc7fac31c23a0a8e5fafa9bdb1f1a59950a3bf4f32ad9a9c87a472f1b5,2024-11-12T13:56:24.513000 +CVE-2024-51668,0,0,48200efc7fac31c23a0a8e5fafa9bdb1f1a59950a3bf4f32ad9a9c87a472f1b5,2024-11-12T13:56:24.513000 CVE-2024-5167,0,0,a26d674346a63d8730649864e3fcc22e33fb8b5877ed990bcd49874aef8d8c48,2024-08-01T13:59:41.660000 -CVE-2024-51670,0,1,6b1c3ded81e899ea83f78c72687b003b0add9ee5b9d5d075c91040d8d36272c7,2024-11-12T13:56:24.513000 +CVE-2024-51670,0,0,6b1c3ded81e899ea83f78c72687b003b0add9ee5b9d5d075c91040d8d36272c7,2024-11-12T13:56:24.513000 CVE-2024-51672,0,0,14a5ef0a87d874231b0f786642aa34aa9f0064d5c86f2b9992f4fe90d62559ab,2024-11-06T22:08:22.747000 -CVE-2024-51673,0,1,d34bce6a7d43c01ace9bdee2ccc10759fe0c1d8a6fc2a33e6ae5bd38a291ee03,2024-11-12T13:56:24.513000 -CVE-2024-51674,0,1,82fa9eccb17564915494c98b05516dacc01351f00ed5d96df7b44f2aa0556e72,2024-11-12T13:56:24.513000 -CVE-2024-51675,0,1,8a4bacc24cff024145f3f2bcaf3202f909b690eb8b24ec3863ccfd5d108562ed,2024-11-12T13:56:24.513000 -CVE-2024-51676,0,1,ece0a16779fe3a19431027941663a0cdb1298b76465f9e748c1eef77d20b83f9,2024-11-12T13:56:24.513000 +CVE-2024-51673,0,0,d34bce6a7d43c01ace9bdee2ccc10759fe0c1d8a6fc2a33e6ae5bd38a291ee03,2024-11-12T13:56:24.513000 +CVE-2024-51674,0,0,82fa9eccb17564915494c98b05516dacc01351f00ed5d96df7b44f2aa0556e72,2024-11-12T13:56:24.513000 +CVE-2024-51675,0,0,8a4bacc24cff024145f3f2bcaf3202f909b690eb8b24ec3863ccfd5d108562ed,2024-11-12T13:56:24.513000 +CVE-2024-51676,0,0,ece0a16779fe3a19431027941663a0cdb1298b76465f9e748c1eef77d20b83f9,2024-11-12T13:56:24.513000 CVE-2024-51677,0,0,8b0f7a3853108bd14021b832cd2914a4bbd49dc774029c03bf84670c6d192320,2024-11-06T22:10:31.677000 CVE-2024-51678,0,0,ce4086679232add4ebc40be30bdc12f20f02b66e38c181d2556e9473603941fd,2024-11-06T22:10:45.103000 CVE-2024-5168,0,0,cbe1b6c96aef7b506dd526cf00951c936dfc5233fd9563b4af0bf7fdab7a5899,2024-05-24T01:15:30.977000 @@ -265301,38 +265340,38 @@ CVE-2024-51681,0,0,6987ab81beb2df0eaa9da220f2d791ed5d8df3f0e18bd37d9a9b390a4eaf5 CVE-2024-51682,0,0,aaba0581a3d811571ae104155388a45dd47ae531ed284c6ab0022efdb152fbe5,2024-11-06T22:12:02.353000 CVE-2024-51683,0,0,f59d50717ee7305489d521abf4c5c1ef491e4436568b0e3c6dd145e0ad77427b,2024-11-06T22:12:19.803000 CVE-2024-51685,0,0,3ec6f589ce8427b20bd90f3e3168669c47fda17fa0f474f038e9a6e94e0e60b9,2024-11-06T19:34:31.590000 -CVE-2024-51689,0,1,ab2f405c7815c7db8e61d12d5b0c31d4e0752b7068e1e475bf3338853f840d9d,2024-11-12T13:56:24.513000 +CVE-2024-51689,0,0,ab2f405c7815c7db8e61d12d5b0c31d4e0752b7068e1e475bf3338853f840d9d,2024-11-12T13:56:24.513000 CVE-2024-5169,0,0,882a6aa1fee4c71f4df51ce353ec6b27431ae776e2b2b23b3c5ba8c59ca21797,2024-08-02T15:00:10.200000 -CVE-2024-51690,0,1,7e5eae0ff5cca9f377bf464de65b2d968392e357bd55f7a073753a3ee3d229f4,2024-11-12T13:56:24.513000 -CVE-2024-51691,0,1,73e6d824a16ca2782aa18803ed40c7a2a2ad8c22f8cfd7d2ae458a7c863acfc0,2024-11-12T13:56:24.513000 -CVE-2024-51692,0,1,47142521750fc5f4c80a2ebac833b7c85cd8456885e91d2e5bacd3c692628f26,2024-11-12T13:56:24.513000 -CVE-2024-51693,0,1,c07fcc774ae6d0e57484ab2e3681c3f6c40033af3041dc057a94b27a5e935d75,2024-11-12T13:56:24.513000 -CVE-2024-51694,0,1,405ba0cb4039940fba3e9cc7dbe1f19206ec5a92959ada9868178d7ee01c2666,2024-11-12T13:56:24.513000 -CVE-2024-51695,0,1,03c9f54b09d56f452f87f9074532b6db757e822db9f539fcd37d6cb3d848c51e,2024-11-12T13:56:24.513000 -CVE-2024-51696,0,1,99feb95f48ce54a04d7be9d4647c1c6609e4f842e1c0408a55ed0fd453c83350,2024-11-12T13:56:24.513000 -CVE-2024-51697,0,1,3523ef8d826117bd1ef77395e3670abefcbeee0e3d278458ef60961056f152e4,2024-11-12T13:56:24.513000 -CVE-2024-51698,0,1,eea11ed9477fdd5218efa57f0ad2bd0031aa264b1925f49532450e5f091a4ca2,2024-11-12T13:56:24.513000 -CVE-2024-51699,0,1,2d2d226f52ac90c3fa30972780fa9b96b80b51538ca9b15d46e74b821c52288d,2024-11-12T13:56:24.513000 +CVE-2024-51690,0,0,7e5eae0ff5cca9f377bf464de65b2d968392e357bd55f7a073753a3ee3d229f4,2024-11-12T13:56:24.513000 +CVE-2024-51691,0,0,73e6d824a16ca2782aa18803ed40c7a2a2ad8c22f8cfd7d2ae458a7c863acfc0,2024-11-12T13:56:24.513000 +CVE-2024-51692,0,0,47142521750fc5f4c80a2ebac833b7c85cd8456885e91d2e5bacd3c692628f26,2024-11-12T13:56:24.513000 +CVE-2024-51693,0,0,c07fcc774ae6d0e57484ab2e3681c3f6c40033af3041dc057a94b27a5e935d75,2024-11-12T13:56:24.513000 +CVE-2024-51694,0,0,405ba0cb4039940fba3e9cc7dbe1f19206ec5a92959ada9868178d7ee01c2666,2024-11-12T13:56:24.513000 +CVE-2024-51695,0,0,03c9f54b09d56f452f87f9074532b6db757e822db9f539fcd37d6cb3d848c51e,2024-11-12T13:56:24.513000 +CVE-2024-51696,0,0,99feb95f48ce54a04d7be9d4647c1c6609e4f842e1c0408a55ed0fd453c83350,2024-11-12T13:56:24.513000 +CVE-2024-51697,0,0,3523ef8d826117bd1ef77395e3670abefcbeee0e3d278458ef60961056f152e4,2024-11-12T13:56:24.513000 +CVE-2024-51698,0,0,eea11ed9477fdd5218efa57f0ad2bd0031aa264b1925f49532450e5f091a4ca2,2024-11-12T13:56:24.513000 +CVE-2024-51699,0,0,2d2d226f52ac90c3fa30972780fa9b96b80b51538ca9b15d46e74b821c52288d,2024-11-12T13:56:24.513000 CVE-2024-5170,0,0,0357b8fbab1b76f01ca0dd625bf87ec8b80f7fd2d35927c69b68200ba07a11a4,2024-09-27T18:23:43.833000 -CVE-2024-51701,0,1,a586c11793c47bd17e207fab7c67c7f2260940d62d944e91b4e9e097d808ea7e,2024-11-12T13:56:24.513000 -CVE-2024-51702,0,1,82ae209d2756295e5bea67525c41b31407d6ceae0da0dddafd38107d0139f983,2024-11-12T13:56:24.513000 -CVE-2024-51703,0,1,c6b1145b54c4e92b7f05c62235c5c4aa72981840a664d70b0257efb79547d791,2024-11-12T13:56:24.513000 -CVE-2024-51704,0,1,01648d5556ecfa261367de2758d23be56c91dc29712af306d43da9b9153a9c7d,2024-11-12T13:56:24.513000 -CVE-2024-51705,0,1,29543c44afbfcf598a216d62a52f59ad9e5b0df556463bcdeb894c3b0ddd4581,2024-11-12T13:56:24.513000 -CVE-2024-51706,0,1,cea585faa0d53f3f169c3047aa9884215b01c5b80225d91a2aa02d33fda0f501,2024-11-12T13:56:24.513000 -CVE-2024-51707,0,1,9fb9157ee7d77ab97c05b3130fec7d80b6875bc3a58fe9db0212bfb5caa23339,2024-11-12T13:56:24.513000 -CVE-2024-51708,0,1,49696148fbe3773822145a4775c82910ee1f300f0b84f471768a3d8b9394d448,2024-11-12T13:56:24.513000 -CVE-2024-51709,0,1,ec790ee466bdc716f10d562f0e219bddd7045fea97307ba233e05a4d07d1444f,2024-11-12T13:56:24.513000 +CVE-2024-51701,0,0,a586c11793c47bd17e207fab7c67c7f2260940d62d944e91b4e9e097d808ea7e,2024-11-12T13:56:24.513000 +CVE-2024-51702,0,0,82ae209d2756295e5bea67525c41b31407d6ceae0da0dddafd38107d0139f983,2024-11-12T13:56:24.513000 +CVE-2024-51703,0,0,c6b1145b54c4e92b7f05c62235c5c4aa72981840a664d70b0257efb79547d791,2024-11-12T13:56:24.513000 +CVE-2024-51704,0,0,01648d5556ecfa261367de2758d23be56c91dc29712af306d43da9b9153a9c7d,2024-11-12T13:56:24.513000 +CVE-2024-51705,0,0,29543c44afbfcf598a216d62a52f59ad9e5b0df556463bcdeb894c3b0ddd4581,2024-11-12T13:56:24.513000 +CVE-2024-51706,0,0,cea585faa0d53f3f169c3047aa9884215b01c5b80225d91a2aa02d33fda0f501,2024-11-12T13:56:24.513000 +CVE-2024-51707,0,0,9fb9157ee7d77ab97c05b3130fec7d80b6875bc3a58fe9db0212bfb5caa23339,2024-11-12T13:56:24.513000 +CVE-2024-51708,0,0,49696148fbe3773822145a4775c82910ee1f300f0b84f471768a3d8b9394d448,2024-11-12T13:56:24.513000 +CVE-2024-51709,0,0,ec790ee466bdc716f10d562f0e219bddd7045fea97307ba233e05a4d07d1444f,2024-11-12T13:56:24.513000 CVE-2024-5171,0,0,dd574bf92e93c62d270c5e3b0cb384556e01dba1d43a5b9db2a02845fa564cb4,2024-07-23T18:09:56.753000 -CVE-2024-51710,0,1,70931eab0d5b7a21719ff2b6d555599d0ce4726240f4e7296e212acd929260fe,2024-11-12T13:56:24.513000 -CVE-2024-51711,0,1,01f590c4e397c81c30d97e92bcdaef91a5682a52934e80ef247786a90f50633a,2024-11-12T13:56:24.513000 -CVE-2024-51712,0,1,e558b7c3b31e3fcad2ab19cc90b9a732f09ecdc9f9078218a00b275c5807cb52,2024-11-12T13:56:24.513000 -CVE-2024-51713,0,1,624c6a153892492e7eed7078062f5868671ea49bdb1ed6937bb39ab3f7a4e6e3,2024-11-12T13:56:24.513000 -CVE-2024-51714,0,1,660617ab66d52c525eec86941dd5e09f48bb227807f79886233efd581781f3e9,2024-11-12T13:56:24.513000 -CVE-2024-51716,0,1,54f23a045bbb3ca5c6a112d92fdf88e12f5dac28e05af31c540ec5f29b0c9e82,2024-11-12T13:56:24.513000 -CVE-2024-51717,0,1,0528e0c7d07059ca5fe41ea6d661ea92cc786d699804e48039ef2d1479e3a43a,2024-11-12T13:56:24.513000 -CVE-2024-51718,0,1,9aa3261b8e536504ad8ba3c429c49299ec7c49e625e7595a30d4e4107362d460,2024-11-12T13:56:24.513000 -CVE-2024-51719,0,1,7154cc207b4cfbe8cd3be353a6dbfab77953efea32b8e79fce767fd25daf7885,2024-11-12T13:56:24.513000 +CVE-2024-51710,0,0,70931eab0d5b7a21719ff2b6d555599d0ce4726240f4e7296e212acd929260fe,2024-11-12T13:56:24.513000 +CVE-2024-51711,0,0,01f590c4e397c81c30d97e92bcdaef91a5682a52934e80ef247786a90f50633a,2024-11-12T13:56:24.513000 +CVE-2024-51712,0,0,e558b7c3b31e3fcad2ab19cc90b9a732f09ecdc9f9078218a00b275c5807cb52,2024-11-12T13:56:24.513000 +CVE-2024-51713,0,0,624c6a153892492e7eed7078062f5868671ea49bdb1ed6937bb39ab3f7a4e6e3,2024-11-12T13:56:24.513000 +CVE-2024-51714,0,0,660617ab66d52c525eec86941dd5e09f48bb227807f79886233efd581781f3e9,2024-11-12T13:56:24.513000 +CVE-2024-51716,0,0,54f23a045bbb3ca5c6a112d92fdf88e12f5dac28e05af31c540ec5f29b0c9e82,2024-11-12T13:56:24.513000 +CVE-2024-51717,0,0,0528e0c7d07059ca5fe41ea6d661ea92cc786d699804e48039ef2d1479e3a43a,2024-11-12T13:56:24.513000 +CVE-2024-51718,0,0,9aa3261b8e536504ad8ba3c429c49299ec7c49e625e7595a30d4e4107362d460,2024-11-12T13:56:24.513000 +CVE-2024-51719,0,0,7154cc207b4cfbe8cd3be353a6dbfab77953efea32b8e79fce767fd25daf7885,2024-11-12T13:56:24.513000 CVE-2024-5172,0,0,b469524ff2309ced9aec08b056578c23e8b8b5248adb8fcea2b38cb214c81275,2024-07-05T14:05:48.213000 CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da6464,2024-06-26T12:44:29.693000 CVE-2024-51734,0,0,1cd13d8635d39c437cbb33b350735ec8f4fced2309825670ef2275f584df030b,2024-11-05T20:35:26.167000 @@ -265343,8 +265382,8 @@ CVE-2024-51740,0,0,74dcd62c794431349724c21a2a10e6fc9dfce3314bc46b9aad9df5d89f4c0 CVE-2024-51744,0,0,df641a1b86566e97bb7074f2d337c50f51346569211bd554409b057e4c4da639,2024-11-05T16:04:26.053000 CVE-2024-51745,0,0,37db28606ad10f651e6f62f94e51def5fb50b1cfae8314bc96328b8b65ad324b,2024-11-06T18:17:17.287000 CVE-2024-51746,0,0,3cd98a267aedbbeeb4ad193a68e5bacd0a1a46a62f6ccca5880e9520a47fbe14,2024-11-06T18:17:17.287000 -CVE-2024-51747,0,1,25d6bd0ff3f85d39d80ee11112a05e1ad8216b6c2fd2794d35d1e9542fc2ceb9,2024-11-12T13:55:21.227000 -CVE-2024-51748,0,1,9b7477705169f4bb30c6616f4b3aeff3f2e76cd4ce9e40c06c7b918e82c19551,2024-11-12T13:55:21.227000 +CVE-2024-51747,0,0,25d6bd0ff3f85d39d80ee11112a05e1ad8216b6c2fd2794d35d1e9542fc2ceb9,2024-11-12T13:55:21.227000 +CVE-2024-51748,0,0,9b7477705169f4bb30c6616f4b3aeff3f2e76cd4ce9e40c06c7b918e82c19551,2024-11-12T13:55:21.227000 CVE-2024-51751,0,0,5e82f37cf3dfc23b4c489447a3752cbf986237e64e94f63b0a07a70b000b7b12,2024-11-08T19:01:25.633000 CVE-2024-51752,0,0,e4bd7dfff09e294fe713d9b76aba7fd50689256bee0d75d076093e0fe4805888,2024-11-06T18:17:17.287000 CVE-2024-51753,0,0,bf33e866ff4adcdc8169c4272817d8f4f57258218421ea7cafddbf38a1c6e30a,2024-11-06T18:17:17.287000 @@ -265353,45 +265392,45 @@ CVE-2024-51755,0,0,8da46be2050120e871a46966a709a4a6c341c8b76decbe7d2852b8155e882 CVE-2024-51756,0,0,7e7db3439c4e45c36bf53dc70dbe779b982ce3f3056b8757e470dab737dd37ba,2024-11-06T18:17:17.287000 CVE-2024-51757,0,0,4a6a6f5d284f7e398e40f49b0f871e08dca74b70a20c565e444a807f2ff3adcf,2024-11-08T19:01:25.633000 CVE-2024-51758,0,0,f380eb8d34567367d647061664429271d9307b0015af8f1ccfbeb527fa9b8011,2024-11-08T19:01:03.880000 -CVE-2024-51759,0,1,d7e3fffb9bbe00d7828c69c49042db425ba3a8f69d85eea947e9f519295183f0,2024-11-12T13:56:24.513000 +CVE-2024-51759,0,0,d7e3fffb9bbe00d7828c69c49042db425ba3a8f69d85eea947e9f519295183f0,2024-11-12T13:56:24.513000 CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000 -CVE-2024-51760,0,1,ed9651aa9154a248687433de274acd9501a7b311268ff1812cf9f76a64d59a2e,2024-11-12T13:56:24.513000 -CVE-2024-51761,0,1,7fba3491ed17cbb0fcacf7e06dec1801a39b2cbb0c39394d461b327fba0f0b35,2024-11-12T13:56:24.513000 -CVE-2024-51762,0,1,d2974582ab4193d4fadecd27c7279e3cb5c2f47e26174ca4e5af6a95c50b9465,2024-11-12T13:56:24.513000 -CVE-2024-51763,0,1,1ab0b26c017f9714f7e7328b764552b7d7949949df835662c6f45441aac0b931,2024-11-12T13:56:24.513000 +CVE-2024-51760,0,0,ed9651aa9154a248687433de274acd9501a7b311268ff1812cf9f76a64d59a2e,2024-11-12T13:56:24.513000 +CVE-2024-51761,0,0,7fba3491ed17cbb0fcacf7e06dec1801a39b2cbb0c39394d461b327fba0f0b35,2024-11-12T13:56:24.513000 +CVE-2024-51762,0,0,d2974582ab4193d4fadecd27c7279e3cb5c2f47e26174ca4e5af6a95c50b9465,2024-11-12T13:56:24.513000 +CVE-2024-51763,0,0,1ab0b26c017f9714f7e7328b764552b7d7949949df835662c6f45441aac0b931,2024-11-12T13:56:24.513000 CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000 CVE-2024-51774,0,0,669a599ada079f107ff827e67143f083d374e9861d23daa36ef167763e62d529,2024-11-06T17:35:41.767000 -CVE-2024-51776,0,1,5ca2c4eb522419754c0be1183c799032dcc5ffdbcb2b4aea116b020281ac6eec,2024-11-12T13:56:24.513000 -CVE-2024-51778,0,1,cc75b3182d817e23b6259e8bea41efa67ff795e094696a3ef400f4547e1ce14a,2024-11-12T13:56:24.513000 -CVE-2024-51779,0,1,e37c2de45258d18f70482a094dc803ef3315d01cda8dc84fd6b14bd193ca1f62,2024-11-12T13:56:24.513000 +CVE-2024-51776,0,0,5ca2c4eb522419754c0be1183c799032dcc5ffdbcb2b4aea116b020281ac6eec,2024-11-12T13:56:24.513000 +CVE-2024-51778,0,0,cc75b3182d817e23b6259e8bea41efa67ff795e094696a3ef400f4547e1ce14a,2024-11-12T13:56:24.513000 +CVE-2024-51779,0,0,e37c2de45258d18f70482a094dc803ef3315d01cda8dc84fd6b14bd193ca1f62,2024-11-12T13:56:24.513000 CVE-2024-5178,0,0,bd0c2f144426314e1167d96790d03a45b87cc8b4eeec82d66437d8c03cef924c,2024-07-11T22:15:02.467000 -CVE-2024-51780,0,1,c74a716a41bced56420da16021b14b767618b61de3bb5add3ad89e68171d5ed1,2024-11-12T13:56:24.513000 -CVE-2024-51781,0,1,15a1dae332b2d9e6fb6efa144f29af1d39ceee1bb9fc6523cb643c18ee04a7cf,2024-11-12T13:56:24.513000 -CVE-2024-51782,0,1,aa47abb5fa077405fdecd59e0bf50925aad220bba7367c18c4e0d1d437b2a38f,2024-11-12T13:56:24.513000 -CVE-2024-51783,0,1,e6ae16a07bc3904392bdb24e4cb940377f5c77deaa7d94a979e9e4ec14684259,2024-11-12T13:56:24.513000 -CVE-2024-51784,0,1,2839f6cf77d7f4194a95013323464592ccc20ae56b85b0e04eb5db0ed931d2bb,2024-11-12T13:56:24.513000 -CVE-2024-51785,0,1,08c453c29ca3f09875619fcc196f639eebabf1bcf0974a0511b8032551bf546f,2024-11-12T13:56:24.513000 -CVE-2024-51786,0,1,520a9d7594878cbc5ce52cafc3fcae8311ccf6122d4864b67519a763396d822b,2024-11-12T13:56:24.513000 -CVE-2024-51787,0,1,bab9e4a4fad0f916c45e1911f8476389f1bc62ec3dd9b0ab15962d91798a7078,2024-11-12T13:56:24.513000 -CVE-2024-51788,0,1,01e43f568e06d8e14e8e43f4ad2d756451c1e53633b73ee4e69d2382cb7397fb,2024-11-12T13:55:21.227000 -CVE-2024-51789,0,1,6f331079d91f672217ecc5c30a59ef2bb68a30e28acb36a8078b21af37775d04,2024-11-12T13:55:21.227000 +CVE-2024-51780,0,0,c74a716a41bced56420da16021b14b767618b61de3bb5add3ad89e68171d5ed1,2024-11-12T13:56:24.513000 +CVE-2024-51781,0,0,15a1dae332b2d9e6fb6efa144f29af1d39ceee1bb9fc6523cb643c18ee04a7cf,2024-11-12T13:56:24.513000 +CVE-2024-51782,0,0,aa47abb5fa077405fdecd59e0bf50925aad220bba7367c18c4e0d1d437b2a38f,2024-11-12T13:56:24.513000 +CVE-2024-51783,0,0,e6ae16a07bc3904392bdb24e4cb940377f5c77deaa7d94a979e9e4ec14684259,2024-11-12T13:56:24.513000 +CVE-2024-51784,0,0,2839f6cf77d7f4194a95013323464592ccc20ae56b85b0e04eb5db0ed931d2bb,2024-11-12T13:56:24.513000 +CVE-2024-51785,0,0,08c453c29ca3f09875619fcc196f639eebabf1bcf0974a0511b8032551bf546f,2024-11-12T13:56:24.513000 +CVE-2024-51786,0,0,520a9d7594878cbc5ce52cafc3fcae8311ccf6122d4864b67519a763396d822b,2024-11-12T13:56:24.513000 +CVE-2024-51787,0,0,bab9e4a4fad0f916c45e1911f8476389f1bc62ec3dd9b0ab15962d91798a7078,2024-11-12T13:56:24.513000 +CVE-2024-51788,0,0,01e43f568e06d8e14e8e43f4ad2d756451c1e53633b73ee4e69d2382cb7397fb,2024-11-12T13:55:21.227000 +CVE-2024-51789,0,0,6f331079d91f672217ecc5c30a59ef2bb68a30e28acb36a8078b21af37775d04,2024-11-12T13:55:21.227000 CVE-2024-5179,0,0,ea665152b8c9953ad6e84eb904f7eac78af7e075a45f2a4da51451b13f6b9cb3,2024-10-09T16:57:08.317000 -CVE-2024-51790,0,1,fba98a5a0db28c31280349a90cdb7b7024352d9f0714027ac377d0f6cd5519cc,2024-11-12T13:55:21.227000 -CVE-2024-51791,0,1,23e57cba494263540d9476be8dbc91c39074a345469e3f762d8046c45490e08d,2024-11-12T13:55:21.227000 -CVE-2024-51792,0,1,fc1eeb5584728befc235c6239684e31ab35d3a01996711d288287f5d00f4e79e,2024-11-12T13:55:21.227000 -CVE-2024-51793,0,1,a33e947eee1155b56fcce35072f8ba98ed10ed03d59e2ba4375497d315b7d991,2024-11-12T13:55:21.227000 +CVE-2024-51790,0,0,fba98a5a0db28c31280349a90cdb7b7024352d9f0714027ac377d0f6cd5519cc,2024-11-12T13:55:21.227000 +CVE-2024-51791,0,0,23e57cba494263540d9476be8dbc91c39074a345469e3f762d8046c45490e08d,2024-11-12T13:55:21.227000 +CVE-2024-51792,0,0,fc1eeb5584728befc235c6239684e31ab35d3a01996711d288287f5d00f4e79e,2024-11-12T13:55:21.227000 +CVE-2024-51793,0,0,a33e947eee1155b56fcce35072f8ba98ed10ed03d59e2ba4375497d315b7d991,2024-11-12T13:55:21.227000 CVE-2024-5181,0,0,bbf6825e1d5f360a1a58b67dff2bf4d85afbf0a93fef4d4bb8dfd7975bcf0e60,2024-06-26T12:44:29.693000 CVE-2024-5182,0,0,58b8232fd0b5e70f15eeeb5297ff44723ef92c555fd120d8b123a01ca786d63b,2024-08-27T17:30:21.127000 -CVE-2024-51820,0,1,e0565ea45509b179cbbf7d8bc10d86ac29b20a5974ea39e22274cbbf6efe2431,2024-11-12T13:55:21.227000 -CVE-2024-51837,0,1,d1d1427b6d691dbc75b94eb25f7fc05dd2fd50de2a89774dcf097252dcddb3e1,2024-11-12T13:55:21.227000 +CVE-2024-51820,0,0,e0565ea45509b179cbbf7d8bc10d86ac29b20a5974ea39e22274cbbf6efe2431,2024-11-12T13:55:21.227000 +CVE-2024-51837,0,0,d1d1427b6d691dbc75b94eb25f7fc05dd2fd50de2a89774dcf097252dcddb3e1,2024-11-12T13:55:21.227000 CVE-2024-5184,0,0,913e376e9213bf80a4ef6a0008bd230beba5d0e3fbd42416956e3dc16ba16e7b,2024-06-18T17:06:20.257000 -CVE-2024-51843,0,1,6f4210db4ae69f330684f6bf1d87e6d390e139b21fb3bff0e6c4ca708b800b7b,2024-11-12T13:55:21.227000 -CVE-2024-51845,0,1,dbd1c3b4a35b8f99deb6b733f1f6a0d823e2de27d76d535b93cb645196883f7d,2024-11-12T13:55:21.227000 +CVE-2024-51843,0,0,6f4210db4ae69f330684f6bf1d87e6d390e139b21fb3bff0e6c4ca708b800b7b,2024-11-12T13:55:21.227000 +CVE-2024-51845,0,0,dbd1c3b4a35b8f99deb6b733f1f6a0d823e2de27d76d535b93cb645196883f7d,2024-11-12T13:55:21.227000 CVE-2024-5185,0,0,0c09010aee9423412314c9f1cbba57fc2fd9ee19c760646e6502f5738cacb7fd,2024-08-30T19:15:16.340000 CVE-2024-5186,0,0,7baed0c201f742c44896dec767d6237c8df7ae961ab3d7ec09eb8b65736716f7,2024-09-24T14:04:47.170000 CVE-2024-5187,0,0,88fb29ce759c452b913d57a873a63220e31c82d475ca2c84fa3b804bf9736023,2024-10-23T13:36:11.643000 CVE-2024-5188,0,0,b2a939863f7779e6dba1e0e2aecd4047c60710495b7cac734003aec732566505,2024-06-11T17:41:17.087000 -CVE-2024-51882,0,1,e290c05368a0bd7b18c7c49e7b6a5a874f7303a05115f4a00bb15e20d5a6314a,2024-11-12T13:55:21.227000 +CVE-2024-51882,0,0,e290c05368a0bd7b18c7c49e7b6a5a874f7303a05115f4a00bb15e20d5a6314a,2024-11-12T13:55:21.227000 CVE-2024-5189,0,0,87ea6bb70c0f4e8e0e95d6725175819a83c6ff33cc484fc5f525db9ad5e385e9,2024-06-13T18:36:45.417000 CVE-2024-5190,0,0,d58b9fdaecdb1abec20ccf7764e52a460a4959870ee8917a6c4a9f4c686657e6,2024-05-22T03:15:08.273000 CVE-2024-5191,0,0,855a566258b8b88a588ebc49e507f9db3fa3e450b83819e0fe6599e7fdad210b,2024-06-24T19:25:23.943000 @@ -265406,18 +265445,18 @@ CVE-2024-51988,0,0,9398d8a80c5a41180002e2b13788d4e0785beca5d303a4ad1646b56530ae4 CVE-2024-51989,0,0,a66d3df688b16ca6972a5503652a5945de21b13a7ef47f9e2408cd742c91aa40,2024-11-08T19:01:03.880000 CVE-2024-5199,0,0,8fdec235790e80ab25bf344b6e4e20c94c0a12c0bede9440d8c94965619f66eb,2024-10-28T21:35:23.237000 CVE-2024-51990,0,0,5a0b7a0ddc0e56bea6e775544df250647bd9e6d489e037eeef6da34742509908,2024-11-08T19:01:25.633000 -CVE-2024-51992,0,1,6af48747827be50f1e3a16e8e861da6495a81992702d7833ebe1335a57ab1cfc,2024-11-12T13:55:21.227000 +CVE-2024-51992,0,0,6af48747827be50f1e3a16e8e861da6495a81992702d7833ebe1335a57ab1cfc,2024-11-12T13:55:21.227000 CVE-2024-51993,0,0,0b180a03099571fff8a13158fe72d7871f053352d43d872590f8f53c841ecca8,2024-11-08T19:01:03.880000 CVE-2024-51994,0,0,9ecdd0862ec4cb4e8cbc599710fe336df5bb3c681162050e709512d4ec211c97,2024-11-08T19:01:03.880000 CVE-2024-51995,0,0,7484e6b15af945f697a88a8c3b9d2c315fe6e0004cde6e533470a014d3f9ae3d,2024-11-08T19:01:03.880000 -CVE-2024-51997,0,1,ab86aff6fa43516eaff213e4584d906496b3f2e2f19bf6f0c2c9236a622fbe69,2024-11-12T13:56:54.483000 +CVE-2024-51997,0,0,ab86aff6fa43516eaff213e4584d906496b3f2e2f19bf6f0c2c9236a622fbe69,2024-11-12T13:56:54.483000 CVE-2024-51998,0,0,19a2e1052c10533bdc1ed034b91b5ec816f585536da2e947441dab97cd0af7ac,2024-11-08T19:01:03.880000 -CVE-2024-52000,0,1,53607fd920c5e6c0c523f59cb394de5d5c634c469499e12c0f4cb198af2d27c3,2024-11-12T13:56:54.483000 -CVE-2024-52001,0,1,ee27726a1c73b7b7f6e5760fe3ce79bb84c8b16431699361ef4c426b16c2de6e,2024-11-12T13:56:54.483000 -CVE-2024-52002,0,1,c00913d7259c42a7cc8354350f7a82513ce9d83d7bd5962c00b4cf14c2a1047a,2024-11-12T13:56:54.483000 -CVE-2024-52004,0,1,5fa07d0a35480bd23f86ea684f2a0f66c5e4b9b2bf1fbc1961b6e8f9dcc625fa,2024-11-12T13:56:54.483000 -CVE-2024-52007,0,1,9b9844f37c4a4c3cef932fa358d8594e2305c52695217b7622048372b9ab612f,2024-11-12T13:56:54.483000 -CVE-2024-52009,0,1,8bbf25e6f645e131b823aafb60173e6af960fce613c6d8dadc55e928f3ee2540,2024-11-12T13:56:54.483000 +CVE-2024-52000,0,0,53607fd920c5e6c0c523f59cb394de5d5c634c469499e12c0f4cb198af2d27c3,2024-11-12T13:56:54.483000 +CVE-2024-52001,0,0,ee27726a1c73b7b7f6e5760fe3ce79bb84c8b16431699361ef4c426b16c2de6e,2024-11-12T13:56:54.483000 +CVE-2024-52002,0,0,c00913d7259c42a7cc8354350f7a82513ce9d83d7bd5962c00b4cf14c2a1047a,2024-11-12T13:56:54.483000 +CVE-2024-52004,0,0,5fa07d0a35480bd23f86ea684f2a0f66c5e4b9b2bf1fbc1961b6e8f9dcc625fa,2024-11-12T13:56:54.483000 +CVE-2024-52007,0,0,9b9844f37c4a4c3cef932fa358d8594e2305c52695217b7622048372b9ab612f,2024-11-12T13:56:54.483000 +CVE-2024-52009,0,0,8bbf25e6f645e131b823aafb60173e6af960fce613c6d8dadc55e928f3ee2540,2024-11-12T13:56:54.483000 CVE-2024-5201,0,0,64f0da97aed099b7390504c61b2a584cf361827a66e92ad103d8b3995d82fd05,2024-05-24T01:15:30.977000 CVE-2024-52013,0,0,dc6fa1208648c6e0d094b332c10d38b0f7c8c8c6d93ae518d64f679a86a6ec4c,2024-11-05T16:35:36.337000 CVE-2024-52014,0,0,545c92489d8cb508f0bdcb65d9f6b19ac8bf6a61dd5add79060ed642cb14b442,2024-11-05T16:35:37.113000 @@ -265438,7 +265477,7 @@ CVE-2024-52028,0,0,4d053166f6459b35dbc5abb28e4fc3b18b596ce5d1996232d90ecaad96322 CVE-2024-52029,0,0,45a0bf857ef5def84cf99a7ced23782d689f019eff53b1ace413b47c193dc284,2024-11-05T16:35:57.397000 CVE-2024-5203,0,0,e867d44b31fa735ecaef1844aba382841138e742c9b7e957e6089969316cab00,2024-09-13T11:15:10.197000 CVE-2024-52030,0,0,dbd783f66b9834ef61aedd9eab2874c798fdd9f590b76fb0f940976162a98a15,2024-11-05T16:35:58.320000 -CVE-2024-52032,0,1,6b65d090166c2e680411be7c97febaa4916648a3bf79bfc6a7587651c62b78e2,2024-11-12T13:56:24.513000 +CVE-2024-52032,0,0,6b65d090166c2e680411be7c97febaa4916648a3bf79bfc6a7587651c62b78e2,2024-11-12T13:56:24.513000 CVE-2024-5204,0,0,87eb5b753d379a1bd1ef79b260f2b73c84b7ff9a4b79082cf351323e04c98a6d,2024-05-29T13:02:09.280000 CVE-2024-52043,0,0,f628a95ee6f27b518880b39a2d7b1dea019d91185e307729da648217b18fdef9,2024-11-08T20:39:36.233000 CVE-2024-5205,0,0,4921ed356d4f56252ffbf3c608cb3301846a77ee8cc9c08ec7f0a543467e385d,2024-05-24T13:03:11.993000 @@ -265465,28 +265504,30 @@ CVE-2024-5225,0,0,908db7200208aad82f301f521b9dc90a90551560079e967278f95345fdc583 CVE-2024-5226,0,0,343bea1ef6104d1a60d532c3087e707033a7d2cea2eb006f3e8cf7d609df1199,2024-08-08T13:04:18.753000 CVE-2024-5227,0,0,782d407fd59442ae1cd49577c63d7b8236dddc237a48b5fa6a3df2e3ceec540d,2024-05-24T01:15:30.977000 CVE-2024-5228,0,0,d7fb18ef663e7fbb963ee04e575f2bc258b900955c0912600676521519fad837,2024-05-24T01:15:30.977000 -CVE-2024-52286,0,1,a006a0be971b0e96964504e5809b0d7c6410ed1592b8c4976d82ae2953104dc3,2024-11-12T13:55:21.227000 -CVE-2024-52288,0,1,8f949332b60260488906ff1b8c70f9a1209d9b10278c3c334faa6ae7259272ba,2024-11-12T13:55:21.227000 +CVE-2024-52286,0,0,a006a0be971b0e96964504e5809b0d7c6410ed1592b8c4976d82ae2953104dc3,2024-11-12T13:55:21.227000 +CVE-2024-52288,0,0,8f949332b60260488906ff1b8c70f9a1209d9b10278c3c334faa6ae7259272ba,2024-11-12T13:55:21.227000 CVE-2024-5229,0,0,787c92e076dbd9dca682f832ee22f0e31b439c91ed2d6b58a8c544f86d4189c3,2024-07-03T02:08:42.827000 +CVE-2024-52296,1,1,e1d3676ac45354462ec68621ba5d0e3065cda95d7796d7a3da6af17f09b9d248,2024-11-12T16:15:26.030000 +CVE-2024-52297,1,1,476242ed3a5f6d85484bec0586307ad55a8c506bda5fa6246f3822c9b0f980d0,2024-11-12T16:15:26.230000 CVE-2024-5230,0,0,f45c8274ba28e0dc58bed98870ed092580a9c18662584e7c3debbd7f7cd359f4,2024-06-04T19:21:02.540000 CVE-2024-5231,0,0,255bed42ab2a064a39e6f8c88880296d2f7a7d154f3db6dc7f4df2fa244d299f,2024-06-04T19:21:02.640000 -CVE-2024-52311,0,1,440cc6f6193f2a4b57d7c7c4a4f4b3f01242ca6df6bc89770050e09d3b499acf,2024-11-12T13:56:54.483000 -CVE-2024-52312,0,1,e095caa38b1d55aa1661d9e6b591e2f5164609c3e5c2884b5f60aa22d851bdcc,2024-11-12T13:56:54.483000 -CVE-2024-52313,0,1,d6c72d2fda8c652aceb546ca4dc43f0485da383ec6c61ed73ed8a61cc3116669,2024-11-12T13:56:54.483000 -CVE-2024-52314,0,1,1573621277321f9a5e33b224990557625938794cd01d39551dd04996aff05f9d,2024-11-12T13:56:54.483000 +CVE-2024-52311,0,0,440cc6f6193f2a4b57d7c7c4a4f4b3f01242ca6df6bc89770050e09d3b499acf,2024-11-12T13:56:54.483000 +CVE-2024-52312,0,0,e095caa38b1d55aa1661d9e6b591e2f5164609c3e5c2884b5f60aa22d851bdcc,2024-11-12T13:56:54.483000 +CVE-2024-52313,0,0,d6c72d2fda8c652aceb546ca4dc43f0485da383ec6c61ed73ed8a61cc3116669,2024-11-12T13:56:54.483000 +CVE-2024-52314,0,0,1573621277321f9a5e33b224990557625938794cd01d39551dd04996aff05f9d,2024-11-12T13:56:54.483000 CVE-2024-5232,0,0,8d68905f3b69b3dadb32694d2c73f30dc32ad3c794d56bacf5b1c8bfed3d3bb6,2024-06-04T19:21:02.890000 CVE-2024-5233,0,0,d230ff373762a089849cb791769c151d4d1eb1a364270894bffa0dbac945e679,2024-06-04T19:21:02.993000 CVE-2024-5234,0,0,14a09ab7485c5dff6a0e2d37ff7f584b26da4a8cf075e00d5ab541632ac32bbb,2024-06-04T19:21:03.100000 CVE-2024-5235,0,0,98bbbe6acfd408ea35eab71055bef5859edfdf3c3c90f82fa44b5b2f0c597f28,2024-06-04T19:21:03.207000 -CVE-2024-52350,0,1,692358ac026b1dcbfe6e09ab2593ec3b4f32e9a916cf64b8732ac22b9832c48f,2024-11-12T13:55:21.227000 -CVE-2024-52351,0,1,a3e325cd315c5fea0f5f837fd6ee002cc35206ad757df5ede60f907fde9affb3,2024-11-12T13:55:21.227000 -CVE-2024-52352,0,1,d000632140f71e44e942a3dbc2ddd9260fa470cb96bef8ac5f8ba3eea1f0382e,2024-11-12T13:55:21.227000 -CVE-2024-52353,0,1,8f6fdbf8162ece41a08a7cc2a2dc9e5249ac6195297b0e830ced0d3f4bc5c84a,2024-11-12T13:55:21.227000 -CVE-2024-52354,0,1,bd5ed3d68271f155fc3112a493679226950394a406d6f8e4021a12bfa7a3c4fe,2024-11-12T13:55:21.227000 -CVE-2024-52355,0,1,ab138c81f8a6c2d78d8bf3737e35a8422aee1976da0dc3f8a86c63b65d3787dd,2024-11-12T13:55:21.227000 -CVE-2024-52356,0,1,6f52c6a317f3e6d9b4fea003476d72ca3813f755516b2759515eed910b7d7fc2,2024-11-12T13:55:21.227000 -CVE-2024-52357,0,1,0b87f00ebcffd7ab9b093f3ccd343158c40fba6d8989757f4c8a16b72f945025,2024-11-12T13:55:21.227000 -CVE-2024-52358,0,1,98865d3b54e5cf46f7348181649ffde2326b16ddca1830d7a36a631093f0fb1c,2024-11-12T13:55:21.227000 +CVE-2024-52350,0,0,692358ac026b1dcbfe6e09ab2593ec3b4f32e9a916cf64b8732ac22b9832c48f,2024-11-12T13:55:21.227000 +CVE-2024-52351,0,0,a3e325cd315c5fea0f5f837fd6ee002cc35206ad757df5ede60f907fde9affb3,2024-11-12T13:55:21.227000 +CVE-2024-52352,0,0,d000632140f71e44e942a3dbc2ddd9260fa470cb96bef8ac5f8ba3eea1f0382e,2024-11-12T13:55:21.227000 +CVE-2024-52353,0,0,8f6fdbf8162ece41a08a7cc2a2dc9e5249ac6195297b0e830ced0d3f4bc5c84a,2024-11-12T13:55:21.227000 +CVE-2024-52354,0,0,bd5ed3d68271f155fc3112a493679226950394a406d6f8e4021a12bfa7a3c4fe,2024-11-12T13:55:21.227000 +CVE-2024-52355,0,0,ab138c81f8a6c2d78d8bf3737e35a8422aee1976da0dc3f8a86c63b65d3787dd,2024-11-12T13:55:21.227000 +CVE-2024-52356,0,0,6f52c6a317f3e6d9b4fea003476d72ca3813f755516b2759515eed910b7d7fc2,2024-11-12T13:55:21.227000 +CVE-2024-52357,0,0,0b87f00ebcffd7ab9b093f3ccd343158c40fba6d8989757f4c8a16b72f945025,2024-11-12T13:55:21.227000 +CVE-2024-52358,0,0,98865d3b54e5cf46f7348181649ffde2326b16ddca1830d7a36a631093f0fb1c,2024-11-12T13:55:21.227000 CVE-2024-5236,0,0,3a876190aab882c0110e09fef49a5c72516897cda47bddba2de12251cfa9a5e8,2024-05-24T01:15:30.977000 CVE-2024-5237,0,0,8803efe45da93d97b55082adbd1bb29281c1282514c20ec3608a648081cd56be,2024-06-04T19:21:03.317000 CVE-2024-5238,0,0,a03a95be1868c6bee6318b11858946fc155e156e4fa75ea27b59162de04fd53f,2024-06-04T19:21:03.413000 @@ -265505,10 +265546,10 @@ CVE-2024-5250,0,0,b4b370273f1fe30d94b715ad219dda570a7dcb84192abd50c3cb746299bdbb CVE-2024-5251,0,0,7d84d2df7bf6674f7d634954defb2f38b0363c19ae19f78012df0aa633abf27a,2024-07-19T15:25:30.980000 CVE-2024-5252,0,0,1b28d536afc88eae5088fe06ff49428bbad5ffcb2aa7139fe40c4c06d2601422,2024-07-19T15:29:35.447000 CVE-2024-5253,0,0,73f9562f224a9a11b8b8279a7bf00d920003fa046cb7c88a3a55caf281adabe4,2024-07-19T15:30:34.717000 -CVE-2024-52530,0,1,33b7429eb7eb3be95001923a1f89646e5a1cfe585e3ad31147ffb8fafc52d42f,2024-11-12T13:55:21.227000 -CVE-2024-52531,0,1,8cb0e01e69eb879d3a531e10dfc8fc193c666536142557a776eb4bc19dd211cb,2024-11-12T13:55:21.227000 -CVE-2024-52532,0,1,ceac3c72c1c60bdab26132bf0ee3396fe51ade03b31a6af19ddc21f1a4f3dd27,2024-11-12T13:55:21.227000 -CVE-2024-52533,0,1,ac3444958d7fbb391e5c3db526759af5d841fda8bb8dfd9399d7e6fb36c7138c,2024-11-12T13:55:21.227000 +CVE-2024-52530,0,0,33b7429eb7eb3be95001923a1f89646e5a1cfe585e3ad31147ffb8fafc52d42f,2024-11-12T13:55:21.227000 +CVE-2024-52531,0,0,8cb0e01e69eb879d3a531e10dfc8fc193c666536142557a776eb4bc19dd211cb,2024-11-12T13:55:21.227000 +CVE-2024-52532,0,0,ceac3c72c1c60bdab26132bf0ee3396fe51ade03b31a6af19ddc21f1a4f3dd27,2024-11-12T13:55:21.227000 +CVE-2024-52533,0,1,81d75647e8fcacbe880bcd9f7eaf399938e1df4314078c30bc37f40639859c7b,2024-11-12T16:35:24.297000 CVE-2024-5254,0,0,78882d871be0a19bc95888168cf12372f503de77ac359f287536c8f062c38532,2024-07-19T15:32:05.560000 CVE-2024-5255,0,0,a9d47c22e8985fc8d8b40f4bef3272595484bdbc8485e44830cb58ee997ab90f,2024-07-19T15:32:18.850000 CVE-2024-5256,0,0,c0c79be075ef53b66bd4c726b840e366d70c6f0c56013178c0440e2e2bf91c1e,2024-09-24T18:41:40.007000 @@ -266277,7 +266318,7 @@ CVE-2024-6122,0,0,06803cba232580597a75bb268bd4b066a1cc7965fffda32fa54d013022be6b CVE-2024-6123,0,0,e5cb7862ae434be3489ddc1babc06be5b6b7d8b0ae968d68e19b0440d485ee4a,2024-08-14T14:15:27.870000 CVE-2024-6124,0,0,dbae4ba6931a49b60006ec1ed4b58995a60c43677eb3c396860d17e670311bc6,2024-08-27T11:15:04.617000 CVE-2024-6125,0,0,dcd2ab56787ddae0f7c175c392cba81a8765f3e4738004aeecc40e1ed002ca73,2024-06-20T12:44:01.637000 -CVE-2024-6126,0,0,fe32d1d72ee98dda5ecd99b3a7a2dd6c7f2499fcdf431273ff58d6a25ff8ecce,2024-07-05T12:55:51.367000 +CVE-2024-6126,0,1,2cc8b72789e1a4853a8a3c067f455bf8c94af855bdaad1798c163c58dbfe69c4,2024-11-12T15:15:11.403000 CVE-2024-6127,0,0,78b2d5dd67e9c05b32bbe278fa7cdf65d5c6c9d848f18552ef9889ec17d13cda,2024-06-28T10:27:00.920000 CVE-2024-6128,0,0,752c35ccc9ca0893ce78cfd348cd97a47a4c4389e751d1fa12a176ad61b65ba8,2024-09-20T23:21:47.123000 CVE-2024-6129,0,0,2ff762b7cd1a3a05b9f7a7bf543ed96dfafb16d6f8890a34166ecd6ab87a1ddd,2024-09-20T19:21:03.763000 @@ -266607,7 +266648,7 @@ CVE-2024-6497,0,0,b980a8afca3367d307f1b8ae084c1de1478e48fcb0a6d42a16be67c3823c34 CVE-2024-6498,0,0,1ed281221bc697855933115a42dfe940bdc52a0072d0e3695abed7f798c88ab5,2024-09-06T17:35:19.293000 CVE-2024-6499,0,0,5aefcf3098945d08365a478f93189a0b1b6a19cac1228ed97908dfeeb06cd006,2024-09-26T22:07:50.040000 CVE-2024-6500,0,0,d6e17cf29259cccc059c07e88e123ff08e9fd8308cfe5e11844bc5a9a1491c18,2024-08-19T13:00:23.117000 -CVE-2024-6501,0,0,45d58d6fcd90c3b83531e796541078a549af17f7a81eb1fbfe7d6944aa2bc8ac,2024-07-11T13:06:13.187000 +CVE-2024-6501,0,1,308ca90e0c6a5a78d481d91b2651b0fc358fbf8323e207c9fcfc8e1195173709,2024-11-12T15:15:11.530000 CVE-2024-6502,0,0,7304740865a2d9646b306af4eab2981d10cf59323822892a921ddddc4962ea79,2024-09-11T16:49:28.650000 CVE-2024-6504,0,0,6666bb3ba2314d1147da34b1413146555668de024ce515e1e34c91b1fe32472b,2024-09-10T13:53:28.387000 CVE-2024-6505,0,0,2472b280b959c45a84076dc8298b1f0ea15132bfdd2f045bf3ab100aab446db1,2024-09-19T06:15:03.463000 @@ -266697,7 +266738,7 @@ CVE-2024-6600,0,0,d38b8e15b440ec379e5d4dcf9d0495a2b72fd02b3eb8c13111cb9109e14989 CVE-2024-6601,0,0,1b3b880d323fbc5730a980592d9133d50798789725a5a19bb934e3d6e9a6650b,2024-10-30T20:35:39.587000 CVE-2024-6602,0,0,f6a87652a2fe583b38a38e64b24a5e6d6d6790eb720538440a254ce49a22d782,2024-07-16T18:15:08.900000 CVE-2024-6603,0,0,69cec991ec6c96faca0e6549878f06a74d4f5b721edfdd20399a8cd286528c4f,2024-07-16T18:15:08.990000 -CVE-2024-6604,0,0,f73fc100d1a2db4c08570352811399bc301810a24809aae8f14734fee2b9bcd0,2024-07-16T18:15:09.077000 +CVE-2024-6604,0,1,9069e1e4303827c6bac2a3f980520353e2df4612754e7a70e6afd1b8541d78f4,2024-11-12T16:35:25.143000 CVE-2024-6605,0,0,c63bd0135437fcc4d79120f4a6d6fc9c887b669225a222a69b4002ddda65549b,2024-08-01T14:00:29.013000 CVE-2024-6606,0,0,1a43f6b156f00ca0284491ac0129496772fc5a0993a21ff17fb319d7882c2e97,2024-07-16T18:15:09.247000 CVE-2024-6607,0,0,e0f051eabf509802774447af80a0c738a4502496130b70b32bcf3185bbfd563c,2024-08-01T14:00:30.023000 @@ -267880,6 +267921,7 @@ CVE-2024-8070,0,0,fe9b454067f74b13c9d22e1bfea14cc77320169fffe5e56dce182517c870c1 CVE-2024-8071,0,0,ac7c2c7e7df896f6bfe7f17a6e74f8de236e5ec843865384cdf53fde1e533098,2024-08-23T15:34:53.913000 CVE-2024-8072,0,0,08fafb0bed7b0568fefcb8938e0e01cf4acf3cb153d4b847bc3e1d9427344a62,2024-08-22T14:35:18.797000 CVE-2024-8073,0,0,10b7625a2313189ee3b842662d1479fc9c76da034a2ab4b4a904df4cf34a67e5,2024-09-12T20:58:56.413000 +CVE-2024-8074,1,1,076dc0b186a0afea61c1a9a5ea4ed9867805411ce7c2a803d30f87fae20b0c22,2024-11-12T15:48:59.103000 CVE-2024-8075,0,0,ade4c273165c7aec4765c6326040b76c5f63a113e2ed288ff931d9df9094655a,2024-08-29T21:57:51.377000 CVE-2024-8076,0,0,17f13fca60dc9f294e50e141a5e871f314ee6e5e737c4e528c1768c1265f9d75,2024-08-29T21:58:31.820000 CVE-2024-8077,0,0,52c1674bca408deb5f4af1cbc16aa8747d849ce452283a87adbc49089818e7d0,2024-08-29T21:59:08.997000 @@ -268197,6 +268239,7 @@ CVE-2024-8485,0,0,a23363c7e119dcd66690422c5888ab97f710d472d308cfeb1e931d4e393131 CVE-2024-8486,0,0,a895c2dfc5296c31033d2d8775c35d4e89c74a55a8e4a0d1cd2be303d1154f98,2024-10-07T17:48:28.117000 CVE-2024-8488,0,0,0a3c72da0e3d6042858531d99f20f7d46ebd7634c2988e0b42f58011241f998b,2024-10-10T12:56:30.817000 CVE-2024-8490,0,0,5ff62dababbd8edfb72d0a97e4807df424b78f87491e2373479d6c84fbd14d32,2024-09-27T18:36:00.053000 +CVE-2024-8495,1,1,123bc3e7f16c35d61872897698b0fa7f122111fb7b6bc25343bcafd7ca188a34,2024-11-12T16:15:26.560000 CVE-2024-8497,0,0,903ccc83158de7417bc6f3ffdca83d1bf1fc40ad14228b01a3e1e063e242f9a9,2024-09-26T13:32:02.803000 CVE-2024-8499,0,0,bc10e268953f3510a56a82c76a3284d959caf9db18a1ecb3936e6906e82e8732,2024-11-08T21:01:13.457000 CVE-2024-8500,0,0,4a6f945879b83f03905c3f0642d30c4c3935515f8d05579f7adc4234c4210fca,2024-10-25T16:43:24.040000 @@ -268394,7 +268437,7 @@ CVE-2024-8751,0,0,dd4f77422f5dc981129a2e765da3e243ee86648b85be15172cd0c4e6601f99 CVE-2024-8752,0,0,be5f97c0edf8e6ac8b5e8514ff7047e0f4fcd958517cc5377fbff739f62f1969,2024-09-20T22:42:20.367000 CVE-2024-8754,0,0,f8a4ca9a3c8c6c9af2a693c6565fade1a53b2c08d2db63ea33e154699f832b1a,2024-09-14T15:40:20.583000 CVE-2024-8755,0,0,6df715314b1336790c7d97e006488029fc046357f7768aca9e76af35c90a4cf5,2024-10-15T12:58:51.050000 -CVE-2024-8756,0,1,267dc6d9d323b3ee60c214fb8c857bab77801af706c2ead75de38cc80f69f89e,2024-11-12T13:56:24.513000 +CVE-2024-8756,0,0,267dc6d9d323b3ee60c214fb8c857bab77801af706c2ead75de38cc80f69f89e,2024-11-12T13:56:24.513000 CVE-2024-8757,0,0,ac7b458a171f940d51c6f598fa3e7660be88f90768b34e80d2717be5212da2e2,2024-10-15T12:57:46.880000 CVE-2024-8758,0,0,fea72da3ec447aa80df355b080e42aa6b936f28594d975635bc512eef8e85985,2024-10-07T21:35:03.193000 CVE-2024-8760,0,0,9ea2fbe1bce76fe8b787c65fe635c22c7a5af9164ae399ebf90a4b05706537bf,2024-10-15T12:57:46.880000 @@ -268453,8 +268496,8 @@ CVE-2024-8876,0,0,adf401fb4b8b2c24f06ac7d28fd2360497bd835317abc655be39e3ccb04a97 CVE-2024-8877,0,0,072c8e486444961bae4945079e8c7eda87a37fe8ff462296a0eff944cb3f1801,2024-09-30T15:31:14.690000 CVE-2024-8878,0,0,d355a1999baf0c8606d16796b1d3b0e1dca83258ab14464d5a94be439e5488d1,2024-09-30T15:21:31.693000 CVE-2024-8880,0,0,4890b5d8ccfd73a7de9d70be358a6aa9c5c8f4db772389c703fb4d83ffb621f1,2024-09-20T16:41:38.030000 -CVE-2024-8881,0,1,c22369bc914ccfd9b06d3d7aabe82fa87d6a964b490b973066b8f984f84c1211,2024-11-12T13:55:21.227000 -CVE-2024-8882,0,1,051a5ecdd86f1f8fd6245ca5836a7db78c55add42a1ae8d71eea96d1ba0a1cb1,2024-11-12T13:55:21.227000 +CVE-2024-8881,0,0,c22369bc914ccfd9b06d3d7aabe82fa87d6a964b490b973066b8f984f84c1211,2024-11-12T13:55:21.227000 +CVE-2024-8882,0,0,051a5ecdd86f1f8fd6245ca5836a7db78c55add42a1ae8d71eea96d1ba0a1cb1,2024-11-12T13:55:21.227000 CVE-2024-8883,0,0,ef867150b75a006b88b657706b5ccab0ed5de191cb19aa041336ee55b15eac37,2024-11-05T04:15:03.467000 CVE-2024-8884,0,0,bbe657acd3b81809e4c38d289d4690d33ce15843f154a38b409847ce2483e4ec,2024-10-10T12:56:30.817000 CVE-2024-8885,0,0,3d17cd6b07f76e6b7b78ee39290572c27afe08953d025655a317633960052841,2024-10-04T13:50:43.727000 @@ -268510,7 +268553,7 @@ CVE-2024-8951,0,0,888c97aa442d5e8c89ae77387b914cd3981839dfe932748e6b429d09cccb70 CVE-2024-8956,0,0,1cb756cbfed7cce32103cd61ea4e7225af7cf46acb1dafb383d10ad8a9c01dda,2024-11-05T02:00:01.697000 CVE-2024-8957,0,0,0308f2f5a0567b3e01401fcc5a35dd0d4903c31a6d3992c47cfe16c6bc21eadc,2024-11-05T02:00:01.697000 CVE-2024-8959,0,0,0dc3502ed244ae66bafd80efba15dddd0bb76667e6d8b2d3ee7e3d6fc71e6baf,2024-10-25T12:56:07.750000 -CVE-2024-8960,0,1,cb9c3666b1d5630b31aed515dc84bc6b9317ac9454d917c6e7a599d8d75d0609,2024-11-12T13:56:24.513000 +CVE-2024-8960,0,0,cb9c3666b1d5630b31aed515dc84bc6b9317ac9454d917c6e7a599d8d75d0609,2024-11-12T13:56:24.513000 CVE-2024-8963,0,0,67fe8ea90f3163df4929d6782956d377bcadef461d17352cf475deabaa8fd4ad,2024-09-20T16:32:02.563000 CVE-2024-8964,0,0,c8fc4fc0d8f6e4149ea3cd0239ed4708c78c8d6f77eb0df4938d6649d94bf7d7,2024-10-10T12:56:30.817000 CVE-2024-8965,0,0,fcd9a7faf9aba17ebbc93d83d1389f5891b9c0797caaf85615a1a91da1ce5a78,2024-10-04T19:04:03.157000 @@ -268680,7 +268723,7 @@ CVE-2024-9221,0,0,feb1b16d88be55b92259cd20b799cece7abb9935cf5adfed4d1f38e82a4356 CVE-2024-9222,0,0,aa75daaaa6f167f771e02be32b7ac6d9115eba757cf38ea3ae7fe336f82931ef,2024-10-08T15:34:13.250000 CVE-2024-9224,0,0,1efb870d30ff5afb9078703fdeff1bc29463ebfa0c91ad435c25d902219ffec9,2024-10-07T19:19:38.157000 CVE-2024-9225,0,0,d9b0065994459fe38d594a136ae9cff90cf19d12b5b0208b359cee9d6c2409ea,2024-10-07T20:24:41.420000 -CVE-2024-9226,0,1,3017dba656895d061d1d7c16c330fb343b4119f2b662f95a0b71ccddd04254e6,2024-11-12T13:56:24.513000 +CVE-2024-9226,0,0,3017dba656895d061d1d7c16c330fb343b4119f2b662f95a0b71ccddd04254e6,2024-11-12T13:56:24.513000 CVE-2024-9228,0,0,cb0dad29f14eeb8fed9baf1de8b4ba619c5e35c4fffb0932ef40f0c6748e195d,2024-10-07T19:01:04.960000 CVE-2024-9231,0,0,1a98d4e564cd1445dff204dbfca514c3336df15b7e3a4c13356dccfc41c8c7ca,2024-10-30T18:56:03.380000 CVE-2024-9232,0,0,a07f526496bb68b184ee001c7d6cd9744d3cb563b91260e8d60bd9b70cac4bda,2024-10-15T12:58:51.050000 @@ -268690,7 +268733,7 @@ CVE-2024-9237,0,0,fb69e6f6fcfba2cfafb660a24001833586540d01b0ed897e2ee22df678729e CVE-2024-9240,0,0,64e490409dd599c74da5a2492515b43ccd4793b118bdb242162550231e348320,2024-10-18T12:53:04.627000 CVE-2024-9241,0,0,6c5cc70c23164aeead7a2ffa985d7e69869a7cd0428a8503a9e9f624c0c87b24,2024-10-07T18:51:20.950000 CVE-2024-9242,0,0,2931ce38d642cfa320383051a5a41609f3e037ff0fe51760f16b233825fad051,2024-10-08T16:26:06.147000 -CVE-2024-9262,0,1,0faf581ebb856c33af20ae813ef5903cd96d0da73e2d232fe550d71402d04408,2024-11-12T13:56:24.513000 +CVE-2024-9262,0,0,0faf581ebb856c33af20ae813ef5903cd96d0da73e2d232fe550d71402d04408,2024-11-12T13:56:24.513000 CVE-2024-9263,0,0,ee4f7b487368511acdd8209efd3b16cc7ea9463265fe8e2495be906cd811a62e,2024-10-18T12:53:04.627000 CVE-2024-9264,0,0,453599246838d2f15e3e7a7864ab2c75c071b729888f2b98b95994ed621e8268,2024-11-01T18:14:31.377000 CVE-2024-9265,0,0,370ae511e2a3bdf95824ac5c42b3e844c54d5bb7a6631dfac66939ebcd808076,2024-10-07T18:48:15.380000 @@ -268698,7 +268741,7 @@ CVE-2024-9266,0,0,9897e7bd01e8f0fea686bbe0969277eb0e59373ffc16090ed1770b5ca71252 CVE-2024-9267,0,0,e1783d6d7b8ba5585243c45fe350fa65068fd1659c19369f548dec592743f878,2024-10-04T13:51:25.567000 CVE-2024-9268,0,0,7e7771d589d5219f5f8e1d4b856d8a4ecc833e195b34661fddc76da01954ef5a,2024-09-27T17:15:14.497000 CVE-2024-9269,0,0,89e3d14dbb396872dee171ef3aa7d49f480ae977e81c830f9aba067690d7384e,2024-10-04T13:51:25.567000 -CVE-2024-9270,0,1,85daebf0a534c2e07ef9b04eb2e04b99daea3b856e74fe9c9c9148aa1e9f8e19,2024-11-12T13:56:24.513000 +CVE-2024-9270,0,0,85daebf0a534c2e07ef9b04eb2e04b99daea3b856e74fe9c9c9148aa1e9f8e19,2024-11-12T13:56:24.513000 CVE-2024-9271,0,0,66e01cc911285d725adb63f03395bcee28ec66abccf0b01c43138b6af47fb79f,2024-10-08T16:17:29.110000 CVE-2024-9272,0,0,a24b66874e7208e8487d25208cbebeb411ca8d85bf3090e22e1f2bb545069376,2024-10-04T13:51:25.567000 CVE-2024-9273,0,0,d541667891e816199f828382e531f52a986321fd7f85b5856a4bc94c161620a8,2024-09-27T17:15:14.550000 @@ -268763,7 +268806,7 @@ CVE-2024-9351,0,0,33d034faa3e6b0aeb71bafa0ae8b2ea418555ae0b07eef9d890e7c43507fa4 CVE-2024-9352,0,0,788f5bf16f633f8f02e340b198528b062bcda6aeec70a897601eaf656cd6ab6a,2024-10-18T12:52:33.507000 CVE-2024-9353,0,0,64ddffc3239a0d67e3b79e48af9889b2f8d89027aa9c53de3cc5595dbd6f2fd7,2024-10-08T18:50:51.357000 CVE-2024-9355,0,0,302621984b6116aa148a6d267ab2864d150a3fcf399bab5a42fa5db73f8156da,2024-11-05T08:15:04.413000 -CVE-2024-9357,0,1,ecac5cca1d13ae41e27c64ccd21707ad2b9f6cb13725a3072faecffbc49d78e9,2024-11-12T13:55:21.227000 +CVE-2024-9357,0,0,ecac5cca1d13ae41e27c64ccd21707ad2b9f6cb13725a3072faecffbc49d78e9,2024-11-12T13:55:21.227000 CVE-2024-9358,0,0,ad1311c8435fb7ce092ff9c8b7c1abe83209465bc92e72b7b733a8ea9fa4bf3c,2024-10-04T13:51:25.567000 CVE-2024-9359,0,0,c3e20cb7feaf9e2d5c48c39f4d484e16226f28d5df197104e70b6a5f0b84dc00,2024-10-04T18:54:12.417000 CVE-2024-9360,0,0,9328fb4e6135929e3835e5c835fd869b8491fb46bae32eb4c5f02c6fc86a7446,2024-10-04T18:53:58.020000 @@ -268807,6 +268850,7 @@ CVE-2024-9412,0,0,aa9a3d3cdb3659b02012ef158f2f0c675ff0de511272afae470c48f556502f CVE-2024-9414,0,0,5c21f14ec376abe57dfce5e862247c317429afdd9c8e1a9c0b90f9672b7f519b,2024-10-18T12:52:33.507000 CVE-2024-9417,0,0,c74a648d5508a7a2c2d3e505619e54040658d58791e6150e9a0fe8cbf972b416,2024-10-07T17:48:28.117000 CVE-2024-9419,0,0,a3f1d241a393213976f2495a35f5bc1427a284fa16c4a0b19d1f7c056beff495,2024-11-01T12:57:03.417000 +CVE-2024-9420,1,1,16abe743c10c84ef66d4a9297b6d91aa254bf942da6fed8f6490dfaf0762e547,2024-11-12T16:15:26.760000 CVE-2024-9421,0,0,c9b1d003792a28014f7a9846d6ca15c83ef06308c8117d3bc2489a9bd808c180,2024-10-10T20:59:01.600000 CVE-2024-9423,0,0,080f0a87d4561f3316974a1b5473f0b3836e39e629c6273c7813cc62b41d4a31,2024-10-04T13:50:43.727000 CVE-2024-9425,0,0,bc1d05d29533f5db80147aca0ebcf5dcf1807c002307822e9b1efd4c274ae327,2024-10-22T13:55:04.537000 @@ -268975,7 +269019,7 @@ CVE-2024-9707,0,0,cde0816a76e7682ea9f7dc3a69f12238a4d95599cfec418d205198361a6879 CVE-2024-9708,0,0,08bc1437568decedc8d133fc5b87f480913bc1f7eb502b0ca93b4d7f941cdca2,2024-11-01T12:57:03.417000 CVE-2024-9756,0,0,8173cad728731052b89b4b59f3b4da8665b01e9fe6a8b575d907d967b2da6473,2024-10-15T12:57:46.880000 CVE-2024-9772,0,0,0d1b30d428fb6796ba367d377c6619e6bf9b25cc03796237a99e8a8d275b84f3,2024-10-28T13:58:09.230000 -CVE-2024-9775,0,1,e3916d71ec9dd0d5246614a59a1cb4484a6342794b8a5103a7b8b237fed4d20b,2024-11-12T13:56:24.513000 +CVE-2024-9775,0,0,e3916d71ec9dd0d5246614a59a1cb4484a6342794b8a5103a7b8b237fed4d20b,2024-11-12T13:56:24.513000 CVE-2024-9776,0,0,82a616b68a2c5818c813f35d61772c622935aa1b119f178b9eaa21355bac63d9,2024-10-15T12:57:46.880000 CVE-2024-9778,0,0,0fe7ee5860b89dbc53027fbdd06b191ad5c5e349a3553ba6bc5769975646dd12,2024-10-15T12:57:46.880000 CVE-2024-9780,0,0,82a65b59c0bb0f4aa37b7bc9835ace6b2d8eb95b730adf88705db9589433fda5,2024-10-17T14:18:18.433000 @@ -269022,8 +269066,8 @@ CVE-2024-9825,0,0,43f77069eab20c6659796a5ca73cb04eb18b719fa0ad0721704c789de71379 CVE-2024-9826,0,0,c03e2e0710a5712915ae2341fa5030e5bd74d5917743f7fdf85c043b115b921d,2024-11-01T16:17:10.620000 CVE-2024-9827,0,0,c5e7676b9d011eef0934f8d1e51cd92697f77495088547784042162cb4944824,2024-11-01T16:17:07.187000 CVE-2024-9829,0,0,ea980a1e481fc86407edeb6f0040d6f4a6ff2d17edcbe8d18dd95381292ad49b,2024-10-25T16:30:44.520000 -CVE-2024-9835,0,1,c228c557dc8af1c5106b06720891713942e228f3bfa98f5b97dd84e152830fc6,2024-11-12T13:55:21.227000 -CVE-2024-9836,0,1,6ea8c6b91c647e267072b00a3957d5519f7f69791a842d0ae5172659fb697220,2024-11-12T13:55:21.227000 +CVE-2024-9835,0,1,ca18e7b41fab9b483950f5f59199903f1b661b24923c7a18a4c44cf7bcb08f14,2024-11-12T15:35:17.853000 +CVE-2024-9836,0,1,5d120048cea246a15edceb1ecc1c13de92be1dc1c21567e1e478f7428ef25fec,2024-11-12T15:35:18.093000 CVE-2024-9837,0,0,bb8fbc31e530027dfddbaf6dae2f5d1b4333d91b7cafcea32a3d82a1ea54dea9,2024-10-15T12:57:46.880000 CVE-2024-9841,0,0,ebdd51eec8479d80c9266cdceb915506aec1278560e194f65ea2f5d20595b81b,2024-11-08T19:01:03.880000 CVE-2024-9846,0,0,173656afdffd3fc8df737b5cdb277d7e27d47fc010c3df17216e30b52661a1bb,2024-11-06T14:58:04.160000 @@ -269043,7 +269087,7 @@ CVE-2024-9867,0,0,e67b1f8bf4d2b38a2b9f15fec521fb884d23cbbf85b48f78911bb6397a2ae3 CVE-2024-9868,0,0,b2463439f3611d00d054cbd441340ef04f6dbee60e35877cb3af971fb7fd3668,2024-11-04T13:44:51.370000 CVE-2024-9869,0,0,2195387ef9aab560e210893ad1e9f3295c5808c9d50c0ada4fa1d17778d3d1ae,2024-10-11T15:15:06.500000 CVE-2024-9873,0,0,54e1b937a83aa8c512a9ce3ab381594073150b73716fb01cf60c5f6e4db0c415,2024-10-16T16:38:14.557000 -CVE-2024-9874,0,1,f2eeefaff6dc1bf48f3ae121c662c9abde2013a6363dc8cd7ad5cb2521077502,2024-11-12T13:56:24.513000 +CVE-2024-9874,0,0,f2eeefaff6dc1bf48f3ae121c662c9abde2013a6363dc8cd7ad5cb2521077502,2024-11-12T13:56:24.513000 CVE-2024-9878,0,0,34a522bfd6522a898b0c35e6aaad7d9eea3a547bd3dbf1793fc567099f36e907,2024-11-08T15:25:45.930000 CVE-2024-9883,0,0,3d8bffa6f00f1635d66365d71fac3209d831583acb3bbea648179300cb3b5f9b,2024-11-06T17:32:17.477000 CVE-2024-9884,0,0,757f98f3275a3bf4e9b1e819bb018e139225ae1ebee044e7c027a7c44897e089,2024-11-01T12:57:03.417000