Auto-Update: 2024-11-04T23:00:19.803018+00:00

This commit is contained in:
cad-safe-bot 2024-11-04 23:03:19 +00:00
parent 03a6b1a616
commit 8187b1dabe
47 changed files with 1754 additions and 249 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-47192",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-10T19:15:47.710",
"lastModified": "2024-04-10T19:49:51.183",
"lastModified": "2024-11-04T21:35:00.850",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: core: sysfs: Fix hang when device state is set via sysfs Esto corrige una regresi\u00f3n agregada con: commit f0f82e2476f6 (\"scsi: core: Fix capacity set to zero after offlinining device\") El problema es que despu\u00e9s de la recuperaci\u00f3n de iSCSI, iscsid llamar\u00e1 al kernel para establecer el estado del dev en running, y con ese parche ahora llamamos a scsi_rescan_device() con el state_mutex retenido. Si el hilo del controlador de errores SCSI est\u00e1 empezando a probar el dispositivo en scsi_send_eh_cmnd() entonces va a intentar capturar el state_mutex. Entonces estamos atascados, porque cuando scsi_rescan_device() intenta enviar su E/S, scsi_queue_rq() llama a -> scsi_host_queue_ready() -> scsi_host_in_recovery() que devolver\u00e1 verdadero (el estado del host todav\u00eda est\u00e1 en recuperaci\u00f3n) y la E/S simplemente se volver\u00e1 a poner en cola. scsi_send_eh_cmnd() nunca podr\u00e1 tomar el state_mutex para finalizar el manejo de errores. Para evitar el punto muerto, mueva el c\u00f3digo relacionado con el rescan a despu\u00e9s de que eliminemos el state_mutex. Esto tambi\u00e9n agrega una verificaci\u00f3n para ver si ya estamos en el estado de ejecuci\u00f3n. Esto evita escaneos adicionales y ayuda al caso iscsid donde si la clase de transporte ya ha puesto en l\u00ednea el dispositivo durante su proceso de recuperaci\u00f3n, entonces no necesitamos espacio de usuario para hacerlo nuevamente y posiblemente bloquear ese daemon."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/4edd8cd4e86dd3047e5294bbefcc0a08f66a430f",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-47224",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T15:15:11.687",
"lastModified": "2024-05-21T16:54:26.047",
"lastModified": "2024-11-04T21:35:01.163",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: net:ll_temac: Aseg\u00farate de liberar skb cuando est\u00e9 completamente utilizado. Con el puntero skb acoplado en la BD TX, tenemos una forma sencilla y eficaz de liberar el buffer skb. cuando la trama ha sido transmitida. Pero para evitar liberar el skb mientras todav\u00eda hay fragmentos del skb en uso, debemos aprovechar el BD TX del skb, no el primero. Sin esto, estamos haciendo use after free en el lado DMA, cuando el primer BD de un paquete BD de transmisi\u00f3n m\u00faltiple se considera completado en xmit_done y los BD restantes todav\u00eda se est\u00e1n procesando."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/019ab7d044d0ebf97e1236bb8935b7809be92358",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-47350",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-21T15:15:21.483",
"lastModified": "2024-05-21T16:54:26.047",
"lastModified": "2024-11-04T21:35:01.490",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: powerpc/mm: corrige el bloqueo en el fallo de ejecuci\u00f3n del kernel. El kernel de powerpc no est\u00e1 preparado para manejar fallos de ejecuci\u00f3n del kernel. Especialmente, la funci\u00f3n is_exec_fault() devolver\u00e1 'false' cuando el kernel tome un fallo de ejecuci\u00f3n, porque la verificaci\u00f3n se basa en la lectura de current->thread.regs->trap que contiene la trampa del usuario. Por ejemplo, al provocar una prueba LKDTM EXEC_USERSPACE, current->thread.regs->trap se establece en SYSCALL trap (0xc00), y set_access_flags_filter() no ve el error cometido por el kernel como un error de ejecuci\u00f3n. La confirmaci\u00f3n d7df2443cd5f (\"powerpc/mm: corregir errores de segmentaci\u00f3n falsos en radix con autonuma\") lo dej\u00f3 claro y lo manej\u00f3 correctamente. Pero m\u00e1s tarde, la confirmaci\u00f3n d3ca587404b3 (\"powerpc/mm: corregir informes de fallas de ejecuci\u00f3n del kernel\") elimin\u00f3 ese manejo, introduciendo una prueba basada en error_code. Y aqu\u00ed est\u00e1 el problema, porque en el 603 todos los bits superiores de SRR1 se borran cuando el controlador de errores de instrucci\u00f3n TLB sale a ISI. Hasta la confirmaci\u00f3n cbd7e6ca0210 (\"powerpc/fault: Evite la verificaci\u00f3n pesada de search_exception_tables()\"), un fallo de ejecuci\u00f3n del kernel en una direcci\u00f3n de espacio de usuario se detectaba indirectamente por la falta de entrada para esa direcci\u00f3n en las tablas de excepci\u00f3n. Pero despu\u00e9s de esa confirmaci\u00f3n, el kernel depende principalmente de KUAP o del manejo de mm del n\u00facleo para detectar accesos de usuarios incorrectos. Aqu\u00ed el acceso no es incorrecto, por lo que mm lo maneja. Es un fallo menor porque PAGE_EXEC no est\u00e1 configurada, set_access_flags_filter() deber\u00eda configurar PAGE_EXEC y listo. Pero como is_exec_fault() devuelve false como se explic\u00f3 al principio, set_access_flags_filter() sale sin configurar el indicador PAGE_EXEC, lo que conduce a un fallo de ejecuci\u00f3n menor para siempre. Como el kernel no est\u00e1 preparado para manejar tales fallos de ejecuci\u00f3n, lo que hay que hacer es activar bad_kernel_fault() para cualquier fallo de ejecuci\u00f3n tomado por el kernel, como estaba antes de la confirmaci\u00f3n d3ca587404b3."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/500f81cec9f1bfa5210aa9dd5ba9a06e22f62a35",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-47511",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-24T15:15:12.237",
"lastModified": "2024-05-24T18:09:20.027",
"lastModified": "2024-11-04T21:35:01.830",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: pcm: oss: corrige tama\u00f1os de per\u00edodo/b\u00fafer negativos El c\u00e1lculo del tama\u00f1o del per\u00edodo en la capa OSS puede recibir un valor negativo como error, pero el c\u00f3digo all\u00ed asume solo los valores positivos y manejarlos con size_t. Debido a esto, es posible que se pase un valor demasiado grande a las capas inferiores. Este parche cambia el c\u00f3digo para manejar con ssize_t y agrega las comprobaciones de errores adecuadas."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/00a860678098fcd9fa8db2b5fb9d2ddf4776d4cc",

View File

@ -2,7 +2,7 @@
"id": "CVE-2021-47555",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-24T15:15:20.237",
"lastModified": "2024-05-24T18:09:20.027",
"lastModified": "2024-11-04T21:35:02.123",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: vlan: corrige el desbordamiento insuficiente para real_dev refcnt Inyecte el error antes de dev_hold(real_dev) en Register_vlan_dev() y ejecute el siguiente caso de prueba: ip link add dev dummy1 tipo dummy ip link add nombre dummy1.100 link dummy1 tipo vlan id 100 ip link del dev dummy1 Cuando se elimina el dispositivo de red ficticio, recibiremos una ADVERTENCIA como la siguiente: ===================== ==================================================== = refcount_t: decremento hit 0; p\u00e9rdida de memoria. ADVERTENCIA: CPU: 2 PID: 0 en lib/refcount.c:31 refcount_warn_saturate+0xbf/0x1e0 y un bucle sin fin de: ======================== ================================================= unregister_netdevice: esperando que el dummy1 quede libre. Recuento de uso = -1073741824 Esto se debe a que dev_put(real_dev) en vlan_dev_free() se llama sin dev_hold(real_dev) en Register_vlan_dev(). Hace que el refcnt de real_dev se desborde. Mueva dev_hold(real_dev) a vlan_dev_init() que es la devoluci\u00f3n de llamada de ndo_init(). Eso hace que dev_hold() y dev_put() para real_dev de vlan sean sim\u00e9tricos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 4.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/01d9cc2dea3fde3bad6d27f464eff463496e2b00",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-36325",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-09T06:15:11.303",
"lastModified": "2024-10-10T12:51:56.987",
"lastModified": "2024-11-04T22:35:00.740",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "i2p anterior a la versi\u00f3n 2.3.0 (Java) permite desanonimizar las direcciones IPv4 e IPv6 p\u00fablicas de los servicios ocultos de i2p (tambi\u00e9n conocidos como eepsites) mediante un ataque de correlaci\u00f3n entre las direcciones IPv4 e IPv6 que se produce cuando un mensaje tunelizado y reproducido tiene una discrepancia de comportamiento (puede descartarse o puede dar como resultado una respuesta de destino incorrecto). Un ataque tardar\u00eda d\u00edas en completarse."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"references": [
{
"url": "https://geti2p.net/en/blog/post/2023/06/25/new_release_2.3.0",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-46840",
"sourceIdentifier": "security@xen.org",
"published": "2024-03-20T11:15:08.180",
"lastModified": "2024-03-20T13:00:16.367",
"lastModified": "2024-11-04T22:35:01.860",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "La ubicaci\u00f3n incorrecta de una directiva de preprocesador en el c\u00f3digo fuente da como resultado una l\u00f3gica que no funciona como se espera cuando el soporte para invitados HVM se compila desde Xen."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 4.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 0.5,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://xenbits.xenproject.org/xsa/advisory-450.html",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10041",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-10-23T14:15:03.970",
"lastModified": "2024-11-04T17:35:09.270",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-04T22:27:02.877",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -40,6 +40,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +61,61 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linux-pam:linux-pam:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20ED7FC4-9FBB-4886-9FF0-BBBCBBE852D6"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D"
}
]
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2024-10041",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2319212",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-10277",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-23T12:15:02.403",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-04T22:13:13.207",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -61,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -120,22 +140,55 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*",
"matchCriteriaId": "94F213FF-17EB-4B99-9621-80792AD14A74"
}
]
}
]
}
],
"references": [
{
"url": "https://flowus.cn/share/510c9ef1-8bb9-4c8f-9648-2ea6ee726b06?code=G8A6P3",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.281552",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.281552",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.423830",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10278",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-23T13:15:12.157",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-04T22:11:53.397",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in ESAFENET CDG 5. It has been classified as critical. This affects an unknown part of the file /com/esafenet/servlet/user/ReUserOrganiseService.java. The manipulation of the argument userId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en ESAFENET CDG 5. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo /com/esafenet/servlet/user/ReUserOrganiseService.java. La manipulaci\u00f3n del argumento userId provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,22 +140,55 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*",
"matchCriteriaId": "94F213FF-17EB-4B99-9621-80792AD14A74"
}
]
}
]
}
],
"references": [
{
"url": "https://flowus.cn/share/cdfbea40-da0c-4fe7-a4b8-86631f0fd796?code=G8A6P3",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.281553",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.281553",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.423831",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-10279",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-10-23T13:15:12.877",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-04T22:14:01.963",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in ESAFENET CDG 5. It has been declared as critical. This vulnerability affects unknown code of the file /com/esafenet/servlet/policy/PrintPolicyService.java. The manipulation of the argument policyId leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en ESAFENET CDG 5. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /com/esafenet/servlet/policy/PrintPolicyService.java. La manipulaci\u00f3n del argumento policyId provoca una inyecci\u00f3n SQL. El ataque se puede iniciar de forma remota. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera."
}
],
"metrics": {
@ -57,6 +61,26 @@
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "cna@vuldb.com",
"type": "Secondary",
@ -116,22 +140,55 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*",
"matchCriteriaId": "94F213FF-17EB-4B99-9621-80792AD14A74"
}
]
}
]
}
],
"references": [
{
"url": "https://flowus.cn/share/b04c63c7-5b3c-47d2-9159-43943aecc342?code=G8A6P3",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.281554",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.281554",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.423832",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-21726",
"sourceIdentifier": "security@joomla.org",
"published": "2024-02-29T01:44:03.897",
"lastModified": "2024-02-29T13:49:29.390",
"lastModified": "2024-11-04T21:35:03.690",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "El filtrado de contenido inadecuado genera vulnerabilidades XSS en varios componentes."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security@joomla.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23242",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:48.200",
"lastModified": "2024-03-13T21:15:56.410",
"lastModified": "2024-11-04T22:35:02.393",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se solucion\u00f3 un problema de privacidad al no registrar el contenido de los campos de texto. Este problema se solucion\u00f3 en macOS Sonoma 14.4, iOS 17.4 y iPadOS 17.4. Es posible que una aplicaci\u00f3n pueda ver los datos de Mail."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23245",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-03-08T02:15:48.287",
"lastModified": "2024-03-13T23:15:46.520",
"lastModified": "2024-11-04T21:35:04.100",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Este problema se solucion\u00f3 agregando una solicitud adicional de consentimiento del usuario. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. Los atajos de terceros pueden utilizar una acci\u00f3n heredada de Automator para enviar eventos a aplicaciones sin el consentimiento del usuario."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "http://seclists.org/fulldisclosure/2024/Mar/21",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-23561",
"sourceIdentifier": "psirt@hcl.com",
"published": "2024-04-15T21:15:07.243",
"lastModified": "2024-04-16T13:24:07.103",
"lastModified": "2024-11-04T22:35:03.360",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"references": [
{
"url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0111926",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-24549",
"sourceIdentifier": "security@apache.org",
"published": "2024-03-13T16:15:29.373",
"lastModified": "2024-06-23T09:15:11.213",
"lastModified": "2024-11-04T22:35:04.083",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Denegaci\u00f3n de servicio debido a una vulnerabilidad de validaci\u00f3n de entrada incorrecta para solicitudes HTTP/2 en Apache Tomcat. Al procesar una solicitud HTTP/2, si la solicitud exced\u00eda cualquiera de los l\u00edmites configurados para los encabezados, la secuencia HTTP/2 asociada no se restablec\u00eda hasta que se hubieran procesado todos los encabezados. Este problema afecta a Apache Tomcat: desde 11.0.0- M1 hasta 11.0.0-M16, desde 10.1.0-M1 hasta 10.1.18, desde 9.0.0-M1 hasta 9.0.85, desde 8.5.0 hasta 8.5.98. Se recomienda a los usuarios actualizar a la versi\u00f3n 11.0.0-M17, 10.1.19, 9.0.86 u 8.5.99, que solucionan el problema."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@apache.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-26708",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-04-03T15:15:53.390",
"lastModified": "2024-04-03T17:24:18.150",
"lastModified": "2024-11-04T22:35:04.300",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mptcp: realmente se adapta a la ejecuci\u00f3n fastopen. El cierre del subflujo Fastopen y PM-trigger puede correr, seg\u00fan lo informado por syzkaller. En mi primer intento de cerrar dicha ejecuci\u00f3n, me perd\u00ed el hecho de que el estado del subflujo puede cambiar nuevamente antes de que se invoque la devoluci\u00f3n de llamada subflow_state_change. Solucione el problema copiando adicionalmente todos los estados a los que se puede acceder directamente desde TCP_FIN_WAIT1."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/337cebbd850f94147cee05252778f8f78b8c337f",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-27184",
"sourceIdentifier": "security@joomla.org",
"published": "2024-08-20T16:15:10.733",
"lastModified": "2024-08-21T12:30:33.697",
"lastModified": "2024-11-04T21:35:04.690",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Una validaci\u00f3n inadecuada de las URL podr\u00eda dar lugar a una verificaci\u00f3n no v\u00e1lida de si una URL de redireccionamiento es interna o no."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@joomla.org",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-3219",
"sourceIdentifier": "cna@python.org",
"published": "2024-07-29T22:15:04.970",
"lastModified": "2024-10-17T19:15:22.220",
"lastModified": "2024-11-04T22:35:06.427",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -61,6 +61,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/29/3",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-33147",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-07T17:15:08.803",
"lastModified": "2024-05-07T20:07:58.737",
"lastModified": "2024-11-04T22:35:04.680",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Se descubri\u00f3 que J2EEFAST v2.7.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro sql_filter en la funci\u00f3n authRoleList."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33147.txt",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-34457",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-22T10:15:03.607",
"lastModified": "2024-09-11T11:15:10.757",
"lastModified": "2024-11-04T22:35:05.480",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-36916",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-05-30T16:15:14.963",
"lastModified": "2024-06-27T14:15:14.463",
"lastModified": "2024-11-04T21:35:04.977",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: blk-iocost: evita cambios fuera de los l\u00edmites UBSAN detecta un comportamiento indefinido en blk-iocost, donde a veces iocg->delay se desplaza hacia la derecha en un n\u00famero demasiado grande, lo que resulta en un estado indefinido. comportamiento en algunas arquitecturas. [186.556576] ------------[ cortar aqu\u00ed ]------------ UBSAN: desplazamiento fuera de los l\u00edmites en block/blk-iocost.c:1366 :23 exponente de desplazamiento 64 es demasiado grande para el tipo de 64 bits 'u64' (tambi\u00e9n conocido como 'unsigned long long') CPU: 16 PID: 0 Comm: swapper/16 Tainted: GSEN 6.9.0-0_fbk700_debug_rc2_kbuilder_0_gc85af715cac0 #1 Nombre de hardware: Quanta Twin Lakes MP/Twin Lakes MP pasivo, BIOS F09_3A23 08/12/2020 Seguimiento de llamadas: dump_stack_lvl+0x8f/0xe0 __ubsan_handle_shift_out_of_bounds+0x22c/0x280 iocg_kick_delay+0x30b/0x310 ioc_timer_fn+0x2fb/0x 1f80 __run_timer_base+0x1b6/0x250 ... Evitar ese comportamiento indefinido simplemente tomando la rama \"retraso = 0\" si el cambio es demasiado grande. No estoy seguro de cu\u00e1les ser\u00e1n los s\u00edntomas de un retraso de valor indefinido, pero sospecho que podr\u00eda ser m\u00e1s que molesto depurarlo."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/488dc6808cb8369685f18cee81e88e7052ac153b",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37844",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T19:15:03.897",
"lastModified": "2024-10-28T14:35:11.803",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-04T21:58:56.810",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:radixiot:mango:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.2.0",
"matchCriteriaId": "C65DD50F-B1B1-4694-8391-F121255AF129"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/herombey/Disclosures/blob/main/CVE-2024-37844%20XSS.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/herombey/Disclosures/tree/main",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37845",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T19:15:03.973",
"lastModified": "2024-10-29T18:35:04.397",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-04T21:53:53.433",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:radixiot:mango:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.2.0",
"matchCriteriaId": "C65DD50F-B1B1-4694-8391-F121255AF129"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/herombey/Disclosures/blob/main/CVE-2024-37845%20RCE.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/herombey/Disclosures/tree/main",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-37846",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T19:15:04.027",
"lastModified": "2024-10-29T18:35:05.693",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2024-11-04T22:03:12.527",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"baseSeverity": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 2.5
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,14 +81,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:radixiot:mango:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.2.0",
"matchCriteriaId": "C65DD50F-B1B1-4694-8391-F121255AF129"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/herombey/Disclosures/blob/main/CVE-2024-37846-CSTI.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/herombey/Disclosures/tree/main",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-37847",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-25T19:15:04.087",
"lastModified": "2024-10-29T18:35:06.983",
"lastModified": "2024-11-04T21:32:29.250",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -55,14 +85,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:radixiot:mango:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.1.4",
"matchCriteriaId": "8A8E1DDF-63E8-4C11-AA25-F11CE3976FA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:radixiot:mangoapi:*:*:*:*:*:*:*:*",
"versionEndExcluding": "4.5.5",
"matchCriteriaId": "997E9719-EA5D-41DC-ACF7-8016356B03D5"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/herombey/Disclosures/blob/main/CVE-2024-37847%20File%20Upload%20Path%20Traversal.pdf",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Mitigation",
"Third Party Advisory"
]
},
{
"url": "https://github.com/herombey/Disclosures/tree/main",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-38587",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-06-19T14:15:18.800",
"lastModified": "2024-07-15T07:15:11.083",
"lastModified": "2024-11-04T21:35:05.243",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Speakup: corrige el error sizeof() vs ARRAY_SIZE() El puntero \"buf\" es una matriz de valores u16. Este c\u00f3digo deber\u00eda usar ARRAY_SIZE() (que es 256) en lugar de sizeof() (que es 512), de lo contrario a\u00fan puede salirse de los l\u00edmites."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://git.kernel.org/stable/c/008ab3c53bc4f0b2f20013c8f6c204a3203d0b8b",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-39637",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-08-01T22:15:25.837",
"lastModified": "2024-08-02T12:59:43.990",
"lastModified": "2024-11-04T22:35:05.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/edubin/wordpress-edubin-theme-9-2-0-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-40490",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-01T16:15:08.793",
"lastModified": "2024-11-01T20:24:53.730",
"lastModified": "2024-11-04T21:35:05.530",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Sourcebans++ before v.1.8.0 allows a remote attacker to obtain sensitive information via a crafted XAJAX call to the Forgot Password function."
},
{
"lang": "es",
"value": " Un problema en Sourcebans++ anterior a v.1.8.0 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s de una llamada XAJAX manipulada a la funci\u00f3n Olvid\u00e9 mi contrase\u00f1a."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/sbpp/sourcebans-pp/issues/975",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40594",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-06T05:15:09.670",
"lastModified": "2024-07-08T15:49:22.437",
"lastModified": "2024-11-04T21:35:06.433",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -39,6 +39,18 @@
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
}
],
"references": [
{
"url": "https://arstechnica.com/ai/2024/07/chatgpts-much-heralded-mac-app-was-storing-conversations-as-plain-text/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-41930",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-09-27T09:15:03.550",
"lastModified": "2024-09-30T12:46:20.237",
"lastModified": "2024-11-04T22:35:07.177",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,30 @@
"value": "Existe una vulnerabilidad de Cross-Site Scripting en MF Teacher Performance Management System version 6. Si se explota esta vulnerabilidad, se puede ejecutar una secuencia de comandos arbitraria en el navegador web del usuario que accedi\u00f3 al sitio web utilizando el producto."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44185",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-10-24T17:15:16.470",
"lastModified": "2024-10-29T15:22:45.677",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-04T22:35:07.400",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-44232",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-11-01T21:15:14.730",
"lastModified": "2024-11-04T14:42:06.010",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-04T21:35:07.233",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sonoma 14.7.1, macOS Ventura 13.7.1, visionOS 2.1, watchOS 11.1, tvOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, iOS 18.1 and iPadOS 18.1. Parsing a maliciously crafted video file may lead to unexpected system termination."
},
{
"lang": "es",
"value": " El problema se solucion\u00f3 con comprobaciones de los l\u00edmites mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.7.1, macOS Ventura 13.7.1, visionOS 2.1, watchOS 11.1, tvOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, iOS 18.1 y iPadOS 18.1. El an\u00e1lisis de un archivo de video creado con fines malintencionados puede provocar la finalizaci\u00f3n inesperada del sistema."
}
],
"metrics": {
@ -32,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -45,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-44233",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-11-01T21:15:14.787",
"lastModified": "2024-11-04T14:42:01.997",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-04T22:35:07.613",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sonoma 14.7.1, macOS Ventura 13.7.1, visionOS 2.1, watchOS 11.1, tvOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, iOS 18.1 and iPadOS 18.1. Parsing a maliciously crafted video file may lead to unexpected system termination."
},
{
"lang": "es",
"value": " El problema se solucion\u00f3 con comprobaciones de l\u00edmites mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.7.1, macOS Ventura 13.7.1, visionOS 2.1, watchOS 11.1, tvOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, iOS 18.1 y iPadOS 18.1. El an\u00e1lisis de un archivo de video creado con fines malintencionados puede provocar la finalizaci\u00f3n inesperada del sistema."
}
],
"metrics": {
@ -32,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -45,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,13 +2,17 @@
"id": "CVE-2024-44234",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-11-01T21:15:14.847",
"lastModified": "2024-11-04T14:42:08.367",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-04T21:35:08.147",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sonoma 14.7.1, macOS Ventura 13.7.1, visionOS 2.1, watchOS 11.1, tvOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, iOS 18.1 and iPadOS 18.1. Parsing a maliciously crafted video file may lead to unexpected system termination."
},
{
"lang": "es",
"value": " El problema se solucion\u00f3 con comprobaciones de l\u00edmites mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.7.1, macOS Ventura 13.7.1, visionOS 2.1, watchOS 11.1, tvOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, iOS 18.1 y iPadOS 18.1. El an\u00e1lisis de un archivo de video creado con fines malintencionados puede provocar la finalizaci\u00f3n inesperada del sistema."
}
],
"metrics": {
@ -32,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -45,6 +69,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-45504",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2024-09-10T05:15:12.780",
"lastModified": "2024-09-10T12:09:50.377",
"lastModified": "2024-11-04T21:35:09.173",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "La vulnerabilidad de cross-site request forgery (CSRF) en varios productos de Alps System Integration y productos OEM permite que un atacante remoto no autenticado secuestre la autenticaci\u00f3n del usuario y realice operaciones no deseadas si el usuario ve una p\u00e1gina maliciosa mientras est\u00e1 conectado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://alsifaq.dga.jp/faq_detail.html?id=6494",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-46040",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-07T16:15:05.407",
"lastModified": "2024-10-07T17:47:48.410",
"lastModified": "2024-11-04T22:35:08.430",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "IoT Haat Smart Plug IH-IN-16A-S IH-IN-16A-S v5.16.1 sufre un vencimiento de sesi\u00f3n insuficiente. La falta de validaci\u00f3n del token de autenticaci\u00f3n en IoT Haat durante el modo de emparejamiento del punto de acceso hace que el atacante repita los paquetes de Wi-Fi y apague a la fuerza el punto de acceso despu\u00e9s de que el token de autenticaci\u00f3n haya vencido."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-613"
}
]
}
],
"references": [
{
"url": "https://github.com/Anonymous120386/Anonymous",

View File

@ -2,17 +2,41 @@
"id": "CVE-2024-47041",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2024-10-25T11:15:17.667",
"lastModified": "2024-10-25T16:35:10.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-04T22:16:13.793",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In valid_address of syscall.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En valid_address de syscall.c, existe una posible lectura fuera de los l\u00edmites debido a una comprobaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -36,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -47,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26"
}
]
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/pixel/2024-10-01",
"source": "dsap-vuln-management@google.com"
"source": "dsap-vuln-management@google.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47189",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-10-21T20:15:14.697",
"lastModified": "2024-10-23T15:12:34.673",
"lastModified": "2024-11-04T22:35:09.220",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "La interfaz API del componente AWV (conferencias de audio, web y video) de Mitel MiCollab hasta la versi\u00f3n 9.8 SP1 FP2 (9.8.1.201) podr\u00eda permitir que un atacante no autenticado realice una inyecci\u00f3n SQL debido a una desinfecci\u00f3n insuficiente de la entrada del usuario. Una explotaci\u00f3n exitosa podr\u00eda permitir que un atacante con conocimiento de detalles espec\u00edficos acceda a informaci\u00f3n no confidencial sobre el aprovisionamiento de usuarios y ejecute comandos de base de datos SQL arbitrarios."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0026",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-48410",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-01T17:15:17.580",
"lastModified": "2024-11-01T20:24:53.730",
"lastModified": "2024-11-04T21:35:10.317",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in Camtrace v.9.16.2.1 allows a remote attacker to execute arbitrary code via the login.php."
},
{
"lang": "es",
"value": " La vulnerabilidad de cross site scripting en Camtrace v.9.16.2.1 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de login.php."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/Youns92/e7cd3f5d18ab089320f72c51fa3977de",

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-48463",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-04T21:15:04.707",
"lastModified": "2024-11-04T21:15:04.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Bruno before 1.29.1 uses Electron shell.openExternal without validation (of http or https) for opening windows within the Markdown docs viewer."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/opcod3r/ab69f36d52367df7ffac32a597dff31c",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/usebruno/bruno/pull/3122",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/usebruno/bruno/releases/tag/v1.29.1",
"source": "cve@mitre.org"
},
{
"url": "https://www.usebruno.com/changelog",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-51252",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-01T18:15:07.287",
"lastModified": "2024-11-01T20:24:53.730",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-04T21:35:11.177",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the restore function."
},
{
"lang": "es",
"value": " En Draytek Vigor3900 1.5.1.3, los atacantes pueden inyectar comandos maliciosos en mainfunction.cgi y ejecutar comandos arbitrarios llamando a la funci\u00f3n restore."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-51377",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-01T16:15:09.400",
"lastModified": "2024-11-01T20:24:53.730",
"lastModified": "2024-11-04T21:35:12.543",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Ladybird Web Solution Faveo Helpdesk & Servicedesk (On-Premise and Cloud) 9.2.0 allows a remote attacker to execute arbitrary code via the Subject and Identifier fields"
},
{
"lang": "es",
"value": "Un problema en Ladybird Web Solution Faveo Helpdesk & Servicedesk (On-Premise and Cloud) 9.2.0 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s de los campos Subject e Identifier "
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Asadiqbal2/Vulnerabilities-Research/tree/main/CVE-2024-51377",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-51432",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-01T16:15:09.697",
"lastModified": "2024-11-01T20:24:53.730",
"lastModified": "2024-11-04T22:35:10.037",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in FiberHome HG6544C RP2743 allows an attacker to execute arbitrary code via the SSID field in the WIFI Clients List not being sanitized"
},
{
"lang": "es",
"value": " La vulnerabilidad de cross site scripting en FiberHome HG6544C RP2743 permite que un atacante ejecute c\u00f3digo arbitrario a trav\u00e9s del campo SSID en la lista de clientes WIFI que no est\u00e1 desinfectada"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 4.8,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://en.fiberhome.com/",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-51744",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-04T22:15:03.997",
"lastModified": "2024-11-04T22:15:03.997",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in \"dangerous\" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behaviour of an established function and is not 100 % backwards compatible, so updating to 4.5.1 might break your code. In case you cannot update to 4.5.0, please make sure that you are properly checking for all errors (\"dangerous\" ones first), so that you are not running in the case detailed above."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.1,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-755"
}
]
}
],
"references": [
{
"url": "https://github.com/golang-jwt/jwt/commit/7b1c1c00a171c6c79bbdb40e4ce7d197060c1c2c",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/golang-jwt/jwt/security/advisories/GHSA-29wx-vh33-7x7r",
"source": "security-advisories@github.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-04T21:00:20.280091+00:00
2024-11-04T23:00:19.803018+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-04T20:47:21.767000+00:00
2024-11-04T22:35:10.037000+00:00
```
### Last Data Feed Release
@ -33,54 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
268166
268168
```
### CVEs added in the last Commit
Recently added CVEs: `10`
Recently added CVEs: `2`
- [CVE-2024-10768](CVE-2024/CVE-2024-107xx/CVE-2024-10768.json) (`2024-11-04T19:15:05.743`)
- [CVE-2024-10791](CVE-2024/CVE-2024-107xx/CVE-2024-10791.json) (`2024-11-04T20:15:04.580`)
- [CVE-2024-30616](CVE-2024/CVE-2024-306xx/CVE-2024-30616.json) (`2024-11-04T19:15:06.193`)
- [CVE-2024-30617](CVE-2024/CVE-2024-306xx/CVE-2024-30617.json) (`2024-11-04T19:15:06.277`)
- [CVE-2024-30618](CVE-2024/CVE-2024-306xx/CVE-2024-30618.json) (`2024-11-04T19:15:06.360`)
- [CVE-2024-30619](CVE-2024/CVE-2024-306xx/CVE-2024-30619.json) (`2024-11-04T19:15:06.440`)
- [CVE-2024-34885](CVE-2024/CVE-2024-348xx/CVE-2024-34885.json) (`2024-11-04T19:15:06.560`)
- [CVE-2024-34891](CVE-2024/CVE-2024-348xx/CVE-2024-34891.json) (`2024-11-04T19:15:06.647`)
- [CVE-2024-45086](CVE-2024/CVE-2024-450xx/CVE-2024-45086.json) (`2024-11-04T20:15:05.013`)
- [CVE-2024-45185](CVE-2024/CVE-2024-451xx/CVE-2024-45185.json) (`2024-11-04T20:15:05.257`)
- [CVE-2024-48463](CVE-2024/CVE-2024-484xx/CVE-2024-48463.json) (`2024-11-04T21:15:04.707`)
- [CVE-2024-51744](CVE-2024/CVE-2024-517xx/CVE-2024-51744.json) (`2024-11-04T22:15:03.997`)
### CVEs modified in the last Commit
Recently modified CVEs: `52`
Recently modified CVEs: `43`
- [CVE-2024-26828](CVE-2024/CVE-2024-268xx/CVE-2024-26828.json) (`2024-11-04T19:35:06.407`)
- [CVE-2024-26918](CVE-2024/CVE-2024-269xx/CVE-2024-26918.json) (`2024-11-04T19:35:06.627`)
- [CVE-2024-26940](CVE-2024/CVE-2024-269xx/CVE-2024-26940.json) (`2024-11-04T19:35:06.833`)
- [CVE-2024-27393](CVE-2024/CVE-2024-273xx/CVE-2024-27393.json) (`2024-11-04T19:35:07.067`)
- [CVE-2024-27524](CVE-2024/CVE-2024-275xx/CVE-2024-27524.json) (`2024-11-04T20:35:04.913`)
- [CVE-2024-27525](CVE-2024/CVE-2024-275xx/CVE-2024-27525.json) (`2024-11-04T20:35:05.800`)
- [CVE-2024-34223](CVE-2024/CVE-2024-342xx/CVE-2024-34223.json) (`2024-11-04T19:35:07.467`)
- [CVE-2024-35083](CVE-2024/CVE-2024-350xx/CVE-2024-35083.json) (`2024-11-04T20:35:06.920`)
- [CVE-2024-36117](CVE-2024/CVE-2024-361xx/CVE-2024-36117.json) (`2024-11-04T19:15:06.733`)
- [CVE-2024-36953](CVE-2024/CVE-2024-369xx/CVE-2024-36953.json) (`2024-11-04T19:35:09.213`)
- [CVE-2024-44731](CVE-2024/CVE-2024-447xx/CVE-2024-44731.json) (`2024-11-04T20:35:07.840`)
- [CVE-2024-48270](CVE-2024/CVE-2024-482xx/CVE-2024-48270.json) (`2024-11-04T19:35:11.057`)
- [CVE-2024-48289](CVE-2024/CVE-2024-482xx/CVE-2024-48289.json) (`2024-11-04T20:35:09.307`)
- [CVE-2024-48336](CVE-2024/CVE-2024-483xx/CVE-2024-48336.json) (`2024-11-04T20:35:10.193`)
- [CVE-2024-48733](CVE-2024/CVE-2024-487xx/CVE-2024-48733.json) (`2024-11-04T19:35:11.380`)
- [CVE-2024-48734](CVE-2024/CVE-2024-487xx/CVE-2024-48734.json) (`2024-11-04T19:35:12.597`)
- [CVE-2024-50801](CVE-2024/CVE-2024-508xx/CVE-2024-50801.json) (`2024-11-04T19:35:13.810`)
- [CVE-2024-50802](CVE-2024/CVE-2024-508xx/CVE-2024-50802.json) (`2024-11-04T19:35:14.907`)
- [CVE-2024-51328](CVE-2024/CVE-2024-513xx/CVE-2024-51328.json) (`2024-11-04T19:35:16.150`)
- [CVE-2024-51406](CVE-2024/CVE-2024-514xx/CVE-2024-51406.json) (`2024-11-04T19:35:17.410`)
- [CVE-2024-51407](CVE-2024/CVE-2024-514xx/CVE-2024-51407.json) (`2024-11-04T20:35:11.350`)
- [CVE-2024-6080](CVE-2024/CVE-2024-60xx/CVE-2024-6080.json) (`2024-11-04T19:15:07.323`)
- [CVE-2024-7807](CVE-2024/CVE-2024-78xx/CVE-2024-7807.json) (`2024-11-04T20:47:21.767`)
- [CVE-2024-9324](CVE-2024/CVE-2024-93xx/CVE-2024-9324.json) (`2024-11-04T19:15:07.587`)
- [CVE-2024-9325](CVE-2024/CVE-2024-93xx/CVE-2024-9325.json) (`2024-11-04T19:15:07.790`)
- [CVE-2024-3219](CVE-2024/CVE-2024-32xx/CVE-2024-3219.json) (`2024-11-04T22:35:06.427`)
- [CVE-2024-33147](CVE-2024/CVE-2024-331xx/CVE-2024-33147.json) (`2024-11-04T22:35:04.680`)
- [CVE-2024-34457](CVE-2024/CVE-2024-344xx/CVE-2024-34457.json) (`2024-11-04T22:35:05.480`)
- [CVE-2024-36916](CVE-2024/CVE-2024-369xx/CVE-2024-36916.json) (`2024-11-04T21:35:04.977`)
- [CVE-2024-37844](CVE-2024/CVE-2024-378xx/CVE-2024-37844.json) (`2024-11-04T21:58:56.810`)
- [CVE-2024-37845](CVE-2024/CVE-2024-378xx/CVE-2024-37845.json) (`2024-11-04T21:53:53.433`)
- [CVE-2024-37846](CVE-2024/CVE-2024-378xx/CVE-2024-37846.json) (`2024-11-04T22:03:12.527`)
- [CVE-2024-37847](CVE-2024/CVE-2024-378xx/CVE-2024-37847.json) (`2024-11-04T21:32:29.250`)
- [CVE-2024-38587](CVE-2024/CVE-2024-385xx/CVE-2024-38587.json) (`2024-11-04T21:35:05.243`)
- [CVE-2024-39637](CVE-2024/CVE-2024-396xx/CVE-2024-39637.json) (`2024-11-04T22:35:05.700`)
- [CVE-2024-40490](CVE-2024/CVE-2024-404xx/CVE-2024-40490.json) (`2024-11-04T21:35:05.530`)
- [CVE-2024-40594](CVE-2024/CVE-2024-405xx/CVE-2024-40594.json) (`2024-11-04T21:35:06.433`)
- [CVE-2024-41930](CVE-2024/CVE-2024-419xx/CVE-2024-41930.json) (`2024-11-04T22:35:07.177`)
- [CVE-2024-44185](CVE-2024/CVE-2024-441xx/CVE-2024-44185.json) (`2024-11-04T22:35:07.400`)
- [CVE-2024-44232](CVE-2024/CVE-2024-442xx/CVE-2024-44232.json) (`2024-11-04T21:35:07.233`)
- [CVE-2024-44233](CVE-2024/CVE-2024-442xx/CVE-2024-44233.json) (`2024-11-04T22:35:07.613`)
- [CVE-2024-44234](CVE-2024/CVE-2024-442xx/CVE-2024-44234.json) (`2024-11-04T21:35:08.147`)
- [CVE-2024-45504](CVE-2024/CVE-2024-455xx/CVE-2024-45504.json) (`2024-11-04T21:35:09.173`)
- [CVE-2024-46040](CVE-2024/CVE-2024-460xx/CVE-2024-46040.json) (`2024-11-04T22:35:08.430`)
- [CVE-2024-47041](CVE-2024/CVE-2024-470xx/CVE-2024-47041.json) (`2024-11-04T22:16:13.793`)
- [CVE-2024-47189](CVE-2024/CVE-2024-471xx/CVE-2024-47189.json) (`2024-11-04T22:35:09.220`)
- [CVE-2024-48410](CVE-2024/CVE-2024-484xx/CVE-2024-48410.json) (`2024-11-04T21:35:10.317`)
- [CVE-2024-51252](CVE-2024/CVE-2024-512xx/CVE-2024-51252.json) (`2024-11-04T21:35:11.177`)
- [CVE-2024-51377](CVE-2024/CVE-2024-513xx/CVE-2024-51377.json) (`2024-11-04T21:35:12.543`)
- [CVE-2024-51432](CVE-2024/CVE-2024-514xx/CVE-2024-51432.json) (`2024-11-04T22:35:10.037`)
## Download and Usage

View File

@ -154944,7 +154944,7 @@ CVE-2020-25727,0,0,9f5eca368bd07dcdd869e0aeac7c4d2e011fffe163b754f51bdee77559709
CVE-2020-25728,0,0,bfdbfc94ad27bc04267c8e56468159aebc12f3a6057f0226fa6c134a2c76f10d,2020-09-25T17:40:51.173000
CVE-2020-25729,0,0,c050a786ee2fa8d723e5e41234630bfaffa93fb091157268dc95b7df1240f22c,2020-09-24T14:42:09.080000
CVE-2020-2573,0,0,7cb38a0cda14d86f7e594a6c977c8dd7d564d47b07843e6c3c833b9441654d86,2022-01-04T16:43:12.697000
CVE-2020-25730,0,1,2f2fe4829e79f017641d98f858979352ffef03d62b80cb5a735e7bdb56005f41,2024-11-04T19:35:00.910000
CVE-2020-25730,0,0,2f2fe4829e79f017641d98f858979352ffef03d62b80cb5a735e7bdb56005f41,2024-11-04T19:35:00.910000
CVE-2020-25733,0,0,109e189ef190c59a9450ed9da0e65218f7d838e204deaae021d216f01b171854,2023-11-07T03:20:24.463000
CVE-2020-25734,0,0,3f59d4d29c83c5054ee354b50fd36ed8e9b765e17c7f639faa2d81e1b887e411,2023-11-07T03:20:24.520000
CVE-2020-25735,0,0,b762af2870594db2fbe828cc1b1bccdf29d1535ec31127ffb78a3546589bba77,2023-11-07T03:20:24.577000
@ -160519,7 +160519,7 @@ CVE-2020-5194,0,0,b10abe505d51e0dd31546a82e1770808fcfc83ccc2039cd6bf4f2b226418ee
CVE-2020-5195,0,0,9c455fce4359d8153f54937748aeafb112345aee5f0af6a7b8e8767cf75a65e0,2020-01-22T16:05:31.283000
CVE-2020-5196,0,0,3db9cfe307d6bfad1346143c1c789564b2d8d5344d159cb9a5aa67fdbb48bd78,2020-01-17T03:02:04.857000
CVE-2020-5197,0,0,166ff2df531a2c3cbdaca82b89f8ef39807972f6f515640d1b8fd23f6d803a6e,2021-07-21T11:39:23.747000
CVE-2020-5200,0,1,646570fa5a655321d2cf417655cdf8e0c119a48ff65ec65d5fe4817bca5795db,2024-11-04T20:35:00.717000
CVE-2020-5200,0,0,646570fa5a655321d2cf417655cdf8e0c119a48ff65ec65d5fe4817bca5795db,2024-11-04T20:35:00.717000
CVE-2020-5202,0,0,58d5a304abc62c5752bab4f8c0370fb4da8104106dd134a4298657c13ae8b429,2022-01-01T20:03:08.133000
CVE-2020-5203,0,0,e1337dc8bdfa49ce0c2456a3ce041da4f1de509c7cac9c52fe24e7545d0a8071,2021-07-21T11:39:23.747000
CVE-2020-5204,0,0,970a07d3c1fbc57e57b03667d979c83238f3747c7ddc7782db20f3433fa11013,2020-01-18T19:15:10.947000
@ -186992,7 +186992,7 @@ CVE-2021-47066,0,0,3dc9bcc464a6ab3b776aff0e71a0bea9e097dc1e904059ecf25dd8969bef0
CVE-2021-47067,0,0,47dc1af1626b10fa0dfe5d35f18291fb00286d2fb75fd269bcf3ff5bee42736c,2024-03-01T14:04:26.010000
CVE-2021-47068,0,0,0e9613a6b9e3bad19dd79725e1f65d7be51fb3aae34c56147e089ef00705124b,2024-03-01T14:04:26.010000
CVE-2021-47069,0,0,0baf3689a99afae159a794fa882bbde862d8f0b3a2cedc563e0510d34d3745bb,2024-03-01T22:22:25.913000
CVE-2021-47070,0,1,0584c186d80f84c4146403f3cafabf00a3e7703a9e9eb3500b990094f96b7714,2024-11-04T19:35:01.957000
CVE-2021-47070,0,0,0584c186d80f84c4146403f3cafabf00a3e7703a9e9eb3500b990094f96b7714,2024-11-04T19:35:01.957000
CVE-2021-47071,0,0,b0504ff2034ae0c4cc16202b4cc6e9136ea7ef90af22d96415d8d13f216623a8,2024-03-01T22:22:25.913000
CVE-2021-47072,0,0,cf41cbf231f55b926ec73e3d5eeef7180bfd709e7f8ced7efd6dbec1d429bdcf,2024-03-01T22:22:25.913000
CVE-2021-47073,0,0,55717623a5e4775e6cdba866cbade7342e2c623e9f3852474ccdaf2b36202333,2024-03-01T22:22:25.913000
@ -187114,7 +187114,7 @@ CVE-2021-47188,0,0,e6a6f0a863fd0b932dc358db740d6fc5aa8627c048b64301dfe58213c8b68
CVE-2021-47189,0,0,48f90e1a498dd9395788e85b5b3fb28d93d24e5c08e09370284b300a3f0c6d12,2024-11-01T18:35:00.807000
CVE-2021-47190,0,0,a23b60385bed7997c530e4b41937eadabf6ba2e668fb03ecc615e4ad6df3d195,2024-04-10T19:49:51.183000
CVE-2021-47191,0,0,baf35fc648eda6a3feb39f18a5c99fdd9a75e22cc9f519adf716e800ca27866f,2024-04-10T19:49:51.183000
CVE-2021-47192,0,0,89d68fa7dca3f0424ebac488b35bd95de399854a2ef2e9961be289a4695f3819,2024-04-10T19:49:51.183000
CVE-2021-47192,0,1,3db5176b03ff24d6fad6f0ff6dd21e1052b7b9a503a77cd6316fdc1acd099edd,2024-11-04T21:35:00.850000
CVE-2021-47193,0,0,b5bd1afd4c6a02ca2a2969198c95e4901234c965e7fe433c27281259074364d2,2024-04-19T19:20:07.550000
CVE-2021-47194,0,0,9d895c630c92e9f6689899bad26fd025e53d528730c464a535eea55402e84943,2024-04-19T19:19:16.967000
CVE-2021-47195,0,0,0abf3955e7599b2cc932554806394527386aebc638b6030e9df2f0d084775bcc,2024-04-19T19:16:08.537000
@ -187146,7 +187146,7 @@ CVE-2021-47220,0,0,3b5282a5a78ae38dd9afefd942320359b1e71d1f67c1eff9fa622a893f6cd
CVE-2021-47221,0,0,be4fba76a1b024c941c507f7c354bd8197d5a0317f4df6b315ba3d46d2ffbdb5,2024-05-21T16:54:26.047000
CVE-2021-47222,0,0,3f9a21db77caf7d70e1c4613a3e366cdfeb41cdf8308383b2302e318a16fa064,2024-05-21T16:54:26.047000
CVE-2021-47223,0,0,153ed24456f2781c6911d2f948472f17dfbb988764986042d16c2ec594c0d813,2024-05-21T16:54:26.047000
CVE-2021-47224,0,0,413a390368944d1a7d57d9920709038152923e30f74f3dfe0473afbe34abf5ce,2024-05-21T16:54:26.047000
CVE-2021-47224,0,1,45fbf78f88f3c1f6e1a572a874933a00ef07b077ccabd44c203e1c81a457bbe1,2024-11-04T21:35:01.163000
CVE-2021-47225,0,0,6151b31c9506986be96203f26eb64bee342321c5d48323fdd39dbc88fab43e3d,2024-05-21T16:54:26.047000
CVE-2021-47226,0,0,0ca14def49d58288ccebac9b5ffda959e779c40fe1395292a223b40d99620dd8,2024-05-21T16:54:26.047000
CVE-2021-47227,0,0,d58b6e5d0039e2c73e223660c4806a8199d919f5d02b15eb3b8ec0875620efcc,2024-05-21T16:54:26.047000
@ -187184,7 +187184,7 @@ CVE-2021-47258,0,0,43e5d4398baa884888a6821f1cc44ebd315950a1d75455b3aa6a2b21fe961
CVE-2021-47259,0,0,b94b7bd51459fdf369e8f3e705a39196eb98f20596c79a7966fbe7cd84498907,2024-07-03T01:37:30.730000
CVE-2021-47260,0,0,eed23e4375c3c68601f2520e12d8f67acb43a3edb9de2b59bea4672dc4d46a96,2024-05-21T16:54:26.047000
CVE-2021-47261,0,0,445c6ca2c94ba5191e4c9238eece7da90e5479679202eff4238f40b3a18777b7,2024-05-21T16:54:26.047000
CVE-2021-47262,0,1,a6777b1d4230cf53233c142858d3baca0c76203feaf8ab924d12cb0c66b5d1ed,2024-11-04T19:35:02.187000
CVE-2021-47262,0,0,a6777b1d4230cf53233c142858d3baca0c76203feaf8ab924d12cb0c66b5d1ed,2024-11-04T19:35:02.187000
CVE-2021-47263,0,0,1176196a3698e7937ef1dee9eee1484d93eb714c3bfd1da777cd57ad81e35620,2024-05-21T16:54:26.047000
CVE-2021-47264,0,0,6843fefa1c0dd36dc7cf5ef00b7f0d9e8fededb938b876ac5eaeaf235634eb5f,2024-05-21T16:54:26.047000
CVE-2021-47265,0,0,75030ffadf61bd1ff09d790099186059b18f888a5d9b4f5c6b04efe02cb5e83c,2024-05-21T16:54:26.047000
@ -187272,7 +187272,7 @@ CVE-2021-47346,0,0,8eb04a161f5fad162ddfc9280e0e1e3b031d26e05579e5ffc857ed4840288
CVE-2021-47347,0,0,476f5ddf457ab9d201d314890a9171d1bfa8d527b3eaa192f8b003b5eed33e0b,2024-05-21T16:54:26.047000
CVE-2021-47348,0,0,cbd7050f60b6d34998fac30b0c35a9199cb24117e7667e7c425da37d327e3490,2024-07-03T01:37:42.580000
CVE-2021-47349,0,0,4ad4402aaf6d70e325021bad9c08cbec191db8987ecf72e0d3fe3bdd775d684b,2024-05-21T16:54:26.047000
CVE-2021-47350,0,0,d5e86460d27966602edca07e0c65a354c620e7bea46408470f7fb8cf67d8dc85,2024-05-21T16:54:26.047000
CVE-2021-47350,0,1,ab13144fb5c2f9144ade78305127cf617b36adc2ce77f76bf0d86636b0d7ff63,2024-11-04T21:35:01.490000
CVE-2021-47351,0,0,0870708f6b04076b51d5166d132aa4f23369d1326df0bcd7b65e016994ee2a43,2024-05-21T16:54:26.047000
CVE-2021-47352,0,0,13385803f439a4940e9526eabd221ed2d5b6d783029db932a5596e09f1f1cdb9,2024-05-21T16:54:26.047000
CVE-2021-47353,0,0,1495c4726f0ff0c180f058de7ed99cf8890bd5e69457fbc7e2f9d298e8dfc965,2024-05-21T16:54:26.047000
@ -187433,7 +187433,7 @@ CVE-2021-47507,0,0,291f76395ae66887aac568d8cc45c564db489d66d6c95dfb28df76651f372
CVE-2021-47508,0,0,d5c4490cf8b2bfd12f3d81fa77c73abd0db20eb41ca5f92ab5aaa6e8c70c725e,2024-05-24T18:09:20.027000
CVE-2021-47509,0,0,6c136d107ba034bcd6c5085b26c671ef37be673d06a366c3e2c5934b61e296cd,2024-05-24T18:09:20.027000
CVE-2021-47510,0,0,270627eb232d447cc08f70aff04a5d0568e3059f6c21c73ef6a95c2a2ed08a4c,2024-05-24T18:09:20.027000
CVE-2021-47511,0,0,902d0b87d8d98eef47622e317e8c85f71d9b0841750917ba1cc5e935ca840963,2024-05-24T18:09:20.027000
CVE-2021-47511,0,1,e3d90ab6114d070019d1ef5ff8c0b7af502cde3377475c2be408cd65bff17061,2024-11-04T21:35:01.830000
CVE-2021-47512,0,0,b14ad06ad68acf2737e5e42986db1751275379351190fd9d4d1bd398eb0cd0c6,2024-05-24T18:09:20.027000
CVE-2021-47513,0,0,190d21c68923096a3a47ba6c546ff9c6c8c65c7f04e3fcd0c537382258462ac9,2024-06-10T18:43:58.750000
CVE-2021-47514,0,0,f622f5906c504cfffbbd90f9d1ab0375f794fc4b7714ff336da6d82aee74ef92,2024-05-24T18:09:20.027000
@ -187469,7 +187469,7 @@ CVE-2021-47543,0,0,e10032a4dc5819dab790e96a9c85611aa2456b01789b4c8b320ffa21f2dd5
CVE-2021-47544,0,0,f8ca718ed959197c9021832a7220c2167737a26fe05b58fc21ffd4156ad184f7,2024-05-24T18:09:20.027000
CVE-2021-47545,0,0,f9e54059060dbde4c9be7c93d9de1cad5092e9bea1c8e1591e1b69055c210ed1,2024-06-13T14:15:10.783000
CVE-2021-47546,0,0,8461100e46567c79f5d33fcfead2911dc03544a4ae68184cff44a4e4a055685f,2024-06-10T18:30:20.320000
CVE-2021-47547,0,1,04b64a9a35fc7837f86d56415bc5f41e13d3f173d5499d6ea570c7785f541036,2024-11-04T19:35:02.390000
CVE-2021-47547,0,0,04b64a9a35fc7837f86d56415bc5f41e13d3f173d5499d6ea570c7785f541036,2024-11-04T19:35:02.390000
CVE-2021-47548,0,0,03a8a3877d4ca0ad093bd20ff48d4aebe255325f8becd5edf1b9a31b21d3ffa9,2024-07-03T01:38:08.723000
CVE-2021-47549,0,0,513795ad7a7ea3e427214675d10d84c28c33553bc02366f8eefe4045f37975aa,2024-05-24T18:09:20.027000
CVE-2021-47550,0,0,625b7614680ee2b0447f843771d1b01d412586caa610798634da339105c2afb3,2024-06-10T19:23:10.227000
@ -187477,7 +187477,7 @@ CVE-2021-47551,0,0,eac531d2e05b82c07ff9255b733606dbe0ffe65bbbebf081e70ce81f529e4
CVE-2021-47552,0,0,5d3d5362faf4887dd9c84f934a6fae5b4c1336fd72a4a6faa1165471dbee6a90,2024-05-24T18:09:20.027000
CVE-2021-47553,0,0,321382f7b9e6bf328f90a5b45f80489cf47e5531e7cf08bf3aa8c852a939d4b6,2024-05-24T18:09:20.027000
CVE-2021-47554,0,0,259e8e5707d266118c9c75a97a5d9e029fb1a3d3dd6cc808c2e17bc1fb0e8874,2024-05-24T18:09:20.027000
CVE-2021-47555,0,0,ddb6af1a52c9c27f3fd38e11fce7d3aa2ae7bb7159a89f2ba058f14650e38b05,2024-05-24T18:09:20.027000
CVE-2021-47555,0,1,dbea687f358d747f53976e24b1c5accd67c1a4981e86de5442a25cadb01c4a68,2024-11-04T21:35:02.123000
CVE-2021-47556,0,0,73b9a661d821e5f6057b14dc5f869a594bed1dd54cfb1162fbe957d9812a01b4,2024-06-10T19:23:01.133000
CVE-2021-47557,0,0,2b690ea2b80629f30457b798674a2b8c3b52527880e834329d079b807bf1cf62,2024-05-24T18:09:20.027000
CVE-2021-47558,0,0,7f29cbac039a68882c1c81cdca737471ed988824a0bc634b65fd16dccfd5fc5b,2024-05-24T18:09:20.027000
@ -227451,7 +227451,7 @@ CVE-2023-36317,0,0,c079cfb22cefab3f68143c585133ce4a69cf059be109844f051d6b5cfe343
CVE-2023-36319,0,0,4f2f9b43de4f619c1ecd79d747be40d5cfa224891e28131a7aa2b697e390ee2c,2023-09-21T13:20:09.453000
CVE-2023-3632,0,0,c0b2e40cbda3f2ee6107fd6d29665ee1a2dc274485d787cec90bc7cd79e0d9ec,2023-08-16T08:15:41.550000
CVE-2023-36321,0,0,3a757d1927b56aa55826750e72e53ed68bd81a53376818344594d48da7b7b82d,2024-08-01T13:44:06.490000
CVE-2023-36325,0,0,34adff3c3e012e8498345f808977d87a66a8a4c562ffe7dfed842240789cc82b,2024-10-10T12:51:56.987000
CVE-2023-36325,0,1,ba9c6f0e4fbf82defb8140fe306c9cd5ad64fd33dd0bb120e9858e10ef3927ea,2024-11-04T22:35:00.740000
CVE-2023-36326,0,0,ded9eb90a8ff10548777c4348acf8633173a5fdf3caf961f9c4181c6b713fc5e,2023-09-06T00:04:24.377000
CVE-2023-36327,0,0,7eeaf1acc33373866f4ef20f13e035096e985e7a884ec7a542b5579b42a728cc,2023-09-06T00:05:15.863000
CVE-2023-36328,0,0,2bcddcad90867d8da646da5264dfa03e8941e4a150d5759638d15ecb3a68202e,2024-03-07T17:46:02.277000
@ -234135,7 +234135,7 @@ CVE-2023-45285,0,0,77883aa881bda99f1d19ba35b11a9a1e8caee32118b6c24da9d7ea21930a3
CVE-2023-45286,0,0,d44939332093de0621571dd50fbbf72433dd32913bd42846a1498c4ee2848685,2024-01-04T19:15:08.737000
CVE-2023-45287,0,0,d2da2c58b3609253e3286b1b93fa0d97abe9bcd02db4f7cc4811b975b121f7c4,2024-01-12T14:15:48.310000
CVE-2023-45288,0,0,82bba28c8566833be940e806bb1e2ff38edb61bcc7c1e4542d16b7cdc8317f67,2024-08-26T21:35:02.457000
CVE-2023-45289,0,1,5b9af44f5fb05d5fd02cd2106e16283e6766be9cc8c8184692f272ca138dc067,2024-11-04T19:35:02.600000
CVE-2023-45289,0,0,5b9af44f5fb05d5fd02cd2106e16283e6766be9cc8c8184692f272ca138dc067,2024-11-04T19:35:02.600000
CVE-2023-45290,0,0,f22fc13bdae5e6edab97f7e0fddab9822bb3ae91388d56c6e1d234cdc0e49b4d,2024-05-01T17:15:26.040000
CVE-2023-45292,0,0,9325e9e3b78b777445115a8da3de2cb25249d0f8ef4a9d3921e74e58a0d0d777,2023-12-14T16:26:54.007000
CVE-2023-4530,0,0,eeb9daf8b96668373bbb47227634f4b43c799c25d28cf12757e3af97741f4f52,2023-10-11T17:19:19.627000
@ -235288,7 +235288,7 @@ CVE-2023-46836,0,0,f5ce4ff90551bdc127de2610cb54770c0ee6eeab88d256f3d330df3bb8f0a
CVE-2023-46837,0,0,235eb49f4a5cfd2303e4d9fe86113f4253281fb598c82093310061fdb70ca753,2024-02-15T03:15:34.683000
CVE-2023-46838,0,0,e55342ec982796174c93d42f4d3441b48151cf088d830e6cc56db632a8572edf,2024-08-27T19:25:43.650000
CVE-2023-46839,0,0,ade13f3f4236efdd37ffe784525b46e44d60393bacb2fa119614ea207b8ebc1e,2024-03-20T13:00:16.367000
CVE-2023-46840,0,0,e2c2a3f07287623c4942310cd62ca252a9987076f8c6ae079ee3034faa28627b,2024-03-20T13:00:16.367000
CVE-2023-46840,0,1,3cefb363098374cb1a0dbf2fc4113f6b73680a4ea6b95bd6763077d9e17a3230,2024-11-04T22:35:01.860000
CVE-2023-46841,0,0,69de2292f7b0165df885056be3cdde071d60eea027dc1314d310f07d8d34f1e0,2024-03-23T03:15:09.740000
CVE-2023-46842,0,0,146be54706ee3606fe0d577bb9f29c8faefa1499d8598a34577d5ae58ff57434,2024-05-16T15:44:44.683000
CVE-2023-46845,0,0,48a4a3963c5d9a1075438d9ede53ec2921256cff2ac8df6833bec0acc65592f9,2023-11-15T15:21:57.587000
@ -237568,7 +237568,7 @@ CVE-2023-5004,0,0,e9c8d000c46a971371653c9299f9477c1d350bcd7ede26af818f1f3cd6a6fc
CVE-2023-50044,0,0,c9dad549cf95cdf6f6a82dc7c47870e6807ae3192bcaf46f220bb6a3fa47ca36,2023-12-29T00:15:50.170000
CVE-2023-5005,0,0,745cb1ab76d83a3107371edfdd319096e1b6d1d025dbda4b9d241b022cb9185d,2023-12-21T19:25:31.277000
CVE-2023-50053,0,0,9b450f039e219e8c0dc6b5319645fc133cad473316e16f22c0a481e9974339ce,2024-08-01T13:45:22.157000
CVE-2023-50059,0,1,02f0d37d833c83270aef100f2afd20fdbe702668e721150206666eba9d2f5d78,2024-11-04T20:35:01.547000
CVE-2023-50059,0,0,02f0d37d833c83270aef100f2afd20fdbe702668e721150206666eba9d2f5d78,2024-11-04T20:35:01.547000
CVE-2023-5006,0,0,21d14cc4876f8cc1a801d8b8c70a50bf2886311fb727493df0ced96b6e0ba142,2024-01-24T17:16:48.267000
CVE-2023-50061,0,0,233fe17f839b0e8ef7a1099d37a8dbf5d9b685d75def71772f132a905686000f,2024-08-22T19:35:08.363000
CVE-2023-50069,0,0,d5b56f504dfc9456d663c793e6af0eeee24a43c49c91c208a5bdce7a8736c014,2024-01-05T23:08:29.450000
@ -238820,7 +238820,7 @@ CVE-2023-5205,0,0,b69f37089db22b12f4214cc9f8a6664b76f8ae791614a71f308741a98961cc
CVE-2023-52059,0,0,0016757ad0c8c5e292c8d6de754d386680126fb24aa8899c4ed395170c5f6803,2024-10-04T16:51:20.313000
CVE-2023-52060,0,0,10d04b0fb69a380e5645fa0ec83c2959fc511b0d1bd5963b639f55d35d913fd4,2024-10-03T19:58:19.037000
CVE-2023-52064,0,0,2e6eacf3122e193934b8e5026ba3d667018aabe2b15f00e378d2dd371a1d173e,2024-01-17T21:08:45.903000
CVE-2023-52066,0,1,85402deace46f95bf508292308a27b3aaa2bf7f39ae66e341406df5f594363f6,2024-11-04T19:35:02.827000
CVE-2023-52066,0,0,85402deace46f95bf508292308a27b3aaa2bf7f39ae66e341406df5f594363f6,2024-11-04T19:35:02.827000
CVE-2023-52068,0,0,9738fbe2996c9d736286f8e78dfc9c20ccebb2ce66b7bbc56f1565006d5c4c29,2024-01-22T19:53:08.497000
CVE-2023-52069,0,0,ad23cadb3859f85a66031ccd7a898a641dcf7c2393a905b66159386dbb4d3689,2024-01-23T21:41:02.097000
CVE-2023-5207,0,0,27de1d00636be1f83fc1921e6c08668bf71abfdb23dc6eb68c14d9a95ba3c956,2024-10-03T07:15:23.347000
@ -239168,7 +239168,7 @@ CVE-2023-52477,0,0,efe2f5528fad5a77ed7c9d16cf79090652ba25f88c0384442b12b40db626d
CVE-2023-52478,0,0,068097b3c13a30c208b5d211494ed7aaf6a7f9fc35695f62f8ac60e5e2f6fdb4,2024-02-29T13:49:29.390000
CVE-2023-52479,0,0,bc49728c5dbac438d554a85beb665991e321a7f58d6bb98d8ea717a0d121f494,2024-02-29T13:49:29.390000
CVE-2023-52480,0,0,2329da01f12ebb4b23076c653c8e17a2ab7add15aadb16cbe58fefc1bb16dc60,2024-02-29T13:49:29.390000
CVE-2023-52481,0,1,13e0d99d5be86e579f2e4a651dc1cf50d114a581aa3d9bf867a5254db7e01289,2024-11-04T20:35:02.537000
CVE-2023-52481,0,0,13e0d99d5be86e579f2e4a651dc1cf50d114a581aa3d9bf867a5254db7e01289,2024-11-04T20:35:02.537000
CVE-2023-52482,0,0,8e7120a407feee69d888ab8d409801a9cc2911c8130d47914d6a778dab36d389,2024-11-04T13:16:34.130000
CVE-2023-52483,0,0,2ae4ab70118f65a957b47b0238eee6990f9676ca82bf320c1c4eb1ef04aaeb62,2024-02-29T13:49:29.390000
CVE-2023-52484,0,0,cad4d37ff955036544d9c11417bd9d68e192b5a6438cfcc5ad47e9adf8a1ff38,2024-02-29T13:49:29.390000
@ -241464,7 +241464,7 @@ CVE-2024-0011,0,0,871bd2790e1644ed9a3dece6c89b7131ea036c72c23f82726bf2a5f6003f50
CVE-2024-0014,0,0,57b1d977bcf36a4089ab5ef9c9905bf2b69a9e66b00e8c3e91bd20eccc0f8b75,2024-08-26T18:35:03.770000
CVE-2024-0015,0,0,00e8b369d8c884be684dc161c3d8d59320e06337f56989191711b768cfe02c9b,2024-08-28T17:35:03.353000
CVE-2024-0016,0,0,07b99aa38f7f021ca30f24587ae8679400297ca98f5e8da8ccc928cbae430ba9,2024-10-31T15:35:18.640000
CVE-2024-0017,0,1,14eb641628890f648788a425e3e5a78e490af46ff0390af32867dbcd0985ceba,2024-11-04T19:35:03.033000
CVE-2024-0017,0,0,14eb641628890f648788a425e3e5a78e490af46ff0390af32867dbcd0985ceba,2024-11-04T19:35:03.033000
CVE-2024-0018,0,0,eb1e6beb7617de808c00f24002cfa4ad37cdeb05dc3559f2748a83507aca8f33,2024-08-15T18:35:05.293000
CVE-2024-0019,0,0,99addb01bdd59dfa56c3bb78510b54e791e3b9af747d8108035ab5d4ed5b10b6,2024-02-16T21:39:50.223000
CVE-2024-0020,0,0,e73ca517c90039568523c56c44f0cf8b451388b3358b22e01f666a71e39cd157,2024-08-01T13:45:54.660000
@ -242376,7 +242376,7 @@ CVE-2024-10033,0,0,e2a4855e02c8a9aa5aec00750ec89db4d8c9b23a9a547fcb7ea42ccd4625c
CVE-2024-10035,0,0,e1bab51809ac69fa5c75a2d897691dc0f5acda7e478ad5d8b743b12fab524013,2024-11-04T18:50:05.607000
CVE-2024-1004,0,0,be9a3a60f238fd673f4d3f1f166af1f9400f4582d193359c16f232ef2b1c02fa,2024-05-17T02:35:09.263000
CVE-2024-10040,0,0,7b56aeaf06debaabcdf1e140476d580d2600dab38558a586b77601e247b0f5d1,2024-11-01T18:26:23.450000
CVE-2024-10041,0,0,51c1a91c4f22ee214c5dcda807542750d47d7e85f524ab1da7d13a157020a726,2024-11-04T17:35:09.270000
CVE-2024-10041,0,1,bc97b1f0a7eb4420b570fcec2b3ff9bd8baa184700ca89e13f76151cb5ba6af3,2024-11-04T22:27:02.877000
CVE-2024-10045,0,0,a817f3402cf6055b1a750108ad8efeb9be1dc186e8fac94b1b8b513bcc47b228,2024-10-25T18:52:30.337000
CVE-2024-10048,0,0,753b7b10384148568802076e97b22f964c12e42cf7a3108618b3a771a6303c01,2024-10-29T14:34:04.427000
CVE-2024-10049,0,0,885c4f58797b80385cdce80d924e46fe2b372795dfe14e40121472290c664142,2024-10-29T14:49:04.463000
@ -242403,8 +242403,8 @@ CVE-2024-10092,0,0,96aeeb96773a5c0a6e4e68b9196f2f369ac89a58107c1085bc8eadc272cfb
CVE-2024-10093,0,0,94a330c294b313c7705272073b44baeb2e1acc1449e78c4e0c252c7b91c53316,2024-11-01T18:07:07.003000
CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615abb6,2024-10-21T21:03:53.647000
CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000
CVE-2024-10100,0,1,f9d8653b0b809755807a27c91859fa59733e823c9baf33fbd9ba6460baccb9d4,2024-11-04T19:15:05.297000
CVE-2024-10101,0,1,e3896c5d7db68c5b786b00b58edff142c65dff97c0f85c49d64d1701e59c4a4a,2024-11-04T19:15:05.527000
CVE-2024-10100,0,0,f9d8653b0b809755807a27c91859fa59733e823c9baf33fbd9ba6460baccb9d4,2024-11-04T19:15:05.297000
CVE-2024-10101,0,0,e3896c5d7db68c5b786b00b58edff142c65dff97c0f85c49d64d1701e59c4a4a,2024-11-04T19:15:05.527000
CVE-2024-10108,0,0,f3f4ad009417795f18debc95373d890db3250e635fff4006fa4ef1bc9580626c,2024-11-01T12:57:03.417000
CVE-2024-1011,0,0,a83b664837c33e7f0f4cec42868f7bdd93765cacc9e6b97b43804e8b07af65f2,2024-05-17T02:35:09.987000
CVE-2024-10112,0,0,3a01d2baa33f19e143abe5aabe181ccab32faac99effca8d7325142fe7220a64,2024-10-25T12:56:07.750000
@ -242500,9 +242500,9 @@ CVE-2024-1026,0,0,e127bb5d00442b36eed0e6ff6513a3a42c45706876a3a5f2167365447fb898
CVE-2024-10266,0,0,c93db2a67de792a64ad3b8f3ae10accf6f21ac600e94cc18aca994ed95268502,2024-10-29T14:34:04.427000
CVE-2024-1027,0,0,7cdd04f65f65ce162dee4b0e860b968e4c1a6b7f21d53e978519c8259363a858,2024-05-17T02:35:11.427000
CVE-2024-10276,0,0,913e45b2b0c4a67a031924d52b79fd99196e0bfd1eaceb610aead0724000ee9a,2024-10-29T18:15:05.140000
CVE-2024-10277,0,0,045d19cabcb46c520338d26403e49aad7248792b4dcb1c61a9bb40526760fac4,2024-10-23T15:12:34.673000
CVE-2024-10278,0,0,56ee6a4da4de5c0e9a8258a03df3a3a9b6b90c37d9c7631850f400938a22db00,2024-10-23T15:12:34.673000
CVE-2024-10279,0,0,e64edd41252858e04d752ad843858b5ee1ffab4901d78e52b3de9d4b7b86a8b2,2024-10-23T15:12:34.673000
CVE-2024-10277,0,1,5633b0a41069f99639d6b8d0da0073d4b799e83ff36f803e05de4f861ca0e809,2024-11-04T22:13:13.207000
CVE-2024-10278,0,1,c9cbd5b0d1959e5b852835b7c2d60bfafc6010c2ef6b05ac61999b047c308cd3,2024-11-04T22:11:53.397000
CVE-2024-10279,0,1,c459f3c486eb7911256529f3f9f8fe5235406769079b9004ab1b5560b431402a,2024-11-04T22:14:01.963000
CVE-2024-1028,0,0,e7c94049b8605ccb1520e715a47348e2114f12f58dfbf02bb50626d7afd3f607,2024-05-17T02:35:11.530000
CVE-2024-10280,0,0,80d3551a7846d386eaa7773e34e82873be79fb4129972791d3d9c2f22c644ad6,2024-11-01T14:03:20.267000
CVE-2024-10281,0,0,96f941de80b9e6605dd27180456ff1a7884752f0502e3b6d50c69f446bf67663,2024-11-01T13:52:35.563000
@ -242679,12 +242679,12 @@ CVE-2024-10594,0,0,9f73b176d1fdcc28ef57fb338558f792090b1198ca431d11760ef62758907
CVE-2024-10595,0,0,713412cb3481e40d2727869bbf69e43a9603569843cd3c3208811998499997f6,2024-11-01T20:57:26.027000
CVE-2024-10596,0,0,89ac2005acfd3d8d41d0e2b8aafe285ef55fcb6b50ff7e1417f316fc9317c4a3,2024-11-01T12:57:03.417000
CVE-2024-10597,0,0,ec144bfd42b6ee158eff368d4debef5de7c0bf99a868e7f6dbbe8e6a0cc8cee7,2024-11-01T12:57:03.417000
CVE-2024-10598,0,1,660edc51f4fc2fa9935095811accaae31a6c26005b25bae3073af9a24ccefd47,2024-11-04T19:44:05.513000
CVE-2024-10599,0,1,42ec1e77225c5fd4ca05825fc485c8d353f9da187c3647e655d8a79fac27eb60,2024-11-04T19:44:59.183000
CVE-2024-10598,0,0,660edc51f4fc2fa9935095811accaae31a6c26005b25bae3073af9a24ccefd47,2024-11-04T19:44:05.513000
CVE-2024-10599,0,0,42ec1e77225c5fd4ca05825fc485c8d353f9da187c3647e655d8a79fac27eb60,2024-11-04T19:44:59.183000
CVE-2024-1060,0,0,d653064ebc7376d659eeceb53018669b809b93fa1e3915db85367d79da8fa5c6,2024-02-05T20:49:55.413000
CVE-2024-10600,0,1,5afdca71a2cfc04818fc875bba0d0eff7c59f59939a632712606dbeb7be81101,2024-11-04T19:45:26.723000
CVE-2024-10601,0,1,91a7748f7ab8196cb0c18c7002e72eb09e5cd397974ceca74dce38f93ac7cb73,2024-11-04T19:45:45.603000
CVE-2024-10602,0,1,04e1f27ef7f15379bd08987a24eacd4e8204618250984eba6d7aa4f620cd7386,2024-11-04T19:46:22.830000
CVE-2024-10600,0,0,5afdca71a2cfc04818fc875bba0d0eff7c59f59939a632712606dbeb7be81101,2024-11-04T19:45:26.723000
CVE-2024-10601,0,0,91a7748f7ab8196cb0c18c7002e72eb09e5cd397974ceca74dce38f93ac7cb73,2024-11-04T19:45:45.603000
CVE-2024-10602,0,0,04e1f27ef7f15379bd08987a24eacd4e8204618250984eba6d7aa4f620cd7386,2024-11-04T19:46:22.830000
CVE-2024-10605,0,0,c315ce550a5a02f0527765642dbae87c4523e776fcb8c12a6fce2fe76cbae215,2024-11-01T12:57:03.417000
CVE-2024-10607,0,0,d4f1d535c87507c67c7a41b6eff84066fe8858ae73b9785b0d4652d99a74edf2,2024-11-01T12:57:03.417000
CVE-2024-10608,0,0,bd2102b8a140839a55ce6e1f5830b17a43f862d7a5baafd4d8f33b660692c0cc,2024-11-01T12:57:03.417000
@ -242708,10 +242708,10 @@ CVE-2024-10651,0,0,4020d234a4dc20eeefa40d62db04df21d3fc130e9d8122bd0290808c2b4b1
CVE-2024-10652,0,0,e78eb78c66337c771ed734884436ae7db011d1841627efa41acd490150897405,2024-11-01T12:57:03.417000
CVE-2024-10653,0,0,1b2d26feb706600b9c41b1333f6a03988902fcf9ecda5a5dffeb928661e3db01,2024-11-04T07:15:03.743000
CVE-2024-10654,0,0,b71e1c46dc877d6506cd8226e7a3f6003b53c0e286f8e1e5ecb474e19ec184b8,2024-11-01T12:57:03.417000
CVE-2024-10655,0,1,4a39173efe85c13de7825496903f8eabd930fb258764390bce3ef665db358080,2024-11-04T19:47:40.207000
CVE-2024-10656,0,1,18b5e609f97649677e5109dc16530200dc01ab85577b2f860b138b1af32e903c,2024-11-04T19:47:22.733000
CVE-2024-10657,0,1,5aa26720310b42db2ea6ef4889360ebeb3fd6b29f11acb0fdb3b6096a49be1ec,2024-11-04T19:47:03.377000
CVE-2024-10658,0,1,e9d9b236f839d9847378b01f43925f95cb3b7a9d36c15ac46bc9d52dc81aefc3,2024-11-04T19:46:45.707000
CVE-2024-10655,0,0,4a39173efe85c13de7825496903f8eabd930fb258764390bce3ef665db358080,2024-11-04T19:47:40.207000
CVE-2024-10656,0,0,18b5e609f97649677e5109dc16530200dc01ab85577b2f860b138b1af32e903c,2024-11-04T19:47:22.733000
CVE-2024-10657,0,0,5aa26720310b42db2ea6ef4889360ebeb3fd6b29f11acb0fdb3b6096a49be1ec,2024-11-04T19:47:03.377000
CVE-2024-10658,0,0,e9d9b236f839d9847378b01f43925f95cb3b7a9d36c15ac46bc9d52dc81aefc3,2024-11-04T19:46:45.707000
CVE-2024-10659,0,0,3d4100a5014ab3e38ed7d92229a30de2a57befe7b3dd0753fd233294ddd14e70,2024-11-01T20:24:53.730000
CVE-2024-1066,0,0,7cd919bef6acbf4a1ab59632c47efb8ac6efc2d2c9f422a5fc3bf23611a0e27a,2024-10-08T19:52:24.017000
CVE-2024-10660,0,0,f886943977b519a7bf6536209b69c1f1829a6f26fa045720745e5c1a9b2bccc9,2024-11-01T20:24:53.730000
@ -242768,11 +242768,11 @@ CVE-2024-10761,0,0,e55627ca0aefeb59987656a92ae2fe0920723534c3676e4833cbe2ebfab1f
CVE-2024-10764,0,0,ec3f49d125cf2e2f9f040e77955c901db8d4fc081c2a5a3c578e4d10b68b11ee,2024-11-04T18:50:05.607000
CVE-2024-10765,0,0,f94f39587334d404980a388e9dfd9fb9115fae8b2ac1d9ff2a13bbe026583b18,2024-11-04T18:50:05.607000
CVE-2024-10766,0,0,1b1319bb6e0bee622c046653104b00240692805524f9a93d49c4c9f821fef751,2024-11-04T18:50:05.607000
CVE-2024-10768,1,1,aed04b331f848f55e770417e26cef0f008da2fae8f2170b818012b56295c9fef,2024-11-04T19:15:05.743000
CVE-2024-10768,0,0,aed04b331f848f55e770417e26cef0f008da2fae8f2170b818012b56295c9fef,2024-11-04T19:15:05.743000
CVE-2024-1077,0,0,9052c519c4a7de5cf3516fc923116c25b788d5b36a137a2e416fb3d37403344d,2024-07-03T01:44:58.330000
CVE-2024-1078,0,0,88568fa2f20f5ea8de25fda48576808429bbc616448df571a879f056db565620,2024-02-14T18:39:51.437000
CVE-2024-1079,0,0,0a964f4e43e1a2d85a40a4753c5354fe293facf65d0ebcc06031e68ccad95a0f,2024-02-14T19:33:09.977000
CVE-2024-10791,1,1,cb043225edc618ea2693a51127808443f4accc3588a4d0ea0e9750587123f32a,2024-11-04T20:15:04.580000
CVE-2024-10791,0,0,cb043225edc618ea2693a51127808443f4accc3588a4d0ea0e9750587123f32a,2024-11-04T20:15:04.580000
CVE-2024-1080,0,0,9acdbacec5fb31283e62a6d3f1b1bde4de3af0ce021840a5a12a8cd06719b667,2024-03-13T18:16:18.563000
CVE-2024-1081,0,0,b9ecb327bf229081db54279065262fbdf204fadb84142fe6a647ad5480db67c8,2024-02-22T19:07:27.197000
CVE-2024-1082,0,0,1a3a3ef85a9a06621291f657b27812f6a6be683bc843b0137ba9e53485eee330,2024-10-17T15:46:44.327000
@ -245088,7 +245088,7 @@ CVE-2024-21722,0,0,a86fb4d95ec57288d080d9ff105ac4d713cb82e6d029a4568b198925539ef
CVE-2024-21723,0,0,c123a68ae41218e084e71266e368c668840ae873b9865a9853aeca12024bce7b,2024-02-29T13:49:29.390000
CVE-2024-21724,0,0,13cf7200241cf795a2ddca2e0396bacd352639744079d295d3483718d273f60f,2024-02-29T13:49:29.390000
CVE-2024-21725,0,0,ebdabbe1fa288bbeb81a276a125f761859acd9172475efecd68ff4e2c004f13b,2024-10-27T02:35:00.563000
CVE-2024-21726,0,0,6323b2b43ac337f244a115fea0a0997a8ee4d7e666452b5dae48b4ac07f1f7fb,2024-02-29T13:49:29.390000
CVE-2024-21726,0,1,258e12429393fbdcadf90bc903b6c4eaa784036f8d4a014cbe225655bb0298a5,2024-11-04T21:35:03.690000
CVE-2024-21727,0,0,2cfa1a63a24a03456c625f31f74d2ce885912143f39c319c4ec56855c86f3f44,2024-10-29T19:35:15.020000
CVE-2024-21728,0,0,6d3de60c64db99ec16689d15b3a09c6273756d73ea66742792a8ee295b84ce4d,2024-02-16T13:38:00.047000
CVE-2024-21729,0,0,69b41949a5d8ab5958e5ae8c193456700a1a795d0620b2c7e7a56d8ac77a3347,2024-08-16T14:53:59.690000
@ -245822,7 +245822,7 @@ CVE-2024-22725,0,0,5fa379724d5fca6a5a451858a4ba6ac34ebc02b0c57c2f76559d231c12c11
CVE-2024-22727,0,0,21f0a699093390ba1d8ee3a22a8e6961dde2045354957e98f8b2db244c882256,2024-02-20T19:50:53.960000
CVE-2024-22729,0,0,768bb63a8e628d1d5ad8c32ce479e7ef65e430464c818e272a86590502c0053a,2024-02-01T15:15:34.173000
CVE-2024-2273,0,0,0a70a78279025f010830c200ec41c70db1b0b3c6a90f640b7fd5d17983a65e86,2024-05-02T18:00:37.360000
CVE-2024-22733,0,1,5ffc84c54b1133a58773831b099651e00af398e2efc2f99a6ca9461a3d33c96b,2024-11-04T20:01:12.483000
CVE-2024-22733,0,0,5ffc84c54b1133a58773831b099651e00af398e2efc2f99a6ca9461a3d33c96b,2024-11-04T20:01:12.483000
CVE-2024-22734,0,0,a3491dcc3c7b5d449a7e86cb6408877457dffcd3f57d3503ef629f53a0b65b58,2024-07-08T14:17:29.360000
CVE-2024-2274,0,0,6fc96400c211578866c6c22eea50b1789a75c82b773ece131b3550b25233611e,2024-05-17T02:38:08.363000
CVE-2024-22749,0,0,bc8737d9438d776e0226ec03871efe6a0159338bddb3aa6ecadc564f1611c479,2024-01-31T18:01:59.017000
@ -246091,10 +246091,10 @@ CVE-2024-23239,0,0,17a811a7a40ab6626263a25969f3b0683f14fcd51c6df6a2a6c4fb1d83529
CVE-2024-2324,0,0,a32ac9b03f44a6b6199f75f2e494024d5620e1a8d468eb3441202d4c5501e3ef,2024-05-02T18:00:37.360000
CVE-2024-23240,0,0,497e30da1de753eb5948327cba1061ca7bd974bb0b6e982d8b68d5fdfd0d0084,2024-03-08T14:02:57.420000
CVE-2024-23241,0,0,c5a768451bd1e85db3c39139e6a6ab2856d36214932ed6b230453a123731e8b7,2024-03-13T22:15:10.003000
CVE-2024-23242,0,0,95631f167174ef115c9c95938ba9ae61f1f0294242d6095fc64b03c429b051d7,2024-03-13T21:15:56.410000
CVE-2024-23242,0,1,aaecde8a798ca776b50091eab43b4c20fea81702419ce910fabce080cf53ec16,2024-11-04T22:35:02.393000
CVE-2024-23243,0,0,3b35a30cb124f0b586652130bcd66797855bcd6efb290e087afdb4d7fffb3adb,2024-03-13T21:15:56.460000
CVE-2024-23244,0,0,24e1f39ea8345f9beebd2c960d56e2266341c33ce47de81803c5b5c5ff8fbc8f,2024-08-28T16:35:08.747000
CVE-2024-23245,0,0,3ef3bab1c68decbc207b88786c8ec7e903fe6be44e3bdef049351a5b3b76ec4b,2024-03-13T23:15:46.520000
CVE-2024-23245,0,1,101d7b866eed02e86ebd84557a1282b5cb9bc6d29a5271f7e19a7ee3c96cb84e,2024-11-04T21:35:04.100000
CVE-2024-23246,0,0,a3f6288a4dec4e6b98e18e3dcc2273527c942df80239f6227e94a0328a431f71,2024-07-03T01:47:40.097000
CVE-2024-23247,0,0,d5698b79b28caabaab0fed7a322a63e6d266c688aa3ae5f6b0f0f62214304bc8,2024-08-26T15:35:04.747000
CVE-2024-23248,0,0,c6580627d980adaa3f84f2190835feaa8367986dcf4cd0997d62805a89d20fc8,2024-10-30T19:35:08.687000
@ -246361,7 +246361,7 @@ CVE-2024-23557,0,0,4270afce746443b5193815936f76591ad043b307043acbde73eb7ec4d54cd
CVE-2024-23558,0,0,1aaffec8c09fd69e12702b79a89a97fa66d8cf8050a73827a56fcf9396bca5b5,2024-11-01T19:35:15.123000
CVE-2024-23559,0,0,1cfe950943db323f850a4ffa6fa09a9e594439fd864c25048ffda399bb0b3e4f,2024-04-15T19:15:09.577000
CVE-2024-23560,0,0,e362890ddaf504fd7ec860643e0e2bcce74ce536f1ff64f240f88b9ed03a4aad,2024-04-16T13:24:07.103000
CVE-2024-23561,0,0,bcd9227766d304795ee303f29e84a1fe0441cf6abc456f3208c29472cf08888f,2024-04-16T13:24:07.103000
CVE-2024-23561,0,1,05ce6bff2b3c083c40d1cefd8ecfe83b9e8bac92f3576a18d3243c6c46e3bef3,2024-11-04T22:35:03.360000
CVE-2024-23562,0,0,4d517ea8a2763e5506a865d21e69db429e3d16d2d215329e0568829328a2181b,2024-10-23T23:15:12.397000
CVE-2024-2357,0,0,58f4675a1a89325da5d3ee44283ebc42e89a0cdd69475172a4baac455a4ffac1,2024-03-23T03:15:12.690000
CVE-2024-23576,0,0,adfa1bbd41df2580fc9b0c7a87cd6221bc650972fa1b63f1cdf4b78644242d49,2024-08-01T16:35:05.990000
@ -246962,7 +246962,7 @@ CVE-2024-24539,0,0,ea2b06118fb4ab0dda0a5c17a6d492fd01d3bc7dfa939af9055cc4352c7ac
CVE-2024-2454,0,0,c3abdbdc4c03ce442d9698003ff8b7b916836453e928376d3b534ebef9e7432e,2024-10-03T07:15:29.810000
CVE-2024-24543,0,0,6385de143d1b0b1fdcac1d167b2fcd059d27448a1d2af20c5a3fd2632900f66a,2024-02-14T17:13:32.827000
CVE-2024-24548,0,0,b2630c3d24a789753fdaa109f39bed000429d845fa16c1ba7d96c172523068ec,2024-07-03T01:48:20.620000
CVE-2024-24549,0,0,f5a15fcd5d9acee072cefdba50b124ee1362445c36c6cff50be2ef6d7391ffe1,2024-06-23T09:15:11.213000
CVE-2024-24549,0,1,e0cb1775866ac8f49af5b075bad0d8f00fe5247b05cc2c6f571fccc8eab4a31e,2024-11-04T22:35:04.083000
CVE-2024-2455,0,0,3cc0f9fdc9468fb27389ba133379c86897b93cf96dc0807e412017bc8c64c264,2024-08-01T14:04:01.833000
CVE-2024-24550,0,0,91eff862acdcc27750c50b47ce447c3c9c3416434f24687f7378afff1f649bd4,2024-06-24T12:57:36.513000
CVE-2024-24551,0,0,41b8feea4c57aca430d02394b62e3944b862a79d0fb8a08429e306b869ff2908,2024-06-24T12:57:36.513000
@ -247360,7 +247360,7 @@ CVE-2024-25079,0,0,747dcc74f114c461c43dc15d8c7262cc52b3ea0a47dd0c2658850379b94ea
CVE-2024-2508,0,0,5f5b90c70383af5e74076ecfe442ac5d6b537a3785081aa188cda0ddf04bd81f,2024-07-31T12:57:02.300000
CVE-2024-25080,0,0,ac2a1dea63d0c6616a8817d8c9857da421c3824981ab86a3e448f029507a2e2d,2024-11-01T19:35:18.183000
CVE-2024-25081,0,0,8447758264e474cd1c8516048ae8770433feeb45ecce33ffdf5df19305ed1ff9,2024-08-27T19:35:13.260000
CVE-2024-25082,0,1,e037d2c10f0e82add3e0b0236d3b6431278477a525fab3979ccbeb71c8bddda3,2024-11-04T19:35:04.633000
CVE-2024-25082,0,0,e037d2c10f0e82add3e0b0236d3b6431278477a525fab3979ccbeb71c8bddda3,2024-11-04T19:35:04.633000
CVE-2024-25083,0,0,82140a5a06672843cc06d8c49a45d2786901923a23d988718119cbf0cb5278eb,2024-08-28T16:35:13.370000
CVE-2024-25086,0,0,d7f7d87d6cdc4c934f4645f409f9d6ad95bc0b43a7473acdcf85c7b382132abe,2024-07-08T14:17:42.020000
CVE-2024-25087,0,0,d0eb5bf250014d4733c8c2cd43475d3db0483672bd5d42f237e7c0898368e6b0,2024-10-30T15:35:07.993000
@ -247958,7 +247958,7 @@ CVE-2024-25969,0,0,a2d227b0b86b4325c26bb6f673bbdc8a7ef141703ec468628c2766b328aa9
CVE-2024-2597,0,0,614f461cf5a32e6e3c045095423c1ac446116226b22d5334101b749199de8efc,2024-03-18T19:40:00.173000
CVE-2024-25970,0,0,f8b7303cc0abe87ee106240dccbd738c35db8e13a2603b08d62839897cd5a5d6,2024-05-14T19:18:31.490000
CVE-2024-25971,0,0,d03bf655e7e0d5dbf73b6beff3280dcd3ab38f529872aed84cb4a267414cdc66,2024-03-28T20:53:20.813000
CVE-2024-25972,0,1,f562429727244ba83adab7ab33e6715f66598350a42ffea3de89f272c0ae03bd,2024-11-04T20:35:03.760000
CVE-2024-25972,0,0,f562429727244ba83adab7ab33e6715f66598350a42ffea3de89f272c0ae03bd,2024-11-04T20:35:03.760000
CVE-2024-25973,0,0,64b2d7e51fd0c1f6188056368cd8ef177890326c25a57ab938769dde8c643479,2024-02-21T07:15:58.040000
CVE-2024-25974,0,0,12433a6d8e699d155905877ac67441d31fc3219c3906ce3bad9f2bfde8f9f2f4,2024-08-01T13:47:57.737000
CVE-2024-25975,0,0,7575b9d67e4ea045410d7956ad161bd45f31efb1c5194db4cce836637ccacb6a,2024-07-03T01:49:20.510000
@ -248282,7 +248282,7 @@ CVE-2024-26295,0,0,bee0ceea4a2fa9f7b5cd5ca393d32245b0399ff1744d3c1781d7fe4c47055
CVE-2024-26296,0,0,544e1c2c94ce65e70db959ad46d5372fa189de6687abd994a179048ab80cba75,2024-08-01T13:48:05.123000
CVE-2024-26297,0,0,af2dff5c494a25db31e51e78048442dd01fa43e7ea7ca9a2aba52748560b0484,2024-08-01T13:48:05.817000
CVE-2024-26298,0,0,59727460b37052fa0a59faa646f1b3121962ba5c31619135e5630e3a1f8617f0,2024-08-01T13:48:06.523000
CVE-2024-26299,0,1,4af490fcb06c2a0a12f3931f9418f50f8d065e15f235e9b7e567768770556a1c,2024-11-04T19:35:05.457000
CVE-2024-26299,0,0,4af490fcb06c2a0a12f3931f9418f50f8d065e15f235e9b7e567768770556a1c,2024-11-04T19:35:05.457000
CVE-2024-2630,0,0,ec856c27a5c03dd021fb947cb024a63c9409651759234a9bffe340d8fd7b989a,2024-10-30T16:35:14.117000
CVE-2024-26300,0,0,1ac1f21ae9a2403844c235609ee04177577ebeaf725b3bb4b2178b26e2a031f5,2024-02-28T14:06:45.783000
CVE-2024-26301,0,0,19f0f94ed5cbffac086b7363ba9897dc486d991fcb04fba1d0f3db89247a8bc8,2024-02-28T14:06:45.783000
@ -248467,7 +248467,7 @@ CVE-2024-26649,0,0,940fcd7e5d20bc1c18f4c974a09622f0b6b6d87231bbd7408e7118d35c4ba
CVE-2024-2665,0,0,0d168a0d5dbe4804c9bebe4f21c0d1f4a27974809ea172b5979b5dccd55d97c3,2024-04-10T13:23:38.787000
CVE-2024-26650,0,0,c37b82afef74cba8f0a1b3081e8c53c80ac8f73689ed9f1c045183b9566d980d,2024-05-23T14:15:09.293000
CVE-2024-26651,0,0,fb1778dec4aa28736fc803494a7d95d0a4887c74ed91b5258df0fc8bdc4d3968,2024-06-27T13:15:55.767000
CVE-2024-26652,0,1,8d6649d168744efbfe6b62c08e9360ae7602de48e9181fe8c422fe485dc0c24c,2024-11-04T20:35:04.647000
CVE-2024-26652,0,0,8d6649d168744efbfe6b62c08e9360ae7602de48e9181fe8c422fe485dc0c24c,2024-11-04T20:35:04.647000
CVE-2024-26653,0,0,d8aee5aa874cda3bb376f3ce8a5f14e5f03fc79d04d8d093a2467a5582803bc0,2024-04-03T14:15:16.520000
CVE-2024-26654,0,0,d30cf3144176f55463a59233de7c2d22b1a5877071a0f572ada286ee3c4a13b0,2024-06-25T21:15:58.207000
CVE-2024-26655,0,0,e538fefaef2b297407375360bfd7d37a24041d5520688f3409c56615cace1742,2024-04-03T14:15:16.860000
@ -248528,7 +248528,7 @@ CVE-2024-26704,0,0,3f440b7915a84102c31c6ca58997604b072456ac2fdae8caa0bf3d548cca7
CVE-2024-26705,0,0,78b53ae404d02219812b4aeb186b05a7a11b1f5ab2997316c1bbd3060abe82f6,2024-04-03T17:24:18.150000
CVE-2024-26706,0,0,89b4f648ec2b3b26b7668e53c563f37afbde85f99ae0e56fedec5035cd8965f5,2024-04-03T17:24:18.150000
CVE-2024-26707,0,0,0b4632ba7cbb3593b28164a910e817aabff12a96bda4f173426fe88e799fb2d3,2024-06-25T22:15:21.363000
CVE-2024-26708,0,0,30add7bc80093f61aa6ba0466f1b9ab6f422a9ca1d0dfad43551ca60f41aaf63,2024-04-03T17:24:18.150000
CVE-2024-26708,0,1,b7b4fd917032dbfb390eabc8cff6b35f00ba8bfbaca82390ba12fef81251a7c8,2024-11-04T22:35:04.300000
CVE-2024-26709,0,0,db5b445e594837265e4231997ca9ab456eb703993d2f2aecb25185917da73c88,2024-04-03T17:24:18.150000
CVE-2024-2671,0,0,574794b92da1fad69b45dab76d86555ba117f14e94371362986a89b344dcc19f,2024-05-17T02:38:24.070000
CVE-2024-26710,0,0,e030f43a8aa53571f8f35affc42bdc96443cc55f22ceaec1c312b7d16f03bb91,2024-04-04T14:15:09.567000
@ -248560,7 +248560,7 @@ CVE-2024-26733,0,0,646af548b9533cc8bde386b28e554214eab8f2a020503960c0d1f100df49a
CVE-2024-26734,0,0,0eb1b1feddc3c43838ae7b1cbb500208ff685270dbb18f151464783d19bf4c65,2024-04-03T17:24:18.150000
CVE-2024-26735,0,0,7afe0996673efde5a6585f2186b8a08bb5ef98d3542cccab732c4df20b91e8aa,2024-10-31T14:35:12.657000
CVE-2024-26736,0,0,a562229f2b02fc6cec76f3673034e8ce7378dc0d0fc6cbaec0df447d9263eebb,2024-06-25T22:15:21.543000
CVE-2024-26737,0,1,5d630f8ababe5101cb5f2cea2096882f36be8fed2220dc01cee465676a15e40c,2024-11-04T19:35:06.193000
CVE-2024-26737,0,0,5d630f8ababe5101cb5f2cea2096882f36be8fed2220dc01cee465676a15e40c,2024-11-04T19:35:06.193000
CVE-2024-26738,0,0,3ed173e742b2f1ef480700b80fac0353c8315c8c73b558ad6f8306db1c647ea2,2024-04-03T17:24:18.150000
CVE-2024-26739,0,0,3d829b13b19365c48f5d561476965397ebd2e1886563c8f01827db030cd83b2d,2024-04-03T17:24:18.150000
CVE-2024-2674,0,0,f2c8a10eeecd3f969d6af12d88b2654ac020152e56dd763b8a3c5395662fb559,2024-05-17T02:38:24.343000
@ -248660,7 +248660,7 @@ CVE-2024-26824,0,0,34887f560d328b7bba35a6644eabb0ffc96cff74bf520b9ed66b0e71dc5b1
CVE-2024-26825,0,0,c530382651586c6f00e357a62287c33dae2aca66e91ddbf4d033164bb0e5af4c,2024-06-27T12:15:21.290000
CVE-2024-26826,0,0,b96f5bfbf455712c540bd404ccad30ca4bbaa9c3b24bb619ee2f9755485cb6ec,2024-04-17T12:48:07.510000
CVE-2024-26827,0,0,4cc514efbe22ca04935a47f409b758351113d51b04fbbf02df44e27fcf8c06d7,2024-04-18T15:15:28.957000
CVE-2024-26828,0,1,97a54035816ae7398000e031f21c5a1326a47ba614922ea9f997061803eed8fd,2024-11-04T19:35:06.407000
CVE-2024-26828,0,0,97a54035816ae7398000e031f21c5a1326a47ba614922ea9f997061803eed8fd,2024-11-04T19:35:06.407000
CVE-2024-26829,0,0,f8089f48fc5ec0e8590d91d8eb0c2fbd4e11020168517d02c9b9ea2b70df64b5,2024-04-17T12:48:07.510000
CVE-2024-2683,0,0,03d83a8830e046a65ef4d0799c57f1d02403a9d84f74ce05a3e92291cd2a2db1,2024-06-27T19:15:12.647000
CVE-2024-26830,0,0,b998bb99b2690406751770253dbf825292746bb49e7ef9e53a6b25ffa549a608,2024-04-17T12:48:07.510000
@ -248759,7 +248759,7 @@ CVE-2024-26914,0,0,b60bf8a04b17c0ea33f524de7c269b75b58d301f82cdab9a9708a990a2d14
CVE-2024-26915,0,0,3aeea9b3b1040d92e3c4fc19c7e143be80147947903ccfd65b166e36804975a5,2024-04-17T16:51:07.347000
CVE-2024-26916,0,0,2c15e9b6f09b6b6e09b74c13dd3524379b0f76dc583243b6aec1ac31f122210d,2024-04-17T16:51:07.347000
CVE-2024-26917,0,0,cdf4aa661c28bc82e7bbc6e2edd85f7d0ef8bc5794588a496ab874cff6906bf0,2024-06-27T12:15:22.740000
CVE-2024-26918,0,1,ce69ac1622eef6980f6643c9ecfc31fb973f75565e256eaf541cc492bb16369c,2024-11-04T19:35:06.627000
CVE-2024-26918,0,0,ce69ac1622eef6980f6643c9ecfc31fb973f75565e256eaf541cc492bb16369c,2024-11-04T19:35:06.627000
CVE-2024-26919,0,0,f54ec30d2ed3a1e0c74b7edc597cfe6317573675a479d2109cbf5afdc2d9f863,2024-04-17T16:51:07.347000
CVE-2024-2692,0,0,e314c30fd6d02d5324cac765f38a00a3fad84e8e8754a5ba44244d3c13521cfa,2024-04-04T12:48:41.700000
CVE-2024-26920,0,0,4ed01824a69e292270d5ff6781ce9cdf9d386678446143ef4ec96cc3c070ab59,2024-05-03T06:15:09.207000
@ -248784,7 +248784,7 @@ CVE-2024-26937,0,0,33130fd04e0fa99aeccf3a69a79fa96a77ec456d0858750d9a99028babebd
CVE-2024-26938,0,0,96ac3ebb354ca4dfcb1c66c1b68ad4ffcd043cacfbf00b0352d68804b44cf1b2,2024-05-01T13:02:20.750000
CVE-2024-26939,0,0,3127531537fc8434c8a8153e0717ce9c8f7520225ded802370bdb01946c9c847,2024-07-03T01:50:03.663000
CVE-2024-2694,0,0,fad38f23bc41981803e0eeabc9f68c34e5895ab08c006564e735241d1ad99ffe,2024-09-03T15:10:54.557000
CVE-2024-26940,0,1,f34b1c5c185f90adcb50cc6aa19a87b181d6d95943fd7cdf197949bcb6da759e,2024-11-04T19:35:06.833000
CVE-2024-26940,0,0,f34b1c5c185f90adcb50cc6aa19a87b181d6d95943fd7cdf197949bcb6da759e,2024-11-04T19:35:06.833000
CVE-2024-26941,0,0,2a1089d0f00712d14223399449bc2078dc16c4aec3f3fa2e0d76cbb9292aff72,2024-05-01T13:02:20.750000
CVE-2024-26942,0,0,2d57b93ce0dd646b07d92a214c08685384cf52a1b44011b76a4f0a2c97f50567,2024-07-03T01:50:04.523000
CVE-2024-26943,0,0,d0c9c3da8d0f6a05b9cd6130864f51abb4e8d6492319a7d33df6ba0459e34162,2024-05-01T13:02:20.750000
@ -249041,7 +249041,7 @@ CVE-2024-27180,0,0,755d0874d2ed43dddf4f6e3448f6f22c7a827dab259e8383ebb29df952431
CVE-2024-27181,0,0,21e26148840b13fc3c6737fbae62d8da3122fe005206d34756c4a69e36306e68,2024-08-02T14:35:10.763000
CVE-2024-27182,0,0,3745db63e259cb2e1fbe54f15ae0e0f8afab0bc93a91d91e5de7d932d84971e0,2024-08-16T16:55:10.923000
CVE-2024-27183,0,0,73875a696a64d9ddbd95175557e5ab869a14de50e9906db42e11184efe06e929,2024-07-12T17:13:30.700000
CVE-2024-27184,0,0,d27258a08ec723a941addb4bb2a2c30ae14dda17a55ede0aef2dc950361ddede,2024-08-21T12:30:33.697000
CVE-2024-27184,0,1,74abad6e016f98892899d86d623f3cf7d80dc82e5ada3c03a423741f065cd83a,2024-11-04T21:35:04.690000
CVE-2024-27185,0,0,b762b551c83c129a4d40b0942e2ef5f495129c37450126af06e72aba7aa9a55f,2024-09-22T05:15:11.530000
CVE-2024-27186,0,0,f7fe08e5f4b7d5180c79088df80bd67536777321be61e31aba4444583ba7c65a,2024-08-21T12:30:33.697000
CVE-2024-27187,0,0,32158e2082b18c6d5d5bddb28bf354f8353016a3e995123bcfaff2f5ad6259ca,2024-08-21T12:30:33.697000
@ -249244,7 +249244,7 @@ CVE-2024-2739,0,0,f67ee20b2bc2ca284467eaab4487259eaa12927229efc313e4a8f27526c7f5
CVE-2024-27390,0,0,fd939b5a46e3db47e38737677dc08895d4507457dc8c59f804a220890fafa028,2024-05-01T19:50:25.633000
CVE-2024-27391,0,0,c609df1ae4a0d8b672f84b73ef5e4ba82e2a581d1583d7f5330bf8875e22776f,2024-05-01T19:50:25.633000
CVE-2024-27392,0,0,d71bd39d141dc4709bff7fbbc837ba796224bb31c86e71592537c5234c653cf4,2024-05-01T19:50:25.633000
CVE-2024-27393,0,1,a820280c7bba1e95ccdd5f172abf8e004f1adbda93a24cf4bc97141799a16e12,2024-11-04T19:35:07.067000
CVE-2024-27393,0,0,a820280c7bba1e95ccdd5f172abf8e004f1adbda93a24cf4bc97141799a16e12,2024-11-04T19:35:07.067000
CVE-2024-27394,0,0,08a27f4278e90895db869570c2ad1394d2b1b7ce2eebd13c81985e703b3d5763,2024-09-06T14:35:11.027000
CVE-2024-27395,0,0,f509312d757b52ad19fbd73ceeb6a726f1f69fc5206c32a2cd50e6d3c74db34b,2024-06-27T12:15:24.577000
CVE-2024-27396,0,0,e14a9534df6188e2d3948f71aa579b6ff342c8dd8805de92331af3aa294e2094,2024-06-27T12:15:24.647000
@ -249335,8 +249335,8 @@ CVE-2024-27517,0,0,93229684c3b5353b9850f42eea516ead9975e4cc8c949db8afa0cb3684297
CVE-2024-27518,0,0,eee44445b24d086f58ae13c836362c174731b2fe04eb60975982bae1d572cb19,2024-08-22T19:35:18.243000
CVE-2024-2752,0,0,9ac4a8690eeceffd759ff2fb7b55e32f8cb8bb4afb752110bdafa62b8f4bb686,2024-05-02T18:00:37.360000
CVE-2024-27521,0,0,142655bf7422b3c81bdc37fb7ef4329756d07238f339af47f3bda39ff16ed820,2024-08-09T21:35:03.300000
CVE-2024-27524,0,1,08e4bd6ccc21c266f96d6111b83d7d95158b2c7ca600162e7e70631b4fc240b9,2024-11-04T20:35:04.913000
CVE-2024-27525,0,1,e06f7e0695efcbe9bfa15a3ac23251ff54875c477a75b737778895eddfe51566,2024-11-04T20:35:05.800000
CVE-2024-27524,0,0,08e4bd6ccc21c266f96d6111b83d7d95158b2c7ca600162e7e70631b4fc240b9,2024-11-04T20:35:04.913000
CVE-2024-27525,0,0,e06f7e0695efcbe9bfa15a3ac23251ff54875c477a75b737778895eddfe51566,2024-11-04T20:35:05.800000
CVE-2024-2753,0,0,49ae39425f6531deb039d8727a759281a000c2c0b8058f4a13a0491f93794534,2024-08-30T22:15:06.227000
CVE-2024-27536,0,0,c377b0d21fbb5c7de68c4946896ec2f8ec67ef0d39bad02515cbb41c44d1bebd,2024-04-23T22:15:07.037000
CVE-2024-27537,0,0,3cbe9bcef09fe4fba870050d9e0c130363a525b398fa9371487301911d20249d,2024-04-23T22:15:07.087000
@ -251555,10 +251555,10 @@ CVE-2024-3061,0,0,4efd703c3bf27329551bb8c57b6ec5103d42ea334ef6d9361feb4d292b06b0
CVE-2024-30612,0,0,e42904b723a61ee315384c0049851285bcc87d076f88def1dfe4ab911cc568cf,2024-08-01T15:35:11.227000
CVE-2024-30613,0,0,ec7980af57ce21f0caa7be201315bcd79301675671829a9c0350efcb6a7c58e3,2024-08-01T15:35:12.083000
CVE-2024-30614,0,0,70864962c71d46c273106725c973080a3fb9295eb2c95d98fdaa16c813277ea2,2024-04-12T12:43:46.210000
CVE-2024-30616,1,1,c1a6a4c3cc5fd0dcdf0bc13fd82797f8e892fdde1ef891f61798225b0b81093d,2024-11-04T19:15:06.193000
CVE-2024-30617,1,1,337a5e570fc3287a5934dd6ed25da1f8be90c7bdd03412e4cf3fd9e4a4bd3aed,2024-11-04T19:15:06.277000
CVE-2024-30618,1,1,76eb4eef203367820f3c5d1365fb1d7995071f91ca2740b654bd334c85c99889,2024-11-04T19:15:06.360000
CVE-2024-30619,1,1,fe2b48990b749bc87750f991b242da0180f7975b89478992bf2890b8ebff25ae,2024-11-04T19:15:06.440000
CVE-2024-30616,0,0,c1a6a4c3cc5fd0dcdf0bc13fd82797f8e892fdde1ef891f61798225b0b81093d,2024-11-04T19:15:06.193000
CVE-2024-30617,0,0,337a5e570fc3287a5934dd6ed25da1f8be90c7bdd03412e4cf3fd9e4a4bd3aed,2024-11-04T19:15:06.277000
CVE-2024-30618,0,0,76eb4eef203367820f3c5d1365fb1d7995071f91ca2740b654bd334c85c99889,2024-11-04T19:15:06.360000
CVE-2024-30619,0,0,fe2b48990b749bc87750f991b242da0180f7975b89478992bf2890b8ebff25ae,2024-11-04T19:15:06.440000
CVE-2024-30620,0,0,cb2dae6c6270bb539b2166cb7fc038684b4c961f4662350232b399db4e69aab4,2024-08-01T13:50:20.133000
CVE-2024-30621,0,0,c30c1529b2190a6ab334a4d43b23be8a438f3a9728c71ea136b98a3e95653561,2024-08-19T20:35:13.943000
CVE-2024-30622,0,0,9349da08418f3c5641f38670dab1e797cf4839fe3c9959b5e399bf11323db712,2024-08-13T15:35:09.960000
@ -252624,7 +252624,7 @@ CVE-2024-32166,0,0,e117f1f1473eb5a0781f79a5d43c653abcb8b2fa988a11cd3340ec0a690c0
CVE-2024-32167,0,0,915de4b0debb285120767f5ee79a021decbe9afbb3817337a80cac9f827f0a60,2024-08-01T13:51:22.630000
CVE-2024-3217,0,0,dc86fb8c3829a8b9d2e0fd455ded6f7df193be42ecbfecd0ffd8ac89ef8aedfe,2024-04-05T12:40:52.763000
CVE-2024-3218,0,0,cca321349f887cdf01c9c59558600fd5914c251177129598df483266ec0d6bf2,2024-05-17T02:39:47.357000
CVE-2024-3219,0,0,019b5cd63ba6f5c6e50d95982e32c42e466f254734d8401943e335ab92663b2b,2024-10-17T19:15:22.220000
CVE-2024-3219,0,1,d75adb043abf900a830f12369dbfaaf21a90caabc2980fbf9a9804b77e51d17f,2024-11-04T22:35:06.427000
CVE-2024-32205,0,0,b515c22daf534e23184b3e43b254269995ffc71b09793c9a7a083a2ff7d807bb,2024-04-22T20:15:07.210000
CVE-2024-32206,0,0,8cd9c34ce9f7db79af05faf1c051a80ce3416b7ab823e5294fc2704f3b904424,2024-07-03T01:55:51.200000
CVE-2024-3221,0,0,bc74600907433c2d1f49c74b0b5cb8ca05b39c0ecdd1932ffaf2a011380efa9f,2024-05-17T02:39:47.450000
@ -253382,7 +253382,7 @@ CVE-2024-33139,0,0,4dc296ec40d742774c8325154323233da513fffbd0c23d14d8c7c60416445
CVE-2024-3314,0,0,2a6089b9715ccbb2944e67e64444ce430371716aa66690df6a523f92fa13c530,2024-05-17T02:39:50.393000
CVE-2024-33144,0,0,7ce66848bdfdad6c7661c7606415e2d330de485bc612c3cf999a55dbe1be4b18,2024-07-03T01:57:31.107000
CVE-2024-33146,0,0,4baefebe2977ba4ed48c0fb4dc2805a0ffd790dd812293e2b72426874933d1a5,2024-07-03T01:57:31.870000
CVE-2024-33147,0,0,7d23db268c3bdc731a2593ebba8c65a129bad97d294db5d04c45871b0f21b0cc,2024-05-07T20:07:58.737000
CVE-2024-33147,0,1,013021f51d091edc9e62b90439aae5b3f1fef121e283a30b882df74257be9696,2024-11-04T22:35:04.680000
CVE-2024-33148,0,0,a83555d17609f0766452576dea699651fb83f48955debeca15155d2173e305cb,2024-05-07T20:07:58.737000
CVE-2024-33149,0,0,cd385dce8cfe9dabe6c5f72763dc870308b700fe51948946fbdaf204a00dfaef,2024-07-03T01:57:32.207000
CVE-2024-3315,0,0,d4c4bec8a7887aa6179d0d947bd09e1c52add867f368feb0b797beea3673295f,2024-05-17T02:39:50.500000
@ -254116,7 +254116,7 @@ CVE-2024-3422,0,0,5f60b24505b1e7fc45669de7abca6b1144a134b9cac6c7f843eaaa0cb8d68c
CVE-2024-34220,0,0,664ae3f60d9d03fd7e09aca2b3c3f619f12a9aa76b48e9dbe80314480913931c,2024-07-03T01:59:40.530000
CVE-2024-34221,0,0,4fc0fe5a0a7d481229d82414975559b5ce7e394eebb1a6cc6af7f54bf077ba48,2024-10-29T15:35:28.087000
CVE-2024-34222,0,0,c9254aeea26939ed840e05e8449aee7f6267f0c74101a29fff26f90fc72a21b5,2024-07-03T01:59:42.050000
CVE-2024-34223,0,1,00e725fc833985ae31ccd463ca116c24e214083756cb7b09e0d3b38167c9cd28,2024-11-04T19:35:07.467000
CVE-2024-34223,0,0,00e725fc833985ae31ccd463ca116c24e214083756cb7b09e0d3b38167c9cd28,2024-11-04T19:35:07.467000
CVE-2024-34224,0,0,bc6821e7a1a1197e8806ef37396dfb61f1b6fcbd255743a94622a514f32eb2a4,2024-09-03T19:35:12.227000
CVE-2024-34225,0,0,e08a9ad45b2661eed67570a87cb42ad712c6fe6e9c128f00e0736869ea473a7c,2024-07-03T01:59:42.910000
CVE-2024-34226,0,0,e9df399e03868b5419f9e1d39391572872ab999c75d356756b02d0d173e993c9,2024-08-22T15:35:06.620000
@ -254280,7 +254280,7 @@ CVE-2024-34452,0,0,0601c8beed111acadaba988be3618d3e8a2a7b19905fce659ac719cace1be
CVE-2024-34453,0,0,47a7edffe635099f1bf55d077c40113fc9f5ba8dcdeec8da8790d14933d9ceb1,2024-07-03T02:00:06.540000
CVE-2024-34454,0,0,9c41ced14bcda502a6d91e8242ee544d71d5283ff3511493207ec7805cdb48e7,2024-07-03T02:00:07.617000
CVE-2024-34455,0,0,c191f5457e9d706ca3323355b6cb28301bf69c793f902f33757952929305bbe5,2024-07-03T02:00:08.547000
CVE-2024-34457,0,0,1808dce8625ecc1a2696d6210cc83b83a6cc772514c0892ea03ff228d0ce840e,2024-09-11T11:15:10.757000
CVE-2024-34457,0,1,488e2de12358ba7ac2ecaef904903ac7bcb5c8ffea8ebfc53fe2dd66e2b38582,2024-11-04T22:35:05.480000
CVE-2024-34458,0,0,ad9c57980a1196e03a7ff89c7cbce14805d2491f6af55e1053911cc733df4207,2024-08-21T13:31:38.380000
CVE-2024-34459,0,0,fa787ae7a4c8630112bbb06f81f3133274e5fdd9f7332b290019503934d44271,2024-08-22T18:35:08.623000
CVE-2024-3446,0,0,5ac77fa1865633043064ab1ffaeb59fe80c825b06632f0aec7d1674c1a671484,2024-09-25T01:15:40.827000
@ -254624,10 +254624,10 @@ CVE-2024-3487,0,0,4ff2b905105ca048d90a2e33e25fd9b26128f3e6906b07d6299f870ad63ad5
CVE-2024-3488,0,0,61e15575c22ff5a767d1be731e2c78e99681dc33e8575bc1a8940edf28193df9,2024-05-15T18:35:11.453000
CVE-2024-34882,0,0,414bf162499af104af9e3ac918dba0d5046535587e72d8bc01c02fcf53c2126c,2024-11-04T18:50:05.607000
CVE-2024-34883,0,0,8cef556fd6ed557941a27afa1209a5a7329727230a916eab9bc05cc044ac6260,2024-11-04T18:50:05.607000
CVE-2024-34885,1,1,9bb95018cc7498813bb5e4c574e8edec8c067795fd5c1f2a36cbd0c7ca8bdc4c,2024-11-04T19:15:06.560000
CVE-2024-34885,0,0,9bb95018cc7498813bb5e4c574e8edec8c067795fd5c1f2a36cbd0c7ca8bdc4c,2024-11-04T19:15:06.560000
CVE-2024-34887,0,0,d22116c2ae31cab92f7a56e7512a45389f55722ab02edbebae92352923fda0c2,2024-11-04T18:50:05.607000
CVE-2024-3489,0,0,ea9bd95a767998b3f2d98747bee17b3d4435734727140c279148a23c9826811b,2024-05-02T18:00:37.360000
CVE-2024-34891,1,1,74f783d8e75ff41a9b7fd67a10b65058026cc95b8c85260bf99919168c78e502,2024-11-04T19:15:06.647000
CVE-2024-34891,0,0,74f783d8e75ff41a9b7fd67a10b65058026cc95b8c85260bf99919168c78e502,2024-11-04T19:15:06.647000
CVE-2024-34899,0,0,8587795bcb80eaac03ccdd83ddcd275c805b44aa37227142776a20079d894d2e,2024-05-14T16:12:23.490000
CVE-2024-3490,0,0,fde4feb36b1284855cd6b30fa66a3af34b0e61e505831180625a8b1a9752ddb6,2024-05-02T13:27:25.103000
CVE-2024-34905,0,0,f78ccd452da80c6b8b88b8df2150e212f5062dc9ace03288d809e1d46c16b911,2024-08-19T18:35:11.410000
@ -254709,7 +254709,7 @@ CVE-2024-3508,0,0,ce82a7050fad9545b54b48fbeb7e72666687f8071a844658c7f2f064c0e3c0
CVE-2024-35080,0,0,c9a211365cbd542cdef0b29d59f3b2dfae2b1b61359fa8769a673763d1c1edb3,2024-07-03T02:01:19.997000
CVE-2024-35081,0,0,5f351d35a7c4bf1c7c66c04741787cf7f264d0978d7069822794634f96e6d2d6,2024-07-03T02:01:20.817000
CVE-2024-35082,0,0,50893ba92bdaace4fd9b61f50c725a7911d5b698ac51e1ad37d8182767cd2ba8,2024-05-24T01:15:30.977000
CVE-2024-35083,0,1,33f64168edb7b7f68d059cde18d803c0f2719b461103a2f57a97fd64b126d447,2024-11-04T20:35:06.920000
CVE-2024-35083,0,0,33f64168edb7b7f68d059cde18d803c0f2719b461103a2f57a97fd64b126d447,2024-11-04T20:35:06.920000
CVE-2024-35084,0,0,ac2799cc1434dfc2c78149fd1b6245909a5d0ccbc943a72e9768ed8158560b71,2024-07-03T02:01:21.793000
CVE-2024-35085,0,0,28b8104ff5f9fa8bc166e7b90ee75abfa07185cbfa227faaf969ddb5ab2e1407,2024-08-19T16:35:14.260000
CVE-2024-35086,0,0,bbb34dc58989be1196237a9d847c0e01aed13ed3f437f7e1bef961a874339d86,2024-07-03T02:01:22.567000
@ -255509,7 +255509,7 @@ CVE-2024-36113,0,0,bd0f172ed061f2563f819d35f44c783c215c944968e504df51b3e976b592c
CVE-2024-36114,0,0,5e400f6e1accfe4ee34afe11a2ba03b10596fa4481251b5d420288b4320d1b3a,2024-05-30T13:15:41.297000
CVE-2024-36115,0,0,f8ba661b18a24aa8a9d37cbb77cc6240a2c56bf800de38ea5defb142197d0446,2024-06-20T12:43:25.663000
CVE-2024-36116,0,0,3e18cd044e5ac4fbf5437d214cb9f9e5fd21bda7e634efa12dbd7a1ca2e9815a,2024-06-20T12:43:25.663000
CVE-2024-36117,0,1,42a17f7c6e84289ca632ec11d6e4deda84e90fa76f4b0c21d790cd54d8995eea,2024-11-04T19:15:06.733000
CVE-2024-36117,0,0,42a17f7c6e84289ca632ec11d6e4deda84e90fa76f4b0c21d790cd54d8995eea,2024-11-04T19:15:06.733000
CVE-2024-36118,0,0,465f56aaa290110c45c5a97c561d74aa67b1f0338ecac0756842534493905f75,2024-05-30T18:18:58.870000
CVE-2024-36119,0,0,ad3fdfde6f7f919d37105cd874e63e8e2fe26461ce221136b38033b394426334,2024-05-31T13:01:46.727000
CVE-2024-3612,0,0,93a685f994d05c8ad5b7ff57b12106c8be79a3b2a7f159c5cdaae42ff2a83d49,2024-06-26T17:15:27.243000
@ -255999,7 +255999,7 @@ CVE-2024-36912,0,0,4d16e3c0e44dae74fb4f56ef66d76111321868b505627c129ae05bf55e598
CVE-2024-36913,0,0,b5701a70b17faedcb86c05267b95e0568110660dd09bba586abfe504bf7e17cc,2024-07-03T02:03:49.870000
CVE-2024-36914,0,0,9d0a2a59a5979e599afc47c85619298d0dba44926c68bad3c42d98f4e86a1e53,2024-05-30T18:18:58.870000
CVE-2024-36915,0,0,59e6fc1291daca135761fa52e5fdb0439e9267cfc7e5c77dda28056758ddba27,2024-08-19T05:15:06.460000
CVE-2024-36916,0,0,36d478152b8897415c4b118bf935e513132999146096a1b52b71ec1c2fb671a6,2024-06-27T14:15:14.463000
CVE-2024-36916,0,1,b42788e5ba43d52d97ef34794298702508078a0547c8d3a7ae12e7beacd0e1c9,2024-11-04T21:35:04.977000
CVE-2024-36917,0,0,87ba592cc3ba4baa8d23c838419e7e78fb3196c8c68a279e35cd80ddf82e8648,2024-10-10T12:15:04.060000
CVE-2024-36918,0,0,f4c8fb45e44d9a145b3470164e7534e29337de61bbd3b9ef12d7c79463c4d087,2024-05-30T18:18:58.870000
CVE-2024-36919,0,0,99baaae9ef063c605b7a2ccf732530270475d8e1a1554e496c616adb6d6ac4e2,2024-06-27T14:15:14.533000
@ -256038,7 +256038,7 @@ CVE-2024-3695,0,0,cd8583909d9224874fa5edd0e2b15c723aa0e29947c489c19d9e0c7d6c0bc0
CVE-2024-36950,0,0,5481634f4762829611a0871f56a4ab89e2246b2eba6289dad49130b2c56bcf42,2024-06-27T14:15:15.090000
CVE-2024-36951,0,0,cdb358871df864e3a182d37953aaed429ff6a5f247e5d9e7d6be476ab6336252,2024-05-30T18:18:58.870000
CVE-2024-36952,0,0,0e58dc709cffcfd05de9d57f3aa03a8717a237addfd16a6d5836235e18c7c410,2024-05-30T18:18:58.870000
CVE-2024-36953,0,1,0490f8448dc7e27a18e58db0aaae7f93d214f69dd46e7c69b0f76db33e41cf96,2024-11-04T19:35:09.213000
CVE-2024-36953,0,0,0490f8448dc7e27a18e58db0aaae7f93d214f69dd46e7c69b0f76db33e41cf96,2024-11-04T19:35:09.213000
CVE-2024-36954,0,0,0cc7487fca8978b6ea62e77d179531116ae2856cff453cf4a9702de0da5aa2c4,2024-06-27T14:15:15.237000
CVE-2024-36955,0,0,2177d2fec34a0c82ee8955b7c31b7d24aa0bfbc57287be7b8c0e982445dfea8d,2024-07-03T02:03:54.210000
CVE-2024-36956,0,0,f86ebb70c181e89ce1106f0834475ad18db36a14534d58b5dedad7d89fb3c2b5,2024-05-30T18:18:58.870000
@ -256680,10 +256680,10 @@ CVE-2024-37831,0,0,84d591b6c62e8531ddd444b16a032f0bcaaa039fd0dd2bdc2becb030b994a
CVE-2024-3784,0,0,f0c80c77a0788aa17bf80578f54749ae490fe23c5161f7f9c165d9871caa60a2,2024-04-15T19:12:25.887000
CVE-2024-37840,0,0,1ea05f0cae39cea91919dabf259bc43d4d53a339aa6352e9633c1155c24e02e9,2024-07-03T02:04:49.190000
CVE-2024-37843,0,0,b2b97625cfd8538b070daf88e20efea752488fb698343ba1b69e8a5a31a226a9,2024-08-01T13:54:21.843000
CVE-2024-37844,0,0,e92866aea9b310ce4b128c5f2fa285465297f99b6b41a105e42d6be7945f9dd4,2024-10-28T14:35:11.803000
CVE-2024-37845,0,0,2fbb245c05e69100edbeb6bd8d6ef93427bfd7db32c67bd81b3947a76ff82479,2024-10-29T18:35:04.397000
CVE-2024-37846,0,0,0a771dd4297ecb7d6b521e019dc9e4e37262258e8937f6940b3754658324b8b2,2024-10-29T18:35:05.693000
CVE-2024-37847,0,0,4a1f07d2568b8def7f98c67a4d243c1afbe30f9de21a43af0fc95c8f1b1da6c5,2024-10-29T18:35:06.983000
CVE-2024-37844,0,1,de4ca3641a53d243984a7fd1b360fd808737cc6cd7e902f979333e9bcb9b6586,2024-11-04T21:58:56.810000
CVE-2024-37845,0,1,bec7eaa549e4265a2f5e9171c2b1616e0c7f6d78bbc28be332e29449dbca45e2,2024-11-04T21:53:53.433000
CVE-2024-37846,0,1,14b467d999377a0f0fedbdf3eca1bf507f557f010b9d4c91834b3c146cbb0ac7,2024-11-04T22:03:12.527000
CVE-2024-37847,0,1,569310391550375395e9421a27fea80ad5736064a77d5c294d1f2eef409b6b86,2024-11-04T21:32:29.250000
CVE-2024-37848,0,0,b9654691620e5501baad2d1771338ac2aedaf89f42fcedfa6b269a2de242ad76,2024-07-03T02:04:49.977000
CVE-2024-37849,0,0,7a15b5118e0a895a8306b103c51dd029b756d9600db3bef6c7132e3f601ee351,2024-08-15T15:35:11.593000
CVE-2024-3785,0,0,a59b207d5a568fe95d1650fae2ba42ab1a2108a4cbb162f57fceb4094d5da52c,2024-10-31T14:35:17.530000
@ -257350,7 +257350,7 @@ CVE-2024-38583,0,0,3586ecafa0d1ca6e8a926d43c12025b855a9c710e7b8311423d413eb76501
CVE-2024-38584,0,0,866c0fab6737d5c632d2fe0d0fa84370c558b19a956e53ddad3dc439393e5215,2024-09-19T13:19:59.523000
CVE-2024-38585,0,0,ac7ad3971d199dfa0ef80e1eb68414477e8c3ff2ccc08162bcbd892283ba3515,2024-06-20T12:44:01.637000
CVE-2024-38586,0,0,e1ff5c054b319f07de453ba910d18e7747a4a3215b30c879a6dd800b406a5cb1,2024-07-05T08:15:03.210000
CVE-2024-38587,0,0,0b984db6b2a9d7bf09dd4f816f04bfd5bf979a0b9b75a21ee2fc29cf10ba66a9,2024-07-15T07:15:11.083000
CVE-2024-38587,0,1,0a3e5daa01a3bda2ca9f44e3710648752086dd41bed929adb199f5138bb39728,2024-11-04T21:35:05.243000
CVE-2024-38588,0,0,83a3ccb65e1fa9bbcacd884a5041e890e7bceb684a12f226603e74d7ab95ec72,2024-10-31T08:35:06.230000
CVE-2024-38589,0,0,054b7c93b18a32102a19731b8b9f7b53136e29764718c76bb09302eaee6404d9,2024-07-15T07:15:11.207000
CVE-2024-3859,0,0,f6a57f468f9800b8da982d83af2ac389f3f4d8b059886951b49765f213c508e4,2024-07-03T02:06:47.757000
@ -258074,7 +258074,7 @@ CVE-2024-39633,0,0,fc0971d1bc8793039b4953353803c462b62ac233474e83dd34dde3ab57042
CVE-2024-39634,0,0,b68dbc093c134ffec6acb55cc59fb6f5bc0edd749d548af565529e002e00c7c7,2024-08-02T12:59:43.990000
CVE-2024-39635,0,0,de70c45d07db6614d3e443df9460115ba902119a62dfce68d14c6216ecaf4985,2024-11-01T20:24:53.730000
CVE-2024-39636,0,0,356132dd8c4585470fbd20a2862e8961fed4fe21f88d52a87134f7776cb4d243,2024-08-02T12:59:43.990000
CVE-2024-39637,0,0,c9cd93cf93f9c41475771220e56072736d7ef7107ab49d4cf3bf3069940988e9,2024-08-02T12:59:43.990000
CVE-2024-39637,0,1,80fe3bc57b73ad9ac108a5a969d2217482f3be0bb280f01a4b7e247941a392f8,2024-11-04T22:35:05.700000
CVE-2024-39638,0,0,cf36aae6a91cc72ba13b071b9e149e2fa798a9f572f58ede9d761408ecfcdde9,2024-09-13T21:00:44.173000
CVE-2024-39639,0,0,c892bca8e5f4fff4c1ed6dadeda295fe8620f9e4f2c22d8b274a7931f62cf1d0,2024-11-01T20:24:53.730000
CVE-2024-3964,0,0,9f7a9dcb99a6b1dda9d890f7e0a024c114babf4cc61dfd04fd66f31288d98320,2024-08-01T13:56:47.440000
@ -258446,7 +258446,7 @@ CVE-2024-40484,0,0,450f717e0dcf79c0d7625633ec58aab189af6e628b95e324782e3205e6fde
CVE-2024-40486,0,0,4cd2f281e08f3291d37d3a4823af93070215d87d687ca41653f1c72ca427a7a7,2024-08-13T01:13:52.383000
CVE-2024-40487,0,0,41af7da83500c8a75e7df05fb6c9f48916ac5794006d346f5d5ff76e523c1408,2024-08-23T15:35:06.307000
CVE-2024-40488,0,0,935bd1c3b9e22ad2c8e572783ed910d0a85a3508107693b6f595be8805553bbf,2024-08-13T01:13:53.230000
CVE-2024-40490,0,0,6d80e25b669dfc3ac12222827143bba769042150838d4e3a5b1a97d314fbf57d,2024-11-01T20:24:53.730000
CVE-2024-40490,0,1,6bdbe902ec1275c3611f20f24d45bb94d7a0b9ba02d145178c98f1f5b90371a0,2024-11-04T21:35:05.530000
CVE-2024-40492,0,0,887baeb8c822fbf96c83ae7c8317e551b9d380e125d5f646dfb0a8c0719647ab,2024-08-01T13:57:30.260000
CVE-2024-40493,0,0,aaea0b22b1a9fd8ca62ceefb69cfb4d04acb9686bdbdbc9774da6bba4ba8925d,2024-10-25T17:01:22.433000
CVE-2024-40494,0,0,48a84fe0e443f816c7deb1ffb2fa8d49462b96b77d70d281cb18dcbf2a2ebfcd,2024-10-23T17:35:05.100000
@ -258500,7 +258500,7 @@ CVE-2024-40575,0,0,267280fd6d1dce9620611aeb1f0d6276db3825fa55e9f5e7fc538f4804a7f
CVE-2024-40576,0,0,8423823b913f3d1284aae2224b689bfefe0b7a1b018e49f904fd4948fdba6a99,2024-08-01T13:57:51.520000
CVE-2024-4058,0,0,517dff31dd649a4fc97ec9b0700bafce6dc3cd3c4729ffb175a77bfe0097ad6e,2024-08-01T13:59:23.240000
CVE-2024-4059,0,0,c49986e07be30ca2c850f4613369c1702dff21e7018832f61c83284c95e0cc00,2024-05-03T03:16:29.430000
CVE-2024-40594,0,0,5f8b4e7b3001e206c4db42bfb10b66a5767bd1e5041c1bca9998a882526a992d,2024-07-08T15:49:22.437000
CVE-2024-40594,0,1,e1d4d027c9dcda2da83b02bb549097245bef0193d8569c5563a5fbe8b55ccbb0,2024-11-04T21:35:06.433000
CVE-2024-40595,0,0,c44d4f6c466d7ef5eae926dc07df3df9a34ba4de6b2deba6d973ce015e367bf0,2024-10-25T12:56:07.750000
CVE-2024-40596,0,0,eba237165708995f6d88799cc22362156aa815eb2255f3ea66a6ad9f417cfe2d,2024-07-09T16:45:08.760000
CVE-2024-40597,0,0,9253bd3e0343b7becb6fbf27eb19f59c2b782f333d3980529c893721abdb7002,2024-07-08T15:49:22.437000
@ -259412,7 +259412,7 @@ CVE-2024-41927,0,0,28b0e861c649b30f117a5ffa21dceff5e2eb3f40c9e49c2283b3efe64f1c3
CVE-2024-41928,0,0,fac45a5eba953351f64e8420aefaa828221c1e8b109e75da05d07c8ee7a8c443,2024-09-06T17:35:13.400000
CVE-2024-41929,0,0,7547305bee5f10749b150ea9e1b86a9a69192b8070c36c448e7faebd542862fc,2024-09-20T12:30:51.220000
CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000
CVE-2024-41930,0,0,aa58d3ec2ec1f583bc94527e5b89837194106277c444e0d511759663a04c7f55,2024-09-30T12:46:20.237000
CVE-2024-41930,0,1,b52bedd6fe23f23d9196bfe0280a65c540f937909a2604096ecc91d821792ab0,2024-11-04T22:35:07.177000
CVE-2024-41931,0,0,b563afee0e5b34fafa40b2a0b6590f442b2c5bae7f91256d0709bb72d33194df,2024-10-17T17:15:11.773000
CVE-2024-41936,0,0,d330b2a32a604797fc4eb94f395ba3140911090caf0d19e4d7603d421735298b,2024-08-20T16:26:54.663000
CVE-2024-41937,0,0,17d01be9af92612ee6b4d89126a811836507d3fbf35417e172928be42551212a,2024-08-23T16:21:21.893000
@ -261077,7 +261077,7 @@ CVE-2024-44181,0,0,6968e89bcc34da95b275f481a5e61eaf93b419f4e1f0ac49b3eaa4255a65d
CVE-2024-44182,0,0,c8405a3d9209d8acdecd393b8c354b0a78369af6884ff3ac8bf0fb4d77988b16,2024-09-24T16:52:49.767000
CVE-2024-44183,0,0,57b9818651cb417289cf4085c7f242935e44b16eacbd02a55d723c9720089da4,2024-09-24T19:04:51.030000
CVE-2024-44184,0,0,2b4c62cacdeb539e2524aa34af1a6c1e7c1594f87082a2353399d1dc98f019f0,2024-09-24T19:03:08.110000
CVE-2024-44185,0,0,8473ea59582fac16714f99db767193dfeb6d727db3a0eec56d667af7073d7402,2024-10-29T15:22:45.677000
CVE-2024-44185,0,1,51b072a6b33548434c332f03f5c5042e3cd88999d38e0cb6ec7f071c47ccfefb,2024-11-04T22:35:07.400000
CVE-2024-44186,0,0,0a6ed69346f4ae3547e173619f5fb32c164a57eccfeb66e3a57b038524695fd7,2024-09-24T18:03:45.513000
CVE-2024-44187,0,0,d2d2c28ca4949100ff21bfe0c88cdee4654cdb1db67fcca21321bb7541d90ded,2024-09-25T13:25:52.043000
CVE-2024-44188,0,0,d9b3eca877b183751dacb80ba82d47175b17c9197d2f1bc3c870ce12e136ffb2,2024-09-24T20:38:27.090000
@ -261108,9 +261108,9 @@ CVE-2024-44222,0,0,2d1c9506aa01928c94a245f74651f0e477458ddd815a4bd143998351ecb56
CVE-2024-44228,0,0,4d366f4ca03e1f210ca17d40371d7f0002d4d2fd25c7288f272f27e0c556885e,2024-10-30T20:35:27.570000
CVE-2024-44229,0,0,459366a3ff6ef76a99d08535a28f4f2b6e8f55a20bc19afc8ece1fec95aa44c2,2024-10-29T23:15:03.437000
CVE-2024-4423,0,0,0715bc9caf3e0b170ca2968c721bdd1e236908d8891315bb75fdf772bdc9c875,2024-07-03T02:07:32.943000
CVE-2024-44232,0,0,0236f45cc3ff252c180db77a6cdaa66334e23fae140432040fce9b375eed8e1e,2024-11-04T14:42:06.010000
CVE-2024-44233,0,0,d4a94483c9cf2b29255cede4216e01b3edfb0f634b4a675e37897f3ea82f28b7,2024-11-04T14:42:01.997000
CVE-2024-44234,0,0,a6e5feacb6221a74a5b10c311a409f1ece6ff36bb3e549f3710e4ea28781c4ac,2024-11-04T14:42:08.367000
CVE-2024-44232,0,1,3fbe44e4234d017eaf06dfe11500106b1c1f27817b9da3c7498cf923d0b31bc7,2024-11-04T21:35:07.233000
CVE-2024-44233,0,1,4e116c60e2f8b4a4de222c448ec0b2dd784509714d36dcce11a20af58c7b5f7d,2024-11-04T22:35:07.613000
CVE-2024-44234,0,1,82408897d48c8a47124992d1c94da051dd820e10264980d21bbc3dd678fe407d,2024-11-04T21:35:08.147000
CVE-2024-44235,0,0,f6b12e29f9914b58eea41bdafe0e4148ebdbea0c9aa9cac7f81ae35deb7df419,2024-10-30T21:35:06.987000
CVE-2024-44236,0,0,2596c988781ee3ffb6a2ddc6dda4e4baeacf8834e38bce0c324b3d9abc20481c,2024-10-30T17:28:52.077000
CVE-2024-44237,0,0,0ccb96caec122e6d60ce17ba18063b0a9447d8c20c9511ccf57f0112e5d3846b,2024-10-29T21:35:16.563000
@ -261280,7 +261280,7 @@ CVE-2024-44728,0,0,cb7a7604dfcd48f9cda73a0c69d9a24576616f565cbb7b44a1dd956c1a254
CVE-2024-44729,0,0,8927fd223d4ba575b179ed6c329831ef814c6d84c37bf537a737d3016ff6f41f,2024-10-16T19:35:07.543000
CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000
CVE-2024-44730,0,0,68e24ec16142e7e4b16db1fb49b8bca291622a943e62f8987d7002843b292365,2024-10-16T19:35:08.430000
CVE-2024-44731,0,1,c8b83766bd37ae72dea57fcd8091713c429814e3571ec057fa8a55aadda72daa,2024-11-04T20:35:07.840000
CVE-2024-44731,0,0,c8b83766bd37ae72dea57fcd8091713c429814e3571ec057fa8a55aadda72daa,2024-11-04T20:35:07.840000
CVE-2024-44734,0,0,2c4788aa6c56f345d19a79974f7a25e8f33117ccbb6a849bf098c683fbf59a73,2024-10-16T19:35:09.310000
CVE-2024-44739,0,0,48da2c283a8d53275b8fef0ca13127577bd8ad3471472700794962cf357a3ab6,2024-09-06T16:46:47.907000
CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000
@ -261505,7 +261505,7 @@ CVE-2024-45075,0,0,72725abf8f0bda55b265624cd19c42b954d17e9672b7c19951b6fe04531ef
CVE-2024-45076,0,0,5fb321e82c08a6c58252337bee6e5fcb4b13786a863fe8ca643f04e713d05d32,2024-09-06T16:44:52.310000
CVE-2024-4508,0,0,26388c420646a8ddc4ee2de628a691e0fa51808e2f848ae0f9b7aad58ccb1298,2024-05-17T02:40:26.220000
CVE-2024-45085,0,0,6bf407745c49416d639e4551e6b0198c41834096ad27b893ebf03e1d6f70dda9,2024-10-16T16:38:14.557000
CVE-2024-45086,1,1,6033a6df67db621f8173f55d18c48fb1722bf1239fc7b55c825347122fb7ab81,2024-11-04T20:15:05.013000
CVE-2024-45086,0,0,6033a6df67db621f8173f55d18c48fb1722bf1239fc7b55c825347122fb7ab81,2024-11-04T20:15:05.013000
CVE-2024-4509,0,0,996942a0a2c59f4d53067a2868fbad35944719504585e3998bbd4d788c545588,2024-06-04T19:20:40.347000
CVE-2024-45096,0,0,d4f642a1e6bb8f30a3a63abc6de33d2a734d4a63841c63adbbf0861fc10b1ff8,2024-09-06T12:34:17.957000
CVE-2024-45097,0,0,66f33176e0c07f5466116654bcd7c2847267016c1af22914a830c235e4290102,2024-09-06T12:51:59.750000
@ -261590,7 +261590,7 @@ CVE-2024-45180,0,0,08348c7b1382a66372a71879585bc4b470bbbe0e7bc2a628091dcf790778c
CVE-2024-45181,0,0,c1b3f50892c5ad2964a42f2f7c4bb1e591fc78d268d80e02244df3b7c3d3d502,2024-09-18T20:26:26.873000
CVE-2024-45182,0,0,e32901d25899173bbdbcd4da8de2dfd78b6a7db5248414eaa56acb1cb3e78104,2024-10-29T21:35:21.720000
CVE-2024-45184,0,0,2cf234e0a6e14825f232aaef12e4c1aaad3da08547a4333f332ffe8186f4ef37,2024-10-15T12:57:46.880000
CVE-2024-45185,1,1,4d25eea007d12e8196676fddd5a022b600ae0556220020b594a3731f94074eb3,2024-11-04T20:15:05.257000
CVE-2024-45185,0,0,4d25eea007d12e8196676fddd5a022b600ae0556220020b594a3731f94074eb3,2024-11-04T20:15:05.257000
CVE-2024-45186,0,0,77c3f8977c3993383fb80894e402f55d5d22584cb41b5e73c31c8d88ae8792cc,2024-10-04T13:50:43.727000
CVE-2024-45187,0,0,b29c34a9281e147a1f2b33bdd2a8c272cd39081d36dd9d0273787cf191e54024,2024-08-26T12:47:20.187000
CVE-2024-45188,0,0,b715e0fd98dc9de103c52fc47a055822268226fc14af5f0a01f3a3eab3db9def,2024-08-26T12:47:20.187000
@ -261810,7 +261810,7 @@ CVE-2024-45492,0,0,073ca72c9147ce0bd071ae42dd069b817368a461c31ddb6a6a85b43c752a5
CVE-2024-45496,0,0,cb4145e26d358c15cb434585f9bcb20449ce473167aa6d60e18e039ff47cf458,2024-09-20T12:31:20.110000
CVE-2024-45498,0,0,ead799fee90d0be791c926b84a8db9a257cc85e76c202f16fed08488baf7d590,2024-11-04T17:35:22.900000
CVE-2024-4550,0,0,ea2693a2208898e22f1b33bfbea2ea7879154431a660b6be5aad9a2659ccd071,2024-09-14T11:47:14.677000
CVE-2024-45504,0,0,d1fb07a3228efd18f7c0af3faab016c97edb9e2da8e02dba547168a8c292ae66,2024-09-10T12:09:50.377000
CVE-2024-45504,0,1,3b58dca9312966af1f86033b4db5d926602e7a6d36304d3cb72a6a0485059e81,2024-11-04T21:35:09.173000
CVE-2024-45506,0,0,53228a9659d8b3663e59f7b6cd3ffdc01b4518a34e19971e095f98575a886619,2024-10-14T03:15:10.123000
CVE-2024-45507,0,0,b2cf0920dcb75db868de7b4afd51449cea360da72164b9b7e7a575176b0c17c4,2024-09-05T17:53:39.760000
CVE-2024-45508,0,0,a7bf13ff5f2bf318e53d0cc8b12c1b5ac7eae45f1991e7b683a2e3673a166bb9,2024-09-04T16:44:08.247000
@ -262047,7 +262047,7 @@ CVE-2024-4601,0,0,f0cf92b01a71b6ce5239836875c0fea83fe5cefcc9c9a95787d845c6004188
CVE-2024-4602,0,0,2d8504f508e1d4f718d8c666850c307b85c9596de2a8b2f0ab0bc138c9da4ca4,2024-08-01T13:59:32.233000
CVE-2024-4603,0,0,9942bc7f0ee4df83c0037c4c5d6b42a7bde07b02fe0e655d3c99ab93c8488123,2024-10-14T15:15:14.210000
CVE-2024-4604,0,0,a39c956f080c616b17936b03ed62fbdee5080806b0deef5fc7741779c0bf0ec7,2024-06-27T12:47:19.847000
CVE-2024-46040,0,0,f69112d5a1863fbd0caca1b0b2804dd2dfc1a731583d042e591bd5e81ca4008b,2024-10-07T17:47:48.410000
CVE-2024-46040,0,1,85792bd5218441a1fb68e9fb698c73a2bb724468be93c68b328b24f4f512b509,2024-11-04T22:35:08.430000
CVE-2024-46041,0,0,c02cff8dc91cfcfecb1fc716067f6a80d76cbf5a6025a1c04ea63ec71bb7758f,2024-10-07T20:35:09.113000
CVE-2024-46044,0,0,dfae0b580cc93a2984a53d2394c3390df5d1e1d5f2ece9d0c43f69417b5fcfde,2024-09-20T00:34:08.463000
CVE-2024-46045,0,0,1a98614675cd9ac27117f00c6334ae044bd6c443cf6f2ab16e4d3bf0015beac5,2024-10-15T14:35:06.040000
@ -262577,7 +262577,7 @@ CVE-2024-47033,0,0,832da9d601d21dbf0e493cc5aa9c40ea841249f6ae7b39664e233ce5eaa2a
CVE-2024-47034,0,0,558e2a7d5a936fa44ec7effaff8334ac5e14654558ea39c45a930fd9a21cf5e2,2024-10-28T17:56:51.787000
CVE-2024-47035,0,0,4e91a9b948b2436f3e1ce65f21bd6916987ebeb91709f80af87e58910e21de45,2024-10-31T00:05:18.113000
CVE-2024-4704,0,0,9637a93e192a5f32142e05687e31ff3688b029254561fc4728d18bbfa1666d6b,2024-07-03T02:07:57.433000
CVE-2024-47041,0,0,badb113c52ad3f26fac9981faa6ebae8f0444af7e7657f49674083947f90d206,2024-10-25T16:35:10.220000
CVE-2024-47041,0,1,3bc2a3bddc8da3842b6c1f5b193d4833f879c6d95295752a7854f136b776b81b,2024-11-04T22:16:13.793000
CVE-2024-47044,0,0,ee5fa186fb8ea19ca537298bbe2b5e712b21f44e9ac5aca4b5f7e41e68f91755,2024-10-17T02:15:02.840000
CVE-2024-47045,0,0,f477b3cad8608c11a6f4e2c578041877872bac107a164ee977d83ddf752336b4,2024-09-26T15:35:29.950000
CVE-2024-47046,0,0,7869fbf4e097ddf562d122b002ca5484caa2f32ab0ccc92f893d14cc4f35f687,2024-10-10T12:56:30.817000
@ -262671,7 +262671,7 @@ CVE-2024-47184,0,0,ec4f2d4aa381d6be3b04a5d96e034e76004fe037b3abeb496a459d57a9fce
CVE-2024-47186,0,0,039f38f277124d2a0772e43f534fb151851ccf4c65185f4966f7e81d742991ce,2024-10-07T13:30:55.640000
CVE-2024-47187,0,0,817b13d1e8de6a39f3ef47c843dc5a93e7afef448e0409c2b2ed1c1bad0aac52,2024-10-22T13:48:59.893000
CVE-2024-47188,0,0,121b1d8543a839662e5f78a404dc83b47db88a564ef1132d3f948fc248118eb7,2024-10-22T13:50:17.493000
CVE-2024-47189,0,0,7ecc2a6d7651786fe3ca88fc21700c3aba959abbfb427b593201d67fe273baa5,2024-10-23T15:12:34.673000
CVE-2024-47189,0,1,7d3af50eb7bb8d000bc263107eea64000b2f13c8fe93501539ce47dbaede0a87,2024-11-04T22:35:09.220000
CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000
CVE-2024-47191,0,0,2d0ea97c75991dd32a2813bf0ef51251f3610baaa622ce7906ea2e3545fc5ab0,2024-10-10T12:51:56.987000
CVE-2024-47194,0,0,0afa0b09ca6b7bbd6bd860b01b5c9153eec47be962883f1807d6c455d470088c,2024-10-16T18:15:04.043000
@ -263317,7 +263317,7 @@ CVE-2024-48257,0,0,cde7b8837142e8c81fa5cdd04cd1a286ad8050551e4a13ecd4d16d52e71f8
CVE-2024-48259,0,0,05be91466999f287d7c34a7b188d482630d814bc65ce325c3824838e8ad22bcc,2024-10-15T19:35:38.413000
CVE-2024-4826,0,0,deaf8fdab596ba1219725251282b0367e2dd73462b62b55f2e950ae3725565c5,2024-05-16T13:15:48.163000
CVE-2024-48261,0,0,c50173bdf25e4741bc510b2698ace8c3db8c27162251f6faafaff8896241ef72,2024-10-14T15:15:14.130000
CVE-2024-48270,0,1,e82279cb4f373ef131088b2d6ce9afd1cdb7a974f6f061e99b19d0e81804f27f,2024-11-04T19:35:11.057000
CVE-2024-48270,0,0,e82279cb4f373ef131088b2d6ce9afd1cdb7a974f6f061e99b19d0e81804f27f,2024-11-04T19:35:11.057000
CVE-2024-48271,0,0,f1a486724163e31edae91e89dc14d5baec7425ac5626e9c57973c7569aa40cc5,2024-11-01T12:57:03.417000
CVE-2024-48272,0,0,dbe268aef174a7c0e19118488cdbf6bd3dd4bc2a094901a22c6cf1a9597b5ee2,2024-11-01T12:57:03.417000
CVE-2024-48278,0,0,2d230a37c6a5ea93411d7a1b4293f4f461a087e46c8a9a4eaba61f8eeb3339e7,2024-10-16T16:38:43.170000
@ -263325,11 +263325,11 @@ CVE-2024-48279,0,0,734681838e14fea506d33d2e5cffcb45e5208b2ff1232248e90dbda0d4737
CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b92f9,2024-10-16T16:38:43.170000
CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b694,2024-10-16T16:38:43.170000
CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000
CVE-2024-48289,0,1,3c17d5bd38424fa0af920fbe41958bfb5ff6ab46e45b8d73a90e0bb1a9946e7a,2024-11-04T20:35:09.307000
CVE-2024-48289,0,0,3c17d5bd38424fa0af920fbe41958bfb5ff6ab46e45b8d73a90e0bb1a9946e7a,2024-11-04T20:35:09.307000
CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000
CVE-2024-48307,0,0,935ee3e0328307bbb03111416c4595c4eff3ac408a08578a24f622dddb9d0c64,2024-11-01T12:57:03.417000
CVE-2024-48311,0,0,354d288e073d9064d21602cf2204c79fdbedf6cf54999e8a50b7d788e057c63f,2024-11-01T12:57:03.417000
CVE-2024-48336,0,1,ceb20642f87b45ae345232a2a331752a7382b0137ef1494f458e4bcdd5d57c2f,2024-11-04T20:35:10.193000
CVE-2024-48336,0,0,ceb20642f87b45ae345232a2a331752a7382b0137ef1494f458e4bcdd5d57c2f,2024-11-04T20:35:10.193000
CVE-2024-48342,0,0,cab27a7526b8debabab042631051135b3c12f9f8dc84e657f2f251a3750f9436,2024-11-04T07:15:11.437000
CVE-2024-48343,0,0,6b50c2f4f6b1096ee0c17db257557835a9194bfca6ac184c217bfb38c59667b0,2024-10-29T19:35:23.657000
CVE-2024-48346,0,0,9cadc94f91da6becfc880372821212f6fb47778feb19564283e0a19072e428a5,2024-11-01T12:57:03.417000
@ -263347,7 +263347,7 @@ CVE-2024-4839,0,0,b71f0924b0409cbf87c224c453882d6c9b4eee1b8a725627eb630ec6587a6e
CVE-2024-48396,0,0,e6bec06764d82cb7bcb788cbf02d61a5b8cf783d546a1c28ebb405611c8acc81,2024-10-30T20:35:31.167000
CVE-2024-4840,0,0,e883b61cf74d34d59484fc9e98d49b7c4a3e1a85aadae7b936258fde00012f35,2024-05-14T16:11:39.510000
CVE-2024-4841,0,0,65ebfdfe2681835a6b4ece6477d685d2c79df9dc285d61b3c6847a6703ab5189,2024-06-24T12:57:36.513000
CVE-2024-48410,0,0,9a7c16d0d117971b5fcf2a39197568feb35c6192384462d3f187b9150854c781,2024-11-01T20:24:53.730000
CVE-2024-48410,0,1,ccc65ac0ed111907d1e5a65a9755c401ec69cc35af0c3e48b39cab031ff07170,2024-11-04T21:35:10.317000
CVE-2024-48411,0,0,f02f5a173c68a1066ae1d0ad3ecb091448747ebc7ae5d98814db8ad4f2b7f72f,2024-10-16T19:35:11.290000
CVE-2024-48415,0,0,74b10390d002ade4800e5d7a55f6d3a4ceb198a0f7cd7077ee2455a630a69b9d,2024-10-25T16:55:26.083000
CVE-2024-4842,0,0,266948939b8663b41b45dca8cb12f3f3247c17eab2663a8a73d7a0fbf198d426,2024-05-30T20:15:09.703000
@ -263369,6 +263369,7 @@ CVE-2024-48454,0,0,6b6ca49a060c554891c90c2e114c529f7522d5800fbd375e9b33b5c669ae0
CVE-2024-48459,0,0,901474388331b2012a4633aead65b3a3d672e9f671a2126655443e04f1134f78,2024-10-29T20:35:32.737000
CVE-2024-4846,0,0,354213cecebbad5d2830809199864dadc70a5508c38afeb47a24b8f17c4c0fe1,2024-06-25T18:50:42.040000
CVE-2024-48461,0,0,1c2083218c3c3685e23b071a99b5af3e2d4f1a943e6f041925ac67eedb8db886,2024-11-01T12:57:35.843000
CVE-2024-48463,1,1,fe90ce034e717eb1a2b4658f5cecc56fa2b65feb2651269e1a8fe912ec00703d,2024-11-04T21:15:04.707000
CVE-2024-48465,0,0,79a85011a870c4c08986e482d9ae1db011c8d568f8e3fabc9f719daa8800b0cb,2024-10-30T18:35:15.410000
CVE-2024-4847,0,0,3e175fcde7743d0dafc07697dcd3c0585505cba50a8840c440513434f4a1e2f1,2024-05-15T16:40:19.330000
CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000
@ -263447,8 +263448,8 @@ CVE-2024-48713,0,0,445ad86acde4498d015f6e3ec387c87f05498a686a49f564198004eca8c35
CVE-2024-48714,0,0,5966fa7e4cea1148b0617541f87717ad0f7359afa5da2d98079f2bad16d0d0d4,2024-10-16T17:35:06.330000
CVE-2024-4872,0,0,549af6d3c4facab0e0ed80259f11ae3b62839f464bd03f4ae7443d031f1f2086,2024-10-30T15:31:41.743000
CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000
CVE-2024-48733,0,1,773fd6b2e7e4f5cd5440d09e78665a8b9dbd2f1c81115825a7a0b5a44cebe66d,2024-11-04T19:35:11.380000
CVE-2024-48734,0,1,235096d5d15c9ed0cae8fc2b37a546f714681d3c8637630f6435091904d25b7e,2024-11-04T19:35:12.597000
CVE-2024-48733,0,0,773fd6b2e7e4f5cd5440d09e78665a8b9dbd2f1c81115825a7a0b5a44cebe66d,2024-11-04T19:35:11.380000
CVE-2024-48734,0,0,235096d5d15c9ed0cae8fc2b37a546f714681d3c8637630f6435091904d25b7e,2024-11-04T19:35:12.597000
CVE-2024-48735,0,0,aa134cb71eec050b9e0ec9fc38dfda524a75b12ece7317a32efa232ed7d6416c,2024-11-01T13:15:12.620000
CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000
CVE-2024-48743,0,0,e34f375e468f7c410c7d8c60761e70f3ee3d5b15b7109d5d939d88a21b51dbc6,2024-10-29T19:35:25.777000
@ -264335,8 +264336,8 @@ CVE-2024-5076,0,0,de640e02cf3b45a3c273aa587ea62260b6bf3eea8d977ac9f3e7280d3f5d4b
CVE-2024-5077,0,0,58d61679dec16d0807ee3c6d8f70abda23dd3b8ef542c3a47286601f3d544039,2024-08-01T13:59:40.333000
CVE-2024-5079,0,0,03cab751fae6538cdd3ee0f9a467090b1b9dca8ded972c9a24812d90a2b62ab7,2024-08-01T13:59:40.517000
CVE-2024-5080,0,0,88ae00b43e12b64ab9ecc2d4c4ea1fe4d89b86d4c131aa05e4a989c5a4e3b207,2024-08-01T13:59:40.707000
CVE-2024-50801,0,1,b02fd2a4d914f47ebf18861bef14a429b26208dd8058232ee786f89bcea879c0,2024-11-04T19:35:13.810000
CVE-2024-50802,0,1,8492f5be24f5ad2918f47970062e4bc2c1c3f432ad972af1d330cb18adac5b2e,2024-11-04T19:35:14.907000
CVE-2024-50801,0,0,b02fd2a4d914f47ebf18861bef14a429b26208dd8058232ee786f89bcea879c0,2024-11-04T19:35:13.810000
CVE-2024-50802,0,0,8492f5be24f5ad2918f47970062e4bc2c1c3f432ad972af1d330cb18adac5b2e,2024-11-04T19:35:14.907000
CVE-2024-5081,0,0,0bebffdc717b25462ccb5a198cb29076c0fa0475011c795b0df7ab25d1acf197,2024-08-05T15:35:16.180000
CVE-2024-5084,0,0,79705ce3d53f6e7c72da00fccc935c6da44be9bf4354c31cd8528afb5e0a643e,2024-05-24T01:15:30.977000
CVE-2024-5085,0,0,6942e3068671e85a9578eddbb7240c8706dd53cd6ec5670c5d4ddd91c950a30a,2024-05-24T01:15:30.977000
@ -264399,7 +264400,7 @@ CVE-2024-51247,0,0,f91aabdacc19911e686cb0a70b4fe352fe5b7223ce99b8d8bbb7be0048cad
CVE-2024-51248,0,0,5b1f2d7395fc3935207664d4c3fab29f0abf14a36ed23190b3643b6f2344c487,2024-11-04T17:35:37.110000
CVE-2024-51249,0,0,3d0cc9c67b7b5023c7f9e10f06a152021d08c28671660933aadd4bf75e0be323,2024-11-04T18:50:05.607000
CVE-2024-51251,0,0,c4c34718f73bd23a2f11b62312d57fb9837cb268511a72fa7d6e908990a99a5e,2024-11-04T18:50:05.607000
CVE-2024-51252,0,0,f4f3cc5383a6a1f58f9ea84c21f6a507fb680ae234f6b29b5a0b0272d72878d3,2024-11-01T20:24:53.730000
CVE-2024-51252,0,1,c40d149bc17e2ce27f405a8cb61567ffbf2937e2612cf7f9b90f8bbcb8ca6b16,2024-11-04T21:35:11.177000
CVE-2024-51253,0,0,096fa2cabcaa44b92f571ac0967480e4fabe4fb9873c51a9dbe9e95ead4dc4ec,2024-11-04T18:50:05.607000
CVE-2024-51254,0,0,223d23065b28f9aecf516c7169cb923513ae1f39fc52963cc50e2cab41350206,2024-11-01T12:57:03.417000
CVE-2024-51255,0,0,09c7dedf943104113335c71594438f15e0e67937d27a8d621ad19f82c6566163,2024-11-01T12:57:03.417000
@ -264422,20 +264423,20 @@ CVE-2024-5131,0,0,9b223a3704656a88e804c16f004e4517a5aad70b85be149c86a7a2071dad55
CVE-2024-5132,0,0,1e1b0edf57956ef222afc7fdedc2f2211203f4402428303961b463cfc0ea97cb,2024-06-07T17:15:51.840000
CVE-2024-51326,0,0,f88ded964298acbc6e9a32974022511c8e8484cd2422cb2a7910953f3b963a4b,2024-11-04T18:50:05.607000
CVE-2024-51327,0,0,9e8435fa7a61ae04c5765f958337ed383ed068434cbfa132e59dc833305d80cc,2024-11-04T18:50:05.607000
CVE-2024-51328,0,1,768f8be19425d8bf4cf9b5b89b937b298b5cc7b18ce12eea5265b64902006bbb,2024-11-04T19:35:16.150000
CVE-2024-51328,0,0,768f8be19425d8bf4cf9b5b89b937b298b5cc7b18ce12eea5265b64902006bbb,2024-11-04T19:35:16.150000
CVE-2024-51329,0,0,fe9fe6fee70bf7f535cc859756a1487466d3af982f47aeef778ab1863ee2a417,2024-11-04T18:50:05.607000
CVE-2024-5133,0,0,ce2c3261ccf7a6af3656f0cd319a645240f50aa81e714a3f3634cc2f14d7c857,2024-10-17T16:41:53.717000
CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa19,2024-06-04T19:21:01.167000
CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000
CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000
CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000
CVE-2024-51377,0,0,fabb65b5ac4208b70588bb6a36168c12aeda2e6275f9671e51ffef7913bcb173,2024-11-01T20:24:53.730000
CVE-2024-51377,0,1,27e24251b8fbb0cd40dc4b3232759f12cbe7946bd501f1e15145c4cb45ca2b57,2024-11-04T21:35:12.543000
CVE-2024-51378,0,0,25041eea06e8de15fb868a226604237e266234c162cafb1c59832cc50427a9bb,2024-11-01T12:57:03.417000
CVE-2024-5138,0,0,47c03094386326d2315f3415dc7d3ef94b00cbe65c94e42ace003fc1a8714791,2024-09-06T20:35:18.950000
CVE-2024-51398,0,0,e38b939d0a6ada1e8acc966a58f2c362a310a99f3df73314a118d336cca6e0d5,2024-11-01T20:24:53.730000
CVE-2024-51399,0,0,885aca9993ad625251b3194b60c099bbab5438db620967daab647ff77bcb67d2,2024-11-01T20:24:53.730000
CVE-2024-51406,0,1,219f1a907dc34e3139e40d74617f86db24d4b43908c87f25fb1a00f5ef8165d9,2024-11-04T19:35:17.410000
CVE-2024-51407,0,1,fda917e854eca07dcff49df0339535f103ba20de93b59699ac770c63d8521d21,2024-11-04T20:35:11.350000
CVE-2024-51406,0,0,219f1a907dc34e3139e40d74617f86db24d4b43908c87f25fb1a00f5ef8165d9,2024-11-04T19:35:17.410000
CVE-2024-51407,0,0,fda917e854eca07dcff49df0339535f103ba20de93b59699ac770c63d8521d21,2024-11-04T20:35:11.350000
CVE-2024-51408,0,0,9a1949f2d560a68fd2bb3d1dbdd350dc06e2d41859fb297a38dbe2b5ea7ec1ed,2024-11-04T18:50:05.607000
CVE-2024-5141,0,0,5b006751fd2d8ca9e95fc8cef49a641b35089e8e5594eecd996fab7cf0d4e5e8,2024-07-24T17:58:54.867000
CVE-2024-51419,0,0,e145fdc3d6134b228049cf2c0ec561624aa79dc4de0c1da7a3c5f83de9d39a5f,2024-11-01T12:57:03.417000
@ -264447,7 +264448,7 @@ CVE-2024-51427,0,0,8620fe2fe9783598011162ebda7f5b78a4941fc646ad43a32bd7b2f439c18
CVE-2024-5143,0,0,5ac39d02075c8e32566e12e6b75645e72f6b53d1cd5d8a84d8661f31cb199459,2024-10-31T15:35:44.950000
CVE-2024-51430,0,0,ff23326a74158832e3c36a3da3cf40ac4ba003ba8db91bd39e91a6a5bd9de288,2024-11-01T12:57:03.417000
CVE-2024-51431,0,0,ae4ea87885399ca20809740aa83c76657f25771a3072d37738bc514622348a08,2024-11-01T20:24:53.730000
CVE-2024-51432,0,0,1eba1fa24b7f4b0a1931cdf3e2b2e1eddcf1b909a581b7a56d8b9a07b4ee7f89,2024-11-01T20:24:53.730000
CVE-2024-51432,0,1,06d0d3316848cec870b03db5c1c503efe28d2aee8f81e4282d342a754853942f,2024-11-04T22:35:10.037000
CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000
CVE-2024-5145,0,0,e9d5b011678068f9e46540aba9b4c166c9546581cf81cda6f6984ec899d8b7b6,2024-06-04T19:21:01.520000
CVE-2024-5147,0,0,67fd758fa3d69d8e32fe541a58ba746107ffb7370fa9ddd99ec9988f56fe738f,2024-05-22T12:46:53.887000
@ -264505,6 +264506,7 @@ CVE-2024-5170,0,0,0357b8fbab1b76f01ca0dd625bf87ec8b80f7fd2d35927c69b68200ba07a11
CVE-2024-5171,0,0,dd574bf92e93c62d270c5e3b0cb384556e01dba1d43a5b9db2a02845fa564cb4,2024-07-23T18:09:56.753000
CVE-2024-5172,0,0,b469524ff2309ced9aec08b056578c23e8b8b5248adb8fcea2b38cb214c81275,2024-07-05T14:05:48.213000
CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da6464,2024-06-26T12:44:29.693000
CVE-2024-51744,1,1,bd6bdc91f6d67c702ddc17998c6ec175a52423aac604901379de8ad46f8ae218,2024-11-04T22:15:03.997000
CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000
CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000
CVE-2024-51774,0,0,6b9ad01ae39e28e730652b71db4c41fab661cbf3a8f11904f5f832a6412e27be,2024-11-04T14:27:25.593000
@ -265308,7 +265310,7 @@ CVE-2024-6076,0,0,f75c5e0cd2d3ad9cf3dc79d2ee6835febd9e3e1415fea3908528543dbed7f7
CVE-2024-6077,0,0,c4974f2c49bcf99698e08f718ed154b51d3cf73496f9c975d2598a4132600a7c,2024-09-19T14:31:18.463000
CVE-2024-6078,0,0,a48aa92a89b3d2f828f8a341ad2ce6a914a21f3587846f530cf16dc8ed30ed69,2024-08-15T13:01:10.150000
CVE-2024-6079,0,0,a625435aeb66a78a45b154461c249f77137a161767aad8b8e49464f09120384a,2024-08-14T02:07:05.410000
CVE-2024-6080,0,1,55d7faa358e2c45f28e6431d41c784f80ed1049266aaeb5cc9ce768b54dd30d9,2024-11-04T19:15:07.323000
CVE-2024-6080,0,0,55d7faa358e2c45f28e6431d41c784f80ed1049266aaeb5cc9ce768b54dd30d9,2024-11-04T19:15:07.323000
CVE-2024-6082,0,0,013046d87182f03b6cbc3b5958c2d5ce3b9ca55b4984041383e50b43bd3564b5,2024-09-13T18:29:30.637000
CVE-2024-6083,0,0,6d9bb4abe3add5a9314088c73da6990ced956f79d42ec66733f8e068d49bd5c9,2024-09-16T13:21:53.467000
CVE-2024-6084,0,0,6faa90c930997c0aec12adfd29df5cf00c8158d82ed8686290b073db2ac7ae60,2024-08-08T16:20:42.537000
@ -266737,7 +266739,7 @@ CVE-2024-7799,0,0,00b687245dbb834ce768a34773e6d247f116248fb1170e2cff00e71dda4a9f
CVE-2024-7800,0,0,648c15c60d543078675ed09d23bcee51c2c4405b9726708dfb6ef04a08b9ac6a,2024-08-19T16:50:39.993000
CVE-2024-7801,0,0,bed682b6222cb0c9f77cc5a0751ff36b1d3476d22f8b98362a2b5472dbe7cc5b,2024-10-17T15:19:27.053000
CVE-2024-7805,0,0,135d6da17dfa4c84aefd569e9d92e16548bde418c54a07f703c8b45a0b8c6cd9,2024-09-11T14:15:13.560000
CVE-2024-7807,0,1,2b05161833902ee1c6dae96b01f5274ddcf91f23e94abe55093a1d69ee2cc8f0,2024-11-04T20:47:21.767000
CVE-2024-7807,0,0,2b05161833902ee1c6dae96b01f5274ddcf91f23e94abe55093a1d69ee2cc8f0,2024-11-04T20:47:21.767000
CVE-2024-7808,0,0,969711922c4e0f4c36191148ae8c5b992516373bcf5aef167544cc98dd0f6ef8,2024-08-19T18:07:44.270000
CVE-2024-7809,0,0,60527746c8c58a9337e860dd0533a4fd053da5d7ab44e27861411efc76582427,2024-08-19T18:11:18.537000
CVE-2024-7810,0,0,501ecfcc11cf2cc73802b4d3933bb0470270948711ab4bd8700d22a848dae6e6,2024-08-19T18:12:14.090000
@ -267789,8 +267791,8 @@ CVE-2024-9320,0,0,f09699099fcbae251236569e3b80f87aa18c611c7a9a81741339a3f6ea9ef5
CVE-2024-9321,0,0,a14c3ea501d5675f270df02cf8d21d7014c48fd4251b0c1b324165be69ef0bfa,2024-10-01T13:28:20.110000
CVE-2024-9322,0,0,e95e70788b8a6a49aa85018220569b500de2dbb1919ebd97b01b91f0a91cc54e,2024-10-02T13:32:17.277000
CVE-2024-9323,0,0,890a6430432a24ca83a099564288fe0c5e63b6dff3bdabb06ff3376334cef2ee,2024-10-01T12:55:17.873000
CVE-2024-9324,0,1,c90a31597fc72ee8ba44787e48ca451aefb58f6936dc59b8b78a2afd7dcaf01e,2024-11-04T19:15:07.587000
CVE-2024-9325,0,1,f1bc3af7edbc900b325a37f1afc7e0ab8457fdb779f2396948205355d49dfd14,2024-11-04T19:15:07.790000
CVE-2024-9324,0,0,c90a31597fc72ee8ba44787e48ca451aefb58f6936dc59b8b78a2afd7dcaf01e,2024-11-04T19:15:07.587000
CVE-2024-9325,0,0,f1bc3af7edbc900b325a37f1afc7e0ab8457fdb779f2396948205355d49dfd14,2024-11-04T19:15:07.790000
CVE-2024-9326,0,0,ac353111de081e75045512f212a47527fdd858d5e54a48eba79a4b87a1838dd8,2024-10-02T13:33:16.530000
CVE-2024-9327,0,0,9bb62fae114b1c29588ad2672d640859a17a9f3af7375a799fc34e218e9d39c9,2024-10-02T12:57:17.787000
CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000

Can't render this file because it is too large.