From 8187b1dabefb69ee386c73dc235bedcd532bf762 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 4 Nov 2024 23:03:19 +0000 Subject: [PATCH] Auto-Update: 2024-11-04T23:00:19.803018+00:00 --- CVE-2021/CVE-2021-471xx/CVE-2021-47192.json | 27 ++- CVE-2021/CVE-2021-472xx/CVE-2021-47224.json | 27 ++- CVE-2021/CVE-2021-473xx/CVE-2021-47350.json | 27 ++- CVE-2021/CVE-2021-475xx/CVE-2021-47511.json | 27 ++- CVE-2021/CVE-2021-475xx/CVE-2021-47555.json | 27 ++- CVE-2023/CVE-2023-363xx/CVE-2023-36325.json | 39 +++- CVE-2023/CVE-2023-468xx/CVE-2023-46840.json | 27 ++- CVE-2024/CVE-2024-100xx/CVE-2024-10041.json | 65 +++++- CVE-2024/CVE-2024-102xx/CVE-2024-10277.json | 65 +++++- CVE-2024/CVE-2024-102xx/CVE-2024-10278.json | 69 ++++++- CVE-2024/CVE-2024-102xx/CVE-2024-10279.json | 69 ++++++- CVE-2024/CVE-2024-217xx/CVE-2024-21726.json | 27 ++- CVE-2024/CVE-2024-232xx/CVE-2024-23242.json | 39 +++- CVE-2024/CVE-2024-232xx/CVE-2024-23245.json | 27 ++- CVE-2024/CVE-2024-235xx/CVE-2024-23561.json | 14 +- CVE-2024/CVE-2024-245xx/CVE-2024-24549.json | 27 ++- CVE-2024/CVE-2024-267xx/CVE-2024-26708.json | 27 ++- CVE-2024/CVE-2024-271xx/CVE-2024-27184.json | 27 ++- CVE-2024/CVE-2024-32xx/CVE-2024-3219.json | 14 +- CVE-2024/CVE-2024-331xx/CVE-2024-33147.json | 39 +++- CVE-2024/CVE-2024-344xx/CVE-2024-34457.json | 22 +- CVE-2024/CVE-2024-369xx/CVE-2024-36916.json | 27 ++- CVE-2024/CVE-2024-378xx/CVE-2024-37844.json | 62 +++++- CVE-2024/CVE-2024-378xx/CVE-2024-37845.json | 62 +++++- CVE-2024/CVE-2024-378xx/CVE-2024-37846.json | 62 +++++- CVE-2024/CVE-2024-378xx/CVE-2024-37847.json | 67 ++++++- CVE-2024/CVE-2024-385xx/CVE-2024-38587.json | 27 ++- CVE-2024/CVE-2024-396xx/CVE-2024-39637.json | 14 +- CVE-2024/CVE-2024-404xx/CVE-2024-40490.json | 43 +++- CVE-2024/CVE-2024-405xx/CVE-2024-40594.json | 14 +- CVE-2024/CVE-2024-419xx/CVE-2024-41930.json | 27 ++- CVE-2024/CVE-2024-441xx/CVE-2024-44185.json | 24 ++- CVE-2024/CVE-2024-442xx/CVE-2024-44232.json | 38 +++- CVE-2024/CVE-2024-442xx/CVE-2024-44233.json | 38 +++- CVE-2024/CVE-2024-442xx/CVE-2024-44234.json | 38 +++- CVE-2024/CVE-2024-455xx/CVE-2024-45504.json | 39 +++- CVE-2024/CVE-2024-460xx/CVE-2024-46040.json | 39 +++- CVE-2024/CVE-2024-470xx/CVE-2024-47041.json | 60 +++++- CVE-2024/CVE-2024-471xx/CVE-2024-47189.json | 39 +++- CVE-2024/CVE-2024-484xx/CVE-2024-48410.json | 43 +++- CVE-2024/CVE-2024-484xx/CVE-2024-48463.json | 33 +++ CVE-2024/CVE-2024-512xx/CVE-2024-51252.json | 45 ++++- CVE-2024/CVE-2024-513xx/CVE-2024-51377.json | 43 +++- CVE-2024/CVE-2024-514xx/CVE-2024-51432.json | 43 +++- CVE-2024/CVE-2024-517xx/CVE-2024-51744.json | 60 ++++++ README.md | 72 +++---- _state.csv | 212 ++++++++++---------- 47 files changed, 1754 insertions(+), 249 deletions(-) create mode 100644 CVE-2024/CVE-2024-484xx/CVE-2024-48463.json create mode 100644 CVE-2024/CVE-2024-517xx/CVE-2024-51744.json diff --git a/CVE-2021/CVE-2021-471xx/CVE-2021-47192.json b/CVE-2021/CVE-2021-471xx/CVE-2021-47192.json index c1753cf9888..75c520ff562 100644 --- a/CVE-2021/CVE-2021-471xx/CVE-2021-47192.json +++ b/CVE-2021/CVE-2021-471xx/CVE-2021-47192.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47192", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-10T19:15:47.710", - "lastModified": "2024-04-10T19:49:51.183", + "lastModified": "2024-11-04T21:35:00.850", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: scsi: core: sysfs: Fix hang when device state is set via sysfs Esto corrige una regresi\u00f3n agregada con: commit f0f82e2476f6 (\"scsi: core: Fix capacity set to zero after offlinining device\") El problema es que despu\u00e9s de la recuperaci\u00f3n de iSCSI, iscsid llamar\u00e1 al kernel para establecer el estado del dev en running, y con ese parche ahora llamamos a scsi_rescan_device() con el state_mutex retenido. Si el hilo del controlador de errores SCSI est\u00e1 empezando a probar el dispositivo en scsi_send_eh_cmnd() entonces va a intentar capturar el state_mutex. Entonces estamos atascados, porque cuando scsi_rescan_device() intenta enviar su E/S, scsi_queue_rq() llama a -> scsi_host_queue_ready() -> scsi_host_in_recovery() que devolver\u00e1 verdadero (el estado del host todav\u00eda est\u00e1 en recuperaci\u00f3n) y la E/S simplemente se volver\u00e1 a poner en cola. scsi_send_eh_cmnd() nunca podr\u00e1 tomar el state_mutex para finalizar el manejo de errores. Para evitar el punto muerto, mueva el c\u00f3digo relacionado con el rescan a despu\u00e9s de que eliminemos el state_mutex. Esto tambi\u00e9n agrega una verificaci\u00f3n para ver si ya estamos en el estado de ejecuci\u00f3n. Esto evita escaneos adicionales y ayuda al caso iscsid donde si la clase de transporte ya ha puesto en l\u00ednea el dispositivo durante su proceso de recuperaci\u00f3n, entonces no necesitamos espacio de usuario para hacerlo nuevamente y posiblemente bloquear ese daemon." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/4edd8cd4e86dd3047e5294bbefcc0a08f66a430f", diff --git a/CVE-2021/CVE-2021-472xx/CVE-2021-47224.json b/CVE-2021/CVE-2021-472xx/CVE-2021-47224.json index fed05dec1fa..9fa75b66c34 100644 --- a/CVE-2021/CVE-2021-472xx/CVE-2021-47224.json +++ b/CVE-2021/CVE-2021-472xx/CVE-2021-47224.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47224", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:11.687", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-11-04T21:35:01.163", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux se ha resuelto la siguiente vulnerabilidad: net:ll_temac: Aseg\u00farate de liberar skb cuando est\u00e9 completamente utilizado. Con el puntero skb acoplado en la BD TX, tenemos una forma sencilla y eficaz de liberar el buffer skb. cuando la trama ha sido transmitida. Pero para evitar liberar el skb mientras todav\u00eda hay fragmentos del skb en uso, debemos aprovechar el BD TX del skb, no el primero. Sin esto, estamos haciendo use after free en el lado DMA, cuando el primer BD de un paquete BD de transmisi\u00f3n m\u00faltiple se considera completado en xmit_done y los BD restantes todav\u00eda se est\u00e1n procesando." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.2, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/019ab7d044d0ebf97e1236bb8935b7809be92358", diff --git a/CVE-2021/CVE-2021-473xx/CVE-2021-47350.json b/CVE-2021/CVE-2021-473xx/CVE-2021-47350.json index 17135578eaf..b539f571823 100644 --- a/CVE-2021/CVE-2021-473xx/CVE-2021-47350.json +++ b/CVE-2021/CVE-2021-473xx/CVE-2021-47350.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47350", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-21T15:15:21.483", - "lastModified": "2024-05-21T16:54:26.047", + "lastModified": "2024-11-04T21:35:01.490", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se resolvi\u00f3 la siguiente vulnerabilidad: powerpc/mm: corrige el bloqueo en el fallo de ejecuci\u00f3n del kernel. El kernel de powerpc no est\u00e1 preparado para manejar fallos de ejecuci\u00f3n del kernel. Especialmente, la funci\u00f3n is_exec_fault() devolver\u00e1 'false' cuando el kernel tome un fallo de ejecuci\u00f3n, porque la verificaci\u00f3n se basa en la lectura de current->thread.regs->trap que contiene la trampa del usuario. Por ejemplo, al provocar una prueba LKDTM EXEC_USERSPACE, current->thread.regs->trap se establece en SYSCALL trap (0xc00), y set_access_flags_filter() no ve el error cometido por el kernel como un error de ejecuci\u00f3n. La confirmaci\u00f3n d7df2443cd5f (\"powerpc/mm: corregir errores de segmentaci\u00f3n falsos en radix con autonuma\") lo dej\u00f3 claro y lo manej\u00f3 correctamente. Pero m\u00e1s tarde, la confirmaci\u00f3n d3ca587404b3 (\"powerpc/mm: corregir informes de fallas de ejecuci\u00f3n del kernel\") elimin\u00f3 ese manejo, introduciendo una prueba basada en error_code. Y aqu\u00ed est\u00e1 el problema, porque en el 603 todos los bits superiores de SRR1 se borran cuando el controlador de errores de instrucci\u00f3n TLB sale a ISI. Hasta la confirmaci\u00f3n cbd7e6ca0210 (\"powerpc/fault: Evite la verificaci\u00f3n pesada de search_exception_tables()\"), un fallo de ejecuci\u00f3n del kernel en una direcci\u00f3n de espacio de usuario se detectaba indirectamente por la falta de entrada para esa direcci\u00f3n en las tablas de excepci\u00f3n. Pero despu\u00e9s de esa confirmaci\u00f3n, el kernel depende principalmente de KUAP o del manejo de mm del n\u00facleo para detectar accesos de usuarios incorrectos. Aqu\u00ed el acceso no es incorrecto, por lo que mm lo maneja. Es un fallo menor porque PAGE_EXEC no est\u00e1 configurada, set_access_flags_filter() deber\u00eda configurar PAGE_EXEC y listo. Pero como is_exec_fault() devuelve false como se explic\u00f3 al principio, set_access_flags_filter() sale sin configurar el indicador PAGE_EXEC, lo que conduce a un fallo de ejecuci\u00f3n menor para siempre. Como el kernel no est\u00e1 preparado para manejar tales fallos de ejecuci\u00f3n, lo que hay que hacer es activar bad_kernel_fault() para cualquier fallo de ejecuci\u00f3n tomado por el kernel, como estaba antes de la confirmaci\u00f3n d3ca587404b3." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/500f81cec9f1bfa5210aa9dd5ba9a06e22f62a35", diff --git a/CVE-2021/CVE-2021-475xx/CVE-2021-47511.json b/CVE-2021/CVE-2021-475xx/CVE-2021-47511.json index 2c1034a6575..dcc94276ac8 100644 --- a/CVE-2021/CVE-2021-475xx/CVE-2021-47511.json +++ b/CVE-2021/CVE-2021-475xx/CVE-2021-47511.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47511", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-24T15:15:12.237", - "lastModified": "2024-05-24T18:09:20.027", + "lastModified": "2024-11-04T21:35:01.830", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ALSA: pcm: oss: corrige tama\u00f1os de per\u00edodo/b\u00fafer negativos El c\u00e1lculo del tama\u00f1o del per\u00edodo en la capa OSS puede recibir un valor negativo como error, pero el c\u00f3digo all\u00ed asume solo los valores positivos y manejarlos con size_t. Debido a esto, es posible que se pase un valor demasiado grande a las capas inferiores. Este parche cambia el c\u00f3digo para manejar con ssize_t y agrega las comprobaciones de errores adecuadas." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/00a860678098fcd9fa8db2b5fb9d2ddf4776d4cc", diff --git a/CVE-2021/CVE-2021-475xx/CVE-2021-47555.json b/CVE-2021/CVE-2021-475xx/CVE-2021-47555.json index 18d40dcde43..768ca7f2378 100644 --- a/CVE-2021/CVE-2021-475xx/CVE-2021-47555.json +++ b/CVE-2021/CVE-2021-475xx/CVE-2021-47555.json @@ -2,7 +2,7 @@ "id": "CVE-2021-47555", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-24T15:15:20.237", - "lastModified": "2024-05-24T18:09:20.027", + "lastModified": "2024-11-04T21:35:02.123", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: vlan: corrige el desbordamiento insuficiente para real_dev refcnt Inyecte el error antes de dev_hold(real_dev) en Register_vlan_dev() y ejecute el siguiente caso de prueba: ip link add dev dummy1 tipo dummy ip link add nombre dummy1.100 link dummy1 tipo vlan id 100 ip link del dev dummy1 Cuando se elimina el dispositivo de red ficticio, recibiremos una ADVERTENCIA como la siguiente: ===================== ==================================================== = refcount_t: decremento hit 0; p\u00e9rdida de memoria. ADVERTENCIA: CPU: 2 PID: 0 en lib/refcount.c:31 refcount_warn_saturate+0xbf/0x1e0 y un bucle sin fin de: ======================== ================================================= unregister_netdevice: esperando que el dummy1 quede libre. Recuento de uso = -1073741824 Esto se debe a que dev_put(real_dev) en vlan_dev_free() se llama sin dev_hold(real_dev) en Register_vlan_dev(). Hace que el refcnt de real_dev se desborde. Mueva dev_hold(real_dev) a vlan_dev_init() que es la devoluci\u00f3n de llamada de ndo_init(). Eso hace que dev_hold() y dev_put() para real_dev de vlan sean sim\u00e9tricos." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 4.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/01d9cc2dea3fde3bad6d27f464eff463496e2b00", diff --git a/CVE-2023/CVE-2023-363xx/CVE-2023-36325.json b/CVE-2023/CVE-2023-363xx/CVE-2023-36325.json index 85379f4f65b..fc7248cd3ac 100644 --- a/CVE-2023/CVE-2023-363xx/CVE-2023-36325.json +++ b/CVE-2023/CVE-2023-363xx/CVE-2023-36325.json @@ -2,7 +2,7 @@ "id": "CVE-2023-36325", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-09T06:15:11.303", - "lastModified": "2024-10-10T12:51:56.987", + "lastModified": "2024-11-04T22:35:00.740", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "i2p anterior a la versi\u00f3n 2.3.0 (Java) permite desanonimizar las direcciones IPv4 e IPv6 p\u00fablicas de los servicios ocultos de i2p (tambi\u00e9n conocidos como eepsites) mediante un ataque de correlaci\u00f3n entre las direcciones IPv4 e IPv6 que se produce cuando un mensaje tunelizado y reproducido tiene una discrepancia de comportamiento (puede descartarse o puede dar como resultado una respuesta de destino incorrecto). Un ataque tardar\u00eda d\u00edas en completarse." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.7, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], "references": [ { "url": "https://geti2p.net/en/blog/post/2023/06/25/new_release_2.3.0", diff --git a/CVE-2023/CVE-2023-468xx/CVE-2023-46840.json b/CVE-2023/CVE-2023-468xx/CVE-2023-46840.json index b1075e44ca9..4356f7d8df5 100644 --- a/CVE-2023/CVE-2023-468xx/CVE-2023-46840.json +++ b/CVE-2023/CVE-2023-468xx/CVE-2023-46840.json @@ -2,7 +2,7 @@ "id": "CVE-2023-46840", "sourceIdentifier": "security@xen.org", "published": "2024-03-20T11:15:08.180", - "lastModified": "2024-03-20T13:00:16.367", + "lastModified": "2024-11-04T22:35:01.860", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "La ubicaci\u00f3n incorrecta de una directiva de preprocesador en el c\u00f3digo fuente da como resultado una l\u00f3gica que no funciona como se espera cuando el soporte para invitados HVM se compila desde Xen." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 4.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 0.5, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://xenbits.xenproject.org/xsa/advisory-450.html", diff --git a/CVE-2024/CVE-2024-100xx/CVE-2024-10041.json b/CVE-2024/CVE-2024-100xx/CVE-2024-10041.json index 7307f6e0972..33a699025d8 100644 --- a/CVE-2024/CVE-2024-100xx/CVE-2024-10041.json +++ b/CVE-2024/CVE-2024-100xx/CVE-2024-10041.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10041", "sourceIdentifier": "secalert@redhat.com", "published": "2024-10-23T14:15:03.970", - "lastModified": "2024-11-04T17:35:09.270", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-04T22:27:02.877", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -40,6 +40,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +61,61 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linux-pam:linux-pam:-:*:*:*:*:*:*:*", + "matchCriteriaId": "20ED7FC4-9FBB-4886-9FF0-BBBCBBE852D6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", + "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D" + } + ] + } + ] + } + ], "references": [ { "url": "https://access.redhat.com/security/cve/CVE-2024-10041", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2319212", - "source": "secalert@redhat.com" + "source": "secalert@redhat.com", + "tags": [ + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10277.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10277.json index 3506253db10..75cc9845e4c 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10277.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10277.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10277", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-23T12:15:02.403", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-04T22:13:13.207", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -61,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -120,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*", + "matchCriteriaId": "94F213FF-17EB-4B99-9621-80792AD14A74" + } + ] + } + ] + } + ], "references": [ { "url": "https://flowus.cn/share/510c9ef1-8bb9-4c8f-9648-2ea6ee726b06?code=G8A6P3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.281552", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281552", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.423830", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10278.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10278.json index 93cfae443ea..e7a58bfbb1d 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10278.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10278.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10278", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-23T13:15:12.157", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-04T22:11:53.397", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in ESAFENET CDG 5. It has been classified as critical. This affects an unknown part of the file /com/esafenet/servlet/user/ReUserOrganiseService.java. The manipulation of the argument userId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en ESAFENET CDG 5. Se ha clasificado como cr\u00edtica. Afecta a una parte desconocida del archivo /com/esafenet/servlet/user/ReUserOrganiseService.java. La manipulaci\u00f3n del argumento userId provoca una inyecci\u00f3n SQL. Es posible iniciar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*", + "matchCriteriaId": "94F213FF-17EB-4B99-9621-80792AD14A74" + } + ] + } + ] + } + ], "references": [ { "url": "https://flowus.cn/share/cdfbea40-da0c-4fe7-a4b8-86631f0fd796?code=G8A6P3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.281553", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281553", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.423831", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-102xx/CVE-2024-10279.json b/CVE-2024/CVE-2024-102xx/CVE-2024-10279.json index f90c4d2e060..234ed01802d 100644 --- a/CVE-2024/CVE-2024-102xx/CVE-2024-10279.json +++ b/CVE-2024/CVE-2024-102xx/CVE-2024-10279.json @@ -2,13 +2,17 @@ "id": "CVE-2024-10279", "sourceIdentifier": "cna@vuldb.com", "published": "2024-10-23T13:15:12.877", - "lastModified": "2024-10-23T15:12:34.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-04T22:14:01.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in ESAFENET CDG 5. It has been declared as critical. This vulnerability affects unknown code of the file /com/esafenet/servlet/policy/PrintPolicyService.java. The manipulation of the argument policyId leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en ESAFENET CDG 5. Se ha declarado como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /com/esafenet/servlet/policy/PrintPolicyService.java. La manipulaci\u00f3n del argumento policyId provoca una inyecci\u00f3n SQL. El ataque se puede iniciar de forma remota. La vulnerabilidad se ha hecho p\u00fablica y puede utilizarse. Se contact\u00f3 al proveedor con antelaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -57,6 +61,26 @@ } ], "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "cna@vuldb.com", "type": "Secondary", @@ -116,22 +140,55 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*", + "matchCriteriaId": "94F213FF-17EB-4B99-9621-80792AD14A74" + } + ] + } + ] + } + ], "references": [ { "url": "https://flowus.cn/share/b04c63c7-5b3c-47d2-9159-43943aecc342?code=G8A6P3", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.281554", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.281554", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.423832", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21726.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21726.json index 45c7925e91e..d13f78cf266 100644 --- a/CVE-2024/CVE-2024-217xx/CVE-2024-21726.json +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21726.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21726", "sourceIdentifier": "security@joomla.org", "published": "2024-02-29T01:44:03.897", - "lastModified": "2024-02-29T13:49:29.390", + "lastModified": "2024-11-04T21:35:03.690", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "El filtrado de contenido inadecuado genera vulnerabilidades XSS en varios componentes." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, "weaknesses": [ { "source": "security@joomla.org", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23242.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23242.json index 195fc47cf81..964e20edf85 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23242.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23242.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23242", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:48.200", - "lastModified": "2024-03-13T21:15:56.410", + "lastModified": "2024-11-04T22:35:02.393", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se solucion\u00f3 un problema de privacidad al no registrar el contenido de los campos de texto. Este problema se solucion\u00f3 en macOS Sonoma 14.4, iOS 17.4 y iPadOS 17.4. Es posible que una aplicaci\u00f3n pueda ver los datos de Mail." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.3, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", diff --git a/CVE-2024/CVE-2024-232xx/CVE-2024-23245.json b/CVE-2024/CVE-2024-232xx/CVE-2024-23245.json index f75f1345284..f5c8fa96083 100644 --- a/CVE-2024/CVE-2024-232xx/CVE-2024-23245.json +++ b/CVE-2024/CVE-2024-232xx/CVE-2024-23245.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23245", "sourceIdentifier": "product-security@apple.com", "published": "2024-03-08T02:15:48.287", - "lastModified": "2024-03-13T23:15:46.520", + "lastModified": "2024-11-04T21:35:04.100", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Este problema se solucion\u00f3 agregando una solicitud adicional de consentimiento del usuario. Este problema se solucion\u00f3 en macOS Sonoma 14.4, macOS Monterey 12.7.4, macOS Ventura 13.6.5. Los atajos de terceros pueden utilizar una acci\u00f3n heredada de Automator para enviar eventos a aplicaciones sin el consentimiento del usuario." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 5.4, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/21", diff --git a/CVE-2024/CVE-2024-235xx/CVE-2024-23561.json b/CVE-2024/CVE-2024-235xx/CVE-2024-23561.json index 19190fb231b..ce3d87edf1a 100644 --- a/CVE-2024/CVE-2024-235xx/CVE-2024-23561.json +++ b/CVE-2024/CVE-2024-235xx/CVE-2024-23561.json @@ -2,7 +2,7 @@ "id": "CVE-2024-23561", "sourceIdentifier": "psirt@hcl.com", "published": "2024-04-15T21:15:07.243", - "lastModified": "2024-04-16T13:24:07.103", + "lastModified": "2024-11-04T22:35:03.360", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], "references": [ { "url": "https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0111926", diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24549.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24549.json index 7f0b2a539e7..cb6eba79e3a 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24549.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24549.json @@ -2,7 +2,7 @@ "id": "CVE-2024-24549", "sourceIdentifier": "security@apache.org", "published": "2024-03-13T16:15:29.373", - "lastModified": "2024-06-23T09:15:11.213", + "lastModified": "2024-11-04T22:35:04.083", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Denegaci\u00f3n de servicio debido a una vulnerabilidad de validaci\u00f3n de entrada incorrecta para solicitudes HTTP/2 en Apache Tomcat. Al procesar una solicitud HTTP/2, si la solicitud exced\u00eda cualquiera de los l\u00edmites configurados para los encabezados, la secuencia HTTP/2 asociada no se restablec\u00eda hasta que se hubieran procesado todos los encabezados. Este problema afecta a Apache Tomcat: desde 11.0.0- M1 hasta 11.0.0-M16, desde 10.1.0-M1 hasta 10.1.18, desde 9.0.0-M1 hasta 9.0.85, desde 8.5.0 hasta 8.5.98. Se recomienda a los usuarios actualizar a la versi\u00f3n 11.0.0-M17, 10.1.19, 9.0.86 u 8.5.99, que solucionan el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-267xx/CVE-2024-26708.json b/CVE-2024/CVE-2024-267xx/CVE-2024-26708.json index 403c63a8188..e2b100fad0d 100644 --- a/CVE-2024/CVE-2024-267xx/CVE-2024-26708.json +++ b/CVE-2024/CVE-2024-267xx/CVE-2024-26708.json @@ -2,7 +2,7 @@ "id": "CVE-2024-26708", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-04-03T15:15:53.390", - "lastModified": "2024-04-03T17:24:18.150", + "lastModified": "2024-11-04T22:35:04.300", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: mptcp: realmente se adapta a la ejecuci\u00f3n fastopen. El cierre del subflujo Fastopen y PM-trigger puede correr, seg\u00fan lo informado por syzkaller. En mi primer intento de cerrar dicha ejecuci\u00f3n, me perd\u00ed el hecho de que el estado del subflujo puede cambiar nuevamente antes de que se invoque la devoluci\u00f3n de llamada subflow_state_change. Solucione el problema copiando adicionalmente todos los estados a los que se puede acceder directamente desde TCP_FIN_WAIT1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/337cebbd850f94147cee05252778f8f78b8c337f", diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27184.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27184.json index ac82158fbef..52d4d1f322c 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27184.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27184.json @@ -2,7 +2,7 @@ "id": "CVE-2024-27184", "sourceIdentifier": "security@joomla.org", "published": "2024-08-20T16:15:10.733", - "lastModified": "2024-08-21T12:30:33.697", + "lastModified": "2024-11-04T21:35:04.690", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Una validaci\u00f3n inadecuada de las URL podr\u00eda dar lugar a una verificaci\u00f3n no v\u00e1lida de si una URL de redireccionamiento es interna o no." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "security@joomla.org", diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3219.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3219.json index 764a2ac234b..08778d31006 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3219.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3219.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3219", "sourceIdentifier": "cna@python.org", "published": "2024-07-29T22:15:04.970", - "lastModified": "2024-10-17T19:15:22.220", + "lastModified": "2024-11-04T22:35:06.427", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -61,6 +61,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "http://www.openwall.com/lists/oss-security/2024/07/29/3", diff --git a/CVE-2024/CVE-2024-331xx/CVE-2024-33147.json b/CVE-2024/CVE-2024-331xx/CVE-2024-33147.json index 216d60b6683..4c8d47c08c2 100644 --- a/CVE-2024/CVE-2024-331xx/CVE-2024-33147.json +++ b/CVE-2024/CVE-2024-331xx/CVE-2024-33147.json @@ -2,7 +2,7 @@ "id": "CVE-2024-33147", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-07T17:15:08.803", - "lastModified": "2024-05-07T20:07:58.737", + "lastModified": "2024-11-04T22:35:04.680", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que J2EEFAST v2.7.0 contiene una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro sql_filter en la funci\u00f3n authRoleList." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://github.com/cxcxcxcxcxcxcxc/cxcxcxcxcxcxcxc/blob/main/cxcxcxcxcxc/about-2024/33147.txt", diff --git a/CVE-2024/CVE-2024-344xx/CVE-2024-34457.json b/CVE-2024/CVE-2024-344xx/CVE-2024-34457.json index 51ed19ebd09..5de80629380 100644 --- a/CVE-2024/CVE-2024-344xx/CVE-2024-34457.json +++ b/CVE-2024/CVE-2024-344xx/CVE-2024-34457.json @@ -2,7 +2,7 @@ "id": "CVE-2024-34457", "sourceIdentifier": "security@apache.org", "published": "2024-07-22T10:15:03.607", - "lastModified": "2024-09-11T11:15:10.757", + "lastModified": "2024-11-04T22:35:05.480", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-369xx/CVE-2024-36916.json b/CVE-2024/CVE-2024-369xx/CVE-2024-36916.json index 6644cb655de..50fa9c9c83e 100644 --- a/CVE-2024/CVE-2024-369xx/CVE-2024-36916.json +++ b/CVE-2024/CVE-2024-369xx/CVE-2024-36916.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36916", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-05-30T16:15:14.963", - "lastModified": "2024-06-27T14:15:14.463", + "lastModified": "2024-11-04T21:35:04.977", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: blk-iocost: evita cambios fuera de los l\u00edmites UBSAN detecta un comportamiento indefinido en blk-iocost, donde a veces iocg->delay se desplaza hacia la derecha en un n\u00famero demasiado grande, lo que resulta en un estado indefinido. comportamiento en algunas arquitecturas. [186.556576] ------------[ cortar aqu\u00ed ]------------ UBSAN: desplazamiento fuera de los l\u00edmites en block/blk-iocost.c:1366 :23 exponente de desplazamiento 64 es demasiado grande para el tipo de 64 bits 'u64' (tambi\u00e9n conocido como 'unsigned long long') CPU: 16 PID: 0 Comm: swapper/16 Tainted: GSEN 6.9.0-0_fbk700_debug_rc2_kbuilder_0_gc85af715cac0 #1 Nombre de hardware: Quanta Twin Lakes MP/Twin Lakes MP pasivo, BIOS F09_3A23 08/12/2020 Seguimiento de llamadas: dump_stack_lvl+0x8f/0xe0 __ubsan_handle_shift_out_of_bounds+0x22c/0x280 iocg_kick_delay+0x30b/0x310 ioc_timer_fn+0x2fb/0x 1f80 __run_timer_base+0x1b6/0x250 ... Evitar ese comportamiento indefinido simplemente tomando la rama \"retraso = 0\" si el cambio es demasiado grande. No estoy seguro de cu\u00e1les ser\u00e1n los s\u00edntomas de un retraso de valor indefinido, pero sospecho que podr\u00eda ser m\u00e1s que molesto depurarlo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/488dc6808cb8369685f18cee81e88e7052ac153b", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37844.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37844.json index 3181d0b22e2..2f287fa5f9e 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37844.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37844.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37844", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T19:15:03.897", - "lastModified": "2024-10-28T14:35:11.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-04T21:58:56.810", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:radixiot:mango:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.2.0", + "matchCriteriaId": "C65DD50F-B1B1-4694-8391-F121255AF129" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/herombey/Disclosures/blob/main/CVE-2024-37844%20XSS.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/herombey/Disclosures/tree/main", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37845.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37845.json index 0f1121d2674..c6d1c2fe83d 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37845.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37845.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37845", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T19:15:03.973", - "lastModified": "2024-10-29T18:35:04.397", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-04T21:53:53.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.2, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:radixiot:mango:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.2.0", + "matchCriteriaId": "C65DD50F-B1B1-4694-8391-F121255AF129" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/herombey/Disclosures/blob/main/CVE-2024-37845%20RCE.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/herombey/Disclosures/tree/main", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37846.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37846.json index 715c4f19643..36ef3a55214 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37846.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37846.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37846", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T19:15:04.027", - "lastModified": "2024-10-29T18:35:05.693", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2024-11-04T22:03:12.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 3.5, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 2.5 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:radixiot:mango:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.2.0", + "matchCriteriaId": "C65DD50F-B1B1-4694-8391-F121255AF129" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/herombey/Disclosures/blob/main/CVE-2024-37846-CSTI.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/herombey/Disclosures/tree/main", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37847.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37847.json index d94c5a77b69..557fb926ea7 100644 --- a/CVE-2024/CVE-2024-378xx/CVE-2024-37847.json +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37847.json @@ -2,7 +2,7 @@ "id": "CVE-2024-37847", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-25T19:15:04.087", - "lastModified": "2024-10-29T18:35:06.983", + "lastModified": "2024-11-04T21:32:29.250", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -55,14 +85,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:radixiot:mango:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.1.4", + "matchCriteriaId": "8A8E1DDF-63E8-4C11-AA25-F11CE3976FA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:radixiot:mangoapi:*:*:*:*:*:*:*:*", + "versionEndExcluding": "4.5.5", + "matchCriteriaId": "997E9719-EA5D-41DC-ACF7-8016356B03D5" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/herombey/Disclosures/blob/main/CVE-2024-37847%20File%20Upload%20Path%20Traversal.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Mitigation", + "Third Party Advisory" + ] }, { "url": "https://github.com/herombey/Disclosures/tree/main", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-385xx/CVE-2024-38587.json b/CVE-2024/CVE-2024-385xx/CVE-2024-38587.json index 5b75067a961..380ece813ae 100644 --- a/CVE-2024/CVE-2024-385xx/CVE-2024-38587.json +++ b/CVE-2024/CVE-2024-385xx/CVE-2024-38587.json @@ -2,7 +2,7 @@ "id": "CVE-2024-38587", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-06-19T14:15:18.800", - "lastModified": "2024-07-15T07:15:11.083", + "lastModified": "2024-11-04T21:35:05.243", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: Speakup: corrige el error sizeof() vs ARRAY_SIZE() El puntero \"buf\" es una matriz de valores u16. Este c\u00f3digo deber\u00eda usar ARRAY_SIZE() (que es 256) en lugar de sizeof() (que es 512), de lo contrario a\u00fan puede salirse de los l\u00edmites." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW", + "baseScore": 5.3, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://git.kernel.org/stable/c/008ab3c53bc4f0b2f20013c8f6c204a3203d0b8b", diff --git a/CVE-2024/CVE-2024-396xx/CVE-2024-39637.json b/CVE-2024/CVE-2024-396xx/CVE-2024-39637.json index 95d8ce93ffc..9c3747ae27b 100644 --- a/CVE-2024/CVE-2024-396xx/CVE-2024-39637.json +++ b/CVE-2024/CVE-2024-396xx/CVE-2024-39637.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39637", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-01T22:15:25.837", - "lastModified": "2024-08-02T12:59:43.990", + "lastModified": "2024-11-04T22:35:05.700", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/edubin/wordpress-edubin-theme-9-2-0-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", diff --git a/CVE-2024/CVE-2024-404xx/CVE-2024-40490.json b/CVE-2024/CVE-2024-404xx/CVE-2024-40490.json index 80428c4d746..1ce4e8126ec 100644 --- a/CVE-2024/CVE-2024-404xx/CVE-2024-40490.json +++ b/CVE-2024/CVE-2024-404xx/CVE-2024-40490.json @@ -2,16 +2,55 @@ "id": "CVE-2024-40490", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-01T16:15:08.793", - "lastModified": "2024-11-01T20:24:53.730", + "lastModified": "2024-11-04T21:35:05.530", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Sourcebans++ before v.1.8.0 allows a remote attacker to obtain sensitive information via a crafted XAJAX call to the Forgot Password function." + }, + { + "lang": "es", + "value": " Un problema en Sourcebans++ anterior a v.1.8.0 permite que un atacante remoto obtenga informaci\u00f3n confidencial a trav\u00e9s de una llamada XAJAX manipulada a la funci\u00f3n Olvid\u00e9 mi contrase\u00f1a." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 7.5, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/sbpp/sourcebans-pp/issues/975", diff --git a/CVE-2024/CVE-2024-405xx/CVE-2024-40594.json b/CVE-2024/CVE-2024-405xx/CVE-2024-40594.json index e68ff31e475..24dd051709b 100644 --- a/CVE-2024/CVE-2024-405xx/CVE-2024-40594.json +++ b/CVE-2024/CVE-2024-405xx/CVE-2024-40594.json @@ -2,7 +2,7 @@ "id": "CVE-2024-40594", "sourceIdentifier": "cve@mitre.org", "published": "2024-07-06T05:15:09.670", - "lastModified": "2024-07-08T15:49:22.437", + "lastModified": "2024-11-04T21:35:06.433", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -39,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] + } + ], "references": [ { "url": "https://arstechnica.com/ai/2024/07/chatgpts-much-heralded-mac-app-was-storing-conversations-as-plain-text/", diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41930.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41930.json index d0b973ae7a7..3aeb9b43e34 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41930.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41930.json @@ -2,7 +2,7 @@ "id": "CVE-2024-41930", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-09-27T09:15:03.550", - "lastModified": "2024-09-30T12:46:20.237", + "lastModified": "2024-11-04T22:35:07.177", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Existe una vulnerabilidad de Cross-Site Scripting en MF Teacher Performance Management System version 6. Si se explota esta vulnerabilidad, se puede ejecutar una secuencia de comandos arbitraria en el navegador web del usuario que accedi\u00f3 al sitio web utilizando el producto." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "vultures@jpcert.or.jp", diff --git a/CVE-2024/CVE-2024-441xx/CVE-2024-44185.json b/CVE-2024/CVE-2024-441xx/CVE-2024-44185.json index bdaef577db4..a3ab696ccae 100644 --- a/CVE-2024/CVE-2024-441xx/CVE-2024-44185.json +++ b/CVE-2024/CVE-2024-441xx/CVE-2024-44185.json @@ -2,8 +2,8 @@ "id": "CVE-2024-44185", "sourceIdentifier": "product-security@apple.com", "published": "2024-10-24T17:15:16.470", - "lastModified": "2024-10-29T15:22:45.677", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-04T22:35:07.400", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 5.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44232.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44232.json index 6a8f93c7fdb..74326814ebe 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44232.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44232.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44232", "sourceIdentifier": "product-security@apple.com", "published": "2024-11-01T21:15:14.730", - "lastModified": "2024-11-04T14:42:06.010", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-04T21:35:07.233", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sonoma 14.7.1, macOS Ventura 13.7.1, visionOS 2.1, watchOS 11.1, tvOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, iOS 18.1 and iPadOS 18.1. Parsing a maliciously crafted video file may lead to unexpected system termination." + }, + { + "lang": "es", + "value": " El problema se solucion\u00f3 con comprobaciones de los l\u00edmites mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.7.1, macOS Ventura 13.7.1, visionOS 2.1, watchOS 11.1, tvOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, iOS 18.1 y iPadOS 18.1. El an\u00e1lisis de un archivo de video creado con fines malintencionados puede provocar la finalizaci\u00f3n inesperada del sistema." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44233.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44233.json index 76b2ac0249f..13dc8a952f9 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44233.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44233.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44233", "sourceIdentifier": "product-security@apple.com", "published": "2024-11-01T21:15:14.787", - "lastModified": "2024-11-04T14:42:01.997", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-04T22:35:07.613", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sonoma 14.7.1, macOS Ventura 13.7.1, visionOS 2.1, watchOS 11.1, tvOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, iOS 18.1 and iPadOS 18.1. Parsing a maliciously crafted video file may lead to unexpected system termination." + }, + { + "lang": "es", + "value": " El problema se solucion\u00f3 con comprobaciones de l\u00edmites mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.7.1, macOS Ventura 13.7.1, visionOS 2.1, watchOS 11.1, tvOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, iOS 18.1 y iPadOS 18.1. El an\u00e1lisis de un archivo de video creado con fines malintencionados puede provocar la finalizaci\u00f3n inesperada del sistema." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-442xx/CVE-2024-44234.json b/CVE-2024/CVE-2024-442xx/CVE-2024-44234.json index b32232dc2fe..769e13d24bb 100644 --- a/CVE-2024/CVE-2024-442xx/CVE-2024-44234.json +++ b/CVE-2024/CVE-2024-442xx/CVE-2024-44234.json @@ -2,13 +2,17 @@ "id": "CVE-2024-44234", "sourceIdentifier": "product-security@apple.com", "published": "2024-11-01T21:15:14.847", - "lastModified": "2024-11-04T14:42:08.367", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-04T21:35:08.147", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sonoma 14.7.1, macOS Ventura 13.7.1, visionOS 2.1, watchOS 11.1, tvOS 18.1, iOS 17.7.1 and iPadOS 17.7.1, iOS 18.1 and iPadOS 18.1. Parsing a maliciously crafted video file may lead to unexpected system termination." + }, + { + "lang": "es", + "value": " El problema se solucion\u00f3 con comprobaciones de l\u00edmites mejoradas. Este problema se solucion\u00f3 en macOS Sonoma 14.7.1, macOS Ventura 13.7.1, visionOS 2.1, watchOS 11.1, tvOS 18.1, iOS 17.7.1 y iPadOS 17.7.1, iOS 18.1 y iPadOS 18.1. El an\u00e1lisis de un archivo de video creado con fines malintencionados puede provocar la finalizaci\u00f3n inesperada del sistema." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-455xx/CVE-2024-45504.json b/CVE-2024/CVE-2024-455xx/CVE-2024-45504.json index 0c9643fa330..f5b6b651714 100644 --- a/CVE-2024/CVE-2024-455xx/CVE-2024-45504.json +++ b/CVE-2024/CVE-2024-455xx/CVE-2024-45504.json @@ -2,7 +2,7 @@ "id": "CVE-2024-45504", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-09-10T05:15:12.780", - "lastModified": "2024-09-10T12:09:50.377", + "lastModified": "2024-11-04T21:35:09.173", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de cross-site request forgery (CSRF) en varios productos de Alps System Integration y productos OEM permite que un atacante remoto no autenticado secuestre la autenticaci\u00f3n del usuario y realice operaciones no deseadas si el usuario ve una p\u00e1gina maliciosa mientras est\u00e1 conectado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], "references": [ { "url": "https://alsifaq.dga.jp/faq_detail.html?id=6494", diff --git a/CVE-2024/CVE-2024-460xx/CVE-2024-46040.json b/CVE-2024/CVE-2024-460xx/CVE-2024-46040.json index 5f989038eed..610ba802ff8 100644 --- a/CVE-2024/CVE-2024-460xx/CVE-2024-46040.json +++ b/CVE-2024/CVE-2024-460xx/CVE-2024-46040.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46040", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-07T16:15:05.407", - "lastModified": "2024-10-07T17:47:48.410", + "lastModified": "2024-11-04T22:35:08.430", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "IoT Haat Smart Plug IH-IN-16A-S IH-IN-16A-S v5.16.1 sufre un vencimiento de sesi\u00f3n insuficiente. La falta de validaci\u00f3n del token de autenticaci\u00f3n en IoT Haat durante el modo de emparejamiento del punto de acceso hace que el atacante repita los paquetes de Wi-Fi y apague a la fuerza el punto de acceso despu\u00e9s de que el token de autenticaci\u00f3n haya vencido." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH", + "baseScore": 6.5, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], "references": [ { "url": "https://github.com/Anonymous120386/Anonymous", diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47041.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47041.json index 6a356cd7a90..90242551a52 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47041.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47041.json @@ -2,17 +2,41 @@ "id": "CVE-2024-47041", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2024-10-25T11:15:17.667", - "lastModified": "2024-10-25T16:35:10.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-04T22:16:13.793", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In valid_address of syscall.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En valid_address de syscall.c, existe una posible lectura fuera de los l\u00edmites debido a una comprobaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." } ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -36,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -47,10 +81,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8B9FEC8-73B6-43B8-B24E-1F7C20D91D26" + } + ] + } + ] + } + ], "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-10-01", - "source": "dsap-vuln-management@google.com" + "source": "dsap-vuln-management@google.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-471xx/CVE-2024-47189.json b/CVE-2024/CVE-2024-471xx/CVE-2024-47189.json index 356e70fce9d..61173a79b85 100644 --- a/CVE-2024/CVE-2024-471xx/CVE-2024-47189.json +++ b/CVE-2024/CVE-2024-471xx/CVE-2024-47189.json @@ -2,7 +2,7 @@ "id": "CVE-2024-47189", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T20:15:14.697", - "lastModified": "2024-10-23T15:12:34.673", + "lastModified": "2024-11-04T22:35:09.220", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La interfaz API del componente AWV (conferencias de audio, web y video) de Mitel MiCollab hasta la versi\u00f3n 9.8 SP1 FP2 (9.8.1.201) podr\u00eda permitir que un atacante no autenticado realice una inyecci\u00f3n SQL debido a una desinfecci\u00f3n insuficiente de la entrada del usuario. Una explotaci\u00f3n exitosa podr\u00eda permitir que un atacante con conocimiento de detalles espec\u00edficos acceda a informaci\u00f3n no confidencial sobre el aprovisionamiento de usuarios y ejecute comandos de base de datos SQL arbitrarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 7.7, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2024-0026", diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48410.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48410.json index 6c56019207f..57ded0ae4f4 100644 --- a/CVE-2024/CVE-2024-484xx/CVE-2024-48410.json +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48410.json @@ -2,16 +2,55 @@ "id": "CVE-2024-48410", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-01T17:15:17.580", - "lastModified": "2024-11-01T20:24:53.730", + "lastModified": "2024-11-04T21:35:10.317", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in Camtrace v.9.16.2.1 allows a remote attacker to execute arbitrary code via the login.php." + }, + { + "lang": "es", + "value": " La vulnerabilidad de cross site scripting en Camtrace v.9.16.2.1 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de login.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 6.1, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/Youns92/e7cd3f5d18ab089320f72c51fa3977de", diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48463.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48463.json new file mode 100644 index 00000000000..8119796c0b3 --- /dev/null +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48463.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-48463", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-04T21:15:04.707", + "lastModified": "2024-11-04T21:15:04.707", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Bruno before 1.29.1 uses Electron shell.openExternal without validation (of http or https) for opening windows within the Markdown docs viewer." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/opcod3r/ab69f36d52367df7ffac32a597dff31c", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/usebruno/bruno/pull/3122", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/usebruno/bruno/releases/tag/v1.29.1", + "source": "cve@mitre.org" + }, + { + "url": "https://www.usebruno.com/changelog", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51252.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51252.json index fa5cb920fb8..055573403fa 100644 --- a/CVE-2024/CVE-2024-512xx/CVE-2024-51252.json +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51252.json @@ -2,16 +2,55 @@ "id": "CVE-2024-51252", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-01T18:15:07.287", - "lastModified": "2024-11-01T20:24:53.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-11-04T21:35:11.177", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Draytek Vigor3900 1.5.1.3, attackers can inject malicious commands into mainfunction.cgi and execute arbitrary commands by calling the restore function." + }, + { + "lang": "es", + "value": " En Draytek Vigor3900 1.5.1.3, los atacantes pueden inyectar comandos maliciosos en mainfunction.cgi y ejecutar comandos arbitrarios llamando a la funci\u00f3n restore." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.0, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/fu37kola/cve/blob/main/DrayTek/Vigor3900/1.5.1.3/DrayTek_Vigor_3900_1.5.1.3.pdf", diff --git a/CVE-2024/CVE-2024-513xx/CVE-2024-51377.json b/CVE-2024/CVE-2024-513xx/CVE-2024-51377.json index 8a2702a4aae..3323058db8f 100644 --- a/CVE-2024/CVE-2024-513xx/CVE-2024-51377.json +++ b/CVE-2024/CVE-2024-513xx/CVE-2024-51377.json @@ -2,16 +2,55 @@ "id": "CVE-2024-51377", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-01T16:15:09.400", - "lastModified": "2024-11-01T20:24:53.730", + "lastModified": "2024-11-04T21:35:12.543", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Ladybird Web Solution Faveo Helpdesk & Servicedesk (On-Premise and Cloud) 9.2.0 allows a remote attacker to execute arbitrary code via the Subject and Identifier fields" + }, + { + "lang": "es", + "value": "Un problema en Ladybird Web Solution Faveo Helpdesk & Servicedesk (On-Premise and Cloud) 9.2.0 permite que un atacante remoto ejecute c\u00f3digo arbitrario a trav\u00e9s de los campos Subject e Identifier " + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH", + "baseScore": 8.8, + "baseSeverity": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Asadiqbal2/Vulnerabilities-Research/tree/main/CVE-2024-51377", diff --git a/CVE-2024/CVE-2024-514xx/CVE-2024-51432.json b/CVE-2024/CVE-2024-514xx/CVE-2024-51432.json index e7995303e81..9b11b65be34 100644 --- a/CVE-2024/CVE-2024-514xx/CVE-2024-51432.json +++ b/CVE-2024/CVE-2024-514xx/CVE-2024-51432.json @@ -2,16 +2,55 @@ "id": "CVE-2024-51432", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-01T16:15:09.697", - "lastModified": "2024-11-01T20:24:53.730", + "lastModified": "2024-11-04T22:35:10.037", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in FiberHome HG6544C RP2743 allows an attacker to execute arbitrary code via the SSID field in the WIFI Clients List not being sanitized" + }, + { + "lang": "es", + "value": " La vulnerabilidad de cross site scripting en FiberHome HG6544C RP2743 permite que un atacante ejecute c\u00f3digo arbitrario a trav\u00e9s del campo SSID en la lista de clientes WIFI que no est\u00e1 desinfectada" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE", + "baseScore": 4.8, + "baseSeverity": "MEDIUM" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://en.fiberhome.com/", diff --git a/CVE-2024/CVE-2024-517xx/CVE-2024-51744.json b/CVE-2024/CVE-2024-517xx/CVE-2024-51744.json new file mode 100644 index 00000000000..fd4a74a73cf --- /dev/null +++ b/CVE-2024/CVE-2024-517xx/CVE-2024-51744.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-51744", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-04T22:15:03.997", + "lastModified": "2024-11-04T22:15:03.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in \"dangerous\" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behaviour of an established function and is not 100 % backwards compatible, so updating to 4.5.1 might break your code. In case you cannot update to 4.5.0, please make sure that you are properly checking for all errors (\"dangerous\" ones first), so that you are not running in the case detailed above." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "baseScore": 3.1, + "baseSeverity": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/golang-jwt/jwt/commit/7b1c1c00a171c6c79bbdb40e4ce7d197060c1c2c", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/golang-jwt/jwt/security/advisories/GHSA-29wx-vh33-7x7r", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index f39a04b4ab3..0645c07fabe 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-04T21:00:20.280091+00:00 +2024-11-04T23:00:19.803018+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-04T20:47:21.767000+00:00 +2024-11-04T22:35:10.037000+00:00 ``` ### Last Data Feed Release @@ -33,54 +33,46 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -268166 +268168 ``` ### CVEs added in the last Commit -Recently added CVEs: `10` +Recently added CVEs: `2` -- [CVE-2024-10768](CVE-2024/CVE-2024-107xx/CVE-2024-10768.json) (`2024-11-04T19:15:05.743`) -- [CVE-2024-10791](CVE-2024/CVE-2024-107xx/CVE-2024-10791.json) (`2024-11-04T20:15:04.580`) -- [CVE-2024-30616](CVE-2024/CVE-2024-306xx/CVE-2024-30616.json) (`2024-11-04T19:15:06.193`) -- [CVE-2024-30617](CVE-2024/CVE-2024-306xx/CVE-2024-30617.json) (`2024-11-04T19:15:06.277`) -- [CVE-2024-30618](CVE-2024/CVE-2024-306xx/CVE-2024-30618.json) (`2024-11-04T19:15:06.360`) -- [CVE-2024-30619](CVE-2024/CVE-2024-306xx/CVE-2024-30619.json) (`2024-11-04T19:15:06.440`) -- [CVE-2024-34885](CVE-2024/CVE-2024-348xx/CVE-2024-34885.json) (`2024-11-04T19:15:06.560`) -- [CVE-2024-34891](CVE-2024/CVE-2024-348xx/CVE-2024-34891.json) (`2024-11-04T19:15:06.647`) -- [CVE-2024-45086](CVE-2024/CVE-2024-450xx/CVE-2024-45086.json) (`2024-11-04T20:15:05.013`) -- [CVE-2024-45185](CVE-2024/CVE-2024-451xx/CVE-2024-45185.json) (`2024-11-04T20:15:05.257`) +- [CVE-2024-48463](CVE-2024/CVE-2024-484xx/CVE-2024-48463.json) (`2024-11-04T21:15:04.707`) +- [CVE-2024-51744](CVE-2024/CVE-2024-517xx/CVE-2024-51744.json) (`2024-11-04T22:15:03.997`) ### CVEs modified in the last Commit -Recently modified CVEs: `52` +Recently modified CVEs: `43` -- [CVE-2024-26828](CVE-2024/CVE-2024-268xx/CVE-2024-26828.json) (`2024-11-04T19:35:06.407`) -- [CVE-2024-26918](CVE-2024/CVE-2024-269xx/CVE-2024-26918.json) (`2024-11-04T19:35:06.627`) -- [CVE-2024-26940](CVE-2024/CVE-2024-269xx/CVE-2024-26940.json) (`2024-11-04T19:35:06.833`) -- [CVE-2024-27393](CVE-2024/CVE-2024-273xx/CVE-2024-27393.json) (`2024-11-04T19:35:07.067`) -- [CVE-2024-27524](CVE-2024/CVE-2024-275xx/CVE-2024-27524.json) (`2024-11-04T20:35:04.913`) -- [CVE-2024-27525](CVE-2024/CVE-2024-275xx/CVE-2024-27525.json) (`2024-11-04T20:35:05.800`) -- [CVE-2024-34223](CVE-2024/CVE-2024-342xx/CVE-2024-34223.json) (`2024-11-04T19:35:07.467`) -- [CVE-2024-35083](CVE-2024/CVE-2024-350xx/CVE-2024-35083.json) (`2024-11-04T20:35:06.920`) -- [CVE-2024-36117](CVE-2024/CVE-2024-361xx/CVE-2024-36117.json) (`2024-11-04T19:15:06.733`) -- [CVE-2024-36953](CVE-2024/CVE-2024-369xx/CVE-2024-36953.json) (`2024-11-04T19:35:09.213`) -- [CVE-2024-44731](CVE-2024/CVE-2024-447xx/CVE-2024-44731.json) (`2024-11-04T20:35:07.840`) -- [CVE-2024-48270](CVE-2024/CVE-2024-482xx/CVE-2024-48270.json) (`2024-11-04T19:35:11.057`) -- [CVE-2024-48289](CVE-2024/CVE-2024-482xx/CVE-2024-48289.json) (`2024-11-04T20:35:09.307`) -- [CVE-2024-48336](CVE-2024/CVE-2024-483xx/CVE-2024-48336.json) (`2024-11-04T20:35:10.193`) -- [CVE-2024-48733](CVE-2024/CVE-2024-487xx/CVE-2024-48733.json) (`2024-11-04T19:35:11.380`) -- [CVE-2024-48734](CVE-2024/CVE-2024-487xx/CVE-2024-48734.json) (`2024-11-04T19:35:12.597`) -- [CVE-2024-50801](CVE-2024/CVE-2024-508xx/CVE-2024-50801.json) (`2024-11-04T19:35:13.810`) -- [CVE-2024-50802](CVE-2024/CVE-2024-508xx/CVE-2024-50802.json) (`2024-11-04T19:35:14.907`) -- [CVE-2024-51328](CVE-2024/CVE-2024-513xx/CVE-2024-51328.json) (`2024-11-04T19:35:16.150`) -- [CVE-2024-51406](CVE-2024/CVE-2024-514xx/CVE-2024-51406.json) (`2024-11-04T19:35:17.410`) -- [CVE-2024-51407](CVE-2024/CVE-2024-514xx/CVE-2024-51407.json) (`2024-11-04T20:35:11.350`) -- [CVE-2024-6080](CVE-2024/CVE-2024-60xx/CVE-2024-6080.json) (`2024-11-04T19:15:07.323`) -- [CVE-2024-7807](CVE-2024/CVE-2024-78xx/CVE-2024-7807.json) (`2024-11-04T20:47:21.767`) -- [CVE-2024-9324](CVE-2024/CVE-2024-93xx/CVE-2024-9324.json) (`2024-11-04T19:15:07.587`) -- [CVE-2024-9325](CVE-2024/CVE-2024-93xx/CVE-2024-9325.json) (`2024-11-04T19:15:07.790`) +- [CVE-2024-3219](CVE-2024/CVE-2024-32xx/CVE-2024-3219.json) (`2024-11-04T22:35:06.427`) +- [CVE-2024-33147](CVE-2024/CVE-2024-331xx/CVE-2024-33147.json) (`2024-11-04T22:35:04.680`) +- [CVE-2024-34457](CVE-2024/CVE-2024-344xx/CVE-2024-34457.json) (`2024-11-04T22:35:05.480`) +- [CVE-2024-36916](CVE-2024/CVE-2024-369xx/CVE-2024-36916.json) (`2024-11-04T21:35:04.977`) +- [CVE-2024-37844](CVE-2024/CVE-2024-378xx/CVE-2024-37844.json) (`2024-11-04T21:58:56.810`) +- [CVE-2024-37845](CVE-2024/CVE-2024-378xx/CVE-2024-37845.json) (`2024-11-04T21:53:53.433`) +- [CVE-2024-37846](CVE-2024/CVE-2024-378xx/CVE-2024-37846.json) (`2024-11-04T22:03:12.527`) +- [CVE-2024-37847](CVE-2024/CVE-2024-378xx/CVE-2024-37847.json) (`2024-11-04T21:32:29.250`) +- [CVE-2024-38587](CVE-2024/CVE-2024-385xx/CVE-2024-38587.json) (`2024-11-04T21:35:05.243`) +- [CVE-2024-39637](CVE-2024/CVE-2024-396xx/CVE-2024-39637.json) (`2024-11-04T22:35:05.700`) +- [CVE-2024-40490](CVE-2024/CVE-2024-404xx/CVE-2024-40490.json) (`2024-11-04T21:35:05.530`) +- [CVE-2024-40594](CVE-2024/CVE-2024-405xx/CVE-2024-40594.json) (`2024-11-04T21:35:06.433`) +- [CVE-2024-41930](CVE-2024/CVE-2024-419xx/CVE-2024-41930.json) (`2024-11-04T22:35:07.177`) +- [CVE-2024-44185](CVE-2024/CVE-2024-441xx/CVE-2024-44185.json) (`2024-11-04T22:35:07.400`) +- [CVE-2024-44232](CVE-2024/CVE-2024-442xx/CVE-2024-44232.json) (`2024-11-04T21:35:07.233`) +- [CVE-2024-44233](CVE-2024/CVE-2024-442xx/CVE-2024-44233.json) (`2024-11-04T22:35:07.613`) +- [CVE-2024-44234](CVE-2024/CVE-2024-442xx/CVE-2024-44234.json) (`2024-11-04T21:35:08.147`) +- [CVE-2024-45504](CVE-2024/CVE-2024-455xx/CVE-2024-45504.json) (`2024-11-04T21:35:09.173`) +- [CVE-2024-46040](CVE-2024/CVE-2024-460xx/CVE-2024-46040.json) (`2024-11-04T22:35:08.430`) +- [CVE-2024-47041](CVE-2024/CVE-2024-470xx/CVE-2024-47041.json) (`2024-11-04T22:16:13.793`) +- [CVE-2024-47189](CVE-2024/CVE-2024-471xx/CVE-2024-47189.json) (`2024-11-04T22:35:09.220`) +- [CVE-2024-48410](CVE-2024/CVE-2024-484xx/CVE-2024-48410.json) (`2024-11-04T21:35:10.317`) +- [CVE-2024-51252](CVE-2024/CVE-2024-512xx/CVE-2024-51252.json) (`2024-11-04T21:35:11.177`) +- [CVE-2024-51377](CVE-2024/CVE-2024-513xx/CVE-2024-51377.json) (`2024-11-04T21:35:12.543`) +- [CVE-2024-51432](CVE-2024/CVE-2024-514xx/CVE-2024-51432.json) (`2024-11-04T22:35:10.037`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 86350507a30..f3aae38c565 100644 --- a/_state.csv +++ b/_state.csv @@ -154944,7 +154944,7 @@ CVE-2020-25727,0,0,9f5eca368bd07dcdd869e0aeac7c4d2e011fffe163b754f51bdee77559709 CVE-2020-25728,0,0,bfdbfc94ad27bc04267c8e56468159aebc12f3a6057f0226fa6c134a2c76f10d,2020-09-25T17:40:51.173000 CVE-2020-25729,0,0,c050a786ee2fa8d723e5e41234630bfaffa93fb091157268dc95b7df1240f22c,2020-09-24T14:42:09.080000 CVE-2020-2573,0,0,7cb38a0cda14d86f7e594a6c977c8dd7d564d47b07843e6c3c833b9441654d86,2022-01-04T16:43:12.697000 -CVE-2020-25730,0,1,2f2fe4829e79f017641d98f858979352ffef03d62b80cb5a735e7bdb56005f41,2024-11-04T19:35:00.910000 +CVE-2020-25730,0,0,2f2fe4829e79f017641d98f858979352ffef03d62b80cb5a735e7bdb56005f41,2024-11-04T19:35:00.910000 CVE-2020-25733,0,0,109e189ef190c59a9450ed9da0e65218f7d838e204deaae021d216f01b171854,2023-11-07T03:20:24.463000 CVE-2020-25734,0,0,3f59d4d29c83c5054ee354b50fd36ed8e9b765e17c7f639faa2d81e1b887e411,2023-11-07T03:20:24.520000 CVE-2020-25735,0,0,b762af2870594db2fbe828cc1b1bccdf29d1535ec31127ffb78a3546589bba77,2023-11-07T03:20:24.577000 @@ -160519,7 +160519,7 @@ CVE-2020-5194,0,0,b10abe505d51e0dd31546a82e1770808fcfc83ccc2039cd6bf4f2b226418ee CVE-2020-5195,0,0,9c455fce4359d8153f54937748aeafb112345aee5f0af6a7b8e8767cf75a65e0,2020-01-22T16:05:31.283000 CVE-2020-5196,0,0,3db9cfe307d6bfad1346143c1c789564b2d8d5344d159cb9a5aa67fdbb48bd78,2020-01-17T03:02:04.857000 CVE-2020-5197,0,0,166ff2df531a2c3cbdaca82b89f8ef39807972f6f515640d1b8fd23f6d803a6e,2021-07-21T11:39:23.747000 -CVE-2020-5200,0,1,646570fa5a655321d2cf417655cdf8e0c119a48ff65ec65d5fe4817bca5795db,2024-11-04T20:35:00.717000 +CVE-2020-5200,0,0,646570fa5a655321d2cf417655cdf8e0c119a48ff65ec65d5fe4817bca5795db,2024-11-04T20:35:00.717000 CVE-2020-5202,0,0,58d5a304abc62c5752bab4f8c0370fb4da8104106dd134a4298657c13ae8b429,2022-01-01T20:03:08.133000 CVE-2020-5203,0,0,e1337dc8bdfa49ce0c2456a3ce041da4f1de509c7cac9c52fe24e7545d0a8071,2021-07-21T11:39:23.747000 CVE-2020-5204,0,0,970a07d3c1fbc57e57b03667d979c83238f3747c7ddc7782db20f3433fa11013,2020-01-18T19:15:10.947000 @@ -186992,7 +186992,7 @@ CVE-2021-47066,0,0,3dc9bcc464a6ab3b776aff0e71a0bea9e097dc1e904059ecf25dd8969bef0 CVE-2021-47067,0,0,47dc1af1626b10fa0dfe5d35f18291fb00286d2fb75fd269bcf3ff5bee42736c,2024-03-01T14:04:26.010000 CVE-2021-47068,0,0,0e9613a6b9e3bad19dd79725e1f65d7be51fb3aae34c56147e089ef00705124b,2024-03-01T14:04:26.010000 CVE-2021-47069,0,0,0baf3689a99afae159a794fa882bbde862d8f0b3a2cedc563e0510d34d3745bb,2024-03-01T22:22:25.913000 -CVE-2021-47070,0,1,0584c186d80f84c4146403f3cafabf00a3e7703a9e9eb3500b990094f96b7714,2024-11-04T19:35:01.957000 +CVE-2021-47070,0,0,0584c186d80f84c4146403f3cafabf00a3e7703a9e9eb3500b990094f96b7714,2024-11-04T19:35:01.957000 CVE-2021-47071,0,0,b0504ff2034ae0c4cc16202b4cc6e9136ea7ef90af22d96415d8d13f216623a8,2024-03-01T22:22:25.913000 CVE-2021-47072,0,0,cf41cbf231f55b926ec73e3d5eeef7180bfd709e7f8ced7efd6dbec1d429bdcf,2024-03-01T22:22:25.913000 CVE-2021-47073,0,0,55717623a5e4775e6cdba866cbade7342e2c623e9f3852474ccdaf2b36202333,2024-03-01T22:22:25.913000 @@ -187114,7 +187114,7 @@ CVE-2021-47188,0,0,e6a6f0a863fd0b932dc358db740d6fc5aa8627c048b64301dfe58213c8b68 CVE-2021-47189,0,0,48f90e1a498dd9395788e85b5b3fb28d93d24e5c08e09370284b300a3f0c6d12,2024-11-01T18:35:00.807000 CVE-2021-47190,0,0,a23b60385bed7997c530e4b41937eadabf6ba2e668fb03ecc615e4ad6df3d195,2024-04-10T19:49:51.183000 CVE-2021-47191,0,0,baf35fc648eda6a3feb39f18a5c99fdd9a75e22cc9f519adf716e800ca27866f,2024-04-10T19:49:51.183000 -CVE-2021-47192,0,0,89d68fa7dca3f0424ebac488b35bd95de399854a2ef2e9961be289a4695f3819,2024-04-10T19:49:51.183000 +CVE-2021-47192,0,1,3db5176b03ff24d6fad6f0ff6dd21e1052b7b9a503a77cd6316fdc1acd099edd,2024-11-04T21:35:00.850000 CVE-2021-47193,0,0,b5bd1afd4c6a02ca2a2969198c95e4901234c965e7fe433c27281259074364d2,2024-04-19T19:20:07.550000 CVE-2021-47194,0,0,9d895c630c92e9f6689899bad26fd025e53d528730c464a535eea55402e84943,2024-04-19T19:19:16.967000 CVE-2021-47195,0,0,0abf3955e7599b2cc932554806394527386aebc638b6030e9df2f0d084775bcc,2024-04-19T19:16:08.537000 @@ -187146,7 +187146,7 @@ CVE-2021-47220,0,0,3b5282a5a78ae38dd9afefd942320359b1e71d1f67c1eff9fa622a893f6cd CVE-2021-47221,0,0,be4fba76a1b024c941c507f7c354bd8197d5a0317f4df6b315ba3d46d2ffbdb5,2024-05-21T16:54:26.047000 CVE-2021-47222,0,0,3f9a21db77caf7d70e1c4613a3e366cdfeb41cdf8308383b2302e318a16fa064,2024-05-21T16:54:26.047000 CVE-2021-47223,0,0,153ed24456f2781c6911d2f948472f17dfbb988764986042d16c2ec594c0d813,2024-05-21T16:54:26.047000 -CVE-2021-47224,0,0,413a390368944d1a7d57d9920709038152923e30f74f3dfe0473afbe34abf5ce,2024-05-21T16:54:26.047000 +CVE-2021-47224,0,1,45fbf78f88f3c1f6e1a572a874933a00ef07b077ccabd44c203e1c81a457bbe1,2024-11-04T21:35:01.163000 CVE-2021-47225,0,0,6151b31c9506986be96203f26eb64bee342321c5d48323fdd39dbc88fab43e3d,2024-05-21T16:54:26.047000 CVE-2021-47226,0,0,0ca14def49d58288ccebac9b5ffda959e779c40fe1395292a223b40d99620dd8,2024-05-21T16:54:26.047000 CVE-2021-47227,0,0,d58b6e5d0039e2c73e223660c4806a8199d919f5d02b15eb3b8ec0875620efcc,2024-05-21T16:54:26.047000 @@ -187184,7 +187184,7 @@ CVE-2021-47258,0,0,43e5d4398baa884888a6821f1cc44ebd315950a1d75455b3aa6a2b21fe961 CVE-2021-47259,0,0,b94b7bd51459fdf369e8f3e705a39196eb98f20596c79a7966fbe7cd84498907,2024-07-03T01:37:30.730000 CVE-2021-47260,0,0,eed23e4375c3c68601f2520e12d8f67acb43a3edb9de2b59bea4672dc4d46a96,2024-05-21T16:54:26.047000 CVE-2021-47261,0,0,445c6ca2c94ba5191e4c9238eece7da90e5479679202eff4238f40b3a18777b7,2024-05-21T16:54:26.047000 -CVE-2021-47262,0,1,a6777b1d4230cf53233c142858d3baca0c76203feaf8ab924d12cb0c66b5d1ed,2024-11-04T19:35:02.187000 +CVE-2021-47262,0,0,a6777b1d4230cf53233c142858d3baca0c76203feaf8ab924d12cb0c66b5d1ed,2024-11-04T19:35:02.187000 CVE-2021-47263,0,0,1176196a3698e7937ef1dee9eee1484d93eb714c3bfd1da777cd57ad81e35620,2024-05-21T16:54:26.047000 CVE-2021-47264,0,0,6843fefa1c0dd36dc7cf5ef00b7f0d9e8fededb938b876ac5eaeaf235634eb5f,2024-05-21T16:54:26.047000 CVE-2021-47265,0,0,75030ffadf61bd1ff09d790099186059b18f888a5d9b4f5c6b04efe02cb5e83c,2024-05-21T16:54:26.047000 @@ -187272,7 +187272,7 @@ CVE-2021-47346,0,0,8eb04a161f5fad162ddfc9280e0e1e3b031d26e05579e5ffc857ed4840288 CVE-2021-47347,0,0,476f5ddf457ab9d201d314890a9171d1bfa8d527b3eaa192f8b003b5eed33e0b,2024-05-21T16:54:26.047000 CVE-2021-47348,0,0,cbd7050f60b6d34998fac30b0c35a9199cb24117e7667e7c425da37d327e3490,2024-07-03T01:37:42.580000 CVE-2021-47349,0,0,4ad4402aaf6d70e325021bad9c08cbec191db8987ecf72e0d3fe3bdd775d684b,2024-05-21T16:54:26.047000 -CVE-2021-47350,0,0,d5e86460d27966602edca07e0c65a354c620e7bea46408470f7fb8cf67d8dc85,2024-05-21T16:54:26.047000 +CVE-2021-47350,0,1,ab13144fb5c2f9144ade78305127cf617b36adc2ce77f76bf0d86636b0d7ff63,2024-11-04T21:35:01.490000 CVE-2021-47351,0,0,0870708f6b04076b51d5166d132aa4f23369d1326df0bcd7b65e016994ee2a43,2024-05-21T16:54:26.047000 CVE-2021-47352,0,0,13385803f439a4940e9526eabd221ed2d5b6d783029db932a5596e09f1f1cdb9,2024-05-21T16:54:26.047000 CVE-2021-47353,0,0,1495c4726f0ff0c180f058de7ed99cf8890bd5e69457fbc7e2f9d298e8dfc965,2024-05-21T16:54:26.047000 @@ -187433,7 +187433,7 @@ CVE-2021-47507,0,0,291f76395ae66887aac568d8cc45c564db489d66d6c95dfb28df76651f372 CVE-2021-47508,0,0,d5c4490cf8b2bfd12f3d81fa77c73abd0db20eb41ca5f92ab5aaa6e8c70c725e,2024-05-24T18:09:20.027000 CVE-2021-47509,0,0,6c136d107ba034bcd6c5085b26c671ef37be673d06a366c3e2c5934b61e296cd,2024-05-24T18:09:20.027000 CVE-2021-47510,0,0,270627eb232d447cc08f70aff04a5d0568e3059f6c21c73ef6a95c2a2ed08a4c,2024-05-24T18:09:20.027000 -CVE-2021-47511,0,0,902d0b87d8d98eef47622e317e8c85f71d9b0841750917ba1cc5e935ca840963,2024-05-24T18:09:20.027000 +CVE-2021-47511,0,1,e3d90ab6114d070019d1ef5ff8c0b7af502cde3377475c2be408cd65bff17061,2024-11-04T21:35:01.830000 CVE-2021-47512,0,0,b14ad06ad68acf2737e5e42986db1751275379351190fd9d4d1bd398eb0cd0c6,2024-05-24T18:09:20.027000 CVE-2021-47513,0,0,190d21c68923096a3a47ba6c546ff9c6c8c65c7f04e3fcd0c537382258462ac9,2024-06-10T18:43:58.750000 CVE-2021-47514,0,0,f622f5906c504cfffbbd90f9d1ab0375f794fc4b7714ff336da6d82aee74ef92,2024-05-24T18:09:20.027000 @@ -187469,7 +187469,7 @@ CVE-2021-47543,0,0,e10032a4dc5819dab790e96a9c85611aa2456b01789b4c8b320ffa21f2dd5 CVE-2021-47544,0,0,f8ca718ed959197c9021832a7220c2167737a26fe05b58fc21ffd4156ad184f7,2024-05-24T18:09:20.027000 CVE-2021-47545,0,0,f9e54059060dbde4c9be7c93d9de1cad5092e9bea1c8e1591e1b69055c210ed1,2024-06-13T14:15:10.783000 CVE-2021-47546,0,0,8461100e46567c79f5d33fcfead2911dc03544a4ae68184cff44a4e4a055685f,2024-06-10T18:30:20.320000 -CVE-2021-47547,0,1,04b64a9a35fc7837f86d56415bc5f41e13d3f173d5499d6ea570c7785f541036,2024-11-04T19:35:02.390000 +CVE-2021-47547,0,0,04b64a9a35fc7837f86d56415bc5f41e13d3f173d5499d6ea570c7785f541036,2024-11-04T19:35:02.390000 CVE-2021-47548,0,0,03a8a3877d4ca0ad093bd20ff48d4aebe255325f8becd5edf1b9a31b21d3ffa9,2024-07-03T01:38:08.723000 CVE-2021-47549,0,0,513795ad7a7ea3e427214675d10d84c28c33553bc02366f8eefe4045f37975aa,2024-05-24T18:09:20.027000 CVE-2021-47550,0,0,625b7614680ee2b0447f843771d1b01d412586caa610798634da339105c2afb3,2024-06-10T19:23:10.227000 @@ -187477,7 +187477,7 @@ CVE-2021-47551,0,0,eac531d2e05b82c07ff9255b733606dbe0ffe65bbbebf081e70ce81f529e4 CVE-2021-47552,0,0,5d3d5362faf4887dd9c84f934a6fae5b4c1336fd72a4a6faa1165471dbee6a90,2024-05-24T18:09:20.027000 CVE-2021-47553,0,0,321382f7b9e6bf328f90a5b45f80489cf47e5531e7cf08bf3aa8c852a939d4b6,2024-05-24T18:09:20.027000 CVE-2021-47554,0,0,259e8e5707d266118c9c75a97a5d9e029fb1a3d3dd6cc808c2e17bc1fb0e8874,2024-05-24T18:09:20.027000 -CVE-2021-47555,0,0,ddb6af1a52c9c27f3fd38e11fce7d3aa2ae7bb7159a89f2ba058f14650e38b05,2024-05-24T18:09:20.027000 +CVE-2021-47555,0,1,dbea687f358d747f53976e24b1c5accd67c1a4981e86de5442a25cadb01c4a68,2024-11-04T21:35:02.123000 CVE-2021-47556,0,0,73b9a661d821e5f6057b14dc5f869a594bed1dd54cfb1162fbe957d9812a01b4,2024-06-10T19:23:01.133000 CVE-2021-47557,0,0,2b690ea2b80629f30457b798674a2b8c3b52527880e834329d079b807bf1cf62,2024-05-24T18:09:20.027000 CVE-2021-47558,0,0,7f29cbac039a68882c1c81cdca737471ed988824a0bc634b65fd16dccfd5fc5b,2024-05-24T18:09:20.027000 @@ -227451,7 +227451,7 @@ CVE-2023-36317,0,0,c079cfb22cefab3f68143c585133ce4a69cf059be109844f051d6b5cfe343 CVE-2023-36319,0,0,4f2f9b43de4f619c1ecd79d747be40d5cfa224891e28131a7aa2b697e390ee2c,2023-09-21T13:20:09.453000 CVE-2023-3632,0,0,c0b2e40cbda3f2ee6107fd6d29665ee1a2dc274485d787cec90bc7cd79e0d9ec,2023-08-16T08:15:41.550000 CVE-2023-36321,0,0,3a757d1927b56aa55826750e72e53ed68bd81a53376818344594d48da7b7b82d,2024-08-01T13:44:06.490000 -CVE-2023-36325,0,0,34adff3c3e012e8498345f808977d87a66a8a4c562ffe7dfed842240789cc82b,2024-10-10T12:51:56.987000 +CVE-2023-36325,0,1,ba9c6f0e4fbf82defb8140fe306c9cd5ad64fd33dd0bb120e9858e10ef3927ea,2024-11-04T22:35:00.740000 CVE-2023-36326,0,0,ded9eb90a8ff10548777c4348acf8633173a5fdf3caf961f9c4181c6b713fc5e,2023-09-06T00:04:24.377000 CVE-2023-36327,0,0,7eeaf1acc33373866f4ef20f13e035096e985e7a884ec7a542b5579b42a728cc,2023-09-06T00:05:15.863000 CVE-2023-36328,0,0,2bcddcad90867d8da646da5264dfa03e8941e4a150d5759638d15ecb3a68202e,2024-03-07T17:46:02.277000 @@ -234135,7 +234135,7 @@ CVE-2023-45285,0,0,77883aa881bda99f1d19ba35b11a9a1e8caee32118b6c24da9d7ea21930a3 CVE-2023-45286,0,0,d44939332093de0621571dd50fbbf72433dd32913bd42846a1498c4ee2848685,2024-01-04T19:15:08.737000 CVE-2023-45287,0,0,d2da2c58b3609253e3286b1b93fa0d97abe9bcd02db4f7cc4811b975b121f7c4,2024-01-12T14:15:48.310000 CVE-2023-45288,0,0,82bba28c8566833be940e806bb1e2ff38edb61bcc7c1e4542d16b7cdc8317f67,2024-08-26T21:35:02.457000 -CVE-2023-45289,0,1,5b9af44f5fb05d5fd02cd2106e16283e6766be9cc8c8184692f272ca138dc067,2024-11-04T19:35:02.600000 +CVE-2023-45289,0,0,5b9af44f5fb05d5fd02cd2106e16283e6766be9cc8c8184692f272ca138dc067,2024-11-04T19:35:02.600000 CVE-2023-45290,0,0,f22fc13bdae5e6edab97f7e0fddab9822bb3ae91388d56c6e1d234cdc0e49b4d,2024-05-01T17:15:26.040000 CVE-2023-45292,0,0,9325e9e3b78b777445115a8da3de2cb25249d0f8ef4a9d3921e74e58a0d0d777,2023-12-14T16:26:54.007000 CVE-2023-4530,0,0,eeb9daf8b96668373bbb47227634f4b43c799c25d28cf12757e3af97741f4f52,2023-10-11T17:19:19.627000 @@ -235288,7 +235288,7 @@ CVE-2023-46836,0,0,f5ce4ff90551bdc127de2610cb54770c0ee6eeab88d256f3d330df3bb8f0a CVE-2023-46837,0,0,235eb49f4a5cfd2303e4d9fe86113f4253281fb598c82093310061fdb70ca753,2024-02-15T03:15:34.683000 CVE-2023-46838,0,0,e55342ec982796174c93d42f4d3441b48151cf088d830e6cc56db632a8572edf,2024-08-27T19:25:43.650000 CVE-2023-46839,0,0,ade13f3f4236efdd37ffe784525b46e44d60393bacb2fa119614ea207b8ebc1e,2024-03-20T13:00:16.367000 -CVE-2023-46840,0,0,e2c2a3f07287623c4942310cd62ca252a9987076f8c6ae079ee3034faa28627b,2024-03-20T13:00:16.367000 +CVE-2023-46840,0,1,3cefb363098374cb1a0dbf2fc4113f6b73680a4ea6b95bd6763077d9e17a3230,2024-11-04T22:35:01.860000 CVE-2023-46841,0,0,69de2292f7b0165df885056be3cdde071d60eea027dc1314d310f07d8d34f1e0,2024-03-23T03:15:09.740000 CVE-2023-46842,0,0,146be54706ee3606fe0d577bb9f29c8faefa1499d8598a34577d5ae58ff57434,2024-05-16T15:44:44.683000 CVE-2023-46845,0,0,48a4a3963c5d9a1075438d9ede53ec2921256cff2ac8df6833bec0acc65592f9,2023-11-15T15:21:57.587000 @@ -237568,7 +237568,7 @@ CVE-2023-5004,0,0,e9c8d000c46a971371653c9299f9477c1d350bcd7ede26af818f1f3cd6a6fc CVE-2023-50044,0,0,c9dad549cf95cdf6f6a82dc7c47870e6807ae3192bcaf46f220bb6a3fa47ca36,2023-12-29T00:15:50.170000 CVE-2023-5005,0,0,745cb1ab76d83a3107371edfdd319096e1b6d1d025dbda4b9d241b022cb9185d,2023-12-21T19:25:31.277000 CVE-2023-50053,0,0,9b450f039e219e8c0dc6b5319645fc133cad473316e16f22c0a481e9974339ce,2024-08-01T13:45:22.157000 -CVE-2023-50059,0,1,02f0d37d833c83270aef100f2afd20fdbe702668e721150206666eba9d2f5d78,2024-11-04T20:35:01.547000 +CVE-2023-50059,0,0,02f0d37d833c83270aef100f2afd20fdbe702668e721150206666eba9d2f5d78,2024-11-04T20:35:01.547000 CVE-2023-5006,0,0,21d14cc4876f8cc1a801d8b8c70a50bf2886311fb727493df0ced96b6e0ba142,2024-01-24T17:16:48.267000 CVE-2023-50061,0,0,233fe17f839b0e8ef7a1099d37a8dbf5d9b685d75def71772f132a905686000f,2024-08-22T19:35:08.363000 CVE-2023-50069,0,0,d5b56f504dfc9456d663c793e6af0eeee24a43c49c91c208a5bdce7a8736c014,2024-01-05T23:08:29.450000 @@ -238820,7 +238820,7 @@ CVE-2023-5205,0,0,b69f37089db22b12f4214cc9f8a6664b76f8ae791614a71f308741a98961cc CVE-2023-52059,0,0,0016757ad0c8c5e292c8d6de754d386680126fb24aa8899c4ed395170c5f6803,2024-10-04T16:51:20.313000 CVE-2023-52060,0,0,10d04b0fb69a380e5645fa0ec83c2959fc511b0d1bd5963b639f55d35d913fd4,2024-10-03T19:58:19.037000 CVE-2023-52064,0,0,2e6eacf3122e193934b8e5026ba3d667018aabe2b15f00e378d2dd371a1d173e,2024-01-17T21:08:45.903000 -CVE-2023-52066,0,1,85402deace46f95bf508292308a27b3aaa2bf7f39ae66e341406df5f594363f6,2024-11-04T19:35:02.827000 +CVE-2023-52066,0,0,85402deace46f95bf508292308a27b3aaa2bf7f39ae66e341406df5f594363f6,2024-11-04T19:35:02.827000 CVE-2023-52068,0,0,9738fbe2996c9d736286f8e78dfc9c20ccebb2ce66b7bbc56f1565006d5c4c29,2024-01-22T19:53:08.497000 CVE-2023-52069,0,0,ad23cadb3859f85a66031ccd7a898a641dcf7c2393a905b66159386dbb4d3689,2024-01-23T21:41:02.097000 CVE-2023-5207,0,0,27de1d00636be1f83fc1921e6c08668bf71abfdb23dc6eb68c14d9a95ba3c956,2024-10-03T07:15:23.347000 @@ -239168,7 +239168,7 @@ CVE-2023-52477,0,0,efe2f5528fad5a77ed7c9d16cf79090652ba25f88c0384442b12b40db626d CVE-2023-52478,0,0,068097b3c13a30c208b5d211494ed7aaf6a7f9fc35695f62f8ac60e5e2f6fdb4,2024-02-29T13:49:29.390000 CVE-2023-52479,0,0,bc49728c5dbac438d554a85beb665991e321a7f58d6bb98d8ea717a0d121f494,2024-02-29T13:49:29.390000 CVE-2023-52480,0,0,2329da01f12ebb4b23076c653c8e17a2ab7add15aadb16cbe58fefc1bb16dc60,2024-02-29T13:49:29.390000 -CVE-2023-52481,0,1,13e0d99d5be86e579f2e4a651dc1cf50d114a581aa3d9bf867a5254db7e01289,2024-11-04T20:35:02.537000 +CVE-2023-52481,0,0,13e0d99d5be86e579f2e4a651dc1cf50d114a581aa3d9bf867a5254db7e01289,2024-11-04T20:35:02.537000 CVE-2023-52482,0,0,8e7120a407feee69d888ab8d409801a9cc2911c8130d47914d6a778dab36d389,2024-11-04T13:16:34.130000 CVE-2023-52483,0,0,2ae4ab70118f65a957b47b0238eee6990f9676ca82bf320c1c4eb1ef04aaeb62,2024-02-29T13:49:29.390000 CVE-2023-52484,0,0,cad4d37ff955036544d9c11417bd9d68e192b5a6438cfcc5ad47e9adf8a1ff38,2024-02-29T13:49:29.390000 @@ -241464,7 +241464,7 @@ CVE-2024-0011,0,0,871bd2790e1644ed9a3dece6c89b7131ea036c72c23f82726bf2a5f6003f50 CVE-2024-0014,0,0,57b1d977bcf36a4089ab5ef9c9905bf2b69a9e66b00e8c3e91bd20eccc0f8b75,2024-08-26T18:35:03.770000 CVE-2024-0015,0,0,00e8b369d8c884be684dc161c3d8d59320e06337f56989191711b768cfe02c9b,2024-08-28T17:35:03.353000 CVE-2024-0016,0,0,07b99aa38f7f021ca30f24587ae8679400297ca98f5e8da8ccc928cbae430ba9,2024-10-31T15:35:18.640000 -CVE-2024-0017,0,1,14eb641628890f648788a425e3e5a78e490af46ff0390af32867dbcd0985ceba,2024-11-04T19:35:03.033000 +CVE-2024-0017,0,0,14eb641628890f648788a425e3e5a78e490af46ff0390af32867dbcd0985ceba,2024-11-04T19:35:03.033000 CVE-2024-0018,0,0,eb1e6beb7617de808c00f24002cfa4ad37cdeb05dc3559f2748a83507aca8f33,2024-08-15T18:35:05.293000 CVE-2024-0019,0,0,99addb01bdd59dfa56c3bb78510b54e791e3b9af747d8108035ab5d4ed5b10b6,2024-02-16T21:39:50.223000 CVE-2024-0020,0,0,e73ca517c90039568523c56c44f0cf8b451388b3358b22e01f666a71e39cd157,2024-08-01T13:45:54.660000 @@ -242376,7 +242376,7 @@ CVE-2024-10033,0,0,e2a4855e02c8a9aa5aec00750ec89db4d8c9b23a9a547fcb7ea42ccd4625c CVE-2024-10035,0,0,e1bab51809ac69fa5c75a2d897691dc0f5acda7e478ad5d8b743b12fab524013,2024-11-04T18:50:05.607000 CVE-2024-1004,0,0,be9a3a60f238fd673f4d3f1f166af1f9400f4582d193359c16f232ef2b1c02fa,2024-05-17T02:35:09.263000 CVE-2024-10040,0,0,7b56aeaf06debaabcdf1e140476d580d2600dab38558a586b77601e247b0f5d1,2024-11-01T18:26:23.450000 -CVE-2024-10041,0,0,51c1a91c4f22ee214c5dcda807542750d47d7e85f524ab1da7d13a157020a726,2024-11-04T17:35:09.270000 +CVE-2024-10041,0,1,bc97b1f0a7eb4420b570fcec2b3ff9bd8baa184700ca89e13f76151cb5ba6af3,2024-11-04T22:27:02.877000 CVE-2024-10045,0,0,a817f3402cf6055b1a750108ad8efeb9be1dc186e8fac94b1b8b513bcc47b228,2024-10-25T18:52:30.337000 CVE-2024-10048,0,0,753b7b10384148568802076e97b22f964c12e42cf7a3108618b3a771a6303c01,2024-10-29T14:34:04.427000 CVE-2024-10049,0,0,885c4f58797b80385cdce80d924e46fe2b372795dfe14e40121472290c664142,2024-10-29T14:49:04.463000 @@ -242403,8 +242403,8 @@ CVE-2024-10092,0,0,96aeeb96773a5c0a6e4e68b9196f2f369ac89a58107c1085bc8eadc272cfb CVE-2024-10093,0,0,94a330c294b313c7705272073b44baeb2e1acc1449e78c4e0c252c7b91c53316,2024-11-01T18:07:07.003000 CVE-2024-10099,0,0,f14bdb99d2ca7956ea9400330266332303014dc510bc6e629dc22733e615abb6,2024-10-21T21:03:53.647000 CVE-2024-1010,0,0,b9c2292e551f86bb732084025c958f6307d4b05614efbc31206ace678efe61b8,2024-05-17T02:35:09.883000 -CVE-2024-10100,0,1,f9d8653b0b809755807a27c91859fa59733e823c9baf33fbd9ba6460baccb9d4,2024-11-04T19:15:05.297000 -CVE-2024-10101,0,1,e3896c5d7db68c5b786b00b58edff142c65dff97c0f85c49d64d1701e59c4a4a,2024-11-04T19:15:05.527000 +CVE-2024-10100,0,0,f9d8653b0b809755807a27c91859fa59733e823c9baf33fbd9ba6460baccb9d4,2024-11-04T19:15:05.297000 +CVE-2024-10101,0,0,e3896c5d7db68c5b786b00b58edff142c65dff97c0f85c49d64d1701e59c4a4a,2024-11-04T19:15:05.527000 CVE-2024-10108,0,0,f3f4ad009417795f18debc95373d890db3250e635fff4006fa4ef1bc9580626c,2024-11-01T12:57:03.417000 CVE-2024-1011,0,0,a83b664837c33e7f0f4cec42868f7bdd93765cacc9e6b97b43804e8b07af65f2,2024-05-17T02:35:09.987000 CVE-2024-10112,0,0,3a01d2baa33f19e143abe5aabe181ccab32faac99effca8d7325142fe7220a64,2024-10-25T12:56:07.750000 @@ -242500,9 +242500,9 @@ CVE-2024-1026,0,0,e127bb5d00442b36eed0e6ff6513a3a42c45706876a3a5f2167365447fb898 CVE-2024-10266,0,0,c93db2a67de792a64ad3b8f3ae10accf6f21ac600e94cc18aca994ed95268502,2024-10-29T14:34:04.427000 CVE-2024-1027,0,0,7cdd04f65f65ce162dee4b0e860b968e4c1a6b7f21d53e978519c8259363a858,2024-05-17T02:35:11.427000 CVE-2024-10276,0,0,913e45b2b0c4a67a031924d52b79fd99196e0bfd1eaceb610aead0724000ee9a,2024-10-29T18:15:05.140000 -CVE-2024-10277,0,0,045d19cabcb46c520338d26403e49aad7248792b4dcb1c61a9bb40526760fac4,2024-10-23T15:12:34.673000 -CVE-2024-10278,0,0,56ee6a4da4de5c0e9a8258a03df3a3a9b6b90c37d9c7631850f400938a22db00,2024-10-23T15:12:34.673000 -CVE-2024-10279,0,0,e64edd41252858e04d752ad843858b5ee1ffab4901d78e52b3de9d4b7b86a8b2,2024-10-23T15:12:34.673000 +CVE-2024-10277,0,1,5633b0a41069f99639d6b8d0da0073d4b799e83ff36f803e05de4f861ca0e809,2024-11-04T22:13:13.207000 +CVE-2024-10278,0,1,c9cbd5b0d1959e5b852835b7c2d60bfafc6010c2ef6b05ac61999b047c308cd3,2024-11-04T22:11:53.397000 +CVE-2024-10279,0,1,c459f3c486eb7911256529f3f9f8fe5235406769079b9004ab1b5560b431402a,2024-11-04T22:14:01.963000 CVE-2024-1028,0,0,e7c94049b8605ccb1520e715a47348e2114f12f58dfbf02bb50626d7afd3f607,2024-05-17T02:35:11.530000 CVE-2024-10280,0,0,80d3551a7846d386eaa7773e34e82873be79fb4129972791d3d9c2f22c644ad6,2024-11-01T14:03:20.267000 CVE-2024-10281,0,0,96f941de80b9e6605dd27180456ff1a7884752f0502e3b6d50c69f446bf67663,2024-11-01T13:52:35.563000 @@ -242679,12 +242679,12 @@ CVE-2024-10594,0,0,9f73b176d1fdcc28ef57fb338558f792090b1198ca431d11760ef62758907 CVE-2024-10595,0,0,713412cb3481e40d2727869bbf69e43a9603569843cd3c3208811998499997f6,2024-11-01T20:57:26.027000 CVE-2024-10596,0,0,89ac2005acfd3d8d41d0e2b8aafe285ef55fcb6b50ff7e1417f316fc9317c4a3,2024-11-01T12:57:03.417000 CVE-2024-10597,0,0,ec144bfd42b6ee158eff368d4debef5de7c0bf99a868e7f6dbbe8e6a0cc8cee7,2024-11-01T12:57:03.417000 -CVE-2024-10598,0,1,660edc51f4fc2fa9935095811accaae31a6c26005b25bae3073af9a24ccefd47,2024-11-04T19:44:05.513000 -CVE-2024-10599,0,1,42ec1e77225c5fd4ca05825fc485c8d353f9da187c3647e655d8a79fac27eb60,2024-11-04T19:44:59.183000 +CVE-2024-10598,0,0,660edc51f4fc2fa9935095811accaae31a6c26005b25bae3073af9a24ccefd47,2024-11-04T19:44:05.513000 +CVE-2024-10599,0,0,42ec1e77225c5fd4ca05825fc485c8d353f9da187c3647e655d8a79fac27eb60,2024-11-04T19:44:59.183000 CVE-2024-1060,0,0,d653064ebc7376d659eeceb53018669b809b93fa1e3915db85367d79da8fa5c6,2024-02-05T20:49:55.413000 -CVE-2024-10600,0,1,5afdca71a2cfc04818fc875bba0d0eff7c59f59939a632712606dbeb7be81101,2024-11-04T19:45:26.723000 -CVE-2024-10601,0,1,91a7748f7ab8196cb0c18c7002e72eb09e5cd397974ceca74dce38f93ac7cb73,2024-11-04T19:45:45.603000 -CVE-2024-10602,0,1,04e1f27ef7f15379bd08987a24eacd4e8204618250984eba6d7aa4f620cd7386,2024-11-04T19:46:22.830000 +CVE-2024-10600,0,0,5afdca71a2cfc04818fc875bba0d0eff7c59f59939a632712606dbeb7be81101,2024-11-04T19:45:26.723000 +CVE-2024-10601,0,0,91a7748f7ab8196cb0c18c7002e72eb09e5cd397974ceca74dce38f93ac7cb73,2024-11-04T19:45:45.603000 +CVE-2024-10602,0,0,04e1f27ef7f15379bd08987a24eacd4e8204618250984eba6d7aa4f620cd7386,2024-11-04T19:46:22.830000 CVE-2024-10605,0,0,c315ce550a5a02f0527765642dbae87c4523e776fcb8c12a6fce2fe76cbae215,2024-11-01T12:57:03.417000 CVE-2024-10607,0,0,d4f1d535c87507c67c7a41b6eff84066fe8858ae73b9785b0d4652d99a74edf2,2024-11-01T12:57:03.417000 CVE-2024-10608,0,0,bd2102b8a140839a55ce6e1f5830b17a43f862d7a5baafd4d8f33b660692c0cc,2024-11-01T12:57:03.417000 @@ -242708,10 +242708,10 @@ CVE-2024-10651,0,0,4020d234a4dc20eeefa40d62db04df21d3fc130e9d8122bd0290808c2b4b1 CVE-2024-10652,0,0,e78eb78c66337c771ed734884436ae7db011d1841627efa41acd490150897405,2024-11-01T12:57:03.417000 CVE-2024-10653,0,0,1b2d26feb706600b9c41b1333f6a03988902fcf9ecda5a5dffeb928661e3db01,2024-11-04T07:15:03.743000 CVE-2024-10654,0,0,b71e1c46dc877d6506cd8226e7a3f6003b53c0e286f8e1e5ecb474e19ec184b8,2024-11-01T12:57:03.417000 -CVE-2024-10655,0,1,4a39173efe85c13de7825496903f8eabd930fb258764390bce3ef665db358080,2024-11-04T19:47:40.207000 -CVE-2024-10656,0,1,18b5e609f97649677e5109dc16530200dc01ab85577b2f860b138b1af32e903c,2024-11-04T19:47:22.733000 -CVE-2024-10657,0,1,5aa26720310b42db2ea6ef4889360ebeb3fd6b29f11acb0fdb3b6096a49be1ec,2024-11-04T19:47:03.377000 -CVE-2024-10658,0,1,e9d9b236f839d9847378b01f43925f95cb3b7a9d36c15ac46bc9d52dc81aefc3,2024-11-04T19:46:45.707000 +CVE-2024-10655,0,0,4a39173efe85c13de7825496903f8eabd930fb258764390bce3ef665db358080,2024-11-04T19:47:40.207000 +CVE-2024-10656,0,0,18b5e609f97649677e5109dc16530200dc01ab85577b2f860b138b1af32e903c,2024-11-04T19:47:22.733000 +CVE-2024-10657,0,0,5aa26720310b42db2ea6ef4889360ebeb3fd6b29f11acb0fdb3b6096a49be1ec,2024-11-04T19:47:03.377000 +CVE-2024-10658,0,0,e9d9b236f839d9847378b01f43925f95cb3b7a9d36c15ac46bc9d52dc81aefc3,2024-11-04T19:46:45.707000 CVE-2024-10659,0,0,3d4100a5014ab3e38ed7d92229a30de2a57befe7b3dd0753fd233294ddd14e70,2024-11-01T20:24:53.730000 CVE-2024-1066,0,0,7cd919bef6acbf4a1ab59632c47efb8ac6efc2d2c9f422a5fc3bf23611a0e27a,2024-10-08T19:52:24.017000 CVE-2024-10660,0,0,f886943977b519a7bf6536209b69c1f1829a6f26fa045720745e5c1a9b2bccc9,2024-11-01T20:24:53.730000 @@ -242768,11 +242768,11 @@ CVE-2024-10761,0,0,e55627ca0aefeb59987656a92ae2fe0920723534c3676e4833cbe2ebfab1f CVE-2024-10764,0,0,ec3f49d125cf2e2f9f040e77955c901db8d4fc081c2a5a3c578e4d10b68b11ee,2024-11-04T18:50:05.607000 CVE-2024-10765,0,0,f94f39587334d404980a388e9dfd9fb9115fae8b2ac1d9ff2a13bbe026583b18,2024-11-04T18:50:05.607000 CVE-2024-10766,0,0,1b1319bb6e0bee622c046653104b00240692805524f9a93d49c4c9f821fef751,2024-11-04T18:50:05.607000 -CVE-2024-10768,1,1,aed04b331f848f55e770417e26cef0f008da2fae8f2170b818012b56295c9fef,2024-11-04T19:15:05.743000 +CVE-2024-10768,0,0,aed04b331f848f55e770417e26cef0f008da2fae8f2170b818012b56295c9fef,2024-11-04T19:15:05.743000 CVE-2024-1077,0,0,9052c519c4a7de5cf3516fc923116c25b788d5b36a137a2e416fb3d37403344d,2024-07-03T01:44:58.330000 CVE-2024-1078,0,0,88568fa2f20f5ea8de25fda48576808429bbc616448df571a879f056db565620,2024-02-14T18:39:51.437000 CVE-2024-1079,0,0,0a964f4e43e1a2d85a40a4753c5354fe293facf65d0ebcc06031e68ccad95a0f,2024-02-14T19:33:09.977000 -CVE-2024-10791,1,1,cb043225edc618ea2693a51127808443f4accc3588a4d0ea0e9750587123f32a,2024-11-04T20:15:04.580000 +CVE-2024-10791,0,0,cb043225edc618ea2693a51127808443f4accc3588a4d0ea0e9750587123f32a,2024-11-04T20:15:04.580000 CVE-2024-1080,0,0,9acdbacec5fb31283e62a6d3f1b1bde4de3af0ce021840a5a12a8cd06719b667,2024-03-13T18:16:18.563000 CVE-2024-1081,0,0,b9ecb327bf229081db54279065262fbdf204fadb84142fe6a647ad5480db67c8,2024-02-22T19:07:27.197000 CVE-2024-1082,0,0,1a3a3ef85a9a06621291f657b27812f6a6be683bc843b0137ba9e53485eee330,2024-10-17T15:46:44.327000 @@ -245088,7 +245088,7 @@ CVE-2024-21722,0,0,a86fb4d95ec57288d080d9ff105ac4d713cb82e6d029a4568b198925539ef CVE-2024-21723,0,0,c123a68ae41218e084e71266e368c668840ae873b9865a9853aeca12024bce7b,2024-02-29T13:49:29.390000 CVE-2024-21724,0,0,13cf7200241cf795a2ddca2e0396bacd352639744079d295d3483718d273f60f,2024-02-29T13:49:29.390000 CVE-2024-21725,0,0,ebdabbe1fa288bbeb81a276a125f761859acd9172475efecd68ff4e2c004f13b,2024-10-27T02:35:00.563000 -CVE-2024-21726,0,0,6323b2b43ac337f244a115fea0a0997a8ee4d7e666452b5dae48b4ac07f1f7fb,2024-02-29T13:49:29.390000 +CVE-2024-21726,0,1,258e12429393fbdcadf90bc903b6c4eaa784036f8d4a014cbe225655bb0298a5,2024-11-04T21:35:03.690000 CVE-2024-21727,0,0,2cfa1a63a24a03456c625f31f74d2ce885912143f39c319c4ec56855c86f3f44,2024-10-29T19:35:15.020000 CVE-2024-21728,0,0,6d3de60c64db99ec16689d15b3a09c6273756d73ea66742792a8ee295b84ce4d,2024-02-16T13:38:00.047000 CVE-2024-21729,0,0,69b41949a5d8ab5958e5ae8c193456700a1a795d0620b2c7e7a56d8ac77a3347,2024-08-16T14:53:59.690000 @@ -245822,7 +245822,7 @@ CVE-2024-22725,0,0,5fa379724d5fca6a5a451858a4ba6ac34ebc02b0c57c2f76559d231c12c11 CVE-2024-22727,0,0,21f0a699093390ba1d8ee3a22a8e6961dde2045354957e98f8b2db244c882256,2024-02-20T19:50:53.960000 CVE-2024-22729,0,0,768bb63a8e628d1d5ad8c32ce479e7ef65e430464c818e272a86590502c0053a,2024-02-01T15:15:34.173000 CVE-2024-2273,0,0,0a70a78279025f010830c200ec41c70db1b0b3c6a90f640b7fd5d17983a65e86,2024-05-02T18:00:37.360000 -CVE-2024-22733,0,1,5ffc84c54b1133a58773831b099651e00af398e2efc2f99a6ca9461a3d33c96b,2024-11-04T20:01:12.483000 +CVE-2024-22733,0,0,5ffc84c54b1133a58773831b099651e00af398e2efc2f99a6ca9461a3d33c96b,2024-11-04T20:01:12.483000 CVE-2024-22734,0,0,a3491dcc3c7b5d449a7e86cb6408877457dffcd3f57d3503ef629f53a0b65b58,2024-07-08T14:17:29.360000 CVE-2024-2274,0,0,6fc96400c211578866c6c22eea50b1789a75c82b773ece131b3550b25233611e,2024-05-17T02:38:08.363000 CVE-2024-22749,0,0,bc8737d9438d776e0226ec03871efe6a0159338bddb3aa6ecadc564f1611c479,2024-01-31T18:01:59.017000 @@ -246091,10 +246091,10 @@ CVE-2024-23239,0,0,17a811a7a40ab6626263a25969f3b0683f14fcd51c6df6a2a6c4fb1d83529 CVE-2024-2324,0,0,a32ac9b03f44a6b6199f75f2e494024d5620e1a8d468eb3441202d4c5501e3ef,2024-05-02T18:00:37.360000 CVE-2024-23240,0,0,497e30da1de753eb5948327cba1061ca7bd974bb0b6e982d8b68d5fdfd0d0084,2024-03-08T14:02:57.420000 CVE-2024-23241,0,0,c5a768451bd1e85db3c39139e6a6ab2856d36214932ed6b230453a123731e8b7,2024-03-13T22:15:10.003000 -CVE-2024-23242,0,0,95631f167174ef115c9c95938ba9ae61f1f0294242d6095fc64b03c429b051d7,2024-03-13T21:15:56.410000 +CVE-2024-23242,0,1,aaecde8a798ca776b50091eab43b4c20fea81702419ce910fabce080cf53ec16,2024-11-04T22:35:02.393000 CVE-2024-23243,0,0,3b35a30cb124f0b586652130bcd66797855bcd6efb290e087afdb4d7fffb3adb,2024-03-13T21:15:56.460000 CVE-2024-23244,0,0,24e1f39ea8345f9beebd2c960d56e2266341c33ce47de81803c5b5c5ff8fbc8f,2024-08-28T16:35:08.747000 -CVE-2024-23245,0,0,3ef3bab1c68decbc207b88786c8ec7e903fe6be44e3bdef049351a5b3b76ec4b,2024-03-13T23:15:46.520000 +CVE-2024-23245,0,1,101d7b866eed02e86ebd84557a1282b5cb9bc6d29a5271f7e19a7ee3c96cb84e,2024-11-04T21:35:04.100000 CVE-2024-23246,0,0,a3f6288a4dec4e6b98e18e3dcc2273527c942df80239f6227e94a0328a431f71,2024-07-03T01:47:40.097000 CVE-2024-23247,0,0,d5698b79b28caabaab0fed7a322a63e6d266c688aa3ae5f6b0f0f62214304bc8,2024-08-26T15:35:04.747000 CVE-2024-23248,0,0,c6580627d980adaa3f84f2190835feaa8367986dcf4cd0997d62805a89d20fc8,2024-10-30T19:35:08.687000 @@ -246361,7 +246361,7 @@ CVE-2024-23557,0,0,4270afce746443b5193815936f76591ad043b307043acbde73eb7ec4d54cd CVE-2024-23558,0,0,1aaffec8c09fd69e12702b79a89a97fa66d8cf8050a73827a56fcf9396bca5b5,2024-11-01T19:35:15.123000 CVE-2024-23559,0,0,1cfe950943db323f850a4ffa6fa09a9e594439fd864c25048ffda399bb0b3e4f,2024-04-15T19:15:09.577000 CVE-2024-23560,0,0,e362890ddaf504fd7ec860643e0e2bcce74ce536f1ff64f240f88b9ed03a4aad,2024-04-16T13:24:07.103000 -CVE-2024-23561,0,0,bcd9227766d304795ee303f29e84a1fe0441cf6abc456f3208c29472cf08888f,2024-04-16T13:24:07.103000 +CVE-2024-23561,0,1,05ce6bff2b3c083c40d1cefd8ecfe83b9e8bac92f3576a18d3243c6c46e3bef3,2024-11-04T22:35:03.360000 CVE-2024-23562,0,0,4d517ea8a2763e5506a865d21e69db429e3d16d2d215329e0568829328a2181b,2024-10-23T23:15:12.397000 CVE-2024-2357,0,0,58f4675a1a89325da5d3ee44283ebc42e89a0cdd69475172a4baac455a4ffac1,2024-03-23T03:15:12.690000 CVE-2024-23576,0,0,adfa1bbd41df2580fc9b0c7a87cd6221bc650972fa1b63f1cdf4b78644242d49,2024-08-01T16:35:05.990000 @@ -246962,7 +246962,7 @@ CVE-2024-24539,0,0,ea2b06118fb4ab0dda0a5c17a6d492fd01d3bc7dfa939af9055cc4352c7ac CVE-2024-2454,0,0,c3abdbdc4c03ce442d9698003ff8b7b916836453e928376d3b534ebef9e7432e,2024-10-03T07:15:29.810000 CVE-2024-24543,0,0,6385de143d1b0b1fdcac1d167b2fcd059d27448a1d2af20c5a3fd2632900f66a,2024-02-14T17:13:32.827000 CVE-2024-24548,0,0,b2630c3d24a789753fdaa109f39bed000429d845fa16c1ba7d96c172523068ec,2024-07-03T01:48:20.620000 -CVE-2024-24549,0,0,f5a15fcd5d9acee072cefdba50b124ee1362445c36c6cff50be2ef6d7391ffe1,2024-06-23T09:15:11.213000 +CVE-2024-24549,0,1,e0cb1775866ac8f49af5b075bad0d8f00fe5247b05cc2c6f571fccc8eab4a31e,2024-11-04T22:35:04.083000 CVE-2024-2455,0,0,3cc0f9fdc9468fb27389ba133379c86897b93cf96dc0807e412017bc8c64c264,2024-08-01T14:04:01.833000 CVE-2024-24550,0,0,91eff862acdcc27750c50b47ce447c3c9c3416434f24687f7378afff1f649bd4,2024-06-24T12:57:36.513000 CVE-2024-24551,0,0,41b8feea4c57aca430d02394b62e3944b862a79d0fb8a08429e306b869ff2908,2024-06-24T12:57:36.513000 @@ -247360,7 +247360,7 @@ CVE-2024-25079,0,0,747dcc74f114c461c43dc15d8c7262cc52b3ea0a47dd0c2658850379b94ea CVE-2024-2508,0,0,5f5b90c70383af5e74076ecfe442ac5d6b537a3785081aa188cda0ddf04bd81f,2024-07-31T12:57:02.300000 CVE-2024-25080,0,0,ac2a1dea63d0c6616a8817d8c9857da421c3824981ab86a3e448f029507a2e2d,2024-11-01T19:35:18.183000 CVE-2024-25081,0,0,8447758264e474cd1c8516048ae8770433feeb45ecce33ffdf5df19305ed1ff9,2024-08-27T19:35:13.260000 -CVE-2024-25082,0,1,e037d2c10f0e82add3e0b0236d3b6431278477a525fab3979ccbeb71c8bddda3,2024-11-04T19:35:04.633000 +CVE-2024-25082,0,0,e037d2c10f0e82add3e0b0236d3b6431278477a525fab3979ccbeb71c8bddda3,2024-11-04T19:35:04.633000 CVE-2024-25083,0,0,82140a5a06672843cc06d8c49a45d2786901923a23d988718119cbf0cb5278eb,2024-08-28T16:35:13.370000 CVE-2024-25086,0,0,d7f7d87d6cdc4c934f4645f409f9d6ad95bc0b43a7473acdcf85c7b382132abe,2024-07-08T14:17:42.020000 CVE-2024-25087,0,0,d0eb5bf250014d4733c8c2cd43475d3db0483672bd5d42f237e7c0898368e6b0,2024-10-30T15:35:07.993000 @@ -247958,7 +247958,7 @@ CVE-2024-25969,0,0,a2d227b0b86b4325c26bb6f673bbdc8a7ef141703ec468628c2766b328aa9 CVE-2024-2597,0,0,614f461cf5a32e6e3c045095423c1ac446116226b22d5334101b749199de8efc,2024-03-18T19:40:00.173000 CVE-2024-25970,0,0,f8b7303cc0abe87ee106240dccbd738c35db8e13a2603b08d62839897cd5a5d6,2024-05-14T19:18:31.490000 CVE-2024-25971,0,0,d03bf655e7e0d5dbf73b6beff3280dcd3ab38f529872aed84cb4a267414cdc66,2024-03-28T20:53:20.813000 -CVE-2024-25972,0,1,f562429727244ba83adab7ab33e6715f66598350a42ffea3de89f272c0ae03bd,2024-11-04T20:35:03.760000 +CVE-2024-25972,0,0,f562429727244ba83adab7ab33e6715f66598350a42ffea3de89f272c0ae03bd,2024-11-04T20:35:03.760000 CVE-2024-25973,0,0,64b2d7e51fd0c1f6188056368cd8ef177890326c25a57ab938769dde8c643479,2024-02-21T07:15:58.040000 CVE-2024-25974,0,0,12433a6d8e699d155905877ac67441d31fc3219c3906ce3bad9f2bfde8f9f2f4,2024-08-01T13:47:57.737000 CVE-2024-25975,0,0,7575b9d67e4ea045410d7956ad161bd45f31efb1c5194db4cce836637ccacb6a,2024-07-03T01:49:20.510000 @@ -248282,7 +248282,7 @@ CVE-2024-26295,0,0,bee0ceea4a2fa9f7b5cd5ca393d32245b0399ff1744d3c1781d7fe4c47055 CVE-2024-26296,0,0,544e1c2c94ce65e70db959ad46d5372fa189de6687abd994a179048ab80cba75,2024-08-01T13:48:05.123000 CVE-2024-26297,0,0,af2dff5c494a25db31e51e78048442dd01fa43e7ea7ca9a2aba52748560b0484,2024-08-01T13:48:05.817000 CVE-2024-26298,0,0,59727460b37052fa0a59faa646f1b3121962ba5c31619135e5630e3a1f8617f0,2024-08-01T13:48:06.523000 -CVE-2024-26299,0,1,4af490fcb06c2a0a12f3931f9418f50f8d065e15f235e9b7e567768770556a1c,2024-11-04T19:35:05.457000 +CVE-2024-26299,0,0,4af490fcb06c2a0a12f3931f9418f50f8d065e15f235e9b7e567768770556a1c,2024-11-04T19:35:05.457000 CVE-2024-2630,0,0,ec856c27a5c03dd021fb947cb024a63c9409651759234a9bffe340d8fd7b989a,2024-10-30T16:35:14.117000 CVE-2024-26300,0,0,1ac1f21ae9a2403844c235609ee04177577ebeaf725b3bb4b2178b26e2a031f5,2024-02-28T14:06:45.783000 CVE-2024-26301,0,0,19f0f94ed5cbffac086b7363ba9897dc486d991fcb04fba1d0f3db89247a8bc8,2024-02-28T14:06:45.783000 @@ -248467,7 +248467,7 @@ CVE-2024-26649,0,0,940fcd7e5d20bc1c18f4c974a09622f0b6b6d87231bbd7408e7118d35c4ba CVE-2024-2665,0,0,0d168a0d5dbe4804c9bebe4f21c0d1f4a27974809ea172b5979b5dccd55d97c3,2024-04-10T13:23:38.787000 CVE-2024-26650,0,0,c37b82afef74cba8f0a1b3081e8c53c80ac8f73689ed9f1c045183b9566d980d,2024-05-23T14:15:09.293000 CVE-2024-26651,0,0,fb1778dec4aa28736fc803494a7d95d0a4887c74ed91b5258df0fc8bdc4d3968,2024-06-27T13:15:55.767000 -CVE-2024-26652,0,1,8d6649d168744efbfe6b62c08e9360ae7602de48e9181fe8c422fe485dc0c24c,2024-11-04T20:35:04.647000 +CVE-2024-26652,0,0,8d6649d168744efbfe6b62c08e9360ae7602de48e9181fe8c422fe485dc0c24c,2024-11-04T20:35:04.647000 CVE-2024-26653,0,0,d8aee5aa874cda3bb376f3ce8a5f14e5f03fc79d04d8d093a2467a5582803bc0,2024-04-03T14:15:16.520000 CVE-2024-26654,0,0,d30cf3144176f55463a59233de7c2d22b1a5877071a0f572ada286ee3c4a13b0,2024-06-25T21:15:58.207000 CVE-2024-26655,0,0,e538fefaef2b297407375360bfd7d37a24041d5520688f3409c56615cace1742,2024-04-03T14:15:16.860000 @@ -248528,7 +248528,7 @@ CVE-2024-26704,0,0,3f440b7915a84102c31c6ca58997604b072456ac2fdae8caa0bf3d548cca7 CVE-2024-26705,0,0,78b53ae404d02219812b4aeb186b05a7a11b1f5ab2997316c1bbd3060abe82f6,2024-04-03T17:24:18.150000 CVE-2024-26706,0,0,89b4f648ec2b3b26b7668e53c563f37afbde85f99ae0e56fedec5035cd8965f5,2024-04-03T17:24:18.150000 CVE-2024-26707,0,0,0b4632ba7cbb3593b28164a910e817aabff12a96bda4f173426fe88e799fb2d3,2024-06-25T22:15:21.363000 -CVE-2024-26708,0,0,30add7bc80093f61aa6ba0466f1b9ab6f422a9ca1d0dfad43551ca60f41aaf63,2024-04-03T17:24:18.150000 +CVE-2024-26708,0,1,b7b4fd917032dbfb390eabc8cff6b35f00ba8bfbaca82390ba12fef81251a7c8,2024-11-04T22:35:04.300000 CVE-2024-26709,0,0,db5b445e594837265e4231997ca9ab456eb703993d2f2aecb25185917da73c88,2024-04-03T17:24:18.150000 CVE-2024-2671,0,0,574794b92da1fad69b45dab76d86555ba117f14e94371362986a89b344dcc19f,2024-05-17T02:38:24.070000 CVE-2024-26710,0,0,e030f43a8aa53571f8f35affc42bdc96443cc55f22ceaec1c312b7d16f03bb91,2024-04-04T14:15:09.567000 @@ -248560,7 +248560,7 @@ CVE-2024-26733,0,0,646af548b9533cc8bde386b28e554214eab8f2a020503960c0d1f100df49a CVE-2024-26734,0,0,0eb1b1feddc3c43838ae7b1cbb500208ff685270dbb18f151464783d19bf4c65,2024-04-03T17:24:18.150000 CVE-2024-26735,0,0,7afe0996673efde5a6585f2186b8a08bb5ef98d3542cccab732c4df20b91e8aa,2024-10-31T14:35:12.657000 CVE-2024-26736,0,0,a562229f2b02fc6cec76f3673034e8ce7378dc0d0fc6cbaec0df447d9263eebb,2024-06-25T22:15:21.543000 -CVE-2024-26737,0,1,5d630f8ababe5101cb5f2cea2096882f36be8fed2220dc01cee465676a15e40c,2024-11-04T19:35:06.193000 +CVE-2024-26737,0,0,5d630f8ababe5101cb5f2cea2096882f36be8fed2220dc01cee465676a15e40c,2024-11-04T19:35:06.193000 CVE-2024-26738,0,0,3ed173e742b2f1ef480700b80fac0353c8315c8c73b558ad6f8306db1c647ea2,2024-04-03T17:24:18.150000 CVE-2024-26739,0,0,3d829b13b19365c48f5d561476965397ebd2e1886563c8f01827db030cd83b2d,2024-04-03T17:24:18.150000 CVE-2024-2674,0,0,f2c8a10eeecd3f969d6af12d88b2654ac020152e56dd763b8a3c5395662fb559,2024-05-17T02:38:24.343000 @@ -248660,7 +248660,7 @@ CVE-2024-26824,0,0,34887f560d328b7bba35a6644eabb0ffc96cff74bf520b9ed66b0e71dc5b1 CVE-2024-26825,0,0,c530382651586c6f00e357a62287c33dae2aca66e91ddbf4d033164bb0e5af4c,2024-06-27T12:15:21.290000 CVE-2024-26826,0,0,b96f5bfbf455712c540bd404ccad30ca4bbaa9c3b24bb619ee2f9755485cb6ec,2024-04-17T12:48:07.510000 CVE-2024-26827,0,0,4cc514efbe22ca04935a47f409b758351113d51b04fbbf02df44e27fcf8c06d7,2024-04-18T15:15:28.957000 -CVE-2024-26828,0,1,97a54035816ae7398000e031f21c5a1326a47ba614922ea9f997061803eed8fd,2024-11-04T19:35:06.407000 +CVE-2024-26828,0,0,97a54035816ae7398000e031f21c5a1326a47ba614922ea9f997061803eed8fd,2024-11-04T19:35:06.407000 CVE-2024-26829,0,0,f8089f48fc5ec0e8590d91d8eb0c2fbd4e11020168517d02c9b9ea2b70df64b5,2024-04-17T12:48:07.510000 CVE-2024-2683,0,0,03d83a8830e046a65ef4d0799c57f1d02403a9d84f74ce05a3e92291cd2a2db1,2024-06-27T19:15:12.647000 CVE-2024-26830,0,0,b998bb99b2690406751770253dbf825292746bb49e7ef9e53a6b25ffa549a608,2024-04-17T12:48:07.510000 @@ -248759,7 +248759,7 @@ CVE-2024-26914,0,0,b60bf8a04b17c0ea33f524de7c269b75b58d301f82cdab9a9708a990a2d14 CVE-2024-26915,0,0,3aeea9b3b1040d92e3c4fc19c7e143be80147947903ccfd65b166e36804975a5,2024-04-17T16:51:07.347000 CVE-2024-26916,0,0,2c15e9b6f09b6b6e09b74c13dd3524379b0f76dc583243b6aec1ac31f122210d,2024-04-17T16:51:07.347000 CVE-2024-26917,0,0,cdf4aa661c28bc82e7bbc6e2edd85f7d0ef8bc5794588a496ab874cff6906bf0,2024-06-27T12:15:22.740000 -CVE-2024-26918,0,1,ce69ac1622eef6980f6643c9ecfc31fb973f75565e256eaf541cc492bb16369c,2024-11-04T19:35:06.627000 +CVE-2024-26918,0,0,ce69ac1622eef6980f6643c9ecfc31fb973f75565e256eaf541cc492bb16369c,2024-11-04T19:35:06.627000 CVE-2024-26919,0,0,f54ec30d2ed3a1e0c74b7edc597cfe6317573675a479d2109cbf5afdc2d9f863,2024-04-17T16:51:07.347000 CVE-2024-2692,0,0,e314c30fd6d02d5324cac765f38a00a3fad84e8e8754a5ba44244d3c13521cfa,2024-04-04T12:48:41.700000 CVE-2024-26920,0,0,4ed01824a69e292270d5ff6781ce9cdf9d386678446143ef4ec96cc3c070ab59,2024-05-03T06:15:09.207000 @@ -248784,7 +248784,7 @@ CVE-2024-26937,0,0,33130fd04e0fa99aeccf3a69a79fa96a77ec456d0858750d9a99028babebd CVE-2024-26938,0,0,96ac3ebb354ca4dfcb1c66c1b68ad4ffcd043cacfbf00b0352d68804b44cf1b2,2024-05-01T13:02:20.750000 CVE-2024-26939,0,0,3127531537fc8434c8a8153e0717ce9c8f7520225ded802370bdb01946c9c847,2024-07-03T01:50:03.663000 CVE-2024-2694,0,0,fad38f23bc41981803e0eeabc9f68c34e5895ab08c006564e735241d1ad99ffe,2024-09-03T15:10:54.557000 -CVE-2024-26940,0,1,f34b1c5c185f90adcb50cc6aa19a87b181d6d95943fd7cdf197949bcb6da759e,2024-11-04T19:35:06.833000 +CVE-2024-26940,0,0,f34b1c5c185f90adcb50cc6aa19a87b181d6d95943fd7cdf197949bcb6da759e,2024-11-04T19:35:06.833000 CVE-2024-26941,0,0,2a1089d0f00712d14223399449bc2078dc16c4aec3f3fa2e0d76cbb9292aff72,2024-05-01T13:02:20.750000 CVE-2024-26942,0,0,2d57b93ce0dd646b07d92a214c08685384cf52a1b44011b76a4f0a2c97f50567,2024-07-03T01:50:04.523000 CVE-2024-26943,0,0,d0c9c3da8d0f6a05b9cd6130864f51abb4e8d6492319a7d33df6ba0459e34162,2024-05-01T13:02:20.750000 @@ -249041,7 +249041,7 @@ CVE-2024-27180,0,0,755d0874d2ed43dddf4f6e3448f6f22c7a827dab259e8383ebb29df952431 CVE-2024-27181,0,0,21e26148840b13fc3c6737fbae62d8da3122fe005206d34756c4a69e36306e68,2024-08-02T14:35:10.763000 CVE-2024-27182,0,0,3745db63e259cb2e1fbe54f15ae0e0f8afab0bc93a91d91e5de7d932d84971e0,2024-08-16T16:55:10.923000 CVE-2024-27183,0,0,73875a696a64d9ddbd95175557e5ab869a14de50e9906db42e11184efe06e929,2024-07-12T17:13:30.700000 -CVE-2024-27184,0,0,d27258a08ec723a941addb4bb2a2c30ae14dda17a55ede0aef2dc950361ddede,2024-08-21T12:30:33.697000 +CVE-2024-27184,0,1,74abad6e016f98892899d86d623f3cf7d80dc82e5ada3c03a423741f065cd83a,2024-11-04T21:35:04.690000 CVE-2024-27185,0,0,b762b551c83c129a4d40b0942e2ef5f495129c37450126af06e72aba7aa9a55f,2024-09-22T05:15:11.530000 CVE-2024-27186,0,0,f7fe08e5f4b7d5180c79088df80bd67536777321be61e31aba4444583ba7c65a,2024-08-21T12:30:33.697000 CVE-2024-27187,0,0,32158e2082b18c6d5d5bddb28bf354f8353016a3e995123bcfaff2f5ad6259ca,2024-08-21T12:30:33.697000 @@ -249244,7 +249244,7 @@ CVE-2024-2739,0,0,f67ee20b2bc2ca284467eaab4487259eaa12927229efc313e4a8f27526c7f5 CVE-2024-27390,0,0,fd939b5a46e3db47e38737677dc08895d4507457dc8c59f804a220890fafa028,2024-05-01T19:50:25.633000 CVE-2024-27391,0,0,c609df1ae4a0d8b672f84b73ef5e4ba82e2a581d1583d7f5330bf8875e22776f,2024-05-01T19:50:25.633000 CVE-2024-27392,0,0,d71bd39d141dc4709bff7fbbc837ba796224bb31c86e71592537c5234c653cf4,2024-05-01T19:50:25.633000 -CVE-2024-27393,0,1,a820280c7bba1e95ccdd5f172abf8e004f1adbda93a24cf4bc97141799a16e12,2024-11-04T19:35:07.067000 +CVE-2024-27393,0,0,a820280c7bba1e95ccdd5f172abf8e004f1adbda93a24cf4bc97141799a16e12,2024-11-04T19:35:07.067000 CVE-2024-27394,0,0,08a27f4278e90895db869570c2ad1394d2b1b7ce2eebd13c81985e703b3d5763,2024-09-06T14:35:11.027000 CVE-2024-27395,0,0,f509312d757b52ad19fbd73ceeb6a726f1f69fc5206c32a2cd50e6d3c74db34b,2024-06-27T12:15:24.577000 CVE-2024-27396,0,0,e14a9534df6188e2d3948f71aa579b6ff342c8dd8805de92331af3aa294e2094,2024-06-27T12:15:24.647000 @@ -249335,8 +249335,8 @@ CVE-2024-27517,0,0,93229684c3b5353b9850f42eea516ead9975e4cc8c949db8afa0cb3684297 CVE-2024-27518,0,0,eee44445b24d086f58ae13c836362c174731b2fe04eb60975982bae1d572cb19,2024-08-22T19:35:18.243000 CVE-2024-2752,0,0,9ac4a8690eeceffd759ff2fb7b55e32f8cb8bb4afb752110bdafa62b8f4bb686,2024-05-02T18:00:37.360000 CVE-2024-27521,0,0,142655bf7422b3c81bdc37fb7ef4329756d07238f339af47f3bda39ff16ed820,2024-08-09T21:35:03.300000 -CVE-2024-27524,0,1,08e4bd6ccc21c266f96d6111b83d7d95158b2c7ca600162e7e70631b4fc240b9,2024-11-04T20:35:04.913000 -CVE-2024-27525,0,1,e06f7e0695efcbe9bfa15a3ac23251ff54875c477a75b737778895eddfe51566,2024-11-04T20:35:05.800000 +CVE-2024-27524,0,0,08e4bd6ccc21c266f96d6111b83d7d95158b2c7ca600162e7e70631b4fc240b9,2024-11-04T20:35:04.913000 +CVE-2024-27525,0,0,e06f7e0695efcbe9bfa15a3ac23251ff54875c477a75b737778895eddfe51566,2024-11-04T20:35:05.800000 CVE-2024-2753,0,0,49ae39425f6531deb039d8727a759281a000c2c0b8058f4a13a0491f93794534,2024-08-30T22:15:06.227000 CVE-2024-27536,0,0,c377b0d21fbb5c7de68c4946896ec2f8ec67ef0d39bad02515cbb41c44d1bebd,2024-04-23T22:15:07.037000 CVE-2024-27537,0,0,3cbe9bcef09fe4fba870050d9e0c130363a525b398fa9371487301911d20249d,2024-04-23T22:15:07.087000 @@ -251555,10 +251555,10 @@ CVE-2024-3061,0,0,4efd703c3bf27329551bb8c57b6ec5103d42ea334ef6d9361feb4d292b06b0 CVE-2024-30612,0,0,e42904b723a61ee315384c0049851285bcc87d076f88def1dfe4ab911cc568cf,2024-08-01T15:35:11.227000 CVE-2024-30613,0,0,ec7980af57ce21f0caa7be201315bcd79301675671829a9c0350efcb6a7c58e3,2024-08-01T15:35:12.083000 CVE-2024-30614,0,0,70864962c71d46c273106725c973080a3fb9295eb2c95d98fdaa16c813277ea2,2024-04-12T12:43:46.210000 -CVE-2024-30616,1,1,c1a6a4c3cc5fd0dcdf0bc13fd82797f8e892fdde1ef891f61798225b0b81093d,2024-11-04T19:15:06.193000 -CVE-2024-30617,1,1,337a5e570fc3287a5934dd6ed25da1f8be90c7bdd03412e4cf3fd9e4a4bd3aed,2024-11-04T19:15:06.277000 -CVE-2024-30618,1,1,76eb4eef203367820f3c5d1365fb1d7995071f91ca2740b654bd334c85c99889,2024-11-04T19:15:06.360000 -CVE-2024-30619,1,1,fe2b48990b749bc87750f991b242da0180f7975b89478992bf2890b8ebff25ae,2024-11-04T19:15:06.440000 +CVE-2024-30616,0,0,c1a6a4c3cc5fd0dcdf0bc13fd82797f8e892fdde1ef891f61798225b0b81093d,2024-11-04T19:15:06.193000 +CVE-2024-30617,0,0,337a5e570fc3287a5934dd6ed25da1f8be90c7bdd03412e4cf3fd9e4a4bd3aed,2024-11-04T19:15:06.277000 +CVE-2024-30618,0,0,76eb4eef203367820f3c5d1365fb1d7995071f91ca2740b654bd334c85c99889,2024-11-04T19:15:06.360000 +CVE-2024-30619,0,0,fe2b48990b749bc87750f991b242da0180f7975b89478992bf2890b8ebff25ae,2024-11-04T19:15:06.440000 CVE-2024-30620,0,0,cb2dae6c6270bb539b2166cb7fc038684b4c961f4662350232b399db4e69aab4,2024-08-01T13:50:20.133000 CVE-2024-30621,0,0,c30c1529b2190a6ab334a4d43b23be8a438f3a9728c71ea136b98a3e95653561,2024-08-19T20:35:13.943000 CVE-2024-30622,0,0,9349da08418f3c5641f38670dab1e797cf4839fe3c9959b5e399bf11323db712,2024-08-13T15:35:09.960000 @@ -252624,7 +252624,7 @@ CVE-2024-32166,0,0,e117f1f1473eb5a0781f79a5d43c653abcb8b2fa988a11cd3340ec0a690c0 CVE-2024-32167,0,0,915de4b0debb285120767f5ee79a021decbe9afbb3817337a80cac9f827f0a60,2024-08-01T13:51:22.630000 CVE-2024-3217,0,0,dc86fb8c3829a8b9d2e0fd455ded6f7df193be42ecbfecd0ffd8ac89ef8aedfe,2024-04-05T12:40:52.763000 CVE-2024-3218,0,0,cca321349f887cdf01c9c59558600fd5914c251177129598df483266ec0d6bf2,2024-05-17T02:39:47.357000 -CVE-2024-3219,0,0,019b5cd63ba6f5c6e50d95982e32c42e466f254734d8401943e335ab92663b2b,2024-10-17T19:15:22.220000 +CVE-2024-3219,0,1,d75adb043abf900a830f12369dbfaaf21a90caabc2980fbf9a9804b77e51d17f,2024-11-04T22:35:06.427000 CVE-2024-32205,0,0,b515c22daf534e23184b3e43b254269995ffc71b09793c9a7a083a2ff7d807bb,2024-04-22T20:15:07.210000 CVE-2024-32206,0,0,8cd9c34ce9f7db79af05faf1c051a80ce3416b7ab823e5294fc2704f3b904424,2024-07-03T01:55:51.200000 CVE-2024-3221,0,0,bc74600907433c2d1f49c74b0b5cb8ca05b39c0ecdd1932ffaf2a011380efa9f,2024-05-17T02:39:47.450000 @@ -253382,7 +253382,7 @@ CVE-2024-33139,0,0,4dc296ec40d742774c8325154323233da513fffbd0c23d14d8c7c60416445 CVE-2024-3314,0,0,2a6089b9715ccbb2944e67e64444ce430371716aa66690df6a523f92fa13c530,2024-05-17T02:39:50.393000 CVE-2024-33144,0,0,7ce66848bdfdad6c7661c7606415e2d330de485bc612c3cf999a55dbe1be4b18,2024-07-03T01:57:31.107000 CVE-2024-33146,0,0,4baefebe2977ba4ed48c0fb4dc2805a0ffd790dd812293e2b72426874933d1a5,2024-07-03T01:57:31.870000 -CVE-2024-33147,0,0,7d23db268c3bdc731a2593ebba8c65a129bad97d294db5d04c45871b0f21b0cc,2024-05-07T20:07:58.737000 +CVE-2024-33147,0,1,013021f51d091edc9e62b90439aae5b3f1fef121e283a30b882df74257be9696,2024-11-04T22:35:04.680000 CVE-2024-33148,0,0,a83555d17609f0766452576dea699651fb83f48955debeca15155d2173e305cb,2024-05-07T20:07:58.737000 CVE-2024-33149,0,0,cd385dce8cfe9dabe6c5f72763dc870308b700fe51948946fbdaf204a00dfaef,2024-07-03T01:57:32.207000 CVE-2024-3315,0,0,d4c4bec8a7887aa6179d0d947bd09e1c52add867f368feb0b797beea3673295f,2024-05-17T02:39:50.500000 @@ -254116,7 +254116,7 @@ CVE-2024-3422,0,0,5f60b24505b1e7fc45669de7abca6b1144a134b9cac6c7f843eaaa0cb8d68c CVE-2024-34220,0,0,664ae3f60d9d03fd7e09aca2b3c3f619f12a9aa76b48e9dbe80314480913931c,2024-07-03T01:59:40.530000 CVE-2024-34221,0,0,4fc0fe5a0a7d481229d82414975559b5ce7e394eebb1a6cc6af7f54bf077ba48,2024-10-29T15:35:28.087000 CVE-2024-34222,0,0,c9254aeea26939ed840e05e8449aee7f6267f0c74101a29fff26f90fc72a21b5,2024-07-03T01:59:42.050000 -CVE-2024-34223,0,1,00e725fc833985ae31ccd463ca116c24e214083756cb7b09e0d3b38167c9cd28,2024-11-04T19:35:07.467000 +CVE-2024-34223,0,0,00e725fc833985ae31ccd463ca116c24e214083756cb7b09e0d3b38167c9cd28,2024-11-04T19:35:07.467000 CVE-2024-34224,0,0,bc6821e7a1a1197e8806ef37396dfb61f1b6fcbd255743a94622a514f32eb2a4,2024-09-03T19:35:12.227000 CVE-2024-34225,0,0,e08a9ad45b2661eed67570a87cb42ad712c6fe6e9c128f00e0736869ea473a7c,2024-07-03T01:59:42.910000 CVE-2024-34226,0,0,e9df399e03868b5419f9e1d39391572872ab999c75d356756b02d0d173e993c9,2024-08-22T15:35:06.620000 @@ -254280,7 +254280,7 @@ CVE-2024-34452,0,0,0601c8beed111acadaba988be3618d3e8a2a7b19905fce659ac719cace1be CVE-2024-34453,0,0,47a7edffe635099f1bf55d077c40113fc9f5ba8dcdeec8da8790d14933d9ceb1,2024-07-03T02:00:06.540000 CVE-2024-34454,0,0,9c41ced14bcda502a6d91e8242ee544d71d5283ff3511493207ec7805cdb48e7,2024-07-03T02:00:07.617000 CVE-2024-34455,0,0,c191f5457e9d706ca3323355b6cb28301bf69c793f902f33757952929305bbe5,2024-07-03T02:00:08.547000 -CVE-2024-34457,0,0,1808dce8625ecc1a2696d6210cc83b83a6cc772514c0892ea03ff228d0ce840e,2024-09-11T11:15:10.757000 +CVE-2024-34457,0,1,488e2de12358ba7ac2ecaef904903ac7bcb5c8ffea8ebfc53fe2dd66e2b38582,2024-11-04T22:35:05.480000 CVE-2024-34458,0,0,ad9c57980a1196e03a7ff89c7cbce14805d2491f6af55e1053911cc733df4207,2024-08-21T13:31:38.380000 CVE-2024-34459,0,0,fa787ae7a4c8630112bbb06f81f3133274e5fdd9f7332b290019503934d44271,2024-08-22T18:35:08.623000 CVE-2024-3446,0,0,5ac77fa1865633043064ab1ffaeb59fe80c825b06632f0aec7d1674c1a671484,2024-09-25T01:15:40.827000 @@ -254624,10 +254624,10 @@ CVE-2024-3487,0,0,4ff2b905105ca048d90a2e33e25fd9b26128f3e6906b07d6299f870ad63ad5 CVE-2024-3488,0,0,61e15575c22ff5a767d1be731e2c78e99681dc33e8575bc1a8940edf28193df9,2024-05-15T18:35:11.453000 CVE-2024-34882,0,0,414bf162499af104af9e3ac918dba0d5046535587e72d8bc01c02fcf53c2126c,2024-11-04T18:50:05.607000 CVE-2024-34883,0,0,8cef556fd6ed557941a27afa1209a5a7329727230a916eab9bc05cc044ac6260,2024-11-04T18:50:05.607000 -CVE-2024-34885,1,1,9bb95018cc7498813bb5e4c574e8edec8c067795fd5c1f2a36cbd0c7ca8bdc4c,2024-11-04T19:15:06.560000 +CVE-2024-34885,0,0,9bb95018cc7498813bb5e4c574e8edec8c067795fd5c1f2a36cbd0c7ca8bdc4c,2024-11-04T19:15:06.560000 CVE-2024-34887,0,0,d22116c2ae31cab92f7a56e7512a45389f55722ab02edbebae92352923fda0c2,2024-11-04T18:50:05.607000 CVE-2024-3489,0,0,ea9bd95a767998b3f2d98747bee17b3d4435734727140c279148a23c9826811b,2024-05-02T18:00:37.360000 -CVE-2024-34891,1,1,74f783d8e75ff41a9b7fd67a10b65058026cc95b8c85260bf99919168c78e502,2024-11-04T19:15:06.647000 +CVE-2024-34891,0,0,74f783d8e75ff41a9b7fd67a10b65058026cc95b8c85260bf99919168c78e502,2024-11-04T19:15:06.647000 CVE-2024-34899,0,0,8587795bcb80eaac03ccdd83ddcd275c805b44aa37227142776a20079d894d2e,2024-05-14T16:12:23.490000 CVE-2024-3490,0,0,fde4feb36b1284855cd6b30fa66a3af34b0e61e505831180625a8b1a9752ddb6,2024-05-02T13:27:25.103000 CVE-2024-34905,0,0,f78ccd452da80c6b8b88b8df2150e212f5062dc9ace03288d809e1d46c16b911,2024-08-19T18:35:11.410000 @@ -254709,7 +254709,7 @@ CVE-2024-3508,0,0,ce82a7050fad9545b54b48fbeb7e72666687f8071a844658c7f2f064c0e3c0 CVE-2024-35080,0,0,c9a211365cbd542cdef0b29d59f3b2dfae2b1b61359fa8769a673763d1c1edb3,2024-07-03T02:01:19.997000 CVE-2024-35081,0,0,5f351d35a7c4bf1c7c66c04741787cf7f264d0978d7069822794634f96e6d2d6,2024-07-03T02:01:20.817000 CVE-2024-35082,0,0,50893ba92bdaace4fd9b61f50c725a7911d5b698ac51e1ad37d8182767cd2ba8,2024-05-24T01:15:30.977000 -CVE-2024-35083,0,1,33f64168edb7b7f68d059cde18d803c0f2719b461103a2f57a97fd64b126d447,2024-11-04T20:35:06.920000 +CVE-2024-35083,0,0,33f64168edb7b7f68d059cde18d803c0f2719b461103a2f57a97fd64b126d447,2024-11-04T20:35:06.920000 CVE-2024-35084,0,0,ac2799cc1434dfc2c78149fd1b6245909a5d0ccbc943a72e9768ed8158560b71,2024-07-03T02:01:21.793000 CVE-2024-35085,0,0,28b8104ff5f9fa8bc166e7b90ee75abfa07185cbfa227faaf969ddb5ab2e1407,2024-08-19T16:35:14.260000 CVE-2024-35086,0,0,bbb34dc58989be1196237a9d847c0e01aed13ed3f437f7e1bef961a874339d86,2024-07-03T02:01:22.567000 @@ -255509,7 +255509,7 @@ CVE-2024-36113,0,0,bd0f172ed061f2563f819d35f44c783c215c944968e504df51b3e976b592c CVE-2024-36114,0,0,5e400f6e1accfe4ee34afe11a2ba03b10596fa4481251b5d420288b4320d1b3a,2024-05-30T13:15:41.297000 CVE-2024-36115,0,0,f8ba661b18a24aa8a9d37cbb77cc6240a2c56bf800de38ea5defb142197d0446,2024-06-20T12:43:25.663000 CVE-2024-36116,0,0,3e18cd044e5ac4fbf5437d214cb9f9e5fd21bda7e634efa12dbd7a1ca2e9815a,2024-06-20T12:43:25.663000 -CVE-2024-36117,0,1,42a17f7c6e84289ca632ec11d6e4deda84e90fa76f4b0c21d790cd54d8995eea,2024-11-04T19:15:06.733000 +CVE-2024-36117,0,0,42a17f7c6e84289ca632ec11d6e4deda84e90fa76f4b0c21d790cd54d8995eea,2024-11-04T19:15:06.733000 CVE-2024-36118,0,0,465f56aaa290110c45c5a97c561d74aa67b1f0338ecac0756842534493905f75,2024-05-30T18:18:58.870000 CVE-2024-36119,0,0,ad3fdfde6f7f919d37105cd874e63e8e2fe26461ce221136b38033b394426334,2024-05-31T13:01:46.727000 CVE-2024-3612,0,0,93a685f994d05c8ad5b7ff57b12106c8be79a3b2a7f159c5cdaae42ff2a83d49,2024-06-26T17:15:27.243000 @@ -255999,7 +255999,7 @@ CVE-2024-36912,0,0,4d16e3c0e44dae74fb4f56ef66d76111321868b505627c129ae05bf55e598 CVE-2024-36913,0,0,b5701a70b17faedcb86c05267b95e0568110660dd09bba586abfe504bf7e17cc,2024-07-03T02:03:49.870000 CVE-2024-36914,0,0,9d0a2a59a5979e599afc47c85619298d0dba44926c68bad3c42d98f4e86a1e53,2024-05-30T18:18:58.870000 CVE-2024-36915,0,0,59e6fc1291daca135761fa52e5fdb0439e9267cfc7e5c77dda28056758ddba27,2024-08-19T05:15:06.460000 -CVE-2024-36916,0,0,36d478152b8897415c4b118bf935e513132999146096a1b52b71ec1c2fb671a6,2024-06-27T14:15:14.463000 +CVE-2024-36916,0,1,b42788e5ba43d52d97ef34794298702508078a0547c8d3a7ae12e7beacd0e1c9,2024-11-04T21:35:04.977000 CVE-2024-36917,0,0,87ba592cc3ba4baa8d23c838419e7e78fb3196c8c68a279e35cd80ddf82e8648,2024-10-10T12:15:04.060000 CVE-2024-36918,0,0,f4c8fb45e44d9a145b3470164e7534e29337de61bbd3b9ef12d7c79463c4d087,2024-05-30T18:18:58.870000 CVE-2024-36919,0,0,99baaae9ef063c605b7a2ccf732530270475d8e1a1554e496c616adb6d6ac4e2,2024-06-27T14:15:14.533000 @@ -256038,7 +256038,7 @@ CVE-2024-3695,0,0,cd8583909d9224874fa5edd0e2b15c723aa0e29947c489c19d9e0c7d6c0bc0 CVE-2024-36950,0,0,5481634f4762829611a0871f56a4ab89e2246b2eba6289dad49130b2c56bcf42,2024-06-27T14:15:15.090000 CVE-2024-36951,0,0,cdb358871df864e3a182d37953aaed429ff6a5f247e5d9e7d6be476ab6336252,2024-05-30T18:18:58.870000 CVE-2024-36952,0,0,0e58dc709cffcfd05de9d57f3aa03a8717a237addfd16a6d5836235e18c7c410,2024-05-30T18:18:58.870000 -CVE-2024-36953,0,1,0490f8448dc7e27a18e58db0aaae7f93d214f69dd46e7c69b0f76db33e41cf96,2024-11-04T19:35:09.213000 +CVE-2024-36953,0,0,0490f8448dc7e27a18e58db0aaae7f93d214f69dd46e7c69b0f76db33e41cf96,2024-11-04T19:35:09.213000 CVE-2024-36954,0,0,0cc7487fca8978b6ea62e77d179531116ae2856cff453cf4a9702de0da5aa2c4,2024-06-27T14:15:15.237000 CVE-2024-36955,0,0,2177d2fec34a0c82ee8955b7c31b7d24aa0bfbc57287be7b8c0e982445dfea8d,2024-07-03T02:03:54.210000 CVE-2024-36956,0,0,f86ebb70c181e89ce1106f0834475ad18db36a14534d58b5dedad7d89fb3c2b5,2024-05-30T18:18:58.870000 @@ -256680,10 +256680,10 @@ CVE-2024-37831,0,0,84d591b6c62e8531ddd444b16a032f0bcaaa039fd0dd2bdc2becb030b994a CVE-2024-3784,0,0,f0c80c77a0788aa17bf80578f54749ae490fe23c5161f7f9c165d9871caa60a2,2024-04-15T19:12:25.887000 CVE-2024-37840,0,0,1ea05f0cae39cea91919dabf259bc43d4d53a339aa6352e9633c1155c24e02e9,2024-07-03T02:04:49.190000 CVE-2024-37843,0,0,b2b97625cfd8538b070daf88e20efea752488fb698343ba1b69e8a5a31a226a9,2024-08-01T13:54:21.843000 -CVE-2024-37844,0,0,e92866aea9b310ce4b128c5f2fa285465297f99b6b41a105e42d6be7945f9dd4,2024-10-28T14:35:11.803000 -CVE-2024-37845,0,0,2fbb245c05e69100edbeb6bd8d6ef93427bfd7db32c67bd81b3947a76ff82479,2024-10-29T18:35:04.397000 -CVE-2024-37846,0,0,0a771dd4297ecb7d6b521e019dc9e4e37262258e8937f6940b3754658324b8b2,2024-10-29T18:35:05.693000 -CVE-2024-37847,0,0,4a1f07d2568b8def7f98c67a4d243c1afbe30f9de21a43af0fc95c8f1b1da6c5,2024-10-29T18:35:06.983000 +CVE-2024-37844,0,1,de4ca3641a53d243984a7fd1b360fd808737cc6cd7e902f979333e9bcb9b6586,2024-11-04T21:58:56.810000 +CVE-2024-37845,0,1,bec7eaa549e4265a2f5e9171c2b1616e0c7f6d78bbc28be332e29449dbca45e2,2024-11-04T21:53:53.433000 +CVE-2024-37846,0,1,14b467d999377a0f0fedbdf3eca1bf507f557f010b9d4c91834b3c146cbb0ac7,2024-11-04T22:03:12.527000 +CVE-2024-37847,0,1,569310391550375395e9421a27fea80ad5736064a77d5c294d1f2eef409b6b86,2024-11-04T21:32:29.250000 CVE-2024-37848,0,0,b9654691620e5501baad2d1771338ac2aedaf89f42fcedfa6b269a2de242ad76,2024-07-03T02:04:49.977000 CVE-2024-37849,0,0,7a15b5118e0a895a8306b103c51dd029b756d9600db3bef6c7132e3f601ee351,2024-08-15T15:35:11.593000 CVE-2024-3785,0,0,a59b207d5a568fe95d1650fae2ba42ab1a2108a4cbb162f57fceb4094d5da52c,2024-10-31T14:35:17.530000 @@ -257350,7 +257350,7 @@ CVE-2024-38583,0,0,3586ecafa0d1ca6e8a926d43c12025b855a9c710e7b8311423d413eb76501 CVE-2024-38584,0,0,866c0fab6737d5c632d2fe0d0fa84370c558b19a956e53ddad3dc439393e5215,2024-09-19T13:19:59.523000 CVE-2024-38585,0,0,ac7ad3971d199dfa0ef80e1eb68414477e8c3ff2ccc08162bcbd892283ba3515,2024-06-20T12:44:01.637000 CVE-2024-38586,0,0,e1ff5c054b319f07de453ba910d18e7747a4a3215b30c879a6dd800b406a5cb1,2024-07-05T08:15:03.210000 -CVE-2024-38587,0,0,0b984db6b2a9d7bf09dd4f816f04bfd5bf979a0b9b75a21ee2fc29cf10ba66a9,2024-07-15T07:15:11.083000 +CVE-2024-38587,0,1,0a3e5daa01a3bda2ca9f44e3710648752086dd41bed929adb199f5138bb39728,2024-11-04T21:35:05.243000 CVE-2024-38588,0,0,83a3ccb65e1fa9bbcacd884a5041e890e7bceb684a12f226603e74d7ab95ec72,2024-10-31T08:35:06.230000 CVE-2024-38589,0,0,054b7c93b18a32102a19731b8b9f7b53136e29764718c76bb09302eaee6404d9,2024-07-15T07:15:11.207000 CVE-2024-3859,0,0,f6a57f468f9800b8da982d83af2ac389f3f4d8b059886951b49765f213c508e4,2024-07-03T02:06:47.757000 @@ -258074,7 +258074,7 @@ CVE-2024-39633,0,0,fc0971d1bc8793039b4953353803c462b62ac233474e83dd34dde3ab57042 CVE-2024-39634,0,0,b68dbc093c134ffec6acb55cc59fb6f5bc0edd749d548af565529e002e00c7c7,2024-08-02T12:59:43.990000 CVE-2024-39635,0,0,de70c45d07db6614d3e443df9460115ba902119a62dfce68d14c6216ecaf4985,2024-11-01T20:24:53.730000 CVE-2024-39636,0,0,356132dd8c4585470fbd20a2862e8961fed4fe21f88d52a87134f7776cb4d243,2024-08-02T12:59:43.990000 -CVE-2024-39637,0,0,c9cd93cf93f9c41475771220e56072736d7ef7107ab49d4cf3bf3069940988e9,2024-08-02T12:59:43.990000 +CVE-2024-39637,0,1,80fe3bc57b73ad9ac108a5a969d2217482f3be0bb280f01a4b7e247941a392f8,2024-11-04T22:35:05.700000 CVE-2024-39638,0,0,cf36aae6a91cc72ba13b071b9e149e2fa798a9f572f58ede9d761408ecfcdde9,2024-09-13T21:00:44.173000 CVE-2024-39639,0,0,c892bca8e5f4fff4c1ed6dadeda295fe8620f9e4f2c22d8b274a7931f62cf1d0,2024-11-01T20:24:53.730000 CVE-2024-3964,0,0,9f7a9dcb99a6b1dda9d890f7e0a024c114babf4cc61dfd04fd66f31288d98320,2024-08-01T13:56:47.440000 @@ -258446,7 +258446,7 @@ CVE-2024-40484,0,0,450f717e0dcf79c0d7625633ec58aab189af6e628b95e324782e3205e6fde CVE-2024-40486,0,0,4cd2f281e08f3291d37d3a4823af93070215d87d687ca41653f1c72ca427a7a7,2024-08-13T01:13:52.383000 CVE-2024-40487,0,0,41af7da83500c8a75e7df05fb6c9f48916ac5794006d346f5d5ff76e523c1408,2024-08-23T15:35:06.307000 CVE-2024-40488,0,0,935bd1c3b9e22ad2c8e572783ed910d0a85a3508107693b6f595be8805553bbf,2024-08-13T01:13:53.230000 -CVE-2024-40490,0,0,6d80e25b669dfc3ac12222827143bba769042150838d4e3a5b1a97d314fbf57d,2024-11-01T20:24:53.730000 +CVE-2024-40490,0,1,6bdbe902ec1275c3611f20f24d45bb94d7a0b9ba02d145178c98f1f5b90371a0,2024-11-04T21:35:05.530000 CVE-2024-40492,0,0,887baeb8c822fbf96c83ae7c8317e551b9d380e125d5f646dfb0a8c0719647ab,2024-08-01T13:57:30.260000 CVE-2024-40493,0,0,aaea0b22b1a9fd8ca62ceefb69cfb4d04acb9686bdbdbc9774da6bba4ba8925d,2024-10-25T17:01:22.433000 CVE-2024-40494,0,0,48a84fe0e443f816c7deb1ffb2fa8d49462b96b77d70d281cb18dcbf2a2ebfcd,2024-10-23T17:35:05.100000 @@ -258500,7 +258500,7 @@ CVE-2024-40575,0,0,267280fd6d1dce9620611aeb1f0d6276db3825fa55e9f5e7fc538f4804a7f CVE-2024-40576,0,0,8423823b913f3d1284aae2224b689bfefe0b7a1b018e49f904fd4948fdba6a99,2024-08-01T13:57:51.520000 CVE-2024-4058,0,0,517dff31dd649a4fc97ec9b0700bafce6dc3cd3c4729ffb175a77bfe0097ad6e,2024-08-01T13:59:23.240000 CVE-2024-4059,0,0,c49986e07be30ca2c850f4613369c1702dff21e7018832f61c83284c95e0cc00,2024-05-03T03:16:29.430000 -CVE-2024-40594,0,0,5f8b4e7b3001e206c4db42bfb10b66a5767bd1e5041c1bca9998a882526a992d,2024-07-08T15:49:22.437000 +CVE-2024-40594,0,1,e1d4d027c9dcda2da83b02bb549097245bef0193d8569c5563a5fbe8b55ccbb0,2024-11-04T21:35:06.433000 CVE-2024-40595,0,0,c44d4f6c466d7ef5eae926dc07df3df9a34ba4de6b2deba6d973ce015e367bf0,2024-10-25T12:56:07.750000 CVE-2024-40596,0,0,eba237165708995f6d88799cc22362156aa815eb2255f3ea66a6ad9f417cfe2d,2024-07-09T16:45:08.760000 CVE-2024-40597,0,0,9253bd3e0343b7becb6fbf27eb19f59c2b782f333d3980529c893721abdb7002,2024-07-08T15:49:22.437000 @@ -259412,7 +259412,7 @@ CVE-2024-41927,0,0,28b0e861c649b30f117a5ffa21dceff5e2eb3f40c9e49c2283b3efe64f1c3 CVE-2024-41928,0,0,fac45a5eba953351f64e8420aefaa828221c1e8b109e75da05d07c8ee7a8c443,2024-09-06T17:35:13.400000 CVE-2024-41929,0,0,7547305bee5f10749b150ea9e1b86a9a69192b8070c36c448e7faebd542862fc,2024-09-20T12:30:51.220000 CVE-2024-4193,0,0,4d4f4fcde78b01b33e30a077c434c1714d01a9ac9cd58d916bc86b963b6ddbd7,2024-05-14T16:11:39.510000 -CVE-2024-41930,0,0,aa58d3ec2ec1f583bc94527e5b89837194106277c444e0d511759663a04c7f55,2024-09-30T12:46:20.237000 +CVE-2024-41930,0,1,b52bedd6fe23f23d9196bfe0280a65c540f937909a2604096ecc91d821792ab0,2024-11-04T22:35:07.177000 CVE-2024-41931,0,0,b563afee0e5b34fafa40b2a0b6590f442b2c5bae7f91256d0709bb72d33194df,2024-10-17T17:15:11.773000 CVE-2024-41936,0,0,d330b2a32a604797fc4eb94f395ba3140911090caf0d19e4d7603d421735298b,2024-08-20T16:26:54.663000 CVE-2024-41937,0,0,17d01be9af92612ee6b4d89126a811836507d3fbf35417e172928be42551212a,2024-08-23T16:21:21.893000 @@ -261077,7 +261077,7 @@ CVE-2024-44181,0,0,6968e89bcc34da95b275f481a5e61eaf93b419f4e1f0ac49b3eaa4255a65d CVE-2024-44182,0,0,c8405a3d9209d8acdecd393b8c354b0a78369af6884ff3ac8bf0fb4d77988b16,2024-09-24T16:52:49.767000 CVE-2024-44183,0,0,57b9818651cb417289cf4085c7f242935e44b16eacbd02a55d723c9720089da4,2024-09-24T19:04:51.030000 CVE-2024-44184,0,0,2b4c62cacdeb539e2524aa34af1a6c1e7c1594f87082a2353399d1dc98f019f0,2024-09-24T19:03:08.110000 -CVE-2024-44185,0,0,8473ea59582fac16714f99db767193dfeb6d727db3a0eec56d667af7073d7402,2024-10-29T15:22:45.677000 +CVE-2024-44185,0,1,51b072a6b33548434c332f03f5c5042e3cd88999d38e0cb6ec7f071c47ccfefb,2024-11-04T22:35:07.400000 CVE-2024-44186,0,0,0a6ed69346f4ae3547e173619f5fb32c164a57eccfeb66e3a57b038524695fd7,2024-09-24T18:03:45.513000 CVE-2024-44187,0,0,d2d2c28ca4949100ff21bfe0c88cdee4654cdb1db67fcca21321bb7541d90ded,2024-09-25T13:25:52.043000 CVE-2024-44188,0,0,d9b3eca877b183751dacb80ba82d47175b17c9197d2f1bc3c870ce12e136ffb2,2024-09-24T20:38:27.090000 @@ -261108,9 +261108,9 @@ CVE-2024-44222,0,0,2d1c9506aa01928c94a245f74651f0e477458ddd815a4bd143998351ecb56 CVE-2024-44228,0,0,4d366f4ca03e1f210ca17d40371d7f0002d4d2fd25c7288f272f27e0c556885e,2024-10-30T20:35:27.570000 CVE-2024-44229,0,0,459366a3ff6ef76a99d08535a28f4f2b6e8f55a20bc19afc8ece1fec95aa44c2,2024-10-29T23:15:03.437000 CVE-2024-4423,0,0,0715bc9caf3e0b170ca2968c721bdd1e236908d8891315bb75fdf772bdc9c875,2024-07-03T02:07:32.943000 -CVE-2024-44232,0,0,0236f45cc3ff252c180db77a6cdaa66334e23fae140432040fce9b375eed8e1e,2024-11-04T14:42:06.010000 -CVE-2024-44233,0,0,d4a94483c9cf2b29255cede4216e01b3edfb0f634b4a675e37897f3ea82f28b7,2024-11-04T14:42:01.997000 -CVE-2024-44234,0,0,a6e5feacb6221a74a5b10c311a409f1ece6ff36bb3e549f3710e4ea28781c4ac,2024-11-04T14:42:08.367000 +CVE-2024-44232,0,1,3fbe44e4234d017eaf06dfe11500106b1c1f27817b9da3c7498cf923d0b31bc7,2024-11-04T21:35:07.233000 +CVE-2024-44233,0,1,4e116c60e2f8b4a4de222c448ec0b2dd784509714d36dcce11a20af58c7b5f7d,2024-11-04T22:35:07.613000 +CVE-2024-44234,0,1,82408897d48c8a47124992d1c94da051dd820e10264980d21bbc3dd678fe407d,2024-11-04T21:35:08.147000 CVE-2024-44235,0,0,f6b12e29f9914b58eea41bdafe0e4148ebdbea0c9aa9cac7f81ae35deb7df419,2024-10-30T21:35:06.987000 CVE-2024-44236,0,0,2596c988781ee3ffb6a2ddc6dda4e4baeacf8834e38bce0c324b3d9abc20481c,2024-10-30T17:28:52.077000 CVE-2024-44237,0,0,0ccb96caec122e6d60ce17ba18063b0a9447d8c20c9511ccf57f0112e5d3846b,2024-10-29T21:35:16.563000 @@ -261280,7 +261280,7 @@ CVE-2024-44728,0,0,cb7a7604dfcd48f9cda73a0c69d9a24576616f565cbb7b44a1dd956c1a254 CVE-2024-44729,0,0,8927fd223d4ba575b179ed6c329831ef814c6d84c37bf537a737d3016ff6f41f,2024-10-16T19:35:07.543000 CVE-2024-4473,0,0,8a0cf4a98efdbfb5770862e11c920028f2e3a9a43c44eb843685fb5ef0c3f72b,2024-05-14T19:17:55.627000 CVE-2024-44730,0,0,68e24ec16142e7e4b16db1fb49b8bca291622a943e62f8987d7002843b292365,2024-10-16T19:35:08.430000 -CVE-2024-44731,0,1,c8b83766bd37ae72dea57fcd8091713c429814e3571ec057fa8a55aadda72daa,2024-11-04T20:35:07.840000 +CVE-2024-44731,0,0,c8b83766bd37ae72dea57fcd8091713c429814e3571ec057fa8a55aadda72daa,2024-11-04T20:35:07.840000 CVE-2024-44734,0,0,2c4788aa6c56f345d19a79974f7a25e8f33117ccbb6a849bf098c683fbf59a73,2024-10-16T19:35:09.310000 CVE-2024-44739,0,0,48da2c283a8d53275b8fef0ca13127577bd8ad3471472700794962cf357a3ab6,2024-09-06T16:46:47.907000 CVE-2024-4474,0,0,f8c1a36ad14efe96f98dae06e1720ed737c744e50cd9a9e3991eaed9f98aef96,2024-07-17T02:48:04.213000 @@ -261505,7 +261505,7 @@ CVE-2024-45075,0,0,72725abf8f0bda55b265624cd19c42b954d17e9672b7c19951b6fe04531ef CVE-2024-45076,0,0,5fb321e82c08a6c58252337bee6e5fcb4b13786a863fe8ca643f04e713d05d32,2024-09-06T16:44:52.310000 CVE-2024-4508,0,0,26388c420646a8ddc4ee2de628a691e0fa51808e2f848ae0f9b7aad58ccb1298,2024-05-17T02:40:26.220000 CVE-2024-45085,0,0,6bf407745c49416d639e4551e6b0198c41834096ad27b893ebf03e1d6f70dda9,2024-10-16T16:38:14.557000 -CVE-2024-45086,1,1,6033a6df67db621f8173f55d18c48fb1722bf1239fc7b55c825347122fb7ab81,2024-11-04T20:15:05.013000 +CVE-2024-45086,0,0,6033a6df67db621f8173f55d18c48fb1722bf1239fc7b55c825347122fb7ab81,2024-11-04T20:15:05.013000 CVE-2024-4509,0,0,996942a0a2c59f4d53067a2868fbad35944719504585e3998bbd4d788c545588,2024-06-04T19:20:40.347000 CVE-2024-45096,0,0,d4f642a1e6bb8f30a3a63abc6de33d2a734d4a63841c63adbbf0861fc10b1ff8,2024-09-06T12:34:17.957000 CVE-2024-45097,0,0,66f33176e0c07f5466116654bcd7c2847267016c1af22914a830c235e4290102,2024-09-06T12:51:59.750000 @@ -261590,7 +261590,7 @@ CVE-2024-45180,0,0,08348c7b1382a66372a71879585bc4b470bbbe0e7bc2a628091dcf790778c CVE-2024-45181,0,0,c1b3f50892c5ad2964a42f2f7c4bb1e591fc78d268d80e02244df3b7c3d3d502,2024-09-18T20:26:26.873000 CVE-2024-45182,0,0,e32901d25899173bbdbcd4da8de2dfd78b6a7db5248414eaa56acb1cb3e78104,2024-10-29T21:35:21.720000 CVE-2024-45184,0,0,2cf234e0a6e14825f232aaef12e4c1aaad3da08547a4333f332ffe8186f4ef37,2024-10-15T12:57:46.880000 -CVE-2024-45185,1,1,4d25eea007d12e8196676fddd5a022b600ae0556220020b594a3731f94074eb3,2024-11-04T20:15:05.257000 +CVE-2024-45185,0,0,4d25eea007d12e8196676fddd5a022b600ae0556220020b594a3731f94074eb3,2024-11-04T20:15:05.257000 CVE-2024-45186,0,0,77c3f8977c3993383fb80894e402f55d5d22584cb41b5e73c31c8d88ae8792cc,2024-10-04T13:50:43.727000 CVE-2024-45187,0,0,b29c34a9281e147a1f2b33bdd2a8c272cd39081d36dd9d0273787cf191e54024,2024-08-26T12:47:20.187000 CVE-2024-45188,0,0,b715e0fd98dc9de103c52fc47a055822268226fc14af5f0a01f3a3eab3db9def,2024-08-26T12:47:20.187000 @@ -261810,7 +261810,7 @@ CVE-2024-45492,0,0,073ca72c9147ce0bd071ae42dd069b817368a461c31ddb6a6a85b43c752a5 CVE-2024-45496,0,0,cb4145e26d358c15cb434585f9bcb20449ce473167aa6d60e18e039ff47cf458,2024-09-20T12:31:20.110000 CVE-2024-45498,0,0,ead799fee90d0be791c926b84a8db9a257cc85e76c202f16fed08488baf7d590,2024-11-04T17:35:22.900000 CVE-2024-4550,0,0,ea2693a2208898e22f1b33bfbea2ea7879154431a660b6be5aad9a2659ccd071,2024-09-14T11:47:14.677000 -CVE-2024-45504,0,0,d1fb07a3228efd18f7c0af3faab016c97edb9e2da8e02dba547168a8c292ae66,2024-09-10T12:09:50.377000 +CVE-2024-45504,0,1,3b58dca9312966af1f86033b4db5d926602e7a6d36304d3cb72a6a0485059e81,2024-11-04T21:35:09.173000 CVE-2024-45506,0,0,53228a9659d8b3663e59f7b6cd3ffdc01b4518a34e19971e095f98575a886619,2024-10-14T03:15:10.123000 CVE-2024-45507,0,0,b2cf0920dcb75db868de7b4afd51449cea360da72164b9b7e7a575176b0c17c4,2024-09-05T17:53:39.760000 CVE-2024-45508,0,0,a7bf13ff5f2bf318e53d0cc8b12c1b5ac7eae45f1991e7b683a2e3673a166bb9,2024-09-04T16:44:08.247000 @@ -262047,7 +262047,7 @@ CVE-2024-4601,0,0,f0cf92b01a71b6ce5239836875c0fea83fe5cefcc9c9a95787d845c6004188 CVE-2024-4602,0,0,2d8504f508e1d4f718d8c666850c307b85c9596de2a8b2f0ab0bc138c9da4ca4,2024-08-01T13:59:32.233000 CVE-2024-4603,0,0,9942bc7f0ee4df83c0037c4c5d6b42a7bde07b02fe0e655d3c99ab93c8488123,2024-10-14T15:15:14.210000 CVE-2024-4604,0,0,a39c956f080c616b17936b03ed62fbdee5080806b0deef5fc7741779c0bf0ec7,2024-06-27T12:47:19.847000 -CVE-2024-46040,0,0,f69112d5a1863fbd0caca1b0b2804dd2dfc1a731583d042e591bd5e81ca4008b,2024-10-07T17:47:48.410000 +CVE-2024-46040,0,1,85792bd5218441a1fb68e9fb698c73a2bb724468be93c68b328b24f4f512b509,2024-11-04T22:35:08.430000 CVE-2024-46041,0,0,c02cff8dc91cfcfecb1fc716067f6a80d76cbf5a6025a1c04ea63ec71bb7758f,2024-10-07T20:35:09.113000 CVE-2024-46044,0,0,dfae0b580cc93a2984a53d2394c3390df5d1e1d5f2ece9d0c43f69417b5fcfde,2024-09-20T00:34:08.463000 CVE-2024-46045,0,0,1a98614675cd9ac27117f00c6334ae044bd6c443cf6f2ab16e4d3bf0015beac5,2024-10-15T14:35:06.040000 @@ -262577,7 +262577,7 @@ CVE-2024-47033,0,0,832da9d601d21dbf0e493cc5aa9c40ea841249f6ae7b39664e233ce5eaa2a CVE-2024-47034,0,0,558e2a7d5a936fa44ec7effaff8334ac5e14654558ea39c45a930fd9a21cf5e2,2024-10-28T17:56:51.787000 CVE-2024-47035,0,0,4e91a9b948b2436f3e1ce65f21bd6916987ebeb91709f80af87e58910e21de45,2024-10-31T00:05:18.113000 CVE-2024-4704,0,0,9637a93e192a5f32142e05687e31ff3688b029254561fc4728d18bbfa1666d6b,2024-07-03T02:07:57.433000 -CVE-2024-47041,0,0,badb113c52ad3f26fac9981faa6ebae8f0444af7e7657f49674083947f90d206,2024-10-25T16:35:10.220000 +CVE-2024-47041,0,1,3bc2a3bddc8da3842b6c1f5b193d4833f879c6d95295752a7854f136b776b81b,2024-11-04T22:16:13.793000 CVE-2024-47044,0,0,ee5fa186fb8ea19ca537298bbe2b5e712b21f44e9ac5aca4b5f7e41e68f91755,2024-10-17T02:15:02.840000 CVE-2024-47045,0,0,f477b3cad8608c11a6f4e2c578041877872bac107a164ee977d83ddf752336b4,2024-09-26T15:35:29.950000 CVE-2024-47046,0,0,7869fbf4e097ddf562d122b002ca5484caa2f32ab0ccc92f893d14cc4f35f687,2024-10-10T12:56:30.817000 @@ -262671,7 +262671,7 @@ CVE-2024-47184,0,0,ec4f2d4aa381d6be3b04a5d96e034e76004fe037b3abeb496a459d57a9fce CVE-2024-47186,0,0,039f38f277124d2a0772e43f534fb151851ccf4c65185f4966f7e81d742991ce,2024-10-07T13:30:55.640000 CVE-2024-47187,0,0,817b13d1e8de6a39f3ef47c843dc5a93e7afef448e0409c2b2ed1c1bad0aac52,2024-10-22T13:48:59.893000 CVE-2024-47188,0,0,121b1d8543a839662e5f78a404dc83b47db88a564ef1132d3f948fc248118eb7,2024-10-22T13:50:17.493000 -CVE-2024-47189,0,0,7ecc2a6d7651786fe3ca88fc21700c3aba959abbfb427b593201d67fe273baa5,2024-10-23T15:12:34.673000 +CVE-2024-47189,0,1,7d3af50eb7bb8d000bc263107eea64000b2f13c8fe93501539ce47dbaede0a87,2024-11-04T22:35:09.220000 CVE-2024-4719,0,0,5f15010ce3da97593d62bd8e5cbd7e4df0db8fec077945fcbb72e898184ff8a0,2024-06-20T20:15:19.763000 CVE-2024-47191,0,0,2d0ea97c75991dd32a2813bf0ef51251f3610baaa622ce7906ea2e3545fc5ab0,2024-10-10T12:51:56.987000 CVE-2024-47194,0,0,0afa0b09ca6b7bbd6bd860b01b5c9153eec47be962883f1807d6c455d470088c,2024-10-16T18:15:04.043000 @@ -263317,7 +263317,7 @@ CVE-2024-48257,0,0,cde7b8837142e8c81fa5cdd04cd1a286ad8050551e4a13ecd4d16d52e71f8 CVE-2024-48259,0,0,05be91466999f287d7c34a7b188d482630d814bc65ce325c3824838e8ad22bcc,2024-10-15T19:35:38.413000 CVE-2024-4826,0,0,deaf8fdab596ba1219725251282b0367e2dd73462b62b55f2e950ae3725565c5,2024-05-16T13:15:48.163000 CVE-2024-48261,0,0,c50173bdf25e4741bc510b2698ace8c3db8c27162251f6faafaff8896241ef72,2024-10-14T15:15:14.130000 -CVE-2024-48270,0,1,e82279cb4f373ef131088b2d6ce9afd1cdb7a974f6f061e99b19d0e81804f27f,2024-11-04T19:35:11.057000 +CVE-2024-48270,0,0,e82279cb4f373ef131088b2d6ce9afd1cdb7a974f6f061e99b19d0e81804f27f,2024-11-04T19:35:11.057000 CVE-2024-48271,0,0,f1a486724163e31edae91e89dc14d5baec7425ac5626e9c57973c7569aa40cc5,2024-11-01T12:57:03.417000 CVE-2024-48272,0,0,dbe268aef174a7c0e19118488cdbf6bd3dd4bc2a094901a22c6cf1a9597b5ee2,2024-11-01T12:57:03.417000 CVE-2024-48278,0,0,2d230a37c6a5ea93411d7a1b4293f4f461a087e46c8a9a4eaba61f8eeb3339e7,2024-10-16T16:38:43.170000 @@ -263325,11 +263325,11 @@ CVE-2024-48279,0,0,734681838e14fea506d33d2e5cffcb45e5208b2ff1232248e90dbda0d4737 CVE-2024-48280,0,0,3fccbb43adc0eac89fff4a77fa6463e9ab8591cb5e7aecf8a80efbe6484b92f9,2024-10-16T16:38:43.170000 CVE-2024-48282,0,0,053fa49ae9967fbc35cea64fb50742395541b443f63ba6361e4836107ed1b694,2024-10-16T16:38:43.170000 CVE-2024-48283,0,0,c5c95d36f4cc9b3b4716d94f26715484ab471510ba26541a1f3c47bce371907e,2024-10-16T16:38:43.170000 -CVE-2024-48289,0,1,3c17d5bd38424fa0af920fbe41958bfb5ff6ab46e45b8d73a90e0bb1a9946e7a,2024-11-04T20:35:09.307000 +CVE-2024-48289,0,0,3c17d5bd38424fa0af920fbe41958bfb5ff6ab46e45b8d73a90e0bb1a9946e7a,2024-11-04T20:35:09.307000 CVE-2024-48291,0,0,3c4533b920a9f2edb3f01b1757898b30516db1528ffb114ee1df5dcc338084ea,2024-10-29T14:34:50.257000 CVE-2024-48307,0,0,935ee3e0328307bbb03111416c4595c4eff3ac408a08578a24f622dddb9d0c64,2024-11-01T12:57:03.417000 CVE-2024-48311,0,0,354d288e073d9064d21602cf2204c79fdbedf6cf54999e8a50b7d788e057c63f,2024-11-01T12:57:03.417000 -CVE-2024-48336,0,1,ceb20642f87b45ae345232a2a331752a7382b0137ef1494f458e4bcdd5d57c2f,2024-11-04T20:35:10.193000 +CVE-2024-48336,0,0,ceb20642f87b45ae345232a2a331752a7382b0137ef1494f458e4bcdd5d57c2f,2024-11-04T20:35:10.193000 CVE-2024-48342,0,0,cab27a7526b8debabab042631051135b3c12f9f8dc84e657f2f251a3750f9436,2024-11-04T07:15:11.437000 CVE-2024-48343,0,0,6b50c2f4f6b1096ee0c17db257557835a9194bfca6ac184c217bfb38c59667b0,2024-10-29T19:35:23.657000 CVE-2024-48346,0,0,9cadc94f91da6becfc880372821212f6fb47778feb19564283e0a19072e428a5,2024-11-01T12:57:03.417000 @@ -263347,7 +263347,7 @@ CVE-2024-4839,0,0,b71f0924b0409cbf87c224c453882d6c9b4eee1b8a725627eb630ec6587a6e CVE-2024-48396,0,0,e6bec06764d82cb7bcb788cbf02d61a5b8cf783d546a1c28ebb405611c8acc81,2024-10-30T20:35:31.167000 CVE-2024-4840,0,0,e883b61cf74d34d59484fc9e98d49b7c4a3e1a85aadae7b936258fde00012f35,2024-05-14T16:11:39.510000 CVE-2024-4841,0,0,65ebfdfe2681835a6b4ece6477d685d2c79df9dc285d61b3c6847a6703ab5189,2024-06-24T12:57:36.513000 -CVE-2024-48410,0,0,9a7c16d0d117971b5fcf2a39197568feb35c6192384462d3f187b9150854c781,2024-11-01T20:24:53.730000 +CVE-2024-48410,0,1,ccc65ac0ed111907d1e5a65a9755c401ec69cc35af0c3e48b39cab031ff07170,2024-11-04T21:35:10.317000 CVE-2024-48411,0,0,f02f5a173c68a1066ae1d0ad3ecb091448747ebc7ae5d98814db8ad4f2b7f72f,2024-10-16T19:35:11.290000 CVE-2024-48415,0,0,74b10390d002ade4800e5d7a55f6d3a4ceb198a0f7cd7077ee2455a630a69b9d,2024-10-25T16:55:26.083000 CVE-2024-4842,0,0,266948939b8663b41b45dca8cb12f3f3247c17eab2663a8a73d7a0fbf198d426,2024-05-30T20:15:09.703000 @@ -263369,6 +263369,7 @@ CVE-2024-48454,0,0,6b6ca49a060c554891c90c2e114c529f7522d5800fbd375e9b33b5c669ae0 CVE-2024-48459,0,0,901474388331b2012a4633aead65b3a3d672e9f671a2126655443e04f1134f78,2024-10-29T20:35:32.737000 CVE-2024-4846,0,0,354213cecebbad5d2830809199864dadc70a5508c38afeb47a24b8f17c4c0fe1,2024-06-25T18:50:42.040000 CVE-2024-48461,0,0,1c2083218c3c3685e23b071a99b5af3e2d4f1a943e6f041925ac67eedb8db886,2024-11-01T12:57:35.843000 +CVE-2024-48463,1,1,fe90ce034e717eb1a2b4658f5cecc56fa2b65feb2651269e1a8fe912ec00703d,2024-11-04T21:15:04.707000 CVE-2024-48465,0,0,79a85011a870c4c08986e482d9ae1db011c8d568f8e3fabc9f719daa8800b0cb,2024-10-30T18:35:15.410000 CVE-2024-4847,0,0,3e175fcde7743d0dafc07697dcd3c0585505cba50a8840c440513434f4a1e2f1,2024-05-15T16:40:19.330000 CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000 @@ -263447,8 +263448,8 @@ CVE-2024-48713,0,0,445ad86acde4498d015f6e3ec387c87f05498a686a49f564198004eca8c35 CVE-2024-48714,0,0,5966fa7e4cea1148b0617541f87717ad0f7359afa5da2d98079f2bad16d0d0d4,2024-10-16T17:35:06.330000 CVE-2024-4872,0,0,549af6d3c4facab0e0ed80259f11ae3b62839f464bd03f4ae7443d031f1f2086,2024-10-30T15:31:41.743000 CVE-2024-4873,0,0,acc2d485a3cc66f2d361ddda92f62901a8108a4490dc81ea4acfb7f60771d88d,2024-06-20T12:44:01.637000 -CVE-2024-48733,0,1,773fd6b2e7e4f5cd5440d09e78665a8b9dbd2f1c81115825a7a0b5a44cebe66d,2024-11-04T19:35:11.380000 -CVE-2024-48734,0,1,235096d5d15c9ed0cae8fc2b37a546f714681d3c8637630f6435091904d25b7e,2024-11-04T19:35:12.597000 +CVE-2024-48733,0,0,773fd6b2e7e4f5cd5440d09e78665a8b9dbd2f1c81115825a7a0b5a44cebe66d,2024-11-04T19:35:11.380000 +CVE-2024-48734,0,0,235096d5d15c9ed0cae8fc2b37a546f714681d3c8637630f6435091904d25b7e,2024-11-04T19:35:12.597000 CVE-2024-48735,0,0,aa134cb71eec050b9e0ec9fc38dfda524a75b12ece7317a32efa232ed7d6416c,2024-11-01T13:15:12.620000 CVE-2024-4874,0,0,4b5967df7915507c9b0020b0ee4984332d2c23e37a57b9a262a2ae6c5b300f4b,2024-06-24T19:41:12.293000 CVE-2024-48743,0,0,e34f375e468f7c410c7d8c60761e70f3ee3d5b15b7109d5d939d88a21b51dbc6,2024-10-29T19:35:25.777000 @@ -264335,8 +264336,8 @@ CVE-2024-5076,0,0,de640e02cf3b45a3c273aa587ea62260b6bf3eea8d977ac9f3e7280d3f5d4b CVE-2024-5077,0,0,58d61679dec16d0807ee3c6d8f70abda23dd3b8ef542c3a47286601f3d544039,2024-08-01T13:59:40.333000 CVE-2024-5079,0,0,03cab751fae6538cdd3ee0f9a467090b1b9dca8ded972c9a24812d90a2b62ab7,2024-08-01T13:59:40.517000 CVE-2024-5080,0,0,88ae00b43e12b64ab9ecc2d4c4ea1fe4d89b86d4c131aa05e4a989c5a4e3b207,2024-08-01T13:59:40.707000 -CVE-2024-50801,0,1,b02fd2a4d914f47ebf18861bef14a429b26208dd8058232ee786f89bcea879c0,2024-11-04T19:35:13.810000 -CVE-2024-50802,0,1,8492f5be24f5ad2918f47970062e4bc2c1c3f432ad972af1d330cb18adac5b2e,2024-11-04T19:35:14.907000 +CVE-2024-50801,0,0,b02fd2a4d914f47ebf18861bef14a429b26208dd8058232ee786f89bcea879c0,2024-11-04T19:35:13.810000 +CVE-2024-50802,0,0,8492f5be24f5ad2918f47970062e4bc2c1c3f432ad972af1d330cb18adac5b2e,2024-11-04T19:35:14.907000 CVE-2024-5081,0,0,0bebffdc717b25462ccb5a198cb29076c0fa0475011c795b0df7ab25d1acf197,2024-08-05T15:35:16.180000 CVE-2024-5084,0,0,79705ce3d53f6e7c72da00fccc935c6da44be9bf4354c31cd8528afb5e0a643e,2024-05-24T01:15:30.977000 CVE-2024-5085,0,0,6942e3068671e85a9578eddbb7240c8706dd53cd6ec5670c5d4ddd91c950a30a,2024-05-24T01:15:30.977000 @@ -264399,7 +264400,7 @@ CVE-2024-51247,0,0,f91aabdacc19911e686cb0a70b4fe352fe5b7223ce99b8d8bbb7be0048cad CVE-2024-51248,0,0,5b1f2d7395fc3935207664d4c3fab29f0abf14a36ed23190b3643b6f2344c487,2024-11-04T17:35:37.110000 CVE-2024-51249,0,0,3d0cc9c67b7b5023c7f9e10f06a152021d08c28671660933aadd4bf75e0be323,2024-11-04T18:50:05.607000 CVE-2024-51251,0,0,c4c34718f73bd23a2f11b62312d57fb9837cb268511a72fa7d6e908990a99a5e,2024-11-04T18:50:05.607000 -CVE-2024-51252,0,0,f4f3cc5383a6a1f58f9ea84c21f6a507fb680ae234f6b29b5a0b0272d72878d3,2024-11-01T20:24:53.730000 +CVE-2024-51252,0,1,c40d149bc17e2ce27f405a8cb61567ffbf2937e2612cf7f9b90f8bbcb8ca6b16,2024-11-04T21:35:11.177000 CVE-2024-51253,0,0,096fa2cabcaa44b92f571ac0967480e4fabe4fb9873c51a9dbe9e95ead4dc4ec,2024-11-04T18:50:05.607000 CVE-2024-51254,0,0,223d23065b28f9aecf516c7169cb923513ae1f39fc52963cc50e2cab41350206,2024-11-01T12:57:03.417000 CVE-2024-51255,0,0,09c7dedf943104113335c71594438f15e0e67937d27a8d621ad19f82c6566163,2024-11-01T12:57:03.417000 @@ -264422,20 +264423,20 @@ CVE-2024-5131,0,0,9b223a3704656a88e804c16f004e4517a5aad70b85be149c86a7a2071dad55 CVE-2024-5132,0,0,1e1b0edf57956ef222afc7fdedc2f2211203f4402428303961b463cfc0ea97cb,2024-06-07T17:15:51.840000 CVE-2024-51326,0,0,f88ded964298acbc6e9a32974022511c8e8484cd2422cb2a7910953f3b963a4b,2024-11-04T18:50:05.607000 CVE-2024-51327,0,0,9e8435fa7a61ae04c5765f958337ed383ed068434cbfa132e59dc833305d80cc,2024-11-04T18:50:05.607000 -CVE-2024-51328,0,1,768f8be19425d8bf4cf9b5b89b937b298b5cc7b18ce12eea5265b64902006bbb,2024-11-04T19:35:16.150000 +CVE-2024-51328,0,0,768f8be19425d8bf4cf9b5b89b937b298b5cc7b18ce12eea5265b64902006bbb,2024-11-04T19:35:16.150000 CVE-2024-51329,0,0,fe9fe6fee70bf7f535cc859756a1487466d3af982f47aeef778ab1863ee2a417,2024-11-04T18:50:05.607000 CVE-2024-5133,0,0,ce2c3261ccf7a6af3656f0cd319a645240f50aa81e714a3f3634cc2f14d7c857,2024-10-17T16:41:53.717000 CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa19,2024-06-04T19:21:01.167000 CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000 CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000 CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000 -CVE-2024-51377,0,0,fabb65b5ac4208b70588bb6a36168c12aeda2e6275f9671e51ffef7913bcb173,2024-11-01T20:24:53.730000 +CVE-2024-51377,0,1,27e24251b8fbb0cd40dc4b3232759f12cbe7946bd501f1e15145c4cb45ca2b57,2024-11-04T21:35:12.543000 CVE-2024-51378,0,0,25041eea06e8de15fb868a226604237e266234c162cafb1c59832cc50427a9bb,2024-11-01T12:57:03.417000 CVE-2024-5138,0,0,47c03094386326d2315f3415dc7d3ef94b00cbe65c94e42ace003fc1a8714791,2024-09-06T20:35:18.950000 CVE-2024-51398,0,0,e38b939d0a6ada1e8acc966a58f2c362a310a99f3df73314a118d336cca6e0d5,2024-11-01T20:24:53.730000 CVE-2024-51399,0,0,885aca9993ad625251b3194b60c099bbab5438db620967daab647ff77bcb67d2,2024-11-01T20:24:53.730000 -CVE-2024-51406,0,1,219f1a907dc34e3139e40d74617f86db24d4b43908c87f25fb1a00f5ef8165d9,2024-11-04T19:35:17.410000 -CVE-2024-51407,0,1,fda917e854eca07dcff49df0339535f103ba20de93b59699ac770c63d8521d21,2024-11-04T20:35:11.350000 +CVE-2024-51406,0,0,219f1a907dc34e3139e40d74617f86db24d4b43908c87f25fb1a00f5ef8165d9,2024-11-04T19:35:17.410000 +CVE-2024-51407,0,0,fda917e854eca07dcff49df0339535f103ba20de93b59699ac770c63d8521d21,2024-11-04T20:35:11.350000 CVE-2024-51408,0,0,9a1949f2d560a68fd2bb3d1dbdd350dc06e2d41859fb297a38dbe2b5ea7ec1ed,2024-11-04T18:50:05.607000 CVE-2024-5141,0,0,5b006751fd2d8ca9e95fc8cef49a641b35089e8e5594eecd996fab7cf0d4e5e8,2024-07-24T17:58:54.867000 CVE-2024-51419,0,0,e145fdc3d6134b228049cf2c0ec561624aa79dc4de0c1da7a3c5f83de9d39a5f,2024-11-01T12:57:03.417000 @@ -264447,7 +264448,7 @@ CVE-2024-51427,0,0,8620fe2fe9783598011162ebda7f5b78a4941fc646ad43a32bd7b2f439c18 CVE-2024-5143,0,0,5ac39d02075c8e32566e12e6b75645e72f6b53d1cd5d8a84d8661f31cb199459,2024-10-31T15:35:44.950000 CVE-2024-51430,0,0,ff23326a74158832e3c36a3da3cf40ac4ba003ba8db91bd39e91a6a5bd9de288,2024-11-01T12:57:03.417000 CVE-2024-51431,0,0,ae4ea87885399ca20809740aa83c76657f25771a3072d37738bc514622348a08,2024-11-01T20:24:53.730000 -CVE-2024-51432,0,0,1eba1fa24b7f4b0a1931cdf3e2b2e1eddcf1b909a581b7a56d8b9a07b4ee7f89,2024-11-01T20:24:53.730000 +CVE-2024-51432,0,1,06d0d3316848cec870b03db5c1c503efe28d2aee8f81e4282d342a754853942f,2024-11-04T22:35:10.037000 CVE-2024-5144,0,0,6bbfaf13c1764c4fefc00893d80de8b864d8af9b05653210d129c904ab48e8ed,2024-05-31T18:15:13.217000 CVE-2024-5145,0,0,e9d5b011678068f9e46540aba9b4c166c9546581cf81cda6f6984ec899d8b7b6,2024-06-04T19:21:01.520000 CVE-2024-5147,0,0,67fd758fa3d69d8e32fe541a58ba746107ffb7370fa9ddd99ec9988f56fe738f,2024-05-22T12:46:53.887000 @@ -264505,6 +264506,7 @@ CVE-2024-5170,0,0,0357b8fbab1b76f01ca0dd625bf87ec8b80f7fd2d35927c69b68200ba07a11 CVE-2024-5171,0,0,dd574bf92e93c62d270c5e3b0cb384556e01dba1d43a5b9db2a02845fa564cb4,2024-07-23T18:09:56.753000 CVE-2024-5172,0,0,b469524ff2309ced9aec08b056578c23e8b8b5248adb8fcea2b38cb214c81275,2024-07-05T14:05:48.213000 CVE-2024-5173,0,0,e808cbd0ff507575dfa32503bcc3a2123c9461298f1a4a4ef8cd294367da6464,2024-06-26T12:44:29.693000 +CVE-2024-51744,1,1,bd6bdc91f6d67c702ddc17998c6ec175a52423aac604901379de8ad46f8ae218,2024-11-04T22:15:03.997000 CVE-2024-5176,0,0,095b03ddd1cdcd739bbe8693b41d7d6e416f60f9815e0be55e0b3850508434d9,2024-06-05T15:15:12.620000 CVE-2024-5177,0,0,4596ccdb96b84f0f6003dc91187b58acc558e0743564be9aa6ad28db4e46749c,2024-05-24T01:15:30.977000 CVE-2024-51774,0,0,6b9ad01ae39e28e730652b71db4c41fab661cbf3a8f11904f5f832a6412e27be,2024-11-04T14:27:25.593000 @@ -265308,7 +265310,7 @@ CVE-2024-6076,0,0,f75c5e0cd2d3ad9cf3dc79d2ee6835febd9e3e1415fea3908528543dbed7f7 CVE-2024-6077,0,0,c4974f2c49bcf99698e08f718ed154b51d3cf73496f9c975d2598a4132600a7c,2024-09-19T14:31:18.463000 CVE-2024-6078,0,0,a48aa92a89b3d2f828f8a341ad2ce6a914a21f3587846f530cf16dc8ed30ed69,2024-08-15T13:01:10.150000 CVE-2024-6079,0,0,a625435aeb66a78a45b154461c249f77137a161767aad8b8e49464f09120384a,2024-08-14T02:07:05.410000 -CVE-2024-6080,0,1,55d7faa358e2c45f28e6431d41c784f80ed1049266aaeb5cc9ce768b54dd30d9,2024-11-04T19:15:07.323000 +CVE-2024-6080,0,0,55d7faa358e2c45f28e6431d41c784f80ed1049266aaeb5cc9ce768b54dd30d9,2024-11-04T19:15:07.323000 CVE-2024-6082,0,0,013046d87182f03b6cbc3b5958c2d5ce3b9ca55b4984041383e50b43bd3564b5,2024-09-13T18:29:30.637000 CVE-2024-6083,0,0,6d9bb4abe3add5a9314088c73da6990ced956f79d42ec66733f8e068d49bd5c9,2024-09-16T13:21:53.467000 CVE-2024-6084,0,0,6faa90c930997c0aec12adfd29df5cf00c8158d82ed8686290b073db2ac7ae60,2024-08-08T16:20:42.537000 @@ -266737,7 +266739,7 @@ CVE-2024-7799,0,0,00b687245dbb834ce768a34773e6d247f116248fb1170e2cff00e71dda4a9f CVE-2024-7800,0,0,648c15c60d543078675ed09d23bcee51c2c4405b9726708dfb6ef04a08b9ac6a,2024-08-19T16:50:39.993000 CVE-2024-7801,0,0,bed682b6222cb0c9f77cc5a0751ff36b1d3476d22f8b98362a2b5472dbe7cc5b,2024-10-17T15:19:27.053000 CVE-2024-7805,0,0,135d6da17dfa4c84aefd569e9d92e16548bde418c54a07f703c8b45a0b8c6cd9,2024-09-11T14:15:13.560000 -CVE-2024-7807,0,1,2b05161833902ee1c6dae96b01f5274ddcf91f23e94abe55093a1d69ee2cc8f0,2024-11-04T20:47:21.767000 +CVE-2024-7807,0,0,2b05161833902ee1c6dae96b01f5274ddcf91f23e94abe55093a1d69ee2cc8f0,2024-11-04T20:47:21.767000 CVE-2024-7808,0,0,969711922c4e0f4c36191148ae8c5b992516373bcf5aef167544cc98dd0f6ef8,2024-08-19T18:07:44.270000 CVE-2024-7809,0,0,60527746c8c58a9337e860dd0533a4fd053da5d7ab44e27861411efc76582427,2024-08-19T18:11:18.537000 CVE-2024-7810,0,0,501ecfcc11cf2cc73802b4d3933bb0470270948711ab4bd8700d22a848dae6e6,2024-08-19T18:12:14.090000 @@ -267789,8 +267791,8 @@ CVE-2024-9320,0,0,f09699099fcbae251236569e3b80f87aa18c611c7a9a81741339a3f6ea9ef5 CVE-2024-9321,0,0,a14c3ea501d5675f270df02cf8d21d7014c48fd4251b0c1b324165be69ef0bfa,2024-10-01T13:28:20.110000 CVE-2024-9322,0,0,e95e70788b8a6a49aa85018220569b500de2dbb1919ebd97b01b91f0a91cc54e,2024-10-02T13:32:17.277000 CVE-2024-9323,0,0,890a6430432a24ca83a099564288fe0c5e63b6dff3bdabb06ff3376334cef2ee,2024-10-01T12:55:17.873000 -CVE-2024-9324,0,1,c90a31597fc72ee8ba44787e48ca451aefb58f6936dc59b8b78a2afd7dcaf01e,2024-11-04T19:15:07.587000 -CVE-2024-9325,0,1,f1bc3af7edbc900b325a37f1afc7e0ab8457fdb779f2396948205355d49dfd14,2024-11-04T19:15:07.790000 +CVE-2024-9324,0,0,c90a31597fc72ee8ba44787e48ca451aefb58f6936dc59b8b78a2afd7dcaf01e,2024-11-04T19:15:07.587000 +CVE-2024-9325,0,0,f1bc3af7edbc900b325a37f1afc7e0ab8457fdb779f2396948205355d49dfd14,2024-11-04T19:15:07.790000 CVE-2024-9326,0,0,ac353111de081e75045512f212a47527fdd858d5e54a48eba79a4b87a1838dd8,2024-10-02T13:33:16.530000 CVE-2024-9327,0,0,9bb62fae114b1c29588ad2672d640859a17a9f3af7375a799fc34e218e9d39c9,2024-10-02T12:57:17.787000 CVE-2024-9328,0,0,a5f7378f6f2f1cd502f7cde1b5f6090c2d79ebec3e3af2aa2eaafb1f04d0c325,2024-10-01T11:34:57.773000