Auto-Update: 2024-12-02T19:00:42.087633+00:00

This commit is contained in:
cad-safe-bot 2024-12-02 19:03:52 +00:00
parent 2e670e7e08
commit 8e6168a40a
50 changed files with 2173 additions and 274 deletions

View File

@ -2,8 +2,9 @@
"id": "CVE-2023-28461",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-03-15T23:15:10.070",
"lastModified": "2024-11-26T02:00:02.500",
"lastModified": "2024-12-02T17:15:05.133",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -186,6 +187,14 @@
"Mitigation",
"Vendor Advisory"
]
},
{
"url": "https://support.arraynetworks.net/prx/001/http/supportportal.arraynetworks.net/documentation/FieldNotice/Array_Networks_Security_Advisory_for_Remote_Code_Execution_Vulnerability_AG.pdf",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Mitigation",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36362",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-22T14:15:09.687",
"lastModified": "2023-06-30T13:00:27.743",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-02T17:15:06.610",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
@ -79,6 +89,16 @@
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/MonetDB/MonetDB/issues/7387",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36363",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-22T14:15:09.740",
"lastModified": "2023-06-28T16:49:34.877",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-02T17:15:06.740",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
@ -79,6 +89,16 @@
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/MonetDB/MonetDB/issues/7384",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36364",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-22T14:15:09.790",
"lastModified": "2023-06-28T19:02:50.977",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-02T17:15:06.850",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
@ -79,6 +89,16 @@
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/MonetDB/MonetDB/issues/7386",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36365",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-22T14:15:09.837",
"lastModified": "2023-06-28T19:02:23.943",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-02T17:15:06.967",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"configurations": [
@ -79,6 +89,16 @@
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/MonetDB/MonetDB/issues/7378",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36366",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-22T14:15:09.883",
"lastModified": "2023-06-28T19:02:10.183",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-02T17:15:07.090",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"configurations": [
@ -79,6 +89,16 @@
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/MonetDB/MonetDB/issues/7381",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36367",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-22T14:15:09.930",
"lastModified": "2023-06-28T18:49:20.373",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-02T17:15:07.213",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"configurations": [
@ -79,6 +89,16 @@
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/MonetDB/MonetDB/issues/7380",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-36368",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-22T14:15:09.977",
"lastModified": "2023-06-29T18:00:05.380",
"vulnStatus": "Analyzed",
"lastModified": "2024-12-02T17:15:07.343",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-770"
}
]
}
],
"configurations": [
@ -79,6 +89,16 @@
"Patch",
"Third Party Advisory"
]
},
{
"url": "https://github.com/MonetDB/MonetDB/issues/7379",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Patch",
"Third Party Advisory"
]
}
]
}

View File

@ -2,15 +2,55 @@
"id": "CVE-2024-11696",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-11-26T14:15:19.143",
"lastModified": "2024-11-26T14:15:19.143",
"vulnStatus": "Received",
"lastModified": "2024-12-02T18:15:08.253",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The application failed to account for exceptions thrown by the `loadManifestFromFile` method during add-on signature verification. This flaw, triggered by an invalid or unsupported extension manifest, could have caused runtime errors that disrupted the signature validation process. As a result, the enforcement of signature validation for unrelated add-ons may have been bypassed. Signature validation in this context is used to ensure that third-party applications on the user's computer have not tampered with the user's extensions, limiting the impact of this issue. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5."
},
{
"lang": "es",
"value": "La aplicaci\u00f3n no tuvo en cuenta las excepciones generadas por el m\u00e9todo `loadManifestFromFile` durante la verificaci\u00f3n de la firma del complemento. Esta falla, provocada por un manifiesto de extensi\u00f3n no v\u00e1lido o no compatible, podr\u00eda haber causado errores de tiempo de ejecuci\u00f3n que interrumpieron el proceso de validaci\u00f3n de la firma. Como resultado, es posible que se haya omitido la aplicaci\u00f3n de la validaci\u00f3n de la firma para complementos no relacionados. La validaci\u00f3n de la firma en este contexto se utiliza para garantizar que las aplicaciones de terceros en la computadora del usuario no hayan alterado las extensiones del usuario, lo que limita el impacto de este problema. Esta vulnerabilidad afecta a Firefox &lt; 133, Firefox ESR &lt; 128.5, Thunderbird &lt; 133 y Thunderbird &lt; 128.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1929600",

View File

@ -2,15 +2,55 @@
"id": "CVE-2024-11703",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-11-26T14:15:19.810",
"lastModified": "2024-11-26T14:15:19.810",
"vulnStatus": "Received",
"lastModified": "2024-12-02T18:15:09.087",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "On Android, Firefox may have inadvertently allowed viewing saved passwords without the required device PIN authentication. This vulnerability affects Firefox < 133."
},
{
"lang": "es",
"value": "En Android, Firefox podr\u00eda haber permitido, sin darse cuenta, ver contrase\u00f1as guardadas sin la autenticaci\u00f3n del PIN del dispositivo requerida. Esta vulnerabilidad afecta a Firefox &lt; 133."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1928779",

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-20116",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-12-02T04:15:03.833",
"lastModified": "2024-12-02T04:15:03.833",
"vulnStatus": "Received",
"lastModified": "2024-12-02T17:15:08.113",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In cmdq, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09057438; Issue ID: MSV-1696."
},
{
"lang": "es",
"value": "En cmdq, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n del sistema necesarios. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09057438; ID de problema: MSV-1696."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@mediatek.com",

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-20125",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-12-02T04:15:04.663",
"lastModified": "2024-12-02T04:15:04.663",
"vulnStatus": "Received",
"lastModified": "2024-12-02T17:15:09.543",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In vdec, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09046782; Issue ID: MSV-1728."
},
{
"lang": "es",
"value": "En vdec, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los privilegios de ejecuci\u00f3n del sistema. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09046782; ID de problema: MSV-1728."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security@mediatek.com",

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-20127",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-12-02T04:15:04.777",
"lastModified": "2024-12-02T04:15:04.777",
"vulnStatus": "Received",
"lastModified": "2024-12-02T17:15:09.827",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Telephony, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09289881; Issue ID: MSV-2023."
},
{
"lang": "es",
"value": "En telefon\u00eda, existe la posibilidad de una lectura fuera de los l\u00edmites debido a la falta de una verificaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09289881; ID de problema: MSV-2023."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@mediatek.com",

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-20128",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-12-02T04:15:04.967",
"lastModified": "2024-12-02T04:15:04.967",
"vulnStatus": "Received",
"lastModified": "2024-12-02T17:15:10.230",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Telephony, there is a possible out of bounds read due to a missing bounds check. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS09289881; Issue ID: MSV-2024."
},
{
"lang": "es",
"value": "En telefon\u00eda, existe la posibilidad de una lectura fuera de los l\u00edmites debido a la falta de una verificaci\u00f3n de los l\u00edmites. Esto podr\u00eda provocar una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n. ID de parche: ALPS09289881; ID de problema: MSV-2024."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@mediatek.com",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-22272",
"sourceIdentifier": "security@vmware.com",
"published": "2024-06-27T21:15:13.670",
"lastModified": "2024-06-28T10:27:00.920",
"lastModified": "2024-12-02T18:15:09.290",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
@ -30,19 +32,33 @@
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 4.9,
"baseSeverity": "MEDIUM"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24371",
"source": "security@vmware.com"
},
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24371",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-29645",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-02T15:15:10.960",
"lastModified": "2024-12-02T15:15:10.960",
"vulnStatus": "Received",
"lastModified": "2024-12-02T18:15:09.453",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -12,6 +12,18 @@
}
],
"metrics": {},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/Crispy-fried-chicken/83f0f5e8a475284d64bf99fb342e9027",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-30282",
"sourceIdentifier": "psirt@adobe.com",
"published": "2024-05-16T09:15:11.253",
"lastModified": "2024-05-16T13:03:05.353",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-12-02T17:48:54.733",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,10 +19,12 @@
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -49,12 +49,75 @@
"value": "CWE-787"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "23.0.0",
"versionEndExcluding": "23.0.6",
"matchCriteriaId": "3E241CF7-1D65-4BF8-8759-EADE0D0FBEEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
"versionStartIncluding": "24.0.0",
"versionEndExcluding": "24.0.3",
"matchCriteriaId": "41C1FD5E-1403-4D81-81D7-FE84D39531DA"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
"matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/animate/apsb24-36.html",
"source": "psirt@adobe.com"
"source": "psirt@adobe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://helpx.adobe.com/security/products/animate/apsb24-36.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-34923",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-27T20:15:09.060",
"lastModified": "2024-05-28T12:39:28.377",
"lastModified": "2024-12-02T18:15:09.617",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "En el firmware del dispositivo Avocent DSR2030 03.04.00.07 anterior a 03.07.01.23 y en el firmware del dispositivo SVIP1020 01.06.00.03 anterior a 01.07.00.00, hay un cross-site scripting (XSS) Reflejado."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/Ka1ne1/ka1ne1.github.io/blob/main/avocent_xss.html",
@ -24,6 +59,14 @@
{
"url": "https://ka1ne1.github.io/avocent_xss.html",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Ka1ne1/ka1ne1.github.io/blob/main/avocent_xss.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://ka1ne1.github.io/avocent_xss.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-35366",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-29T20:15:19.863",
"lastModified": "2024-11-29T20:15:19.863",
"vulnStatus": "Received",
"lastModified": "2024-12-02T17:15:10.497",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FFmpeg n6.1.1 is Integer Overflow. The vulnerability exists in the parse_options function of sbgdec.c within the libavformat module. When parsing certain options, the software does not adequately validate the input. This allows for negative duration values to be accepted without proper bounds checking."
},
{
"lang": "es",
"value": "FFmpeg n6.1.1 es un desbordamiento de enteros. La vulnerabilidad existe en la funci\u00f3n parse_options de sbgdec.c dentro del m\u00f3dulo libavformat. Al analizar ciertas opciones, el software no valida adecuadamente la entrada. Esto permite que se acepten valores de duraci\u00f3n negativos sin una verificaci\u00f3n de los l\u00edmites adecuada."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/1047524396/1e72f170d58c2547ebd4db4cdf6cfabf",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-35367",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-29T20:15:19.957",
"lastModified": "2024-11-29T20:15:19.957",
"vulnStatus": "Received",
"lastModified": "2024-12-02T17:15:10.680",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FFmpeg n6.1.1 has an Out-of-bounds Read via libavcodec/ppc/vp8dsp_altivec.c, static const vec_s8 h_subpel_filters_outer"
},
{
"lang": "es",
"value": "FFmpeg n6.1.1 tiene una lectura fuera de los l\u00edmites a trav\u00e9s de libavcodec/ppc/vp8dsp_altivec.c, static const vec_s8 h_subpel_filters_outer"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/1047524396/9754a44845578358f6a403447c458ca4",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-35368",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-29T20:15:20.050",
"lastModified": "2024-11-29T20:15:20.050",
"vulnStatus": "Received",
"lastModified": "2024-12-02T17:15:10.860",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FFmpeg n7.0 is affected by a Double Free via the rkmpp_retrieve_frame function within libavcodec/rkmppdec.c."
},
{
"lang": "es",
"value": "FFmpeg n7.0 se ve afectado por una doble liberaci\u00f3n a trav\u00e9s de la funci\u00f3n rkmpp_retrieve_framework dentro de libavcodec/rkmppdec.c."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-415"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/1047524396/7e6e47220ae2b2d2fb4611f0d8a31ec5",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-35371",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-29T20:15:20.143",
"lastModified": "2024-11-29T20:15:20.143",
"vulnStatus": "Received",
"lastModified": "2024-12-02T17:15:11.037",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ant-Media-Serverv2.8.2 is affected by Improper Output Neutralization for Logs. The vulnerability stems from insufficient input sanitization in the logging mechanism. Without proper filtering or validation, user-controllable data, such as identifiers or other sensitive information, can be included in log entries without restrictions."
},
{
"lang": "es",
"value": "Ant-Media-Serverv2.8.2 se ve afectado por una neutralizaci\u00f3n incorrecta de la salida de registros. La vulnerabilidad se origina en una desinfecci\u00f3n insuficiente de la entrada en el mecanismo de registro. Sin un filtrado o validaci\u00f3n adecuados, los datos controlables por el usuario, como identificadores u otra informaci\u00f3n confidencial, pueden incluirse en las entradas de registro sin restricciones."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/1047524396/4eb17867f2e375f4824274c5e7b4d384",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-36610",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-29T20:15:20.237",
"lastModified": "2024-11-29T20:15:20.237",
"vulnStatus": "Received",
"lastModified": "2024-12-02T17:15:11.230",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A deserialization vulnerability exists in the Stub class of the VarDumper module in Symfony v7.0.3. The vulnerability stems from deficiencies in the original implementation when handling properties with null or uninitialized values. An attacker could construct specific serialized data and use this vulnerability to execute unauthorized code."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de deserializaci\u00f3n en la clase Stub del m\u00f3dulo VarDumper en Symfony v7.0.3. La vulnerabilidad surge de deficiencias en la implementaci\u00f3n original al manejar propiedades con valores nulos o no inicializados. Un atacante podr\u00eda construir datos serializados espec\u00edficos y usar esta vulnerabilidad para ejecutar c\u00f3digo no autorizado."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/1047524396/24e93f2905850235e42ad7db6e878bd5",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-36612",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-29T20:15:20.340",
"lastModified": "2024-11-29T20:15:20.340",
"vulnStatus": "Received",
"lastModified": "2024-12-02T17:15:11.420",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Zulip from 8.0 to 8.3 contains a memory leak vulnerability in the handling of popovers."
},
{
"lang": "es",
"value": "Zulip de 8.0 a 8.3 contiene una vulnerabilidad de p\u00e9rdida de memoria en el manejo de ventanas emergentes."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/1047524396/f7ff51d24ebbb29e21dfb70a0c97302b",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-36616",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-29T19:15:07.817",
"lastModified": "2024-11-29T19:15:07.817",
"vulnStatus": "Received",
"lastModified": "2024-12-02T18:15:09.857",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An integer overflow in the component /libavformat/westwood_vqa.c of FFmpeg n6.1.1 allows attackers to cause a denial of service in the application via a crafted VQA file."
},
{
"lang": "es",
"value": "Un desbordamiento de entero en el componente /libavformat/westwood_vqa.c de FFmpeg n6.1.1 permite a atacantes provocar una denegaci\u00f3n de servicio en la aplicaci\u00f3n a trav\u00e9s de un archivo VQA manipulado."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/1047524396/ded3e1509d8296ec4a91817867d108e0",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-36617",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-29T18:15:07.230",
"lastModified": "2024-11-29T18:15:07.230",
"vulnStatus": "Received",
"lastModified": "2024-12-02T18:15:10.270",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FFmpeg n6.1.1 has an integer overflow vulnerability in the FFmpeg CAF decoder."
},
{
"lang": "es",
"value": "FFmpeg n6.1.1 tiene una vulnerabilidad de desbordamiento de enteros en el decodificador CAF de FFmpeg."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/1047524396/f20749f8addc8f86de9cfacf17ba29df",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-36618",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-29T18:15:07.390",
"lastModified": "2024-11-29T18:15:07.390",
"vulnStatus": "Received",
"lastModified": "2024-12-02T18:15:10.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "FFmpeg n6.1.1 has a vulnerability in the AVI demuxer of the libavformat library which allows for an integer overflow, potentially resulting in a denial-of-service (DoS) condition."
},
{
"lang": "es",
"value": "FFmpeg n6.1.1 tiene una vulnerabilidad en el demuxer AVI de la librer\u00eda libavformat que permite un desbordamiento de enteros, lo que potencialmente resulta en una condici\u00f3n de denegaci\u00f3n de servicio (DoS)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/1047524396/a148f3679415a6da53ca112eb2ba1523",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-38476",
"sourceIdentifier": "security@apache.org",
"published": "2024-07-01T19:15:04.977",
"lastModified": "2024-10-29T17:35:06.547",
"vulnStatus": "Modified",
"lastModified": "2024-12-02T17:36:33.403",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -23,6 +23,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -30,9 +32,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
@ -43,6 +43,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -50,9 +52,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
@ -60,16 +60,6 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "security@apache.org",
"type": "Secondary",
@ -79,6 +69,16 @@
"value": "CWE-829"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
@ -92,8 +92,8 @@
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.4.0",
"versionEndIncluding": "2.4.60",
"matchCriteriaId": "ADFAFBE0-CE34-4E39-A748-63D487842DB1"
"versionEndExcluding": "2.4.60",
"matchCriteriaId": "13126636-FD76-4E3E-B949-14A5082DE02A"
}
]
}
@ -129,6 +129,28 @@
"tags": [
"Third Party Advisory"
]
},
{
"url": "http://www.openwall.com/lists/oss-security/2024/07/01/9",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
},
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240712-0001/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40075",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-07-22T19:15:02.867",
"lastModified": "2024-07-24T12:55:13.223",
"lastModified": "2024-12-02T18:15:10.760",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,11 +15,50 @@
"value": " Se descubri\u00f3 que Laravel v11.x contiene una vulnerabilidad de XML External Entity (XXE)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"references": [
{
"url": "https://gitee.com/Q16G/laravel_bug/blob/master/laravelBug.md",
"source": "cve@mitre.org"
},
{
"url": "https://gitee.com/Q16G/laravel_bug/blob/master/laravelBug.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-46054",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-27T15:15:26.200",
"lastModified": "2024-11-27T15:15:26.200",
"vulnStatus": "Received",
"lastModified": "2024-12-02T17:15:11.610",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenVidReview 1.0 is vulnerable to Incorrect Access Control. The /upload route is accessible without authentication, allowing any user to upload files."
},
{
"lang": "es",
"value": "OpenVidReview 1.0 es vulnerable a un control de acceso incorrecto. La ruta /upload es accesible sin autenticaci\u00f3n, lo que permite que cualquier usuario cargue archivos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/b1d0ws/CVEs/blob/main/CVE-2024-46054.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-47078",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-09-25T16:15:10.907",
"lastModified": "2024-10-01T18:29:17.867",
"lastModified": "2024-12-02T18:31:56.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -17,32 +17,14 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
@ -50,26 +32,34 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
},
{
"source": "security-advisories@github.com",
"type": "Secondary",
@ -83,6 +73,16 @@
"value": "CWE-863"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
@ -94,9 +94,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:meshtastic:meshtastic_firmware:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:o:meshtastic:meshtastic_firmware:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.5.1",
"matchCriteriaId": "958EC971-A6BF-457B-95F0-09DA40B334DE"
"matchCriteriaId": "E439DDC9-06DB-4E86-A0E4-4D5FF73E9870"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2024-49763",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-02T17:15:11.830",
"lastModified": "2024-12-02T17:15:11.830",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PlexRipper is a cross-platform media downloader for Plex. PlexRipper\u2019s open CORS policy allows attackers to gain sensitive information from PlexRipper by getting the user to access the attacker\u2019s domain. This allows an attacking website to access the /api/PlexAccount endpoint and steal the user\u2019s Plex login. This vulnerability is fixed in 0.24.0."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-942"
}
]
}
],
"references": [
{
"url": "https://github.com/PlexRipper/PlexRipper/commit/184074644a1f5a8ac59519929a9c4b92280fb2a1",
"source": "security-advisories@github.com"
},
{
"url": "https://securitylab.github.com/advisories/GHSL-2024-305_PlexRipper/",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-50380",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-12-02T17:15:11.980",
"lastModified": "2024-12-02T17:15:11.980",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Snap One OVRC cloud uses the MAC address as an identifier to provide information when requested. An attacker can impersonate other devices by supplying enumerated MAC addresses and receive sensitive information about the device."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-290"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2024-50381",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2024-12-02T17:15:12.160",
"lastModified": "2024-12-02T17:15:12.160",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability exists in Snap One OVRC cloud where an attacker can impersonate a Hub device and send requests to claim and unclaim devices. The attacker only needs to provide the MAC address of the targeted device and can make a request to unclaim it from its original connection and make a request to claim it."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-23-136-01",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2024-52596",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-02T17:15:12.353",
"lastModified": "2024-12-02T17:15:12.353",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SimpleSAMLphp xml-common is a common classes for handling XML-structures. When loading an (untrusted) XML document, for example the SAMLResponse, it's possible to induce an XXE. This vulnerability is fixed in 1.19.0."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"references": [
{
"url": "https://github.com/simplesamlphp/xml-common/commit/fa4ade391c3194466acf5fbfd5d2ecdbf5e831f5",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/simplesamlphp/xml-common/security/advisories/GHSA-2x65-fpch-2fcm",
"source": "security-advisories@github.com"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/12/msg00001.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-52806",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-02T17:15:12.580",
"lastModified": "2024-12-02T17:15:12.580",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SimpleSAMLphp SAML2 library is a PHP library for SAML2 related functionality. When loading an (untrusted) XML document, for example the SAMLResponse, it's possible to induce an XXE. This vulnerability is fixed in 4.6.14 and 5.0.0-alpha.18."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-611"
}
]
}
],
"references": [
{
"url": "https://github.com/simplesamlphp/saml2/commit/5fd4ce4596656fb0c1278f15b8305825412e89f7",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/simplesamlphp/saml2/security/advisories/GHSA-pxm4-r5ph-q2m2",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-53259",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-02T17:15:12.767",
"lastModified": "2024-12-02T17:15:12.767",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "quic-go is an implementation of the QUIC protocol in Go. An off-path attacker can inject an ICMP Packet Too Large packet. Since affected quic-go versions used IP_PMTUDISC_DO, the kernel would then return a \"message too large\" error on sendmsg, i.e. when quic-go attempts to send a packet that exceeds the MTU claimed in that ICMP packet. By setting this value to smaller than 1200 bytes (the minimum MTU for QUIC), the attacker can disrupt a QUIC connection. Crucially, this can be done after completion of the handshake, thereby circumventing any TCP fallback that might be implemented on the application layer (for example, many browsers fall back to HTTP over TCP if they're unable to establish a QUIC connection). The attacker needs to at least know the client's IP and port tuple to mount an attack. This vulnerability is fixed in 0.48.2."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-345"
}
]
}
],
"references": [
{
"url": "https://github.com/quic-go/quic-go/commit/ca31dd355cbe5fc6c5807992d9d1149c66c96a50",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/quic-go/quic-go/pull/4729",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/quic-go/quic-go/releases/tag/v0.48.2",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/quic-go/quic-go/security/advisories/GHSA-px8v-pp82-rcvr",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-53364",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-02T17:15:12.933",
"lastModified": "2024-12-02T17:15:12.933",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability was found in PHPGURUKUL Vehicle Parking Management System v1.13 in /users/view-detail.php. This vulnerability affects the viewid parameter, where improper input sanitization allows attackers to inject malicious SQL queries."
}
],
"metrics": {},
"references": [
{
"url": "http://phpgurukul.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/SCR-athif/CVE/tree/main/CVE-2024-53364",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-53459",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-02T16:15:12.637",
"lastModified": "2024-12-02T16:15:12.637",
"lastModified": "2024-12-02T18:15:11.123",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Sysax Multi Server 6.99 is vulnerable to Cross Site Scripting (XSS) via the /scgi?sid parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://packetstormsecurity.com/files/182467/Sysax-Multi-Server-6.99-Cross-Site-Scripting.html",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53504",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-29T20:15:20.763",
"lastModified": "2024-11-29T20:15:20.763",
"vulnStatus": "Received",
"lastModified": "2024-12-02T17:15:13.047",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability has been identified in Siyuan 3.1.11 via the notebook parameter in /searchHistory."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de inyecci\u00f3n SQL en Siyuan 3.1.11 a trav\u00e9s del par\u00e1metro notebook en /searchHistory."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/siyuan-note/siyuan/issues/13058",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53505",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-29T20:15:20.853",
"lastModified": "2024-11-29T20:15:20.853",
"vulnStatus": "Received",
"lastModified": "2024-12-02T17:15:13.257",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability has been identified in Siyuan 3.1.11 via the id parameter at /getAssetContent."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de inyecci\u00f3n SQL en Siyuan 3.1.11 a trav\u00e9s del par\u00e1metro id en /getAssetContent."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/siyuan-note/siyuan/issues/13059",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53506",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-29T20:15:20.943",
"lastModified": "2024-11-29T20:15:20.943",
"vulnStatus": "Received",
"lastModified": "2024-12-02T17:15:13.497",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability has been identified in Siyuan 3.1.11 via the ids array parameter in /batchGetBlockAttrs."
},
{
"lang": "es",
"value": "Se ha identificado una vulnerabilidad de inyecci\u00f3n SQL en Siyuan 3.1.11 a trav\u00e9s del par\u00e1metro de matriz ids en /batchGetBlockAttrs."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/siyuan-note/siyuan/issues/13060",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53507",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-29T20:15:21.027",
"lastModified": "2024-11-29T20:15:21.027",
"vulnStatus": "Received",
"lastModified": "2024-12-02T17:15:13.707",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability was discovered in Siyuan 3.1.11 in /getHistoryItems."
},
{
"lang": "es",
"value": "Se descubri\u00f3 una vulnerabilidad de inyecci\u00f3n SQL en Siyuan 3.1.11 en /getHistoryItems."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/siyuan-note/siyuan/issues/13057",

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-53564",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-02T18:15:11.353",
"lastModified": "2024-12-02T18:15:11.353",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authenticated arbitrary file upload vulnerability in the component /module_admin/upload.php of freepbx v17.0.19.17 allows attackers to execute arbitrary code via uploading a crafted file."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/hyp164D1/490732de230edf97423f6d95b0d2f903",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-53566",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-12-02T18:15:11.500",
"lastModified": "2024-12-02T18:15:11.500",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in the action_listcategories() function of Sangoma Asterisk v22/22.0.0/22.0.0-rc1/22.0.0-rc2/22.0.0-pre1 allows attackers to execute a path traversal."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/hyp164D1/e7c0f44ffb38c00320aa1a6d98bee616",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/asterisk/asterisk/blob/22/main/manager.c#L2556",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53920",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-27T15:15:26.837",
"lastModified": "2024-11-27T16:15:15.037",
"vulnStatus": "Received",
"lastModified": "2024-12-02T17:15:13.913",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In elisp-mode.el in GNU Emacs through 30.0.92, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)"
},
{
"lang": "es",
"value": "En elisp-mode.el de GNU Emacs hasta la versi\u00f3n 30.0.92, un usuario que elija invocar elisp-completion-at-point (para completar el c\u00f3digo) en c\u00f3digo fuente de Emacs Lisp que no sea de confianza puede desencadenar una expansi\u00f3n de macros de Lisp no segura que permita a los atacantes ejecutar c\u00f3digo arbitrario. (Esta expansi\u00f3n no segura tambi\u00e9n ocurre si un usuario elige habilitar el diagn\u00f3stico sobre la marcha de que byte compila c\u00f3digo fuente de Emacs Lisp que no es de confianza)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://eshelyaron.com/posts/2024-11-27-emacs-aritrary-code-execution-and-how-to-avoid-it.html",

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2024-53990",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-02T18:15:11.753",
"lastModified": "2024-12-02T18:15:11.753",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The AsyncHttpClient (AHC) library allows Java applications to easily execute HTTP requests and asynchronously process HTTP responses. When making any HTTP request, the automatically enabled and self-managed CookieStore (aka cookie jar) will silently replace explicitly defined Cookies with any that have the same name from the cookie jar. For services that operate with multiple users, this can result in one user's Cookie being used for another user's requests."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.2,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://github.com/AsyncHttpClient/async-http-client/commit/d5a83362f7aed81b93ebca559746ac9be0f95425",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/AsyncHttpClient/async-http-client/issues/1964",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/AsyncHttpClient/async-http-client/pull/2033",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/AsyncHttpClient/async-http-client/security/advisories/GHSA-mfj5-cf8g-g2fv",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2024-53992",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-02T17:15:14.113",
"lastModified": "2024-12-02T17:15:14.113",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "unzip-bot is a Telegram bot to extract various types of archives. Users could exploit unsanitized inputs to inject malicious commands that are executed through subprocess.Popen with shell=True. Attackers can exploit this vulnerability using a crafted archive name, password, or video name. This vulnerability is fixed in 7.0.3a."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://github.com/EDM115/unzip-bot/commit/5213b693eabb562842cdbf21c1074e91bfa00274",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/EDM115/unzip-bot/security/advisories/GHSA-34cg-7f8c-fm5h",
"source": "security-advisories@github.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-02T17:01:43.272285+00:00
2024-12-02T19:00:42.087633+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-02T16:15:14.603000+00:00
2024-12-02T18:31:56.817000+00:00
```
### Last Data Feed Release
@ -33,49 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
271901
271912
```
### CVEs added in the last Commit
Recently added CVEs: `15`
Recently added CVEs: `11`
- [CVE-2024-10905](CVE-2024/CVE-2024-109xx/CVE-2024-10905.json) (`2024-12-02T15:15:10.240`)
- [CVE-2024-29645](CVE-2024/CVE-2024-296xx/CVE-2024-29645.json) (`2024-12-02T15:15:10.960`)
- [CVE-2024-31669](CVE-2024/CVE-2024-316xx/CVE-2024-31669.json) (`2024-12-02T15:15:11.113`)
- [CVE-2024-38827](CVE-2024/CVE-2024-388xx/CVE-2024-38827.json) (`2024-12-02T15:15:11.270`)
- [CVE-2024-46905](CVE-2024/CVE-2024-469xx/CVE-2024-46905.json) (`2024-12-02T15:15:11.443`)
- [CVE-2024-46906](CVE-2024/CVE-2024-469xx/CVE-2024-46906.json) (`2024-12-02T15:15:11.633`)
- [CVE-2024-46907](CVE-2024/CVE-2024-469xx/CVE-2024-46907.json) (`2024-12-02T15:15:11.793`)
- [CVE-2024-46908](CVE-2024/CVE-2024-469xx/CVE-2024-46908.json) (`2024-12-02T15:15:11.967`)
- [CVE-2024-46909](CVE-2024/CVE-2024-469xx/CVE-2024-46909.json) (`2024-12-02T15:15:12.120`)
- [CVE-2024-52732](CVE-2024/CVE-2024-527xx/CVE-2024-52732.json) (`2024-12-02T15:15:12.270`)
- [CVE-2024-53459](CVE-2024/CVE-2024-534xx/CVE-2024-53459.json) (`2024-12-02T16:15:12.637`)
- [CVE-2024-53862](CVE-2024/CVE-2024-538xx/CVE-2024-53862.json) (`2024-12-02T16:15:14.277`)
- [CVE-2024-53981](CVE-2024/CVE-2024-539xx/CVE-2024-53981.json) (`2024-12-02T16:15:14.457`)
- [CVE-2024-53984](CVE-2024/CVE-2024-539xx/CVE-2024-53984.json) (`2024-12-02T16:15:14.603`)
- [CVE-2024-8785](CVE-2024/CVE-2024-87xx/CVE-2024-8785.json) (`2024-12-02T15:15:12.380`)
- [CVE-2024-49763](CVE-2024/CVE-2024-497xx/CVE-2024-49763.json) (`2024-12-02T17:15:11.830`)
- [CVE-2024-50380](CVE-2024/CVE-2024-503xx/CVE-2024-50380.json) (`2024-12-02T17:15:11.980`)
- [CVE-2024-50381](CVE-2024/CVE-2024-503xx/CVE-2024-50381.json) (`2024-12-02T17:15:12.160`)
- [CVE-2024-52596](CVE-2024/CVE-2024-525xx/CVE-2024-52596.json) (`2024-12-02T17:15:12.353`)
- [CVE-2024-52806](CVE-2024/CVE-2024-528xx/CVE-2024-52806.json) (`2024-12-02T17:15:12.580`)
- [CVE-2024-53259](CVE-2024/CVE-2024-532xx/CVE-2024-53259.json) (`2024-12-02T17:15:12.767`)
- [CVE-2024-53364](CVE-2024/CVE-2024-533xx/CVE-2024-53364.json) (`2024-12-02T17:15:12.933`)
- [CVE-2024-53564](CVE-2024/CVE-2024-535xx/CVE-2024-53564.json) (`2024-12-02T18:15:11.353`)
- [CVE-2024-53566](CVE-2024/CVE-2024-535xx/CVE-2024-53566.json) (`2024-12-02T18:15:11.500`)
- [CVE-2024-53990](CVE-2024/CVE-2024-539xx/CVE-2024-53990.json) (`2024-12-02T18:15:11.753`)
- [CVE-2024-53992](CVE-2024/CVE-2024-539xx/CVE-2024-53992.json) (`2024-12-02T17:15:14.113`)
### CVEs modified in the last Commit
Recently modified CVEs: `15`
Recently modified CVEs: `37`
- [CVE-2023-34188](CVE-2023/CVE-2023-341xx/CVE-2023-34188.json) (`2024-12-02T15:15:08.200`)
- [CVE-2024-11051](CVE-2024/CVE-2024-110xx/CVE-2024-11051.json) (`2024-12-02T15:14:56.087`)
- [CVE-2024-11700](CVE-2024/CVE-2024-117xx/CVE-2024-11700.json) (`2024-12-02T15:15:10.557`)
- [CVE-2024-20130](CVE-2024/CVE-2024-201xx/CVE-2024-20130.json) (`2024-12-02T16:15:07.200`)
- [CVE-2024-20131](CVE-2024/CVE-2024-201xx/CVE-2024-20131.json) (`2024-12-02T16:15:07.387`)
- [CVE-2024-20132](CVE-2024/CVE-2024-201xx/CVE-2024-20132.json) (`2024-12-02T16:15:07.557`)
- [CVE-2024-20133](CVE-2024/CVE-2024-201xx/CVE-2024-20133.json) (`2024-12-02T16:15:07.737`)
- [CVE-2024-20134](CVE-2024/CVE-2024-201xx/CVE-2024-20134.json) (`2024-12-02T16:15:07.907`)
- [CVE-2024-20135](CVE-2024/CVE-2024-201xx/CVE-2024-20135.json) (`2024-12-02T16:15:08.097`)
- [CVE-2024-20136](CVE-2024/CVE-2024-201xx/CVE-2024-20136.json) (`2024-12-02T16:15:08.260`)
- [CVE-2024-20137](CVE-2024/CVE-2024-201xx/CVE-2024-20137.json) (`2024-12-02T16:15:08.433`)
- [CVE-2024-20138](CVE-2024/CVE-2024-201xx/CVE-2024-20138.json) (`2024-12-02T16:15:08.603`)
- [CVE-2024-20139](CVE-2024/CVE-2024-201xx/CVE-2024-20139.json) (`2024-12-02T16:15:08.770`)
- [CVE-2024-21723](CVE-2024/CVE-2024-217xx/CVE-2024-21723.json) (`2024-12-02T16:15:08.967`)
- [CVE-2024-45520](CVE-2024/CVE-2024-455xx/CVE-2024-45520.json) (`2024-12-02T16:15:11.293`)
- [CVE-2024-20127](CVE-2024/CVE-2024-201xx/CVE-2024-20127.json) (`2024-12-02T17:15:09.827`)
- [CVE-2024-20128](CVE-2024/CVE-2024-201xx/CVE-2024-20128.json) (`2024-12-02T17:15:10.230`)
- [CVE-2024-22272](CVE-2024/CVE-2024-222xx/CVE-2024-22272.json) (`2024-12-02T18:15:09.290`)
- [CVE-2024-29645](CVE-2024/CVE-2024-296xx/CVE-2024-29645.json) (`2024-12-02T18:15:09.453`)
- [CVE-2024-30282](CVE-2024/CVE-2024-302xx/CVE-2024-30282.json) (`2024-12-02T17:48:54.733`)
- [CVE-2024-34923](CVE-2024/CVE-2024-349xx/CVE-2024-34923.json) (`2024-12-02T18:15:09.617`)
- [CVE-2024-35366](CVE-2024/CVE-2024-353xx/CVE-2024-35366.json) (`2024-12-02T17:15:10.497`)
- [CVE-2024-35367](CVE-2024/CVE-2024-353xx/CVE-2024-35367.json) (`2024-12-02T17:15:10.680`)
- [CVE-2024-35368](CVE-2024/CVE-2024-353xx/CVE-2024-35368.json) (`2024-12-02T17:15:10.860`)
- [CVE-2024-35371](CVE-2024/CVE-2024-353xx/CVE-2024-35371.json) (`2024-12-02T17:15:11.037`)
- [CVE-2024-36610](CVE-2024/CVE-2024-366xx/CVE-2024-36610.json) (`2024-12-02T17:15:11.230`)
- [CVE-2024-36612](CVE-2024/CVE-2024-366xx/CVE-2024-36612.json) (`2024-12-02T17:15:11.420`)
- [CVE-2024-36616](CVE-2024/CVE-2024-366xx/CVE-2024-36616.json) (`2024-12-02T18:15:09.857`)
- [CVE-2024-36617](CVE-2024/CVE-2024-366xx/CVE-2024-36617.json) (`2024-12-02T18:15:10.270`)
- [CVE-2024-36618](CVE-2024/CVE-2024-366xx/CVE-2024-36618.json) (`2024-12-02T18:15:10.520`)
- [CVE-2024-38476](CVE-2024/CVE-2024-384xx/CVE-2024-38476.json) (`2024-12-02T17:36:33.403`)
- [CVE-2024-40075](CVE-2024/CVE-2024-400xx/CVE-2024-40075.json) (`2024-12-02T18:15:10.760`)
- [CVE-2024-46054](CVE-2024/CVE-2024-460xx/CVE-2024-46054.json) (`2024-12-02T17:15:11.610`)
- [CVE-2024-47078](CVE-2024/CVE-2024-470xx/CVE-2024-47078.json) (`2024-12-02T18:31:56.817`)
- [CVE-2024-53459](CVE-2024/CVE-2024-534xx/CVE-2024-53459.json) (`2024-12-02T18:15:11.123`)
- [CVE-2024-53504](CVE-2024/CVE-2024-535xx/CVE-2024-53504.json) (`2024-12-02T17:15:13.047`)
- [CVE-2024-53505](CVE-2024/CVE-2024-535xx/CVE-2024-53505.json) (`2024-12-02T17:15:13.257`)
- [CVE-2024-53506](CVE-2024/CVE-2024-535xx/CVE-2024-53506.json) (`2024-12-02T17:15:13.497`)
- [CVE-2024-53507](CVE-2024/CVE-2024-535xx/CVE-2024-53507.json) (`2024-12-02T17:15:13.707`)
- [CVE-2024-53920](CVE-2024/CVE-2024-539xx/CVE-2024-53920.json) (`2024-12-02T17:15:13.913`)
## Download and Usage

View File

@ -221882,7 +221882,7 @@ CVE-2023-28458,0,0,ef73a1fa781dc427433a4344f064cf2c5d295719475229911a534302acd48
CVE-2023-28459,0,0,ff6d9b0d2a61636a2216f5ca3eebb22b60bf4cdf2177e93c8efd3097129af8b8,2023-05-04T12:38:31.430000
CVE-2023-2846,0,0,9aab683976373505e029cb617089a2ec5cce34a049b1b52d471de12eae663bf2,2023-07-10T18:51:01.550000
CVE-2023-28460,0,0,946c7b43c3c7b583cdd2cc158d5075c41f481cca09d32fe7ede01d078026a4ac,2023-03-24T14:57:49.207000
CVE-2023-28461,0,0,15af5ab242189b26137af25d477ece08e0a8e4d9d182fe4dc9af7216dd963dd0,2024-11-26T02:00:02.500000
CVE-2023-28461,0,1,b734dc37bc99200598f1ee9fcd5c811044ce1d1d95438d974fcc0a308eb66f72,2024-12-02T17:15:05.133000
CVE-2023-28462,0,0,2e19120130c69bbcf347fab95b0e8c139f8b88e9e8bf09f2cd8f0d3aa1bc78bf,2023-04-07T17:19:22.730000
CVE-2023-28464,0,0,cb3ff9a13e0f593237f005a371ce64a52ab72b86a221c83df504e264520ebe96,2023-12-22T21:04:49.027000
CVE-2023-28465,0,0,06c8e63c2eb4a5851617744052850dfe59bf346dbe17e85c1e39e4479aeba7f3,2023-12-15T16:35:16.623000
@ -226352,7 +226352,7 @@ CVE-2023-34184,0,0,6b37f9feddce7aba2ca90f92dc8f3c51f7944b89051b1ad282cbb6150f423
CVE-2023-34185,0,0,563c7630349ce4fda4e82697db7e4483c6146d83421789afbaa13e7c27db6e75,2023-07-18T18:21:37.307000
CVE-2023-34186,0,0,c601dee59d899685f4dac19bfea3727b06f03a27cdd0c5191a1823bf6439e20d,2024-05-17T18:36:05.263000
CVE-2023-34187,0,0,b30d3a29f02d088f2a343a02dc8816c3ac4f2ba6ee34c5e343a68b83e34759b6,2023-08-31T21:02:52.107000
CVE-2023-34188,0,1,7be73ea83cc4ddbb5dc0108971f2be63ace20410512b5554871f577f0f232511,2024-12-02T15:15:08.200000
CVE-2023-34188,0,0,7be73ea83cc4ddbb5dc0108971f2be63ace20410512b5554871f577f0f232511,2024-12-02T15:15:08.200000
CVE-2023-34189,0,0,852069858a43c3b830dd45f0d9f89b339d989703c15bd2112166348e71f45a18,2023-08-02T18:51:03.527000
CVE-2023-3419,0,0,dc2398e0d232c730deb43c680eb3a3837a602d0fa3030139e39cb20d21ad8852,2024-08-19T12:59:59.177000
CVE-2023-34192,0,0,85d981e01ef8ef1e0680768bc42005fded3d3ef3dece16cd8a3b1675004ee8a0,2023-07-12T23:08:32.340000
@ -227739,13 +227739,13 @@ CVE-2023-36359,0,0,e37b9be911e04ec3ff31e7ef9f5eb59833aaea9fd5ca5c06d32cd8c864c3b
CVE-2023-3636,0,0,614dee89b74d1f88be51816c6b660ce2752056d128833834b326387d81db8a9e,2023-11-07T04:19:12.717000
CVE-2023-36360,0,0,03f8e99b08fd657ff41dfd2813e153f5a284df5fa1c76bf6a8d43cc2dedb5354,2023-11-07T04:16:33.320000
CVE-2023-36361,0,0,93cdaa989b68200231a2525ea584dfaf163e866781f3629fc9440cd09f618cc4,2023-09-08T16:47:42.827000
CVE-2023-36362,0,0,fda020641fb2b60702b0bb93b62a1dab2c4943bd30ca14c5177f801d2aaf459b,2023-06-30T13:00:27.743000
CVE-2023-36363,0,0,5d61162f2a82ad6579e56c2e739c9ce4fe0aac915f02fc2efe01034e3629b287,2023-06-28T16:49:34.877000
CVE-2023-36364,0,0,ac0efbbdb28c7ff93409a9685dfb5928f16f3f706a34f952336e38ce2cbde1f3,2023-06-28T19:02:50.977000
CVE-2023-36365,0,0,758bb57bc43cd128f72f62fd387a969e7ce1874abca60a631c015fe0f47e0ebc,2023-06-28T19:02:23.943000
CVE-2023-36366,0,0,9e480deb66bb15b4a8761f2275d382c8447d562a18be1df55be2409a8dad923a,2023-06-28T19:02:10.183000
CVE-2023-36367,0,0,dedb51ab8d4978817bfb3fc508951b42a65a43359f68aa05aad778c03b058dc4,2023-06-28T18:49:20.373000
CVE-2023-36368,0,0,8eb3d41770b534ac6c5785c64bc0a54abdce58d6234f44ae967b3006bc3b9c19,2023-06-29T18:00:05.380000
CVE-2023-36362,0,1,f35c3800a748c3ee5be3b3e58969fbaf55a70542449ac51524b5ca585852fba7,2024-12-02T17:15:06.610000
CVE-2023-36363,0,1,5443faca0d1d39bf7b26b052750b5043f604c34bc823d55c9ec6a30569cc723e,2024-12-02T17:15:06.740000
CVE-2023-36364,0,1,65cecffdfff980a49716cdbcd7c8173de3b98782362afa0be07cc7b2496b5b11,2024-12-02T17:15:06.850000
CVE-2023-36365,0,1,3cee1646a92411ae23b58da3264be3882c3ee35cfa85a4db2f58ac1601bb3fc8,2024-12-02T17:15:06.967000
CVE-2023-36366,0,1,cffbaf0f33498e58d50fcda5793d9e85b5fef16d30d1ce519a19c604bf7e95f2,2024-12-02T17:15:07.090000
CVE-2023-36367,0,1,ccf739078a731238f1d3bcf2947ff92dafbcfdd82ca9fb37f44d15486d147e6f,2024-12-02T17:15:07.213000
CVE-2023-36368,0,1,06ed99c7c4b2db13bcde5eee55492c7c3d29c8ba6e669450d0841c38994eb9b9,2024-12-02T17:15:07.343000
CVE-2023-36369,0,0,1397030efe1debf1a2c78b87207e3a04ff15859d12f5f46231974de7e2ee8274,2023-06-29T18:00:21.530000
CVE-2023-3637,0,0,73ac1481ddc1df889412bda0c2583fec7bc5e2313684ecf116cb691307a3f25b,2023-11-07T04:19:12.810000
CVE-2023-36370,0,0,e114760f1feacab67ceb84869de8d52f3d37062c55d26b2af18b46ed8f63846d,2023-06-29T17:50:13.513000
@ -243311,7 +243311,7 @@ CVE-2024-10898,0,0,29bba6e208449ebd52631361f4bdc8eca3c372d754cd58876d30ee6c07372
CVE-2024-10899,0,0,3af5ea7b90e5da0230215c5076c9eff9b3749f9f5f947443d89625612842d08a,2024-11-26T21:01:21.643000
CVE-2024-1090,0,0,2d0b80c82d6d153c4e0b5412c3fcf892da86ac73a72da4cbf84bfbb064bdcb0c,2024-02-29T13:49:29.390000
CVE-2024-10900,0,0,5438023601d5947725ce57a2b51b24b31a697395c49ac1553534945223b38a58,2024-11-29T20:58:31.967000
CVE-2024-10905,1,1,e98ffff37b5956a2ad6c437472b8f53d76d0603bed01c95ada00a17c9ce7eb4b,2024-12-02T15:15:10.240000
CVE-2024-10905,0,0,e98ffff37b5956a2ad6c437472b8f53d76d0603bed01c95ada00a17c9ce7eb4b,2024-12-02T15:15:10.240000
CVE-2024-1091,0,0,54ee7e9ca708166212a73aaa10e4715176fe17b55fbce1ee0ea8f95d289d46a5,2024-02-29T13:49:29.390000
CVE-2024-10913,0,0,4e9b29333972ed20a30c4eccde2c9645761370bd1f3d0211dcdd27a3f9c3d9cf,2024-11-20T14:15:17.253000
CVE-2024-10914,0,0,0e11c1731905763ffc173784369687971adc0677422c26a81c4aa2918d85e560,2024-11-24T15:15:06.090000
@ -243406,7 +243406,7 @@ CVE-2024-11047,0,0,64dbad14a794669b828bb44eebca3fde6ac51457cfee02dad21b39b098487
CVE-2024-11048,0,0,21786d98bafe82af70b0d13927da0cfc2a5e251397b591082c79052adc605aee,2024-11-13T20:53:55.113000
CVE-2024-11049,0,0,efe77d054e00096c249033caeded95aa45069f1f11b699edbd4a58681a130c8a,2024-11-23T01:41:19.207000
CVE-2024-11050,0,0,4a557ebc68e4a21833dd3972056655a89812d1110bd037fcaf7747ecf814996b,2024-11-23T01:38:15.047000
CVE-2024-11051,0,1,0c5db2f4a5372b3789ea13ae4e153849a79584f39670640750e498cda1bc9950,2024-12-02T15:14:56.087000
CVE-2024-11051,0,0,0c5db2f4a5372b3789ea13ae4e153849a79584f39670640750e498cda1bc9950,2024-12-02T15:14:56.087000
CVE-2024-11054,0,0,2b10f7eb7e0ea54cbdf2f44e8ccd2401488923bf3e8bbeb3c99a947af182af3e,2024-11-14T02:43:36.197000
CVE-2024-11055,0,0,063f616f81ec8b41ac610800e9641fd71662778ce9165238c4e4d73be7647e35,2024-11-14T15:18:45.933000
CVE-2024-11056,0,0,6e0160117ff4187f70de2c20437329aad36979ea68e9d50c9569d1405a688157,2024-11-14T15:21:09.907000
@ -243795,15 +243795,15 @@ CVE-2024-11692,0,0,2e2a368d2bad10eec3d1f66bd6815192775038dd3ccc98b4295042a1e55ff
CVE-2024-11693,0,0,80e700b6e230fec6589ebebf228f21bbda939aa10d6b9b37eea0a058e654bc27,2024-11-27T16:15:12.753000
CVE-2024-11694,0,0,8fab8f6682482c80a046d7efcb5d62937e3f2364960b2f04726b7a87f7e40748,2024-11-27T17:15:09.703000
CVE-2024-11695,0,0,923949ea70ffb3960535c924daeac21d36cf8875477a4ac90cebfaddff787cf9,2024-11-27T17:15:09.867000
CVE-2024-11696,0,0,7ab5e962b1864924c9e631a223b7224b844fe8e800da1f91cb3d221520b39912,2024-11-26T14:15:19.143000
CVE-2024-11696,0,1,6fcfecbe72d27221f13c4de456321c16ca5bff79e421c45b458ad11293158d8f,2024-12-02T18:15:08.253000
CVE-2024-11697,0,0,5748a45bf5b4ab1df9cdc0d9e9aecb8d661d83a718add7c3b7046a7fb75f2393,2024-11-27T16:15:12.927000
CVE-2024-11698,0,0,4794c1cf0af88db81ed7f95cedceea58d59a70d0fc54757fe957e605d54d7ffb,2024-11-27T16:15:13.130000
CVE-2024-11699,0,0,a7ea20a1c54c5589a88b0fef3691aeab09fe6e64b22758a350879ee83ee60e9d,2024-11-27T15:15:24.600000
CVE-2024-1170,0,0,ef14266ea2026fd1e77d96d081d12f376a313e532bfd85bbf7562d8a6e990ca2,2024-03-07T13:52:27.110000
CVE-2024-11700,0,1,bc2be5af2b84b6516d161a848a53862ea2fabd715864fcabb126a0f4a490319e,2024-12-02T15:15:10.557000
CVE-2024-11700,0,0,bc2be5af2b84b6516d161a848a53862ea2fabd715864fcabb126a0f4a490319e,2024-12-02T15:15:10.557000
CVE-2024-11701,0,0,3ce088d891c171dd484e061591f74125e217790d856876ddb068c1435abf2279,2024-11-27T16:15:13.470000
CVE-2024-11702,0,0,13d1f6c9b043e1cf62a5a526ef83139151e2fe50c3be4951aef4463544909f25,2024-11-27T16:15:13.660000
CVE-2024-11703,0,0,a0aade5966792892c7a69520deed0024219950d9ba72d34090cb3bb1b7974f3a,2024-11-26T14:15:19.810000
CVE-2024-11703,0,1,e983d143affae3fe0df24c337c8810ae7731133ae347091f674c58908251a91d,2024-12-02T18:15:09.087000
CVE-2024-11704,0,0,2b7b550cc939bccaee7258fd0a9f771da470ed456c481083dde13c083b054c7f,2024-11-27T16:15:13.837000
CVE-2024-11705,0,0,b00958231cd75a51aaf41f507045209bb5b601f8c6cb2be613795f56225c7da5,2024-11-27T16:15:14
CVE-2024-11706,0,0,1b96fbb1c831be79b72164c44aa56f72093a93485fb6eb748f832788631279b2,2024-11-26T17:15:23.010000
@ -244773,7 +244773,7 @@ CVE-2024-20112,0,0,f1fecda0bbefb7976a2e5c2d965f45756c3c554b6bb2aece34ce5311395c4
CVE-2024-20113,0,0,1e9f0bb5dd8b46cb9c193f293f4e7e65c1c4f4218a8b5da37a81aedf61132d39,2024-11-04T18:50:05.607000
CVE-2024-20114,0,0,972dbefe1dd7e2ec5c449b6a55d8a48edf191f12736d3b5ac984afdda696c6ff,2024-11-05T19:58:15.577000
CVE-2024-20115,0,0,e0fbbff01a0fa518c41d64f625797efefd6cdce39d74e0c13995ea3dfe394456,2024-11-04T18:50:05.607000
CVE-2024-20116,0,0,bf601840a74c417151f81f80d77e62b52662f90568182fa10079ae9d50691ec6,2024-12-02T04:15:03.833000
CVE-2024-20116,0,1,1000133cf92be5d4167320d25c02ed658b66c4f3c0eea2c90e9d7fc1bf88b623,2024-12-02T17:15:08.113000
CVE-2024-20117,0,0,6baac420d96eb73610546cd262e04d3589f97187f02f3401eb7616db3fa8d745,2024-11-04T18:50:05.607000
CVE-2024-20118,0,0,f196c02d943f7181a2b543f340de54479a6ac9433fa46d02a1108eafa392e84d,2024-11-04T18:50:05.607000
CVE-2024-20119,0,0,b9d1b34a5ac7be8b5a9ce604f28b7c94e37c0f79b74ec7f206945e209ae81009,2024-11-04T18:50:05.607000
@ -244783,21 +244783,21 @@ CVE-2024-20121,0,0,4938115c914642adef5ea2985a500e819409d2c7aa3a5388330765c060ef6
CVE-2024-20122,0,0,744b016dd77bf1d3925336cb7504cc81d1bda83c1655bf764225b09f6b0227e4,2024-11-05T08:35:19.593000
CVE-2024-20123,0,0,bdf62a4af5c1c1ed58a1e235ea3a69d58e2afa0181d5f68baf40f699c0511aac,2024-11-04T18:50:05.607000
CVE-2024-20124,0,0,1799547edf556e9de06685a9fcdc4c8ef9057ff40c9829ccf5d3b3aa46605f16,2024-11-04T18:50:05.607000
CVE-2024-20125,0,0,79236626570c08d9b2883b399396bb272e80f9ff7a2001cda01b00130776c00b,2024-12-02T04:15:04.663000
CVE-2024-20127,0,0,191445c8421ac764bafa609e191240e08a49a9b03cf7c2f97161e0ac39e8fac0,2024-12-02T04:15:04.777000
CVE-2024-20128,0,0,fd4f49b631373e0791fe4bb327ef73d8f0d2affdeeb231166beab6965fc15222,2024-12-02T04:15:04.967000
CVE-2024-20125,0,1,a95592121d0de2a82283637e180f978c8268829ce83449ebef9c55894c24ce6b,2024-12-02T17:15:09.543000
CVE-2024-20127,0,1,4f5b6e07f1cf122950dbcd8b116d02726448a35cafe00d3cdacf295c0739e6cf,2024-12-02T17:15:09.827000
CVE-2024-20128,0,1,25052607e0f79bd84aa97e3e9edbd33f6226d229c08168150d2c97b326e4867f,2024-12-02T17:15:10.230000
CVE-2024-20129,0,0,671726aba2b1095472532326d37fd302eed94fd6211ea01542506d4087187d34,2024-12-02T04:15:05.073000
CVE-2024-2013,0,0,00ec85b9018843d83179244785c9b4c96e5ba8e015239a21d2d4ac8bf1b712fa,2024-08-15T21:08:02.010000
CVE-2024-20130,0,1,b9b17aa1c03d9483b8843b48bea126960747e04e39929dc746ce4ca1479eb2f1,2024-12-02T16:15:07.200000
CVE-2024-20131,0,1,1e64bc7a3127731196d2fa87109d2384b3e91b26839694666fe149e4e5b53554,2024-12-02T16:15:07.387000
CVE-2024-20132,0,1,f4cc91744b8a6b3af86e4e8d184a868c2fc84388570327f87327ebff157bcaa8,2024-12-02T16:15:07.557000
CVE-2024-20133,0,1,fd2d9fef2f12a32cb33536969e0da117c7ff6a7c081a67ea7cd40b5a5f6d630d,2024-12-02T16:15:07.737000
CVE-2024-20134,0,1,1d4bc63f9eb4412de5ebc6bed4a6fab51dfdc46af786282811b440ef7d69407c,2024-12-02T16:15:07.907000
CVE-2024-20135,0,1,57119bf972026e38996ca755a3f316af2b3402cc04a9db9eba30e1da211f5a53,2024-12-02T16:15:08.097000
CVE-2024-20136,0,1,974b7b8826843336352c8b21d2c949dee3a935c2a7f163750d3cfbd49e510cb7,2024-12-02T16:15:08.260000
CVE-2024-20137,0,1,fe4bf8bc17a27800d12c2afc646a8a72b841cdaf312d08e530acc587ecfcadc2,2024-12-02T16:15:08.433000
CVE-2024-20138,0,1,1264e7fcc71f95b0ae39f37ee36146e7c465bf599e4b07c736bd426b81382a8a,2024-12-02T16:15:08.603000
CVE-2024-20139,0,1,434bf1878b4edcc6ee42c87512888b556d261e46d1cb8ef2e233401120fa701b,2024-12-02T16:15:08.770000
CVE-2024-20130,0,0,b9b17aa1c03d9483b8843b48bea126960747e04e39929dc746ce4ca1479eb2f1,2024-12-02T16:15:07.200000
CVE-2024-20131,0,0,1e64bc7a3127731196d2fa87109d2384b3e91b26839694666fe149e4e5b53554,2024-12-02T16:15:07.387000
CVE-2024-20132,0,0,f4cc91744b8a6b3af86e4e8d184a868c2fc84388570327f87327ebff157bcaa8,2024-12-02T16:15:07.557000
CVE-2024-20133,0,0,fd2d9fef2f12a32cb33536969e0da117c7ff6a7c081a67ea7cd40b5a5f6d630d,2024-12-02T16:15:07.737000
CVE-2024-20134,0,0,1d4bc63f9eb4412de5ebc6bed4a6fab51dfdc46af786282811b440ef7d69407c,2024-12-02T16:15:07.907000
CVE-2024-20135,0,0,57119bf972026e38996ca755a3f316af2b3402cc04a9db9eba30e1da211f5a53,2024-12-02T16:15:08.097000
CVE-2024-20136,0,0,974b7b8826843336352c8b21d2c949dee3a935c2a7f163750d3cfbd49e510cb7,2024-12-02T16:15:08.260000
CVE-2024-20137,0,0,fe4bf8bc17a27800d12c2afc646a8a72b841cdaf312d08e530acc587ecfcadc2,2024-12-02T16:15:08.433000
CVE-2024-20138,0,0,1264e7fcc71f95b0ae39f37ee36146e7c465bf599e4b07c736bd426b81382a8a,2024-12-02T16:15:08.603000
CVE-2024-20139,0,0,434bf1878b4edcc6ee42c87512888b556d261e46d1cb8ef2e233401120fa701b,2024-12-02T16:15:08.770000
CVE-2024-2014,0,0,97c4d99afb7da491efaae3ff0fb6836102849098937eeb69745707d3dbc15b2d,2024-05-17T02:37:59.427000
CVE-2024-2015,0,0,bb3d603120b99e575edb7baace469be8f767dc6e32ed33cf2700f4d2936e46ac,2024-05-17T02:37:59.517000
CVE-2024-2016,0,0,8c172ad566a2e375a3ac2c22bb48a79ffa778559105a1fd5ded9fbaceb4cfb2c,2024-06-04T19:19:12.807000
@ -246152,7 +246152,7 @@ CVE-2024-21703,0,0,08d952643f27d625e1a34daf2a14cf006a2e6417e07616e354cd3cfc64f9f
CVE-2024-2171,0,0,17c18c0537b711b05cfdac779ba2d168e9830dc55b69168346eed3896c1fbc48,2024-10-11T14:15:32.983000
CVE-2024-2172,0,0,edf7001396454eaaf4557a9c3fcef53434431cfdf8112832b9dc273636d1d743,2024-03-13T18:15:58.530000
CVE-2024-21722,0,0,a86fb4d95ec57288d080d9ff105ac4d713cb82e6d029a4568b198925539efc69,2024-10-30T18:35:02.897000
CVE-2024-21723,0,1,ea00e53d0673b309526ea9182c39ca1385df8eb584192b37edee739e9b4e1501,2024-12-02T16:15:08.967000
CVE-2024-21723,0,0,ea00e53d0673b309526ea9182c39ca1385df8eb584192b37edee739e9b4e1501,2024-12-02T16:15:08.967000
CVE-2024-21724,0,0,13cf7200241cf795a2ddca2e0396bacd352639744079d295d3483718d273f60f,2024-02-29T13:49:29.390000
CVE-2024-21725,0,0,ebdabbe1fa288bbeb81a276a125f761859acd9172475efecd68ff4e2c004f13b,2024-10-27T02:35:00.563000
CVE-2024-21726,0,0,258e12429393fbdcadf90bc903b6c4eaa784036f8d4a014cbe225655bb0298a5,2024-11-04T21:35:03.690000
@ -246625,7 +246625,7 @@ CVE-2024-22269,0,0,83ec4dd4286041c4360e0d35616ab25a9b861fe9ef36df2e2fc4ebcfa2a69
CVE-2024-2227,0,0,6858b6fb3beef7b6297eae7344c0bc611e8d1dd2c2ff64967d8d2ab0b2897ccc,2024-03-22T19:02:10.300000
CVE-2024-22270,0,0,b9576398a05665519f8e7fa18c7ea965eb2ef26c2b70aff8574e195025c87aea,2024-08-15T19:35:06.457000
CVE-2024-22271,0,0,c68c7abf466a660fd4d52c665cf118cb88242b1be3f139e271f3b7d99c4e675f,2024-08-01T13:46:54.670000
CVE-2024-22272,0,0,a4dcf85cbf4922799718d1c10a1120b8457bb2d971adaefbd7555789801981e0,2024-06-28T10:27:00.920000
CVE-2024-22272,0,1,ae8f99036a93171821b7649d503a5022b4d6b3351e2d9b659b485dd91464f98a,2024-12-02T18:15:09.290000
CVE-2024-22273,0,0,bbfe4422f6a695e0d7f4adf7fd8e62a3d62f7c38479d626b031b977da58959d8,2024-05-22T12:46:53.887000
CVE-2024-22274,0,0,87361af428d962de76a852670d2cc5984c82c5471ebe2a2d40c0bfba59a3e184,2024-07-03T01:47:13.067000
CVE-2024-22275,0,0,4e0b17231c07cc777231dbb9d62f6bfa759cfc82db650243f36e18a0ee106c1b,2024-05-22T12:46:53.887000
@ -251828,7 +251828,7 @@ CVE-2024-2963,0,0,31d50b8247d27494fa9b9adaa5f17e80a25f74cd25c24e5136f653283814c7
CVE-2024-2964,0,0,6af8d38af5c9612485676aa7d2fa3bff7d4d2c725303e86b5f288ee45d8070f9,2024-03-29T12:45:02.937000
CVE-2024-29640,0,0,86e865cda03b368a317d7c9a1be400ed630e63c917f88b7400c156c17d9e66f3,2024-08-27T18:35:07.370000
CVE-2024-29644,0,0,8f85f2ee54dea78f450e0a34d8d144c380c8a4c7a954f54ad9e505caffbc88b6,2024-08-05T17:35:10.887000
CVE-2024-29645,1,1,998bedeba8b13cb24165783aaa6044be39300d70fde69663c8a7c6d0c6cecfa8,2024-12-02T15:15:10.960000
CVE-2024-29645,0,1,c6d6850a2c13e1d1159098cd4eb2c9b0077860b94792b5ea30ac8f664de7fd64,2024-12-02T18:15:09.453000
CVE-2024-2965,0,0,31194867e3c8375be8a7a72353070c45d11fab5833d7a91937e736bd4749a53d,2024-11-03T17:15:13.107000
CVE-2024-29650,0,0,32230dc7c100b4d45992d9916209ac72d3ba4f4a88f0a390b7772dee0091b547,2024-08-01T16:35:08.160000
CVE-2024-29651,0,0,10ced44f5f76b0e20af308caf370e6cc4fceca5031ea22581c3d1437b439d8e2,2024-08-20T14:35:13.967000
@ -252407,7 +252407,7 @@ CVE-2024-30279,0,0,e8959302b2a7f4b2f979d5a292d479144519886e3c4ec1eda991b8640940d
CVE-2024-3028,0,0,9e4bef210fc19099d68fdbe2ca58f9c70793f50703ba240559787e18524fd766,2024-04-16T13:24:07.103000
CVE-2024-30280,0,0,7232cea83e4b5e67f9a2b634eb562bbb13f45b745f6ead8e9f7f82040938f49a,2024-05-24T01:15:30.977000
CVE-2024-30281,0,0,aa55f6f337f0eff14aaba79eadac42cf1fa69bcced5e256cfe63f794552ecdfc,2024-05-16T13:03:05.353000
CVE-2024-30282,0,0,a990498a43a1ecddf22e7510bd46438fa6701708c2c184811f4ab5f2b9df43a6,2024-05-16T13:03:05.353000
CVE-2024-30282,0,1,23f906c56739d2637a62852ff21f89b589c2e003e455e0b879928121b47e538e,2024-12-02T17:48:54.733000
CVE-2024-30283,0,0,ba083c1bacb29a7f333eacd467f9eb4c19b7b166e16a58a9ca533c939d8d2cec,2024-05-16T13:03:05.353000
CVE-2024-30284,0,0,c3d8cfb90cbc04c8f8451d2b94550163ac2e92e833947aa8e3054cbfbcb5af6b,2024-05-15T16:40:19.330000
CVE-2024-30285,0,0,d5d0073a0c86623254404dea22df638b05a2d50f8dfa4429d0e1bb0ebc3d1cd8,2024-07-09T15:52:12.637000
@ -253462,7 +253462,7 @@ CVE-2024-31651,0,0,ff635ec14b868d2b93fa21d54db2cc160b86957cb7aa11437f2a0e792cdac
CVE-2024-31652,0,0,d3a39df49d7c9a4ac8f46bb863860ab64051b06ba513b7c983446092a2722415,2024-10-30T17:35:05.700000
CVE-2024-3166,0,0,d48b1a20c8084628d17380e69f30813f1d8085267297cebc2bf523c13b3ece3d,2024-10-23T15:25:16.403000
CVE-2024-31666,0,0,253643df7e9c7fc7c94316b23bbda0edfbf28e84ffeb8510af634fd8ae7e9fc0,2024-04-22T19:24:06.727000
CVE-2024-31669,1,1,31ec3184aae1ad222bbbb1a4594b8bb1b152b5cce59b11c364f48ace0bb1fce5,2024-12-02T15:15:11.113000
CVE-2024-31669,0,0,31ec3184aae1ad222bbbb1a4594b8bb1b152b5cce59b11c364f48ace0bb1fce5,2024-12-02T15:15:11.113000
CVE-2024-3167,0,0,0e0e401d957a36adf31f389f0d7fa47f7901c0598b7b2fd42d4c75bdbdd76e80,2024-04-26T15:55:58.810000
CVE-2024-31673,0,0,958f02eb1f314a421c4e692d99797c4d8f0e196e848d56cb014d5e77e7fc54c5,2024-08-05T19:35:12.297000
CVE-2024-31678,0,0,45c8b2607673d8af8b3ec231962e66bcea8064211e1867ed0addb4c93b773839,2024-08-01T13:51:04.350000
@ -255900,7 +255900,7 @@ CVE-2024-34914,0,0,488c01684aef7fae520eb6f0628a96a961ab856901df991bf866a786a5c90
CVE-2024-34919,0,0,823c5c451a1eed666cfdb6436f6850bdbb3997f7dfda43c7cb7477056e9bb3ae,2024-07-03T02:00:54.243000
CVE-2024-3492,0,0,8ef42f39857b82e21bb506d939c2ddf771d4cf0a62a956e7e002606ca7a897a1,2024-06-13T18:36:09.010000
CVE-2024-34921,0,0,258d6bc4ff16be25947117b994a7b2305574dc7e88be47c1d8439dffb3fb7800,2024-07-03T02:00:55.040000
CVE-2024-34923,0,0,4eb062fc2943c9703c6ce714643657218ce1e4ab0248f4efc1ef62aa6ab9477d,2024-05-28T12:39:28.377000
CVE-2024-34923,0,1,05cd7d2d2454a132b33b02c0e02a3677ce1d0fe62e9e1abd5aa2838641d5eb94,2024-12-02T18:15:09.617000
CVE-2024-34927,0,0,65b6f1073e9034477a827eae4f8e1e96da2dcd8b6b7a4dd6a353ea18c54c97c4,2024-07-03T02:00:55.873000
CVE-2024-34928,0,0,06617cab0c322a427612e8f6d6917cd063878ec94ca850683c68470a1a2c8d7a,2024-07-03T02:00:56.653000
CVE-2024-34929,0,0,80902861c56fffe184d43b652e5b65da73fb217bc0c681573f8c1d15948cf18e,2024-08-01T13:52:26.657000
@ -256177,12 +256177,12 @@ CVE-2024-35359,0,0,790098a5aa254df92059c385ad6325db39cd91d13b49630a333bac1d583fc
CVE-2024-3536,0,0,67ef0d9459ffa6371d38db2913b0c14e7a0dd926c6d86f1aea2fa988c69cefc5,2024-05-17T02:39:59.897000
CVE-2024-35361,0,0,94079fbeae6f3e32a28e0bb042dbf7a904fcf03ef2f5fc193b1b6ac0fc4c26ea,2024-07-03T02:01:38.550000
CVE-2024-35362,0,0,234501ffddb96c378ce0415c69c86b74ffa92255e774ec0584c4ec784483afc1,2024-05-22T18:59:20.240000
CVE-2024-35366,0,0,9b84de888d50ddbd7efcc8707ea3df5f70e05d0c67de0741833ade895b234c7a,2024-11-29T20:15:19.863000
CVE-2024-35367,0,0,4cf1651bad5e480a4d826c3f8e668cb9c693764d20895a38503f6b2564a1fcb2,2024-11-29T20:15:19.957000
CVE-2024-35368,0,0,b29911c8c82dc3259e072b942eea7a4d1149791db93f1fecc5fe0708cef54fcf,2024-11-29T20:15:20.050000
CVE-2024-35366,0,1,1071161e28ed5ff1a9e74f6db919922a34bff8a1aae8f1926a3de4bf5a6af995,2024-12-02T17:15:10.497000
CVE-2024-35367,0,1,fc1999610d5647bdd337d9cd372630739a60d5b54ee387f6b863824ba4ed87b5,2024-12-02T17:15:10.680000
CVE-2024-35368,0,1,9627ef41704bb16e68693f5c6e18e4ed8b2de5952a37d343cc0e72735c6da4fd,2024-12-02T17:15:10.860000
CVE-2024-35369,0,0,6df28d8460fe7b04f0a2efffc7b9a631fe258a88dc12fbb0a17d1341163bedc4,2024-11-29T18:15:06.983000
CVE-2024-3537,0,0,7295965fffde5e283abb275e5228fcf2f24e25d29556dedbad478c14243435cd,2024-05-17T02:39:59.987000
CVE-2024-35371,0,0,3451d96059fd4d38b9b56c8029c259808886cc489aad6ecd6a8e5b4dc96d8c65,2024-11-29T20:15:20.143000
CVE-2024-35371,0,1,cb9c4f4e9b8822c4001fcee626e1159d9db26db439ff3fd59eeaae64b65d05f8,2024-12-02T17:15:11.037000
CVE-2024-35373,0,0,014fa23f7024d690cb16f55fa9fe5c207924e838da0219b265271af9723dff82,2024-08-19T18:35:12.200000
CVE-2024-35374,0,0,aa83a1884752e38a4efa40b8d631e010f03947873314106502ec442b10442cd7,2024-08-20T15:35:14.870000
CVE-2024-35375,0,0,ed34ddd9d512918cc00e937f04fcc44b2e98fec270008373eac869e7c2125c2d,2024-05-24T01:15:30.977000
@ -257180,13 +257180,13 @@ CVE-2024-3660,0,0,c3c1c3312c8a9566bf9feedf7d8876d18d19f4aa50138300852d5ac195117e
CVE-2024-36600,0,0,e7eab002c297c7d5ce5dd570ac3b60c68bd283d5ad8a781f4e7d7381b748121c,2024-07-03T02:03:24.687000
CVE-2024-36604,0,0,ceabd4d65e8e525e1dbe1c2ad39c0fe240ecb352a8c95aa43d6d84024ca2af4a,2024-08-15T19:35:12.673000
CVE-2024-3661,0,0,c42cca3fa75d9e1e2e62908451948484a5d5cca5f29f392158a6d0b59eb829bd,2024-07-01T15:15:17.187000
CVE-2024-36610,0,0,312841435172043d5dd2190cf6b8c2300f7c9822702ef3e5fa4446eac6b961e2,2024-11-29T20:15:20.237000
CVE-2024-36610,0,1,978b382e6d2d7458ef4ee665877d5fa279890848d387de447325b7fb46ba2824,2024-12-02T17:15:11.230000
CVE-2024-36611,0,0,42465fba5d209a57964c1117a778f054088fdce7482f6b6bd27c3304a10b7c3d,2024-11-29T19:15:06.780000
CVE-2024-36612,0,0,fdd926ad563891ccb6e110831ad8dd9cdcf5f661c8c399d337246f268066a229,2024-11-29T20:15:20.340000
CVE-2024-36612,0,1,2e5bae787232529157776124a9b65f7f3416dd8775c93aff3efc637bb8af407f,2024-12-02T17:15:11.420000
CVE-2024-36615,0,0,2f8c6f09c7b5113fafb5a41f7e4cbad94a7ad0500652cf2d1c05a06d469ab9d0,2024-11-29T19:15:07.703000
CVE-2024-36616,0,0,30073513037d78480eea5288925f8e6f4e5b29c346f1de578cf8c107b66d46e5,2024-11-29T19:15:07.817000
CVE-2024-36617,0,0,c18e2eb9b33d632f63d305b3eb6f50e7d6743c0489ab5af161e69fa56de5ba4b,2024-11-29T18:15:07.230000
CVE-2024-36618,0,0,f1fe269f8119cc1956333354d8d1ebbf16ea9be0fb3347b792a87c6a5e02f274,2024-11-29T18:15:07.390000
CVE-2024-36616,0,1,296a4798d6d750743bea7f8c9bd5c284519a9999e91edf6d3d9b49bc20d67d94,2024-12-02T18:15:09.857000
CVE-2024-36617,0,1,f14a7d3b346fdf72174febe1311327593886e5ab37642fdc9a403f2c9c27d4e2,2024-12-02T18:15:10.270000
CVE-2024-36618,0,1,1b683ed0f9886fba3e4cae1a9790f48a732ffbacff8e54f88bc0a50590bee2ca,2024-12-02T18:15:10.520000
CVE-2024-36619,0,0,d30e29b19403999a360d49eb2b7510653e8a4eeae72cc3067a2b6e14731d746f,2024-11-29T18:15:07.550000
CVE-2024-3662,0,0,bf35bc71372b512799f21214c4add2ef96949612530c04611b0774c90b1261c4,2024-04-15T13:15:31.997000
CVE-2024-36620,0,0,bd940859e3a70ba9f20daee48c18afd5e689ded5655791c03dcd144494e8ab28,2024-11-29T18:15:07.787000
@ -258602,7 +258602,7 @@ CVE-2024-38472,0,0,e2da2567ed5c1bd58671597c1e4c6860b639e273ff91bc91c02bde109665e
CVE-2024-38473,0,0,36c5b6d67728da1356289c3874d586ffc56f76a7fbb2f457e14a9e4a12de691d,2024-08-01T13:54:52.397000
CVE-2024-38474,0,0,4f088cfc0bc3e33027842b99d0e9469f8c62a5c78773b6fa11ed87f2035049e0,2024-08-21T15:03:30.407000
CVE-2024-38475,0,0,4434bbc9e26235e103b2ea8722d70e74e682dd306d9d4b03d295c12ec512ff31,2024-07-12T14:15:15.277000
CVE-2024-38476,0,0,4dc405e6abe8ebf298b73a343c8daaff34dea74ec39521b4e5e4a255a423f89d,2024-10-29T17:35:06.547000
CVE-2024-38476,0,1,96df90db5dbf5efcc1d36711d52981a73ed110b8dfbeaa5665e3f3feb3c366d0,2024-12-02T17:36:33.403000
CVE-2024-38477,0,0,f870fe888c8d23cfdfdc0433edf103c8cad01a9d525dd04e1a70d1ea4bc3e13e,2024-08-21T15:11:30.857000
CVE-2024-38479,0,0,a59c846ab11aea7508425cae5038126c4ec0f650a8e2bdbef76ed0cb402c0b6f,2024-11-15T13:58:08.913000
CVE-2024-3848,0,0,3a1e7dbb50cc54ecdbcc89881c429869965f00f9d2e1eb9f088acc297fe8920f,2024-05-16T13:03:05.353000
@ -258943,7 +258943,7 @@ CVE-2024-3882,0,0,8cf286ca42c3a62eccb821d9ac0678dabad594eee248c127390ddaf169987d
CVE-2024-38820,0,0,517fdb1091af57612900b39a11b0b83e3890144a7a4d4cb71cfb71c69b405fa9,2024-11-29T12:15:07.007000
CVE-2024-38821,0,0,bb251b2231aa5ec8776de9aee89d7b4c729d7a41bc68ac186fa12d01aa093b81,2024-10-28T13:58:09.230000
CVE-2024-38826,0,0,d2dc3bc0b0f77945ea4b1900d4b45fc9041d9a4783cdeb176eb488aedabdfbeb,2024-11-12T13:55:21.227000
CVE-2024-38827,1,1,3874c464e716661a48f3e22603ab20b7e36bf129e4ab27a217f4348c4a349acc,2024-12-02T15:15:11.270000
CVE-2024-38827,0,0,3874c464e716661a48f3e22603ab20b7e36bf129e4ab27a217f4348c4a349acc,2024-12-02T15:15:11.270000
CVE-2024-38828,0,0,0c8d1b5128144a8d7d124f30bfb82a89e19f39cd304dc10431ed647af64ddcb3,2024-11-18T17:11:17.393000
CVE-2024-3883,0,0,e6bda202b9fd54c10f25f29dd8ae0cebb83b1538aee636944c2fd66bf4045fff,2024-05-02T13:27:25.103000
CVE-2024-38830,0,0,25b272dc1cf212b6cf8b44602a3d5cd0c946406c321e913898f69284c3986026,2024-11-26T12:15:18.413000
@ -259740,7 +259740,7 @@ CVE-2024-40051,0,0,3d4a07f6874af0ae76d5cc0355a7a49b4d82d6a4d252aa7d1e7489d1164a1
CVE-2024-4006,0,0,94faf2d168fb54b3d152844d072ec60ae7893cacd318e45ba2a9ad56b250c9d0,2024-04-25T17:25:05.903000
CVE-2024-40060,0,0,41909e3bdc1614813f63de5445f9f7b9276e4c7561b3b730c75588f114a39308,2024-11-01T14:42:03.693000
CVE-2024-4007,0,0,857ffd215040050c5517e94efdf82e72cc62aae4cfd62acb973d56bcff6e13cd,2024-07-01T16:37:39.040000
CVE-2024-40075,0,0,ea8801174ab63f09ecb78691088214272746fb9a3a5615024827c9ef25c43b0c,2024-07-24T12:55:13.223000
CVE-2024-40075,0,1,696bebca65ab8531e554637eea9876932f9a084e6d9912735f3ae614eec7aa18,2024-12-02T18:15:10.760000
CVE-2024-4008,0,0,41ba43cb718e067f099fac417cd6110082f457ea9bc7353b1528141e52f4a2d0,2024-06-18T17:00:01.570000
CVE-2024-40083,0,0,002189cbf2bb61a03947d60ab203b9b2c05b38f7fa5f102a2294b4e285e5aee3,2024-10-23T15:12:34.673000
CVE-2024-40084,0,0,4bfdc024cb91df5bb8d17d66cec084fec7d97ef49264d00142fadf94256b75f9,2024-10-23T15:12:34.673000
@ -263399,7 +263399,7 @@ CVE-2024-45511,0,0,a33b00ed5286e02a99a5d7d32b95a722e842936b42cb3272cb3598da23178
CVE-2024-45518,0,0,9735413fa02ac827dc734eb603d392ab15d93caac171e362b785c2b23afa3a6f,2024-10-30T21:23:59.893000
CVE-2024-45519,0,0,ba02770fed1525b5b4f0df98b6cf30b24de2e09da9e676dc121caef23db2992b,2024-10-23T15:39:23.220000
CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000
CVE-2024-45520,0,1,5466845711de025b484d71bfbeb994612050916cd5bfb23e3333148ac74978ae,2024-12-02T16:15:11.293000
CVE-2024-45520,0,0,5466845711de025b484d71bfbeb994612050916cd5bfb23e3333148ac74978ae,2024-12-02T16:15:11.293000
CVE-2024-45522,0,0,cfbe5f5b4866198ecf4773ddc4ec07a576ac517554c3c987f558bc88648f0e9a,2024-09-05T14:29:32.737000
CVE-2024-45523,0,0,e7d93fa702fd02b5bced215282921c641c45ca521a1d9282d8eeca5a4c9e6cac,2024-09-20T14:35:11.523000
CVE-2024-45526,0,0,f14e1fcc5198e28bcb9f7b3a43daa36e99814812ca109c1c007380ac29ec0aa1,2024-10-23T19:35:10.713000
@ -263666,7 +263666,7 @@ CVE-2024-46047,0,0,57a3435cb7b6e94de5fb698161c585c7b5ce0f8c27f8db901c567ec5b0f81
CVE-2024-46048,0,0,8b386e1ce8db1651262779289df0cde97cc0d4c50d015509acb4f6ce2f921783,2024-09-20T00:35:54.187000
CVE-2024-46049,0,0,39c19419297fc26bc1a072b6b6a8ff9ba0434b8f7cc74fa3a910df77355bb874,2024-09-20T00:39:30.443000
CVE-2024-4605,0,0,cc5939dfa5bb0891c69db66e562cc6696594a6a88efe746332f5ec8ead5152ae,2024-05-14T16:11:39.510000
CVE-2024-46054,0,0,f0a53e0fc28376893d07742f485ef48bcb68dcb537ebfd98fd4e37244e30ff13,2024-11-27T15:15:26.200000
CVE-2024-46054,0,1,ea04f3f8e16edda442709a7e528b23bf1b32148ce756ebc6055b7f37df234f2f,2024-12-02T17:15:11.610000
CVE-2024-46055,0,0,fb3ab0f0de94860a6cfab293110c9c5563c53335293fdfc002812d3e3e3d5f7a,2024-11-27T18:15:13.300000
CVE-2024-4606,0,0,f985d30934b7c1f8930bf2267fb972a68a7301f3b4fab17a99fda7060e053c79,2024-08-28T08:15:07.093000
CVE-2024-4607,0,0,26d7fb8a60d9724fbac67d9d15e472fd268b8645ac384c2f62b0c7323928361f,2024-09-10T15:03:24.710000
@ -264123,11 +264123,11 @@ CVE-2024-46898,0,0,1121a0227e884e663de945d1f5ee0881d2211aaf4fceffe823ea2d2dc74e4
CVE-2024-4690,0,0,8a659fbde289577b9d47a4e0b198b3a10d973db6b9b3690d157fcfdd9eceabd6,2024-10-21T15:51:10.467000
CVE-2024-46902,0,0,27aaa174bb37d07c97f320c2cd9d7af55f96c8335147ef8fc1c8a8b59f67e5a3,2024-10-25T14:50:23.897000
CVE-2024-46903,0,0,c5646f2eca42dcdf58f6c7cfced2b89da0d0fd3b53651fe38e295ee3b07935b5,2024-11-01T19:35:27.957000
CVE-2024-46905,1,1,61d026d9619c108dab285c18a0cf72d8d80132a58f70faff94aa5509533b9382,2024-12-02T15:15:11.443000
CVE-2024-46906,1,1,b7342c4add30d58f1a7fc06f53ca3ea14de5f93eb25a93d613be8e7c5aac1102,2024-12-02T15:15:11.633000
CVE-2024-46907,1,1,99a5d98e415fb461a7a64ecd1233b781d36234e513fb2259d5e67154c9356651,2024-12-02T15:15:11.793000
CVE-2024-46908,1,1,d9df5230b86009d0e5d988ab260acc4e7ab8189ce25aa89bbb900b7c4573af2b,2024-12-02T15:15:11.967000
CVE-2024-46909,1,1,b47bd7ac65aae0a6ebdfdafd0dc3e7316ffb6c2826608679aaa969584ac03798,2024-12-02T15:15:12.120000
CVE-2024-46905,0,0,61d026d9619c108dab285c18a0cf72d8d80132a58f70faff94aa5509533b9382,2024-12-02T15:15:11.443000
CVE-2024-46906,0,0,b7342c4add30d58f1a7fc06f53ca3ea14de5f93eb25a93d613be8e7c5aac1102,2024-12-02T15:15:11.633000
CVE-2024-46907,0,0,99a5d98e415fb461a7a64ecd1233b781d36234e513fb2259d5e67154c9356651,2024-12-02T15:15:11.793000
CVE-2024-46908,0,0,d9df5230b86009d0e5d988ab260acc4e7ab8189ce25aa89bbb900b7c4573af2b,2024-12-02T15:15:11.967000
CVE-2024-46909,0,0,b47bd7ac65aae0a6ebdfdafd0dc3e7316ffb6c2826608679aaa969584ac03798,2024-12-02T15:15:12.120000
CVE-2024-46911,0,0,b22e051b0f3c36b9606e67ab41355b75022485dd9540e72995287ed3b5f31c90,2024-11-01T17:35:07.877000
CVE-2024-46914,0,0,8183f2e81bda981099173d1b49f2e9d3c952a93e63b81e2bd23ce00d12f134f9,2024-10-22T22:15:05.810000
CVE-2024-46918,0,0,bb2eeb1c2eb1e1757cf1750044772f91012857866544e10c0b718da276cf0057,2024-09-20T18:14:23.897000
@ -264253,7 +264253,7 @@ CVE-2024-47074,0,0,267a945e17f4a8e8e3ad906b4a73babdb13651aee69ba771912b3792671fd
CVE-2024-47075,0,0,fc6fb563183ec73ff3cc748ab21f019299b633a8e98bafeae8d21bcd8012663d,2024-09-30T12:46:20.237000
CVE-2024-47076,0,0,82c29f0b96fa3aec0681c5bff18d4d64d621f66fcd11bafc7be54b1c376fa105,2024-09-30T12:46:20.237000
CVE-2024-47077,0,0,da6225ab755733389945bc8204b7e8eb730152eea799320a5a148837369aa9ea,2024-09-30T12:45:57.823000
CVE-2024-47078,0,0,8bdd7f4a6a380f462186123802b1e26c1e7d5d1d23baa10a3c43c8a1cb6418ee,2024-10-01T18:29:17.867000
CVE-2024-47078,0,1,10afb9e6722a0aa2d390a08f8c9cc758e3470acdae52bc8d53ba79b68f1e0fed,2024-12-02T18:31:56.817000
CVE-2024-47079,0,0,d8ccb016ae09801690996b7754595e296560f1a65a763da55e97f54fd5c7b0dc,2024-10-10T12:57:21.987000
CVE-2024-4708,0,0,c271dbf72bf72946f8191932c0e7ad58bd2ebed6dfb7e2f3f6882e8c7f0da7d3,2024-08-29T19:31:56.517000
CVE-2024-47080,0,0,aa86a69aa1a9b207836e4ce6e146e436fefd6cc1a294d7c36c55a2bb96d8f384,2024-10-16T16:38:43.170000
@ -265789,6 +265789,7 @@ CVE-2024-4976,0,0,fc4df77a0f9a74699614d42497ce42eb6f6db7897f4ce74b0071ab4cbdb2d9
CVE-2024-49760,0,0,ab1d2b1d3d6f87001d0ec0c674554d145fba544f43978860ab9f315317a9615d,2024-11-06T15:01:01.013000
CVE-2024-49761,0,0,cc77d1f33b16264261b43a7d1baebc02063ded1f31c9ab42da049e2bed05a708,2024-11-05T16:41:46.660000
CVE-2024-49762,0,0,e267f4df9b55b0cddd8b82283d5a577158c52194b354f86421be17fb0c5fcf65,2024-10-25T12:56:07.750000
CVE-2024-49763,1,1,390a387f134353159444b9384ca7139409cca538e6054a310492c29d8a68242c,2024-12-02T17:15:11.830000
CVE-2024-49764,0,0,35742a982a82bfbac3ba89ac10d6a85fed15175d4d482af0c8f4cf2b3fa6e2cc,2024-11-20T14:40:02.630000
CVE-2024-49766,0,0,555038e30b17856b98b1634207b04f50d3fce08a3c00047a5f41e29a9d10d5d9,2024-10-28T13:58:09.230000
CVE-2024-49767,0,0,b1abfb6c942255ecba6af733c92d4d0cb5e1d316b2b9040982ab9c6769c6893b,2024-11-05T20:03:04.847000
@ -266371,6 +266372,8 @@ CVE-2024-50376,0,0,c17efa3dc650d5a0b44b765200512faffc52101b81c2385c1a9f8e742ee86
CVE-2024-50377,0,0,a88baec8ddbf85dae69a29e2d805cf9a334ef1555a19dac3559d55b727cb3e80,2024-11-26T11:22:08.767000
CVE-2024-50378,0,0,d1e7f6cc1c38465f15ead8b558f025ff2fd8c3e8d0c0fab80553e16623c34e06,2024-11-08T19:01:03.880000
CVE-2024-5038,0,0,99b942f340bd77179350025250d1eccbd97ee2b6f6339af49bfd1a72be63cbf5,2024-06-11T17:41:37.883000
CVE-2024-50380,1,1,5cfd4d3058711977d7b02b9e779feffa0e24d95fd021403d8b8b4f61100953a5,2024-12-02T17:15:11.980000
CVE-2024-50381,1,1,cc4c78182ccb5412150348a074c0f3fe64b48452294aba2fc4de16da81547ef3,2024-12-02T17:15:12.160000
CVE-2024-50382,0,0,f0709ea17e5f95032091a174ec66193a9596281fe9af192634610c6cbe74c173,2024-10-25T12:56:36.827000
CVE-2024-50383,0,0,e2190fcc52d7d22ac332b0c05a25a337fdc4e67265af4d4eac38727251637b62,2024-10-25T12:56:36.827000
CVE-2024-50386,0,0,e8a2dfb379d3c33fde3d10d50a34e7ed2697dcee8b987f61d477faa743f65676,2024-11-12T15:48:59.103000
@ -267644,6 +267647,7 @@ CVE-2024-52585,0,0,ae573765d0059b6c237eb866187766f9c4c0b67ec566925f547df71f0cc9a
CVE-2024-52587,0,0,4ff6d32c0cce5d4db211ff88731438a9a256421cd5f2b2cabeafbdadc8a29ef5,2024-11-19T21:57:32.967000
CVE-2024-5259,0,0,b3c664cd11ddb9db1b34b50011b18499fc5ac06e8b6b6a588e8cf7d8bc26fc37,2024-06-11T17:44:42.783000
CVE-2024-52595,0,0,8a7985528b5682db55ae119b7b5e36765ed6db59aa7644e450a4161b96108d1c,2024-11-25T14:27:38.087000
CVE-2024-52596,1,1,a1b5270424704526254af72af668772c7edcde11b939184b2a93420e4568a321,2024-12-02T17:15:12.353000
CVE-2024-52597,0,0,0dc15f04b10696c300efbe4aac63baeff7d573b005de682671a7397a19d8fe4d,2024-11-20T14:15:17.967000
CVE-2024-52598,0,0,477258740433139def022fa49fc642fb7eea1c94a8945d9797525cab03b121cb,2024-11-20T15:15:11.667000
CVE-2024-5260,0,0,1ea9956e2812efb1ad02a50e6e15b3c5419e86ea96923b6afc83449c65511582,2024-07-02T12:09:16.907000
@ -267672,7 +267676,7 @@ CVE-2024-52723,0,0,5e158b9e6ae935fe53fcd904758ef5184a80e91ca85495f081966847a4cf0
CVE-2024-52725,0,0,33f6fa34c3dd7f326aa8525752182246593fbe26f97c40f7481f5dc188051048,2024-11-20T17:15:18.867000
CVE-2024-52726,0,0,07104ca9c9e8f2a3a4e4ad76e018b45eb5df5070643287e443babd815c74fea3,2024-11-27T17:15:13.463000
CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000
CVE-2024-52732,1,1,d6a80ccb8de450005a7cb1743d48fc0ea7e9c3041c776b4edbabfa2f08461cb5,2024-12-02T15:15:12.270000
CVE-2024-52732,0,0,d6a80ccb8de450005a7cb1743d48fc0ea7e9c3041c776b4edbabfa2f08461cb5,2024-12-02T15:15:12.270000
CVE-2024-52739,0,0,e67c6617d90c4f2c32d6849dbe6387498e43b14fb180727dba9b598a59a70f9d,2024-11-20T20:35:16.147000
CVE-2024-5274,0,0,c24e97658283aca2d227c212a256ad0361bc0b2f150a90ed4a532bb6225b406f,2024-11-27T18:12:51.690000
CVE-2024-5275,0,0,0a8f92936fd54cfeba80497afbb5044228db5d667d0dcb3a75c34af54c4c0fca,2024-06-20T12:44:01.637000
@ -267706,6 +267710,7 @@ CVE-2024-52800,0,0,33614182cc9b4d3349a9904c03846eec72212dbb8490ca45f9ad64e956176
CVE-2024-52801,0,0,d525f21f1148c8de036d0ddf88b67ee0013549964accf061ff9bd87a44f68775,2024-11-29T19:15:08.890000
CVE-2024-52802,0,0,ff357ae423b4185f6e8528f29c93636cc2249c9e015517449516a4f8158b5ed5,2024-11-22T16:15:34.283000
CVE-2024-52804,0,0,8f245cf45089b95fdaaac467eb0e4e1eb7afae864da129b7e5bc629b398d8ade,2024-11-22T16:15:34.417000
CVE-2024-52806,1,1,1e66f4db39d971971749d7820312b694e65f24529172d67dfa753beb583671a4,2024-12-02T17:15:12.580000
CVE-2024-52809,0,0,989c6fa478d553e2d01696ef3757f80543cb54fc9b37563f1acf5b5911de0279,2024-11-29T19:15:09.030000
CVE-2024-5281,0,0,d8e0f0c592f3cfcf36fc66f961b905d6afba3d53af3789e65e13042755c0a3cb,2024-08-01T13:59:43.367000
CVE-2024-52810,0,0,72dcf4c0c2683dd3fe0322cd1ee30a3ed4e5f334c6c81826d75b9f5c61e14c8f,2024-11-29T19:15:09.163000
@ -267859,6 +267864,7 @@ CVE-2024-53253,0,0,d8774b8b7a52a6828fee68f5032117fca8a6e77570ad308c3ddf9958a04b6
CVE-2024-53254,0,0,ee53e9b703f27318442647deb86c75e2def0aedf5170eb37f9fbf3bd5e2537ab,2024-11-27T18:15:18.060000
CVE-2024-53255,0,0,d61a8d7710c40f67983bd99e9267ded1e91d86ea0747c698bd8cab97316873cd,2024-11-25T19:15:11.760000
CVE-2024-53258,0,0,a915b82637f40f0c10b7fb4e3ffc3bc669fcfe23ea0f5d157743938cb68f10dd,2024-11-25T20:15:10.030000
CVE-2024-53259,1,1,b56d791ed8a3934da53ca3b2bc8d09134e7671697306e7cd36424993380151b4,2024-12-02T17:15:12.767000
CVE-2024-5326,0,0,2be4cbe8832da29a051a88af0386c312f2db765fd88a5b2a911937a61354bc30,2024-05-30T13:15:41.297000
CVE-2024-53260,0,0,f8456e8751226ee5d041fd86437235b7d18924e40a17ade86dc5cd10d0203ce0,2024-11-27T22:15:05.353000
CVE-2024-53261,0,0,26d255de57d248944569dc2de87b17d6f9e71a4446cd8213a8b457b4c29b3a3f,2024-11-25T20:15:10.217000
@ -267878,6 +267884,7 @@ CVE-2024-53335,0,0,c7b5a8f73d12d44b7820d29b4dc55e553a7dba1e50218bfd0cdeaf78dc12e
CVE-2024-5334,0,0,24408ed0ac6ef1e7a34f70a35a6cc670103055f984541012ab7ae541f1637158,2024-07-12T08:15:11.130000
CVE-2024-5335,0,0,ca6f9c300eae3fba64e2743a790d9179f2c4fca4ad8e008f81848f8094115088,2024-08-21T12:30:33.697000
CVE-2024-5336,0,0,2f884d9a8acdce925dfd5f3bbb7e4d857b44070abc5058c1ed58328cd4186515,2024-06-04T19:21:04.947000
CVE-2024-53364,1,1,98d19b85cee394f2609af2d3c120e10f09c46dfe00af779065231746b6ce8188,2024-12-02T17:15:12.933000
CVE-2024-53365,0,0,f94a22f04b10f25f8afa0eb1104a56f755f11fa91566b703eeea9947dc95908c,2024-11-26T20:15:33.650000
CVE-2024-5337,0,0,2b5f97595978a274de9cc82ffbb4e0a657c957408faf59676ddd95606d164a93,2024-06-04T19:21:05.063000
CVE-2024-5338,0,0,a30664650e5151e5bf507d4d1b27e8e105537061b8462474ea4f7add61cf4b05,2024-06-04T19:21:05.170000
@ -267891,16 +267898,16 @@ CVE-2024-5343,0,0,fedc1366914170279f2e5d2ad585273a49bb658750b62f8b5bda5b06ac846b
CVE-2024-53438,0,0,269e7677ace7d9295c53368d7a770c8536638e497558c04303dcd88d3a89eb20,2024-11-27T17:15:14.647000
CVE-2024-5344,0,0,b9eb66177d3d824bf1f1529dfc9f0ece4e45e95565139113aee3e384e4e64696,2024-07-17T03:07:04.743000
CVE-2024-5345,0,0,e63bd8698ebea410f9684596571cb5f236dcece9e087d3c47739e1f377731d0e,2024-05-31T13:01:46.727000
CVE-2024-53459,1,1,245c76a8b1f2e6c0f50dde2742a33bf75027788f3843da5272c1752af8a62ac6,2024-12-02T16:15:12.637000
CVE-2024-53459,0,1,bcee038fd506b2d042b2e2518da0df51a6c3759ec3722aac04f828072f98c4d4,2024-12-02T18:15:11.123000
CVE-2024-5346,0,0,da43d69a3160345da9f992308a5772b156b46661e78425f332f67d306a3affb7,2024-06-24T20:00:59.240000
CVE-2024-5347,0,0,16093735dbce016cf2430c73a4d8045f77e47434e1c219ace83416138a28cb5d,2024-05-31T13:01:46.727000
CVE-2024-5348,0,0,bc3d8d1f3668d1fc879553d2a82a62e6b9980757b64bfd9f1d5fdacf853f73c6,2024-06-03T14:46:24.250000
CVE-2024-5349,0,0,095035450c60a13c08898917421d5656b2399179b1253e40806dcf47c3a4d9f7,2024-07-03T15:44:23.807000
CVE-2024-5350,0,0,8440f1aab6c7debe55a047353772f60d1de30f1b1b7f7fc13c3946381d3b4f12,2024-05-28T12:39:42.673000
CVE-2024-53504,0,0,7b94acf3236703c440799d7cea37ecf926431af8ccfa327a5bdac99daac96a25,2024-11-29T20:15:20.763000
CVE-2024-53505,0,0,a48aa2a3f2b02e57c4384e6ed488ff8a0bd7c8c19b15bc8f8b5a06a4955c7a08,2024-11-29T20:15:20.853000
CVE-2024-53506,0,0,ba2e698ad390074012b311e33d17d473f0ae54b1e9303f2625175edc4f7ce59c,2024-11-29T20:15:20.943000
CVE-2024-53507,0,0,c5e946052b7a1eef03672c0a3197d790626776dff0c07041d5c8e1cd1640a81d,2024-11-29T20:15:21.027000
CVE-2024-53504,0,1,0cf1059548643389b1e33bad68f218b18235298c923b702dcc5a0c676fd86048,2024-12-02T17:15:13.047000
CVE-2024-53505,0,1,429565da56ff3abdf2d5572d186f8d39966f1f694a5c9ddaefd7405363575dd7,2024-12-02T17:15:13.257000
CVE-2024-53506,0,1,9dfa3208f902ab3513f3502d8928ce98e8eedec2f27ad06842644780d149d8db,2024-12-02T17:15:13.497000
CVE-2024-53507,0,1,12d141a23906013906618b23cee234cf31c91fd8e1e8d9da3760596286952af5,2024-12-02T17:15:13.707000
CVE-2024-5351,0,0,5b3be503117b69cfbfdb88b1fae31317d85f3a58c24bc4f082dcbe98687cb2c4,2024-06-04T19:21:05.570000
CVE-2024-5352,0,0,da1c4d8b4e23dadce106da9517801ea125925e8071854aa14e0650ba3020a2bf,2024-06-21T18:15:11.303000
CVE-2024-5353,0,0,525ae1f28e269a2f910a2998894d881f94e776efad76469271fac08c213e4cb6,2024-06-04T19:21:05.680000
@ -267910,6 +267917,8 @@ CVE-2024-53554,0,0,438643a55aaa35b78f1b23aac2881a01cc4a8024d9a2bdae2137a7b9fa7a8
CVE-2024-53555,0,0,174e17d1628af05aaf3f22807e86abd0dc7a03bf1129ef93abe75153c9a01a07,2024-11-26T21:15:08.560000
CVE-2024-53556,0,0,6925ef5b3d50b82f5e08a24f19e7ff4e448493177d9879ad27f5ac4d6f2f0b97,2024-11-27T17:15:14.917000
CVE-2024-5356,0,0,85f64e8ba0cebff8187202ea327ca3c906742c5e7d2301ba82b2780a509234eb,2024-06-04T19:21:05.977000
CVE-2024-53564,1,1,e10a96030ded2829a41b48cc1671c01830a59f8174dc924d23b218915340bc5b,2024-12-02T18:15:11.353000
CVE-2024-53566,1,1,dbff5ecbfdcc9c433f6a2fc9ea0927173d5445ca6c33bb6be0347daffda46700,2024-12-02T18:15:11.500000
CVE-2024-5357,0,0,3e42587e7af2230be214dc062d75c1c832a73aeee43ae2fc11277198b34ad5c7,2024-06-07T20:15:12.387000
CVE-2024-5358,0,0,fdd72871ebf6d62b075a63baf142931fcf44d230f54a18747bfadc4ddcff1dbe,2024-06-04T19:21:06.077000
CVE-2024-5359,0,0,0dc709734361df5232c8a75ae2b832e7f1398579fd9d2edbd5174e887cf59eee,2024-06-04T19:21:06.183000
@ -268045,7 +268054,7 @@ CVE-2024-53858,0,0,6c64b7a629ccdbeeaa44425cb24892d67f2dbeb5f6725b97741be6047ebd2
CVE-2024-53859,0,0,4facd2b494aef0ff73beaf08d6d1ca6f6f9ab5c48842cb7bed7f8b39e94a454f,2024-11-27T22:15:05.673000
CVE-2024-53860,0,0,f686ec46a02a9bc4a804217b41a7af4658fb7390d2c722028f65e08a7a2b5414,2024-11-27T22:15:05.833000
CVE-2024-53861,0,0,a65f03f3f651364136c909e8ecc868a7d260812665c52bd4fa163e7f079f01ea,2024-11-29T19:15:09.433000
CVE-2024-53862,1,1,eb71730385f5a115df10825836b94c0319055c91f99db9bfd92d5c3006795a35,2024-12-02T16:15:14.277000
CVE-2024-53862,0,0,eb71730385f5a115df10825836b94c0319055c91f99db9bfd92d5c3006795a35,2024-12-02T16:15:14.277000
CVE-2024-53864,0,0,5333aa1d756baa8b2b2af9d321f1e4bf84fee7810b77a54afa507c359fe16403,2024-11-29T19:15:09.577000
CVE-2024-53865,0,0,4a38354939a410a34cc87939fb2218794cb79b60b95dc7b6ebed34b8c98c2e76,2024-11-29T19:15:09.710000
CVE-2024-5387,0,0,d7455745fd4e2043656d894120ace9fd562ab2b459405f5c80fb87774616ea6e,2024-06-03T19:15:09.500000
@ -268064,7 +268073,7 @@ CVE-2024-53914,0,0,e050babf2e1b2fa263009de5875d826c83245812f4e7813c8d122d68332fd
CVE-2024-53915,0,0,4605c52b83221ae0e3cdd10a9aad63d660542ba26783410343eed38f4ba2ed72,2024-11-29T20:55:43.810000
CVE-2024-53916,0,0,8b397b00703240f42bfc4c720e49d6f6e4984c2220fee564d2c3c72e3311b723,2024-11-27T17:15:15.127000
CVE-2024-5392,0,0,b24872fec717fdd1d01c0a9d16cd8dae85d0db85954b236e74ba95a5e5c8352c,2024-06-04T19:21:08.117000
CVE-2024-53920,0,0,d20c3dd3d3a0856cc626272b3d8ad44701e7a3636060e73cd0d1d84df2576a28,2024-11-27T16:15:15.037000
CVE-2024-53920,0,1,a291ce56b664f688b2d6f36f512bf0b737cf558f95f0af0d70bd1b3310ba1ecf,2024-12-02T17:15:13.913000
CVE-2024-5393,0,0,295d4f9eb57788d71849a73c0b5d6c4f89e92a1e7613c6c16abcfeb4329f6a42,2024-06-04T19:21:08.420000
CVE-2024-53930,0,0,1076c24462100197e38bce4bb3bb1d95bc12e583ba6e6f216b5c96e80fcd4c47,2024-11-26T16:15:21.150000
CVE-2024-5394,0,0,aaadf9a58796777f85dc2107a816ebb5c0ae4c9d890d2d8c3ab15382290e4f66,2024-06-04T19:21:08.527000
@ -268076,10 +268085,12 @@ CVE-2024-53976,0,0,8d5f56cf46e847394bbb16bbccc754e64a340211b5713f291e4e6fbe540b2
CVE-2024-53979,0,0,daaf571bfcfd25ad5803f97558dcc6ea565a6375b17d8bed4a6f9cee29769cb2,2024-11-29T19:15:09.847000
CVE-2024-5398,0,0,1fca9edd99ff7753e0d36d6f4d73a5a23ccf8ab9dd992541f79488471e393289,2024-06-11T10:15:13.690000
CVE-2024-53980,0,0,f2c4b71c263d54957f07bea69df75ebb3d992381d97f959d8cfdaa259a929ae9,2024-11-29T19:15:09.993000
CVE-2024-53981,1,1,4ba898eb1befa3f2561edd750eac82eeb420da27aa2d03f7cf36b5b838c9b47f,2024-12-02T16:15:14.457000
CVE-2024-53981,0,0,4ba898eb1befa3f2561edd750eac82eeb420da27aa2d03f7cf36b5b838c9b47f,2024-12-02T16:15:14.457000
CVE-2024-53983,0,0,53274ba64b5204fbd988c3ba5170f84dc187572b2bad72061a88e06a87cfa81a,2024-11-29T19:15:10.137000
CVE-2024-53984,1,1,892c82f8a41d78ebdbb6204162b35fdbbfd980dac8482c839614b9f0b40eeb3b,2024-12-02T16:15:14.603000
CVE-2024-53984,0,0,892c82f8a41d78ebdbb6204162b35fdbbfd980dac8482c839614b9f0b40eeb3b,2024-12-02T16:15:14.603000
CVE-2024-5399,0,0,6f591a4ee360dfdb4118262029ef6ec2f3647ffdfa160e81ed9cdadb88ac0f1d,2024-05-28T12:39:28.377000
CVE-2024-53990,1,1,6379e4bbe26e19105376b36b2196150c1631dc13a93cec6d1f3c3cedfc26df0a,2024-12-02T18:15:11.753000
CVE-2024-53992,1,1,968e2d279d6edfc36860c960df4396bf9d9df657b6a78a28aa81a3adc4be5a3e,2024-12-02T17:15:14.113000
CVE-2024-5400,0,0,094967d50b5003fa8a1a95a7cd40ccdb2300c03695bb818acf6e11d6054c6ffe,2024-05-28T12:39:28.377000
CVE-2024-54003,0,0,2506866a989efaeab3da1a8a5555a804f26e4215f0a647f04a179f236368dfb1,2024-11-27T20:15:26.133000
CVE-2024-54004,0,0,4b55764e78df7d1fab73ac81a29fd36001f40116e182b6aab547372d06b234b5,2024-11-27T19:15:33.723000
@ -270974,7 +270985,7 @@ CVE-2024-8781,0,0,3ec0b05f8d5a664e00f19be45699369ceb748ac3a54899e5a3d5a5f6653a98
CVE-2024-8782,0,0,ec0da4baac22ae9eceb8ce2507375e0a71b6a51926de3cc40576bcd259fd7175,2024-09-19T01:46:07.003000
CVE-2024-8783,0,0,b434dfc5f50cf2811a1f5688ac574f745dec48e5af54cf5f568ce8560b0e2702,2024-09-19T01:38:57.033000
CVE-2024-8784,0,0,7bc5ed86fd42122481efd27561493828acec6a50cb9d34c0b1c40453c943431f,2024-09-19T01:38:35.177000
CVE-2024-8785,1,1,389f4d4466fc599aa1e162e96341d9287a40c3b8fbeefcdf0ef9b4791ab6ee69,2024-12-02T15:15:12.380000
CVE-2024-8785,0,0,389f4d4466fc599aa1e162e96341d9287a40c3b8fbeefcdf0ef9b4791ab6ee69,2024-12-02T15:15:12.380000
CVE-2024-8786,0,0,98535b365547eb81c56b86d17170e324effeb134cfd99a6f8a9199c7d69b6f51,2024-10-04T13:51:25.567000
CVE-2024-8787,0,0,697959dd00ebdc9b4d866bc462eeca4254ff62268820b8cc5f18a9f4531e0ed8,2024-10-16T16:38:14.557000
CVE-2024-8788,0,0,109bf9bb3aa314390f1c0b3dee4d54ea5d0e02bbb648b956ffff0a9dad06b2f6,2024-10-03T17:25:41.467000

Can't render this file because it is too large.