From 9a396ac24a60ea0da276e521ad291d254dfba38f Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Mon, 2 Dec 2024 23:03:43 +0000 Subject: [PATCH] Auto-Update: 2024-12-02T23:00:32.388797+00:00 --- CVE-2018/CVE-2018-93xx/CVE-2018-9376.json | 21 ++ CVE-2018/CVE-2018-93xx/CVE-2018-9380.json | 39 +++- CVE-2018/CVE-2018-93xx/CVE-2018-9381.json | 39 +++- CVE-2018/CVE-2018-94xx/CVE-2018-9413.json | 21 ++ CVE-2018/CVE-2018-94xx/CVE-2018-9414.json | 21 ++ CVE-2018/CVE-2018-94xx/CVE-2018-9418.json | 21 ++ CVE-2018/CVE-2018-94xx/CVE-2018-9423.json | 21 ++ CVE-2018/CVE-2018-94xx/CVE-2018-9426.json | 21 ++ CVE-2018/CVE-2018-94xx/CVE-2018-9429.json | 21 ++ CVE-2018/CVE-2018-94xx/CVE-2018-9430.json | 21 ++ CVE-2018/CVE-2018-94xx/CVE-2018-9431.json | 21 ++ CVE-2018/CVE-2018-94xx/CVE-2018-9435.json | 21 ++ CVE-2023/CVE-2023-443xx/CVE-2023-44342.json | 68 ++++++- CVE-2023/CVE-2023-443xx/CVE-2023-44343.json | 68 ++++++- CVE-2023/CVE-2023-443xx/CVE-2023-44344.json | 68 ++++++- CVE-2023/CVE-2023-443xx/CVE-2023-44345.json | 78 +++++++- CVE-2023/CVE-2023-443xx/CVE-2023-44346.json | 66 ++++++- CVE-2023/CVE-2023-443xx/CVE-2023-44347.json | 68 ++++++- CVE-2024/CVE-2024-207xx/CVE-2024-20799.json | 50 ++++- CVE-2024/CVE-2024-208xx/CVE-2024-20800.json | 50 ++++- CVE-2024/CVE-2024-260xx/CVE-2024-26028.json | 48 ++++- CVE-2024/CVE-2024-260xx/CVE-2024-26030.json | 50 ++++- CVE-2024/CVE-2024-260xx/CVE-2024-26031.json | 48 ++++- CVE-2024/CVE-2024-260xx/CVE-2024-26032.json | 50 ++++- CVE-2024/CVE-2024-260xx/CVE-2024-26033.json | 50 ++++- CVE-2024/CVE-2024-260xx/CVE-2024-26034.json | 50 ++++- CVE-2024/CVE-2024-260xx/CVE-2024-26035.json | 50 ++++- CVE-2024/CVE-2024-260xx/CVE-2024-26038.json | 50 ++++- CVE-2024/CVE-2024-260xx/CVE-2024-26040.json | 50 ++++- CVE-2024/CVE-2024-260xx/CVE-2024-26041.json | 50 ++++- CVE-2024/CVE-2024-260xx/CVE-2024-26042.json | 46 ++++- CVE-2024/CVE-2024-260xx/CVE-2024-26043.json | 50 ++++- CVE-2024/CVE-2024-260xx/CVE-2024-26044.json | 50 ++++- CVE-2024/CVE-2024-260xx/CVE-2024-26045.json | 50 ++++- CVE-2024/CVE-2024-260xx/CVE-2024-26050.json | 70 ++++++- CVE-2024/CVE-2024-260xx/CVE-2024-26056.json | 50 ++++- CVE-2024/CVE-2024-260xx/CVE-2024-26059.json | 50 ++++- CVE-2024/CVE-2024-260xx/CVE-2024-26061.json | 50 ++++- CVE-2024/CVE-2024-260xx/CVE-2024-26062.json | 50 ++++- CVE-2024/CVE-2024-260xx/CVE-2024-26063.json | 60 +++++- CVE-2024/CVE-2024-260xx/CVE-2024-26064.json | 48 ++++- CVE-2024/CVE-2024-260xx/CVE-2024-26065.json | 50 ++++- CVE-2024/CVE-2024-302xx/CVE-2024-30279.json | 141 ++++++++++++- CVE-2024/CVE-2024-302xx/CVE-2024-30280.json | 141 ++++++++++++- CVE-2024/CVE-2024-302xx/CVE-2024-30284.json | 141 ++++++++++++- CVE-2024/CVE-2024-302xx/CVE-2024-30293.json | 79 +++++++- CVE-2024/CVE-2024-302xx/CVE-2024-30294.json | 79 +++++++- CVE-2024/CVE-2024-302xx/CVE-2024-30295.json | 69 ++++++- CVE-2024/CVE-2024-302xx/CVE-2024-30296.json | 69 ++++++- CVE-2024/CVE-2024-302xx/CVE-2024-30297.json | 69 ++++++- CVE-2024/CVE-2024-303xx/CVE-2024-30301.json | 83 +++++++- CVE-2024/CVE-2024-303xx/CVE-2024-30302.json | 83 +++++++- CVE-2024/CVE-2024-303xx/CVE-2024-30303.json | 83 +++++++- CVE-2024/CVE-2024-303xx/CVE-2024-30304.json | 83 +++++++- CVE-2024/CVE-2024-303xx/CVE-2024-30305.json | 83 +++++++- CVE-2024/CVE-2024-303xx/CVE-2024-30306.json | 83 +++++++- CVE-2024/CVE-2024-303xx/CVE-2024-30308.json | 44 ++++- CVE-2024/CVE-2024-303xx/CVE-2024-30309.json | 44 ++++- CVE-2024/CVE-2024-303xx/CVE-2024-30310.json | 141 ++++++++++++- CVE-2024/CVE-2024-303xx/CVE-2024-30311.json | 155 ++++++++++++++- CVE-2024/CVE-2024-303xx/CVE-2024-30312.json | 155 ++++++++++++++- CVE-2024/CVE-2024-340xx/CVE-2024-34094.json | 149 +++++++++++++- CVE-2024/CVE-2024-340xx/CVE-2024-34095.json | 141 ++++++++++++- CVE-2024/CVE-2024-340xx/CVE-2024-34096.json | 141 ++++++++++++- CVE-2024/CVE-2024-340xx/CVE-2024-34097.json | 157 ++++++++++++++- CVE-2024/CVE-2024-340xx/CVE-2024-34098.json | 151 +++++++++++++- CVE-2024/CVE-2024-340xx/CVE-2024-34099.json | 151 +++++++++++++- CVE-2024/CVE-2024-341xx/CVE-2024-34100.json | 141 ++++++++++++- CVE-2024/CVE-2024-341xx/CVE-2024-34101.json | 141 ++++++++++++- CVE-2024/CVE-2024-393xx/CVE-2024-39392.json | 71 ++++++- CVE-2024/CVE-2024-393xx/CVE-2024-39396.json | 61 +++++- CVE-2024/CVE-2024-398xx/CVE-2024-39890.json | 44 +++++ CVE-2024/CVE-2024-418xx/CVE-2024-41836.json | 86 +++++++- CVE-2024/CVE-2024-451xx/CVE-2024-45153.json | 39 +++- CVE-2024/CVE-2024-495xx/CVE-2024-49523.json | 39 +++- CVE-2024/CVE-2024-495xx/CVE-2024-49524.json | 39 +++- CVE-2024/CVE-2024-495xx/CVE-2024-49581.json | 56 ++++++ CVE-2024/CVE-2024-527xx/CVE-2024-52725.json | 45 ++++- CVE-2024/CVE-2024-533xx/CVE-2024-53375.json | 25 +++ CVE-2024/CVE-2024-534xx/CVE-2024-53477.json | 25 +++ CVE-2024/CVE-2024-539xx/CVE-2024-53938.json | 25 +++ CVE-2024/CVE-2024-539xx/CVE-2024-53939.json | 29 +++ CVE-2024/CVE-2024-539xx/CVE-2024-53940.json | 21 ++ CVE-2024/CVE-2024-539xx/CVE-2024-53941.json | 25 +++ CVE-2024/CVE-2024-539xx/CVE-2024-53985.json | 86 ++++++++ CVE-2024/CVE-2024-539xx/CVE-2024-53986.json | 82 ++++++++ CVE-2024/CVE-2024-539xx/CVE-2024-53987.json | 82 ++++++++ CVE-2024/CVE-2024-539xx/CVE-2024-53988.json | 82 ++++++++ CVE-2024/CVE-2024-539xx/CVE-2024-53989.json | 82 ++++++++ README.md | 86 ++++---- _state.csv | 207 +++++++++++--------- 91 files changed, 5636 insertions(+), 622 deletions(-) create mode 100644 CVE-2018/CVE-2018-93xx/CVE-2018-9376.json create mode 100644 CVE-2018/CVE-2018-94xx/CVE-2018-9413.json create mode 100644 CVE-2018/CVE-2018-94xx/CVE-2018-9414.json create mode 100644 CVE-2018/CVE-2018-94xx/CVE-2018-9418.json create mode 100644 CVE-2018/CVE-2018-94xx/CVE-2018-9423.json create mode 100644 CVE-2018/CVE-2018-94xx/CVE-2018-9426.json create mode 100644 CVE-2018/CVE-2018-94xx/CVE-2018-9429.json create mode 100644 CVE-2018/CVE-2018-94xx/CVE-2018-9430.json create mode 100644 CVE-2018/CVE-2018-94xx/CVE-2018-9431.json create mode 100644 CVE-2018/CVE-2018-94xx/CVE-2018-9435.json create mode 100644 CVE-2024/CVE-2024-398xx/CVE-2024-39890.json create mode 100644 CVE-2024/CVE-2024-495xx/CVE-2024-49581.json create mode 100644 CVE-2024/CVE-2024-533xx/CVE-2024-53375.json create mode 100644 CVE-2024/CVE-2024-534xx/CVE-2024-53477.json create mode 100644 CVE-2024/CVE-2024-539xx/CVE-2024-53938.json create mode 100644 CVE-2024/CVE-2024-539xx/CVE-2024-53939.json create mode 100644 CVE-2024/CVE-2024-539xx/CVE-2024-53940.json create mode 100644 CVE-2024/CVE-2024-539xx/CVE-2024-53941.json create mode 100644 CVE-2024/CVE-2024-539xx/CVE-2024-53985.json create mode 100644 CVE-2024/CVE-2024-539xx/CVE-2024-53986.json create mode 100644 CVE-2024/CVE-2024-539xx/CVE-2024-53987.json create mode 100644 CVE-2024/CVE-2024-539xx/CVE-2024-53988.json create mode 100644 CVE-2024/CVE-2024-539xx/CVE-2024-53989.json diff --git a/CVE-2018/CVE-2018-93xx/CVE-2018-9376.json b/CVE-2018/CVE-2018-93xx/CVE-2018-9376.json new file mode 100644 index 00000000000..32b47d5877d --- /dev/null +++ b/CVE-2018/CVE-2018-93xx/CVE-2018-9376.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2018-9376", + "sourceIdentifier": "security@android.com", + "published": "2024-12-02T21:15:09.107", + "lastModified": "2024-12-02T21:15:09.107", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In rpc_msg_handler and related handlers of\u00a0drivers/misc/mediatek/eccci/port_rpc.c, there is a possible out of bounds\u00a0write due to an incorrect bounds check. This could lead to local escalation\u00a0of privilege with System execution privileges needed. User interaction is\u00a0not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/docs/security/bulletin/pixel/2018-07-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2018/CVE-2018-93xx/CVE-2018-9380.json b/CVE-2018/CVE-2018-93xx/CVE-2018-9380.json index 066418035c0..201a1bf71a2 100644 --- a/CVE-2018/CVE-2018-93xx/CVE-2018-9380.json +++ b/CVE-2018/CVE-2018-93xx/CVE-2018-9380.json @@ -2,7 +2,7 @@ "id": "CVE-2018-9380", "sourceIdentifier": "security@android.com", "published": "2024-12-02T20:15:04.443", - "lastModified": "2024-12-02T20:15:04.443", + "lastModified": "2024-12-02T22:15:08.237", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In l2c_lcc_proc_pdu of l2c_fcr.cc, there is a possible out of bounds write\u00a0due to improper input validation. This could lead to remote escalation of\u00a0privilege with no additional execution privileges needed. User interaction\u00a0is needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "references": [ { "url": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01", diff --git a/CVE-2018/CVE-2018-93xx/CVE-2018-9381.json b/CVE-2018/CVE-2018-93xx/CVE-2018-9381.json index 693a2db836d..64f3f8ffdfd 100644 --- a/CVE-2018/CVE-2018-93xx/CVE-2018-9381.json +++ b/CVE-2018/CVE-2018-93xx/CVE-2018-9381.json @@ -2,7 +2,7 @@ "id": "CVE-2018-9381", "sourceIdentifier": "security@android.com", "published": "2024-12-02T20:15:05.440", - "lastModified": "2024-12-02T20:15:05.440", + "lastModified": "2024-12-02T22:15:08.493", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "In gatts_process_read_by_type_req of gatt_sr.c, there is a possible\u00a0information disclosure due to uninitialized data. This could lead to remote\u00a0information disclosure with no additional execution privileges needed. User\u00a0interaction is not needed for exploitation." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-908" + } + ] + } + ], "references": [ { "url": "https://source.android.com/docs/security/bulletin/pixel/2018-06-01", diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9413.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9413.json new file mode 100644 index 00000000000..817f0fb03fb --- /dev/null +++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9413.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2018-9413", + "sourceIdentifier": "security@android.com", + "published": "2024-12-02T21:15:09.653", + "lastModified": "2024-12-02T21:15:09.653", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In handle_notification_response of btif_rc.cc, there is a possible out of\u00a0bounds write due to a missing bounds check. This could lead to remote code\u00a0execution with no additional execution privileges needed. User interaction\u00a0is needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/docs/security/bulletin/pixel/2018-07-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9414.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9414.json new file mode 100644 index 00000000000..13236f9b2b1 --- /dev/null +++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9414.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2018-9414", + "sourceIdentifier": "security@android.com", + "published": "2024-12-02T21:15:09.757", + "lastModified": "2024-12-02T21:15:09.757", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In gattServerSendResponseNative of com_android_bluetooth_gatt.cpp, there is\u00a0a possible out of bounds stack write due to a missing bounds check. This\u00a0could lead to local escalation of privilege with User execution privileges\u00a0needed. User interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/docs/security/bulletin/pixel/2018-07-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9418.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9418.json new file mode 100644 index 00000000000..3c1f5dd625c --- /dev/null +++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9418.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2018-9418", + "sourceIdentifier": "security@android.com", + "published": "2024-12-02T22:15:08.727", + "lastModified": "2024-12-02T22:15:08.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In handle_app_cur_val_response of dtif_rc.cc, there is a possible stack\u00a0buffer overflow due to a missing bounds check. This could lead to remote\u00a0code execution with no additional execution privileges needed. User\u00a0interaction is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/docs/security/bulletin/pixel/2018-07-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9423.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9423.json new file mode 100644 index 00000000000..b6b8c4fb802 --- /dev/null +++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9423.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2018-9423", + "sourceIdentifier": "security@android.com", + "published": "2024-12-02T22:15:08.827", + "lastModified": "2024-12-02T22:15:08.827", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In ihevcd_parse_slice_header of ihevcd_parse_slice_header.c there is a possible out of bound read due to missing bounds check. This could lead to denial of service with no additional execution privileges needed. User interaction is needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/docs/security/bulletin/pixel/2018-07-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9426.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9426.json new file mode 100644 index 00000000000..da0b59bbb23 --- /dev/null +++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9426.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2018-9426", + "sourceIdentifier": "security@android.com", + "published": "2024-12-02T22:15:08.917", + "lastModified": "2024-12-02T22:15:08.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In \u00a0RsaKeyPairGenerator::getNumberOfIterations of RSAKeyPairGenerator.java,\u00a0an incorrect implementation could cause weak RSA key pairs being generated.\u00a0This could lead to crypto vulnerability with no additional execution\u00a0privileges needed. User interaction is not needed for exploitation.\u00a0Bulletin Fix: The fix is designed to correctly implement the key generation according to FIPS standard." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/docs/security/bulletin/pixel/2018-07-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9429.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9429.json new file mode 100644 index 00000000000..0d6b251bce1 --- /dev/null +++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9429.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2018-9429", + "sourceIdentifier": "security@android.com", + "published": "2024-12-02T22:15:09.013", + "lastModified": "2024-12-02T22:15:09.013", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In buildImageItemsIfPossible of ItemTable.cpp there is a possible out of bound read due to uninitialized data. This could lead to information disclosure with no additional execution privileges needed. User interaction is needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/docs/security/bulletin/pixel/2018-07-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9430.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9430.json new file mode 100644 index 00000000000..182cd975d0d --- /dev/null +++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9430.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2018-9430", + "sourceIdentifier": "security@android.com", + "published": "2024-12-02T22:15:09.113", + "lastModified": "2024-12-02T22:15:09.113", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In prop2cfg of btif_storage.cc, there is a possible out of bounds write due\u00a0to an incorrect bounds check. This could lead to remote code execution with\u00a0no additional execution privileges needed. User interaction is not needed\u00a0for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/docs/security/bulletin/pixel/2018-07-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9431.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9431.json new file mode 100644 index 00000000000..f8f7feca40d --- /dev/null +++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9431.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2018-9431", + "sourceIdentifier": "security@android.com", + "published": "2024-12-02T22:15:09.210", + "lastModified": "2024-12-02T22:15:09.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In OSUInfo of OSUInfo.java, there is a possible escalation of privilege due\u00a0to improper input validation. This could lead to local escalation of\u00a0privilege with no additional execution privileges needed. User interaction\u00a0is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/docs/security/bulletin/pixel/2018-07-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2018/CVE-2018-94xx/CVE-2018-9435.json b/CVE-2018/CVE-2018-94xx/CVE-2018-9435.json new file mode 100644 index 00000000000..59691354fb3 --- /dev/null +++ b/CVE-2018/CVE-2018-94xx/CVE-2018-9435.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2018-9435", + "sourceIdentifier": "security@android.com", + "published": "2024-12-02T22:15:09.310", + "lastModified": "2024-12-02T22:15:09.310", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In gatt_process_error_rsp of gatt_cl.cc, there is a possible out of bound\u00a0read due to a missing bounds check. This could lead to local information\u00a0disclosure with no additional execution privileges needed. User interaction\u00a0is not needed for exploitation." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://source.android.com/docs/security/bulletin/pixel/2018-08-01", + "source": "security@android.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44342.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44342.json index f6f5576fa13..6070182e989 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44342.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44342.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44342", "sourceIdentifier": "psirt@adobe.com", "published": "2024-02-29T01:41:13.020", - "lastModified": "2024-02-29T13:49:47.277", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:11:14.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,62 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndIncluding": "17.4.2", + "matchCriteriaId": "965511F1-E643-4597-97E2-E57063795C3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.5.1", + "matchCriteriaId": "9F24B6DB-FF95-468F-9545-1EF380FBD84B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44343.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44343.json index 5378a7dfc17..e12a2f1271c 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44343.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44343.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44343", "sourceIdentifier": "psirt@adobe.com", "published": "2024-02-29T01:41:13.323", - "lastModified": "2024-02-29T13:49:47.277", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:11:22.367", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,62 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndIncluding": "17.4.2", + "matchCriteriaId": "965511F1-E643-4597-97E2-E57063795C3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.5.1", + "matchCriteriaId": "9F24B6DB-FF95-468F-9545-1EF380FBD84B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44344.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44344.json index f0a63c20ec8..69fbbb2f1a2 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44344.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44344.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44344", "sourceIdentifier": "psirt@adobe.com", "published": "2024-02-29T01:41:13.497", - "lastModified": "2024-02-29T13:49:47.277", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:11:34.303", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,62 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndIncluding": "17.4.2", + "matchCriteriaId": "965511F1-E643-4597-97E2-E57063795C3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.5.1", + "matchCriteriaId": "9F24B6DB-FF95-468F-9545-1EF380FBD84B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44345.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44345.json index cc41b5db485..a2677178bfa 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44345.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44345.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44345", "sourceIdentifier": "psirt@adobe.com", "published": "2024-02-29T01:41:13.680", - "lastModified": "2024-02-29T13:49:47.277", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:11:59.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -42,19 +42,81 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndIncluding": "17.4.2", + "matchCriteriaId": "965511F1-E643-4597-97E2-E57063795C3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.5.1", + "matchCriteriaId": "9F24B6DB-FF95-468F-9545-1EF380FBD84B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44346.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44346.json index 0025cbcac8b..2bf68ce02e6 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44346.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44346.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44346", "sourceIdentifier": "psirt@adobe.com", "published": "2024-02-29T01:41:13.857", - "lastModified": "2024-02-29T13:49:47.277", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:12:16.443", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -51,10 +51,62 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndIncluding": "17.4.2", + "matchCriteriaId": "965511F1-E643-4597-97E2-E57063795C3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.5.1", + "matchCriteriaId": "9F24B6DB-FF95-468F-9545-1EF380FBD84B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44347.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44347.json index 55634733657..6d9c22ee472 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44347.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44347.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44347", "sourceIdentifier": "psirt@adobe.com", "published": "2024-02-29T01:41:14.037", - "lastModified": "2024-02-29T13:49:47.277", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:12:28.940", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", - "availabilityImpact": "HIGH", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,62 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndIncluding": "17.4.2", + "matchCriteriaId": "965511F1-E643-4597-97E2-E57063795C3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.5.1", + "matchCriteriaId": "9F24B6DB-FF95-468F-9545-1EF380FBD84B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb23-55.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-207xx/CVE-2024-20799.json b/CVE-2024/CVE-2024-207xx/CVE-2024-20799.json index 06d42ba5804..d21091bed09 100644 --- a/CVE-2024/CVE-2024-207xx/CVE-2024-20799.json +++ b/CVE-2024/CVE-2024-207xx/CVE-2024-20799.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20799", "sourceIdentifier": "psirt@adobe.com", "published": "2024-04-02T08:15:59.050", - "lastModified": "2024-04-02T12:50:42.233", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:07:32.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-208xx/CVE-2024-20800.json b/CVE-2024/CVE-2024-208xx/CVE-2024-20800.json index b3e8da89f9e..6c4eb7b247a 100644 --- a/CVE-2024/CVE-2024-208xx/CVE-2024-20800.json +++ b/CVE-2024/CVE-2024-208xx/CVE-2024-20800.json @@ -2,8 +2,8 @@ "id": "CVE-2024-20800", "sourceIdentifier": "psirt@adobe.com", "published": "2024-04-04T09:15:07.470", - "lastModified": "2024-04-04T12:48:41.700", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:07:34.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26028.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26028.json index 571ad0f6de5..2c9ece28400 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26028.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26028.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26028", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:09.910", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:06:53.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26030.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26030.json index 55c238eef02..9c73f48355f 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26030.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26030.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26030", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:10.130", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:06:56.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26031.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26031.json index e9d7e8e1ce0..e978f868526 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26031.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26031.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26031", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:10.420", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:06:58.120", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -23,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26032.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26032.json index 5d67ce17239..8dd4a903c65 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26032.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26032.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26032", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:10.647", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:06:59.920", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26033.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26033.json index 7e018904859..245d2269a0f 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26033.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26033.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26033", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:10.867", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:07:02.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26034.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26034.json index 007dccc5042..39af23989b7 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26034.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26034.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26034", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:11.100", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:07:03.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26035.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26035.json index 1dcf850bbce..0473b93b1fc 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26035.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26035.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26035", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:11.360", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:07:06.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26038.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26038.json index 4cf0fdc6330..5edcccaed27 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26038.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26038.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26038", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:11.570", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:07:08.043", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26040.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26040.json index d768cb70269..bf643181c3e 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26040.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26040.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26040", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:11.790", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:07:09.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26041.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26041.json index 1e268090d52..b88201c4387 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26041.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26041.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26041", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:12.023", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:07:12.473", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26042.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26042.json index 5a09d6423b5..5fe977146df 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26042.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26042.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26042", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:12.273", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:07:13.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -23,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26043.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26043.json index f3cff162752..aab4bc90d97 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26043.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26043.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26043", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:12.510", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:07:15.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26044.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26044.json index c14f1853bf4..4612e23df35 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26044.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26044.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26044", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:12.767", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:07:18.390", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26045.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26045.json index 0b409ad0545..5ff3c4c1ceb 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26045.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26045.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26045", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:13.007", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:07:20.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26050.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26050.json index f43dd94cefc..7081998327f 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26050.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26050.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26050", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:13.263", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:07:22.173", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "HIGH", @@ -30,19 +32,37 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 4.8, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +71,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26056.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26056.json index 65884837192..3b5c9a47179 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26056.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26056.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26056", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:14.097", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:07:24.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26059.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26059.json index 2c01f5c0c38..65249e14a07 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26059.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26059.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26059", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:14.313", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:07:26.627", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26061.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26061.json index 96335960dcd..0f2f4263f33 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26061.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26061.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26061", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:14.533", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:07:28.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26062.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26062.json index f16af31c5b2..e7c116b4d42 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26062.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26062.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26062", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:14.760", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:07:32.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26063.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26063.json index 0fb255b1d0b..2abe511b922 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26063.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26063.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26063", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:14.973", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:09:53.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.3, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 3.9, "impactScore": 1.4 @@ -42,19 +42,63 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26064.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26064.json index 824792dcbe1..aebe003f0df 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26064.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26064.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26064", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:15.197", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:09:18.633", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -23,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-260xx/CVE-2024-26065.json b/CVE-2024/CVE-2024-260xx/CVE-2024-26065.json index ad80af68030..4661152295e 100644 --- a/CVE-2024/CVE-2024-260xx/CVE-2024-26065.json +++ b/CVE-2024/CVE-2024-260xx/CVE-2024-26065.json @@ -2,8 +2,8 @@ "id": "CVE-2024-26065", "sourceIdentifier": "psirt@adobe.com", "published": "2024-03-18T18:15:15.440", - "lastModified": "2024-03-18T19:40:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:08:58.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,44 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.20.0", + "matchCriteriaId": "9BEA709A-B1E9-4411-893D-A638A404C606" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.03", + "matchCriteriaId": "E35144F6-BF70-46DA-BA01-FBCD55284456" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-05.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30279.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30279.json index 7898bdb79e4..8009b91881f 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30279.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30279.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30279", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-23T09:15:08.813", - "lastModified": "2024-05-24T01:15:30.977", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:22:38.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,135 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "72903DD8-1DCC-4E83-A97C-6C8307132B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "9126C385-299B-4E56-A3AF-F325A54ACBA2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "FA2B6852-78F2-4C79-A7DB-CAEC44B93EC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "DEAA50D1-C7BA-4644-BA20-18D3870160EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "C5CC8784-11B6-47B9-901E-634FE1490B74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "F548DEAE-966F-476D-9202-14BF1FAD222D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30280.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30280.json index b4b459e8fe4..594a761d5b5 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30280.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30280.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30280", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-23T09:15:09.103", - "lastModified": "2024-05-24T01:15:30.977", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:07:30.440", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,135 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "72903DD8-1DCC-4E83-A97C-6C8307132B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "9126C385-299B-4E56-A3AF-F325A54ACBA2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "FA2B6852-78F2-4C79-A7DB-CAEC44B93EC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "DEAA50D1-C7BA-4644-BA20-18D3870160EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "C5CC8784-11B6-47B9-901E-634FE1490B74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "F548DEAE-966F-476D-9202-14BF1FAD222D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30284.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30284.json index 4930518f216..ab9381b5f43 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30284.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30284.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30284", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-15T10:15:08.313", - "lastModified": "2024-05-15T16:40:19.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:22:08.673", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,135 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "72903DD8-1DCC-4E83-A97C-6C8307132B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "9126C385-299B-4E56-A3AF-F325A54ACBA2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "FA2B6852-78F2-4C79-A7DB-CAEC44B93EC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "DEAA50D1-C7BA-4644-BA20-18D3870160EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "C5CC8784-11B6-47B9-901E-634FE1490B74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "F548DEAE-966F-476D-9202-14BF1FAD222D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30293.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30293.json index 84794f1c2a5..635a38a962e 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30293.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30293.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30293", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:11.497", - "lastModified": "2024-05-16T13:03:05.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:56:07.083", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,19 +42,82 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*", + "versionStartIncluding": "23.0.0", + "versionEndExcluding": "23.0.6", + "matchCriteriaId": "3E241CF7-1D65-4BF8-8759-EADE0D0FBEEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*", + "versionStartIncluding": "24.0.0", + "versionEndExcluding": "24.0.3", + "matchCriteriaId": "41C1FD5E-1403-4D81-81D7-FE84D39531DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/animate/apsb24-36.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/animate/apsb24-36.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30294.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30294.json index 7183661ec0e..06d52b0c072 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30294.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30294.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30294", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:11.763", - "lastModified": "2024-05-16T13:03:05.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:57:44.330", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,19 +42,82 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*", + "versionStartIncluding": "23.0.0", + "versionEndExcluding": "23.0.6", + "matchCriteriaId": "3E241CF7-1D65-4BF8-8759-EADE0D0FBEEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*", + "versionStartIncluding": "24.0.0", + "versionEndExcluding": "24.0.3", + "matchCriteriaId": "41C1FD5E-1403-4D81-81D7-FE84D39531DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/animate/apsb24-36.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/animate/apsb24-36.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30295.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30295.json index 0d30eeabaaf..40a26325764 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30295.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30295.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30295", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:11.990", - "lastModified": "2024-05-16T13:03:05.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:58:00.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,63 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*", + "versionStartIncluding": "23.0.0", + "versionEndExcluding": "23.0.6", + "matchCriteriaId": "3E241CF7-1D65-4BF8-8759-EADE0D0FBEEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*", + "versionStartIncluding": "24.0.0", + "versionEndExcluding": "24.0.3", + "matchCriteriaId": "41C1FD5E-1403-4D81-81D7-FE84D39531DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/animate/apsb24-36.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/animate/apsb24-36.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30296.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30296.json index 16fb7c2b198..f1dbb102f06 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30296.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30296.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30296", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:12.213", - "lastModified": "2024-05-16T13:03:05.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:58:13.037", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,63 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*", + "versionStartIncluding": "23.0.0", + "versionEndExcluding": "23.0.6", + "matchCriteriaId": "3E241CF7-1D65-4BF8-8759-EADE0D0FBEEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*", + "versionStartIncluding": "24.0.0", + "versionEndExcluding": "24.0.3", + "matchCriteriaId": "41C1FD5E-1403-4D81-81D7-FE84D39531DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/animate/apsb24-36.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/animate/apsb24-36.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30297.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30297.json index 12a7c85a715..76a40218c28 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30297.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30297.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30297", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:12.447", - "lastModified": "2024-05-16T13:03:05.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:58:24.973", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,63 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*", + "versionStartIncluding": "23.0.0", + "versionEndExcluding": "23.0.6", + "matchCriteriaId": "3E241CF7-1D65-4BF8-8759-EADE0D0FBEEC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*", + "versionStartIncluding": "24.0.0", + "versionEndExcluding": "24.0.3", + "matchCriteriaId": "41C1FD5E-1403-4D81-81D7-FE84D39531DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/animate/apsb24-36.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/animate/apsb24-36.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30301.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30301.json index 052c950e70b..f2c000694fd 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30301.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30301.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30301", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-02T21:16:11.537", - "lastModified": "2024-05-03T12:50:34.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:26:39.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30574", + "matchCriteriaId": "7D65D856-CA8E-4CEB-A1E8-DE9884CE5BAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "23.008.20533", + "matchCriteriaId": "D358E246-F7D0-42F2-B1D0-EBB054C1D25D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30574", + "matchCriteriaId": "FC78934F-5834-40B5-B401-7D6484F9F7DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "23.008.20533", + "matchCriteriaId": "941E52F2-CB10-4D54-8635-D2BE80C21368" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-07.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-07.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30302.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30302.json index 4722ad5e75a..e0c62066fc0 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30302.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30302.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30302", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-02T21:16:11.747", - "lastModified": "2024-05-03T12:50:34.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:46:16.643", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30574", + "matchCriteriaId": "7D65D856-CA8E-4CEB-A1E8-DE9884CE5BAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "23.008.20533", + "matchCriteriaId": "D358E246-F7D0-42F2-B1D0-EBB054C1D25D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30574", + "matchCriteriaId": "FC78934F-5834-40B5-B401-7D6484F9F7DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "23.008.20533", + "matchCriteriaId": "941E52F2-CB10-4D54-8635-D2BE80C21368" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-07.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-07.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30303.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30303.json index ff89abce50a..e554ce992f5 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30303.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30303.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30303", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-02T21:16:11.943", - "lastModified": "2024-05-03T12:50:34.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:46:14.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30574", + "matchCriteriaId": "7D65D856-CA8E-4CEB-A1E8-DE9884CE5BAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "23.008.20533", + "matchCriteriaId": "D358E246-F7D0-42F2-B1D0-EBB054C1D25D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30574", + "matchCriteriaId": "FC78934F-5834-40B5-B401-7D6484F9F7DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "23.008.20533", + "matchCriteriaId": "941E52F2-CB10-4D54-8635-D2BE80C21368" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-07.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-07.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30304.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30304.json index db3dc071fd2..2a52b673d86 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30304.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30304.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30304", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-02T21:16:12.130", - "lastModified": "2024-05-03T12:50:34.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:46:12.677", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30574", + "matchCriteriaId": "7D65D856-CA8E-4CEB-A1E8-DE9884CE5BAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "23.008.20533", + "matchCriteriaId": "D358E246-F7D0-42F2-B1D0-EBB054C1D25D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30574", + "matchCriteriaId": "FC78934F-5834-40B5-B401-7D6484F9F7DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "23.008.20533", + "matchCriteriaId": "941E52F2-CB10-4D54-8635-D2BE80C21368" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-07.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-07.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30305.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30305.json index 02a0b09f67b..5388353d79b 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30305.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30305.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30305", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-02T21:16:12.327", - "lastModified": "2024-05-03T12:50:34.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:46:10.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30574", + "matchCriteriaId": "7D65D856-CA8E-4CEB-A1E8-DE9884CE5BAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "23.008.20533", + "matchCriteriaId": "D358E246-F7D0-42F2-B1D0-EBB054C1D25D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30574", + "matchCriteriaId": "FC78934F-5834-40B5-B401-7D6484F9F7DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "23.008.20533", + "matchCriteriaId": "941E52F2-CB10-4D54-8635-D2BE80C21368" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-07.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-07.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30306.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30306.json index 916e5186ea5..aeee45d7fc8 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30306.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30306.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30306", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-02T21:16:12.523", - "lastModified": "2024-05-03T12:50:34.250", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:46:08.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,77 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30574", + "matchCriteriaId": "7D65D856-CA8E-4CEB-A1E8-DE9884CE5BAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "23.008.20533", + "matchCriteriaId": "D358E246-F7D0-42F2-B1D0-EBB054C1D25D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30574", + "matchCriteriaId": "FC78934F-5834-40B5-B401-7D6484F9F7DC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "23.008.20533", + "matchCriteriaId": "941E52F2-CB10-4D54-8635-D2BE80C21368" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-07.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-07.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30308.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30308.json index e332af046c8..65bb779d1a3 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30308.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30308.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30308", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:13.137", - "lastModified": "2024-05-16T13:03:05.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:25:14.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:substance_3d_painter:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.0", + "matchCriteriaId": "CD315CE1-12F5-4A6B-AC9A-248B6230428C" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-31.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-31.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30309.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30309.json index a890b4aac63..95739b1d08a 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30309.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30309.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30309", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-16T09:15:13.377", - "lastModified": "2024-05-16T13:03:05.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:25:04.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:substance_3d_painter:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.0", + "matchCriteriaId": "CD315CE1-12F5-4A6B-AC9A-248B6230428C" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-31.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/substance3d_painter/apsb24-31.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30310.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30310.json index ba05df7d1e3..1cce96dfe71 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30310.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30310.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30310", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-15T10:15:10.093", - "lastModified": "2024-05-15T16:40:19.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:22:11.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,135 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "72903DD8-1DCC-4E83-A97C-6C8307132B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "9126C385-299B-4E56-A3AF-F325A54ACBA2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "FA2B6852-78F2-4C79-A7DB-CAEC44B93EC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "DEAA50D1-C7BA-4644-BA20-18D3870160EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "C5CC8784-11B6-47B9-901E-634FE1490B74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "F548DEAE-966F-476D-9202-14BF1FAD222D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30311.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30311.json index 1da9ee8303f..32c95259528 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30311.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30311.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30311", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-15T10:15:10.640", - "lastModified": "2024-06-10T18:15:30.757", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:22:13.143", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +51,151 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "72903DD8-1DCC-4E83-A97C-6C8307132B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "9126C385-299B-4E56-A3AF-F325A54ACBA2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "FA2B6852-78F2-4C79-A7DB-CAEC44B93EC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "DEAA50D1-C7BA-4644-BA20-18D3870160EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "C5CC8784-11B6-47B9-901E-634FE1490B74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "F548DEAE-966F-476D-9202-14BF1FAD222D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1946", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1946", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30312.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30312.json index 82e941bebb8..e6a30690c58 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30312.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30312.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30312", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-15T10:15:11.087", - "lastModified": "2024-06-10T18:15:30.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:22:15.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,14 +51,151 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "72903DD8-1DCC-4E83-A97C-6C8307132B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "9126C385-299B-4E56-A3AF-F325A54ACBA2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "FA2B6852-78F2-4C79-A7DB-CAEC44B93EC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "DEAA50D1-C7BA-4644-BA20-18D3870160EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "C5CC8784-11B6-47B9-901E-634FE1490B74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "F548DEAE-966F-476D-9202-14BF1FAD222D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1952", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-1952", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34094.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34094.json index 05c13eb5b1b..649957e96a8 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34094.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34094.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34094", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-15T10:15:11.433", - "lastModified": "2024-05-15T16:40:19.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:22:17.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -49,12 +49,147 @@ "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "72903DD8-1DCC-4E83-A97C-6C8307132B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "9126C385-299B-4E56-A3AF-F325A54ACBA2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "FA2B6852-78F2-4C79-A7DB-CAEC44B93EC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "DEAA50D1-C7BA-4644-BA20-18D3870160EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "C5CC8784-11B6-47B9-901E-634FE1490B74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "F548DEAE-966F-476D-9202-14BF1FAD222D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34095.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34095.json index 9f90bca2597..a41f7adf826 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34095.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34095.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34095", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-15T10:15:11.847", - "lastModified": "2024-05-15T16:40:19.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:22:18.937", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,135 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "72903DD8-1DCC-4E83-A97C-6C8307132B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "9126C385-299B-4E56-A3AF-F325A54ACBA2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "FA2B6852-78F2-4C79-A7DB-CAEC44B93EC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "DEAA50D1-C7BA-4644-BA20-18D3870160EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "C5CC8784-11B6-47B9-901E-634FE1490B74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "F548DEAE-966F-476D-9202-14BF1FAD222D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34096.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34096.json index 90011d32c7c..888b5019fda 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34096.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34096.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34096", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-15T10:15:12.303", - "lastModified": "2024-05-15T16:40:19.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:22:21.580", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,135 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "72903DD8-1DCC-4E83-A97C-6C8307132B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "9126C385-299B-4E56-A3AF-F325A54ACBA2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "FA2B6852-78F2-4C79-A7DB-CAEC44B93EC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "DEAA50D1-C7BA-4644-BA20-18D3870160EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "C5CC8784-11B6-47B9-901E-634FE1490B74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "F548DEAE-966F-476D-9202-14BF1FAD222D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34097.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34097.json index b7781479322..a28bd223720 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34097.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34097.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34097", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-15T10:15:12.740", - "lastModified": "2024-05-15T16:40:19.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:22:32.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -23,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,27 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.8, - "baseSeverity": "HIGH" + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,7 +62,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +71,135 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "72903DD8-1DCC-4E83-A97C-6C8307132B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "9126C385-299B-4E56-A3AF-F325A54ACBA2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "FA2B6852-78F2-4C79-A7DB-CAEC44B93EC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "DEAA50D1-C7BA-4644-BA20-18D3870160EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "C5CC8784-11B6-47B9-901E-634FE1490B74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "F548DEAE-966F-476D-9202-14BF1FAD222D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34098.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34098.json index 5254baaa72d..845178c471e 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34098.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34098.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34098", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-15T10:15:13.133", - "lastModified": "2024-05-15T16:40:19.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:22:06.980", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,19 +42,154 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "72903DD8-1DCC-4E83-A97C-6C8307132B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "9126C385-299B-4E56-A3AF-F325A54ACBA2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "FA2B6852-78F2-4C79-A7DB-CAEC44B93EC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "DEAA50D1-C7BA-4644-BA20-18D3870160EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "C5CC8784-11B6-47B9-901E-634FE1490B74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "F548DEAE-966F-476D-9202-14BF1FAD222D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-340xx/CVE-2024-34099.json b/CVE-2024/CVE-2024-340xx/CVE-2024-34099.json index dea96e743c9..6a0d63ab9ed 100644 --- a/CVE-2024/CVE-2024-340xx/CVE-2024-34099.json +++ b/CVE-2024/CVE-2024-340xx/CVE-2024-34099.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34099", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-15T10:15:13.997", - "lastModified": "2024-05-15T16:40:19.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:22:05.153", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,19 +42,154 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "72903DD8-1DCC-4E83-A97C-6C8307132B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "9126C385-299B-4E56-A3AF-F325A54ACBA2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "FA2B6852-78F2-4C79-A7DB-CAEC44B93EC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "DEAA50D1-C7BA-4644-BA20-18D3870160EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "C5CC8784-11B6-47B9-901E-634FE1490B74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "F548DEAE-966F-476D-9202-14BF1FAD222D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34100.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34100.json index 2d39445da4f..5f8c899ae77 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34100.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34100.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34100", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-15T10:15:14.393", - "lastModified": "2024-05-15T16:40:19.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:22:34.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,135 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "72903DD8-1DCC-4E83-A97C-6C8307132B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "9126C385-299B-4E56-A3AF-F325A54ACBA2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "FA2B6852-78F2-4C79-A7DB-CAEC44B93EC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "DEAA50D1-C7BA-4644-BA20-18D3870160EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "C5CC8784-11B6-47B9-901E-634FE1490B74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "F548DEAE-966F-476D-9202-14BF1FAD222D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-341xx/CVE-2024-34101.json b/CVE-2024/CVE-2024-341xx/CVE-2024-34101.json index 39e1b59f5c3..07a8b664aab 100644 --- a/CVE-2024/CVE-2024-341xx/CVE-2024-34101.json +++ b/CVE-2024/CVE-2024-341xx/CVE-2024-34101.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34101", "sourceIdentifier": "psirt@adobe.com", "published": "2024-05-15T10:15:14.827", - "lastModified": "2024-05-15T16:40:19.330", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T21:22:36.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,135 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "72903DD8-1DCC-4E83-A97C-6C8307132B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*", + "versionStartIncluding": "15.007.20033", + "versionEndExcluding": "24.002.20759", + "matchCriteriaId": "9126C385-299B-4E56-A3AF-F325A54ACBA2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "FA2B6852-78F2-4C79-A7DB-CAEC44B93EC4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30635", + "matchCriteriaId": "DEAA50D1-C7BA-4644-BA20-18D3870160EF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "C5CC8784-11B6-47B9-901E-634FE1490B74" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:acrobat_reader:*:*:*:*:classic:*:*:*", + "versionStartIncluding": "20.001.30002", + "versionEndExcluding": "20.005.30636", + "matchCriteriaId": "F548DEAE-966F-476D-9202-14BF1FAD222D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/acrobat/apsb24-29.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39392.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39392.json index 0c99f8c3c8b..14c4977a676 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39392.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39392.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39392", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-02T07:16:08.883", - "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:17:30.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -42,19 +42,74 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.5.3", + "matchCriteriaId": "2D5EBEA0-C4C4-4D20-8420-E00C50E1ABC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "19.0", + "versionEndExcluding": "19.4", + "matchCriteriaId": "D1D1DA47-DAE1-4805-B396-DAB13BE2A620" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb24-48.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39396.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39396.json index 39781254648..507ef388ec8 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39396.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39396.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39396", "sourceIdentifier": "psirt@adobe.com", "published": "2024-08-02T07:16:09.270", - "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:17:32.997", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +51,55 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.5.3", + "matchCriteriaId": "2D5EBEA0-C4C4-4D20-8420-E00C50E1ABC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "19.0", + "versionEndExcluding": "19.4", + "matchCriteriaId": "D1D1DA47-DAE1-4805-B396-DAB13BE2A620" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb24-48.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39890.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39890.json new file mode 100644 index 00000000000..0303d724233 --- /dev/null +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39890.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-39890", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-02T21:15:10.483", + "lastModified": "2024-12-02T21:15:10.483", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Samsung Mobile Processor, Wearable Processor, and Modem Exynos 9820, 9825, 980, 990, 850, 1080, 2100, 1280, 2200, 1330, 1380, 1480, 2400, 9110, W920, W930, W1000, Modem 5123, Modem 5300. The baseband software does not properly check the length specified by the CC (Call Control). This can lead to an Out-of-Bounds write." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://semiconductor.samsung.com/support/quality-support/product-security-updates/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-418xx/CVE-2024-41836.json b/CVE-2024/CVE-2024-418xx/CVE-2024-41836.json index 7b454c3ec8f..9bf9d1de7ff 100644 --- a/CVE-2024/CVE-2024-418xx/CVE-2024-41836.json +++ b/CVE-2024/CVE-2024-418xx/CVE-2024-41836.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41836", "sourceIdentifier": "psirt@adobe.com", "published": "2024-07-23T12:15:10.240", - "lastModified": "2024-07-24T12:55:13.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:17:28.253", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,10 +19,12 @@ "cvssMetricV31": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -30,9 +32,27 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", - "availabilityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "baseScore": 5.5, - "baseSeverity": "MEDIUM" + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 3.6 @@ -42,7 +62,7 @@ "weaknesses": [ { "source": "psirt@adobe.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,10 +71,62 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.5.3", + "matchCriteriaId": "2D5EBEA0-C4C4-4D20-8420-E00C50E1ABC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*", + "versionStartIncluding": "19.0", + "versionEndExcluding": "19.4", + "matchCriteriaId": "D1D1DA47-DAE1-4805-B396-DAB13BE2A620" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/indesign/apsb24-48.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://helpx.adobe.com/security/products/indesign/apsb24-48.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-451xx/CVE-2024-45153.json b/CVE-2024/CVE-2024-451xx/CVE-2024-45153.json index 5dc44f82675..963bd6e7be8 100644 --- a/CVE-2024/CVE-2024-451xx/CVE-2024-45153.json +++ b/CVE-2024/CVE-2024-451xx/CVE-2024-45153.json @@ -2,8 +2,8 @@ "id": "CVE-2024-45153", "sourceIdentifier": "psirt@adobe.com", "published": "2024-10-07T13:15:15.603", - "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:44:29.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -23,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.21.0", + "matchCriteriaId": "AAF67BB0-572D-4DCA-9CEB-C30D5D8FDB48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5.0", + "matchCriteriaId": "5FF97DFB-A8E0-4311-A6EA-303A4D8612C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49523.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49523.json index 0fc98464863..f88b5f75019 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49523.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49523.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49523", "sourceIdentifier": "psirt@adobe.com", "published": "2024-11-07T22:15:20.977", - "lastModified": "2024-11-08T19:01:03.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:44:26.157", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -23,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.21.0", + "matchCriteriaId": "AAF67BB0-572D-4DCA-9CEB-C30D5D8FDB48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5.0", + "matchCriteriaId": "5FF97DFB-A8E0-4311-A6EA-303A4D8612C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49524.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49524.json index e2f78da739e..cc084bccf20 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49524.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49524.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49524", "sourceIdentifier": "psirt@adobe.com", "published": "2024-11-07T22:15:21.200", - "lastModified": "2024-11-08T19:01:03.880", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2024-12-02T22:44:21.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -23,6 +23,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -30,9 +32,7 @@ "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", - "availabilityImpact": "NONE", - "baseScore": 5.4, - "baseSeverity": "MEDIUM" + "availabilityImpact": "NONE" }, "exploitabilityScore": 2.3, "impactScore": 2.7 @@ -51,10 +51,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:-:*:*:*", + "versionEndExcluding": "6.5.21.0", + "matchCriteriaId": "AAF67BB0-572D-4DCA-9CEB-C30D5D8FDB48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:adobe:experience_manager:*:*:*:*:aem_cloud_service:*:*:*", + "versionEndExcluding": "2024.5.0", + "matchCriteriaId": "5FF97DFB-A8E0-4311-A6EA-303A4D8612C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://helpx.adobe.com/security/products/experience-manager/apsb24-28.html", - "source": "psirt@adobe.com" + "source": "psirt@adobe.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49581.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49581.json new file mode 100644 index 00000000000..134aa403fb1 --- /dev/null +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49581.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-49581", + "sourceIdentifier": "cve-coordination@palantir.com", + "published": "2024-12-02T21:15:10.830", + "lastModified": "2024-12-02T21:15:10.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Restricted Views backed objects (OSV1) could be bypassed under specific circumstances due to a software bug, this could have allowed users that didn't have permission to see such objects to view them via Object Explorer directly. This software bug did not impact or otherwise make data available across organizational boundaries nor did it allow for data to be viewed or accessed by unauthenticated users. \nThe affected service have been patched and automatically deployed to all Apollo-managed Foundry instances." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@palantir.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@palantir.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://palantir.safebase.us/?tcuUid=b60db1ee-4b1a-475d-848e-c5a670a0da16", + "source": "cve-coordination@palantir.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-527xx/CVE-2024-52725.json b/CVE-2024/CVE-2024-527xx/CVE-2024-52725.json index a27726846c7..dfeba584393 100644 --- a/CVE-2024/CVE-2024-527xx/CVE-2024-52725.json +++ b/CVE-2024/CVE-2024-527xx/CVE-2024-52725.json @@ -2,16 +2,55 @@ "id": "CVE-2024-52725", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-20T17:15:18.867", - "lastModified": "2024-11-20T17:15:18.867", - "vulnStatus": "Received", + "lastModified": "2024-12-02T21:15:10.977", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SemCms v4.8 was discovered to contain a SQL injection vulnerability. This allows an attacker to execute arbitrary code via the ldgid parameter in the SEMCMS_SeoAndTag.php component." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que SemCms v4.8 contiene una vulnerabilidad de inyecci\u00f3n SQL que permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s del par\u00e1metro ldgid en el componente SEMCMS_SeoAndTag.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://semcms.com", diff --git a/CVE-2024/CVE-2024-533xx/CVE-2024-53375.json b/CVE-2024/CVE-2024-533xx/CVE-2024-53375.json new file mode 100644 index 00000000000..7122d79b7dd --- /dev/null +++ b/CVE-2024/CVE-2024-533xx/CVE-2024-53375.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-53375", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-02T22:15:10.507", + "lastModified": "2024-12-02T22:15:10.507", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Authenticated remote code execution (RCE) vulnerabilities affect TP-Link Archer, Deco, and Tapo series routers. A vulnerability exists in the \"tmp_get_sites\" function of the HomeShield functionality provided by TP-Link. This vulnerability is still exploitable without the installation or activation of the HomeShield functionality." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/ThottySploity/CVE-2024-53375", + "source": "cve@mitre.org" + }, + { + "url": "https://thottysploity.github.io/posts/cve-2024-53375/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-534xx/CVE-2024-53477.json b/CVE-2024/CVE-2024-534xx/CVE-2024-53477.json new file mode 100644 index 00000000000..a87c22f21d8 --- /dev/null +++ b/CVE-2024/CVE-2024-534xx/CVE-2024-53477.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-53477", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-02T21:15:11.217", + "lastModified": "2024-12-02T21:15:11.217", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "JFinal CMS 5.1.0 is vulnerable to Command Execution via unauthorized execution of deserialization in the file ApiForm.java" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/kaoniniang2/c2deceea281fcd0aec5a8165183be3c1", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/jflyfox/jfinal_cms/releases/tag/v5.1.0", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53938.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53938.json new file mode 100644 index 00000000000..10ef8baf089 --- /dev/null +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53938.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-53938", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-02T22:15:10.633", + "lastModified": "2024-12-02T22:15:10.633", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0) devices. The TELNET service is enabled by default and exposed over the LAN. The root account is accessible without a password, allowing attackers to achieve full control over the router remotely without any authentication." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/actuator/cve/blob/main/Victure/CVE-2024-53938.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/actuator/cve/blob/main/Victure/Victure_RX1800_Security_Report.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53939.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53939.json new file mode 100644 index 00000000000..932570e1bf0 --- /dev/null +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53939.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-53939", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-02T22:15:10.757", + "lastModified": "2024-12-02T22:15:10.757", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0) devices. The /cgi-bin/luci/admin/opsw/Dual_freq_un_apple endpoint is vulnerable to command injection through the 2.4 GHz and 5 GHz name parameters, allowing an attacker to execute arbitrary commands on the device (with root-level permissions) via crafted input." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/actuator/cve/blob/main/Victure/CVE-2024-53939.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/actuator/cve/blob/main/Victure/RX1800-EN_V1.0.0_r12_110933-CMD-INJ-WIFI-SHELL.gif", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/actuator/cve/blob/main/Victure/Victure_RX1800_Security_Report.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53940.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53940.json new file mode 100644 index 00000000000..9dbb5ae46c3 --- /dev/null +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53940.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-53940", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-02T22:15:10.880", + "lastModified": "2024-12-02T22:15:10.880", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0) devices. Certain /cgi-bin/luci/admin endpoints are vulnerable to command injection. Attackers can exploit this by sending crafted payloads through parameters intended for the ping utility, enabling arbitrary command execution with root-level permissions on the device." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/actuator/cve/blob/main/Victure/CVE-2024-53940.txt", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53941.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53941.json new file mode 100644 index 00000000000..0aaf3bea81b --- /dev/null +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53941.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-53941", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-12-02T22:15:10.993", + "lastModified": "2024-12-02T22:15:10.993", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Victure RX1800 WiFi 6 Router (software EN_V1.0.0_r12_110933, hardware 1.0) devices. A remote attacker (in proximity to a Wi-Fi network) can derive the default Wi-Fi PSK value via the last 4 octets of the BSSID." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/actuator/cve/blob/main/Victure/CVE-2024-53941.txt", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/actuator/cve/blob/main/Victure/Victure_RX1800_Security_Report.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53985.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53985.json new file mode 100644 index 00000000000..9b99efe232b --- /dev/null +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53985.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-53985", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-02T22:15:11.197", + "lastModified": "2024-12-02T22:15:11.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. There is a possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer 1.6.0 when used with Rails >= 7.1.0 and Nokogiri < 1.15.7, or 1.16.x < 1.16.8. The XSS vulnerability with certain configurations of Rails::HTML::Sanitizer may allow an attacker to inject content if HTML5 sanitization is enabled and the application developer has overridden the sanitizer's allowed tags with both \"math\" and \"style\" elements or both both \"svg\" and \"style\" elements. This vulnerability is fixed in 1.6.1." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/rails/rails-html-sanitizer/commit/b0220b8850d52199a15f83c472d175a4122dd7b1", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/rails/rails-html-sanitizer/commit/cd18b0ef00aad1d4a9e1c5d860cd23f80f63c505", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-w8gc-x259-rc7x", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53986.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53986.json new file mode 100644 index 00000000000..60d3466e3c0 --- /dev/null +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53986.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-53986", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-02T22:15:11.343", + "lastModified": "2024-12-02T22:15:11.343", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. There is a possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer 1.6.0 when used with Rails >= 7.1.0. A possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer may allow an attacker to inject content if HTML5 sanitization is enabled and the application developer has overridden the sanitizer's allowed tags where the \"math\" and \"style\" elements are both explicitly allowed. This vulnerability is fixed in 1.6.1." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/rails/rails-html-sanitizer/commit/f02ffbb8465e73920b6de0da940f5530f855965e", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-638j-pmjw-jq48", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53987.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53987.json new file mode 100644 index 00000000000..03da047ac5c --- /dev/null +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53987.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-53987", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-02T22:15:11.473", + "lastModified": "2024-12-02T22:15:11.473", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. There is a possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer 1.6.0 when used with Rails >= 7.1.0. A possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer may allow an attacker to inject content if HTML5 sanitization is enabled and the application developer has overridden the sanitizer's allowed tags where the \"style\" element is explicitly allowed and the \"svg\" or \"math\" element is not allowed. This vulnerability is fixed in 1.6.1." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/rails/rails-html-sanitizer/commit/f02ffbb8465e73920b6de0da940f5530f855965e", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-2x5m-9ch4-qgrr", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53988.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53988.json new file mode 100644 index 00000000000..579e6a28cc0 --- /dev/null +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53988.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-53988", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-02T22:15:11.610", + "lastModified": "2024-12-02T22:15:11.610", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. There is a possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer 1.6.0 when used with Rails >= 7.1.0. A possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer may allow an attacker to inject content if HTML5 sanitization is enabled and the application developer has overridden the sanitizer's allowed tags where the \"math\", \"mtext\", \"table\", and \"style\" elements are allowed and either either \"mglyph\" or \"malignmark\" are allowed. This vulnerability is fixed in 1.6.1." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/rails/rails-html-sanitizer/commit/a0a3e8b76b696446ffc6bffcff3bc7b7c6393c72", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-cfjx-w229-hgx5", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53989.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53989.json new file mode 100644 index 00000000000..0fde206552c --- /dev/null +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53989.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-53989", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-12-02T21:15:11.433", + "lastModified": "2024-12-02T22:15:11.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "rails-html-sanitizer is responsible for sanitizing HTML fragments in Rails applications. There is a possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer 1.6.0 when used with Rails >= 7.1.0. A possible XSS vulnerability with certain configurations of Rails::HTML::Sanitizer may allow an attacker to inject content if HTML5 sanitization is enabled and the application developer has overridden the sanitizer's allowed tags for the the \"noscript\" element. This vulnerability is fixed in 1.6.1." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/rails/rails-html-sanitizer/commit/16251735e36ebdc302e2f90f2a39cad56879414f", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/rails/rails-html-sanitizer/security/advisories/GHSA-rxv5-gxqc-xx8g", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index a03cbb1c560..6be45c7ece2 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-02T21:00:30.701836+00:00 +2024-12-02T23:00:32.388797+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-02T20:43:17.603000+00:00 +2024-12-02T22:44:29.430000+00:00 ``` ### Last Data Feed Release @@ -33,47 +33,67 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -271920 +271943 ``` ### CVEs added in the last Commit -Recently added CVEs: `8` +Recently added CVEs: `23` -- [CVE-2018-9380](CVE-2018/CVE-2018-93xx/CVE-2018-9380.json) (`2024-12-02T20:15:04.443`) -- [CVE-2018-9381](CVE-2018/CVE-2018-93xx/CVE-2018-9381.json) (`2024-12-02T20:15:05.440`) -- [CVE-2024-39343](CVE-2024/CVE-2024-393xx/CVE-2024-39343.json) (`2024-12-02T20:15:06.993`) -- [CVE-2024-52724](CVE-2024/CVE-2024-527xx/CVE-2024-52724.json) (`2024-12-02T19:15:10.697`) -- [CVE-2024-53484](CVE-2024/CVE-2024-534xx/CVE-2024-53484.json) (`2024-12-02T19:15:10.820`) -- [CVE-2024-53617](CVE-2024/CVE-2024-536xx/CVE-2024-53617.json) (`2024-12-02T19:15:10.940`) -- [CVE-2024-53900](CVE-2024/CVE-2024-539xx/CVE-2024-53900.json) (`2024-12-02T20:15:08.347`) -- [CVE-2024-5890](CVE-2024/CVE-2024-58xx/CVE-2024-5890.json) (`2024-12-02T19:15:12.357`) +- [CVE-2018-9376](CVE-2018/CVE-2018-93xx/CVE-2018-9376.json) (`2024-12-02T21:15:09.107`) +- [CVE-2018-9413](CVE-2018/CVE-2018-94xx/CVE-2018-9413.json) (`2024-12-02T21:15:09.653`) +- [CVE-2018-9414](CVE-2018/CVE-2018-94xx/CVE-2018-9414.json) (`2024-12-02T21:15:09.757`) +- [CVE-2018-9418](CVE-2018/CVE-2018-94xx/CVE-2018-9418.json) (`2024-12-02T22:15:08.727`) +- [CVE-2018-9423](CVE-2018/CVE-2018-94xx/CVE-2018-9423.json) (`2024-12-02T22:15:08.827`) +- [CVE-2018-9426](CVE-2018/CVE-2018-94xx/CVE-2018-9426.json) (`2024-12-02T22:15:08.917`) +- [CVE-2018-9429](CVE-2018/CVE-2018-94xx/CVE-2018-9429.json) (`2024-12-02T22:15:09.013`) +- [CVE-2018-9430](CVE-2018/CVE-2018-94xx/CVE-2018-9430.json) (`2024-12-02T22:15:09.113`) +- [CVE-2018-9431](CVE-2018/CVE-2018-94xx/CVE-2018-9431.json) (`2024-12-02T22:15:09.210`) +- [CVE-2018-9435](CVE-2018/CVE-2018-94xx/CVE-2018-9435.json) (`2024-12-02T22:15:09.310`) +- [CVE-2024-39890](CVE-2024/CVE-2024-398xx/CVE-2024-39890.json) (`2024-12-02T21:15:10.483`) +- [CVE-2024-49581](CVE-2024/CVE-2024-495xx/CVE-2024-49581.json) (`2024-12-02T21:15:10.830`) +- [CVE-2024-53375](CVE-2024/CVE-2024-533xx/CVE-2024-53375.json) (`2024-12-02T22:15:10.507`) +- [CVE-2024-53477](CVE-2024/CVE-2024-534xx/CVE-2024-53477.json) (`2024-12-02T21:15:11.217`) +- [CVE-2024-53938](CVE-2024/CVE-2024-539xx/CVE-2024-53938.json) (`2024-12-02T22:15:10.633`) +- [CVE-2024-53939](CVE-2024/CVE-2024-539xx/CVE-2024-53939.json) (`2024-12-02T22:15:10.757`) +- [CVE-2024-53940](CVE-2024/CVE-2024-539xx/CVE-2024-53940.json) (`2024-12-02T22:15:10.880`) +- [CVE-2024-53941](CVE-2024/CVE-2024-539xx/CVE-2024-53941.json) (`2024-12-02T22:15:10.993`) +- [CVE-2024-53985](CVE-2024/CVE-2024-539xx/CVE-2024-53985.json) (`2024-12-02T22:15:11.197`) +- [CVE-2024-53986](CVE-2024/CVE-2024-539xx/CVE-2024-53986.json) (`2024-12-02T22:15:11.343`) +- [CVE-2024-53987](CVE-2024/CVE-2024-539xx/CVE-2024-53987.json) (`2024-12-02T22:15:11.473`) +- [CVE-2024-53988](CVE-2024/CVE-2024-539xx/CVE-2024-53988.json) (`2024-12-02T22:15:11.610`) +- [CVE-2024-53989](CVE-2024/CVE-2024-539xx/CVE-2024-53989.json) (`2024-12-02T21:15:11.433`) ### CVEs modified in the last Commit -Recently modified CVEs: `20` +Recently modified CVEs: `66` -- [CVE-2022-4395](CVE-2022/CVE-2022-43xx/CVE-2022-4395.json) (`2024-12-02T19:15:06.587`) -- [CVE-2023-36357](CVE-2023/CVE-2023-363xx/CVE-2023-36357.json) (`2024-12-02T19:15:07.480`) -- [CVE-2023-44341](CVE-2023/CVE-2023-443xx/CVE-2023-44341.json) (`2024-12-02T20:14:51.967`) -- [CVE-2023-45727](CVE-2023/CVE-2023-457xx/CVE-2023-45727.json) (`2024-12-02T19:15:08.390`) -- [CVE-2024-1674](CVE-2024/CVE-2024-16xx/CVE-2024-1674.json) (`2024-12-02T19:51:32.163`) -- [CVE-2024-1675](CVE-2024/CVE-2024-16xx/CVE-2024-1675.json) (`2024-12-02T19:54:08.677`) -- [CVE-2024-20768](CVE-2024/CVE-2024-207xx/CVE-2024-20768.json) (`2024-12-02T20:20:27.637`) -- [CVE-2024-30283](CVE-2024/CVE-2024-302xx/CVE-2024-30283.json) (`2024-12-02T20:43:17.603`) -- [CVE-2024-30286](CVE-2024/CVE-2024-302xx/CVE-2024-30286.json) (`2024-12-02T20:43:09.190`) -- [CVE-2024-30287](CVE-2024/CVE-2024-302xx/CVE-2024-30287.json) (`2024-12-02T20:43:02.727`) -- [CVE-2024-30288](CVE-2024/CVE-2024-302xx/CVE-2024-30288.json) (`2024-12-02T20:42:53.247`) -- [CVE-2024-30289](CVE-2024/CVE-2024-302xx/CVE-2024-30289.json) (`2024-12-02T20:42:43.033`) -- [CVE-2024-30290](CVE-2024/CVE-2024-302xx/CVE-2024-30290.json) (`2024-12-02T20:42:22.897`) -- [CVE-2024-30291](CVE-2024/CVE-2024-302xx/CVE-2024-30291.json) (`2024-12-02T20:42:16.157`) -- [CVE-2024-30292](CVE-2024/CVE-2024-302xx/CVE-2024-30292.json) (`2024-12-02T20:42:07.283`) -- [CVE-2024-30307](CVE-2024/CVE-2024-303xx/CVE-2024-30307.json) (`2024-12-02T20:16:16.277`) -- [CVE-2024-35451](CVE-2024/CVE-2024-354xx/CVE-2024-35451.json) (`2024-12-02T20:15:06.700`) -- [CVE-2024-53364](CVE-2024/CVE-2024-533xx/CVE-2024-53364.json) (`2024-12-02T20:15:07.487`) -- [CVE-2024-53623](CVE-2024/CVE-2024-536xx/CVE-2024-53623.json) (`2024-12-02T20:15:07.917`) -- [CVE-2024-53861](CVE-2024/CVE-2024-538xx/CVE-2024-53861.json) (`2024-12-02T19:15:12.150`) +- [CVE-2024-30302](CVE-2024/CVE-2024-303xx/CVE-2024-30302.json) (`2024-12-02T21:46:16.643`) +- [CVE-2024-30303](CVE-2024/CVE-2024-303xx/CVE-2024-30303.json) (`2024-12-02T21:46:14.537`) +- [CVE-2024-30304](CVE-2024/CVE-2024-303xx/CVE-2024-30304.json) (`2024-12-02T21:46:12.677`) +- [CVE-2024-30305](CVE-2024/CVE-2024-303xx/CVE-2024-30305.json) (`2024-12-02T21:46:10.833`) +- [CVE-2024-30306](CVE-2024/CVE-2024-303xx/CVE-2024-30306.json) (`2024-12-02T21:46:08.757`) +- [CVE-2024-30308](CVE-2024/CVE-2024-303xx/CVE-2024-30308.json) (`2024-12-02T22:25:14.460`) +- [CVE-2024-30309](CVE-2024/CVE-2024-303xx/CVE-2024-30309.json) (`2024-12-02T22:25:04.283`) +- [CVE-2024-30310](CVE-2024/CVE-2024-303xx/CVE-2024-30310.json) (`2024-12-02T21:22:11.137`) +- [CVE-2024-30311](CVE-2024/CVE-2024-303xx/CVE-2024-30311.json) (`2024-12-02T21:22:13.143`) +- [CVE-2024-30312](CVE-2024/CVE-2024-303xx/CVE-2024-30312.json) (`2024-12-02T21:22:15.280`) +- [CVE-2024-34094](CVE-2024/CVE-2024-340xx/CVE-2024-34094.json) (`2024-12-02T21:22:17.230`) +- [CVE-2024-34095](CVE-2024/CVE-2024-340xx/CVE-2024-34095.json) (`2024-12-02T21:22:18.937`) +- [CVE-2024-34096](CVE-2024/CVE-2024-340xx/CVE-2024-34096.json) (`2024-12-02T21:22:21.580`) +- [CVE-2024-34097](CVE-2024/CVE-2024-340xx/CVE-2024-34097.json) (`2024-12-02T21:22:32.400`) +- [CVE-2024-34098](CVE-2024/CVE-2024-340xx/CVE-2024-34098.json) (`2024-12-02T21:22:06.980`) +- [CVE-2024-34099](CVE-2024/CVE-2024-340xx/CVE-2024-34099.json) (`2024-12-02T21:22:05.153`) +- [CVE-2024-34100](CVE-2024/CVE-2024-341xx/CVE-2024-34100.json) (`2024-12-02T21:22:34.273`) +- [CVE-2024-34101](CVE-2024/CVE-2024-341xx/CVE-2024-34101.json) (`2024-12-02T21:22:36.350`) +- [CVE-2024-39392](CVE-2024/CVE-2024-393xx/CVE-2024-39392.json) (`2024-12-02T22:17:30.700`) +- [CVE-2024-39396](CVE-2024/CVE-2024-393xx/CVE-2024-39396.json) (`2024-12-02T22:17:32.997`) +- [CVE-2024-41836](CVE-2024/CVE-2024-418xx/CVE-2024-41836.json) (`2024-12-02T22:17:28.253`) +- [CVE-2024-45153](CVE-2024/CVE-2024-451xx/CVE-2024-45153.json) (`2024-12-02T22:44:29.430`) +- [CVE-2024-49523](CVE-2024/CVE-2024-495xx/CVE-2024-49523.json) (`2024-12-02T22:44:26.157`) +- [CVE-2024-49524](CVE-2024/CVE-2024-495xx/CVE-2024-49524.json) (`2024-12-02T22:44:21.850`) +- [CVE-2024-52725](CVE-2024/CVE-2024-527xx/CVE-2024-52725.json) (`2024-12-02T21:15:10.977`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 3a0f0c4b679..2a8353be2d9 100644 --- a/_state.csv +++ b/_state.csv @@ -126936,26 +126936,36 @@ CVE-2018-9370,0,0,ae53e355aa0524bf60f4d348ee71944e38f6c6c59f44b44474743ec3d5eda5 CVE-2018-9371,0,0,dce1635a39fc875c3a6010e78992681138a4af74d8f57da615da4dd9d5becbf0,2024-11-22T21:25:48.853000 CVE-2018-9372,0,0,5241fff5e37359ca4d40d4d0ef51eddfb8e42f03921d8e136fe460686e5ef5c0,2024-11-19T21:56:45.533000 CVE-2018-9374,0,0,b5c9257b4379d5ec059f557b277f9ab8f86bedde18eae66967ba271cf76e5f31,2024-11-29T22:15:06.327000 +CVE-2018-9376,1,1,ca8cc45f967ea36522e5828a1c658a55ab0d2776b3d6bb7cde3ad78582f34eb1,2024-12-02T21:15:09.107000 CVE-2018-9377,0,0,e4a0a8bd1ac9734ae148f92ac66c4e7d1d997837e82ad8c47cc9f88531e107dc,2024-11-29T22:15:06.483000 -CVE-2018-9380,1,1,0cc9720b8e47ec2d5bd020aeebcb8430890e5213bf61503748dc373711e983f7,2024-12-02T20:15:04.443000 -CVE-2018-9381,1,1,8de3083231df9c7abf0f8830119091ef6106ff8e1b61d1198db8d22f7c36bfc3,2024-12-02T20:15:05.440000 +CVE-2018-9380,0,1,e6fbe63ca9b9f94eed7d3113363726fcbc9fd32f362f8de02b396f07c6dcdef2,2024-12-02T22:15:08.237000 +CVE-2018-9381,0,1,6d23302b8a97082a76241d451afb14bf577899eb10a0c0816bc7882dabaf95b5,2024-12-02T22:15:08.493000 CVE-2018-9385,0,0,a04751693f742cd9abca42cb6fa43b673fbcc24bbf305f54b6cb4b8b3d812bd4,2018-12-12T21:37:19.207000 CVE-2018-9409,0,0,ebcda6f7e24e6f698fa6ccd47d9f60bf8bc1c7442cbc31f290fa0b923152d8a0,2024-11-20T20:35:04.480000 CVE-2018-9410,0,0,67eeebcbba32822e3887bccb33fae18efb160aec58d1cb7ea07ebe4be1e04e64,2024-11-22T22:28:51.533000 CVE-2018-9411,0,0,e176a59ad08b39fe1e6853540b0f5379b5df64366124dc7ef673195cfcdd7002,2024-11-22T22:30:25.617000 CVE-2018-9412,0,0,8f50260d1e8b65957e2cb05a966f6136a2dee829d699d386c0ca2a63e589e17c,2024-11-23T00:56:14.623000 +CVE-2018-9413,1,1,c96c3efa9a30492ac98f18f0022a88627e5c62aad3ceec520d5c6c6e2465f89e,2024-12-02T21:15:09.653000 +CVE-2018-9414,1,1,ff411e1453b6d328c9937c931929b28e4db55740686db80ad8901a21ffa183de,2024-12-02T21:15:09.757000 CVE-2018-9415,0,0,ed7c0b7190441eec3d5a1d3e25bd99949f1ee50503dc12cac8466031b55d4227,2018-12-12T21:36:26.237000 CVE-2018-9417,0,0,d14f6cd2cf635e766e90a973936df96c48a6f5ddbb0b86d066715267e8c688d6,2024-11-22T22:08:46.630000 +CVE-2018-9418,1,1,86b4dfa22a3219c3f9d5034a4757f9ff995bbacf3a2fc82a5cbc74c8c40e90ee,2024-12-02T22:15:08.727000 CVE-2018-9419,0,0,c18c29ca18cc221fa9a8a8c05cd34721a5a1c5a074ea2d5aabaa414db75bd8e3,2024-11-22T22:07:33.540000 CVE-2018-9420,0,0,66fc0f4acf821ffb8066676839446733124360b845f6c5c453f18b9e6c40661b,2024-11-22T22:06:41.107000 CVE-2018-9421,0,0,52ba484018943b73a71b64289663d9ef88b221366cb0d59b8c78fc2228d30f11,2024-11-22T22:05:41.297000 CVE-2018-9422,0,0,b22e8a2bc8d5adc29f8bdfbdd7dc1e05001e055bf24c72ec70cb010b3e16095b,2019-08-19T20:15:10.567000 +CVE-2018-9423,1,1,6429a61812c1530f111bfc1063779ac291054cf489c4cfbb06a56a9e664d5689,2024-12-02T22:15:08.827000 CVE-2018-9424,0,0,071ed5e03e559b374e1e944c883e1f76b850eb82b86ac5533496dbfc405cbff1,2024-11-22T21:26:59.867000 CVE-2018-9425,0,0,8bb9fe5d8897d0c1ee991ea8f216f809874791aaa9aa06201b1a1ea7da995c7f,2019-10-02T12:37:35.567000 +CVE-2018-9426,1,1,e8a0b43c9e2f9cc03e9b91e751e2505103dbd9f5b1a6bdb4f3dd8276e43afc78,2024-12-02T22:15:08.917000 CVE-2018-9427,0,0,5486e933f7e8fc1bc0bff04d24f293fbfbce11d5548d03ed415827a8763827af,2018-12-18T17:33:53.610000 CVE-2018-9428,0,0,3b5ce7df2963b04e24e60241e4f43e4dd0d84039a25f956359e2baadc53434c2,2024-11-22T22:04:52.717000 +CVE-2018-9429,1,1,b9892d5139a31082ae9ac512e281aa4db068f938e8c67575e2043284b5edb0f1,2024-12-02T22:15:09.013000 +CVE-2018-9430,1,1,1e879fd9b3be4c0280c3eecdb5931334d471944ac8149a8f3ac9c579177562bc,2024-12-02T22:15:09.113000 +CVE-2018-9431,1,1,2a681870d64666e3d9e71af5fcfdf2ad31bc131ecf5e0b1626b97134f6597bf4,2024-12-02T22:15:09.210000 CVE-2018-9432,0,0,df057bd665a08e609e489b18ec44ef01d41efdbc35ca27192e24b02968fc98c8,2024-11-22T21:11:15.770000 CVE-2018-9433,0,0,7eb797c3d8bd260ec2ed1dbbfc9bf065ef873715e18a47f18908c92e08feb4be,2024-11-22T21:13:28.557000 +CVE-2018-9435,1,1,ee1327bfa3619abc31a585102da866f3ca24670ce83ca477b60091514b63e7a3,2024-12-02T22:15:09.310000 CVE-2018-9436,0,0,c8a247a24c83592bc549534ae7eaaefb20fd255e25c6b61b4321b051f8f1edfb,2018-12-12T21:25:58.460000 CVE-2018-9437,0,0,2fe7c032447c4aee2d71cdb7773a63d008648862a1635a0096aea7442fa776a0,2018-12-12T21:23:38.690000 CVE-2018-9438,0,0,9dbca74422ec533040b998a41e1e9831a0ef457b53367dc472271daa39aa9ea8,2019-10-03T00:03:26.223000 @@ -209363,7 +209373,7 @@ CVE-2022-43946,0,0,9454164159dbb10a9ad61a906f578ee6e77f1dad056c3ea482f9847b26cc9 CVE-2022-43947,0,0,930ca17bfba7d7c5edef81b50c4bed53316f88b588a9e915ff55d08fcd99e2fd,2023-11-07T03:54:10.187000 CVE-2022-43948,0,0,82504337f08fc51bc776a2c1da2d5aec082839077b37667df962adfb690361e8,2023-11-07T03:54:10.427000 CVE-2022-43949,0,0,6c72abd88f0c5e9d46e60e364b0f8a386336076428497ae4da3e94d618f2f9aa,2023-11-07T03:54:10.637000 -CVE-2022-4395,0,1,467e57fab841a895d97de8d3708cae1f54123076e5e5abcb766a29f9a85bd41f,2024-12-02T19:15:06.587000 +CVE-2022-4395,0,0,467e57fab841a895d97de8d3708cae1f54123076e5e5abcb766a29f9a85bd41f,2024-12-02T19:15:06.587000 CVE-2022-43950,0,0,6742201e2da288c6f1446a59a373009d757b714c07a820521842aa35592f0c05,2023-11-07T03:54:10.837000 CVE-2022-43951,0,0,496c56822957e4145787a5dab7a852893545ed21d01397666cae306817ad2e07,2023-11-07T03:54:11.063000 CVE-2022-43952,0,0,76274f021962892a140dc456f478628abd811f10262c8873bea05e9f8492c4e4,2023-11-07T03:54:11.290000 @@ -227735,7 +227745,7 @@ CVE-2023-36351,0,0,4e41961541ac78849f8aab63adfbcd0727b537f75956145c83242ef2d9af6 CVE-2023-36354,0,0,3012502699f5ab60433e9398c145155b6da1a5364596cc6383c9819a14af809b,2023-06-29T20:45:07.187000 CVE-2023-36355,0,0,ffe90f8a7e879810f87e5e896a76276491565a663822003d1bb7fff0b535aff0,2023-07-04T17:15:10.850000 CVE-2023-36356,0,0,b5d4bc3aef30a2b056aa0749109155967237df455fbc3d3a2c517ad3ef391555,2023-06-30T16:18:59.383000 -CVE-2023-36357,0,1,7f8ec13898de07f57c7e8e66d0c8d2ff725c2b13b80d89d540b0324101332414,2024-12-02T19:15:07.480000 +CVE-2023-36357,0,0,7f8ec13898de07f57c7e8e66d0c8d2ff725c2b13b80d89d540b0324101332414,2024-12-02T19:15:07.480000 CVE-2023-36358,0,0,e8205291295a9879a960f26b0fc8aa8de236189b0ca638e99ab394ed48966169,2023-06-30T13:47:39.297000 CVE-2023-36359,0,0,e37b9be911e04ec3ff31e7ef9f5eb59833aaea9fd5ca5c06d32cd8c864c3b67a,2023-06-29T20:44:26.790000 CVE-2023-3636,0,0,614dee89b74d1f88be51816c6b660ce2752056d128833834b326387d81db8a9e,2023-11-07T04:19:12.717000 @@ -233903,13 +233913,13 @@ CVE-2023-44338,0,0,fceb66f519f57c084dcf66fed4cec095683a38b3d185d014206f57cd36a46 CVE-2023-44339,0,0,bb5be312cfbea4ba9c930505f7c7fcb81033beb4c672f7a0c06d918de19173b2,2023-12-04T17:34:46.583000 CVE-2023-4434,0,0,bab0423e657791622a5b1409fa9318c47786d7a606db9ea15a66615a867b1044,2023-08-25T17:57:45.133000 CVE-2023-44340,0,0,b21cbcd12707cbbd4a9d675bde35dbb9ee00edc609212e10acc00e505adf0941,2023-12-04T16:15:08.083000 -CVE-2023-44341,0,1,828a7a9a18d5f7af7b82657b7cde66e4ef46869412e2a2d6887decf9962a8019,2024-12-02T20:14:51.967000 -CVE-2023-44342,0,0,0c8bedb7886b7171854ef831382334ac881a68f538b7d273dcef6fd357215323,2024-02-29T13:49:47.277000 -CVE-2023-44343,0,0,8fd557cf540814772da5b8f541b9a82e772c312189a977dcf6ce0e2afc55c609,2024-02-29T13:49:47.277000 -CVE-2023-44344,0,0,c241d06a46154624c7347cb87577b52cd441f5be92768e1d05ef69e662dda1ca,2024-02-29T13:49:47.277000 -CVE-2023-44345,0,0,c5f124f5cca1073021c69712334ba0ff640d513acd050f45aae409c4c7473168,2024-02-29T13:49:47.277000 -CVE-2023-44346,0,0,4c280fc897acf4d78ebe900ffeb7058c65a515ca970b0dae4a3a11450d2fc60f,2024-02-29T13:49:47.277000 -CVE-2023-44347,0,0,45f81ce4d0a62c9794ae3cb7dc5d397dfe8d37b8ed755ea5ae1d268d1bee20a2,2024-02-29T13:49:47.277000 +CVE-2023-44341,0,0,828a7a9a18d5f7af7b82657b7cde66e4ef46869412e2a2d6887decf9962a8019,2024-12-02T20:14:51.967000 +CVE-2023-44342,0,1,967bb2b606885b44f8c4f1410dedc6d15cb2a25448a62b5178c44931fdc7b86d,2024-12-02T22:11:14.767000 +CVE-2023-44343,0,1,e2e90a7045baaaa1d9ab4fa06678df8cec7be2940431f1d19c38ec9a68bfa900,2024-12-02T22:11:22.367000 +CVE-2023-44344,0,1,2847f23aa77adcc7eb96bc670617961a1425a85117ca7e351e1681a635711797,2024-12-02T22:11:34.303000 +CVE-2023-44345,0,1,377c6c1f7a0eeab5bf8127ef5e042e37133146f3eb94aca0794895a09ca67060,2024-12-02T22:11:59.650000 +CVE-2023-44346,0,1,3ef78e036a254e18b66c35eb4825e56c2750730c6f3351c075847847c8bee4db,2024-12-02T22:12:16.443000 +CVE-2023-44347,0,1,ebb0b083164d0798b442f37f83e10e0e95eff0f7522f2f80ab8f27f79c6948c5,2024-12-02T22:12:28.940000 CVE-2023-44348,0,0,4170304c9e89394666fccd32006d71d647fc2db337fcc8f6bb8f24beb756a7e7,2023-12-04T16:15:08.290000 CVE-2023-4435,0,0,9caff56bdfd7a2d077fc4f101104e23e56e93c0eea5dd36276d5c3ce2248aaf5,2023-08-25T17:34:31.577000 CVE-2023-44350,0,0,95c2a526088a0cc1aaf4802541726ad73c193d620053959b6a7cbd80ce0fcc34,2023-11-23T03:39:25.393000 @@ -234691,7 +234701,7 @@ CVE-2023-45722,0,0,4240dd682886c768ab9b9a025ce52687e223d3b5bc66b3a8ef1362427eaf3 CVE-2023-45723,0,0,d75569efe29622a0fceee924d9f808ceeedc0897b5e709cd04faad485aeb7c09,2024-01-09T18:52:37.707000 CVE-2023-45724,0,0,d957afe86c592e8319388b49220462c05dc155b1c149c8e2b8f7290372cc8a41,2024-01-09T18:34:41.837000 CVE-2023-45725,0,0,4be92db793dd202daa1a3bc98875d9a583e5498eb2cacfe9e3765b156e332912,2023-12-20T18:32:15.360000 -CVE-2023-45727,0,1,f1e978bfdbac20d70116743d7e239fd9d61802cf9fcce1a1bef0439bb8e689df,2024-12-02T19:15:08.390000 +CVE-2023-45727,0,0,f1e978bfdbac20d70116743d7e239fd9d61802cf9fcce1a1bef0439bb8e689df,2024-12-02T19:15:08.390000 CVE-2023-4573,0,0,8c2c56b4c0641002c802a71d0b3ecc92540f29cc9ee6db1aabe5f4a00eb5a7e0,2024-10-21T13:55:03.510000 CVE-2023-45733,0,0,b0aa2fba9e6a64d0852357607afb3a43fdbb4b3413ce5b91e26ae220829c70ff,2024-05-17T18:36:05.263000 CVE-2023-45734,0,0,bcdee8c11a0e8a4792b5d7f342842becf89dbf6ffedf6c74619e3ac3b10011b3,2024-09-09T12:21:53.383000 @@ -244342,8 +244352,8 @@ CVE-2024-1670,0,0,1076fe172d6239bf170090e8e565b53f2a5e980bdc541ad08c209e2df3f767 CVE-2024-1671,0,0,b90d151a59720bfc66cb3bbbb41d4e1a2a08b8f84ae511718307d6e0d6c90578,2024-02-26T16:27:52.697000 CVE-2024-1672,0,0,5df25617ae1b8580bd17e41342f3db39038751d4dea40ef6d92d4a83e8eeb0f4,2024-08-01T13:46:08.940000 CVE-2024-1673,0,0,72b6738109f060ca33cec8daa581f20d84f924c2dda86dec338ec0b1edf6aa3e,2024-08-01T13:46:09.737000 -CVE-2024-1674,0,1,4cf2c5e9e39ff8cbbaa4992242e531b6a235b946fada67dc6b67140da5874399,2024-12-02T19:51:32.163000 -CVE-2024-1675,0,1,6dc11c1ffd0c7e93efd7705d99983d7290104eca7113a2804027689feb726c3f,2024-12-02T19:54:08.677000 +CVE-2024-1674,0,0,4cf2c5e9e39ff8cbbaa4992242e531b6a235b946fada67dc6b67140da5874399,2024-12-02T19:51:32.163000 +CVE-2024-1675,0,0,6dc11c1ffd0c7e93efd7705d99983d7290104eca7113a2804027689feb726c3f,2024-12-02T19:54:08.677000 CVE-2024-1676,0,0,49c3202c5c497a772989e79ead25a52e922bf653bfa98e11038c1b979dd6584e,2024-11-05T16:35:10.247000 CVE-2024-1677,0,0,6fbed0b3db8f4573d0e0535b3a26ae2bb9498eab495e7625679b1e1f5bc2100b,2024-05-02T18:00:37.360000 CVE-2024-1678,0,0,d7ff889a45c19600d651a095e777206640b8492b0764403803a17b2b0960a8bd,2024-05-02T18:00:37.360000 @@ -245243,7 +245253,7 @@ CVE-2024-20764,0,0,aaf6aea1cfc81c17e2ef82d097347523784d6c37fa8e664f1fa9ad6c605a3 CVE-2024-20765,0,0,ad91982b1363103e7d071a542448be4f43c1d446a44c46149dd1d5563e96bd7d,2024-02-29T18:06:42.010000 CVE-2024-20766,0,0,898b775b089dd9caddb4b4690630a4034df5907c7b03a6ac372c91b73b803f73,2024-04-10T19:49:51.183000 CVE-2024-20767,0,0,e44fe1f40a168c1d580708d22170c7101344fa827a777107ab7c62d60385df35,2024-03-18T12:38:25.490000 -CVE-2024-20768,0,1,0a787ae17c1c9554efbce8083ebf2f71929ddd956de1438a76dc74375b810cb1,2024-12-02T20:20:27.637000 +CVE-2024-20768,0,0,0a787ae17c1c9554efbce8083ebf2f71929ddd956de1438a76dc74375b810cb1,2024-12-02T20:20:27.637000 CVE-2024-20769,0,0,4c236b05669b68ca5ce041ed8b26b6adfc2e0cb9e4a3ee0955957eb96f78ccb6,2024-06-14T19:30:30.037000 CVE-2024-2077,0,0,e7bd6e3d8e34c4ba57719bf938fdc690e0425d907fa9aeaa848477a4c8d06182,2024-05-17T02:38:02.460000 CVE-2024-20770,0,0,2220817887bead81dba660b5070a9bfc8174373fc0e12fc00c386ef0f159eda4,2024-04-10T19:49:51.183000 @@ -245270,9 +245280,9 @@ CVE-2024-20795,0,0,339aac1d5967def1721b9f2266bf58d280ddf20a2869a78a797eb0f1e5bbf CVE-2024-20796,0,0,00526c11ef10ac19e26f1b9fd4dbb5343656ad019ba0153210f3164b00fbb116,2024-04-11T12:47:44.137000 CVE-2024-20797,0,0,cca548d603d4ef24bc949550666e86662b0fde7c1a3163dc260ede4b6277d4bf,2024-04-11T12:47:44.137000 CVE-2024-20798,0,0,8b948926eaf9bb7762236e345460aa95eaff4b64e6ad072852daab65eab7f1c6,2024-04-11T12:47:44.137000 -CVE-2024-20799,0,0,be6e8bc23c4eb41e771357761dbce73cd47b42dda0ff977a9652c2ff0bfdfabc,2024-04-02T12:50:42.233000 +CVE-2024-20799,0,1,e14bc255e39a0fbf73332b041fca58be1031162fae1815563fb8ea9b691c56fe,2024-12-02T22:07:32.537000 CVE-2024-2080,0,0,739bb7bc16949ce8dc42f086707a1965c48b8c0e80b8a96770d78539ca010524,2024-03-22T12:45:36.130000 -CVE-2024-20800,0,0,7d598eb35b767da6ce6e52e544545febf72abfb821daa2a71a664b5c5b8ff423,2024-04-04T12:48:41.700000 +CVE-2024-20800,0,1,63cbca2bd0041e91c4c27520108a691e41ded598aa31ad458d4ca67a8b3670d7,2024-12-02T22:07:34.180000 CVE-2024-20802,0,0,199d727c032aa2e620e384dca4e13a9e3425e69f11a38c8295cb8667c34719d8,2024-01-10T16:14:57.787000 CVE-2024-20803,0,0,0344cde3efeaae4afbdf650bafe8bd2112bea594bd06ade4eca20bfb4af01ace,2024-01-10T16:11:26.313000 CVE-2024-20804,0,0,047c084f6461b3ccfa7e0491c6396c940be7f851c74224e7b3908c6f90469840,2024-04-02T01:15:50.777000 @@ -249141,47 +249151,47 @@ CVE-2024-26024,0,0,3ab60f6be938f975935e53b7a80711b98fe8d56f189e7148a76008394bc4a CVE-2024-26025,0,0,3352cb4bf9ea0c839d1741e6282396ec44178b4e8d69bb56155c91bf1b50fdf8,2024-09-06T18:54:37.007000 CVE-2024-26026,0,0,9489dfd8cfaf84cc429afc6dedc0bc5efa9a938711a5b920a49c5eb5da48c8dd,2024-05-08T17:05:24.083000 CVE-2024-26027,0,0,92cac7f77f6e52e5db63c20697f9eef252fe749956e34d00b1955a621b2a7163,2024-09-06T18:52:51.097000 -CVE-2024-26028,0,0,5f8913cd7c0dbd81bba046bb5b12f67c41b2f05945fde5c38d400529f7172145,2024-03-18T19:40:00.173000 +CVE-2024-26028,0,1,c517cc3720c90dec606bc7d8dee3896584eb629812e374b25507b7a34818d629,2024-12-02T22:06:53.717000 CVE-2024-26029,0,0,3b6290d9a75a8e9810fd217f46cbaf1351e6c78f04f13dd99b8776f7c655bd87,2024-08-07T12:15:36.547000 CVE-2024-2603,0,0,78190220c4426015d8e369c25fb4d08ae79b05986155963bab2103b320746b59,2024-07-03T01:53:22.183000 -CVE-2024-26030,0,0,e771bde2ccc0f6a8a74dae0bef3632dad893d364ead4a50da5a66219d28fcf58,2024-03-18T19:40:00.173000 -CVE-2024-26031,0,0,a4f631c9740748d980ae06a58adb65536316766decf55b30b7f7ccdfb4a9735f,2024-03-18T19:40:00.173000 -CVE-2024-26032,0,0,b74f3f639ccbf55fc320a87006dd74cabdb470176a85bc48b7c070f8e4477b8e,2024-03-18T19:40:00.173000 -CVE-2024-26033,0,0,c95498604650f4b6417dd1bd91c65a040969bcd5381ab26d4fdf39274ce0266e,2024-03-18T19:40:00.173000 -CVE-2024-26034,0,0,672422787b08cb906abe9f8e2c3954f223e40e500cd43d845b3a05f149701501,2024-03-18T19:40:00.173000 -CVE-2024-26035,0,0,c655a73283f5084eef293f7b261bdc3361ddde9cb9617d00aafb6dc8e4d4cfb4,2024-03-18T19:40:00.173000 +CVE-2024-26030,0,1,d7acb1e81dd5fa90c7c5b9b18609c55ef6866eae68acd588a8a8bc16b3ccaa0e,2024-12-02T22:06:56.380000 +CVE-2024-26031,0,1,9251a22057f236e1d3a848e565f60cf6550f57153c17685d81f7d9f0da5a0b28,2024-12-02T22:06:58.120000 +CVE-2024-26032,0,1,25ba5027b92ba7b29cd5952069e3745d08f29b71e08faea170ccb8512e51d957,2024-12-02T22:06:59.920000 +CVE-2024-26033,0,1,c78707ded2f2b609bc7eca4313e9210441b759e77c29f088718bb51d621ffcdf,2024-12-02T22:07:02.203000 +CVE-2024-26034,0,1,6716c83fd1d8d731d8fc3214db861cc7937299ee72e21da7d42be35b66918217,2024-12-02T22:07:03.987000 +CVE-2024-26035,0,1,be43584d20133ee714916450b0eaa223ef0e0c531281a3b0f6515ff2706e1c73,2024-12-02T22:07:06.280000 CVE-2024-26036,0,0,1d83088cd2cd101659224a3fc5c08fa64786f76447e958e3014dda7a1b3b2762,2024-06-14T19:30:06.617000 CVE-2024-26037,0,0,93771142bffee162d36251cc4e8ed14800b95d6cabf310d68e7055bd0eea978f,2024-06-14T19:48:13.247000 -CVE-2024-26038,0,0,44665b8c0f4003d2f15e5507d8268ad827d4a7ae86e458d13a7310768e8295c4,2024-03-18T19:40:00.173000 +CVE-2024-26038,0,1,b9bb6c98495127ac6071b9f41984d6f796b59bc5be5e7634f158102197235d11,2024-12-02T22:07:08.043000 CVE-2024-26039,0,0,1174a6c1115f79e7f0889b154dfc89e46af3bb6dd2520ac9d5c13289cf240986,2024-06-14T19:47:57.717000 CVE-2024-2604,0,0,450c7d59fe8571ecee58ed217df60ab05189f4ad43db724a13d662a6d29d50fb,2024-05-17T02:38:21.500000 -CVE-2024-26040,0,0,683cbf1b2b05164531aa4b967f814680a6a08e0f59432d5b3559c4fdc0894937,2024-03-18T19:40:00.173000 -CVE-2024-26041,0,0,7bab9958051cbed100ec8af1d6950fe62a26d0bfe1d767809b75721640912f9c,2024-03-18T19:40:00.173000 -CVE-2024-26042,0,0,9895ff35e16d0bcd3f521c01abfdb5ef5566cb5b0e4338abfcc90963bd5980a2,2024-03-18T19:40:00.173000 -CVE-2024-26043,0,0,bb2be2782284b1a2353ab8049876af0f975bcb55d28a13167cdd6f1499a72985,2024-03-18T19:40:00.173000 -CVE-2024-26044,0,0,799574bec11184e905a9a967aca39418e129659dac740fafef9b05ba6719c481,2024-03-18T19:40:00.173000 -CVE-2024-26045,0,0,0acb4c430eb04b486f9fde8afbebe04bb30c7a2da9501b59437c922e62ac22b2,2024-03-18T19:40:00.173000 +CVE-2024-26040,0,1,881490c457662cce773f8ca7cddb2e3a126b8164e3048aefa446f96a3d6a6526,2024-12-02T22:07:09.847000 +CVE-2024-26041,0,1,82bc3a27e139f2eac0699f5c997717f1714702a611d02caf92170be6080bfa06,2024-12-02T22:07:12.473000 +CVE-2024-26042,0,1,b4a00f3667ef84694a4e6abf52951c7d51f9277bef08b433c87aba15cfea5dff,2024-12-02T22:07:13.407000 +CVE-2024-26043,0,1,99ead7d68c938569d32b725222aa01cb299aa9704e98099bfec50c1573334734,2024-12-02T22:07:15.597000 +CVE-2024-26044,0,1,d48863d0a18ce3b99a996ff7e489563474f3ba710823fa01053fdd4130dff831,2024-12-02T22:07:18.390000 +CVE-2024-26045,0,1,c0e5a2bde8102da916dc75a0d099b9e904cf36335678ec6973bdd23ad8cb11f5,2024-12-02T22:07:20.870000 CVE-2024-26046,0,0,5c87a28b13d53ec29b89a2b33427517db21012c37c446a313fb6274d8fa5a520,2024-04-10T13:23:38.787000 CVE-2024-26047,0,0,148096905025fd63cbc95f27e9e4e0c5f23280eef70892c2f079c5329b94e086,2024-04-10T13:23:38.787000 CVE-2024-26049,0,0,a3a34d9b7dae7c572a170c4cf9ad06366559734e7c052afbd0e4cb731a5c408a,2024-08-07T13:15:59.723000 CVE-2024-2605,0,0,349e4409ed80d6811abb3d6a22d4a1c2580eb4cb5b90719226cde56ad4b7d78f,2024-08-28T15:35:21.410000 -CVE-2024-26050,0,0,a01e15c84b45a65b3bc336a569ca46f534ec28925a3745536846dbd737880774,2024-03-18T19:40:00.173000 +CVE-2024-26050,0,1,a45a43204e66a747018474afbb3bf9e8cced59d2a9da4abea0d1a9ec7441e460,2024-12-02T22:07:22.173000 CVE-2024-26051,0,0,78bc48859c38750da39204fe9139ed7326b9440e064a7c71bb9438b77aa20ed2,2024-03-18T19:40:00.173000 CVE-2024-26052,0,0,b304109295db8f5f3410f8f04ff1bacf299ca38b40fc697f2ab4ec3a5eabc71f,2024-03-18T19:40:00.173000 CVE-2024-26053,0,0,08b1c01624e7d71b7ff35b901082456bbba3fa5d18db4bad7ba7d58bb2e8e67e,2024-06-14T19:46:37.923000 CVE-2024-26054,0,0,eda3484671c40e51a92b63a901454f377d91e0d9bfcdc0a5fb15602bc8f94d81,2024-06-14T19:24:41.580000 CVE-2024-26055,0,0,baa99b29bd8823923f255a8118fccf649a7d41ab4a2f879c4c914a9fe0240d12,2024-06-14T19:46:17.973000 -CVE-2024-26056,0,0,cdde0faae5371b6934ff40ac1740cac009f960619bf2984b3c2abc0f388d4781,2024-03-18T19:40:00.173000 +CVE-2024-26056,0,1,fd25988b2ffb880e93d02ea0a7d6ca550724c5a3bf8011f3370b495b2e1472a4,2024-12-02T22:07:24.513000 CVE-2024-26057,0,0,e45b3f0f152eb3c78dc9320bed534a79a66b2c35d46fd8b2b0ef0017333c4b87,2024-06-14T19:46:03.817000 CVE-2024-26058,0,0,a93e87c800fd4d920581776c16d0072b04deb406d205f9f24e685781c2f5715f,2024-06-14T19:37:56.100000 -CVE-2024-26059,0,0,3a74ee7caa73ebe11f8a8e2f4a849fd43a4fe73562ba6d99358d666bb4fc6636,2024-03-18T19:40:00.173000 +CVE-2024-26059,0,1,1e0d0341f224106eff1e5af2366626fd5d13edf1ca8e2c987ea5d5df70d49373,2024-12-02T22:07:26.627000 CVE-2024-2606,0,0,e9eebb20c04d0205e18586a1da81a72eb028c0ab6b349ea25646cae1d987bed3,2024-10-30T15:35:09.973000 CVE-2024-26060,0,0,9cdef2d575b129761f3290b88017e8f07b5021de9d3255eeba059f838c645f83,2024-06-14T18:49:08.077000 -CVE-2024-26061,0,0,95eff38cd1c7e403d46e8de01e1ed3169b38a7e929aa5fe4e06324861444a4f1,2024-03-18T19:40:00.173000 -CVE-2024-26062,0,0,3dc8f814b10216475d4edc6897c31db61a1f8c0a6e3b0883a2d1e46684b7142a,2024-03-18T19:40:00.173000 -CVE-2024-26063,0,0,1028e1f60c29e9dd75da893fae42db180e50d6378d7ce64836077ff36689b7be,2024-03-18T19:40:00.173000 -CVE-2024-26064,0,0,b5a6418f30594df825c54e8c57e5891a2c2a26d483674e8695e0d10b7ea61d28,2024-03-18T19:40:00.173000 -CVE-2024-26065,0,0,4a6417bae6eb89991d2d94a0e17d6388aadf1dfe0e0de6bbd2e9c127d6de83c3,2024-03-18T19:40:00.173000 +CVE-2024-26061,0,1,ad2ceb8808417064310c3cdf2f62f9478a68900289ec3c3d53d06a95b0f1f100,2024-12-02T22:07:28.717000 +CVE-2024-26062,0,1,de3a3c35ada4aa1c5944365be2cf00e2b621e3c48f1c3cd28c67c563a45ac527,2024-12-02T22:07:32.527000 +CVE-2024-26063,0,1,0be577b3563c3b84879e994b8e663bef83be58c13a6830fc3d5d283ea404cee7,2024-12-02T22:09:53.683000 +CVE-2024-26064,0,1,22ea7ed6008c6012e35e6e94aafec1da167cb036f2701bb13e0387b484a6c89c,2024-12-02T22:09:18.633000 +CVE-2024-26065,0,1,9e200907fbcbb393ada9d535c2f77eec4931a2dded2812365f92071cee63cdfa,2024-12-02T22:08:58.650000 CVE-2024-26066,0,0,c16f3c27056b3c70c3163298471f82d82d65c7e624bee5584c40df2a2851002f,2024-06-14T18:48:49.183000 CVE-2024-26067,0,0,4e837a02e31f2ba959b9ab2cadbab50fe243bb7e44fdf350987cc4ea278caf71,2024-03-18T19:40:00.173000 CVE-2024-26068,0,0,8b1bf80f59bd4ba690a55f04b468280504b7e85a202f44401a8c49c1cbdddd95,2024-06-14T18:48:22.843000 @@ -252405,44 +252415,44 @@ CVE-2024-30274,0,0,a2395c418161e6c596f5972c7c03ce0794aa86ba1471f6fa70be52e1a37f3 CVE-2024-30275,0,0,5c7fd7a6cf84690d33049db8d301fa3c3763a08fb307abbb2a39ddc9f47ba093,2024-05-16T13:03:05.353000 CVE-2024-30276,0,0,0bd4be9c7f10ca7d4fd2dfa1716549a7092cbd7f9a2adabf7913546d4cdfeadd,2024-07-09T15:50:56.480000 CVE-2024-30278,0,0,61f4d7e9a9587a3224ab5f7ebbd333eb1034f085c631558b85be2564db298806,2024-07-15T16:15:37.093000 -CVE-2024-30279,0,0,e8959302b2a7f4b2f979d5a292d479144519886e3c4ec1eda991b8640940de58,2024-05-24T01:15:30.977000 +CVE-2024-30279,0,1,767e69e25126451c4f487ebe7766f45df35bb82c6e622e29c3997953a2b4aa46,2024-12-02T21:22:38.307000 CVE-2024-3028,0,0,9e4bef210fc19099d68fdbe2ca58f9c70793f50703ba240559787e18524fd766,2024-04-16T13:24:07.103000 -CVE-2024-30280,0,0,7232cea83e4b5e67f9a2b634eb562bbb13f45b745f6ead8e9f7f82040938f49a,2024-05-24T01:15:30.977000 +CVE-2024-30280,0,1,93bdc3da471d036a4418ced21d662a3f15c2d1ab9923945dd89a213b934e5951,2024-12-02T21:07:30.440000 CVE-2024-30281,0,0,aa55f6f337f0eff14aaba79eadac42cf1fa69bcced5e256cfe63f794552ecdfc,2024-05-16T13:03:05.353000 CVE-2024-30282,0,0,23f906c56739d2637a62852ff21f89b589c2e003e455e0b879928121b47e538e,2024-12-02T17:48:54.733000 -CVE-2024-30283,0,1,9e8da6a935a66e8cc0ba5dc2d12b3c47dfb3d77dd0f559b5a2de4927dc7e26e5,2024-12-02T20:43:17.603000 -CVE-2024-30284,0,0,c3d8cfb90cbc04c8f8451d2b94550163ac2e92e833947aa8e3054cbfbcb5af6b,2024-05-15T16:40:19.330000 +CVE-2024-30283,0,0,9e8da6a935a66e8cc0ba5dc2d12b3c47dfb3d77dd0f559b5a2de4927dc7e26e5,2024-12-02T20:43:17.603000 +CVE-2024-30284,0,1,1c3b923f08901bf42732b59f245e3843c68bd61f1640ed6808aa75f45339dcbe,2024-12-02T21:22:08.673000 CVE-2024-30285,0,0,d5d0073a0c86623254404dea22df638b05a2d50f8dfa4429d0e1bb0ebc3d1cd8,2024-07-09T15:52:12.637000 -CVE-2024-30286,0,1,75adbc0b51f836d9f2b10b0ae55478ab071a31884ca662124852dad5ccb56d6c,2024-12-02T20:43:09.190000 -CVE-2024-30287,0,1,7d0b87d3020256a2d5f84b012b2fcf6ff6489ac9b52ff2f45e12033da8f761e2,2024-12-02T20:43:02.727000 -CVE-2024-30288,0,1,3c09417664156b15182e9b1c6d59cd996098519fbd2be16a7308f1b21d29feb9,2024-12-02T20:42:53.247000 -CVE-2024-30289,0,1,3585e0d3ed5bf6e39023e32ef47376cfc16c1f13711447cb7ae5fdeb55e8f5c7,2024-12-02T20:42:43.033000 +CVE-2024-30286,0,0,75adbc0b51f836d9f2b10b0ae55478ab071a31884ca662124852dad5ccb56d6c,2024-12-02T20:43:09.190000 +CVE-2024-30287,0,0,7d0b87d3020256a2d5f84b012b2fcf6ff6489ac9b52ff2f45e12033da8f761e2,2024-12-02T20:43:02.727000 +CVE-2024-30288,0,0,3c09417664156b15182e9b1c6d59cd996098519fbd2be16a7308f1b21d29feb9,2024-12-02T20:42:53.247000 +CVE-2024-30289,0,0,3585e0d3ed5bf6e39023e32ef47376cfc16c1f13711447cb7ae5fdeb55e8f5c7,2024-12-02T20:42:43.033000 CVE-2024-3029,0,0,497ffe4940c4ad919b0790a585fb5a1b548684ec5cdf0a9c9ccfacdc2ebdeebe,2024-04-16T13:24:07.103000 -CVE-2024-30290,0,1,41177f0a3696b47485943131d85e9a76808670403ac9b663f81a9664eec567b6,2024-12-02T20:42:22.897000 -CVE-2024-30291,0,1,626e3632f0a9ffe88c0c837d5c97c109f71e5e7517b877a727052bfb28302134,2024-12-02T20:42:16.157000 -CVE-2024-30292,0,1,905628d504199451b227bdc8e1cc783bcc48f3bc506ed15f151bfbe5197dcc2c,2024-12-02T20:42:07.283000 -CVE-2024-30293,0,0,cb6d64f28c1d177af9d8787acdb5f1ba6610d7808ccf528bce800949c7d74b22,2024-05-16T13:03:05.353000 -CVE-2024-30294,0,0,7166a81324ee6dd52833272914dc6f5ed70b0f6ae30e108fd1b216dad0523d9b,2024-05-16T13:03:05.353000 -CVE-2024-30295,0,0,7acbb1c4868f13b65f181cea277a794fc009caf9cee062ee7f161860d6c960f2,2024-05-16T13:03:05.353000 -CVE-2024-30296,0,0,be0909c296e6e8e43038b5643a1a0c28c6682fe163ca23c3edf171e922ae6f6e,2024-05-16T13:03:05.353000 -CVE-2024-30297,0,0,55a6b9a1f93e14e98892ac8ad42e4742b35b926da37b4c4e027266ed3205e993,2024-05-16T13:03:05.353000 +CVE-2024-30290,0,0,41177f0a3696b47485943131d85e9a76808670403ac9b663f81a9664eec567b6,2024-12-02T20:42:22.897000 +CVE-2024-30291,0,0,626e3632f0a9ffe88c0c837d5c97c109f71e5e7517b877a727052bfb28302134,2024-12-02T20:42:16.157000 +CVE-2024-30292,0,0,905628d504199451b227bdc8e1cc783bcc48f3bc506ed15f151bfbe5197dcc2c,2024-12-02T20:42:07.283000 +CVE-2024-30293,0,1,677551f52db0a2f3dd9d417d269ecfa084fbe2698457016b810539c3464a12ab,2024-12-02T21:56:07.083000 +CVE-2024-30294,0,1,7c1c3ca5859403614ab177d8966fd465f2ca9acd2006f45c1e5ee913dc704558,2024-12-02T21:57:44.330000 +CVE-2024-30295,0,1,af52457c614b754de367b515ff58d8a2b362917a582134c64f2a73034397eb2f,2024-12-02T21:58:00.817000 +CVE-2024-30296,0,1,debe059d0b0adab752e8eed367cea91d921632069a4779f8924abaecaafaf05b,2024-12-02T21:58:13.037000 +CVE-2024-30297,0,1,e027b37ff8f5e82bbe1986c29e4c7b4c164a4ff6b5ee35f015fce4fc66acbbc0,2024-12-02T21:58:24.973000 CVE-2024-30298,0,0,92bbe49d33f9c926bdca52a1a92f14b21413490e1bf1dd65bcaf24fbb0fe1407,2024-05-16T13:03:05.353000 CVE-2024-30299,0,0,1654b592ab1dce50a91f0ff3960d214faa43e082d949db6429602b9ab8066e0e,2024-07-15T17:37:09.007000 CVE-2024-3030,0,0,5eafba8e87a04804f0ee37eb44b2a0db0456e0dcfce765e75341d9edfec2815f,2024-04-04T12:48:41.700000 CVE-2024-30300,0,0,cb30fb32a49ef545078d6cb3d0e2c9d2976845dda248b7c3086e68c50460cc41,2024-07-15T17:37:06.847000 -CVE-2024-30301,0,0,9b74ed05354c1aa1aaf7222bb27897d0894fcbdf51bd0565f77bbad0338cfc5f,2024-05-03T12:50:34.250000 -CVE-2024-30302,0,0,dbae568de5b2417e966678cb186a0766d0a1270a494653512196e489399925de,2024-05-03T12:50:34.250000 -CVE-2024-30303,0,0,29beefe281b7361c70e3d46cb1e8ccb19d06aa60b2190adf964c9790227b9a7c,2024-05-03T12:50:34.250000 -CVE-2024-30304,0,0,2f0e61c634483371daf468eb219084e155dd462f28241798096506ee1920c008,2024-05-03T12:50:34.250000 -CVE-2024-30305,0,0,06a2884c73df2d31a52d1bd390050cc8f729b4ecb20f46a8a57111dab1aed1e3,2024-05-03T12:50:34.250000 -CVE-2024-30306,0,0,bd8325522698ffc48ea724274c543ace644daca528131bb314d105d4fa38a7b6,2024-05-03T12:50:34.250000 -CVE-2024-30307,0,1,f0696b48a33e78d85b238fe696c465ffab8e32dfc9166fa9661c3e97bf0d35fb,2024-12-02T20:16:16.277000 -CVE-2024-30308,0,0,5db84bb1c77c493bd5ac8ed7e018742d1d8a89c45b2de719cb9832260f35cd9c,2024-05-16T13:03:05.353000 -CVE-2024-30309,0,0,9a08ca34b700dad3cb2e16c475ae7c7fe2e87ace9e5ca70ca16a8519afa5c91c,2024-05-16T13:03:05.353000 +CVE-2024-30301,0,1,1d880fc56800437353729bd633130382627d28a26ef17fcc0f9bcebc9d48aeea,2024-12-02T21:26:39.823000 +CVE-2024-30302,0,1,41767d09e1e84621af01876ec28762d88bccfb3048cc60297246580ad49a8909,2024-12-02T21:46:16.643000 +CVE-2024-30303,0,1,a718b20b8237dff7397d077291c578dab3c9c6babc5c66a1bf496b68dc159997,2024-12-02T21:46:14.537000 +CVE-2024-30304,0,1,d36b546a4fa11ffb324ce13c6fddae1e37c67eff5ef1111609d11778b436f36b,2024-12-02T21:46:12.677000 +CVE-2024-30305,0,1,66e6b440071203362ed2c138e187ce7dd497b3cbd679c367425aff1eb6e913fc,2024-12-02T21:46:10.833000 +CVE-2024-30306,0,1,c62fd54eee28d25605f61ddb4a4a4308d57a515209dfa0d18191ddbdee5dd5ab,2024-12-02T21:46:08.757000 +CVE-2024-30307,0,0,f0696b48a33e78d85b238fe696c465ffab8e32dfc9166fa9661c3e97bf0d35fb,2024-12-02T20:16:16.277000 +CVE-2024-30308,0,1,5f1964482b65dc2c70f692724bb7f56e4c08406729eb2dce5b9eacc1354a161f,2024-12-02T22:25:14.460000 +CVE-2024-30309,0,1,172ac0280d958f9d671884ee11784df404104f55d789f16f7ba5982844dcbde2,2024-12-02T22:25:04.283000 CVE-2024-3031,0,0,fa19e5674d76c5b46624774eba96476ad7fabe41ca511ba02fe99ace14a675a4,2024-06-04T16:57:41.053000 -CVE-2024-30310,0,0,21368fdcf4a9e18a31e2b9852298271dcdaa60df59c08c1dc5b448b5ec3f2a8c,2024-05-15T16:40:19.330000 -CVE-2024-30311,0,0,9aaaf7a631f27c18ba0d6e026b9e5bc097be151497f5f87035ce25407b016799,2024-06-10T18:15:30.757000 -CVE-2024-30312,0,0,f08a9328fc0df8fc97205027f081abf4a30dc22420a8570eec8a2d548e77aee7,2024-06-10T18:15:30.880000 +CVE-2024-30310,0,1,0318e7fa8c109fbd13dfaf43bb618e0a49e9b16e0b621e77faecb78de1db2a84,2024-12-02T21:22:11.137000 +CVE-2024-30311,0,1,3840218508a24667161b6ff79a375834ddbf249257e991ddfa8b10e97ab37e31,2024-12-02T21:22:13.143000 +CVE-2024-30312,0,1,d795e4958162bcd7905c2b6c90993ddfcc6293aa254bf6c539234075dec0a0ba,2024-12-02T21:22:15.280000 CVE-2024-30314,0,0,001958112e812873f2afe024af602bc1e18aaeafca421eccd7dc6e99cd4f7d19,2024-05-22T08:15:09.777000 CVE-2024-3032,0,0,23903a6cbcf453fd38d8d4b287e955f74e9435539a64a2e4e4033c0e9a9a2ffa,2024-11-20T15:09:42.557000 CVE-2024-30321,0,0,77e82c6b15f80502cfe967b03a0cf5e1edff68cc4e25f0455ce9c65c8c4bfbce,2024-11-12T13:15:07.503000 @@ -255255,15 +255265,15 @@ CVE-2024-34090,0,0,bd5741ae5c881eed969a6846397df746acefb1b3b796191e30ee091ebe5a7 CVE-2024-34091,0,0,316b2e1c1466fafa03f21d7850553c09c4a77fce34562e440629956736be2b9a,2024-07-03T01:59:22.050000 CVE-2024-34092,0,0,2bf58264e02a52c672b220e53b15e2c1d2f3b9a912fb11a120406afd90e13f81,2024-05-06T19:53:38.797000 CVE-2024-34093,0,0,a3683f2cbbe3f4d2616fb123bbb1ded4218b58d2ed8c82d304f478e8d6150d29,2024-07-03T01:59:22.817000 -CVE-2024-34094,0,0,e058c298956a4eefff483912d321ec6abface079166873be933a6f29ae488517,2024-05-15T16:40:19.330000 -CVE-2024-34095,0,0,718d8c96c08399e79a88559b2ca689071335463b3719b579b43d4a05eb67dddf,2024-05-15T16:40:19.330000 -CVE-2024-34096,0,0,8b7f18a2869ffd5297f15be40b06047024170baabba628f362c9230fc8b4d8c7,2024-05-15T16:40:19.330000 -CVE-2024-34097,0,0,eaa6791cf71199d1cde68116fa7fa3d819d3442889bde44f40a13e019eee1444,2024-05-15T16:40:19.330000 -CVE-2024-34098,0,0,0aa7360245689162ad79d8372a61fede4224dbd8d5b6d11839b3e7354d4d6583,2024-05-15T16:40:19.330000 -CVE-2024-34099,0,0,e726ec893da8bd1b2d593478012deb02081fb3ea5ef144a8f74b134b032b0f2a,2024-05-15T16:40:19.330000 +CVE-2024-34094,0,1,4a77234f952d89a826212a179822c0c7a172b66c5cc32db8749726c010d65461,2024-12-02T21:22:17.230000 +CVE-2024-34095,0,1,d1042554b8aa40d419c24ba4b1e01e81a6955e985c34a7bed5f418ec718acfee,2024-12-02T21:22:18.937000 +CVE-2024-34096,0,1,1397cb1cc138b73cdf02c88e8123029567366d53f582e78eafee3e7b7fd1eb6f,2024-12-02T21:22:21.580000 +CVE-2024-34097,0,1,b597f6e800282cea93dceb581efda183c6ca314fbca6fdbae9dc10601282f740,2024-12-02T21:22:32.400000 +CVE-2024-34098,0,1,c844d0cf5434c88acd7c56d7afb41cd5ae0b9becf9abe22449b8e7ec24a42d87,2024-12-02T21:22:06.980000 +CVE-2024-34099,0,1,adfb376bbda5df2b669a66a9a70c69b27377b79686e8e83c0e7d17870315e016,2024-12-02T21:22:05.153000 CVE-2024-3410,0,0,533c3c87802e0074c9d8405f1348fe90ff7e170f7331b0fceecfe41f39301921,2024-07-11T15:06:16.780000 -CVE-2024-34100,0,0,d8828e50212ed74523ec3b065b2e3e4ed1a87a7eeaaf810d753c27d5c9b78bae,2024-05-15T16:40:19.330000 -CVE-2024-34101,0,0,57dc3c112be34ec8b6fa52914716368e3e0d45ef2055bcb7e2a377daf556b987,2024-05-15T16:40:19.330000 +CVE-2024-34100,0,1,b9de82a55a848fb0ded50e732f2bd29585de09c57c6a0f2f873468a862d1466f,2024-12-02T21:22:34.273000 +CVE-2024-34101,0,1,0c02bf49fe854ef7dfe4e46c181614b6a7a877ffa285ce6f512ec820ffafd818,2024-12-02T21:22:36.350000 CVE-2024-34102,0,0,876ce402f51a8b6c02751efc7e4b69c49e28c64490e386fcdd90c90466ff21d3,2024-11-29T15:33:14.280000 CVE-2024-34103,0,0,8e858e6deebf3dd74486b084ebc01e723dadd4c1741289465f9eef03525519ca,2024-07-09T15:36:11.363000 CVE-2024-34104,0,0,0c3b9794948346667daf712c1fa8aea7e59869808e596eca4e201c3b2e06e87d,2024-07-09T15:36:40.730000 @@ -256228,7 +256238,7 @@ CVE-2024-35433,0,0,f81c77793e6b4ae7b0491b15530e15eb48456cdd61c3fc22182d06ed972d4 CVE-2024-35434,0,0,21d86b1029a00b97e65dc0e9f829fff58cf55d0aa50fabcc94705f59669d3cd5,2024-08-22T20:35:11.130000 CVE-2024-3544,0,0,ac159828af5bc2292e8e0701d42b4d30a3b9b1860c97c52c0c82cf5c85bdace8,2024-05-02T18:00:37.360000 CVE-2024-3545,0,0,8572c3ccec0c267251b3f9351679ce5114a5e3088ae0469b492154e558f9687c,2024-11-04T17:35:20.247000 -CVE-2024-35451,0,1,a9e8d91c7fb856563fec41fc62c183401db6e468934db2a46c7a491efbf2407a,2024-12-02T20:15:06.700000 +CVE-2024-35451,0,0,a9e8d91c7fb856563fec41fc62c183401db6e468934db2a46c7a491efbf2407a,2024-12-02T20:15:06.700000 CVE-2024-3546,0,0,35163ad2b2190e22887b6e298f1e24f2828b8a7ebd49798d961ad2c534ecb1cb,2024-05-02T18:00:37.360000 CVE-2024-35468,0,0,f9dd9febc4034bc90fe43ce99b50256976b33c57b8b35c20fdc90432a37fa2c3,2024-08-19T15:35:09.230000 CVE-2024-35469,0,0,18bee3ba5715b478a436de716da42f1ea7108aec420f8357db65b4bc2307290f,2024-08-22T19:35:28.953000 @@ -259200,7 +259210,7 @@ CVE-2024-3934,0,0,3e23cb8746110c86130adc40e1a1911de8a168d18836a34bacdc1437f4453c CVE-2024-39340,0,0,fc621b442d86eea0a2e72227f2b14f23e2a67834630b902f47135788b8db4fd4,2024-09-23T15:15:13.907000 CVE-2024-39341,0,0,7c359c6b4015613fc52267fcd7e5d9646d4cfcd7e7964fd0c4b36316116d1347,2024-11-04T17:35:19.370000 CVE-2024-39342,0,0,93fef3118f07e5180653fc41b9d6410f0df44f4e0465d850d3b1f4400c7d473a,2024-09-26T13:32:55.343000 -CVE-2024-39343,1,1,5387f0e37d9edeed6f67983994a72c30c3e3ad56112bee25e823237afaf5f39e,2024-12-02T20:15:06.993000 +CVE-2024-39343,0,0,5387f0e37d9edeed6f67983994a72c30c3e3ad56112bee25e823237afaf5f39e,2024-12-02T20:15:06.993000 CVE-2024-39344,0,0,e818a000a36da13fc4fe8918e0aa5d488785b27901618777d7233d703b03f419,2024-08-26T16:35:10.110000 CVE-2024-39345,0,0,f773bf4aa168ca0fb54a499af45e3e951779cc47e8e783983f66e20a083935eb,2024-09-03T22:15:04.480000 CVE-2024-39347,0,0,f05ffc50868d752b16aba36bcf98397a1a823dcf709e914fdceefc955d8df28b,2024-06-28T10:27:00.920000 @@ -259240,11 +259250,11 @@ CVE-2024-39389,0,0,39fdb9d0b9fb20cf297a06b83cf6ea63096507f0061506f0b3a0f5514e771 CVE-2024-3939,0,0,946bcd2da6cf8e6d3629d51459f4ff005d5f6fd111c61e8b42a0b8395ce78a5e,2024-05-28T12:39:28.377000 CVE-2024-39390,0,0,c8965544c02fdae63e51faeacb24e01b58cd6d48b0d4bbb6d9d53e7a251f45c3,2024-08-19T16:22:28.793000 CVE-2024-39391,0,0,bf23b3a4fcfac995de8f821967dd611a6d3dd8d85e93d5526f26f27ffcdff7d8,2024-08-19T16:22:17.017000 -CVE-2024-39392,0,0,66cfce17bd8b1475fbe1823e0e269e958974fa5e662af0c38bd8aae43df2ebb5,2024-08-02T12:59:43.990000 +CVE-2024-39392,0,1,e10c92c090352ea41f72f60c723c80f7ab4d695101a1aa85c147636e1b8de344,2024-12-02T22:17:30.700000 CVE-2024-39393,0,0,8d078099fcd2ba2e29d66fdd3890558f3d5c728361f03f1806fa233e35110fcb,2024-08-19T16:22:01.510000 CVE-2024-39394,0,0,67d9184a58298d11927ad8a4d2557ca26d7931b94761a921a0e3ca0596e7f469,2024-08-19T16:21:44.130000 CVE-2024-39395,0,0,6041b2c95b4d02613efc44b37a4c39f137ea78ef6f900110e80ea44a0fb6086c,2024-08-19T16:21:26.890000 -CVE-2024-39396,0,0,35651f26387fec82c0dfb279ff129f06faad55e21497397f655b21318cdf6ddc,2024-08-02T12:59:43.990000 +CVE-2024-39396,0,1,6d42a623814e5abc57de7da1a6bc502bbd6ee645bf71737e89d1294e478e1a0f,2024-12-02T22:17:32.997000 CVE-2024-39397,0,0,bc21f8a66648c1efcf4ca52e5ba26326af30e1f67653bf02c4d0fc076a018882,2024-08-14T14:46:52.150000 CVE-2024-39398,0,0,b13e5a889a1d5b727e630d5416e27454a60538370cba632d5345aedf9ef651f1,2024-08-14T14:47:10.077000 CVE-2024-39399,0,0,4cd3219b33101eddf896726c1e1cdd03d88714b46de5e5fffa9cba80cc09741e,2024-08-14T14:47:39.603000 @@ -259668,6 +259678,7 @@ CVE-2024-39886,0,0,c211eb7fd7b7d4a2dcf17c01e99303dbbe9f112b3010b65271b5f2c7acb83 CVE-2024-39887,0,0,bcab76b5e08590d7913c7572e3483924f579ce0c6c9a43158866e543d2bd0484,2024-07-16T14:15:04.380000 CVE-2024-39888,0,0,12ac4fc0e9c84bce2da7114954ff2c2a0c7f51f26f043191b5bde403ad5b0bce,2024-07-09T18:19:14.047000 CVE-2024-3989,0,0,05ae590a507d36950ff969d05988ddbd0846a5630f6cd12721f077e7e440e592,2024-05-14T16:11:39.510000 +CVE-2024-39890,1,1,1abd78fdb2e75f327cc0e488ec9803e48688bf0f1aa5e6a81474037fda0b6eca,2024-12-02T21:15:10.483000 CVE-2024-39891,0,0,ce65af2cc2ab9f5337749d509721b17f14cb456e8c1b3062d4901ad84093db6b,2024-07-24T14:38:43.270000 CVE-2024-39894,0,0,1740bddb6fe58de0ef1c139ba5a05d5875d6244dcec43c669506110ca6b1a045,2024-09-11T16:15:06.003000 CVE-2024-39895,0,0,81e277926f04a447fa0edae3630d7dab6d337a392b69cef51e67fcc762844274,2024-07-09T18:19:14.047000 @@ -260768,7 +260779,7 @@ CVE-2024-41832,0,0,0aae3d28b18298f2b558236451b81f22e0bfeda44aa145e0ca7ba383c218d CVE-2024-41833,0,0,85fc1d4f81094922dce51fd479c7b435396bc7c4f95057b5b31db4afd23d399d,2024-08-15T17:16:37.090000 CVE-2024-41834,0,0,13eed51b4e049020c7f638e068eae53ccda0a6881cd4fb5749936291f43eb8d6,2024-08-15T17:13:25.090000 CVE-2024-41835,0,0,79c86df6665f091ccf38637e3904931e0a79e20c4f60784272f388a048f561fd,2024-08-15T17:13:11.837000 -CVE-2024-41836,0,0,447eeb0d32c0b3fbb708b5b9d75636c09225896b7443055b6e14477ceb9e8a2d,2024-07-24T12:55:13.223000 +CVE-2024-41836,0,1,f410720add9eb9cecfb4e0cc8e053cdf3a0d4f1cd6bbe65793506a5cf6b4bf43,2024-12-02T22:17:28.253000 CVE-2024-41839,0,0,9a0f787d6e23b303277da94f6b7fca243c6839137dcfdc0b22d503addf44ffe6,2024-09-16T13:15:10.250000 CVE-2024-4184,0,0,97f0f6e60ab54d01538d6d4b2a509ea43c378ea58cb11870c912ba2b10ca82d6,2024-10-21T14:09:02.020000 CVE-2024-41840,0,0,3f28aebde978cc1f8839cc676dd62bb75d63b90fe1295e0e4ccf51b0e1e39f51,2024-08-19T18:54:02.200000 @@ -263133,7 +263144,7 @@ CVE-2024-45149,0,0,daf87a7836b76bd56fac2770e905e7b6c1fea6089c2a616c772a21c525fb4 CVE-2024-4515,0,0,745b5001aba1f09f57fb481d2a3d2000635a4a96793fd9115da6678f1f7fddb3,2024-06-04T19:20:40.830000 CVE-2024-45150,0,0,25297a51c7e056e0eef2c1d82abf928cc5b754033a51ebc86ffea268c8dda19e,2024-10-18T14:35:32.140000 CVE-2024-45152,0,0,bd0c32155845100c86d9a163f010bc2cb2e9e7d310daf97560224b9b2f8db8ff,2024-10-18T14:41:51.683000 -CVE-2024-45153,0,0,c9b6f6f604be874c28a0b3df41268a7f7c06f363d60093be6656ca781e4d7ced,2024-10-07T17:47:48.410000 +CVE-2024-45153,0,1,fbfef51b891369d8b4535dbd73c5037c896ececfed8b242bc1453c48af4b8df5,2024-12-02T22:44:29.430000 CVE-2024-45157,0,0,63dadaa4025af01917ecdee4f3056de9070f640b6e5412ee381e40dd74f61d1e,2024-09-12T16:29:42.717000 CVE-2024-45158,0,0,f4aff4de2d03b3142e6ab8f036af352cca5d7617879cb7e89e1ecc71620fc908,2024-09-06T19:35:26.390000 CVE-2024-45159,0,0,315bbe3853593d217ddbcd9fba2e9d9003cbd4c00b52b441be6179268e6c4816,2024-09-19T18:26:24.687000 @@ -265654,8 +265665,8 @@ CVE-2024-49519,0,0,0c9b815ee25fd3b977781ca7322f0301dff2ecb81eb4674ef637be6e0aaf8 CVE-2024-49520,0,0,5417c9518e041be3da563c2aea58b8195b0422391f27b29dc488ee8778558689,2024-11-13T18:51:35.550000 CVE-2024-49521,0,0,b6e71b25b37ec4e45f9c94e2de97660647487c454d6134b4a0e23d5fab648bf3,2024-11-18T18:44:32.113000 CVE-2024-49522,0,0,b49aefd5a73ccd26563c8b91d3f2d98c089948509c56be654cf3171337fc2496,2024-11-08T18:06:01.930000 -CVE-2024-49523,0,0,f80724f56253226f78ea56271ee80d62b3ba148e1878999be1900b25d2719668,2024-11-08T19:01:03.880000 -CVE-2024-49524,0,0,e7793eab2fff9b59c976da4b69592a395e034319e6c39d07f8b75673444fce47,2024-11-08T19:01:03.880000 +CVE-2024-49523,0,1,c23d5903d8a48d0720f16d3331f82d89de559d588c07383f130cba07b652c9c5,2024-12-02T22:44:26.157000 +CVE-2024-49524,0,1,9578ce2f9e746d63134087918524353bc8ec52585fda4db52959eb86bf019547,2024-12-02T22:44:21.850000 CVE-2024-49525,0,0,28a277ab9b52157a5e4549773b7a8750a6dbb7b4cb916799fff07dd0ec631a6f,2024-11-13T18:51:21.430000 CVE-2024-49526,0,0,69c6bf5485d49eb3a2da169497c27d72a1196f6e9a7d6c7d2c7c44787150932a,2024-11-18T18:41:33.857000 CVE-2024-49527,0,0,0d9fde76ea05a295ae3bcd4b45293562d8fc9654bdbe0c09a49c5875709be45a,2024-11-18T18:39:52.213000 @@ -265670,6 +265681,7 @@ CVE-2024-49574,0,0,b617967e93da689f445f38134ba47043080cbdf46d6acc332d4ced620bedb CVE-2024-49579,0,0,0f0dd66a3db0fe299ae55b9b0e6c22f11c400dc3ee27d05103041b63e67e9d3e,2024-11-14T19:24:45.603000 CVE-2024-4958,0,0,15591ba73d7708bbd560fadc0281274b5c7c2c12545797826fbf6e13e1222639,2024-06-03T14:46:24.250000 CVE-2024-49580,0,0,89085af96d96dbfcdc87aa1d40157bd1a1b8615e2e8f40b207dbbe916ae159de,2024-11-14T19:25:47.433000 +CVE-2024-49581,1,1,88736c9a5c653b012c32f21980d87b41c363ec40ca6fbdff7f49248d090d1060,2024-12-02T21:15:10.830000 CVE-2024-4959,0,0,862ee7700763d202e5d5dada80050e48cca3b83d56a63673f2017bcf5adb7503,2024-07-03T02:08:22.750000 CVE-2024-49592,0,0,2c7b7fb1be7fc5fd754e82efd0fe5851f47e43e4cc7b8ec1fd6fcc2811eb81ce,2024-11-27T17:15:12.093000 CVE-2024-49593,0,0,0790debc03c6d685a8ce9800bcaf05d3a2d51714ee514270485ccb66f44467d5,2024-11-18T19:35:04.960000 @@ -267676,8 +267688,8 @@ CVE-2024-52711,0,0,25e806d2babc20691476aabfcc4918f38a4f803e2dadea4a566e728ec69d7 CVE-2024-52714,0,0,e8174cb74f218481a745eaa4fb4441e2ce8d564c733028629c2c073a4476af1a,2024-11-20T20:35:15.260000 CVE-2024-5272,0,0,d387d985ee64cb70308558e1288744b27040b8f28ef99da7e8b0a0af44167dd6,2024-05-28T12:39:28.377000 CVE-2024-52723,0,0,5e158b9e6ae935fe53fcd904758ef5184a80e91ca85495f081966847a4cf0194,2024-11-22T16:15:33.983000 -CVE-2024-52724,1,1,31bcc87a603cca0a8b96eca1f7ca6e15911f791c17c30d44ad001cfd53b29b95,2024-12-02T19:15:10.697000 -CVE-2024-52725,0,0,33f6fa34c3dd7f326aa8525752182246593fbe26f97c40f7481f5dc188051048,2024-11-20T17:15:18.867000 +CVE-2024-52724,0,0,31bcc87a603cca0a8b96eca1f7ca6e15911f791c17c30d44ad001cfd53b29b95,2024-12-02T19:15:10.697000 +CVE-2024-52725,0,1,ca83ad92f53ba791b675728b41a882f6bce2ad034a322e498ad5b1a0459b09dd,2024-12-02T21:15:10.977000 CVE-2024-52726,0,0,07104ca9c9e8f2a3a4e4ad76e018b45eb5df5070643287e443babd815c74fea3,2024-11-27T17:15:13.463000 CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000 CVE-2024-52732,0,0,d6a80ccb8de450005a7cb1743d48fc0ea7e9c3041c776b4edbabfa2f08461cb5,2024-12-02T15:15:12.270000 @@ -267888,9 +267900,10 @@ CVE-2024-53335,0,0,c7b5a8f73d12d44b7820d29b4dc55e553a7dba1e50218bfd0cdeaf78dc12e CVE-2024-5334,0,0,24408ed0ac6ef1e7a34f70a35a6cc670103055f984541012ab7ae541f1637158,2024-07-12T08:15:11.130000 CVE-2024-5335,0,0,ca6f9c300eae3fba64e2743a790d9179f2c4fca4ad8e008f81848f8094115088,2024-08-21T12:30:33.697000 CVE-2024-5336,0,0,2f884d9a8acdce925dfd5f3bbb7e4d857b44070abc5058c1ed58328cd4186515,2024-06-04T19:21:04.947000 -CVE-2024-53364,0,1,708f3ece40bf0bf488cd6ba77ae8795762f91e489b51a867d515c5116d6de69d,2024-12-02T20:15:07.487000 +CVE-2024-53364,0,0,708f3ece40bf0bf488cd6ba77ae8795762f91e489b51a867d515c5116d6de69d,2024-12-02T20:15:07.487000 CVE-2024-53365,0,0,f94a22f04b10f25f8afa0eb1104a56f755f11fa91566b703eeea9947dc95908c,2024-11-26T20:15:33.650000 CVE-2024-5337,0,0,2b5f97595978a274de9cc82ffbb4e0a657c957408faf59676ddd95606d164a93,2024-06-04T19:21:05.063000 +CVE-2024-53375,1,1,b686c16d5a9d9c6ff7ab59ef7e382bb1fb40c729bbe54dddf6d66315c37d5e8b,2024-12-02T22:15:10.507000 CVE-2024-5338,0,0,a30664650e5151e5bf507d4d1b27e8e105537061b8462474ea4f7add61cf4b05,2024-06-04T19:21:05.170000 CVE-2024-5339,0,0,f1bbd379636cfad5e34ec0ced69571115fae96e9b2078934f8d5d54e609ed8df,2024-06-04T19:21:05.273000 CVE-2024-5340,0,0,546c56f2649b42bddc6aa9959f384e4ae23101ba059a7107ea7eadf7da74c09f,2024-06-04T19:21:05.373000 @@ -267905,8 +267918,9 @@ CVE-2024-5345,0,0,e63bd8698ebea410f9684596571cb5f236dcece9e087d3c47739e1f377731d CVE-2024-53459,0,0,bcee038fd506b2d042b2e2518da0df51a6c3759ec3722aac04f828072f98c4d4,2024-12-02T18:15:11.123000 CVE-2024-5346,0,0,da43d69a3160345da9f992308a5772b156b46661e78425f332f67d306a3affb7,2024-06-24T20:00:59.240000 CVE-2024-5347,0,0,16093735dbce016cf2430c73a4d8045f77e47434e1c219ace83416138a28cb5d,2024-05-31T13:01:46.727000 +CVE-2024-53477,1,1,753aaf8c684bb995d983939a69c12192942ed2e573e55f2d4f5233aa6560b86c,2024-12-02T21:15:11.217000 CVE-2024-5348,0,0,bc3d8d1f3668d1fc879553d2a82a62e6b9980757b64bfd9f1d5fdacf853f73c6,2024-06-03T14:46:24.250000 -CVE-2024-53484,1,1,7f2e36a94d2ab38efc349e912aac79a8f2255c98dd9d4e3cafa14fba72ce9911,2024-12-02T19:15:10.820000 +CVE-2024-53484,0,0,7f2e36a94d2ab38efc349e912aac79a8f2255c98dd9d4e3cafa14fba72ce9911,2024-12-02T19:15:10.820000 CVE-2024-5349,0,0,095035450c60a13c08898917421d5656b2399179b1253e40806dcf47c3a4d9f7,2024-07-03T15:44:23.807000 CVE-2024-5350,0,0,8440f1aab6c7debe55a047353772f60d1de30f1b1b7f7fc13c3946381d3b4f12,2024-05-28T12:39:42.673000 CVE-2024-53504,0,0,0cf1059548643389b1e33bad68f218b18235298c923b702dcc5a0c676fd86048,2024-12-02T17:15:13.047000 @@ -267934,11 +267948,11 @@ CVE-2024-53603,0,0,162b8a1c0030915029673db748be5d0adb733dae81b9ae207cb34767108f8 CVE-2024-53604,0,0,f62d305bb98148833da87db5a11321e6ca6d6dd658f1c5fbfba2d66d119aa0aa,2024-11-29T14:15:05.893000 CVE-2024-53605,0,0,ca300feecc4d15af3b8cbc938be55c089599ebfcca8298d8fee9c4660ffccb57,2024-12-02T01:15:04.030000 CVE-2024-5361,0,0,5486d2207143454b44a9225276732f9ee62f5258ee0c41c9fa5501a1b55451e4,2024-05-28T12:39:42.673000 -CVE-2024-53617,1,1,1d15b7d8455e44e7d682bb17f092211a84550d994186e8d8092655932756eace,2024-12-02T20:15:07.710000 +CVE-2024-53617,0,0,1d15b7d8455e44e7d682bb17f092211a84550d994186e8d8092655932756eace,2024-12-02T20:15:07.710000 CVE-2024-53619,0,0,7d24d177db4282b10dd583a800553384958865a9c2b032eab35d21cf889272f3,2024-11-26T20:15:33.880000 CVE-2024-5362,0,0,5b47523dd74fc943fbc0021df1551e4d13ec69c02c41616d4b2935f18460ef93,2024-06-04T19:21:06.287000 CVE-2024-53620,0,0,9d59f48eff7094eebabf16396953b43066a8c0a92b748f43ae8922b5e2bf6319,2024-11-26T20:15:34.050000 -CVE-2024-53623,0,1,531ddce100784ec8b317b297b660a260e518e8b80f64012824aac6bf3d8289e3,2024-12-02T20:15:07.917000 +CVE-2024-53623,0,0,531ddce100784ec8b317b297b660a260e518e8b80f64012824aac6bf3d8289e3,2024-12-02T20:15:07.917000 CVE-2024-5363,0,0,bb04284a4e58fb2effb3b9c467567f3bbd6015eb64c220429872004dc6821b06,2024-06-04T19:21:06.390000 CVE-2024-53635,0,0,6e8b5160fce2a741e8ac5d43a4a38430a8c2b5d2b740bbc37c715cac813c59a2,2024-11-27T18:15:18.130000 CVE-2024-5364,0,0,96afe929167b2de1681dda607a064227a5b629af3adb1987caaf0917b62b92a8,2024-06-04T19:21:06.490000 @@ -268059,7 +268073,7 @@ CVE-2024-53855,0,0,3b7a475c32d1d09fe2eb4189fd1d6fb7d653d88d8eb34139f0255f4c5d06f CVE-2024-53858,0,0,6c64b7a629ccdbeeaa44425cb24892d67f2dbeb5f6725b97741be6047ebd2567,2024-11-27T22:15:05.520000 CVE-2024-53859,0,0,4facd2b494aef0ff73beaf08d6d1ca6f6f9ab5c48842cb7bed7f8b39e94a454f,2024-11-27T22:15:05.673000 CVE-2024-53860,0,0,f686ec46a02a9bc4a804217b41a7af4658fb7390d2c722028f65e08a7a2b5414,2024-11-27T22:15:05.833000 -CVE-2024-53861,0,1,c906a7c9ad7960370bb443153ada29d340a316d0e26a761ec82eb161aaf6e2d4,2024-12-02T19:15:12.150000 +CVE-2024-53861,0,0,c906a7c9ad7960370bb443153ada29d340a316d0e26a761ec82eb161aaf6e2d4,2024-12-02T19:15:12.150000 CVE-2024-53862,0,0,eb71730385f5a115df10825836b94c0319055c91f99db9bfd92d5c3006795a35,2024-12-02T16:15:14.277000 CVE-2024-53864,0,0,5333aa1d756baa8b2b2af9d321f1e4bf84fee7810b77a54afa507c359fe16403,2024-11-29T19:15:09.577000 CVE-2024-53865,0,0,4a38354939a410a34cc87939fb2218794cb79b60b95dc7b6ebed34b8c98c2e76,2024-11-29T19:15:09.710000 @@ -268068,7 +268082,7 @@ CVE-2024-5388,0,0,88068f2d18329bc2e1ad4660154ccfa55826fed94a4e1660b5757c6715c273 CVE-2024-5389,0,0,f6aaaf23dff2a1d7f90a7950cdbb76e8322ef8c0ff1bf8f6173fe4634d169b69,2024-07-09T19:15:13.853000 CVE-2024-53899,0,0,ca94e39391001349829a2f872ca5d1d0c6ef0f2f07a2a901a4f8c2f87ada266a,2024-11-26T18:23:09.517000 CVE-2024-5390,0,0,577e03013c579fd5ea5c07b95a092cd4d32be3fa4130d25da9e61ffe468007ab,2024-06-04T19:21:08.020000 -CVE-2024-53900,1,1,d85cbefb465ea902cbbe0e0389f3f5eff99eb2d1812c50eefe5ac1d7199e1a85,2024-12-02T20:15:08.347000 +CVE-2024-53900,0,0,d85cbefb465ea902cbbe0e0389f3f5eff99eb2d1812c50eefe5ac1d7199e1a85,2024-12-02T20:15:08.347000 CVE-2024-53901,0,0,52cbcc170c451b305e90c5f0e2a88558d86a9bc5446c93579e76a9aa43a0081d,2024-11-26T19:52:01.653000 CVE-2024-53909,0,0,f496b480d61110aca5ba4afaa8506ac48e157eddeacabdc9f46723c429d54992,2024-11-29T20:54:47.700000 CVE-2024-5391,0,0,a7c29f93c1b76aed47351138468a6c5b251b9f9a4ad39cf688118719a36ed1c7,2024-06-07T20:15:12.687000 @@ -268083,7 +268097,11 @@ CVE-2024-5392,0,0,b24872fec717fdd1d01c0a9d16cd8dae85d0db85954b236e74ba95a5e5c835 CVE-2024-53920,0,0,a291ce56b664f688b2d6f36f512bf0b737cf558f95f0af0d70bd1b3310ba1ecf,2024-12-02T17:15:13.913000 CVE-2024-5393,0,0,295d4f9eb57788d71849a73c0b5d6c4f89e92a1e7613c6c16abcfeb4329f6a42,2024-06-04T19:21:08.420000 CVE-2024-53930,0,0,1076c24462100197e38bce4bb3bb1d95bc12e583ba6e6f216b5c96e80fcd4c47,2024-11-26T16:15:21.150000 +CVE-2024-53938,1,1,00aded0375d391a087a15db921a447eed8670e453691bf728d3fae98e66e6100,2024-12-02T22:15:10.633000 +CVE-2024-53939,1,1,e7320e3797895c63e43c4a9ec5307dd5f614a377bc9de5971ce6aab8c2f2f12b,2024-12-02T22:15:10.757000 CVE-2024-5394,0,0,aaadf9a58796777f85dc2107a816ebb5c0ae4c9d890d2d8c3ab15382290e4f66,2024-06-04T19:21:08.527000 +CVE-2024-53940,1,1,0e2171e6261f48306c1a6c46d350addc4f2e85b214a329e78036a56b49e2ec36,2024-12-02T22:15:10.880000 +CVE-2024-53941,1,1,bb701754b0f29aec99d35aefc4ba9fa9c71af7b26206bbe6f629d295ba6eef01,2024-12-02T22:15:10.993000 CVE-2024-5395,0,0,e532c0fafbcef9b666c7ef0302f25a35b4dc4d0c2a33d2079af161ebd3ce2b3c,2024-05-28T12:39:28.377000 CVE-2024-5396,0,0,d0f735b85e524715ed1861b804d3fb37a4720102a88b42bc6f1eec50bfcc099d,2024-06-04T19:21:08.627000 CVE-2024-5397,0,0,79c82f6af34f5d76edc0fe512c9b3e616bf4c7ca15c122380ba9806c73a591a6,2024-06-04T19:21:08.733000 @@ -268095,6 +268113,11 @@ CVE-2024-53980,0,0,f2c4b71c263d54957f07bea69df75ebb3d992381d97f959d8cfdaa259a929 CVE-2024-53981,0,0,4ba898eb1befa3f2561edd750eac82eeb420da27aa2d03f7cf36b5b838c9b47f,2024-12-02T16:15:14.457000 CVE-2024-53983,0,0,53274ba64b5204fbd988c3ba5170f84dc187572b2bad72061a88e06a87cfa81a,2024-11-29T19:15:10.137000 CVE-2024-53984,0,0,892c82f8a41d78ebdbb6204162b35fdbbfd980dac8482c839614b9f0b40eeb3b,2024-12-02T16:15:14.603000 +CVE-2024-53985,1,1,b2dd022282a98e85588906fb6b8a5b377ec403f760a946a9025c43dfda60aaa6,2024-12-02T22:15:11.197000 +CVE-2024-53986,1,1,b3112a59de443cb770f6e7779568f5fd73700cf10e2a14df140c7537de6b5a1e,2024-12-02T22:15:11.343000 +CVE-2024-53987,1,1,36d1bb114e13cfa7ce919f4ed46cbfb425a7d934a477c1710d295b37446b1075,2024-12-02T22:15:11.473000 +CVE-2024-53988,1,1,8b45a29e5631206d0cbfff2872f8d738c2060b05b2ada0e5923c9981eef80240,2024-12-02T22:15:11.610000 +CVE-2024-53989,1,1,0358cc647ddace41a4dfeb86c3aca5be8a1a57964a4ee04c89fd93a56be3847d,2024-12-02T22:15:11.740000 CVE-2024-5399,0,0,6f591a4ee360dfdb4118262029ef6ec2f3647ffdfa160e81ed9cdadb88ac0f1d,2024-05-28T12:39:28.377000 CVE-2024-53990,0,0,6379e4bbe26e19105376b36b2196150c1631dc13a93cec6d1f3c3cedfc26df0a,2024-12-02T18:15:11.753000 CVE-2024-53992,0,0,968e2d279d6edfc36860c960df4396bf9d9df657b6a78a28aa81a3adc4be5a3e,2024-12-02T17:15:14.113000 @@ -268547,7 +268570,7 @@ CVE-2024-5885,0,0,dcdbec1e5ab1fdbf77f5f1b7e765973fbf7491d04e03a7c4b99d66ab0997c5 CVE-2024-5886,0,0,c6e7cb024adb68ffe24a326928e4d7c782b39c0023921bf84bad462101dad3b7,2024-06-20T11:15:56.580000 CVE-2024-5887,0,0,9566859cf83ab696aed1d992c858295b1ee73a5dd4c0fa67df0787b71b1dba0d,2024-07-17T12:15:02.013000 CVE-2024-5889,0,0,fbcff794637f48a8b78c74fdd2956f49b1e81babb06e13aa124ccff6d03acd89,2024-08-01T16:50:43.603000 -CVE-2024-5890,1,1,7c6b5ac721dd6914eae890c33082005820010469b56039e337acfc1334e10773,2024-12-02T19:15:12.357000 +CVE-2024-5890,0,0,7c6b5ac721dd6914eae890c33082005820010469b56039e337acfc1334e10773,2024-12-02T19:15:12.357000 CVE-2024-5891,0,0,a1103d3c594e6c6c8995aad9b94775b3d253fc3aed0174490e511fc908219bb6,2024-10-04T12:32:13.813000 CVE-2024-5892,0,0,c827287e71db613eefb73da2ddb327e45b7bab6b508053dda1226986578187ad,2024-06-13T18:36:09.013000 CVE-2024-5893,0,0,78ef67dfe3790c320a0f9ba1a7349940f70da93d76f5f0750d1f242e1c8acc0a,2024-08-14T14:02:14.170000