diff --git a/CVE-2024/CVE-2024-105xx/CVE-2024-10567.json b/CVE-2024/CVE-2024-105xx/CVE-2024-10567.json new file mode 100644 index 00000000000..a71f473aec3 --- /dev/null +++ b/CVE-2024/CVE-2024-105xx/CVE-2024-10567.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-10567", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-04T09:15:04.177", + "lastModified": "2024-12-04T09:15:04.177", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The TI WooCommerce Wishlist plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wizard' function in all versions up to, and including, 2.9.1. This makes it possible for unauthenticated attackers to create new pages, modify plugin settings, and perform limited options updates." + }, + { + "lang": "es", + "value": "El complemento TI WooCommerce Wishlist para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a la falta de una comprobaci\u00f3n de capacidad en la funci\u00f3n \"asistente\" en todas las versiones hasta la 2.9.1 incluida. Esto permite que atacantes no autenticados creen p\u00e1ginas nuevas, modifiquen la configuraci\u00f3n del complemento y realicen actualizaciones limitadas de opciones." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3199516/ti-woocommerce-wishlist", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0a5f2e1a-2216-4885-9b74-a08142816f2b?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-107xx/CVE-2024-10787.json b/CVE-2024/CVE-2024-107xx/CVE-2024-10787.json new file mode 100644 index 00000000000..7a399299d08 --- /dev/null +++ b/CVE-2024/CVE-2024-107xx/CVE-2024-10787.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-10787", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-04T09:15:04.323", + "lastModified": "2024-12-04T09:15:04.323", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The LA-Studio Element Kit for Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.4.4 via the 'elementor-template' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from private and draft posts created by Elementor that they should not have access to." + }, + { + "lang": "es", + "value": "El complemento LA-Studio Element Kit para Elementor para WordPress es vulnerable a la exposici\u00f3n de informaci\u00f3n en todas las versiones hasta la 1.4.4 incluida a trav\u00e9s del c\u00f3digo abreviado 'elementor-template' debido a restricciones insuficientes sobre qu\u00e9 publicaciones se pueden incluir. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, extraigan datos de publicaciones privadas y borradores creadas por Elementor a las que no deber\u00edan tener acceso." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3198563%40lastudio-element-kit&new=3198563%40lastudio-element-kit&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2e63c0fb-7fe7-42f7-8fa9-ec159d3c8117?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11814.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11814.json new file mode 100644 index 00000000000..57b45780e0c --- /dev/null +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11814.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-11814", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-04T10:15:05.007", + "lastModified": "2024-12-04T10:15:05.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Additional Custom Order Status for WooCommerce plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the wfwp_wcos_delete_finished, wfwp_wcos_delete_fallback_finished, wfwp_wcos_delete_fallback_orders_updated, and wfwp_wcos_delete_fallback_status parameters in all versions up to, and including, 1.6.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3198852%40order-status-for-woocommerce%2Ftrunk&old=3179390%40order-status-for-woocommerce%2Ftrunk&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/28267144-a709-4631-8925-69c6e0aca77c?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11880.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11880.json new file mode 100644 index 00000000000..23a3180c798 --- /dev/null +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11880.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2024-11880", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-04T09:15:04.470", + "lastModified": "2024-12-04T09:15:04.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The B Testimonial \u2013 testimonial plugin for WP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'b_testimonial' shortcode in all versions up to, and including, 1.2.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento B Testimonial \u2013 testimonial plugin for WP para WordPress, es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del c\u00f3digo abreviado 'b_testimonial' del complemento en todas las versiones hasta la 1.2.2 incluida , debido a una desinfecci\u00f3n de entrada y al escape de salida insuficiente en los atributos proporcionados por el usuario. Esto permite que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n siempre que un usuario acceda a una p\u00e1gina inyectada." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/b-testimonial/tags/1.2.2/inc/theme/one.php#L18", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3200155/b-testimonial/trunk/inc/theme/one.php", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3200155%40b-testimonial&new=3200155%40b-testimonial&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ea251110-02fa-4f4e-a578-855d3331b200?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-119xx/CVE-2024-11952.json b/CVE-2024/CVE-2024-119xx/CVE-2024-11952.json new file mode 100644 index 00000000000..6d223976f6e --- /dev/null +++ b/CVE-2024/CVE-2024-119xx/CVE-2024-11952.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-11952", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-04T09:15:04.637", + "lastModified": "2024-12-04T09:15:04.637", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Classic Addons \u2013 WPBakery Page Builder plugin for WordPress is vulnerable to Limited Local PHP File Inclusion in all versions up to, and including, 3.0 via the 'style' parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, and permissions granted by an Administrator, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other \u201csafe\u201d file types can be uploaded and included. The vulnerability is limited to PHP files in a Windows environment." + }, + { + "lang": "es", + "value": "El complemento Classic Addons \u2013 WPBakery Page Builder para WordPress es vulnerable a la inclusi\u00f3n limitada de archivos PHP locales en todas las versiones hasta la 3.0 incluida a trav\u00e9s del par\u00e1metro 'style'. Esto permite que atacantes autenticados, con acceso de nivel de colaborador o superior, y permisos otorgados por un administrador, incluyan y ejecuten archivos arbitrarios en el servidor, lo que permite la ejecuci\u00f3n de cualquier c\u00f3digo PHP en esos archivos. Esto se puede utilizar para eludir los controles de acceso, obtener datos confidenciales o lograr la ejecuci\u00f3n de c\u00f3digo en casos en los que se puedan cargar e incluir im\u00e1genes y otros tipos de archivos \"seguros\". La vulnerabilidad se limita a los archivos PHP en un entorno Windows." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/classic-addons-wpbakery-page-builder-addons/tags/3.1/addons/testimonial-slider-item/testimonial-slider-item.php#L28", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9645b17e-6a7c-4cdd-ae43-7d2c84b624cc?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-50xx/CVE-2024-5020.json b/CVE-2024/CVE-2024-50xx/CVE-2024-5020.json new file mode 100644 index 00000000000..c165ec27342 --- /dev/null +++ b/CVE-2024/CVE-2024-50xx/CVE-2024-5020.json @@ -0,0 +1,112 @@ +{ + "id": "CVE-2024-5020", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-12-04T09:15:04.813", + "lastModified": "2024-12-04T09:15:04.813", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled FancyBox JavaScript library (versions 1.3.4 to 3.5.7) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "Varios complementos para WordPress son vulnerables a Cross-Site Scripting almacenado a trav\u00e9s de la librer\u00eda de JavaScript FancyBox incluida en el complemento (versiones 1.3.4 a 3.5.7) en varias versiones debido a una desinfecci\u00f3n de entrada y al escape de salida insuficiente en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitrarios en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/changeset/3150376/woo-smart-quick-view", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3153081/colibri-page-builder", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3156791/form-maker", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3157076/nextgen-gallery", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3158415/envira-gallery-lite", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3160232/easy-fancybox", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3160432/visual-portfolio", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3161422/fv-wordpress-flowplayer", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3161892/wp-carousel-free", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3169926/accordion-slider", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset/3173097/responsive-lightbox", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3175577%40getwid%2Ftrunk&old=3119180%40getwid%2Ftrunk&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3186301%40fancybox-for-wordpress%2Ftrunk&old=3058912%40fancybox-for-wordpress%2Ftrunk&sfp_email=&sfph_mail=", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d99d4b9a-aa09-434d-91a8-7afaa0e8b5db?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 28d9e1dc25a..dc738956f30 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-12-04T09:00:47.617293+00:00 +2024-12-04T11:00:42.223440+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-12-04T08:15:07.357000+00:00 +2024-12-04T10:15:05.007000+00:00 ``` ### Last Data Feed Release @@ -33,35 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -272071 +272077 ``` ### CVEs added in the last Commit -Recently added CVEs: `10` +Recently added CVEs: `6` -- [CVE-2023-52943](CVE-2023/CVE-2023-529xx/CVE-2023-52943.json) (`2024-12-04T07:15:04.033`) -- [CVE-2023-52944](CVE-2023/CVE-2023-529xx/CVE-2023-52944.json) (`2024-12-04T07:15:05.790`) -- [CVE-2023-6978](CVE-2023/CVE-2023-69xx/CVE-2023-6978.json) (`2024-12-04T08:15:05.933`) -- [CVE-2024-10664](CVE-2024/CVE-2024-106xx/CVE-2024-10664.json) (`2024-12-04T08:15:06.150`) -- [CVE-2024-11293](CVE-2024/CVE-2024-112xx/CVE-2024-11293.json) (`2024-12-04T08:15:06.343`) -- [CVE-2024-11398](CVE-2024/CVE-2024-113xx/CVE-2024-11398.json) (`2024-12-04T07:15:05.983`) -- [CVE-2024-11466](CVE-2024/CVE-2024-114xx/CVE-2024-11466.json) (`2024-12-04T08:15:06.523`) -- [CVE-2024-11769](CVE-2024/CVE-2024-117xx/CVE-2024-11769.json) (`2024-12-04T08:15:06.680`) -- [CVE-2024-11903](CVE-2024/CVE-2024-119xx/CVE-2024-11903.json) (`2024-12-04T08:15:06.830`) -- [CVE-2024-45717](CVE-2024/CVE-2024-457xx/CVE-2024-45717.json) (`2024-12-04T07:15:06.167`) +- [CVE-2024-10567](CVE-2024/CVE-2024-105xx/CVE-2024-10567.json) (`2024-12-04T09:15:04.177`) +- [CVE-2024-10787](CVE-2024/CVE-2024-107xx/CVE-2024-10787.json) (`2024-12-04T09:15:04.323`) +- [CVE-2024-11814](CVE-2024/CVE-2024-118xx/CVE-2024-11814.json) (`2024-12-04T10:15:05.007`) +- [CVE-2024-11880](CVE-2024/CVE-2024-118xx/CVE-2024-11880.json) (`2024-12-04T09:15:04.470`) +- [CVE-2024-11952](CVE-2024/CVE-2024-119xx/CVE-2024-11952.json) (`2024-12-04T09:15:04.637`) +- [CVE-2024-5020](CVE-2024/CVE-2024-50xx/CVE-2024-5020.json) (`2024-12-04T09:15:04.813`) ### CVEs modified in the last Commit -Recently modified CVEs: `6` +Recently modified CVEs: `0` -- [CVE-2023-40660](CVE-2023/CVE-2023-406xx/CVE-2023-40660.json) (`2024-12-04T08:15:04.043`) -- [CVE-2023-41175](CVE-2023/CVE-2023-411xx/CVE-2023-41175.json) (`2024-12-04T08:15:05.413`) -- [CVE-2023-6267](CVE-2023/CVE-2023-62xx/CVE-2023-6267.json) (`2024-12-04T08:15:05.740`) -- [CVE-2024-50311](CVE-2024/CVE-2024-503xx/CVE-2024-50311.json) (`2024-12-04T08:15:06.993`) -- [CVE-2024-7409](CVE-2024/CVE-2024-74xx/CVE-2024-7409.json) (`2024-12-04T08:15:07.190`) -- [CVE-2024-9671](CVE-2024/CVE-2024-96xx/CVE-2024-9671.json) (`2024-12-04T08:15:07.357`) ## Download and Usage diff --git a/_state.csv b/_state.csv index e603fee6b45..57cd15fa9ef 100644 --- a/_state.csv +++ b/_state.csv @@ -231272,7 +231272,7 @@ CVE-2023-40657,0,0,de372f5606a6a9c0eb353d9acefa85fa576d984d78e2f34c3e3bafeafb5ce CVE-2023-40658,0,0,ec6a7da992e4a61e093680a2b43bb0d08dcdbf46697d35ad12b8309e47940e08,2023-12-19T16:18:43.973000 CVE-2023-40659,0,0,35befea62191f695c48319d8ed013a9b87268e043d5c4cb35cf83c6b24b9dbba,2023-12-19T16:19:14.030000 CVE-2023-4066,0,0,482f0605c00fe47c2e56add459aa14771a908830e4024cd5720c226e1cad88fe,2023-11-07T04:22:05.117000 -CVE-2023-40660,0,1,8f0d2ab960b481c9115618d0598631b687825125e0c8da51e6f54573c4040e08,2024-12-04T08:15:04.043000 +CVE-2023-40660,0,0,8f0d2ab960b481c9115618d0598631b687825125e0c8da51e6f54573c4040e08,2024-12-04T08:15:04.043000 CVE-2023-40661,0,0,ead81992a121a065406ead845a6eff8cbe7ffa67b4cbdf514191ab6ae8e666ff,2024-09-16T17:15:59.490000 CVE-2023-40662,0,0,594636a14114b8f6c5f805485b6204c56b0cc1ae1d017c97614bf987015f6bc0,2023-12-06T01:58:09.613000 CVE-2023-40663,0,0,5c227ce83fd9abaeefb23f5cd3cc170595345142500017896629afe65fb29c5f,2023-09-28T16:40:06.667000 @@ -231642,7 +231642,7 @@ CVE-2023-41171,0,0,e91c1c0983b18373caa01d2fc3829d4aca5526f6ea91f09225762071e0c00 CVE-2023-41172,0,0,a2a36b7918a13bed62f70cad725e2f7ca8218a25c101404c0106500b1a272788,2023-12-12T18:11:23.157000 CVE-2023-41173,0,0,44360db06d77e3ca130be3f73c6fa563158b2ab9fb89660101960bfa3809c8da,2024-10-02T18:35:07.057000 CVE-2023-41174,0,0,2b2ea5ae0f2b5c6f0c6c3a442733edf6861dc2bbb5ee3334bd5d62867b5b303e,2023-11-07T04:20:56.423000 -CVE-2023-41175,0,1,882175afbfccbb6a9b60a1ad5c0e3e7a620d681e62eff2fdf0602bf627e3212a,2024-12-04T08:15:05.413000 +CVE-2023-41175,0,0,882175afbfccbb6a9b60a1ad5c0e3e7a620d681e62eff2fdf0602bf627e3212a,2024-12-04T08:15:05.413000 CVE-2023-41176,0,0,735a0bc0e4dcb12596e8399bf2bb3db1e454d6b0ecbf729493e45efd006cfa90,2024-01-29T17:36:19.543000 CVE-2023-41177,0,0,85d92f4605d3211cf1bde63a5199a5251834ff7f9b179a06c1231042c732c91a,2024-01-29T17:36:01.880000 CVE-2023-41178,0,0,ae4285b4cb6a4ba4be6bd1f532eeda2be8bd03382dfa154527e14597a8ca5649,2024-01-29T17:35:46.797000 @@ -239969,8 +239969,8 @@ CVE-2023-52921,0,0,a48775dbfab0732fcd6f1775e31ba85c4c607611235b45012eee015ec3b0e CVE-2023-52922,0,0,f8dda9a612a62da48681886aa5b29d558c036a1e4859b270d3dc7f2c2a284a40,2024-11-28T15:15:17.260000 CVE-2023-5293,0,0,37b5570c94c226fac17bbeba13451e285dd87937cebf55577645a70e3fbcf851,2024-05-17T02:32:58.843000 CVE-2023-5294,0,0,91871d88408d7e2bcaad4b05fb484ac2315248d3665cd88ba6ae47f2da8d5f16,2024-05-17T02:32:58.950000 -CVE-2023-52943,1,1,95172f22973222adafe75d0bb50e3a0b028ba6a84ad2606ffcdfeba0a725d52b,2024-12-04T07:15:04.033000 -CVE-2023-52944,1,1,6304c319a82e26814feba4d5659596e36a405f000e683b1df7c8011ab60d7aa7,2024-12-04T07:15:05.790000 +CVE-2023-52943,0,0,95172f22973222adafe75d0bb50e3a0b028ba6a84ad2606ffcdfeba0a725d52b,2024-12-04T07:15:04.033000 +CVE-2023-52944,0,0,6304c319a82e26814feba4d5659596e36a405f000e683b1df7c8011ab60d7aa7,2024-12-04T07:15:05.790000 CVE-2023-52946,0,0,43d8c575418a7f78a11e9526af607aac1baa72cf0563b1f4b331156f6ceab810,2024-10-08T15:55:07.543000 CVE-2023-52947,0,0,63d645c926faea55b9fdad340f3f464b9fdc9faedf4a6e963e4826e43b2cd432,2024-10-02T15:26:28.213000 CVE-2023-52948,0,0,f79919aed1747abb868b7504103d5ade0b888b12580c06d7084afbaa6db543f5,2024-10-02T15:26:30.160000 @@ -240879,7 +240879,7 @@ CVE-2023-6263,0,0,6ffbe7a0f3ed5da65854400a3ae0f9155c9da08a9eb879f8adbcc066abc0ab CVE-2023-6264,0,0,bf7f0e509c0a54e71114843664df9d940b4cca0fe96092175c117a53c783fa32,2023-12-01T03:51:45.277000 CVE-2023-6265,0,0,51fef7a1d70a0713d35cf095b64918c44089e076c67fa317ecf944dd1c1b4cc0,2024-08-02T09:15:35.073000 CVE-2023-6266,0,0,f933e3bedba95dd495fb578e964515f95892aaed9560e4c9e46b1e0c0e076d10,2024-01-17T20:13:08.783000 -CVE-2023-6267,0,1,dee65e356e3e4276e2c163d1c8301624af12daba4da3110a5be52bd415de11eb,2024-12-04T08:15:05.740000 +CVE-2023-6267,0,0,dee65e356e3e4276e2c163d1c8301624af12daba4da3110a5be52bd415de11eb,2024-12-04T08:15:05.740000 CVE-2023-6268,0,0,45dfb68afc069393d3628900f65c6191652ee16c03fc7a8017e48e14bf1edd9a,2024-01-04T03:14:37.020000 CVE-2023-6269,0,0,0bfa35c6ca8316c74fb5cc127597f80feb0289558fe11e8a4f742ed223ba9bb3,2023-12-13T17:15:07.400000 CVE-2023-6270,0,0,d00bdd52db567626fb03ea16d06bfd12d7d4f39059f0134b911e740fab0af4ee,2024-06-27T13:15:54.233000 @@ -241498,7 +241498,7 @@ CVE-2023-6974,0,0,95d755ed2cf9cd3ad0ce8d7777c37b70e8c0e863aed2be171a17161f3dfa16 CVE-2023-6975,0,0,9cdc17f352bc9a458492222cdb3c822da88f8f2da8948b96e948d50c21eb5bbf,2024-02-06T20:16:02.677000 CVE-2023-6976,0,0,1646cd6017c3d3525c51772f5b0b195ab0d1518be4c9d1e29e19c42f1c81fe9e,2023-12-29T16:44:03.743000 CVE-2023-6977,0,0,21e2be0415bb63130af434bb9a3ab0274dbb5909f12b56f7cda0d0943fa7eab6,2023-12-29T16:45:44.597000 -CVE-2023-6978,1,1,1a99910c4fa020f164dd5e3d974735ca14a374b259fc40934d2e073e58155e39,2024-12-04T08:15:05.933000 +CVE-2023-6978,0,0,1a99910c4fa020f164dd5e3d974735ca14a374b259fc40934d2e073e58155e39,2024-12-04T08:15:05.933000 CVE-2023-6979,0,0,7bfafff9fa2bbdadd15de95e2a32407c6623f50daf763ca19cc980f5cf119318,2024-01-18T17:04:44.897000 CVE-2023-6980,0,0,30b229af76685b0c302c8a090a3a1ef55920179808a8370cc5c41c5cdffaf2d4,2024-01-10T13:29:13.183000 CVE-2023-6981,0,0,4cc78b4ca87f79a5dec7dc8697f5c75caa8e76dac9ed1576e8afd9c8acefe18d,2024-01-09T18:55:41.547000 @@ -243101,6 +243101,7 @@ CVE-2024-10557,0,0,916270a9974bff554871e6150633c47888d2f31193bcd036f4a8e8f28cf81 CVE-2024-10559,0,0,f02de87419b06f79046e87a4e20909e93937f86137fa0aad3ef812234236acf4,2024-11-01T20:43:41.070000 CVE-2024-1056,0,0,7aa227b1313326ef7e8b583bc7a3f0e84afbbd1f0f46388543b54cca53251293,2024-09-19T22:06:32.340000 CVE-2024-10561,0,0,29b70870967a739c229fbeecbb009b70108489636df3647702a2fd1c0595a0bb,2024-11-01T20:42:12.303000 +CVE-2024-10567,1,1,fdf5166df55d150842e458af2a793fa1d3c00ca4cbeb5f49eccb41fc57bccf07,2024-12-04T09:15:04.177000 CVE-2024-1057,0,0,afa16fae44234143422d3d8f32f1ab0c34f389c2f0ebb0a7139bb0ca7e4b1769,2024-04-22T13:28:43.747000 CVE-2024-10570,0,0,c512ffde6a7106ceaaceffb83d70a1ad2c299d9e7c750445faea3d54adc81ae2,2024-11-26T06:15:07.880000 CVE-2024-10571,0,0,764d0722def38a147b3ba290b54cc9e9aebe855b12c99828d9c801c2e02fe1a0,2024-11-19T15:46:52.187000 @@ -243171,7 +243172,7 @@ CVE-2024-10660,0,0,f525208ea29c8266cde1476239eda59ff1f0ab9a3e7bdbee9dd171ceb2cef CVE-2024-10661,0,0,3a8f12267875f9e533b9d9d2b244a0cfff287128b133c964cf1107af67490bfa,2024-11-05T14:30:37.787000 CVE-2024-10662,0,0,7f193b35faecba25eb69b45c896888a79d54755e1824e8384db4944270b09c04,2024-11-05T14:30:16.847000 CVE-2024-10663,0,0,56c7d3287e139fe19936f6cb7fa26b4b5d51ff98c5ecd26e802a9aff37283829,2024-12-04T03:15:04.267000 -CVE-2024-10664,1,1,796b22701b055ba8701a960a0e1c376b47fe7e168a60b7afae06a4dd4f680250,2024-12-04T08:15:06.150000 +CVE-2024-10664,0,0,796b22701b055ba8701a960a0e1c376b47fe7e168a60b7afae06a4dd4f680250,2024-12-04T08:15:06.150000 CVE-2024-10665,0,0,c459412fd1578af7223b09f026120261b8e30ea805de1cd1f35345a53fdbc421,2024-11-20T10:15:04.627000 CVE-2024-10667,0,0,8c3b4c9a2974763bbe2a826956e8c92748c65fd783dec0a85476416fcfdde1dc,2024-11-12T13:56:24.513000 CVE-2024-10668,0,0,ad6a1e988aa7f35451b56c605706e2e8d28df7ceaf4537d00be5d4d05186782b,2024-11-08T19:01:03.880000 @@ -243259,6 +243260,7 @@ CVE-2024-1078,0,0,88568fa2f20f5ea8de25fda48576808429bbc616448df571a879f056db5656 CVE-2024-10780,0,0,c1ecca85ce8b3056ebbd399065040071bccfd855c4b5b2dad405de442e772561,2024-11-28T10:15:05.280000 CVE-2024-10781,0,0,525208815751629467d033df5e23d63739a60403cc03b8051f4119b633da5911,2024-11-26T06:15:08.057000 CVE-2024-10786,0,0,a76f656d6635ceb4e91d9df4d3549e3d377ef91a9f4fadf29676d949614dad8b,2024-11-18T17:11:17.393000 +CVE-2024-10787,1,1,52c7beb7218e1503d2006d17d7be3c6b66706b21988dcca6143826e3ce32347d,2024-12-04T09:15:04.323000 CVE-2024-1079,0,0,0a964f4e43e1a2d85a40a4753c5354fe293facf65d0ebcc06031e68ccad95a0f,2024-02-14T19:33:09.977000 CVE-2024-10790,0,0,c5195852541315ac22dd1b614848e72547c3a099e7858697bb9ee4c86225d43f,2024-11-12T13:55:21.227000 CVE-2024-10791,0,0,a1ab37f8c195110cb663fc7e474028527dca661a169201c0160b30306fac4c75,2024-11-06T15:05:38.240000 @@ -243589,7 +243591,7 @@ CVE-2024-11277,0,0,70fa881c494ed4e8a3131fb313821feca0fce09e01d4dad197524b7869b48 CVE-2024-11278,0,0,cc19a6be7ba80ee301c92f54c29f2c5c95b3da6dd7918df5b7b1d59f8e31a90e,2024-11-20T05:15:16.530000 CVE-2024-1128,0,0,de5352d9c421a908307277eb7da3f5f6fcfc08a095ea033ab740d4804aa5ccea,2024-02-29T13:49:29.390000 CVE-2024-1129,0,0,bb6d36851ed2d72741a575302302ac57d511f2bf349c6ca7db7385fd53c3529a,2024-02-29T13:49:29.390000 -CVE-2024-11293,1,1,e46a7eec96404bb5101b51ea354f9204e8dfdf0f3886dd047246796d18fd27a6,2024-12-04T08:15:06.343000 +CVE-2024-11293,0,0,e46a7eec96404bb5101b51ea354f9204e8dfdf0f3886dd047246796d18fd27a6,2024-12-04T08:15:06.343000 CVE-2024-11296,0,0,b5d9d945be4839f25d895d1859f75ba059f45889157013a41666f5c27008260c,2024-11-22T23:15:04.507000 CVE-2024-11298,0,0,d8f84875ecbdb5e5ed14a2aa3c38c3b3c8b003b9c3de892f6ca47d32136bf2e9,2024-11-22T23:15:04.983000 CVE-2024-1130,0,0,19461582000c347e1c07ca83a1d00e23feee8e20532d52fc093ba50686691b5b,2024-02-29T13:49:29.390000 @@ -243639,7 +243641,7 @@ CVE-2024-11392,0,0,1e5f2ec38300a521839918df7c104887d1b6dd0c3952db0a36cb8a2513cfd CVE-2024-11393,0,0,19dee016144f4c49671550a1a20a1c722bca8a9d767501dcdfc03cfe728a7c2b,2024-11-27T21:54:58.570000 CVE-2024-11394,0,0,ed715a5643cd62dc08ee2cf492057b775795efb9422c8c56a37f188481d1231f,2024-11-27T21:54:52.887000 CVE-2024-11395,0,0,e97b88024677a483ae4a42afe9a8440978faa48e4e721bb1c822953f8252b946,2024-11-19T21:56:45.533000 -CVE-2024-11398,1,1,63c12840091c62bddf8aca8a25e9558e380c3e415c163c7cede5adb6e5e3fac6,2024-12-04T07:15:05.983000 +CVE-2024-11398,0,0,63c12840091c62bddf8aca8a25e9558e380c3e415c163c7cede5adb6e5e3fac6,2024-12-04T07:15:05.983000 CVE-2024-1140,0,0,346c2ed0aaabc419b4aefe2cf8513b81b972566618f29982168bc7166c832ab2,2024-02-27T19:17:32.253000 CVE-2024-11400,0,0,2b6a39a96cf5696646b5b9e32fab47bfc23a160a64905ed162280ce11db7d350,2024-11-25T15:02:53.013000 CVE-2024-11402,0,0,8f3fd8a8eb506c6f6e3edecf9f43883a3e4c87bf00125a7e79e2d78e9478466d,2024-11-28T11:15:17.613000 @@ -243663,7 +243665,7 @@ CVE-2024-11458,0,0,6849bad28a4b41fcdd85ffcf4846b0c6058567a8a7be243965c5d4ff08dab CVE-2024-1146,0,0,c681ac136637104b7d43e23a49d30f381f11dad3f3f7ec48919504256a9e5b2a,2024-03-19T13:26:46 CVE-2024-11461,0,0,ddca8d6b2db926cfca3eee24bf3b6aa5eb08e9faad161d3c0076b0f9ecc87254,2024-12-03T08:15:06.043000 CVE-2024-11463,0,0,ec04c7e81fa0a01468a3fa77b8e3ee0a2d478d739fbf8b7cd12d4c8bed3fd0d3,2024-11-23T04:15:08.893000 -CVE-2024-11466,1,1,ed19e1572850befd2050aed0d159dc8e99a1cec935bf91592b5574694b9a39a4,2024-12-04T08:15:06.523000 +CVE-2024-11466,0,0,ed19e1572850befd2050aed0d159dc8e99a1cec935bf91592b5574694b9a39a4,2024-12-04T08:15:06.523000 CVE-2024-1147,0,0,5da69e40e8a720c3c3c366cde1a8363ffbcff6346e82168cfd4c7602d33328bd,2024-03-21T12:58:51.093000 CVE-2024-11477,0,0,47ede4582a757f3d8a2482f5720bb8d1160cb660e47ba0cb5bbe4f95d03eaff1,2024-11-22T21:15:08.613000 CVE-2024-11479,0,0,982324963f23f6a4954523d0a7c470a8a11360056b0cba3cc1c659bab66e2dca,2024-12-04T01:15:04.650000 @@ -243861,7 +243863,7 @@ CVE-2024-11747,0,0,5846087b971ceadf1fdbd5ac66bd2b2a8268b18d83ff64448907256363b9d CVE-2024-1175,0,0,190484da8a43d8915393af59d3a99a603fc65c2c05796109a63c7e3028461e1e,2024-07-24T20:32:01.573000 CVE-2024-1176,0,0,3a9729597b8ae5d1f7a6b2981371f9af662d86aa4ba3ac1ac5a3a2992dbcfc6a,2024-03-13T18:16:18.563000 CVE-2024-11761,0,0,eb52b6beba84d5e3aa94afd1e69b06248988bf9736924036fa502f3813b0779d,2024-11-28T09:15:05.090000 -CVE-2024-11769,1,1,813b4ca9ddd71efa0b3a700e3dc2f1f4d157f2578ab3364b1b16bb776e1239cc,2024-12-04T08:15:06.680000 +CVE-2024-11769,0,0,813b4ca9ddd71efa0b3a700e3dc2f1f4d157f2578ab3364b1b16bb776e1239cc,2024-12-04T08:15:06.680000 CVE-2024-1177,0,0,d9cdcff987bd78d6f32a7f8b0a8d2970109268852041331a890d212ad12ebb88,2024-02-13T14:06:04.817000 CVE-2024-1178,0,0,1ff4a71536018366c289bfb8a1aa1adef7208a3ae26719efcdb84bec870fcd3d,2024-03-05T13:41:01.900000 CVE-2024-11782,0,0,e3d9ca853e3de7c456298225b3bac758bc6cc14e92c8dd2b7f7b36c0bd838f02,2024-12-03T10:15:05.320000 @@ -243889,6 +243891,7 @@ CVE-2024-11805,0,0,c4320a41ca0d4edd118e9ad964bb3b250fee875896f75cfe07057a59cde52 CVE-2024-11807,0,0,83e6dd7f59f5861de27b9d23ae4ec5ced9bd51284fab9e461c8dc1e80a558c5d,2024-12-04T03:15:05.083000 CVE-2024-1181,0,0,3ab1ccda9f702c4fc6b350844c2c0edd9e45550807a44d2d8746213d5ed7378e,2024-03-20T13:00:16.367000 CVE-2024-11813,0,0,47986a6664f48e0ab6f40ac97cf4101e783e667add47394a886845bd4ba2a0fb,2024-12-04T03:15:05.227000 +CVE-2024-11814,1,1,8d2559433b15496a8d63a0ebc0960f7cd4d359f72a84564ac67a786f0d8fa215,2024-12-04T10:15:05.007000 CVE-2024-11817,0,0,9a66a0fca3306ba25f6938738b8c35626d89b0596c6acf3b5c6bd12c17a8843e,2024-12-03T15:15:41.753000 CVE-2024-11818,0,0,03353c8ea92f63bcb93155865a1eb5dbe1fed70391bddfd4d8cf954b882838c4,2024-12-03T15:06:10.997000 CVE-2024-11819,0,0,4ad555b58c0b6ae087a0e197e14f318c0818cf9ebf662c2c2b44a9340719cc17,2024-12-03T15:00:58.693000 @@ -243907,11 +243910,12 @@ CVE-2024-11862,0,0,6d3560dff7bd57ea41736e55020db21367a02a743a7c33eb7522f1239d06c CVE-2024-11866,0,0,236ffb034bd54f27fb167fb484e28869563519fc7ac4134695f9cf499c46e00e,2024-12-03T09:15:05.487000 CVE-2024-1187,0,0,3fcd8394fe17b53cc850805fb2de93d28c688f808245fcfde96cd99bc903bbab,2024-05-17T02:35:17.220000 CVE-2024-1188,0,0,6744ad4ad1ed370f6488ba44c137b6887619ea6ff1a51ee5f48fd0aec905e09b,2024-05-17T02:35:17.327000 +CVE-2024-11880,1,1,b255094d98006106aba37938f28ef8f31691ac5a763fdee1ae91e8c1f8c4938b,2024-12-04T09:15:04.470000 CVE-2024-1189,0,0,b364c59b0d964a14f93b1e1b61d95f98aeb338db4ea440a29e1d18c3cc27c9d5,2024-05-17T02:35:17.427000 CVE-2024-11897,0,0,d5f4e16d0c416d0bc7e9693ab4dd4f2940f1e76ca592186996c6739857e2d080,2024-12-04T03:15:05.380000 CVE-2024-11898,0,0,0456808eb2a54e3b5ec4a2165ac77afd50bb67da5ab4fe9c475ae45285713587,2024-12-03T08:15:06.857000 CVE-2024-1190,0,0,97174d698ee0a283db94af4be93c59e8a1814d898054ed7eb2fd6bfac02921e8,2024-05-17T02:35:17.533000 -CVE-2024-11903,1,1,e190f59abd3921fd91372998bdb1e4cf17e331aa62db018afba79b6f439c7c17,2024-12-04T08:15:06.830000 +CVE-2024-11903,0,0,e190f59abd3921fd91372998bdb1e4cf17e331aa62db018afba79b6f439c7c17,2024-12-04T08:15:06.830000 CVE-2024-1191,0,0,6e38ed7db5944087a721298d0ec64e89db09082a4119551dba4b0f62276916e5,2024-05-17T02:35:17.640000 CVE-2024-11918,0,0,3593929fa79fd2ff3075ff0960153853c146cae2b4c652e91826347f06e81c6b,2024-11-28T06:15:08.347000 CVE-2024-1192,0,0,2496c5c2bd24b6b1e653d79a0dbb975771788d1c54262403d529d1a596a31073,2024-05-17T02:35:17.743000 @@ -243920,6 +243924,7 @@ CVE-2024-1193,0,0,ffb9a4095d8f9913e32a4a9fb84e7d515c719215bffa9c1271257c84c94703 CVE-2024-11933,0,0,ff719b80c8b04b1955877df42e564ce90eac2c09e4f59c20e785f18a1e8804d6,2024-12-03T16:04:10.350000 CVE-2024-1194,0,0,2ada7ec0067a4a6c15e16c8b6d60d2605ff0ff50c80d53e3de0a5fe7493767f7,2024-05-17T02:35:17.933000 CVE-2024-1195,0,0,524480b99d81e527b71e9b6d2b12e0f3d16697f860efe8d11194cd8cf60ecd57,2024-05-17T02:35:18.037000 +CVE-2024-11952,1,1,1cf8955e26709babaa743e659edcf01ad0b08b777d583067e6146dcc8a8319e6,2024-12-04T09:15:04.637000 CVE-2024-11959,0,0,55f4f0848caef18230c7048f835a742ab3a0aaaf83b000723880212a9c969f3f,2024-11-28T15:15:18.003000 CVE-2024-1196,0,0,173789435a8c6c5c60dcb01ff025ba37f5dda093bc9fc2e5668920b347e89874,2024-06-26T15:15:19.377000 CVE-2024-11960,0,0,2d84941367c11811ce6d55e848618cc2315cea35327995aea7fad7a0f77a50b6,2024-11-28T15:15:18.347000 @@ -263572,7 +263577,7 @@ CVE-2024-45711,0,0,c76ce0fb0b280add38abeec887b12ed00e8aa69fc19718287cdb1c80f84d6 CVE-2024-45713,0,0,b322f2bac93307c369424f189efe14df580c4c3f7a294baca589b00a18f25c23,2024-10-18T12:52:33.507000 CVE-2024-45714,0,0,5c3e8041ca04ab9e00d5e1227ce3fdcb38d7a530d0008cd7190a206ef01de9bc,2024-10-30T20:33:59.393000 CVE-2024-45715,0,0,37bef608e0301f0513f42a353922e475a8a29cbe13ea1c6d00a07886229eaaea,2024-10-30T20:59:19.737000 -CVE-2024-45717,1,1,39a92933b3c58f83397e6c5dc91b7e234be00faaf987aaf18eef3dfc7499ad29,2024-12-04T07:15:06.167000 +CVE-2024-45717,0,0,39a92933b3c58f83397e6c5dc91b7e234be00faaf987aaf18eef3dfc7499ad29,2024-12-04T07:15:06.167000 CVE-2024-45719,0,0,b755d05d9431d88e340720fc552d851e209c5823abea3fc08fbea1207a8b8083,2024-11-22T21:15:18.130000 CVE-2024-4572,0,0,6754f54e88e479a744a4367c8d1d2577fd697a90d0783dabcb9fc508df61090e,2024-05-14T15:44:06.153000 CVE-2024-45720,0,0,9a958c282ef360c53e2ab2db366594f7b62a7ef8d528ac6998de122fd3a653b0,2024-10-10T12:51:56.987000 @@ -266297,6 +266302,7 @@ CVE-2024-50196,0,0,675ca6a3533eddc8a6d45432592fdaaf1bb5dced0aa110561a6b06a466e57 CVE-2024-50197,0,0,893b8d49a3c8bfcb1b7ca77d5de84df33485e9af4e3168bdf23d38eaaa3f1acc,2024-11-29T20:33:23.700000 CVE-2024-50198,0,0,c618d856f80a65c389660bf5305caa4f554130dfdf672d6f63bde935a5b36126,2024-11-29T20:31:29.787000 CVE-2024-50199,0,0,790411aeb1eb3c29f71ef981d65498f2cd8c66850ab6f2c0880f47cb2a5c0da3,2024-11-08T19:01:03.880000 +CVE-2024-5020,1,1,08e36e9d1b1710179f6bdc6d8d05c0cf55b2b91c7157274bf953f8aec41eab7f,2024-12-04T09:15:04.813000 CVE-2024-50200,0,0,39818810e6a92ba66da874110ced722f11de013303f8d602e577eeb9e4e93e06,2024-11-08T19:01:03.880000 CVE-2024-50201,0,0,09a1d2ed13abd2226e3074bd37eb9876228c60757af6992d6779c0487fabffe2,2024-11-19T16:08:36.890000 CVE-2024-50202,0,0,e310c41388d08879a2605fc86ca05cc293de9a409d6751330b377d2eccd78f94,2024-11-19T16:12:17.660000 @@ -266414,7 +266420,7 @@ CVE-2024-50306,0,0,99b8de1207b2fdc71c13146c7372e7163a77f6f60a3176c55d7bfb57d63fa CVE-2024-50307,0,0,6d2dcfccb50c0c30fd7d9bda3b36490982da8110db31d087befc4509a1d360cd,2024-10-28T13:58:09.230000 CVE-2024-5031,0,0,5b0fce1eabb88a37a871d927606cb4ca5166c3808ddca60f777848c692bab12e,2024-05-22T12:46:53.887000 CVE-2024-50310,0,0,cdbb51e1b47d1a9497998e60f58fb5fe87ced29e9d042b4c42b3a1b3ac7563d2,2024-11-13T23:15:38.657000 -CVE-2024-50311,0,1,313483da4e2ddf325edc778dd8801acc03525ba2f6a80263f977c8d7c689ecb0,2024-12-04T08:15:06.993000 +CVE-2024-50311,0,0,313483da4e2ddf325edc778dd8801acc03525ba2f6a80263f977c8d7c689ecb0,2024-12-04T08:15:06.993000 CVE-2024-50312,0,0,8b68d956a110cf88efd2db7bdd6fdd3dc5b02186497d9ae2cbca0852915a398f,2024-10-30T18:35:56.753000 CVE-2024-50313,0,0,57c773ed95d19cba8304d961904a015105ffc1450a840dde453d207457fba72c,2024-11-15T17:12:44.410000 CVE-2024-50315,0,0,4cc2faf3d8c489bc195ea9b1b71e3db71fb7f18259f91c4f6bf82e911f7ad06a,2024-11-06T18:15:06.173000 @@ -270019,7 +270025,7 @@ CVE-2024-7400,0,0,880bea0e2ff4ceadacbe376968f4ebe20bb468fa58e2ed97aa47316bc459f4 CVE-2024-7401,0,0,43ffed7b6ca165f2a0da7944b4e4cef6faa3da0b6dbd419986732fe262f21587,2024-09-05T18:34:17.433000 CVE-2024-7404,0,0,3de89ee628b5ee024a57e174f6f544c149981b7447dbe414eb2dc5874d61c7d0,2024-11-15T13:58:08.913000 CVE-2024-7408,0,0,a5191010d29cd8fd3daea07e74870b9bf130ede8610ab518fb24ce3a11a386f4,2024-08-13T16:06:08.213000 -CVE-2024-7409,0,1,488f7cd8613a07663fd2fcaea51fb59dea89c23c6bc9fcf4138ec8034492692c,2024-12-04T08:15:07.190000 +CVE-2024-7409,0,0,488f7cd8613a07663fd2fcaea51fb59dea89c23c6bc9fcf4138ec8034492692c,2024-12-04T08:15:07.190000 CVE-2024-7410,0,0,d4e8b81d7bab3d90baf0746a6fdf1d2e1dd63b1bd2599e20b73bae4467a0729b,2024-08-12T13:41:36.517000 CVE-2024-7411,0,0,233fe970a370850f5b652951fe7b5f603c4b4a66cd3c44f0b67dc9d466e3271d,2024-08-15T13:01:10.150000 CVE-2024-7412,0,0,b7efc7f691385d07c16b9c98953749b4113f5c7d6e2cc5e240ac710642b7a973,2024-08-12T13:41:36.517000 @@ -271804,7 +271810,7 @@ CVE-2024-9667,0,0,db0574de12822738c38c8016441ce46841c68ee532fe6a4e072cebc9412ff1 CVE-2024-9668,0,0,f818a6b8cdaa67cfd4295b3c202a4554201abb8c6b4c20c52c4343e3261d3200,2024-11-19T15:55:00.840000 CVE-2024-9669,0,0,e43a2c242ce502e5f4277c8ca066e05cabf58a1b45c60ed2305e161be02c71b0,2024-11-28T09:15:05.710000 CVE-2024-9670,0,0,f306c0fbbcbde1e6a65006fd3bdd50d366f02be816ff2a6f00ef3348b3b76328,2024-10-15T12:57:46.880000 -CVE-2024-9671,0,1,07505dc2e62c688e3c2f28b8f629bcf6a677a0c568456141408a4c666f175e20,2024-12-04T08:15:07.357000 +CVE-2024-9671,0,0,07505dc2e62c688e3c2f28b8f629bcf6a677a0c568456141408a4c666f175e20,2024-12-04T08:15:07.357000 CVE-2024-9674,0,0,99b8206db3c3741ff50725aa3969c36280edf4a37082b6473da1336e00a39d59,2024-10-22T14:02:50.473000 CVE-2024-9675,0,0,eca475b135003e7e06db8f69f6d2f142dd27c257379e7a0b16967a90dcf42a39,2024-11-13T08:15:03.170000 CVE-2024-9676,0,0,f87bebf8f4fe552507220e4e3a39d7cfe81d27fa23e0e0624f2c2714aabd7dd0,2024-11-26T09:15:06.820000