diff --git a/CVE-2023/CVE-2023-21xx/CVE-2023-2142.json b/CVE-2023/CVE-2023-21xx/CVE-2023-2142.json index 5fa2d0b7421..e3437fb8d09 100644 --- a/CVE-2023/CVE-2023-21xx/CVE-2023-2142.json +++ b/CVE-2023/CVE-2023-21xx/CVE-2023-2142.json @@ -2,15 +2,43 @@ "id": "CVE-2023-2142", "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T12:15:18.307", - "lastModified": "2024-11-26T12:15:18.307", + "lastModified": "2024-11-27T17:15:05.200", "vulnStatus": "Received", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Nunjucks versions prior to version 3.2.4, it was \npossible to bypass the restrictions which are provided by the autoescape\n functionality. If there are two user-controlled parameters on the same \nline used in the views, it was possible to inject cross site scripting \npayloads using the backslash \\ character." + }, + { + "lang": "es", + "value": "En las versiones de Nunjucks anteriores a la versi\u00f3n 3.2.4, era posible eludir las restricciones que proporciona la funci\u00f3n de escape autom\u00e1tico. Si hay dos par\u00e1metros controlados por el usuario en la misma l\u00ednea utilizada en las vistas, era posible inyectar payloads de cross-site scripting utilizando el car\u00e1cter de barra invertida \\." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, "weaknesses": [ { "source": "security@mozilla.org", diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32223.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32223.json index 9708aa71214..1c94bb98abd 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32223.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32223.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32223", "sourceIdentifier": "cna@cyber.gov.il", "published": "2023-06-28T21:15:09.940", - "lastModified": "2023-07-06T15:33:10.737", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-27T17:15:05.937", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -13,32 +13,14 @@ ], "metrics": { "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH" - }, - "exploitabilityScore": 2.8, - "impactScore": 5.9 - }, { "source": "cna@cyber.gov.il", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -46,9 +28,27 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "baseScore": 8.8, - "baseSeverity": "HIGH" + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 @@ -65,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-346" + } + ] } ], "configurations": [ @@ -103,6 +113,13 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://www.gov.il/en/Departments/faq/cve_advisories", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33298.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33298.json index bca5268b2c2..1ac2f76ec60 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33298.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33298.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33298", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-30T22:15:10.077", - "lastModified": "2023-08-02T15:40:35.783", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-27T17:15:06.230", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,6 +19,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -26,9 +28,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 7.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.8, "impactScore": 5.9 @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ @@ -88,6 +98,30 @@ "Technical Description", "Third Party Advisory" ] + }, + { + "url": "https://support.perimeter81.com/docs/macos-agent-release-notes", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] + }, + { + "url": "https://www.kb.cert.org/vuls/id/653767", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] + }, + { + "url": "https://www.ns-echo.com/posts/cve_2023_33298.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Technical Description", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-335xx/CVE-2023-33570.json b/CVE-2023/CVE-2023-335xx/CVE-2023-33570.json index 619663b0d9b..9f614fa66ab 100644 --- a/CVE-2023/CVE-2023-335xx/CVE-2023-33570.json +++ b/CVE-2023/CVE-2023-335xx/CVE-2023-33570.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33570", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-28T20:15:09.540", - "lastModified": "2023-07-10T15:53:05.990", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-27T17:15:06.687", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,6 +19,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", @@ -26,9 +28,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 @@ -45,6 +45,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ @@ -71,6 +81,13 @@ "tags": [ "Exploit" ] + }, + { + "url": "https://siltonrenato02.medium.com/a-brief-summary-about-a-ssti-to-rce-in-bagisto-e900ac450490", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-358xx/CVE-2023-35830.json b/CVE-2023/CVE-2023-358xx/CVE-2023-35830.json index 1c6351bf212..4c9c0ae5acd 100644 --- a/CVE-2023/CVE-2023-358xx/CVE-2023-35830.json +++ b/CVE-2023/CVE-2023-358xx/CVE-2023-35830.json @@ -2,8 +2,8 @@ "id": "CVE-2023-35830", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-29T16:15:09.897", - "lastModified": "2023-07-11T19:25:28.647", - "vulnStatus": "Analyzed", + "lastModified": "2024-11-27T17:15:08.783", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -19,6 +19,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -26,9 +28,7 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.9 @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ @@ -132,6 +142,20 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://www.stw-mobile-machines.com/fileadmin/user_upload/content/STW/PSIRT/STW-IR-23-001.pdf", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.stw-mobile-machines.com/psirt/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-111xx/CVE-2024-11160.json b/CVE-2024/CVE-2024-111xx/CVE-2024-11160.json new file mode 100644 index 00000000000..bac2c5a5698 --- /dev/null +++ b/CVE-2024/CVE-2024-111xx/CVE-2024-11160.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2024-11160", + "sourceIdentifier": "security@wordfence.com", + "published": "2024-11-27T18:15:08.620", + "lastModified": "2024-11-27T18:15:08.620", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11694.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11694.json index 3b593b8dfb9..a37ad7dbe17 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11694.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11694.json @@ -2,15 +2,55 @@ "id": "CVE-2024-11694", "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:18.943", - "lastModified": "2024-11-26T14:15:18.943", + "lastModified": "2024-11-27T17:15:09.703", "vulnStatus": "Received", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, and Thunderbird < 128.5." + }, + { + "lang": "es", + "value": "Es posible que el modo estricto de Enhanced Tracking Protection haya permitido inadvertidamente una omisi\u00f3n de frame-src de CSP y un XSS basado en DOM a trav\u00e9s del complemento SafeFrame de Google en la extensi\u00f3n Web Compatibility. Este problema podr\u00eda haber expuesto a los usuarios a marcos maliciosos que se hacen pasar por contenido leg\u00edtimo. Esta vulnerabilidad afecta a Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133 y Thunderbird < 128.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1924167", diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11695.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11695.json index 15d4857fcf9..552d1f0f638 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11695.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11695.json @@ -2,15 +2,55 @@ "id": "CVE-2024-11695", "sourceIdentifier": "security@mozilla.org", "published": "2024-11-26T14:15:19.040", - "lastModified": "2024-11-26T14:15:19.040", + "lastModified": "2024-11-27T17:15:09.867", "vulnStatus": "Received", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "A crafted URL containing Arabic script and whitespace characters could have hidden the true origin of the page, resulting in a potential spoofing attack. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5." + }, + { + "lang": "es", + "value": "Una URL manipulada con caracteres \u00e1rabes y espacios en blanco podr\u00eda haber ocultado el verdadero origen de la p\u00e1gina, lo que podr\u00eda dar lugar a un posible ataque de suplantaci\u00f3n de identidad. Esta vulnerabilidad afecta a Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133 y Thunderbird < 128.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1925496", diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11860.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11860.json new file mode 100644 index 00000000000..65bca15e78d --- /dev/null +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11860.json @@ -0,0 +1,149 @@ +{ + "id": "CVE-2024-11860", + "sourceIdentifier": "cna@vuldb.com", + "published": "2024-11-27T17:15:10.010", + "lastModified": "2024-11-27T17:15:10.010", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in SourceCodester Best House Rental Management System 1.0. This affects an unknown part of the file /rental/ajax.php?action=delete_tenant of the component POST Request Handler. The manipulation of the argument id leads to improper authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", + "baseScore": 6.4, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 4.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-266" + }, + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://drive.google.com/file/d/1CyjtknGVqn5QO_R1WZX-hoGH8ae5DjRq/view", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/YasserREED/YasserREED-CVEs/blob/main/Best%20house%20rental%20management%20system%20project%20in%20php/Unauthorized%20Tenant%20Deletion.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.286245", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.286245", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.449684", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.sourcecodester.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-217xx/CVE-2024-21703.json b/CVE-2024/CVE-2024-217xx/CVE-2024-21703.json new file mode 100644 index 00000000000..1f0699d6a9a --- /dev/null +++ b/CVE-2024/CVE-2024-217xx/CVE-2024-21703.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-21703", + "sourceIdentifier": "security@atlassian.com", + "published": "2024-11-27T17:15:10.260", + "lastModified": "2024-11-27T18:15:08.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This Medium severity Security Misconfiguration vulnerability was introduced in version 8.8.1 of Confluence Data Center and Server for Windows installations.\n\n\n\nThis Security Misconfiguration vulnerability, with a CVSS Score of 6.4 allows an authenticated attacker of the Windows host to read sensitive information about the Confluence Data Center configuration which has high impact to confidentiality, high impact to integrity, high impact to availability, and no user interaction.\n\n\n\nAtlassian recommends that Confluence Data Center and Server customers upgrade to the latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\n\n* Confluence Data Center and Server 7.19: Upgrade to a release greater than or equal to 7.19.18 \n* Confluence Data Center and Server 8.5: Upgrade to a release greater than or equal to 8.5.5\n* Confluence Data Center and Server 8.7: Upgrade to a release greater than or equal to 8.7.2\n* Confluence Data Center and Server 8.8: Upgrade to a release greater than or equal to 8.8.0\n\n\n\nSee the release notes (https://confluence.atlassian.com/conf88/confluence-release-notes-1354501008.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives ). \n\nThis vulnerability was reported via our Atlassian Bug Bounty Program by Chris Elliot." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "references": [ + { + "url": "https://jira.atlassian.com/browse/CONFSERVER-98413", + "source": "security@atlassian.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-292xx/CVE-2024-29292.json b/CVE-2024/CVE-2024-292xx/CVE-2024-29292.json index 6c75139fc08..7e42f5f89e9 100644 --- a/CVE-2024/CVE-2024-292xx/CVE-2024-29292.json +++ b/CVE-2024/CVE-2024-292xx/CVE-2024-29292.json @@ -2,16 +2,55 @@ "id": "CVE-2024-29292", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-20T18:15:22.970", - "lastModified": "2024-11-20T21:15:07.040", - "vulnStatus": "Received", + "lastModified": "2024-11-27T17:15:10.383", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple OS Command Injection vulnerabilities affecting Kasda LinkSmart Router KW6512 <= v1.3 enable an authenticated remote attacker to execute arbitrary OS commands via various cgi parameters." + }, + { + "lang": "es", + "value": "Varias vulnerabilidades de inyecci\u00f3n de comandos del sistema operativo que afectan al enrutador Kasda LinkSmart KW6512 <= v1.3 permiten a un atacante remoto autenticado ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de varios par\u00e1metros cgi." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/QuartzDust/debfd7ddf934a9f5609d7f1a8cd71154", diff --git a/CVE-2024/CVE-2024-308xx/CVE-2024-30896.json b/CVE-2024/CVE-2024-308xx/CVE-2024-30896.json new file mode 100644 index 00000000000..b2b2574ff0f --- /dev/null +++ b/CVE-2024/CVE-2024-308xx/CVE-2024-30896.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-30896", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-21T11:15:34.007", + "lastModified": "2024-11-27T17:15:10.650", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "InfluxDB through 2.7.10 allows allAccess administrators to retrieve all raw tokens via an \"influx auth ls\" command. NOTE: the supplier indicates that this is intentional but is a \"poor design choice\" that will be changed in a future release." + }, + { + "lang": "es", + "value": "InfluxDB hasta la versi\u00f3n 2.7.10 permite a todos los administradores de Access recuperar todos los tokens sin procesar mediante el comando \"influx auth ls\". NOTA: el proveedor indica que esto es intencional, pero es una \"mala elecci\u00f3n de dise\u00f1o\" que se cambiar\u00e1 en una versi\u00f3n futura." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/XenoM0rph97/CVE-2024-30896", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/influxdata/influxdb/issues/24797", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31976.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31976.json new file mode 100644 index 00000000000..4e671152787 --- /dev/null +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31976.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-31976", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-27T17:15:10.913", + "lastModified": "2024-11-27T17:15:10.913", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "EnGenius EWS356-FIR 1.1.30 and earlier devices allow a remote attacker to execute arbitrary OS commands via the Controller connectivity parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/actuator/cve/blob/main/Engenius/CVE-2024-31976", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/actuator/cve/tree/main/EnGenius/EWS356-FIT", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33439.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33439.json index 0e9d878c432..b6ea8c261a9 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33439.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33439.json @@ -2,16 +2,55 @@ "id": "CVE-2024-33439", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-20T19:15:06.010", - "lastModified": "2024-11-20T19:15:06.010", - "vulnStatus": "Received", + "lastModified": "2024-11-27T17:15:11.093", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Kasda LinkSmart Router KW5515 v1.7 and before allows an authenticated remote attacker to execute arbitrary OS commands via cgi parameters." + }, + { + "lang": "es", + "value": "Un problema en Kasda LinkSmart Router KW5515 v1.7 y anteriores permite que un atacante remoto autenticado ejecute comandos arbitrarios del sistema operativo a trav\u00e9s de par\u00e1metros cgi." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/QuartzDust/848acfddff02c881eb86dd302e859e80", diff --git a/CVE-2024/CVE-2024-377xx/CVE-2024-37782.json b/CVE-2024/CVE-2024-377xx/CVE-2024-37782.json index 7f5b404cadc..2af416f494c 100644 --- a/CVE-2024/CVE-2024-377xx/CVE-2024-37782.json +++ b/CVE-2024/CVE-2024-377xx/CVE-2024-37782.json @@ -2,15 +2,55 @@ "id": "CVE-2024-37782", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-22T18:15:17.230", - "lastModified": "2024-11-22T18:15:17.230", - "vulnStatus": "Received", + "lastModified": "2024-11-27T17:15:11.320", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "An LDAP injection vulnerability in the login page of Gladinet CentreStack v13.12.9934.54690 allows attackers to access sensitive data or execute arbitrary commands via a crafted payload injected into the username field." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n LDAP en la p\u00e1gina de inicio de sesi\u00f3n de Gladinet CentreStack v13.12.9934.54690 permite a los atacantes acceder a datos confidenciales o ejecutar comandos arbitrarios a trav\u00e9s de un payload manipulado inyectado en el campo de nombre de usuario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.githubusercontent.com/Draoken/ab5465fc339df7a1e42281540b61f887/raw/fb28d4148e311e8cde9778dee4f8b2e64e27ea92/CVE-2024-37782.txt", diff --git a/CVE-2024/CVE-2024-378xx/CVE-2024-37816.json b/CVE-2024/CVE-2024-378xx/CVE-2024-37816.json new file mode 100644 index 00000000000..036f22911cc --- /dev/null +++ b/CVE-2024/CVE-2024-378xx/CVE-2024-37816.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-37816", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-27T17:15:11.570", + "lastModified": "2024-11-27T17:15:11.570", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Quectel EC25-EUX EC25EUXGAR08A05M1G was discovered to contain a stack overflow." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://quectel.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/quectel-official/Quectel-Security", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-397xx/CVE-2024-39707.json b/CVE-2024/CVE-2024-397xx/CVE-2024-39707.json index 307ee2133e1..95f447948f4 100644 --- a/CVE-2024/CVE-2024-397xx/CVE-2024-39707.json +++ b/CVE-2024/CVE-2024-397xx/CVE-2024-39707.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39707", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-14T22:15:16.147", - "lastModified": "2024-11-15T13:58:08.913", + "lastModified": "2024-11-27T18:15:09.190", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "La funci\u00f3n 0x49 de Insyde IHISI puede restaurar los valores predeterminados de f\u00e1brica para ciertas variables UEFI sin autenticaci\u00f3n adicional de forma predeterminada, lo que podr\u00eda provocar un posible ataque de reversi\u00f3n en ciertas plataformas. Esto se solucion\u00f3 en: kernel 5.2, versi\u00f3n 05.29.19; kernel 5.3, versi\u00f3n 05.38.19; kernel 5.4, versi\u00f3n 05.46.19; kernel 5.5, versi\u00f3n 05.54.19; kernel 5.6, versi\u00f3n 05.61.19." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "references": [ { "url": "https://www.insyde.com/security-pledge/SA-2024007", diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44758.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44758.json index acbb2bcc297..d9228852e1d 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44758.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44758.json @@ -2,7 +2,7 @@ "id": "CVE-2024-44758", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T21:15:09.233", - "lastModified": "2024-11-18T17:11:56.587", + "lastModified": "2024-11-27T18:15:13.007", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Una vulnerabilidad de carga de archivos arbitrarios en el componente /Production/UploadFile of NUS-M9 ERP Management Software v3.0.0 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de archivos manipulados." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://github.com/WarmBrew/web_vul/blob/main/CVES/CVE-2024-44758.md", diff --git a/CVE-2024/CVE-2024-447xx/CVE-2024-44786.json b/CVE-2024/CVE-2024-447xx/CVE-2024-44786.json index 7d43821fc57..125702d745b 100644 --- a/CVE-2024/CVE-2024-447xx/CVE-2024-44786.json +++ b/CVE-2024/CVE-2024-447xx/CVE-2024-44786.json @@ -2,15 +2,32 @@ "id": "CVE-2024-44786", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-22T17:15:08.380", - "lastModified": "2024-11-22T17:15:08.380", - "vulnStatus": "Received", + "lastModified": "2024-11-27T17:15:11.767", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect access control in Meabilis CMS 1.0 allows attackers to access other users' address books via unspecified vectors." + }, + { + "lang": "es", + "value": "El control de acceso incorrecto en Meabilis CMS 1.0 permite a los atacantes acceder a las libretas de direcciones de otros usuarios a trav\u00e9s de vectores no especificados." } ], "metrics": {}, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/luluhackme/8356703c7295d03d6e68a1ca652441b9", diff --git a/CVE-2024/CVE-2024-460xx/CVE-2024-46055.json b/CVE-2024/CVE-2024-460xx/CVE-2024-46055.json index 706f253acf8..81ab79213c8 100644 --- a/CVE-2024/CVE-2024-460xx/CVE-2024-46055.json +++ b/CVE-2024/CVE-2024-460xx/CVE-2024-46055.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46055", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-27T15:15:26.290", - "lastModified": "2024-11-27T15:15:26.290", + "lastModified": "2024-11-27T18:15:13.300", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "OpenVidReview 1.0 is vulnerable to Cross Site Scripting (XSS) in review names." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/b1d0ws/CVEs/blob/main/CVE-2024-46055.md", diff --git a/CVE-2024/CVE-2024-495xx/CVE-2024-49592.json b/CVE-2024/CVE-2024-495xx/CVE-2024-49592.json index 328fe2338ac..abd0e61a07a 100644 --- a/CVE-2024/CVE-2024-495xx/CVE-2024-49592.json +++ b/CVE-2024/CVE-2024-495xx/CVE-2024-49592.json @@ -2,7 +2,7 @@ "id": "CVE-2024-49592", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T21:15:11.070", - "lastModified": "2024-11-18T17:11:56.587", + "lastModified": "2024-11-27T17:15:12.093", "vulnStatus": "Awaiting Analysis", "cveTags": [ { @@ -22,7 +22,42 @@ "value": "McAfee Trial Installer 16.0.53 tiene un control de acceso incorrecto que conduce a una escalada local de privilegios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] + } + ], "references": [ { "url": "https://www.mcafee.com/support/s/article/000002516?language=en_US", diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50657.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50657.json index d825399f0df..5eaea0e706c 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50657.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50657.json @@ -2,15 +2,55 @@ "id": "CVE-2024-50657", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-22T18:15:17.570", - "lastModified": "2024-11-22T18:15:17.570", - "vulnStatus": "Received", + "lastModified": "2024-11-27T17:15:12.323", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Owncloud android apk v.4.3.1 allows a physically proximate attacker to escalate privileges via the PassCodeViewModel class, specifically in the checkPassCodeIsValid method" + }, + { + "lang": "es", + "value": "Un problema en la apk de Android v.4.3.1 de Owncloud permite que un atacante f\u00edsicamente pr\u00f3ximo escale privilegios a trav\u00e9s de la clase PassCodeViewModel, espec\u00edficamente en el m\u00e9todo checkPassCodeIsValid" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://drive.google.com/drive/folders/1C-ZYjYhmKRGvWs9YN51XOiAS2WxxwdQd?usp=sharing", diff --git a/CVE-2024/CVE-2024-506xx/CVE-2024-50672.json b/CVE-2024/CVE-2024-506xx/CVE-2024-50672.json index 391925c3bf4..349b11edd0c 100644 --- a/CVE-2024/CVE-2024-506xx/CVE-2024-50672.json +++ b/CVE-2024/CVE-2024-506xx/CVE-2024-50672.json @@ -2,15 +2,55 @@ "id": "CVE-2024-50672", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-25T21:15:19.523", - "lastModified": "2024-11-25T21:15:19.523", + "lastModified": "2024-11-27T17:15:12.563", "vulnStatus": "Received", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "A NoSQL injection vulnerability in Adapt Learning Adapt Authoring Tool <= 0.11.3 allows unauthenticated attackers to reset user and administrator account passwords via the \"Reset password\" feature. The vulnerability occurs due to insufficient validation of user input, which is used as a query in Mongoose's find() function. This makes it possible for attackers to perform a full takeover of the administrator account. Attackers can then use the newly gained administrative privileges to upload a custom plugin to perform remote code execution (RCE) on the server hosting the web application." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de inyecci\u00f3n NoSQL en Adapt Learning Adapt Authoring Tool <= 0.11.3 permite a atacantes no autenticados restablecer las contrase\u00f1as de cuentas de usuario y administrador a trav\u00e9s de la funci\u00f3n \"Restablecer contrase\u00f1a\". La vulnerabilidad se produce debido a una validaci\u00f3n insuficiente de la entrada del usuario, que se utiliza como consulta en la funci\u00f3n find() de Mongoose. Esto permite a los atacantes realizar una toma de control total de la cuenta de administrador. Los atacantes pueden utilizar los privilegios administrativos reci\u00e9n obtenidos para cargar un complemento personalizado para realizar la ejecuci\u00f3n remota de c\u00f3digo (RCE) en el servidor que aloja la aplicaci\u00f3n web." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/adaptlearning/adapt_authoring", diff --git a/CVE-2024/CVE-2024-511xx/CVE-2024-51163.json b/CVE-2024/CVE-2024-511xx/CVE-2024-51163.json index 8692e22b185..d65cd4740f8 100644 --- a/CVE-2024/CVE-2024-511xx/CVE-2024-51163.json +++ b/CVE-2024/CVE-2024-511xx/CVE-2024-51163.json @@ -2,8 +2,9 @@ "id": "CVE-2024-51163", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-20T17:15:18.417", - "lastModified": "2024-11-22T17:15:09.497", + "lastModified": "2024-11-27T18:15:17.760", "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", @@ -14,7 +15,42 @@ "value": "Vulnerabilidad de inclusi\u00f3n de archivos locales en Vegam Solutions Vegam 4i v.6.3.47.0 y versiones anteriores permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n de etiquetado de impresi\u00f3n." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "references": [ { "url": "https://github.com/rahulkadavil/CVEs/tree/main/CVE-2024-51163", diff --git a/CVE-2024/CVE-2024-512xx/CVE-2024-51228.json b/CVE-2024/CVE-2024-512xx/CVE-2024-51228.json new file mode 100644 index 00000000000..e765236b6ec --- /dev/null +++ b/CVE-2024/CVE-2024-512xx/CVE-2024-51228.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-51228", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-27T17:15:12.800", + "lastModified": "2024-11-27T17:15:12.800", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in TOTOLINK-CX-A3002RU V1.0.4-B20171106.1512 and TOTOLINK-CX-N150RT V2.1.6-B20171121.1002 and TOTOLINK-CX-N300RT V2.1.6-B20170724.1420 and TOTOLINK-CX-N300RT V2.1.8-B20171113.1408 and TOTOLINK-CX-N300RT V2.1.8-B20191010.1107 and TOTOLINK-CX-N302RE V2.0.2-B20170511.1523 allows a remote attacker to execute arbitrary code via the /boafrm/formSysCmd component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/yckuo-sdc/totolink-boa-api-vulnerabilities", + "source": "cve@mitre.org" + }, + { + "url": "https://totolink.tw/support_view/A3002RU", + "source": "cve@mitre.org" + }, + { + "url": "https://totolink.tw/support_view/N150RT", + "source": "cve@mitre.org" + }, + { + "url": "https://www.totolink.tw/products_view/N300RT", + "source": "cve@mitre.org" + }, + { + "url": "https://www.totolink.tw/products_view/N302RE", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-513xx/CVE-2024-51330.json b/CVE-2024/CVE-2024-513xx/CVE-2024-51330.json index e8c88af125a..d378771eb72 100644 --- a/CVE-2024/CVE-2024-513xx/CVE-2024-51330.json +++ b/CVE-2024/CVE-2024-513xx/CVE-2024-51330.json @@ -2,7 +2,7 @@ "id": "CVE-2024-51330", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-15T19:15:08.057", - "lastModified": "2024-11-18T17:11:56.587", + "lastModified": "2024-11-27T17:15:12.973", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Un problema en UltiMaker Cura v.4.41 y 5.8.1 y anteriores permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s del mecanismo de comunicaci\u00f3n entre procesos (IPC) entre la aplicaci\u00f3n Cura y los procesos de CuraEngine, la pila de red del host local, las configuraciones de impresi\u00f3n y los componentes de procesamiento y transmisi\u00f3n de c\u00f3digo G, impresoras 3D Ultimaker." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/HalaAli198/ff06d7a94c06cdfb821dec4d6303e01b", diff --git a/CVE-2024/CVE-2024-513xx/CVE-2024-51367.json b/CVE-2024/CVE-2024-513xx/CVE-2024-51367.json new file mode 100644 index 00000000000..1edd660bf4a --- /dev/null +++ b/CVE-2024/CVE-2024-513xx/CVE-2024-51367.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-51367", + "sourceIdentifier": "cve@mitre.org", + "published": "2024-11-21T20:15:44.660", + "lastModified": "2024-11-27T17:15:13.207", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An arbitrary file upload vulnerability in the component \\Users\\username.BlackBoard of BlackBoard v2.0.0.2 allows attackers to execute arbitrary code via uploading a crafted .xml file." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de carga de archivos arbitrarios en el componente \\Users\\username.BlackBoard de BlackBoard v2.0.0.2 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo .xml manipulado espec\u00edficamente." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "http://blackboard.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Gelcon/PoCofBlackBoard2.0.0.2", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-527xx/CVE-2024-52726.json b/CVE-2024/CVE-2024-527xx/CVE-2024-52726.json index fd6948620c6..b0ee8a2b5f7 100644 --- a/CVE-2024/CVE-2024-527xx/CVE-2024-52726.json +++ b/CVE-2024/CVE-2024-527xx/CVE-2024-52726.json @@ -2,15 +2,55 @@ "id": "CVE-2024-52726", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-22T19:15:07.297", - "lastModified": "2024-11-22T19:15:07.297", - "vulnStatus": "Received", + "lastModified": "2024-11-27T17:15:13.463", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "CRMEB v5.4.0 is vulnerable to Arbitrary file read in the save_basics function which allows an attacker to obtain sensitive information" + }, + { + "lang": "es", + "value": "CRMEB v5.4.0 es vulnerable a la lectura arbitraria de archivos en la funci\u00f3n save_basics, lo que permite a un atacante obtener informaci\u00f3n confidencial." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/sec-Kode/bb71138619b22de28c6b0ba986ad58e5", diff --git a/CVE-2024/CVE-2024-527xx/CVE-2024-52771.json b/CVE-2024/CVE-2024-527xx/CVE-2024-52771.json index 8fa04324b5b..cf530057191 100644 --- a/CVE-2024/CVE-2024-527xx/CVE-2024-52771.json +++ b/CVE-2024/CVE-2024-527xx/CVE-2024-52771.json @@ -2,16 +2,55 @@ "id": "CVE-2024-52771", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-20T17:15:20.637", - "lastModified": "2024-11-20T17:15:20.637", - "vulnStatus": "Received", + "lastModified": "2024-11-27T17:15:14.017", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "DedeBIZ v6.3.0 was discovered to contain an arbitrary file deletion vulnerability via the component /admin/file_manage_view." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que DedeBIZ v6.3.0 conten\u00eda una vulnerabilidad de eliminaci\u00f3n arbitraria de archivos a trav\u00e9s del componente /admin/file_manage_view." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://co-a1natas.feishu.cn/docx/Zsd9dnGUvoBW6tx0G5fcVx6vnBb", diff --git a/CVE-2024/CVE-2024-527xx/CVE-2024-52787.json b/CVE-2024/CVE-2024-527xx/CVE-2024-52787.json index 7bdd714c234..326776ec639 100644 --- a/CVE-2024/CVE-2024-527xx/CVE-2024-52787.json +++ b/CVE-2024/CVE-2024-527xx/CVE-2024-52787.json @@ -2,15 +2,55 @@ "id": "CVE-2024-52787", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-25T18:15:13.597", - "lastModified": "2024-11-25T18:15:13.597", + "lastModified": "2024-11-27T17:15:14.397", "vulnStatus": "Received", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the upload_documents method of libre-chat v0.0.6 allows attackers to execute a path traversal via supplying a crafted filename in an uploaded file." + }, + { + "lang": "es", + "value": "Un problema en el m\u00e9todo upload_documents de libre-chat v0.0.6 permite a los atacantes ejecutar un path traversal mediante el suministro de un nombre de archivo manipulado en un archivo cargado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/jxfzzzt/276a6e8cfbc54d2c2711bb51d8d3dff3", diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5217.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5217.json index 20f36ff8b61..864c307fd1d 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5217.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5217.json @@ -2,13 +2,9 @@ "id": "CVE-2024-5217", "sourceIdentifier": "psirt@servicenow.com", "published": "2024-07-10T17:15:12.373", - "lastModified": "2024-07-30T15:20:54.727", + "lastModified": "2024-11-27T18:56:05.783", "vulnStatus": "Analyzed", "cveTags": [], - "cisaExploitAdd": "2024-07-29", - "cisaActionDue": "2024-08-19", - "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", - "cisaVulnerabilityName": "ServiceNow Incomplete List of Disallowed Inputs Vulnerability", "descriptions": [ { "lang": "en", @@ -27,6 +23,8 @@ "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.2, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "PRESENT", @@ -58,39 +56,19 @@ "recovery": "NOT_DEFINED", "valueDensity": "NOT_DEFINED", "vulnerabilityResponseEffort": "NOT_DEFINED", - "providerUrgency": "NOT_DEFINED", - "baseScore": 9.2, - "baseSeverity": "CRITICAL" + "providerUrgency": "NOT_DEFINED" } } ], "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" - }, - "exploitabilityScore": 3.9, - "impactScore": 5.9 - }, { "source": "psirt@servicenow.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -98,26 +76,38 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } ] }, + "cisaExploitAdd": "2024-07-29", + "cisaActionDue": "2024-08-19", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "ServiceNow Incomplete List of Disallowed Inputs Vulnerability", "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-697" - } - ] - }, { "source": "psirt@servicenow.com", "type": "Secondary", @@ -127,6 +117,16 @@ "value": "CWE-184" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-697" + } + ] } ], "configurations": [ @@ -141,6 +141,11 @@ "criteria": "cpe:2.3:a:servicenow:servicenow:utah:-:*:*:*:*:*:*", "matchCriteriaId": "69E0078E-1953-4F4F-9D5A-B1A140C4B310" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:early_availability:*:*:*:*:*:*", + "matchCriteriaId": "03FE0B52-C7A6-4632-A09E-BE7AB8610DD7" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_1:*:*:*:*:*:*", @@ -171,6 +176,31 @@ "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10:*:*:*:*:*:*", "matchCriteriaId": "76439FC6-2DD2-4AD4-9EB6-A2FEAC10B205" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10_hotfix_1:*:*:*:*:*:*", + "matchCriteriaId": "8097D9B0-9329-4EB7-BB7E-0FF3057D408B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10_hotfix_2:*:*:*:*:*:*", + "matchCriteriaId": "AFEA8D14-D1C8-486B-ABE7-25C9D6B72CE9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10a:*:*:*:*:*:*", + "matchCriteriaId": "5DA716A2-E697-4BC3-8127-E772E67E1C49" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10a_hotfix_1:*:*:*:*:*:*", + "matchCriteriaId": "EEBB1DCE-25AA-4F95-984C-5BB5341A90ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10b:*:*:*:*:*:*", + "matchCriteriaId": "AE34BA83-3810-4314-9A45-B1A8944C6612" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_2:*:*:*:*:*:*", @@ -191,6 +221,11 @@ "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_3:*:*:*:*:*:*", "matchCriteriaId": "C9C467AA-B1A2-4A2A-8363-623232BCBCA0" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_4:*:*:*:*:*:*", + "matchCriteriaId": "A6E189F6-6623-4A0C-8767-A3CC1C12B759" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_3:*:*:*:*:*:*", @@ -211,6 +246,16 @@ "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4:*:*:*:*:*:*", "matchCriteriaId": "481EC1AA-5863-4641-B67F-CD51416ED0EA" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_1:*:*:*:*:*:*", + "matchCriteriaId": "402D816A-2650-4743-A386-029C0D063C39" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2:*:*:*:*:*:*", + "matchCriteriaId": "56CBE65E-2D5A-4191-A2F4-8AC76050404F" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2a:*:*:*:*:*:*", @@ -221,21 +266,71 @@ "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2b:*:*:*:*:*:*", "matchCriteriaId": "76D69B8D-02EE-4E3D-9F54-E94F6DB09D5B" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_3:*:*:*:*:*:*", + "matchCriteriaId": "CC772DD6-2814-4EEF-A524-CC752C277337" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_3b:*:*:*:*:*:*", + "matchCriteriaId": "996C57B4-E8AC-48F6-BA71-328F714B1BAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_4:*:*:*:*:*:*", + "matchCriteriaId": "10B82BE2-BE38-4EA7-85D5-AC28FF4F50BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_4b:*:*:*:*:*:*", + "matchCriteriaId": "D66B18D1-486D-4390-9D1E-5348D1C6729A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_5:*:*:*:*:*:*", + "matchCriteriaId": "A0EC8ACE-70CA-44FC-ACA7-0868D620C86D" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_5:*:*:*:*:*:*", "matchCriteriaId": "8D934721-565F-4707-A32A-B7E4BB9D2DD0" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_5_hotfix_1:*:*:*:*:*:*", + "matchCriteriaId": "4AA97D74-290C-47C7-9976-6EF83950C530" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_6:*:*:*:*:*:*", "matchCriteriaId": "122E0C17-B29B-44B9-A37E-745B103AD398" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_6_hotfix_1:*:*:*:*:*:*", + "matchCriteriaId": "AADFD5CE-9C9D-46FF-9871-E2BD7B2C8B98" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_6_hotfix_2:*:*:*:*:*:*", + "matchCriteriaId": "ECE96EED-C729-4A84-B437-79CCE029C391" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_7:*:*:*:*:*:*", "matchCriteriaId": "8BD49264-D243-4625-828C-AF383D826779" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_7_hotfix_1:*:*:*:*:*:*", + "matchCriteriaId": "FB29FCEC-3DDB-46EE-A7AA-4728E6B9A1D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_7_hotfix_2:*:*:*:*:*:*", + "matchCriteriaId": "AC4CA2B8-EFD8-4C01-8F9C-E613619062DF" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_7a:*:*:*:*:*:*", @@ -251,16 +346,41 @@ "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_8:*:*:*:*:*:*", "matchCriteriaId": "8A4CD267-D72A-4F09-BE9B-F008B1804AD9" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_8_hotfix_2:*:*:*:*:*:*", + "matchCriteriaId": "24D2EBC6-F894-4C1D-A2FF-B49FF4007ED8" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_9:*:*:*:*:*:*", "matchCriteriaId": "26D23EE3-0F88-47F7-ADCD-B74F81A08D9B" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1:*:*:*:*:*:*", + "matchCriteriaId": "FB793686-954A-49F8-BC35-A95325D61303" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1a:*:*:*:*:*:*", "matchCriteriaId": "38DDACA8-69A9-4047-AD99-A7DDC320EAD8" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1b:*:*:*:*:*:*", + "matchCriteriaId": "926C0F6A-0599-4239-B1CE-5D864BBAA315" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:-:*:*:*:*:*:*", @@ -271,26 +391,76 @@ "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_1:*:*:*:*:*:*", "matchCriteriaId": "9132AB29-33C1-4825-BAD4-2804C26316B1" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_1_hotfix_1:*:*:*:*:*:*", + "matchCriteriaId": "68D99613-53A1-4B09-9A78-F8EFA0CC6B01" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2:*:*:*:*:*:*", "matchCriteriaId": "E8FCCFB6-DB7E-4DED-A7E0-1C03087754F5" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_1:*:*:*:*:*:*", + "matchCriteriaId": "7ED2051C-FE4F-4C0A-A3BF-E33141DC3250" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_1a:*:*:*:*:*:*", "matchCriteriaId": "8CFD4017-5B8E-4CAF-B9E5-4A675C11F01A" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_2:*:*:*:*:*:*", + "matchCriteriaId": "40D69E69-DF88-4F8C-A9BD-B642829107E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_3:*:*:*:*:*:*", + "matchCriteriaId": "4D21A542-15DC-432C-9C60-F7CABE8D4807" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix1a:*:*:*:*:*:*", + "matchCriteriaId": "1596163B-637A-49F9-B01F-C6CC297F7E5B" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3:*:*:*:*:*:*", "matchCriteriaId": "0B915FDA-9DCB-43B5-8081-F0690996A3EF" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_1:*:*:*:*:*:*", + "matchCriteriaId": "7308FA07-5C6D-41AA-9EE1-EE9BAAB50A1B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_2:*:*:*:*:*:*", + "matchCriteriaId": "5ED407E7-9595-4B4D-9D53-1A4807BA327C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_3:*:*:*:*:*:*", + "matchCriteriaId": "1EA5B288-54DB-437E-88C2-05F90FF3C918" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_4:*:*:*:*:*:*", + "matchCriteriaId": "6ED497ED-1588-4CF8-AE83-7CC7BEF8B982" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4:*:*:*:*:*:*", "matchCriteriaId": "A74A3197-68F7-4303-A731-B87A8BF3F831" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1:*:*:*:*:*:*", + "matchCriteriaId": "A08FD0FD-E062-4BEC-BE95-0ED2D106826B" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1a:*:*:*:*:*:*", @@ -301,26 +471,51 @@ "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1b:*:*:*:*:*:*", "matchCriteriaId": "847F9124-F3C6-4C93-9E80-544CB0580C8C" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_2b:*:*:*:*:*:*", + "matchCriteriaId": "12808B52-8F7D-4EE0-A43E-85A1C70A6BE3" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_5:*:*:*:*:*:*", "matchCriteriaId": "81880B84-5E9D-4B7F-B1D5-1BF8D25DAF5D" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_5_hotfix_1:*:*:*:*:*:*", + "matchCriteriaId": "8011D2A7-770B-4AE5-80E6-C762F4F0BB55" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_6:*:*:*:*:*:*", "matchCriteriaId": "A58603E3-5AFC-4606-8F9E-1B4FF9A9B843" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_6_hotfix_1:*:*:*:*:*:*", + "matchCriteriaId": "BED5F42A-5FFF-43E0-9BAD-A5E6C1110551" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7:*:*:*:*:*:*", "matchCriteriaId": "ABE64339-EF0B-4430-9768-FA7DE82AA61F" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_1:*:*:*:*:*:*", + "matchCriteriaId": "FF79CA67-765A-4CCB-B1CB-EE1FC02CFCFA" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_1a:*:*:*:*:*:*", "matchCriteriaId": "A3E71353-9AFF-4B6D-89BC-A2909A7C5DDF" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2:*:*:*:*:*:*", + "matchCriteriaId": "C9C5B57E-7852-4E38-9BDA-864CF6F9DB5A" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2a:*:*:*:*:*:*", @@ -331,11 +526,71 @@ "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2b:*:*:*:*:*:*", "matchCriteriaId": "650956A6-8DE6-4C16-A77C-2B208B41DF5F" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_3a:*:*:*:*:*:*", + "matchCriteriaId": "A49AC0E0-9164-43AD-959A-55FCB7965858" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_4:*:*:*:*:*:*", + "matchCriteriaId": "46277115-1A2B-4526-83E8-1446EB5A1EAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_1a:*:*:*:*:*:*", + "matchCriteriaId": "6CDFB167-F252-46A6-A5F6-EF9A4F93FC03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_1b:*:*:*:*:*:*", + "matchCriteriaId": "43DE243B-E90A-4857-A3A6-3A045FE2D75F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_2a:*:*:*:*:*:*", + "matchCriteriaId": "33689F99-48DD-47C6-AFAC-DC5D10785860" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_2b:*:*:*:*:*:*", + "matchCriteriaId": "8F664F1F-5FB2-48B1-93C7-5DF415E673B7" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_8:*:*:*:*:*:*", "matchCriteriaId": "C641B881-7379-448A-A785-3381C72F8353" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_1:*:*:*:*:*:*", + "matchCriteriaId": "03D48963-936B-4A48-8859-A5066A259E03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_2:*:*:*:*:*:*", + "matchCriteriaId": "9149B850-7196-476A-9A27-DEB85B8C6F19" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_3:*:*:*:*:*:*", + "matchCriteriaId": "10622260-FCBC-4CC0-804E-55D75200FC46" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_9:*:*:*:*:*:*", + "matchCriteriaId": "CF44F7A1-D153-4723-BA45-0FE4E4725C2F" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:-:*:*:*:*:*:*", @@ -346,20 +601,55 @@ "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1:*:*:*:*:*:*", "matchCriteriaId": "444DD275-789F-4C07-9D98-BBFAA1640DB3" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_1:*:*:*:*:*:*", + "matchCriteriaId": "5B29B708-BD7C-4A6C-9E78-37D045101A17" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2:*:*:*:*:*:*", + "matchCriteriaId": "1F6EDFA3-9014-4AA7-A17F-DDB1FE96588E" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2a:*:*:*:*:*:*", "matchCriteriaId": "1DA447CA-A6A2-436C-9909-3F0419B7DD6F" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2b:*:*:*:*:*:*", + "matchCriteriaId": "9F263893-6D34-49D6-9407-ED6CB823595E" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2:*:*:*:*:*:*", "matchCriteriaId": "D18E2CD1-AC8E-4ABF-88DE-D3E61A297ED1" }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2_hotfix_1:*:*:*:*:*:*", + "matchCriteriaId": "52FC3724-35E5-4C3A-B6BA-3B270EA4255E" + }, { "vulnerable": true, "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3:*:*:*:*:*:*", "matchCriteriaId": "6137BB81-6B48-4DCB-A9F6-A27D869C12FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3_hotfix_1:*:*:*:*:*:*", + "matchCriteriaId": "B06EABB5-0327-4816-AC7B-34D021758812" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_4:*:*:*:*:*:*", + "matchCriteriaId": "29DC5FC9-2ACF-4C51-93C4-2D0982BA0CA6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_5:*:*:*:*:*:*", + "matchCriteriaId": "9CD5A918-9B71-4CFD-A6DB-437D3B647C6A" } ] } @@ -387,6 +677,27 @@ "tags": [ "Press/Media Coverage" ] + }, + { + "url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1644293", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] + }, + { + "url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648313", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Press/Media Coverage" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-52xx/CVE-2024-5274.json b/CVE-2024/CVE-2024-52xx/CVE-2024-5274.json index 826bad08d12..4721b064b27 100644 --- a/CVE-2024/CVE-2024-52xx/CVE-2024-5274.json +++ b/CVE-2024/CVE-2024-52xx/CVE-2024-5274.json @@ -2,13 +2,9 @@ "id": "CVE-2024-5274", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-05-28T15:15:10.443", - "lastModified": "2024-08-14T17:07:13.270", + "lastModified": "2024-11-27T18:12:51.690", "vulnStatus": "Analyzed", "cveTags": [], - "cisaExploitAdd": "2024-05-28", - "cisaActionDue": "2024-06-18", - "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", - "cisaVulnerabilityName": "Google Chromium V8 Type Confusion Vulnerability", "descriptions": [ { "lang": "en", @@ -26,20 +22,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 5.9 + "impactScore": 6.0 }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", @@ -47,6 +43,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.3, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", @@ -54,15 +52,17 @@ "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 8.3, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 1.6, "impactScore": 6.0 } ] }, + "cisaExploitAdd": "2024-05-28", + "cisaActionDue": "2024-06-18", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Google Chromium V8 Type Confusion Vulnerability", "weaknesses": [ { "source": "nvd@nist.gov", @@ -128,14 +128,15 @@ "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_23.html", "source": "chrome-cve-admin@google.com", "tags": [ - "Vendor Advisory" + "Release Notes" ] }, { "url": "https://issues.chromium.org/issues/341663589", "source": "chrome-cve-admin@google.com", "tags": [ - "Permissions Required" + "Exploit", + "Issue Tracking" ] }, { @@ -151,6 +152,35 @@ "tags": [ "Mailing List" ] + }, + { + "url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_23.html", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] + }, + { + "url": "https://issues.chromium.org/issues/341663589", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVC3FNI7HZLVSRIFBVUSBHI233DZYBKP/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] + }, + { + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6IBUYVPD4MIFQNNYBGAPI5MOECWXXOB/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-532xx/CVE-2024-53254.json b/CVE-2024/CVE-2024-532xx/CVE-2024-53254.json new file mode 100644 index 00000000000..f0c53bcec23 --- /dev/null +++ b/CVE-2024/CVE-2024-532xx/CVE-2024-53254.json @@ -0,0 +1,16 @@ +{ + "id": "CVE-2024-53254", + "sourceIdentifier": "security-advisories@github.com", + "published": "2024-11-27T18:15:18.060", + "lastModified": "2024-11-27T18:15:18.060", + "vulnStatus": "Rejected", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Rejected reason: This CVE is a duplicate of another CVE." + } + ], + "metrics": {}, + "references": [] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-534xx/CVE-2024-53438.json b/CVE-2024/CVE-2024-534xx/CVE-2024-53438.json index 05a87ac2075..c32812470c3 100644 --- a/CVE-2024/CVE-2024-534xx/CVE-2024-53438.json +++ b/CVE-2024/CVE-2024-534xx/CVE-2024-53438.json @@ -2,15 +2,55 @@ "id": "CVE-2024-53438", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-22T17:15:10.857", - "lastModified": "2024-11-22T17:15:10.857", - "vulnStatus": "Received", + "lastModified": "2024-11-27T17:15:14.647", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "EventAttendance.php in ChurchCRM 5.7.0 is vulnerable to SQL injection. An attacker can exploit this vulnerability by manipulating the 'Event' parameter, which is directly interpolated into the SQL query without proper sanitization or validation, allowing attackers to execute arbitrary SQL commands." + }, + { + "lang": "es", + "value": "EventAttendance.php en ChurchCRM 5.7.0 es vulnerable a la inyecci\u00f3n SQL. Un atacante puede aprovechar esta vulnerabilidad manipulando el par\u00e1metro 'Event', que se interpola directamente en la consulta SQL sin la debida desinfecci\u00f3n o validaci\u00f3n, lo que permite a los atacantes ejecutar comandos SQL arbitrarios." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/ChurchCRM/CRM/issues/6988", diff --git a/CVE-2024/CVE-2024-535xx/CVE-2024-53556.json b/CVE-2024/CVE-2024-535xx/CVE-2024-53556.json index e98306f6ab9..f80f6175884 100644 --- a/CVE-2024/CVE-2024-535xx/CVE-2024-53556.json +++ b/CVE-2024/CVE-2024-535xx/CVE-2024-53556.json @@ -2,15 +2,55 @@ "id": "CVE-2024-53556", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-25T21:15:21.693", - "lastModified": "2024-11-25T21:15:21.693", + "lastModified": "2024-11-27T17:15:14.917", "vulnStatus": "Received", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "An Open Redirect vulnerability in Taiga v6.8.1 allows attackers to redirect users to arbitrary websites via appending a crafted link to /login?next= in the login page URL." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de redirecci\u00f3n abierta en Taiga v6.8.1 permite a los atacantes redirigir a los usuarios a sitios web arbitrarios mediante la adici\u00f3n de un enlace manipulado a /login?next= en la URL de la p\u00e1gina de inicio de sesi\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://drive.google.com/file/d/1CIr8oHSF4JaqOn51wIhyZyvsCtlX0Q_e/view?usp=drive_link", diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53635.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53635.json index a43ffb80cf2..79fce846d37 100644 --- a/CVE-2024/CVE-2024-536xx/CVE-2024-53635.json +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53635.json @@ -2,7 +2,7 @@ "id": "CVE-2024-53635", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-27T14:15:19.210", - "lastModified": "2024-11-27T14:15:19.210", + "lastModified": "2024-11-27T18:15:18.130", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in /covid-tms/patient-search-report.php in PHPGurukul COVID 19 Testing Management System v1.0, which allows remote attackers to execute arbitrary code via the searchdata POST request parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/COVID19/Reflected%20Cross%20Site%20Scripting.pdf", diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53916.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53916.json index 6d3966dfd85..85bc6fb47b5 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53916.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53916.json @@ -2,15 +2,43 @@ "id": "CVE-2024-53916", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-25T00:15:04.423", - "lastModified": "2024-11-25T00:15:04.423", - "vulnStatus": "Received", + "lastModified": "2024-11-27T17:15:15.127", + "vulnStatus": "Awaiting Analysis", + "cveTags": [], "descriptions": [ { "lang": "en", "value": "In OpenStack Neutron through 25.0.0, neutron/extensions/tagging.py can use an incorrect ID during policy enforcement. NOTE: 935883 has the \"Work in Progress\" status as of 2024-11-24." + }, + { + "lang": "es", + "value": "En OpenStack Neutron hasta la versi\u00f3n 25.0.0, neutron/extensions/tagging.py puede usar una ID incorrecta durante la aplicaci\u00f3n de pol\u00edticas. NOTA: 935883 tiene el estado \"Trabajo en progreso\" al 24/11/2024." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://github.com/openstack/neutron/blob/363ffa6e9e1ab5968f87d45bc2f1cb6394f48b9f/neutron/extensions/tagging.py#L138-L232", diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54003.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54003.json new file mode 100644 index 00000000000..e4e71db2e12 --- /dev/null +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54003.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-54003", + "sourceIdentifier": "jenkinsci-cert@googlegroups.com", + "published": "2024-11-27T17:15:15.333", + "lastModified": "2024-11-27T17:15:15.333", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Jenkins Simple Queue Plugin 1.4.4 and earlier does not escape the view name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Create permission." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.jenkins.io/security/advisory/2024-11-27/#SECURITY-3467", + "source": "jenkinsci-cert@googlegroups.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-540xx/CVE-2024-54004.json b/CVE-2024/CVE-2024-540xx/CVE-2024-54004.json new file mode 100644 index 00000000000..3404df2cac2 --- /dev/null +++ b/CVE-2024/CVE-2024-540xx/CVE-2024-54004.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-54004", + "sourceIdentifier": "jenkinsci-cert@googlegroups.com", + "published": "2024-11-27T17:15:15.443", + "lastModified": "2024-11-27T17:15:15.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Jenkins Filesystem List Parameter Plugin 0.0.14 and earlier does not restrict the path used for the File system objects list Parameter, allowing attackers with Item/Configure permission to enumerate file names on the Jenkins controller file system." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.jenkins.io/security/advisory/2024-11-27/#SECURITY-3367", + "source": "jenkinsci-cert@googlegroups.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5910.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5910.json index faea11e6e3d..8cb6af31617 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5910.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5910.json @@ -2,13 +2,9 @@ "id": "CVE-2024-5910", "sourceIdentifier": "psirt@paloaltonetworks.com", "published": "2024-07-10T19:15:11.390", - "lastModified": "2024-11-14T02:00:02.740", + "lastModified": "2024-11-27T17:23:02.910", "vulnStatus": "Analyzed", "cveTags": [], - "cisaExploitAdd": "2024-11-07", - "cisaActionDue": "2024-11-28", - "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", - "cisaVulnerabilityName": "Palo Alto Networks Expedition Missing Authentication Vulnerability", "descriptions": [ { "lang": "en", @@ -27,6 +23,8 @@ "cvssData": { "version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:D/RE:M/U:Red", + "baseScore": 9.3, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "attackRequirements": "NONE", @@ -58,9 +56,7 @@ "recovery": "USER", "valueDensity": "DIFFUSE", "vulnerabilityResponseEffort": "MODERATE", - "providerUrgency": "RED", - "baseScore": 9.3, - "baseSeverity": "CRITICAL" + "providerUrgency": "RED" } } ], @@ -71,6 +67,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -78,19 +76,21 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 9.8, - "baseSeverity": "CRITICAL" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } ] }, + "cisaExploitAdd": "2024-11-07", + "cisaActionDue": "2024-11-28", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Palo Alto Networks Expedition Missing Authentication Vulnerability", "weaknesses": [ { - "source": "nvd@nist.gov", - "type": "Primary", + "source": "psirt@paloaltonetworks.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -99,8 +99,8 @@ ] }, { - "source": "psirt@paloaltonetworks.com", - "type": "Secondary", + "source": "nvd@nist.gov", + "type": "Primary", "description": [ { "lang": "en", @@ -135,6 +135,21 @@ "tags": [ "Vendor Advisory" ] + }, + { + "url": "https://security.paloaltonetworks.com/CVE-2024-5910", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] + }, + { + "url": "https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-70xx/CVE-2024-7025.json b/CVE-2024/CVE-2024-70xx/CVE-2024-7025.json new file mode 100644 index 00000000000..3c184701ccc --- /dev/null +++ b/CVE-2024/CVE-2024-70xx/CVE-2024-7025.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-7025", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-11-27T18:15:18.420", + "lastModified": "2024-11-27T18:15:18.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Integer overflow in Layout in Google Chrome prior to 129.0.6668.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "weaknesses": [ + { + "source": "chrome-cve-admin@google.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-472" + } + ] + } + ], + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/367764861", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-79xx/CVE-2024-7971.json b/CVE-2024/CVE-2024-79xx/CVE-2024-7971.json index 8ac433f6c60..60631ef06bb 100644 --- a/CVE-2024/CVE-2024-79xx/CVE-2024-7971.json +++ b/CVE-2024/CVE-2024-79xx/CVE-2024-7971.json @@ -2,13 +2,9 @@ "id": "CVE-2024-7971", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2024-08-21T21:15:09.277", - "lastModified": "2024-08-27T01:00:02.883", + "lastModified": "2024-11-27T17:21:35.077", "vulnStatus": "Analyzed", "cveTags": [], - "cisaExploitAdd": "2024-08-26", - "cisaActionDue": "2024-09-16", - "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", - "cisaVulnerabilityName": "Google Chromium V8 Type Confusion Vulnerability", "descriptions": [ { "lang": "en", @@ -26,20 +22,20 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "REQUIRED", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.8, - "impactScore": 5.9 + "impactScore": 6.0 }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", @@ -47,6 +43,8 @@ "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", @@ -54,19 +52,21 @@ "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", - "availabilityImpact": "HIGH", - "baseScore": 8.8, - "baseSeverity": "HIGH" + "availabilityImpact": "HIGH" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } ] }, + "cisaExploitAdd": "2024-08-26", + "cisaActionDue": "2024-09-16", + "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", + "cisaVulnerabilityName": "Google Chromium V8 Type Confusion Vulnerability", "weaknesses": [ { - "source": "nvd@nist.gov", - "type": "Primary", + "source": "chrome-cve-admin@google.com", + "type": "Secondary", "description": [ { "lang": "en", @@ -75,8 +75,8 @@ ] }, { - "source": "chrome-cve-admin@google.com", - "type": "Secondary", + "source": "nvd@nist.gov", + "type": "Primary", "description": [ { "lang": "en", @@ -127,6 +127,14 @@ "tags": [ "Permissions Required" ] + }, + { + "url": "https://www.microsoft.com/en-us/security/blog/2024/08/30/north-korean-threat-actor-citrine-sleet-exploiting-chromium-zero-day/", + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9369.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9369.json new file mode 100644 index 00000000000..a91be1572ea --- /dev/null +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9369.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-9369", + "sourceIdentifier": "chrome-cve-admin@google.com", + "published": "2024-11-27T18:15:18.560", + "lastModified": "2024-11-27T18:15:18.560", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insufficient data validation in Mojo in Google Chrome prior to 129.0.6668.89 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop.html", + "source": "chrome-cve-admin@google.com" + }, + { + "url": "https://issues.chromium.org/issues/368208152", + "source": "chrome-cve-admin@google.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 384d9c8a7c8..85bc1f3093c 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2024-11-27T17:00:21.063812+00:00 +2024-11-27T19:01:43.480293+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2024-11-27T16:59:20.303000+00:00 +2024-11-27T18:56:05.783000+00:00 ``` ### Last Data Feed Release @@ -33,50 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -271504 +271517 ``` ### CVEs added in the last Commit -Recently added CVEs: `6` +Recently added CVEs: `13` -- [CVE-2024-11862](CVE-2024/CVE-2024-118xx/CVE-2024-11862.json) (`2024-11-27T15:15:25.393`) -- [CVE-2024-46054](CVE-2024/CVE-2024-460xx/CVE-2024-46054.json) (`2024-11-27T15:15:26.200`) -- [CVE-2024-46055](CVE-2024/CVE-2024-460xx/CVE-2024-46055.json) (`2024-11-27T15:15:26.290`) -- [CVE-2024-52307](CVE-2024/CVE-2024-523xx/CVE-2024-52307.json) (`2024-11-21T18:15:12.443`) -- [CVE-2024-52951](CVE-2024/CVE-2024-529xx/CVE-2024-52951.json) (`2024-11-27T15:15:26.550`) -- [CVE-2024-53920](CVE-2024/CVE-2024-539xx/CVE-2024-53920.json) (`2024-11-27T15:15:26.837`) +- [CVE-2024-11160](CVE-2024/CVE-2024-111xx/CVE-2024-11160.json) (`2024-11-27T18:15:08.620`) +- [CVE-2024-11860](CVE-2024/CVE-2024-118xx/CVE-2024-11860.json) (`2024-11-27T17:15:10.010`) +- [CVE-2024-21703](CVE-2024/CVE-2024-217xx/CVE-2024-21703.json) (`2024-11-27T17:15:10.260`) +- [CVE-2024-30896](CVE-2024/CVE-2024-308xx/CVE-2024-30896.json) (`2024-11-21T11:15:34.007`) +- [CVE-2024-31976](CVE-2024/CVE-2024-319xx/CVE-2024-31976.json) (`2024-11-27T17:15:10.913`) +- [CVE-2024-37816](CVE-2024/CVE-2024-378xx/CVE-2024-37816.json) (`2024-11-27T17:15:11.570`) +- [CVE-2024-51228](CVE-2024/CVE-2024-512xx/CVE-2024-51228.json) (`2024-11-27T17:15:12.800`) +- [CVE-2024-51367](CVE-2024/CVE-2024-513xx/CVE-2024-51367.json) (`2024-11-21T20:15:44.660`) +- [CVE-2024-53254](CVE-2024/CVE-2024-532xx/CVE-2024-53254.json) (`2024-11-27T18:15:18.060`) +- [CVE-2024-54003](CVE-2024/CVE-2024-540xx/CVE-2024-54003.json) (`2024-11-27T17:15:15.333`) +- [CVE-2024-54004](CVE-2024/CVE-2024-540xx/CVE-2024-54004.json) (`2024-11-27T17:15:15.443`) +- [CVE-2024-7025](CVE-2024/CVE-2024-70xx/CVE-2024-7025.json) (`2024-11-27T18:15:18.420`) +- [CVE-2024-9369](CVE-2024/CVE-2024-93xx/CVE-2024-9369.json) (`2024-11-27T18:15:18.560`) ### CVEs modified in the last Commit -Recently modified CVEs: `112` +Recently modified CVEs: `30` -- [CVE-2024-50272](CVE-2024/CVE-2024-502xx/CVE-2024-50272.json) (`2024-11-27T15:54:32.213`) -- [CVE-2024-50273](CVE-2024/CVE-2024-502xx/CVE-2024-50273.json) (`2024-11-27T15:58:02.730`) -- [CVE-2024-50274](CVE-2024/CVE-2024-502xx/CVE-2024-50274.json) (`2024-11-27T15:59:35.733`) -- [CVE-2024-50275](CVE-2024/CVE-2024-502xx/CVE-2024-50275.json) (`2024-11-27T16:16:53.177`) -- [CVE-2024-50277](CVE-2024/CVE-2024-502xx/CVE-2024-50277.json) (`2024-11-27T15:30:55.840`) -- [CVE-2024-50278](CVE-2024/CVE-2024-502xx/CVE-2024-50278.json) (`2024-11-27T16:00:23.223`) -- [CVE-2024-50279](CVE-2024/CVE-2024-502xx/CVE-2024-50279.json) (`2024-11-27T16:01:09.817`) -- [CVE-2024-50284](CVE-2024/CVE-2024-502xx/CVE-2024-50284.json) (`2024-11-27T16:20:08.917`) -- [CVE-2024-50285](CVE-2024/CVE-2024-502xx/CVE-2024-50285.json) (`2024-11-27T15:31:58.063`) -- [CVE-2024-50288](CVE-2024/CVE-2024-502xx/CVE-2024-50288.json) (`2024-11-27T15:32:45.147`) -- [CVE-2024-50291](CVE-2024/CVE-2024-502xx/CVE-2024-50291.json) (`2024-11-27T15:16:30.260`) -- [CVE-2024-50296](CVE-2024/CVE-2024-502xx/CVE-2024-50296.json) (`2024-11-27T15:24:16.020`) -- [CVE-2024-50297](CVE-2024/CVE-2024-502xx/CVE-2024-50297.json) (`2024-11-27T15:25:04.810`) -- [CVE-2024-50298](CVE-2024/CVE-2024-502xx/CVE-2024-50298.json) (`2024-11-27T15:25:38.023`) -- [CVE-2024-50302](CVE-2024/CVE-2024-503xx/CVE-2024-50302.json) (`2024-11-27T15:27:00.187`) -- [CVE-2024-52323](CVE-2024/CVE-2024-523xx/CVE-2024-52323.json) (`2024-11-27T15:15:26.377`) -- [CVE-2024-53044](CVE-2024/CVE-2024-530xx/CVE-2024-53044.json) (`2024-11-27T16:40:06.963`) -- [CVE-2024-53045](CVE-2024/CVE-2024-530xx/CVE-2024-53045.json) (`2024-11-27T16:41:06.737`) -- [CVE-2024-53079](CVE-2024/CVE-2024-530xx/CVE-2024-53079.json) (`2024-11-27T16:59:20.303`) -- [CVE-2024-53080](CVE-2024/CVE-2024-530xx/CVE-2024-53080.json) (`2024-11-27T16:57:47.947`) -- [CVE-2024-53081](CVE-2024/CVE-2024-530xx/CVE-2024-53081.json) (`2024-11-27T16:56:35.143`) -- [CVE-2024-53603](CVE-2024/CVE-2024-536xx/CVE-2024-53603.json) (`2024-11-27T16:15:14.583`) -- [CVE-2024-53673](CVE-2024/CVE-2024-536xx/CVE-2024-53673.json) (`2024-11-27T16:15:14.783`) -- [CVE-2024-53975](CVE-2024/CVE-2024-539xx/CVE-2024-53975.json) (`2024-11-27T15:15:26.923`) -- [CVE-2024-9413](CVE-2024/CVE-2024-94xx/CVE-2024-9413.json) (`2024-11-27T16:15:15.180`) +- [CVE-2024-11694](CVE-2024/CVE-2024-116xx/CVE-2024-11694.json) (`2024-11-27T17:15:09.703`) +- [CVE-2024-11695](CVE-2024/CVE-2024-116xx/CVE-2024-11695.json) (`2024-11-27T17:15:09.867`) +- [CVE-2024-29292](CVE-2024/CVE-2024-292xx/CVE-2024-29292.json) (`2024-11-27T17:15:10.383`) +- [CVE-2024-33439](CVE-2024/CVE-2024-334xx/CVE-2024-33439.json) (`2024-11-27T17:15:11.093`) +- [CVE-2024-37782](CVE-2024/CVE-2024-377xx/CVE-2024-37782.json) (`2024-11-27T17:15:11.320`) +- [CVE-2024-39707](CVE-2024/CVE-2024-397xx/CVE-2024-39707.json) (`2024-11-27T18:15:09.190`) +- [CVE-2024-44758](CVE-2024/CVE-2024-447xx/CVE-2024-44758.json) (`2024-11-27T18:15:13.007`) +- [CVE-2024-44786](CVE-2024/CVE-2024-447xx/CVE-2024-44786.json) (`2024-11-27T17:15:11.767`) +- [CVE-2024-46055](CVE-2024/CVE-2024-460xx/CVE-2024-46055.json) (`2024-11-27T18:15:13.300`) +- [CVE-2024-49592](CVE-2024/CVE-2024-495xx/CVE-2024-49592.json) (`2024-11-27T17:15:12.093`) +- [CVE-2024-50657](CVE-2024/CVE-2024-506xx/CVE-2024-50657.json) (`2024-11-27T17:15:12.323`) +- [CVE-2024-50672](CVE-2024/CVE-2024-506xx/CVE-2024-50672.json) (`2024-11-27T17:15:12.563`) +- [CVE-2024-51163](CVE-2024/CVE-2024-511xx/CVE-2024-51163.json) (`2024-11-27T18:15:17.760`) +- [CVE-2024-51330](CVE-2024/CVE-2024-513xx/CVE-2024-51330.json) (`2024-11-27T17:15:12.973`) +- [CVE-2024-5217](CVE-2024/CVE-2024-52xx/CVE-2024-5217.json) (`2024-11-27T18:56:05.783`) +- [CVE-2024-52726](CVE-2024/CVE-2024-527xx/CVE-2024-52726.json) (`2024-11-27T17:15:13.463`) +- [CVE-2024-5274](CVE-2024/CVE-2024-52xx/CVE-2024-5274.json) (`2024-11-27T18:12:51.690`) +- [CVE-2024-52771](CVE-2024/CVE-2024-527xx/CVE-2024-52771.json) (`2024-11-27T17:15:14.017`) +- [CVE-2024-52787](CVE-2024/CVE-2024-527xx/CVE-2024-52787.json) (`2024-11-27T17:15:14.397`) +- [CVE-2024-53438](CVE-2024/CVE-2024-534xx/CVE-2024-53438.json) (`2024-11-27T17:15:14.647`) +- [CVE-2024-53556](CVE-2024/CVE-2024-535xx/CVE-2024-53556.json) (`2024-11-27T17:15:14.917`) +- [CVE-2024-53635](CVE-2024/CVE-2024-536xx/CVE-2024-53635.json) (`2024-11-27T18:15:18.130`) +- [CVE-2024-53916](CVE-2024/CVE-2024-539xx/CVE-2024-53916.json) (`2024-11-27T17:15:15.127`) +- [CVE-2024-5910](CVE-2024/CVE-2024-59xx/CVE-2024-5910.json) (`2024-11-27T17:23:02.910`) +- [CVE-2024-7971](CVE-2024/CVE-2024-79xx/CVE-2024-7971.json) (`2024-11-27T17:21:35.077`) ## Download and Usage diff --git a/_state.csv b/_state.csv index c95737a4b96..d64d7b9d761 100644 --- a/_state.csv +++ b/_state.csv @@ -59865,7 +59865,7 @@ CVE-2013-2247,0,0,a10b84eda5fa7eb734e33c7cae421c90ff553a774cad253490f06fc9dce043 CVE-2013-2248,0,0,db47a0c3293ec2dd123a04e49765beb89d0ea2754f09eedf09c35fe9e65138cc,2024-11-21T01:51:19.700000 CVE-2013-2249,0,0,3a41ebb91ce6b776aa90b527ce2803bdfd5245ae24b381d393ad332646438452,2024-11-21T01:51:19.820000 CVE-2013-2250,0,0,7f772082e082077e836901879b25669c10937d72ff53db0068dc96e1c715f558,2024-11-21T01:51:19.960000 -CVE-2013-2251,0,1,cb81077bc13f20bba05ab0f70fbfc515337e0f9a18d8bae8050184508c360e7b,2024-11-27T16:07:37.487000 +CVE-2013-2251,0,0,cb81077bc13f20bba05ab0f70fbfc515337e0f9a18d8bae8050184508c360e7b,2024-11-27T16:07:37.487000 CVE-2013-2252,0,0,d504525db46d457241326a706b7130374206cc134c39d971c900a0f8d539cec8,2023-11-07T02:14:59.717000 CVE-2013-2254,0,0,5cf5b5b856b10c47cba563b663ef5422a0ee73c3ec411af2cc3edbd10864e5ff,2024-11-21T01:51:20.260000 CVE-2013-2255,0,0,9b42aa4a1aae53cddbe680e647a582ce681ee55342741072a9fb46fa64a1d2b7,2019-11-07T19:38:40.460000 @@ -140594,7 +140594,7 @@ CVE-2019-5474,0,0,5fb8feb22bb226f75e30a0f81a9ceafd2008685b8356c3bc7c4861b1ef4b94 CVE-2019-5475,0,0,3a6d24ef29507296acaed35d9270cd4397f7d843d17351c2675f0e6a3549c663,2024-11-21T04:45:00.383000 CVE-2019-5476,0,0,abe3109a12786693c64912679e7833957e834495913b2974aa811e3248283962,2024-11-21T04:45:00.500000 CVE-2019-5477,0,0,6c998f73dc0b4e6543bf2793d4f9ad3c5d2236c0db7865fb21829a0d51b39d2b,2024-11-21T04:45:00.610000 -CVE-2019-5478,0,1,1e4dfbda2c81e9947ab6f2c2fe5cba6212b5bc721d1047ed0661206bc01e067b,2024-11-27T16:10:16.277000 +CVE-2019-5478,0,0,1e4dfbda2c81e9947ab6f2c2fe5cba6212b5bc721d1047ed0661206bc01e067b,2024-11-27T16:10:16.277000 CVE-2019-5479,0,0,671a7db6dc33f75942b0c5411e1316fdfeb82e1059486f36fc2e732d8377a07a,2024-11-21T04:45:00.860000 CVE-2019-5480,0,0,e221a380042cba5792ad957a8260eeb6873766dd55c7b03160b2dc867b701e04,2024-11-21T04:45:00.980000 CVE-2019-5481,0,0,c03bb8b3aca95044cdb92030418c28a03cc1285d1b3ca9899b69cbd0fbcd4c1c,2024-11-21T04:45:01.090000 @@ -143852,7 +143852,7 @@ CVE-2019-9574,0,0,316deaf2d25dccba3bb59ef295fb782bb276fe0e2b66e887a55c66a6333ebc CVE-2019-9575,0,0,67810d9892a7c3ce763867a23c2c4244fe1f351cd72dcc6e4cfde299be61b43d,2024-11-21T04:51:53.153000 CVE-2019-9576,0,0,6f89f15af8b515fc37e131c03aad13a1f9130f82a02809e91e9867f73ce3c2fa,2024-11-21T04:51:53.293000 CVE-2019-9578,0,0,614fe324eb35dddb6670619017353a2558fc6306d0bdab852d7692fdb1783015,2024-11-21T04:51:53.433000 -CVE-2019-9579,0,1,7d18dae679cc7abd9e20cca009c87dfdd33ea8855fa30d3d4898d0d85c52317b,2024-11-27T16:07:37.487000 +CVE-2019-9579,0,0,7d18dae679cc7abd9e20cca009c87dfdd33ea8855fa30d3d4898d0d85c52317b,2024-11-27T16:07:37.487000 CVE-2019-9580,0,0,c2b20fbc6ffeaad29aff28b3bf54c50bbbb738f9617b82666a1e1759bbc1cd5f,2024-11-21T04:51:53.740000 CVE-2019-9581,0,0,77ff02a1ab8993034c150b4f9e140deae8964a2590beb0caf436bb6575040988,2024-11-21T04:51:53.887000 CVE-2019-9582,0,0,dee06250f9c91d49e045abdac49e4895c92760eba6b2f0b563077292b5e6b3ef,2024-11-21T04:51:54.033000 @@ -212350,7 +212350,7 @@ CVE-2022-48501,0,0,2ce9e9f27e5624c5b9034e55cb8c3312f95af434a7619ff63718f6f73419a CVE-2022-48502,0,0,205af0b70d685f82d120f2bc75263f88a4640d5dd078fb9eb4b11185369dc047,2023-12-15T15:47:33.157000 CVE-2022-48503,0,0,de270207fccacc5f4f1e232440dfc1cff9308bc2f2f94c8f081d05f3c0662e56,2023-08-19T00:42:35.700000 CVE-2022-48504,0,0,8aa3ba2d182d2c9f12d05ddee2429ed23b5c2b04fb0651ec2097d7dffc13f9c4,2024-01-17T17:53:36.217000 -CVE-2022-48505,0,1,5f3cb211c9bfbabf92ef9a5f9f86fda7c50566ffef0a43661562171697633f57,2024-11-27T15:15:21.747000 +CVE-2022-48505,0,0,5f3cb211c9bfbabf92ef9a5f9f86fda7c50566ffef0a43661562171697633f57,2024-11-27T15:15:21.747000 CVE-2022-48506,0,0,5b723496c06b917967011fa23c5ccc2c041a7eb4feaa05105a5551eb3d763c91,2023-07-07T15:05:08.913000 CVE-2022-48507,0,0,348e337d6705da85f45d02609bf25a874e522c08ccf7c421db9201b576074a84,2023-07-12T19:20:32.090000 CVE-2022-48508,0,0,0dce358aeb5fecd97f6cf0f63f6326be86af6ccdd95bb0454cbed733fa5a326b,2023-07-12T19:25:17.467000 @@ -213110,7 +213110,7 @@ CVE-2023-0159,0,0,0f6fd55c120318dcef07ff789a61b56634708ba05cdc2c5c90bc468904524a CVE-2023-0160,0,0,09a7027c859003cd69a1385cc1382972c3bab997f733f848d51a31fefb6fb5af,2023-11-07T03:59:46.343000 CVE-2023-0161,0,0,2d565afc2a392d75d863e5fdf784db6696b2ebade8f447f4c56c766437755f79,2023-11-07T03:59:46.593000 CVE-2023-0162,0,0,433d2d12790885c810d4fa03f75cc93897d0ad22856762b3207cc99a781813da,2023-11-07T03:59:47.037000 -CVE-2023-0163,0,1,5360902169a616d3b19bf9dc9faa9a1efedd78f45a7ac1ee57e19dbea2141dc4,2024-11-27T16:15:06.757000 +CVE-2023-0163,0,0,5360902169a616d3b19bf9dc9faa9a1efedd78f45a7ac1ee57e19dbea2141dc4,2024-11-27T16:15:06.757000 CVE-2023-0164,0,0,56b714ab48298f96034c3fd165df9da114ff92034fa2e1a03fdc9d853978e2ec,2023-01-28T03:37:57.693000 CVE-2023-0165,0,0,441c64ff3d96cd77f0a64b6021d8520baa90e0a13398043debff7990bd94d140,2023-11-07T03:59:47.380000 CVE-2023-0166,0,0,a627a63e43014228e0118c8847152cec6a6ad0f5f2d9646ccac489fb22695346,2023-11-07T03:59:47.623000 @@ -215223,7 +215223,7 @@ CVE-2023-2057,0,0,165de0432b11bd80f63253d5d39a7d757e7675722f3efa39f94976905406f4 CVE-2023-20570,0,0,d393e6ba70af93bcb0478ae4bc75964bab1735c72f61228d038d7f06a285faf7,2024-10-17T14:34:52.950000 CVE-2023-20571,0,0,96f212f661726a3c476a2fb295d8da706572d89ee10f136777356539fdf55e7c,2023-11-28T18:05:25.177000 CVE-2023-20573,0,0,ad0019707ea1d3be9aafe200900d990babb7fbdcc22ca2cce433aaa0fd946615,2024-01-18T17:39:02.430000 -CVE-2023-20575,0,1,d454030d808802a4dcec640f81d272aa7c4135f2a2dc62f9cf54b366e4182643,2024-11-27T16:15:08.010000 +CVE-2023-20575,0,0,d454030d808802a4dcec640f81d272aa7c4135f2a2dc62f9cf54b366e4182643,2024-11-27T16:15:08.010000 CVE-2023-20578,0,0,e2aae81ed2b9fe5469de595a7d4e7bc7f74e6a04f637c722d6521fd97e68f844,2024-10-02T17:35:44.117000 CVE-2023-20579,0,0,eea7d065ebbf11ab22ecb2642783f4f7c9c750dc05223a19e0db0ab258a097d2,2024-10-22T13:33:02.690000 CVE-2023-2058,0,0,0c817ab6ea98d27963a0bdd6b94d4e88089c1ee4704beb5ad1d7199dfd901fb8,2024-05-17T02:22:37.783000 @@ -216086,7 +216086,7 @@ CVE-2023-21416,0,0,6dffe28851c91ee18ceb35579fd29bf8f9a56312fe83491e09cbc3b40f8af CVE-2023-21417,0,0,7d15ce5e3918d9a1b0fa653399fe5450bd6690398fe838839d69e00df17bc67a,2024-11-08T09:15:06.277000 CVE-2023-21418,0,0,cc5acdfd8b96726f57b1246a5c5711431cf7fe80fee9f7109425e08575cd3d20,2024-11-08T09:15:06.453000 CVE-2023-21419,0,0,45ff905fd2374d2820c27347193893ca16be1c6d6d9cda5e8f57ac5821898928,2023-11-07T04:06:35.657000 -CVE-2023-2142,0,0,1d48eaf915395dbd32516659db7c49e6d178aaca35f613a3e888c90805a8cb99,2024-11-26T12:15:18.307000 +CVE-2023-2142,0,1,9e24b63241ce49f973c1a3e9868e31c1395f0909f2faf381ff0f9fd71552f4ab,2024-11-27T17:15:05.200000 CVE-2023-21420,0,0,d82fcd1e46c8dac8582cb3dd087d4ad4d83f57df0f5c8e21a51e9da90cd5441d,2023-02-17T20:21:02.333000 CVE-2023-21421,0,0,733d09550bbe5bab0dce2921db71c5a7f0b9d54c2679b9cb2f268974bca05ad5,2023-02-21T16:04:38.190000 CVE-2023-21422,0,0,2a2fed08bbd0ca52dd22841f89b331fa629b94088c7bced8d629c703c6c7e766,2023-02-21T16:13:30.213000 @@ -216496,7 +216496,7 @@ CVE-2023-2183,0,0,31d5869356e64f9f6c09d96859bf633a59be491e3337931ca8ab60cf8ede5f CVE-2023-21830,0,0,56670845d6f991f1ebb6f5e910a5362188b55e02c6144fabf835b6cedfd04d57,2024-01-17T15:15:10.047000 CVE-2023-21831,0,0,40612f2418cf1d5fe8671c7086162c026d237b011a6f1859f6bfa53b791be71c,2023-01-24T19:26:29.237000 CVE-2023-21832,0,0,ddcbe44e57fa0502c697c9e1375ef658e0ee7b48163117c323038199ead7199d,2024-09-17T14:35:03.410000 -CVE-2023-21833,0,1,e9236bab6dcd9d94ec0aa973c6e3f060cff0a360fc17c511477cd5d36e41be31,2024-11-27T16:32:16.700000 +CVE-2023-21833,0,0,e9236bab6dcd9d94ec0aa973c6e3f060cff0a360fc17c511477cd5d36e41be31,2024-11-27T16:32:16.700000 CVE-2023-21834,0,0,b24d4ab7c8bbc799ac73336d479efcd8846b344534dfd23f5ee9e4c15311b2d8,2023-01-24T19:27:33.833000 CVE-2023-21835,0,0,e438453c05d0ac37a8dbebcb8cd50ddd6e38670993d51927e38ec2ac6343ff57,2024-01-17T15:15:10.157000 CVE-2023-21836,0,0,c3cecb219c742fa03a835e3e671e7b8a3e8841c61a101c801b316bd594712266,2023-01-24T19:28:01.793000 @@ -224090,7 +224090,7 @@ CVE-2023-31315,0,0,44428fbe3e922a7707ac2901dc10ee48452105458214ad8f550b81ed93b19 CVE-2023-3132,0,0,52ab34552d4912b51189535960f33c42d601a676c80cf99d393d54a820deb2f0,2023-11-07T04:17:58.010000 CVE-2023-31320,0,0,94626c9fd18f585c07331302f269c549777a5d34517f86a0946e1593aaaba7c1,2023-11-30T15:10:43.827000 CVE-2023-3133,0,0,003d70726348f1765d3e8bbdc7b1fe8c778d5248156227efcf8dfd6079b65e42,2023-11-07T04:17:58.197000 -CVE-2023-31339,0,1,55016df2b1f62c6b4660412aa764fde8ebdeabe77b5e76cdf782b4574058e985,2024-11-27T15:55:02.843000 +CVE-2023-31339,0,0,55016df2b1f62c6b4660412aa764fde8ebdeabe77b5e76cdf782b4574058e985,2024-11-27T15:55:02.843000 CVE-2023-3134,0,0,56071acdc7623a3f1e8c35f56a75d80cedbc311efc23e7ac51d208245195f557,2023-11-07T04:17:58.303000 CVE-2023-31341,0,0,dd24cf83580387b35de43a1761935afa05605b69789156e33c8226af92558012,2024-08-14T02:07:05.410000 CVE-2023-31346,0,0,baf70a7fbcbac8ee2109bb0ede410a1f9d8a0f3d16eca151ea162e0c8735e373,2024-10-24T15:22:58.270000 @@ -224682,7 +224682,7 @@ CVE-2023-3222,0,0,c8596742688ff4f4ce34cba08b6e87b6035a92b437604e378530583c1e50c7 CVE-2023-32220,0,0,6598ffdb4be98a86b0968f5fa647835aeef5d462978de06a276b077763ea318a,2023-06-27T13:10:22.060000 CVE-2023-32221,0,0,a8096a0f62324cd5523fa36c53eba2b8e14dda932ec9e56d4c5a1ef1e4f5bb61,2023-06-26T15:43:42.757000 CVE-2023-32222,0,0,1bfffb24c78c59e1305082020bf9bea5ed51017055bcc40fffbb1d815e803550,2023-07-06T15:34:43.723000 -CVE-2023-32223,0,0,1d299b31efb215e705607460f6fb8a4876f1de490a061e8af9d146f08c171d0b,2023-07-06T15:33:10.737000 +CVE-2023-32223,0,1,917c1b5258b903e7b790f68cd6060630779eb688b3bea354bbc98d7b17f4b584,2024-11-27T17:15:05.937000 CVE-2023-32224,0,0,93e7fba8e52643b83f12b886ffdbf97b296d423ce997520665ec6ec0f71b4ff0,2023-07-06T15:22:40.277000 CVE-2023-32225,0,0,c772567b1dfc8e5c4d6aef4e997633a6cfcdcec2ddfba65ca031cfb7841ffea6,2023-08-03T20:46:02.310000 CVE-2023-32226,0,0,06d72d0f875d49d0ca2e061add683154237421da117704275da69a03e0bb6b79,2023-08-03T20:49:39.170000 @@ -225067,7 +225067,7 @@ CVE-2023-32609,0,0,ad071be644dccdc78aa42759730857bc4ab0c387f7bceece5cb15f95cfcb0 CVE-2023-3261,0,0,d804b7306842f46510218e49ca93d047e78fc5a76c2a2a392f7a191cee62ed7b,2023-08-25T06:15:08.990000 CVE-2023-32610,0,0,4805853c5e520c87eda77ebca6be0653ac150f2f5318e9b6843d232507ac587c,2023-07-07T14:55:04.910000 CVE-2023-32611,0,0,74fa864c3b0f5c42d618b0d11300f9fbf0cea9afed15dc7a7a5c9e543c558545,2023-11-27T14:15:07.713000 -CVE-2023-32612,0,1,48946b265a891ee8ddf06d198ba3756972109e4c356751ada0c06a41b3d405d2,2024-11-27T16:15:09.290000 +CVE-2023-32612,0,0,48946b265a891ee8ddf06d198ba3756972109e4c356751ada0c06a41b3d405d2,2024-11-27T16:15:09.290000 CVE-2023-32613,0,0,f496d4da1cd36ddca38689cd4e5a8ec5895c11b2c4638bc17410c3085a39d4be,2023-07-06T23:38:05.257000 CVE-2023-32614,0,0,a784f55ff10684ff0982e590005de61c2c9f48fb842d9b782491c6446577db06,2023-09-26T14:44:23.657000 CVE-2023-32615,0,0,091c09c0f2f1329fa59c5332eabb3854daaef309b38ebf1cc8ec5795c893e63f,2023-09-08T17:23:31.060000 @@ -225688,7 +225688,7 @@ CVE-2023-33293,0,0,aaba53a5bd9606bf2b9ebb8058082a8f9430e4008d1677208c38c998718dc CVE-2023-33294,0,0,512a0d802975effda47c9841c790a12db90febf30fa9787f8f1a643f5cf3846e,2023-05-30T15:34:50.353000 CVE-2023-33295,0,0,0ee9ce4891974281a8070ba77006ee5030b6c04f0180cf6fd5145d66b4777c49,2024-01-30T14:29:36.033000 CVE-2023-33297,0,0,5d8e3948533e1bd4647cd5fad08a17be514bf07df635b4c9679a8f82e9ab850f,2023-11-07T04:14:49.637000 -CVE-2023-33298,0,0,2fe7f04c1eab70841d9fb3a8eea01477b543419ec1b2f605e6f740214038e540,2023-08-02T15:40:35.783000 +CVE-2023-33298,0,1,e6807bb120ed528f6bb6a498cf3fde144b5e9bbb47f26a66ce325564392ac08a,2024-11-27T17:15:06.230000 CVE-2023-33299,0,0,38c7cbf55f696320e4e04abc250ce3163757543b746f0dff08506567861aa8c4,2023-11-07T04:14:50.620000 CVE-2023-3330,0,0,b62b544dba0e5d46d39d4efdc53e6faa4883ab9f19a259cae52d022b97d4c1b2,2023-08-28T01:15:09.643000 CVE-2023-33301,0,0,39458e4f7d0ff50d22acdf1137008f959df75babe7c5e030172d43b12d7ea61d,2023-11-07T04:14:50.840000 @@ -225847,7 +225847,7 @@ CVE-2023-33567,0,0,6f8070242f0b52f35467ff6fa5967af9712ffd9e8a51a555b37438dd5b9a2 CVE-2023-33568,0,0,cf9d1d831d747564c354f3c033b6b23993269e0b62f44d9030fcb701e027e8cd,2023-06-23T19:22:43.680000 CVE-2023-33569,0,0,4fadfbd06c77e9caa9b26894eaee099724d33670c303b72aa0401d276bd24594,2023-06-13T15:17:31.487000 CVE-2023-3357,0,0,600350ce8cb54d3cd472e5c55fbe0564cc7d45cade0900caff64a5b44a256810,2023-07-06T17:45:06.373000 -CVE-2023-33570,0,0,9f2846f85e3716647871afc65ae46c02368acab156056b82c3fabd74ffe466ea,2023-07-10T15:53:05.990000 +CVE-2023-33570,0,1,85cf59e7d43d3b836fbc8ade873b57bf05e4ee43d634b3bb632c5499b8726f78,2024-11-27T17:15:06.687000 CVE-2023-3358,0,0,12e8757394b39f03915a68fdab7c57a08d2dd1a06e5f61eff9ec3fcd54fa4870,2023-07-06T16:54:55.357000 CVE-2023-33580,0,0,b896a7d26da1c4a99df4635960a09e8061b54d8b1045b27b06cfff27cfdd8bba,2024-05-14T13:14:08.210000 CVE-2023-33584,0,0,a1f261b95d9793aa4dc94db58be1fdcb1978b62cb448302d23854fb5713a34a5,2024-08-01T13:43:52.090000 @@ -226065,7 +226065,7 @@ CVE-2023-33901,0,0,b52f1f5caa1a71ed7a3660093cc4ff625ef81a8e57103b9446f0f02ece8bc CVE-2023-33902,0,0,1f72efc992411950d4d63edd663b409a9ade365735b2775ffa85420fe4c927ca,2023-07-18T22:36:36.170000 CVE-2023-33903,0,0,bf0c0fe257ca77843a093950bb190c96a208d3b02a2bcd1d680822b64738667d,2023-07-20T01:36:29.007000 CVE-2023-33904,0,0,6e8a8301f0e61237f25896ca44140a1d4f7967d97bc04b883674717a6a107b2d,2023-07-20T01:35:11.450000 -CVE-2023-33905,0,1,3882940bca949272cdc0ab5501ce367e34d2e67106917040374664dcaec9f19a,2024-11-27T16:15:09.610000 +CVE-2023-33905,0,0,3882940bca949272cdc0ab5501ce367e34d2e67106917040374664dcaec9f19a,2024-11-27T16:15:09.610000 CVE-2023-33906,0,0,b1fda6b482ccab08c128646d84ad63d5547dd2cdde95cd6c340c4b80c19d5152,2023-08-09T20:54:32.290000 CVE-2023-33907,0,0,0896c19ffe04302fbacdfd4d930e7c33a3432c132a214e05ee871524bc106cec,2023-08-10T14:34:54.647000 CVE-2023-33908,0,0,b3731c5f6811d32e1adc6f5d15e5d493af862305160e34132f162715c6497284,2023-08-10T14:35:29.667000 @@ -226703,9 +226703,9 @@ CVE-2023-34650,0,0,46b1353cbe03e4c1538a32beef8802bfa42c2c9854cc529e5731b6e7d7182 CVE-2023-34651,0,0,5959bd81f87f39b6a741a557c197abf7cfde59289b5de1b43248b87a5096a9b2,2023-07-06T15:20:42.360000 CVE-2023-34652,0,0,ff947ab860e6120f91e1ca4194d5faab5f86cfd204d0f2ad3e79e4f916272714,2023-11-14T16:36:13.640000 CVE-2023-34654,0,0,f66c971439f3d88246860b7a3a652cadf1cbfd9e1ca8fe442fb861d6292aa4c2,2023-07-10T13:59:13.440000 -CVE-2023-34656,0,1,e8b18d7acdb5258f3011a99a900cbe8bfa5fd0f3cc49dbc6fa2a9cf2299236ff,2024-11-27T15:15:23.147000 +CVE-2023-34656,0,0,e8b18d7acdb5258f3011a99a900cbe8bfa5fd0f3cc49dbc6fa2a9cf2299236ff,2024-11-27T15:15:23.147000 CVE-2023-34657,0,0,9dd1a5c53b7f66fcfe0cf1eaa53a71cc0b26fea430cf6b68cbb074f7dc660b05,2023-06-26T16:26:30.057000 -CVE-2023-34658,0,1,7e79f39e62fba74cd049d08fa473d9537b089c09510e99356df90f937c1a76b3,2024-11-27T15:15:23.273000 +CVE-2023-34658,0,0,7e79f39e62fba74cd049d08fa473d9537b089c09510e99356df90f937c1a76b3,2024-11-27T15:15:23.273000 CVE-2023-34659,0,0,ba101ae9a9a6d722b772e73640680e94739c59a5da3aff941bdbae8a23637381,2023-06-23T21:25:28.887000 CVE-2023-3466,0,0,6a83488758d15c147555e0ff29ed8d720348c008e9c4c1415429f70acbabdc3e,2023-07-28T14:54:11.013000 CVE-2023-34660,0,0,3fdae79286adb78105725fa2e0c187c138f0137808c41ee9fccc354d7a02987e,2023-06-23T21:24:20.913000 @@ -226741,7 +226741,7 @@ CVE-2023-34755,0,0,385ddc4387bd2c5755a94a75b434dd76b08bdc268129c955503dc27a0b6fe CVE-2023-34756,0,0,67d55fee96d1b51f968d7da1697b8e11bb66c530139f57a3e78910d0e6a0d8f6,2023-06-17T03:06:43.303000 CVE-2023-34758,0,0,9eccc6d37c9b088248c8aca33c8aa8875c2b998c800435e2964ecc87b1b82cbf,2023-09-12T19:39:31.640000 CVE-2023-3476,0,0,cd288e67143a643dc4edcffdb16b25dd34c6d270b5aedde5ea5a4f03a4a84a3a,2024-05-17T02:27:31.387000 -CVE-2023-34761,0,1,3fe72814266bd2f80524fddb8c8dc6ef5b680196079b43a9740a275231cf8871,2024-11-27T15:15:23.460000 +CVE-2023-34761,0,0,3fe72814266bd2f80524fddb8c8dc6ef5b680196079b43a9740a275231cf8871,2024-11-27T15:15:23.460000 CVE-2023-3477,0,0,5d5692f0acf1fc9588440776a9873fa73da1512d4616d99905805ac7fd5efa4b,2024-05-17T02:27:31.490000 CVE-2023-3478,0,0,62ca4275c323b059845d588a6c85dcf0f11942cddcb4326cfb1cfa138f569fcf,2024-05-17T02:27:31.600000 CVE-2023-3479,0,0,d48f4215051968fbed645a509aadd86b9d129cff011d403b6f18727633f3065c,2023-07-06T18:50:34.680000 @@ -227346,7 +227346,7 @@ CVE-2023-35826,0,0,5e43d2b4a6463cc57618d690e3eaa3dcf112fab46da37bf46c4f66930757d CVE-2023-35827,0,0,d5267cc8e5ff57341217408bcba76fb2af5741e775cc4e40c4f4580831015c03,2024-01-11T21:15:10.180000 CVE-2023-35828,0,0,13a84b4d359f0a7a20df266cb8df7b222b35808e6042143114f3f2068e115b32,2024-10-21T16:35:06.073000 CVE-2023-35829,0,0,d781a1cc18b7b1a4d19b03bc7b61ddc2d06f09ba27700d26ab277831cd36e00e,2024-02-09T19:13:28.167000 -CVE-2023-35830,0,0,09da6f1a46d1525d1cd80ca8705371b308db2bbf6135eddd66de8da296e8cbe7,2023-07-11T19:25:28.647000 +CVE-2023-35830,0,1,f9ec7bc37d75084b8f9adb19576e522ba0ca1eac41387899bac0f91ba3a89a7b,2024-11-27T17:15:08.783000 CVE-2023-35833,0,0,b59e0c3549ed415537c60ab0c56af9b7ea9f99c585e3da19da7e86a887a60c5c,2024-08-02T17:15:47.460000 CVE-2023-35835,0,0,87bd672c840261ccc99c9c2d2a50acb2ac1b47f706fdd52b69110ddc2fb55b32,2024-02-06T14:23:41.733000 CVE-2023-35836,0,0,25cc78294cec9506c0321746b6fae3d5b11d667157223d96a0d913704cd8ac87,2024-10-28T19:35:06.850000 @@ -239335,15 +239335,15 @@ CVE-2023-52341,0,0,752ec91f49f7d27aa4aefb97c1028c0e3ba02b8dbe8f5ef4e4a5be61da661 CVE-2023-52342,0,0,d9217e8a43616eb93ae5900a69930974b98e947284e3031e63af0d98b4863568,2024-08-26T14:35:02.157000 CVE-2023-52343,0,0,72f06a8afa822a3024d5a446620d24cff01d97ee834295104d1b734aa9f75e3e,2024-11-04T17:35:08.043000 CVE-2023-52344,0,0,2746ce7294f9dd645e743c241e219d96848cd26c1bbf2a1d45c502d1d5d069c5,2024-11-08T22:35:05.047000 -CVE-2023-52345,0,1,9b0f7e720892a08eb597995237cf0041e77eb1cbbac52014266e50a5c094fa0b,2024-11-27T16:22:10.590000 +CVE-2023-52345,0,0,9b0f7e720892a08eb597995237cf0041e77eb1cbbac52014266e50a5c094fa0b,2024-11-27T16:22:10.590000 CVE-2023-52346,0,0,abf5870e70e4c81d560fa222012a9514676bbea91379a04e47b0bfe7513e6621,2024-11-04T18:35:03.567000 CVE-2023-52347,0,0,0de571f6617802f0c8b8163db0698d0cafc861c67facc0349aa475f789167481,2024-11-01T15:35:05.800000 CVE-2023-52348,0,0,a78f5b9171ee88d03834f0039162b0633f8a198afe00aea2be4a4f4c2fbe83ff,2024-11-19T22:35:02.473000 -CVE-2023-52349,0,1,c2009aaf4ca39771753ae2450dc22d33c3a41dcb584ed395b9b9fb6df6e40ace,2024-11-27T16:22:27.920000 +CVE-2023-52349,0,0,c2009aaf4ca39771753ae2450dc22d33c3a41dcb584ed395b9b9fb6df6e40ace,2024-11-27T16:22:27.920000 CVE-2023-5235,0,0,9971c38b51da44a2e87e1667cbf8153f9719c021bb80ee285f53405f1ee2831d,2024-01-11T19:37:47.563000 -CVE-2023-52350,0,1,c42ba7ccf7dc545c6f58ac385eeaea84aeaa885e9881355285e36150928c5107,2024-11-27T16:22:44.777000 +CVE-2023-52350,0,0,c42ba7ccf7dc545c6f58ac385eeaea84aeaa885e9881355285e36150928c5107,2024-11-27T16:22:44.777000 CVE-2023-52351,0,0,e0d15ad66cd3476de6fb03f1fe5885ce689d572ce17666a9de7d2d70a4aa296a,2024-11-05T17:35:04.513000 -CVE-2023-52352,0,1,900de2da6904bba832006209e250a5947f381893191628f8a88415275fc9389c,2024-11-27T16:23:32.247000 +CVE-2023-52352,0,0,900de2da6904bba832006209e250a5947f381893191628f8a88415275fc9389c,2024-11-27T16:23:32.247000 CVE-2023-52353,0,0,c85321a66aa40615f097e7c4b005042b61f142e80160f23edcb6164f859777c0,2024-01-29T15:53:20.917000 CVE-2023-52354,0,0,b83a0ae26910aeb4d8be73792a9bb48b3e532279f0f31aeebd210df1fbcb691b,2024-01-29T16:56:40.830000 CVE-2023-52355,0,0,461ea908f7dd6b61786b879539aa67641b818dbc1dc97626ddbece62684b7542,2024-05-17T17:37:57.793000 @@ -239514,7 +239514,7 @@ CVE-2023-52532,0,0,299d7cb56f6a6c17487eae201e2d466d368011ffa4a3b859f2f2a268babbf CVE-2023-52533,0,0,fb87020ed7c8b21a162b2fc06e0a8d5d89d218140fec502190c9fad28717e9e6,2024-10-25T21:35:02.863000 CVE-2023-52534,0,0,7dc9d1c01e69a34629a396cfd8c7fbd7a37026a7d21c7c1a7e3e6c2396f067b0,2024-11-05T20:35:13.253000 CVE-2023-52535,0,0,a8b46149ce833cf00e265bd878fbc4e9f6f9152b7344f1759d13bc7224de07eb,2024-09-06T22:35:00.460000 -CVE-2023-52536,0,1,b70e3b9bf9057c72bfb5ecc0e7da9092e715abaaf98d3f4896e1b5f49ed6c77e,2024-11-27T16:23:42.923000 +CVE-2023-52536,0,0,b70e3b9bf9057c72bfb5ecc0e7da9092e715abaaf98d3f4896e1b5f49ed6c77e,2024-11-27T16:23:42.923000 CVE-2023-52537,0,0,2559d90b1b1794296f22fc0badef4074c5581bcf37f52502d595b11857600810,2024-08-01T14:35:02.953000 CVE-2023-52538,0,0,9c269667a219bd0a186db35ef8e2818d381c8926a2b266c9f2e28d3c047bb2ee,2024-08-01T13:45:38.693000 CVE-2023-52539,0,0,b821de3cf6dac9b6ca9186886c6757cf361cf7e1b3be10c27145c9e496b92b49,2024-08-15T17:35:01.503000 @@ -243454,6 +243454,7 @@ CVE-2024-11150,0,0,a42c681646aa4974b2ce83b0b93c5af4c26316891f1e3dd7bf6a226e6b2cf CVE-2024-11154,0,0,9c2f24e5b2c6bb0a1acf0aba74e4e593d635b23a924a1df484d24fc0dc0da623,2024-11-20T14:15:17.500000 CVE-2024-11159,0,0,40c853846b1f5260f445d8196c4d1f6aec01e81777411e7a4839d765e27bfc1a,2024-11-26T22:15:17.720000 CVE-2024-1116,0,0,4196b5c71a0d802f4c1e9b3a43ac71c958f929e96b26e1ebb01241c6bd176fa3,2024-05-17T02:35:14.983000 +CVE-2024-11160,1,1,c2a00c83ebfc94083c99410ffbf76862f5cddeb9d6f2530e0ed9a430c75b3087,2024-11-27T18:15:08.620000 CVE-2024-11165,0,0,95fe2b7c203ba5cc9c6e4fb2522e665475ea40e75b68e18a56b9dddf3a00ff2f,2024-11-14T16:35:05.493000 CVE-2024-11168,0,0,5e610ba56b770f0c45b8e5f1da8a18409af80ecc6fd32d397017d56ba5ace8ac,2024-11-13T17:01:16.850000 CVE-2024-1117,0,0,0eff4d8f06fdd3645727772834638be79e19128758cbe94b2a8e7a297167b8d0,2024-05-17T02:35:15.090000 @@ -243746,24 +243747,24 @@ CVE-2024-11678,0,0,e780942a86d65f83e2cb7cc5d04e0a3676e4919574029bbf616d3d9c8bbb8 CVE-2024-1168,0,0,b74b0b0c267c02c66f0f474186eac7335d29517290a9638a292d9de8edcd7c5d,2024-07-11T02:52:36.687000 CVE-2024-11680,0,0,e59e07fcd0f2caeb9f7525587364f8cd5a94ad91992448a2d5730a3a3fe6f61e,2024-11-26T10:15:04.540000 CVE-2024-1169,0,0,a43d6b50f47e310e039f1575550f9d1fe159a31a77f5a57027ebd3dc489ff540,2024-03-07T13:52:27.110000 -CVE-2024-11691,0,1,7a53223ef1bbb0483180a0674c22f2ddfbf700b35cfbc415f7446deb28e06f8a,2024-11-27T16:15:12.330000 -CVE-2024-11692,0,1,2e2a368d2bad10eec3d1f66bd6815192775038dd3ccc98b4295042a1e55ff9d0,2024-11-27T16:15:12.530000 -CVE-2024-11693,0,1,80e700b6e230fec6589ebebf228f21bbda939aa10d6b9b37eea0a058e654bc27,2024-11-27T16:15:12.753000 -CVE-2024-11694,0,0,a6a2c4a535474da2ca567947004ffbecb7b16bb81183cc508d3c10dd53c61627,2024-11-26T14:15:18.943000 -CVE-2024-11695,0,0,53a60a574530fe77be7f2d369026b93d8b41334f9e92c8be10e90eb5d3f867f3,2024-11-26T14:15:19.040000 +CVE-2024-11691,0,0,7a53223ef1bbb0483180a0674c22f2ddfbf700b35cfbc415f7446deb28e06f8a,2024-11-27T16:15:12.330000 +CVE-2024-11692,0,0,2e2a368d2bad10eec3d1f66bd6815192775038dd3ccc98b4295042a1e55ff9d0,2024-11-27T16:15:12.530000 +CVE-2024-11693,0,0,80e700b6e230fec6589ebebf228f21bbda939aa10d6b9b37eea0a058e654bc27,2024-11-27T16:15:12.753000 +CVE-2024-11694,0,1,8fab8f6682482c80a046d7efcb5d62937e3f2364960b2f04726b7a87f7e40748,2024-11-27T17:15:09.703000 +CVE-2024-11695,0,1,923949ea70ffb3960535c924daeac21d36cf8875477a4ac90cebfaddff787cf9,2024-11-27T17:15:09.867000 CVE-2024-11696,0,0,7ab5e962b1864924c9e631a223b7224b844fe8e800da1f91cb3d221520b39912,2024-11-26T14:15:19.143000 -CVE-2024-11697,0,1,5748a45bf5b4ab1df9cdc0d9e9aecb8d661d83a718add7c3b7046a7fb75f2393,2024-11-27T16:15:12.927000 -CVE-2024-11698,0,1,4794c1cf0af88db81ed7f95cedceea58d59a70d0fc54757fe957e605d54d7ffb,2024-11-27T16:15:13.130000 -CVE-2024-11699,0,1,a7ea20a1c54c5589a88b0fef3691aeab09fe6e64b22758a350879ee83ee60e9d,2024-11-27T15:15:24.600000 +CVE-2024-11697,0,0,5748a45bf5b4ab1df9cdc0d9e9aecb8d661d83a718add7c3b7046a7fb75f2393,2024-11-27T16:15:12.927000 +CVE-2024-11698,0,0,4794c1cf0af88db81ed7f95cedceea58d59a70d0fc54757fe957e605d54d7ffb,2024-11-27T16:15:13.130000 +CVE-2024-11699,0,0,a7ea20a1c54c5589a88b0fef3691aeab09fe6e64b22758a350879ee83ee60e9d,2024-11-27T15:15:24.600000 CVE-2024-1170,0,0,ef14266ea2026fd1e77d96d081d12f376a313e532bfd85bbf7562d8a6e990ca2,2024-03-07T13:52:27.110000 -CVE-2024-11700,0,1,ceace3355c1afadd3765ff990a47b048411702573d03dfd1ddbe541b66cd2a99,2024-11-27T16:15:13.300000 -CVE-2024-11701,0,1,3ce088d891c171dd484e061591f74125e217790d856876ddb068c1435abf2279,2024-11-27T16:15:13.470000 -CVE-2024-11702,0,1,13d1f6c9b043e1cf62a5a526ef83139151e2fe50c3be4951aef4463544909f25,2024-11-27T16:15:13.660000 +CVE-2024-11700,0,0,ceace3355c1afadd3765ff990a47b048411702573d03dfd1ddbe541b66cd2a99,2024-11-27T16:15:13.300000 +CVE-2024-11701,0,0,3ce088d891c171dd484e061591f74125e217790d856876ddb068c1435abf2279,2024-11-27T16:15:13.470000 +CVE-2024-11702,0,0,13d1f6c9b043e1cf62a5a526ef83139151e2fe50c3be4951aef4463544909f25,2024-11-27T16:15:13.660000 CVE-2024-11703,0,0,a0aade5966792892c7a69520deed0024219950d9ba72d34090cb3bb1b7974f3a,2024-11-26T14:15:19.810000 -CVE-2024-11704,0,1,2b7b550cc939bccaee7258fd0a9f771da470ed456c481083dde13c083b054c7f,2024-11-27T16:15:13.837000 -CVE-2024-11705,0,1,b00958231cd75a51aaf41f507045209bb5b601f8c6cb2be613795f56225c7da5,2024-11-27T16:15:14 +CVE-2024-11704,0,0,2b7b550cc939bccaee7258fd0a9f771da470ed456c481083dde13c083b054c7f,2024-11-27T16:15:13.837000 +CVE-2024-11705,0,0,b00958231cd75a51aaf41f507045209bb5b601f8c6cb2be613795f56225c7da5,2024-11-27T16:15:14 CVE-2024-11706,0,0,1b96fbb1c831be79b72164c44aa56f72093a93485fb6eb748f832788631279b2,2024-11-26T17:15:23.010000 -CVE-2024-11708,0,1,5872b1f165a61acebbe70a5730336bc20a16b17ac8491536799290291f1eb8e9,2024-11-27T15:15:24.747000 +CVE-2024-11708,0,0,5872b1f165a61acebbe70a5730336bc20a16b17ac8491536799290291f1eb8e9,2024-11-27T15:15:24.747000 CVE-2024-1171,0,0,59f6a72a19a26da04118a5786af1566b99863895f524fbe4b34406571782a615,2024-02-29T13:49:29.390000 CVE-2024-1172,0,0,11b44e5ce5101f5b7c8ab7c5bd49458795761e0ba5cf2024c3b79ca4ef4be57d,2024-02-29T13:49:29.390000 CVE-2024-1173,0,0,d3495940fb5216c0fbed831a88233211893c24cb888781ac48f1d76bb3bc26ba,2024-05-02T18:00:37.360000 @@ -243789,7 +243790,8 @@ CVE-2024-1183,0,0,b9ca697d85173799c910606842f064c322818be1aee71b1208c43495b066c0 CVE-2024-1184,0,0,0bd0336a802b5a07ef17cf4c3337487d1573b3f8590cc13c2e3f9ac276b1f143,2024-05-17T02:35:16.900000 CVE-2024-1185,0,0,a60268243ee8d3dcf82e9c185863da8146ac8c49246dc744f2663ef723b40081,2024-06-26T15:15:19.220000 CVE-2024-1186,0,0,b01b3a0462d1f7a1a803ca8f493a6219bd71eed48ddf8d36021e6ca2af3e1767,2024-05-17T02:35:17.110000 -CVE-2024-11862,1,1,6d3560dff7bd57ea41736e55020db21367a02a743a7c33eb7522f1239d06cd69,2024-11-27T15:15:25.393000 +CVE-2024-11860,1,1,8f2a0fbf19059c6c3c8a5836cc661c7d3bd0f5aaad2633071ac71b0a6a9605c7,2024-11-27T17:15:10.010000 +CVE-2024-11862,0,0,6d3560dff7bd57ea41736e55020db21367a02a743a7c33eb7522f1239d06cd69,2024-11-27T15:15:25.393000 CVE-2024-1187,0,0,3fcd8394fe17b53cc850805fb2de93d28c688f808245fcfde96cd99bc903bbab,2024-05-17T02:35:17.220000 CVE-2024-1188,0,0,6744ad4ad1ed370f6488ba44c137b6887619ea6ff1a51ee5f48fd0aec905e09b,2024-05-17T02:35:17.327000 CVE-2024-1189,0,0,b364c59b0d964a14f93b1e1b61d95f98aeb338db4ea440a29e1d18c3cc27c9d5,2024-05-17T02:35:17.427000 @@ -245268,26 +245270,26 @@ CVE-2024-20899,0,0,1ea5d3c975e5b8e190a2ecdcdb2ffe2594326badefc6428838ae53a3dbe04 CVE-2024-2090,0,0,fd740e48f3f1bf206125be718e7b11b445beb9b28db87f1795fcc38f51fc8ca6,2024-08-01T12:42:36.933000 CVE-2024-20900,0,0,dd950b876d70624a07b7af1c0b796b44690939cd5e1be274d843ac0163ab8cf9,2024-07-05T17:11:51.040000 CVE-2024-20901,0,0,5f9dc6d7e5ec003b4ebac42377482eb7121a0918aab2f40a5dfa15c434211c61,2024-07-05T17:12:08.827000 -CVE-2024-20903,0,1,f1711e5664886d226fb1c0bbb4ffdbab32f883746b840f88fa51affe34bab471,2024-11-27T16:32:13.240000 +CVE-2024-20903,0,0,f1711e5664886d226fb1c0bbb4ffdbab32f883746b840f88fa51affe34bab471,2024-11-27T16:32:13.240000 CVE-2024-20904,0,0,2825f92c3d915e6e0f0061d68d884ba2126601eadca29a19874902f94d6a74f0,2024-01-20T18:42:09.760000 CVE-2024-20905,0,0,5cd75db3ce8e0b4ca7eaa1e088847333bbe8ccce7b8db3715e7ea413af7cfaa2,2024-11-13T16:35:09.767000 CVE-2024-20906,0,0,bd717d71015dc5a5435b2e0a0577a3000709ef823cb8b0c048c75367a9de0fe0,2024-01-20T18:41:53.127000 -CVE-2024-20907,0,1,6cdedde57bcc7effd23429e9b920893b06b04420594036116dcd9d8e33dd747a,2024-11-27T16:32:05.720000 +CVE-2024-20907,0,0,6cdedde57bcc7effd23429e9b920893b06b04420594036116dcd9d8e33dd747a,2024-11-27T16:32:05.720000 CVE-2024-20908,0,0,f48ebbb13e10a919d3724d0ac546c6a4149d41b2169d483ec898b46dd4b06c2b,2024-01-20T18:41:36.717000 -CVE-2024-20909,0,1,5c37ae12db791f7a5f17a4b4a68da1e4d0037c5574297a109dcc5e84b0bb1e46,2024-11-27T16:32:02.417000 +CVE-2024-20909,0,0,5c37ae12db791f7a5f17a4b4a68da1e4d0037c5574297a109dcc5e84b0bb1e46,2024-11-27T16:32:02.417000 CVE-2024-2091,0,0,63435fbeca7c80879cf4e6a4a5624c08d1bd49b5b35309f8f6c212636e73c360,2024-03-28T12:42:56.150000 CVE-2024-20910,0,0,29a700282ac3c23f3ad340e38887f2bcd46589faa3e2b225d7b99161e42d9cd5,2024-01-23T19:42:19.473000 -CVE-2024-20911,0,1,6afa3f4a97fc1808bab0faf3dd86308a391d08a34d4e09627b3ccd7fd05b9c74,2024-11-27T16:31:58.250000 +CVE-2024-20911,0,0,6afa3f4a97fc1808bab0faf3dd86308a391d08a34d4e09627b3ccd7fd05b9c74,2024-11-27T16:31:58.250000 CVE-2024-20912,0,0,e4df4470bb555b4c07efdd1d6d27dc7847c1f66a5ee925c32c1f7f702b610f9b,2024-01-23T19:42:12.067000 -CVE-2024-20913,0,1,c65d7e17dc913591eb1991838888914f80deb6a0856863b8facc2f59c78ce3e4,2024-11-27T16:31:55.040000 +CVE-2024-20913,0,0,c65d7e17dc913591eb1991838888914f80deb6a0856863b8facc2f59c78ce3e4,2024-11-27T16:31:55.040000 CVE-2024-20914,0,0,5fcc977754d6cec15612003989da66d699b4d03dfca24398bd8f26b0bc5e1c40,2024-01-20T18:41:05.227000 CVE-2024-20915,0,0,48635e3f21fd78d508f12f5ee88f082d01cbe44bc77759d7404c6d47358e2a52,2024-08-29T20:35:59.457000 CVE-2024-20916,0,0,fa25cd13f1d5003a9402bf8b2824fbe225d800b2b894fa3cbba3f37644aef975,2024-01-20T18:40:50.423000 -CVE-2024-20917,0,1,88063e310fdfa917e1b9d40d36604d772b4b7af571f1dc922f92be5dbb09229a,2024-11-27T16:31:52.210000 +CVE-2024-20917,0,0,88063e310fdfa917e1b9d40d36604d772b4b7af571f1dc922f92be5dbb09229a,2024-11-27T16:31:52.210000 CVE-2024-20918,0,0,1f8b1c5c8f27f2bbdd35361436e307f2eb12e55549bc074707cb3c0855b1a1a5,2024-02-15T03:18:09.407000 CVE-2024-20919,0,0,f32b38df4be8d406125d20b81a0a36fea655b3c9d080af0ec28f80feefd5b5f5,2024-02-20T19:51:05.510000 CVE-2024-2092,0,0,a316801cc7dde85dd006820e50100cb21585dd08f10e55e1c16e6ff68463ad93,2024-07-23T17:14:41.963000 -CVE-2024-20920,0,1,2c991406da6ae70f9f6e513bfb6b67a971b2ae86d52ed2be7c0d293385e86314,2024-11-27T16:07:37.487000 +CVE-2024-20920,0,0,2c991406da6ae70f9f6e513bfb6b67a971b2ae86d52ed2be7c0d293385e86314,2024-11-27T16:07:37.487000 CVE-2024-20921,0,0,f0986262b45e86fd23744f106528549eb9a9e0900294f36e0f89aa1af025a1b7,2024-11-05T16:35:11.067000 CVE-2024-20922,0,0,9dd883413b1ca45dc7c138e52101d4c22dd7eba0af5f925a999c067fb6713829,2024-02-02T17:36:17.387000 CVE-2024-20923,0,0,a934b00b98c73c6c804cd41561d4b37cf6c513d57c870a7d7f13953b985bc1d6,2024-02-20T19:51:05.510000 @@ -245314,7 +245316,7 @@ CVE-2024-20942,0,0,138cd75b35d318f86006ff20a4b3b9623740d177f3b79d48f82f62a57936d CVE-2024-20943,0,0,c893b8e5b6540c97f966b32b9f9335406bebc3fc0fcebe2041732294e6d7a03c,2024-03-12T14:56:31.537000 CVE-2024-20944,0,0,455869c6c4218017ed3052a739e20e96a49e80460128731305c47837c36967b5,2024-01-20T18:33:55 CVE-2024-20945,0,0,c9a7660aedc8461cf49457ff4506ab3c831d2d70e2229c352a5ff786b482ec6f,2024-11-12T19:35:05.470000 -CVE-2024-20946,0,1,df3034f1fad61ed84baa5888e8cbfac598e430fe48771252310c446f30669d8c,2024-11-27T16:07:37.487000 +CVE-2024-20946,0,0,df3034f1fad61ed84baa5888e8cbfac598e430fe48771252310c446f30669d8c,2024-11-27T16:07:37.487000 CVE-2024-20947,0,0,0a2e4d20648a1d06c26162eb28926c103f307728c3ed375718ac4fd8da927958,2024-02-20T19:51:05.510000 CVE-2024-20948,0,0,12e9e8a4ba5f0d4d5a3ec7d1b0d3211c79a9e2d1eccf174b1829b4aa21974fac,2024-01-20T18:33:19.560000 CVE-2024-20949,0,0,a2a9e2bb1ecc05c1ef53d90345f7a09727513acaa3e67eae682ecc91fa3b450c,2024-02-20T19:51:05.510000 @@ -245324,9 +245326,9 @@ CVE-2024-20952,0,0,ee7670e91d33e31160e61df658911f1f989f8a5d8151285943b5c8af49a8a CVE-2024-20953,0,0,46cccee01b693cef9c9646cac2e0fd84e85cf6e77caa7c1816c2e535a0c5b0f7,2024-02-20T19:51:05.510000 CVE-2024-20954,0,0,57a73413d0e3acca6ee4a29e076cb030f710aa01f467c3e7bf98fabced0d9135,2024-04-17T12:48:31.863000 CVE-2024-20955,0,0,3ef5989170bb1b485154f91fb8591afd4cb71f457c0fd734cc9a4a4e8a7d2a89,2024-02-09T02:26:25.517000 -CVE-2024-20956,0,1,78d82b52430d3bd5c36b5846b4138f4e211c247ebf893f680bcabf1f8af52ffe,2024-11-27T16:37:04.993000 +CVE-2024-20956,0,0,78d82b52430d3bd5c36b5846b4138f4e211c247ebf893f680bcabf1f8af52ffe,2024-11-27T16:37:04.993000 CVE-2024-20957,0,0,e93e5f63896ca6389639f28c6915c0999c46dc6fe6eef70f268dfc725114f0ba,2024-01-20T18:31:43.287000 -CVE-2024-20958,0,1,efd3fe866dd6ac978ea48339b2dd74375e92e3a0c2e0492d39bdbdca54bbfc34,2024-11-27T16:37:02.780000 +CVE-2024-20958,0,0,efd3fe866dd6ac978ea48339b2dd74375e92e3a0c2e0492d39bdbdca54bbfc34,2024-11-27T16:37:02.780000 CVE-2024-20959,0,0,65f727318b2446b38daf72eb41cf2e9b4f6d535e05783839d548b8b026463599,2024-01-20T18:31:27.417000 CVE-2024-20960,0,0,010febbf2de2eeb15e19a661a3f5025a963aa8a6df342253dcc279cae1da13d8,2024-02-20T19:51:05.510000 CVE-2024-20961,0,0,1cad69d2442213fdaa659cc4c85bbaf05d35d026075b85bdaedf813ff8fbfb75,2024-02-02T17:36:27.917000 @@ -245350,53 +245352,53 @@ CVE-2024-20977,0,0,3be8e35326984bf735a6f48b20180da3c518283b741d291831fba90f42ec9 CVE-2024-20978,0,0,7d695c16c538753b41958698ebecaeec17620ace692b6d6e92b6bcee0dbccbeb,2024-03-01T23:19:21.650000 CVE-2024-20979,0,0,d57b35e6e7dde3fdff99cf29258a92afa9b590a25cc9c2305fb3a5b7f5bc7a9e,2024-01-20T18:30:34.090000 CVE-2024-2098,0,0,796ed6f6c420691b7d2e05f9f2ef2be6fc42adb0713e4dfd37258c395c790683,2024-06-13T18:36:09.010000 -CVE-2024-20980,0,1,abde6ecab0a76c34cdd09b34c97cd8350525628bcbe8debc08de3a0bc115e8fa,2024-11-27T16:37:00.523000 +CVE-2024-20980,0,0,abde6ecab0a76c34cdd09b34c97cd8350525628bcbe8debc08de3a0bc115e8fa,2024-11-27T16:37:00.523000 CVE-2024-20981,0,0,738d5bf858a7d236d8ca36c0f60d69759a2053056726d2d11c77fa47893de0b7,2024-02-02T17:24:34.507000 -CVE-2024-20982,0,1,f87c28901aeea0e5dd67035df643da47399d17872e527cadc5978ee3fcb668f7,2024-11-27T16:36:58.220000 +CVE-2024-20982,0,0,f87c28901aeea0e5dd67035df643da47399d17872e527cadc5978ee3fcb668f7,2024-11-27T16:36:58.220000 CVE-2024-20983,0,0,56700ee75dc4016890aa5a0cc71b96eed25889824b578010696ffc98258279e1,2024-02-02T17:27:04.743000 -CVE-2024-20984,0,1,59ddd7988f4c87f18f76eebdeb0d759036445e926bdcb1515ffe9fa87d03cb03,2024-11-27T16:36:55.957000 +CVE-2024-20984,0,0,59ddd7988f4c87f18f76eebdeb0d759036445e926bdcb1515ffe9fa87d03cb03,2024-11-27T16:36:55.957000 CVE-2024-20985,0,0,d0d044412617729c46a8268c921735bb458fb0fe9ac60eac01f501aeb8cc31ab,2024-02-02T17:27:12.127000 -CVE-2024-20986,0,1,6087dcb3b90fcb6ff9e682c89a6638ce3a29264af0095732d921291f4a22d8c3,2024-11-27T16:36:53.537000 +CVE-2024-20986,0,0,6087dcb3b90fcb6ff9e682c89a6638ce3a29264af0095732d921291f4a22d8c3,2024-11-27T16:36:53.537000 CVE-2024-20987,0,0,5674babb479962fb00a1daf77527ad0fcadf7deb1dc2f2e21cb99ae36a705876,2024-01-20T18:30:16.877000 -CVE-2024-20989,0,1,713513baa3464a81e99a0bb8e30a7b8198551d5abd7c99dd135f5dff2572c1b8,2024-11-27T16:36:51.003000 -CVE-2024-20990,0,1,dcd7d39a0ffd7652482a915949bb7e9b369d2287680215279ee5a4bac8701548,2024-11-27T16:36:48.747000 +CVE-2024-20989,0,0,713513baa3464a81e99a0bb8e30a7b8198551d5abd7c99dd135f5dff2572c1b8,2024-11-27T16:36:51.003000 +CVE-2024-20990,0,0,dcd7d39a0ffd7652482a915949bb7e9b369d2287680215279ee5a4bac8701548,2024-11-27T16:36:48.747000 CVE-2024-20991,0,0,94f0f80e95be2725620dad0c6e5443bdd60acc699a66c91ac7c7279a95dd6e81,2024-08-21T15:35:02.493000 -CVE-2024-20992,0,1,ba9800046b8543eaf32ebe0bf6ac96b488e69f6b7913a7d831a97ae919200443,2024-11-27T16:36:46.510000 -CVE-2024-20993,0,1,73f1669c85e855fd76979fe84f382e192647648d4f8a2bb0d0085df2877b0bcc,2024-11-27T16:36:44.187000 -CVE-2024-20994,0,1,5f7ea9f92d561392870426b5d74a9dfb47bcd28f9445b3d46750647497195eed,2024-11-27T16:36:42.223000 -CVE-2024-20995,0,1,01229a4133ced8daa32eab0323077d3b0640a9df62354c85893871947ef19493,2024-11-27T16:37:10.153000 +CVE-2024-20992,0,0,ba9800046b8543eaf32ebe0bf6ac96b488e69f6b7913a7d831a97ae919200443,2024-11-27T16:36:46.510000 +CVE-2024-20993,0,0,73f1669c85e855fd76979fe84f382e192647648d4f8a2bb0d0085df2877b0bcc,2024-11-27T16:36:44.187000 +CVE-2024-20994,0,0,5f7ea9f92d561392870426b5d74a9dfb47bcd28f9445b3d46750647497195eed,2024-11-27T16:36:42.223000 +CVE-2024-20995,0,0,01229a4133ced8daa32eab0323077d3b0640a9df62354c85893871947ef19493,2024-11-27T16:37:10.153000 CVE-2024-20996,0,0,fcd2292738608c647a4c519832797e84b76f4989a7b5a3e0a96bd0b4bdb3583b,2024-10-17T17:09:42.857000 -CVE-2024-20997,0,1,6fcb219b09789009a115af413ffc8003378371105f5ae76f21264248e97d7ed9,2024-11-27T16:36:39.907000 +CVE-2024-20997,0,0,6fcb219b09789009a115af413ffc8003378371105f5ae76f21264248e97d7ed9,2024-11-27T16:36:39.907000 CVE-2024-20998,0,0,45f0642541da0d531c6249ccae4fbcc371dd659326bb9c94a1fffbd680edd27d,2024-07-03T01:46:21.563000 -CVE-2024-20999,0,1,8bcb3141c521c3778b23e1f32939058ac6a444098cc39214296b0751762d0919,2024-11-27T16:36:14.473000 -CVE-2024-21000,0,1,5046a94a4249afec3f785dd51126c5c8b28718404eba20f1156f4ea76f53b597,2024-11-27T16:36:11.717000 -CVE-2024-21001,0,1,416215f17e5ee7b6fd02766a3fe7252d7bc684b3302f3dd4a683e3f6400abefa,2024-11-27T16:36:08.477000 +CVE-2024-20999,0,0,8bcb3141c521c3778b23e1f32939058ac6a444098cc39214296b0751762d0919,2024-11-27T16:36:14.473000 +CVE-2024-21000,0,0,5046a94a4249afec3f785dd51126c5c8b28718404eba20f1156f4ea76f53b597,2024-11-27T16:36:11.717000 +CVE-2024-21001,0,0,416215f17e5ee7b6fd02766a3fe7252d7bc684b3302f3dd4a683e3f6400abefa,2024-11-27T16:36:08.477000 CVE-2024-21002,0,0,7f5c86fdcff82f93225a75a7e73262c6da92b927148218de7deb268aa0c73332,2024-10-31T16:35:04.067000 CVE-2024-21003,0,0,90a06bec930da30c9a00d7e245d95aa433119de047332777b49810dcb3c38582,2024-04-26T09:15:09.823000 CVE-2024-21004,0,0,74d75259359885feb58e67b784c7f0a497e76221cd93421bf881ed958c2f234c,2024-10-31T15:35:24.047000 CVE-2024-21005,0,0,3a0033bb21374d9be43479eee698b2830f41d8d2a9d0eb123f27394e5de66035,2024-04-26T09:15:10.030000 -CVE-2024-21006,0,1,b66db085bb99aa21625f1949517478b22e3fbdd786db1c25a0e1b28fb3539492,2024-11-27T16:36:05.623000 +CVE-2024-21006,0,0,b66db085bb99aa21625f1949517478b22e3fbdd786db1c25a0e1b28fb3539492,2024-11-27T16:36:05.623000 CVE-2024-21007,0,0,318b973189a970b7ce55f9b439b79912feb01731965e9cf4d9ebb34a06f5b815,2024-08-21T15:35:03.230000 -CVE-2024-21008,0,1,79c8ede7039b9ab861b81e9c13133e11dccfa6b5370f6dc01cdafe6899c0cddb,2024-11-27T16:35:56.737000 -CVE-2024-21009,0,1,db6fbd7d8accf1ab224f2cb103b25e5731e70907122a90a7ad837151b5ba25a4,2024-11-27T16:35:46.023000 +CVE-2024-21008,0,0,79c8ede7039b9ab861b81e9c13133e11dccfa6b5370f6dc01cdafe6899c0cddb,2024-11-27T16:35:56.737000 +CVE-2024-21009,0,0,db6fbd7d8accf1ab224f2cb103b25e5731e70907122a90a7ad837151b5ba25a4,2024-11-27T16:35:46.023000 CVE-2024-2101,0,0,f64308a9cf2bd395190830ff176a54d77164cf0faaa20d92ded300e0efbb1c30,2024-07-03T01:53:00.530000 -CVE-2024-21010,0,1,8da34c621e00a1a6bc6945f4463b7f169614eb79b8866a30350c977ef7474dc1,2024-11-27T16:35:37.613000 +CVE-2024-21010,0,0,8da34c621e00a1a6bc6945f4463b7f169614eb79b8866a30350c977ef7474dc1,2024-11-27T16:35:37.613000 CVE-2024-21011,0,0,3db0dfc4f6d9c0cb1b0594a3fea44420c1ced4ee3ac62b2d2aac28313dd8e801,2024-04-26T09:15:10.240000 CVE-2024-21012,0,0,8bb45639916260fb5e290a2144a7289c54983d68a6c83fb494eebd2fbc3b4755,2024-11-13T18:35:25.333000 -CVE-2024-21013,0,1,f4d7d3d63419f5b65aab5308aa286df618fde3314df1470f82e6a12508e6afd5,2024-11-27T16:35:24.993000 -CVE-2024-21014,0,1,fd5fd906db48dbc401dceb2950611dc7ac548d204c7b6b0610339c911785edb1,2024-11-27T16:35:17.047000 -CVE-2024-21015,0,1,f2cd4f3aca6f87b172581e8a6cb037de57f64674ebf070f97b0bb58b0c8cb942,2024-11-27T16:35:00.387000 -CVE-2024-21016,0,1,7b06a7a101f5499528a019b1bce8248ab4b671498b173ccf1a81511b3be4f699,2024-11-27T16:31:47.750000 -CVE-2024-21017,0,1,8d6faacd84399cea88d3d3cedcc5018fe820d93d841edc59c022cc994cbb2e6e,2024-11-27T16:31:43.653000 -CVE-2024-21018,0,1,2e1340b3db5c35ae5b2a9e8c5e499329e51751a7e10154f4c68c14c57ad498d8,2024-11-27T16:31:31.260000 -CVE-2024-21019,0,1,d73ddbd97890db99ed4a0927678658e890f5a9ffc1913db8deba2f5f417025f4,2024-11-27T16:31:28.057000 +CVE-2024-21013,0,0,f4d7d3d63419f5b65aab5308aa286df618fde3314df1470f82e6a12508e6afd5,2024-11-27T16:35:24.993000 +CVE-2024-21014,0,0,fd5fd906db48dbc401dceb2950611dc7ac548d204c7b6b0610339c911785edb1,2024-11-27T16:35:17.047000 +CVE-2024-21015,0,0,f2cd4f3aca6f87b172581e8a6cb037de57f64674ebf070f97b0bb58b0c8cb942,2024-11-27T16:35:00.387000 +CVE-2024-21016,0,0,7b06a7a101f5499528a019b1bce8248ab4b671498b173ccf1a81511b3be4f699,2024-11-27T16:31:47.750000 +CVE-2024-21017,0,0,8d6faacd84399cea88d3d3cedcc5018fe820d93d841edc59c022cc994cbb2e6e,2024-11-27T16:31:43.653000 +CVE-2024-21018,0,0,2e1340b3db5c35ae5b2a9e8c5e499329e51751a7e10154f4c68c14c57ad498d8,2024-11-27T16:31:31.260000 +CVE-2024-21019,0,0,d73ddbd97890db99ed4a0927678658e890f5a9ffc1913db8deba2f5f417025f4,2024-11-27T16:31:28.057000 CVE-2024-2102,0,0,063af9520b1c53909e19a4c543dd4e89e92c8386c428fad7438fe729761d527f,2024-08-01T13:49:41.380000 -CVE-2024-21020,0,1,50d0bb623e906d57fffc4a003271c5d8f0fddd70537c5dfcb50f0a25abb536c4,2024-11-27T16:31:24.850000 +CVE-2024-21020,0,0,50d0bb623e906d57fffc4a003271c5d8f0fddd70537c5dfcb50f0a25abb536c4,2024-11-27T16:31:24.850000 CVE-2024-21021,0,0,64827289a059e7d96255e1e78c913ce22eb2f8c3fa061b78e9bca939974553d5,2024-11-12T20:35:07.200000 -CVE-2024-21022,0,1,64a8139f2b1ea0b3fb6aa0981f9b2d6c01e88bcc85d0046c50f193b99ee667ae,2024-11-27T16:31:22.270000 +CVE-2024-21022,0,0,64a8139f2b1ea0b3fb6aa0981f9b2d6c01e88bcc85d0046c50f193b99ee667ae,2024-11-27T16:31:22.270000 CVE-2024-21023,0,0,927d06c9c846b66c85686832a7d8ba13dd57e57adc9551190b6fa4a25e207424,2024-10-31T15:35:24.947000 -CVE-2024-21024,0,1,8d2a827a192a1b383481a84dfca9c6be9d11ea475bb8e64e40bd9d2b1883bc26,2024-11-27T16:31:18.080000 -CVE-2024-21025,0,1,1547ab83b9d1273d90e9f7e7ea464b636c7853cb15c5a10ed0cb04cf6a3f20f7,2024-11-27T16:31:12.720000 +CVE-2024-21024,0,0,8d2a827a192a1b383481a84dfca9c6be9d11ea475bb8e64e40bd9d2b1883bc26,2024-11-27T16:31:18.080000 +CVE-2024-21025,0,0,1547ab83b9d1273d90e9f7e7ea464b636c7853cb15c5a10ed0cb04cf6a3f20f7,2024-11-27T16:31:12.720000 CVE-2024-21026,0,0,bb4bd2aeeb520f557a235cf2c384bcd9afa22628dbaa611ed6aada649ea8a800,2024-04-19T17:34:46.467000 CVE-2024-21027,0,0,274a137cb4ff0ddef3882d5e5a8152cdc087240750de0d4f3f112c1f3ffe5baa,2024-04-19T17:34:33.557000 CVE-2024-21028,0,0,e746c963a4f2579f4ff27a79a26bb542b668ecc162136be7b39dea5679186530,2024-04-19T17:34:24.897000 @@ -245404,20 +245406,20 @@ CVE-2024-21029,0,0,beed54640564c6e877b911608d3aaede78a6c68fba401ae9c1d7333ce2ffd CVE-2024-2103,0,0,56728262bbb9eac431f64527baa684f066aa452f31fabe1cfef087df0e0cc830,2024-04-04T16:33:06.610000 CVE-2024-21030,0,0,8784ba0a3755df5b21c90fc1a3d06189077ff55e4dd10202c7d6a2ef21eadb3a,2024-07-03T01:46:23.853000 CVE-2024-21031,0,0,47da12e0a06b82feddde80c8f657eef9ceaa2d7cc969db6255ee7d3fcecb3433,2024-04-19T17:31:50.307000 -CVE-2024-21032,0,1,224558dfd07c20308a2bd3552df334b44095a07933d7e9c8bab2ef75b9656e34,2024-11-27T16:31:02.343000 -CVE-2024-21033,0,1,7bc19cb64c3ae24134dd79d7bbfe9e0ed0d38b98c77be70dc6f288f7e389d27e,2024-11-27T16:30:57.530000 -CVE-2024-21034,0,1,b808ea180848747041b7aaaca886e2cee0af839a6638ebb2b8a0217712acb5a2,2024-11-27T16:30:46.090000 -CVE-2024-21035,0,1,cfe330df5a88be696e5b022b2535ceaaa50fa26e99e7cc5299822d6e604c17b0,2024-11-27T16:30:11.690000 +CVE-2024-21032,0,0,224558dfd07c20308a2bd3552df334b44095a07933d7e9c8bab2ef75b9656e34,2024-11-27T16:31:02.343000 +CVE-2024-21033,0,0,7bc19cb64c3ae24134dd79d7bbfe9e0ed0d38b98c77be70dc6f288f7e389d27e,2024-11-27T16:30:57.530000 +CVE-2024-21034,0,0,b808ea180848747041b7aaaca886e2cee0af839a6638ebb2b8a0217712acb5a2,2024-11-27T16:30:46.090000 +CVE-2024-21035,0,0,cfe330df5a88be696e5b022b2535ceaaa50fa26e99e7cc5299822d6e604c17b0,2024-11-27T16:30:11.690000 CVE-2024-21036,0,0,03772262febbe1802cb4e5be8d6e22eef6f08655ecf5ce6b4ff42f4682cb919e,2024-11-07T17:35:12.117000 -CVE-2024-21037,0,1,275560440d01a5b66d9569c94ab21c078479a2c2079e4d03585c66b053e0c227,2024-11-27T16:29:55.693000 -CVE-2024-21038,0,1,0c4ce653fce6696c66d05a2ec71f4cc6c038a3fb76934f714b2f35fe6ba08e3c,2024-11-27T16:29:46.520000 -CVE-2024-21039,0,1,e342c1121fe5cdcd8db5f3285db4e19fc9896de8dc0cd2c0a7bba13348c2b710,2024-11-27T16:29:33.007000 +CVE-2024-21037,0,0,275560440d01a5b66d9569c94ab21c078479a2c2079e4d03585c66b053e0c227,2024-11-27T16:29:55.693000 +CVE-2024-21038,0,0,0c4ce653fce6696c66d05a2ec71f4cc6c038a3fb76934f714b2f35fe6ba08e3c,2024-11-27T16:29:46.520000 +CVE-2024-21039,0,0,e342c1121fe5cdcd8db5f3285db4e19fc9896de8dc0cd2c0a7bba13348c2b710,2024-11-27T16:29:33.007000 CVE-2024-21040,0,0,9207f1539b8715e9de73bf8605d282f9258ecbde4b6b5af37d49fb9b9b73b544,2024-07-03T01:46:25.020000 CVE-2024-21041,0,0,53175e4f9f6fe9a06cdb65415f15e9860a5cc1810804215df4199c035c4956b1,2024-10-31T16:35:04.810000 -CVE-2024-21042,0,1,2413adf0e19ccd06809883f767218c53f86aa92469ced2e7e97fa65ebb6fc34b,2024-11-27T16:29:25.637000 +CVE-2024-21042,0,0,2413adf0e19ccd06809883f767218c53f86aa92469ced2e7e97fa65ebb6fc34b,2024-11-27T16:29:25.637000 CVE-2024-21043,0,0,34b86fb6bc70d1cb3f2e8b52f242178af3e3c87a06302294640b6969cd919425,2024-11-06T19:35:09.460000 -CVE-2024-21044,0,1,d6a124edde02ccad4eb1662b040fc85bdd4c8af9652fa58273abc93194a1774e,2024-11-27T16:29:16.483000 -CVE-2024-21045,0,1,918bd035aa1d6211c105c0b035415fa2c831f7eef3679326aa8e323c6a0fd5ac,2024-11-27T16:29:07.300000 +CVE-2024-21044,0,0,d6a124edde02ccad4eb1662b040fc85bdd4c8af9652fa58273abc93194a1774e,2024-11-27T16:29:16.483000 +CVE-2024-21045,0,0,918bd035aa1d6211c105c0b035415fa2c831f7eef3679326aa8e323c6a0fd5ac,2024-11-27T16:29:07.300000 CVE-2024-21046,0,0,6cd7417a9fe1dad42e5e390bd73f6c59f847ce1b22a979e6a850a74e46589580,2024-11-05T16:35:11.803000 CVE-2024-21047,0,0,2bc5d014697923ab8f9837dde11c202b28c9635338e1429d1d2707b2d34f9717,2024-04-26T09:15:10.500000 CVE-2024-21048,0,0,0740c7f75430ed630e47ca8538d7654b46da3ebd0ee4b5951500b7c74c4ef781,2024-04-17T12:48:31.863000 @@ -246035,6 +246037,7 @@ CVE-2024-2169,0,0,25fcbf8b9d7008ea9954a41615969f4d36543f4a604eb878bcc8b4c5c18a9f CVE-2024-21690,0,0,52f2f5bb1e3e94fbb3d7fb8fab564e88563477b86bcce8501f8853e0eaa6dfd8,2024-11-06T19:35:13.787000 CVE-2024-21697,0,0,407288a03ff597a3a4bb57b1cda7709829bc688e494abd24fba6a6fe97ece8ff,2024-11-19T21:56:45.533000 CVE-2024-2170,0,0,758d6332b5fccd657d38a7eddcc769e16fb72e0c1b6514443e29b8614302434a,2024-03-26T12:55:05.010000 +CVE-2024-21703,1,1,08d952643f27d625e1a34daf2a14cf006a2e6417e07616e354cd3cfc64f9f245,2024-11-27T18:15:08.720000 CVE-2024-2171,0,0,17c18c0537b711b05cfdac779ba2d168e9830dc55b69168346eed3896c1fbc48,2024-10-11T14:15:32.983000 CVE-2024-2172,0,0,edf7001396454eaaf4557a9c3fcef53434431cfdf8112832b9dc273636d1d743,2024-03-13T18:15:58.530000 CVE-2024-21722,0,0,a86fb4d95ec57288d080d9ff105ac4d713cb82e6d029a4568b198925539efc69,2024-10-30T18:35:02.897000 @@ -246222,7 +246225,7 @@ CVE-2024-21918,0,0,742b173c7dcca847586b3391775dbdbe8cf845cb3792806068b182f51bb9a CVE-2024-21919,0,0,17b9ef89ab049d67d3ba5d623527fb2d2cb4b013bdd1ced697ea307068eedea1,2024-03-26T17:09:53.043000 CVE-2024-21920,0,0,efae5f91f3c13ea098899efbd9298ae4cffb0d59d9536b3843182476a9397fd1,2024-03-26T17:09:53.043000 CVE-2024-2193,0,0,122bbc4272c132b83a700a76d93edb5ac61ae458bc4cc3c2f2865bcd2babf1e6,2024-10-29T16:35:13.023000 -CVE-2024-21937,0,1,90d04fbe5cbba2725914398811e0d2326e8d3f32641d17075b562e1968ddb717,2024-11-27T16:20:37.073000 +CVE-2024-21937,0,0,90d04fbe5cbba2725914398811e0d2326e8d3f32641d17075b562e1968ddb717,2024-11-27T16:20:37.073000 CVE-2024-21938,0,0,6c315d3024c09d7a50812151c8cd7326a5235cfaa6042ecac74aa5983aa83d44,2024-11-13T17:01:58.603000 CVE-2024-21939,0,0,a5aa41911721c7484fc24860471dbac89d11ee960d3fa252f5bfcdc696021b47,2024-11-13T17:01:58.603000 CVE-2024-2194,0,0,0e5ae4464806cff80b610073b7b679519a42660f4236dd411b709bf3ba1b49c9,2024-03-13T18:15:58.530000 @@ -250174,10 +250177,10 @@ CVE-2024-27307,0,0,f03537f290162378c6385f978df4ca2a996f710091ddafa0723c8d56d920a CVE-2024-27308,0,0,bb9781c241ee836cf4e778ece7a5b280cfcdc753da6cdee2e11b89f24c113b5e,2024-03-06T21:42:48.053000 CVE-2024-27309,0,0,18416b733d6ac4edeb2af296593281a1b6deae1e8a8956ba324c7cabf7f2e6ba,2024-07-09T16:22:21.487000 CVE-2024-2731,0,0,e2947075d94f67fb0f516acc3c39fdd257b6a53a447028317b4bd1e85304e9ee,2024-04-10T19:49:51.183000 -CVE-2024-27310,0,1,0ee79b9bdb29212875d7f1e2706f2d2e430a7262b7fdafe9e2d4a8e95bde10da,2024-11-27T16:25:10.307000 +CVE-2024-27310,0,0,0ee79b9bdb29212875d7f1e2706f2d2e430a7262b7fdafe9e2d4a8e95bde10da,2024-11-27T16:25:10.307000 CVE-2024-27311,0,0,3441ff0e665052a7fb86a3589fae526973b499df9f488dcbbb9db7b9aaef9973,2024-07-18T14:09:40.923000 CVE-2024-27312,0,0,44ad9df6373c37d335fa110f1ccf73e3064c9d69081ddac9cedf52edbde67366,2024-11-25T15:14:53.217000 -CVE-2024-27313,0,1,35d4fc5dcf7fd82874d8066658bb141d6133e1d7a3505f1ab33a062d023280f6,2024-11-27T16:24:25.567000 +CVE-2024-27313,0,0,35d4fc5dcf7fd82874d8066658bb141d6133e1d7a3505f1ab33a062d023280f6,2024-11-27T16:24:25.567000 CVE-2024-27314,0,0,507bfabf98c061d8de81cbc1d95b3b58842135d25b3a81edb36b7651b27ac69f,2024-07-03T01:50:30.720000 CVE-2024-27315,0,0,db9af09723fb011b8182b6b5bab4f2fc859959fe0ca51aeffec2764eb351e8f1,2024-10-03T13:15:14.710000 CVE-2024-27316,0,0,102105139fcfc876580c7206fba57ae17631b403098c79f616e87bd492a5d28f,2024-08-01T13:48:22.100000 @@ -251602,7 +251605,7 @@ CVE-2024-29278,0,0,1c7d83867b262b09f27588e31bf9841e3af6bdfc0d72746f40dee1d45734a CVE-2024-2928,0,0,1d00a619d6223f6fddadfce8ecd76fa5d6f829b8d361b3e4066e910bc6258ce4,2024-10-11T15:28:03.530000 CVE-2024-2929,0,0,513249311f09defaddca00249c92a4d2f3037014552979e20d0e342694062636,2024-03-26T17:09:53.043000 CVE-2024-29291,0,0,63e881e67f8d85b826801f0c870d1358f1a422a57593ef79bb6bae9024abdbc2,2024-08-02T01:15:58.367000 -CVE-2024-29292,0,0,0fdfa2ea68ccb090b32a91a7c432b205558469835d8c95bb4767b1d71d198096,2024-11-20T21:15:07.040000 +CVE-2024-29292,0,1,00ea6bc4c302c327c3044fa68f8f423ad9fef8aef7e6a4e9a713883b77891c38,2024-11-27T17:15:10.383000 CVE-2024-29296,0,0,196ce9fc64e2de40c4aad14cdb78662ded04058e63416a22f9fb231921284e33,2024-08-01T13:49:29.143000 CVE-2024-2930,0,0,2e48243b295a8e93d53a35219b2be0089b750f595ca7624319aaf969e99aaaca,2024-05-17T02:38:37.687000 CVE-2024-29301,0,0,fd6e891fb9a2f358e58da35cd58c20873301588e91f1b0a5190d88e70e1e8b21,2024-08-05T15:35:14.157000 @@ -252763,6 +252766,7 @@ CVE-2024-30889,0,0,4055363c9710582a93e9c4afde24f53fb76bf450d1c6c8e60ffc2b185aa7e CVE-2024-3089,0,0,f50243477e19a0c473b8d22e5ff97c5e0852740c2af46b357e2e30b0b527a41c,2024-06-10T19:15:54.210000 CVE-2024-30890,0,0,0f772534d2f25b8992cdb2b7f1614a9b1113da3447c153b6e6f711939289b199,2024-11-04T15:35:31.227000 CVE-2024-30891,0,0,396e17014fd3175e72a9c0a6ece22b5363c9ba81b8e8ea154f79fa53fb440cca,2024-08-19T20:35:15.447000 +CVE-2024-30896,1,1,1c2a8f6103b169f4b2e6374c12c4e276b072d21b33e30de613363d5fad056629,2024-11-27T17:15:10.650000 CVE-2024-3090,0,0,ca58ae48ece7b5420c70058bc4ef34d34b72713bd9fb9580ab51af080cd6b613,2024-05-17T02:39:43.047000 CVE-2024-3091,0,0,ac47144b8dcc6e68da1982025c8274e4d7559a0b603bbff8eb392c09297cdc97,2024-05-17T02:39:43.130000 CVE-2024-30915,0,0,4a451061f2277273de3f1e30d4e5402fc40c4a77bd4f2be73b5ddc38a083afc5,2024-07-03T01:54:16.067000 @@ -253533,6 +253537,7 @@ CVE-2024-31972,0,0,f9241b9f06175c965ad284b5c2136f1f7f8e377bc5d6b68f231b17656172b CVE-2024-31973,0,0,c3480f733abb332799fc1f07ef143103e9de0ed931d381c037c7e12d5a9eb78d,2024-11-01T12:57:03.417000 CVE-2024-31974,0,0,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000 CVE-2024-31975,0,0,eb324a6bedd4b93ad2ac0707b00b07dfad728d7f39959adabc810317189eae1a,2024-11-04T17:15:07.030000 +CVE-2024-31976,1,1,86650fc9453e252df3074d41108b57b4ccd00ba612e3f0e59342d64ff7c647e6,2024-11-27T17:15:10.913000 CVE-2024-31977,0,0,8eb0d10eae7cd02452acc4180866c19a5b8993f8851d4be772620f1837a0acf8,2024-09-03T21:15:15.803000 CVE-2024-31978,0,0,d7e67cdb6c9abfc8a281402447b24c354a9ac8bd28f05dea2bb91e1cf546ce10,2024-04-09T12:48:04.090000 CVE-2024-31979,0,0,f097e05504ac9e9ee25949ce03f6b7581ce42735e92ea4d2772041b31a214c2d,2024-08-01T13:51:19.213000 @@ -254605,7 +254610,7 @@ CVE-2024-33435,0,0,7db2665c6496dae0749e042f8d814063672abd8fcceac696d209fd93a501e CVE-2024-33436,0,0,4b7aad63b1a9d18447e5bf42251db2f590710ce8a67d312a75dbe09e1f3c4107,2024-05-01T13:02:20.750000 CVE-2024-33437,0,0,98a2b6e10245b112bb331b45bcb3f30a0dabc9110f63c643d94fcc31a61289bb,2024-08-01T13:51:56.957000 CVE-2024-33438,0,0,5149b18a46d53268b7670d8b6f23e45b58f0f7e28bd1fbf2d1e49eff1651e3a5,2024-08-01T13:51:57.143000 -CVE-2024-33439,0,0,cff768f052081c25bf2badebc993fe13750f42919c9e40af177c06d148312b2d,2024-11-20T19:15:06.010000 +CVE-2024-33439,0,1,865bf8d936802ea495b622b9117733561ad82697688560b335ffdd7376c09f21,2024-11-27T17:15:11.093000 CVE-2024-3344,0,0,70bfed73bbd8c0224afca425b004f1e6ab3832350ac16bb40ba0f3295e2c6f92,2024-04-11T12:47:44.137000 CVE-2024-33442,0,0,3bf0c7079aa4cdea0cf4fc3dc62abf7d3d6d92d11b677d6553e5342d569d6775,2024-07-03T01:58:14.593000 CVE-2024-33443,0,0,35242e2b0082b15f0bb5de03b6dc07c30701907ec01624317337d782f850f813,2024-07-03T01:58:15.370000 @@ -256607,7 +256612,7 @@ CVE-2024-36033,0,0,8911dfc666d23e1c126e3abba0a30a2fed5f5b6caff101c24ce4eb4be9e3d CVE-2024-36034,0,0,4c959fcfa233ae27a9c3f47b39a3f7ddc9a28a9c57a26789bd7acdd84b3e47d4,2024-08-16T20:21:06.120000 CVE-2024-36035,0,0,3fdb254cbf2b10e7d511633eed06bbb7c03953c8f2eb713a72f26b7556cced7e,2024-08-16T20:23:29.943000 CVE-2024-36036,0,0,f9fb5156304c57a40757d765df5364ac35b8d4db65c442212813c00360bf9d28,2024-10-31T16:35:15.723000 -CVE-2024-36037,0,1,bbb4c699fc36319f520212a04780263c6b55d12c3ae95dd593b38199e7090fa1,2024-11-27T16:24:06.917000 +CVE-2024-36037,0,0,bbb4c699fc36319f520212a04780263c6b55d12c3ae95dd593b38199e7090fa1,2024-11-27T16:24:06.917000 CVE-2024-36038,0,0,ed3921618390576c9219c98f6a3f7baf8a0d13ec50c49da12a34a4e745352466,2024-06-24T12:57:36.513000 CVE-2024-36039,0,0,d5f6bc43648106f8c0710f8301f59ed0f37eac1af0c9c7b161995113609db70a,2024-06-24T07:15:15.230000 CVE-2024-3604,0,0,2f82d9621c7da51111c7599a59e672098e964c892eb2588f225c0e98c5e45cbd,2024-08-01T17:39:33.907000 @@ -257854,7 +257859,7 @@ CVE-2024-3777,0,0,e0440f2946e797118e4ada7698a04ee3805fb04d32040b7b7160eb68c53547 CVE-2024-37770,0,0,4e93402ad3ed64140e35d7a96007b07c29c5c8b6e92be0f25f51076d1a6ceeef,2024-07-11T15:05:53.090000 CVE-2024-37779,0,0,6e59c8529157382fe2940395deacc91d059ba345fa934b0466ef9ccea286d30e,2024-09-27T14:35:03.517000 CVE-2024-3778,0,0,2b5fc9c77ae2f993ef971da35cf3870af6c405ab91c786afef1cf6cf11c368d8,2024-04-15T13:15:31.997000 -CVE-2024-37782,0,0,d461addc826c790b5ea01cf6ea01ba779736eb40ca4e76b9dfe7f83c82bb3505,2024-11-22T18:15:17.230000 +CVE-2024-37782,0,1,e9f210e7f42c046d75d0b9f25adae39b4e1c61a1f888965bb1e0dfce89ee0e10,2024-11-27T17:15:11.320000 CVE-2024-37783,0,0,690ccf7acd78cda1161cbf595242a736f04b460c1e840c1328388e07392e0b09,2024-11-22T19:15:06.653000 CVE-2024-3779,0,0,1a47972c633583c7bae072fbb56beacb2d6111c4ffff8b051890256727892c2f,2024-08-21T17:38:16.057000 CVE-2024-37790,0,0,f03d38fcd39f9fc913c999134089e43d5d97a0d5c9124acb1959f0950b818b81,2024-06-21T16:15:12.440000 @@ -257868,6 +257873,7 @@ CVE-2024-37800,0,0,3aebd2faaeb84484cc68215ff2c27d755488c237f64ba208bea923e908662 CVE-2024-37802,0,0,d144fe0e12cc92285cf5a45a291aa1263aaf8f5127240eb000b3aa69fb216783,2024-07-19T14:52:41.287000 CVE-2024-37803,0,0,e775e15ae57e6d87a1c3eae9b2633b6fb5e2150047d8db37ba8a0df6bf917fcb,2024-07-15T16:46:21.273000 CVE-2024-3781,0,0,0166ef6fe2c7d229a771ed8a3459c0974e3bc1428bfcd1abf209c8c2e778a8e5,2024-04-15T19:12:25.887000 +CVE-2024-37816,1,1,5f0590f8d9670dace00b0c5f7e18119e01619fc887f047676757312ab9c71d8d,2024-11-27T17:15:11.570000 CVE-2024-37818,0,0,da6a1f43a8aacd614a81a2f93f80ef733846858e0f1e4aaa3583b19a43f2a1df,2024-10-04T19:15:16.273000 CVE-2024-3782,0,0,b45b8920e0157c6199f5ffbbbc446d8fb5e1a40daf0ca4b703a9dc70f6839c9b,2024-04-15T19:12:25.887000 CVE-2024-37820,0,0,fa0bbe561377b7b439a8d7f261288bdc816d9d647e91a5782129fd4223c1afcd,2024-07-15T22:15:02.850000 @@ -259384,7 +259390,7 @@ CVE-2024-39701,0,0,879aa58f50a7d5b18bfb505718bd80f7c1e443b3ef3725ff1457799d3d8b8 CVE-2024-39702,0,0,4321dd362ed1e1bbd0d5793b212806c9239d130a489ced0fce340c598b116527,2024-11-26T18:15:19.193000 CVE-2024-39704,0,0,1d59c065d69d465eb86bf6114b5299aaf44c728f69d6748df6b6bd65077d4590,2024-07-03T14:32:56.510000 CVE-2024-39705,0,0,aa75ecfe331ee5d16e104493e16afd26f62024e9296a197b99cac0edaec74e23,2024-09-15T20:35:02.817000 -CVE-2024-39707,0,0,a705426f80da8c6a5e48f3d7c38b841a2fbb1f6e4435784c498bc1aedae1b179,2024-11-15T13:58:08.913000 +CVE-2024-39707,0,1,b27b038ddc6cdbabee843db40a21ee56e96ad76d049f977d89dc316ee0e970a2,2024-11-27T18:15:09.190000 CVE-2024-39708,0,0,5ba6724a88a25c721702dbcbb09c32f9771f7eb0a866958cc03dc7237b54b807,2024-10-31T14:35:16.610000 CVE-2024-39709,0,0,7412cab9f5821072dc4804eb5785dcfaaaebeae4cb15f2e4d1fcbff88c86a4c1,2024-11-23T21:15:14.647000 CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000 @@ -262680,7 +262686,7 @@ CVE-2024-44744,0,0,83942cbf0bc52b807dc374447d58331fdab7ca8540cec1aa4efb11011d74c CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000 CVE-2024-44756,0,0,1681a92faf0c64d1815b4eb0c3be7b2fb90b774755ff6087ed8af6c8466588d9,2024-11-19T21:57:56.293000 CVE-2024-44757,0,0,afa0b64a73ad54cd2de86e32a9739915e3b6a820b2485a49a35c06cde9462d98,2024-11-19T21:57:56.293000 -CVE-2024-44758,0,0,4eb170325393d50fb6b1ac0e145b87ee1b40fc3092e830f797f0944442dc9070,2024-11-18T17:11:56.587000 +CVE-2024-44758,0,1,0f87f6fd64cd3ee32a39610ab34845e08d64c79e468acaf8dd1c0a562c908710,2024-11-27T18:15:13.007000 CVE-2024-44759,0,0,74017e4a120ba116b0925bdf36ae176aa3414e2488b714ba0e8a87153b7d0ab6,2024-11-18T17:11:56.587000 CVE-2024-44760,0,0,c31c484463dbcf8debf14f8cb14c4edde2aeacb7ab3b47695b1fc32577e35939,2024-11-15T20:15:20.270000 CVE-2024-44761,0,0,7f624c83820070ebb06f16b5a059f7fe8de7d537067fdcab263416bb3a81ba98,2024-11-18T18:15:06.160000 @@ -262693,7 +262699,7 @@ CVE-2024-44777,0,0,6a3359ab703fdb561391b6cc1409dea8918b62f00651402e3928cb656c93c CVE-2024-44778,0,0,f65f6032191fc3b59c27a2ff44b0f804e08b380039ac35a42aadeb42e1c6d1d1,2024-09-03T18:34:36.987000 CVE-2024-44779,0,0,8defc64818470b86a1ed4aeff7b1d178fe09f0b4135b6d31847cdbae6f118693,2024-09-03T18:33:51.297000 CVE-2024-4478,0,0,dc98d997f68b2645bb873c7bfe328abb5688a66731db128671fb26c7a0667c8b,2024-05-16T13:03:05.353000 -CVE-2024-44786,0,0,70a4aaf90a125c1220210d1796014250f26869aff96d84958413523d6b27534e,2024-11-22T17:15:08.380000 +CVE-2024-44786,0,1,2132a56021bb3deb06dc29a9b690059b9000abfdaaee4a4a267842e4b43f4e57,2024-11-27T17:15:11.767000 CVE-2024-4479,0,0,19a5d52fe32f562c79c648f88a021706b773334e3193aa8af739d9d0094fe357,2024-07-26T13:35:32.397000 CVE-2024-44793,0,0,475809f13ca115bedace2b70621dd1b06c8befeab10468b4f5b0fa1c27241f87,2024-09-05T18:28:42.687000 CVE-2024-44794,0,0,b452ddd5effb0ee34a112c584a56cc4850657b4ae996abe5b559863a6d239fc4,2024-09-05T18:28:09.247000 @@ -263298,7 +263304,7 @@ CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec42 CVE-2024-45682,0,0,8584442aa3e66ef486ff4d0e65e36dc65b16a5528e312d936a157a665ef44302,2024-09-27T18:54:51.820000 CVE-2024-45689,0,0,6e124b6ad87a6e953df96f9e4b72e7f165b5e26f7ae6e42a154710793d167512,2024-11-20T20:35:10.157000 CVE-2024-4569,0,0,2e4b27b05be8561bd3f260b3ccf0eed0d11ea74483878f5df5227737faa1c038,2024-06-28T13:10:05.153000 -CVE-2024-45690,0,1,5723764df58775bb65cffc56ee9068e121c35610c7033bd0cf1fbf999d9fcfa1,2024-11-27T15:15:26.050000 +CVE-2024-45690,0,0,5723764df58775bb65cffc56ee9068e121c35610c7033bd0cf1fbf999d9fcfa1,2024-11-27T15:15:26.050000 CVE-2024-45691,0,0,6cf0734b3b1bbfe46d94206888f2657e4fd0103a6560ef66f8d239ce88dda949,2024-11-20T20:35:10.377000 CVE-2024-45692,0,0,281ed60ed9431c734132a4f1fca034600bdda2bdb5b83bc44745bc26a826447d,2024-09-05T21:35:14.337000 CVE-2024-45693,0,0,8326a6a6c02d5129a5009d67c10554cd90e2c8aefe000e24bf1668842bfb6519,2024-10-17T20:21:11.913000 @@ -263498,8 +263504,8 @@ CVE-2024-46047,0,0,57a3435cb7b6e94de5fb698161c585c7b5ce0f8c27f8db901c567ec5b0f81 CVE-2024-46048,0,0,8b386e1ce8db1651262779289df0cde97cc0d4c50d015509acb4f6ce2f921783,2024-09-20T00:35:54.187000 CVE-2024-46049,0,0,39c19419297fc26bc1a072b6b6a8ff9ba0434b8f7cc74fa3a910df77355bb874,2024-09-20T00:39:30.443000 CVE-2024-4605,0,0,cc5939dfa5bb0891c69db66e562cc6696594a6a88efe746332f5ec8ead5152ae,2024-05-14T16:11:39.510000 -CVE-2024-46054,1,1,f0a53e0fc28376893d07742f485ef48bcb68dcb537ebfd98fd4e37244e30ff13,2024-11-27T15:15:26.200000 -CVE-2024-46055,1,1,2539fbd3e2bc1252940303bca4727c6bfd8b3714627bdc8680589bdb379c4a50,2024-11-27T15:15:26.290000 +CVE-2024-46054,0,0,f0a53e0fc28376893d07742f485ef48bcb68dcb537ebfd98fd4e37244e30ff13,2024-11-27T15:15:26.200000 +CVE-2024-46055,0,1,fb3ab0f0de94860a6cfab293110c9c5563c53335293fdfc002812d3e3e3d5f7a,2024-11-27T18:15:13.300000 CVE-2024-4606,0,0,f985d30934b7c1f8930bf2267fb972a68a7301f3b4fab17a99fda7060e053c79,2024-08-28T08:15:07.093000 CVE-2024-4607,0,0,26d7fb8a60d9724fbac67d9d15e472fd268b8645ac384c2f62b0c7323928361f,2024-09-10T15:03:24.710000 CVE-2024-46076,0,0,3fbd69f65c02bb3814cc49722b87c72edbd2a4b678c2a211eca1ecb2ed16e13e,2024-10-10T12:57:21.987000 @@ -265486,7 +265492,7 @@ CVE-2024-49579,0,0,0f0dd66a3db0fe299ae55b9b0e6c22f11c400dc3ee27d05103041b63e67e9 CVE-2024-4958,0,0,15591ba73d7708bbd560fadc0281274b5c7c2c12545797826fbf6e13e1222639,2024-06-03T14:46:24.250000 CVE-2024-49580,0,0,89085af96d96dbfcdc87aa1d40157bd1a1b8615e2e8f40b207dbbe916ae159de,2024-11-14T19:25:47.433000 CVE-2024-4959,0,0,862ee7700763d202e5d5dada80050e48cca3b83d56a63673f2017bcf5adb7503,2024-07-03T02:08:22.750000 -CVE-2024-49592,0,0,c703ea90112e8bcf8bd25130b1345e2b105fcdfcaded2bbe98ade97b760a4e11,2024-11-18T17:11:56.587000 +CVE-2024-49592,0,1,2c7b7fb1be7fc5fd754e82efd0fe5851f47e43e4cc7b8ec1fd6fcc2811eb81ce,2024-11-27T17:15:12.093000 CVE-2024-49593,0,0,0790debc03c6d685a8ce9800bcaf05d3a2d51714ee514270485ccb66f44467d5,2024-11-18T19:35:04.960000 CVE-2024-49595,0,0,b23fd80b60ac647f05027d85537df31a89ac4114f3b437db461e9c48fece4a35,2024-11-26T03:15:06.093000 CVE-2024-49596,0,0,59e71c8fcc49b547b7105baadcec16161b1e8926ccc4ef3d091ff33a55518621,2024-11-26T03:15:06.570000 @@ -265987,8 +265993,8 @@ CVE-2024-50184,0,0,cb05ed3cbf4320d0b6539ece765682947c4e4dd01f32eb669ed72a68abce5 CVE-2024-50185,0,0,595738e2988b3e2c25066779b5891f8412116ebeed8b468125ac9343052411c0,2024-11-08T19:01:03.880000 CVE-2024-50186,0,0,dc12eba11107a35c5b7f7b4fe757f427daaaa77d7848dff65a7950111c79ee69,2024-11-08T19:01:03.880000 CVE-2024-50187,0,0,9e77a6b02e0f58e2042e30bc8e5136053f0f67b10b4b28bd21fa9c5ec3735ee6,2024-11-08T19:01:03.880000 -CVE-2024-50188,0,1,a0f9600f02706c4c4c201ae8fa928c2340849d4ff2323579e41ceb41b53346b3,2024-11-27T16:14:31.370000 -CVE-2024-50189,0,1,5d4f496901033a53673f3eb245c0783e3367982581bb1f34ad55281445cbc8bd,2024-11-27T16:16:12.133000 +CVE-2024-50188,0,0,a0f9600f02706c4c4c201ae8fa928c2340849d4ff2323579e41ceb41b53346b3,2024-11-27T16:14:31.370000 +CVE-2024-50189,0,0,5d4f496901033a53673f3eb245c0783e3367982581bb1f34ad55281445cbc8bd,2024-11-27T16:16:12.133000 CVE-2024-5019,0,0,208ddc99e1f67b7d6822e7ee095131f1b9c059678d4d2eeb2b2f9eae704845da,2024-08-21T13:43:03.670000 CVE-2024-50190,0,0,2962a78db58b5eff7333f4f943b026fd8630dab04243ae02339e9f901787f7d2,2024-11-08T19:01:03.880000 CVE-2024-50191,0,0,a6db09c765b7d3d35c26042d26dc5603def4093fc6f320ce46df0d5416572571,2024-11-08T19:01:03.880000 @@ -266076,40 +266082,40 @@ CVE-2024-50267,0,0,b18e823f7987bf2f207dbb94811263ba2f7cb694e3871f48c8cc2bf39fe90 CVE-2024-50268,0,0,8df12e1c63e8f4b2fbb1daa84c5b9f22105342f2b53e103ba693f5c7f0487ea3,2024-11-22T22:13:47.450000 CVE-2024-50269,0,0,08dd3f234bbe0775aed81c63daa40d32c7fc72d3655c4eeaed98c1d9c9e8608e,2024-11-26T22:30:27.420000 CVE-2024-50270,0,0,e2cebf6c38789da2746318179b61d916a4b8eb21545b04b6001b05e81a6abdea,2024-11-26T22:38:18.377000 -CVE-2024-50271,0,1,75be6279968206b95ebcae861ce3283df0119a9347956d8cb645a9563e57d5b2,2024-11-27T15:57:03.277000 -CVE-2024-50272,0,1,0be03e353804a02199c122098a354e1959245d65a9b985e89f09f3439354dd50,2024-11-27T15:54:32.213000 -CVE-2024-50273,0,1,393c02307774f77273e83c4fdead3fe05517b310064f89579bd4607a52b97cee,2024-11-27T15:58:02.730000 -CVE-2024-50274,0,1,9989b3c8c4dde1407ba0a455d1f589572c8d1ef9f0e3d426d27ad9e2963d31d2,2024-11-27T15:59:35.733000 -CVE-2024-50275,0,1,6766267fdfcca38908f6315025367cea845708d4a217d1da8a88049872166d2a,2024-11-27T16:16:53.177000 +CVE-2024-50271,0,0,75be6279968206b95ebcae861ce3283df0119a9347956d8cb645a9563e57d5b2,2024-11-27T15:57:03.277000 +CVE-2024-50272,0,0,0be03e353804a02199c122098a354e1959245d65a9b985e89f09f3439354dd50,2024-11-27T15:54:32.213000 +CVE-2024-50273,0,0,393c02307774f77273e83c4fdead3fe05517b310064f89579bd4607a52b97cee,2024-11-27T15:58:02.730000 +CVE-2024-50274,0,0,9989b3c8c4dde1407ba0a455d1f589572c8d1ef9f0e3d426d27ad9e2963d31d2,2024-11-27T15:59:35.733000 +CVE-2024-50275,0,0,6766267fdfcca38908f6315025367cea845708d4a217d1da8a88049872166d2a,2024-11-27T16:16:53.177000 CVE-2024-50276,0,0,c538bd80c38457a997dbbbe83c52db48c4decdc4758c4bdca15192ecb6a6c988,2024-11-19T21:57:32.967000 -CVE-2024-50277,0,1,c1061fa4d8ff42c39e669074ab42e7cb90df575f03a05404df2b2893e3e5b843,2024-11-27T15:30:55.840000 -CVE-2024-50278,0,1,ed452b3654b9ea3f92fcde24a9a8547cc9d042e768f733fa2d6a6c26f5655850,2024-11-27T16:00:23.223000 -CVE-2024-50279,0,1,57b9eb4bee2e4b8c746696d2f77e4b7a23b660ba2233137329bda9edd3e5a25a,2024-11-27T16:01:09.817000 +CVE-2024-50277,0,0,c1061fa4d8ff42c39e669074ab42e7cb90df575f03a05404df2b2893e3e5b843,2024-11-27T15:30:55.840000 +CVE-2024-50278,0,0,ed452b3654b9ea3f92fcde24a9a8547cc9d042e768f733fa2d6a6c26f5655850,2024-11-27T16:00:23.223000 +CVE-2024-50279,0,0,57b9eb4bee2e4b8c746696d2f77e4b7a23b660ba2233137329bda9edd3e5a25a,2024-11-27T16:01:09.817000 CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000 CVE-2024-50280,0,0,11a1a8b1b58475d3237a437167dd9ab60a2fb42d1a5d80b74f255c9d05f0dd67,2024-11-19T21:57:32.967000 CVE-2024-50281,0,0,e4d73f958349685ab6550ff52c43d006d239999025c4abdf04c625c2dd569d54,2024-11-19T21:57:32.967000 CVE-2024-50282,0,0,edca8fb0c68bd2eb1359a831d99bb1855825b22eb947856819184e2bf586acca,2024-11-19T21:57:32.967000 CVE-2024-50283,0,0,c4109a99a84dfd37899e24ace8ae763e86313bd13e7117a125625b028c5711df,2024-11-19T21:57:32.967000 -CVE-2024-50284,0,1,0dd2f3e0d578dbadc046954dcf53364b51273841493d336e73c7cec144ecffef,2024-11-27T16:20:08.917000 -CVE-2024-50285,0,1,57dd7110572199115d76d8b0594b83deda57634c8161b67a640ec65820d64279,2024-11-27T15:31:58.063000 +CVE-2024-50284,0,0,0dd2f3e0d578dbadc046954dcf53364b51273841493d336e73c7cec144ecffef,2024-11-27T16:20:08.917000 +CVE-2024-50285,0,0,57dd7110572199115d76d8b0594b83deda57634c8161b67a640ec65820d64279,2024-11-27T15:31:58.063000 CVE-2024-50286,0,0,b047f979fd53ae155be0a8508cdb3f2f52e50e0ee7507f70c5103e656edad005,2024-11-19T21:57:32.967000 CVE-2024-50287,0,0,5a84aaae41c9428e15665fbcd54dc2d4c799cc4b55cc2a6cb8ec683b32ee59df,2024-11-19T21:57:32.967000 -CVE-2024-50288,0,1,6e2039ce756a6b1a292181b98f184f82f5cbcaecd4e1ac460ee0f3a4ece05c7c,2024-11-27T15:32:45.147000 +CVE-2024-50288,0,0,6e2039ce756a6b1a292181b98f184f82f5cbcaecd4e1ac460ee0f3a4ece05c7c,2024-11-27T15:32:45.147000 CVE-2024-50289,0,0,cbe890f5c9d4c6f76920eb8ce53083b1779519960db0d61cf86dba6e738923f2,2024-11-19T21:57:32.967000 CVE-2024-50290,0,0,472e5b89bdd80749e630d2d7cfdfbfa1f003a07e281a56444507df0faaba7cc5,2024-11-19T21:57:32.967000 -CVE-2024-50291,0,1,2bfa2e93499428357803d9d1742bd1017215506f4ce049e714c1056a205a95ca,2024-11-27T15:16:30.260000 +CVE-2024-50291,0,0,2bfa2e93499428357803d9d1742bd1017215506f4ce049e714c1056a205a95ca,2024-11-27T15:16:30.260000 CVE-2024-50292,0,0,c8fe60f8cf2667fe6bf44b523d8647b1569630ec063acb5ae501ac4b90f9edb0,2024-11-19T21:57:32.967000 CVE-2024-50293,0,0,9696c0877c6aa711d6bbb4e0cdc12ed718f5d22ffeb14c3a923cbf00fbfa862c,2024-11-19T21:57:32.967000 CVE-2024-50294,0,0,a56287c7c6c44b3839623aee8786a853478aac87c1c8f4037bacdb635fa62108,2024-11-19T21:57:32.967000 CVE-2024-50295,0,0,b5793fe9e5e200c708da8e3fd2d3817806f8597db59622027c2d0bf299d5097d,2024-11-19T21:57:32.967000 -CVE-2024-50296,0,1,a0ab00a3d94c15ca5a168953900e499984de52c4d2f3ef150ea36247cfc34755,2024-11-27T15:24:16.020000 -CVE-2024-50297,0,1,18782faadf8e66ce0592c45f4e4ae010037e6a87ea6a4488e69cd940026bbd47,2024-11-27T15:25:04.810000 -CVE-2024-50298,0,1,c08b26d3bb0c2bc365756a21c195b877cc9dad5b276ad51daa25ce5140c0f1cd,2024-11-27T15:25:38.023000 +CVE-2024-50296,0,0,a0ab00a3d94c15ca5a168953900e499984de52c4d2f3ef150ea36247cfc34755,2024-11-27T15:24:16.020000 +CVE-2024-50297,0,0,18782faadf8e66ce0592c45f4e4ae010037e6a87ea6a4488e69cd940026bbd47,2024-11-27T15:25:04.810000 +CVE-2024-50298,0,0,c08b26d3bb0c2bc365756a21c195b877cc9dad5b276ad51daa25ce5140c0f1cd,2024-11-27T15:25:38.023000 CVE-2024-50299,0,0,5aeee9eafaa1a622ea84bc5c27215f72a12d2e934f25cd301792f3ad40da51e9,2024-11-19T21:57:32.967000 CVE-2024-5030,0,0,bb4b715ea840400227e7a7cb9b03010c40389d422c5926920262a0b6d21748ab,2024-11-18T17:11:17.393000 CVE-2024-50300,0,0,357f2775ab252a4a06a076fcdc9db464e297da34ef827354cfabd45ea720901e,2024-11-19T21:57:32.967000 CVE-2024-50301,0,0,6032947c407edcb765791472d12ec09751cf709dcb1308b0f858d51bd46219d3,2024-11-19T21:57:32.967000 -CVE-2024-50302,0,1,c276d48aa253104f6ab94ac380d2127bc623569a115a2b5fb8d69864e82f6893,2024-11-27T15:27:00.187000 +CVE-2024-50302,0,0,c276d48aa253104f6ab94ac380d2127bc623569a115a2b5fb8d69864e82f6893,2024-11-27T15:27:00.187000 CVE-2024-50303,0,0,57cec19dcdbef42ee5ef5518eda5a8f97b5381ad2e4e83ffe649a20f91b7b500,2024-11-19T21:56:45.533000 CVE-2024-50304,0,0,56854a1e99128cd85feb0b11bd3df0ecdf626623d2783528840767997f789d64,2024-11-19T21:56:45.533000 CVE-2024-50305,0,0,b03fd6d501d19d7b209a06f202d725af272151828bcd7418064455026a0a9df5,2024-11-15T13:58:08.913000 @@ -266410,12 +266416,12 @@ CVE-2024-50652,0,0,c46d900b0ec3c3d3dc69c000a8af48eff0cdc2a83f00bffa34618c3851a63 CVE-2024-50653,0,0,351b2ae0bb07d369ff4e76cbcc39f43676534cf729c0eb11791224a2ac34f76b,2024-11-20T15:36:20.257000 CVE-2024-50654,0,0,852ec98b8770e8761131177d563306c16f9d93ec13622504cc7153f7938dd76e,2024-11-20T15:27:08.580000 CVE-2024-50655,0,0,d4ec558baa450e21b64b8fb6af74e8e4b7a98438007bcf88b64f95732f73b83a,2024-11-19T21:51:00.987000 -CVE-2024-50657,0,0,c62ae8e760b0c797e6305b82b7def79ede70f22ae58be77a448cac328641888f,2024-11-22T18:15:17.570000 +CVE-2024-50657,0,1,30b2eb884e7e45c72e97be70bee207473abaa297a2a95565537ba3cd89d0a4dd,2024-11-27T17:15:12.323000 CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000 CVE-2024-50667,0,0,0dcbd7b35b311fe7a681d780dcbe2293327603709e31a27594acb760866d084d,2024-11-12T17:35:12.270000 CVE-2024-5067,0,0,7a5f09523c1a14d6651905f1f8853395c32eebb526caa99a81fddc9a443e16ea,2024-09-05T17:29:32.287000 CVE-2024-50671,0,0,1223fefc332eddf3a4bf368d5cbbf3c4396b7c221e56523e6bdf733ee7c8c46d,2024-11-25T21:15:19.040000 -CVE-2024-50672,0,0,e15ff7e7887d1c58e55af7028d141453133b59d77bea70d3086e75a4dc40d21f,2024-11-25T21:15:19.523000 +CVE-2024-50672,0,1,85b0d6db9be373a6fa69359f08bb412793e42f226dea70f6b5078fe3734ab9e1,2024-11-27T17:15:12.563000 CVE-2024-5069,0,0,9472ccb93cc67e368452ccbd7690fcdac2e9c6bf3a0a4c1febdda7b23dc05b96,2024-06-04T19:20:58.080000 CVE-2024-5071,0,0,1e84a840bf7fe6d05a333c61daff03721e2399762594abd260e8b415b74d49eb,2024-10-28T21:35:22.430000 CVE-2024-5072,0,0,85aed93503872c17702aba727bb062c3ccc667233546a70047ce6a70e5d2f498,2024-11-19T22:35:11.960000 @@ -266583,7 +266589,7 @@ CVE-2024-51156,0,0,950cb85b625d9788feaa8ca00bca17d1dc7f49ab66d36281c4121d0068dc7 CVE-2024-51157,0,0,113cde3c71891d82bf55f2d0b4674fdfc6000fe1838706cb74a6d985959d76d5,2024-11-18T15:35:13.060000 CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000 CVE-2024-51162,0,0,659179ac55d508d31c34cd8742c699a4dc94023e77b3f77dfac64c460e25f9e9,2024-11-22T17:15:09.353000 -CVE-2024-51163,0,0,ba4267b1febf3946e2ff435fc29e576537023ed4cf0b2d8ea671bb9981fe6040,2024-11-22T17:15:09.497000 +CVE-2024-51163,0,1,909afcfaa554939e2c78d7e7af80c5c6961aa7c27e1f5cf118fbed2c52564f74,2024-11-27T18:15:17.760000 CVE-2024-51164,0,0,ceab88983ac8f1f076554a5fc06b1fdf761a41119ff559a9cb41cb2ae46055ec,2024-11-18T17:11:56.587000 CVE-2024-5117,0,0,8f71e5dda3348556d6b06143dcd47b79229dad0468d30aa7c38f8c5c1ecb8524,2024-06-04T19:21:00.547000 CVE-2024-51179,0,0,1ac36b7f8ecbb6442c3e82b8bfc190a784ef1fdb6227f3a1da3d4126f204bf98,2024-11-13T20:35:10.303000 @@ -266603,6 +266609,7 @@ CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3b CVE-2024-51211,0,0,581556a1bd92632bbd04cf9aebe233d1f5e96f417c538ff40e3ed80078a79ca9,2024-11-12T13:56:54.483000 CVE-2024-51213,0,0,a598a44042c959028b27d1b964937a81a14ecccc57789a4658084176eb433102,2024-11-12T18:35:33.433000 CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b5e,2024-06-04T19:21:00.963000 +CVE-2024-51228,1,1,ac26ba41591551e7b354eebad63edb6c2e6671b4cadbb1ad2fb2ebaf77cd607b,2024-11-27T17:15:12.800000 CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000 CVE-2024-5124,0,0,ddf4d98394e08878019bd952c44f2cfd27f047274d82fb0e14f997780f16638c,2024-11-04T11:15:06.937000 CVE-2024-51240,0,0,7445c6ba47df36c0613eb4cb1195b6f0f9ac8d38ec29d4a0f09a129257d8d4ff,2024-11-06T20:35:34.963000 @@ -266642,12 +266649,13 @@ CVE-2024-51327,0,0,6dff1d9ddb8570601185ec672ddf11cc5295d3cdce074e30aa360a3024bc5 CVE-2024-51328,0,0,2b00b7365b3324739a77fda3a7b20dd87707f9d87480b5fe651b2c4602f0e7fd,2024-11-04T19:35:16.150000 CVE-2024-51329,0,0,134d8b5a46fc76f9917a9aed6fc6c4366a039772d7dfe5acc179470dd93f05e6,2024-11-06T19:19:24.793000 CVE-2024-5133,0,0,ce2c3261ccf7a6af3656f0cd319a645240f50aa81e714a3f3634cc2f14d7c857,2024-10-17T16:41:53.717000 -CVE-2024-51330,0,0,e96a5de3ed2885ee831e7c318016642092d9f94ed9c27996decdea1687d8ed73,2024-11-18T17:11:56.587000 +CVE-2024-51330,0,1,b0b4a1198298e101e25b36e98c519271005f74623334a056f35802bef4974c1e,2024-11-27T17:15:12.973000 CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa19,2024-06-04T19:21:01.167000 CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000 CVE-2024-51358,0,0,15a6b357b2a15ba2efd09a7258436a688d09605b686100927239b26110c73a5e,2024-11-07T20:35:14.957000 CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000 CVE-2024-51362,0,0,a6e1a40cf5e527208990e8a764ceb58cfefd7f1b5e4a2c9e1905064ef69946f2,2024-11-06T20:35:35.750000 +CVE-2024-51367,1,1,321834f3c68e231d48212ed0455e22a6133cdcee14f287745838cf2ad31fdf76,2024-11-27T17:15:13.207000 CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000 CVE-2024-51377,0,0,cf00c0a6e7d0ac48895095961c732d7f23ec2a7e49679df67603156d82aefffb,2024-11-14T23:23:52.997000 CVE-2024-51378,0,0,25041eea06e8de15fb868a226604237e266234c162cafb1c59832cc50427a9bb,2024-11-01T12:57:03.417000 @@ -267175,7 +267183,7 @@ CVE-2024-5213,0,0,d0914ed8289e640566cb58700956c5d2665253a06d0896526d4a9160af504e CVE-2024-5214,0,0,63d7572dfe3fc62d2b94f5bd6d323fcf441de42b521ffae91ecf8348de5e238f,2024-06-03T19:15:09.360000 CVE-2024-5215,0,0,000fc07f4cc70899827567e140fa6ed8e48b521d55f3767b5621ab75b67abf1a,2024-06-26T12:44:29.693000 CVE-2024-5216,0,0,fd1f829df1b42ba5feaed9e36309904905f430fd7293476e8efb99a6adc245e7,2024-06-25T12:24:17.873000 -CVE-2024-5217,0,0,f5bf9cf0ef8575eb807fd3b94d1ba33c9e7f461028aa2a7d1bf80d1c2d760eed,2024-07-30T15:20:54.727000 +CVE-2024-5217,0,1,bcb367f5e8f4934ec54457a6bf1d1b467936c7817252514fef2d7bb7ed19c2bf,2024-11-27T18:56:05.783000 CVE-2024-5218,0,0,3f0f08ad7c2d51d3a67b7d7a45835724ecc9f070958f49b8f27381122972dec7,2024-05-28T12:39:42.673000 CVE-2024-5219,0,0,0b0a07b717a73df9a54bac0edd6ba4c81b69c5ace946f2ea22a932d7a079095d,2024-07-03T17:59:37.967000 CVE-2024-5220,0,0,c038ea6a169ab16726e3cd0d45ec2f73c131df5f0c00c638dfb0aa809792bfe5,2024-05-28T12:39:42.673000 @@ -267207,7 +267215,7 @@ CVE-2024-52303,0,0,57a6450ca3f2acaad0d7a5708a267a8f541a38de3d501010a97d19dc2553c CVE-2024-52304,0,0,0a277b5748fc03086c52a906e139b6d4003ef5456e902af6a142f3fb7ee5873a,2024-11-19T21:57:32.967000 CVE-2024-52305,0,0,fb3e1fe1f55433965f9f85cb35ad56a3033a246ddb638ca95e4c6fc4285767e7,2024-11-19T18:04:12.680000 CVE-2024-52306,0,0,dfac1396e024093252f9cdf330e5f0eab10833af9a739a326458e40b25c9c7da,2024-11-19T15:02:45.053000 -CVE-2024-52307,1,1,45f018d30c19214fa9c61ad01f4a9b1a0e1092cd201ecac1feef083922ccc61d,2024-11-27T16:15:14.433000 +CVE-2024-52307,0,0,45f018d30c19214fa9c61ad01f4a9b1a0e1092cd201ecac1feef083922ccc61d,2024-11-27T16:15:14.433000 CVE-2024-52308,0,0,0db58aa0fd04755222aa7bdf601c835c719685fb73c2d21a31da5f6db6051fd8,2024-11-20T15:07:43.127000 CVE-2024-5231,0,0,255bed42ab2a064a39e6f8c88880296d2f7a7d154f3db6dc7f4df2fa244d299f,2024-06-04T19:21:02.640000 CVE-2024-52311,0,0,440cc6f6193f2a4b57d7c7c4a4f4b3f01242ca6df6bc89770050e09d3b499acf,2024-11-12T13:56:54.483000 @@ -267218,7 +267226,7 @@ CVE-2024-52316,0,0,ff532393fbb3fe055624e3ec9b4317af0a9f5c80b8d099f274ce380979ad2 CVE-2024-52317,0,0,8dd9cf0b2675d0151da3af6e2ac3dfaef7e6c1fd135283d8e3e44d96c5be783e,2024-11-18T17:11:17.393000 CVE-2024-52318,0,0,2bba437e59239c6e36ab9227be3e173d0f3c7cc38d614e024ac840e507a6b100,2024-11-18T17:11:17.393000 CVE-2024-5232,0,0,8d68905f3b69b3dadb32694d2c73f30dc32ad3c794d56bacf5b1c8bfed3d3bb6,2024-06-04T19:21:02.890000 -CVE-2024-52323,0,1,4140a8efee2487f8a0ab9781f1095192b3a647c23a2a9eaba3cf214b9a3b68db,2024-11-27T15:15:26.377000 +CVE-2024-52323,0,0,4140a8efee2487f8a0ab9781f1095192b3a647c23a2a9eaba3cf214b9a3b68db,2024-11-27T15:15:26.377000 CVE-2024-5233,0,0,d230ff373762a089849cb791769c151d4d1eb1a364270894bffa0dbac945e679,2024-06-04T19:21:02.993000 CVE-2024-52336,0,0,5ed253ebd2a82ef5ea3ab5a60ad11f0bdb76616e1b68538042da9f8c97f4e20a,2024-11-26T19:15:29.747000 CVE-2024-52337,0,0,23b4775368bbdf0dec045a90c06cd1e5b3e2f47d3699f76ca9bfb7e9368b5326,2024-11-26T19:15:30.013000 @@ -267432,10 +267440,10 @@ CVE-2024-52714,0,0,e8174cb74f218481a745eaa4fb4441e2ce8d564c733028629c2c073a4476a CVE-2024-5272,0,0,d387d985ee64cb70308558e1288744b27040b8f28ef99da7e8b0a0af44167dd6,2024-05-28T12:39:28.377000 CVE-2024-52723,0,0,5e158b9e6ae935fe53fcd904758ef5184a80e91ca85495f081966847a4cf0194,2024-11-22T16:15:33.983000 CVE-2024-52725,0,0,33f6fa34c3dd7f326aa8525752182246593fbe26f97c40f7481f5dc188051048,2024-11-20T17:15:18.867000 -CVE-2024-52726,0,0,aaab5b915c8420d6dfdbfab6de11b3229799466def6ee1eeacddce3fd46cc0b0,2024-11-22T19:15:07.297000 +CVE-2024-52726,0,1,07104ca9c9e8f2a3a4e4ad76e018b45eb5df5070643287e443babd815c74fea3,2024-11-27T17:15:13.463000 CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000 CVE-2024-52739,0,0,e67c6617d90c4f2c32d6849dbe6387498e43b14fb180727dba9b598a59a70f9d,2024-11-20T20:35:16.147000 -CVE-2024-5274,0,0,e7d74c38d2c202c949e1ef012213e640b18c31c48483d84bb8a4761d2997d225,2024-08-14T17:07:13.270000 +CVE-2024-5274,0,1,c24e97658283aca2d227c212a256ad0361bc0b2f150a90ed4a532bb6225b406f,2024-11-27T18:12:51.690000 CVE-2024-5275,0,0,0a8f92936fd54cfeba80497afbb5044228db5d667d0dcb3a75c34af54c4c0fca,2024-06-20T12:44:01.637000 CVE-2024-52754,0,0,efe2054fb692b3adcc609bd36845f4654abf6a516c024ece2df08033c7e16777,2024-11-22T17:15:09.787000 CVE-2024-52755,0,0,201980ce6d3d391174749cb677e5eff116245b0c1dc48789b3b9b50b5ef853a4,2024-11-22T17:15:09.970000 @@ -267448,9 +267456,9 @@ CVE-2024-52765,0,0,215d573d92d5d4ab707e8db266a06400b9c1cb39b63c86b9575271eef3bcc CVE-2024-52769,0,0,b6cb45d7326db7c74bf072246ac67a1dfffc75d7966f0886ca77640876da3fd2,2024-11-20T17:15:19.907000 CVE-2024-5277,0,0,c22b3e398c55d24f660b1a45a3310a9c6b0abef458e72374f87af318fc09202a,2024-10-09T14:49:25.753000 CVE-2024-52770,0,0,7aa9649a9670c716ce311ac92684885a9b795e1a2574f48cc59bb70ef562262a,2024-11-20T17:15:20.200000 -CVE-2024-52771,0,0,5216faefced1eff97e71e61bc18807aec97654fb9fefe72a0573a6ba693a0484,2024-11-20T17:15:20.637000 +CVE-2024-52771,0,1,57831cc0aec212fa9f5452cd5864fd9f742774698e80266ca54ea858d750ac1e,2024-11-27T17:15:14.017000 CVE-2024-5278,0,0,f0307415163f20adf37f2c92a0ed4578caa6aa4e699bedaa3aae52fa3124b77a,2024-10-17T13:56:49.813000 -CVE-2024-52787,0,0,5cf053b2abc44016dfcc451672fa6172c4f3b8dcb05262e0c71f35e05b29e3fa,2024-11-25T18:15:13.597000 +CVE-2024-52787,0,1,f0be565609d1e673f989f286ed2b83aaf7115a7b1858a856c2ab7b57c986e03e,2024-11-27T17:15:14.397000 CVE-2024-52788,0,0,4abe1fd7690362e0e6e7183fadbb1999ee1afb82444324d21e730957cf5066a2,2024-11-22T17:15:10.490000 CVE-2024-52789,0,0,f640d56967c5320ac75d58f4ec0e813038d23df15a507a7fb489e9968905a84b,2024-11-22T17:15:10.660000 CVE-2024-5279,0,0,2c6d1e53ece85fba55c2b83835d7abf75ca4da167ddbecc0aa984e59d469dd0e,2024-06-04T19:21:04.240000 @@ -267501,7 +267509,7 @@ CVE-2024-52945,0,0,63027697b61e71930738cff69e21a659b1ff06f97d852d7c9fcc49bfd7768 CVE-2024-52946,0,0,ef4806982226269ca873cfccc34dff633254ace5ad4fa6e29d31cbf5dd0c16de,2024-11-18T17:11:17.393000 CVE-2024-52947,0,0,032f06f1ece995cd81c8fde69d4726dfc9340376c69a3aad6534cd5f5b5e3ade,2024-11-18T18:35:09.517000 CVE-2024-5295,0,0,a4e592514ef2498b5a4a173dae0a6cbcfb9c607b7fa3ff86ebe7c3784f138898,2024-05-24T01:15:30.977000 -CVE-2024-52951,1,1,7c1224f3f2e9ade77f936266b74982e9a872b28e1a9f688df725306494c7ca71,2024-11-27T15:15:26.550000 +CVE-2024-52951,0,0,7c1224f3f2e9ade77f936266b74982e9a872b28e1a9f688df725306494c7ca71,2024-11-27T15:15:26.550000 CVE-2024-52958,0,0,6ac9e217d9bc0433c548430fb0f3b6b9332a74d03a1b74c65d1c288770e97224,2024-11-27T06:15:18.590000 CVE-2024-52959,0,0,ec1380cbf80c452cc4c173df77383a977439e1ad3214342e17040813236ddc54,2024-11-27T06:15:19.083000 CVE-2024-5296,0,0,9bd527352a89f2b4ccfc677e3fc5feb9bb09c1923dac2d4ba397c3469bcfc648,2024-05-24T01:15:30.977000 @@ -267515,8 +267523,8 @@ CVE-2024-5303,0,0,217ef39fe65f9c942556432bd246389e62862800142bbf571d971052d849f8 CVE-2024-5304,0,0,d968010935b9808df14ec3827c68c660e5030ff1e10dd473ede1e120c2d0020a,2024-08-23T15:06:10.100000 CVE-2024-53042,0,0,6880ebfd034ad41870591bbbdeeaea6760d63ea66896344ed6638c692cbaee51,2024-11-19T21:56:45.533000 CVE-2024-53043,0,0,8605345b311f80d829276d5452f92df6619a24b70030cd2d41c05e3973bef2d1,2024-11-22T22:22:03.963000 -CVE-2024-53044,0,1,13db87ec8352bc7d7a9e5edecc2ddf5bacb85c33a4ca911a96d3b6b927e39574,2024-11-27T16:40:06.963000 -CVE-2024-53045,0,1,153919019dd492ee2f8a4bd103dc9fb649fa232c55f1697b430888fbb999af0c,2024-11-27T16:41:06.737000 +CVE-2024-53044,0,0,13db87ec8352bc7d7a9e5edecc2ddf5bacb85c33a4ca911a96d3b6b927e39574,2024-11-27T16:40:06.963000 +CVE-2024-53045,0,0,153919019dd492ee2f8a4bd103dc9fb649fa232c55f1697b430888fbb999af0c,2024-11-27T16:41:06.737000 CVE-2024-53046,0,0,3e71ba1a7c50b773dcf381dbf7fdbc4a342381bd32ad53fdac02d10d506eebd8,2024-11-19T21:56:45.533000 CVE-2024-53047,0,0,a0801a2f6d3c55ef95cce30e94c6ed5a76950eafd193774abe55034cb73499bf,2024-11-19T21:56:45.533000 CVE-2024-53048,0,0,529447b7e47a46804ce5665f7064fdc0578a20909c47292e6baa06ace21a4eed,2024-11-19T21:56:45.533000 @@ -267553,9 +267561,9 @@ CVE-2024-53075,0,0,b8a47df9f6008c83b93e2abefdeadbc449d2b3e2a3dcb44f41e184a3b9508 CVE-2024-53076,0,0,0be57ac15a64c608a1e52bd99fe58bd7fdd85d1305039bc11b5396e02cea259c,2024-11-22T22:24:24.607000 CVE-2024-53077,0,0,00b9d8c03b0897577603ba9722b5741dae994d46788395a5ed57813d6fd9f76e,2024-11-25T20:41:41.093000 CVE-2024-53078,0,0,fb4576ab424097abb54c012dfd85f820fb3d67465f92657a79299e53e0dd3ac8,2024-11-25T13:31:57.063000 -CVE-2024-53079,0,1,842cfa3f805cf283364d877943681242a6e2d56da2e3fc653cb2100a50c04856,2024-11-27T16:59:20.303000 -CVE-2024-53080,0,1,aab8698cdbcb15572a0f6f56b54b35fb99e8b87751dd7a7ac101c8e70a14a893,2024-11-27T16:57:47.947000 -CVE-2024-53081,0,1,494d629ca516b5b4db6b9980f8938e11f2c142ff9c2899ebea88d56f8aadc322,2024-11-27T16:56:35.143000 +CVE-2024-53079,0,0,842cfa3f805cf283364d877943681242a6e2d56da2e3fc653cb2100a50c04856,2024-11-27T16:59:20.303000 +CVE-2024-53080,0,0,aab8698cdbcb15572a0f6f56b54b35fb99e8b87751dd7a7ac101c8e70a14a893,2024-11-27T16:57:47.947000 +CVE-2024-53081,0,0,494d629ca516b5b4db6b9980f8938e11f2c142ff9c2899ebea88d56f8aadc322,2024-11-27T16:56:35.143000 CVE-2024-53082,0,0,4300d5804f1739d010f3842a1f063115d30827a689b8acceb8e0ef0a875aec0d,2024-11-25T13:35:34.083000 CVE-2024-53083,0,0,14bc093b2d0dbf0b458e87cc263fff838a1c2b0f5030c72f49f5cbb2b92721d1,2024-11-19T21:56:45.533000 CVE-2024-53084,0,0,2cf825e9737c7232363a4d626913473a9390d79ca2cd868f24741a845042e35c,2024-11-19T21:56:45.533000 @@ -267584,6 +267592,7 @@ CVE-2024-5322,0,0,34d5429047e5a1854ac8faff5145e41fb19a8e0b0a19efc95aa08c4b8fb570 CVE-2024-5324,0,0,68af38ce3b695644cbcf19d3a148fcefd2523c0cdca6a2454fd88f0297edc15c,2024-07-24T17:42:49.020000 CVE-2024-5325,0,0,3161b31796f943a80af27275e8f23d08c58d4d31d567c9aa76aee11dec3e806e,2024-07-12T16:34:58.687000 CVE-2024-53253,0,0,d8774b8b7a52a6828fee68f5032117fca8a6e77570ad308c3ddf9958a04b65eb,2024-11-22T20:15:09.210000 +CVE-2024-53254,1,1,ee53e9b703f27318442647deb86c75e2def0aedf5170eb37f9fbf3bd5e2537ab,2024-11-27T18:15:18.060000 CVE-2024-53255,0,0,d61a8d7710c40f67983bd99e9267ded1e91d86ea0747c698bd8cab97316873cd,2024-11-25T19:15:11.760000 CVE-2024-53258,0,0,a915b82637f40f0c10b7fb4e3ffc3bc669fcfe23ea0f5d157743938cb68f10dd,2024-11-25T20:15:10.030000 CVE-2024-5326,0,0,2be4cbe8832da29a051a88af0386c312f2db765fd88a5b2a911937a61354bc30,2024-05-30T13:15:41.297000 @@ -267613,7 +267622,7 @@ CVE-2024-5342,0,0,b9462ea77ffff29ff50fcb5529de81f4f86998607e3428d3f0d5025aaca0f2 CVE-2024-53425,0,0,dba41ac0d03c322e076798942c48ad94ab227d8220eb1e3a3534e4bdae7c6815,2024-11-26T18:15:20.090000 CVE-2024-53426,0,0,9339130e86a75243ea176c2c1911663d0047bd370b4ea0fccb09719eca2c3ad9,2024-11-26T18:15:20.330000 CVE-2024-5343,0,0,fedc1366914170279f2e5d2ad585273a49bb658750b62f8b5bda5b06ac846b44,2024-06-20T12:44:01.637000 -CVE-2024-53438,0,0,1f1caf7763eee1499fc294ada560bfb533a27a99b843716b542793ff5fef1fb8,2024-11-22T17:15:10.857000 +CVE-2024-53438,0,1,269e7677ace7d9295c53368d7a770c8536638e497558c04303dcd88d3a89eb20,2024-11-27T17:15:14.647000 CVE-2024-5344,0,0,b9eb66177d3d824bf1f1529dfc9f0ece4e45e95565139113aee3e384e4e64696,2024-07-17T03:07:04.743000 CVE-2024-5345,0,0,e63bd8698ebea410f9684596571cb5f236dcece9e087d3c47739e1f377731d0e,2024-05-31T13:01:46.727000 CVE-2024-5346,0,0,da43d69a3160345da9f992308a5772b156b46661e78425f332f67d306a3affb7,2024-06-24T20:00:59.240000 @@ -267628,7 +267637,7 @@ CVE-2024-5354,0,0,2705d9995a32176e712249b570d9e2fb33b0b6cf2235d27d22b60367c7562e CVE-2024-5355,0,0,5f2e376ce579cedaa86f2a16497e6e751e8e7c9f0422d5f739a3fa31c20b6848,2024-06-04T19:21:05.883000 CVE-2024-53554,0,0,438643a55aaa35b78f1b23aac2881a01cc4a8024d9a2bdae2137a7b9fa7a8998,2024-11-26T16:15:18.520000 CVE-2024-53555,0,0,174e17d1628af05aaf3f22807e86abd0dc7a03bf1129ef93abe75153c9a01a07,2024-11-26T21:15:08.560000 -CVE-2024-53556,0,0,48f17862e47add857cc3012444f5820a601a669e2f1886efc4926c973e3aada3,2024-11-25T21:15:21.693000 +CVE-2024-53556,0,1,6925ef5b3d50b82f5e08a24f19e7ff4e448493177d9879ad27f5ac4d6f2f0b97,2024-11-27T17:15:14.917000 CVE-2024-5356,0,0,85f64e8ba0cebff8187202ea327ca3c906742c5e7d2301ba82b2780a509234eb,2024-06-04T19:21:05.977000 CVE-2024-5357,0,0,3e42587e7af2230be214dc062d75c1c832a73aeee43ae2fc11277198b34ad5c7,2024-06-07T20:15:12.387000 CVE-2024-5358,0,0,fdd72871ebf6d62b075a63baf142931fcf44d230f54a18747bfadc4ddcff1dbe,2024-06-04T19:21:06.077000 @@ -267636,19 +267645,19 @@ CVE-2024-5359,0,0,0dc709734361df5232c8a75ae2b832e7f1398579fd9d2edbd5174e887cf59e CVE-2024-53597,0,0,9a4c545b5865d03e7d82c6ef3ae0f046b57734eab4f58e2724c4e5178d1b9adb,2024-11-25T22:15:19.340000 CVE-2024-53599,0,0,fd3383bf56de062fbdbeb229ef5252493e3482e4bcfabf0584010575f7387ef2,2024-11-25T21:15:21.993000 CVE-2024-5360,0,0,9a09bdfd8f70d621de992279dbf64a12a444818faeedf82bbd859ed192a0d3f0,2024-05-28T12:39:42.673000 -CVE-2024-53603,0,1,162b8a1c0030915029673db748be5d0adb733dae81b9ae207cb34767108f84eb,2024-11-27T16:15:14.583000 +CVE-2024-53603,0,0,162b8a1c0030915029673db748be5d0adb733dae81b9ae207cb34767108f84eb,2024-11-27T16:15:14.583000 CVE-2024-53604,0,0,47936311e2d1f5cc406b15d873639f8f4b058cff6af769b5c54ad5fe621ee21e,2024-11-27T14:15:19.093000 CVE-2024-5361,0,0,5486d2207143454b44a9225276732f9ee62f5258ee0c41c9fa5501a1b55451e4,2024-05-28T12:39:42.673000 CVE-2024-53619,0,0,7d24d177db4282b10dd583a800553384958865a9c2b032eab35d21cf889272f3,2024-11-26T20:15:33.880000 CVE-2024-5362,0,0,5b47523dd74fc943fbc0021df1551e4d13ec69c02c41616d4b2935f18460ef93,2024-06-04T19:21:06.287000 CVE-2024-53620,0,0,9d59f48eff7094eebabf16396953b43066a8c0a92b748f43ae8922b5e2bf6319,2024-11-26T20:15:34.050000 CVE-2024-5363,0,0,bb04284a4e58fb2effb3b9c467567f3bbd6015eb64c220429872004dc6821b06,2024-06-04T19:21:06.390000 -CVE-2024-53635,0,0,49b4054e38e70319300cf37323e732b469b9fb45e2df27cf28379c7859a0f5bf,2024-11-27T14:15:19.210000 +CVE-2024-53635,0,1,6e8b5160fce2a741e8ac5d43a4a38430a8c2b5d2b740bbc37c715cac813c59a2,2024-11-27T18:15:18.130000 CVE-2024-5364,0,0,96afe929167b2de1681dda607a064227a5b629af3adb1987caaf0917b62b92a8,2024-06-04T19:21:06.490000 CVE-2024-5365,0,0,4b68a39efcc7d1fdd266d085800e02f841a36aae12ede01463956a125c285501,2024-06-04T19:21:06.587000 CVE-2024-5366,0,0,ebdb50e85f32d3970264d5045d82ce95c8965c12926ca2c779990bb15b24ffc0,2024-06-04T19:21:06.690000 CVE-2024-5367,0,0,e1fb712fa137b32c2cb97597a93996bde7ebc629cee38f14d6c04ed9e1154407,2024-06-04T19:21:06.783000 -CVE-2024-53673,0,1,661b6e58e03fb62c2aa1ecc993b2257004bc984a0c70a3930af9e7eaf463bd3b,2024-11-27T16:15:14.783000 +CVE-2024-53673,0,0,661b6e58e03fb62c2aa1ecc993b2257004bc984a0c70a3930af9e7eaf463bd3b,2024-11-27T16:15:14.783000 CVE-2024-53674,0,0,8a5c79f209c5cbb54f78c6e00b940dec235442e0d5729a2a400739bbcabd981c,2024-11-26T22:15:18.713000 CVE-2024-53675,0,0,01989df42cc3673d2d670cddd166ccee1a501522f5e01720638d33a9f30efa8c,2024-11-26T22:15:18.990000 CVE-2024-53676,0,0,f7ef49b888a4eed0585ba7b9f7899002a769200a6ac0008e5a7b61bb2e49d171,2024-11-27T01:15:05.250000 @@ -267687,20 +267696,22 @@ CVE-2024-53912,0,0,e6fb43b2737cbcef51e1f874439414b1eb4c2f7a8143f7711c40052685e1c CVE-2024-53913,0,0,db26b2b1e2298beed3b0db25806c1bedf5fbe7d70658f946838e985da0217084,2024-11-26T16:15:20.480000 CVE-2024-53914,0,0,99735abb7c2ed42da934a1a9995a70c9a86da0f5e52dfc853c7764c9915f1f97,2024-11-26T16:15:20.700000 CVE-2024-53915,0,0,2b435e6209b4777d69d6b127cd04d8b412034b2878f2216636381cb24425f30d,2024-11-26T16:15:20.943000 -CVE-2024-53916,0,0,2d22f43c748e4fc1802bb59a3d73251bff1a353e6d572eedd66031b5d61e27bd,2024-11-25T00:15:04.423000 +CVE-2024-53916,0,1,8b397b00703240f42bfc4c720e49d6f6e4984c2220fee564d2c3c72e3311b723,2024-11-27T17:15:15.127000 CVE-2024-5392,0,0,b24872fec717fdd1d01c0a9d16cd8dae85d0db85954b236e74ba95a5e5c8352c,2024-06-04T19:21:08.117000 -CVE-2024-53920,1,1,d20c3dd3d3a0856cc626272b3d8ad44701e7a3636060e73cd0d1d84df2576a28,2024-11-27T16:15:15.037000 +CVE-2024-53920,0,0,d20c3dd3d3a0856cc626272b3d8ad44701e7a3636060e73cd0d1d84df2576a28,2024-11-27T16:15:15.037000 CVE-2024-5393,0,0,295d4f9eb57788d71849a73c0b5d6c4f89e92a1e7613c6c16abcfeb4329f6a42,2024-06-04T19:21:08.420000 CVE-2024-53930,0,0,1076c24462100197e38bce4bb3bb1d95bc12e583ba6e6f216b5c96e80fcd4c47,2024-11-26T16:15:21.150000 CVE-2024-5394,0,0,aaadf9a58796777f85dc2107a816ebb5c0ae4c9d890d2d8c3ab15382290e4f66,2024-06-04T19:21:08.527000 CVE-2024-5395,0,0,e532c0fafbcef9b666c7ef0302f25a35b4dc4d0c2a33d2079af161ebd3ce2b3c,2024-05-28T12:39:28.377000 CVE-2024-5396,0,0,d0f735b85e524715ed1861b804d3fb37a4720102a88b42bc6f1eec50bfcc099d,2024-06-04T19:21:08.627000 CVE-2024-5397,0,0,79c82f6af34f5d76edc0fe512c9b3e616bf4c7ca15c122380ba9806c73a591a6,2024-06-04T19:21:08.733000 -CVE-2024-53975,0,1,db2852f15c06d19ca698273a0c2e6819bbf9c83aca00ef4837eb933aa4601eda,2024-11-27T15:15:26.923000 +CVE-2024-53975,0,0,db2852f15c06d19ca698273a0c2e6819bbf9c83aca00ef4837eb933aa4601eda,2024-11-27T15:15:26.923000 CVE-2024-53976,0,0,8d5f56cf46e847394bbb16bbccc754e64a340211b5713f291e4e6fbe540b2487,2024-11-26T16:15:21.430000 CVE-2024-5398,0,0,1fca9edd99ff7753e0d36d6f4d73a5a23ccf8ab9dd992541f79488471e393289,2024-06-11T10:15:13.690000 CVE-2024-5399,0,0,6f591a4ee360dfdb4118262029ef6ec2f3647ffdfa160e81ed9cdadb88ac0f1d,2024-05-28T12:39:28.377000 CVE-2024-5400,0,0,094967d50b5003fa8a1a95a7cd40ccdb2300c03695bb818acf6e11d6054c6ffe,2024-05-28T12:39:28.377000 +CVE-2024-54003,1,1,a3c6c675b2f34f375ee2a56ca925b3bb999f2c571194b3341dcd3cd0cdaa5631,2024-11-27T17:15:15.333000 +CVE-2024-54004,1,1,082a4c012cf14e634e97063024708abf81b0ae88671de2cac0207022f22b82d0,2024-11-27T17:15:15.443000 CVE-2024-5402,0,0,a5e55a0c84701c59a5f5d7ada1c30ecac8bd71919dc47c454e4a5ba90cd9220e,2024-07-19T18:03:55.583000 CVE-2024-5403,0,0,2e916307137919215633d6a47f3e654241b49fba1a899d76e9efd2abd496b6ad,2024-05-28T12:39:28.377000 CVE-2024-5404,0,0,9555ba3a9174cf37744b3f17110afa21577889d292df132a8c1f8da3c56bf2a0,2024-06-03T14:46:24.250000 @@ -268160,7 +268171,7 @@ CVE-2024-5906,0,0,203e49fc12cc805aa814a48bc1ee927a32a234142d80d51288f99e84c6703f CVE-2024-5907,0,0,d1b055b40e0f23972d4010743c95e9e712740577d8745b01a87db7feb49b71fd,2024-08-07T16:59:29.527000 CVE-2024-5908,0,0,10ae8b07066771edd89ce262576520c1fd128ba78541519391a2b2649f95b086,2024-08-07T16:55:24.180000 CVE-2024-5909,0,0,e304efd89cf74e4d08d4ff371fbe388379e9204881ef926100a0f1e3a8d60e07,2024-08-07T16:53:10.633000 -CVE-2024-5910,0,0,bac698b7f35de84e6bbf386dfa752340c40a43b520ac5290f26ff52ee5dd650c,2024-11-14T02:00:02.740000 +CVE-2024-5910,0,1,809032c1554caf15adc6ef3696e5c072f55bc8cbc0c3da859c4558e159670420,2024-11-27T17:23:02.910000 CVE-2024-5911,0,0,73115e3f042806be5dcc4a831e78f32335b6192481bdcb3b8ad74d5cdbbf1e0e,2024-07-11T13:05:54.930000 CVE-2024-5912,0,0,3efa6b60416ae7c89e8dc5a2081c5e6def286690a42a0087bed53b30b989bae2,2024-07-11T13:05:54.930000 CVE-2024-5913,0,0,307a9260d70a9d37ef03fc90a18fce4dac6ad981979537b72159d2890aa10b6b,2024-08-06T05:15:41.160000 @@ -269144,6 +269155,7 @@ CVE-2024-7020,0,0,07e3f6eef588b310c604538a1a9169f2247ceb03dd8d5cbbf5f9bf79ffa47d CVE-2024-7022,0,0,f3f91088113b8b5dc64e298e776a2521f61b999864613e4c295fcbf55348078e,2024-09-26T13:32:55.343000 CVE-2024-7023,0,0,3f937f5a1230b5cc57e9f6057ef84d68d172cff978e89a42c9f0a7ad62f5c115,2024-09-26T13:32:55.343000 CVE-2024-7024,0,0,f6ab692713540ecde032ff4fa92fc29e0807ae6392bd295748f24c8601a6b0ea,2024-09-26T13:32:55.343000 +CVE-2024-7025,1,1,84f2822d7322b6c4c770714a08a0be1e8c12fd1166fe94eea014f9b723bf12bb,2024-11-27T18:15:18.420000 CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000 CVE-2024-7029,0,0,5f4ca22966bfb8fd03ea6c375443c6b1c23e214558aa93ba88feba6b27bd6aa8,2024-09-17T13:30:55.010000 CVE-2024-7030,0,0,94cdd35d577500e86064e69ea94124eea32b9ff9eeca8589a0c1d45f0f894609,2024-08-31T03:00:52.647000 @@ -269955,7 +269967,7 @@ CVE-2024-7967,0,0,3b754d3fe60ade3dbaf2ceedb5cb492adc3a6d1342157a48ed7f67b8f6c533 CVE-2024-7968,0,0,d42fbdf1e125bc5bdd13768ccbb0014f1ef469a1fb717c432eb8628bcf97d06a,2024-08-27T13:35:04.780000 CVE-2024-7969,0,0,004186edac2fefffd328a41ea15a25fa627c517f8fe839d3b4b4abc33a5fb6ab,2024-08-28T23:15:05.320000 CVE-2024-7970,0,0,4bb992b64808219b839c5254e00c2c7348ddd7f9644ca29d4ab55ca307fec90f,2024-09-04T14:35:15.343000 -CVE-2024-7971,0,0,46adb6d7721c1dfcc60ee3fda6e97e01d50ab2f0fa3271375a72069a513c0516,2024-08-27T01:00:02.883000 +CVE-2024-7971,0,1,cbe2daa931187e1258dbe5911fe5622967ef34542556be9e6ad2a0b769c2720b,2024-11-27T17:21:35.077000 CVE-2024-7972,0,0,e61aba0cb3afa4d81531ac3dd06c76487abfdcc64e079a47655c169ee1d829d6,2024-08-26T15:11:35.017000 CVE-2024-7973,0,0,f4a6e82caeabd156e6e39c448d3a6bc99c97ac280b9c1d190ceb79dabcc9ff3c,2024-10-24T20:35:14.967000 CVE-2024-7974,0,0,77d5477c7043c324c587d6ddd1b8725973fdf57ee70889d7f1b834f0b27b2189,2024-10-30T21:35:13.293000 @@ -271025,6 +271037,7 @@ CVE-2024-9361,0,0,5b39cf107cd2cec76681af4aec2b9617609d3555d1a39f69e46b82bde9fbb6 CVE-2024-9364,0,0,9d0e8f1b6c358b0978f38ed01c6214be4b3af0735e53abaab527da690e0d783f,2024-10-22T15:26:10.673000 CVE-2024-9366,0,0,407cafef9b2d9532a719e3ec12a763493be7d8b50723eedc7ded3a298c185dc3,2024-10-22T15:09:48.177000 CVE-2024-9368,0,0,9f09034d1cef896f0488110242b0920a28a4e3f8f0b6f56c7b8ec3c63941f7cb,2024-10-10T20:30:51.240000 +CVE-2024-9369,1,1,717a949189134c1304c62734f9cddd0a2758133cac7b4303a63a23d88b34d7a8,2024-11-27T18:15:18.560000 CVE-2024-9372,0,0,8dacc1340b523e83cb4764d42eea980a95a68aef0cadf900c3f45471ba3dc7ad,2024-10-10T20:36:28.020000 CVE-2024-9373,0,0,aeb5e5e7812ae1c911161fbc197cd9777cff81e8221d22b7660e89f11b598b88,2024-10-22T15:07:23.907000 CVE-2024-9374,0,0,71b6734f379ef9a804fdc66eda125efbaf96377b76395ed89ad6eee48b26d41e,2024-10-25T12:56:07.750000 @@ -271060,7 +271073,7 @@ CVE-2024-9409,0,0,3e506ee5c668e864fe32d06ea4b7a74953a7f1e2f6b3e039755ec706eb3dac CVE-2024-9410,0,0,5bec151d8e893e44b70a96e00c59b851f21a71304a48571095d7551a53538240,2024-11-22T19:57:28.770000 CVE-2024-9411,0,0,09446adc9a52ba88acfc951352e9088b24cfd1cdb8a001643ee070875c43ffef,2024-10-04T13:51:25.567000 CVE-2024-9412,0,0,aa9a3d3cdb3659b02012ef158f2f0c675ff0de511272afae470c48f556502feb,2024-10-10T12:51:56.987000 -CVE-2024-9413,0,1,a06de6835130fe994a1b9f10a16e4d390bb61a1bb02ceb9b43d0f4e1eeae3597,2024-11-27T16:15:15.180000 +CVE-2024-9413,0,0,a06de6835130fe994a1b9f10a16e4d390bb61a1bb02ceb9b43d0f4e1eeae3597,2024-11-27T16:15:15.180000 CVE-2024-9414,0,0,5c21f14ec376abe57dfce5e862247c317429afdd9c8e1a9c0b90f9672b7f519b,2024-10-18T12:52:33.507000 CVE-2024-9417,0,0,c74a648d5508a7a2c2d3e505619e54040658d58791e6150e9a0fe8cbf972b416,2024-10-07T17:48:28.117000 CVE-2024-9419,0,0,a3f1d241a393213976f2495a35f5bc1427a284fa16c4a0b19d1f7c056beff495,2024-11-01T12:57:03.417000