Auto-Update: 2024-11-27T19:01:43.480293+00:00

This commit is contained in:
cad-safe-bot 2024-11-27 19:04:55 +00:00
parent bbe73cc426
commit a08f5141e4
45 changed files with 2191 additions and 363 deletions

View File

@ -2,15 +2,43 @@
"id": "CVE-2023-2142",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-11-26T12:15:18.307",
"lastModified": "2024-11-26T12:15:18.307",
"lastModified": "2024-11-27T17:15:05.200",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Nunjucks versions prior to version 3.2.4, it was \npossible to bypass the restrictions which are provided by the autoescape\n functionality. If there are two user-controlled parameters on the same \nline used in the views, it was possible to inject cross site scripting \npayloads using the backslash \\ character."
},
{
"lang": "es",
"value": "En las versiones de Nunjucks anteriores a la versi\u00f3n 3.2.4, era posible eludir las restricciones que proporciona la funci\u00f3n de escape autom\u00e1tico. Si hay dos par\u00e1metros controlados por el usuario en la misma l\u00ednea utilizada en las vistas, era posible inyectar payloads de cross-site scripting utilizando el car\u00e1cter de barra invertida \\."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@mozilla.org",

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-32223",
"sourceIdentifier": "cna@cyber.gov.il",
"published": "2023-06-28T21:15:09.940",
"lastModified": "2023-07-06T15:33:10.737",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T17:15:05.937",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -13,32 +13,14 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "cna@cyber.gov.il",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -46,9 +28,27 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH"
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
@ -65,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-346"
}
]
}
],
"configurations": [
@ -103,6 +113,13 @@
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.gov.il/en/Departments/faq/cve_advisories",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33298",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-30T22:15:10.077",
"lastModified": "2023-08-02T15:40:35.783",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T17:15:06.230",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
@ -88,6 +98,30 @@
"Technical Description",
"Third Party Advisory"
]
},
{
"url": "https://support.perimeter81.com/docs/macos-agent-release-notes",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.kb.cert.org/vuls/id/653767",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
},
{
"url": "https://www.ns-echo.com/posts/cve_2023_33298.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Technical Description",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-33570",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-28T20:15:09.540",
"lastModified": "2023-07-10T15:53:05.990",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T17:15:06.687",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
@ -45,6 +45,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
@ -71,6 +81,13 @@
"tags": [
"Exploit"
]
},
{
"url": "https://siltonrenato02.medium.com/a-brief-summary-about-a-ssti-to-rce-in-bagisto-e900ac450490",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-35830",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-06-29T16:15:09.897",
"lastModified": "2023-07-11T19:25:28.647",
"vulnStatus": "Analyzed",
"lastModified": "2024-11-27T17:15:08.783",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -26,9 +28,7 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
@ -132,6 +142,20 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.stw-mobile-machines.com/fileadmin/user_upload/content/STW/PSIRT/STW-IR-23-001.pdf",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.stw-mobile-machines.com/psirt/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-11160",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-11-27T18:15:08.620",
"lastModified": "2024-11-27T18:15:08.620",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {},
"references": []
}

View File

@ -2,15 +2,55 @@
"id": "CVE-2024-11694",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-11-26T14:15:18.943",
"lastModified": "2024-11-26T14:15:18.943",
"lastModified": "2024-11-27T17:15:09.703",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP `frame-src` bypass and DOM-based XSS through the Google SafeFrame shim in the Web Compatibility extension. This issue could have exposed users to malicious frames masquerading as legitimate content. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Firefox ESR < 115.18, Thunderbird < 133, and Thunderbird < 128.5."
},
{
"lang": "es",
"value": "Es posible que el modo estricto de Enhanced Tracking Protection haya permitido inadvertidamente una omisi\u00f3n de frame-src de CSP y un XSS basado en DOM a trav\u00e9s del complemento SafeFrame de Google en la extensi\u00f3n Web Compatibility. Este problema podr\u00eda haber expuesto a los usuarios a marcos maliciosos que se hacen pasar por contenido leg\u00edtimo. Esta vulnerabilidad afecta a Firefox &lt; 133, Firefox ESR &lt; 128.5, Firefox ESR &lt; 115.18, Thunderbird &lt; 133 y Thunderbird &lt; 128.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1924167",

View File

@ -2,15 +2,55 @@
"id": "CVE-2024-11695",
"sourceIdentifier": "security@mozilla.org",
"published": "2024-11-26T14:15:19.040",
"lastModified": "2024-11-26T14:15:19.040",
"lastModified": "2024-11-27T17:15:09.867",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A crafted URL containing Arabic script and whitespace characters could have hidden the true origin of the page, resulting in a potential spoofing attack. This vulnerability affects Firefox < 133, Firefox ESR < 128.5, Thunderbird < 133, and Thunderbird < 128.5."
},
{
"lang": "es",
"value": "Una URL manipulada con caracteres \u00e1rabes y espacios en blanco podr\u00eda haber ocultado el verdadero origen de la p\u00e1gina, lo que podr\u00eda dar lugar a un posible ataque de suplantaci\u00f3n de identidad. Esta vulnerabilidad afecta a Firefox &lt; 133, Firefox ESR &lt; 128.5, Thunderbird &lt; 133 y Thunderbird &lt; 128.5."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1021"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1925496",

View File

@ -0,0 +1,149 @@
{
"id": "CVE-2024-11860",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-11-27T17:15:10.010",
"lastModified": "2024-11-27T17:15:10.010",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in SourceCodester Best House Rental Management System 1.0. This affects an unknown part of the file /rental/ajax.php?action=delete_tenant of the component POST Request Handler. The manipulation of the argument id leads to improper authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"baseScore": 6.4,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-266"
},
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://drive.google.com/file/d/1CyjtknGVqn5QO_R1WZX-hoGH8ae5DjRq/view",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/YasserREED/YasserREED-CVEs/blob/main/Best%20house%20rental%20management%20system%20project%20in%20php/Unauthorized%20Tenant%20Deletion.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.286245",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.286245",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.449684",
"source": "cna@vuldb.com"
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-21703",
"sourceIdentifier": "security@atlassian.com",
"published": "2024-11-27T17:15:10.260",
"lastModified": "2024-11-27T18:15:08.720",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This Medium severity Security Misconfiguration vulnerability was introduced in version 8.8.1 of Confluence Data Center and Server for Windows installations.\n\n\n\nThis Security Misconfiguration vulnerability, with a CVSS Score of 6.4 allows an authenticated attacker of the Windows host to read sensitive information about the Confluence Data Center configuration which has high impact to confidentiality, high impact to integrity, high impact to availability, and no user interaction.\n\n\n\nAtlassian recommends that Confluence Data Center and Server customers upgrade to the latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:\n\n* Confluence Data Center and Server 7.19: Upgrade to a release greater than or equal to 7.19.18 \n* Confluence Data Center and Server 8.5: Upgrade to a release greater than or equal to 8.5.5\n* Confluence Data Center and Server 8.7: Upgrade to a release greater than or equal to 8.7.2\n* Confluence Data Center and Server 8.8: Upgrade to a release greater than or equal to 8.8.0\n\n\n\nSee the release notes (https://confluence.atlassian.com/conf88/confluence-release-notes-1354501008.html ). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives ). \n\nThis vulnerability was reported via our Atlassian Bug Bounty Program by Chris Elliot."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"references": [
{
"url": "https://jira.atlassian.com/browse/CONFSERVER-98413",
"source": "security@atlassian.com"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-29292",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-20T18:15:22.970",
"lastModified": "2024-11-20T21:15:07.040",
"vulnStatus": "Received",
"lastModified": "2024-11-27T17:15:10.383",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple OS Command Injection vulnerabilities affecting Kasda LinkSmart Router KW6512 <= v1.3 enable an authenticated remote attacker to execute arbitrary OS commands via various cgi parameters."
},
{
"lang": "es",
"value": "Varias vulnerabilidades de inyecci\u00f3n de comandos del sistema operativo que afectan al enrutador Kasda LinkSmart KW6512 &lt;= v1.3 permiten a un atacante remoto autenticado ejecutar comandos arbitrarios del sistema operativo a trav\u00e9s de varios par\u00e1metros cgi."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/QuartzDust/debfd7ddf934a9f5609d7f1a8cd71154",

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-30896",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-21T11:15:34.007",
"lastModified": "2024-11-27T17:15:10.650",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InfluxDB through 2.7.10 allows allAccess administrators to retrieve all raw tokens via an \"influx auth ls\" command. NOTE: the supplier indicates that this is intentional but is a \"poor design choice\" that will be changed in a future release."
},
{
"lang": "es",
"value": "InfluxDB hasta la versi\u00f3n 2.7.10 permite a todos los administradores de Access recuperar todos los tokens sin procesar mediante el comando \"influx auth ls\". NOTA: el proveedor indica que esto es intencional, pero es una \"mala elecci\u00f3n de dise\u00f1o\" que se cambiar\u00e1 en una versi\u00f3n futura."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-922"
}
]
}
],
"references": [
{
"url": "https://github.com/XenoM0rph97/CVE-2024-30896",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/influxdata/influxdb/issues/24797",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-31976",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-27T17:15:10.913",
"lastModified": "2024-11-27T17:15:10.913",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "EnGenius EWS356-FIR 1.1.30 and earlier devices allow a remote attacker to execute arbitrary OS commands via the Controller connectivity parameter."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/actuator/cve/blob/main/Engenius/CVE-2024-31976",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/actuator/cve/tree/main/EnGenius/EWS356-FIT",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-33439",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-20T19:15:06.010",
"lastModified": "2024-11-20T19:15:06.010",
"vulnStatus": "Received",
"lastModified": "2024-11-27T17:15:11.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Kasda LinkSmart Router KW5515 v1.7 and before allows an authenticated remote attacker to execute arbitrary OS commands via cgi parameters."
},
{
"lang": "es",
"value": "Un problema en Kasda LinkSmart Router KW5515 v1.7 y anteriores permite que un atacante remoto autenticado ejecute comandos arbitrarios del sistema operativo a trav\u00e9s de par\u00e1metros cgi."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/QuartzDust/848acfddff02c881eb86dd302e859e80",

View File

@ -2,15 +2,55 @@
"id": "CVE-2024-37782",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-22T18:15:17.230",
"lastModified": "2024-11-22T18:15:17.230",
"vulnStatus": "Received",
"lastModified": "2024-11-27T17:15:11.320",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An LDAP injection vulnerability in the login page of Gladinet CentreStack v13.12.9934.54690 allows attackers to access sensitive data or execute arbitrary commands via a crafted payload injected into the username field."
},
{
"lang": "es",
"value": "Una vulnerabilidad de inyecci\u00f3n LDAP en la p\u00e1gina de inicio de sesi\u00f3n de Gladinet CentreStack v13.12.9934.54690 permite a los atacantes acceder a datos confidenciales o ejecutar comandos arbitrarios a trav\u00e9s de un payload manipulado inyectado en el campo de nombre de usuario."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.githubusercontent.com/Draoken/ab5465fc339df7a1e42281540b61f887/raw/fb28d4148e311e8cde9778dee4f8b2e64e27ea92/CVE-2024-37782.txt",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-37816",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-27T17:15:11.570",
"lastModified": "2024-11-27T17:15:11.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Quectel EC25-EUX EC25EUXGAR08A05M1G was discovered to contain a stack overflow."
}
],
"metrics": {},
"references": [
{
"url": "http://quectel.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/quectel-official/Quectel-Security",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-39707",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-14T22:15:16.147",
"lastModified": "2024-11-15T13:58:08.913",
"lastModified": "2024-11-27T18:15:09.190",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "La funci\u00f3n 0x49 de Insyde IHISI puede restaurar los valores predeterminados de f\u00e1brica para ciertas variables UEFI sin autenticaci\u00f3n adicional de forma predeterminada, lo que podr\u00eda provocar un posible ataque de reversi\u00f3n en ciertas plataformas. Esto se solucion\u00f3 en: kernel 5.2, versi\u00f3n 05.29.19; kernel 5.3, versi\u00f3n 05.38.19; kernel 5.4, versi\u00f3n 05.46.19; kernel 5.5, versi\u00f3n 05.54.19; kernel 5.6, versi\u00f3n 05.61.19."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://www.insyde.com/security-pledge/SA-2024007",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-44758",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-15T21:15:09.233",
"lastModified": "2024-11-18T17:11:56.587",
"lastModified": "2024-11-27T18:15:13.007",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Una vulnerabilidad de carga de archivos arbitrarios en el componente /Production/UploadFile of NUS-M9 ERP Management Software v3.0.0 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de archivos manipulados."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/WarmBrew/web_vul/blob/main/CVES/CVE-2024-44758.md",

View File

@ -2,15 +2,32 @@
"id": "CVE-2024-44786",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-22T17:15:08.380",
"lastModified": "2024-11-22T17:15:08.380",
"vulnStatus": "Received",
"lastModified": "2024-11-27T17:15:11.767",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect access control in Meabilis CMS 1.0 allows attackers to access other users' address books via unspecified vectors."
},
{
"lang": "es",
"value": "El control de acceso incorrecto en Meabilis CMS 1.0 permite a los atacantes acceder a las libretas de direcciones de otros usuarios a trav\u00e9s de vectores no especificados."
}
],
"metrics": {},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/luluhackme/8356703c7295d03d6e68a1ca652441b9",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-46055",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-27T15:15:26.290",
"lastModified": "2024-11-27T15:15:26.290",
"lastModified": "2024-11-27T18:15:13.300",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "OpenVidReview 1.0 is vulnerable to Cross Site Scripting (XSS) in review names."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/b1d0ws/CVEs/blob/main/CVE-2024-46055.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-49592",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-15T21:15:11.070",
"lastModified": "2024-11-18T17:11:56.587",
"lastModified": "2024-11-27T17:15:12.093",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
@ -22,7 +22,42 @@
"value": "McAfee Trial Installer 16.0.53 tiene un control de acceso incorrecto que conduce a una escalada local de privilegios."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
],
"references": [
{
"url": "https://www.mcafee.com/support/s/article/000002516?language=en_US",

View File

@ -2,15 +2,55 @@
"id": "CVE-2024-50657",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-22T18:15:17.570",
"lastModified": "2024-11-22T18:15:17.570",
"vulnStatus": "Received",
"lastModified": "2024-11-27T17:15:12.323",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Owncloud android apk v.4.3.1 allows a physically proximate attacker to escalate privileges via the PassCodeViewModel class, specifically in the checkPassCodeIsValid method"
},
{
"lang": "es",
"value": "Un problema en la apk de Android v.4.3.1 de Owncloud permite que un atacante f\u00edsicamente pr\u00f3ximo escale privilegios a trav\u00e9s de la clase PassCodeViewModel, espec\u00edficamente en el m\u00e9todo checkPassCodeIsValid"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://drive.google.com/drive/folders/1C-ZYjYhmKRGvWs9YN51XOiAS2WxxwdQd?usp=sharing",

View File

@ -2,15 +2,55 @@
"id": "CVE-2024-50672",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-25T21:15:19.523",
"lastModified": "2024-11-25T21:15:19.523",
"lastModified": "2024-11-27T17:15:12.563",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A NoSQL injection vulnerability in Adapt Learning Adapt Authoring Tool <= 0.11.3 allows unauthenticated attackers to reset user and administrator account passwords via the \"Reset password\" feature. The vulnerability occurs due to insufficient validation of user input, which is used as a query in Mongoose's find() function. This makes it possible for attackers to perform a full takeover of the administrator account. Attackers can then use the newly gained administrative privileges to upload a custom plugin to perform remote code execution (RCE) on the server hosting the web application."
},
{
"lang": "es",
"value": "Una vulnerabilidad de inyecci\u00f3n NoSQL en Adapt Learning Adapt Authoring Tool &lt;= 0.11.3 permite a atacantes no autenticados restablecer las contrase\u00f1as de cuentas de usuario y administrador a trav\u00e9s de la funci\u00f3n \"Restablecer contrase\u00f1a\". La vulnerabilidad se produce debido a una validaci\u00f3n insuficiente de la entrada del usuario, que se utiliza como consulta en la funci\u00f3n find() de Mongoose. Esto permite a los atacantes realizar una toma de control total de la cuenta de administrador. Los atacantes pueden utilizar los privilegios administrativos reci\u00e9n obtenidos para cargar un complemento personalizado para realizar la ejecuci\u00f3n remota de c\u00f3digo (RCE) en el servidor que aloja la aplicaci\u00f3n web."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/adaptlearning/adapt_authoring",

View File

@ -2,8 +2,9 @@
"id": "CVE-2024-51163",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-20T17:15:18.417",
"lastModified": "2024-11-22T17:15:09.497",
"lastModified": "2024-11-27T18:15:17.760",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
@ -14,7 +15,42 @@
"value": "Vulnerabilidad de inclusi\u00f3n de archivos locales en Vegam Solutions Vegam 4i v.6.3.47.0 y versiones anteriores permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de la funci\u00f3n de etiquetado de impresi\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://github.com/rahulkadavil/CVEs/tree/main/CVE-2024-51163",

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-51228",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-27T17:15:12.800",
"lastModified": "2024-11-27T17:15:12.800",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in TOTOLINK-CX-A3002RU V1.0.4-B20171106.1512 and TOTOLINK-CX-N150RT V2.1.6-B20171121.1002 and TOTOLINK-CX-N300RT V2.1.6-B20170724.1420 and TOTOLINK-CX-N300RT V2.1.8-B20171113.1408 and TOTOLINK-CX-N300RT V2.1.8-B20191010.1107 and TOTOLINK-CX-N302RE V2.0.2-B20170511.1523 allows a remote attacker to execute arbitrary code via the /boafrm/formSysCmd component."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/yckuo-sdc/totolink-boa-api-vulnerabilities",
"source": "cve@mitre.org"
},
{
"url": "https://totolink.tw/support_view/A3002RU",
"source": "cve@mitre.org"
},
{
"url": "https://totolink.tw/support_view/N150RT",
"source": "cve@mitre.org"
},
{
"url": "https://www.totolink.tw/products_view/N300RT",
"source": "cve@mitre.org"
},
{
"url": "https://www.totolink.tw/products_view/N302RE",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-51330",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-15T19:15:08.057",
"lastModified": "2024-11-18T17:11:56.587",
"lastModified": "2024-11-27T17:15:12.973",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema en UltiMaker Cura v.4.41 y 5.8.1 y anteriores permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s del mecanismo de comunicaci\u00f3n entre procesos (IPC) entre la aplicaci\u00f3n Cura y los procesos de CuraEngine, la pila de red del host local, las configuraciones de impresi\u00f3n y los componentes de procesamiento y transmisi\u00f3n de c\u00f3digo G, impresoras 3D Ultimaker."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/HalaAli198/ff06d7a94c06cdfb821dec4d6303e01b",

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-51367",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-21T20:15:44.660",
"lastModified": "2024-11-27T17:15:13.207",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability in the component \\Users\\username.BlackBoard of BlackBoard v2.0.0.2 allows attackers to execute arbitrary code via uploading a crafted .xml file."
},
{
"lang": "es",
"value": "Una vulnerabilidad de carga de archivos arbitrarios en el componente \\Users\\username.BlackBoard de BlackBoard v2.0.0.2 permite a los atacantes ejecutar c\u00f3digo arbitrario mediante la carga de un archivo .xml manipulado espec\u00edficamente."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "http://blackboard.com",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Gelcon/PoCofBlackBoard2.0.0.2",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,15 +2,55 @@
"id": "CVE-2024-52726",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-22T19:15:07.297",
"lastModified": "2024-11-22T19:15:07.297",
"vulnStatus": "Received",
"lastModified": "2024-11-27T17:15:13.463",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CRMEB v5.4.0 is vulnerable to Arbitrary file read in the save_basics function which allows an attacker to obtain sensitive information"
},
{
"lang": "es",
"value": "CRMEB v5.4.0 es vulnerable a la lectura arbitraria de archivos en la funci\u00f3n save_basics, lo que permite a un atacante obtener informaci\u00f3n confidencial."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/sec-Kode/bb71138619b22de28c6b0ba986ad58e5",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-52771",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-20T17:15:20.637",
"lastModified": "2024-11-20T17:15:20.637",
"vulnStatus": "Received",
"lastModified": "2024-11-27T17:15:14.017",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "DedeBIZ v6.3.0 was discovered to contain an arbitrary file deletion vulnerability via the component /admin/file_manage_view."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que DedeBIZ v6.3.0 conten\u00eda una vulnerabilidad de eliminaci\u00f3n arbitraria de archivos a trav\u00e9s del componente /admin/file_manage_view."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://co-a1natas.feishu.cn/docx/Zsd9dnGUvoBW6tx0G5fcVx6vnBb",

View File

@ -2,15 +2,55 @@
"id": "CVE-2024-52787",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-25T18:15:13.597",
"lastModified": "2024-11-25T18:15:13.597",
"lastModified": "2024-11-27T17:15:14.397",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in the upload_documents method of libre-chat v0.0.6 allows attackers to execute a path traversal via supplying a crafted filename in an uploaded file."
},
{
"lang": "es",
"value": "Un problema en el m\u00e9todo upload_documents de libre-chat v0.0.6 permite a los atacantes ejecutar un path traversal mediante el suministro de un nombre de archivo manipulado en un archivo cargado."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/jxfzzzt/276a6e8cfbc54d2c2711bb51d8d3dff3",

View File

@ -2,13 +2,9 @@
"id": "CVE-2024-5217",
"sourceIdentifier": "psirt@servicenow.com",
"published": "2024-07-10T17:15:12.373",
"lastModified": "2024-07-30T15:20:54.727",
"lastModified": "2024-11-27T18:56:05.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-07-29",
"cisaActionDue": "2024-08-19",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "ServiceNow Incomplete List of Disallowed Inputs Vulnerability",
"descriptions": [
{
"lang": "en",
@ -27,6 +23,8 @@
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.2,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
@ -58,39 +56,19 @@
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED",
"baseScore": 9.2,
"baseSeverity": "CRITICAL"
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "psirt@servicenow.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -98,26 +76,38 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"cisaExploitAdd": "2024-07-29",
"cisaActionDue": "2024-08-19",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "ServiceNow Incomplete List of Disallowed Inputs Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-697"
}
]
},
{
"source": "psirt@servicenow.com",
"type": "Secondary",
@ -127,6 +117,16 @@
"value": "CWE-184"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-697"
}
]
}
],
"configurations": [
@ -141,6 +141,11 @@
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:-:*:*:*:*:*:*",
"matchCriteriaId": "69E0078E-1953-4F4F-9D5A-B1A140C4B310"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:early_availability:*:*:*:*:*:*",
"matchCriteriaId": "03FE0B52-C7A6-4632-A09E-BE7AB8610DD7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_1:*:*:*:*:*:*",
@ -171,6 +176,31 @@
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10:*:*:*:*:*:*",
"matchCriteriaId": "76439FC6-2DD2-4AD4-9EB6-A2FEAC10B205"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10_hotfix_1:*:*:*:*:*:*",
"matchCriteriaId": "8097D9B0-9329-4EB7-BB7E-0FF3057D408B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10_hotfix_2:*:*:*:*:*:*",
"matchCriteriaId": "AFEA8D14-D1C8-486B-ABE7-25C9D6B72CE9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10a:*:*:*:*:*:*",
"matchCriteriaId": "5DA716A2-E697-4BC3-8127-E772E67E1C49"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10a_hotfix_1:*:*:*:*:*:*",
"matchCriteriaId": "EEBB1DCE-25AA-4F95-984C-5BB5341A90ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_10b:*:*:*:*:*:*",
"matchCriteriaId": "AE34BA83-3810-4314-9A45-B1A8944C6612"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_2:*:*:*:*:*:*",
@ -191,6 +221,11 @@
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_3:*:*:*:*:*:*",
"matchCriteriaId": "C9C467AA-B1A2-4A2A-8363-623232BCBCA0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_2_hotfix_4:*:*:*:*:*:*",
"matchCriteriaId": "A6E189F6-6623-4A0C-8767-A3CC1C12B759"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_3:*:*:*:*:*:*",
@ -211,6 +246,16 @@
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4:*:*:*:*:*:*",
"matchCriteriaId": "481EC1AA-5863-4641-B67F-CD51416ED0EA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_1:*:*:*:*:*:*",
"matchCriteriaId": "402D816A-2650-4743-A386-029C0D063C39"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2:*:*:*:*:*:*",
"matchCriteriaId": "56CBE65E-2D5A-4191-A2F4-8AC76050404F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2a:*:*:*:*:*:*",
@ -221,21 +266,71 @@
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_2b:*:*:*:*:*:*",
"matchCriteriaId": "76D69B8D-02EE-4E3D-9F54-E94F6DB09D5B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_3:*:*:*:*:*:*",
"matchCriteriaId": "CC772DD6-2814-4EEF-A524-CC752C277337"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_3b:*:*:*:*:*:*",
"matchCriteriaId": "996C57B4-E8AC-48F6-BA71-328F714B1BAC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_4:*:*:*:*:*:*",
"matchCriteriaId": "10B82BE2-BE38-4EA7-85D5-AC28FF4F50BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_4b:*:*:*:*:*:*",
"matchCriteriaId": "D66B18D1-486D-4390-9D1E-5348D1C6729A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_4_hotfix_5:*:*:*:*:*:*",
"matchCriteriaId": "A0EC8ACE-70CA-44FC-ACA7-0868D620C86D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_5:*:*:*:*:*:*",
"matchCriteriaId": "8D934721-565F-4707-A32A-B7E4BB9D2DD0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_5_hotfix_1:*:*:*:*:*:*",
"matchCriteriaId": "4AA97D74-290C-47C7-9976-6EF83950C530"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_6:*:*:*:*:*:*",
"matchCriteriaId": "122E0C17-B29B-44B9-A37E-745B103AD398"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_6_hotfix_1:*:*:*:*:*:*",
"matchCriteriaId": "AADFD5CE-9C9D-46FF-9871-E2BD7B2C8B98"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_6_hotfix_2:*:*:*:*:*:*",
"matchCriteriaId": "ECE96EED-C729-4A84-B437-79CCE029C391"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_7:*:*:*:*:*:*",
"matchCriteriaId": "8BD49264-D243-4625-828C-AF383D826779"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_7_hotfix_1:*:*:*:*:*:*",
"matchCriteriaId": "FB29FCEC-3DDB-46EE-A7AA-4728E6B9A1D6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_7_hotfix_2:*:*:*:*:*:*",
"matchCriteriaId": "AC4CA2B8-EFD8-4C01-8F9C-E613619062DF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_7a:*:*:*:*:*:*",
@ -251,16 +346,41 @@
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_8:*:*:*:*:*:*",
"matchCriteriaId": "8A4CD267-D72A-4F09-BE9B-F008B1804AD9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_8_hotfix_2:*:*:*:*:*:*",
"matchCriteriaId": "24D2EBC6-F894-4C1D-A2FF-B49FF4007ED8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_9:*:*:*:*:*:*",
"matchCriteriaId": "26D23EE3-0F88-47F7-ADCD-B74F81A08D9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1:*:*:*:*:*:*",
"matchCriteriaId": "FB793686-954A-49F8-BC35-A95325D61303"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1a:*:*:*:*:*:*",
"matchCriteriaId": "38DDACA8-69A9-4047-AD99-A7DDC320EAD8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:utah:patch_9_hotfix_1b:*:*:*:*:*:*",
"matchCriteriaId": "926C0F6A-0599-4239-B1CE-5D864BBAA315"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:-:*:*:*:*:*:*",
@ -271,26 +391,76 @@
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_1:*:*:*:*:*:*",
"matchCriteriaId": "9132AB29-33C1-4825-BAD4-2804C26316B1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_1_hotfix_1:*:*:*:*:*:*",
"matchCriteriaId": "68D99613-53A1-4B09-9A78-F8EFA0CC6B01"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2:*:*:*:*:*:*",
"matchCriteriaId": "E8FCCFB6-DB7E-4DED-A7E0-1C03087754F5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_1:*:*:*:*:*:*",
"matchCriteriaId": "7ED2051C-FE4F-4C0A-A3BF-E33141DC3250"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_1a:*:*:*:*:*:*",
"matchCriteriaId": "8CFD4017-5B8E-4CAF-B9E5-4A675C11F01A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_2:*:*:*:*:*:*",
"matchCriteriaId": "40D69E69-DF88-4F8C-A9BD-B642829107E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix_3:*:*:*:*:*:*",
"matchCriteriaId": "4D21A542-15DC-432C-9C60-F7CABE8D4807"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_2_hotfix1a:*:*:*:*:*:*",
"matchCriteriaId": "1596163B-637A-49F9-B01F-C6CC297F7E5B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3:*:*:*:*:*:*",
"matchCriteriaId": "0B915FDA-9DCB-43B5-8081-F0690996A3EF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_1:*:*:*:*:*:*",
"matchCriteriaId": "7308FA07-5C6D-41AA-9EE1-EE9BAAB50A1B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_2:*:*:*:*:*:*",
"matchCriteriaId": "5ED407E7-9595-4B4D-9D53-1A4807BA327C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_3:*:*:*:*:*:*",
"matchCriteriaId": "1EA5B288-54DB-437E-88C2-05F90FF3C918"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_3_hotfix_4:*:*:*:*:*:*",
"matchCriteriaId": "6ED497ED-1588-4CF8-AE83-7CC7BEF8B982"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4:*:*:*:*:*:*",
"matchCriteriaId": "A74A3197-68F7-4303-A731-B87A8BF3F831"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1:*:*:*:*:*:*",
"matchCriteriaId": "A08FD0FD-E062-4BEC-BE95-0ED2D106826B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1a:*:*:*:*:*:*",
@ -301,26 +471,51 @@
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_1b:*:*:*:*:*:*",
"matchCriteriaId": "847F9124-F3C6-4C93-9E80-544CB0580C8C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_4_hotfix_2b:*:*:*:*:*:*",
"matchCriteriaId": "12808B52-8F7D-4EE0-A43E-85A1C70A6BE3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_5:*:*:*:*:*:*",
"matchCriteriaId": "81880B84-5E9D-4B7F-B1D5-1BF8D25DAF5D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_5_hotfix_1:*:*:*:*:*:*",
"matchCriteriaId": "8011D2A7-770B-4AE5-80E6-C762F4F0BB55"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_6:*:*:*:*:*:*",
"matchCriteriaId": "A58603E3-5AFC-4606-8F9E-1B4FF9A9B843"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_6_hotfix_1:*:*:*:*:*:*",
"matchCriteriaId": "BED5F42A-5FFF-43E0-9BAD-A5E6C1110551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7:*:*:*:*:*:*",
"matchCriteriaId": "ABE64339-EF0B-4430-9768-FA7DE82AA61F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_1:*:*:*:*:*:*",
"matchCriteriaId": "FF79CA67-765A-4CCB-B1CB-EE1FC02CFCFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_1a:*:*:*:*:*:*",
"matchCriteriaId": "A3E71353-9AFF-4B6D-89BC-A2909A7C5DDF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2:*:*:*:*:*:*",
"matchCriteriaId": "C9C5B57E-7852-4E38-9BDA-864CF6F9DB5A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2a:*:*:*:*:*:*",
@ -331,11 +526,71 @@
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_2b:*:*:*:*:*:*",
"matchCriteriaId": "650956A6-8DE6-4C16-A77C-2B208B41DF5F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_3a:*:*:*:*:*:*",
"matchCriteriaId": "A49AC0E0-9164-43AD-959A-55FCB7965858"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotfix_4:*:*:*:*:*:*",
"matchCriteriaId": "46277115-1A2B-4526-83E8-1446EB5A1EAB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_1a:*:*:*:*:*:*",
"matchCriteriaId": "6CDFB167-F252-46A6-A5F6-EF9A4F93FC03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_1b:*:*:*:*:*:*",
"matchCriteriaId": "43DE243B-E90A-4857-A3A6-3A045FE2D75F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_2a:*:*:*:*:*:*",
"matchCriteriaId": "33689F99-48DD-47C6-AFAC-DC5D10785860"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_7_hotifix_2b:*:*:*:*:*:*",
"matchCriteriaId": "8F664F1F-5FB2-48B1-93C7-5DF415E673B7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_8:*:*:*:*:*:*",
"matchCriteriaId": "C641B881-7379-448A-A785-3381C72F8353"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_1:*:*:*:*:*:*",
"matchCriteriaId": "03D48963-936B-4A48-8859-A5066A259E03"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_2:*:*:*:*:*:*",
"matchCriteriaId": "9149B850-7196-476A-9A27-DEB85B8C6F19"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_8_hotfix_3:*:*:*:*:*:*",
"matchCriteriaId": "10622260-FCBC-4CC0-804E-55D75200FC46"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:vancouver:patch_9:*:*:*:*:*:*",
"matchCriteriaId": "CF44F7A1-D153-4723-BA45-0FE4E4725C2F"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:-:*:*:*:*:*:*",
@ -346,20 +601,55 @@
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1:*:*:*:*:*:*",
"matchCriteriaId": "444DD275-789F-4C07-9D98-BBFAA1640DB3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_1:*:*:*:*:*:*",
"matchCriteriaId": "5B29B708-BD7C-4A6C-9E78-37D045101A17"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2:*:*:*:*:*:*",
"matchCriteriaId": "1F6EDFA3-9014-4AA7-A17F-DDB1FE96588E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2a:*:*:*:*:*:*",
"matchCriteriaId": "1DA447CA-A6A2-436C-9909-3F0419B7DD6F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_1_hotfix_2b:*:*:*:*:*:*",
"matchCriteriaId": "9F263893-6D34-49D6-9407-ED6CB823595E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2:*:*:*:*:*:*",
"matchCriteriaId": "D18E2CD1-AC8E-4ABF-88DE-D3E61A297ED1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_2_hotfix_1:*:*:*:*:*:*",
"matchCriteriaId": "52FC3724-35E5-4C3A-B6BA-3B270EA4255E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3:*:*:*:*:*:*",
"matchCriteriaId": "6137BB81-6B48-4DCB-A9F6-A27D869C12FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_3_hotfix_1:*:*:*:*:*:*",
"matchCriteriaId": "B06EABB5-0327-4816-AC7B-34D021758812"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_4:*:*:*:*:*:*",
"matchCriteriaId": "29DC5FC9-2ACF-4C51-93C4-2D0982BA0CA6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:servicenow:servicenow:washington_dc:patch_5:*:*:*:*:*:*",
"matchCriteriaId": "9CD5A918-9B71-4CFD-A6DB-437D3B647C6A"
}
]
}
@ -387,6 +677,27 @@
"tags": [
"Press/Media Coverage"
]
},
{
"url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1644293",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1648313",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.darkreading.com/cloud-security/patchnow-servicenow-critical-rce-bugs-active-exploit",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Press/Media Coverage"
]
}
]
}

View File

@ -2,13 +2,9 @@
"id": "CVE-2024-5274",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-05-28T15:15:10.443",
"lastModified": "2024-08-14T17:07:13.270",
"lastModified": "2024-11-27T18:12:51.690",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-05-28",
"cisaActionDue": "2024-06-18",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Google Chromium V8 Type Confusion Vulnerability",
"descriptions": [
{
"lang": "en",
@ -26,20 +22,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
@ -47,6 +43,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
@ -54,15 +52,17 @@
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.3,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 6.0
}
]
},
"cisaExploitAdd": "2024-05-28",
"cisaActionDue": "2024-06-18",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Google Chromium V8 Type Confusion Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",
@ -128,14 +128,15 @@
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_23.html",
"source": "chrome-cve-admin@google.com",
"tags": [
"Vendor Advisory"
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/341663589",
"source": "chrome-cve-admin@google.com",
"tags": [
"Permissions Required"
"Exploit",
"Issue Tracking"
]
},
{
@ -151,6 +152,35 @@
"tags": [
"Mailing List"
]
},
{
"url": "https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_23.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://issues.chromium.org/issues/341663589",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AVC3FNI7HZLVSRIFBVUSBHI233DZYBKP/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T6IBUYVPD4MIFQNNYBGAPI5MOECWXXOB/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
]
}
]
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2024-53254",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-11-27T18:15:18.060",
"lastModified": "2024-11-27T18:15:18.060",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: This CVE is a duplicate of another CVE."
}
],
"metrics": {},
"references": []
}

View File

@ -2,15 +2,55 @@
"id": "CVE-2024-53438",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-22T17:15:10.857",
"lastModified": "2024-11-22T17:15:10.857",
"vulnStatus": "Received",
"lastModified": "2024-11-27T17:15:14.647",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "EventAttendance.php in ChurchCRM 5.7.0 is vulnerable to SQL injection. An attacker can exploit this vulnerability by manipulating the 'Event' parameter, which is directly interpolated into the SQL query without proper sanitization or validation, allowing attackers to execute arbitrary SQL commands."
},
{
"lang": "es",
"value": "EventAttendance.php en ChurchCRM 5.7.0 es vulnerable a la inyecci\u00f3n SQL. Un atacante puede aprovechar esta vulnerabilidad manipulando el par\u00e1metro 'Event', que se interpola directamente en la consulta SQL sin la debida desinfecci\u00f3n o validaci\u00f3n, lo que permite a los atacantes ejecutar comandos SQL arbitrarios."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ChurchCRM/CRM/issues/6988",

View File

@ -2,15 +2,55 @@
"id": "CVE-2024-53556",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-25T21:15:21.693",
"lastModified": "2024-11-25T21:15:21.693",
"lastModified": "2024-11-27T17:15:14.917",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An Open Redirect vulnerability in Taiga v6.8.1 allows attackers to redirect users to arbitrary websites via appending a crafted link to /login?next= in the login page URL."
},
{
"lang": "es",
"value": "Una vulnerabilidad de redirecci\u00f3n abierta en Taiga v6.8.1 permite a los atacantes redirigir a los usuarios a sitios web arbitrarios mediante la adici\u00f3n de un enlace manipulado a /login?next= en la URL de la p\u00e1gina de inicio de sesi\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://drive.google.com/file/d/1CIr8oHSF4JaqOn51wIhyZyvsCtlX0Q_e/view?usp=drive_link",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-53635",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-27T14:15:19.210",
"lastModified": "2024-11-27T14:15:19.210",
"lastModified": "2024-11-27T18:15:18.130",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A Reflected Cross Site Scripting (XSS) vulnerability was found in /covid-tms/patient-search-report.php in PHPGurukul COVID 19 Testing Management System v1.0, which allows remote attackers to execute arbitrary code via the searchdata POST request parameter."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/COVID19/Reflected%20Cross%20Site%20Scripting.pdf",

View File

@ -2,15 +2,43 @@
"id": "CVE-2024-53916",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-25T00:15:04.423",
"lastModified": "2024-11-25T00:15:04.423",
"vulnStatus": "Received",
"lastModified": "2024-11-27T17:15:15.127",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In OpenStack Neutron through 25.0.0, neutron/extensions/tagging.py can use an incorrect ID during policy enforcement. NOTE: 935883 has the \"Work in Progress\" status as of 2024-11-24."
},
{
"lang": "es",
"value": "En OpenStack Neutron hasta la versi\u00f3n 25.0.0, neutron/extensions/tagging.py puede usar una ID incorrecta durante la aplicaci\u00f3n de pol\u00edticas. NOTA: 935883 tiene el estado \"Trabajo en progreso\" al 24/11/2024."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://github.com/openstack/neutron/blob/363ffa6e9e1ab5968f87d45bc2f1cb6394f48b9f/neutron/extensions/tagging.py#L138-L232",

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-54003",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-11-27T17:15:15.333",
"lastModified": "2024-11-27T17:15:15.333",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Jenkins Simple Queue Plugin 1.4.4 and earlier does not escape the view name, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Create permission."
}
],
"metrics": {},
"references": [
{
"url": "https://www.jenkins.io/security/advisory/2024-11-27/#SECURITY-3467",
"source": "jenkinsci-cert@googlegroups.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-54004",
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
"published": "2024-11-27T17:15:15.443",
"lastModified": "2024-11-27T17:15:15.443",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Jenkins Filesystem List Parameter Plugin 0.0.14 and earlier does not restrict the path used for the File system objects list Parameter, allowing attackers with Item/Configure permission to enumerate file names on the Jenkins controller file system."
}
],
"metrics": {},
"references": [
{
"url": "https://www.jenkins.io/security/advisory/2024-11-27/#SECURITY-3367",
"source": "jenkinsci-cert@googlegroups.com"
}
]
}

View File

@ -2,13 +2,9 @@
"id": "CVE-2024-5910",
"sourceIdentifier": "psirt@paloaltonetworks.com",
"published": "2024-07-10T19:15:11.390",
"lastModified": "2024-11-14T02:00:02.740",
"lastModified": "2024-11-27T17:23:02.910",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-11-07",
"cisaActionDue": "2024-11-28",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Palo Alto Networks Expedition Missing Authentication Vulnerability",
"descriptions": [
{
"lang": "en",
@ -27,6 +23,8 @@
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:D/RE:M/U:Red",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
@ -58,9 +56,7 @@
"recovery": "USER",
"valueDensity": "DIFFUSE",
"vulnerabilityResponseEffort": "MODERATE",
"providerUrgency": "RED",
"baseScore": 9.3,
"baseSeverity": "CRITICAL"
"providerUrgency": "RED"
}
}
],
@ -71,6 +67,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -78,19 +76,21 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"cisaExploitAdd": "2024-11-07",
"cisaActionDue": "2024-11-28",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Palo Alto Networks Expedition Missing Authentication Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -99,8 +99,8 @@
]
},
{
"source": "psirt@paloaltonetworks.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -135,6 +135,21 @@
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.paloaltonetworks.com/CVE-2024-5910",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-7025",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-11-27T18:15:18.420",
"lastModified": "2024-11-27T18:15:18.420",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Integer overflow in Layout in Google Chrome prior to 129.0.6668.89 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
}
],
"metrics": {},
"weaknesses": [
{
"source": "chrome-cve-admin@google.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-472"
}
]
}
],
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/367764861",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -2,13 +2,9 @@
"id": "CVE-2024-7971",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-08-21T21:15:09.277",
"lastModified": "2024-08-27T01:00:02.883",
"lastModified": "2024-11-27T17:21:35.077",
"vulnStatus": "Analyzed",
"cveTags": [],
"cisaExploitAdd": "2024-08-26",
"cisaActionDue": "2024-09-16",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Google Chromium V8 Type Confusion Vulnerability",
"descriptions": [
{
"lang": "en",
@ -26,20 +22,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
@ -47,6 +43,8 @@
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
@ -54,19 +52,21 @@
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"cisaExploitAdd": "2024-08-26",
"cisaActionDue": "2024-09-16",
"cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Google Chromium V8 Type Confusion Vulnerability",
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"source": "chrome-cve-admin@google.com",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -75,8 +75,8 @@
]
},
{
"source": "chrome-cve-admin@google.com",
"type": "Secondary",
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
@ -127,6 +127,14 @@
"tags": [
"Permissions Required"
]
},
{
"url": "https://www.microsoft.com/en-us/security/blog/2024/08/30/north-korean-threat-actor-citrine-sleet-exploiting-chromium-zero-day/",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-9369",
"sourceIdentifier": "chrome-cve-admin@google.com",
"published": "2024-11-27T18:15:18.560",
"lastModified": "2024-11-27T18:15:18.560",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficient data validation in Mojo in Google Chrome prior to 129.0.6668.89 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)"
}
],
"metrics": {},
"references": [
{
"url": "https://chromereleases.googleblog.com/2024/10/stable-channel-update-for-desktop.html",
"source": "chrome-cve-admin@google.com"
},
{
"url": "https://issues.chromium.org/issues/368208152",
"source": "chrome-cve-admin@google.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-27T17:00:21.063812+00:00
2024-11-27T19:01:43.480293+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-27T16:59:20.303000+00:00
2024-11-27T18:56:05.783000+00:00
```
### Last Data Feed Release
@ -33,50 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
271504
271517
```
### CVEs added in the last Commit
Recently added CVEs: `6`
Recently added CVEs: `13`
- [CVE-2024-11862](CVE-2024/CVE-2024-118xx/CVE-2024-11862.json) (`2024-11-27T15:15:25.393`)
- [CVE-2024-46054](CVE-2024/CVE-2024-460xx/CVE-2024-46054.json) (`2024-11-27T15:15:26.200`)
- [CVE-2024-46055](CVE-2024/CVE-2024-460xx/CVE-2024-46055.json) (`2024-11-27T15:15:26.290`)
- [CVE-2024-52307](CVE-2024/CVE-2024-523xx/CVE-2024-52307.json) (`2024-11-21T18:15:12.443`)
- [CVE-2024-52951](CVE-2024/CVE-2024-529xx/CVE-2024-52951.json) (`2024-11-27T15:15:26.550`)
- [CVE-2024-53920](CVE-2024/CVE-2024-539xx/CVE-2024-53920.json) (`2024-11-27T15:15:26.837`)
- [CVE-2024-11160](CVE-2024/CVE-2024-111xx/CVE-2024-11160.json) (`2024-11-27T18:15:08.620`)
- [CVE-2024-11860](CVE-2024/CVE-2024-118xx/CVE-2024-11860.json) (`2024-11-27T17:15:10.010`)
- [CVE-2024-21703](CVE-2024/CVE-2024-217xx/CVE-2024-21703.json) (`2024-11-27T17:15:10.260`)
- [CVE-2024-30896](CVE-2024/CVE-2024-308xx/CVE-2024-30896.json) (`2024-11-21T11:15:34.007`)
- [CVE-2024-31976](CVE-2024/CVE-2024-319xx/CVE-2024-31976.json) (`2024-11-27T17:15:10.913`)
- [CVE-2024-37816](CVE-2024/CVE-2024-378xx/CVE-2024-37816.json) (`2024-11-27T17:15:11.570`)
- [CVE-2024-51228](CVE-2024/CVE-2024-512xx/CVE-2024-51228.json) (`2024-11-27T17:15:12.800`)
- [CVE-2024-51367](CVE-2024/CVE-2024-513xx/CVE-2024-51367.json) (`2024-11-21T20:15:44.660`)
- [CVE-2024-53254](CVE-2024/CVE-2024-532xx/CVE-2024-53254.json) (`2024-11-27T18:15:18.060`)
- [CVE-2024-54003](CVE-2024/CVE-2024-540xx/CVE-2024-54003.json) (`2024-11-27T17:15:15.333`)
- [CVE-2024-54004](CVE-2024/CVE-2024-540xx/CVE-2024-54004.json) (`2024-11-27T17:15:15.443`)
- [CVE-2024-7025](CVE-2024/CVE-2024-70xx/CVE-2024-7025.json) (`2024-11-27T18:15:18.420`)
- [CVE-2024-9369](CVE-2024/CVE-2024-93xx/CVE-2024-9369.json) (`2024-11-27T18:15:18.560`)
### CVEs modified in the last Commit
Recently modified CVEs: `112`
Recently modified CVEs: `30`
- [CVE-2024-50272](CVE-2024/CVE-2024-502xx/CVE-2024-50272.json) (`2024-11-27T15:54:32.213`)
- [CVE-2024-50273](CVE-2024/CVE-2024-502xx/CVE-2024-50273.json) (`2024-11-27T15:58:02.730`)
- [CVE-2024-50274](CVE-2024/CVE-2024-502xx/CVE-2024-50274.json) (`2024-11-27T15:59:35.733`)
- [CVE-2024-50275](CVE-2024/CVE-2024-502xx/CVE-2024-50275.json) (`2024-11-27T16:16:53.177`)
- [CVE-2024-50277](CVE-2024/CVE-2024-502xx/CVE-2024-50277.json) (`2024-11-27T15:30:55.840`)
- [CVE-2024-50278](CVE-2024/CVE-2024-502xx/CVE-2024-50278.json) (`2024-11-27T16:00:23.223`)
- [CVE-2024-50279](CVE-2024/CVE-2024-502xx/CVE-2024-50279.json) (`2024-11-27T16:01:09.817`)
- [CVE-2024-50284](CVE-2024/CVE-2024-502xx/CVE-2024-50284.json) (`2024-11-27T16:20:08.917`)
- [CVE-2024-50285](CVE-2024/CVE-2024-502xx/CVE-2024-50285.json) (`2024-11-27T15:31:58.063`)
- [CVE-2024-50288](CVE-2024/CVE-2024-502xx/CVE-2024-50288.json) (`2024-11-27T15:32:45.147`)
- [CVE-2024-50291](CVE-2024/CVE-2024-502xx/CVE-2024-50291.json) (`2024-11-27T15:16:30.260`)
- [CVE-2024-50296](CVE-2024/CVE-2024-502xx/CVE-2024-50296.json) (`2024-11-27T15:24:16.020`)
- [CVE-2024-50297](CVE-2024/CVE-2024-502xx/CVE-2024-50297.json) (`2024-11-27T15:25:04.810`)
- [CVE-2024-50298](CVE-2024/CVE-2024-502xx/CVE-2024-50298.json) (`2024-11-27T15:25:38.023`)
- [CVE-2024-50302](CVE-2024/CVE-2024-503xx/CVE-2024-50302.json) (`2024-11-27T15:27:00.187`)
- [CVE-2024-52323](CVE-2024/CVE-2024-523xx/CVE-2024-52323.json) (`2024-11-27T15:15:26.377`)
- [CVE-2024-53044](CVE-2024/CVE-2024-530xx/CVE-2024-53044.json) (`2024-11-27T16:40:06.963`)
- [CVE-2024-53045](CVE-2024/CVE-2024-530xx/CVE-2024-53045.json) (`2024-11-27T16:41:06.737`)
- [CVE-2024-53079](CVE-2024/CVE-2024-530xx/CVE-2024-53079.json) (`2024-11-27T16:59:20.303`)
- [CVE-2024-53080](CVE-2024/CVE-2024-530xx/CVE-2024-53080.json) (`2024-11-27T16:57:47.947`)
- [CVE-2024-53081](CVE-2024/CVE-2024-530xx/CVE-2024-53081.json) (`2024-11-27T16:56:35.143`)
- [CVE-2024-53603](CVE-2024/CVE-2024-536xx/CVE-2024-53603.json) (`2024-11-27T16:15:14.583`)
- [CVE-2024-53673](CVE-2024/CVE-2024-536xx/CVE-2024-53673.json) (`2024-11-27T16:15:14.783`)
- [CVE-2024-53975](CVE-2024/CVE-2024-539xx/CVE-2024-53975.json) (`2024-11-27T15:15:26.923`)
- [CVE-2024-9413](CVE-2024/CVE-2024-94xx/CVE-2024-9413.json) (`2024-11-27T16:15:15.180`)
- [CVE-2024-11694](CVE-2024/CVE-2024-116xx/CVE-2024-11694.json) (`2024-11-27T17:15:09.703`)
- [CVE-2024-11695](CVE-2024/CVE-2024-116xx/CVE-2024-11695.json) (`2024-11-27T17:15:09.867`)
- [CVE-2024-29292](CVE-2024/CVE-2024-292xx/CVE-2024-29292.json) (`2024-11-27T17:15:10.383`)
- [CVE-2024-33439](CVE-2024/CVE-2024-334xx/CVE-2024-33439.json) (`2024-11-27T17:15:11.093`)
- [CVE-2024-37782](CVE-2024/CVE-2024-377xx/CVE-2024-37782.json) (`2024-11-27T17:15:11.320`)
- [CVE-2024-39707](CVE-2024/CVE-2024-397xx/CVE-2024-39707.json) (`2024-11-27T18:15:09.190`)
- [CVE-2024-44758](CVE-2024/CVE-2024-447xx/CVE-2024-44758.json) (`2024-11-27T18:15:13.007`)
- [CVE-2024-44786](CVE-2024/CVE-2024-447xx/CVE-2024-44786.json) (`2024-11-27T17:15:11.767`)
- [CVE-2024-46055](CVE-2024/CVE-2024-460xx/CVE-2024-46055.json) (`2024-11-27T18:15:13.300`)
- [CVE-2024-49592](CVE-2024/CVE-2024-495xx/CVE-2024-49592.json) (`2024-11-27T17:15:12.093`)
- [CVE-2024-50657](CVE-2024/CVE-2024-506xx/CVE-2024-50657.json) (`2024-11-27T17:15:12.323`)
- [CVE-2024-50672](CVE-2024/CVE-2024-506xx/CVE-2024-50672.json) (`2024-11-27T17:15:12.563`)
- [CVE-2024-51163](CVE-2024/CVE-2024-511xx/CVE-2024-51163.json) (`2024-11-27T18:15:17.760`)
- [CVE-2024-51330](CVE-2024/CVE-2024-513xx/CVE-2024-51330.json) (`2024-11-27T17:15:12.973`)
- [CVE-2024-5217](CVE-2024/CVE-2024-52xx/CVE-2024-5217.json) (`2024-11-27T18:56:05.783`)
- [CVE-2024-52726](CVE-2024/CVE-2024-527xx/CVE-2024-52726.json) (`2024-11-27T17:15:13.463`)
- [CVE-2024-5274](CVE-2024/CVE-2024-52xx/CVE-2024-5274.json) (`2024-11-27T18:12:51.690`)
- [CVE-2024-52771](CVE-2024/CVE-2024-527xx/CVE-2024-52771.json) (`2024-11-27T17:15:14.017`)
- [CVE-2024-52787](CVE-2024/CVE-2024-527xx/CVE-2024-52787.json) (`2024-11-27T17:15:14.397`)
- [CVE-2024-53438](CVE-2024/CVE-2024-534xx/CVE-2024-53438.json) (`2024-11-27T17:15:14.647`)
- [CVE-2024-53556](CVE-2024/CVE-2024-535xx/CVE-2024-53556.json) (`2024-11-27T17:15:14.917`)
- [CVE-2024-53635](CVE-2024/CVE-2024-536xx/CVE-2024-53635.json) (`2024-11-27T18:15:18.130`)
- [CVE-2024-53916](CVE-2024/CVE-2024-539xx/CVE-2024-53916.json) (`2024-11-27T17:15:15.127`)
- [CVE-2024-5910](CVE-2024/CVE-2024-59xx/CVE-2024-5910.json) (`2024-11-27T17:23:02.910`)
- [CVE-2024-7971](CVE-2024/CVE-2024-79xx/CVE-2024-7971.json) (`2024-11-27T17:21:35.077`)
## Download and Usage

View File

@ -59865,7 +59865,7 @@ CVE-2013-2247,0,0,a10b84eda5fa7eb734e33c7cae421c90ff553a774cad253490f06fc9dce043
CVE-2013-2248,0,0,db47a0c3293ec2dd123a04e49765beb89d0ea2754f09eedf09c35fe9e65138cc,2024-11-21T01:51:19.700000
CVE-2013-2249,0,0,3a41ebb91ce6b776aa90b527ce2803bdfd5245ae24b381d393ad332646438452,2024-11-21T01:51:19.820000
CVE-2013-2250,0,0,7f772082e082077e836901879b25669c10937d72ff53db0068dc96e1c715f558,2024-11-21T01:51:19.960000
CVE-2013-2251,0,1,cb81077bc13f20bba05ab0f70fbfc515337e0f9a18d8bae8050184508c360e7b,2024-11-27T16:07:37.487000
CVE-2013-2251,0,0,cb81077bc13f20bba05ab0f70fbfc515337e0f9a18d8bae8050184508c360e7b,2024-11-27T16:07:37.487000
CVE-2013-2252,0,0,d504525db46d457241326a706b7130374206cc134c39d971c900a0f8d539cec8,2023-11-07T02:14:59.717000
CVE-2013-2254,0,0,5cf5b5b856b10c47cba563b663ef5422a0ee73c3ec411af2cc3edbd10864e5ff,2024-11-21T01:51:20.260000
CVE-2013-2255,0,0,9b42aa4a1aae53cddbe680e647a582ce681ee55342741072a9fb46fa64a1d2b7,2019-11-07T19:38:40.460000
@ -140594,7 +140594,7 @@ CVE-2019-5474,0,0,5fb8feb22bb226f75e30a0f81a9ceafd2008685b8356c3bc7c4861b1ef4b94
CVE-2019-5475,0,0,3a6d24ef29507296acaed35d9270cd4397f7d843d17351c2675f0e6a3549c663,2024-11-21T04:45:00.383000
CVE-2019-5476,0,0,abe3109a12786693c64912679e7833957e834495913b2974aa811e3248283962,2024-11-21T04:45:00.500000
CVE-2019-5477,0,0,6c998f73dc0b4e6543bf2793d4f9ad3c5d2236c0db7865fb21829a0d51b39d2b,2024-11-21T04:45:00.610000
CVE-2019-5478,0,1,1e4dfbda2c81e9947ab6f2c2fe5cba6212b5bc721d1047ed0661206bc01e067b,2024-11-27T16:10:16.277000
CVE-2019-5478,0,0,1e4dfbda2c81e9947ab6f2c2fe5cba6212b5bc721d1047ed0661206bc01e067b,2024-11-27T16:10:16.277000
CVE-2019-5479,0,0,671a7db6dc33f75942b0c5411e1316fdfeb82e1059486f36fc2e732d8377a07a,2024-11-21T04:45:00.860000
CVE-2019-5480,0,0,e221a380042cba5792ad957a8260eeb6873766dd55c7b03160b2dc867b701e04,2024-11-21T04:45:00.980000
CVE-2019-5481,0,0,c03bb8b3aca95044cdb92030418c28a03cc1285d1b3ca9899b69cbd0fbcd4c1c,2024-11-21T04:45:01.090000
@ -143852,7 +143852,7 @@ CVE-2019-9574,0,0,316deaf2d25dccba3bb59ef295fb782bb276fe0e2b66e887a55c66a6333ebc
CVE-2019-9575,0,0,67810d9892a7c3ce763867a23c2c4244fe1f351cd72dcc6e4cfde299be61b43d,2024-11-21T04:51:53.153000
CVE-2019-9576,0,0,6f89f15af8b515fc37e131c03aad13a1f9130f82a02809e91e9867f73ce3c2fa,2024-11-21T04:51:53.293000
CVE-2019-9578,0,0,614fe324eb35dddb6670619017353a2558fc6306d0bdab852d7692fdb1783015,2024-11-21T04:51:53.433000
CVE-2019-9579,0,1,7d18dae679cc7abd9e20cca009c87dfdd33ea8855fa30d3d4898d0d85c52317b,2024-11-27T16:07:37.487000
CVE-2019-9579,0,0,7d18dae679cc7abd9e20cca009c87dfdd33ea8855fa30d3d4898d0d85c52317b,2024-11-27T16:07:37.487000
CVE-2019-9580,0,0,c2b20fbc6ffeaad29aff28b3bf54c50bbbb738f9617b82666a1e1759bbc1cd5f,2024-11-21T04:51:53.740000
CVE-2019-9581,0,0,77ff02a1ab8993034c150b4f9e140deae8964a2590beb0caf436bb6575040988,2024-11-21T04:51:53.887000
CVE-2019-9582,0,0,dee06250f9c91d49e045abdac49e4895c92760eba6b2f0b563077292b5e6b3ef,2024-11-21T04:51:54.033000
@ -212350,7 +212350,7 @@ CVE-2022-48501,0,0,2ce9e9f27e5624c5b9034e55cb8c3312f95af434a7619ff63718f6f73419a
CVE-2022-48502,0,0,205af0b70d685f82d120f2bc75263f88a4640d5dd078fb9eb4b11185369dc047,2023-12-15T15:47:33.157000
CVE-2022-48503,0,0,de270207fccacc5f4f1e232440dfc1cff9308bc2f2f94c8f081d05f3c0662e56,2023-08-19T00:42:35.700000
CVE-2022-48504,0,0,8aa3ba2d182d2c9f12d05ddee2429ed23b5c2b04fb0651ec2097d7dffc13f9c4,2024-01-17T17:53:36.217000
CVE-2022-48505,0,1,5f3cb211c9bfbabf92ef9a5f9f86fda7c50566ffef0a43661562171697633f57,2024-11-27T15:15:21.747000
CVE-2022-48505,0,0,5f3cb211c9bfbabf92ef9a5f9f86fda7c50566ffef0a43661562171697633f57,2024-11-27T15:15:21.747000
CVE-2022-48506,0,0,5b723496c06b917967011fa23c5ccc2c041a7eb4feaa05105a5551eb3d763c91,2023-07-07T15:05:08.913000
CVE-2022-48507,0,0,348e337d6705da85f45d02609bf25a874e522c08ccf7c421db9201b576074a84,2023-07-12T19:20:32.090000
CVE-2022-48508,0,0,0dce358aeb5fecd97f6cf0f63f6326be86af6ccdd95bb0454cbed733fa5a326b,2023-07-12T19:25:17.467000
@ -213110,7 +213110,7 @@ CVE-2023-0159,0,0,0f6fd55c120318dcef07ff789a61b56634708ba05cdc2c5c90bc468904524a
CVE-2023-0160,0,0,09a7027c859003cd69a1385cc1382972c3bab997f733f848d51a31fefb6fb5af,2023-11-07T03:59:46.343000
CVE-2023-0161,0,0,2d565afc2a392d75d863e5fdf784db6696b2ebade8f447f4c56c766437755f79,2023-11-07T03:59:46.593000
CVE-2023-0162,0,0,433d2d12790885c810d4fa03f75cc93897d0ad22856762b3207cc99a781813da,2023-11-07T03:59:47.037000
CVE-2023-0163,0,1,5360902169a616d3b19bf9dc9faa9a1efedd78f45a7ac1ee57e19dbea2141dc4,2024-11-27T16:15:06.757000
CVE-2023-0163,0,0,5360902169a616d3b19bf9dc9faa9a1efedd78f45a7ac1ee57e19dbea2141dc4,2024-11-27T16:15:06.757000
CVE-2023-0164,0,0,56b714ab48298f96034c3fd165df9da114ff92034fa2e1a03fdc9d853978e2ec,2023-01-28T03:37:57.693000
CVE-2023-0165,0,0,441c64ff3d96cd77f0a64b6021d8520baa90e0a13398043debff7990bd94d140,2023-11-07T03:59:47.380000
CVE-2023-0166,0,0,a627a63e43014228e0118c8847152cec6a6ad0f5f2d9646ccac489fb22695346,2023-11-07T03:59:47.623000
@ -215223,7 +215223,7 @@ CVE-2023-2057,0,0,165de0432b11bd80f63253d5d39a7d757e7675722f3efa39f94976905406f4
CVE-2023-20570,0,0,d393e6ba70af93bcb0478ae4bc75964bab1735c72f61228d038d7f06a285faf7,2024-10-17T14:34:52.950000
CVE-2023-20571,0,0,96f212f661726a3c476a2fb295d8da706572d89ee10f136777356539fdf55e7c,2023-11-28T18:05:25.177000
CVE-2023-20573,0,0,ad0019707ea1d3be9aafe200900d990babb7fbdcc22ca2cce433aaa0fd946615,2024-01-18T17:39:02.430000
CVE-2023-20575,0,1,d454030d808802a4dcec640f81d272aa7c4135f2a2dc62f9cf54b366e4182643,2024-11-27T16:15:08.010000
CVE-2023-20575,0,0,d454030d808802a4dcec640f81d272aa7c4135f2a2dc62f9cf54b366e4182643,2024-11-27T16:15:08.010000
CVE-2023-20578,0,0,e2aae81ed2b9fe5469de595a7d4e7bc7f74e6a04f637c722d6521fd97e68f844,2024-10-02T17:35:44.117000
CVE-2023-20579,0,0,eea7d065ebbf11ab22ecb2642783f4f7c9c750dc05223a19e0db0ab258a097d2,2024-10-22T13:33:02.690000
CVE-2023-2058,0,0,0c817ab6ea98d27963a0bdd6b94d4e88089c1ee4704beb5ad1d7199dfd901fb8,2024-05-17T02:22:37.783000
@ -216086,7 +216086,7 @@ CVE-2023-21416,0,0,6dffe28851c91ee18ceb35579fd29bf8f9a56312fe83491e09cbc3b40f8af
CVE-2023-21417,0,0,7d15ce5e3918d9a1b0fa653399fe5450bd6690398fe838839d69e00df17bc67a,2024-11-08T09:15:06.277000
CVE-2023-21418,0,0,cc5acdfd8b96726f57b1246a5c5711431cf7fe80fee9f7109425e08575cd3d20,2024-11-08T09:15:06.453000
CVE-2023-21419,0,0,45ff905fd2374d2820c27347193893ca16be1c6d6d9cda5e8f57ac5821898928,2023-11-07T04:06:35.657000
CVE-2023-2142,0,0,1d48eaf915395dbd32516659db7c49e6d178aaca35f613a3e888c90805a8cb99,2024-11-26T12:15:18.307000
CVE-2023-2142,0,1,9e24b63241ce49f973c1a3e9868e31c1395f0909f2faf381ff0f9fd71552f4ab,2024-11-27T17:15:05.200000
CVE-2023-21420,0,0,d82fcd1e46c8dac8582cb3dd087d4ad4d83f57df0f5c8e21a51e9da90cd5441d,2023-02-17T20:21:02.333000
CVE-2023-21421,0,0,733d09550bbe5bab0dce2921db71c5a7f0b9d54c2679b9cb2f268974bca05ad5,2023-02-21T16:04:38.190000
CVE-2023-21422,0,0,2a2fed08bbd0ca52dd22841f89b331fa629b94088c7bced8d629c703c6c7e766,2023-02-21T16:13:30.213000
@ -216496,7 +216496,7 @@ CVE-2023-2183,0,0,31d5869356e64f9f6c09d96859bf633a59be491e3337931ca8ab60cf8ede5f
CVE-2023-21830,0,0,56670845d6f991f1ebb6f5e910a5362188b55e02c6144fabf835b6cedfd04d57,2024-01-17T15:15:10.047000
CVE-2023-21831,0,0,40612f2418cf1d5fe8671c7086162c026d237b011a6f1859f6bfa53b791be71c,2023-01-24T19:26:29.237000
CVE-2023-21832,0,0,ddcbe44e57fa0502c697c9e1375ef658e0ee7b48163117c323038199ead7199d,2024-09-17T14:35:03.410000
CVE-2023-21833,0,1,e9236bab6dcd9d94ec0aa973c6e3f060cff0a360fc17c511477cd5d36e41be31,2024-11-27T16:32:16.700000
CVE-2023-21833,0,0,e9236bab6dcd9d94ec0aa973c6e3f060cff0a360fc17c511477cd5d36e41be31,2024-11-27T16:32:16.700000
CVE-2023-21834,0,0,b24d4ab7c8bbc799ac73336d479efcd8846b344534dfd23f5ee9e4c15311b2d8,2023-01-24T19:27:33.833000
CVE-2023-21835,0,0,e438453c05d0ac37a8dbebcb8cd50ddd6e38670993d51927e38ec2ac6343ff57,2024-01-17T15:15:10.157000
CVE-2023-21836,0,0,c3cecb219c742fa03a835e3e671e7b8a3e8841c61a101c801b316bd594712266,2023-01-24T19:28:01.793000
@ -224090,7 +224090,7 @@ CVE-2023-31315,0,0,44428fbe3e922a7707ac2901dc10ee48452105458214ad8f550b81ed93b19
CVE-2023-3132,0,0,52ab34552d4912b51189535960f33c42d601a676c80cf99d393d54a820deb2f0,2023-11-07T04:17:58.010000
CVE-2023-31320,0,0,94626c9fd18f585c07331302f269c549777a5d34517f86a0946e1593aaaba7c1,2023-11-30T15:10:43.827000
CVE-2023-3133,0,0,003d70726348f1765d3e8bbdc7b1fe8c778d5248156227efcf8dfd6079b65e42,2023-11-07T04:17:58.197000
CVE-2023-31339,0,1,55016df2b1f62c6b4660412aa764fde8ebdeabe77b5e76cdf782b4574058e985,2024-11-27T15:55:02.843000
CVE-2023-31339,0,0,55016df2b1f62c6b4660412aa764fde8ebdeabe77b5e76cdf782b4574058e985,2024-11-27T15:55:02.843000
CVE-2023-3134,0,0,56071acdc7623a3f1e8c35f56a75d80cedbc311efc23e7ac51d208245195f557,2023-11-07T04:17:58.303000
CVE-2023-31341,0,0,dd24cf83580387b35de43a1761935afa05605b69789156e33c8226af92558012,2024-08-14T02:07:05.410000
CVE-2023-31346,0,0,baf70a7fbcbac8ee2109bb0ede410a1f9d8a0f3d16eca151ea162e0c8735e373,2024-10-24T15:22:58.270000
@ -224682,7 +224682,7 @@ CVE-2023-3222,0,0,c8596742688ff4f4ce34cba08b6e87b6035a92b437604e378530583c1e50c7
CVE-2023-32220,0,0,6598ffdb4be98a86b0968f5fa647835aeef5d462978de06a276b077763ea318a,2023-06-27T13:10:22.060000
CVE-2023-32221,0,0,a8096a0f62324cd5523fa36c53eba2b8e14dda932ec9e56d4c5a1ef1e4f5bb61,2023-06-26T15:43:42.757000
CVE-2023-32222,0,0,1bfffb24c78c59e1305082020bf9bea5ed51017055bcc40fffbb1d815e803550,2023-07-06T15:34:43.723000
CVE-2023-32223,0,0,1d299b31efb215e705607460f6fb8a4876f1de490a061e8af9d146f08c171d0b,2023-07-06T15:33:10.737000
CVE-2023-32223,0,1,917c1b5258b903e7b790f68cd6060630779eb688b3bea354bbc98d7b17f4b584,2024-11-27T17:15:05.937000
CVE-2023-32224,0,0,93e7fba8e52643b83f12b886ffdbf97b296d423ce997520665ec6ec0f71b4ff0,2023-07-06T15:22:40.277000
CVE-2023-32225,0,0,c772567b1dfc8e5c4d6aef4e997633a6cfcdcec2ddfba65ca031cfb7841ffea6,2023-08-03T20:46:02.310000
CVE-2023-32226,0,0,06d72d0f875d49d0ca2e061add683154237421da117704275da69a03e0bb6b79,2023-08-03T20:49:39.170000
@ -225067,7 +225067,7 @@ CVE-2023-32609,0,0,ad071be644dccdc78aa42759730857bc4ab0c387f7bceece5cb15f95cfcb0
CVE-2023-3261,0,0,d804b7306842f46510218e49ca93d047e78fc5a76c2a2a392f7a191cee62ed7b,2023-08-25T06:15:08.990000
CVE-2023-32610,0,0,4805853c5e520c87eda77ebca6be0653ac150f2f5318e9b6843d232507ac587c,2023-07-07T14:55:04.910000
CVE-2023-32611,0,0,74fa864c3b0f5c42d618b0d11300f9fbf0cea9afed15dc7a7a5c9e543c558545,2023-11-27T14:15:07.713000
CVE-2023-32612,0,1,48946b265a891ee8ddf06d198ba3756972109e4c356751ada0c06a41b3d405d2,2024-11-27T16:15:09.290000
CVE-2023-32612,0,0,48946b265a891ee8ddf06d198ba3756972109e4c356751ada0c06a41b3d405d2,2024-11-27T16:15:09.290000
CVE-2023-32613,0,0,f496d4da1cd36ddca38689cd4e5a8ec5895c11b2c4638bc17410c3085a39d4be,2023-07-06T23:38:05.257000
CVE-2023-32614,0,0,a784f55ff10684ff0982e590005de61c2c9f48fb842d9b782491c6446577db06,2023-09-26T14:44:23.657000
CVE-2023-32615,0,0,091c09c0f2f1329fa59c5332eabb3854daaef309b38ebf1cc8ec5795c893e63f,2023-09-08T17:23:31.060000
@ -225688,7 +225688,7 @@ CVE-2023-33293,0,0,aaba53a5bd9606bf2b9ebb8058082a8f9430e4008d1677208c38c998718dc
CVE-2023-33294,0,0,512a0d802975effda47c9841c790a12db90febf30fa9787f8f1a643f5cf3846e,2023-05-30T15:34:50.353000
CVE-2023-33295,0,0,0ee9ce4891974281a8070ba77006ee5030b6c04f0180cf6fd5145d66b4777c49,2024-01-30T14:29:36.033000
CVE-2023-33297,0,0,5d8e3948533e1bd4647cd5fad08a17be514bf07df635b4c9679a8f82e9ab850f,2023-11-07T04:14:49.637000
CVE-2023-33298,0,0,2fe7f04c1eab70841d9fb3a8eea01477b543419ec1b2f605e6f740214038e540,2023-08-02T15:40:35.783000
CVE-2023-33298,0,1,e6807bb120ed528f6bb6a498cf3fde144b5e9bbb47f26a66ce325564392ac08a,2024-11-27T17:15:06.230000
CVE-2023-33299,0,0,38c7cbf55f696320e4e04abc250ce3163757543b746f0dff08506567861aa8c4,2023-11-07T04:14:50.620000
CVE-2023-3330,0,0,b62b544dba0e5d46d39d4efdc53e6faa4883ab9f19a259cae52d022b97d4c1b2,2023-08-28T01:15:09.643000
CVE-2023-33301,0,0,39458e4f7d0ff50d22acdf1137008f959df75babe7c5e030172d43b12d7ea61d,2023-11-07T04:14:50.840000
@ -225847,7 +225847,7 @@ CVE-2023-33567,0,0,6f8070242f0b52f35467ff6fa5967af9712ffd9e8a51a555b37438dd5b9a2
CVE-2023-33568,0,0,cf9d1d831d747564c354f3c033b6b23993269e0b62f44d9030fcb701e027e8cd,2023-06-23T19:22:43.680000
CVE-2023-33569,0,0,4fadfbd06c77e9caa9b26894eaee099724d33670c303b72aa0401d276bd24594,2023-06-13T15:17:31.487000
CVE-2023-3357,0,0,600350ce8cb54d3cd472e5c55fbe0564cc7d45cade0900caff64a5b44a256810,2023-07-06T17:45:06.373000
CVE-2023-33570,0,0,9f2846f85e3716647871afc65ae46c02368acab156056b82c3fabd74ffe466ea,2023-07-10T15:53:05.990000
CVE-2023-33570,0,1,85cf59e7d43d3b836fbc8ade873b57bf05e4ee43d634b3bb632c5499b8726f78,2024-11-27T17:15:06.687000
CVE-2023-3358,0,0,12e8757394b39f03915a68fdab7c57a08d2dd1a06e5f61eff9ec3fcd54fa4870,2023-07-06T16:54:55.357000
CVE-2023-33580,0,0,b896a7d26da1c4a99df4635960a09e8061b54d8b1045b27b06cfff27cfdd8bba,2024-05-14T13:14:08.210000
CVE-2023-33584,0,0,a1f261b95d9793aa4dc94db58be1fdcb1978b62cb448302d23854fb5713a34a5,2024-08-01T13:43:52.090000
@ -226065,7 +226065,7 @@ CVE-2023-33901,0,0,b52f1f5caa1a71ed7a3660093cc4ff625ef81a8e57103b9446f0f02ece8bc
CVE-2023-33902,0,0,1f72efc992411950d4d63edd663b409a9ade365735b2775ffa85420fe4c927ca,2023-07-18T22:36:36.170000
CVE-2023-33903,0,0,bf0c0fe257ca77843a093950bb190c96a208d3b02a2bcd1d680822b64738667d,2023-07-20T01:36:29.007000
CVE-2023-33904,0,0,6e8a8301f0e61237f25896ca44140a1d4f7967d97bc04b883674717a6a107b2d,2023-07-20T01:35:11.450000
CVE-2023-33905,0,1,3882940bca949272cdc0ab5501ce367e34d2e67106917040374664dcaec9f19a,2024-11-27T16:15:09.610000
CVE-2023-33905,0,0,3882940bca949272cdc0ab5501ce367e34d2e67106917040374664dcaec9f19a,2024-11-27T16:15:09.610000
CVE-2023-33906,0,0,b1fda6b482ccab08c128646d84ad63d5547dd2cdde95cd6c340c4b80c19d5152,2023-08-09T20:54:32.290000
CVE-2023-33907,0,0,0896c19ffe04302fbacdfd4d930e7c33a3432c132a214e05ee871524bc106cec,2023-08-10T14:34:54.647000
CVE-2023-33908,0,0,b3731c5f6811d32e1adc6f5d15e5d493af862305160e34132f162715c6497284,2023-08-10T14:35:29.667000
@ -226703,9 +226703,9 @@ CVE-2023-34650,0,0,46b1353cbe03e4c1538a32beef8802bfa42c2c9854cc529e5731b6e7d7182
CVE-2023-34651,0,0,5959bd81f87f39b6a741a557c197abf7cfde59289b5de1b43248b87a5096a9b2,2023-07-06T15:20:42.360000
CVE-2023-34652,0,0,ff947ab860e6120f91e1ca4194d5faab5f86cfd204d0f2ad3e79e4f916272714,2023-11-14T16:36:13.640000
CVE-2023-34654,0,0,f66c971439f3d88246860b7a3a652cadf1cbfd9e1ca8fe442fb861d6292aa4c2,2023-07-10T13:59:13.440000
CVE-2023-34656,0,1,e8b18d7acdb5258f3011a99a900cbe8bfa5fd0f3cc49dbc6fa2a9cf2299236ff,2024-11-27T15:15:23.147000
CVE-2023-34656,0,0,e8b18d7acdb5258f3011a99a900cbe8bfa5fd0f3cc49dbc6fa2a9cf2299236ff,2024-11-27T15:15:23.147000
CVE-2023-34657,0,0,9dd1a5c53b7f66fcfe0cf1eaa53a71cc0b26fea430cf6b68cbb074f7dc660b05,2023-06-26T16:26:30.057000
CVE-2023-34658,0,1,7e79f39e62fba74cd049d08fa473d9537b089c09510e99356df90f937c1a76b3,2024-11-27T15:15:23.273000
CVE-2023-34658,0,0,7e79f39e62fba74cd049d08fa473d9537b089c09510e99356df90f937c1a76b3,2024-11-27T15:15:23.273000
CVE-2023-34659,0,0,ba101ae9a9a6d722b772e73640680e94739c59a5da3aff941bdbae8a23637381,2023-06-23T21:25:28.887000
CVE-2023-3466,0,0,6a83488758d15c147555e0ff29ed8d720348c008e9c4c1415429f70acbabdc3e,2023-07-28T14:54:11.013000
CVE-2023-34660,0,0,3fdae79286adb78105725fa2e0c187c138f0137808c41ee9fccc354d7a02987e,2023-06-23T21:24:20.913000
@ -226741,7 +226741,7 @@ CVE-2023-34755,0,0,385ddc4387bd2c5755a94a75b434dd76b08bdc268129c955503dc27a0b6fe
CVE-2023-34756,0,0,67d55fee96d1b51f968d7da1697b8e11bb66c530139f57a3e78910d0e6a0d8f6,2023-06-17T03:06:43.303000
CVE-2023-34758,0,0,9eccc6d37c9b088248c8aca33c8aa8875c2b998c800435e2964ecc87b1b82cbf,2023-09-12T19:39:31.640000
CVE-2023-3476,0,0,cd288e67143a643dc4edcffdb16b25dd34c6d270b5aedde5ea5a4f03a4a84a3a,2024-05-17T02:27:31.387000
CVE-2023-34761,0,1,3fe72814266bd2f80524fddb8c8dc6ef5b680196079b43a9740a275231cf8871,2024-11-27T15:15:23.460000
CVE-2023-34761,0,0,3fe72814266bd2f80524fddb8c8dc6ef5b680196079b43a9740a275231cf8871,2024-11-27T15:15:23.460000
CVE-2023-3477,0,0,5d5692f0acf1fc9588440776a9873fa73da1512d4616d99905805ac7fd5efa4b,2024-05-17T02:27:31.490000
CVE-2023-3478,0,0,62ca4275c323b059845d588a6c85dcf0f11942cddcb4326cfb1cfa138f569fcf,2024-05-17T02:27:31.600000
CVE-2023-3479,0,0,d48f4215051968fbed645a509aadd86b9d129cff011d403b6f18727633f3065c,2023-07-06T18:50:34.680000
@ -227346,7 +227346,7 @@ CVE-2023-35826,0,0,5e43d2b4a6463cc57618d690e3eaa3dcf112fab46da37bf46c4f66930757d
CVE-2023-35827,0,0,d5267cc8e5ff57341217408bcba76fb2af5741e775cc4e40c4f4580831015c03,2024-01-11T21:15:10.180000
CVE-2023-35828,0,0,13a84b4d359f0a7a20df266cb8df7b222b35808e6042143114f3f2068e115b32,2024-10-21T16:35:06.073000
CVE-2023-35829,0,0,d781a1cc18b7b1a4d19b03bc7b61ddc2d06f09ba27700d26ab277831cd36e00e,2024-02-09T19:13:28.167000
CVE-2023-35830,0,0,09da6f1a46d1525d1cd80ca8705371b308db2bbf6135eddd66de8da296e8cbe7,2023-07-11T19:25:28.647000
CVE-2023-35830,0,1,f9ec7bc37d75084b8f9adb19576e522ba0ca1eac41387899bac0f91ba3a89a7b,2024-11-27T17:15:08.783000
CVE-2023-35833,0,0,b59e0c3549ed415537c60ab0c56af9b7ea9f99c585e3da19da7e86a887a60c5c,2024-08-02T17:15:47.460000
CVE-2023-35835,0,0,87bd672c840261ccc99c9c2d2a50acb2ac1b47f706fdd52b69110ddc2fb55b32,2024-02-06T14:23:41.733000
CVE-2023-35836,0,0,25cc78294cec9506c0321746b6fae3d5b11d667157223d96a0d913704cd8ac87,2024-10-28T19:35:06.850000
@ -239335,15 +239335,15 @@ CVE-2023-52341,0,0,752ec91f49f7d27aa4aefb97c1028c0e3ba02b8dbe8f5ef4e4a5be61da661
CVE-2023-52342,0,0,d9217e8a43616eb93ae5900a69930974b98e947284e3031e63af0d98b4863568,2024-08-26T14:35:02.157000
CVE-2023-52343,0,0,72f06a8afa822a3024d5a446620d24cff01d97ee834295104d1b734aa9f75e3e,2024-11-04T17:35:08.043000
CVE-2023-52344,0,0,2746ce7294f9dd645e743c241e219d96848cd26c1bbf2a1d45c502d1d5d069c5,2024-11-08T22:35:05.047000
CVE-2023-52345,0,1,9b0f7e720892a08eb597995237cf0041e77eb1cbbac52014266e50a5c094fa0b,2024-11-27T16:22:10.590000
CVE-2023-52345,0,0,9b0f7e720892a08eb597995237cf0041e77eb1cbbac52014266e50a5c094fa0b,2024-11-27T16:22:10.590000
CVE-2023-52346,0,0,abf5870e70e4c81d560fa222012a9514676bbea91379a04e47b0bfe7513e6621,2024-11-04T18:35:03.567000
CVE-2023-52347,0,0,0de571f6617802f0c8b8163db0698d0cafc861c67facc0349aa475f789167481,2024-11-01T15:35:05.800000
CVE-2023-52348,0,0,a78f5b9171ee88d03834f0039162b0633f8a198afe00aea2be4a4f4c2fbe83ff,2024-11-19T22:35:02.473000
CVE-2023-52349,0,1,c2009aaf4ca39771753ae2450dc22d33c3a41dcb584ed395b9b9fb6df6e40ace,2024-11-27T16:22:27.920000
CVE-2023-52349,0,0,c2009aaf4ca39771753ae2450dc22d33c3a41dcb584ed395b9b9fb6df6e40ace,2024-11-27T16:22:27.920000
CVE-2023-5235,0,0,9971c38b51da44a2e87e1667cbf8153f9719c021bb80ee285f53405f1ee2831d,2024-01-11T19:37:47.563000
CVE-2023-52350,0,1,c42ba7ccf7dc545c6f58ac385eeaea84aeaa885e9881355285e36150928c5107,2024-11-27T16:22:44.777000
CVE-2023-52350,0,0,c42ba7ccf7dc545c6f58ac385eeaea84aeaa885e9881355285e36150928c5107,2024-11-27T16:22:44.777000
CVE-2023-52351,0,0,e0d15ad66cd3476de6fb03f1fe5885ce689d572ce17666a9de7d2d70a4aa296a,2024-11-05T17:35:04.513000
CVE-2023-52352,0,1,900de2da6904bba832006209e250a5947f381893191628f8a88415275fc9389c,2024-11-27T16:23:32.247000
CVE-2023-52352,0,0,900de2da6904bba832006209e250a5947f381893191628f8a88415275fc9389c,2024-11-27T16:23:32.247000
CVE-2023-52353,0,0,c85321a66aa40615f097e7c4b005042b61f142e80160f23edcb6164f859777c0,2024-01-29T15:53:20.917000
CVE-2023-52354,0,0,b83a0ae26910aeb4d8be73792a9bb48b3e532279f0f31aeebd210df1fbcb691b,2024-01-29T16:56:40.830000
CVE-2023-52355,0,0,461ea908f7dd6b61786b879539aa67641b818dbc1dc97626ddbece62684b7542,2024-05-17T17:37:57.793000
@ -239514,7 +239514,7 @@ CVE-2023-52532,0,0,299d7cb56f6a6c17487eae201e2d466d368011ffa4a3b859f2f2a268babbf
CVE-2023-52533,0,0,fb87020ed7c8b21a162b2fc06e0a8d5d89d218140fec502190c9fad28717e9e6,2024-10-25T21:35:02.863000
CVE-2023-52534,0,0,7dc9d1c01e69a34629a396cfd8c7fbd7a37026a7d21c7c1a7e3e6c2396f067b0,2024-11-05T20:35:13.253000
CVE-2023-52535,0,0,a8b46149ce833cf00e265bd878fbc4e9f6f9152b7344f1759d13bc7224de07eb,2024-09-06T22:35:00.460000
CVE-2023-52536,0,1,b70e3b9bf9057c72bfb5ecc0e7da9092e715abaaf98d3f4896e1b5f49ed6c77e,2024-11-27T16:23:42.923000
CVE-2023-52536,0,0,b70e3b9bf9057c72bfb5ecc0e7da9092e715abaaf98d3f4896e1b5f49ed6c77e,2024-11-27T16:23:42.923000
CVE-2023-52537,0,0,2559d90b1b1794296f22fc0badef4074c5581bcf37f52502d595b11857600810,2024-08-01T14:35:02.953000
CVE-2023-52538,0,0,9c269667a219bd0a186db35ef8e2818d381c8926a2b266c9f2e28d3c047bb2ee,2024-08-01T13:45:38.693000
CVE-2023-52539,0,0,b821de3cf6dac9b6ca9186886c6757cf361cf7e1b3be10c27145c9e496b92b49,2024-08-15T17:35:01.503000
@ -243454,6 +243454,7 @@ CVE-2024-11150,0,0,a42c681646aa4974b2ce83b0b93c5af4c26316891f1e3dd7bf6a226e6b2cf
CVE-2024-11154,0,0,9c2f24e5b2c6bb0a1acf0aba74e4e593d635b23a924a1df484d24fc0dc0da623,2024-11-20T14:15:17.500000
CVE-2024-11159,0,0,40c853846b1f5260f445d8196c4d1f6aec01e81777411e7a4839d765e27bfc1a,2024-11-26T22:15:17.720000
CVE-2024-1116,0,0,4196b5c71a0d802f4c1e9b3a43ac71c958f929e96b26e1ebb01241c6bd176fa3,2024-05-17T02:35:14.983000
CVE-2024-11160,1,1,c2a00c83ebfc94083c99410ffbf76862f5cddeb9d6f2530e0ed9a430c75b3087,2024-11-27T18:15:08.620000
CVE-2024-11165,0,0,95fe2b7c203ba5cc9c6e4fb2522e665475ea40e75b68e18a56b9dddf3a00ff2f,2024-11-14T16:35:05.493000
CVE-2024-11168,0,0,5e610ba56b770f0c45b8e5f1da8a18409af80ecc6fd32d397017d56ba5ace8ac,2024-11-13T17:01:16.850000
CVE-2024-1117,0,0,0eff4d8f06fdd3645727772834638be79e19128758cbe94b2a8e7a297167b8d0,2024-05-17T02:35:15.090000
@ -243746,24 +243747,24 @@ CVE-2024-11678,0,0,e780942a86d65f83e2cb7cc5d04e0a3676e4919574029bbf616d3d9c8bbb8
CVE-2024-1168,0,0,b74b0b0c267c02c66f0f474186eac7335d29517290a9638a292d9de8edcd7c5d,2024-07-11T02:52:36.687000
CVE-2024-11680,0,0,e59e07fcd0f2caeb9f7525587364f8cd5a94ad91992448a2d5730a3a3fe6f61e,2024-11-26T10:15:04.540000
CVE-2024-1169,0,0,a43d6b50f47e310e039f1575550f9d1fe159a31a77f5a57027ebd3dc489ff540,2024-03-07T13:52:27.110000
CVE-2024-11691,0,1,7a53223ef1bbb0483180a0674c22f2ddfbf700b35cfbc415f7446deb28e06f8a,2024-11-27T16:15:12.330000
CVE-2024-11692,0,1,2e2a368d2bad10eec3d1f66bd6815192775038dd3ccc98b4295042a1e55ff9d0,2024-11-27T16:15:12.530000
CVE-2024-11693,0,1,80e700b6e230fec6589ebebf228f21bbda939aa10d6b9b37eea0a058e654bc27,2024-11-27T16:15:12.753000
CVE-2024-11694,0,0,a6a2c4a535474da2ca567947004ffbecb7b16bb81183cc508d3c10dd53c61627,2024-11-26T14:15:18.943000
CVE-2024-11695,0,0,53a60a574530fe77be7f2d369026b93d8b41334f9e92c8be10e90eb5d3f867f3,2024-11-26T14:15:19.040000
CVE-2024-11691,0,0,7a53223ef1bbb0483180a0674c22f2ddfbf700b35cfbc415f7446deb28e06f8a,2024-11-27T16:15:12.330000
CVE-2024-11692,0,0,2e2a368d2bad10eec3d1f66bd6815192775038dd3ccc98b4295042a1e55ff9d0,2024-11-27T16:15:12.530000
CVE-2024-11693,0,0,80e700b6e230fec6589ebebf228f21bbda939aa10d6b9b37eea0a058e654bc27,2024-11-27T16:15:12.753000
CVE-2024-11694,0,1,8fab8f6682482c80a046d7efcb5d62937e3f2364960b2f04726b7a87f7e40748,2024-11-27T17:15:09.703000
CVE-2024-11695,0,1,923949ea70ffb3960535c924daeac21d36cf8875477a4ac90cebfaddff787cf9,2024-11-27T17:15:09.867000
CVE-2024-11696,0,0,7ab5e962b1864924c9e631a223b7224b844fe8e800da1f91cb3d221520b39912,2024-11-26T14:15:19.143000
CVE-2024-11697,0,1,5748a45bf5b4ab1df9cdc0d9e9aecb8d661d83a718add7c3b7046a7fb75f2393,2024-11-27T16:15:12.927000
CVE-2024-11698,0,1,4794c1cf0af88db81ed7f95cedceea58d59a70d0fc54757fe957e605d54d7ffb,2024-11-27T16:15:13.130000
CVE-2024-11699,0,1,a7ea20a1c54c5589a88b0fef3691aeab09fe6e64b22758a350879ee83ee60e9d,2024-11-27T15:15:24.600000
CVE-2024-11697,0,0,5748a45bf5b4ab1df9cdc0d9e9aecb8d661d83a718add7c3b7046a7fb75f2393,2024-11-27T16:15:12.927000
CVE-2024-11698,0,0,4794c1cf0af88db81ed7f95cedceea58d59a70d0fc54757fe957e605d54d7ffb,2024-11-27T16:15:13.130000
CVE-2024-11699,0,0,a7ea20a1c54c5589a88b0fef3691aeab09fe6e64b22758a350879ee83ee60e9d,2024-11-27T15:15:24.600000
CVE-2024-1170,0,0,ef14266ea2026fd1e77d96d081d12f376a313e532bfd85bbf7562d8a6e990ca2,2024-03-07T13:52:27.110000
CVE-2024-11700,0,1,ceace3355c1afadd3765ff990a47b048411702573d03dfd1ddbe541b66cd2a99,2024-11-27T16:15:13.300000
CVE-2024-11701,0,1,3ce088d891c171dd484e061591f74125e217790d856876ddb068c1435abf2279,2024-11-27T16:15:13.470000
CVE-2024-11702,0,1,13d1f6c9b043e1cf62a5a526ef83139151e2fe50c3be4951aef4463544909f25,2024-11-27T16:15:13.660000
CVE-2024-11700,0,0,ceace3355c1afadd3765ff990a47b048411702573d03dfd1ddbe541b66cd2a99,2024-11-27T16:15:13.300000
CVE-2024-11701,0,0,3ce088d891c171dd484e061591f74125e217790d856876ddb068c1435abf2279,2024-11-27T16:15:13.470000
CVE-2024-11702,0,0,13d1f6c9b043e1cf62a5a526ef83139151e2fe50c3be4951aef4463544909f25,2024-11-27T16:15:13.660000
CVE-2024-11703,0,0,a0aade5966792892c7a69520deed0024219950d9ba72d34090cb3bb1b7974f3a,2024-11-26T14:15:19.810000
CVE-2024-11704,0,1,2b7b550cc939bccaee7258fd0a9f771da470ed456c481083dde13c083b054c7f,2024-11-27T16:15:13.837000
CVE-2024-11705,0,1,b00958231cd75a51aaf41f507045209bb5b601f8c6cb2be613795f56225c7da5,2024-11-27T16:15:14
CVE-2024-11704,0,0,2b7b550cc939bccaee7258fd0a9f771da470ed456c481083dde13c083b054c7f,2024-11-27T16:15:13.837000
CVE-2024-11705,0,0,b00958231cd75a51aaf41f507045209bb5b601f8c6cb2be613795f56225c7da5,2024-11-27T16:15:14
CVE-2024-11706,0,0,1b96fbb1c831be79b72164c44aa56f72093a93485fb6eb748f832788631279b2,2024-11-26T17:15:23.010000
CVE-2024-11708,0,1,5872b1f165a61acebbe70a5730336bc20a16b17ac8491536799290291f1eb8e9,2024-11-27T15:15:24.747000
CVE-2024-11708,0,0,5872b1f165a61acebbe70a5730336bc20a16b17ac8491536799290291f1eb8e9,2024-11-27T15:15:24.747000
CVE-2024-1171,0,0,59f6a72a19a26da04118a5786af1566b99863895f524fbe4b34406571782a615,2024-02-29T13:49:29.390000
CVE-2024-1172,0,0,11b44e5ce5101f5b7c8ab7c5bd49458795761e0ba5cf2024c3b79ca4ef4be57d,2024-02-29T13:49:29.390000
CVE-2024-1173,0,0,d3495940fb5216c0fbed831a88233211893c24cb888781ac48f1d76bb3bc26ba,2024-05-02T18:00:37.360000
@ -243789,7 +243790,8 @@ CVE-2024-1183,0,0,b9ca697d85173799c910606842f064c322818be1aee71b1208c43495b066c0
CVE-2024-1184,0,0,0bd0336a802b5a07ef17cf4c3337487d1573b3f8590cc13c2e3f9ac276b1f143,2024-05-17T02:35:16.900000
CVE-2024-1185,0,0,a60268243ee8d3dcf82e9c185863da8146ac8c49246dc744f2663ef723b40081,2024-06-26T15:15:19.220000
CVE-2024-1186,0,0,b01b3a0462d1f7a1a803ca8f493a6219bd71eed48ddf8d36021e6ca2af3e1767,2024-05-17T02:35:17.110000
CVE-2024-11862,1,1,6d3560dff7bd57ea41736e55020db21367a02a743a7c33eb7522f1239d06cd69,2024-11-27T15:15:25.393000
CVE-2024-11860,1,1,8f2a0fbf19059c6c3c8a5836cc661c7d3bd0f5aaad2633071ac71b0a6a9605c7,2024-11-27T17:15:10.010000
CVE-2024-11862,0,0,6d3560dff7bd57ea41736e55020db21367a02a743a7c33eb7522f1239d06cd69,2024-11-27T15:15:25.393000
CVE-2024-1187,0,0,3fcd8394fe17b53cc850805fb2de93d28c688f808245fcfde96cd99bc903bbab,2024-05-17T02:35:17.220000
CVE-2024-1188,0,0,6744ad4ad1ed370f6488ba44c137b6887619ea6ff1a51ee5f48fd0aec905e09b,2024-05-17T02:35:17.327000
CVE-2024-1189,0,0,b364c59b0d964a14f93b1e1b61d95f98aeb338db4ea440a29e1d18c3cc27c9d5,2024-05-17T02:35:17.427000
@ -245268,26 +245270,26 @@ CVE-2024-20899,0,0,1ea5d3c975e5b8e190a2ecdcdb2ffe2594326badefc6428838ae53a3dbe04
CVE-2024-2090,0,0,fd740e48f3f1bf206125be718e7b11b445beb9b28db87f1795fcc38f51fc8ca6,2024-08-01T12:42:36.933000
CVE-2024-20900,0,0,dd950b876d70624a07b7af1c0b796b44690939cd5e1be274d843ac0163ab8cf9,2024-07-05T17:11:51.040000
CVE-2024-20901,0,0,5f9dc6d7e5ec003b4ebac42377482eb7121a0918aab2f40a5dfa15c434211c61,2024-07-05T17:12:08.827000
CVE-2024-20903,0,1,f1711e5664886d226fb1c0bbb4ffdbab32f883746b840f88fa51affe34bab471,2024-11-27T16:32:13.240000
CVE-2024-20903,0,0,f1711e5664886d226fb1c0bbb4ffdbab32f883746b840f88fa51affe34bab471,2024-11-27T16:32:13.240000
CVE-2024-20904,0,0,2825f92c3d915e6e0f0061d68d884ba2126601eadca29a19874902f94d6a74f0,2024-01-20T18:42:09.760000
CVE-2024-20905,0,0,5cd75db3ce8e0b4ca7eaa1e088847333bbe8ccce7b8db3715e7ea413af7cfaa2,2024-11-13T16:35:09.767000
CVE-2024-20906,0,0,bd717d71015dc5a5435b2e0a0577a3000709ef823cb8b0c048c75367a9de0fe0,2024-01-20T18:41:53.127000
CVE-2024-20907,0,1,6cdedde57bcc7effd23429e9b920893b06b04420594036116dcd9d8e33dd747a,2024-11-27T16:32:05.720000
CVE-2024-20907,0,0,6cdedde57bcc7effd23429e9b920893b06b04420594036116dcd9d8e33dd747a,2024-11-27T16:32:05.720000
CVE-2024-20908,0,0,f48ebbb13e10a919d3724d0ac546c6a4149d41b2169d483ec898b46dd4b06c2b,2024-01-20T18:41:36.717000
CVE-2024-20909,0,1,5c37ae12db791f7a5f17a4b4a68da1e4d0037c5574297a109dcc5e84b0bb1e46,2024-11-27T16:32:02.417000
CVE-2024-20909,0,0,5c37ae12db791f7a5f17a4b4a68da1e4d0037c5574297a109dcc5e84b0bb1e46,2024-11-27T16:32:02.417000
CVE-2024-2091,0,0,63435fbeca7c80879cf4e6a4a5624c08d1bd49b5b35309f8f6c212636e73c360,2024-03-28T12:42:56.150000
CVE-2024-20910,0,0,29a700282ac3c23f3ad340e38887f2bcd46589faa3e2b225d7b99161e42d9cd5,2024-01-23T19:42:19.473000
CVE-2024-20911,0,1,6afa3f4a97fc1808bab0faf3dd86308a391d08a34d4e09627b3ccd7fd05b9c74,2024-11-27T16:31:58.250000
CVE-2024-20911,0,0,6afa3f4a97fc1808bab0faf3dd86308a391d08a34d4e09627b3ccd7fd05b9c74,2024-11-27T16:31:58.250000
CVE-2024-20912,0,0,e4df4470bb555b4c07efdd1d6d27dc7847c1f66a5ee925c32c1f7f702b610f9b,2024-01-23T19:42:12.067000
CVE-2024-20913,0,1,c65d7e17dc913591eb1991838888914f80deb6a0856863b8facc2f59c78ce3e4,2024-11-27T16:31:55.040000
CVE-2024-20913,0,0,c65d7e17dc913591eb1991838888914f80deb6a0856863b8facc2f59c78ce3e4,2024-11-27T16:31:55.040000
CVE-2024-20914,0,0,5fcc977754d6cec15612003989da66d699b4d03dfca24398bd8f26b0bc5e1c40,2024-01-20T18:41:05.227000
CVE-2024-20915,0,0,48635e3f21fd78d508f12f5ee88f082d01cbe44bc77759d7404c6d47358e2a52,2024-08-29T20:35:59.457000
CVE-2024-20916,0,0,fa25cd13f1d5003a9402bf8b2824fbe225d800b2b894fa3cbba3f37644aef975,2024-01-20T18:40:50.423000
CVE-2024-20917,0,1,88063e310fdfa917e1b9d40d36604d772b4b7af571f1dc922f92be5dbb09229a,2024-11-27T16:31:52.210000
CVE-2024-20917,0,0,88063e310fdfa917e1b9d40d36604d772b4b7af571f1dc922f92be5dbb09229a,2024-11-27T16:31:52.210000
CVE-2024-20918,0,0,1f8b1c5c8f27f2bbdd35361436e307f2eb12e55549bc074707cb3c0855b1a1a5,2024-02-15T03:18:09.407000
CVE-2024-20919,0,0,f32b38df4be8d406125d20b81a0a36fea655b3c9d080af0ec28f80feefd5b5f5,2024-02-20T19:51:05.510000
CVE-2024-2092,0,0,a316801cc7dde85dd006820e50100cb21585dd08f10e55e1c16e6ff68463ad93,2024-07-23T17:14:41.963000
CVE-2024-20920,0,1,2c991406da6ae70f9f6e513bfb6b67a971b2ae86d52ed2be7c0d293385e86314,2024-11-27T16:07:37.487000
CVE-2024-20920,0,0,2c991406da6ae70f9f6e513bfb6b67a971b2ae86d52ed2be7c0d293385e86314,2024-11-27T16:07:37.487000
CVE-2024-20921,0,0,f0986262b45e86fd23744f106528549eb9a9e0900294f36e0f89aa1af025a1b7,2024-11-05T16:35:11.067000
CVE-2024-20922,0,0,9dd883413b1ca45dc7c138e52101d4c22dd7eba0af5f925a999c067fb6713829,2024-02-02T17:36:17.387000
CVE-2024-20923,0,0,a934b00b98c73c6c804cd41561d4b37cf6c513d57c870a7d7f13953b985bc1d6,2024-02-20T19:51:05.510000
@ -245314,7 +245316,7 @@ CVE-2024-20942,0,0,138cd75b35d318f86006ff20a4b3b9623740d177f3b79d48f82f62a57936d
CVE-2024-20943,0,0,c893b8e5b6540c97f966b32b9f9335406bebc3fc0fcebe2041732294e6d7a03c,2024-03-12T14:56:31.537000
CVE-2024-20944,0,0,455869c6c4218017ed3052a739e20e96a49e80460128731305c47837c36967b5,2024-01-20T18:33:55
CVE-2024-20945,0,0,c9a7660aedc8461cf49457ff4506ab3c831d2d70e2229c352a5ff786b482ec6f,2024-11-12T19:35:05.470000
CVE-2024-20946,0,1,df3034f1fad61ed84baa5888e8cbfac598e430fe48771252310c446f30669d8c,2024-11-27T16:07:37.487000
CVE-2024-20946,0,0,df3034f1fad61ed84baa5888e8cbfac598e430fe48771252310c446f30669d8c,2024-11-27T16:07:37.487000
CVE-2024-20947,0,0,0a2e4d20648a1d06c26162eb28926c103f307728c3ed375718ac4fd8da927958,2024-02-20T19:51:05.510000
CVE-2024-20948,0,0,12e9e8a4ba5f0d4d5a3ec7d1b0d3211c79a9e2d1eccf174b1829b4aa21974fac,2024-01-20T18:33:19.560000
CVE-2024-20949,0,0,a2a9e2bb1ecc05c1ef53d90345f7a09727513acaa3e67eae682ecc91fa3b450c,2024-02-20T19:51:05.510000
@ -245324,9 +245326,9 @@ CVE-2024-20952,0,0,ee7670e91d33e31160e61df658911f1f989f8a5d8151285943b5c8af49a8a
CVE-2024-20953,0,0,46cccee01b693cef9c9646cac2e0fd84e85cf6e77caa7c1816c2e535a0c5b0f7,2024-02-20T19:51:05.510000
CVE-2024-20954,0,0,57a73413d0e3acca6ee4a29e076cb030f710aa01f467c3e7bf98fabced0d9135,2024-04-17T12:48:31.863000
CVE-2024-20955,0,0,3ef5989170bb1b485154f91fb8591afd4cb71f457c0fd734cc9a4a4e8a7d2a89,2024-02-09T02:26:25.517000
CVE-2024-20956,0,1,78d82b52430d3bd5c36b5846b4138f4e211c247ebf893f680bcabf1f8af52ffe,2024-11-27T16:37:04.993000
CVE-2024-20956,0,0,78d82b52430d3bd5c36b5846b4138f4e211c247ebf893f680bcabf1f8af52ffe,2024-11-27T16:37:04.993000
CVE-2024-20957,0,0,e93e5f63896ca6389639f28c6915c0999c46dc6fe6eef70f268dfc725114f0ba,2024-01-20T18:31:43.287000
CVE-2024-20958,0,1,efd3fe866dd6ac978ea48339b2dd74375e92e3a0c2e0492d39bdbdca54bbfc34,2024-11-27T16:37:02.780000
CVE-2024-20958,0,0,efd3fe866dd6ac978ea48339b2dd74375e92e3a0c2e0492d39bdbdca54bbfc34,2024-11-27T16:37:02.780000
CVE-2024-20959,0,0,65f727318b2446b38daf72eb41cf2e9b4f6d535e05783839d548b8b026463599,2024-01-20T18:31:27.417000
CVE-2024-20960,0,0,010febbf2de2eeb15e19a661a3f5025a963aa8a6df342253dcc279cae1da13d8,2024-02-20T19:51:05.510000
CVE-2024-20961,0,0,1cad69d2442213fdaa659cc4c85bbaf05d35d026075b85bdaedf813ff8fbfb75,2024-02-02T17:36:27.917000
@ -245350,53 +245352,53 @@ CVE-2024-20977,0,0,3be8e35326984bf735a6f48b20180da3c518283b741d291831fba90f42ec9
CVE-2024-20978,0,0,7d695c16c538753b41958698ebecaeec17620ace692b6d6e92b6bcee0dbccbeb,2024-03-01T23:19:21.650000
CVE-2024-20979,0,0,d57b35e6e7dde3fdff99cf29258a92afa9b590a25cc9c2305fb3a5b7f5bc7a9e,2024-01-20T18:30:34.090000
CVE-2024-2098,0,0,796ed6f6c420691b7d2e05f9f2ef2be6fc42adb0713e4dfd37258c395c790683,2024-06-13T18:36:09.010000
CVE-2024-20980,0,1,abde6ecab0a76c34cdd09b34c97cd8350525628bcbe8debc08de3a0bc115e8fa,2024-11-27T16:37:00.523000
CVE-2024-20980,0,0,abde6ecab0a76c34cdd09b34c97cd8350525628bcbe8debc08de3a0bc115e8fa,2024-11-27T16:37:00.523000
CVE-2024-20981,0,0,738d5bf858a7d236d8ca36c0f60d69759a2053056726d2d11c77fa47893de0b7,2024-02-02T17:24:34.507000
CVE-2024-20982,0,1,f87c28901aeea0e5dd67035df643da47399d17872e527cadc5978ee3fcb668f7,2024-11-27T16:36:58.220000
CVE-2024-20982,0,0,f87c28901aeea0e5dd67035df643da47399d17872e527cadc5978ee3fcb668f7,2024-11-27T16:36:58.220000
CVE-2024-20983,0,0,56700ee75dc4016890aa5a0cc71b96eed25889824b578010696ffc98258279e1,2024-02-02T17:27:04.743000
CVE-2024-20984,0,1,59ddd7988f4c87f18f76eebdeb0d759036445e926bdcb1515ffe9fa87d03cb03,2024-11-27T16:36:55.957000
CVE-2024-20984,0,0,59ddd7988f4c87f18f76eebdeb0d759036445e926bdcb1515ffe9fa87d03cb03,2024-11-27T16:36:55.957000
CVE-2024-20985,0,0,d0d044412617729c46a8268c921735bb458fb0fe9ac60eac01f501aeb8cc31ab,2024-02-02T17:27:12.127000
CVE-2024-20986,0,1,6087dcb3b90fcb6ff9e682c89a6638ce3a29264af0095732d921291f4a22d8c3,2024-11-27T16:36:53.537000
CVE-2024-20986,0,0,6087dcb3b90fcb6ff9e682c89a6638ce3a29264af0095732d921291f4a22d8c3,2024-11-27T16:36:53.537000
CVE-2024-20987,0,0,5674babb479962fb00a1daf77527ad0fcadf7deb1dc2f2e21cb99ae36a705876,2024-01-20T18:30:16.877000
CVE-2024-20989,0,1,713513baa3464a81e99a0bb8e30a7b8198551d5abd7c99dd135f5dff2572c1b8,2024-11-27T16:36:51.003000
CVE-2024-20990,0,1,dcd7d39a0ffd7652482a915949bb7e9b369d2287680215279ee5a4bac8701548,2024-11-27T16:36:48.747000
CVE-2024-20989,0,0,713513baa3464a81e99a0bb8e30a7b8198551d5abd7c99dd135f5dff2572c1b8,2024-11-27T16:36:51.003000
CVE-2024-20990,0,0,dcd7d39a0ffd7652482a915949bb7e9b369d2287680215279ee5a4bac8701548,2024-11-27T16:36:48.747000
CVE-2024-20991,0,0,94f0f80e95be2725620dad0c6e5443bdd60acc699a66c91ac7c7279a95dd6e81,2024-08-21T15:35:02.493000
CVE-2024-20992,0,1,ba9800046b8543eaf32ebe0bf6ac96b488e69f6b7913a7d831a97ae919200443,2024-11-27T16:36:46.510000
CVE-2024-20993,0,1,73f1669c85e855fd76979fe84f382e192647648d4f8a2bb0d0085df2877b0bcc,2024-11-27T16:36:44.187000
CVE-2024-20994,0,1,5f7ea9f92d561392870426b5d74a9dfb47bcd28f9445b3d46750647497195eed,2024-11-27T16:36:42.223000
CVE-2024-20995,0,1,01229a4133ced8daa32eab0323077d3b0640a9df62354c85893871947ef19493,2024-11-27T16:37:10.153000
CVE-2024-20992,0,0,ba9800046b8543eaf32ebe0bf6ac96b488e69f6b7913a7d831a97ae919200443,2024-11-27T16:36:46.510000
CVE-2024-20993,0,0,73f1669c85e855fd76979fe84f382e192647648d4f8a2bb0d0085df2877b0bcc,2024-11-27T16:36:44.187000
CVE-2024-20994,0,0,5f7ea9f92d561392870426b5d74a9dfb47bcd28f9445b3d46750647497195eed,2024-11-27T16:36:42.223000
CVE-2024-20995,0,0,01229a4133ced8daa32eab0323077d3b0640a9df62354c85893871947ef19493,2024-11-27T16:37:10.153000
CVE-2024-20996,0,0,fcd2292738608c647a4c519832797e84b76f4989a7b5a3e0a96bd0b4bdb3583b,2024-10-17T17:09:42.857000
CVE-2024-20997,0,1,6fcb219b09789009a115af413ffc8003378371105f5ae76f21264248e97d7ed9,2024-11-27T16:36:39.907000
CVE-2024-20997,0,0,6fcb219b09789009a115af413ffc8003378371105f5ae76f21264248e97d7ed9,2024-11-27T16:36:39.907000
CVE-2024-20998,0,0,45f0642541da0d531c6249ccae4fbcc371dd659326bb9c94a1fffbd680edd27d,2024-07-03T01:46:21.563000
CVE-2024-20999,0,1,8bcb3141c521c3778b23e1f32939058ac6a444098cc39214296b0751762d0919,2024-11-27T16:36:14.473000
CVE-2024-21000,0,1,5046a94a4249afec3f785dd51126c5c8b28718404eba20f1156f4ea76f53b597,2024-11-27T16:36:11.717000
CVE-2024-21001,0,1,416215f17e5ee7b6fd02766a3fe7252d7bc684b3302f3dd4a683e3f6400abefa,2024-11-27T16:36:08.477000
CVE-2024-20999,0,0,8bcb3141c521c3778b23e1f32939058ac6a444098cc39214296b0751762d0919,2024-11-27T16:36:14.473000
CVE-2024-21000,0,0,5046a94a4249afec3f785dd51126c5c8b28718404eba20f1156f4ea76f53b597,2024-11-27T16:36:11.717000
CVE-2024-21001,0,0,416215f17e5ee7b6fd02766a3fe7252d7bc684b3302f3dd4a683e3f6400abefa,2024-11-27T16:36:08.477000
CVE-2024-21002,0,0,7f5c86fdcff82f93225a75a7e73262c6da92b927148218de7deb268aa0c73332,2024-10-31T16:35:04.067000
CVE-2024-21003,0,0,90a06bec930da30c9a00d7e245d95aa433119de047332777b49810dcb3c38582,2024-04-26T09:15:09.823000
CVE-2024-21004,0,0,74d75259359885feb58e67b784c7f0a497e76221cd93421bf881ed958c2f234c,2024-10-31T15:35:24.047000
CVE-2024-21005,0,0,3a0033bb21374d9be43479eee698b2830f41d8d2a9d0eb123f27394e5de66035,2024-04-26T09:15:10.030000
CVE-2024-21006,0,1,b66db085bb99aa21625f1949517478b22e3fbdd786db1c25a0e1b28fb3539492,2024-11-27T16:36:05.623000
CVE-2024-21006,0,0,b66db085bb99aa21625f1949517478b22e3fbdd786db1c25a0e1b28fb3539492,2024-11-27T16:36:05.623000
CVE-2024-21007,0,0,318b973189a970b7ce55f9b439b79912feb01731965e9cf4d9ebb34a06f5b815,2024-08-21T15:35:03.230000
CVE-2024-21008,0,1,79c8ede7039b9ab861b81e9c13133e11dccfa6b5370f6dc01cdafe6899c0cddb,2024-11-27T16:35:56.737000
CVE-2024-21009,0,1,db6fbd7d8accf1ab224f2cb103b25e5731e70907122a90a7ad837151b5ba25a4,2024-11-27T16:35:46.023000
CVE-2024-21008,0,0,79c8ede7039b9ab861b81e9c13133e11dccfa6b5370f6dc01cdafe6899c0cddb,2024-11-27T16:35:56.737000
CVE-2024-21009,0,0,db6fbd7d8accf1ab224f2cb103b25e5731e70907122a90a7ad837151b5ba25a4,2024-11-27T16:35:46.023000
CVE-2024-2101,0,0,f64308a9cf2bd395190830ff176a54d77164cf0faaa20d92ded300e0efbb1c30,2024-07-03T01:53:00.530000
CVE-2024-21010,0,1,8da34c621e00a1a6bc6945f4463b7f169614eb79b8866a30350c977ef7474dc1,2024-11-27T16:35:37.613000
CVE-2024-21010,0,0,8da34c621e00a1a6bc6945f4463b7f169614eb79b8866a30350c977ef7474dc1,2024-11-27T16:35:37.613000
CVE-2024-21011,0,0,3db0dfc4f6d9c0cb1b0594a3fea44420c1ced4ee3ac62b2d2aac28313dd8e801,2024-04-26T09:15:10.240000
CVE-2024-21012,0,0,8bb45639916260fb5e290a2144a7289c54983d68a6c83fb494eebd2fbc3b4755,2024-11-13T18:35:25.333000
CVE-2024-21013,0,1,f4d7d3d63419f5b65aab5308aa286df618fde3314df1470f82e6a12508e6afd5,2024-11-27T16:35:24.993000
CVE-2024-21014,0,1,fd5fd906db48dbc401dceb2950611dc7ac548d204c7b6b0610339c911785edb1,2024-11-27T16:35:17.047000
CVE-2024-21015,0,1,f2cd4f3aca6f87b172581e8a6cb037de57f64674ebf070f97b0bb58b0c8cb942,2024-11-27T16:35:00.387000
CVE-2024-21016,0,1,7b06a7a101f5499528a019b1bce8248ab4b671498b173ccf1a81511b3be4f699,2024-11-27T16:31:47.750000
CVE-2024-21017,0,1,8d6faacd84399cea88d3d3cedcc5018fe820d93d841edc59c022cc994cbb2e6e,2024-11-27T16:31:43.653000
CVE-2024-21018,0,1,2e1340b3db5c35ae5b2a9e8c5e499329e51751a7e10154f4c68c14c57ad498d8,2024-11-27T16:31:31.260000
CVE-2024-21019,0,1,d73ddbd97890db99ed4a0927678658e890f5a9ffc1913db8deba2f5f417025f4,2024-11-27T16:31:28.057000
CVE-2024-21013,0,0,f4d7d3d63419f5b65aab5308aa286df618fde3314df1470f82e6a12508e6afd5,2024-11-27T16:35:24.993000
CVE-2024-21014,0,0,fd5fd906db48dbc401dceb2950611dc7ac548d204c7b6b0610339c911785edb1,2024-11-27T16:35:17.047000
CVE-2024-21015,0,0,f2cd4f3aca6f87b172581e8a6cb037de57f64674ebf070f97b0bb58b0c8cb942,2024-11-27T16:35:00.387000
CVE-2024-21016,0,0,7b06a7a101f5499528a019b1bce8248ab4b671498b173ccf1a81511b3be4f699,2024-11-27T16:31:47.750000
CVE-2024-21017,0,0,8d6faacd84399cea88d3d3cedcc5018fe820d93d841edc59c022cc994cbb2e6e,2024-11-27T16:31:43.653000
CVE-2024-21018,0,0,2e1340b3db5c35ae5b2a9e8c5e499329e51751a7e10154f4c68c14c57ad498d8,2024-11-27T16:31:31.260000
CVE-2024-21019,0,0,d73ddbd97890db99ed4a0927678658e890f5a9ffc1913db8deba2f5f417025f4,2024-11-27T16:31:28.057000
CVE-2024-2102,0,0,063af9520b1c53909e19a4c543dd4e89e92c8386c428fad7438fe729761d527f,2024-08-01T13:49:41.380000
CVE-2024-21020,0,1,50d0bb623e906d57fffc4a003271c5d8f0fddd70537c5dfcb50f0a25abb536c4,2024-11-27T16:31:24.850000
CVE-2024-21020,0,0,50d0bb623e906d57fffc4a003271c5d8f0fddd70537c5dfcb50f0a25abb536c4,2024-11-27T16:31:24.850000
CVE-2024-21021,0,0,64827289a059e7d96255e1e78c913ce22eb2f8c3fa061b78e9bca939974553d5,2024-11-12T20:35:07.200000
CVE-2024-21022,0,1,64a8139f2b1ea0b3fb6aa0981f9b2d6c01e88bcc85d0046c50f193b99ee667ae,2024-11-27T16:31:22.270000
CVE-2024-21022,0,0,64a8139f2b1ea0b3fb6aa0981f9b2d6c01e88bcc85d0046c50f193b99ee667ae,2024-11-27T16:31:22.270000
CVE-2024-21023,0,0,927d06c9c846b66c85686832a7d8ba13dd57e57adc9551190b6fa4a25e207424,2024-10-31T15:35:24.947000
CVE-2024-21024,0,1,8d2a827a192a1b383481a84dfca9c6be9d11ea475bb8e64e40bd9d2b1883bc26,2024-11-27T16:31:18.080000
CVE-2024-21025,0,1,1547ab83b9d1273d90e9f7e7ea464b636c7853cb15c5a10ed0cb04cf6a3f20f7,2024-11-27T16:31:12.720000
CVE-2024-21024,0,0,8d2a827a192a1b383481a84dfca9c6be9d11ea475bb8e64e40bd9d2b1883bc26,2024-11-27T16:31:18.080000
CVE-2024-21025,0,0,1547ab83b9d1273d90e9f7e7ea464b636c7853cb15c5a10ed0cb04cf6a3f20f7,2024-11-27T16:31:12.720000
CVE-2024-21026,0,0,bb4bd2aeeb520f557a235cf2c384bcd9afa22628dbaa611ed6aada649ea8a800,2024-04-19T17:34:46.467000
CVE-2024-21027,0,0,274a137cb4ff0ddef3882d5e5a8152cdc087240750de0d4f3f112c1f3ffe5baa,2024-04-19T17:34:33.557000
CVE-2024-21028,0,0,e746c963a4f2579f4ff27a79a26bb542b668ecc162136be7b39dea5679186530,2024-04-19T17:34:24.897000
@ -245404,20 +245406,20 @@ CVE-2024-21029,0,0,beed54640564c6e877b911608d3aaede78a6c68fba401ae9c1d7333ce2ffd
CVE-2024-2103,0,0,56728262bbb9eac431f64527baa684f066aa452f31fabe1cfef087df0e0cc830,2024-04-04T16:33:06.610000
CVE-2024-21030,0,0,8784ba0a3755df5b21c90fc1a3d06189077ff55e4dd10202c7d6a2ef21eadb3a,2024-07-03T01:46:23.853000
CVE-2024-21031,0,0,47da12e0a06b82feddde80c8f657eef9ceaa2d7cc969db6255ee7d3fcecb3433,2024-04-19T17:31:50.307000
CVE-2024-21032,0,1,224558dfd07c20308a2bd3552df334b44095a07933d7e9c8bab2ef75b9656e34,2024-11-27T16:31:02.343000
CVE-2024-21033,0,1,7bc19cb64c3ae24134dd79d7bbfe9e0ed0d38b98c77be70dc6f288f7e389d27e,2024-11-27T16:30:57.530000
CVE-2024-21034,0,1,b808ea180848747041b7aaaca886e2cee0af839a6638ebb2b8a0217712acb5a2,2024-11-27T16:30:46.090000
CVE-2024-21035,0,1,cfe330df5a88be696e5b022b2535ceaaa50fa26e99e7cc5299822d6e604c17b0,2024-11-27T16:30:11.690000
CVE-2024-21032,0,0,224558dfd07c20308a2bd3552df334b44095a07933d7e9c8bab2ef75b9656e34,2024-11-27T16:31:02.343000
CVE-2024-21033,0,0,7bc19cb64c3ae24134dd79d7bbfe9e0ed0d38b98c77be70dc6f288f7e389d27e,2024-11-27T16:30:57.530000
CVE-2024-21034,0,0,b808ea180848747041b7aaaca886e2cee0af839a6638ebb2b8a0217712acb5a2,2024-11-27T16:30:46.090000
CVE-2024-21035,0,0,cfe330df5a88be696e5b022b2535ceaaa50fa26e99e7cc5299822d6e604c17b0,2024-11-27T16:30:11.690000
CVE-2024-21036,0,0,03772262febbe1802cb4e5be8d6e22eef6f08655ecf5ce6b4ff42f4682cb919e,2024-11-07T17:35:12.117000
CVE-2024-21037,0,1,275560440d01a5b66d9569c94ab21c078479a2c2079e4d03585c66b053e0c227,2024-11-27T16:29:55.693000
CVE-2024-21038,0,1,0c4ce653fce6696c66d05a2ec71f4cc6c038a3fb76934f714b2f35fe6ba08e3c,2024-11-27T16:29:46.520000
CVE-2024-21039,0,1,e342c1121fe5cdcd8db5f3285db4e19fc9896de8dc0cd2c0a7bba13348c2b710,2024-11-27T16:29:33.007000
CVE-2024-21037,0,0,275560440d01a5b66d9569c94ab21c078479a2c2079e4d03585c66b053e0c227,2024-11-27T16:29:55.693000
CVE-2024-21038,0,0,0c4ce653fce6696c66d05a2ec71f4cc6c038a3fb76934f714b2f35fe6ba08e3c,2024-11-27T16:29:46.520000
CVE-2024-21039,0,0,e342c1121fe5cdcd8db5f3285db4e19fc9896de8dc0cd2c0a7bba13348c2b710,2024-11-27T16:29:33.007000
CVE-2024-21040,0,0,9207f1539b8715e9de73bf8605d282f9258ecbde4b6b5af37d49fb9b9b73b544,2024-07-03T01:46:25.020000
CVE-2024-21041,0,0,53175e4f9f6fe9a06cdb65415f15e9860a5cc1810804215df4199c035c4956b1,2024-10-31T16:35:04.810000
CVE-2024-21042,0,1,2413adf0e19ccd06809883f767218c53f86aa92469ced2e7e97fa65ebb6fc34b,2024-11-27T16:29:25.637000
CVE-2024-21042,0,0,2413adf0e19ccd06809883f767218c53f86aa92469ced2e7e97fa65ebb6fc34b,2024-11-27T16:29:25.637000
CVE-2024-21043,0,0,34b86fb6bc70d1cb3f2e8b52f242178af3e3c87a06302294640b6969cd919425,2024-11-06T19:35:09.460000
CVE-2024-21044,0,1,d6a124edde02ccad4eb1662b040fc85bdd4c8af9652fa58273abc93194a1774e,2024-11-27T16:29:16.483000
CVE-2024-21045,0,1,918bd035aa1d6211c105c0b035415fa2c831f7eef3679326aa8e323c6a0fd5ac,2024-11-27T16:29:07.300000
CVE-2024-21044,0,0,d6a124edde02ccad4eb1662b040fc85bdd4c8af9652fa58273abc93194a1774e,2024-11-27T16:29:16.483000
CVE-2024-21045,0,0,918bd035aa1d6211c105c0b035415fa2c831f7eef3679326aa8e323c6a0fd5ac,2024-11-27T16:29:07.300000
CVE-2024-21046,0,0,6cd7417a9fe1dad42e5e390bd73f6c59f847ce1b22a979e6a850a74e46589580,2024-11-05T16:35:11.803000
CVE-2024-21047,0,0,2bc5d014697923ab8f9837dde11c202b28c9635338e1429d1d2707b2d34f9717,2024-04-26T09:15:10.500000
CVE-2024-21048,0,0,0740c7f75430ed630e47ca8538d7654b46da3ebd0ee4b5951500b7c74c4ef781,2024-04-17T12:48:31.863000
@ -246035,6 +246037,7 @@ CVE-2024-2169,0,0,25fcbf8b9d7008ea9954a41615969f4d36543f4a604eb878bcc8b4c5c18a9f
CVE-2024-21690,0,0,52f2f5bb1e3e94fbb3d7fb8fab564e88563477b86bcce8501f8853e0eaa6dfd8,2024-11-06T19:35:13.787000
CVE-2024-21697,0,0,407288a03ff597a3a4bb57b1cda7709829bc688e494abd24fba6a6fe97ece8ff,2024-11-19T21:56:45.533000
CVE-2024-2170,0,0,758d6332b5fccd657d38a7eddcc769e16fb72e0c1b6514443e29b8614302434a,2024-03-26T12:55:05.010000
CVE-2024-21703,1,1,08d952643f27d625e1a34daf2a14cf006a2e6417e07616e354cd3cfc64f9f245,2024-11-27T18:15:08.720000
CVE-2024-2171,0,0,17c18c0537b711b05cfdac779ba2d168e9830dc55b69168346eed3896c1fbc48,2024-10-11T14:15:32.983000
CVE-2024-2172,0,0,edf7001396454eaaf4557a9c3fcef53434431cfdf8112832b9dc273636d1d743,2024-03-13T18:15:58.530000
CVE-2024-21722,0,0,a86fb4d95ec57288d080d9ff105ac4d713cb82e6d029a4568b198925539efc69,2024-10-30T18:35:02.897000
@ -246222,7 +246225,7 @@ CVE-2024-21918,0,0,742b173c7dcca847586b3391775dbdbe8cf845cb3792806068b182f51bb9a
CVE-2024-21919,0,0,17b9ef89ab049d67d3ba5d623527fb2d2cb4b013bdd1ced697ea307068eedea1,2024-03-26T17:09:53.043000
CVE-2024-21920,0,0,efae5f91f3c13ea098899efbd9298ae4cffb0d59d9536b3843182476a9397fd1,2024-03-26T17:09:53.043000
CVE-2024-2193,0,0,122bbc4272c132b83a700a76d93edb5ac61ae458bc4cc3c2f2865bcd2babf1e6,2024-10-29T16:35:13.023000
CVE-2024-21937,0,1,90d04fbe5cbba2725914398811e0d2326e8d3f32641d17075b562e1968ddb717,2024-11-27T16:20:37.073000
CVE-2024-21937,0,0,90d04fbe5cbba2725914398811e0d2326e8d3f32641d17075b562e1968ddb717,2024-11-27T16:20:37.073000
CVE-2024-21938,0,0,6c315d3024c09d7a50812151c8cd7326a5235cfaa6042ecac74aa5983aa83d44,2024-11-13T17:01:58.603000
CVE-2024-21939,0,0,a5aa41911721c7484fc24860471dbac89d11ee960d3fa252f5bfcdc696021b47,2024-11-13T17:01:58.603000
CVE-2024-2194,0,0,0e5ae4464806cff80b610073b7b679519a42660f4236dd411b709bf3ba1b49c9,2024-03-13T18:15:58.530000
@ -250174,10 +250177,10 @@ CVE-2024-27307,0,0,f03537f290162378c6385f978df4ca2a996f710091ddafa0723c8d56d920a
CVE-2024-27308,0,0,bb9781c241ee836cf4e778ece7a5b280cfcdc753da6cdee2e11b89f24c113b5e,2024-03-06T21:42:48.053000
CVE-2024-27309,0,0,18416b733d6ac4edeb2af296593281a1b6deae1e8a8956ba324c7cabf7f2e6ba,2024-07-09T16:22:21.487000
CVE-2024-2731,0,0,e2947075d94f67fb0f516acc3c39fdd257b6a53a447028317b4bd1e85304e9ee,2024-04-10T19:49:51.183000
CVE-2024-27310,0,1,0ee79b9bdb29212875d7f1e2706f2d2e430a7262b7fdafe9e2d4a8e95bde10da,2024-11-27T16:25:10.307000
CVE-2024-27310,0,0,0ee79b9bdb29212875d7f1e2706f2d2e430a7262b7fdafe9e2d4a8e95bde10da,2024-11-27T16:25:10.307000
CVE-2024-27311,0,0,3441ff0e665052a7fb86a3589fae526973b499df9f488dcbbb9db7b9aaef9973,2024-07-18T14:09:40.923000
CVE-2024-27312,0,0,44ad9df6373c37d335fa110f1ccf73e3064c9d69081ddac9cedf52edbde67366,2024-11-25T15:14:53.217000
CVE-2024-27313,0,1,35d4fc5dcf7fd82874d8066658bb141d6133e1d7a3505f1ab33a062d023280f6,2024-11-27T16:24:25.567000
CVE-2024-27313,0,0,35d4fc5dcf7fd82874d8066658bb141d6133e1d7a3505f1ab33a062d023280f6,2024-11-27T16:24:25.567000
CVE-2024-27314,0,0,507bfabf98c061d8de81cbc1d95b3b58842135d25b3a81edb36b7651b27ac69f,2024-07-03T01:50:30.720000
CVE-2024-27315,0,0,db9af09723fb011b8182b6b5bab4f2fc859959fe0ca51aeffec2764eb351e8f1,2024-10-03T13:15:14.710000
CVE-2024-27316,0,0,102105139fcfc876580c7206fba57ae17631b403098c79f616e87bd492a5d28f,2024-08-01T13:48:22.100000
@ -251602,7 +251605,7 @@ CVE-2024-29278,0,0,1c7d83867b262b09f27588e31bf9841e3af6bdfc0d72746f40dee1d45734a
CVE-2024-2928,0,0,1d00a619d6223f6fddadfce8ecd76fa5d6f829b8d361b3e4066e910bc6258ce4,2024-10-11T15:28:03.530000
CVE-2024-2929,0,0,513249311f09defaddca00249c92a4d2f3037014552979e20d0e342694062636,2024-03-26T17:09:53.043000
CVE-2024-29291,0,0,63e881e67f8d85b826801f0c870d1358f1a422a57593ef79bb6bae9024abdbc2,2024-08-02T01:15:58.367000
CVE-2024-29292,0,0,0fdfa2ea68ccb090b32a91a7c432b205558469835d8c95bb4767b1d71d198096,2024-11-20T21:15:07.040000
CVE-2024-29292,0,1,00ea6bc4c302c327c3044fa68f8f423ad9fef8aef7e6a4e9a713883b77891c38,2024-11-27T17:15:10.383000
CVE-2024-29296,0,0,196ce9fc64e2de40c4aad14cdb78662ded04058e63416a22f9fb231921284e33,2024-08-01T13:49:29.143000
CVE-2024-2930,0,0,2e48243b295a8e93d53a35219b2be0089b750f595ca7624319aaf969e99aaaca,2024-05-17T02:38:37.687000
CVE-2024-29301,0,0,fd6e891fb9a2f358e58da35cd58c20873301588e91f1b0a5190d88e70e1e8b21,2024-08-05T15:35:14.157000
@ -252763,6 +252766,7 @@ CVE-2024-30889,0,0,4055363c9710582a93e9c4afde24f53fb76bf450d1c6c8e60ffc2b185aa7e
CVE-2024-3089,0,0,f50243477e19a0c473b8d22e5ff97c5e0852740c2af46b357e2e30b0b527a41c,2024-06-10T19:15:54.210000
CVE-2024-30890,0,0,0f772534d2f25b8992cdb2b7f1614a9b1113da3447c153b6e6f711939289b199,2024-11-04T15:35:31.227000
CVE-2024-30891,0,0,396e17014fd3175e72a9c0a6ece22b5363c9ba81b8e8ea154f79fa53fb440cca,2024-08-19T20:35:15.447000
CVE-2024-30896,1,1,1c2a8f6103b169f4b2e6374c12c4e276b072d21b33e30de613363d5fad056629,2024-11-27T17:15:10.650000
CVE-2024-3090,0,0,ca58ae48ece7b5420c70058bc4ef34d34b72713bd9fb9580ab51af080cd6b613,2024-05-17T02:39:43.047000
CVE-2024-3091,0,0,ac47144b8dcc6e68da1982025c8274e4d7559a0b603bbff8eb392c09297cdc97,2024-05-17T02:39:43.130000
CVE-2024-30915,0,0,4a451061f2277273de3f1e30d4e5402fc40c4a77bd4f2be73b5ddc38a083afc5,2024-07-03T01:54:16.067000
@ -253533,6 +253537,7 @@ CVE-2024-31972,0,0,f9241b9f06175c965ad284b5c2136f1f7f8e377bc5d6b68f231b17656172b
CVE-2024-31973,0,0,c3480f733abb332799fc1f07ef143103e9de0ed931d381c037c7e12d5a9eb78d,2024-11-01T12:57:03.417000
CVE-2024-31974,0,0,eb64c7f63099840683d53752791541217d3c4d0792dfc9b0d9b46ea3d72b30e4,2024-07-03T01:55:41.323000
CVE-2024-31975,0,0,eb324a6bedd4b93ad2ac0707b00b07dfad728d7f39959adabc810317189eae1a,2024-11-04T17:15:07.030000
CVE-2024-31976,1,1,86650fc9453e252df3074d41108b57b4ccd00ba612e3f0e59342d64ff7c647e6,2024-11-27T17:15:10.913000
CVE-2024-31977,0,0,8eb0d10eae7cd02452acc4180866c19a5b8993f8851d4be772620f1837a0acf8,2024-09-03T21:15:15.803000
CVE-2024-31978,0,0,d7e67cdb6c9abfc8a281402447b24c354a9ac8bd28f05dea2bb91e1cf546ce10,2024-04-09T12:48:04.090000
CVE-2024-31979,0,0,f097e05504ac9e9ee25949ce03f6b7581ce42735e92ea4d2772041b31a214c2d,2024-08-01T13:51:19.213000
@ -254605,7 +254610,7 @@ CVE-2024-33435,0,0,7db2665c6496dae0749e042f8d814063672abd8fcceac696d209fd93a501e
CVE-2024-33436,0,0,4b7aad63b1a9d18447e5bf42251db2f590710ce8a67d312a75dbe09e1f3c4107,2024-05-01T13:02:20.750000
CVE-2024-33437,0,0,98a2b6e10245b112bb331b45bcb3f30a0dabc9110f63c643d94fcc31a61289bb,2024-08-01T13:51:56.957000
CVE-2024-33438,0,0,5149b18a46d53268b7670d8b6f23e45b58f0f7e28bd1fbf2d1e49eff1651e3a5,2024-08-01T13:51:57.143000
CVE-2024-33439,0,0,cff768f052081c25bf2badebc993fe13750f42919c9e40af177c06d148312b2d,2024-11-20T19:15:06.010000
CVE-2024-33439,0,1,865bf8d936802ea495b622b9117733561ad82697688560b335ffdd7376c09f21,2024-11-27T17:15:11.093000
CVE-2024-3344,0,0,70bfed73bbd8c0224afca425b004f1e6ab3832350ac16bb40ba0f3295e2c6f92,2024-04-11T12:47:44.137000
CVE-2024-33442,0,0,3bf0c7079aa4cdea0cf4fc3dc62abf7d3d6d92d11b677d6553e5342d569d6775,2024-07-03T01:58:14.593000
CVE-2024-33443,0,0,35242e2b0082b15f0bb5de03b6dc07c30701907ec01624317337d782f850f813,2024-07-03T01:58:15.370000
@ -256607,7 +256612,7 @@ CVE-2024-36033,0,0,8911dfc666d23e1c126e3abba0a30a2fed5f5b6caff101c24ce4eb4be9e3d
CVE-2024-36034,0,0,4c959fcfa233ae27a9c3f47b39a3f7ddc9a28a9c57a26789bd7acdd84b3e47d4,2024-08-16T20:21:06.120000
CVE-2024-36035,0,0,3fdb254cbf2b10e7d511633eed06bbb7c03953c8f2eb713a72f26b7556cced7e,2024-08-16T20:23:29.943000
CVE-2024-36036,0,0,f9fb5156304c57a40757d765df5364ac35b8d4db65c442212813c00360bf9d28,2024-10-31T16:35:15.723000
CVE-2024-36037,0,1,bbb4c699fc36319f520212a04780263c6b55d12c3ae95dd593b38199e7090fa1,2024-11-27T16:24:06.917000
CVE-2024-36037,0,0,bbb4c699fc36319f520212a04780263c6b55d12c3ae95dd593b38199e7090fa1,2024-11-27T16:24:06.917000
CVE-2024-36038,0,0,ed3921618390576c9219c98f6a3f7baf8a0d13ec50c49da12a34a4e745352466,2024-06-24T12:57:36.513000
CVE-2024-36039,0,0,d5f6bc43648106f8c0710f8301f59ed0f37eac1af0c9c7b161995113609db70a,2024-06-24T07:15:15.230000
CVE-2024-3604,0,0,2f82d9621c7da51111c7599a59e672098e964c892eb2588f225c0e98c5e45cbd,2024-08-01T17:39:33.907000
@ -257854,7 +257859,7 @@ CVE-2024-3777,0,0,e0440f2946e797118e4ada7698a04ee3805fb04d32040b7b7160eb68c53547
CVE-2024-37770,0,0,4e93402ad3ed64140e35d7a96007b07c29c5c8b6e92be0f25f51076d1a6ceeef,2024-07-11T15:05:53.090000
CVE-2024-37779,0,0,6e59c8529157382fe2940395deacc91d059ba345fa934b0466ef9ccea286d30e,2024-09-27T14:35:03.517000
CVE-2024-3778,0,0,2b5fc9c77ae2f993ef971da35cf3870af6c405ab91c786afef1cf6cf11c368d8,2024-04-15T13:15:31.997000
CVE-2024-37782,0,0,d461addc826c790b5ea01cf6ea01ba779736eb40ca4e76b9dfe7f83c82bb3505,2024-11-22T18:15:17.230000
CVE-2024-37782,0,1,e9f210e7f42c046d75d0b9f25adae39b4e1c61a1f888965bb1e0dfce89ee0e10,2024-11-27T17:15:11.320000
CVE-2024-37783,0,0,690ccf7acd78cda1161cbf595242a736f04b460c1e840c1328388e07392e0b09,2024-11-22T19:15:06.653000
CVE-2024-3779,0,0,1a47972c633583c7bae072fbb56beacb2d6111c4ffff8b051890256727892c2f,2024-08-21T17:38:16.057000
CVE-2024-37790,0,0,f03d38fcd39f9fc913c999134089e43d5d97a0d5c9124acb1959f0950b818b81,2024-06-21T16:15:12.440000
@ -257868,6 +257873,7 @@ CVE-2024-37800,0,0,3aebd2faaeb84484cc68215ff2c27d755488c237f64ba208bea923e908662
CVE-2024-37802,0,0,d144fe0e12cc92285cf5a45a291aa1263aaf8f5127240eb000b3aa69fb216783,2024-07-19T14:52:41.287000
CVE-2024-37803,0,0,e775e15ae57e6d87a1c3eae9b2633b6fb5e2150047d8db37ba8a0df6bf917fcb,2024-07-15T16:46:21.273000
CVE-2024-3781,0,0,0166ef6fe2c7d229a771ed8a3459c0974e3bc1428bfcd1abf209c8c2e778a8e5,2024-04-15T19:12:25.887000
CVE-2024-37816,1,1,5f0590f8d9670dace00b0c5f7e18119e01619fc887f047676757312ab9c71d8d,2024-11-27T17:15:11.570000
CVE-2024-37818,0,0,da6a1f43a8aacd614a81a2f93f80ef733846858e0f1e4aaa3583b19a43f2a1df,2024-10-04T19:15:16.273000
CVE-2024-3782,0,0,b45b8920e0157c6199f5ffbbbc446d8fb5e1a40daf0ca4b703a9dc70f6839c9b,2024-04-15T19:12:25.887000
CVE-2024-37820,0,0,fa0bbe561377b7b439a8d7f261288bdc816d9d647e91a5782129fd4223c1afcd,2024-07-15T22:15:02.850000
@ -259384,7 +259390,7 @@ CVE-2024-39701,0,0,879aa58f50a7d5b18bfb505718bd80f7c1e443b3ef3725ff1457799d3d8b8
CVE-2024-39702,0,0,4321dd362ed1e1bbd0d5793b212806c9239d130a489ced0fce340c598b116527,2024-11-26T18:15:19.193000
CVE-2024-39704,0,0,1d59c065d69d465eb86bf6114b5299aaf44c728f69d6748df6b6bd65077d4590,2024-07-03T14:32:56.510000
CVE-2024-39705,0,0,aa75ecfe331ee5d16e104493e16afd26f62024e9296a197b99cac0edaec74e23,2024-09-15T20:35:02.817000
CVE-2024-39707,0,0,a705426f80da8c6a5e48f3d7c38b841a2fbb1f6e4435784c498bc1aedae1b179,2024-11-15T13:58:08.913000
CVE-2024-39707,0,1,b27b038ddc6cdbabee843db40a21ee56e96ad76d049f977d89dc316ee0e970a2,2024-11-27T18:15:09.190000
CVE-2024-39708,0,0,5ba6724a88a25c721702dbcbb09c32f9771f7eb0a866958cc03dc7237b54b807,2024-10-31T14:35:16.610000
CVE-2024-39709,0,0,7412cab9f5821072dc4804eb5785dcfaaaebeae4cb15f2e4d1fcbff88c86a4c1,2024-11-23T21:15:14.647000
CVE-2024-3971,0,0,232de18e9e74ddfe0c81af44fc47161b6db81bcc698685ef24ea3f7084d9ef87,2024-07-29T16:51:34.570000
@ -262680,7 +262686,7 @@ CVE-2024-44744,0,0,83942cbf0bc52b807dc374447d58331fdab7ca8540cec1aa4efb11011d74c
CVE-2024-4475,0,0,b199ea7732b827fa53d53ebb43badb03a8dff248a786cc8d7d2459800e62c08e,2024-07-17T02:47:07.620000
CVE-2024-44756,0,0,1681a92faf0c64d1815b4eb0c3be7b2fb90b774755ff6087ed8af6c8466588d9,2024-11-19T21:57:56.293000
CVE-2024-44757,0,0,afa0b64a73ad54cd2de86e32a9739915e3b6a820b2485a49a35c06cde9462d98,2024-11-19T21:57:56.293000
CVE-2024-44758,0,0,4eb170325393d50fb6b1ac0e145b87ee1b40fc3092e830f797f0944442dc9070,2024-11-18T17:11:56.587000
CVE-2024-44758,0,1,0f87f6fd64cd3ee32a39610ab34845e08d64c79e468acaf8dd1c0a562c908710,2024-11-27T18:15:13.007000
CVE-2024-44759,0,0,74017e4a120ba116b0925bdf36ae176aa3414e2488b714ba0e8a87153b7d0ab6,2024-11-18T17:11:56.587000
CVE-2024-44760,0,0,c31c484463dbcf8debf14f8cb14c4edde2aeacb7ab3b47695b1fc32577e35939,2024-11-15T20:15:20.270000
CVE-2024-44761,0,0,7f624c83820070ebb06f16b5a059f7fe8de7d537067fdcab263416bb3a81ba98,2024-11-18T18:15:06.160000
@ -262693,7 +262699,7 @@ CVE-2024-44777,0,0,6a3359ab703fdb561391b6cc1409dea8918b62f00651402e3928cb656c93c
CVE-2024-44778,0,0,f65f6032191fc3b59c27a2ff44b0f804e08b380039ac35a42aadeb42e1c6d1d1,2024-09-03T18:34:36.987000
CVE-2024-44779,0,0,8defc64818470b86a1ed4aeff7b1d178fe09f0b4135b6d31847cdbae6f118693,2024-09-03T18:33:51.297000
CVE-2024-4478,0,0,dc98d997f68b2645bb873c7bfe328abb5688a66731db128671fb26c7a0667c8b,2024-05-16T13:03:05.353000
CVE-2024-44786,0,0,70a4aaf90a125c1220210d1796014250f26869aff96d84958413523d6b27534e,2024-11-22T17:15:08.380000
CVE-2024-44786,0,1,2132a56021bb3deb06dc29a9b690059b9000abfdaaee4a4a267842e4b43f4e57,2024-11-27T17:15:11.767000
CVE-2024-4479,0,0,19a5d52fe32f562c79c648f88a021706b773334e3193aa8af739d9d0094fe357,2024-07-26T13:35:32.397000
CVE-2024-44793,0,0,475809f13ca115bedace2b70621dd1b06c8befeab10468b4f5b0fa1c27241f87,2024-09-05T18:28:42.687000
CVE-2024-44794,0,0,b452ddd5effb0ee34a112c584a56cc4850657b4ae996abe5b559863a6d239fc4,2024-09-05T18:28:09.247000
@ -263298,7 +263304,7 @@ CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec42
CVE-2024-45682,0,0,8584442aa3e66ef486ff4d0e65e36dc65b16a5528e312d936a157a665ef44302,2024-09-27T18:54:51.820000
CVE-2024-45689,0,0,6e124b6ad87a6e953df96f9e4b72e7f165b5e26f7ae6e42a154710793d167512,2024-11-20T20:35:10.157000
CVE-2024-4569,0,0,2e4b27b05be8561bd3f260b3ccf0eed0d11ea74483878f5df5227737faa1c038,2024-06-28T13:10:05.153000
CVE-2024-45690,0,1,5723764df58775bb65cffc56ee9068e121c35610c7033bd0cf1fbf999d9fcfa1,2024-11-27T15:15:26.050000
CVE-2024-45690,0,0,5723764df58775bb65cffc56ee9068e121c35610c7033bd0cf1fbf999d9fcfa1,2024-11-27T15:15:26.050000
CVE-2024-45691,0,0,6cf0734b3b1bbfe46d94206888f2657e4fd0103a6560ef66f8d239ce88dda949,2024-11-20T20:35:10.377000
CVE-2024-45692,0,0,281ed60ed9431c734132a4f1fca034600bdda2bdb5b83bc44745bc26a826447d,2024-09-05T21:35:14.337000
CVE-2024-45693,0,0,8326a6a6c02d5129a5009d67c10554cd90e2c8aefe000e24bf1668842bfb6519,2024-10-17T20:21:11.913000
@ -263498,8 +263504,8 @@ CVE-2024-46047,0,0,57a3435cb7b6e94de5fb698161c585c7b5ce0f8c27f8db901c567ec5b0f81
CVE-2024-46048,0,0,8b386e1ce8db1651262779289df0cde97cc0d4c50d015509acb4f6ce2f921783,2024-09-20T00:35:54.187000
CVE-2024-46049,0,0,39c19419297fc26bc1a072b6b6a8ff9ba0434b8f7cc74fa3a910df77355bb874,2024-09-20T00:39:30.443000
CVE-2024-4605,0,0,cc5939dfa5bb0891c69db66e562cc6696594a6a88efe746332f5ec8ead5152ae,2024-05-14T16:11:39.510000
CVE-2024-46054,1,1,f0a53e0fc28376893d07742f485ef48bcb68dcb537ebfd98fd4e37244e30ff13,2024-11-27T15:15:26.200000
CVE-2024-46055,1,1,2539fbd3e2bc1252940303bca4727c6bfd8b3714627bdc8680589bdb379c4a50,2024-11-27T15:15:26.290000
CVE-2024-46054,0,0,f0a53e0fc28376893d07742f485ef48bcb68dcb537ebfd98fd4e37244e30ff13,2024-11-27T15:15:26.200000
CVE-2024-46055,0,1,fb3ab0f0de94860a6cfab293110c9c5563c53335293fdfc002812d3e3e3d5f7a,2024-11-27T18:15:13.300000
CVE-2024-4606,0,0,f985d30934b7c1f8930bf2267fb972a68a7301f3b4fab17a99fda7060e053c79,2024-08-28T08:15:07.093000
CVE-2024-4607,0,0,26d7fb8a60d9724fbac67d9d15e472fd268b8645ac384c2f62b0c7323928361f,2024-09-10T15:03:24.710000
CVE-2024-46076,0,0,3fbd69f65c02bb3814cc49722b87c72edbd2a4b678c2a211eca1ecb2ed16e13e,2024-10-10T12:57:21.987000
@ -265486,7 +265492,7 @@ CVE-2024-49579,0,0,0f0dd66a3db0fe299ae55b9b0e6c22f11c400dc3ee27d05103041b63e67e9
CVE-2024-4958,0,0,15591ba73d7708bbd560fadc0281274b5c7c2c12545797826fbf6e13e1222639,2024-06-03T14:46:24.250000
CVE-2024-49580,0,0,89085af96d96dbfcdc87aa1d40157bd1a1b8615e2e8f40b207dbbe916ae159de,2024-11-14T19:25:47.433000
CVE-2024-4959,0,0,862ee7700763d202e5d5dada80050e48cca3b83d56a63673f2017bcf5adb7503,2024-07-03T02:08:22.750000
CVE-2024-49592,0,0,c703ea90112e8bcf8bd25130b1345e2b105fcdfcaded2bbe98ade97b760a4e11,2024-11-18T17:11:56.587000
CVE-2024-49592,0,1,2c7b7fb1be7fc5fd754e82efd0fe5851f47e43e4cc7b8ec1fd6fcc2811eb81ce,2024-11-27T17:15:12.093000
CVE-2024-49593,0,0,0790debc03c6d685a8ce9800bcaf05d3a2d51714ee514270485ccb66f44467d5,2024-11-18T19:35:04.960000
CVE-2024-49595,0,0,b23fd80b60ac647f05027d85537df31a89ac4114f3b437db461e9c48fece4a35,2024-11-26T03:15:06.093000
CVE-2024-49596,0,0,59e71c8fcc49b547b7105baadcec16161b1e8926ccc4ef3d091ff33a55518621,2024-11-26T03:15:06.570000
@ -265987,8 +265993,8 @@ CVE-2024-50184,0,0,cb05ed3cbf4320d0b6539ece765682947c4e4dd01f32eb669ed72a68abce5
CVE-2024-50185,0,0,595738e2988b3e2c25066779b5891f8412116ebeed8b468125ac9343052411c0,2024-11-08T19:01:03.880000
CVE-2024-50186,0,0,dc12eba11107a35c5b7f7b4fe757f427daaaa77d7848dff65a7950111c79ee69,2024-11-08T19:01:03.880000
CVE-2024-50187,0,0,9e77a6b02e0f58e2042e30bc8e5136053f0f67b10b4b28bd21fa9c5ec3735ee6,2024-11-08T19:01:03.880000
CVE-2024-50188,0,1,a0f9600f02706c4c4c201ae8fa928c2340849d4ff2323579e41ceb41b53346b3,2024-11-27T16:14:31.370000
CVE-2024-50189,0,1,5d4f496901033a53673f3eb245c0783e3367982581bb1f34ad55281445cbc8bd,2024-11-27T16:16:12.133000
CVE-2024-50188,0,0,a0f9600f02706c4c4c201ae8fa928c2340849d4ff2323579e41ceb41b53346b3,2024-11-27T16:14:31.370000
CVE-2024-50189,0,0,5d4f496901033a53673f3eb245c0783e3367982581bb1f34ad55281445cbc8bd,2024-11-27T16:16:12.133000
CVE-2024-5019,0,0,208ddc99e1f67b7d6822e7ee095131f1b9c059678d4d2eeb2b2f9eae704845da,2024-08-21T13:43:03.670000
CVE-2024-50190,0,0,2962a78db58b5eff7333f4f943b026fd8630dab04243ae02339e9f901787f7d2,2024-11-08T19:01:03.880000
CVE-2024-50191,0,0,a6db09c765b7d3d35c26042d26dc5603def4093fc6f320ce46df0d5416572571,2024-11-08T19:01:03.880000
@ -266076,40 +266082,40 @@ CVE-2024-50267,0,0,b18e823f7987bf2f207dbb94811263ba2f7cb694e3871f48c8cc2bf39fe90
CVE-2024-50268,0,0,8df12e1c63e8f4b2fbb1daa84c5b9f22105342f2b53e103ba693f5c7f0487ea3,2024-11-22T22:13:47.450000
CVE-2024-50269,0,0,08dd3f234bbe0775aed81c63daa40d32c7fc72d3655c4eeaed98c1d9c9e8608e,2024-11-26T22:30:27.420000
CVE-2024-50270,0,0,e2cebf6c38789da2746318179b61d916a4b8eb21545b04b6001b05e81a6abdea,2024-11-26T22:38:18.377000
CVE-2024-50271,0,1,75be6279968206b95ebcae861ce3283df0119a9347956d8cb645a9563e57d5b2,2024-11-27T15:57:03.277000
CVE-2024-50272,0,1,0be03e353804a02199c122098a354e1959245d65a9b985e89f09f3439354dd50,2024-11-27T15:54:32.213000
CVE-2024-50273,0,1,393c02307774f77273e83c4fdead3fe05517b310064f89579bd4607a52b97cee,2024-11-27T15:58:02.730000
CVE-2024-50274,0,1,9989b3c8c4dde1407ba0a455d1f589572c8d1ef9f0e3d426d27ad9e2963d31d2,2024-11-27T15:59:35.733000
CVE-2024-50275,0,1,6766267fdfcca38908f6315025367cea845708d4a217d1da8a88049872166d2a,2024-11-27T16:16:53.177000
CVE-2024-50271,0,0,75be6279968206b95ebcae861ce3283df0119a9347956d8cb645a9563e57d5b2,2024-11-27T15:57:03.277000
CVE-2024-50272,0,0,0be03e353804a02199c122098a354e1959245d65a9b985e89f09f3439354dd50,2024-11-27T15:54:32.213000
CVE-2024-50273,0,0,393c02307774f77273e83c4fdead3fe05517b310064f89579bd4607a52b97cee,2024-11-27T15:58:02.730000
CVE-2024-50274,0,0,9989b3c8c4dde1407ba0a455d1f589572c8d1ef9f0e3d426d27ad9e2963d31d2,2024-11-27T15:59:35.733000
CVE-2024-50275,0,0,6766267fdfcca38908f6315025367cea845708d4a217d1da8a88049872166d2a,2024-11-27T16:16:53.177000
CVE-2024-50276,0,0,c538bd80c38457a997dbbbe83c52db48c4decdc4758c4bdca15192ecb6a6c988,2024-11-19T21:57:32.967000
CVE-2024-50277,0,1,c1061fa4d8ff42c39e669074ab42e7cb90df575f03a05404df2b2893e3e5b843,2024-11-27T15:30:55.840000
CVE-2024-50278,0,1,ed452b3654b9ea3f92fcde24a9a8547cc9d042e768f733fa2d6a6c26f5655850,2024-11-27T16:00:23.223000
CVE-2024-50279,0,1,57b9eb4bee2e4b8c746696d2f77e4b7a23b660ba2233137329bda9edd3e5a25a,2024-11-27T16:01:09.817000
CVE-2024-50277,0,0,c1061fa4d8ff42c39e669074ab42e7cb90df575f03a05404df2b2893e3e5b843,2024-11-27T15:30:55.840000
CVE-2024-50278,0,0,ed452b3654b9ea3f92fcde24a9a8547cc9d042e768f733fa2d6a6c26f5655850,2024-11-27T16:00:23.223000
CVE-2024-50279,0,0,57b9eb4bee2e4b8c746696d2f77e4b7a23b660ba2233137329bda9edd3e5a25a,2024-11-27T16:01:09.817000
CVE-2024-5028,0,0,6e4747168a055d3478d0389157f1378a0e5efd7245fc9814fa65e0cf7f805db7,2024-08-01T13:59:38.360000
CVE-2024-50280,0,0,11a1a8b1b58475d3237a437167dd9ab60a2fb42d1a5d80b74f255c9d05f0dd67,2024-11-19T21:57:32.967000
CVE-2024-50281,0,0,e4d73f958349685ab6550ff52c43d006d239999025c4abdf04c625c2dd569d54,2024-11-19T21:57:32.967000
CVE-2024-50282,0,0,edca8fb0c68bd2eb1359a831d99bb1855825b22eb947856819184e2bf586acca,2024-11-19T21:57:32.967000
CVE-2024-50283,0,0,c4109a99a84dfd37899e24ace8ae763e86313bd13e7117a125625b028c5711df,2024-11-19T21:57:32.967000
CVE-2024-50284,0,1,0dd2f3e0d578dbadc046954dcf53364b51273841493d336e73c7cec144ecffef,2024-11-27T16:20:08.917000
CVE-2024-50285,0,1,57dd7110572199115d76d8b0594b83deda57634c8161b67a640ec65820d64279,2024-11-27T15:31:58.063000
CVE-2024-50284,0,0,0dd2f3e0d578dbadc046954dcf53364b51273841493d336e73c7cec144ecffef,2024-11-27T16:20:08.917000
CVE-2024-50285,0,0,57dd7110572199115d76d8b0594b83deda57634c8161b67a640ec65820d64279,2024-11-27T15:31:58.063000
CVE-2024-50286,0,0,b047f979fd53ae155be0a8508cdb3f2f52e50e0ee7507f70c5103e656edad005,2024-11-19T21:57:32.967000
CVE-2024-50287,0,0,5a84aaae41c9428e15665fbcd54dc2d4c799cc4b55cc2a6cb8ec683b32ee59df,2024-11-19T21:57:32.967000
CVE-2024-50288,0,1,6e2039ce756a6b1a292181b98f184f82f5cbcaecd4e1ac460ee0f3a4ece05c7c,2024-11-27T15:32:45.147000
CVE-2024-50288,0,0,6e2039ce756a6b1a292181b98f184f82f5cbcaecd4e1ac460ee0f3a4ece05c7c,2024-11-27T15:32:45.147000
CVE-2024-50289,0,0,cbe890f5c9d4c6f76920eb8ce53083b1779519960db0d61cf86dba6e738923f2,2024-11-19T21:57:32.967000
CVE-2024-50290,0,0,472e5b89bdd80749e630d2d7cfdfbfa1f003a07e281a56444507df0faaba7cc5,2024-11-19T21:57:32.967000
CVE-2024-50291,0,1,2bfa2e93499428357803d9d1742bd1017215506f4ce049e714c1056a205a95ca,2024-11-27T15:16:30.260000
CVE-2024-50291,0,0,2bfa2e93499428357803d9d1742bd1017215506f4ce049e714c1056a205a95ca,2024-11-27T15:16:30.260000
CVE-2024-50292,0,0,c8fe60f8cf2667fe6bf44b523d8647b1569630ec063acb5ae501ac4b90f9edb0,2024-11-19T21:57:32.967000
CVE-2024-50293,0,0,9696c0877c6aa711d6bbb4e0cdc12ed718f5d22ffeb14c3a923cbf00fbfa862c,2024-11-19T21:57:32.967000
CVE-2024-50294,0,0,a56287c7c6c44b3839623aee8786a853478aac87c1c8f4037bacdb635fa62108,2024-11-19T21:57:32.967000
CVE-2024-50295,0,0,b5793fe9e5e200c708da8e3fd2d3817806f8597db59622027c2d0bf299d5097d,2024-11-19T21:57:32.967000
CVE-2024-50296,0,1,a0ab00a3d94c15ca5a168953900e499984de52c4d2f3ef150ea36247cfc34755,2024-11-27T15:24:16.020000
CVE-2024-50297,0,1,18782faadf8e66ce0592c45f4e4ae010037e6a87ea6a4488e69cd940026bbd47,2024-11-27T15:25:04.810000
CVE-2024-50298,0,1,c08b26d3bb0c2bc365756a21c195b877cc9dad5b276ad51daa25ce5140c0f1cd,2024-11-27T15:25:38.023000
CVE-2024-50296,0,0,a0ab00a3d94c15ca5a168953900e499984de52c4d2f3ef150ea36247cfc34755,2024-11-27T15:24:16.020000
CVE-2024-50297,0,0,18782faadf8e66ce0592c45f4e4ae010037e6a87ea6a4488e69cd940026bbd47,2024-11-27T15:25:04.810000
CVE-2024-50298,0,0,c08b26d3bb0c2bc365756a21c195b877cc9dad5b276ad51daa25ce5140c0f1cd,2024-11-27T15:25:38.023000
CVE-2024-50299,0,0,5aeee9eafaa1a622ea84bc5c27215f72a12d2e934f25cd301792f3ad40da51e9,2024-11-19T21:57:32.967000
CVE-2024-5030,0,0,bb4b715ea840400227e7a7cb9b03010c40389d422c5926920262a0b6d21748ab,2024-11-18T17:11:17.393000
CVE-2024-50300,0,0,357f2775ab252a4a06a076fcdc9db464e297da34ef827354cfabd45ea720901e,2024-11-19T21:57:32.967000
CVE-2024-50301,0,0,6032947c407edcb765791472d12ec09751cf709dcb1308b0f858d51bd46219d3,2024-11-19T21:57:32.967000
CVE-2024-50302,0,1,c276d48aa253104f6ab94ac380d2127bc623569a115a2b5fb8d69864e82f6893,2024-11-27T15:27:00.187000
CVE-2024-50302,0,0,c276d48aa253104f6ab94ac380d2127bc623569a115a2b5fb8d69864e82f6893,2024-11-27T15:27:00.187000
CVE-2024-50303,0,0,57cec19dcdbef42ee5ef5518eda5a8f97b5381ad2e4e83ffe649a20f91b7b500,2024-11-19T21:56:45.533000
CVE-2024-50304,0,0,56854a1e99128cd85feb0b11bd3df0ecdf626623d2783528840767997f789d64,2024-11-19T21:56:45.533000
CVE-2024-50305,0,0,b03fd6d501d19d7b209a06f202d725af272151828bcd7418064455026a0a9df5,2024-11-15T13:58:08.913000
@ -266410,12 +266416,12 @@ CVE-2024-50652,0,0,c46d900b0ec3c3d3dc69c000a8af48eff0cdc2a83f00bffa34618c3851a63
CVE-2024-50653,0,0,351b2ae0bb07d369ff4e76cbcc39f43676534cf729c0eb11791224a2ac34f76b,2024-11-20T15:36:20.257000
CVE-2024-50654,0,0,852ec98b8770e8761131177d563306c16f9d93ec13622504cc7153f7938dd76e,2024-11-20T15:27:08.580000
CVE-2024-50655,0,0,d4ec558baa450e21b64b8fb6af74e8e4b7a98438007bcf88b64f95732f73b83a,2024-11-19T21:51:00.987000
CVE-2024-50657,0,0,c62ae8e760b0c797e6305b82b7def79ede70f22ae58be77a448cac328641888f,2024-11-22T18:15:17.570000
CVE-2024-50657,0,1,30b2eb884e7e45c72e97be70bee207473abaa297a2a95565537ba3cd89d0a4dd,2024-11-27T17:15:12.323000
CVE-2024-5066,0,0,afaa043e18b083dd4b11b301517b086f80728c1a74393b687f88875df4970445,2024-05-20T13:00:34.807000
CVE-2024-50667,0,0,0dcbd7b35b311fe7a681d780dcbe2293327603709e31a27594acb760866d084d,2024-11-12T17:35:12.270000
CVE-2024-5067,0,0,7a5f09523c1a14d6651905f1f8853395c32eebb526caa99a81fddc9a443e16ea,2024-09-05T17:29:32.287000
CVE-2024-50671,0,0,1223fefc332eddf3a4bf368d5cbbf3c4396b7c221e56523e6bdf733ee7c8c46d,2024-11-25T21:15:19.040000
CVE-2024-50672,0,0,e15ff7e7887d1c58e55af7028d141453133b59d77bea70d3086e75a4dc40d21f,2024-11-25T21:15:19.523000
CVE-2024-50672,0,1,85b0d6db9be373a6fa69359f08bb412793e42f226dea70f6b5078fe3734ab9e1,2024-11-27T17:15:12.563000
CVE-2024-5069,0,0,9472ccb93cc67e368452ccbd7690fcdac2e9c6bf3a0a4c1febdda7b23dc05b96,2024-06-04T19:20:58.080000
CVE-2024-5071,0,0,1e84a840bf7fe6d05a333c61daff03721e2399762594abd260e8b415b74d49eb,2024-10-28T21:35:22.430000
CVE-2024-5072,0,0,85aed93503872c17702aba727bb062c3ccc667233546a70047ce6a70e5d2f498,2024-11-19T22:35:11.960000
@ -266583,7 +266589,7 @@ CVE-2024-51156,0,0,950cb85b625d9788feaa8ca00bca17d1dc7f49ab66d36281c4121d0068dc7
CVE-2024-51157,0,0,113cde3c71891d82bf55f2d0b4674fdfc6000fe1838706cb74a6d985959d76d5,2024-11-18T15:35:13.060000
CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000
CVE-2024-51162,0,0,659179ac55d508d31c34cd8742c699a4dc94023e77b3f77dfac64c460e25f9e9,2024-11-22T17:15:09.353000
CVE-2024-51163,0,0,ba4267b1febf3946e2ff435fc29e576537023ed4cf0b2d8ea671bb9981fe6040,2024-11-22T17:15:09.497000
CVE-2024-51163,0,1,909afcfaa554939e2c78d7e7af80c5c6961aa7c27e1f5cf118fbed2c52564f74,2024-11-27T18:15:17.760000
CVE-2024-51164,0,0,ceab88983ac8f1f076554a5fc06b1fdf761a41119ff559a9cb41cb2ae46055ec,2024-11-18T17:11:56.587000
CVE-2024-5117,0,0,8f71e5dda3348556d6b06143dcd47b79229dad0468d30aa7c38f8c5c1ecb8524,2024-06-04T19:21:00.547000
CVE-2024-51179,0,0,1ac36b7f8ecbb6442c3e82b8bfc190a784ef1fdb6227f3a1da3d4126f204bf98,2024-11-13T20:35:10.303000
@ -266603,6 +266609,7 @@ CVE-2024-5121,0,0,98477bc3a7c67683bd43da705ad15db6f590ce85a12aaf89110d94461e6c3b
CVE-2024-51211,0,0,581556a1bd92632bbd04cf9aebe233d1f5e96f417c538ff40e3ed80078a79ca9,2024-11-12T13:56:54.483000
CVE-2024-51213,0,0,a598a44042c959028b27d1b964937a81a14ecccc57789a4658084176eb433102,2024-11-12T18:35:33.433000
CVE-2024-5122,0,0,b102c5894de9c993bdf361c85aa63dd17cb454ea5ed33d3ad3120a6c50356b5e,2024-06-04T19:21:00.963000
CVE-2024-51228,1,1,ac26ba41591551e7b354eebad63edb6c2e6671b4cadbb1ad2fb2ebaf77cd607b,2024-11-27T17:15:12.800000
CVE-2024-5123,0,0,c6ee92320f25e8ca50da0e044240269e2ddcb04724d5d630d165dc261fdc83ba,2024-06-04T19:21:01.063000
CVE-2024-5124,0,0,ddf4d98394e08878019bd952c44f2cfd27f047274d82fb0e14f997780f16638c,2024-11-04T11:15:06.937000
CVE-2024-51240,0,0,7445c6ba47df36c0613eb4cb1195b6f0f9ac8d38ec29d4a0f09a129257d8d4ff,2024-11-06T20:35:34.963000
@ -266642,12 +266649,13 @@ CVE-2024-51327,0,0,6dff1d9ddb8570601185ec672ddf11cc5295d3cdce074e30aa360a3024bc5
CVE-2024-51328,0,0,2b00b7365b3324739a77fda3a7b20dd87707f9d87480b5fe651b2c4602f0e7fd,2024-11-04T19:35:16.150000
CVE-2024-51329,0,0,134d8b5a46fc76f9917a9aed6fc6c4366a039772d7dfe5acc179470dd93f05e6,2024-11-06T19:19:24.793000
CVE-2024-5133,0,0,ce2c3261ccf7a6af3656f0cd319a645240f50aa81e714a3f3634cc2f14d7c857,2024-10-17T16:41:53.717000
CVE-2024-51330,0,0,e96a5de3ed2885ee831e7c318016642092d9f94ed9c27996decdea1687d8ed73,2024-11-18T17:11:56.587000
CVE-2024-51330,0,1,b0b4a1198298e101e25b36e98c519271005f74623334a056f35802bef4974c1e,2024-11-27T17:15:12.973000
CVE-2024-5134,0,0,58696e79550f0b90695fd0ef5882cdbbda645a91799b45ef9d447d20546faa19,2024-06-04T19:21:01.167000
CVE-2024-5135,0,0,2e8010a5b25d8168b9552f9cffde1de1e433efa7269af046a0453f1985b50c89,2024-05-20T13:00:04.957000
CVE-2024-51358,0,0,15a6b357b2a15ba2efd09a7258436a688d09605b686100927239b26110c73a5e,2024-11-07T20:35:14.957000
CVE-2024-5136,0,0,00acd0d99ac180a457379231db172c8713de0958aea5d4d69a24c44371050460,2024-06-04T19:21:01.267000
CVE-2024-51362,0,0,a6e1a40cf5e527208990e8a764ceb58cfefd7f1b5e4a2c9e1905064ef69946f2,2024-11-06T20:35:35.750000
CVE-2024-51367,1,1,321834f3c68e231d48212ed0455e22a6133cdcee14f287745838cf2ad31fdf76,2024-11-27T17:15:13.207000
CVE-2024-5137,0,0,1c94e90fa849c62df03c5c4f490c71de8dac579e548f5eda16234216f611cd2a,2024-06-04T19:21:01.370000
CVE-2024-51377,0,0,cf00c0a6e7d0ac48895095961c732d7f23ec2a7e49679df67603156d82aefffb,2024-11-14T23:23:52.997000
CVE-2024-51378,0,0,25041eea06e8de15fb868a226604237e266234c162cafb1c59832cc50427a9bb,2024-11-01T12:57:03.417000
@ -267175,7 +267183,7 @@ CVE-2024-5213,0,0,d0914ed8289e640566cb58700956c5d2665253a06d0896526d4a9160af504e
CVE-2024-5214,0,0,63d7572dfe3fc62d2b94f5bd6d323fcf441de42b521ffae91ecf8348de5e238f,2024-06-03T19:15:09.360000
CVE-2024-5215,0,0,000fc07f4cc70899827567e140fa6ed8e48b521d55f3767b5621ab75b67abf1a,2024-06-26T12:44:29.693000
CVE-2024-5216,0,0,fd1f829df1b42ba5feaed9e36309904905f430fd7293476e8efb99a6adc245e7,2024-06-25T12:24:17.873000
CVE-2024-5217,0,0,f5bf9cf0ef8575eb807fd3b94d1ba33c9e7f461028aa2a7d1bf80d1c2d760eed,2024-07-30T15:20:54.727000
CVE-2024-5217,0,1,bcb367f5e8f4934ec54457a6bf1d1b467936c7817252514fef2d7bb7ed19c2bf,2024-11-27T18:56:05.783000
CVE-2024-5218,0,0,3f0f08ad7c2d51d3a67b7d7a45835724ecc9f070958f49b8f27381122972dec7,2024-05-28T12:39:42.673000
CVE-2024-5219,0,0,0b0a07b717a73df9a54bac0edd6ba4c81b69c5ace946f2ea22a932d7a079095d,2024-07-03T17:59:37.967000
CVE-2024-5220,0,0,c038ea6a169ab16726e3cd0d45ec2f73c131df5f0c00c638dfb0aa809792bfe5,2024-05-28T12:39:42.673000
@ -267207,7 +267215,7 @@ CVE-2024-52303,0,0,57a6450ca3f2acaad0d7a5708a267a8f541a38de3d501010a97d19dc2553c
CVE-2024-52304,0,0,0a277b5748fc03086c52a906e139b6d4003ef5456e902af6a142f3fb7ee5873a,2024-11-19T21:57:32.967000
CVE-2024-52305,0,0,fb3e1fe1f55433965f9f85cb35ad56a3033a246ddb638ca95e4c6fc4285767e7,2024-11-19T18:04:12.680000
CVE-2024-52306,0,0,dfac1396e024093252f9cdf330e5f0eab10833af9a739a326458e40b25c9c7da,2024-11-19T15:02:45.053000
CVE-2024-52307,1,1,45f018d30c19214fa9c61ad01f4a9b1a0e1092cd201ecac1feef083922ccc61d,2024-11-27T16:15:14.433000
CVE-2024-52307,0,0,45f018d30c19214fa9c61ad01f4a9b1a0e1092cd201ecac1feef083922ccc61d,2024-11-27T16:15:14.433000
CVE-2024-52308,0,0,0db58aa0fd04755222aa7bdf601c835c719685fb73c2d21a31da5f6db6051fd8,2024-11-20T15:07:43.127000
CVE-2024-5231,0,0,255bed42ab2a064a39e6f8c88880296d2f7a7d154f3db6dc7f4df2fa244d299f,2024-06-04T19:21:02.640000
CVE-2024-52311,0,0,440cc6f6193f2a4b57d7c7c4a4f4b3f01242ca6df6bc89770050e09d3b499acf,2024-11-12T13:56:54.483000
@ -267218,7 +267226,7 @@ CVE-2024-52316,0,0,ff532393fbb3fe055624e3ec9b4317af0a9f5c80b8d099f274ce380979ad2
CVE-2024-52317,0,0,8dd9cf0b2675d0151da3af6e2ac3dfaef7e6c1fd135283d8e3e44d96c5be783e,2024-11-18T17:11:17.393000
CVE-2024-52318,0,0,2bba437e59239c6e36ab9227be3e173d0f3c7cc38d614e024ac840e507a6b100,2024-11-18T17:11:17.393000
CVE-2024-5232,0,0,8d68905f3b69b3dadb32694d2c73f30dc32ad3c794d56bacf5b1c8bfed3d3bb6,2024-06-04T19:21:02.890000
CVE-2024-52323,0,1,4140a8efee2487f8a0ab9781f1095192b3a647c23a2a9eaba3cf214b9a3b68db,2024-11-27T15:15:26.377000
CVE-2024-52323,0,0,4140a8efee2487f8a0ab9781f1095192b3a647c23a2a9eaba3cf214b9a3b68db,2024-11-27T15:15:26.377000
CVE-2024-5233,0,0,d230ff373762a089849cb791769c151d4d1eb1a364270894bffa0dbac945e679,2024-06-04T19:21:02.993000
CVE-2024-52336,0,0,5ed253ebd2a82ef5ea3ab5a60ad11f0bdb76616e1b68538042da9f8c97f4e20a,2024-11-26T19:15:29.747000
CVE-2024-52337,0,0,23b4775368bbdf0dec045a90c06cd1e5b3e2f47d3699f76ca9bfb7e9368b5326,2024-11-26T19:15:30.013000
@ -267432,10 +267440,10 @@ CVE-2024-52714,0,0,e8174cb74f218481a745eaa4fb4441e2ce8d564c733028629c2c073a4476a
CVE-2024-5272,0,0,d387d985ee64cb70308558e1288744b27040b8f28ef99da7e8b0a0af44167dd6,2024-05-28T12:39:28.377000
CVE-2024-52723,0,0,5e158b9e6ae935fe53fcd904758ef5184a80e91ca85495f081966847a4cf0194,2024-11-22T16:15:33.983000
CVE-2024-52725,0,0,33f6fa34c3dd7f326aa8525752182246593fbe26f97c40f7481f5dc188051048,2024-11-20T17:15:18.867000
CVE-2024-52726,0,0,aaab5b915c8420d6dfdbfab6de11b3229799466def6ee1eeacddce3fd46cc0b0,2024-11-22T19:15:07.297000
CVE-2024-52726,0,1,07104ca9c9e8f2a3a4e4ad76e018b45eb5df5070643287e443babd815c74fea3,2024-11-27T17:15:13.463000
CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000
CVE-2024-52739,0,0,e67c6617d90c4f2c32d6849dbe6387498e43b14fb180727dba9b598a59a70f9d,2024-11-20T20:35:16.147000
CVE-2024-5274,0,0,e7d74c38d2c202c949e1ef012213e640b18c31c48483d84bb8a4761d2997d225,2024-08-14T17:07:13.270000
CVE-2024-5274,0,1,c24e97658283aca2d227c212a256ad0361bc0b2f150a90ed4a532bb6225b406f,2024-11-27T18:12:51.690000
CVE-2024-5275,0,0,0a8f92936fd54cfeba80497afbb5044228db5d667d0dcb3a75c34af54c4c0fca,2024-06-20T12:44:01.637000
CVE-2024-52754,0,0,efe2054fb692b3adcc609bd36845f4654abf6a516c024ece2df08033c7e16777,2024-11-22T17:15:09.787000
CVE-2024-52755,0,0,201980ce6d3d391174749cb677e5eff116245b0c1dc48789b3b9b50b5ef853a4,2024-11-22T17:15:09.970000
@ -267448,9 +267456,9 @@ CVE-2024-52765,0,0,215d573d92d5d4ab707e8db266a06400b9c1cb39b63c86b9575271eef3bcc
CVE-2024-52769,0,0,b6cb45d7326db7c74bf072246ac67a1dfffc75d7966f0886ca77640876da3fd2,2024-11-20T17:15:19.907000
CVE-2024-5277,0,0,c22b3e398c55d24f660b1a45a3310a9c6b0abef458e72374f87af318fc09202a,2024-10-09T14:49:25.753000
CVE-2024-52770,0,0,7aa9649a9670c716ce311ac92684885a9b795e1a2574f48cc59bb70ef562262a,2024-11-20T17:15:20.200000
CVE-2024-52771,0,0,5216faefced1eff97e71e61bc18807aec97654fb9fefe72a0573a6ba693a0484,2024-11-20T17:15:20.637000
CVE-2024-52771,0,1,57831cc0aec212fa9f5452cd5864fd9f742774698e80266ca54ea858d750ac1e,2024-11-27T17:15:14.017000
CVE-2024-5278,0,0,f0307415163f20adf37f2c92a0ed4578caa6aa4e699bedaa3aae52fa3124b77a,2024-10-17T13:56:49.813000
CVE-2024-52787,0,0,5cf053b2abc44016dfcc451672fa6172c4f3b8dcb05262e0c71f35e05b29e3fa,2024-11-25T18:15:13.597000
CVE-2024-52787,0,1,f0be565609d1e673f989f286ed2b83aaf7115a7b1858a856c2ab7b57c986e03e,2024-11-27T17:15:14.397000
CVE-2024-52788,0,0,4abe1fd7690362e0e6e7183fadbb1999ee1afb82444324d21e730957cf5066a2,2024-11-22T17:15:10.490000
CVE-2024-52789,0,0,f640d56967c5320ac75d58f4ec0e813038d23df15a507a7fb489e9968905a84b,2024-11-22T17:15:10.660000
CVE-2024-5279,0,0,2c6d1e53ece85fba55c2b83835d7abf75ca4da167ddbecc0aa984e59d469dd0e,2024-06-04T19:21:04.240000
@ -267501,7 +267509,7 @@ CVE-2024-52945,0,0,63027697b61e71930738cff69e21a659b1ff06f97d852d7c9fcc49bfd7768
CVE-2024-52946,0,0,ef4806982226269ca873cfccc34dff633254ace5ad4fa6e29d31cbf5dd0c16de,2024-11-18T17:11:17.393000
CVE-2024-52947,0,0,032f06f1ece995cd81c8fde69d4726dfc9340376c69a3aad6534cd5f5b5e3ade,2024-11-18T18:35:09.517000
CVE-2024-5295,0,0,a4e592514ef2498b5a4a173dae0a6cbcfb9c607b7fa3ff86ebe7c3784f138898,2024-05-24T01:15:30.977000
CVE-2024-52951,1,1,7c1224f3f2e9ade77f936266b74982e9a872b28e1a9f688df725306494c7ca71,2024-11-27T15:15:26.550000
CVE-2024-52951,0,0,7c1224f3f2e9ade77f936266b74982e9a872b28e1a9f688df725306494c7ca71,2024-11-27T15:15:26.550000
CVE-2024-52958,0,0,6ac9e217d9bc0433c548430fb0f3b6b9332a74d03a1b74c65d1c288770e97224,2024-11-27T06:15:18.590000
CVE-2024-52959,0,0,ec1380cbf80c452cc4c173df77383a977439e1ad3214342e17040813236ddc54,2024-11-27T06:15:19.083000
CVE-2024-5296,0,0,9bd527352a89f2b4ccfc677e3fc5feb9bb09c1923dac2d4ba397c3469bcfc648,2024-05-24T01:15:30.977000
@ -267515,8 +267523,8 @@ CVE-2024-5303,0,0,217ef39fe65f9c942556432bd246389e62862800142bbf571d971052d849f8
CVE-2024-5304,0,0,d968010935b9808df14ec3827c68c660e5030ff1e10dd473ede1e120c2d0020a,2024-08-23T15:06:10.100000
CVE-2024-53042,0,0,6880ebfd034ad41870591bbbdeeaea6760d63ea66896344ed6638c692cbaee51,2024-11-19T21:56:45.533000
CVE-2024-53043,0,0,8605345b311f80d829276d5452f92df6619a24b70030cd2d41c05e3973bef2d1,2024-11-22T22:22:03.963000
CVE-2024-53044,0,1,13db87ec8352bc7d7a9e5edecc2ddf5bacb85c33a4ca911a96d3b6b927e39574,2024-11-27T16:40:06.963000
CVE-2024-53045,0,1,153919019dd492ee2f8a4bd103dc9fb649fa232c55f1697b430888fbb999af0c,2024-11-27T16:41:06.737000
CVE-2024-53044,0,0,13db87ec8352bc7d7a9e5edecc2ddf5bacb85c33a4ca911a96d3b6b927e39574,2024-11-27T16:40:06.963000
CVE-2024-53045,0,0,153919019dd492ee2f8a4bd103dc9fb649fa232c55f1697b430888fbb999af0c,2024-11-27T16:41:06.737000
CVE-2024-53046,0,0,3e71ba1a7c50b773dcf381dbf7fdbc4a342381bd32ad53fdac02d10d506eebd8,2024-11-19T21:56:45.533000
CVE-2024-53047,0,0,a0801a2f6d3c55ef95cce30e94c6ed5a76950eafd193774abe55034cb73499bf,2024-11-19T21:56:45.533000
CVE-2024-53048,0,0,529447b7e47a46804ce5665f7064fdc0578a20909c47292e6baa06ace21a4eed,2024-11-19T21:56:45.533000
@ -267553,9 +267561,9 @@ CVE-2024-53075,0,0,b8a47df9f6008c83b93e2abefdeadbc449d2b3e2a3dcb44f41e184a3b9508
CVE-2024-53076,0,0,0be57ac15a64c608a1e52bd99fe58bd7fdd85d1305039bc11b5396e02cea259c,2024-11-22T22:24:24.607000
CVE-2024-53077,0,0,00b9d8c03b0897577603ba9722b5741dae994d46788395a5ed57813d6fd9f76e,2024-11-25T20:41:41.093000
CVE-2024-53078,0,0,fb4576ab424097abb54c012dfd85f820fb3d67465f92657a79299e53e0dd3ac8,2024-11-25T13:31:57.063000
CVE-2024-53079,0,1,842cfa3f805cf283364d877943681242a6e2d56da2e3fc653cb2100a50c04856,2024-11-27T16:59:20.303000
CVE-2024-53080,0,1,aab8698cdbcb15572a0f6f56b54b35fb99e8b87751dd7a7ac101c8e70a14a893,2024-11-27T16:57:47.947000
CVE-2024-53081,0,1,494d629ca516b5b4db6b9980f8938e11f2c142ff9c2899ebea88d56f8aadc322,2024-11-27T16:56:35.143000
CVE-2024-53079,0,0,842cfa3f805cf283364d877943681242a6e2d56da2e3fc653cb2100a50c04856,2024-11-27T16:59:20.303000
CVE-2024-53080,0,0,aab8698cdbcb15572a0f6f56b54b35fb99e8b87751dd7a7ac101c8e70a14a893,2024-11-27T16:57:47.947000
CVE-2024-53081,0,0,494d629ca516b5b4db6b9980f8938e11f2c142ff9c2899ebea88d56f8aadc322,2024-11-27T16:56:35.143000
CVE-2024-53082,0,0,4300d5804f1739d010f3842a1f063115d30827a689b8acceb8e0ef0a875aec0d,2024-11-25T13:35:34.083000
CVE-2024-53083,0,0,14bc093b2d0dbf0b458e87cc263fff838a1c2b0f5030c72f49f5cbb2b92721d1,2024-11-19T21:56:45.533000
CVE-2024-53084,0,0,2cf825e9737c7232363a4d626913473a9390d79ca2cd868f24741a845042e35c,2024-11-19T21:56:45.533000
@ -267584,6 +267592,7 @@ CVE-2024-5322,0,0,34d5429047e5a1854ac8faff5145e41fb19a8e0b0a19efc95aa08c4b8fb570
CVE-2024-5324,0,0,68af38ce3b695644cbcf19d3a148fcefd2523c0cdca6a2454fd88f0297edc15c,2024-07-24T17:42:49.020000
CVE-2024-5325,0,0,3161b31796f943a80af27275e8f23d08c58d4d31d567c9aa76aee11dec3e806e,2024-07-12T16:34:58.687000
CVE-2024-53253,0,0,d8774b8b7a52a6828fee68f5032117fca8a6e77570ad308c3ddf9958a04b65eb,2024-11-22T20:15:09.210000
CVE-2024-53254,1,1,ee53e9b703f27318442647deb86c75e2def0aedf5170eb37f9fbf3bd5e2537ab,2024-11-27T18:15:18.060000
CVE-2024-53255,0,0,d61a8d7710c40f67983bd99e9267ded1e91d86ea0747c698bd8cab97316873cd,2024-11-25T19:15:11.760000
CVE-2024-53258,0,0,a915b82637f40f0c10b7fb4e3ffc3bc669fcfe23ea0f5d157743938cb68f10dd,2024-11-25T20:15:10.030000
CVE-2024-5326,0,0,2be4cbe8832da29a051a88af0386c312f2db765fd88a5b2a911937a61354bc30,2024-05-30T13:15:41.297000
@ -267613,7 +267622,7 @@ CVE-2024-5342,0,0,b9462ea77ffff29ff50fcb5529de81f4f86998607e3428d3f0d5025aaca0f2
CVE-2024-53425,0,0,dba41ac0d03c322e076798942c48ad94ab227d8220eb1e3a3534e4bdae7c6815,2024-11-26T18:15:20.090000
CVE-2024-53426,0,0,9339130e86a75243ea176c2c1911663d0047bd370b4ea0fccb09719eca2c3ad9,2024-11-26T18:15:20.330000
CVE-2024-5343,0,0,fedc1366914170279f2e5d2ad585273a49bb658750b62f8b5bda5b06ac846b44,2024-06-20T12:44:01.637000
CVE-2024-53438,0,0,1f1caf7763eee1499fc294ada560bfb533a27a99b843716b542793ff5fef1fb8,2024-11-22T17:15:10.857000
CVE-2024-53438,0,1,269e7677ace7d9295c53368d7a770c8536638e497558c04303dcd88d3a89eb20,2024-11-27T17:15:14.647000
CVE-2024-5344,0,0,b9eb66177d3d824bf1f1529dfc9f0ece4e45e95565139113aee3e384e4e64696,2024-07-17T03:07:04.743000
CVE-2024-5345,0,0,e63bd8698ebea410f9684596571cb5f236dcece9e087d3c47739e1f377731d0e,2024-05-31T13:01:46.727000
CVE-2024-5346,0,0,da43d69a3160345da9f992308a5772b156b46661e78425f332f67d306a3affb7,2024-06-24T20:00:59.240000
@ -267628,7 +267637,7 @@ CVE-2024-5354,0,0,2705d9995a32176e712249b570d9e2fb33b0b6cf2235d27d22b60367c7562e
CVE-2024-5355,0,0,5f2e376ce579cedaa86f2a16497e6e751e8e7c9f0422d5f739a3fa31c20b6848,2024-06-04T19:21:05.883000
CVE-2024-53554,0,0,438643a55aaa35b78f1b23aac2881a01cc4a8024d9a2bdae2137a7b9fa7a8998,2024-11-26T16:15:18.520000
CVE-2024-53555,0,0,174e17d1628af05aaf3f22807e86abd0dc7a03bf1129ef93abe75153c9a01a07,2024-11-26T21:15:08.560000
CVE-2024-53556,0,0,48f17862e47add857cc3012444f5820a601a669e2f1886efc4926c973e3aada3,2024-11-25T21:15:21.693000
CVE-2024-53556,0,1,6925ef5b3d50b82f5e08a24f19e7ff4e448493177d9879ad27f5ac4d6f2f0b97,2024-11-27T17:15:14.917000
CVE-2024-5356,0,0,85f64e8ba0cebff8187202ea327ca3c906742c5e7d2301ba82b2780a509234eb,2024-06-04T19:21:05.977000
CVE-2024-5357,0,0,3e42587e7af2230be214dc062d75c1c832a73aeee43ae2fc11277198b34ad5c7,2024-06-07T20:15:12.387000
CVE-2024-5358,0,0,fdd72871ebf6d62b075a63baf142931fcf44d230f54a18747bfadc4ddcff1dbe,2024-06-04T19:21:06.077000
@ -267636,19 +267645,19 @@ CVE-2024-5359,0,0,0dc709734361df5232c8a75ae2b832e7f1398579fd9d2edbd5174e887cf59e
CVE-2024-53597,0,0,9a4c545b5865d03e7d82c6ef3ae0f046b57734eab4f58e2724c4e5178d1b9adb,2024-11-25T22:15:19.340000
CVE-2024-53599,0,0,fd3383bf56de062fbdbeb229ef5252493e3482e4bcfabf0584010575f7387ef2,2024-11-25T21:15:21.993000
CVE-2024-5360,0,0,9a09bdfd8f70d621de992279dbf64a12a444818faeedf82bbd859ed192a0d3f0,2024-05-28T12:39:42.673000
CVE-2024-53603,0,1,162b8a1c0030915029673db748be5d0adb733dae81b9ae207cb34767108f84eb,2024-11-27T16:15:14.583000
CVE-2024-53603,0,0,162b8a1c0030915029673db748be5d0adb733dae81b9ae207cb34767108f84eb,2024-11-27T16:15:14.583000
CVE-2024-53604,0,0,47936311e2d1f5cc406b15d873639f8f4b058cff6af769b5c54ad5fe621ee21e,2024-11-27T14:15:19.093000
CVE-2024-5361,0,0,5486d2207143454b44a9225276732f9ee62f5258ee0c41c9fa5501a1b55451e4,2024-05-28T12:39:42.673000
CVE-2024-53619,0,0,7d24d177db4282b10dd583a800553384958865a9c2b032eab35d21cf889272f3,2024-11-26T20:15:33.880000
CVE-2024-5362,0,0,5b47523dd74fc943fbc0021df1551e4d13ec69c02c41616d4b2935f18460ef93,2024-06-04T19:21:06.287000
CVE-2024-53620,0,0,9d59f48eff7094eebabf16396953b43066a8c0a92b748f43ae8922b5e2bf6319,2024-11-26T20:15:34.050000
CVE-2024-5363,0,0,bb04284a4e58fb2effb3b9c467567f3bbd6015eb64c220429872004dc6821b06,2024-06-04T19:21:06.390000
CVE-2024-53635,0,0,49b4054e38e70319300cf37323e732b469b9fb45e2df27cf28379c7859a0f5bf,2024-11-27T14:15:19.210000
CVE-2024-53635,0,1,6e8b5160fce2a741e8ac5d43a4a38430a8c2b5d2b740bbc37c715cac813c59a2,2024-11-27T18:15:18.130000
CVE-2024-5364,0,0,96afe929167b2de1681dda607a064227a5b629af3adb1987caaf0917b62b92a8,2024-06-04T19:21:06.490000
CVE-2024-5365,0,0,4b68a39efcc7d1fdd266d085800e02f841a36aae12ede01463956a125c285501,2024-06-04T19:21:06.587000
CVE-2024-5366,0,0,ebdb50e85f32d3970264d5045d82ce95c8965c12926ca2c779990bb15b24ffc0,2024-06-04T19:21:06.690000
CVE-2024-5367,0,0,e1fb712fa137b32c2cb97597a93996bde7ebc629cee38f14d6c04ed9e1154407,2024-06-04T19:21:06.783000
CVE-2024-53673,0,1,661b6e58e03fb62c2aa1ecc993b2257004bc984a0c70a3930af9e7eaf463bd3b,2024-11-27T16:15:14.783000
CVE-2024-53673,0,0,661b6e58e03fb62c2aa1ecc993b2257004bc984a0c70a3930af9e7eaf463bd3b,2024-11-27T16:15:14.783000
CVE-2024-53674,0,0,8a5c79f209c5cbb54f78c6e00b940dec235442e0d5729a2a400739bbcabd981c,2024-11-26T22:15:18.713000
CVE-2024-53675,0,0,01989df42cc3673d2d670cddd166ccee1a501522f5e01720638d33a9f30efa8c,2024-11-26T22:15:18.990000
CVE-2024-53676,0,0,f7ef49b888a4eed0585ba7b9f7899002a769200a6ac0008e5a7b61bb2e49d171,2024-11-27T01:15:05.250000
@ -267687,20 +267696,22 @@ CVE-2024-53912,0,0,e6fb43b2737cbcef51e1f874439414b1eb4c2f7a8143f7711c40052685e1c
CVE-2024-53913,0,0,db26b2b1e2298beed3b0db25806c1bedf5fbe7d70658f946838e985da0217084,2024-11-26T16:15:20.480000
CVE-2024-53914,0,0,99735abb7c2ed42da934a1a9995a70c9a86da0f5e52dfc853c7764c9915f1f97,2024-11-26T16:15:20.700000
CVE-2024-53915,0,0,2b435e6209b4777d69d6b127cd04d8b412034b2878f2216636381cb24425f30d,2024-11-26T16:15:20.943000
CVE-2024-53916,0,0,2d22f43c748e4fc1802bb59a3d73251bff1a353e6d572eedd66031b5d61e27bd,2024-11-25T00:15:04.423000
CVE-2024-53916,0,1,8b397b00703240f42bfc4c720e49d6f6e4984c2220fee564d2c3c72e3311b723,2024-11-27T17:15:15.127000
CVE-2024-5392,0,0,b24872fec717fdd1d01c0a9d16cd8dae85d0db85954b236e74ba95a5e5c8352c,2024-06-04T19:21:08.117000
CVE-2024-53920,1,1,d20c3dd3d3a0856cc626272b3d8ad44701e7a3636060e73cd0d1d84df2576a28,2024-11-27T16:15:15.037000
CVE-2024-53920,0,0,d20c3dd3d3a0856cc626272b3d8ad44701e7a3636060e73cd0d1d84df2576a28,2024-11-27T16:15:15.037000
CVE-2024-5393,0,0,295d4f9eb57788d71849a73c0b5d6c4f89e92a1e7613c6c16abcfeb4329f6a42,2024-06-04T19:21:08.420000
CVE-2024-53930,0,0,1076c24462100197e38bce4bb3bb1d95bc12e583ba6e6f216b5c96e80fcd4c47,2024-11-26T16:15:21.150000
CVE-2024-5394,0,0,aaadf9a58796777f85dc2107a816ebb5c0ae4c9d890d2d8c3ab15382290e4f66,2024-06-04T19:21:08.527000
CVE-2024-5395,0,0,e532c0fafbcef9b666c7ef0302f25a35b4dc4d0c2a33d2079af161ebd3ce2b3c,2024-05-28T12:39:28.377000
CVE-2024-5396,0,0,d0f735b85e524715ed1861b804d3fb37a4720102a88b42bc6f1eec50bfcc099d,2024-06-04T19:21:08.627000
CVE-2024-5397,0,0,79c82f6af34f5d76edc0fe512c9b3e616bf4c7ca15c122380ba9806c73a591a6,2024-06-04T19:21:08.733000
CVE-2024-53975,0,1,db2852f15c06d19ca698273a0c2e6819bbf9c83aca00ef4837eb933aa4601eda,2024-11-27T15:15:26.923000
CVE-2024-53975,0,0,db2852f15c06d19ca698273a0c2e6819bbf9c83aca00ef4837eb933aa4601eda,2024-11-27T15:15:26.923000
CVE-2024-53976,0,0,8d5f56cf46e847394bbb16bbccc754e64a340211b5713f291e4e6fbe540b2487,2024-11-26T16:15:21.430000
CVE-2024-5398,0,0,1fca9edd99ff7753e0d36d6f4d73a5a23ccf8ab9dd992541f79488471e393289,2024-06-11T10:15:13.690000
CVE-2024-5399,0,0,6f591a4ee360dfdb4118262029ef6ec2f3647ffdfa160e81ed9cdadb88ac0f1d,2024-05-28T12:39:28.377000
CVE-2024-5400,0,0,094967d50b5003fa8a1a95a7cd40ccdb2300c03695bb818acf6e11d6054c6ffe,2024-05-28T12:39:28.377000
CVE-2024-54003,1,1,a3c6c675b2f34f375ee2a56ca925b3bb999f2c571194b3341dcd3cd0cdaa5631,2024-11-27T17:15:15.333000
CVE-2024-54004,1,1,082a4c012cf14e634e97063024708abf81b0ae88671de2cac0207022f22b82d0,2024-11-27T17:15:15.443000
CVE-2024-5402,0,0,a5e55a0c84701c59a5f5d7ada1c30ecac8bd71919dc47c454e4a5ba90cd9220e,2024-07-19T18:03:55.583000
CVE-2024-5403,0,0,2e916307137919215633d6a47f3e654241b49fba1a899d76e9efd2abd496b6ad,2024-05-28T12:39:28.377000
CVE-2024-5404,0,0,9555ba3a9174cf37744b3f17110afa21577889d292df132a8c1f8da3c56bf2a0,2024-06-03T14:46:24.250000
@ -268160,7 +268171,7 @@ CVE-2024-5906,0,0,203e49fc12cc805aa814a48bc1ee927a32a234142d80d51288f99e84c6703f
CVE-2024-5907,0,0,d1b055b40e0f23972d4010743c95e9e712740577d8745b01a87db7feb49b71fd,2024-08-07T16:59:29.527000
CVE-2024-5908,0,0,10ae8b07066771edd89ce262576520c1fd128ba78541519391a2b2649f95b086,2024-08-07T16:55:24.180000
CVE-2024-5909,0,0,e304efd89cf74e4d08d4ff371fbe388379e9204881ef926100a0f1e3a8d60e07,2024-08-07T16:53:10.633000
CVE-2024-5910,0,0,bac698b7f35de84e6bbf386dfa752340c40a43b520ac5290f26ff52ee5dd650c,2024-11-14T02:00:02.740000
CVE-2024-5910,0,1,809032c1554caf15adc6ef3696e5c072f55bc8cbc0c3da859c4558e159670420,2024-11-27T17:23:02.910000
CVE-2024-5911,0,0,73115e3f042806be5dcc4a831e78f32335b6192481bdcb3b8ad74d5cdbbf1e0e,2024-07-11T13:05:54.930000
CVE-2024-5912,0,0,3efa6b60416ae7c89e8dc5a2081c5e6def286690a42a0087bed53b30b989bae2,2024-07-11T13:05:54.930000
CVE-2024-5913,0,0,307a9260d70a9d37ef03fc90a18fce4dac6ad981979537b72159d2890aa10b6b,2024-08-06T05:15:41.160000
@ -269144,6 +269155,7 @@ CVE-2024-7020,0,0,07e3f6eef588b310c604538a1a9169f2247ceb03dd8d5cbbf5f9bf79ffa47d
CVE-2024-7022,0,0,f3f91088113b8b5dc64e298e776a2521f61b999864613e4c295fcbf55348078e,2024-09-26T13:32:55.343000
CVE-2024-7023,0,0,3f937f5a1230b5cc57e9f6057ef84d68d172cff978e89a42c9f0a7ad62f5c115,2024-09-26T13:32:55.343000
CVE-2024-7024,0,0,f6ab692713540ecde032ff4fa92fc29e0807ae6392bd295748f24c8601a6b0ea,2024-09-26T13:32:55.343000
CVE-2024-7025,1,1,84f2822d7322b6c4c770714a08a0be1e8c12fd1166fe94eea014f9b723bf12bb,2024-11-27T18:15:18.420000
CVE-2024-7027,0,0,5a505a0256616ae7086bad971714674072a78d2b5b489c23bd05df293d4823ce,2024-07-24T12:55:13.223000
CVE-2024-7029,0,0,5f4ca22966bfb8fd03ea6c375443c6b1c23e214558aa93ba88feba6b27bd6aa8,2024-09-17T13:30:55.010000
CVE-2024-7030,0,0,94cdd35d577500e86064e69ea94124eea32b9ff9eeca8589a0c1d45f0f894609,2024-08-31T03:00:52.647000
@ -269955,7 +269967,7 @@ CVE-2024-7967,0,0,3b754d3fe60ade3dbaf2ceedb5cb492adc3a6d1342157a48ed7f67b8f6c533
CVE-2024-7968,0,0,d42fbdf1e125bc5bdd13768ccbb0014f1ef469a1fb717c432eb8628bcf97d06a,2024-08-27T13:35:04.780000
CVE-2024-7969,0,0,004186edac2fefffd328a41ea15a25fa627c517f8fe839d3b4b4abc33a5fb6ab,2024-08-28T23:15:05.320000
CVE-2024-7970,0,0,4bb992b64808219b839c5254e00c2c7348ddd7f9644ca29d4ab55ca307fec90f,2024-09-04T14:35:15.343000
CVE-2024-7971,0,0,46adb6d7721c1dfcc60ee3fda6e97e01d50ab2f0fa3271375a72069a513c0516,2024-08-27T01:00:02.883000
CVE-2024-7971,0,1,cbe2daa931187e1258dbe5911fe5622967ef34542556be9e6ad2a0b769c2720b,2024-11-27T17:21:35.077000
CVE-2024-7972,0,0,e61aba0cb3afa4d81531ac3dd06c76487abfdcc64e079a47655c169ee1d829d6,2024-08-26T15:11:35.017000
CVE-2024-7973,0,0,f4a6e82caeabd156e6e39c448d3a6bc99c97ac280b9c1d190ceb79dabcc9ff3c,2024-10-24T20:35:14.967000
CVE-2024-7974,0,0,77d5477c7043c324c587d6ddd1b8725973fdf57ee70889d7f1b834f0b27b2189,2024-10-30T21:35:13.293000
@ -271025,6 +271037,7 @@ CVE-2024-9361,0,0,5b39cf107cd2cec76681af4aec2b9617609d3555d1a39f69e46b82bde9fbb6
CVE-2024-9364,0,0,9d0e8f1b6c358b0978f38ed01c6214be4b3af0735e53abaab527da690e0d783f,2024-10-22T15:26:10.673000
CVE-2024-9366,0,0,407cafef9b2d9532a719e3ec12a763493be7d8b50723eedc7ded3a298c185dc3,2024-10-22T15:09:48.177000
CVE-2024-9368,0,0,9f09034d1cef896f0488110242b0920a28a4e3f8f0b6f56c7b8ec3c63941f7cb,2024-10-10T20:30:51.240000
CVE-2024-9369,1,1,717a949189134c1304c62734f9cddd0a2758133cac7b4303a63a23d88b34d7a8,2024-11-27T18:15:18.560000
CVE-2024-9372,0,0,8dacc1340b523e83cb4764d42eea980a95a68aef0cadf900c3f45471ba3dc7ad,2024-10-10T20:36:28.020000
CVE-2024-9373,0,0,aeb5e5e7812ae1c911161fbc197cd9777cff81e8221d22b7660e89f11b598b88,2024-10-22T15:07:23.907000
CVE-2024-9374,0,0,71b6734f379ef9a804fdc66eda125efbaf96377b76395ed89ad6eee48b26d41e,2024-10-25T12:56:07.750000
@ -271060,7 +271073,7 @@ CVE-2024-9409,0,0,3e506ee5c668e864fe32d06ea4b7a74953a7f1e2f6b3e039755ec706eb3dac
CVE-2024-9410,0,0,5bec151d8e893e44b70a96e00c59b851f21a71304a48571095d7551a53538240,2024-11-22T19:57:28.770000
CVE-2024-9411,0,0,09446adc9a52ba88acfc951352e9088b24cfd1cdb8a001643ee070875c43ffef,2024-10-04T13:51:25.567000
CVE-2024-9412,0,0,aa9a3d3cdb3659b02012ef158f2f0c675ff0de511272afae470c48f556502feb,2024-10-10T12:51:56.987000
CVE-2024-9413,0,1,a06de6835130fe994a1b9f10a16e4d390bb61a1bb02ceb9b43d0f4e1eeae3597,2024-11-27T16:15:15.180000
CVE-2024-9413,0,0,a06de6835130fe994a1b9f10a16e4d390bb61a1bb02ceb9b43d0f4e1eeae3597,2024-11-27T16:15:15.180000
CVE-2024-9414,0,0,5c21f14ec376abe57dfce5e862247c317429afdd9c8e1a9c0b90f9672b7f519b,2024-10-18T12:52:33.507000
CVE-2024-9417,0,0,c74a648d5508a7a2c2d3e505619e54040658d58791e6150e9a0fe8cbf972b416,2024-10-07T17:48:28.117000
CVE-2024-9419,0,0,a3f1d241a393213976f2495a35f5bc1427a284fa16c4a0b19d1f7c056beff495,2024-11-01T12:57:03.417000

Can't render this file because it is too large.