Auto-Update: 2024-11-20T21:00:31.582668+00:00

This commit is contained in:
cad-safe-bot 2024-11-20 21:03:33 +00:00
parent 6fa76129b2
commit a4e6be1433
57 changed files with 52282 additions and 307 deletions

View File

@ -2,16 +2,59 @@
"id": "CVE-2018-9371",
"sourceIdentifier": "security@android.com",
"published": "2024-11-19T20:15:27.843",
"lastModified": "2024-11-19T21:56:45.533",
"lastModified": "2024-11-20T20:35:02.730",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In the Mediatek Preloader, there are out of bounds reads and writes due to an exposed interface that allows arbitrary peripheral memory mapping with insufficient blacklisting/whitelisting. This could lead to local elevation of privilege, given physical access to the device with no additional execution privileges needed. User interaction is needed for exploitation."
},
{
"lang": "es",
"value": "En Mediatek Preloader, hay lecturas y escrituras fuera de los l\u00edmites debido a una interfaz expuesta que permite la asignaci\u00f3n arbitraria de memoria perif\u00e9rica con listas negras o listas blancas insuficientes. Esto podr\u00eda llevar a una elevaci\u00f3n local de privilegios, dado el acceso f\u00edsico al dispositivo sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-06-01",

View File

@ -2,16 +2,55 @@
"id": "CVE-2018-9409",
"sourceIdentifier": "security@android.com",
"published": "2024-11-19T20:15:27.970",
"lastModified": "2024-11-19T21:56:45.533",
"lastModified": "2024-11-20T20:35:04.480",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In HWCSession::SetColorModeById of hwc_session.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En HWCSession::SetColorModeById de hwc_session.cpp, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-06-01",

View File

@ -2,16 +2,43 @@
"id": "CVE-2018-9468",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T17:15:08.783",
"lastModified": "2024-11-20T17:15:08.783",
"lastModified": "2024-11-20T19:35:00.663",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In query of DownloadManager.java, there is a possible read/write of arbitrary files due to a permissions bypass. This could lead to local information disclosure and file rewriting with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En la consulta de DownloadManager.java, existe una posible lectura/escritura de archivos arbitrarios debido a una omisi\u00f3n de permisos. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local y la reescritura de archivos sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.2
}
]
},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",

View File

@ -2,16 +2,55 @@
"id": "CVE-2018-9469",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T17:15:09.040",
"lastModified": "2024-11-20T17:15:09.040",
"lastModified": "2024-11-20T19:35:00.937",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In multiple functions of ShortcutService.java, there is a possible creation of a spoofed shortcut due to a missing permission check. This could lead to local escalation of privilege in a privileged app with no additional execution privileges needed. User interaction is needed for exploitation."
},
{
"lang": "es",
"value": "En varias funciones de ShortcutService.java, existe la posibilidad de crear un acceso directo falsificado debido a la falta de verificaci\u00f3n de permisos. Esto podr\u00eda provocar una escalada local de privilegios en una aplicaci\u00f3n privilegiada sin necesidad de privilegios de ejecuci\u00f3n adicionales. Se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-9470",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.427",
"lastModified": "2024-11-20T18:15:19.427",
"lastModified": "2024-11-20T19:35:02.080",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In bff_Scanner_addOutPos of Scanner.c, there is a possible out-of-bounds write due to an incorrect bounds check. This could lead to remote escalation of privilege in an unprivileged app with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-9471",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.500",
"lastModified": "2024-11-20T18:15:19.500",
"lastModified": "2024-11-20T19:35:03.063",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In the deserialization constructor of NanoAppFilter.java, there is a possible loss of data due to type confusion. This could lead to local escalation of privilege in the system server with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-9472",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.550",
"lastModified": "2024-11-20T18:15:19.550",
"lastModified": "2024-11-20T19:35:03.980",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In xmlMemStrdupLoc of xmlmemory.c, there is a possible out-of-bounds write due to an integer overflow. This could lead to remote code execution in an unprivileged process with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-9474",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.610",
"lastModified": "2024-11-20T18:15:19.610",
"lastModified": "2024-11-20T19:35:04.790",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In writeToParcel of MediaPlayer.java, there is a possible serialization/deserialization mismatch due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.4,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-9475",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.670",
"lastModified": "2024-11-20T18:15:19.670",
"lastModified": "2024-11-20T19:35:05.590",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In HeadsetInterface::ClccResponse of btif_hf.cc, there is a possible out of bounds stack write due to a missing bounds check. This could lead to remote escalation of privilege via Bluetooth, if the recipient has enabled SIP calls with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-9477",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.723",
"lastModified": "2024-11-20T18:15:19.723",
"lastModified": "2024-11-20T19:35:06.410",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In the development options section of the Settings app, there is a possible authentication bypass due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-294"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-9478",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.773",
"lastModified": "2024-11-20T18:15:19.773",
"lastModified": "2024-11-20T19:35:07.310",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In process_service_attr_req and process_service_search_attr_req of sdp_server.cc, there is an out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. \u00a0User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-9479",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.830",
"lastModified": "2024-11-20T18:15:19.830",
"lastModified": "2024-11-20T19:35:08.127",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In process_service_attr_req and process_service_search_attr_req of sdp_server.cc, there is an out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. \u00a0User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-9480",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.890",
"lastModified": "2024-11-20T18:15:19.890",
"lastModified": "2024-11-20T19:35:09.023",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In bta_hd_get_report_act of bta_hd_act.cc, there is a possible out-of-bounds read due to improper input validation. This could lead to remote information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-9481",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:19.940",
"lastModified": "2024-11-20T18:15:19.940",
"lastModified": "2024-11-20T19:35:10.130",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,46 @@
"value": "In bta_hd_set_report_act of bta_hd_act.cc, there is a possible out-of-bounds read due to an integer overflow. This could lead to remote information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-9482",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:20.000",
"lastModified": "2024-11-20T18:15:20.000",
"lastModified": "2024-11-20T19:35:11.110",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,46 @@
"value": "In intr_data_copy_cb of btif_hd.cc, there is a possible out of bounds read due to an integer overflow. This could lead to local information disclosure in the Bluetooth service with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.2,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-9483",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:20.053",
"lastModified": "2024-11-20T18:15:20.053",
"lastModified": "2024-11-20T19:35:11.993",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,46 @@
"value": "In bta_dm_remove_sec_dev_entry of bta_dm_act.cc, there is a possible out of bounds read due to a use after free. This could lead to remote information disclosure over bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
},
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-9484",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:20.107",
"lastModified": "2024-11-20T18:15:20.107",
"lastModified": "2024-11-20T19:35:12.870",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In l2cu_send_peer_config_rej of l2c_utils.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-9485",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:20.163",
"lastModified": "2024-11-20T18:15:20.163",
"lastModified": "2024-11-20T19:35:13.760",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In l2cble_process_sig_cmd of l2c_ble.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to remote information disclosure over bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-9486",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:20.220",
"lastModified": "2024-11-20T18:15:20.220",
"lastModified": "2024-11-20T19:35:14.657",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "In hidh_l2cif_data_ind of hidh_conn.cc, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure over bluetooth with no additional execution privileges needed. User interaction is not needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2018-9487",
"sourceIdentifier": "security@android.com",
"published": "2024-11-20T18:15:20.277",
"lastModified": "2024-11-20T18:15:20.277",
"lastModified": "2024-11-20T19:35:15.573",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "In setVpnForcedLocked of Vpn.java, there is a possible blocking of internet traffic through vpn due to a bad uid check. This could lead to local denial of service with no additional execution privileges needed. User interaction is needed for exploitation."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://source.android.com/security/bulletin/2018-09-01",

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27742",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-16T20:15:09.093",
"lastModified": "2023-05-25T16:03:19.983",
"lastModified": "2024-11-20T19:56:22.243",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -56,8 +56,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:idurar_project:idurar:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A6E415AB-4775-4054-BCFF-200F07D738F9"
"criteria": "cpe:2.3:a:idurarapp:idurar:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "225F9DEE-58C6-420B-BF9D-62CC86A2658A"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-52265",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-12-30T23:15:42.620",
"lastModified": "2024-01-11T20:17:16.273",
"lastModified": "2024-11-20T19:56:22.243",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -60,9 +60,9 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:idurar_project:idurar:*:*:*:*:*:*:*:*",
"criteria": "cpe:2.3:a:idurarapp:idurar:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.0.1",
"matchCriteriaId": "79B1E39B-AFD9-4568-9048-1313A14EDA6E"
"matchCriteriaId": "BE66257B-9C39-4205-B2B6-C6D86646DCEC"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-24051",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-06-12T18:15:10.920",
"lastModified": "2024-08-26T12:43:44.580",
"lastModified": "2024-11-20T19:16:25.340",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
@ -61,8 +61,8 @@
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:monoprice:select_min_v2_firmware:37.115.32:*:*:*:*:*:*:*",
"matchCriteriaId": "174297BB-58CA-4E5C-B121-D755E395D227"
"criteria": "cpe:2.3:o:monoprice:select_mini_3d_printer_v2_firmware:37.115.32:*:*:*:*:*:*:*",
"matchCriteriaId": "2D8D610F-4B1E-4736-AB77-311D52AAF424"
}
]
},
@ -72,8 +72,8 @@
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:monoprice:select_min_v2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C3179B43-1DE7-41E9-B4FD-3D6E6FA4F0DB"
"criteria": "cpe:2.3:h:monoprice:select_mini_3d_printer_v2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CCF0FA4C-6C8C-4A3E-BFC7-4973389ED13D"
}
]
}

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

File diff suppressed because it is too large Load Diff

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-33439",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-20T19:15:06.010",
"lastModified": "2024-11-20T19:15:06.010",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Kasda LinkSmart Router KW5515 v1.7 and before allows an authenticated remote attacker to execute arbitrary OS commands via cgi parameters."
}
],
"metrics": {},
"references": [
{
"url": "https://gist.github.com/QuartzDust/848acfddff02c881eb86dd302e859e80",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-45510",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-20T20:15:18.943",
"lastModified": "2024-11-20T20:15:18.943",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Zimbra Collaboration (ZCS) through 10.0. Zimbra Webmail (Modern UI) is vulnerable to a stored Cross-Site Scripting (XSS) attack due to improper sanitization of user input. This allows an attacker to inject malicious code into specific fields of an e-mail message. When the victim adds the attacker to their contacts, the malicious code is stored and executed when viewing the contact list. This can lead to unauthorized actions such as arbitrary mail sending, mailbox exfiltration, profile picture alteration, and other malicious actions. Proper sanitization and escaping of input fields are necessary to mitigate this vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "https://wiki.zimbra.com/wiki/Security_Center",
"source": "cve@mitre.org"
},
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.9#Security_Fixes",
"source": "cve@mitre.org"
},
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.1#Security_Fixes",
"source": "cve@mitre.org"
},
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/9.0.0/P41#Security_Fixes",
"source": "cve@mitre.org"
},
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,33 @@
{
"id": "CVE-2024-45511",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-20T19:15:06.123",
"lastModified": "2024-11-20T19:15:06.123",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Zimbra Collaboration (ZCS) through 10.1. A reflected Cross-Site Scripting (XSS) issue exists through the Briefcase module due to improper sanitization of file content by the OnlyOffice formatter. This occurs when the victim opens a crafted URL pointing to a shared folder containing a malicious file uploaded by the attacker. The vulnerability allows the attacker to execute arbitrary JavaScript in the context of the victim's session."
}
],
"metrics": {},
"references": [
{
"url": "https://wiki.zimbra.com/wiki/Security_Center",
"source": "cve@mitre.org"
},
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.0.9#Security_Fixes",
"source": "cve@mitre.org"
},
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/10.1.1#Security_Fixes",
"source": "cve@mitre.org"
},
{
"url": "https://wiki.zimbra.com/wiki/Zimbra_Responsible_Disclosure_Policy",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-45689",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-20T11:15:05.337",
"lastModified": "2024-11-20T11:15:05.337",
"lastModified": "2024-11-20T20:35:10.157",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Moodle. Dynamic tables did not enforce capability checks, which resulted in users having the ability to retrieve information they did not have permission to access."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una falla en Moodle. Las tablas din\u00e1micas no aplicaban comprobaciones de capacidad, lo que provocaba que los usuarios pudieran recuperar informaci\u00f3n a la que no ten\u00edan permiso de acceso."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309941",

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-45691",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-20T11:15:05.490",
"lastModified": "2024-11-20T11:15:05.490",
"lastModified": "2024-11-20T20:35:10.377",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in Moodle. When restricting access to a lesson activity with a password, certain passwords could be bypassed or less secure due to a loose comparison in the password-checking logic. This issue only affected passwords set to \"magic hash\" values."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una falla en Moodle. Al restringir el acceso a una actividad de lecci\u00f3n con una contrase\u00f1a, ciertas contrase\u00f1as pod\u00edan ser ignoradas o menos seguras debido a una comparaci\u00f3n poco precisa en la l\u00f3gica de verificaci\u00f3n de contrase\u00f1as. Este problema solo afectaba a las contrase\u00f1as configuradas con valores de \"hash m\u00e1gico\"."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2309940",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46794",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-18T08:15:06.230",
"lastModified": "2024-09-20T12:30:51.220",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-20T20:56:49.150",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,139 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: x86/tdx: Se corrige la fuga de datos en mmio_read() La funci\u00f3n mmio_read() realiza una TDVMCALL para recuperar datos MMIO para una direcci\u00f3n del VMM. Sean not\u00f3 que mmio_read() expone involuntariamente el valor de una variable inicializada (val) en la pila al VMM. Esta variable solo se necesita como valor de salida. No era necesario pasarla al VMM en primer lugar. No env\u00ede el valor original de *val al VMM. [ dhansen: aclare para qu\u00e9 se usa 'val'. ]"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 3.3,
"baseSeverity": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndIncluding": "5.19",
"matchCriteriaId": "2100D1B8-9648-47E0-8CA8-90D1FE7C62FD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1",
"versionEndExcluding": "6.1.110",
"matchCriteriaId": "FD34EEF6-E0F8-42D6-BF92-8EB851A6ADEC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6",
"versionEndExcluding": "6.6.51",
"matchCriteriaId": "25B5F323-C9C2-4F67-BF42-0C5BDD860576"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.10",
"versionEndExcluding": "6.10.10",
"matchCriteriaId": "D16659A9-BECD-4E13-8994-B096652762E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8B3CE743-2126-47A3-8B7C-822B502CF119"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4DEB27E7-30AA-45CC-8934-B89263EF3551"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E0005AEF-856E-47EB-BFE4-90C46899394D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "39889A68-6D34-47A6-82FC-CD0BF23D6754"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc5:*:*:*:*:*:*",
"matchCriteriaId": "B8383ABF-1457-401F-9B61-EE50F4C61F4F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.11:rc6:*:*:*:*:*:*",
"matchCriteriaId": "B77A9280-37E6-49AD-B559-5B23A3B1DC3D"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/26c6af49d26ffc377e392e30d4086db19eed0ef7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b55ce742afcb8e8189d82f2f1e635ba1b5a461fa",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/b6fb565a2d15277896583d471b21bc14a0c99661",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ef00818c50cf55a3a56bd9a9fae867c92dfb84e7",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46812",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:14.163",
"lastModified": "2024-09-30T12:45:57.823",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-20T20:48:48.663",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,103 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: drm/amd/display: Omitir planos inactivos dentro de ModeSupportAndSystemConfiguration [Por qu\u00e9] Coverity informa sobre accesos ilegales a la memoria. [C\u00f3mo] Omitir planos inactivos."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1",
"versionEndExcluding": "6.1.109",
"matchCriteriaId": "39357484-8FFF-4FED-BEBE-83FE3BB15077"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6",
"versionEndExcluding": "6.6.50",
"matchCriteriaId": "7717901F-E796-498A-B954-A554CDFE5FE4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.10",
"versionEndExcluding": "6.10.9",
"matchCriteriaId": "3F5B2E4D-6C25-4CEF-B66C-96048941FD98"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/3300a039caf850376bc3416c808cd8879da412bb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/8406158a546441b73f0b216aedacbf9a1e5748fb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/a54f7e866cc73a4cb71b8b24bb568ba35c8969df",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/ee9d6df6d9172917d9ddbd948bb882652d5ecd29",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-46827",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-09-27T13:15:15.153",
"lastModified": "2024-09-30T12:45:57.823",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-20T20:40:40.737",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,88 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: ath12k: se corrige el fallo del firmware debido a un peer nss no v\u00e1lido Actualmente, si el punto de acceso recibe una solicitud de asociaci\u00f3n que contiene un elemento de informaci\u00f3n de capacidades HE extendidas con un MCS-NSS no v\u00e1lido, se produce un fallo del firmware. Este problema surge cuando las capacidades EHT-PHY muestran compatibilidad con un ancho de banda y el MCS-NSS configurado para ese ancho de banda en particular se completa con ceros y, debido a esto, el controlador obtiene peer_nss como 0 y el env\u00edo de este valor al firmware provoca un fallo. Aborde este problema implementando un paso de validaci\u00f3n para el valor peer_nss antes de pasarlo al firmware. Si el valor es mayor que cero, proceda a reenviarlo al firmware. Sin embargo, si el valor no es v\u00e1lido, rechace la solicitud de asociaci\u00f3n para evitar posibles fallos del firmware. Probado en: QCN9274 hw2.0 PCI WLAN.WBE.1.0.1-00029-QCAHKSWPL_SILICONZ-1"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionEndExcluding": "6.6.51",
"matchCriteriaId": "D4954ED0-8229-4D57-B4B3-CB5154734977"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.10",
"versionEndExcluding": "6.10.10",
"matchCriteriaId": "D16659A9-BECD-4E13-8994-B096652762E2"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/25a15f80253a7c8776e4e4880d797d20ec864154",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/838c2cfdb6be7d7d8c06c711edf893eb34ca2e7c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/db163a463bb93cd3e37e1e7b10b9726fb6f95857",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,16 +2,43 @@
"id": "CVE-2024-48899",
"sourceIdentifier": "patrick@puiterwijk.org",
"published": "2024-11-20T11:15:05.563",
"lastModified": "2024-11-20T11:15:05.563",
"lastModified": "2024-11-20T20:35:10.583",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Moodle. Additional checks are required to ensure users can only fetch the list of course badges for courses that they are intended to have access to."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en Moodle. Se requieren verificaciones adicionales para garantizar que los usuarios solo puedan obtener la lista de credenciales de los cursos a los que se les pretende dar acceso."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "patrick@puiterwijk.org",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48981",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-20T20:15:19.097",
"lastModified": "2024-11-20T20:15:19.097",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in MBed OS 6.16.0. During processing of HCI packets, the software dynamically determines the length of the packet header by looking up the identifying first byte and matching it against a table of possible lengths. The initial parsing function, hciTrSerialRxIncoming does not drop packets with invalid identifiers but also does not set a safe default for the length of unknown packets' headers, leading to a buffer overflow. This can be leveraged into an arbitrary write by an attacker. It is possible to overwrite the pointer to a not-yet-allocated buffer that is supposed to receive the contents of the packet body. One can then overwrite the state variable used by the function to determine which state of packet parsing is currently occurring. Because the buffer is allocated when the last byte of the header has been copied, the combination of having a bad header length variable that will never match the counter variable and being able to overwrite the state variable with the resulting buffer overflow can be used to advance the function to the next step while skipping the buffer allocation and resulting pointer write. The next 16 bytes from the packet body are then written wherever the corrupted data pointer is pointing."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/mbed-ce/mbed-os/blob/54e8693ef4ff7e025018094f290a1d5cf380941f/connectivity/FEATURE_BLE/source/cordio/stack_adaptation/hci_tr.c#L161",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/mbed-ce/mbed-os/pull/374",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48983",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-20T20:15:19.183",
"lastModified": "2024-11-20T20:15:19.183",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in MBed OS 6.16.0. During processing of HCI packets, the software dynamically determines the length of the packet data by reading 2 bytes from the packet header. A buffer is then allocated to contain the entire packet, the size of which is calculated as the length of the packet body determined earlier plus the header length. WsfMsgAlloc then increments this again by sizeof(wsfMsg_t). This may cause an integer overflow that results in the buffer being significantly too small to contain the entire packet. This may cause a buffer overflow of up to 65 KB . This bug is trivial to exploit for a denial of service but can generally not be exploited further because the exploitable buffer is dynamically allocated."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/mbed-ce/mbed-os/blob/54e8693ef4ff7e025018094f290a1d5cf380941f/connectivity/FEATURE_BLE/libraries/cordio_stack/wsf/sources/port/baremetal/wsf_msg.c#L72",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/mbed-ce/mbed-os/pull/388",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-48985",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-20T20:15:19.270",
"lastModified": "2024-11-20T20:15:19.270",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in MBed OS 6.16.0. During processing of HCI packets, the software dynamically determines the length of the packet data by reading 2 bytes from the packet data. A buffer is then allocated to contain the entire packet, the size of which is calculated as the length of the packet body determined earlier and the header length. If the allocate fails because the specified packet is too large, no exception handling occurs and hciTrSerialRxIncoming continues to write bytes into the 4-byte large temporary header buffer, leading to a buffer overflow. This can be leveraged into an arbitrary write by an attacker. It is possible to overwrite the pointer to the buffer that is supposed to receive the contents of the packet body but which couldn't be allocated. One can then overwrite the state variable used by the function to determine which step of the parsing process is currently being executed. This advances the function to the next state, where it proceeds to copy data to that arbitrary location. The packet body is then written wherever the corrupted data pointer is pointing."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/mbed-ce/mbed-os/blob/54e8693ef4ff7e025018094f290a1d5cf380941f/connectivity/FEATURE_BLE/source/cordio/stack_adaptation/hci_tr.c#L200",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/mbed-ce/mbed-os/pull/384",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50056",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T20:15:17.853",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-20T20:18:00.460",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,75 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: uvc: Corrige la desreferenciaci\u00f3n de ERR_PTR en uvc_v4l2.c Corrige la posible desreferenciaci\u00f3n de ERR_PTR() en find_format_by_pix() y uvc_v4l2_enum_format(). Corrige los siguientes errores de coincidencia: drivers/usb/gadget/function/uvc_v4l2.c:124 find_format_by_pix() error: posible desreferenciaci\u00f3n de 'fmtdesc' a ERR_PTR() drivers/usb/gadget/function/uvc_v4l2.c:392 uvc_v4l2_enum_format() error: posible desreferenciaci\u00f3n de 'fmtdesc' a ERR_PTR() Adem\u00e1s, corrige un problema similar en uvc_v4l2_try_format() para una posible desreferenciaci\u00f3n de ERR_PTR()."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.4",
"matchCriteriaId": "66F99BD9-E74F-4CC8-834E-B73BD4643C7B"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/a7bb96b18864225a694e3887ac2733159489e4b0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/cedeb36c3ff4acd0f3d09918dfd8ed1df05efdd6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50060",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T20:15:18.117",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-20T20:25:37.210",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,23 +15,103 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: io_uring: comprobar si necesitamos reprogramar durante el vaciado de desbordamiento En t\u00e9rminos de uso normal de la aplicaci\u00f3n, esta lista siempre estar\u00e1 vac\u00eda. Y si una aplicaci\u00f3n se desborda un poco, tendr\u00e1 algunas entradas. Sin embargo, obviamente nada impide que syzbot ejecute un caso de prueba que genere un mont\u00f3n de entradas de desbordamiento, y luego vaciarlas puede llevar bastante tiempo. Verifique la necesidad de reprogramar durante el vaciado y elimine nuestros bloqueos y h\u00e1galo si es necesario. No hay ning\u00fan estado que mantener aqu\u00ed, ya que los desbordamientos siempre se podan desde el principio de la lista, por lo tanto, est\u00e1 bien eliminar y volver a adquirir los bloqueos al final del bucle."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.1",
"versionEndExcluding": "6.1.113",
"matchCriteriaId": "C9833DA6-D5C8-4B44-9B42-1FF7CB895D7B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6",
"versionEndExcluding": "6.6.57",
"matchCriteriaId": "922342C4-A42B-4202-87E5-A5B665F7A490"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.4",
"matchCriteriaId": "66F99BD9-E74F-4CC8-834E-B73BD4643C7B"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/a2493904e95ce94bbec819d8f7f03b99976eb25c",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c2eadeafce2d385b3f6d26a7f31fee5aba2bbbb0",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/eac2ca2d682f94f46b1973bdf5e77d85d77b8e53",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/f4ce3b5d26ce149e77e6b8e8f2058aa80e5b034e",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50065",
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"published": "2024-10-21T20:15:18.520",
"lastModified": "2024-10-23T15:12:34.673",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-20T20:07:01.320",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,19 +15,99 @@
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: ntfs3: Cambio a asignaci\u00f3n sin bloqueo en ntfs_d_hash d_hash se realiza mientras se est\u00e1 bajo \"rcu-walk\" y no deber\u00eda estar en suspensi\u00f3n. __get_name() asigna usando GFP_KERNEL, teniendo la posibilidad de estar en suspensi\u00f3n cuando se encuentra bajo presi\u00f3n de memoria. Cambie la asignaci\u00f3n a GFP_NOWAIT."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.6.44",
"versionEndExcluding": "6.6.57",
"matchCriteriaId": "12B34D9E-C686-4929-A5FB-FA16A379708A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.11",
"versionEndExcluding": "6.11.4",
"matchCriteriaId": "66F99BD9-E74F-4CC8-834E-B73BD4643C7B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "7F361E1D-580F-4A2D-A509-7615F73167A1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:linux:linux_kernel:6.12:rc2:*:*:*:*:*:*",
"matchCriteriaId": "925478D0-3E3D-4E6F-ACD5-09F28D5DF82C"
}
]
}
]
}
],
"references": [
{
"url": "https://git.kernel.org/stable/c/589996bf8c459deb5bbc9747d8f1c51658608103",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/c556e72cea2a1131ae418be017dd6fc76fffe2fb",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
},
{
"url": "https://git.kernel.org/stable/c/d0c710372e238510db08ea01e7b8bd81ed995dd6",
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
"tags": [
"Patch"
]
}
]
}

View File

@ -2,24 +2,129 @@
"id": "CVE-2024-52714",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-19T19:15:08.680",
"lastModified": "2024-11-19T21:56:45.533",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-20T20:35:15.260",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC6 v2.0 v15.03.06.50 was discovered to contain a buffer overflow in the function 'fromSetSysTime."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Tenda AC6 v2.0 v15.03.06.50 conten\u00eda un desbordamiento de b\u00fafer en la funci\u00f3n 'fromSetSysTime."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tenda:ac6_firmware:15.03.06.50_multi:*:*:*:*:*:*:*",
"matchCriteriaId": "D3EC4D9E-D190-4037-A9DF-9A1575276E73"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tenda:ac6:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E382AD7E-1450-40FC-AE9D-698B491805F0"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "http://tenda.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "https://github.com/CLan-nad/CVE/blob/main/tenda/fromSetSysTime/1.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-52739",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-20T18:15:23.393",
"lastModified": "2024-11-20T18:15:23.393",
"lastModified": "2024-11-20T20:35:16.147",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "D-LINK DI-8400 v16.07.26A1 was discovered to contain multiple remote command execution (RCE) vulnerabilities in the msp_info_htm function via the flag and cmd parameters."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/DI_8400_msp_info_htm_rce/detail.md",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-52754",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-20T20:15:19.450",
"lastModified": "2024-11-20T20:15:19.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "D-LINK DI-8003 v16.07.16A1 was discovered to contain a buffer overflow via the fn parameter in the tgfile_htm function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/DI_8003_tgfile_htm_stackoverflow/detail.md",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-52757",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-20T20:15:19.533",
"lastModified": "2024-11-20T20:15:19.533",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "D-LINK DI-8003 v16.07.16A1 was discovered to contain a buffer overflow via the notify parameter in the arp_sys_asp function."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/DI_8003_arp_sys_asp_stackoverflow/detail.md",
"source": "cve@mitre.org"
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,24 +2,99 @@
"id": "CVE-2024-52759",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-19T19:15:08.767",
"lastModified": "2024-11-19T21:56:45.533",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2024-11-20T19:04:10.017",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "D-LINK DI-8003 v16.07.26A1 was discovered to contain a buffer overflow via the ip parameter in the ip_position_asp function."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que D-LINK DI-8003 v16.07.26A1 conten\u00eda un desbordamiento de b\u00fafer a trav\u00e9s del par\u00e1metro ip en la funci\u00f3n ip_position_asp."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:di-8003_firmware:16.07.16a1:*:*:*:*:*:*:*",
"matchCriteriaId": "09B22DC9-F8B2-462A-A64C-5881DC1E3FCD"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:di-8003:a1:*:*:*:*:*:*:*",
"matchCriteriaId": "840B4964-A435-4220-BBCC-08DC344FD7D1"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/faqiadegege/IoTVuln/blob/main/DI_8003_ip_position_asp_stackoverflow/detail.md",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-52762",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-19T21:15:06.580",
"lastModified": "2024-11-19T21:56:45.533",
"lastModified": "2024-11-20T20:35:17.280",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A cross-site scripting (XSS) vulnerability in the component /master/header.php of Ganglia-web v3.73 to v3.76 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the \"tz\" parameter."
},
{
"lang": "es",
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) en el componente /master/header.php de Ganglia-web v3.73 a v3.76 permite a los atacantes ejecutar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de un payload manipulado espec\u00edficamente e inyectado en el par\u00e1metro \"tz\"."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/ganglia/ganglia-web/issues/382",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-11-20T19:00:20.813444+00:00
2024-11-20T21:00:31.582668+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-11-20T18:58:42.133000+00:00
2024-11-20T20:56:49.150000+00:00
```
### Last Data Feed Release
@ -33,69 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
270747
270755
```
### CVEs added in the last Commit
Recently added CVEs: `34`
Recently added CVEs: `8`
- [CVE-2018-9479](CVE-2018/CVE-2018-94xx/CVE-2018-9479.json) (`2024-11-20T18:15:19.830`)
- [CVE-2018-9480](CVE-2018/CVE-2018-94xx/CVE-2018-9480.json) (`2024-11-20T18:15:19.890`)
- [CVE-2018-9481](CVE-2018/CVE-2018-94xx/CVE-2018-9481.json) (`2024-11-20T18:15:19.940`)
- [CVE-2018-9482](CVE-2018/CVE-2018-94xx/CVE-2018-9482.json) (`2024-11-20T18:15:20.000`)
- [CVE-2018-9483](CVE-2018/CVE-2018-94xx/CVE-2018-9483.json) (`2024-11-20T18:15:20.053`)
- [CVE-2018-9484](CVE-2018/CVE-2018-94xx/CVE-2018-9484.json) (`2024-11-20T18:15:20.107`)
- [CVE-2018-9485](CVE-2018/CVE-2018-94xx/CVE-2018-9485.json) (`2024-11-20T18:15:20.163`)
- [CVE-2018-9486](CVE-2018/CVE-2018-94xx/CVE-2018-9486.json) (`2024-11-20T18:15:20.220`)
- [CVE-2018-9487](CVE-2018/CVE-2018-94xx/CVE-2018-9487.json) (`2024-11-20T18:15:20.277`)
- [CVE-2024-11081](CVE-2024/CVE-2024-110xx/CVE-2024-11081.json) (`2024-11-20T18:15:22.340`)
- [CVE-2024-11488](CVE-2024/CVE-2024-114xx/CVE-2024-11488.json) (`2024-11-20T17:15:14.097`)
- [CVE-2024-11489](CVE-2024/CVE-2024-114xx/CVE-2024-11489.json) (`2024-11-20T17:15:14.847`)
- [CVE-2024-11490](CVE-2024/CVE-2024-114xx/CVE-2024-11490.json) (`2024-11-20T17:15:15.637`)
- [CVE-2024-11491](CVE-2024/CVE-2024-114xx/CVE-2024-11491.json) (`2024-11-20T17:15:16.397`)
- [CVE-2024-11492](CVE-2024/CVE-2024-114xx/CVE-2024-11492.json) (`2024-11-20T18:15:22.403`)
- [CVE-2024-11493](CVE-2024/CVE-2024-114xx/CVE-2024-11493.json) (`2024-11-20T18:15:22.700`)
- [CVE-2024-29292](CVE-2024/CVE-2024-292xx/CVE-2024-29292.json) (`2024-11-20T18:15:22.970`)
- [CVE-2024-51162](CVE-2024/CVE-2024-511xx/CVE-2024-51162.json) (`2024-11-20T17:15:18.120`)
- [CVE-2024-51163](CVE-2024/CVE-2024-511xx/CVE-2024-51163.json) (`2024-11-20T17:15:18.417`)
- [CVE-2024-52725](CVE-2024/CVE-2024-527xx/CVE-2024-52725.json) (`2024-11-20T17:15:18.867`)
- [CVE-2024-52739](CVE-2024/CVE-2024-527xx/CVE-2024-52739.json) (`2024-11-20T18:15:23.393`)
- [CVE-2024-52769](CVE-2024/CVE-2024-527xx/CVE-2024-52769.json) (`2024-11-20T17:15:19.907`)
- [CVE-2024-52770](CVE-2024/CVE-2024-527xx/CVE-2024-52770.json) (`2024-11-20T17:15:20.200`)
- [CVE-2024-52771](CVE-2024/CVE-2024-527xx/CVE-2024-52771.json) (`2024-11-20T17:15:20.637`)
- [CVE-2024-52796](CVE-2024/CVE-2024-527xx/CVE-2024-52796.json) (`2024-11-20T17:15:20.953`)
- [CVE-2024-33439](CVE-2024/CVE-2024-334xx/CVE-2024-33439.json) (`2024-11-20T19:15:06.010`)
- [CVE-2024-45510](CVE-2024/CVE-2024-455xx/CVE-2024-45510.json) (`2024-11-20T20:15:18.943`)
- [CVE-2024-45511](CVE-2024/CVE-2024-455xx/CVE-2024-45511.json) (`2024-11-20T19:15:06.123`)
- [CVE-2024-48981](CVE-2024/CVE-2024-489xx/CVE-2024-48981.json) (`2024-11-20T20:15:19.097`)
- [CVE-2024-48983](CVE-2024/CVE-2024-489xx/CVE-2024-48983.json) (`2024-11-20T20:15:19.183`)
- [CVE-2024-48985](CVE-2024/CVE-2024-489xx/CVE-2024-48985.json) (`2024-11-20T20:15:19.270`)
- [CVE-2024-52754](CVE-2024/CVE-2024-527xx/CVE-2024-52754.json) (`2024-11-20T20:15:19.450`)
- [CVE-2024-52757](CVE-2024/CVE-2024-527xx/CVE-2024-52757.json) (`2024-11-20T20:15:19.533`)
### CVEs modified in the last Commit
Recently modified CVEs: `47`
- [CVE-2024-34365](CVE-2024/CVE-2024-343xx/CVE-2024-34365.json) (`2024-11-20T17:35:27.017`)
- [CVE-2024-34487](CVE-2024/CVE-2024-344xx/CVE-2024-34487.json) (`2024-11-20T17:35:27.303`)
- [CVE-2024-3471](CVE-2024/CVE-2024-34xx/CVE-2024-3471.json) (`2024-11-20T18:35:22.923`)
- [CVE-2024-35283](CVE-2024/CVE-2024-352xx/CVE-2024-35283.json) (`2024-11-20T18:35:20.470`)
- [CVE-2024-3629](CVE-2024/CVE-2024-36xx/CVE-2024-3629.json) (`2024-11-20T18:35:23.183`)
- [CVE-2024-3644](CVE-2024/CVE-2024-36xx/CVE-2024-3644.json) (`2024-11-20T18:35:23.437`)
- [CVE-2024-46768](CVE-2024/CVE-2024-467xx/CVE-2024-46768.json) (`2024-11-20T18:19:35.033`)
- [CVE-2024-46771](CVE-2024/CVE-2024-467xx/CVE-2024-46771.json) (`2024-11-20T18:20:03.130`)
- [CVE-2024-46774](CVE-2024/CVE-2024-467xx/CVE-2024-46774.json) (`2024-11-20T18:19:00.327`)
- [CVE-2024-46775](CVE-2024/CVE-2024-467xx/CVE-2024-46775.json) (`2024-11-20T18:17:13.750`)
- [CVE-2024-46776](CVE-2024/CVE-2024-467xx/CVE-2024-46776.json) (`2024-11-20T17:56:57.290`)
- [CVE-2024-46777](CVE-2024/CVE-2024-467xx/CVE-2024-46777.json) (`2024-11-20T17:56:02.287`)
- [CVE-2024-46778](CVE-2024/CVE-2024-467xx/CVE-2024-46778.json) (`2024-11-20T17:40:37.847`)
- [CVE-2024-46780](CVE-2024/CVE-2024-467xx/CVE-2024-46780.json) (`2024-11-20T17:31:54.440`)
- [CVE-2024-46789](CVE-2024/CVE-2024-467xx/CVE-2024-46789.json) (`2024-11-20T17:27:03.197`)
- [CVE-2024-46815](CVE-2024/CVE-2024-468xx/CVE-2024-46815.json) (`2024-11-20T18:22:12.017`)
- [CVE-2024-46816](CVE-2024/CVE-2024-468xx/CVE-2024-46816.json) (`2024-11-20T18:02:52.437`)
- [CVE-2024-46817](CVE-2024/CVE-2024-468xx/CVE-2024-46817.json) (`2024-11-20T17:45:43.893`)
- [CVE-2024-46820](CVE-2024/CVE-2024-468xx/CVE-2024-46820.json) (`2024-11-20T17:34:05.143`)
- [CVE-2024-46825](CVE-2024/CVE-2024-468xx/CVE-2024-46825.json) (`2024-11-20T17:24:04.660`)
- [CVE-2024-46826](CVE-2024/CVE-2024-468xx/CVE-2024-46826.json) (`2024-11-20T17:19:00.183`)
- [CVE-2024-4705](CVE-2024/CVE-2024-47xx/CVE-2024-4705.json) (`2024-11-20T18:58:42.133`)
- [CVE-2024-50968](CVE-2024/CVE-2024-509xx/CVE-2024-50968.json) (`2024-11-20T17:35:28.470`)
- [CVE-2024-52613](CVE-2024/CVE-2024-526xx/CVE-2024-52613.json) (`2024-11-20T17:35:28.730`)
- [CVE-2024-7193](CVE-2024/CVE-2024-71xx/CVE-2024-7193.json) (`2024-11-20T17:04:07.447`)
- [CVE-2024-24051](CVE-2024/CVE-2024-240xx/CVE-2024-24051.json) (`2024-11-20T19:16:25.340`)
- [CVE-2024-33014](CVE-2024/CVE-2024-330xx/CVE-2024-33014.json) (`2024-11-20T20:35:37.887`)
- [CVE-2024-33015](CVE-2024/CVE-2024-330xx/CVE-2024-33015.json) (`2024-11-20T19:57:11.903`)
- [CVE-2024-33018](CVE-2024/CVE-2024-330xx/CVE-2024-33018.json) (`2024-11-20T19:40:37.843`)
- [CVE-2024-33019](CVE-2024/CVE-2024-330xx/CVE-2024-33019.json) (`2024-11-20T19:21:14.377`)
- [CVE-2024-33020](CVE-2024/CVE-2024-330xx/CVE-2024-33020.json) (`2024-11-20T19:24:57.907`)
- [CVE-2024-33021](CVE-2024/CVE-2024-330xx/CVE-2024-33021.json) (`2024-11-20T19:28:00.557`)
- [CVE-2024-33022](CVE-2024/CVE-2024-330xx/CVE-2024-33022.json) (`2024-11-20T19:30:31.947`)
- [CVE-2024-33023](CVE-2024/CVE-2024-330xx/CVE-2024-33023.json) (`2024-11-20T19:34:07.593`)
- [CVE-2024-33024](CVE-2024/CVE-2024-330xx/CVE-2024-33024.json) (`2024-11-20T19:42:03.107`)
- [CVE-2024-33025](CVE-2024/CVE-2024-330xx/CVE-2024-33025.json) (`2024-11-20T19:53:16.570`)
- [CVE-2024-33026](CVE-2024/CVE-2024-330xx/CVE-2024-33026.json) (`2024-11-20T19:37:28.193`)
- [CVE-2024-45689](CVE-2024/CVE-2024-456xx/CVE-2024-45689.json) (`2024-11-20T20:35:10.157`)
- [CVE-2024-45691](CVE-2024/CVE-2024-456xx/CVE-2024-45691.json) (`2024-11-20T20:35:10.377`)
- [CVE-2024-46794](CVE-2024/CVE-2024-467xx/CVE-2024-46794.json) (`2024-11-20T20:56:49.150`)
- [CVE-2024-46812](CVE-2024/CVE-2024-468xx/CVE-2024-46812.json) (`2024-11-20T20:48:48.663`)
- [CVE-2024-46827](CVE-2024/CVE-2024-468xx/CVE-2024-46827.json) (`2024-11-20T20:40:40.737`)
- [CVE-2024-48899](CVE-2024/CVE-2024-488xx/CVE-2024-48899.json) (`2024-11-20T20:35:10.583`)
- [CVE-2024-50056](CVE-2024/CVE-2024-500xx/CVE-2024-50056.json) (`2024-11-20T20:18:00.460`)
- [CVE-2024-50060](CVE-2024/CVE-2024-500xx/CVE-2024-50060.json) (`2024-11-20T20:25:37.210`)
- [CVE-2024-50065](CVE-2024/CVE-2024-500xx/CVE-2024-50065.json) (`2024-11-20T20:07:01.320`)
- [CVE-2024-52714](CVE-2024/CVE-2024-527xx/CVE-2024-52714.json) (`2024-11-20T20:35:15.260`)
- [CVE-2024-52739](CVE-2024/CVE-2024-527xx/CVE-2024-52739.json) (`2024-11-20T20:35:16.147`)
- [CVE-2024-52759](CVE-2024/CVE-2024-527xx/CVE-2024-52759.json) (`2024-11-20T19:04:10.017`)
- [CVE-2024-52762](CVE-2024/CVE-2024-527xx/CVE-2024-52762.json) (`2024-11-20T20:35:17.280`)
## Download and Usage

View File

@ -96970,7 +96970,7 @@ CVE-2017-13221,0,0,57e3b08fba40dbad7e13f1ecaef036f44baab1a7137260bac79cedbd0aaba
CVE-2017-13222,0,0,ebfdf42baf601798adad1e504ba051d585896884b139bf563ee706b616493897,2018-01-24T16:09:05.727000
CVE-2017-13225,0,0,435256662af53bc84b96c8ecfbcc5e36a7df54bbec82fdff4a451c067fc3516f,2018-01-25T14:42:54.447000
CVE-2017-13226,0,0,a63799b06443b94461c2cc06e2e1817db591c161b20b7ad48cffc3add8fc02f9,2019-10-03T00:03:26.223000
CVE-2017-13227,0,1,298c91cd6525a66e289471e63f3648a2d80772c5e5ecb99bbc80e8ce07d9c1c2,2024-11-20T17:35:01.323000
CVE-2017-13227,0,0,298c91cd6525a66e289471e63f3648a2d80772c5e5ecb99bbc80e8ce07d9c1c2,2024-11-20T17:35:01.323000
CVE-2017-13228,0,0,d6d00cc11b40a6f7cf8c7c7b74c3a16d54ba4bf0782c9a7d7071e50c41c579df,2018-03-13T14:41:27.033000
CVE-2017-13229,0,0,7ebc8fa8286ba1d5821a34ad554783788a44485aedcb5ab1d772a4b9b365c210,2018-03-06T19:52:36.463000
CVE-2017-13230,0,0,d8a847f5c7c6d9cdce8e19c6fc7435655e7234b7d29ac67a202b7766226c4533,2018-03-13T14:40:12.123000
@ -97063,7 +97063,7 @@ CVE-2017-13311,0,0,55504e7fca37acf50034a712244c28977b52d63a2e0a85783f86e9cd04320
CVE-2017-13312,0,0,b6008dd37efed3ed1dd1887cecd96d4e7119296f7daae93046904c3ca18f8781,2024-11-19T16:35:02.293000
CVE-2017-13313,0,0,9c6a43618c00c0daf8e78c975c9182c8d073005f306ff0e197206a7550c09d34,2024-11-19T16:35:03.173000
CVE-2017-13314,0,0,f15cc076ea1dd87f4d0185b4f5bda3970135144fc10252817f13153eff27c1ae,2024-11-19T16:35:03.990000
CVE-2017-13315,0,1,d16ea5a6b80ed40589c9b9f086a0f1c6ce65bee6281581573bcff9f10ee7ebce,2024-11-20T17:35:01.990000
CVE-2017-13315,0,0,d16ea5a6b80ed40589c9b9f086a0f1c6ce65bee6281581573bcff9f10ee7ebce,2024-11-20T17:35:01.990000
CVE-2017-1332,0,0,784a9ee8c3796f2a11ff24e95ae95a08508911f60f6ead21d91e6503f5824554,2017-08-03T15:46:39.147000
CVE-2017-1333,0,0,3ec8913dbfad3ccab38e891f6e15f9a0101bb53e4d210c158476cd692803a999,2017-11-16T17:13:42.270000
CVE-2017-1334,0,0,406b3dd86a0e9fb2c9a541dafaa2903ce89044fcfe05700f9700b783b2647a7d,2017-10-10T15:07:22.713000
@ -126884,12 +126884,12 @@ CVE-2018-9335,0,0,a4615c2362644f0db16eaee8cf3937ed4f43b5ecf27164e1ed1f54117ac25b
CVE-2018-9336,0,0,ece9df721ed9453241003aa3ca14b7e9da806325e2f8fa4c87f2deb09e87e0cc,2018-06-13T14:27:26.440000
CVE-2018-9337,0,0,fa1438ef5dec1ff612947292d12b5f781ba1ebd09d4937236a9cc31915af5230,2020-02-17T16:15:25.707000
CVE-2018-9338,0,0,40228caba823ad4e1209a735d23de42ebe53e934eb70e92e5f887484ad853af1,2024-11-19T21:56:45.533000
CVE-2018-9339,0,1,709efef40e42bc3c2225b57543207441d20c7ae11456afd083c75a2cdc9efcd2,2024-11-20T17:35:03.690000
CVE-2018-9340,0,1,e1bd80ee3e5ace41d8144dcb6345ec04b94a8d02c934bd98bf987da3d9907ae8,2024-11-20T17:35:05.083000
CVE-2018-9341,0,1,cd9badee59c87b713a540b7c443b6ae5619b04098a98a92b34dccc3138e4e84c,2024-11-20T17:35:06.453000
CVE-2018-9344,0,1,65379d2152171423139c5d37a84fb2153c0976314acd795bf036e0babb97c542,2024-11-20T17:35:07.810000
CVE-2018-9345,0,1,4ca350d52bd2857345f5bae5382d74c8aba6043d7b12f03b4a66e07250b88245,2024-11-20T17:35:09.167000
CVE-2018-9346,0,1,8047424bed92883715de87714aaea146c43861253f77c3ba87eaffe19bc426eb,2024-11-20T17:35:10.507000
CVE-2018-9339,0,0,709efef40e42bc3c2225b57543207441d20c7ae11456afd083c75a2cdc9efcd2,2024-11-20T17:35:03.690000
CVE-2018-9340,0,0,e1bd80ee3e5ace41d8144dcb6345ec04b94a8d02c934bd98bf987da3d9907ae8,2024-11-20T17:35:05.083000
CVE-2018-9341,0,0,cd9badee59c87b713a540b7c443b6ae5619b04098a98a92b34dccc3138e4e84c,2024-11-20T17:35:06.453000
CVE-2018-9344,0,0,65379d2152171423139c5d37a84fb2153c0976314acd795bf036e0babb97c542,2024-11-20T17:35:07.810000
CVE-2018-9345,0,0,4ca350d52bd2857345f5bae5382d74c8aba6043d7b12f03b4a66e07250b88245,2024-11-20T17:35:09.167000
CVE-2018-9346,0,0,8047424bed92883715de87714aaea146c43861253f77c3ba87eaffe19bc426eb,2024-11-20T17:35:10.507000
CVE-2018-9347,0,0,004e6ddc7f66bf50b522d5dc4068b89ca2d1ec23406d1738d4ef275b0261e9d4,2018-12-27T13:51:37.067000
CVE-2018-9348,0,0,7af83442535298c290a4c9be23d63103bd5378183d38c43ed7368ffef3523d1d,2024-11-20T16:35:02.590000
CVE-2018-9355,0,0,e8ee2b8217cc4365fa52ec9ad40dda0902bdca6141010bdb87ba36c76908b916,2018-12-14T21:00:55.643000
@ -126908,10 +126908,10 @@ CVE-2018-9367,0,0,6e3d42576b1bba3f49a27b062398e300d1ae34ff95f48a7b310f4e1f7a6a36
CVE-2018-9368,0,0,3eed727016aaa1bdb2ab5590e837fbeae320a0018dd2936f380b32a99670cd83,2024-11-19T21:56:45.533000
CVE-2018-9369,0,0,9395f39f3513afb7330245b4e0c6e2bb02799fed3ddb0f89583c25ad12118d29,2024-11-19T21:56:45.533000
CVE-2018-9370,0,0,80c738099e22390d7e6e0bedd05470d0a35c0f1a435a7004a3ba7f53da24e5b7,2024-11-19T21:56:45.533000
CVE-2018-9371,0,0,2fb9e6f1ef7787cbeb22bcd1773478b505435b8f99bc15218d6dfcac4adccdb0,2024-11-19T21:56:45.533000
CVE-2018-9371,0,1,391d37936865c68d4397a6dd5a5c14645bbed7006327faadfe06d86fb258ec9f,2024-11-20T20:35:02.730000
CVE-2018-9372,0,0,5241fff5e37359ca4d40d4d0ef51eddfb8e42f03921d8e136fe460686e5ef5c0,2024-11-19T21:56:45.533000
CVE-2018-9385,0,0,a04751693f742cd9abca42cb6fa43b673fbcc24bbf305f54b6cb4b8b3d812bd4,2018-12-12T21:37:19.207000
CVE-2018-9409,0,0,2968adb0075b7a844b1483be93f82fcfba96e3349da8031816178caf69a971d2,2024-11-19T21:56:45.533000
CVE-2018-9409,0,1,ebcda6f7e24e6f698fa6ccd47d9f60bf8bc1c7442cbc31f290fa0b923152d8a0,2024-11-20T20:35:04.480000
CVE-2018-9410,0,0,45d71f9ef4f84e4fb6ba694e9a2e9b63ef0d6353576e0fc9edb4a0ce290c4c46,2024-11-19T21:56:45.533000
CVE-2018-9411,0,0,476b90c439a624a41737123423172fd604476c92ec43d209337f6742c8d2dcd6,2024-11-20T16:35:05.247000
CVE-2018-9412,0,0,af0a26cc2a5cb016d9b3edebc5a3654aa65d5ce51220ae84c7907a388e7c6262,2024-11-19T22:15:18.813000
@ -126948,26 +126948,26 @@ CVE-2018-9459,0,0,37f92a3a8615ac08ad1157d56af457710a07fd1019b073a6d5f8014670ff75
CVE-2018-9465,0,0,3393303102eece75c592f8058027ea52136d9a6fe887ab46a73f746fe5320e57,2018-12-12T14:31:22.043000
CVE-2018-9466,0,0,8a0bcf1d1447e0805bae81af54b078ca35801107416c23ddf0d4e34acefc60c4,2024-11-20T16:35:12.150000
CVE-2018-9467,0,0,f5a4d9f86c03009f1de6b0f82410445906224b1309bf765545b0d54afac3483c,2024-11-20T00:15:16.820000
CVE-2018-9468,1,1,df02ce6b1d3ad6facea805e279cbed7c6c7701712910c294bf68b00df0b469c2,2024-11-20T17:15:08.783000
CVE-2018-9469,1,1,9bff9d593879c1fdf78301c90abaa160b90bd6eac95cba15c05faa69eff3a9a4,2024-11-20T17:15:09.040000
CVE-2018-9470,1,1,b5cccf8f6b9f73a4a95c37b2bbd0781cd6ba57e39dc5fde7c2c904efbd17f814,2024-11-20T18:15:19.427000
CVE-2018-9471,1,1,a25bd887e39eac47b2287f87e3158bc5da1cedaa4466f518bfab743c61723935,2024-11-20T18:15:19.500000
CVE-2018-9472,1,1,6d41a1ef8ff54b7645232023c7bd7e12a653214c2489443a595f5949dfe52bb4,2024-11-20T18:15:19.550000
CVE-2018-9468,0,1,4ad8c9d864ae31198912ba653d748e3abeed9dd8403ebcf567b0dd50bdaa8c03,2024-11-20T19:35:00.663000
CVE-2018-9469,0,1,aa3c8c07cc7eabdc806accba6566a0e861e50384909ef6b1c64352a9ea52614f,2024-11-20T19:35:00.937000
CVE-2018-9470,0,1,1edc3c40db1064f64c880c7256f918fce736efafa95e44c73e960d7c43bfd7bf,2024-11-20T19:35:02.080000
CVE-2018-9471,0,1,19718f3b157e69037ccdf5119c4fde2ee21decc486e09268e4a137598f6d731f,2024-11-20T19:35:03.063000
CVE-2018-9472,0,1,859d9f86c54cb3ac2b3c8eed44babd4c849f22daa60b8841a1970ba7343add05,2024-11-20T19:35:03.980000
CVE-2018-9473,0,0,c1bdd895adedc9cea983c10ac747c9f80d48e4298ee85e28850c7d3a483f6fc6,2023-11-07T03:01:36.857000
CVE-2018-9474,1,1,9e2b0489401002dd8acaba51c5f85ce9c9ffae27e01c2b081a4bc10aeb07a6f6,2024-11-20T18:15:19.610000
CVE-2018-9475,1,1,ca68577f7baec870a17f6b527f53952d05f1ae3256058c0a3bfd1858ed849b51,2024-11-20T18:15:19.670000
CVE-2018-9474,0,1,2fc462ca1c99c70e2644d5a4cf7e700117a5d94211c5f9c273211f202b8f442f,2024-11-20T19:35:04.790000
CVE-2018-9475,0,1,a33b010c0ffcea3706ecab9f9683c6e2a9a060715eb0b06244d5b86da272af72,2024-11-20T19:35:05.590000
CVE-2018-9476,0,0,1a47893a31d348e8886bcf5af0104f1b9d6f9c70018616ac539379931cc12516,2023-11-07T03:01:36.913000
CVE-2018-9477,1,1,0b3782d7dea5a5ed303fb6f5a1565051d2a7ee5c5ec41f3b66100968046d3a3a,2024-11-20T18:15:19.723000
CVE-2018-9478,1,1,cec0fab52d78d1de919f516142ec6b7848350eee24daa8824c8d1e0c4497c216,2024-11-20T18:15:19.773000
CVE-2018-9479,1,1,f22a2731df3aac2b0bdb456ea6856653670bff2ed5601c47970a5d0dbfbf931e,2024-11-20T18:15:19.830000
CVE-2018-9480,1,1,ab859b2ce5aefa70c1732d96640459bfc766e2f04074780af897f8f403546339,2024-11-20T18:15:19.890000
CVE-2018-9481,1,1,784e23fa20ef2fa61ecdefe55b6081e5aef5f3107dd6f81a5e94a6e1cb094637,2024-11-20T18:15:19.940000
CVE-2018-9482,1,1,14d935e2207311ceeb90656bfdedf27cb4585dbf4fa00e0eb424830286d8c440,2024-11-20T18:15:20
CVE-2018-9483,1,1,db4653754d1231afdef6b6a1577601d7b9565f52f1a6b26b29b17caa3c98dc32,2024-11-20T18:15:20.053000
CVE-2018-9484,1,1,3c612c22c918d7eac7620bc0366fec1f7519f5a9e04df68743e1ad55b47e30e5,2024-11-20T18:15:20.107000
CVE-2018-9485,1,1,a6d84f14faaa2d95ec8f919baecaebc6ba9e427635afb4713d0c1a36749252d7,2024-11-20T18:15:20.163000
CVE-2018-9486,1,1,7dc0674674af21a0abccc63bc5778a80ab4b376e9a828d2449c08fd30d791ecd,2024-11-20T18:15:20.220000
CVE-2018-9487,1,1,d1a184d9c48e59ffed2afaf8c24275fa500657c6b909ce47ee106a6d2e37df55,2024-11-20T18:15:20.277000
CVE-2018-9477,0,1,dc13b19992f78434791a0fbc13a8edc462f7906dc94916facd9ae82c958a18d3,2024-11-20T19:35:06.410000
CVE-2018-9478,0,1,e62c7e60234a00aab239fe0bf28caf2fee794b5fbe6ede6546cbb5aad76f7733,2024-11-20T19:35:07.310000
CVE-2018-9479,0,1,019da2b825e07153cd168d654e8fa2b554132cee5892ca29f3fba26b51246f16,2024-11-20T19:35:08.127000
CVE-2018-9480,0,1,7d2bc9d3d402ad7b751be65da82b421799466990f6d6bfffb54761b6d52c46d2,2024-11-20T19:35:09.023000
CVE-2018-9481,0,1,2e6e23f49e804ad13c814a4a55ffe419aecc075c670e854d63326bf3024a6da3,2024-11-20T19:35:10.130000
CVE-2018-9482,0,1,46da710fbe56476783bc00e35fb2014c86285ab8f035637b7dcf7815f9b954cb,2024-11-20T19:35:11.110000
CVE-2018-9483,0,1,84ad1db0d1f7efd9beb78ab661a079e810de5c191e41ebc0e6d40304afa5e585,2024-11-20T19:35:11.993000
CVE-2018-9484,0,1,ab9a6d34f3c239a98e606ce81ca46dfdd65bf0dee026aa6d5f426b65c2e5f557,2024-11-20T19:35:12.870000
CVE-2018-9485,0,1,578887ca1d1ad14a45310a5538f57217d997a642266c29bee0679734d86c5363,2024-11-20T19:35:13.760000
CVE-2018-9486,0,1,9ff7641a6fb9e148057b6696e43d07c1f1cc89ef1e3a5a55f1c75528042ec7a1,2024-11-20T19:35:14.657000
CVE-2018-9487,0,1,d8a3a9ce741a4dfc7f600b57fa66cd1d7b625fb2298e8dfc7c4229a76769a452,2024-11-20T19:35:15.573000
CVE-2018-9488,0,0,71b6dcf45b61fc203c6b47a6e57d0e676f081e2bcfeee87d14c2243a30065e58,2020-08-24T17:37:01.140000
CVE-2018-9489,0,0,0099c3fefae2b8555e406065f8c8cb7b969ba5c3ca27214a0b4864b328f4581b,2018-12-13T15:00:19.263000
CVE-2018-9490,0,0,cc042ad56360c2290ea2dde569ff2c97233270532d7564c204f2685c4a8e9dd4,2023-11-07T03:01:36.990000
@ -215895,7 +215895,7 @@ CVE-2023-21266,0,0,18d7bcc4c1fdfc1af03411d2e140522d50eb303306a9a01cd215164baa58c
CVE-2023-21267,0,0,228f6f7596b6cb97274c6123e77ddff3343b22ba18b10a96e2055db9bcead853,2024-07-03T01:39:20.417000
CVE-2023-21268,0,0,7502585c73530dd6ce3c3ff0a870c3ee2c56fd847c4fb3355c51e0a7f0ac2071,2023-11-15T02:55:56.537000
CVE-2023-21269,0,0,fece9dff3711fe2af86d775cc74a99bad4829a0075d5a2a32efc6af138cb5008,2024-10-09T16:35:01.057000
CVE-2023-21270,0,1,1fe5c2357fd389c2fa26892a2779cf8fae56997897dec89089d61f79d70b9e74,2024-11-20T17:35:18.563000
CVE-2023-21270,0,0,1fe5c2357fd389c2fa26892a2779cf8fae56997897dec89089d61f79d70b9e74,2024-11-20T17:35:18.563000
CVE-2023-21271,0,0,3086339ffce7fa60dbd215e725bc9394127b3bd1eb1d62f2277d721d350ea6f3,2023-08-18T19:54:05.827000
CVE-2023-21272,0,0,8929585c315334a5cf678abc944b74ca2a510b1cfc115c2eab8b9f06cedbaa56,2024-10-09T16:35:02.920000
CVE-2023-21273,0,0,1299d8533bbcaea325dcedcf17bc021b0703fb6c70d4dac65290a62467f88245,2023-08-18T19:44:13.167000
@ -221153,7 +221153,7 @@ CVE-2023-27733,0,0,222a4bd3533e318360f2e12e34f2a89ae493a553a560ecd9505d00aae2564
CVE-2023-27734,0,0,de74baa3a7e7f63dc76bee3aecaffc2b9f06833e06f247af333e54597e51ba31,2023-04-10T18:04:50.560000
CVE-2023-27739,0,0,cadbd272261d892e69c16c178cf9831f947c175b35886b62ac2390ecfa232633,2024-01-12T16:06:23.180000
CVE-2023-2774,0,0,c810249789d285e6cf04f6bf05015caa1979f9f2d42f50daf612abea1d801a2f,2024-05-17T02:23:15.210000
CVE-2023-27742,0,0,32b159e61f8383cd7fcd31819ba01f73b90a78dc2aa9436fa96b64bc3246fb3e,2023-05-25T16:03:19.983000
CVE-2023-27742,0,1,a2c1ee8734fba09808e95eec356212903b84f1466473cb02262fed6962e358de,2024-11-20T19:56:22.243000
CVE-2023-27744,0,0,b36ff3a0f74800e914d90727c07f269d38ddb402862a1d7510dcd59f6693d3ed,2023-06-09T18:57:44.797000
CVE-2023-27745,0,0,b3e512081fcdb9736fa8d8177024cdf8a8c1082eb225d248b40dce224e852988,2023-06-09T19:08:15.767000
CVE-2023-27746,0,0,110a7d43283e10ab0b779399e29db689021b5eb4be3f2d5df37751782c96272f,2023-04-21T19:06:09.237000
@ -227151,7 +227151,7 @@ CVE-2023-35654,0,0,5ec0257719972615a54320d70abd4585860da16cb9145e7dd4cf2a9de0b38
CVE-2023-35655,0,0,46ccfbda32de6d4aaa44064f160c4fe81117afbe213f242d2b419179ac9bae89,2023-10-14T01:44:43.167000
CVE-2023-35656,0,0,351408b3f3ce527e3e9ca146a71adca57765b10d14ffc2f2878145486a62e13f,2023-10-25T10:02:58.693000
CVE-2023-35658,0,0,8bcf70abab563df9c5ba967b15bc341b1fdf6e9f2ec89ab41d871dfe9fd14b2f,2023-09-14T02:18:53.670000
CVE-2023-35659,0,1,31170e6307be117b564d3fd5270e7a03d19c2b548298af8e23e6ce6a501467dd,2024-11-20T17:35:20.210000
CVE-2023-35659,0,0,31170e6307be117b564d3fd5270e7a03d19c2b548298af8e23e6ce6a501467dd,2024-11-20T17:35:20.210000
CVE-2023-3566,0,0,c2dc7026e794fcf3036669dc6d7e1d3151b5648f6848d46c6c625fc93ddde6f5,2024-05-17T02:27:36.673000
CVE-2023-35660,0,0,486a712e4d0f56647a1f8028aec97638904ee0fb3391eb5df721854ed5551546,2023-10-18T01:42:58.543000
CVE-2023-35661,0,0,92d005e666e4198e224998a5911b6ec28079a5f8101e9661c640419fbd2863da,2023-10-18T01:45:44.173000
@ -227178,7 +227178,7 @@ CVE-2023-35681,0,0,2603f8896e8c125b6797dbd02195d63673d6f51724707bcecf3de29ee5bd3
CVE-2023-35682,0,0,8e5be0df20127646df0c428d0877b5f6025db53a632750e4d83bce87d34712e9,2023-09-13T14:39:22.120000
CVE-2023-35683,0,0,5a67cee00f3de3a526dd990d465ec70cca53419801a3d26ae9d8d814db70f2e8,2023-09-14T02:00:12.517000
CVE-2023-35684,0,0,09ccb465b40d0eb68fba17fcdf270a630f7753abe8e6c5c89ccedcd22bd9e51b,2023-09-14T02:02:15.467000
CVE-2023-35686,0,1,34617fa54ac067d67ae07ae5ad3d4a38c50027007110f600a134e523b8321b8c,2024-11-20T17:35:20.610000
CVE-2023-35686,0,0,34617fa54ac067d67ae07ae5ad3d4a38c50027007110f600a134e523b8321b8c,2024-11-20T17:35:20.610000
CVE-2023-35687,0,0,c28e4b6a4d942f40e08b784a20dfc07c8f0fcc8f7236ef7809c0123c392aa182,2023-09-14T02:03:49.147000
CVE-2023-35689,0,0,c77c9e7a23c05ba829d34db48953b7d9e346df1f83dfb61e4b82c0b286c3749f,2023-08-22T01:10:41.940000
CVE-2023-3569,0,0,5a78514f93a9c1a429d4db50f2959ea2876b105709fb83ffa2f2296def39f506,2023-08-14T19:15:13.793000
@ -239224,7 +239224,7 @@ CVE-2023-5226,0,0,813cfbc02d6e857ea4eb9c4f7b0c665f95722678b412ba7b4768217ecb1ce9
CVE-2023-52262,0,0,c1a0e14df800f2a6d2b576d38364858b40d13c4449139f09de1e58f768e99f83,2024-01-09T21:20:26.513000
CVE-2023-52263,0,0,d1a953d70f5209ec5975404c6f52a0c966704ac8bdfece382e6f115124fdf088,2024-01-09T21:37:09.483000
CVE-2023-52264,0,0,9b2ff78f1b876fa1ed0a22169927fe0b9df14333dbd58be130a0170557049d22,2024-01-05T20:46:48.340000
CVE-2023-52265,0,0,d76308d493ddec97e5a9af6160653c91db8aca54e222e0b0f6f03ebefe6a6952,2024-01-11T20:17:16.273000
CVE-2023-52265,0,1,74648b0c5a4866a26d1688194f13c820ce8ad530bf73fb4759c3192acca12418,2024-11-20T19:56:22.243000
CVE-2023-52266,0,0,392e79410dd28494b88c098222c23fa3ab292d50b98fa168a723aeada84a1be0,2024-09-09T21:35:09.117000
CVE-2023-52267,0,0,a333985231dc167d1838ad07c7f5412f41c783b53ac052753e0394b8194796a8,2024-01-09T21:19:32.343000
CVE-2023-52268,0,0,d87a3a66864f0939a813dc0ad46f072d4aac6bc928fa03cd8863ddce8fb2a7b5,2024-11-19T17:35:07.247000
@ -242863,7 +242863,7 @@ CVE-2024-10379,0,0,214be4d491421db3527c631a39011912a259f53e90e222f386f0e0be59c25
CVE-2024-1038,0,0,c7b47d6608546def6f3304631405edc76ac6151bae95644217fe0b19e7498b5e,2024-03-13T18:16:18.563000
CVE-2024-10380,0,0,251c7695ebdffe14f2a561bb3be22f7946019d2ec5c5cf9081e853969f1037dd,2024-11-01T16:11:00.217000
CVE-2024-10381,0,0,c0308fe75631e6e478c4bb91d489e96b1c2dde80a7b938a5a315dee1135c5bea,2024-11-14T21:44:53.280000
CVE-2024-10382,0,1,6cb5ff8e8fbaf6d99ec6d0369d0950b2bb65417500c51e58719c4fb1a4cfecd9,2024-11-20T17:35:22.073000
CVE-2024-10382,0,0,6cb5ff8e8fbaf6d99ec6d0369d0950b2bb65417500c51e58719c4fb1a4cfecd9,2024-11-20T17:35:22.073000
CVE-2024-10386,0,0,92094aeb70b25026044a453c13f522af4eb391b2229044481dc021518acdc439,2024-11-05T20:07:59.487000
CVE-2024-10387,0,0,5a1f42d28f618e614b5301c0b94be55a535432bf7194e0692256ccf6aa332018,2024-11-05T20:05:55.323000
CVE-2024-10388,0,0,baa860af3611995aa3b48c2ac11975f858a05164ea5f5d56cfe1775a5d194758,2024-11-19T21:57:32.967000
@ -243306,7 +243306,7 @@ CVE-2024-11077,0,0,017b8d255e80754134e620d058a9d65876d81581be37ad0ebd6cdd417d3b7
CVE-2024-11078,0,0,d133c6201a7de964272170f882ab0586a90d59fac96ab8e0ce223d3687fb9309,2024-11-12T13:55:21.227000
CVE-2024-11079,0,0,d1a710289b6254268300773c7c9b113893f43edc23893d87d06dbeefe81deb1d,2024-11-12T13:55:21.227000
CVE-2024-1108,0,0,72e8aa7ee320c630f0cd3020b574b902dcf572a1d2888f0afb29692e74e18247,2024-02-22T19:07:37.840000
CVE-2024-11081,1,1,868ddada0bf262c198b91d0f6dc5cc082627c1fafb1bc6c0669f2cc02fb00c28,2024-11-20T18:15:22.340000
CVE-2024-11081,0,0,868ddada0bf262c198b91d0f6dc5cc082627c1fafb1bc6c0669f2cc02fb00c28,2024-11-20T18:15:22.340000
CVE-2024-11085,0,0,36aaba845c0a90c554661f4023115a3f46c67d2a691dfc21b49793447a4b6d8f,2024-11-18T17:11:17.393000
CVE-2024-11086,0,0,f4d7f35e95dad05e023fed49ac9e59da09a947f51bc79e0e10dc6b97e93d7482,2024-11-20T13:15:04.020000
CVE-2024-1109,0,0,54a246b33f975a42367e7b2f8f64c59b5c20293302ad365ae743bbdf357522c9,2024-02-10T04:13:21.610000
@ -243448,13 +243448,13 @@ CVE-2024-11484,0,0,3aa464aa114e9a16609d997b5976852f2e09e31f2772cc684ca98d8b57443
CVE-2024-11485,0,0,06e5567ffff9bf5762cacb559e6f60057c15b345cd5b497e93c1b41dfe58bb98,2024-11-20T16:15:19.990000
CVE-2024-11486,0,0,7c15b276c5e10bb30088f41a466046358ea98a2439e6b7be46e2551e1312d436,2024-11-20T16:15:20.273000
CVE-2024-11487,0,0,4dc442ecc0e78fa6f11201dcdffd8036378dd9553b06e5d3bd37c1017aa4a005,2024-11-20T16:15:20.543000
CVE-2024-11488,1,1,34165f0c813abb9abfee75c83d1b1b40280912f4e239f105712914e94bd63ded,2024-11-20T17:15:14.097000
CVE-2024-11489,1,1,d049b5ca44808d39c4b7cf14a9c92d411e742ce240269b63810bd4e5434ce388,2024-11-20T17:15:14.847000
CVE-2024-11488,0,0,34165f0c813abb9abfee75c83d1b1b40280912f4e239f105712914e94bd63ded,2024-11-20T17:15:14.097000
CVE-2024-11489,0,0,d049b5ca44808d39c4b7cf14a9c92d411e742ce240269b63810bd4e5434ce388,2024-11-20T17:15:14.847000
CVE-2024-1149,0,0,b02f2ba30bfd9b077afbf478cdb43cc9b464ca358abc4a5e9f7416d9d1b2fcff,2024-02-15T17:52:08.970000
CVE-2024-11490,1,1,d294f3c38443dcd020e5ea017596df459d37913b92096d63a59a27081dd35077,2024-11-20T17:15:15.637000
CVE-2024-11491,1,1,02077d131042a2b8c0e7fccccde442b38220ee5d1826aa568f8f9e4b16f9ebb9,2024-11-20T17:15:16.397000
CVE-2024-11492,1,1,d4e1d6df577e501fd3b6a404785d87e1988a7abce6229191e4d8c1c008a388dc,2024-11-20T18:15:22.403000
CVE-2024-11493,1,1,296e3b8a96345bb7228b40375399765470fa3ea89cf10c3cfe96f69eb025afa1,2024-11-20T18:15:22.700000
CVE-2024-11490,0,0,d294f3c38443dcd020e5ea017596df459d37913b92096d63a59a27081dd35077,2024-11-20T17:15:15.637000
CVE-2024-11491,0,0,02077d131042a2b8c0e7fccccde442b38220ee5d1826aa568f8f9e4b16f9ebb9,2024-11-20T17:15:16.397000
CVE-2024-11492,0,0,d4e1d6df577e501fd3b6a404785d87e1988a7abce6229191e4d8c1c008a388dc,2024-11-20T18:15:22.403000
CVE-2024-11493,0,0,296e3b8a96345bb7228b40375399765470fa3ea89cf10c3cfe96f69eb025afa1,2024-11-20T18:15:22.700000
CVE-2024-11494,0,0,5890d4fb88df3d8f55b6792aa5c18e107344b1b8b9d64b1485bac263c175d055,2024-11-20T10:15:05.920000
CVE-2024-11495,0,0,79062961a6b5f76603192d58576bb23157ae662ae3c66c7b46038e4fdb4d0e00,2024-11-20T13:15:04.197000
CVE-2024-1150,0,0,b47a3c09b3a331a50594ab70df2061c7818f30992462806b6f5b7a310a00b60b,2024-02-15T17:42:08.113000
@ -246809,7 +246809,7 @@ CVE-2024-23275,0,0,2c9c1f4d2ca81860bcf12d49a2478f6772035d6cdcedc7473a9a2bfb8f8df
CVE-2024-23276,0,0,b7fa000b367d55e31a4b1c9fd4a1f238256bf2545a07d5e4a633de96f48c7a44,2024-08-28T16:35:09.187000
CVE-2024-23277,0,0,329d44f192e6d8ad64377bfea1b406324a89ddf322f5987758a35ef433724dec,2024-03-14T20:34:31.303000
CVE-2024-23278,0,0,766bded776e256695874796c761a698226a698abed559def31f9f418b44fbd0e,2024-08-01T13:47:14.363000
CVE-2024-23279,0,1,0cfac59bec6198ae482efa1723b7740dc16ed21f2d64facdb2439aacd6044ab3,2024-11-20T17:35:23.370000
CVE-2024-23279,0,0,0cfac59bec6198ae482efa1723b7740dc16ed21f2d64facdb2439aacd6044ab3,2024-11-20T17:35:23.370000
CVE-2024-2328,0,0,db4dcfea63581146a34d92e0d3290b1bf593c898de5919596eb70f461d745708,2024-05-02T18:00:37.360000
CVE-2024-23280,0,0,ddc6f40a9de9d3a8d8165b26792d447c58ff17ce75e5f106261376a7c5e4a9e1,2024-10-31T17:35:02.803000
CVE-2024-23281,0,0,4fecacd73d888b14029108fc1accb8e172c50322968d3c217d22a97f8374b808,2024-11-05T22:35:03.703000
@ -247042,7 +247042,7 @@ CVE-2024-23559,0,0,1cfe950943db323f850a4ffa6fa09a9e594439fd864c25048ffda399bb0b3
CVE-2024-23560,0,0,611d6f496e671cc0d1d356211a118fce6e543142f0a1a253e80e1a53fcc9dde1,2024-11-06T22:35:04.240000
CVE-2024-23561,0,0,05ce6bff2b3c083c40d1cefd8ecfe83b9e8bac92f3576a18d3243c6c46e3bef3,2024-11-04T22:35:03.360000
CVE-2024-23562,0,0,4d517ea8a2763e5506a865d21e69db429e3d16d2d215329e0568829328a2181b,2024-10-23T23:15:12.397000
CVE-2024-2357,0,1,047100f7d23f6fc4c73eb91b24ba51665a90b521f0f43784e71468339885fec0,2024-11-20T18:35:19.917000
CVE-2024-2357,0,0,047100f7d23f6fc4c73eb91b24ba51665a90b521f0f43784e71468339885fec0,2024-11-20T18:35:19.917000
CVE-2024-23576,0,0,adfa1bbd41df2580fc9b0c7a87cd6221bc650972fa1b63f1cdf4b78644242d49,2024-08-01T16:35:05.990000
CVE-2024-23579,0,0,c21892456c22f0f232ec5c1ceee77db91725955ceae3295921c8e393b52d9988,2024-07-03T01:47:55.687000
CVE-2024-2358,0,0,6f4feaa02ea37cd82e67534651d9f0b2cdac6734cb6d67d953e75bc77e24ca55,2024-05-16T13:03:05.353000
@ -247171,7 +247171,7 @@ CVE-2024-23710,0,0,bd7284af235de5db2fd51076f2026e0e8319c2a15e9eab609541ac6fe582c
CVE-2024-23711,0,0,3b2f25c3bfdf9a198d84e7ce79a3c5bc71465fc8bd3a9e12aa99c3c94a4d9db4,2024-07-11T15:05:25.990000
CVE-2024-23712,0,0,99a9a0e98f6ec74442cc23ab4a592b5612be30e655f849926f8cbd43d464cc6c,2024-07-03T01:48:04.970000
CVE-2024-23713,0,0,84ac23a9c686e595929bab4dad7b08bca80d94f5a0dad54d418e0bd955964876,2024-07-03T01:48:05.220000
CVE-2024-23715,0,1,7243fa8d7c0fc8189b10503618634c6b88707441759db0629ff8ade7ded54469,2024-11-20T17:35:23.597000
CVE-2024-23715,0,0,7243fa8d7c0fc8189b10503618634c6b88707441759db0629ff8ade7ded54469,2024-11-20T17:35:23.597000
CVE-2024-23716,0,0,72aa4692fe36e515631363961ebc214b187f38d11478c60001fc03eecbbbe02e,2024-09-12T14:35:11.523000
CVE-2024-23717,0,0,6ae2f39818716426e507c7fefae1ead3e28d18b5fd2ac50fedfcf5c736aa3969,2024-08-16T19:35:03.877000
CVE-2024-23721,0,0,738ea0fe142701915583cf528173779941e7a1ec154f74c48132f1439081fb4a,2024-08-28T15:35:15.520000
@ -247445,7 +247445,7 @@ CVE-2024-24042,0,0,b866c3917f18283c11cab3dd04e447f4e26ea64e6c1cb154e64b25a1b7f81
CVE-2024-24043,0,0,c9f0291d3b3ea0f3d4660ebdd10587f7bae9e2552aede9432383ad105d2d7da2,2024-08-28T16:35:09.730000
CVE-2024-2405,0,0,758f03026c76b7f47d263886ed290a557d382d5cf70707c814c23dc8eb2e5ffc,2024-07-03T01:53:13.110000
CVE-2024-24050,0,0,ee5c3af93ac39c1d9242e4e77bb6e2faff5b394550cb3ee7c80d2d31c43d8a98,2024-11-04T16:35:03.377000
CVE-2024-24051,0,0,1d91890559076f5980bf15f5e9e94cabb5a5df274a545b95ecd8bd06b33e0e8b,2024-08-26T12:43:44.580000
CVE-2024-24051,0,1,c5ed1aba5ac70f550d4f14be8166caf308597328059f7804493b36245a345971,2024-11-20T19:16:25.340000
CVE-2024-24059,0,0,cc5e7807b112ca0c0cee68be0235e3c2f7d399e66c70ee9eee946a6792853ade,2024-02-03T00:40:43.793000
CVE-2024-2406,0,0,87c2a8b3896489a9b03a37a228da22ed5ee51ad5268683466cf776b61ae5f9e1,2024-05-17T02:38:12.963000
CVE-2024-24060,0,0,2e0c6f7f369551ad17564dbd7d463c4c76a814be7028ba2232c5427157eed964,2024-02-03T00:40:48.600000
@ -248983,7 +248983,7 @@ CVE-2024-26278,0,0,a4bf5f7d4f5a8cc66cc891c37bd6872984880cd4b8b9e994fb28df36f06ab
CVE-2024-26279,0,0,495c848487ea7b68d426f27b99de0402b60520a7c129465843fde2c78b15bbc3,2024-07-19T18:53:34.103000
CVE-2024-2628,0,0,09573b659ba12c91153fe41a3eb70641eb4f8cb568e4e66d7b1cdbd070a295c2,2024-08-06T19:35:04.207000
CVE-2024-26280,0,0,50ad290499bb0e7f4914845cafc39bb50b8cd84bff7c79192f6c4ba13a4d77b8,2024-11-01T18:35:03.183000
CVE-2024-26281,0,1,a849d619186af504504fa06c72a1de5232d101cf0e09841ceadc9c64335b2847,2024-11-20T17:35:24.450000
CVE-2024-26281,0,0,a849d619186af504504fa06c72a1de5232d101cf0e09841ceadc9c64335b2847,2024-11-20T17:35:24.450000
CVE-2024-26282,0,0,2415bbc5102339f312e8121d8b848d8a0ee85368a51aeb48af30bc997a57bc8a,2024-11-06T23:35:00.770000
CVE-2024-26283,0,0,70b62f66f453e79526730a72f92e1afaa7ba86c4fe8f0536398a3c1b2d56ab73,2024-08-29T20:36:24.750000
CVE-2024-26284,0,0,ba0c5ee2dd708f43860971c13fc5bba83aa42d583abdba9cf972a949bd992a6b,2024-02-22T19:07:27.197000
@ -250078,7 +250078,7 @@ CVE-2024-27572,0,0,021a88f3c1ae2bf66877708ae71a24ab68a5a10fe16311950a18df580d61c
CVE-2024-27574,0,0,3445d7e232fea473b297543f2639b454fd942ac9a4758abe8e2e7d31ea60e498,2024-07-03T01:50:42.303000
CVE-2024-27575,0,0,be8794a9d53d194bc575e7dee32b34180e95b0c9ca647d9bec212ab94e155297,2024-07-03T01:50:43.093000
CVE-2024-2758,0,0,83f18458ab99013ac8c623c0e7eb4bfe2c9f8eaa4e32e7c3d8c905cc1a10e95f,2024-10-30T19:35:10.840000
CVE-2024-2759,0,1,8fccf2a38a3368754121197f810ef4f77572bc3639a0dab551027dac0b629c6b,2024-11-20T18:35:20.200000
CVE-2024-2759,0,0,8fccf2a38a3368754121197f810ef4f77572bc3639a0dab551027dac0b629c6b,2024-11-20T18:35:20.200000
CVE-2024-27592,0,0,2bb1866167f07ee9274a3bf581a1ca5a19a85b09e387c0707a33412074dd7fff,2024-11-14T20:35:16.207000
CVE-2024-27593,0,0,029f3c2e91f81eb13ffd203db20809d92acce3f5ac8b5078e84e11d1f4fdb2ab,2024-07-03T01:50:43.897000
CVE-2024-2760,0,0,85c06c3412f2f06c20f37186e39e8f13a8e65a1960bf456bbd20de54d50a8907,2024-09-05T23:15:12.103000
@ -250450,7 +250450,7 @@ CVE-2024-28064,0,0,5db58ab15827f5d89b98fe3165771037627d7f9c473b580f2abd9ddc572df
CVE-2024-28065,0,0,e0f1de1046eacd4012e9d6249d2050e67e395f04094ef510445210074f331722,2024-04-08T18:49:25.863000
CVE-2024-28066,0,0,c2a2736221464f46eb769fe0b6456e8f036fffd40dc0d59a61172bd4b1ad730b,2024-08-15T15:35:07.070000
CVE-2024-28067,0,0,a4ab36c1a0f02cd85391b8205ae6018b62f1e3ce44037e321802482d111c11e9,2024-10-30T19:35:09.503000
CVE-2024-28068,0,1,4fbfbac86c2329a3432aa6f25961e53ef015ff37937ef76408aee78939ca2066,2024-11-20T17:35:25.313000
CVE-2024-28068,0,0,4fbfbac86c2329a3432aa6f25961e53ef015ff37937ef76408aee78939ca2066,2024-11-20T17:35:25.313000
CVE-2024-28069,0,0,c685346bb55bf7387451d2fbf1405ced89c60d435f78a40193e6458bfa4c25b5,2024-08-02T21:35:20.240000
CVE-2024-2807,0,0,72cbbe4530c555d4dd2940aeac6ca3cb99d0e169b305a79bbc9962a7b891ce9f,2024-05-17T02:38:31.100000
CVE-2024-28070,0,0,b02bed99aa18fb94d77393e8a0bab2512136cfff81f1cb82c2c934d3f0ee20db,2024-03-17T22:38:29.433000
@ -251297,7 +251297,7 @@ CVE-2024-29278,0,0,1c7d83867b262b09f27588e31bf9841e3af6bdfc0d72746f40dee1d45734a
CVE-2024-2928,0,0,1d00a619d6223f6fddadfce8ecd76fa5d6f829b8d361b3e4066e910bc6258ce4,2024-10-11T15:28:03.530000
CVE-2024-2929,0,0,513249311f09defaddca00249c92a4d2f3037014552979e20d0e342694062636,2024-03-26T17:09:53.043000
CVE-2024-29291,0,0,63e881e67f8d85b826801f0c870d1358f1a422a57593ef79bb6bae9024abdbc2,2024-08-02T01:15:58.367000
CVE-2024-29292,1,1,f9ce2bfafc7aec21107dd061a2982af230bf54b887c310d3c057e28ff4639d7d,2024-11-20T18:15:22.970000
CVE-2024-29292,0,0,f9ce2bfafc7aec21107dd061a2982af230bf54b887c310d3c057e28ff4639d7d,2024-11-20T18:15:22.970000
CVE-2024-29296,0,0,196ce9fc64e2de40c4aad14cdb78662ded04058e63416a22f9fb231921284e33,2024-08-01T13:49:29.143000
CVE-2024-2930,0,0,2e48243b295a8e93d53a35219b2be0089b750f595ca7624319aaf969e99aaaca,2024-05-17T02:38:37.687000
CVE-2024-29301,0,0,fd6e891fb9a2f358e58da35cd58c20873301588e91f1b0a5190d88e70e1e8b21,2024-08-05T15:35:14.157000
@ -252175,7 +252175,7 @@ CVE-2024-30473,0,0,cc643ea6610c054923dcda820bdbaeee3470f2fed9befe993862cdd8d5602
CVE-2024-30477,0,0,2a9c94bd63166efd66be5d42497334130f49f4b0acff68b2e8385a53a877c218,2024-04-01T01:12:59.077000
CVE-2024-30478,0,0,8648debe6405c1216a86c901736f7e8905eccc7e01f0ae6ab2126aef21a3be15,2024-04-01T01:12:59.077000
CVE-2024-30479,0,0,dc5972e51ae5c4d9085a312951d31c7a1307033adf582d496a71c4016c267016,2024-05-17T18:36:05.263000
CVE-2024-3048,0,1,f9feeaa162c2ed25a6f521625ce5d52a1c23a8331ff895073074f6c4f57088c6,2024-11-20T18:35:21.557000
CVE-2024-3048,0,0,f9feeaa162c2ed25a6f521625ce5d52a1c23a8331ff895073074f6c4f57088c6,2024-11-20T18:35:21.557000
CVE-2024-30480,0,0,b33b7f57a3321cd5daad33e04d6baf951eb974f794b47e5823d0c4fbb0662cf8,2024-05-17T18:36:05.263000
CVE-2024-30481,0,0,f260eed3e75ce7805654963acb1b9a08407e71ffc153893529b554eea634e098,2024-10-08T20:49:44.620000
CVE-2024-30482,0,0,10ca3e420c318bd7efd1d9ff7c0685797885e5c3c9336d5f9e0ee32d2856df9c,2024-04-01T01:12:59.077000
@ -252400,7 +252400,7 @@ CVE-2024-30736,0,0,2ced33d674490f24caa86d9cd5af28449006fe8e43616ef44cf265003015a
CVE-2024-30737,0,0,061625de72d7496c66f4433249e7e460e27160d9df381544095455b128a43032,2024-05-27T01:15:20.303000
CVE-2024-3074,0,0,692263c5307e015d32e912e35fe257a32ec29872ecbd1850dca3dc8eb976c202,2024-05-02T18:00:37.360000
CVE-2024-3075,0,0,03cbf98d3e79eb701c4183fdc55446e630b64ce247873cfbbe161828125e0010,2024-04-26T12:58:17.720000
CVE-2024-3076,0,1,aa6fc3b51d3057a74b1d22b857f3c37eb304520775132fc3224dcd14e2c0d120,2024-11-20T18:35:21.813000
CVE-2024-3076,0,0,aa6fc3b51d3057a74b1d22b857f3c37eb304520775132fc3224dcd14e2c0d120,2024-11-20T18:35:21.813000
CVE-2024-3077,0,0,13d0f653548f6e08a428cbd5c76a54d70134d49ca71fc1c43b86001e7767738f,2024-03-29T12:45:02.937000
CVE-2024-3078,0,0,42b453b3e6a827e37a8a77bcf4c4ca7669e48d95d9df326c975a16f05e6cc7f4,2024-05-17T02:39:42.337000
CVE-2024-3079,0,0,f1f95675216f703c162f7205baecbbd680e7e08a69a3f6cb5ab9f6df26e36eab,2024-06-17T12:43:31.090000
@ -253877,7 +253877,7 @@ CVE-2024-32806,0,0,03e8d32999c3a5efc79b13bc3e4fb18e94e6d99ea0a7399671612649aa44b
CVE-2024-32807,0,0,5fcb2610b0f8f7193730bfceb1c8cf9ee7f988425363a4303f2b55142270c2db,2024-05-17T10:15:10.997000
CVE-2024-32808,0,0,0e1a2b235c3b7bd46a18d577ca8639513bc942571c1f797d2fd3e36c55454f3d,2024-04-24T13:39:42.883000
CVE-2024-32809,0,0,d55b0fbad69973f351986c9fcc53d0cd143d959400089a8fce8f63772d8e13b1,2024-05-17T18:35:35.070000
CVE-2024-3281,0,1,de7ffacc35df72293a3157176532645298406fac4e018f3e7cd35c3df239f98c,2024-11-20T18:35:22.063000
CVE-2024-3281,0,0,de7ffacc35df72293a3157176532645298406fac4e018f3e7cd35c3df239f98c,2024-11-20T18:35:22.063000
CVE-2024-32810,0,0,6a865bd7e3c08616d003142afb839e5afabf0b835ab7b19d068e7100b21221a2,2024-05-03T12:48:41.067000
CVE-2024-32811,0,0,638081b1e5b1b690a9536c1d45979321fbdc88533eddc89e04dcc94ec3198760,2024-06-10T02:52:08.267000
CVE-2024-32812,0,0,86238ccef9a58545902a9744b568cff6fc1f9270a86a5025dcc4c13bf66f2c0c,2024-04-24T13:39:42.883000
@ -254084,19 +254084,19 @@ CVE-2024-33010,0,0,e00198869c2ea66a1314ffe3bf412f3093fb7a3278c73287d700256b4d598
CVE-2024-33011,0,0,cbf49377b15ca0b951fbea2819100320e72a74607f7553c2afc6bcaa9b9a7391,2024-08-06T16:30:24.547000
CVE-2024-33012,0,0,4bc8f3dea2723c5fcb6a62672461d04feb3241b18be807657aeefdbc2f2fbe3b,2024-08-06T16:30:24.547000
CVE-2024-33013,0,0,1e8badcd9b1e7582698c15c832838b3a3258759bce9d6a4b7896097159c5c1d1,2024-08-06T16:30:24.547000
CVE-2024-33014,0,0,8f9120c3394c0a348cc97ec4aacda2572b3da3cf93af4a1acad6f607f123b1c0,2024-08-06T16:30:24.547000
CVE-2024-33015,0,0,ce73ea710474934199a1b7316118bad3029df84894826c41295126d49b12424d,2024-08-06T16:30:24.547000
CVE-2024-33014,0,1,17e65450462618fd1135ee3cf9ac036700ee9d40a64a41db01cd1bbba939f042,2024-11-20T20:35:37.887000
CVE-2024-33015,0,1,a8faf6d542966c6a6bbb9517a15e1af6c045ca706ac2d2c8f4197dbd64d727dd,2024-11-20T19:57:11.903000
CVE-2024-33016,0,0,991f608b14254739266aae02c613708ce2455fe761b6eeba78de6d8d7351dede,2024-09-03T12:59:02.453000
CVE-2024-33018,0,0,b677fd6b54a53c9fee206f01ccf5cdc56faac0beecc10ec63cf0263aa9b7b8be,2024-08-06T16:30:24.547000
CVE-2024-33019,0,0,34a99c9d1b449404e5d8c52c560d1d3907132ed509c8da0b6b1fad284d5628fd,2024-08-06T16:30:24.547000
CVE-2024-33018,0,1,5668fd00cc6a4f6e5313830c182c4ab287cb3062984cf4e6c3f55f1036709de8,2024-11-20T19:40:37.843000
CVE-2024-33019,0,1,43905da547e20ddc5999184db945c6cc5763f5423f4b90906083cb2057c0dd04,2024-11-20T19:21:14.377000
CVE-2024-3302,0,0,10a0a5360346a347e0e1404168c46ba9e22d839c53347c2b379db8443b59f174,2024-07-03T02:06:08.953000
CVE-2024-33020,0,0,5b2c148292d798fbf48eb3ae036b19ba78743fd366bcdd6079bd179d27bddd46,2024-08-06T16:30:24.547000
CVE-2024-33021,0,0,3a1ba5e7b1ccc84931a210c3aa2fd9306700a856479629c42d72d707fc0b0cef,2024-08-06T16:30:24.547000
CVE-2024-33022,0,0,2281f81217bc9f815665dbe8ab2d4a85a82f001011bcba67b813d20c14f8b90e,2024-08-06T16:30:24.547000
CVE-2024-33023,0,0,f07c6961c818e42fa07a4c877bc946312ec641a3f9e47b5477d110c399e86fb6,2024-08-06T16:30:24.547000
CVE-2024-33024,0,0,4969e5bddaca7911ae4fd3ce18abf8425c6d1ea66030ccd772575a2259497f2a,2024-08-06T16:30:24.547000
CVE-2024-33025,0,0,b2224958808cef69179c29751ac5699dda8398fa1ca6d6be644feb0949d642b0,2024-08-06T16:30:24.547000
CVE-2024-33026,0,0,298d33f6a8bfb6f36fcf1be4fa982f6af985ae195af9a3a0c45ae097558f81f9,2024-08-06T16:30:24.547000
CVE-2024-33020,0,1,a98b30d9430b4e634a6198b5cb02526958ea7702d8e7c8f8c806c0d1284269dd,2024-11-20T19:24:57.907000
CVE-2024-33021,0,1,ccd01207b2241212fedfd15a9aa7e1a05983d0c04d0b053228e996edcbdee17f,2024-11-20T19:28:00.557000
CVE-2024-33022,0,1,f060fe28200ec9f2009585e6ba8005e628f9fc8acb49fd6512a882e7b277657d,2024-11-20T19:30:31.947000
CVE-2024-33023,0,1,2d72e6e33acd2f182cd77b86d2f40ab4dca52bd8febe3b5a3cd995e64aea36f7,2024-11-20T19:34:07.593000
CVE-2024-33024,0,1,7b658eb6457893e6692bb760b7ef91b7768c00bde3bd8521c906a131d1b97d00,2024-11-20T19:42:03.107000
CVE-2024-33025,0,1,893305928fc94d76559d9da2ebd1b665dd3adfd857cbedb26a1df72241603132,2024-11-20T19:53:16.570000
CVE-2024-33026,0,1,9eb82ed6c143fbfb40eba05956705e6f444a64a5c4af3cff6bb7582ba78b80c6,2024-11-20T19:37:28.193000
CVE-2024-33027,0,0,26992809153af0a3cde7fd5f54a863ef84036157b94429656d19ba0fceae691f,2024-11-20T14:38:17.037000
CVE-2024-33028,0,0,9556e6342bb305ff319688a3dfdbf71c607a65772f46730c46709cc81d9e4868,2024-11-20T14:39:07.953000
CVE-2024-33029,0,0,62f4abf9d5534812dcbd495946ad70608b570bfbd1504fa70c29b97162ab7cc8,2024-11-07T19:54:49.197000
@ -254289,6 +254289,7 @@ CVE-2024-33435,0,0,7db2665c6496dae0749e042f8d814063672abd8fcceac696d209fd93a501e
CVE-2024-33436,0,0,4b7aad63b1a9d18447e5bf42251db2f590710ce8a67d312a75dbe09e1f3c4107,2024-05-01T13:02:20.750000
CVE-2024-33437,0,0,98a2b6e10245b112bb331b45bcb3f30a0dabc9110f63c643d94fcc31a61289bb,2024-08-01T13:51:56.957000
CVE-2024-33438,0,0,5149b18a46d53268b7670d8b6f23e45b58f0f7e28bd1fbf2d1e49eff1651e3a5,2024-08-01T13:51:57.143000
CVE-2024-33439,1,1,cff768f052081c25bf2badebc993fe13750f42919c9e40af177c06d148312b2d,2024-11-20T19:15:06.010000
CVE-2024-3344,0,0,70bfed73bbd8c0224afca425b004f1e6ab3832350ac16bb40ba0f3295e2c6f92,2024-04-11T12:47:44.137000
CVE-2024-33442,0,0,3bf0c7079aa4cdea0cf4fc3dc62abf7d3d6d92d11b677d6553e5342d569d6775,2024-07-03T01:58:14.593000
CVE-2024-33443,0,0,35242e2b0082b15f0bb5de03b6dc07c30701907ec01624317337d782f850f813,2024-07-03T01:58:15.370000
@ -254799,7 +254800,7 @@ CVE-2024-34084,0,0,7d9440ddf04c82559a24e924ee696f81ed9dcd7a55ec24907b743742e82c1
CVE-2024-34085,0,0,5d94e0e1234d28ea1392eb258fba225a24d0a9939e78b10ffa8b6f875a256c7c,2024-05-14T19:17:55.627000
CVE-2024-34086,0,0,104df8351545cea86a5aeab75846aeda1282b00a21f2f9f835c10597aaf719fa,2024-05-14T19:17:55.627000
CVE-2024-34087,0,0,b43933510c12517787f75bed2112cdd5360e703f06365c71649e9989d251d8cd,2024-08-28T16:35:22.590000
CVE-2024-34088,0,1,a80408224d364ca41e4a201f640dddc7eb78225a35e7bd8d6873b90011d1813f,2024-11-20T17:35:26.147000
CVE-2024-34088,0,0,a80408224d364ca41e4a201f640dddc7eb78225a35e7bd8d6873b90011d1813f,2024-11-20T17:35:26.147000
CVE-2024-34089,0,0,5e7107f526e1d12d254978d5169bae34a870123e709df2c6ba63a16f1fef24b8,2024-05-06T19:53:38.797000
CVE-2024-34090,0,0,bd5741ae5c881eed969a6846397df746acefb1b3b796191e30ee091ebe5a715d,2024-11-01T20:35:10.933000
CVE-2024-34091,0,0,316b2e1c1466fafa03f21d7850553c09c4a77fce34562e440629956736be2b9a,2024-07-03T01:59:22.050000
@ -254980,7 +254981,7 @@ CVE-2024-34361,0,0,5168cc961b7acd32b3151096d37c0368d10fe552c02e8547e9bea1142d188
CVE-2024-34362,0,0,5719c5589fbb1889037578d1ce8361ba73ba257d793c16ea51ae0d2d5ac6391c,2024-06-12T13:29:07.643000
CVE-2024-34363,0,0,29fcce7b6e913bdead357ab5b9389335d62a3a260d09f4e099131952c971f5ff,2024-06-11T17:44:14.347000
CVE-2024-34364,0,0,16d3b1c447511f5ba065cf18435b78c90cb58ee194acb420be34d56a1e4088a7,2024-06-11T17:20:27.203000
CVE-2024-34365,0,1,2a15532a52d93b882067af0f92df755a1c94eaf5d9ad1f120aa56a5cf6419d41,2024-11-20T17:35:27.017000
CVE-2024-34365,0,0,2a15532a52d93b882067af0f92df755a1c94eaf5d9ad1f120aa56a5cf6419d41,2024-11-20T17:35:27.017000
CVE-2024-34366,0,0,f5fb53fee5d33e6c04dfd75d1bc82cf4356fcf1cec4db7359e4c88746e95e769,2024-05-06T19:53:38.797000
CVE-2024-34367,0,0,b938dbe32bc0f2b2b08fe9afbb49f3e7437c5991332ead460ffded5315763ead,2024-05-06T19:53:38.797000
CVE-2024-34368,0,0,3be6ba8c94d9b0485281637fbc03b0202fd9deceadc0680ff9568480d31bd12b,2024-05-06T19:53:38.797000
@ -255101,7 +255102,7 @@ CVE-2024-34481,0,0,e2a3e65c4103fe32da9193eb433184ea87fbd297993203e84b18d9ad821ef
CVE-2024-34483,0,0,6f3bfc57c4ac08b52bc633ea80c521be2c99b03f22d863fb736d441dc611c592,2024-07-03T02:00:16.293000
CVE-2024-34484,0,0,1f03b9dcfd21c2d1e1e4109b895d9faab7d5dde86fb48f1db146804d6f2ea32a,2024-05-06T12:44:56.377000
CVE-2024-34486,0,0,f93c0e2186ca66e0dc95b1ea19ad0932973e939f81793a6d44ba3fea5b8487f5,2024-08-01T13:52:24.443000
CVE-2024-34487,0,1,f8a502380ab1e377fb91e288027c5b0a32280a04c3867681b304cf44a4ef3e0b,2024-11-20T17:35:27.303000
CVE-2024-34487,0,0,f8a502380ab1e377fb91e288027c5b0a32280a04c3867681b304cf44a4ef3e0b,2024-11-20T17:35:27.303000
CVE-2024-34488,0,0,bd1886e792bd0f0be5174d43785b1ee8c3d2805a0b92328a691bf28c3b9e55ad,2024-07-03T02:00:17.670000
CVE-2024-34489,0,0,98fc4bbdad28e1f470f6bbf8edfd27b4d57977594296e589fe4b4857cec1a304,2024-07-03T02:00:18.727000
CVE-2024-34490,0,0,8682749851a19fd719239443e2502b58b0b536d71d97e88f6d39bdad053f0e7a,2024-07-03T02:00:19.953000
@ -255307,7 +255308,7 @@ CVE-2024-34706,0,0,d37668f824cae92c94d3d4080655a3f7931abe160a13955740cf593692644
CVE-2024-34707,0,0,92351a72b9df02ccb187c386dac1b1a7856d7ac67d7318f75d8c78237ff0f469,2024-05-14T16:12:23.490000
CVE-2024-34708,0,0,ddcff80f674ca3ed50080eea78a77d561cbc250193cb5d568a1a82a28c5bf6cc,2024-05-14T16:12:23.490000
CVE-2024-34709,0,0,adf6d2b81a5e40a88a3da30770e9ce95dbdae2bb46c4d3799e84ccb57fa2d50c,2024-05-14T16:12:23.490000
CVE-2024-3471,0,1,73ff09fc2c28ad3524b5b1ca804dca3bd6fc9f46aa8366de3c284efe7aa3af53,2024-11-20T18:35:22.923000
CVE-2024-3471,0,0,73ff09fc2c28ad3524b5b1ca804dca3bd6fc9f46aa8366de3c284efe7aa3af53,2024-11-20T18:35:22.923000
CVE-2024-34710,0,0,7965ba19eedea6a8e4d4ccc9754ad83b6a2971391afa999b1f4b01b06b69f205,2024-05-21T12:37:59.687000
CVE-2024-34712,0,0,3f1dde6d42ea063d9e476d7cbf6f83ce13ff1b68be852ea9528dcb38a2c181a5,2024-05-14T19:17:55.627000
CVE-2024-34713,0,0,dade094148c26177c5c5e0a9b6aed3312784fd8ef4a22e49caf276d789f44a17,2024-05-14T19:17:55.627000
@ -255663,7 +255664,7 @@ CVE-2024-35272,0,0,4c1a47b56d7417b088998b4603214b936945d403bf6190e9e2c7cd926cf7a
CVE-2024-35274,0,0,469db2ced6f82069a481a1e075e780926859c353f46e8b5b311a2688050ba842,2024-11-13T17:01:16.850000
CVE-2024-3528,0,0,c96e1e132295c243d4fa4a90d8abf77e41d771305ddbcf81d644bca2cdde7da0,2024-05-17T02:39:59.157000
CVE-2024-35282,0,0,fe23f4116601299cd085746b33d91adab4014743ea1af63d79bf69af6ebb68e0,2024-09-20T19:44:17.557000
CVE-2024-35283,0,1,ca0b3f00a38824c3aed71cdb1138e6e91cf615412bca500f8e6650cd8dfad427,2024-11-20T18:35:20.470000
CVE-2024-35283,0,0,ca0b3f00a38824c3aed71cdb1138e6e91cf615412bca500f8e6650cd8dfad427,2024-11-20T18:35:20.470000
CVE-2024-35284,0,0,3a94c448d00dd5059f3fd361118e6cd65d80e9412861f2d6774f390c6aa71d9d,2024-05-29T19:50:25.303000
CVE-2024-35285,0,0,76a41b3575cee58df6a92d4d67ad746bb5986287224218feccad1dc78e0acbbc,2024-10-23T15:12:34.673000
CVE-2024-35286,0,0,750facd12e2c01a8ba1e0bf72f7c63f3d0fd7caac4133b6f0d25286457d0ae82,2024-10-23T15:12:34.673000
@ -256506,7 +256507,7 @@ CVE-2024-36286,0,0,7d09221a564e0c2df0ff5611559a80db23ca3f0bea1adae57d3ef567da0d5
CVE-2024-36287,0,0,58cd0f96868d0f87ad27a0900cc18166044a8ed0400369c58b15a0b5d92f53af,2024-08-07T16:13:00.603000
CVE-2024-36288,0,0,f27253452fa242bd38d9e8a6852071d40fc41ce412d6b25543b2bb1fcbe8c01c,2024-07-15T07:15:05.230000
CVE-2024-36289,0,0,c81e4dcba680502adf1e6cb5fb9cf85188de117b98260b47eb77431186ce409a,2024-07-03T02:03:02.973000
CVE-2024-3629,0,1,02f51104eec9b528b26df3269b71deb72cfae6ae02d6f7b5853e996dbdb9db74,2024-11-20T18:35:23.183000
CVE-2024-3629,0,0,02f51104eec9b528b26df3269b71deb72cfae6ae02d6f7b5853e996dbdb9db74,2024-11-20T18:35:23.183000
CVE-2024-36294,0,0,ab00c27961eace667f9ea5e5ad7b6cd8c0f468a3668d36549eb32d498e33b135,2024-11-15T14:00:09.720000
CVE-2024-3630,0,0,bdc2182e4eec98ff9c8b84bc3c1a34a4c9de2619b28e4dcc17481a1a7a7b6f08,2024-11-07T16:35:19.253000
CVE-2024-36302,0,0,97f37a0491b91273ea881320e1230a32004b42aecc2ad6ef769b0832e9456ade,2024-07-03T02:03:03.750000
@ -256596,7 +256597,7 @@ CVE-2024-36434,0,0,8fba84c9c20ed6e9e38e371f6a7314cc80d9ab38ed1fc3ffdc1e7c8b52186
CVE-2024-36435,0,0,42aa941ee425d333c537ed403b5f168d15cf55caec805a299bb4c45521e1c947,2024-08-01T13:52:50.527000
CVE-2024-36438,0,0,fcbe2e02dbfe7753ae10ee196c2c3d66e08c15fdea4edc31b3da8e63f435a898,2024-08-01T13:52:51.240000
CVE-2024-36439,0,0,53640dcff33bc5be3aae865e96f45e5b04acc4f9a249851cd066fcd8fafec018,2024-08-23T16:18:28.547000
CVE-2024-3644,0,1,289cd84d76eba7566a7f3a12e6fe432fd296cc1682decfe552f880b571bb7420,2024-11-20T18:35:23.437000
CVE-2024-3644,0,0,289cd84d76eba7566a7f3a12e6fe432fd296cc1682decfe552f880b571bb7420,2024-11-20T18:35:23.437000
CVE-2024-36440,0,0,59ab2a39d6c2dd526eff525f8a252fc4b6d83dfd01305d7415645bc4cb89310a,2024-08-23T16:18:28.547000
CVE-2024-36441,0,0,2b88ed4b9b9e3ad047e589055d5c5d9766a5fd9d7690c7cf12f1bc3c5c619d9d,2024-08-23T16:18:28.547000
CVE-2024-36442,0,0,1c399162807c537e1f340452dbe4754afa92739719bfa0084f2ebab835ea4147,2024-08-23T16:18:28.547000
@ -262860,6 +262861,8 @@ CVE-2024-45507,0,0,b2cf0920dcb75db868de7b4afd51449cea360da72164b9b7e7a575176b0c1
CVE-2024-45508,0,0,a7bf13ff5f2bf318e53d0cc8b12c1b5ac7eae45f1991e7b683a2e3673a166bb9,2024-09-04T16:44:08.247000
CVE-2024-45509,0,0,2da4a07b41eb99a3059398ff74aeb7ba3be7995744fd94f415c5c3e9d41f0b5f,2024-09-04T16:45:08.597000
CVE-2024-4551,0,0,f0a0f74f6dfab215971682e84a8c3d35d9da568954bf14d9189d7462b5493bd2,2024-09-20T00:24:08.597000
CVE-2024-45510,1,1,512f8eea14a2ce4c554c8faebda6469e621968abeb5177b5849fd159d5e2820a,2024-11-20T20:15:18.943000
CVE-2024-45511,1,1,a33b00ed5286e02a99a5d7d32b95a722e842936b42cb3272cb3598da231788bd,2024-11-20T19:15:06.123000
CVE-2024-45518,0,0,9735413fa02ac827dc734eb603d392ab15d93caac171e362b785c2b23afa3a6f,2024-10-30T21:23:59.893000
CVE-2024-45519,0,0,ba02770fed1525b5b4f0df98b6cf30b24de2e09da9e676dc121caef23db2992b,2024-10-23T15:39:23.220000
CVE-2024-4552,0,0,a910e848f992d4848b5a9057809234cfe8833a167abb01396097dc34db4ca3d3,2024-06-04T16:57:41.053000
@ -262927,10 +262930,10 @@ CVE-2024-45678,0,0,a1fda46a16546e5971e32d47cf6c55c6e5adf9e7e7bc6498d2c3cdc35ca99
CVE-2024-45679,0,0,b98f85803530a208de6f955471a00fda8462357bfd07c53d204959dc086af47d,2024-09-20T12:30:51.220000
CVE-2024-4568,0,0,950b62937f2f303cb16f164d002be64527131317e5dfff26daecb96b6bec4236,2024-05-07T13:39:32.710000
CVE-2024-45682,0,0,8584442aa3e66ef486ff4d0e65e36dc65b16a5528e312d936a157a665ef44302,2024-09-27T18:54:51.820000
CVE-2024-45689,0,0,c7e979f31e1bde92d5b4da5387428b58120f1325596ab42847b6eba43ff3aeb7,2024-11-20T11:15:05.337000
CVE-2024-45689,0,1,6e124b6ad87a6e953df96f9e4b72e7f165b5e26f7ae6e42a154710793d167512,2024-11-20T20:35:10.157000
CVE-2024-4569,0,0,2e4b27b05be8561bd3f260b3ccf0eed0d11ea74483878f5df5227737faa1c038,2024-06-28T13:10:05.153000
CVE-2024-45690,0,0,74454f7c531bfb80a37c3fdc1f763db2a09dcbe2ca0c5bb3597e3500efe2f820,2024-11-20T11:15:05.413000
CVE-2024-45691,0,0,ca4f55343dfa025487a6d3aee03385fc29227f8ef98bfe91847acc674bc2317b,2024-11-20T11:15:05.490000
CVE-2024-45691,0,1,6cf0734b3b1bbfe46d94206888f2657e4fd0103a6560ef66f8d239ce88dda949,2024-11-20T20:35:10.377000
CVE-2024-45692,0,0,281ed60ed9431c734132a4f1fca034600bdda2bdb5b83bc44745bc26a826447d,2024-09-05T21:35:14.337000
CVE-2024-45693,0,0,8326a6a6c02d5129a5009d67c10554cd90e2c8aefe000e24bf1668842bfb6519,2024-10-17T20:21:11.913000
CVE-2024-45694,0,0,6df0853247a969905230185a9047d7f0b5d3157f1a7bc76614dde5322218c3ae,2024-09-17T18:40:07.243000
@ -263450,21 +263453,21 @@ CVE-2024-46764,0,0,12c93d62cf976e0fac2b5ba84bf2f54a4d1d5062174357996a20e7c4bd1fa
CVE-2024-46765,0,0,584f96269688e10aedc11057947f82fa03feb9c9ca3ecb2a522bbf502bad2684,2024-09-26T13:24:29.697000
CVE-2024-46766,0,0,55d63c81e0644404ba2b3c5eec2e0e368cac985d5fcde38c97950713f33905c3,2024-09-23T16:15:23.823000
CVE-2024-46767,0,0,fd3b90678eac65bcb3233c07c19427fffd1566d14f3f9a8041e6042771984f5b,2024-09-20T12:30:51.220000
CVE-2024-46768,0,1,ee740127af67ae8086ba37a9f2512a554b9d048c382b04d9070cf9b51579f1a0,2024-11-20T18:19:35.033000
CVE-2024-46768,0,0,ee740127af67ae8086ba37a9f2512a554b9d048c382b04d9070cf9b51579f1a0,2024-11-20T18:19:35.033000
CVE-2024-46769,0,0,c9bbe9575cc2848fce277d2f64a3b4e07e53acfd7fdf23d95dd87f904a651799,2024-09-30T12:44:27.907000
CVE-2024-4677,0,0,06b789b4e22353188f4fa1dbcfc045ef487187889647b738ddd6f1b3dabcd887,2024-06-04T19:20:45.830000
CVE-2024-46770,0,0,7f952820dc90535bd167d3f017a589524ac6f56b9d3dfae2b4b9bd0b58f79ea0,2024-09-23T16:13:25.563000
CVE-2024-46771,0,1,71a4de85b53379f94526037df901498ea6ac4fdcecd02ba212f18e76a39be045,2024-11-20T18:20:03.130000
CVE-2024-46771,0,0,71a4de85b53379f94526037df901498ea6ac4fdcecd02ba212f18e76a39be045,2024-11-20T18:20:03.130000
CVE-2024-46772,0,0,a8ae53586f05d332df3222762c5e7961597b69a5b7445f0db6ae4d1db439b4de,2024-09-23T16:52:17.577000
CVE-2024-46773,0,0,d50dc13b3db60a3fbb1947c3c76c4140c6ced2f89d983703c7f17bd27e5be084,2024-09-23T16:51:59.983000
CVE-2024-46774,0,1,674493f028c34fd9192163f3608c7ec506bedd3e768bd43034605534a0b63a17,2024-11-20T18:19:00.327000
CVE-2024-46775,0,1,262156bbdb73176f9653b3b68eae0bc78294be6056ada06350ce5793116d537a,2024-11-20T18:17:13.750000
CVE-2024-46776,0,1,b229f205a3358474780929aaa686adb3d080d222663cdf9e1e6c1a3682667d66,2024-11-20T17:56:57.290000
CVE-2024-46777,0,1,65946aeaba38bf8caf0ac1d615bdf194883b7f45fa3d6f1a8acae5d588c93e92,2024-11-20T17:56:02.287000
CVE-2024-46778,0,1,63f5cb21b3c66a3fbccb3f4f323eed19d16dbd087dd987cb02ef3d17b8ecfb2c,2024-11-20T17:40:37.847000
CVE-2024-46774,0,0,674493f028c34fd9192163f3608c7ec506bedd3e768bd43034605534a0b63a17,2024-11-20T18:19:00.327000
CVE-2024-46775,0,0,262156bbdb73176f9653b3b68eae0bc78294be6056ada06350ce5793116d537a,2024-11-20T18:17:13.750000
CVE-2024-46776,0,0,b229f205a3358474780929aaa686adb3d080d222663cdf9e1e6c1a3682667d66,2024-11-20T17:56:57.290000
CVE-2024-46777,0,0,65946aeaba38bf8caf0ac1d615bdf194883b7f45fa3d6f1a8acae5d588c93e92,2024-11-20T17:56:02.287000
CVE-2024-46778,0,0,63f5cb21b3c66a3fbccb3f4f323eed19d16dbd087dd987cb02ef3d17b8ecfb2c,2024-11-20T17:40:37.847000
CVE-2024-46779,0,0,9459e2bbf4547b8d8450c1952a14b96461b698fba144de37fd66253536f5c10f,2024-09-23T16:37:51.473000
CVE-2024-4678,0,0,be695eaab1f72a88b10d5b9b54afd539ecd5dccc02b3dde1eca881aeeba1ff59,2024-06-04T19:20:45.930000
CVE-2024-46780,0,1,f11280a31c667cc558d9097b2fdcbf0e351d3b09c3c67c2e9a5986ac93884fb7,2024-11-20T17:31:54.440000
CVE-2024-46780,0,0,f11280a31c667cc558d9097b2fdcbf0e351d3b09c3c67c2e9a5986ac93884fb7,2024-11-20T17:31:54.440000
CVE-2024-46781,0,0,b7800767661ad72dc7d9b50173ef44ead44890ec84d2e21b5c9fa258abff2f06,2024-09-23T16:37:07.117000
CVE-2024-46782,0,0,8fc9ad3608da20697ed5d3ccf36f03f0ef1fd876169984385298851863cf19f3,2024-09-23T16:32:04.373000
CVE-2024-46783,0,0,70531073079a8c8ac29e6e1c446f67895f92dfb43b67b6c609e333e90673bcd9,2024-11-20T15:47:35.273000
@ -263473,13 +263476,13 @@ CVE-2024-46785,0,0,3c5b13d46d7bf1096dbbf64131b42dd8dc761cb5c75995e3c1cf54795d428
CVE-2024-46786,0,0,25c7670eeacc5e83ba81db4459f557d546315f042b4010db6dd6a4480e89f0e5,2024-09-26T12:48:37.447000
CVE-2024-46787,0,0,28621b503bd078f2b0141b3d6d74179143aa95798c87759eebe0f345e318857a,2024-11-20T15:33:08.557000
CVE-2024-46788,0,0,695266a8c696b6d7e3425cc0a9ed86e76a0329cbee6a482b93b62801857e8044,2024-09-20T12:30:51.220000
CVE-2024-46789,0,1,c3269567de8f6eac1c676e3d988c555c4ae91be4c929b335b733006adf2d460d,2024-11-20T17:27:03.197000
CVE-2024-46789,0,0,c3269567de8f6eac1c676e3d988c555c4ae91be4c929b335b733006adf2d460d,2024-11-20T17:27:03.197000
CVE-2024-4679,0,0,9bfb1104bd992ff014fab2b1166f6f818504f2232183224a6a702e4c44b2119a,2024-07-02T12:09:16.907000
CVE-2024-46790,0,0,d27eade819ed2fd15185afc828dfb8999a9cfdae3e96ed34fd07c06d351f85e6,2024-09-20T12:30:51.220000
CVE-2024-46791,0,0,2949ee11720d44bcaa052e660ce7fdc2dacadc36031963879d79e5b14b90b05b,2024-09-20T18:21:19.457000
CVE-2024-46792,0,0,5038c4c1693692d5253e8551ff854391bb6738497f066bf8f1ac22d03388831f,2024-09-20T12:30:51.220000
CVE-2024-46793,0,0,5452cb2817c8065947f735ef97ead551e1c7be7210a5f52312096dcde22888bc,2024-09-24T16:00:17.977000
CVE-2024-46794,0,0,4a5040d28c02875cb7f0ceba00353539020b8be79b10a6b6826a3f96b115ba34,2024-09-20T12:30:51.220000
CVE-2024-46794,0,1,3bf5f09cc29c70ce8917817495e3813500614f8aceb69ff6239db0d4936483ae,2024-11-20T20:56:49.150000
CVE-2024-46795,0,0,55d6e0bba7bd481c945e6a93dbfcd32f89fd250eb3ae7b4fbde929ae04db9d69,2024-09-20T18:21:04.067000
CVE-2024-46796,0,0,28472ecdbcd97592496f972f38ed0e2707ca54f7f2402c660d26ed0e341ec07d,2024-09-20T18:20:35.837000
CVE-2024-46797,0,0,239bb9221da06bc577ba6d1fb233ef14e7a13537287f8c044cdc8bb4757e9b22,2024-09-29T15:15:15.837000
@ -263499,23 +263502,23 @@ CVE-2024-46809,0,0,dcfa6f78752d8dfd4941368385c7effd649ce285f1db49426196bd75d645e
CVE-2024-4681,0,0,fe9d790ee9979c1aca5fe28a3e8115d4c327b815a1753595a7df398a95b1856e,2024-06-04T19:20:46.033000
CVE-2024-46810,0,0,d6ed42b54ce1c1237fa733d10c7a872f52146f4cfd255a9fa7accbbb83ebd3f2,2024-10-04T17:43:04.277000
CVE-2024-46811,0,0,e3c61e9558dd1a3f131364b8d64c8ba6f14ec560c30f285430f0270477a47445,2024-10-07T14:24:56.860000
CVE-2024-46812,0,0,134272cc7effe83799d5018c6b8c85291ae3808b9eeebc0177d5fdded748636a,2024-09-30T12:45:57.823000
CVE-2024-46812,0,1,ab25e4957fa6f544eaeadbefeeba1fa4f4f4260c5ec7185c361ae61d213dcd85,2024-11-20T20:48:48.663000
CVE-2024-46813,0,0,ec855766c2269aedb12237a993dfb5b55059aae43c85d0e5552568c0bcce8660,2024-10-04T17:38:17.740000
CVE-2024-46814,0,0,80befd72986fd4035afe06cedc03a7664f2ffcaf670ef7869d07a2b36466e8ce,2024-10-04T17:27:47.450000
CVE-2024-46815,0,1,c299d5fd5955b01dea3d800f7bc23cd424d44f684b18d348ce43ae25f9c523b3,2024-11-20T18:22:12.017000
CVE-2024-46816,0,1,65fec096967b53105bad0893cdaafe0a8bb3271c2ee45a1b1df56c13edd560fe,2024-11-20T18:02:52.437000
CVE-2024-46817,0,1,5a8208eec476849ff25de3af23936cbbaef5ec006d085abcf7c4f9c88ae2e37c,2024-11-20T17:45:43.893000
CVE-2024-46815,0,0,c299d5fd5955b01dea3d800f7bc23cd424d44f684b18d348ce43ae25f9c523b3,2024-11-20T18:22:12.017000
CVE-2024-46816,0,0,65fec096967b53105bad0893cdaafe0a8bb3271c2ee45a1b1df56c13edd560fe,2024-11-20T18:02:52.437000
CVE-2024-46817,0,0,5a8208eec476849ff25de3af23936cbbaef5ec006d085abcf7c4f9c88ae2e37c,2024-11-20T17:45:43.893000
CVE-2024-46818,0,0,fe798b484e17caf3bda06ab6aba71d50cbde163879fa6025cdd90b9e91e24bea,2024-10-04T17:18:36.613000
CVE-2024-46819,0,0,48d86dbd2f9dcc09d09972864acc79179bab0022e56037f99c750892b571c5b3,2024-10-04T17:11:00.570000
CVE-2024-4682,0,0,b188d20fdb53d2324882bc38bcdbd4c51d4b6beb562fc8362c2866e7563895e8,2024-06-04T19:20:46.140000
CVE-2024-46820,0,1,530ef5d90934aa384637a2025e464ca9658f0fb315dfe973fa7d8ac7dac79183,2024-11-20T17:34:05.143000
CVE-2024-46820,0,0,530ef5d90934aa384637a2025e464ca9658f0fb315dfe973fa7d8ac7dac79183,2024-11-20T17:34:05.143000
CVE-2024-46821,0,0,646f132e7ed27c2717e047a01ec92f6d102c4152b9e0279d740913fed403825d,2024-10-04T17:06:43.573000
CVE-2024-46822,0,0,c8a3d9e215b85580ec5917e738992b4dc25efcf9e837d449af86f4aa8203218c,2024-10-02T14:24:01.757000
CVE-2024-46823,0,0,a167de10545a153c3d95daa6a21be068049a4c361c32c751cae65bc6ee29695c,2024-11-20T13:59:52.723000
CVE-2024-46824,0,0,e0a90c0b6b8be6e8cdf7ea82a8f4714c063f5420a085c7bc4fdc88f4640c9615,2024-10-02T14:29:08.417000
CVE-2024-46825,0,1,489d14aa4370a6b8abf31f5b609f2e027c90ea80208491ed95bd1ab23466dbec,2024-11-20T17:24:04.660000
CVE-2024-46826,0,1,3d93083c38eb2145a4685a9a140cc89964cd35bbc56a9be19b7147ec9ebdc9bd,2024-11-20T17:19:00.183000
CVE-2024-46827,0,0,40baba2ef01956ae5817a5c6c5f01915d6c37f21b62c361b4db5d49834b997d9,2024-09-30T12:45:57.823000
CVE-2024-46825,0,0,489d14aa4370a6b8abf31f5b609f2e027c90ea80208491ed95bd1ab23466dbec,2024-11-20T17:24:04.660000
CVE-2024-46826,0,0,3d93083c38eb2145a4685a9a140cc89964cd35bbc56a9be19b7147ec9ebdc9bd,2024-11-20T17:19:00.183000
CVE-2024-46827,0,1,7619714f6336b4f4254cd737da0e51631b98e9b3484c47affc75bb2353c96dcb,2024-11-20T20:40:40.737000
CVE-2024-46828,0,0,004223b8b179cc9feb2d2821c2f255bfd0f1e8b6e2ee56da948ed2efdc61c3a4,2024-09-30T12:45:57.823000
CVE-2024-46829,0,0,9756f5c42072f53bba1b23c8dae157441c264939ffe910650603ebb072073237,2024-10-02T14:27:57.920000
CVE-2024-4683,0,0,f97d6282ccf029728c8ab8e65ca2b64efa101897ef8ccdc22b5456d11d66a8f8,2024-06-04T19:20:46.247000
@ -263682,7 +263685,7 @@ CVE-2024-47046,0,0,7869fbf4e097ddf562d122b002ca5484caa2f32ab0ccc92f893d14cc4f35f
CVE-2024-47047,0,0,d8855532a1b9b01d9e7fc7225d9d8944472a4e5bcd23ab8d15e96ebcc6becd71,2024-09-27T17:03:35.507000
CVE-2024-47048,0,0,3e2f1651277aae0b881ff2293ea5a1adce6f7fca0dbe63c48af088557b921506,2024-09-26T17:12:07.440000
CVE-2024-47049,0,0,3e6b2d17b4e33f39069cb56c499a02c9b742796ce9abde4b775c7183f5720e70,2024-09-27T17:09:46.980000
CVE-2024-4705,0,1,d259c4d653df071e68c221dae3247d75c673e9cf20139b6f08dcb899bfa4f077,2024-11-20T18:58:42.133000
CVE-2024-4705,0,0,d259c4d653df071e68c221dae3247d75c673e9cf20139b6f08dcb899bfa4f077,2024-11-20T18:58:42.133000
CVE-2024-47050,0,0,4296aa963533e4a7521fa22cb8b50e427318f2d783af0da7884f907ad4fc085b,2024-09-27T15:29:21.450000
CVE-2024-47058,0,0,1e972d8f0df7a48ab103a834b6d9eb8c181e8f51fba2eb0fd8d68faea4946bf9,2024-09-27T15:31:30.917000
CVE-2024-47059,0,0,1ded05aa2ea1e0adbe840bc57816abecb4dbdb9b2a551e659bc55563f7788a30,2024-09-20T12:30:17.483000
@ -264714,7 +264717,7 @@ CVE-2024-48895,0,0,11f1b544314db3e7a2e2f0ae6118cf9681d6a4928b5a8a68633e1e42e5369
CVE-2024-48896,0,0,3369e20ee0c39a35940972233d3a6f057bff00e79eb9a81bb021ceda4d8b9473,2024-11-20T14:47:12.777000
CVE-2024-48897,0,0,5a651bf9ceed3dc79bdeab3d379ead0cb2ab30abdd2679a869c88655c07729fc,2024-11-20T14:48:25.373000
CVE-2024-48898,0,0,33dcb27cf8e50763240699ca31930c2c749d47d6fae90855cdfb6f7b4010e416,2024-11-20T14:46:16.237000
CVE-2024-48899,0,0,0d8ef23611eada8fc0fc63454f34a97709861b32b5e14032cbff7c3fb2b15ca3,2024-11-20T11:15:05.563000
CVE-2024-48899,0,1,e2343bc29701c7dd942e081fd9b9c03c8cc3f4c4605751635b0b917daee962c0,2024-11-20T20:35:10.583000
CVE-2024-4890,0,0,ee7720239380ab5c638f0803999a779457a74687c16e858d2acf0798605f57a2,2024-10-10T20:11:44.610000
CVE-2024-48900,0,0,2b3a5e56342c363922328f10e6f3d06b5c266c3768636276b8919e3a3cee88b7,2024-11-13T17:01:16.850000
CVE-2024-48901,0,0,d75b1ce91db0ab482f676e585ae0cc64acc3419cc25fbdc6e4284c75a5d0d1be,2024-11-20T14:45:10.380000
@ -264774,6 +264777,9 @@ CVE-2024-48971,0,0,aec61daa8e3e4bc8e82a3ac6302404f969998220414a402a4bfea69832823
CVE-2024-48973,0,0,1df97559f56714d73ec761dcc150a7afb6ddaa2583c3474ad5af745f48ebc20c,2024-11-15T13:58:08.913000
CVE-2024-48974,0,0,bca1b70ac99b7db7d345213bfc69c0dea4bcbf3438528546c7259844ada903e4,2024-11-15T13:58:08.913000
CVE-2024-4898,0,0,a64ada88476e7dbd5dca1f8ed9406bed15a3acb87fadbe7d9a4f3102502b7a67,2024-07-23T17:50:44.033000
CVE-2024-48981,1,1,1ae96babf6a4bcc2c78e7f12ca532a4f5fdb10b8ae0b5db7bfe970b52b7f2e55,2024-11-20T20:15:19.097000
CVE-2024-48983,1,1,c25b1c5b11a7a174c8828eba698c43d9664ed2267c90e0cfb70c0a5dcb22d464,2024-11-20T20:15:19.183000
CVE-2024-48985,1,1,a7fa7a5712b72125cff0256e9fc7f9d4582651fb55335db9b19250ae3ea99a4c,2024-11-20T20:15:19.270000
CVE-2024-48987,0,0,bb1285db59c3075341f96aec62f9b4ce4709041d90082c7f3534792a4d32fb84,2024-10-15T12:58:51.050000
CVE-2024-48989,0,0,9073e18090b9ae4eb5079758fa48cb03e03a3dcd9dfe9e38f4453d35dfeb5c4c,2024-11-13T17:01:16.850000
CVE-2024-4899,0,0,7d0ca1543842829897b22c32fd7c3ea389ea1c85b28761d045bc30da0b354462,2024-07-03T02:08:16.280000
@ -265433,17 +265439,17 @@ CVE-2024-5005,0,0,28bdb1683e492d24b33087981d0823dd42f49eeb8c271eabba28b1e925e506
CVE-2024-50050,0,0,66652f02df241336011c1992f267ec2c5372a9547dcd28fcca3e67d65a218700,2024-10-24T19:35:08.107000
CVE-2024-50052,0,0,bf2b7a67576b83d69e87d14ac4239bf8784a5a388f0a9d54bedc6a322c97af62,2024-10-29T14:34:04.427000
CVE-2024-50055,0,0,223ed98e7a7f4160f8634a62679e487b1296c8eb2d61be84de5731c91a2cb49b,2024-10-23T21:45:15.137000
CVE-2024-50056,0,0,862ab8ad8b5ca0def367c55982bb2c45b4f93bd3f7f7c0124b0eb400352da0b7,2024-10-23T15:12:34.673000
CVE-2024-50056,0,1,65852cd5b35b3778c893416578aa58dff542e751590caba7144c5acde66facb7,2024-11-20T20:18:00.460000
CVE-2024-50057,0,0,ba05620682b6a9a556450ee0eed48c115fc6212d5ab9174ae69859e3d6638159,2024-10-24T16:12:52.007000
CVE-2024-50058,0,0,62ecfd8d486a96be612bd84ae6d7050123a99c1eeef7fe7df02a5c30cb36a532,2024-11-08T16:15:45.117000
CVE-2024-50059,0,0,653291e9f66f3aebf5c844ab31fcc818fd9067a2f5f994c3daf2f8308b7dfe88,2024-11-08T16:15:45.267000
CVE-2024-5006,0,0,275a7db4a7750ed7acf4e95109b09b599d0f03c3ae61db2773b61bbc80a38eed,2024-06-11T17:36:24
CVE-2024-50060,0,0,eb351b3ab760e96eb16cafe62aff8422358fe64e2442d5ba785b82df12fcb827,2024-10-23T15:12:34.673000
CVE-2024-50060,0,1,0f714ff1584d3a2f8e6a3b2a4a13b6b101e6250c6d37b58bad5b19c63cfc75dc,2024-11-20T20:25:37.210000
CVE-2024-50061,0,0,adfa4c7105f2a2d6ac6001b08865d994315eaf40295441d8499676332f52333c,2024-10-23T21:48:29.030000
CVE-2024-50062,0,0,fb76c5d17773e9b99ba2a7f2c28322bbec6aca19454d77f6ffd53fa694af65b4,2024-10-23T21:48:57.737000
CVE-2024-50063,0,0,335825fddda843a4f3cb56868f3f1152d45953fe44c5ec530af3e8acfafdbb95,2024-10-23T15:12:34.673000
CVE-2024-50064,0,0,0fbb48f98a0eb4f4ff5ac7ecc0e869de5fbcd36b7eb760b827cf0f646f0d7eab,2024-10-23T21:49:29.423000
CVE-2024-50065,0,0,798ea878f6caa10adb303d247fc046bf695b098e873c9993ee906b7bb5d17e5c,2024-10-23T15:12:34.673000
CVE-2024-50065,0,1,acca9cf28f900ef40d178c4343451c865da897e4de8fb20ebb290b68db23ec11,2024-11-20T20:07:01.320000
CVE-2024-50066,0,0,b3bb02ba0974e5b5a24b8679fabb6bb49ad893447f49a1e1929628709c3f45f4,2024-11-05T20:19:07.983000
CVE-2024-50067,0,0,cd7f92b058928f9381866d19ee3707f46c9ff67524491021fd1106cc3aa345e8,2024-11-17T15:15:19.113000
CVE-2024-50068,0,0,b357b7d6a2971d612ca74bbd17c1e805d468b220432de66ab123477d4c8a0299,2024-10-30T16:57:35.427000
@ -266043,7 +266049,7 @@ CVE-2024-50955,0,0,8157390cc8753ab3c3dc03f615378f98ac2c1983a215bd6243bc7dc27b803
CVE-2024-50956,0,0,61199958fcf25ae9206f0f8875ee79a0e783a402692b34e9d18c29f4a470b75f,2024-11-15T13:58:08.913000
CVE-2024-5096,0,0,5ed717834c38883681c6d180e391a0fccee5714f6ff3215bd896b6366e61be87,2024-06-04T19:20:58.687000
CVE-2024-50966,0,0,c0f005c4299dd685198e56d1be45ab03ba5dbee734217c81e9ee9426dc60d25f,2024-11-08T19:01:03.880000
CVE-2024-50968,0,1,865af00b0d3359238b453f9ef69955e0280211f860d95e8839fe9707addc1032,2024-11-20T17:35:28.470000
CVE-2024-50968,0,0,865af00b0d3359238b453f9ef69955e0280211f860d95e8839fe9707addc1032,2024-11-20T17:35:28.470000
CVE-2024-50969,0,0,f82f81fef8a82d72e4053f9ec8030a8d4d20833c5d6be0f5bb0e03f29d0491f9,2024-11-14T14:47:53.487000
CVE-2024-5097,0,0,f8c17c92eeab06c631c7e3bccbcd56a5be798bb0ae3554a5ecf4b2a49f948336,2024-06-04T19:20:58.787000
CVE-2024-50970,0,0,8dd8091efad0e3e366d58c3e5e49254ef2beed41cb2828ce8202543afc0c5fb4,2024-11-18T20:35:05.977000
@ -266135,8 +266141,8 @@ CVE-2024-51152,0,0,2fc415b0efc6d5417097e1245b382b91c976aaa5917a1040e7761d3f03c4c
CVE-2024-51156,0,0,950cb85b625d9788feaa8ca00bca17d1dc7f49ab66d36281c4121d0068dc7fe0,2024-11-18T18:35:06.703000
CVE-2024-51157,0,0,113cde3c71891d82bf55f2d0b4674fdfc6000fe1838706cb74a6d985959d76d5,2024-11-18T15:35:13.060000
CVE-2024-5116,0,0,8edab88198021b2d3b9901d621d1dabac4b2933945eb225d0257a88c98ac3f15,2024-06-04T19:21:00.430000
CVE-2024-51162,1,1,1be07bd670c45a51346041c05a664e0548effc328bc31730e943243cf7caa6dd,2024-11-20T17:15:18.120000
CVE-2024-51163,1,1,2ee787ecc47f7f401ec200ba94b7e62bfd2bcdba9d49d68dcab0a0ec8127078a,2024-11-20T17:15:18.417000
CVE-2024-51162,0,0,1be07bd670c45a51346041c05a664e0548effc328bc31730e943243cf7caa6dd,2024-11-20T17:15:18.120000
CVE-2024-51163,0,0,2ee787ecc47f7f401ec200ba94b7e62bfd2bcdba9d49d68dcab0a0ec8127078a,2024-11-20T17:15:18.417000
CVE-2024-51164,0,0,ceab88983ac8f1f076554a5fc06b1fdf761a41119ff559a9cb41cb2ae46055ec,2024-11-18T17:11:56.587000
CVE-2024-5117,0,0,8f71e5dda3348556d6b06143dcd47b79229dad0468d30aa7c38f8c5c1ecb8524,2024-06-04T19:21:00.547000
CVE-2024-51179,0,0,1ac36b7f8ecbb6442c3e82b8bfc190a784ef1fdb6227f3a1da3d4126f204bf98,2024-11-13T20:35:10.303000
@ -266953,7 +266959,7 @@ CVE-2024-52598,0,0,477258740433139def022fa49fc642fb7eea1c94a8945d9797525cab03b12
CVE-2024-5260,0,0,1ea9956e2812efb1ad02a50e6e15b3c5419e86ea96923b6afc83449c65511582,2024-07-02T12:09:16.907000
CVE-2024-52600,0,0,889882d763fff118298a79c0992b9d094668285ba42b3979d1acce7319312517,2024-11-19T21:56:45.533000
CVE-2024-5261,0,0,0592ac8c89e0cb8027f6648912b9536cab36db7fb70868109d4e1f51168ecc2f,2024-06-25T18:50:42.040000
CVE-2024-52613,0,1,5250f63c9c5511452022eabcd6488c8c26c81f478ff3445bc230db37173dd9d3,2024-11-20T17:35:28.730000
CVE-2024-52613,0,0,5250f63c9c5511452022eabcd6488c8c26c81f478ff3445bc230db37173dd9d3,2024-11-20T17:35:28.730000
CVE-2024-52614,0,0,691c38d1248080ff09180daa940a0ea35464380839e23dd93b5188ae19dfbdb8,2024-11-20T06:15:16.023000
CVE-2024-5262,0,0,83603483afb7387d019b476baa2cae004e6d4e7f9b65a5997b6545bcd7a41b63,2024-06-11T17:18:50.600000
CVE-2024-5263,0,0,997be873c6f28955b5d0d8cb5df3c06ebeb17c50a7068003806eac08a0ed2846,2024-08-07T16:01:35.217000
@ -266967,26 +266973,28 @@ CVE-2024-5269,0,0,fcc703e959dc9fcd54d2dba10777aa46d0a7036a8f955bfd8c508426ccf0b2
CVE-2024-5270,0,0,7ec6ed8f215026bf9d30718594365eb1a902134340d8c0dfba08c80435c07d35,2024-05-28T12:39:28.377000
CVE-2024-5271,0,0,7285855bafca9dd1fc033351db47cae9ea7831aeb2f80b9313f86f9100e15f62,2024-05-31T13:01:46.727000
CVE-2024-52711,0,0,78721fa26ebd510269586a73a1d757b8cf5c952035a30436ca3be9b5757e4b65,2024-11-19T21:57:32.967000
CVE-2024-52714,0,0,658ca957fccc95dcf66f192b351e1eb1aa79e66fe1fbde58b681eba4d3166214,2024-11-19T21:56:45.533000
CVE-2024-52714,0,1,e8174cb74f218481a745eaa4fb4441e2ce8d564c733028629c2c073a4476af1a,2024-11-20T20:35:15.260000
CVE-2024-5272,0,0,d387d985ee64cb70308558e1288744b27040b8f28ef99da7e8b0a0af44167dd6,2024-05-28T12:39:28.377000
CVE-2024-52725,1,1,33f6fa34c3dd7f326aa8525752182246593fbe26f97c40f7481f5dc188051048,2024-11-20T17:15:18.867000
CVE-2024-52725,0,0,33f6fa34c3dd7f326aa8525752182246593fbe26f97c40f7481f5dc188051048,2024-11-20T17:15:18.867000
CVE-2024-5273,0,0,098baedadde55d65116b7be974965fe184b3495f86a75c5fc729e60404fd76e0,2024-11-07T15:35:14.380000
CVE-2024-52739,1,1,101c0b9876bf858a76409f50d2e2d09af749568b9decaf9de2879046e254c2a3,2024-11-20T18:15:23.393000
CVE-2024-52739,0,1,e67c6617d90c4f2c32d6849dbe6387498e43b14fb180727dba9b598a59a70f9d,2024-11-20T20:35:16.147000
CVE-2024-5274,0,0,e7d74c38d2c202c949e1ef012213e640b18c31c48483d84bb8a4761d2997d225,2024-08-14T17:07:13.270000
CVE-2024-5275,0,0,0a8f92936fd54cfeba80497afbb5044228db5d667d0dcb3a75c34af54c4c0fca,2024-06-20T12:44:01.637000
CVE-2024-52759,0,0,80eaed11a6f63280332e88d3cbf4b0530a8471b6b3c6b18c568aa62f2956ad50,2024-11-19T21:56:45.533000
CVE-2024-52754,1,1,f9a9821a7161800e5e382614d4d7ebd64c1ef10d8746c92e43100efcef522e7c,2024-11-20T20:15:19.450000
CVE-2024-52757,1,1,f5c773b49db1f5dbe859127ff27a4aa4ba75101a64418905cb78d116ea2f4b7d,2024-11-20T20:15:19.533000
CVE-2024-52759,0,1,08470462711a12166b9502857167c45e0c73c0f4362bfd9e0cbde5aa910afc64,2024-11-20T19:04:10.017000
CVE-2024-5276,0,0,b98c8bf623aeff1994feca32cb34066ea8ef6a81fb35099972c112f59613dd44,2024-06-26T12:44:29.693000
CVE-2024-52762,0,0,353c63bf6aa3aeb3f0cdcf47d86962135e93381335c1d6bdfca45cd78f17fe81,2024-11-19T21:56:45.533000
CVE-2024-52762,0,1,2da142212af1f3c370b1753b9867e2dc76148c3ba2e7239c746267d4ce514522,2024-11-20T20:35:17.280000
CVE-2024-52763,0,0,c5573017d062db00f6bed25c6759761baf5200224a59e32fc8cc1b829343cac2,2024-11-19T21:56:45.533000
CVE-2024-52769,1,1,b6cb45d7326db7c74bf072246ac67a1dfffc75d7966f0886ca77640876da3fd2,2024-11-20T17:15:19.907000
CVE-2024-52769,0,0,b6cb45d7326db7c74bf072246ac67a1dfffc75d7966f0886ca77640876da3fd2,2024-11-20T17:15:19.907000
CVE-2024-5277,0,0,c22b3e398c55d24f660b1a45a3310a9c6b0abef458e72374f87af318fc09202a,2024-10-09T14:49:25.753000
CVE-2024-52770,1,1,7aa9649a9670c716ce311ac92684885a9b795e1a2574f48cc59bb70ef562262a,2024-11-20T17:15:20.200000
CVE-2024-52771,1,1,5216faefced1eff97e71e61bc18807aec97654fb9fefe72a0573a6ba693a0484,2024-11-20T17:15:20.637000
CVE-2024-52770,0,0,7aa9649a9670c716ce311ac92684885a9b795e1a2574f48cc59bb70ef562262a,2024-11-20T17:15:20.200000
CVE-2024-52771,0,0,5216faefced1eff97e71e61bc18807aec97654fb9fefe72a0573a6ba693a0484,2024-11-20T17:15:20.637000
CVE-2024-5278,0,0,f0307415163f20adf37f2c92a0ed4578caa6aa4e699bedaa3aae52fa3124b77a,2024-10-17T13:56:49.813000
CVE-2024-52788,0,0,10422e316ff1cd1c42e0724b49036642b5ea260660f059be4278fcd3695d7b6c,2024-11-19T21:56:45.533000
CVE-2024-52789,0,0,f36dc0a54a71530ea75878243901cd19d9ac10d089d77a73bd61490fb92dd90d,2024-11-19T21:56:45.533000
CVE-2024-5279,0,0,2c6d1e53ece85fba55c2b83835d7abf75ca4da167ddbecc0aa984e59d469dd0e,2024-06-04T19:21:04.240000
CVE-2024-52796,1,1,c4bd427fdb738f1679f0a9210a59387be5f22896c83df074062019be41d6dd7e,2024-11-20T17:15:20.953000
CVE-2024-52796,0,0,c4bd427fdb738f1679f0a9210a59387be5f22896c83df074062019be41d6dd7e,2024-11-20T17:15:20.953000
CVE-2024-5280,0,0,86594c27d113c80fe7aa0a775d64720f8f3d823c49f62206ae5f1ae12a324b16,2024-08-01T13:59:43.187000
CVE-2024-5281,0,0,d8e0f0c592f3cfcf36fc66f961b905d6afba3d53af3789e65e13042755c0a3cb,2024-08-01T13:59:43.367000
CVE-2024-5282,0,0,d02e51c4b0ee276cbc37162ff12b0d5f63d5cb6622dea90c00e2302f02b5f264,2024-08-01T13:59:43.553000
@ -268698,7 +268706,7 @@ CVE-2024-7189,0,0,ff23bad07ab6275204285dcbecd341c53e0f43077ff255ee222be124d95deb
CVE-2024-7190,0,0,6b10a3300e7f1568fb96fd13af7e875d61c31bab7b7b7e6416cbb0109bea73d4,2024-08-23T14:23:56.243000
CVE-2024-7191,0,0,05a58f0ea89619617ea6d05464587bd2a57828801e18ec1f64442f7e68c768f8,2024-08-23T14:24:48.103000
CVE-2024-7192,0,0,6102e2c061b392d7cc60badb5f7058fe4f352fff0fcb923589fe1aff828e98a0,2024-08-23T14:25:37.527000
CVE-2024-7193,0,1,a7792ab358806bb530ac0c5ce816eeadff0824c0332b64e6f400175db8173aba,2024-11-20T17:04:07.447000
CVE-2024-7193,0,0,a7792ab358806bb530ac0c5ce816eeadff0824c0332b64e6f400175db8173aba,2024-11-20T17:04:07.447000
CVE-2024-7194,0,0,fb8fb327a2568c1f320f1950bfd0d09d6807afbd06bbd21f9382e7a1490f26a5,2024-08-12T14:35:56.040000
CVE-2024-7195,0,0,6200e8d18c215bbfa8ef0be79e3a73b7174d7501600a48a5810d4c572cbb7769,2024-08-12T14:35:58.443000
CVE-2024-7196,0,0,aa78bda25303d7508f05178076eb7f1847a629e60799ff5c817fd6b3a1be9a5a,2024-08-12T14:36:00.460000

Can't render this file because it is too large.